Create an email signature onto your iPhone

Create an email signature onto your iPhone

Today’s email signatures contain a lot more than just your name and contact details. Links to websites, Facebook, Twitter account and the ubiquitous legal disclaimers along with your company’s branding give clients the information they need.

Many of you have this on your main computer email system but when it comes to your mobile devices “sent from my IPhone” is as flash as it gets…

Not only can you have the same email signature on your iPhone/iPad but you can create multiple email signatures for each account that you access (business/personal/rental etc.).

Either send yourself an email message from your computer or device that already has the desired signature set up on it or check you’re sent items for one.

  • Open the email in the Mail app on your iPhone/iPad.
  • Tap and hold down on the signature in order to bring up the blue selection tool. Move the anchors so you have the entire signature highlighted.
  • Tap on Copy.
  • Press the Home button to return to your Home screen.
  • Launch the Settings app.
  • Tap on Mail, Contacts, Calendars.
  • Scroll down to Signature under the Mail section.
  • Tap on the account you’d like to add the signature to if you have multiple signatures set up Per Account.
  • Delete the contents.
  • Tap and hold in the signature field to bring up the selection tool again.
  • Tap Paste in the popup menu.
  • You may see a strangely formatted version of your signature but here’s the magic…
  • Shake your iPhone briefly and tap Undo in order to remove the automatic formatting Apple may have done.
  • This will bring back any colors or other HTML content that may not have shown up in the original paste. Et Voila.

If you want to know more call us on 0800 878 878 or email stephen@techs.co.nz.

Viruses are getting smarter

Viruses are getting smarter

Ransomware Example

What would your first thought be seeing the above on your computer, laptop or cellphone? Would you start to wonder “What has my family been looking at?” or “What have I come across browsing the internet by mistake?”

Within the last year we have been seeing an increasing trend in viruses called Ransomware.

‘Ransomware’ is a type of malware/virus that attempts to extort money from a computer user by infecting and taking control of the victim’s computer, cell-phone, or the files or documents stored on it. Typically, the Ransomware will either ‘lock’ the computer to prevent normal usage, or encrypt the documents and files on it to prevent access to the saved data.

The ransom demand will then be displayed, usually either via a text file or as a webpage in the web browser. This type of malware leverages the victim’s surprise, embarrassment and/or fear to push them into paying the ransom demanded. Ransomware may arrive as part of another malware’s payload, or may be delivered by an exploit kit such as Blackhole, which exploits vulnerabilities on the affected computer, device to silently install and execute the malware.

In almost all cases, payment of the ransom still does not restore the computer to normal use. As such, we strongly recommend that no payment be made and give us a call straight away. You may have never heard of this type of virus or even been affected. Prevention is simple, make sure to have up-to-date antivirus (Eset nod antivirus for example). Stay away from unsafe websites (Adult content, kids free game downloads or pirated music, movies or tv shows). Good idea if you have kids is to take interest in what they do online so they and your computers are safe.

Backups are also highly recommended; there was a case in America recently when a police station themselves was hit with another type of randomware that encrypted all computers and network drives, files. Due to this police station having no backup, the police had to pay the ransom (At least the criminals were honest enough to send the police the de-crypt code to unlock the police station pcs !).

Remember we are here to help you regarding any Information Technology issues like viruses or malware. We are but a phone call away.

So if you’re in need of some help with Viruses, or even just some free friendly advice, get in touch with us, 6-370 8093.

To discuss how Tech Solutions can help call us on 0800 878 878 or email office@techs.co.nz.

Tracking a Lost or Stolen Mobile Device

Tracking a Lost or Stolen Mobile Device

You have misplaced your mobile device; your phone or iPad or tablet is gone! Stolen! Lost! TIME TO PANIC! Yes? No, it is not time to panic (yet) as there are several ways to locate your device. If you locate the device and it has been stolen, not lost, ensure you contact the police rather than going to get it yourself.

Do the simple things first. Call your phone, can you find it that way? Someone else can possibly answer the call. Sending your phone a text, especially with a reward offer, can help too. Always apply common sense around meeting people to get your device back. If neither of these work then it’s time to get technical!

Can Android, Windows or Apple help?

Yes they can, by default, Windows, Android and Apple devices have limited capabilities to find your device. If you have not set your device up the standard way these may not work. Also unless your device has a keypad lock enabled anyone who can access your settings can turn these settings off. Apple and Android offer these services more of a way to protect your data on the device than stop/discourage theft, however see ‘Prevention is better than cure’ below. They also work only if the phone is both on and online.

Apple: Apple uses a cloud based service called “Find my iPhone/iPad/Mac”. You must have enabled iCloud and enabled “find my iPhone” on this device before this will work for you. Head over to icloud.com and log in using your Apple ID credentials. Once signed in, you should see your iCloud dashboard with different icons. Click on the “Find My iPhone” icon. From here you can see all your devices and their location. The device can be made to play a sound, in case you lost it down the back of the sofa! You can also activate “Lost Mode” which locks down the device and displays the message of your choice. As a last resort, and this will mean ‘Find my iDevice’ won’t work anymore, you can erase all data too (factory reset).

Android: The Android OS has a service called Android Device Manager (ADM). You must have enabled Location Services to locate your phone and also enabled remote wipe to wipe it. Head over to google.com/android/devicemanager and log in with your Google ID. From there you can see you devices and their locations, if enabled. Each phone will give you the option to ring, lock or (if enabled) as a last resort wipe the device.

Prevention is Better than Cure

As always it is best not to lose it in the first place, but being prepared for the possibility is second best. By default most mobile devices can be found, just ensure the settings are enabled as mentioned above and (for your security) enable some form of lock screen code. There are some apps that you can install now to really help you can recover your device in the future. These apps have anti-theft (and anti-malware in the case of Android) in mind, not just the data protection offered by default. For further help with these applications or any concerns with your mobile device contact us here at Technology Solutions

Android Anti malware and Anti-theft

Avast! Free Mobile Security http://www.avast.com/en-nz/free-mobile-security

ESET Mobile Security & Antivirus http://www.eset.com/us/home/products/mobile-security-android/

Android & Apple Anti-theft only: Lookout https://www.lookout.com/features/ios

So if you’re in need of some help tracking your device, or even just some friendly advice, get in touch with us.

To discuss how Technology Solutions can help your business call on 0800 878 878.

Google Analytics

Google Analytics

what is it and how can it help your business?

Google analytics is a service offered by Google to measure and report on visitors to your website. The service can generate detailed statistics and reports to let you make informed decisions about what does and doesn’t on your website. The service is free but there is a premium version available for free.

Google Analytics can track visitors from all referrers, including search engines and social networks, direct visits and referring sites. It also tracks display advertising, pay-per-click networks, email marketing and digital collateral such as links within PDF documents.

So in simple terms you can find out useful information like when people visit your website, how long they spent, what pages are the most visited and how they find your website.

A quick guide to making Google Analytics work for you

In simple terms, Analytics is a free web service provided by Google, although it requires you create an account. You (or your web developer) simply add some code to your website and it will start to track and store all kinds of very useful information about how people find and use your website.

Why is it so helpful to small business?

In the days before the internet, small businesses wishing to entice potential customers into their stores had to rely heavily on traditional advertising, word of mouth and impressive front window displays to lure in passers-by. It is very difficult to measure just how effective each type of advertising is.

Your Website is a new ‘storefront’

Think of your website as your ‘virtual shop-window’ and Google Analytics as an all seeing camera that keeps track of everyone arriving at, wandering around and leaving your store. Google Analytics is split into four key reporting areas; Audience (who is visiting your site), Acquisition (how they are getting to your site), Behaviour (what they are doing on your site) and Conversions (have they completed what you wanted them to), each of which is useful for difference purposes.

What can you learn with Google Analytics?

How visitors found your website (via search engines, social media, or links on other sites etc)

If they are first-time visitors, or returning traffic.

How visitors moved through the site e.g. did they stay a while and read? Did they click on different pages? Did they get bored and leave straight away?

How they accessed the website in the first place e.g. were they on a mobile phone? Or were they doing some online shopping at their work desk when the boss wasn’t looking?

The success (or failure) of key conversion points on your site: i.e. the pages on your website such as ‘newsletter sign up’ or ‘contact form’ where potential customers can ‘convert’ to a lead by entering their details.

For ecommerce sites it can track sales, average order value etc.

In fact, the above is just a small portion of the metrics that Google Analytics allows you to track and interpret across your domain.

In short, Google Analytics allows you to:

  • Gain invaluable insights into your customer’s behaviour
  • Examine facts rather than assumptions or guesses.
  • Confidently make educated decisions on how to make improvements to your website.
  • So if you’re in need of better information as to how your customers access your website, or even just some friendly advice, get in touch with us.

To discuss how Technology Solutions can help your business call 0800 878 878.

How to Make a Strong Password

How to Make a Strong Password

Two essential password rules:

Following two rules are the minimum that you should follow when creating a password.

Rule 1 – Password Length: Stick with passwords that are at least 8 characters in length. The more character in the passwords is better, as the time taken to crack the password by an attacker will be longer. 10 characters or longer are better.
Rule 2 – Password Complexity: Your password should contain at least one character from each of the following groups.

  1. Lower case letter
  2. Upper case letter
  3. Numbers
  4. Special Characters

This is often called the “8 4 Rule” (Eight Four Rule):

  • 8 = 8 characters minimum length
  • 4 = 1 lower case + 1 upper case + 1 number + 1 special character.

Just following the “8 4 Rule” will ensure your passwords are much stronger than before for those of you who don’t follow any guidelines or rules when creating a passwords. If your banking and any financially sensitive website passwords doesn’t follow the “8 4 Rule”, I strongly suggest that you change those passwords as soon as possible to at least follow the “8 4 Rule”.

Guidelines for creating strong passwords:

  1. Follow “8 4 Rule
  2. Unique Characters. Should contain at least 5 unique characters. You already have 4 different character if you’ve followed “8 4 Rule”.
  3. Use a Passphrase.  Use a ‘passphrase’ to easily remember the passwords. You can use initials of a song or a phrase that are very familiar to you e.g. “ At Technology Solutions, we love strong passwords!” can be converted to a strong password “@TS0l,wlsp!”

Another method of ensuring the use of strong passwords, and dealing having to remember lots of them, is to use a password manager. A password manager gives you the option of totally random and long passwords, and means you don’t have to remember them all. I will cover the pros, cons and best practice of the current best password manager, LastPass, in the next newsletter.

To discuss how Tech Solutions can help call us on 0800 878 878 or email office@techs.co.nz.

CONTACT US

Address: 22 Victoria Street, Masterton 5810
Phone: 0800 878 878
Email: office@techs.co.nz

BUSINESS HOURS

Monday - Friday: 8am to 5pm
Weekend and After Hours services available

FIND US