In an effort to have better controls over topic groups, a faster interface and a more modern look, we have moved to a new blog site. Our new site utilizes the speed and features that are native to the publishing platform Ghost.
All posts before 2019 are best viewed here on Blogger. All posts from 2019 or later are best viewed on our new blog site. All blogs can also be accessed on our technology index page, which is organized by more than 10 different categories and can be searched by any topic. This index also includes links to videos that have been made to accompany our posts.
You can also subscribe to our weekly blog posts by entering your email after clicking the Subscribe button from any page on our new site.
As always, thank you for reading our posts!
A blog created to explore technology ideas around protecting the confidentiality, integrity, and availability of data. We work to deliver posts with effective tips for troubleshooting current technology issues in addition to tips for better organizing our lives utilizing technology as a tool. The information provided is designed to save time, alleviate frustration, and provide support while troubleshooting common technology problems and implementing new technologies.
Showing posts with label GeneralTopics. Show all posts
Showing posts with label GeneralTopics. Show all posts
Wednesday, May 08, 2019
Wednesday, April 17, 2019
Scanning to Email versus Scanning to a Folder
Multi-function printers typically include scanning capability and provide many more features than a simple printer. One of the most time-saving features of a multi-function printer is the ability to scan to email and scan to a folder on a computer on the same network. These scan functions operate much the same way, yet have distinct differences. It is important to understand these differences when deciding which option is better for your unique environment. It is also possible that you will use both ways under different circumstances.
This post covers the main differences between scanning to email versus scanning to a folder on a computer on the same network as the printer.
First, it is important to note the exact steps required for configuring either type of scanning varies slightly by printer manufacturers and printer models. However, the underlying functionality and requirements for each type of scanning are essentially the same. Second, the best way to find the exact steps to follow for either type of scanning is to visit the website for the printer manufacturer, go to their support or drivers page, type in the exact model of printer and follow the steps in their documentation. Lastly, the steps below help illustrate what it takes for both functions, how they differ and what needs they best meet.
This post covers the main differences between scanning to email versus scanning to a folder on a computer on the same network as the printer.
Scanning to Email versus Scanning to a Folder
First, it is important to note the exact steps required for configuring either type of scanning varies slightly by printer manufacturers and printer models. However, the underlying functionality and requirements for each type of scanning are essentially the same. Second, the best way to find the exact steps to follow for either type of scanning is to visit the website for the printer manufacturer, go to their support or drivers page, type in the exact model of printer and follow the steps in their documentation. Lastly, the steps below help illustrate what it takes for both functions, how they differ and what needs they best meet.
Thursday, April 11, 2019
Security Round Up: Amazon, Facebook & Ransomware
If you are interested or looking for them you can find near daily news articles discussing some form of risk to the security of our private data. This can come in many forms including, but not limited to:
- Company data breaches
- Ransomware attacks
- Phishing schemes
- Malware
- Companies storing files in plain text
- Servers that did not receive critical updates
- Social engineering and more
The point of this list is to show all the ways we need to be vigilant. While we do not want to waste all our time worrying about our data, the more present we are while online and the more cautious we are when sharing information, the better protected we will be. There will always be examples of issues out of our hands, for instance when a company gets hacked, but if we protect ourselves by not reusing user id's and passwords we can control how badly we are affected.
Thursday, April 04, 2019
How to Share an App Link with Someone to Download
Downloading new apps because of a feature you need or because someone mentioned one that piqued your interest is a common occurrence for most people. Unfortunately, it can be challenging to be sure the app listed in search results is indeed the app you intended to get. This becomes increasingly complicated when the app is named something slightly different than the company name or if the company has multiple apps with similar names.
Luckily, there is a way to share a link to download an app with someone so they can get the correct app every time.
If you would like to share an app with someone and want to ensure they download the correct app, the best way is to send them a link to download the exact app. This can be especially helpful when providing tech support, or when the person downloading the app does not consider themselves tech savvy.
Luckily, there is a way to share a link to download an app with someone so they can get the correct app every time.
How to Share an App Link with Someone to Download
If you would like to share an app with someone and want to ensure they download the correct app, the best way is to send them a link to download the exact app. This can be especially helpful when providing tech support, or when the person downloading the app does not consider themselves tech savvy.
To share an iOS app
- Open the App Store.
- Search for the app you intend to share.
Thursday, March 28, 2019
How to Manage Links Created in Acrobat: Zoom, Docs & More
Adobe pdf files are a great way to share documents because anyone can download Reader for free which allows them to open pdf files. There are additional benefits, as covered in our post "The Best App for Merging and Modifying Files". This post covers some of the specific settings you can control when creating a link in an Acrobat document.
Hyperlinks are simply text that has been programmed to link to another place. The link can be to a website, like the one used above, to another place inside the same document, or even to open an additional file. Depending upon where the hyperlink points to, the customizations available vary. This post covers some of these customizations, how they work and how you can control what they do.
Different types of links provide different customizations. Zoom control is allowed for links that redirect to another location within the same document. The zoom feature allows you to change the focus of the destination page, showing more data than the rest of the document by zooming out, or focusing on important detail by zooming in. Links can also point to external documents which is useful for organizations housing shared documents. Lastly, hyperlinks can point to external locations such as websites for additional information.
To create a link in Acrobat:
Hyperlinks are simply text that has been programmed to link to another place. The link can be to a website, like the one used above, to another place inside the same document, or even to open an additional file. Depending upon where the hyperlink points to, the customizations available vary. This post covers some of these customizations, how they work and how you can control what they do.
How to Manage Links Created in Acrobat: Zoom, Docs & More
Different types of links provide different customizations. Zoom control is allowed for links that redirect to another location within the same document. The zoom feature allows you to change the focus of the destination page, showing more data than the rest of the document by zooming out, or focusing on important detail by zooming in. Links can also point to external documents which is useful for organizations housing shared documents. Lastly, hyperlinks can point to external locations such as websites for additional information.
To create a link in Acrobat:
- Highlight the text to link.
- Right-click the highlighted text and select "Create Link".
Wednesday, March 20, 2019
How Formulas Help Excel do the Calculations for You
To see this process in action, watch the video that accompanies this post.
Microsoft Excel is a spreadsheet program that can be used to process simple computations as well as advanced functions. Most people can use Excel for basic calculations like:
Microsoft Excel is a spreadsheet program that can be used to process simple computations as well as advanced functions. Most people can use Excel for basic calculations like:
- Sum - adds the numbers in the cells in a selected range
- Average - finds the average of the numbers in cells in a selected range
- Count - counts the number of cells in a selected range with numbers in them
- Countif - counts the number of cells in a selected range that meet the criteria you set
- Attendance and absences for a group
- Average spending or income
- Supplies for a business or event
- Inventory for insurance or a business
These are a few examples of how Excel formulas can be useful by automatically processing repetitive calculations.
Thursday, March 14, 2019
How to Add Standard & Custom Watermarks to Documents
To see this process in action, watch the video that accompanies this post.
Most people have seen a document with a watermark. Confidential, Draft and Do Not Copy are commonly used watermarks. The purpose of a watermark is to visually alert the reader of a particular status related to this document. Attaching text like confidential or draft into the background of the document ensures the mark stays with the document even if copies are made. By contrast, having this information in an email or on the outside of an envelope does not protect the documents inside once they are removed from the email or envelope.
Another benefit of watermarks is that they can be added quickly and cause minimal distraction to the document context.
Most people have seen a document with a watermark. Confidential, Draft and Do Not Copy are commonly used watermarks. The purpose of a watermark is to visually alert the reader of a particular status related to this document. Attaching text like confidential or draft into the background of the document ensures the mark stays with the document even if copies are made. By contrast, having this information in an email or on the outside of an envelope does not protect the documents inside once they are removed from the email or envelope.
Another benefit of watermarks is that they can be added quickly and cause minimal distraction to the document context.
How to Add Standard & Custom Watermarks to Documents
There are two main types of watermarks to add to documents: standard and custom. Custom watermarks allow you to use an image as the watermark as well as customizing the format of standard watermarks.
Adding standard watermarks
Standard watermarks consist of the following text choices:
- Confidential
- Do not Copy
- Draft
- Sample
- ASAP
- Urgent
Thursday, March 07, 2019
It's Consumer Protection Week - Here's 4 Ways to be Safer Online
This week is National Consumer Protection week and as while there are many threats to our user data and personal information, there are also a multitude of ways we can protect ourselves. Some examples of best practices are:
Reduce the amount you rely upon search
- Using a credit card rather than debit card - this prevents you from needing to enter a pin in public where people can visually capture your input.
- Using Apple or Google Pay - these applications store your credit card so you do not need to physically access the card to use it.
- Using a unique PIN for debit cards - not reusing this pin for unlocking cell phones or as voicemail codes, etc.
- Never sharing passwords, account access, and credit or debit cards with others.
There are other, more advanced threats to the security of your devices. It is important to be aware of them as this increases your ability to protect yourself from them.
It's Consumer Protection Week - Here's 4 Ways to be Safer Online
There are far more than four approaches to staying safe in an online environment, but these ideas can be implemented immediately. Most importantly, remember to slow down when you are feeling pressured. Hackers often use scare tactics to appeal to your emotional, and less rational, feelings to get you to act without thinking. If you stop and think about what is going on before reacting, you will be less likely to make a big mistake.
Reduce the amount you rely upon search
Thursday, February 28, 2019
The Best App for Merging and Modifying Files
To see this process in action, watch the video that accompanies this post.
When working with larger files there can be a need to modify the order of pages, add signatures, or scan and add in additional documents for reference. During this process, you may run into issues like:
For situations where you need to merge and modify files, the best application is Adobe Acrobat.
Adobe Acrobat has one-click tools that make it easy to insert additional documents into a single document, remove unnecessary pages, and reorder pages. These tools are especially important when working with very large documents, documents with pages that need to be signed, documents where only certain pages are updated, and when scanning in multiple documents.
Merging documents
When working with larger files there can be a need to modify the order of pages, add signatures, or scan and add in additional documents for reference. During this process, you may run into issues like:
- Multiple file uploads not being allowed.
- A long document that requires a signature or signatures on only a few pages. In this case, printing the entire document and scanning it all back in together can be wasteful.
- Scanning a document that is larger than the automatic document feeder of the scanner and breaks the files into multiple files.
For situations where you need to merge and modify files, the best application is Adobe Acrobat.
The Best App for Merging and Modifying Files
Adobe Acrobat has one-click tools that make it easy to insert additional documents into a single document, remove unnecessary pages, and reorder pages. These tools are especially important when working with very large documents, documents with pages that need to be signed, documents where only certain pages are updated, and when scanning in multiple documents.
Merging documents
Thursday, February 21, 2019
How to Ensure a Microsoft O365 License is Available to Reuse Immediately
If you have more than one license in a Microsoft Office 365 or O365 account, you know managing the licenses can sometimes be tricky. The bigger your organization, the greater the number of licenses and the easier it can be to run into issues. There are many benefits to subscribing to O365 licenses though, including the ability to reassign licenses. This is beneficial when an employee leaves as their access to the license can be removed and used for the person replacing them. This helps prevent businesses from wasting money on additional licenses.
However, it is important to know the correct way to reassign a license. There is a way to do this that allows the license to be reused immediately, while another way holds onto the license for 30 days before it can be assigned to another user. For those businesses whose number of licenses equals or nominally exceeds their number of employees, it will be critical to remove the user in the correct way so the license is available immediately.
However, it is important to know the correct way to reassign a license. There is a way to do this that allows the license to be reused immediately, while another way holds onto the license for 30 days before it can be assigned to another user. For those businesses whose number of licenses equals or nominally exceeds their number of employees, it will be critical to remove the user in the correct way so the license is available immediately.
How to Ensure a Microsoft O365 License is Available to Reuse Immediately
The way to ensure a license is immediately available for reuse is by removing the licenses from the user before removing the user. To remove a license from a former employee so that it is immediately available for reuse, follow these steps:
- Log into the Microsoft O365 admin portal at portal.microsoft.com.
- From the Admin dashboard, click on "Active users".
Thursday, February 14, 2019
How to Make iPhone Contacts Accessible on a Windows Device
Backing up a smart phone to a computer or laptop does not mean the data is stored in a usable format. For instance, backing up an iPhone does not mean you can go directly to the apps, images, calendar or other items easily. Some things sync with iTunes, but most things are not directly accessible from a backup and there are times when you may want some of this data without being on the same device as the backups.
For instance, having contact or calendar information synced to a local device can be more efficient than referencing your phone every time. Luckily, there is an easy way to sync data, like contacts, making it accessible without installing iTunes or backing up the device to that machine.
For instance, having contact or calendar information synced to a local device can be more efficient than referencing your phone every time. Luckily, there is an easy way to sync data, like contacts, making it accessible without installing iTunes or backing up the device to that machine.
How to Make iPhone Contacts Accessible on a Windows Device
To access contacts on your iPhone from a Windows device:
- First, visit the page to download iCloud for Windows on the Windows device.
- Under the heading "Download iCloud for Windows", click the "Download" button to start the installer.
- Click "Run" to run the installer.
Thursday, February 07, 2019
How to Take Square Payments Without Creating User Logins
To see this process in action, watch the video that accompanies this post.
As a payment processing service for small businesses, Square is easy to set up and easy to use. There are many benefits to using Square over accepting credit card payments directly, including:
As a payment processing service for small businesses, Square is easy to set up and easy to use. There are many benefits to using Square over accepting credit card payments directly, including:
- Transparent service fees for all types of payments collected
- Managing PCI compliance
- Zero monthly and minimum fees, which is especially helpful for new businesses or those who do not need to use the service every month
- An online presence for the items or services you sell
Another great feature is the ability to send invitations to people to connect additional devices using the Square application. By using an invitation from you, that device can accept payments on behalf of your organization. Additionally, this is done without making them an employee, or creating additional user accounts or credentials. This feature is a secure way for any business, non-profit, or other organization to host events, have remote workers, interns or volunteers, collect funds on behalf of their business. Most importantly is it accomplished all without providing unnecessary account access.
How to Take Square Payments Without Creating User Logins
Another great benefit of inviting a device to accept payments on behalf of your account is that it can be done at no additional cost to you and the setup can be accomplished within a few minutes. Below are instructions for sending an invitation to someone with a device, as well as how to accept that invitation on a device.
Thursday, January 31, 2019
Security Round Up: Email, Voicemail and Paycheck Phishing
We are barely a month into 2019 but attacks on our data are as prevalent as ever. Threats can come in many forms, including but not limited to:
- Company data breaches (which you have no control over)
- Hacked user accounts often stemming from weak or commonly used passwords (which we can control)
- Phishing attacks via email, phone calls and more
- Email attacks
- Malware embedded images
- Unsecured wireless networks
- Unencrypted online forms
- Man-in-the-middle attacks
Thursday, January 24, 2019
Ways to Customize a Computer's Display to Reduce Eye Strain
To see this process in action, watch the video that accompanies this post.
There are many reasons why we are on our computers and laptops for extended periods of time each day. It might be from our job, a hobby, or just to stay connected to others. Whatever the reason, we know the blue light emitted from monitors, displays and smart phones can be hard on our eyes. This is especially true when sitting for a long time which can cause eye irritation.
Luckily, there are built-in settings in on both Windows and Mac devices whose purpose is to protect your eyes from extended exposure to blue light.
On Mac devices
On a Mac device, use the Night Shift setting to reduce the level of blue light by using warmer colors. To use Night Shift:
There are many reasons why we are on our computers and laptops for extended periods of time each day. It might be from our job, a hobby, or just to stay connected to others. Whatever the reason, we know the blue light emitted from monitors, displays and smart phones can be hard on our eyes. This is especially true when sitting for a long time which can cause eye irritation.
Luckily, there are built-in settings in on both Windows and Mac devices whose purpose is to protect your eyes from extended exposure to blue light.
Ways to Customize a Computer's Display to Reduce Eye Strain
On Mac devices
On a Mac device, use the Night Shift setting to reduce the level of blue light by using warmer colors. To use Night Shift:
- Open "System Preferences".
- In the System Preferences window, select "Displays".
Thursday, January 17, 2019
How to Use Microsoft Word as a Free PDF Editor
To see this process in action, watch the video that accompanies this post.
For nearly any task you can think of, there are probably multiple software solutions available to meet that need. Deciding which one to use requires research to find which one meets the needs of the project, has the most features and of course comes with the right price. Unfortunately, sometimes the software is only needed for a very limited number of uses or a rare occasion. In these instances, it is hard to justify signing up for a monthly recurring subscription or spending hundreds of dollars up front.
A commonly used type of file that benefits both businesses and individuals are pdf files. PDF files are extremely common because they:
For nearly any task you can think of, there are probably multiple software solutions available to meet that need. Deciding which one to use requires research to find which one meets the needs of the project, has the most features and of course comes with the right price. Unfortunately, sometimes the software is only needed for a very limited number of uses or a rare occasion. In these instances, it is hard to justify signing up for a monthly recurring subscription or spending hundreds of dollars up front.
A commonly used type of file that benefits both businesses and individuals are pdf files. PDF files are extremely common because they:
- Allow documents to be shared while maintaining control over the content
- Provide the ability to control who can edit the document
- Maintain the integrity of the formatting and
- Sharing pdf files means anyone accessing them can do so without paying for proprietary software (perhaps the most important reason to use pdf files)
How to Use Microsoft Word as a Free PDF Editor
Thursday, January 10, 2019
How to be More Efficient by Managing Quick Access Links
To see this process in action, watch the video that accompanies this post.
Increasing efficiency often feels like a goal that is difficult to obtain. How can we measure efficiency to verify there has been an increase ? How can we consistently increase it without wearing ourselves down? Luckily there are settings in Windows that can be set to best meet our specific needs. For example, modifying the links in the Quick access section in File Explorer can be accomplished within minutes and greatly increase efficiency.
The Quick access section in File Explorer houses links that reference files, folders, shared drives, or Windows locations like the Desktop or Downloads folders. Quick access links appear in the top left section of every File Explorer window which makes it a great place to link frequently used files and folders. Typically, the longer you have a computer the deeper folders get created. Folders are often organized by year or topic with sub-folders created inside. Creating links in the Quick access section to commonly used, but deep sub-folders, can be a huge time saver.
Modifying the settings for the Quick access section
To remove a link listed in the Quick access section:
Increasing efficiency often feels like a goal that is difficult to obtain. How can we measure efficiency to verify there has been an increase ? How can we consistently increase it without wearing ourselves down? Luckily there are settings in Windows that can be set to best meet our specific needs. For example, modifying the links in the Quick access section in File Explorer can be accomplished within minutes and greatly increase efficiency.
The Quick access section in File Explorer houses links that reference files, folders, shared drives, or Windows locations like the Desktop or Downloads folders. Quick access links appear in the top left section of every File Explorer window which makes it a great place to link frequently used files and folders. Typically, the longer you have a computer the deeper folders get created. Folders are often organized by year or topic with sub-folders created inside. Creating links in the Quick access section to commonly used, but deep sub-folders, can be a huge time saver.
How to be More Efficient by Managing Quick Access Links
To remove a link listed in the Quick access section:
- Open File Explorer.
- Right-click on the link to remove.
- In the popup menu, select "Remove from Quick access".
Thursday, January 03, 2019
Security Round Up: What Recent Breaches You Should Know
It is the start of a new year which means new goals for most people and a fresh way of looking at things. Unfortunately, one thing that did not change with the start of the new year is the threat to your personal information and data. During the last few months some substantial new threats were released. These threats are in addition to the millions of users' data leaked via companies like Marriott and others and are of particular importance as they affect hardware items people commonly have in their home.
Guardzilla indoor wireless security systems - GZ501W
A vulnerability in some of Guardzilla's indoor wireless security systems allow hard coded security keys to be easily cracked. This vulnerability exists primarily because the keys utilize an outdated algorithm. Once cracked, those keys can be used to access customer data uploaded to Amazon web services where Guardzilla's storage servers reside.
Security Round Up: What Recent Breaches You Should Know
Guardzilla indoor wireless security systems - GZ501W
A vulnerability in some of Guardzilla's indoor wireless security systems allow hard coded security keys to be easily cracked. This vulnerability exists primarily because the keys utilize an outdated algorithm. Once cracked, those keys can be used to access customer data uploaded to Amazon web services where Guardzilla's storage servers reside.
Thursday, December 20, 2018
Why it's Important to Use Personal Email when Creating Certain Accounts
Keeping track of user accounts and passwords can feel like a ridiculous endeavor. Every site we order from, and even some simply visited, wants you to create an account with them. Some sites no longer allow guest ordering, meaning you are forced to create an account or one is created automatically if you want to order from them. As a result we quickly end up with hundreds of user accounts making it nearly impossible to remember different user id's and password combinations for each. This puts the security of those accounts at risk as any data breach could cause those credentials to be exposed.
There is another important item to consider when creating new accounts. It is critical to consider what type of account you are creating before determining which email account to use. In some instances the type of email account does not matter while in others it is crucial to use a personal email account, one not attached to any service, to maintain control.
There is another important item to consider when creating new accounts. It is critical to consider what type of account you are creating before determining which email account to use. In some instances the type of email account does not matter while in others it is crucial to use a personal email account, one not attached to any service, to maintain control.
Why it's Important to Use Personal Email when Creating Certain Accounts
First, let's clarify the different types of email. There are personal accounts that are contingent upon a paid service. Examples would be Comcast or AT&T emails provided for free when they are your Internet Service Provider (ISP). There are email accounts provided for free by employers, which are contingent upon your employment with them. The third type of email accounts are those provided for free to users without being tied to a service or job.
Thursday, December 13, 2018
How to Fix Chrome When it Stops Working
Nearly 50% of internet traffic is accessed by people using the Chrome browser. Chrome downloads fast and begins with a minimalistic interface to which plugins can later be added. Last but not least, it is always smart to have two browsers installed on a device. This way, if something happens to one of them, the device can still get online to fix the broken browser. If you only have one browser and it fails, recovering is much more difficult.
With any software application there are times when the application does not respond or behave the way we expect. This often happens when we least expect it, i.e., times when we have not specifically made any changes and are not having any other issues. This makes it challenging to know where to begin troubleshooting. This post specifically covers some ways to fix Chrome when it unexpectedly stops working.
With any software application there are times when the application does not respond or behave the way we expect. This often happens when we least expect it, i.e., times when we have not specifically made any changes and are not having any other issues. This makes it challenging to know where to begin troubleshooting. This post specifically covers some ways to fix Chrome when it unexpectedly stops working.
How to Fix Chrome When it Stops Working
Before trying to fix Chrome, it is important to check the following items to be sure the browser is causing the issue.
- Verify your device is connected to the internet - this can be checked by looking at the wired or wireless connection icon in the system tray.
Thursday, December 06, 2018
4 Reasons Why You Need a Backup to Cloud Services
There are many benefits to utilizing cloud services. For some businesses, cloud services are the best way for employees working in different locations to remain informed and work collaboratively. Cloud services can also reduce the initial investment for new businesses, help businesses get started faster, and help with budget planning.
Unfortunately, like most things, there are drawbacks to consider with the benefits. This post covers four reasons why it is important for any business, and some individuals, to have a backup plan to cloud services.
Cloud services rely upon internet accessibility. If the internet goes down, all devices on the network lose the ability to access cloud based services, applications and files. This can cause lost productivity, lost sales, loss of reputation and much more depending upon the type of business.
Below is a list of potential issues and some ideas for workarounds to get you questioning what weaknesses your business may have and what you need to do about them.
Issue 1: Hardware failure
Unfortunately, like most things, there are drawbacks to consider with the benefits. This post covers four reasons why it is important for any business, and some individuals, to have a backup plan to cloud services.
4 Reasons Why You Need a Backup to Cloud Services
Cloud services rely upon internet accessibility. If the internet goes down, all devices on the network lose the ability to access cloud based services, applications and files. This can cause lost productivity, lost sales, loss of reputation and much more depending upon the type of business.
Below is a list of potential issues and some ideas for workarounds to get you questioning what weaknesses your business may have and what you need to do about them.
Issue 1: Hardware failure
Subscribe to:
Comments (Atom)


