In early March 2020, there have been nearly 3,100 deaths and more than 90,000 people infected with the respiratory disease known as COVID-19 across the globe.  After months of watching this take place in other countries, the previous few cases in the United States have begun to rise – including one here in Fort Lee, NJ.

For now, the Centers for Disease Control recommends several common-sense and very reasonable precautions.  These include regular hand washing or using alcohol-based hand sanitizer, covering coughs and sneezes (with your elbow or several tissues), and staying home and avoiding public spaces if you are feeling sick.  I’d like to point out that these are inherently smart things to do during flu season anyway, but I realize that most people don’t fear the flu despite the number of people who die from that disease each year.

So what should you do if local health officials declare a quarantine?  You should have a ready supply of your prescription medicine, tissues, pain-relieving medication (Tylenol or Advil), hand sanitizer (if you can find it), and face masks.  Don’t forget to keep your phone charged so that you can call someone for help if you develop symptoms (or they worsen).  There is significantly more information available by conducting an internet search (or using the Resources listed below).

But I want to shift this discussion to businesses – either the one you own or one for which you work.  How do you handle something completely different than your everyday normal?

Try to Prevent Further Infection

If your business has many employees or if it serves the public, you must think about ways that you can reduce the chance of spreading infection. Some options include providing hand sanitizer dispensers, wiping down frequently touched surfaces with household cleaners, and a more frequent cleaning schedule for common areas and restrooms.

If your business has delivery or service vehicles, you should clean the steering wheel, commonly touched dashboard or smart-drive appliances, door handles (both inside and out), and the key fob.

Given the current circumstances, you might begin to avoid shaking hands with customers and colleagues.  Touching elbows should suffice in a pinch or even a distinct nod of your head as a way of greeting.

Internal Communications

If public health officials discourage people from attending large gatherings, you should begin to think about how your company will communicate with staff members who are forced to stay at home.  Many businesses allow that kind of flexibility anyway, so you probably already have some informal communication channels via phone and email.

You should start to formalize those mechanisms now so that you are not scrambling at the last minute.  Make sure you have an updated list of contact information (phone numbers and email addresses), so everyone can contact co-workers quickly.  If your business uses VOIP, make sure that everyone understands how to use soft-phones, and provide a quick reference guide to configure an office phone at home.

Have your staff check to see if they can access their email at home from a web browser to ensure that all remote access rules are in place and that the staff members know their passwords.  If you have not yet implemented multi-function authentication (MFA) for your email, now is the perfect opportunity to do so.  Similarly, it’s worth making sure everyone has email access from their smartphones or tablets.

For some businesses, chat systems like Slack or Microsoft Teams can be effective mechanisms for your staff to remain in touch with one another in real-time.  Another alternative, if you need to conduct meetings frequently is Zoom.  If you don’t use this kind of technology now and are interested in investigating whether you should, please contact me for a discussion.

Remote Access to Your Business

Make sure your staff has access to your remote desktop access software and knows how to use it so that they can connect to their office computers.  (Don’t have remote access to your office? Again, contact me to discuss how your needs can be met.)

Do you have specific business resources, like your accounting system, that has unique security requirements?  If so, think about what additional provisions are necessary for someone working from home.

Your Office on Empty

If most or all your staff are working from home, what does that mean for your office?  Do your physical security systems or climate settings need to be adjusted?  Do you want to set up video cameras or other remote monitoring hardware?  Heck, who’s going to water the plants?  On a more serious note, if you have an on-premises server, you want to make sure it can be administered entirely remotely, including power cycling.

It’s also worth determining who will have responsibility for the office in the event of any problems, which could still occur even if no one is there.  What if a water pipe in the building breaks, or there’s a burglary?  Make sure it’s clear who will respond.

Everyday Business Functions

Think about the regularly scheduled aspects of running your business, with an eye toward those tasks that assume the presence of certain people.  Can they run payroll, accounts receivable, and accounts payable from a remote location?  Try to ensure that every key position has at least one backup, so if one person falls ill, your business’ ability to function won’t be compromised.

If international travel is a significant part of your business, you’re already figuring out how to compensate through videoconferencing and similar technologies.  But if you regularly travel only within the country or your area, think about which trips are essential and which you can replace by using online conferencing tools.

Finally, consider how your clients and customers will react to this new situation.  It’s unfortunately likely that there may be less work taking place so that you might see a decrease in your revenue stream; on the other hand, some businesses may see an increased workload.  For instance, if the number of patients in hospitals skyrockets, those business owners who support healthcare systems may struggle under the load alongside the doctors and nurses.

I hope and pray that all these preparations prove unnecessary, but they’re worthwhile to consider and implement just the same.  Too many businesses have failed after a fire, hurricane, or earthquake renders an office uninhabitable, and such natural disasters are all too common.  Others have closed their doors because a ransomware attack caused too much disruption to their day-to-day activities.  Planning for a better outcome now – while there is time to think clearly about what must take place – will ensure your continued business success.

Resources

World Health Organization

US Centers for Disease Control and Prevention

New Jersey Department of Health

New York City Department of Health

In mid-January 2020, Microsoft issued advisory ADV200001 warning of a vulnerability in the scripting engine of Internet Explorer.  Yes, I know, that’s gibberish to most of you.  It means that there could have been an attempt to execute code in attack mode via that browser.   How?  You could have received an email with a link that explicitly opened Internet Explorer (even if it wasn’t your default browser) and been sent to a malicious web site specifically designed by bad guys.   If exploited successfully, the attacker could have gained access rights to your computer.  As Microsoft put it at the time: “An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.”

That’s very bad (I’d segue into the Ghostbusters “don’t cross the streams” theme about the definition of the word “bad,” but I’m sure you get the idea).

At the time, Microsoft did not have an immediate fix.  As of February’s “patch Tuesday,” they announced one with the heading “Security Advisory CVE-2020-0674.”  Microsoft will be patching desktop operating systems from Windows 7 clear through the latest version of Windows 10, plus a slew of server operating systems.

The Network Operations Center will be testing this set of updates for the next seven days.  If the patches pass those tests, then the updates will be available for all of you by the end of next week.  In the interim, I have only one thing to say:  DO NOT USE INTERNET EXPLORER, USE ANOTHER BROWSER!  There are several to choose from, for example, Mozilla Firefox, Google Chrome, Opera (which I didn’t recall as being around, but it still exists) or Brave (which I’m sure you’ve never heard of), heck there are probably some of you who use Edge in Windows 10 (heaven help you).  If you’re not sure what browser is your default, write to me and I’ll let you know.

But let’s get down to the meat of this:  If Microsoft announced the problem on January 17 and only released the solution on February 11, the bad guys had a considerable amount of time to take advantage of the vulnerability, and yet the world didn’t come to a screeching halt.  But I don’t – for one minute – want to suggest that you not patch a known vulnerability.  What I recommend, instead, is a moderate amount of common sense.  And the best way to implement that would be to stop using the problem-plagued browser, even after your computer receives the patches.

Bottom line:  this exploit is explicitly for IE – so to avoid any possible unpleasantness, don’t use it.  Simple really.

Thanks and safe computing!

At the end of July 2019, most of you probably heard about a data breach at Capital One. More than 100 million people in the United States and Canada were affected by this event. Thankfully, as of this writing (mid-August), very little of the information was made available to the normal group of bad actors who dwell in the Dark Web. This breach was simply the work of a zealous former Amazon Web Services employee who knew that there was a way to access the data. Pretty freakin’ scary!

To make matters worse, the woman who performed this hack had also obtained information from other organizations. Somehow she made the monumental mistake of publicizing those details. I’m not sure what — or even if — she was thinking. But the fact that someone has the wherewithal to accomplish these feats of what most of us consider the “dark arts” of computing is supremely unsettling.

Why anyone would want to subject themselves to the notoriety of having accomplished this act, when there was no useful purpose, confounds me.

Around the same time, the Federal Trade Commission concluded its work with Equifax and fined them close to $700 million. Almost immediately afterwards, so-called “consumer advocates” started a loud chorus of “Sign up and get your $125 from Equifax!” on news stations and social media.

They did this without telling people the “fine print” of the FTC agreement said there is only $31 million in that particular reward pot. So if just half of the more than 146 million affected individuals filed a claim, each one would end up with about 42 cents. That is sheer stupidity!

The best approach for dealing with this debacle is to sign up for the free credit monitoring that is being offered. It is supposed to last for 10 years. Do that here: https://www.equifaxbreachsettlement.com/file-a-claim.

Even though other forms of free monitoring are available, you usually only get one year. It is in your best interest — given the extent of the potential damage caused by the Equifax breach — to take the longest possible term of protection available.

There is a feature of Windows 10 that some people might find useful. It is called Task View, and it has the ability to create multiple desktops.

To activate Task View, click its icon — a large rectangle with two smaller rectangles flanking it — in the Windows Taskbar just to the right of the Search box. When you do, Task View (and its associated feature Timeline) opens.

At the very top of the screen you’ll see a “New desktop” button, and beneath that, thumbnails of all of your currently running applications arrayed against the desktop so you can quickly see what you’ve got running. You can click any thumbnail to switch to that application or press the Esc key to leave Task View and return to where you were.

Beneath that you’ll see Timeline, with thumbnails of documents you’ve worked on over the last thirty days. For all businesses and most home users, I have disabled this feature to afford you more privacy. Microsoft tracks this information, and I do not feel comfortable providing them with more telemetry than necessary. However, if you think this could be useful, let me know and I can tell you how to reactivate it.

Now, if you were used to using the Alt-Tab key combination to cycle through open applications in Windows 7, you can still do that as well, but Task View adds a couple of extra twists. If you hover your mouse over any thumbnail, a small X appears in its upper-right corner. You can click the X to close that application.

Task View also lets you create multiple virtual desktops, each with different Windows applications running on them. To create a new desktop, open Task View and click “New desktop” at the upper left of the screen. You can run a different set of Windows applications inside the new desktop. For instance, you could dedicate one desktop to your Microsoft Office applications, like Word, Outlook, and Excel, and another desktop to handle your various browser applications, and another for your accounting software.

To switch among these virtual desktops, click the Task View icon and click the desktop to which you want to switch. You can keep creating new desktops this way and switch among them.

Let me know your reactions to using this new Windows 10 feature by posting a Comment.

I used to consult for Fortune 100 companies, and it never ceased to amaze me how management could make some of the moves it did. Sometimes plans that were identified as “not well thought out” (i.e., half-baked) saw the light of day — and projects failed. So when Microsoft announced it was changing the way in which Windows 10 semi-annual updates were going to be released, it got my attention.

When Windows 10 was released in July 2015, Microsoft said that it was working towards the concept of “Software as a Service.” It established a strategy of twice-a-year Feature Updates; one in the spring and one in the fall, which were tagged “yymm” (e.g., 1809 or 1903). Each Feature Update had an 18-month lifespan before support would no longer be available, and the computer would be forced to jump to the then current version. For the first couple of iterations, that worked (sort of).

Apparently, it took some time before Microsoft realized that it couldn’t maintain the drumbeat of an update feature every six months. Instead, they are going to implement one Feature Update a year, and another form of update — what used to be called a “service pack.” This is still two major updates a year, but they have not indicated if they plan to change the 18-month support restriction.

I realize that this will be revealed in time, but right now, before the end of July’s Microsoft worldwide partner conference, things are still very much up in the air. Every IT support organization that has tuned the Windows Update settings to protect computers from unexpected updates is going to have to find out what the new settings are and reconfigure them. Every IT support organization is also going to have to figure out how to go from one Feature Update to another without adversely affecting the computer. And everyone is going to have to decide if they want to remain on a merry-go-round where the conductor keeps changing the speed of the carousel.

But what happens when something that another IT provider, or vendor, does is so not aligned with “best practices” that it makes me shudder? What if their actions could cause a serious problem at the client’s (or prospect’s) site that might have otherwise been avoided? Couldn’t I then be forgiven if I mentioned that the other guy’s effort was misguided?

I guess it depends on the circumstances.

I encountered two instances of less than stellar computer infrastructure design in the early part of June, and my frustration was significantly higher than that expressed by the folks who were affected. Could I not be forgiven if I said, “Well, you know, those guys really messed up here, but I have a way to fix it.”

But I can’t explicitly say that because I don’t always know the kind of relationship the client (or prospect) has with that vendor or IT company. Instead, I’m usually turning things around by saying something like, “Well that’s not how I do things, because after 10 years in business, I’ve learned that this approach —whatever this is — works much better.”

Of course finding the appropriate solutions to a client’s – or a prospect’s – problems is the core of my business. The tag line for Heliotropic Systems has been “Computer Systems Analysis & Design” for more than 20 years. My goal is to design and deploy computer and network hardware and software with the understanding that it is supposed to operate properly, based on the client’s requirements. In my very parochial way of thinking, I guess that’s pretty much what anyone would want, never mind expect.

Read More →

This month Microsoft will start to gently remind Windows 7 users that it is time to consider switching to Windows 10. According a blog post by Matt Barlow, a Microsoft marketing executive:

“Beginning next month, if you are a Windows 7 customer, you can expect to see a notification appear on your Windows 7 PC. This is a courtesy reminder that you can expect to see a handful of times in 2019. By starting the reminders now, our hope is that you have time to plan and prepare for this transition. These notifications are designed to help provide information only and if you would prefer not to receive them again, you’ll be able to select an option for “do not notify me again,” and we will not send you any further reminders.”

The good news: You will be nagged, but you will be able to turn off the alert. The bad news: I suspect that by November or December, that will no longer be the case. After January 14, 2020, I am certain that if you continue to use Windows 7, you will receive a larger banner regarding the end of support. What that means is your computer, along with Office 2010, will no longer receive any updates, including security updates — and this could expose your computer to potential security threats.

I have written several times that I aim to replace all older computers between now and the end of the year. Anyone who has a newer computer (say, three years old or less) that is running Windows 7 can simply upgrade “in place.” Starting in June, I plan to contact you to schedule this. It entails backing-up your files, downloading Windows 10, and installing the new operating system without replacing your computer. The whole process takes a little over four hours and can be done via remote session.

Thanks and safe computing!

There are days when I simply don’t have the time to read all of the news emails that appear in Outlook, or in the half-dozen computer magazines I subscribe to. In this case, I guess I should have, because I missed a tiny story that turned out to be big news. (A lesson taught by Mrs. Jurow, when I was a fifth-grader at Ogden Elementary School in Valley Stream, NY.) Intel reported in late September 2018 there were “issues” regarding its ability to supply new eighth-generation chips — called Coffee Lake — to computer manufacturers (OEMs). You can read the announcement here: https://newsroom.intel.com/news-releases/supply-update/.

Those eighth-generation chips were the ones I was counting on to be in your new Windows 10 computers. Sad to say, that ain’t gonna happen very soon.

There is currently a “hold” on all those new Coffee Lake-based desktops and laptops. They are not in the pipeline from any of the major OEMs (e.g., Lenovo, Dell, or HP). To meet a higher demand for new computers, they are continuing to produce models with the existing seventh-generation chips (called Kaby Lake). Because of this unexpected need to switch gears at the end of 2018, shipments of all new computers are also being delayed.

How long is the delay? Higher-end models are showing a two to three month lag. In one specific case, the mid-range models I wanted to order as replacements for a client on February 12 (when I originally wrote this article) have an estimated March 25 delivery date — six weeks.

Here’s what this means for you. I am going to have to alter my timeline of deployment to include an additional six to eight weeks. That means I’ll be contacting you sooner than I had originally planned, and that you’ll probably have to wait longer to receive your new computer.

If there is any change in the status of this debacle, I will let you know as soon as possible. I’ll be able to do that because I now have a Google email alert for all things related to Intel Coffee Lake chip status.

After years of creating almost a dozen versions of Internet Explorer, in 2015, Microsoft introduced a new browser called Edge. This was released concurrently with Windows 10. The following year Microsoft announced that there would be no further development (meaning enhancements) to Internet Explorer (IE); only security updates would be issued.

At the start of 2019, according to Net Applications, a company that measures browser usage around the world, almost no one uses the Edge browser (4%) and use of IE has plummeted to 11%. It comes as a stark reminder to realize that only five years ago, IE had almost 85% of the market share.

You are probably asking, “What does this have to do with me?”

I’m getting there, I promise.

As many web developers have discovered, it is increasingly hard to code a web site to support a browser that doesn’t know about the latest features and techniques for displaying web pages. So a number of sites have simply said they are no longer going to run on IE. If you want to view or use their web sites, you’ll have to use another browser. I found this out with one client when she couldn’t get to her AOL mail using IE!

All Windows 10 computers come with the Edge browser by default. But also contained in the operating system is the code to run IE 11. It has been my standard operating practice to remove the Edge icon from the taskbar and replace it with the one for IE. But if Microsoft is not going to issue anything other than security updates, and more web sites decide not to code for IE, I am making a mistake in providing it for you.

So I took a closer look at the Net Applications statistics. To my amazement, my personal favorite browser, Mozilla Firefox has a 10% share – even lower than IE! And to my surprise, Google Chrome has a 64% share. It didn’t take long for me to realize that I need to update my standard deployment task for new computers.

Going forward, I will install Google Chrome on all Windows 10 computers, and set that to be your default browser. I will port over your bookmarks (favorites) and saved information so that you can continue to use this browser instead of Internet Explorer.

I will caution you that that Chrome is slightly different than IE. To help make this transition a little easier, if you want to start using it now, I will offer to install it on your current Windows 7 computer. That way you can compare and contrast how your favorite web sites appear with both browsers, and take at least a few months to wean yourselves away from IE.

PS — After I wrote this article, Microsoft announced that they will be using the Google Chrome framework for future versions of the Edge browser. Notwithstanding that development (which won’t be released until later in 2019), I’m still going to install Chrome.

In plain English, cryptojacking is the stealing the resources of your computer (processing power and electrical power) to mine a cryptocurrency. Data is “mined” on a computer by using special programs to solve complex, encrypted math equations to gain a piece of the currency.

Cybercriminals are always looking for the fastest and easiest way to conduct fraud, and one was revealed in late 2017. There is a company called Coinhive, which launched a service that mines for a digital currency, known as Monero, directly within a web browser. Anyone using the computer is completely unaware that anything is amiss; unless they realize their browser is running very, very, slowly.

According to Symantec, “cryptojacking is a way for cybercriminals to make free money with minimal effort. Cybercriminals can simply hijack someone else’s machine with just a few lines of code. This leaves the
victim bearing the cost of the computations and electricity that are necessary to mine cryptocurrency. The criminals get away with the tokens.”

In early 2018, Malwarebytes published a report on the current state of cryptomining and cryptojacking. Shown below is a map, which depicts the world view and it appears that the United States is greatly affected by this scourge:

According to cyber-guy Brian Krebs, “Monero differs from Bitcoin in that its transactions are virtually untraceable, and there is no way for an outsider to track Monero transactions between two parties. Naturally, this quality makes Monero an especially appealing choice for cybercriminals.”

If you think that something is not quite right with your computer, please give me a call. I want to be sure your computer isn’t running software you didn’t know anything about (and generating profits for crooks).