Warning: A non-numeric value encountered in /homepages/39/d518120989/htdocs/itsupport/wp-content/themes/Divi/functions.php on line 5607

Windows 10 Update 1803 New Features and Improvements

Windows 10 continues to gain more features with updates that thankfully have some substance it would appear. There quite a few updates that are streamlining many processes for IT Professionals as well as ensuring that Windows 10 is a more secure browser. Security is a vital feature of any OS and Update 1803 certainly ensures that improvements continue to be made. With 1803, S mode will now be possible on the Enterprise edition of Windows 10. S mode is a mode that is noted for it being streamlined, with better security and better speed. S mode for example boots up 15 seconds faster than standard Windows 10. In addition, S mode only allows apps from the Microsoft Store to be added, reducing the risk of infection to a PC, in addition S mode only allows Edge to be used as the web browser until other browsers are available in the Windows Store. Update 1803 now allows for S mode to be available on Enterprise editions of Windows 10, through activating Pro in S mode first and then upgrading to Enterprise edition. Continuing with security, Windows Defender now shares information with Microsoft 365 services and allows both to communicate with each other about threat detection. Windows Defender Exploit Guard is now also extended to support Microsoft Office software. There is also additional for those using virtualization to now include VBS and HVCI to be possible now truly on Windows 10. For those who don’t like that their PC is sending diagnostic data to Windows can now delete such data. Protection of the user and enterprise is one the pillars of...

How to Create a LinkedIn Profile for IT Computer Support

Why is LinkedIn Important for IT Computer Support Career? The proliferation of social media website has evolved into an extremely effective internet job search tool that recruiters and hiring managers used to scour sites for potential candidates. Websites such as LinkedIn, applicants use to post resume and e-mails directly to company’s websites they may be interested in working for. The powerful aid of the internet employs a very important role in today’s technical society. LinkedIn is a great and professional way for networking and connecting with your colleagues, college or university professors. This website is used by students, teachers, prospective job seekers, employers, job recruiters, etc. This blog will walk you through the necessary steps of creating an IT Computer Support LinkedIn profile page. It will also list some of the key features that should be included in your LinkedIn profile; which will also make your profile page, standout, look professional and eye-catching to the viewers. IT Computer Support Specialist Technician A professional profile should include a recent photo that is of high-quality caliber. It is very important to present yourself in a professional manner which involves looking well groomed; for example, a nice light-colored shirt, a suit jacket and matching tie and for ladies a blazer with a nice top underneath it will present a clean, sharp and professional image. Remember to smile to enhance your professional look. An appropriate headline pertaining to your IT Computer Support Specialist career is important as it catches the viewers’ attention. You want the perspective employer to know what your career field is without reading through paragraphs of information and still do...

How to Secure Your Mobile Device in 5 Steps

The rapidly changing of technology and portability of mobile devices, have forced people to heavily rely on these products. With these increased functionalities, mobile devices carry out several our day-to-day activities, like: surfing the web, booking appointments, setting up reminders, sharing files, instant messaging, video calling, and mobile banking. Given all these applications, mobile devices are vulnerable to online threats and are also susceptible to physical attacks due to their portability. Some of the security threats include malware specifically designed for mobile devices: worms, spyware, unauthorized access, phishing, and theft. Here are some steps that will help you minimize the exposure of your mobile device to digital threats. USE STRONG PASSWORDS Strong passwords coupled with biometric features, such as fingerprint authenticators, make unauthorized access nearly impossible. Your passwords should be eight or more characters long and contain alphanumeric characters. If your mobile device allows two-factor authentication, don’t hesitate to use it. You don’t want to be subject to unforeseen attacks. Add a passcode, PIN, or pattern lock. This helps protect your data from an attacker who gets ahold of your phone, even if the app developer didn’t properly secure the data. Use different passwords for sites and apps. If you use the same passwords for banking, social media, email, etc., then a hacker only needs to figure out one password to gain access to your identity. You can choose when you want to change your password, but don’t forget to change your password at least every 90 days, three months … ENSURE PUBLIC OR FREE WI-FI IS PROTECTED Everybody loves free Wi-Fi, but free could turn expensive in a...

Security improvements in Windows 10

Security Improvements in ransomware protection in Windows 10 Ransomware is the most extensive digital danger to safety and productivity now a day. Its impact is touched everywhere around the world. No computer user is safe, from the average home users that they could lose the ability to perform daily Internet activities, and all the way to organizations whose business operations can be toothless by ransomware infection are affected. Many high-profile events have demonstrated that ransomware can have shattering effects on all of the desktop users. Microsoft upgrades their Windows 10 to be more secure because they recognize that the threat to output that shameless modern cybercrime represents and capitalizes significantly in a thoughtful and simple strategy that is showing to be effective as new attacks arise. Microsoft has observed that extremely skilled and well-funded attackers can find unexpected paths to their aims. So, they detect and help avoid these threats with advanced defence services such as Windows Defender Antivirus and Windows Defender Advanced Threat Protection.   Microsoft’s Windows Defender AV on Windows 10 controls the power of the cloud and artificial intelligence built on top of the Microsoft Intelligent Security Graph to quickly identify new threats, this include ransomware, as it first sees anywhere around the globe. In the Windows 10 Creators Upgrade, they significantly improved the ability of Windows Defender AV to recognize and stop ransomware more efficiently and faster than ever. With the Windows 10 Creator update, it will have a deeper level of the technical details on the ransomware detailed investments in Windows 10 Creators Update.   Security structures built in Windows 10 reflect their next-gen,...

How to validate that your home router is not compromised

The wireless router can be the easiest target for hackers to compromise your network, if configured improperly. Hackers will employ many different methods to attempt to hack your router. Some of these methods that I will be talking about include Wi-Fi hacking and DNS hijacking. There are many different preventative measures than can be taken to ensure that you have a secure router. Setting up a secure router is very important because not only can your network and personal information be compromised, but you may be held legally responsible for all of the potentially illegal traffic that goes through your network. Validate that your router is secure A popular method for hackers to compromise all devices in DNS hijacking; DNS hijacking is when a hacker subverts the resolution of DNS queries. In other words, they can direct you to malicious websites even when you try to visit a known secure website such as your online banking website. This can be done to a personal computer within a network, or even the router if a router has vulnerabilities within its firmware. There are tools that exist to test if you are a victim of DNS hijacking. One such tool is F-Secure, you can check your security with this tool by visiting f-secure.com/router-checker/. What this tool does is analyze your own router’s DNS requests to see if they are being redirected to a third-party rogue DNS, or if the DNS requests are acting as they should.   Hackers may also try to gain access to your router by cracking your Wi-Fi password or simply joining your network if it is left...