<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:g-custom="http://base.google.com/cns/1.0" xmlns:media="http://search.yahoo.com/mrss/" version="2.0">
  <channel>
    <title>EV Tech Tips</title>
    <link>https://www.ev-consultech.com</link>
    <description>We write about anything we believe will be interesting to our readers within the world of tech. Emerging technologies, cyber-attacks, how to protect yourself online, security, and tech tips.</description>
    <atom:link href="https://www.ev-consultech.com/feed/rss2" type="application/rss+xml" rel="self" />
    <image>
      <title>EV Tech Tips</title>
      <url>https://irp.cdn-website.com/7ed1db60/dms3rep/multi/Ironscales-d7199d0e.jpg</url>
      <link>https://www.ev-consultech.com</link>
    </image>
    <item>
      <title>What To Know About The CrowdStrike Outage</title>
      <link>https://www.ev-consultech.com/what-to-know-about-the-crowdstrike-outage</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           CrowdStrike: An International Inconvenience
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           On July 19th, there was an international CrowdStrike outage which affected many major institutions such as hospitals, airlines, digital media, finance, and government organizations in many countries. According to CNBC, this was the ‘largest IT outage in history’ due to its widespread financial losses, damage, and negative effects. CrowdStrike, an important EDR provider for Microsoft, launched a faulty update for its Falcon Sensor, used for the Windows operating system. The update was deemed fit for launch due to a hidden bug in the program content validator, creating a huge problem for millions of people and important industries. Because of the organization’s lack of ensured testing, millions of Windows devices displayed what is known as the “Blue Screen of Death”; a blue screen indicating a complete outage in the Microsoft system. The infamous blue screen left many enterprises with little resources to function and their machines powered by Windows were out of use, causing disorder, panic, and a lack of security. Furthermore, the outage caught all staff and authority by surprise making responsibilities more difficult to uphold.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Why is this important?
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The effects of the CrowdStrike outage left countless damages for each of its leading users. Technical specialists were required to manually remove the update over the course of several days, resulting in flight delays, loss of intel, poor communication, and a newfound unreliability in their cybersecurity. This was a major inconvenience for the critical industries that depend on CrowdStrike services for their success. In one case, a total of $500 million was lost at Delta Airlines after having to cancel around 2,000 flights. There were also around $5 billion in financial losses for other major enterprises. All around, the international outage left much damage to each of CrowdStrike’s main dependents.   
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Thankfully, CrowdStrike itself made sure to issue an apology informing the public of its commitment to improving the testing processes so this never happens again. Further testing on all future updates and programs would include techniques such as stress testing, fuzzing, rollback testing, as well as fault injection to ensure the best results.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Ways to avoid the outage:
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           According to TechRepublic, “SentinelOne Singularity and Microsoft Defender for Endpoint are among the top CrowdStrike alternatives”. Neither of these EDR providers affected their users like CrowdStrike did on July 19th because of their alternative work ethic and testing procedures. It’s safe to say that many industries and businesses could be wary of depending on CrowdStrike for future EDR needs. However, there are still other viable options that will provide more efficient services to all major enterprises and businesses, big or small. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           At EV-Consultech, we help clients stay informed about cybersecurity threats to their business success. We understand how valuable and important reliable service is to every company which is why we have ensured it with SentinelOne for over 2 years. Contact us today and learn more about the importance of cybersecurity knowledge.       
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/pexels-photo-207580-3399913a.jpeg" length="96125" type="image/jpeg" />
      <pubDate>Fri, 23 Aug 2024 05:11:05 GMT</pubDate>
      <guid>https://www.ev-consultech.com/what-to-know-about-the-crowdstrike-outage</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/pexels-photo-2881229.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/pexels-photo-207580-3399913a.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>The STOP Method</title>
      <link>https://www.ev-consultech.com/stop</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           STOP
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Today, email phishing scams have become very dangerous and popular. These attempts to get sensitive information can create a huge problem for businesses. This is increasingly getting worse with attackers finding creative ways to try to lure you in, hence the name “phishing”. However, when you are alert and take dynamic measures, you can protect yourself from being a victim of these scams. We will discuss the STOP method and how you can protect yourself from phishing attacks.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            The
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           STOP
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            method stands for:
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           S
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            uspicious?
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           T
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            elling you to click?
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           O
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ffering something amazing?
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           P
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ushing you to act quickly?
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            We will go through each of these questions, to make this muscle memory for you for years to come.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Suspicious?
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Suspicious emails include misspellings, poor grammar, unexpected content, or a gut feeling. As kids, we were taught not to talk to strangers, but in this case, strangers can look very familiar. Email vigilance extends beyond just unknown senders.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Telling you to click?
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Links can redirect you to anything, and in this case, one click can be bad news.  These links do not always go where they say they go. Scammers use link shorteners like “Bit.ly” to make links shorter, which is suspicious. Also, if you see a word in the link that you find familiar, it does not mean the link will go to that page.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Offering something too good to be true?
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            If you recently won a free iPad…. you did not. These types of emails can offer you free prizes and usually have the word “congratulations” on them. If it is too good to be true, ignore it.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Pushing you to act quickly?
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Emails that ask you to do something quickly that you usually need to complete with more caution should be a huge red flag right off the bat. For example, your boss asks you to complete an invoice immediately or an email from your bank to confirm a receipt fund by one hour.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           At EV-Consultech, we help users fight against these potential malicious attacks. We train them every month with different simulated phishing attacks called “phishing campaigns”. Users also have the option to report a suspicious email by using our provided Ironscales tool. This is the tool we use to send in our campaigns, and it also provides users with a button in outlook to report a specific email as a phishing email. Contact us today and learn more about the importance of cybersecurity knowledge. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/stop.jpg" length="28844" type="image/jpeg" />
      <pubDate>Tue, 19 Mar 2024 19:36:33 GMT</pubDate>
      <author>evelandia@ev-consultech.com (Eduardo Velandia)</author>
      <guid>https://www.ev-consultech.com/stop</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/stop.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/stop.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Your Shield Against Insider Attacks</title>
      <link>https://www.ev-consultech.com/your-shield-against-insider-attacks</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Your Shield Against Insider Attacks
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Organizations face the challenges of protecting their sensitive and important data in a world of booming technology. While external threats are always the topic of discussion, insider threats are also something to be careful about, and different types of applications introduce a new wave of vulnerabilities. Recent incidents, including the big case at Tesla, force companies to alter their defense tragedies to be alert to threats inside of an organization. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
        
            Even tech giants like Microsoft have fallen prey to insider crime, emphasizing the need for a good strategy to fight this growing danger. Over the past four years, we have seen a forty percent increase in the average annual cost of insider risks, urging organizations to reevaluate their internal data security policies. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Most Important Steps for Defense
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
        
            Control Access/Permissions:
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Configure access controls and regularly review permissions based on job positions. Give users only the access they need to carry out the job itself. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
        
            Monitoring:
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Deploy monitoring tools to track user activities within different applications, allowing the detection of malicious behavior as early as possible. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Offboarding of employees:
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Develop great offboarding procedures to remove access to any application they were using when an employee departs. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Encryption:
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Encourage encryption of sensitive and important data within SaaS (Software as a Service) applications. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
        
            Security Awareness and Training Programs:
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Push for the knowledge of security awareness, encouraging employees to report any suspicious behavior and testing them regularly. This can be done with monthly training and simulations. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
        &lt;br/&gt;&#xD;
        
            At EV-consultech, we take security awareness very seriously and ensure that all our clients are protected against insider and outsider threats. With our regular training and simulations, our users are exposed to the worst-case scenarios and are prepared in the event of a potential attack from any source, internal and external. We are always here to combat any type of cyber attack with state of the art tools we provide to our clients as part of our managed IT services. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/content-blog-cybersecurity-trust-no-one-cc2011-002f-ab571a48.webp" length="10244" type="image/webp" />
      <pubDate>Thu, 28 Dec 2023 21:29:47 GMT</pubDate>
      <guid>https://www.ev-consultech.com/your-shield-against-insider-attacks</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/content-blog-cybersecurity-trust-no-one-cc2011-002f-ab571a48.webp">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/content-blog-cybersecurity-trust-no-one-cc2011-002f-ab571a48.webp">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>The Importance of Password Managers</title>
      <link>https://www.ev-consultech.com/the-importance-of-password-managers</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Password Managers
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In our online world, keeping your accounts secure is crucial. Password managers act like a super-guard for your passwords, not only storing them safely but also creating super-strong ones that even the best hackers can't crack. To see your passwords, you only need to remember one key password.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Access Your Passwords Safely: 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           If you use the Chrome password manager, you can unlock it with your laptop pin. Another smart way is to use multi-factor authentication, a popular security trick. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           More Features: 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Auto-Fill and Login:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Password managers make logging in a breeze by filling in your details for you. This not only saves time but also lowers the risk of falling for tricky phishing scams.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Multi-Platform Sync:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Your passwords stay updated and ready on all your gadgets – computer, laptop, phone, or tablet. No more worries about juggling different passwords for each device or keeping an excel sheet full of them. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Password Sharing:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           You can safely share your login info with others without telling them the actual password. Great for family or team accounts. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           The Benefits: 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Security:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           By creating and handling tough passwords, these managers boost the security of your online accounts. This means hackers have a harder time getting into your personal stuff.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Convenience:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Forget the headache of trying to remember lots of passwords or keeping lists. With a password manager, just remember one key password. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Time-Saving:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Logging in is quicker with features that fill in your details for you. This not only saves time but also makes your online experience smoother and more enjoyable. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Some of the Best Password Managers out there
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           : 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           DashLane
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           DashLane provides all the essential features of a password manager, coupled with additional security measures such as a dark web monitor and VPN. It conducts scans to identify weak passwords across various accounts, supports multiple forms of multi-factor authentication, allows remote revocation of device access, and actively scans for compromised accounts. While it offers robust features, the subscription plans may be considered relatively high-priced.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           NordPass
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           NordPass, developed by the reputable team behind NordVPN, offers a comprehensive solution with a data breach scanner and a password health report. It supports various forms of multi-factor authentication and ensures secure password sharing. The service prioritizes user security and is backed by the credibility of the Nord brand. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           BitWarden 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           BitWarden
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           is an excellent choice for beginners, boasting user-friendly features and the best free tier subscription. With support for multi-factor authentication, open-source architecture, and sharing capabilities, it provides a cost-effective option for those looking to upgrade to a paid plan.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           At EV-consultech, we are here to help you find the perfect password manager that suits you or your business. This makes things easier for everyone and gives confidence in knowing all accounts are safe. Let's work together to create a solid and secure foundation for your company's digital world.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/password-manager-og.jpg" length="14455" type="image/jpeg" />
      <pubDate>Wed, 06 Dec 2023 23:58:42 GMT</pubDate>
      <guid>https://www.ev-consultech.com/the-importance-of-password-managers</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/password-manager-og.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/password-manager-og.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>The Importance of Cyber Insurance</title>
      <link>https://www.ev-consultech.com/the-importance-of-cyber-insurance</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Cyber Insurance
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In today's modern age, cyber insurance has been an important tool for businesses, providing financial protection just in case of cyber threats. A single click on a suspicious link can lead to terrible consequences, with different types of attacks like malware, spyware, and ransomware. The growth of cybercrime, especially with the rise of remote work, highlights the crucial need for cyber insurance. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
            These policies vary but often cover costs related to data recovery, legal fees, crisis management, and more. While cyber insurance can't replace robust cybersecurity, it provides a critical financial safety net. More and more companies are investing in cyber insurance, with a 41% increase in businesses securing policies. In addition to this, they are also investing more time in cyber education. For example, simulated threat emails and doing security campaigns every year. This is the deep foundation for practicing good security awareness when working. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
        
             Costs for cyber insurance premiums depend on factors such as cybersecurity measures and business size. As cyber threats evolve, insurers are refining their coverage and imposing stricter cybersecurity requirements. Cyber insurance is a critical tool for businesses in today's digital landscape. While costs are rising, the potential financial protection it offers is very considerable. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
            At EV-consultech we always help our clients find the best solutions for any inevitable cyber threats. We identify their worries and based on how much they are willing to spend, we propose a great solution in terms of cyber insurance. We understand the importance of protecting a company from cybercrime and having a good financial foundation to get passed danger. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/cyber-blog-pic.jpg" length="80530" type="image/jpeg" />
      <pubDate>Mon, 30 Oct 2023 23:03:34 GMT</pubDate>
      <guid>https://www.ev-consultech.com/the-importance-of-cyber-insurance</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/cyber-blog-pic.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/cyber-blog-pic.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Chat GPT: The Good and the Bad</title>
      <link>https://www.ev-consultech.com/chat-gpt-the-good-and-the-bad</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In today's day in age, the use of AI-generated platforms has become increasingly popular across the internet. These platforms allow for a fast and facilitated way to complete tasks such as professional work, education, or expanding one's personal knowledge. Anyone has the ability to discover new or pre-existing information regarding a multitude of topics by simply imputing their inquiries on platforms such as Chat GPT.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Chat GPT has had a striking impact on society because of how easy it is for people to gather information on any topic. The platform provides information on anything asked through its online chat and it does so with a fast response. However, Chat GPT and AI-generated platforms can have potential risks such as...
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Data Breaches
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Data breaches can happen when using any type of online platform, especially those generated by AI. Chat GPT must be accessed through a web browser since it cannot be downloaded. Because of that, data breaches can occur if an unauthorized party gets a hold of your online chat logs, personal information, or any other sensitive data. A few consequences are:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ol&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Privacy compromises
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            : If an unknown person or group gains access to your personal information through the platform, your privacy has been compromised and you identity could be exposed.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Identity theft
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            : Cybercriminals could use your personal information to act under your name rather than their own. They would steal your identity by using it against you in order to perform fraudulent actions.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Misuse of data
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            : User data could be subject to misuse when a data breach occurs on an AI platform. With that, your information could be used without your consent for suspicious activity online.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ol&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Open AI appears to be taking accurate cyber security measures in order to make it less likely for data breaches to take place. However, not all systems are free from errors or breaches in security, and Chat GPT is a good example of this.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Access to Confidential Information
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Chat GPT has the ability to use personal information entered into the online chat by its users. In order to ensure the user's safety and continual privacy while using the platform, it's best to not exploit one's own information when using the AI chat.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Gaining access to user information isn't easy for an AI-generated platform to achieve, but if the user provides the data themselves, it can have some consequences.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Biased or Inconsistent Information
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           An additional risk in using Chat GPT is that it could potentially provide biased or inconsistent information to its users
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Because of the wide range of information the platform contains, it could possibly generate false data that could be confused for something else.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            This can definitely affect industries or companies that use AI-generated content for their line of work
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           These businesses could provide faulty service to their customers all due to the misleading data given by an AI platform. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            This has the potential to hinder the company’s advances and overall performance as a result. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In the end, it's up to the user and the user alone how they interpret the information given by the AI chat bots; it could be completely right or completely false. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Question: Is it safe to use? 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           In certain aspects, Chat GPT contains multiple potential threats to one’s online experience. A platform such as this one can provide misinformation and exploit your personal information. However, it can still be used without problems if certain measures are taken accordingly. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Safety Measures You Can Take:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Browse on and interacting with AI platforms through anonymous accounts
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Keep personal or sensitive information private 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Review the platform’s privacy policy and be well-informed about its activity
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
        
            To conclude, yes, Chat GPT is safe to use as long as it is used responsibly and accordingly to reap the benefits. These types of platforms will continue to be prevalent in the world for years to come and it’s important to know how to ensure we have the best experience with AI.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Where can I learn more about the effects of AI for my business?
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
             
            &#xD;
        &lt;br/&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            At EV-Consultech, we can answer any questions or concerns you may have regarding the influence of AI. Learn more by contacting us below.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
        
             
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/canstockphoto108596301.jpg" length="50382" type="image/jpeg" />
      <pubDate>Wed, 28 Jun 2023 01:35:03 GMT</pubDate>
      <author>evelandia@ev-consultech.com (Eduardo Velandia)</author>
      <guid>https://www.ev-consultech.com/chat-gpt-the-good-and-the-bad</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/canstockphoto108596301.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/canstockphoto108596301.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Benefits of A.I. Chatbots</title>
      <link>https://www.ev-consultech.com/benefits-of-ai-chatbots</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Why Using A.I. Chatbots Will Impact The Way You Conduct Business
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-6697306.jpeg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            From learning to navigate around-the-clock client assistance to perfecting the overall consumer online experience, these are just some of the few expectations that consumers have of all online businesses. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://userlike.com/en/blog/consumer-chatbot-perceptions" target="_blank"&gt;&#xD;
      
           80%
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            of surveyed online users confirmed they have engaged with an AI chatbot at one point or another. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Businesses across all industries are turning to integrate the use of AI chat boxes to better manage and are reaping the benefits. Here are a few selling points about AI chatbot usage that may elevate your business: 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a href="https://www.statista.com/statistics/808427/effectiveness-of-customer-service-chatbots-at-resolving-customers-issues/" target="_blank"&gt;&#xD;
    &lt;img src="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/Statista2+Image.png" alt="Bar graph measuring customer service satisfaction about how effective chatbots resolved user issues"/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           24-HOUR ASSISTANCE 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Information is accessible with the touch of a button, and so are chatbots. Whether consumers are in a different time zone or not, having any questions addressed at any time of the day can be the important factor that makes a client want to conduct business with your organization! 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Based on a Statista statistic, research shows that
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://bloggingwizard.com/chatbot-statistics/" target="_blank"&gt;&#xD;
      
           33%
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            of online consumers found chatbots ‘very effective’ in resolving their queries. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           MORE ACCURATE LEADS
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
             
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
      
           Despite 24-hour assistance, businesses need to ensure that all incoming online traffic is being analyzed to yield high quality leads. This helps filter through all online traffic to better target your desired user demographic.   
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            According to Drift, chatbots aid in generating
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.drift.com/blog/state-of-conversational-marketing/?utm_source=salesforce&amp;amp;utm_medium=blog" target="_blank"&gt;&#xD;
      
           55%
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            of high-quality leads for businesses. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           OMNI-CHANNEL APPROACH
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            The beauty of running a business today is that you have multiple platforms to utilize. In layman's terms, more accessibility equals more coverage. With the help of conversational AI, connecting all digital channels will be easily integrated. Some of the main highlights of a multi-channel approach consist of saving time on redundant customer requests, allowing for comprehensive connectivity to track new customer behavior patterns when collecting data and provide a quicker response time to customer requests across all platforms. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           ENGAGEMENT BOOSTER
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Online users enjoy fast response times that come with AI chatbots. Your business can engage with more leads when it allows visitors to start conversations on the website compared to when it asks them to first fill out the forms.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://userlike.com/en/blog/consumer-chatbot-perceptions" target="_blank"&gt;&#xD;
      
           68%
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            of users appreciate the fast response time that comes with using chatbots.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/Userlike+Image.png" alt=""/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           ASSISTING IN MULTIPLE LANGUAGES
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
             
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Without multilingual support, businesses are at risk of losing the attention of consumers. Multilingual chatbots improve the the overall user experience with self-service options. Users can easily find answers to common questions without waiting for a response.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Where can I learn more about using AI Chatbots for my business?
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
             
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
             
            &#xD;
        &lt;br/&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           At EV-Consultech, we can assist you with any concerns on how to yield better productivity and efficiency for your digital workplace. Begin your AI chatbot integration today by scheduling a technology consultation with us below. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-8386440.jpeg" length="154692" type="image/jpeg" />
      <pubDate>Fri, 12 May 2023 02:26:04 GMT</pubDate>
      <guid>https://www.ev-consultech.com/benefits-of-ai-chatbots</guid>
      <g-custom:tags type="string">#ai,#chatbot</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-5697255.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-8386440.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Achieving Business Success During the Pandemic</title>
      <link>https://www.ev-consultech.com/achieving-business-success-during-the-pandemic</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Pandemic Impact
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            As a result of the COVID-19 pandemic, companies are forced to change how they get work done in the new circumstances. With that, PCs are very important elements used to empower employees to exercise their expertise and services in different ways. According to
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           IT decision makers (ITDMs)
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           , for future work to be progressive during the pandemic, employees must have access to stable work PCs in order to continue remotely. Companies that invest in better PCs and adjust their work strategies can guarantee the stability of how they work through the effects of the pandemic.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h4&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Introducing Hybrid Work
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/h4&gt;&#xD;
  &lt;h4&gt;&#xD;
    &lt;span&gt;&#xD;
      
           COVID-19 has made way for change in the business world, no matter if it’s in mature, medium-maturity, or low-maturity organizations. Because of that,
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           ITDMs
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            work to create beneficial work strategies for when the pandemic is over. Prior to the pandemic, most organizations had less than
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           10% of their employees
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            working remotely. Now, employees need to balance their organization’s needs whether they are working from the office or remotely from home.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/h4&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
        
            Over half of the
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           ITDMs
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            notice that their company will eventually become hybrid meaning that some members will work at home certain days of the week and at the office for the other days. The employees as well as their employers will have the chance to continue their business ventures and work from different settings. Only about a quarter of IT decision makers express their intentions to go back to their pre-COVID work strategies. However, as many companies support continued productivity both remotely and on-sight, employees agree. Both employers and their employees support a hybrid-work future due to its many opportunities for workers to do their jobs from anywhere, not just their office workspace. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
        
            Over
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           80% of IT decision makers (ITDMs)
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            see the overall benefits of upgrading their company PCs for the good of their entire organizations.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Two-thirds of ITDMs
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            also see the importance of investing in reliable, high-performance PCs for continued work, especially over the next year. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
        
            As employees are increasingly working from multiple locations, online video calls have become critical for ideal connectivity wherever they may be working. Because of that,
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           82% of decision makers
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            agree that investing in extremely stable PCs for better video quality and overall capability is an important change worth making. Similarly,
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           85%
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            agree that it’s important to ensure the stability and strength of their PCs to ensure the best resources for company work to get done. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h4&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           But What About Older PCs?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h4&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            PCs are the foundation for employers and employees alike to continue doing their work outside the company office. However,
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           ITDMs
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            say that current PCs fail to ensure the best productivity for their organizations. Older models may struggle to provide good video and audio quality for business calls, connectivity in order to complete tasks, or support for a new type of work. For that reason, the organizations need to invest in better PCs that support their hybrid-work strategies. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h4&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           PCs vs. Hybrid Work
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h4&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            A vast majority of
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           ITDMs
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            believe that purchasing PCs is much different than it was before due to a need for performance, security, and reliability. These factors matter because they can allow for improved employee experience, organization productivity, and better company performance. But while many high-maturity organizations agree with this statement, only
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           27% of low-maturity organizations
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            do. It's critical that PC devices are stable and high-performing for the new future of working technology. Without them, companies could potentially fall behind during the COVID-19 pandemic. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h5&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Companies should:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h5&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Test and ensure the good performance and stability of their PCs
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
             
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            (If mature)
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Build systems for long-term and long-lasting success
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            (If medium/low maturity)
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Build a business case
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Reach out to schedule a technology consultation. At EV-Consultech, we can help you upgrade your PCs to ensure the efficiency and productivity of your hybrid workplace.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h4&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/h4&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/canstockphoto17658403-dd43ac53-5784d7c6-31e4a3af.jpg" length="366759" type="image/jpeg" />
      <pubDate>Wed, 04 Jan 2023 23:45:01 GMT</pubDate>
      <guid>https://www.ev-consultech.com/achieving-business-success-during-the-pandemic</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/canstockphoto17658403-dd43ac53.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/canstockphoto17658403-dd43ac53-5784d7c6-31e4a3af.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Checklist for Better Digital  Offboarding of Employees</title>
      <link>https://www.ev-consultech.com/checklist-for-better-digital-offboarding-of-employees</link>
      <description>When an employee decides to leave a company, there is an offboarding process that needs to happen. This process “decouples” the employee from the company’s technological assets and is vital to cybersecurity.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h1&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Checklist for Better Digital Offboarding of Employees
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h1&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Digital footprints cover today's modern workplace. Employees begin making these the moment they're hired. They get a company email address and application logins. They may even update their LinkedIn page to connect to your company.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            When an employee decides to leave a company, there is an offboarding process that needs to happen. This process “decouples” the employee from the company’s technological assets and is vital to cybersecurity.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           You don’t want a former employee to maliciously email all your customers from their work email. Sensitive files left on a former staffer’s computer could leak months later. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://webinarcare.com/best-offboarding-software/offboarding-statistics/" target="_blank"&gt;&#xD;
      
           20% of
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            surveyed businesses have experienced a data breach connected to a former employee.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Digital offboarding entails revoking privileges to company data, and much more. This is a critical process to go through for each former staff member to reduce risk.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Below, we’ve provided a handy checklist to help you cover all your bases.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Your Digital Offboarding Checklist
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           1. Knowledge Transfer
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Vast swaths of corporate knowledge can disappear when a person leaves an organization. It’s important to capture this during a digital offboarding process.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           This could be something as simple as what social media app someone used for company posts. Or it may be productivity leveraging. Such as the best way to enter the sales data into the CRM.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Make sure to do a knowledge download with an employee during the exit interview. Better yet, have all staff regularly document procedures and workflows. This makes the knowledge available if the employee is ever not there to perform those tasks.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           2. Address Social Media Connections to the Company
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Address any social media connections to the former employee. Is their personal Facebook user account an admin for your company's Facebook page? Do they post on your corporate LinkedIn page? Make sure to revoke the employee's access to any cooperate Social Media platforms.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           4. Identify All Apps &amp;amp; Logins the Person Has Been Using for Work
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Hopefully, your HR or IT department will have a list of all the apps and website logins that an employee has. But you can’t assume this. Employees often use unauthorized cloud apps to do their work. This is usually done without realizing the security consequences.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Make sure you know of any apps that the employee may have used for business activities. You will need to address these. Either change the login if you plan to continue using them. Or you may want to close them altogether after exporting company data.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           5. Change Email Password
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Changing the employee’s email password should be one of the first things you do. This keeps a former employee from getting company information. It also keeps them from emailing as a representative of the company.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Accounts are typically not closed immediately because emails need to be stored. But you should change the password to ensure the employee no longer has access.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           6. Change Employee Passwords for Cloud Business Apps
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Change all other app passwords. Remember that people often access business apps on personal devices. So, just because they can’t access their work computer any longer, doesn’t mean they can’t access their old accounts.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Changing the passwords locks them out no matter what device they are using. You can also simplify the process with a single sign-on solution.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           7. Recover Any Company Devices
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Make sure to recover any company-owned devices from the employee’s home. Remote employees are often issued equipment to use.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           You should do this as soon as possible to avoid loss of the equipment. Once people no longer work for a company, they may sell, give away, or trash devices
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           8. Recover Data on Employee's Personal Devices
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Many companies use a bring your own device (BYOD) policy. It saves them money, but this can make offboarding more difficult.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           You need to ensure you’ve captured all company data from those devices. If you don’t already have a backup policy in place for this, now would be a good time to create one.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           9. Transfer Data Ownership &amp;amp; Close Employee Accounts
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Don’t keep old employee cloud accounts open indefinitely. Choose a user account to transfer their data to and then close the old account. Leaving unused employee accounts open is an invitation to a hacker. With no one monitoring the account, breaches can happen without anyone knowing. A criminal could gain access and steal data for months unnoticed. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           10. Revoke Access by Employee’s Devices to Your Apps and Network
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Using an endpoint device management system, you can easily revoke device access. Remove the former employee’s device from any approved device list in your system.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           11. Change Any Building Digital Passcodes
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Don’t forget about physical access to your building. If you have any digital gate or door passcodes, be sure to change these so the person can no longer gain access.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           12. Need Help Reducing Offboarding Security Risk?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           When you proactively address digital offboarding, the process is easier and less risky. Contact us today for a free consultation to enhance your cybersecurity.
           &#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/checklist-gea509ec90_1920-047a64df-5f082be8-b9a47f5b.jpg" length="3590472" type="image/png" />
      <pubDate>Tue, 29 Nov 2022 21:59:54 GMT</pubDate>
      <guid>https://www.ev-consultech.com/checklist-for-better-digital-offboarding-of-employees</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/checklistr.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/checklist-gea509ec90_1920-047a64df-5f082be8-b9a47f5b.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>5 Big Mistakes Companies Are Making In The Digital Workspace</title>
      <link>https://www.ev-consultech.com/5-mistakes-companies-are-making-in-the-digital-workspace</link>
      <description>The pandemic has been a reality check that companies all around have shared. It required major changes in how they operate. No longer, did the status quo of having everyone work in the office make sense for everyone. Many organizations had to quickly evolve to working through remote means.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h1&gt;&#xD;
    &lt;span&gt;&#xD;
      
           5 Big Mistakes Companies Are Making In The Digital Workspace
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h1&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The pandemic has been a reality check that companies all around have shared. It required major changes in how they operate. No longer, did the status quo of having everyone work in the office make sense for everyone. Many organizations had to quickly evolve to working through remote means.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            During the worst of the pandemic, it’s estimated that
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.apollotechnical.com/statistics-on-remote-workers/" target="_blank"&gt;&#xD;
      
           70% of
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            full-time workers were working from home. Even now that the pandemic has hit a new waning phase, remote work is still very much a reality. 92% of surveyed employees expect to still work from home at least 1 or more days per week.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            This transformation has forced companies to rethink the tools and policies they use. Many have also needed to completely revamp how they work. They've had to switch to a cloud-based digital workspace to enable a hybrid team.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           This transition has brought newfound benefits, such as:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Lower costs for employees and employers
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Better employee work/life balance
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Higher morale
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            The same or improved productivity
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            More flexibility in serving clients
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           But, the transition to a digital workplace has also brought challenges and risks. These include:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Vulnerable networks and endpoints
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Employees feeling disconnected
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Communication problems
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Difficulty tracking productivity and accountability
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Increased risk of data breaches
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://www.cybertalk.org/2022/03/31/remote-work-security-statistics-in-2022/" target="_blank"&gt;&#xD;
      
           20% of
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            organizations experienced a breach during the pandemic due to a remote worker.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Overcoming the challenges and reaping the benefits takes time and effort. It also often takes the help of a trained IT professional, so you avoid costly mistakes.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Below are some of the biggest company mistakes when building a digital workplace. For the statistics, we referenced IGLOO’s
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.igloosoftware.com/state-of-the-digital-workplace/" target="_blank"&gt;&#xD;
      
           State of the Digital Workplace
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           report.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           1. Poor Cloud File Organization
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           When companies go virtual for their workflows, files live in a cloud-accessible environment. If those cloud storage environments aren’t well organized, it's a problem. It can be difficult for employees to find the files they need.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           About 51% of employees have avoided sharing a document with a colleague for this reason. They either couldn’t find it or thought it would be too hard to find. It’s notable that this is the highest percentage recorded for this stat in the
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.igloosoftware.com/state-of-the-digital-workplace/" target="_blank"&gt;&#xD;
      
           IGLOO report
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . Meaning that this problem is getting worse.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Some tips for making shared cloud storage files easier to locate are:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Keep file structure flat (2-3 folders deep)
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Create a consistent hierarchy and naming structure
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Don’t create a folder for fewer than 10 documents
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Archive and delete older files monthly to reduce clutter
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           2. Leaving Remote Workers Out of the Conversation
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Many companies haven’t yet overcome in-person vs remote communication challenges. In fact, nearly 60% of remote workers say they miss out on important information. This is because colleagues first communicated it in person. Efficiency suffers when in-office workers make decisions without regard for remote colleagues.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Managers and bosses must lead the way in changing this culture. While old habits do take a while to change, mindset can transition to be more inclusive of the hybrid world.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           3. Not Addressing Unauthorized Cloud App use
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Unauthorized cloud app use (also known as Shadow IT) was already a problem before the pandemic. That problem escalated once people began working from home. Which is often using their personal devices.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Over half (57%) of employees use at least one unauthorized app in their workflow. When this happens, organizations can suffer in many ways.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Some of the risks of shadow IT include:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Data leakage from non-secured apps
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Date privacy compliance violations
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Redundancies in app use that increase costs
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Unprotected company data due to a lack of visibility
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             The employee leaves and no one can access the data in the unauthorized app
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           4. Not Realizing Remote Doesn’t Always Mean From Home
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Remote employees aren’t always working from home, connected to their home Wi-Fi. They may also be working from airports, hotels, a family member’s home, or local coffee shops.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Companies that don’t properly protect company data used by remote employees, can be at risk of a breach. Public networks are notorious for being susceptible to “man-in-the-middle” attacks. This is where a hacker connects to the same public network. Then, using software, can access data transmissions from others on that network.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           It's advisable to use a business VPN for all remote work situations. VPNs are fairly inexpensive and easy to use. The employee simply enables the app on their device. The app then reroutes their data through secure, encrypted servers
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           5. Using Communication Tools That Frustrate Everyone
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Are virtual meetings giving your team problems? As many as 85% of remote workers say that they’ve had 1-2 meetings interrupted by technology. It’s getting so you can hardly have a virtual meeting without someone having a technical issue.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Communication is the oil that makes the engine of a digital workplace run. Effective cloud-based video calls, audio calls, and chats depend on the right technology. This facilitates a smooth experience.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Don’t rush to use just any communication tools. Take your time and test them out. Get help optimizing settings to improve your virtual meetings. Additionally, ensure your remote team has tools to foster smooth communications. This includes headsets, VoIP desk sets, webcams, etc. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Boost the Productivity of Your Hybrid Office
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Reach out today to schedule a technology consultation. At EV-Consultech we can help you improve the efficiency and productivity of your digital workplace.
           &#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/domenico-loia-hGV2TfOh0ns-unsplash-2fa134f9.jpg" length="1753010" type="image/png" />
      <pubDate>Thu, 13 Oct 2022 23:41:43 GMT</pubDate>
      <guid>https://www.ev-consultech.com/5-mistakes-companies-are-making-in-the-digital-workspace</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/domenico-loia-hGV2TfOh0ns-unsplash-2fa134f9.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/domenico-loia-hGV2TfOh0ns-unsplash-2fa134f9.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>6 Discontinued Technologies That Could Be Putting You At Risk</title>
      <link>https://www.ev-consultech.com/6-discontinued-technologies-that-could-be-putting-you-at-risk</link>
      <description>The one constant about technology is that it changes rapidly. Tools that were once industry standard, like Internet Explorer and Adobe Flash, age out, replaced by faster and more secure alternatives.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h1&gt;&#xD;
    &lt;span&gt;&#xD;
      
           6 Discontinued Technologies That Could Be Putting You At Risk
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h1&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The one constant about technology is that it changes rapidly. Tools that were once industry standard, like Internet Explorer and Adobe Flash, age out, replaced by faster and more secure alternatives. Discontinued technology can leave computers and networks vulnerable to attacks.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           While older technology may still run fine on your systems that doesn’t mean that it’s okay to use. One of the biggest dangers of using outdated technology is that it can lead to a data breach.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            After a number of years old software and hardware systems are often no longer supported by their OEM's. No support, means no new updates that often patch newly found and exploited system vulnerabilities. Unpatched devices can be a sitting duck for hackers looking to gain access into a network.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Approximately
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.zdnet.com/google-amp/article/cybersecurity-one-in-three-breaches-are-caused-by-unpatched-vulnerabilities/" target="_blank"&gt;&#xD;
      
           1 in 3 data breaches
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            are due to unpatched system vulnerabilities.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Another problem with using discontinued technology is that it can leave you behind. Your business can end up looking like you’re in the stone ages to your customers, which can cause them to lose faith and trust.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Important reasons to keep your technology updated to a supported version are:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Reduce the risk of a data breach or malware infection
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            To mitigate hardware and software compatibility issues
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Meet data privacy compliance requirements
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            To be competitive in your market
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            To keep a good reputation and foster customer trust
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            To enable employee productivity
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Older systems are clunky and get in the way of employee productivity. If you keep these older systems in use, it can lead to the loss of good team members due to frustration.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.zdnet.com/article/nearly-half-of-workers-will-quit-their-job-if-their-workplace-technology-is-not-up-to-scratch/" target="_blank"&gt;&#xD;
      
           49% of
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            surveyed workers say they would consider leaving their jobs due to poor technology. Following is a list of outdated technology tools that you should replace as soon as possible. Are any of these still in use on your home computer or within your business?
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Get Rid of This Tech Now If You’re Still Using It!
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Internet Explorer
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Many moons ago, Internet Explorer (IE) used to be the number one browser in the world. But, over time, Google Chrome and other browsers have "edged it" out. Including its own replacement, Microsoft Edge.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Microsoft began phasing out IE with the introduction of Microsoft Edge in 2015 which is now actually based on Google's open source Chromium Project. In recent years, applications and websites have dropped support for the legacy IE browser. Internet Explorer
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://docs.microsoft.com/en-us/lifecycle/faq/internet-explorer-microsoft-edge" target="_blank"&gt;&#xD;
      
           loses all support
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            starting June 15, 2022.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Adobe Flash
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Millions of websites used Adobe Flash in the early 2000s. But other tools can now do the animations and neat things Flash could do. This made the tool obsolete, and Adobe ended it.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            The
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.adobe.com/products/flashplayer/end-of-life.html" target="_blank"&gt;&#xD;
      
           Adobe Flash Player
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            lost all support, including security updates, as of January 1, 2021. If you still have this lingering on any of your computers, you should uninstall the browser plugin and any Flash software. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Windows 7 and Earlier
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Windows 7 was a very popular operating system, but it’s now gone the way of the dinosaur. The old OS lost support on January 14, 2020. While Windows 10 and Windows 11 have seen widespread adoption both in homes and businesses.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           While it will still technically run, Windows 7 is vulnerable to being hacked. Microsoft Windows OS is a high-value target for hackers, so, you can be sure they are out there looking for systems still running this obsolete version of Windows so they can take advantage of its vulnerabilities.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           macOS 10.14 Mojave and Earlier
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Due to the steep costs of Apple computers, people tend to hang onto them as long as possible. However, once these devices age past a certain point, they will no longer work with the newest version of macOS, leaving the hardware stuck on an older and non-supported version with potentially unpatched security flaws.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If you are running macOS 10.14 Mojave or earlier, then your OS is no longer supported by Apple, and you need to upgrade.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Oracle 18c Database
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If your business uses Oracle databases, then you may want to check your current version. If you are running the Oracle 18C Database, then you are vulnerable. Breaches can easily happen due to unpatched system vulnerabilities.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            The Oracle 18C Database lost all support in June of 2021. If you have upgraded, then you’ll want to keep an eye out for another upcoming end-of-support date. Both Oracle 19C and 21C will be losing premiere support in
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.oracle.com/us/support/library/lifetime-support-technology-069183.pdf" target="_blank"&gt;&#xD;
      
           April of 2024
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Microsoft SQL Server 2014
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Another popular database tool is Microsoft’s SQL. If you are using SQL Server 2014, then mainstream support has already ended. And in
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://docs.microsoft.com/en-us/lifecycle/products/sql-server-2014" target="_blank"&gt;&#xD;
      
           July of 2024
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           , all support, including security updates will stop entirely.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           This gives you a little more time to upgrade before you’re in danger of not getting security patches. But it is better to upgrade sooner rather than later. Leaving plenty of time for testing and verification of the upgrade.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Need Help Upgrading Your Technology &amp;amp; Reducing Risk?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Upgrades can be scary, especially if everything has been running great. You may be afraid that a migration or upgrade will cause issues, but rest assured. EV-Consultech can help smoothly upgrade your technology in addition to comprehensive testing to ensure the all systems are working as expected and reliable. If your business is in the greater Los Angeles area, fill out the form below to schedule a technology review today!
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/website-6700615-61c0519b-21836e8c.png" length="19146" type="image/png" />
      <pubDate>Fri, 02 Sep 2022 20:52:13 GMT</pubDate>
      <guid>https://www.ev-consultech.com/6-discontinued-technologies-that-could-be-putting-you-at-risk</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/TTT_Blog-Post-Social-Media-Image-6-Discontinued-Technology-Tools-You-Should-Not-Be-Using-Any-Longer-V2.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/website-6700615-61c0519b-21836e8c.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>5 Exciting Ways Microsoft 365 Is Enabling The Hybrid Office</title>
      <link>https://www.ev-consultech.com/5-exciting-ways-microsoft-365-is-enabling-the-hybrid-office</link>
      <description>Microsoft 365 is much more than just Excel, Word, PowerPoint, and Outlook. Find out how this powerhouse platform is helping teams evolve in the new hybrid office business world.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h1&gt;&#xD;
    &lt;span&gt;&#xD;
      
           5 Exciting Ways Microsoft 365 Is Enabling The Hybrid Office
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h1&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           “Hybrid office” is a new buzzword you’ll hear being thrown around a lot on LinkedIn. It’s the mix of having employees both working at the office and working from home; which has become more than a buzzword and is now the reality for many companies.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            In February of 2022, there was a survey of employees with remote-capable jobs which found
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.gallup.com/workplace/390632/future-hybrid-work-key-questions-answered-data.aspx" target="_blank"&gt;&#xD;
      
           42% of
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            them were working a hybrid schedule and 39% of them working from home full time.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The global pandemic brought on this hybrid office transition. It forced companies to operate with teams that could no longer safely come to the office. During this time, employers and employees experienced the benefits of hybrid work firsthand.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           These benefits of remote teams included cost-savings for both workers and employers. It also allowed the company to operate with more flexibility and improved worker morale.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Employers were initially hesitant because they feared remote work would cause productivity to tank, but it actually increased in most cases.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Now
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.zippia.com/advice/hybrid-work-statistics/" target="_blank"&gt;&#xD;
      
           63% of
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            high-growth companies use a “productivity anywhere” hybrid work approach.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            In order for hybrid teams to be productive they need to stay connected. No matter where they work, the right technology tools should enable them.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           One of the leaders in this space has been Microsoft. The company plans to add several exciting updates this year. These will provide more tools for companies to enable their hybrid teams.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Here are some of the ways you can use Microsoft 365 to optimize a productive hybrid office. Note, that some of these features are already out, and others are set to release later this year.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           1. Microsoft Teams &amp;amp; Expanded Features
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Microsoft Teams is much more than a team messaging app. The application combines the best features of virtual video meetings and messaging channels. It brings them together into a platform designed to be a secure online work hub.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           MS Teams has come a long way in the last five years. And the company continues to add more features to enable hybrid offices. Some of the recent feature updates include:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             The ability to do webinar registration
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Presenter modes that provide a more professional virtual presence
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Increased security through features like smart links and smart attachments
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            A full business VoIP phone system add-on
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             The addition of a “metaverse” component called Mesh for Teams 
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/maxresdefault.jpg" alt=""/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://www.microsoft.com/en-us/mesh" target="_blank"&gt;&#xD;
      
           Mesh for Microsoft Teams
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           New Meeting Options for RSVP in Outlook
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            One of the challenges, when everyone isn’t working in the same place, is how to know when to
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           “clock in” and “clock out.” As well as how to let colleagues know whether you are working at home next week or the office.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           To help hybrid teams better coordinate, Outlook is getting an update. It will allow users to RSVP to meetings. This can let team members know whether they are attending virtually or in person. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Better Framing for More Engaging Meetings
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            One thing that can distract from the purpose of a meeting is someone’s background at home. Positioning of the camera can also be problematic. One person might have their face taking up 80% of the video screen. Another may only take up 20% because they’re sitting farther away from their PC’s camera.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            A new Surface Hub 2S Smart Camera will allow for better face framing. This will affect when people are meeting virtually in Microsoft Teams. Features include adjusting the room view so people’s faces will be clearer. As well as having more consistent sizing.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The video display will also automatically adjust as people join or leave a physical room.
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/focDwJ5PBYLu3vdDbmEtEg.jpg" alt=""/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           I
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.microsoft.com/en-us/microsoft-365/blog/2022/03/16/3-ways-to-meet-new-hybrid-expectations-with-microsoft-teams-and-microsoft-365/" target="_blank"&gt;&#xD;
      
           mages are from
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;a href="https://www.microsoft.com/en-us/microsoft-365/blog/2022/03/16/3-ways-to-meet-new-hybrid-expectations-with-microsoft-teams-and-microsoft-365/" target="_blank"&gt;&#xD;
      
           Microsoft
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Get Better Control of Your Video Using PowerPoint to Present
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           People often share a screen in a video call and present a PowerPoint presentation. It can be difficult to keep everyone as engaged as when you’re presenting in person.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           For example, in person, you can maintain eye contact. People can clearly see your facial expressions as you emphasize various things. That’s not always the case when presenting virtually. The app may push your video feed into a tiny box.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            There's a new upcoming feature for Teams called Cameo. It will allow you to seamlessly integrate PowerPoint with MS teams. You can decide exactly how you want your video feed to appear in relation to your presentation.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Another addition is Recording Studio. This new feature for PowerPoint allows you to record professional-looking on-demand videos. You can do it right inside the app. 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/side.png" alt=""/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Cameo in PowerPoint &amp;amp; MS Teams
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Get Help With Your Presentation Skills
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Microsoft has poured a lot of AI capabilities into Microsoft 365 over the last several years. One that will soon help you deliver better virtual presentations is
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://techcommunity.microsoft.com/t5/microsoft-365-blog/deliver-content-your-way-with-powerpoint-enhancements-cameo/ba-p/3247071" target="_blank"&gt;&#xD;
      
           Speaker Coach
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           This is a private and personalized coach that can help you hone your presentation skills. This improves your switch to the differences between presenting online versus in person.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Some of the feedback it can provide includes:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Use of repetitive language
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Use of filler words (Ummm)
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Speaking pace
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Pausing for input
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Intonation
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Speaker overlaps
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            And more
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Let EV-Consultech Upgrade Your Hybrid Office Capabilities
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           with Microsoft 365
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           As you can see Microsoft 365 has a ton of helpful features. But it does help to have an expert guide to help you navigate these capabilities. At EV Consultech we are well versed in finding opportunities for your business to utilize there capabilities to improve productivity and help your business grow. Contact us today to set up a chat about how we can help.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/TTT_Blog-Post-Social-Media-Image-5-Exciting-Ways-Microsoft-365-Can-Enable-the-Hybrid-Office-V1.png" length="216057" type="image/png" />
      <pubDate>Mon, 22 Aug 2022 22:36:43 GMT</pubDate>
      <guid>https://www.ev-consultech.com/5-exciting-ways-microsoft-365-is-enabling-the-hybrid-office</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/Picture1-7167c32e.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/TTT_Blog-Post-Social-Media-Image-5-Exciting-Ways-Microsoft-365-Can-Enable-the-Hybrid-Office-V1.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Four New Cloud Storage Trends in 2022</title>
      <link>https://www.ev-consultech.com/four-new-cloud-storage-trends-in-2022</link>
      <description>As advances like automation and AI come to other types of cloud services, cloud storage is not being left behind. The industry continues to evolve, making the process of storing data in the cloud less complex, more reliable and better secured.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h1&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Four New Cloud Storage Trends in 2022
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h1&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           One area of cloud computing that is used widely, but often isn’t as flashy as the software side is cloud storage. Storing files in the cloud to make them easily accessible and shareable from anywhere was one of the very first uses of the cloud that was adopted widely by many users.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           As advances like automation and AI come to other types of cloud services, cloud storage is not being left behind. The industry continues to evolve, making the process of storing data in the cloud less complex, more reliable and better secured.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           It’s estimated that in 2021, 50% of all company data was stored in the cloud. An increase of 15% from just five years earlier. With today’s hybrid teams that may be working from home and be hundreds or thousands of miles away from co-workers, it’s important to centrally locate files in cloud systems that can be accessed by everyone.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           What can you expect to see in the cloud storage market this year? Here are some of the most interesting trends to keep an eye on.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           1. BUILT-IN RANSOMWARE DEFENSES
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Ransomware can impact data no matter where it is stored. Whether on a computer, server or in a cloud storage platform, this malware can encrypt the information and make it unreadable to the business that owns it.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            In 2021, the average ransomware payment increased
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://purplesec.us/resources/cyber-security-statistics/ransomware/" target="_blank"&gt;&#xD;
      
           by 82%
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            and ransomware incidents rose 64% during the first half of the year. A survey of CISOs found that over the last 18 months,
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.darkreading.com/attacks-breaches/why-cloud-storage-isn-t-immune-to-ransomware" target="_blank"&gt;&#xD;
      
           98% of
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            organizations suffered a cloud data breach.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           To combat ransomware, you’ll begin seeing cloud storage services offering ransomware recovery protection. This involves sophisticated systems that can help prevent files from being encrypted by code as well as those that take a copy of files and store it securely away, so files can be restored at the click of a button.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           With ransomware showing no sign of stopping, this is a welcome addition in the cloud storage arena.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           2. “THE EDGE” BECOMES MORE KEY IN CLOUD STORAGE
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           One of the new buzzwords of the last few years has been “Edge” or “Edge computing.” This means bringing data applications and storage resources geographically closer to the user that needs to connect to them.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           As reliance on cloud storage and other cloud applications has increased, so has the need to improve response times from user to server. When data must travel across large distances, it becomes more difficult to quickly and economically deliver the best user experience. Thus, cloud service providers have been moving to an "Edge" computing model.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           What this means for you is better reliability and faster response when accessing or searching on files because your provider is going to work to provide your service from one of the company’s cloud servers that is geographically closer to your location.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           For companies with offices spread out around a country or throughout the world, this means that you’ll want to keep service location in mind when signing up for cloud storage and have a discussion with the provider about distance and if they are utilizing Edge computing.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           3. EXPECT MORE HELP FROM AI AND MACHINE LEARNING
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           AI and machine learning are making just about every area of technology smarter. Microsoft Word and text message apps now predict what you might type to help you fill in the blanks and type faster. Programs like Photoshop can automatically crop around a person in an image within seconds using the power of AI.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            AI is also going to become more prevalent in cloud storage this year. You can expect help with automatic organization of your files based on your cloud storage patterns.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Look for features designed to eliminate manual or repetitive tasks to free up more time. This includes AI helping to automate things like provisioning, obtaining and importing data (known as “ingesting”), managing data retention, and more.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           4. LEGACY VENDORS BEGIN OFFERING MORE CLOUD OPTIONS
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            2022 is going to bring more cloud storage options coming from legacy technology providers. For example, Hewlett-Packard Enterprise recently introduced a new
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.hpe.com/us/en/storage/data-services-cloud-console.html" target="_blank"&gt;&#xD;
      
           Data Services Cloud Console
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            , and Dell Technologies just announced a new
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.dell.com/en-us/blog/a-better-way-to-multi-cloud/" target="_blank"&gt;&#xD;
      
           APEX multi-cloud
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            design that it is working on to improve the cloud ecosystem.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           More cloud storage options mean you may need more help deciding which model will work best for you, as pricing will vary widely. You don’t want to end up with more storage than you need or be paying a lot for a smaller amount of space.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           It pays to keep on top of new offerings and understand that every new cloud storage option might not be a fit for your organization’s specific data storage needs.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           GET HELP OPTIMIZING YOUR CLOUD STORAGE &amp;amp; BACKUP ENVIRONMENT
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Your business data is what runs your company, and it needs to be stored securely and in a way that’s still easily accessible. Find out how EV Consultech can help you optimize your cloud storage to improve cost efficiency.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/Picture1.jpg" length="19152" type="image/jpeg" />
      <pubDate>Fri, 05 Aug 2022 16:25:46 GMT</pubDate>
      <guid>https://www.ev-consultech.com/four-new-cloud-storage-trends-in-2022</guid>
      <g-custom:tags type="string">Productivity,Audit,Utility,Managed IT Services,Compliance,Technology,EV-Consultech,2022,Los Angeles,CMMC</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/Picture1.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/Picture1.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>The Best Ways to Give an Older PC New Life</title>
      <link>https://www.ev-consultech.com/the-best-ways-to-give-an-older-pc-new-life</link>
      <description>Purchasing a new computer is a big investment. Many small businesses and home PC owners end up struggling with older systems because they want to get as many years out of them as possible.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h1&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The Best Ways to Give an Older PC New Life
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h1&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Purchasing a new computer is a big investment. Many small businesses and home PC owners end up struggling with older systems because they want to get as many years out of them as possible.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           There are some promising upgrades you can do that will cost much less than the price of a new computer, while making your PC feel like new again. Not only does this save you money, but it also helps the environment. Reducing our e-waste by reusing what we can has a much more positive impact than recycling.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Here are some options you can try to improve the performance of an older computer:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           UPGRADE TO A SOLID-STATE DRIVE (SSD)
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Prices for solid-state drives have come down quite a bit in the past few years, now making them an affordable upgrade that can breathe life back into an older PC that might be slowing down. Unlike hard disk drives (HDDs), SSDs don't have any moving parts and use flash memory that allows for quicker response times. They also drastically reduce your time to boot and make searching  for files, opening applications, and other activities a breeze.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Some of the
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.enterprisestorageforum.com/hardware/ssd-vs-hdd/" target="_blank"&gt;&#xD;
      
           advantages
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            of upgrading your computer’s hard drive to SSD include:
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            SSD read/write speeds up to 2500 MB/second compared to HDD at up to 200 MB/second
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            SSD access time of 0.1ms as compared to HDD at 5.5-8.0ms
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            SSDs use between 2-5 watts of energy compared to HDD at 6-15 watts
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           INCREASE THE RAM (MEMORY)
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Another low-cost upgrade that nets a significant increase in performance is a memory upgrade. If your PC was a cheaper model it likely only had 4GB or 8GB of RAM when you bought it, you'd likely have trouble opening too many tabs in your browser or having multiple programs open at once. By upgrading your RAM to 12, 16, or 32GB can make it seem like you have an entirely new computer.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           UPGRADE THE GRAPHICS CARD
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If you play computer games or work in any type of video, imaging, or 3D software, an outdated graphics card can ruin your experience.  Instead of replacing your entire computer, just upgrading the graphics card to a more robust model can improve your PC’s performance and give you several more useful years from it.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           CLEAN OUT YOUR PC COOLING SYSTEM
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Heat is an enemy of your computer’s internal parts. As your cooling system gets clogged up with dust or pet hair, excess heat will start building up inside your device. As this happens your computer may start acting strange, with programs crashing or your system rebooting on its own. If you suspect excess heat may be an issue, have your computer’s fan and cooling system checked out to see if it needs cleaning or you can also try cleaning it out yourself.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           CONNECT AN EXTERNAL MONITOR TO A LAPTOP
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            If you’re working on a laptop and having a hard time multi-tasking due to limited screen real estate, consider getting an external monitor rather than replacing your entire PC. Monitors are just a fraction of the cost of computers, and having a screen twice the size of the one on your laptop can make all the difference in the world and improve productivity due to the additional screen space.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           GET AN EXTERNAL HARD DRIVE
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Computers can slow down and be more difficult to use when the drive fills up with data. Over the years, files build up, and many users never take the time to go through and delete those that are unnecessary. Buying an external hard drive can allow you to offload files that may be slowing you down, while still keeping them easily accessible. Another benefit of an external hard drive is that it’s portable and can easily be carried between home and work and used in both places.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           GET A PROFESSIONAL COMPUTER TUNE-UP
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Those free PC cleaner tools you find online aren’t going to give you the type of tune-up that a professional IT provider can give. For our MSP clients we go through things like the Windows Registry, duplicate system files, internal errors, and more to clean up your system and remove all the “junk” that has built up over the years. If our users experience any performance issues we can run diagnostic tests for things like failing parts, and provide expert guidance on your most impactful upgrade options.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           WE CAN HELP IMPROVE YOUR COMPUTER’S PERFORMANCE!
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Don’t struggle with an older PC! At EV-Consultech we can help you with cost-effective upgrade options that will extend the life of your products while only recommending a full replacement when truly necessary.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If you have a small to medium business (SMB) in the Los Angeles area, feel free to reach out using the form below to learn more about how we optimize our clients’ day-to-day business operations and productivity through affordable, flexible and customized IT solutions.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/old+lt.jpg" length="313993" type="image/jpeg" />
      <pubDate>Fri, 10 Jun 2022 19:30:18 GMT</pubDate>
      <guid>https://www.ev-consultech.com/the-best-ways-to-give-an-older-pc-new-life</guid>
      <g-custom:tags type="string">Productivity,Audit,Utility,Managed IT Services,Compliance,Technology,EV-Consultech,2022,Los Angeles,CMMC</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/old+lt.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/old+lt.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Alarming Phishing Attack Trends to Beware of in 2022</title>
      <link>https://www.ev-consultech.com/alarming-phishing-attack-trends-to-beware-of-in-2022</link>
      <description>Phishing remains one of the biggest dangers to your business's health and wellbeing. In 2020, 75% of companies around the world experienced a phishing attack, and mobile phishing threats skyrocketed by 161%.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h1&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Alarming Phishing Attack Trends to Beware of in 2022
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h1&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Phishing remains one of the biggest dangers to your business's health and wellbeing.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            In 2020,
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.tessian.com/blog/phishing-statistics-2020/" target="_blank"&gt;&#xD;
      
           75% of
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            companies around the world experienced a phishing attack, and mobile phishing threats skyrocketed
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.securitymagazine.com/articles/96430-mobile-phishing-threats-surged-161-in-2021" target="_blank"&gt;&#xD;
      
           by 161
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           %
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            .  In the era of web3.0 trojan's and viruses downloaded directly from the internet is far less common. Phishing emails are now the preferred method for hackers and scammers.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Just one phishing email can be responsible for a company succumbing to ransomware and having to face costly downtime. It can also lead to a user to unknowingly hand over their credentials to a company email account that the hacker can then use to send targeted attacks to customers or other vendors.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Phishing takes advantage of human error. They use sophisticated tactics to fool the recipient into divulging information or infecting their network with malware.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Your best safeguards against the continuous onslaught of phishing include:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Email filtering services such as
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;a href="https://www.ev-consultech.com/ironscales" target="_blank"&gt;&#xD;
        
            IRONSCALES
           &#xD;
      &lt;/a&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            DNS filtering
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Next-gen antivirus/anti-malware
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Ongoing employee cybersecurity awareness training and phishing attack simulations
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             also available through
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;a href="https://www.ev-consultech.com/ironscales" target="_blank"&gt;&#xD;
        
            IRONSCALES
           &#xD;
      &lt;/a&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            To properly train your employees and ensure your IT security is being upgraded to meet the newest threats you need to know what new phishing dangers are headed your way and what can be done to avoid these attacks.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           PHISHING IS INCREASINGLY BEING SENT VIA TEXT MESSAGE
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           People seem to be less suspicious of text messages than they are of unexpected email messages. Most phishing training is usually focused on phishing emails because it’s always been the most prevalent channel of attack.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           However, cybercrime entities are now taking advantage of the easy availability of mobile phone numbers and using text messaging to deploy phishing attacks. This type of phishing, called “smishing” (SMS+phishing), has been growing in volume.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           People are receiving more text messages now than they did in the past, due in large part to retailers and services pushing text updates to your phone what seems like every 5 minutes. This makes it even easier for phishing via SMS to fake being a shipment notice and get a user to click on a shortened URL.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           BUSINESS EMAIL COMPROMISE IS ON THE RISE
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Ransomware has been a growing threat over the last few years largely because it’s been a big money-maker for the criminal groups that launch cyberattacks. A new up-and-coming form of attack is beginning to be quite lucrative and is thus growing rapidly.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Business email compromise (BEC) is on the rise and being exploited by attackers to make money off things like gift card scams and fake wire transfer requests.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           What makes BEC so dangerous (and lucrative) is that when a criminal gains access to a business email account, they can send very convincing phishing messages to employees, customers, and vendors of that company.
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            The recipients will immediately trust the familiar email address, making these emails potent weapons for cybercriminals.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           MAJOR TECH YOUTUBER LINUS SEBASTIAN GETS SCAMMED BY A BUSINESS EMAIL COMPROMISE ATTACK:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           SMALL BUSI
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           NESSES ARE BEING TARGETED MORE FREQUENTLY WITH SPEAR PHISHING
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           There is no such thing as being too small to be attacked by a hacker. Small businesses are targeted frequently in cyberattacks because they tend to have less IT security than larger companies.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            43% of all data breaches target small and mid-sized companies, and 40% of small businesses that become victims of an attack experience at least
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://cybersecurity-magazine.com/10-small-business-cyber-security-statistics-that-you-should-know-and-how-to-improve-them/" target="_blank"&gt;&#xD;
      
           eight hours
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            of downtime as a result.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Spear phishing is a more dangerous form of phishing because it’s targeted and not generic. It’s the type deployed in an attack using BEC.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           It used to be that spear-phishing was used for larger companies because it takes more time to set up a targeted and tailored attack. However, as large criminal groups and state-sponsored hackers make their attacks more efficient, they’re able to more easily target anyone.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           As a result small businesses are receiving more tailored phishing attacks that are harder for their users to identify as a scam.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           THE USE OF INITIAL ACCESS BROKERS TO MAKE ATTACKS MORE EFFECTIVE
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           We just discussed the fact that large criminal groups are continually optimizing their attacks to make them more effective
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . They treat cyberattacks like a business and work to make them more profitable all the time.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            One way they are doing this is by using outside specialists called Initial
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Access Brokers. This is a specific type of hacker that only focuses on getting the initial breach into a network or company account. The increasing use of these experts in their field makes phishing attacks even more dangerous and difficult for users to detect.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           BUSINESS IMPERSONATION IS BEING USED MORE OFTEN
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           As users have gotten savvier about being careful of emails from unknown senders, phishing attackers have increasingly used business impersonation. This is where a phishing email will come in looking like a legitimate email from a company that the user may know or even do business with.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Amazon is a common target of business impersonation, but it also happens with smaller companies as well. For example, there have been instances where website hosting companies have had client lists breached and those companies sent emails impersonating the hosting company and asking the users to log in to an account to fix an urgent problem.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           More business impersonation being used in phishing attacks mean users have to be suspicious of all emails, not just those from unknown senders.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           IS YOUR COMPANY ADEQUATELY PROTECTED FROM PHISHING ATTACKS?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            It’s important to use a multi-layered strategy when it comes to defending against one of the biggest dangers to your business's wellbeing.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Give us a call at 626-405-8987 or fill out the form below to get started with a cybersecurity audit to review your current security posture and identify ways to improve.
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/hacking-6694207.png" length="26091" type="image/png" />
      <pubDate>Fri, 13 May 2022 21:12:24 GMT</pubDate>
      <guid>https://www.ev-consultech.com/alarming-phishing-attack-trends-to-beware-of-in-2022</guid>
      <g-custom:tags type="string">Productivity,Audit,Utility,Managed IT Services,Compliance,Technology,EV-Consultech,2022,Los Angeles,CMMC</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/TTT_Blog-Post-Social-Media-Image-Alarming-Phishing-Attack-Trends-to-Beware-V1.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/hacking-6694207.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>5 Things You Should Never Do on a Work Computer</title>
      <link>https://www.ev-consultech.com/5-things-you-should-never-do-on-a-work-computer</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h1&gt;&#xD;
    &lt;span&gt;&#xD;
      
           5 Things You Should Never Do on a Work Computer
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h1&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Whether you work remotely or in an office, the line between personal and work tasks can become blurred when working on your company computer.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            At first, you may just be checking a few personal emails while on a lunch break. But as the line continues to get crossed, you'll start to think of your work computer as a personal device; checking Facebook, taking BuzzFeed quizzes, and maybe even looking at a few sketchy websites. In a survey of over 900 employees, it was found that
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://blog.malwarebytes.com/malwarebytes-news/2020/10/work-devices-for-personal-use/" target="_blank"&gt;&#xD;
      
           only 30%
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            said they never used their work PC for personal activities. The other 70% admitted to using their work computer for various personal reasons.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           It’s a bad idea to mix work and personal, no matter how much more convenient it is to use your work PC for a personal task during the day. You can end up getting reprimanded, causing a data breach at your company, or possibly losing your job.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Here are several things you should never do on your work PC:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           1. SAVE YOUR PERSONAL PASSWORDS IN THE BROWSER
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Many people manage their passwords by allowing their browser to save and then auto-fill them. This can be convenient, but it’s not very secure should you lose access to that PC.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            When the computer you use isn’t yours, it can be taken away at any time for a number of reasons, such as an upgrade, repair, or god-forbid, an unexpected termination.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If someone else accesses your old work device and you never signed out of the browser, they can use your saved passwords to access emails, banking info, and more.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Also know that some companies will donate old PCs to worthy causes, which could leave your passwords in the hands of a stranger if the PC wasn't properly wiped.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           2. STORE PERSONAL DATA
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           It’s easy to get in the habit of storing personal data on your work computer, especially if your home PC doesn’t have a lot of storage space. But this bad habit leaves you wide open to a couple of major problems:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Loss of your files:
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             If you lose access to the PC for any reason, your files can be lost forever
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Your personal files being company-accessible:
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Many companies have backups of employee devices to protect against data loss. So, those beach photos stored on your work PC that you’d rather not have anyone else see could be accessible company-wide if they are captured in a backup process or stored on a company server.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           3. VISIT SKETCHY WEBSITES
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           You should assume that any activity you are doing on a work device is being monitored and is accessible by your boss. Companies often have cybersecurity measures in place like DNS filtering that is designed to protect against phishing websites. This same type of software can also send an alert should an employee visit a sketchy website deemed dangerous to security (which many sketchy websites are).
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           You should never visit any website on your work computer that you wouldn’t be comfortable visiting with your boss looking over your shoulder.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           4. ALLOW FRIENDS OR FAMILY TO USE IT
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           When you work remotely and your work computer is a permanent fixture in your home, it can be tempting to allow a friend or family member to use it if asked. Often, work PCs are more powerful than a typical home computer and may even have company-supplied software that someone wouldn’t purchase on their own.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           But allowing anyone else to use your work computer could constitute a compliance breach of data protection regulations that your company needs to adhere to. Just the fact that the personal data of your customers or other employees could be accessed by someone not authorized to do so, can mean a stiff penalty.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Additionally, a child or friend not well-versed in cybersecurity could end up visiting a phishing site and infecting your work device, which in turn infects other company devices compromising multiple accounts, leaving you responsible for a major breach.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            At least
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://blog.malwarebytes.com/reports/2020/08/20-percent-of-organizations-experienced-breach-due-to-remote-worker-labs-report-reveals/" target="_blank"&gt;&#xD;
      
           20% of
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            companies have experienced a data breach during the pandemic due to a remote worker.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           5. TURN OFF COMPANY-INSTALLED APPS LIKE BACKUPS AND ANTIVIRUS
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If you’re trying to get work done and a backup kicks in and slows your PC down to a crawl, it can be tempting to turn off the backup process. But this can leave the data on your computer unprotected and unrecoverable in the case of a hard drive crash or ransomware infection.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Company-installed apps are there for a reason and it’s usually cybersecurity and business continuity.
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            These should not be turned off unless given express permission by your supervisor or company’s IT team
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/john-schnobrich-FlPc9_VocJ4-unsplash.jpg" length="151220" type="image/jpeg" />
      <pubDate>Fri, 29 Apr 2022 21:07:06 GMT</pubDate>
      <guid>https://www.ev-consultech.com/5-things-you-should-never-do-on-a-work-computer</guid>
      <g-custom:tags type="string">Productivity,Utility,Managed IT Services,Technology,EV-Consultech,2022,Los Angeles</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/john-schnobrich-FlPc9_VocJ4-unsplash.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/john-schnobrich-FlPc9_VocJ4-unsplash.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Does Your Company Need to Be CMMC Compliant?</title>
      <link>https://www.ev-consultech.com/does-your-company-need-to-be-cmmc-compliant</link>
      <description>The Cybersecurity Maturity Model Certification (CMMC) is a new cybersecurity framework developed by the US Department of Defense (DoD). The goal of the new CMMC requirements is to protect Controlled Unclassified Information (CUI) and Federal Contract Information (FCI).</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h1&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Does Your Company Need to Be CMMC Compliant?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h1&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           What Is CMMC? 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            The Cybersecurity Maturity Model Certification
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.acq.osd.mil/cmmc/" target="_blank"&gt;&#xD;
      
           (CMMC)
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            is a new cybersecurity framework developed by th
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            e
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.defense.gov/" target="_blank"&gt;&#xD;
      
           US Department of Defense
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.defense.gov/" target="_blank"&gt;&#xD;
      
           (DoD)
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            . The goal of the new CMMC requirements is to protect Controlled Unclassified Information
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           (
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.esd.whs.mil/Portals/54/Documents/DD/issuances/dodi/520048p.PDF" target="_blank"&gt;&#xD;
      
           CUI
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            )
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            and
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.acquisition.gov/far/52.204-21-0" target="_blank"&gt;&#xD;
      
           Federal Contract Information
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.acquisition.gov/far/52.204-21-0" target="_blank"&gt;&#xD;
      
           (FCI)
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .  
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Who Needs To Be CMMC Compliant? 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Any company and its subcontractors that bid on
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            a
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.defense.gov/" target="_blank"&gt;&#xD;
      
           US Department of Defense (DoD)
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            contract that contains Federal Contract Information (
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.acquisition.gov/far/52.204-21-0" target="_blank"&gt;&#xD;
      
           FCI
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           ) and/or Controlled Unclassified Information (
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.esd.whs.mil/Portals/54/Documents/DD/issuances/dodi/520048p.PDF" target="_blank"&gt;&#xD;
      
           CUI
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           ) w
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ill be required to be CMMC compliant. Only contracts for
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://csrc.nist.gov/glossary/term/commercial_off_the_shelf" target="_blank"&gt;&#xD;
      
           Commercial off-the-shelf (COTS)
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            products will be exempt from CMMC compliance requirements. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/cmmc-73c3bf1a.png" alt="Impossibly Thin Laptop Craob X with Media and Charging Hub Attached"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           When Will This Be Required? 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Due to the significant changes in the
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.acq.osd.mil/cmmc/about-us.html" target="_blank"&gt;&#xD;
      
           latest CMMC 2.0 iteration
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            the DoD suspended any CMMC requirements for new contracts until the rulemaking process for CMMC 2.0 has been completed. The process is expected to take anywhere from
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.acq.osd.mil/cmmc/faq.html" target="_blank"&gt;&#xD;
      
           9 to 24 months
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            . Although the CMMC compliance requirements are still several months away, we highly recommend that companies who plan to bid on DoD contracts start preparations for their CMMC assessment now. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Early adopters of CMMC will have a clear competitive advantage over their rivals; especially considering that implementation will take several months, and
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.acquisition.gov/dfars/252.204-7021-cybersecurity-maturity-model-certification-requirements." target="_blank"&gt;&#xD;
      
           compliance is required at the time of contract award
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . The sooner your organization meets CMMC compliance requirements, the less competition it will face when bidding on new DoD contracts that require CMMC. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           We Do Not Conduct The Final CMMC Assessments
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Depending on your organization’s current cybersecurity status and the CMMC Level required, implementation of the new standard can take anywhere from several weeks to a few months. Starting now will save you valuable time and will get you ahead of the competition. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Our audit will help your organization to close existing gaps by implementing suitable controls and addressing any missing requirements including developing and writing the extensive documentation required. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           CMMC Pre-Assessment 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           We will help you prepare for the final CMMC Audit by gathering and organizing evidence for a smooth assessment. Think of it as a mock audit. We will verify that proper security measures are in place, mature, and can be proven to an auditor. If we find issues we will help you fix them and will be at your side throughout the process. We will not recommend the final CMMC Audit until we are confident that your organization is ready. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           From Founder and CEO, Eduardo Velandia: 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            “After one long week with
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.linkedin.com/company/edwards-project-solutions/" target="_blank"&gt;&#xD;
      
           Edwards Performance Solutions
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            , I can say that I'm much more comfortable and confident with my understanding of
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.linkedin.com/feed/hashtag/?keywords=cmmc&amp;amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A6910671352463040512" target="_blank"&gt;&#xD;
      
           #cmmc
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            .
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.linkedin.com/in/ACoAAAETX_wBuSfdgCp29LdqwyAtEPXY93Fmz6M" target="_blank"&gt;&#xD;
      
           Joy
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.linkedin.com/in/ACoAAAETX_wBuSfdgCp29LdqwyAtEPXY93Fmz6M" target="_blank"&gt;&#xD;
      
           Belinda Beland
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;a href="https://www.linkedin.com/in/ACoAAAETX_wBuSfdgCp29LdqwyAtEPXY93Fmz6M" target="_blank"&gt;&#xD;
      
           ,
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.linkedin.com/in/ACoAACJ2n-YBwwWbSBu_FLXZAE-5NAPbCgaLbYE" target="_blank"&gt;&#xD;
      
           Amira
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.linkedin.com/in/ACoAACJ2n-YBwwWbSBu_FLXZAE-5NAPbCgaLbYE" target="_blank"&gt;&#xD;
      
           Armond
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ,
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.linkedin.com/in/ACoAAAzmAVgBYd01VrRqPL7lSvIsqxLCtgRX4Pw" target="_blank"&gt;&#xD;
      
           Matt Hoeper
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;a href="https://www.linkedin.com/in/ACoAAAzmAVgBYd01VrRqPL7lSvIsqxLCtgRX4Pw" target="_blank"&gt;&#xD;
      
           ,
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.linkedin.com/in/ACoAAABN0qMBRnBwgBC1OND8b6xd8xnMeHUHvhI" target="_blank"&gt;&#xD;
      
           Chris Silvers,
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            and
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.linkedin.com/in/ACoAAACT5l0B_3OJqLmrDs_UIIbaSnnyJS_tlds" target="_blank"&gt;&#xD;
      
           Tony Buenger
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            were all fantastic instructors and took extra care in explaining the more difficult areas. I am extremely glad to have taken this class and highly recommend it to anyone else interested in obtaining their
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.linkedin.com/feed/hashtag/?keywords=ccp&amp;amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A6910671352463040512" target="_blank"&gt;&#xD;
      
           #CCP
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           ! 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            I wanted to specially thank
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.linkedin.com/in/ACoAAAETX_wBuSfdgCp29LdqwyAtEPXY93Fmz6M" target="_blank"&gt;&#xD;
      
           Joy Belinda Beland
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           , for encouraging me to take this training. I've known Joy for quite sometime and she has always provided great advice to me about how to improve my MSP practice. I look forward to the weekly study group and to keep the synergy going with this wonderful group of IT professionals.” 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/156765156_10158094649315784_7368003757861728568_n-506ec716.jpg" alt=""/&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-2058147.jpeg" length="277382" type="image/jpeg" />
      <pubDate>Tue, 05 Apr 2022 20:13:18 GMT</pubDate>
      <guid>https://www.ev-consultech.com/does-your-company-need-to-be-cmmc-compliant</guid>
      <g-custom:tags type="string">Productivity,Audit,Utility,Managed IT Services,Compliance,Technology,EV-Consultech,2022,Los Angeles,CMMC</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/cmmc.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-2058147.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>War in Ukraine to Exacerbate Microchip Shortage</title>
      <link>https://www.ev-consultech.com/war-in-ukraine-to-exacerbate-microchip-shortage</link>
      <description>Before Putin invaded Ukraine on February 24, 2022, a single Ukrainian company was responsible for refining more than 90% of the neon used in the production of US semiconductors.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h1&gt;&#xD;
    &lt;span&gt;&#xD;
      
           War in Ukraine to Exacerbate Microchip Shortage
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h1&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Before Putin invaded Ukraine on February 24, 2022, a single Ukrainian company was responsible for refining more than 90% of the neon used in the production of US semiconductors.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           A critical part of manufacturing these chips requires a process called plasma etching that uses a  mixture of about eight parts neon to one part CHF3 (Freon 23) to create a beam of plasma used to remove material from the surface if the microchip wafers. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/pexels-photo-3855962-1a78965b.jpeg" alt="Impossibly Thin Laptop Craob X with Media and Charging Hub Attached"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Last time Russia invaded Ukraine in 2014, the price of neon shot up 600%.
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Last week, US and Japanese governments were scrambling to make sure that will not happen again, pressuring their chip industries to find alternative sources of this obscure gas before it’s too late. Making matters worse Russia provides over 30% of the global palladium supply. Palladium is a rare platinum group metal also used in semiconducters and electronics. Not only that but palladium is also needed in other important industries used in catalytic converters, mobile phones and even dental fillings. Ukraine and Russia also lead the world in production of metals like nickel, copper, platinum, and iron. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Globalization has made it easier than ever for countries to trade with one another allowing them to specialize in specific industries tailored to their resources and skills to maximize efficiency and then trade excess production for other goods. International trade is fantastic for the global economy but in times of war when trade breaks down it can leave certain industries and countries vulnerable. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Currently, chip makers have only 2 to 4 weeks of reserve supply of these materials, however prolonged supply disruption could severely impact production of semiconductors and everything else that depends on them such as cars, phones, computers, and more.  
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/pexels-photo-2582935-f75571ef.jpeg" length="3729221" type="image/png" />
      <pubDate>Tue, 15 Mar 2022 20:33:52 GMT</pubDate>
      <guid>https://www.ev-consultech.com/war-in-ukraine-to-exacerbate-microchip-shortage</guid>
      <g-custom:tags type="string">Productivity,Laptop,EV-Consultech,2022,Resolutions,Utility,Managed IT Services,PC,Technology,Microsoft,Los Angeles,Windows 11,Windows 10</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/pexels-photo-2582935-f75571ef.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/pexels-photo-2582935-f75571ef.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>The Impossibly Thin Laptop by Mysterious Company: Craob</title>
      <link>https://www.ev-consultech.com/impossibly-thin-laptop-by-mysterious-company-craob</link>
      <description>Super thin and portless, the laptop uses a magnetic hub that attaches to the back of the laptop to facilitate charging and data transfer.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h1&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            The Impossibly Thin Laptop by
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/h1&gt;&#xD;
  &lt;h1&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Mysterious Company: Craob
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h1&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Super thin and portless, the laptop uses a magnetic hub that attaches to the back of the laptop to facilitate charg
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           ing
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           and data transfer. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/craob+x+hub.jpg" alt="Impossibly Thin Laptop Craob X with Media and Charging Hub Attached"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://craob.com/" target="_blank"&gt;&#xD;
      
           Craob's website
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           claims that the laptop will weigh 1.9 pounds and be just 7mm thin. Thinner than most smartphones.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Despite how thin the laptop is, Craob is claiming top tier specifications: 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            12th Generation Intel Core i7-1280P Processor with Intel Iris Xe Graphics 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            13.3-inch 4k UHD+ Display 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Up to 32GB RAM LPDDR5 RAM 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Up to 2TB PCIe 4.0 x4 SSD 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Intel WiFi  6E 
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           At this point the laptop appears to be more of a concept rather than a finished product.
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            The specifications given are just too powerful to not overheat in a chassis like this unless the CPU is downclocked significantly. Also, the photos on their website appear to just be renders, and thanks to
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://bigtechquestion.com/2022/02/05/laptops/who-are-craob/" target="_blank"&gt;&#xD;
      
           some sleuthing by David Artis
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           s
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           , we know their website was built very cheaply using a Wordpress template with a domain hosted by Godaddy. Additionally, "In the site’s footer, it makes mention of the company “Craob Inc”. The “Inc” suggests a US company but I cannot find any US company registered under this name (for the US you have to search by state; I did this so you don’t have to!)
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Indeed, looking at the models on the site, they are Caucasian, consistent with a US company
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            The plug on the mains cable is US standard
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            The laptop is showing a US keyboard
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Assuming they are based in the US, 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.uspto.gov/" target="_blank"&gt;&#xD;
      
           there are no patents
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            under their name"
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           We hope in the near future a product like this may actually come to market, but for now it just seems too good to be true.
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/croab-x.jpg" length="885778" type="image/png" />
      <pubDate>Mon, 28 Feb 2022 22:44:41 GMT</pubDate>
      <guid>https://www.ev-consultech.com/impossibly-thin-laptop-by-mysterious-company-craob</guid>
      <g-custom:tags type="string">Productivity,Laptop,EV-Consultech,2022,Resolutions,Utility,Managed IT Services,PC,Technology,Microsoft,Los Angeles,Windows 11,Windows 10</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/croab-x.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/croab-x.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>The Tech Behind Amazon Go</title>
      <link>https://www.ev-consultech.com/the-tech-behind-amazon-go</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Amazon is bringing its cashier-less Amazon Go stores to the suburbs.
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           First unveiled in 2018, unlike most shops, there are no registers or cashiers. You walk in, pick out what you want, and walk out. Amazon calls it a “Just Walk Out” shopping experience. The stores focus on everyday goods, basic groceries, ready-to-eat food, alcohol, drinks, and snacks. Essentially making them an even more convenient convenience store. These new more suburban locations are coming at a time when many employees are now choosing to work from home spending less time in city centers and more time at home in the suburbs. adding to the pool of potential customers for the new locations. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Amazon Go locations are equipped with a mindboggling amount of tech.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Using their Amazon Go app, customers scan their phones at the entrance allowing Amazon’s artificial intelligence system to identify each user. Then, using cameras littered throughout the store in combination with computer vision technology and additional hidden sensors, Amazon's AI is able to track exactly where you are in the store, what items you pick up, and what items you may put back. Once you're done shopping you can just walk right out of the front door. After leaving the store, Amazon will automatically charge your card on file only for the items you took. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If Amazon does charge you for something you didn't take,
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            then you can just go into the app swipe left on the item to remove it from your receipt and Amazon will automatically process a refund with no questions asked.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           With their pilot locations open for 4 years now Amazon is confident in the technology; hence their plan to start expanding to new locations in Mill Creek, Washington and Los Angeles with more to come. 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/Amazon_Go_in_Seattle-_December_2016-e10204a8.jpg" length="3017013" type="image/png" />
      <pubDate>Tue, 01 Feb 2022 18:47:24 GMT</pubDate>
      <guid>https://www.ev-consultech.com/the-tech-behind-amazon-go</guid>
      <g-custom:tags type="string">Productivity,Laptop,OS,EV-Consultech,2022,Officespace,Pasadena,Resolutions,IT Managed Services,Utility,Managed IT Services,PC,Desktop,Technology,Collaboration,Operating System,Microsoft,Los Angeles,Home Office,Windows 11,IT Services,Windows 10</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/amazon_go.0.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/Amazon_Go_in_Seattle-_December_2016-e10204a8.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Simple Cybersecurity Resolutions for 2022</title>
      <link>https://www.ev-consultech.com/simple-cybersecurity-resolutions-for-the-new-year</link>
      <description>3 simple cybersecurity resolutions for the new year</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Say "yes" to updates
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Installing updates is one of the best ways to be more cybersecure. Updates often include security patches and optimizations that make your device feel more snappy, so next time an app offers you an update, click “yes” instead of “no”, “cancel” or “remind me later”. 
            &#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Say "no" to weak passwords
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Strong passwords keep your data safe, so don't let yourself choose feeble passwords in 2022, and if somebody shares a password with you, or asks for yours, just say "no.” Read the 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.cisa.gov/sites/default/files/publications/Cybersecurity%20Awareness%20Month%202021%20-%20Creating%20Passwords%20Tip%20Sheet.pdf" target="_blank"&gt;&#xD;
      
           Creating a Password Tip Sheet
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            from the CISA for more information about secure passwords.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Say "woah" to unexpected messages
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Scams come in all shapes and sizes, but no matter how they’re dressed up, they always want something valuable, URGENTLY. So don’t be rushed—take your time in 2022. Cyber criminals use phishing tactics, hoping to fool their victims. If you’re unsure who an email is from—even if the details appear accurate— or if the email looks ‘phishy,’ do not respond and do not click on any links or attachments found in that email. When available use the “report phish” or “report” option to help your organization or email provider block other suspicious emails before they arrive in your inbox. Read the 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.cisa.gov/sites/default/files/publications/Cybersecurity%20Awareness%20Month%202021%20-%20Phishing%20Tip%20Sheet.pdf" target="_blank"&gt;&#xD;
      
           Phishing Tip
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.cisa.gov/sites/default/files/publications/Cybersecurity%20Awareness%20Month%202021%20-%20Phishing%20Tip%20Sheet.pdf" target="_blank"&gt;&#xD;
      
           Sheet
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            from the CISA for more information.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Follow the trials and tribulations of Tim as a seemingly innocent piece of digital information threatens to ruin his life when it falls into the wrong hands.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-769525.jpeg" length="615622" type="image/jpeg" />
      <pubDate>Tue, 18 Jan 2022 21:11:11 GMT</pubDate>
      <guid>https://www.ev-consultech.com/simple-cybersecurity-resolutions-for-the-new-year</guid>
      <g-custom:tags type="string">Productivity,Laptop,OS,EV-Consultech,2022,Officespace,Pasadena,Resolutions,IT Managed Services,Utility,Managed IT Services,PC,Desktop,Technology,Collaboration,Operating System,Microsoft,Los Angeles,Home Office,Windows 11,IT Services,Windows 10</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-769525.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-769525.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>The Office is Dying</title>
      <link>https://www.ev-consultech.com/the-office-is-dying</link>
      <description>Why many employees may refuse to return to the office even after the pandemic is over.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Office Spaces: Then and Now
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The first dedicated office building was created all the way back in 1726. The building was made to handle the abundance of British Royal Navy paperwork and provide a meeting space for collaboration between employees. Since then, the concept has become so widespread; towering skyscrapers now dominate the skyline of major cities across the world. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Due to the initial COVID lockdowns, employees had to work from home, forcing companies to quickly adapt to changing needs, sparking major changes that were developed and deployed within weeks rather than months or even years. Almost overnight cloud services, video conferencing, and remote computer access became essential for a company to stay afloat and keep their employees connected. No one knew when we would be able to go back to the office again. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Now over a year and a half since the lockdowns, many employees have grown accustomed to working from home, with some outright refusing to work for a company that cannot accommodate their new lifestyle. Critics of the work from home model insist that it hinders collaboration and employees will be more tempted to slack off at home than in the office. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Do We Even Need Offices? 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If you've returned to a physical office since the pandemic you’ll notice your fellow coworkers hunched over their computers bouncing back and forth from one Zoom meeting to another rather than mingling and discussing new ideas in person. The office you remember as being not so bad has likely become a much more frustrating place and on top of that the commute that wasn't so bad when it was a daily occurrence has now become frustratingly endless. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The effect that working from home has on collaboration has not been extensively studied, but with tools like Microsoft Teams and Slack remote workers can often collaborate as effectively or more so than in person. As for productivity dropping at home, this has been disproven, with most studies claiming they saw a jump in productivity from workers transitioning to a hybrid or completely remote work model. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            While we've had effective remote working technologies for years before COVID, the balance of power in a working situation naturally resides with the majority. When the majority of workers were in the same office, remote workers missed key interactions and may have been less effective than their in-office counterparts. However, with the majority of workers now remote, anyone who returns to the office will likely still be operating under remote working rules. Meetings are now held on Zoom, work progress must be tracked through an app, etc.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Will the Office Return?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Some leaders foresaw this shift in power, and started advocating a "return to the office" early in the pandemic, under the assumption that remote work would be a temporary and subpar "Band Aid" until office work was feasible once again.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           To attract employees back some companies are attempting to make their offices a "destination",  offering benefits like an employee gym, updated décor and complimentary meals and snacks. These are certainly nice things to have, but is someone really going to travel 45 minutes for a workout and lunch?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           For many organizations, real estate is considered a "crown jewel," showcasing their importance in a very physical way. However, dedicated physical space seems to be a far less valuable asset than it once was. As you consider your company's future, come to conversations armed with data about how, when and where your employees are working. Tech leaders will help guide and shape many of these conversations and drive the next innovations of where and how we work and collaborate. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            If you would like to know more about how
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           EV-Consultech can help your company work more efficiently online, please fill out the form below:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-323705.jpeg" length="229347" type="image/jpeg" />
      <pubDate>Mon, 03 Jan 2022 20:25:32 GMT</pubDate>
      <guid>https://www.ev-consultech.com/the-office-is-dying</guid>
      <g-custom:tags type="string">Productivity,Laptop,OS,EV-Consultech,2021,Officespace,Pasadena,IT Managed Services,Utility,Managed IT Services,PC,Desktop,Technology,Collaboration,Operating System,Microsoft,Los Angeles,Home Office,Windows 11,IT Services,Windows 10</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-323705.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-323705.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Tips to Save Time in Windows</title>
      <link>https://www.ev-consultech.com/tips-to-save-time-in-windows</link>
      <description>To help you save a considerable amount of time and increase your productivity we made this list of some very useful but underutilized tips and tricks.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           On Average Americans spend 4 hours and 7 minutes per day on a computer or laptop. That adds up to over 1,500 hours per year. To help you save a considerable amount of time and increase your productivity we made this list of some very useful but underutilized tips and tricks.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Shortcuts
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            - Savvy Windows users probably know the basic windows shortcuts such as ctrl+x/c/v for cut, copy and paste and ctrl+p for print, but as you can imagine there are plenty more. Pressing WIN+PRTSC puts a screenshot in your screenshots folder, WIN+E opens explorer, WIN+I opens settings, WIN+TAB opens taskview and CTRL+SHIFT+ESC opens Task Manager. There are plenty more where that came from. If you're curious
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://support.microsoft.com/en-us/windows/keyboard-shortcuts-in-windows-dcc61a57-8ff0-cffe-9796-cb9706c75eec" target="_blank"&gt;&#xD;
      
           click this link
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            for a full list of keyboard shortcuts in Windows 11, 10 and 7.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Multiple Desktops
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           – This is a feature that power users can’t live without. Multiple virtual desktops allows users to instantly switch between different workflows such as photo editing, responding to emails, or writing a blog; each of which may require multiple windows open at a time, making it very time consuming to minimize and open these windows when you want to switch tasks.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Pinned Apps
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           – Far too many users never utilize this simple time-saving feature. By right clicking on an application icon and selecting “Pin to taskbar” that application icon will always show up on your taskbar making it easy to launch your most frequently used applications with one click and if there are any unused apps on your taskbar can right click on them and select “Unpin from taskbar” to help cleanup your desktop.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Windows Search
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           – Another underutilized tool built right into Windows. To use it simply click on the Windows Button and begin typing. Whatever you type on the keyboard will be searched for on the computer. If nothing matching your search is found locally on the computer then it will give you the option to search the internet instead. This feature is very useful for finding apps or settings that you don't commonly use or may not know the location of.
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Customization
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            – A great way to make Windows more functional and un
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           ique is by going to Windows Settings, then click on Personalization. From here you have a ton of customization options allowing you to change your desktop background, choose a light or dark theme for Windows, choose an accent color, and customize the taskbar. You can change the size and color or your mouse pointer by going to Settings&amp;gt;Ease of Access&amp;gt;Mouse Pointer. You can also customize Windows notification noises by going to Sound Control Panel&amp;gt;Sounds. If you want even more customization Rainmeter is a popular third party application that allows its users to further customize the look of their computer in ways they never thought possible.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-51415.jpeg" length="266117" type="image/jpeg" />
      <pubDate>Fri, 03 Dec 2021 18:41:37 GMT</pubDate>
      <guid>https://www.ev-consultech.com/tips-to-save-time-in-windows</guid>
      <g-custom:tags type="string">Productivity,Laptop,Microsoft Teams,OS,EV-Consultech,2021,Pasadena,Tricks,IT Managed Services,Utility,Managed IT Services,PC,Desktop,Technology,Collaboration,Operating System,Microsoft,Los Angeles,Windows 11,IT Services,Windows 10,Tips</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-51415.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-51415.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Framework - The Environmentally Friendly and Modular Laptop</title>
      <link>https://www.ev-consultech.com/framework-laptop</link>
      <description>Framework is paving the way to a greener future with modular, upgradable laptops.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Framework is paving the way to a greener future with modular, upgradable laptops.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In the pursuit of making our phones and laptops as thin as possible, engineers have had to come up with some ridiculous ways to shave millimeters of thickness off of these devices year over year. The ability to easily replace parts...gone. Upgradability? NOPE! Some laptops don’t even come with normal USB ports, ethernet, or HDMI. Manufacturers make these sacrifices to develop an extremely thin and light device, that users end up paying for later on when they have to chuck out the whole laptop when the screen breaks or the mousepad stops
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            working.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The last MacBook with an easily replaceable battery came out back in 2013. Since then Apple and even companies like Microsoft have made their devices borderline impossible to fix or upgrade while telling consumers that these sacrifices have been made in their best interest. In reality the fact that most devices can't easily be repaired only serves to fatten the pocketbooks of the companies that manufacture them.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Founded in January 2020, Framework set out to fix a broken industry
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            and help save the environment by manufacturing modular, repairable, laptops without making sacrifices in build quality. We’ve all had the experience of a busted screen, button, or connector that can’t be fixed, battery life degrading, storage running out quicker than expected. Instead of having to throw out your device or purchase an expensive adapter, Framework wants to make every repair and upgrade possible for someone who had never been inside a computer before. They provide clear labelling of parts with scannable QR codes that link to clear instructions. Framework focuses on simplifying common repairs and upgrades such as battery replacement and storage upgrades. Their laptop avoids glue and tape, minimizes the number of unique fasteners, and even includes a few spare screws in the case for when one inevitably disappears. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/framework-inside.jpg" alt=""/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The Framework laptop was developed out of frustration with the current status quo
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            of disposable devices and the impact it is having on our environment and future. Every year our planet creates 50 million tons of e-waste comprised of old laptops, phones, and broken adapters. According to Nirav Patel, "The single best way to reduce the environmental impact of electronics is to make them last longer. In addition to enabling longevity, we’re focused on improving sustainability across the life of our products. The Framework Laptop is made of 50% post consumer recycled (PCR) aluminum and an average of 30% PCR plastic. Our packaging is fully recyclable with no single-use plastics, and all of our product shipments are carbon
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           offset."
           &#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Framework is more than just a concept;
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            the company is currently taking orders and actually shipping laptops. The price for one is very competitive compared to other laptops with similar specifications.  We truly hope that this company continues to thrive as it made a big initial splash, even attracting popular tech Youtuber Linus Sebastian who believed in the concept enough to invest $225,000 of his own money into Framework.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Major manufacturers have been telling us for years that consumers can't have their cake and eat it too. In reality Framework has built a modular, upgradable laptop, that proves consumers don't need to sacrifice build quality in order to have an environmentally friendly, upgradable, and modular laptop.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If you want to learn more about the Framework Laptop we suggest watching the Linus Tech Tips review that was produced and posted before the founder's investment in Framework:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/framework+laptop.jpg" length="437833" type="image/jpeg" />
      <pubDate>Fri, 19 Nov 2021 22:47:26 GMT</pubDate>
      <guid>https://www.ev-consultech.com/framework-laptop</guid>
      <g-custom:tags type="string">Productivity,Laptop,OS,EV-Consultech,2021,Pasadena,IT Managed Services,Managed IT Services,PC,Technology,Operating System,Microsoft,Los Angeles,Mac OS,Windows 11,IT Services,Framework,Windows 10</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/framework+laptop.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/framework+laptop.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Increase Your Productivity with Microsoft Teams</title>
      <link>https://www.ev-consultech.com/increase-your-productivity-with-microsoft-teams</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Microsoft Teams currently has over 145 million daily users
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           , meaning there is a high likelihood you’re using it personally or for work. Most businesses use Teams for video calls and to create group chats, but many fail to utilize the wealth of advanced features available that help increase productivity and organization. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Greater Utility with Apps 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           One of the lesser-known but most powerful additions to Microsoft Teams is the ability to add apps to chats and channels as a shared tab that everyone can view. This allows users to share and interact with content directly from within Teams. Apps include Outlook, OneNote, SharePoint, Trello, Monday.com, Adobe CC, and more. Some simple, but especially useful apps we found were a To-do List/Task Planner that can be used to quickly assign tasks to team members much like Slack or Monday.com, a Calendar that integrates with Outlook so everyone can see who is available or busy at any given day or time, and a Forms app that allows users to create customized polls quickly and easily. Instead of having to hold a meeting just to gauge people’s opinions, use a poll instead! 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Minimize Distractions
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Using the built in Calendar app, Microsoft Teams allows users to block off sections of time for themselves to focus on specific tasks without distractions. For example if a new employee has some questions about work, they can check the shared calendar first to see if any senior level employees are available to answer their questions without having to risk interrupting some important work or a private meeting. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Email Forwarding to a Channel 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Many of us find ourselves checking our emails less and less. With email forwarding to a channel, Microsoft has made it easier for you and your teams to stay up to date. The feature does exactly what the name says; you can enable email forwarding to a channel by clicking on the ellipsis next to the desired channel name, then click on "get email address", a new email address will be created for the channel. Anything mailed to this address will automatically show up in the channel making it especially easy for teams to keep track of shared mailboxes. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Urgent Chat Notifications 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Be warned, use this feature sparingly! It is the digital equivalent of banging loudly on an office door! To send an Urgent Message, look below the text compose box for the outline of an exclamation point! Click on it and you can mark your message as Important or Urgent. Mark a message as urgent and once you hit send the recipient will receive a notification every two minutes for 20 minutes or until they check the message. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/pexels-photo-3194519-e509e8d7.jpeg" length="657595" type="image/png" />
      <pubDate>Fri, 12 Nov 2021 23:13:36 GMT</pubDate>
      <guid>https://www.ev-consultech.com/increase-your-productivity-with-microsoft-teams</guid>
      <g-custom:tags type="string">Productivity,Laptop,Microsoft Teams,OS,AI,EV-Consultech,2021,Pasadena,Tricks,IT Managed Services,Utility,Managed IT Services,PC,Desktop,Technology,Collaboration,Operating System,Microsoft,Los Angeles,Mac OS,Windows 11,IT Services,Windows 10,Tips</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/pexels-photo-3194519-f6c8db3a.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/pexels-photo-3194519-e509e8d7.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Transform Video Conferences with the Meeting Owl Pro</title>
      <link>https://www.ev-consultech.com/meeting-owl-pro</link>
      <description>Meet the Meeting Owl Pro — the smartest video conferencing camera on the market that autofocuses on whoever's speaking with exceptional video and sound.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            At EV-Consultech we are always looking out for new products and services to improve our customers digital quality of life..
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            When Covid-19 first hit many companies started having their employees work remotely and as a result video calls became an integral part of running a business. Company meetings were being held remotely on Zoom or Microsoft Teams instead of in conference rooms. Now that many of us are returning to work in person we are finding that the traditional means of using a laptop and a webcam does not work well for hybrid meetings where it is important for remote participants to be able to see everyone attending in person and vise-versa.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The Meeting Owl Pro creates a an enhanced sense of immersion when participating in hybrid meetings. Thanks to a high-definition 360 degree camera, 8 microphones, and three speakers, those who can't attend a meeting in person can still feel like they are actually there.  The meeting Owl Pro uses its 360 degree camera and microphones to detect who is speaking and crop the image to highlight them.
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            The Meeting Owl Pro is easy to setup and use.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The device is plug-and-play meaning there is no manual drivers or software to install. Just plug it into your computer like a normal webcam and it will start working like magic. The Owl Pro is compatible with Microsoft Teams, Zoom, Skype, Google Hangouts, Slack, Go-To-Meeting, and more!
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Our Customers Love It!
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           After installing the first Owl Pro Camera for one of our clients, it immediately had an impact. Just about every time they host a virtual meeting with OWL someone in the remote audience will ask about it. In fact,  just a few weeks after our first install, one viewer loved the camera so much they immediately contacted us and requested one for their company's own conference room.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Watch the following video to see how a traditional webcam compares to the Meeting Owl Pro:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Tailored to Your Needs.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            EV-Consultech has partnered with
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.yelp.com/biz/altech-security-glendale" target="_blank"&gt;&#xD;
      
           Altech Security
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            to create bespoke teleconferencing solutions by getting to know our customers' needs, existing equipment, and budget so we can provide a range of options customized to your business.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/Owls+in+Action-6a5ac2c1.png" alt=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/0001-85b9f681-726a1f99.jpg" alt=""/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Fill out the form below or give us a call at 626-405-8987 to find out how we provide cost effective solutions that maximize our clients’ return on investment.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/owl-3f06ed8c-2d3066f9-65090590.jpg" length="490315" type="image/png" />
      <pubDate>Fri, 05 Nov 2021 21:41:59 GMT</pubDate>
      <guid>https://www.ev-consultech.com/meeting-owl-pro</guid>
      <g-custom:tags type="string">hybridmeeting,Laptop,OS,MeetingOwlPro,AI,EV-Consultech,2021,Pasadena,AltechSecurity,IT Managed Services,Apple,Managed IT Services,PC,Desktop,Technology,OwlLabs,Operating System,Microsoft,Los Angeles,Mac OS,Windows 11,IT Services,Windows 10</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/owl.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/owl-3f06ed8c-2d3066f9-65090590.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Cybersecurity Awareness Month - Week 4: Cybersecurity First</title>
      <link>https://www.ev-consultech.com/cybersecurity-awareness-month-week-4-cybersecurity-first</link>
      <description>It’s the last week of Cybersecurity Awareness Month, you should continue to do your part and 
 #BeCyberSmart! Actions today affect our future. Cybersecurity is a year-round effort and has become more of a consideration in how we work, learn, and live. #CyberMonth #CybersecurityFirst</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In this last week of Cybersecurity Awareness Month
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            , we really want to stress the importance of being safe on the internet, and keeping your data secure. So many people and businesses fall victim to cybercrimes they thought would never happen to them. These mistakes can be costly and even destroy peoples' livelihoods.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Most of the time mistakes like these can be avoided
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            There are plenty of resources available on how to identify phishing attacks and social engineering trickery in addition to what precautions can be taken to secure your data.  Check out our
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.ev-consultech.com/csam-week-1-be-cyber-smart" target="_blank"&gt;&#xD;
      
           Top Tips for Cybersecurity Awareness Month
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           in addition to these resources provided by CISA.gov:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Week 4 Tip Sheets: Cybersecurity First
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://www.cisa.gov/sites/default/files/publications/Cybersecurity%20Awareness%20Month%202021%20-%20Why%20is%20Cybersecurity%20Important.pdf" target="_blank"&gt;&#xD;
      
           Why is Cybersecurity Important Tip Sheet
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Cybersecurity is the art of protecting networks, devices, and data from unlawful access or criminal use and the practice of guaranteeing confidentiality, integrity, and availability of information. Communication, transportation, shopping, and medicine are just some of the things that rely on computers systems and the Internet now. Much of your personal information is stored either on your computer, smartphone, tablet or possibly on someone else’s system. Knowing how to protect the information that you have stored is of high importance not just for an individual but for an organization and those in it.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://www.cisa.gov/sites/default/files/publications/Cybersecurity%20Awareness%20Month%202021%20-%20Cybersecurity%20Starts%20With%20You%20Tip%20Sheet.pdf" target="_blank"&gt;&#xD;
      
           Cybersecurity Starts with You Tip Sheet
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Every time you use the Internet, you face choices related to your security. Friends can be selected, links clicked, websites accessed, and wireless networks can be joined. Your security and the security of the nation depends on making secure online decisions. Making the Internet more safe and secure requires all of us to take responsibility for our own cybersecurity posture.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://www.cisa.gov/sites/default/files/publications/Cybersecurity%20Awareness%20Month%202021%20-%20Approaching%20Cybersecurity%20Tip%20Sheet.pdf" target="_blank"&gt;&#xD;
      
           Approaching Cybersecurity Tip Sheet
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           As cyber-attacks and their consequences grow, the imperative for cybersecurity and resilience is becoming increasingly important, not just to homeland security, but businesses, schools, and individuals. Attackers use a variety of vulnerabilities and phishing attacks to compromise the security of networks and devices. To approach this threat effectively and protect your networks, it is even more necessary to become familiar with cyber essentials.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Thank you for your support and commitment to Cybersecurity Awareness Month 2021 and helping all Americans stay safe and secure online.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Follow the trials and tribulations of Tim as a seemingly innocent piece of digital information threatens to ruin his life when it falls into the wrong hands.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            If you or your company would like to know more about how EV-Consultech keeps their customers safe online give us a call at 626-405-8987 or fill out the form below:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/pexels-photo-1789541-38b38626.jpeg" length="2572785" type="image/png" />
      <pubDate>Fri, 29 Oct 2021 20:22:21 GMT</pubDate>
      <guid>https://www.ev-consultech.com/cybersecurity-awareness-month-week-4-cybersecurity-first</guid>
      <g-custom:tags type="string">IRONSCALES,Cyber Security,security training,EV-Consultech,Cloud Storage,Training,Cyber,Managed IT Services,cyber protect,Technology,Phishing,CyberFit,AI,SMB,2021,Attack,MSP,2020,#informationsecurity,2019,IT Managed Services,blockchain,CyberSecurity,Scam,Small Business,#CyberMonth,IT Services,Cyberattack</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/pexels-photo-1789541-53670a90.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/pexels-photo-1789541-38b38626.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Cybersecurity Awareness Month - Week 3: Cybersecurity Career Awareness</title>
      <link>https://www.ev-consultech.com/csam-week-3-cybersecurity-career-awareness</link>
      <description>Cybersecurity Career Awareness Week, brought to us by the National Initiative for Cybersecurity (NICE), is a week-long campaign that provides an opportunity to learn about the contributions and innovations of cybersecurity practitioners, and the plethora of job opportunities that can be found when exploring cybersecurity as a career choice.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Cybersecurity Career Awareness Week
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           , brought to us by the 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.nist.gov/itl/applied-cybersecurity/nice" target="_blank"&gt;&#xD;
      
           National Initiative for Cybersecurity (NICE)
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           , is a week-long campaign that provides an opportunity to learn about the contributions and innovations of cybersecurity practitioners, and the plethora of job opportunities that can be found when exploring cybersecurity as a career choice.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           During this week, learners of all ages, educators, parents, employers, and the community participate in the recognition of how cybersecurity plays a vital role in global society; showcasing how building a nation’s cybersecurity workforce enhances each nation’s security and promotes economic prosperity.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           During this week educators, parents, students, employers, government partners, and the community are exposed to cybersecurity workforce opportunities, the variety of cybersecurity careers, and existing and emerging educational pathways. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Cybersecurity careers are a growing segment
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
            of the nation’s workforce needs and a great opportunity for students choosing their future career and adults looking for a new path. Currently there are over 450,000 jobs open nation-wide in cybersecurity and the global cybersecurity workforce is expected to experience a shortage of 1.8 million cybersecurity professionals by 2022. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           There are multiple career options and numerous pathways to enter the cybersecurity career field. You don't need to be an experienced white-hat hacker to work in cybersecurity. Sales, design, and management experience are all applicable skills that not many other people in the field have. It is never too late to start a career in cybersecurity and demand for positions like these has never been higher
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           We urge you to go to the website for
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="http://nist.gov/nice/ccaw" target="_blank"&gt;&#xD;
      
            
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;a href="http://nist.gov/nice/ccaw" target="_blank"&gt;&#xD;
      
           Cybersecurity Career Awareness Week
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            to learn more and see how you can get involved. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/NICE+Cybersecurity+Workforce+Demand+One-Pager+2021+%28508+Compliant%29-1.png" alt=""/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Watch This Video to Discover the Wide Range of Opportunities in the Field of Cyber Security
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            If you or your company would like to know more about how EV-Consultech keeps their customers safe online give us a call at 626-405-8987 or fill out the form below:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-3095465.png" length="1400444" type="image/png" />
      <pubDate>Fri, 22 Oct 2021 22:44:41 GMT</pubDate>
      <guid>https://www.ev-consultech.com/csam-week-3-cybersecurity-career-awareness</guid>
      <g-custom:tags type="string">IRONSCALES,Cyber Security,security training,EV-Consultech,Cloud Storage,Training,Cyber,Managed IT Services,cyber protect,Technology,Phishing,CyberFit,AI,SMB,2021,Attack,MSP,2020,#informationsecurity,2019,IT Managed Services,blockchain,CyberSecurity,Scam,Small Business,#CyberMonth,IT Services,Cyberattack</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-3095465.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-3095465.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Cybersecurity Awareness Month – Week 2: Phight the Phish!</title>
      <link>https://www.ev-consultech.com/csam-week-2-phight-the-phish</link>
      <description>Learn how to spot and report phishing attempts to prevent ransomware and other malware attacks.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      
           What is a Phishing Attack
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;font&gt;&#xD;
          &lt;span&gt;&#xD;
            &lt;b&gt;&#xD;
              &lt;font&gt;&#xD;
                
                Phishing attacks
               &#xD;
              &lt;/font&gt;&#xD;
            &lt;/b&gt;&#xD;
          &lt;/span&gt;&#xD;
          &lt;font&gt;&#xD;
            
              use email or malicious websites to either infect your machine or trick a user into entering personal or financial information. Phishing emails may appear to come from a real financial institution, e-commerce site, government agency, or any other service, business, or individual. The email may also request personal information such as account numbers, passwords, or Social Security numbers. When users respond with the requested information or click on a link, attackers can use this information to access users’ accounts.
             &#xD;
          &lt;/font&gt;&#xD;
        &lt;/font&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;font&gt;&#xD;
          &lt;br/&gt;&#xD;
        &lt;/font&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;b&gt;&#xD;
        &lt;font&gt;&#xD;
          
             Cyber criminals
            &#xD;
        &lt;/font&gt;&#xD;
      &lt;/b&gt;&#xD;
      &lt;font&gt;&#xD;
        
            use phishing tactics, hoping to fool their victims. If you’re unsure who an email is from—even if the details appear accurate— or if the email looks ‘phishy,’ do not respond and do not click on any links or attachments found in that email. When available use the “report 
           &#xD;
      &lt;/font&gt;&#xD;
    &lt;/font&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;font&gt;&#xD;
        
            phish” or “report” option to help your organization or email provider block other suspicious emails before they arrive in your inbox. Read the
           &#xD;
      &lt;/font&gt;&#xD;
      &lt;b&gt;&#xD;
        &lt;font&gt;&#xD;
          &lt;a href="https://www.cisa.gov/sites/default/files/publications/Cybersecurity%20Awareness%20Month%202021%20-%20Phishing%20Tip%20Sheet.pdf" target="_blank"&gt;&#xD;
            
              Phishing Tip Sheet
             &#xD;
          &lt;/a&gt;&#xD;
        &lt;/font&gt;&#xD;
      &lt;/b&gt;&#xD;
      &lt;font&gt;&#xD;
        
            for more information.
           &#xD;
      &lt;/font&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;b&gt;&#xD;
        
            Today’s technology
           &#xD;
      &lt;/b&gt;&#xD;
    &lt;/font&gt;&#xD;
    &lt;font&gt;&#xD;
      
           allows us to connect from around the world. We can access banking info, shop online, and control our televisions, homes, and cars from our smartphones. With this added convenience comes an increased risk of identity theft and Internet scams. We need to #BeCyberSmart on the Internet—at home, at school, at work, on mobile devices, and on the go.
          &#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;b&gt;&#xD;
        &lt;font&gt;&#xD;
          
             Tips on How to Identify a Phishing Attack
            &#xD;
        &lt;/font&gt;&#xD;
      &lt;/b&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;b&gt;&#xD;
        &lt;font&gt;&#xD;
          &lt;br/&gt;&#xD;
        &lt;/font&gt;&#xD;
      &lt;/b&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            If you or your company would like to know more about how EV-Consultech keeps their customers safe online give us a call at 626-405-8987 or fill out the form below:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-5574266.jpeg" length="1169770" type="image/jpeg" />
      <pubDate>Fri, 15 Oct 2021 22:33:31 GMT</pubDate>
      <guid>https://www.ev-consultech.com/csam-week-2-phight-the-phish</guid>
      <g-custom:tags type="string">Cyber Security,Phishing,security training,CyberFit,EV-Consultech,SMB,2021,Attack,MSP,2020,Cloud Storage,Training,Cyber,2019,IT Managed Services,Managed IT Services,cyber protect,Technology,blockchain,CyberSecurity,Scam,Small Business,IT Services,Cyberattack</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-5574266.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-5574266.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Cybersecurity Awareness Month - Week 1: Be Cyber Smart!</title>
      <link>https://www.ev-consultech.com/csam-week-1-be-cyber-smart</link>
      <description>Do Your Part #BeCyberSmart! This first week of Cybersecurity Awareness Month we will explore the fundamentals of cybersecurity, teaching you how you can better secure your digital lives and improve the security of your devices.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      
           TOP TIPS TO SHARE DURING CYBERSECURITY AWARENESS MONTH
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;b&gt;&#xD;
        
            Double your login protection.
           &#xD;
      &lt;/b&gt;&#xD;
    &lt;/font&gt;&#xD;
    
          Enable multi-factor authentication (MFA) for all accounts and devices to ensure 
          &#xD;
    &lt;span&gt;&#xD;
      
           that the only person who has access to your account is you. Use it for email, banking, social media, and any 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           other service that requires logging in. If MFA is an option, enable it by using a trusted mobile device, such as 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           your smartphone, an authenticator app, or a secure token—a small physical device that can hook onto your key 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           ring.
           &#xD;
      &lt;font&gt;&#xD;
        &lt;font&gt;&#xD;
          &lt;font&gt;&#xD;
            
              Read the
             &#xD;
          &lt;/font&gt;&#xD;
          &lt;b&gt;&#xD;
            &lt;font&gt;&#xD;
              &lt;a href="https://www.cisa.gov/sites/default/files/publications/Cybersecurity%20Awareness%20Month%202021%20-%20MFA%20Tip%20Sheet.pdf" target="_blank"&gt;&#xD;
                
                Multi-Factor Authentication (MFA) How-to-Guide
               &#xD;
              &lt;/a&gt;&#xD;
            &lt;/font&gt;&#xD;
          &lt;/b&gt;&#xD;
        &lt;/font&gt;&#xD;
        &lt;font&gt;&#xD;
        &lt;/font&gt;&#xD;
        &lt;font&gt;&#xD;
          
             f
            &#xD;
        &lt;/font&gt;&#xD;
      &lt;/font&gt;&#xD;
      
           or more information.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;font&gt;&#xD;
        
            Shake up your password protocol.
           &#xD;
      &lt;/font&gt;&#xD;
    &lt;/b&gt;&#xD;
    
          According to National Institute of Standards and Technology (NIST) 
          &#xD;
    &lt;span&gt;&#xD;
      
           guidance, you should consider using the longest password or passphrase permissible. Get creative and 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           customize your standard password for different sites, which can prevent cyber criminals from gaining access to 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           these accounts and protect you in the event of a breach. Use password managers to generate and remember 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           different, complex passwords for each of your accounts. Read the
           &#xD;
      &lt;a href="https://www.cisa.gov/sites/default/files/publications/Cybersecurity%20Awareness%20Month%202021%20-%20Creating%20Passwords%20Tip%20Sheet.pdf" target="_blank"&gt;&#xD;
        &lt;b&gt;&#xD;
          &lt;font&gt;&#xD;
            
              Creating a Password Tip Sheet
             &#xD;
          &lt;/font&gt;&#xD;
        &lt;/b&gt;&#xD;
      &lt;/a&gt;&#xD;
      
           for more 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           information.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If you connect, you must protect.
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;font&gt;&#xD;
        
            Whether it’s your computer, smartphone, game device, or other network devices, the best defense against viruses and malware is to update to the latest security software, web 
           &#xD;
      &lt;/font&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           browser, and operating systems. Sign up for automatic updates, if you can, and protect your devices with 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;font&gt;&#xD;
        
            anti-virus software. 
           &#xD;
      &lt;/font&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;b&gt;&#xD;
          &lt;font&gt;&#xD;
            
              Play hard to get with strangers.
             &#xD;
          &lt;/font&gt;&#xD;
        &lt;/b&gt;&#xD;
        &lt;font&gt;&#xD;
          
             Cyber criminals use phishing tactics, hoping to fool their victims. If you’re 
            &#xD;
        &lt;/font&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           unsure who an email is from—even if the details appear accurate— or if the email looks ‘phishy,’ do not 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           respond and do not click on any links or attachments found in that email. When available use the “report
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;font&gt;&#xD;
        
            phish” or “report” option to help your organization or email provider block other suspicious emails before then 
           &#xD;
      &lt;/font&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;font&gt;&#xD;
        
            arrive in your inbox. Read the
           &#xD;
      &lt;/font&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;b&gt;&#xD;
          &lt;a href="https://www.cisa.gov/sites/default/files/publications/Cybersecurity%20Awareness%20Month%202021%20-%20Phishing%20Tip%20Sheet.pdf" target="_blank"&gt;&#xD;
            
              Phishing Tip
             &#xD;
          &lt;/a&gt;&#xD;
        &lt;/b&gt;&#xD;
      &lt;/font&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;a href="https://www.cisa.gov/sites/default/files/publications/Cybersecurity%20Awareness%20Month%202021%20-%20Phishing%20Tip%20Sheet.pdf" target="_blank"&gt;&#xD;
          &lt;b&gt;&#xD;
            &lt;font&gt;&#xD;
              
               Sheet
              &#xD;
            &lt;/font&gt;&#xD;
          &lt;/b&gt;&#xD;
        &lt;/a&gt;&#xD;
        &lt;font&gt;&#xD;
          
             for more information.
            &#xD;
        &lt;/font&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;b&gt;&#xD;
        &lt;font&gt;&#xD;
          
             Never click and tell.
            &#xD;
        &lt;/font&gt;&#xD;
      &lt;/b&gt;&#xD;
      &lt;font&gt;&#xD;
        
            Limit what information you post on social media—from personal addresses to where you 
           &#xD;
      &lt;/font&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           like to grab coffee. What many people don’t realize is that these seemingly random details are all criminals 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           need to know to target you, your loved ones, and your physical belongings—online and in the real world. Keep 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Social Security numbers, account numbers, and passwords private, as well as specific information about 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           yourself, such as your full name, address, birthday, and even vacation plans. Disable location services that 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;font&gt;&#xD;
        
            allow anyone to see where you are – and where you aren’t – at any given time. Read the
           &#xD;
      &lt;/font&gt;&#xD;
      &lt;a href="https://www.cisa.gov/sites/default/files/publications/Cybersecurity%20Awareness%20Month%202021%20-%20Social%20Media%20Tip%20Sheet.pdf" target="_blank"&gt;&#xD;
        &lt;font&gt;&#xD;
          &lt;b&gt;&#xD;
            
              Social Media 
             &#xD;
          &lt;/b&gt;&#xD;
        &lt;/font&gt;&#xD;
      &lt;/a&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;a href="https://www.cisa.gov/sites/default/files/publications/Cybersecurity%20Awareness%20Month%202021%20-%20Social%20Media%20Tip%20Sheet.pdf" target="_blank"&gt;&#xD;
        &lt;font&gt;&#xD;
          &lt;b&gt;&#xD;
            
              Cybersecurity Tip Sheet
             &#xD;
          &lt;/b&gt;&#xD;
        &lt;/font&gt;&#xD;
      &lt;/a&gt;&#xD;
      &lt;font&gt;&#xD;
        
            for more information.
           &#xD;
      &lt;/font&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;b&gt;&#xD;
          &lt;font&gt;&#xD;
            
              Keep tabs on your apps
             &#xD;
          &lt;/font&gt;&#xD;
        &lt;/b&gt;&#xD;
        &lt;font&gt;&#xD;
          &lt;b&gt;&#xD;
            
              .
             &#xD;
          &lt;/b&gt;&#xD;
        &lt;/font&gt;&#xD;
        &lt;font&gt;&#xD;
          
             Most connected appliances, toys and devices are supported by a mobile application. 
            &#xD;
        &lt;/font&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Your mobile device could be filled with suspicious apps running in the background or using default permissions 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           you never realized you approved—gathering your personal information without your knowledge while also 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           putting your identity and privacy at risk. Check your app permissions and use the “rule of least privilege” to 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           delete what you don’t need or no longer use. Learn to just say “no” to privilege requests that don’t make 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           sense. Only download apps from trusted vendors and sources.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;b&gt;&#xD;
        &lt;font&gt;&#xD;
          
             Stay protected while connected.
            &#xD;
        &lt;/font&gt;&#xD;
      &lt;/b&gt;&#xD;
      &lt;font&gt;&#xD;
        
            Before you connect to any public wireless hotspot – like at an airport, hotel, 
           &#xD;
      &lt;/font&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           or café – be sure to confirm the name of the network and exact login procedures with appropriate staff to 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           ensure that the network is legitimate. If you do use an unsecured public access point, practice good internet 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           hygiene by avoiding sensitive activities (e.g., banking) that require passwords or credit cards. Your personal 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           hotspot is often a safer alternative to free Wi-Fi. Only use sites that begin with “https://” when online shopping 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           or banking.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;b&gt;&#xD;
        &lt;font&gt;&#xD;
          
             Nord VPN on the Importance of Being Cyber Smart
            &#xD;
        &lt;/font&gt;&#xD;
      &lt;/b&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            If you or your company would like to know more about how EV-Consultech keeps their customers safe online give us a call at 626-405-8987 or fill out the form below:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/pexels-photo-5422739-d0681af3.jpeg" length="2341400" type="image/png" />
      <pubDate>Fri, 08 Oct 2021 23:47:46 GMT</pubDate>
      <guid>https://www.ev-consultech.com/csam-week-1-be-cyber-smart</guid>
      <g-custom:tags type="string">IRONSCALES,Cyber Security,security training,EV-Consultech,Cloud Storage,Training,Cyber,Managed IT Services,cyber protect,Technology,Phishing,CyberFit,AI,SMB,2021,Attack,MSP,2020,#informationsecurity,2019,IT Managed Services,blockchain,CyberSecurity,Scam,Small Business,#CyberMonth,IT Services,Cyberattack</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-5422739.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/pexels-photo-5422739-d0681af3.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>STOP. THINK. CONNECT.™</title>
      <link>https://www.ev-consultech.com/stop-think-connect</link>
      <description>EV-Consultech is excited to announce our partnership with the Cybersecurity and Infrastructure Security Agency’s (CISA) STOP. THINK. CONNECT.™ Campaign.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;b&gt;&#xD;
        &lt;font&gt;&#xD;
          
              EV-Consultech is excited to announce our partnership with the Cybersecurity and Infrastructure Security Agency’s (CISA) STOP. THINK. CONNECT.™ Campaign. 
            &#xD;
        &lt;/font&gt;&#xD;
      &lt;/b&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          The STOP. THINK. CONNECT.™ Campaign is an unprecedented effort among more than 500 government, nonprofit, academic, and industry organizations to promote safer online behavior and practices. The Campaign’s goal is to increase the understanding of cyber threats and empower the American public to be safer and more secure online. 
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          Throughout the year, we will highlight cybersecurity and online safety issues on our blog and through our social media. Online safety is a shared responsibility; together we can positively influence our online community. Your support will help ensure all of us are safer both at work and home. 
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;font&gt;&#xD;
        
            We encourage you to join our efforts by: 
           &#xD;
      &lt;/font&gt;&#xD;
    &lt;/b&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;ul&gt;&#xD;
      &lt;li&gt;&#xD;
        
            Following our Blog to stay updated on recent developments in cybersecurity  
           &#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        
            Adhering to simple cyber tips and encouraging those around you to do the same 
           &#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        
            Displaying and distributing STOP. THINK. CONNECT.™ resources to your personal and professional networks. 
           &#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        
            STOP. THINK. CONNECT.™ resources and safety tips can be found at https://www.cisa.gov/publication/stop-think-connect-toolkit 
           &#xD;
      &lt;/li&gt;&#xD;
    &lt;/ul&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          We are excited about our new partnership and know each of you will do your part to advance this important issue. Visit www.cisa.gov/stopthinkconnect to learn more about the Campaign and gain access to additional resources.  
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;b&gt;&#xD;
        &lt;font&gt;&#xD;
          
             The following video explains some dangers of the internet and what STOP. THINK CONNECT.™ stands for:
            &#xD;
        &lt;/font&gt;&#xD;
      &lt;/b&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            If you or your company would like to know more about how EV-Consultech keeps their customers safe online give us a call at 626-405-8987 or fill out the form below:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/censorship-limitations-freedom-of-expression-restricted-39584.jpeg" length="317230" type="image/jpeg" />
      <pubDate>Fri, 01 Oct 2021 21:18:20 GMT</pubDate>
      <guid>https://www.ev-consultech.com/stop-think-connect</guid>
      <g-custom:tags type="string">IRONSCALES,Cyber Security,security training,EV-Consultech,Cloud Storage,Training,Cyber,Managed IT Services,cyber protect,Technology,Phishing,Acronis,CyberFit,AI,SMB,2021,Attack,MSP,2020,2019,IT Managed Services,blockchain,CyberSecurity,Scam,Small Business,IT Services,Cyberattack</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/STC..png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/censorship-limitations-freedom-of-expression-restricted-39584.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Why Cyber Criminals are Targeting Small Businesses</title>
      <link>https://www.ev-consultech.com/why-cyber-criminals-are-targeting-small-businesses</link>
      <description>Small Business owners often underestimate the risks that they face in the world of cyber-security.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;b&gt;&#xD;
          
             Small Business owners often underestimate the risks that they face in the world of cyber-security. 
            &#xD;
        &lt;/b&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;b&gt;&#xD;
          &lt;br/&gt;&#xD;
        &lt;/b&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;font&gt;&#xD;
        
            82% of small business owners believe they will not be subjected to a cyber-attack
           &#xD;
      &lt;/font&gt;&#xD;
    &lt;/b&gt;&#xD;
    
          according to Towergate Insurance. Small business owners generally believe that since there are bigger fish to fry out there, hackers are unlikely to target them...however, this couldn’t be further from the truth.  
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;font&gt;&#xD;
        
            Many SMB’s have substantial sets of data
           &#xD;
      &lt;/font&gt;&#xD;
    &lt;/b&gt;&#xD;
    
          such as credit card numbers, employee names, customer addresses, trade secrets and other private information that can be very valuable to the company and their customers; this data is often left completely unprotected. A prime target for hackers.
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;font&gt;&#xD;
        
            Meanwhile, larger corporations are spending obscene amounts of cash each year
           &#xD;
      &lt;/font&gt;&#xD;
    &lt;/b&gt;&#xD;
    
          to protect their valuable data. In 2020 Microsoft pledged to spend at least $1 billion per year on cyber-security and in 2019 the US President’s Budget set aside $15 billion for the same purpose. That’s about $46 per person in the US or .3% of the entire nation’s budget! In the eyes of a cybercriminal, even though a large corporation like Google or Microsoft have vastly more money to pay out for ransom than a small business, the difficulty and risk involved with breaking into their systems makes the prospect unjustifiable to a criminal. 
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;b&gt;&#xD;
        
            For a small business just starting out, cyber-security is often the last thing on the business owners’ minds.
           &#xD;
      &lt;/b&gt;&#xD;
    &lt;/font&gt;&#xD;
    
          They’re much more likely to be thinking about things like profit margin and how to keep growing the business. While these concerns are certainly important, business owners often lose sight of the bigger picture and forget to ask themselves:
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;blockquote&gt;&#xD;
      &lt;div&gt;&#xD;
        
            Are we safe from cyber-attacks?
           &#xD;
      &lt;/div&gt;&#xD;
    &lt;/blockquote&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;blockquote&gt;&#xD;
    &lt;div&gt;&#xD;
      
           What would happen if we were hacked? 
          &#xD;
    &lt;/div&gt;&#xD;
  &lt;/blockquote&gt;&#xD;
  &lt;blockquote&gt;&#xD;
    &lt;div&gt;&#xD;
      
           Is my data backed up and safe? 
          &#xD;
    &lt;/div&gt;&#xD;
  &lt;/blockquote&gt;&#xD;
  &lt;blockquote&gt;&#xD;
    &lt;div&gt;&#xD;
      
           How long would it take to restore vital systems and their data?
          &#xD;
    &lt;/div&gt;&#xD;
  &lt;/blockquote&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;b&gt;&#xD;
        &lt;font&gt;&#xD;
          
             “These attacks have devastating impacts for any business
            &#xD;
        &lt;/font&gt;&#xD;
      &lt;/b&gt;&#xD;
    &lt;/span&gt;&#xD;
    
          , including data loss, employee downtime and the cost of restoring operations. Data breaches often result in reputation damage, legal damages and financial loss, with the total cost of a single data breach averaging $149,000 for SMBs. For those with limited resources, an attack can prove fatal, causing a reported 60% of small businesses to close their doors following a cyberattack.”  
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          -YEC, Forbes Council 6/2/21 
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;b&gt;&#xD;
        
            It is now more important than ever for small business owners to secure their assets
           &#xD;
      &lt;/b&gt;&#xD;
    &lt;/font&gt;&#xD;
    
          from potential attacks. The risk and likelihood of an attack has never been higher; according to a study done by CISCO 61% of SMBs reported falling victim to at least one cyber-attack last year.  
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          At EV-Consultech, we do everything in our power to ensure our customers won’t be subjected to one of these attacks including email filtering and employee training with IRONSCALES, anti-virus, and more. If a customer still falls victim to an attack, services we offer like Acronis will ensure your data’s integrity; offering encryption, multiple backup locations, and disaster recovery. If a computer crashes or is hacked and rendered useless, its cloud backup can be used as a virtual machine for instant recovery. 
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;b&gt;&#xD;
        &lt;font&gt;&#xD;
          
             The following videos by Acronis and IRONSCALES further explains the effects, scope, and scale of recent cyber attacks on SMBs and how these services help keep our customers safe:
            &#xD;
        &lt;/font&gt;&#xD;
      &lt;/b&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            If you or your company would like to know more about how EV-Consultech keeps their customers safe online give us a call at 626-405-8987 or fill out the form below:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/pexels-photo-7534101-a4a39500.jpeg" length="1534466" type="image/png" />
      <pubDate>Thu, 23 Sep 2021 17:40:08 GMT</pubDate>
      <guid>https://www.ev-consultech.com/why-cyber-criminals-are-targeting-small-businesses</guid>
      <g-custom:tags type="string">IRONSCALES,Cyber Security,security training,EV-Consultech,Cloud Storage,Training,Cyber,Managed IT Services,cyber protect,Technology,Phishing,Acronis,CyberFit,AI,SMB,2021,Attack,MSP,2020,2019,IT Managed Services,blockchain,CyberSecurity,Scam,Small Business,IT Services,Cyberattack</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-7534101.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/pexels-photo-7534101-a4a39500.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Getting Ready for Windows 11</title>
      <link>https://www.ev-consultech.com/getting-ready-for-windows-11</link>
      <description>Is your company ready for the transition to Windows 11? Microsoft has announced Windows 11 will officially release on October 5th, 2021.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           A few months ago,
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Microsoft officially announced they would be releasing Windows 11, and added an official build to the Windows Insider Development program that anyone can download and try out. So that is exactly what we did! The new interface of Windows 11 is cleaner and more simplified than 10. Corners have been rounded off, sleeker, more colorful icons have replaced many of the old ones, and the taskbar is now centered; reminiscent of Apple’s Mac OS. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Windows 11 may look like a reskin
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            of Windows 10, but it is so much more. In addition to the fresh look, Microsoft has implemented new optimizations that will actually make your computer feel much faster. Applications in the foreground will receive higher prioritization for CPU resources, new battery optimizations have been implemented, there is faster resume from sleep, and even quicker sign-in. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           When it is time to upgrade
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            to Windows 11 most users won’t have to worry about app incompatibilities since the developers smartly used the existing underlying platform from Windows 10 to ensure universal compatibility with older Windows 10 applications. If you want to know more about the optimizations that have been made, watch this video released by Microsoft:
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           We are excited
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            for Windows 11 to finally release so our customers can start discovering and taking advantage of the many new features built into the new OS. Not only will it improve our customers' quality of life, it will improve productivity with new optimizations and tools like Task View and Snap Layouts that organize your windows more easily. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/WIN11+Task+View.png" alt=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           After Windows 11 launches
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            on October 5th, EV Consultech will be testing the official release for stability in addition to ensuring all our customers’ applications and computers are compatible before making the switch. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            If you or someone you know is in need of an IT Managed Services Provider for their small to medium sized business; consider EV Consultech. With more than 20 years of experience in the field, we specialize in providing IT Managed Services, Premium Tech Support and IT Solutions in the greater Los Angeles area with fantastic customer service. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Please fill out the form below or give us a call at 626-405-8987 to find out how we provide cost effective solutions that maximize our clients’ return on investment.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/winback-1f84ae89.jpg" length="1691420" type="image/png" />
      <pubDate>Fri, 17 Sep 2021 21:19:03 GMT</pubDate>
      <guid>https://www.ev-consultech.com/getting-ready-for-windows-11</guid>
      <g-custom:tags type="string">Laptop,TaskView,Cyber Security,EV-Consultech,Windows,Cloud Storage,Cyber,features,Managed IT Services,Technology,Operating System,Microsoft,Mac OS,Windows 11,Windows 10,OS,AI,2022,2021,IT Managed Services,Apple,PC,Desktop,CyberSecurity,IT Services</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/winback.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/winback-1f84ae89.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>IRONSCALES – Fighting Phishing Attacks with AI</title>
      <link>https://www.ev-consultech.com/ironscales</link>
      <description>In 2021 we have seen a dramatic increase in cyber-attacks and phishing. IRONSCALES provides comprehensive email security and awareness training.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;b&gt;&#xD;
          
             In 2021 there has been a dramatic increase in cyber-attacks and phishing. 
            &#xD;
        &lt;/b&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      
           According to PhishLabs there has been a 47% increase in phishing attacks in Q1 2021 compared to Q1 2020. Phishing attacks have become so common that the average person is now much more likely to get a virus from an email attachment as opposed to visiting a sketchy website. In fact, 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Verizon’s 2019 Breach Investigations reported that 94% of all malware was delivered via email. In response to this ever increasingly utilized attack vector, IRONSCALES was developed to intercept malicious emails before they even land in your inbox, keeping their customers safe. 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;b&gt;&#xD;
          
             IRONSCALES protection
            &#xD;
        &lt;/b&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/span&gt;&#xD;
    
          doesn’t just stop at just filtering out emails, they also provide comprehensive email security awareness training and simulated phishing attacks to see just how susceptible your employees are. 
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;font&gt;&#xD;
        
            IRONSCALES training
           &#xD;
      &lt;/font&gt;&#xD;
    &lt;/b&gt;&#xD;
    
          helps employees to be more cautious when viewing emails and teaches them how to identify the warning signs associated with a phishing email. “When perimeter technology fails, people must step up. Given the right conditioning, they will. They’ll unite to become a “Human Intrusion Detection System,” a set of sensors intuiting threats your controls miss.” -Cofense 2019 Anti-phishing report.  
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;b&gt;&#xD;
          
             Users will be empowered
            &#xD;
        &lt;/b&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/span&gt;&#xD;
    
          by their training; acting as the last line of defense against malicious cyber-attacks utilizing a dedicated button built into Outlook to report an email as a phishing attack. After an email is reported it is reviewed and then added to IRONSCALES’s database to further train the AI, preventing similar emails from making their way into your inbox again. 
         &#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If you are interested in trying IRONSCALES for your business, please fill out the form below for a free 30-day trial.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/ironscales+mountain.jpg" length="222072" type="image/jpeg" />
      <pubDate>Tue, 03 Aug 2021 21:26:46 GMT</pubDate>
      <guid>https://www.ev-consultech.com/ironscales</guid>
      <g-custom:tags type="string">IRONSCALES,Cyber Security,Phishing,security training,AI,EV-Consultech,2021,Attack,Cloud Storage,Training,Cyber,IT Managed Services,Managed IT Services,Technology,blockchain,CyberSecurity,Scam,IT Services</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/ironscales+mountain.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/ironscales+mountain.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>5 Simple Steps for Better Mobile Security</title>
      <link>https://www.ev-consultech.com/5-simple-steps-for-better-mobile-security</link>
      <description>By following these 5 simple steps, a stolen or lost device may certainly be an inconvenience, however, you will be avoiding a potential data security nightmare.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      
           Mobile Security Is More Important Than Ever Before
          &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          Today many companies are opting into a BYOD (Bring Your Own Device) policy where employees use their own personal devices for work. This allows convenient access to company information and systems, but in turn also makes this data more susceptible to a breach if a device were to be stolen or lost. A mobile security compromise risks more than just the data on the device. The range of consequences is vast, including downtime, supply chain delays, lost business, damage to reputation and regulatory fines. 
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          According to the 2020 Verizon Mobile Security Index report, the portion of companies who have suffered a mobile-related compromise has been growing year over year for the past three years now up to nearly 40%. Additionally, during that same time frame an increasing number of companies reported investing more and more in mobile security over the years.  
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          Thankfully, there are some simple steps end users and companies alike can implement to better secure their mobile devices. These steps will ensure your valuable data is safe and provide some peace of mind: 
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;ol&gt;&#xD;
      &lt;li&gt;&#xD;
        
            First off, ensure all mobile devices are secured with a pin code, or pattern. Biometric security such as fingerprint or facial recognition is not recommended since someone could unlock your phone without your consent. For example, a police officer or criminal could unlock your phone by pointing the camera at your face without permission.
           &#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        
            Secondly, make sure that all apps with sensitive information such as banking apps are secured with a strong unique password for individual users. Once again, do not use biometric security.  
           &#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Ensure all data is being backed up to more than one location. Apple and Google offer cloud backups, however a service like
             &#xD;
          &lt;a href="https://www.ev-consultech.com/acronis-cyber-protect" target="_blank"&gt;&#xD;
            &lt;font&gt;&#xD;
              
               Acronis Cyber Cloud
              &#xD;
            &lt;/font&gt;&#xD;
          &lt;/a&gt;&#xD;
          
             should be considered for additional redundancy and data security. 
            &#xD;
        &lt;/span&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Always have device location tracking enabled such as Google’s “Find my device” or Apple’s “Find my” feature.
             &#xD;
          &lt;b&gt;&#xD;
          &lt;/b&gt;&#xD;
          
             If a device is lost or stolen, act immediately! You can remotely locate the device by using one the following websites and logging into the same account the device was registered to:
             &#xD;
          &lt;a href="https://www.google.com/android/find" target="_blank"&gt;&#xD;
            &lt;font&gt;&#xD;
              
               https://www.google.com/android/find
              &#xD;
            &lt;/font&gt;&#xD;
          &lt;/a&gt;&#xD;
          
             or
             &#xD;
          &lt;a href="https://www.apple.com/icloud/find-my/" target="_blank"&gt;&#xD;
            &lt;font&gt;&#xD;
              
               https://www.apple.com/icloud/find-my/
              &#xD;
            &lt;/font&gt;&#xD;
          &lt;/a&gt;&#xD;
          
             A device can also be remotely wiped from these websites ensuring that the data cannot be accessed or stolen. Please note that after device has been wiped it may no longer be tracked. 
            &#xD;
        &lt;/span&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Follow all standard internet safety practices such as keeping your operating system and apps updated, avoid unsecured WIFI, use 2FA (2 Factor Authentication) when possible, always use a VPN, and be careful about what you click on and download. 
            &#xD;
        &lt;/span&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/li&gt;&#xD;
    &lt;/ol&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          We must remember that our cellphones often function as a key to our personal lives too, arguably more important than an ID card. If someone has saved their passwords to their phone and it isn’t secured, someone could access medical records, company information, your bank accounts, and even private documents like a social security card, driver's license, etc. Spending a bit of time making sure you follow these steps could save you a lot of headaches in the future by avoiding a data security nightmare. 
         &#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/md/unsplash/dms3rep/multi/photo-1584433144859-1fc3ab64a957.jpg" length="179708" type="image/jpeg" />
      <pubDate>Tue, 20 Jul 2021 17:27:06 GMT</pubDate>
      <guid>https://www.ev-consultech.com/5-simple-steps-for-better-mobile-security</guid>
      <g-custom:tags type="string">Biometric,Fingerprint,Phishing,Acronis,CyberFit,AI,EV-Consultech,2021,Attack,Mobile,Cloud App Security,Cloud Storage,Cyber,IT Managed Services,Managed IT Services,Data Backup and Recovery,Technology,blockchain,VPN,CyberSecurity,Scam,IT Services,bitcoin</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/md/unsplash/dms3rep/multi/photo-1584433144859-1fc3ab64a957.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/md/unsplash/dms3rep/multi/photo-1584433144859-1fc3ab64a957.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Acronis Cyber Protect – The All-In-One Cybersecurity Solution</title>
      <link>https://www.ev-consultech.com/acronis-cyber-protect</link>
      <description>Acronis specializes in robust backup and cybersecurity solutions for devices of all types including desktops, laptops, servers, and even mobile devices.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;b&gt;&#xD;
          
             EV Consultech is proud to announce that we are now official partners with Acronis! 
            &#xD;
        &lt;/b&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          Having a robust backup system is more important than ever with the recent rise in cyberattacks and specifically ransomware. When researching backup services for small to medium-sized businesses we were extremely impressed with the abilities of Acronis’ software that extends beyond just basic computer backups. The services they offer are extremely comprehensive and dwarfs the feature sets of their competitors. 
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;b&gt;&#xD;
          
             Intuitive, and convenient backups 
            &#xD;
        &lt;/b&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          Acronis goes beyond basic backup services offering the ability to simultaneously backup to the cloud and to a local device ensuring your data is safe in case of a cyberattack, natural disaster, or even a network outage. Additionally, these backups are extremely customizable with the ability to self-update in the background as often as every five minutes without affecting the computer’s performance by using CPU load balancing. If backups every 5 minutes are not often enough, Acronis also offers continuous data protection so that even the smallest changes in specific applications or folders will be saved as soon as they are made.  
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
           
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          Once your files have been uploaded to the cloud, Acronis gives its users the ability to access their backed-up files from any computer or mobile device with an internet connection. If a computer ever needs to be restored, Acronis will detect the fastest way to restore the data either using the cloud or a local backup if it is available. For businesses that cannot afford for their work to be interrupted, Acronis allows their users to run a virtual machine of the most recent backup, so you can get back to your work within minutes and have zero data loss.
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;b&gt;&#xD;
          
             Protection from all modern threats 
            &#xD;
        &lt;/b&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          In addition to providing comprehensive backup solutions, Acronis is extremely focused on ensuring that their software is secure, and their users’ data is safe; utilizing end-to-end enterprise-grade AES-256 encryption meaning not even Acronis themselves can read your encrypted files. Acronis Cyber Protect also offers a full suite of antimalware services including scheduled and on-demand antivirus scans, web filtering, computer vulnerability assessments, crypto mining process detection, and even real-time monitoring of every file you interact with.  
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;b&gt;&#xD;
          
             Secure, forensic backups protected by the blockchain 
            &#xD;
        &lt;/b&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          Malware protection and frequent backups will keep your business running in case of an attack, but what happens after systems have been recovered? Most importantly the vulnerability that was exploited must be discovered and remediated so a similar situation won’t happen again. 
          &#xD;
    &lt;span&gt;&#xD;
      
           Acronis will greatly assist with this task since they offer secure forensic backups that include raw memory dumps, and backups of all storage space on the computer including unallocated partitions. These forensic backups help cybersecurity investigators and the authorities determine the cause of the breach and who was behind the attack. For even more added security these forensic backups are notarized on the Ethereum blockchain making it impossible for hackers to cover their tracks by deleting or modifying this data. After recovery, the company should file a cyber insurance claim, and report the incident and any data breaches to the proper authorities.  
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If you are interested in trying Acronis Cyber Protect for your business, please fill out the form below for a free 30 day trial.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/acronis_cyber_protect_-_cover+%283%29.jpg" length="107716" type="image/jpeg" />
      <pubDate>Tue, 06 Jul 2021 20:03:50 GMT</pubDate>
      <guid>https://www.ev-consultech.com/acronis-cyber-protect</guid>
      <g-custom:tags type="string">Phishing,Acronis,CyberFit,AI,EV-Consultech,2021,Attack,Cloud Storage,Cyber,IT Managed Services,Managed IT Services,Data Backup and Recovery,Technology,blockchain,VPN,CyberSecurity,Scam,etherium,IT Services,bitcoin</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/acronis_cyber_protect_-_cover+%283%29.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/acronis_cyber_protect_-_cover+%283%29.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>The JBS Cyberattack: An Example of How to Be Prepared</title>
      <link>https://www.ev-consultech.com/jbs-cyberattack</link>
      <description>Read about the importance of maintaining frequent and complete backups of all company systems.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  
         Having frequent and complete backups of all company systems is the best way to recover after computer failure, malware infection, or a targeted cyber-attack. Another one of these cyber-attacks occurred last week, this time targeted at JBS, the largest meat processing company in the world. The attack was distributed by a group known as REvil, which crippled critical systems in at least 10 JBS plants found across the globe. Luckily for JBS, they were much more prepared than Colonial Pipeline for this attack. "The criminals were never able to access our core systems, which greatly reduced potential impact," said Andre Nogueira, chief executive of JBS USA.   
         &#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          The shutdown of certain plant functions occurred on May 30, 2021, over Memorial Day weekend. Impressively, the Brazil-based company said the “vast majority” of its plants would be operational on Wednesday, June 2, meaning their systems were restored in under 48 hours without any money paid out as a ransom. This is quite the feat considering 10 separate plants with multiple computer systems each needed to be restored to working order from backups. Unlike Colonial Pipeline, JBS deserves to be commended for not paying any ransom to the cybercriminals and having the proper measures in place to bring their operations back online as quickly as possible. 
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          It is never advisable to pay a hacker’s ransom as since as the FBI explains, “Paying a ransom emboldens the adversary to target other organizations for profit and provides for a lucrative environment for other criminals to become involved.” Furthermore, in Webroot’s 2021 Security Report they add, "paying a ransom does not guarantee an organization will regain access to their data. According to our research, nearly 17 percent of businesses paid the ransom but were still not able to decrypt their data.” Paying one of these ransoms is a major gamble. Even if you do receive a decryption tool in exchange for a ransom, that tool may take so long to decrypt your data that it  quickly ends up being cheaper to pay IT support to recover the data.  
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          EV Consultech keeps its customers protected by offering remote and in-person support in addition to ensuring all devices have their own backup system
          &#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
    
          s. We also offer services like AI-powered email filtering that keep employees and subsequently their company and customers safe
         &#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If you would like to know more about the services we provide, please fill out the form below:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/md/unsplash/dms3rep/multi/photo-1557761469-f29c6e201784.jpg" length="172250" type="image/jpeg" />
      <pubDate>Fri, 18 Jun 2021 02:43:48 GMT</pubDate>
      <guid>https://www.ev-consultech.com/jbs-cyberattack</guid>
      <g-custom:tags type="string">JBS Attack,Phishing,EV-Consultech,2021,Attack,Cloud Storage,Cyber,Managed IT Services,Data Backup and Recovery,Technology,CyberSecurity,JBS,Scam,IT Services</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/md/unsplash/dms3rep/multi/photo-1557761469-f29c6e201784.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/md/unsplash/dms3rep/multi/photo-1557761469-f29c6e201784.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>The Colonial Pipeline Hack; Hidden Costs of Poor Security Practices</title>
      <link>https://www.ev-consultech.com/colonial-pipeline-hack</link>
      <description>Learn about how the Colonial Pipeline was compromised, and what precautions can be taken to prevent this from happening to you.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  
         Regular updates for Windows and your other applications can be tedious, but the importance of these updates can’t be emphasized enough. In the world of cyber security, hackers are constantly looking for vulnerabilities in outdated websites, operating systems, applications or even in our own judgement when opening emails. 
         &#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          Recently Colonial Pipelines suffered a cyberattack that shut down one of the largest oil pipelines in America. The attack led to panic buying in the southwest United States which caused gas prices to skyrocket across the country. Although investigations are still ongoing, it is believed that the ransomware was distributed by a group known as DarkSide, who sells “ransomware as a service” that anyone can buy and use to target vulnerable, high-value systems. Reportedly, the Colonial Pipeline company had extremely poor cyber and system security practices that likely allowed DarkSide’s ransomware to take over such a large portion of a physical pipeline.  
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          The amount of money Colonial Pipeline was losing every second the pipeline was shut down pushed the company to pay a $90 million ransom in an effort to regain access to their systems. Unfortunately, the decrypting tool they received in exchange for the ransom would have taken longer to decrypt their files than it would have taken to restore all their systems from backups, so the $90 million was essentially wasted.  
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          Jon Niccolls, a cyber security expert from CheckPoint, explains,
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          "Some of the biggest attacks we've seen all started with an email… an employee may have been tricked into downloading some malware, for example. We've also seen recent examples of hackers getting in using weaknesses or compromise of a third-party software. Hackers will use any chance they get to gain a foothold in a network." 
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
           EV Consultech is equipped to protect their clients from such attacks by providing in-house services like monthly computer maintenance to keep your computer and applications up to date.  We also offer automated solutions such as IronScales, which uses the power of AI to automatically detect and filter out phishing emails from your employees’ inboxes. IronScales can also be used to train your employees on how to identify phishing attempts through simulated attacks so they never compromise your company’s security. EV Consultech ensures industry standard cybersecurity practices are always used in addition to providing cloud backup solutions for all devices in case of ransomware attack or device failure. 
         &#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If you would like to know more about how we keep our clients safe online, please fill out the form below.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/canstockphoto14135560.jpg" length="118710" type="image/jpeg" />
      <pubDate>Thu, 27 May 2021 19:20:30 GMT</pubDate>
      <guid>https://www.ev-consultech.com/colonial-pipeline-hack</guid>
      <g-custom:tags type="string">Tech,IRONSCALES,Oil,Shortage,Cyber Security,Phishing,AI,EV-Consultech,2021,Colonial Pipeline,Cloud App Security</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/canstockphoto14135560.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed1db60/dms3rep/multi/canstockphoto14135560.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>How to Improve Teleworker Productivity using SD-WAN</title>
      <link>https://www.ev-consultech.com/how-to-improve-teleworker-productivity-using-sd-wan</link>
      <description>Slow internet connections, consumer and work applications fighting for internet speed, and outages can have a big impact on teleworker productivity. Ensure your remote employees have a seamless home internet connection with constant uptime through the usage of an SD-WAN.</description>
      <content:encoded>&lt;h3&gt;&#xD;
  &lt;b&gt;&#xD;
    
          How to Improve Teleworker Productivity using SD-WAN
         &#xD;
  &lt;/b&gt;&#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           For years, businesses have been striving for greater productivity, higher security, and less time spent resolving unexpected issues. When all end user devices shared a single network location, setting priority levels to network traffic and enforcing access policies to achieve these goals was no big deal.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Fast forward to March 2020, and instantly everything changed. Employees worldwide were sent home to work remotely, and work devices began communicating with each other from a variety of locations. As a result, companies lost their ability to easily manage the workplace infrastructure.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Challenges of Teleworking
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           For businesses accustomed to a traditional office setup, the transition from in-house employee to teleworker has introduced new factors that have complicated the corporate environment. ISP, internet data plans, home network equipment, and location all vary per employee, so companies desiring to retain a productive workforce need to take these factors into account.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If you currently work from home or manage employees who do, you have likely experienced some of the challenges of teleworking already. Slow internet connections, consumer and work applications fighting for internet speed, and outages are all influenced by the factors mentioned above, and these issues can have a big impact on the workday for teleworkers.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Here's the good news! You don't have to settle for long file uploads or downloads, poor videoconferencing quality, and generally slow internet speed. You can have a seamless home internet connection with constant uptime and network traffic prioritization through the usage of an SD-WAN (software-defined wide area network).
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The SD-WAN Solution
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Traditionally, enterprises with multiple branch locations utilized a WAN to create a geographically expansive network, allowing each office to function in tandem and share the same technical resources and services.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Now, SD-WAN enables businesses to utilize network resources owned and operated by a third-party, while retaining the ability to manage these resources simply through the use of a management portal. Recent innovations in SD-WAN allow businesses to extend their corporate network to residential areas, creating one large, centralized WAN encompassing the workplace and the home of each remote employee.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Here's some common advantages teleworkers and businesses derive from adopting an SD-WAN:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Redundancy &amp;amp; Constant Uptime:
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            SD-WAN providers connect each deployed endpoint to the network by multiple network links. If one link goes down, the other link allows for constant uptime even in the event of an outage.
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Network Traffic Prioritization:
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            An SD-WAN enables network traffic to be automatically classified based on importance and type, so that business-critical applications are always prioritized over other traffic.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Proactive Network Monitoring &amp;amp; Visibility:
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            SD-WAN provides real-time reporting and visibility into the corporate and home network. As a result, IT Support teams always have the information they need to resolve issues quickly and effectively.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Simplified Endpoint Setup:
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            SD-WAN endpoint routers ship preconfigured and ready for installation by anyone, not just IT specialists.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Cost &amp;amp; Time Savings:
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Adoption of an SD-WAN infrastructures saves businesses significant time and costs that would otherwise be incurred by owning and managing network hardware on-premises.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Companies including
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Bigleaf
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ,
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Zero Outages
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           , and others provide cost-effective, simple work from home SD-WAN solutions to support teleworkers and improve business productivity with a remote team.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Interested in adopting SD-WAN for your business? Want to learn more about available solutions and plans? Let us know about your business using the form below, and we would love to contact you and discuss the available solutions and which is best for you!
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/SD-WAN.jpg" length="505436" type="image/jpeg" />
      <pubDate>Tue, 02 Mar 2021 21:13:15 GMT</pubDate>
      <guid>https://www.ev-consultech.com/how-to-improve-teleworker-productivity-using-sd-wan</guid>
      <g-custom:tags type="string">Productivity,Network Speed,IT Managed Services,Working Remotely,EV-Consultech,Teleworkers,Home Office,Telecommunications,Remote Workers,SD-WAN,Business</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/SD-WAN.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/SD-WAN.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Phishing and AI: How to Empower your Employees</title>
      <link>https://www.ev-consultech.com/phishing-and-ai-how-to-empower-your-employees</link>
      <description>Phishing attacks are becoming more sophisticated and harder to detect, but you don't have to feel powerless against them.</description>
      <content:encoded>&lt;h3&gt;&#xD;
  &lt;span&gt;&#xD;
    &lt;b&gt;&#xD;
      
           Phishing and AI: How to Empower your Employees
          &#xD;
    &lt;/b&gt;&#xD;
  &lt;/span&gt;&#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  
         If you own or are an employee of an SMB (small or medium-sized business), you have probably received your fair share of spam and phishing emails in your inbox. Some of these phishing emails are glaringly obvious; others, not so much.
         &#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          In the last quarter of 2020, we noticed a large increase in the number of phishing attacks targeting SMBs. The unfortunate truth about phishing is that its goal is to capitalize on human error, something that every employee (and CEO for that matter) is well acquainted with. When users are busy focusing the task at hand, they often don't read between the lines of emails they receive, which is why recent phishing attacks have been so successful.
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      
           Here's the bottom line . . .
          &#xD;
    &lt;/b&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          Phishing attacks are becoming more sophisticated and harder to detect, but you don't have to feel powerless against them. In fact, advances in artificial intelligence (AI) and automation can empower people in the workplace to perform their jobs safely and confidently, without worrying about accidentally clicking on a rogue email link or downloading a malicious attachment.
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          Now, let's move this from the abstract realm to the practical and define how AI and automation can assist you and your organization in the battle against phishing. 
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Enter IRONSCALES
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          While a number of enterprises offer phishing protection solutions, the one we have been impressed by the most is
          &#xD;
    &lt;b&gt;&#xD;
      
            
          &#xD;
    &lt;/b&gt;&#xD;
    &lt;span&gt;&#xD;
      
           IRONSCALES
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           ,
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           an AI-powered, advanced email security SaaS platform that combines the power of machine learning with human interaction. IRONSCALES empowers users to take part in phishing defense by reporting rogue phishing emails, and via user awareness training and simulated phishing attacks.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In addition to the features just mentioned, there are a number of other capabilities that IRONSCALES offers across its multiple packages, so we chose to showcase those included in the Core Plus bundle below. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/b&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            If you are interested in IRONSCALES for your business, we have good news! We have partnered with IRONSCALES to offer a 30-day trial of the Core Plus bundle
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            completely free
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ! For more information about this offer and how IRONSCALES can increase the security of your business, please check out the tabs below.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/Ironscales.jpg" length="292763" type="image/jpeg" />
      <pubDate>Tue, 26 Jan 2021 19:55:35 GMT</pubDate>
      <guid>https://www.ev-consultech.com/phishing-and-ai-how-to-empower-your-employees</guid>
      <g-custom:tags type="string">Email Security,IRONSCALES,Automation,Phishing,Breach,Artificial Intelligence,AI,EV-Consultech,Cybersecurity,Business Email Compromise,IT Managed Services,Work from Home,Business</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/Ironscales.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/Ironscales.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Holiday Security Refresher: Working Remotely</title>
      <link>https://www.ev-consultech.com/holiday-security-refresher-working-remotely4ad1d172</link>
      <description>We are offering free resources on practicing security when working from home. Learn how to further secure your wireless network . . . and more!</description>
      <content:encoded>&lt;h3&gt;&#xD;
  &lt;font&gt;&#xD;
    &lt;b&gt;&#xD;
      
           Holiday Security Refresher: Working Remotely
          &#xD;
    &lt;/b&gt;&#xD;
  &lt;/font&gt;&#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;b&gt;&#xD;
        
            2020 Holiday Security Awareness Campaign
           &#xD;
      &lt;/b&gt;&#xD;
    &lt;/font&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;font&gt;&#xD;
        
            (Week 4)
           &#xD;
      &lt;/font&gt;&#xD;
    &lt;/b&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      
           This is the 4th and final week of our holiday security awareness campaign, and our security focus for this week is
           &#xD;
      &lt;b&gt;&#xD;
        
            working remotely
           &#xD;
      &lt;/b&gt;&#xD;
      
           .
          &#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      
           Since the lockdown back in March, companies have been adopting a more flexible approach to work. Gone are the traditional requirements for employees to always work from the office. 
          &#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Instead, many employees are able to perform their job duties entirely from the comfort of home, or are spending several days a week in an office and the rest working remotely.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      
           As many of us have already experienced, working from home offers tremendous flexibility and can often be even more productive than working in an office. 
          &#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Nevertheless, remaining productive requires diligence, and the same can be said for prioritizing security while working at home.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      
           This week we are featuring the resources listed below:
          &#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;b&gt;&#xD;
        
            1. Updating Security Settings on Home WiFi Networks
           &#xD;
      &lt;/b&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;font&gt;&#xD;
        
            This article provides three methods to secure your wireless network and protect your data from unwanted visitors.
           &#xD;
      &lt;/font&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;b&gt;&#xD;
          
             2.	Work From Home Security Posters
            &#xD;
        &lt;/b&gt;&#xD;
      &lt;/font&gt;&#xD;
      &lt;br/&gt;&#xD;
      &lt;font&gt;&#xD;
        
            These four posters cover a variety of different subjects, including physical security, work-life balance, encryption, and more.
           &#xD;
      &lt;/font&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;font color="#ffffff"&gt;&#xD;
        &lt;b&gt;&#xD;
          
             3.	Don’t Click on That.
            &#xD;
        &lt;/b&gt;&#xD;
      &lt;/font&gt;&#xD;
      &lt;br/&gt;&#xD;
      &lt;font&gt;&#xD;
        
            This humorous sketch discusses the importance of practicing safety, having antivirus software, and using wisdom while browsing online.
           &#xD;
      &lt;/font&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      
           As a reminder, you can view or download all of these resources for free using the tabs below! Simply click on each tab to access its respective content.
          &#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           We hope you have found these resources informative and useful!
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Merry Christmas and Happy New Year!
           &#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The EV-Consultech Team
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/ben-white-1ujXUwqLfO8-unsplash.jpg" length="293993" type="image/jpeg" />
      <pubDate>Thu, 24 Dec 2020 04:48:45 GMT</pubDate>
      <guid>https://www.ev-consultech.com/holiday-security-refresher-working-remotely4ad1d172</guid>
      <g-custom:tags type="string">IT Managed Services,Christmas,Cyber Security,Working Remotely,Work from Home,Security Awareness Campaign 2020,Holiday Season,EV-Consultech,Free Resources</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/ben-white-1ujXUwqLfO8-unsplash.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/ben-white-1ujXUwqLfO8-unsplash.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Holiday Security Refresher: Business Email Compromise (BEC)</title>
      <link>https://www.ev-consultech.com/holiday-security-refresher-business-email-compromise-bec</link>
      <description>These aren't your average phishing attempts. Learn about BEC attacks and how to protect your organization from them.</description>
      <content:encoded>&lt;h3&gt;&#xD;
  &lt;font&gt;&#xD;
    &lt;b&gt;&#xD;
      
           Holiday Security Refresher: Business Email Compromise (BEC)
          &#xD;
    &lt;/b&gt;&#xD;
  &lt;/font&gt;&#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;b&gt;&#xD;
        
            2020 Holiday Security Awareness Campaign
           &#xD;
      &lt;/b&gt;&#xD;
    &lt;/font&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;font&gt;&#xD;
        
            (Week 3)
           &#xD;
      &lt;/font&gt;&#xD;
    &lt;/b&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;font&gt;&#xD;
    
          It is week 3 of our security awareness campaign, and the security focus for this week is
          &#xD;
    &lt;b&gt;&#xD;
      
           Business Email Compromise (BEC)
          &#xD;
    &lt;/b&gt;&#xD;
    
          . 
         &#xD;
  &lt;/font&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      
           BEC attacks are a subset of phishing, and they occur when a cybercriminal impersonates executives or trusted contacts to deceive business owners or employees into transferring funds into a seemingly authentic - but nonetheless fraudulent account.
          &#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      
           While the purpose of most BEC attacks is personal financial gain, these attacks can also be made with the goal of obtaining sensitive business and financial information, as is the case in phishing attacks.
          &#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      
           Attackers utilize BEC attacks year-round, but it is not uncommon around the holidays for these sorts of fraudulent attacks to increase in frequency. As always, during this holiday season be sure to be on guard and practice healthy skepticism with the emails you receive.
          &#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      
           This week we are featuring the resources listed below:
          &#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;b&gt;&#xD;
        
            1. BEC Infographic
           &#xD;
      &lt;/b&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      
           This poster explains BEC attacks, including their design and targets. 
          &#xD;
    &lt;/font&gt;&#xD;
    &lt;font&gt;&#xD;
      
           I
          &#xD;
    &lt;/font&gt;&#xD;
    &lt;span&gt;&#xD;
      
           t also lists the best practices to prevent them from occurring.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;b&gt;&#xD;
        
            2.
           &#xD;
      &lt;/b&gt;&#xD;
      
            
           &#xD;
      &lt;span&gt;&#xD;
        
            3 Facts About BEC Attacks
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           This article describes a few true facts about BEC attacks, providing helpful summaries and recommendations along the way.
          &#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;b&gt;&#xD;
        
            3.
           &#xD;
      &lt;/b&gt;&#xD;
      &lt;b&gt;&#xD;
        
            Take 5: Defending Against BEC Attacks
           &#xD;
      &lt;/b&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           This document lists out several good habits to establish in your organization to provide the best shield of defense against BEC attacks.
          &#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      
           All of these resources are free to access, and you can view or download them below! Simply click on each tab to access its respective content.
          &#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           We hope you have found these resources informative and useful!
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Happy Holidays,
           &#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The EV-Consultech Team
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/Security+Awareness+%233.jpg" length="318613" type="image/jpeg" />
      <pubDate>Thu, 17 Dec 2020 04:24:01 GMT</pubDate>
      <guid>https://www.ev-consultech.com/holiday-security-refresher-business-email-compromise-bec</guid>
      <g-custom:tags type="string">Business Email Compromise,BEC,IT Managed Services,Christmas,Cyber Security,Security Awareness Campaign 2020,Holiday Season,EV-Consultech,Free Resources,Fraudulent Activity</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/Security+Awareness+%233.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/Security+Awareness+%233.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Holiday Security Refresher: Shopping Hazards &amp; Phishing During the Holidays</title>
      <link>https://www.ev-consultech.com/holiday-security-refresher-shopping-hazards-phishing-during-the-holidays</link>
      <description>As technology continues to accelerate, cybercriminals continue in their pursuit to make phishing attacks appear authentic and thus gain access to confidential information. Don't let them succeed!</description>
      <content:encoded>&lt;h3&gt;&#xD;
  &lt;b&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;span&gt;&#xD;
        
             
           &#xD;
      &lt;/span&gt;&#xD;
      
           Holiday Security Refresher: Shopping Hazards &amp;amp; Phishing During the Holidays
          &#xD;
    &lt;/font&gt;&#xD;
  &lt;/b&gt;&#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;font&gt;&#xD;
        
            2020 Holiday Security Awareness Campaign
           &#xD;
      &lt;/font&gt;&#xD;
      &lt;font&gt;&#xD;
        
            (Week 2)
           &#xD;
      &lt;/font&gt;&#xD;
    &lt;/b&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;font&gt;&#xD;
    
          Welcome to week 2 of our security awareness campaign! The security focus for this week is
          &#xD;
    &lt;b&gt;&#xD;
      
           phishing
          &#xD;
    &lt;/b&gt;&#xD;
    
          . 
         &#xD;
  &lt;/font&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      
           As technology continues to accelerate, cybercriminals continue in their pursuit to make phishing attacks appear authentic and thus gain access to confidential information.
          &#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      
           Phishing attacks during the holidays are commonly themed around gift orders and product deals, though normal business-related phishing attacks will still be present during this time.
          &#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      
           As we are now in the middle of the holiday season, be sure to be on guard against phishing attacks and employ safe practices while in the office or at home.
          &#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;font&gt;&#xD;
        
            This week we are featuring:
           &#xD;
      &lt;/font&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;b&gt;&#xD;
          
             1.
            &#xD;
        &lt;/b&gt;&#xD;
        &lt;span&gt;&#xD;
          &lt;b&gt;&#xD;
            
              Holiday Shopping Hazards
             &#xD;
          &lt;/b&gt;&#xD;
        &lt;/span&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;font&gt;&#xD;
        
            A document on the risks and best practices of holiday shopping.
           &#xD;
      &lt;/font&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;b&gt;&#xD;
          
             2.
            &#xD;
        &lt;/b&gt;&#xD;
        &lt;span&gt;&#xD;
          &lt;b&gt;&#xD;
            
              Phishing Decision Infographic
             &#xD;
          &lt;/b&gt;&#xD;
        &lt;/span&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;font&gt;&#xD;
        
            A poster on effective decision-making while analyzing emails.
           &#xD;
      &lt;/font&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;b&gt;&#xD;
          
             3.
            &#xD;
        &lt;/b&gt;&#xD;
        &lt;span&gt;&#xD;
          &lt;b&gt;&#xD;
            
              Sweet Deal
             &#xD;
          &lt;/b&gt;&#xD;
        &lt;/span&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;font&gt;&#xD;
        
            A poster reminder that phishing attacks often offer unrealistically good deals or content.
           &#xD;
      &lt;/font&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;b&gt;&#xD;
          
             4.
            &#xD;
        &lt;/b&gt;&#xD;
        &lt;span&gt;&#xD;
          &lt;b&gt;&#xD;
            
              Great Saves: Phishing
             &#xD;
          &lt;/b&gt;&#xD;
        &lt;/span&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;font&gt;&#xD;
        
            A refresher video on phishing awareness.
           &#xD;
      &lt;/font&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;font&gt;&#xD;
        
            As a reminder, you can access all of these free resources below! 
           &#xD;
      &lt;/font&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Simply click on each tab to access its respective content.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/div&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           We hope you find these resources helpful, and we wish you the best of the season!
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Happy Holidays,
           &#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The EV-Consultech Team
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/Security+Awareness+%232.jpg" length="406983" type="image/jpeg" />
      <pubDate>Wed, 09 Dec 2020 22:25:57 GMT</pubDate>
      <guid>https://www.ev-consultech.com/holiday-security-refresher-shopping-hazards-phishing-during-the-holidays</guid>
      <g-custom:tags type="string">IT Managed Services,Christmas,Cyber Security,Phishing,Security Awareness Campaign 2020,Holiday Season,EV-Consultech,Free Resources,Fraudulent Activity</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/Security+Awareness+%232.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/Security+Awareness+%232.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Holiday Security Refresher: Stay Safe this Season!</title>
      <link>https://www.ev-consultech.com/holiday-security-refresher-stay-safe-this-season</link>
      <description>During this holiday season, we are launching a 4-week security awareness campaign to provide a refresher on the common tactics of cybercriminals, thieves and scammers.</description>
      <content:encoded>&lt;h3&gt;&#xD;
  &lt;span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;font&gt;&#xD;
        
            Holiday Security Refresher: Stay Safe this Season!
           &#xD;
      &lt;/font&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/span&gt;&#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;span&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;font&gt;&#xD;
        
            2020 Holiday Security Awareness Campaign
           &#xD;
      &lt;/font&gt;&#xD;
      &lt;font&gt;&#xD;
        
             
           &#xD;
      &lt;/font&gt;&#xD;
      &lt;font&gt;&#xD;
        
            (Week 1)
           &#xD;
      &lt;/font&gt;&#xD;
    &lt;/b&gt;&#xD;
  &lt;/span&gt;&#xD;
  &lt;font&gt;&#xD;
  &lt;/font&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/b&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;span&gt;&#xD;
          
             It's the holiday season already . . . can you believe it? 2020 has been a year ripe with unexpected surprises, challenges, and blessings. The holidays are a great time to reconnect with family and share joy with loved ones, and this year with all its challenges could certainly use a little cheer.
            &#xD;
        &lt;/span&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/b&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;span&gt;&#xD;
          &lt;br/&gt;&#xD;
        &lt;/span&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/b&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;span&gt;&#xD;
          
             During this holiday season, we are launching a 4-week
            &#xD;
        &lt;/span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             security awareness campaign
            &#xD;
        &lt;/span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             to provide a refresher on the common tactics of cybercriminals, thieves and scammers.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/b&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/b&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;font&gt;&#xD;
          
             They will be especially active this season with more online shopping than ever, due to the coronavirus pandemic and other factors. 
            &#xD;
        &lt;/font&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/b&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;font&gt;&#xD;
          &lt;br/&gt;&#xD;
        &lt;/font&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/b&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;font&gt;&#xD;
          
             Each week we will be providing articles, videos and posters to promote caution and good practices, in order to keep both you and your business safe this holiday season. 
            &#xD;
        &lt;/font&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/b&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;font&gt;&#xD;
          &lt;br/&gt;&#xD;
        &lt;/font&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/b&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;font&gt;&#xD;
          
             This week in promoting security awareness, we are featuring the following resources:
            &#xD;
        &lt;/font&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/b&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;font&gt;&#xD;
          
             1.
             &#xD;
          &lt;span&gt;&#xD;
            
              An article with examples of the common types of scams that you may 
             &#xD;
          &lt;/span&gt;&#xD;
        &lt;/font&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/b&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;font&gt;&#xD;
          
             encounter during the holidays.
            &#xD;
        &lt;/font&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/b&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;font&gt;&#xD;
          
             2. 
             &#xD;
          &lt;span&gt;&#xD;
            
              A poster on spotting fraudulent holiday shipping notices.
             &#xD;
          &lt;/span&gt;&#xD;
        &lt;/font&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/b&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      
           3. 
          &#xD;
    &lt;/b&gt;&#xD;
    &lt;span&gt;&#xD;
      
           A refresher video on the importance of practicing Wi-Fi safety if you find yourself using public Wi-Fi while out shopping.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      
           You can find each of these resources available for free below. 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Simply click on each tab to access its respective content. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           We hope these resources have been useful to you, and wish you a wonderful and safe holiday season!
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Happy Holidays,
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The EV-Consultech Team
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/annie-spratt-QKo-op_gR9I-unsplash.jpg" length="503044" type="image/jpeg" />
      <pubDate>Wed, 02 Dec 2020 21:11:19 GMT</pubDate>
      <guid>https://www.ev-consultech.com/holiday-security-refresher-stay-safe-this-season</guid>
      <g-custom:tags type="string">IT Managed Services,Christmas,Cyber Security,Security Awareness Campaign 2020,EV-Consultech,Holiday Season,Free Resources,Fraudulent Activity</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/annie-spratt-QKo-op_gR9I-unsplash.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/annie-spratt-QKo-op_gR9I-unsplash.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Network Security Best Practices: Access Control and Segmentation</title>
      <link>https://www.ev-consultech.com/network-security-best-practices-access-control-and-segmentation</link>
      <description>Traditional security measures often aren't enough to stop data breaches in this day and age. Two further steps can greatly increase your company's security: Access Control and Segmentation.</description>
      <content:encoded>&lt;h3&gt;&#xD;
  &lt;b&gt;&#xD;
    
          Network Security Best Practices: Access Control and Segmentation
         &#xD;
  &lt;/b&gt;&#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;div&gt;&#xD;
    
          The IT network infrastructure is in many ways the backbone of any business. As a network supports countless diverse aspects of an organization, it is no surprise that IT specialists who have experienced and remediated data breaches can testify that they often cause major - and sometimes irreversible damage.
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          While multiple defenses exist against such threats, such as firewalls and antimalware software, are these in themselves enough to protect a business from attacks? Unfortunately, attackers know that most companies already have these security measures in place for such an event, which is why they often target the human error factor instead, knowing that people are indeed the weakest link and can be prone to making mistakes.
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          However, there are two controls you can implement in your organization's network that can provide another shield of protection beyond traditional security measures, making it much more challenging for intruders to compromise your network: Access Control and Segmentation.
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Implement Tighter Access Control
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      
           While implementing secure access control may seem like a simple task, it can be difficult to execute in reality. Why? One reason in particular keeps many businesses from having tight controls over access, and that is convenience. It is much more convenient for businesses to use the same or similar credentials across the board, rather than having unique access policies per user or department based on individual needs.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Nevertheless, it is vital that businesses ensure their users have all the credentials they need, but not any more or any less. Any more can lead to a massive increase in damage done by an attacker should they access to the network; any less can keep your employees from meeting their job requirements. In many cases, the only exception to a limited access policy should be company owners, executive managers, and IT staff, who need universal access given the scope of their work.
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      
           A limited access policy results in a more secure work environment for everyone. Though some employees under such a policy may dislike having less freedom, the benefits of security far outweighs the costs. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Let's consider an example: A marketing employee has credentials that provide her limited access across an organization. She is able to access her marketing resources, and any other resources she needs. However, she has no access to the accounting department's resources, or the resources of any other department she does not need. She also doesn't have administrative rights. If a perpetrator is able to break into the network through her credentials, he will be able to do far less damage, and across a more limited spectrum than he might have were she to have much greater access to company data.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The bottom line is this - If you are looking for an additional wall of defense beyond traditional measures, maintain tight user access control. This is one of the best defenses you can have against security breaches.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;b&gt;&#xD;
        
            Segment your Network
           &#xD;
      &lt;/b&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Another step you can take to secure your business data is to segment your network by dividing it into several smaller networks. While this method of network security can be time consuming, it can have a powerful affect on your network's security - similar in many ways to limited access policies.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      
           A great way to segment a network is by department. In this way a company can have a different subnetwork for each of its functions, like accounting, shipping, and marketing. Just as tight user access controls can divide access to company resources by user, having segmented networks divides access per computer and network device.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      
           It's also wise to create a separate network for personal devices of employees and guests, with limited access to company data compared to business computers and devices. This will limit any attacker's chance of accessing your important company data through a personal device not equipped with features as per your business's security policies.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The result of a well-designed, segmented network is a more highly secured organization, and a much greater challenge for any attacker trying to break into your company's network.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;b&gt;&#xD;
        
            It's Worth the Effort
           &#xD;
      &lt;/b&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;b&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/b&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      
           At first glance, it may seem too much to define unique access policies based on each user's needs, and to divide your company's network by department, but coupled with firewalls, antimalware software, and other security measures, these efforts will be well worth the time. Many companies are slow to improve their security simply because they haven't experienced a major data breach yet. Instead of having to experience one at all, we recommend you be rigorous and proactive about your company's security, and keep would-be attackers out of your network before they try to enter it.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;font&gt;&#xD;
        
            This blog is based on information from the following articles:
           &#xD;
      &lt;/font&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;a href="/"&gt;&#xD;
      
           Shoring Up Your Network And Security Policies: Least Privilege Models
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;a href="https://www.mspinsights.com/doc/segmenting-and-segregating-your-network-often-overlooked-tips-for-keeping-businesses-safe-0001?vm_tId=2249690&amp;amp;vm_nId=62131&amp;amp;user=3217b79d-96f3-41d3-b983-ea6a5a126bb1&amp;amp;vm_alias=Segmenting%20And%20Segregating%20Your%20Network%3A%20Often%20Overlooked%20Tips%20For%20Keeping%20Businesses%20Safe&amp;amp;utm_source=mkt_MSPIN&amp;amp;utm_medium=email&amp;amp;utm_campaign=MSPIN_10-21-2020-Webroot&amp;amp;utm_term=3217b79d-96f3-41d3-b983-ea6a5a126bb1&amp;amp;utm_content=Segmenting%20And%20Segregating%20Your%20Network%3A%20Often%20Overlooked%20Tips%20For%20Keeping%20Businesses%20Safe&amp;amp;mkt_tok=eyJpIjoiWVdRMk5UWXhNV1l3TnpkaiIsInQiOiJGSVBIVk9RV3FtXC9JS1REQnJtV1JnbXA5QjVQK1FJWXlCZUVJdG5zWENXNW5ZTjE2K2FPcVhxZzAxeTZaWHlobDRhd3N6bDZzRnZjbEF5SFdnSFwvdEVLeXQ1ZVAwd29DODhWcFVVU2R4c3ppRURERG83N2Y0ZVgxXC9wbG8rNHhONCJ9" target="_blank"&gt;&#xD;
      
           Segmenting And Segregating Your Network: Often Overlooked Tips For Keeping Businesses Safe
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/Network+Security.jpg" length="350221" type="image/jpeg" />
      <pubDate>Sat, 31 Oct 2020 02:01:48 GMT</pubDate>
      <guid>https://www.ev-consultech.com/network-security-best-practices-access-control-and-segmentation</guid>
      <g-custom:tags type="string">IT Managed Services,Cyber Security,Networking,Network Security,EV-Consultech,Access Control,Network Segmentation (New Tag),Remote Workers,Business</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/Network+Security.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/Network+Security.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Phishing: Best Practices and How to Identify an Attack</title>
      <link>https://www.ev-consultech.com/phishing-best-practices-and-how-to-identify-an-attack</link>
      <description>Hackers know that human error is the best way into an organization. Learn how to identify their tricks and stop them in their tracks.</description>
      <content:encoded>&lt;h3&gt;&#xD;
  &lt;b&gt;&#xD;
    
          Phishing: 
          &#xD;
    &lt;span&gt;&#xD;
      
           Best Practices and How to Identify an Attack
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/b&gt;&#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;div&gt;&#xD;
    
          Phishing attacks are still the number one cause of business data breaches.
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          Why? Because hackers know that the quickest and most effective avenue to the inside of a company is through human error. It's not hard to understand why phishing attacks are so successful, either. When employees are pressured with multiple projects and correspondence with other parties, they can be quick to act and not so quick to identify fraudulent emails.
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          During these months when many are still working from home, it is critical to an organization's security that employees understand the traits of a phishing attack, and know how to respond appropriately.
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Know the Characteristics of a Phishing Email
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      
           While previously it was most common for hackers to send out mass emails to random email accounts, we are now often seeing an attack known as spear-phishing, where hackers use knowledge of a company and its employees to develop personalized attacks that can be quite believable. These attacks can involve impersonation of a company employee or manager, or even a business partner or service provider.
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Well, this is all good to know, but how can employees identify the characteristics of a phishing attack? 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The good news is, virtually every part of an email can provide an indication of its authenticity. Key identifiers of a phishing attempt can be found most anywhere in an email, from its header to its body. If you are unsure of the legitimacy of an email, examine it and ask yourself questions in the following categories:
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;ul&gt;&#xD;
      &lt;li&gt;&#xD;
        &lt;span&gt;&#xD;
          
             From
            &#xD;
        &lt;/span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             :
            &#xD;
        &lt;/span&gt;&#xD;
        &lt;span&gt;&#xD;
        &lt;/span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Is the email from an unknown contact? Is it from a known contact but is spelled 
            &#xD;
        &lt;/span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             incorrectly?
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        &lt;b&gt;&#xD;
          
             To: 
             &#xD;
          &lt;span&gt;&#xD;
            
               
              &#xD;
            &lt;span&gt;&#xD;
              
               Was this email sent just to me, or to a group of contacts I don't recognize?
              &#xD;
            &lt;/span&gt;&#xD;
          &lt;/span&gt;&#xD;
        &lt;/b&gt;&#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        &lt;span&gt;&#xD;
          &lt;span&gt;&#xD;
            
              Date:
             &#xD;
          &lt;/span&gt;&#xD;
          
              
            &#xD;
        &lt;/span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Examine the date in conjuncture with the rest of the message. Is the date and time unusual based on the sender or the request?
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        &lt;span&gt;&#xD;
          &lt;span&gt;&#xD;
            
               Subject: 
              &#xD;
            &lt;span&gt;&#xD;
              
                
               &#xD;
              &lt;span&gt;&#xD;
                
                Does the subject line sound suspicious? If it is from a known sender, Is the subject line something that they would likely write?
               &#xD;
              &lt;/span&gt;&#xD;
            &lt;/span&gt;&#xD;
          &lt;/span&gt;&#xD;
          &lt;br/&gt;&#xD;
        &lt;/span&gt;&#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        &lt;span&gt;&#xD;
          &lt;span&gt;&#xD;
            &lt;span&gt;&#xD;
              &lt;span&gt;&#xD;
                &lt;b&gt;&#xD;
                  
                 Text Content: 
                 &#xD;
                  &lt;span&gt;&#xD;
                    
                  Is there an urgent request or a threat? Are bad spelling and grammar present throughout the message? Is a known sender asking you to do something that they would not normally ask? These are all big indicators of a phishing attempt.
                 &#xD;
                  &lt;/span&gt;&#xD;
                &lt;/b&gt;&#xD;
              &lt;/span&gt;&#xD;
            &lt;/span&gt;&#xD;
          &lt;/span&gt;&#xD;
        &lt;/span&gt;&#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        &lt;span&gt;&#xD;
          &lt;span&gt;&#xD;
            &lt;span&gt;&#xD;
              &lt;span&gt;&#xD;
                &lt;b&gt;&#xD;
                  
                 Links: 
                 &#xD;
                  &lt;span&gt;&#xD;
                    
                  Are links present in the message that look like legitimate sites but are spelled incorrectly? Are there long hyperlinks present with no explanation?
                 &#xD;
                  &lt;/span&gt;&#xD;
                &lt;/b&gt;&#xD;
              &lt;/span&gt;&#xD;
            &lt;/span&gt;&#xD;
          &lt;/span&gt;&#xD;
        &lt;/span&gt;&#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        &lt;span&gt;&#xD;
          &lt;span&gt;&#xD;
            &lt;span&gt;&#xD;
              &lt;span&gt;&#xD;
                &lt;b&gt;&#xD;
                  
                 Attachments: 
                 &#xD;
                  &lt;span&gt;&#xD;
                    
                  Always examine the content of the message and compare it to any attachments. Are the attachments relevant to the message? Do the attachments contain unknown extensions (for example, .exe, .msi, and .zip are all potentially dangerous filetypes). 
                 &#xD;
                  &lt;/span&gt;&#xD;
                &lt;/b&gt;&#xD;
              &lt;/span&gt;&#xD;
            &lt;/span&gt;&#xD;
          &lt;/span&gt;&#xD;
        &lt;/span&gt;&#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        &lt;span&gt;&#xD;
          &lt;span&gt;&#xD;
            &lt;span&gt;&#xD;
              &lt;span&gt;&#xD;
                &lt;b&gt;&#xD;
                  
                 Frequency of Similar Emails: 
                 &#xD;
                  &lt;span&gt;&#xD;
                    
                   We often receive requests for web design services from different senders that use very similar wording, misspelled grammar and spelling, and frankly sound suspicious. So be sure to analyze the similarity of email requests as this can be another telling sign of phishing.
                 &#xD;
                  &lt;/span&gt;&#xD;
                &lt;/b&gt;&#xD;
              &lt;/span&gt;&#xD;
            &lt;/span&gt;&#xD;
          &lt;/span&gt;&#xD;
        &lt;/span&gt;&#xD;
      &lt;/li&gt;&#xD;
    &lt;/ul&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/b&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      
           Respond Appropriately 
          &#xD;
    &lt;/b&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/b&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             If your answer to even one of the questions spanning the areas above is yes, then do NOT engage in any way with the sender, either by replying, or opening links or attachments. Instead, all suspicious emails should be immediately reported to your company's IT department and verified before any further action is taken.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/b&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          &lt;br/&gt;&#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/b&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          Proper handling of and response to phishing attempts is vital during these times when communication can be hindered by the remote working environment. If you receive a strange email, always look for incorrect spelling/grammar both in the body of the text and in any links. Examine the trustworthiness of the sender and the request. Watch out for attachments and be sure the sender is trusted before opening them. Always report any suspicious emails to your IT department. By spending a few extra minutes now reading that email, you'll save yourself and your company from a lot of time and headaches down the road.
         &#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/Phishing.png" length="36600" type="image/png" />
      <pubDate>Tue, 06 Oct 2020 00:40:27 GMT</pubDate>
      <guid>https://www.ev-consultech.com/phishing-best-practices-and-how-to-identify-an-attack</guid>
      <g-custom:tags type="string">IT Managed Services,Cyber Security,Email,Breach,Phishing,EV-Consultech,Security,Remote Workers,Business</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/Phishing.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/Phishing.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>More Tips for Efficient Remote Work</title>
      <link>https://www.ev-consultech.com/more-tips-for-efficient-remote-work</link>
      <description>Remaining productive during the workday given the realities of life can be a challenge. We offer 5 additional tips to help you work productively during this trying season.</description>
      <content:encoded>&lt;h3&gt;&#xD;
  &lt;b&gt;&#xD;
    
          More Tips for Efficient Remote Work
         &#xD;
  &lt;/b&gt;&#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  
         Back in March, the widespread outbreak of Covid-19 forced many companies to send their employees home for the foreseeable future.  Close to 6 months later, it is clear to see that the work from home trend is here to stay, even after the pandemic clears. 
         &#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In July
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.ev-consultech.com/how-to-work-productively-from-home"&gt;&#xD;
      
           we offered several tips
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           for employees working remotely, regarding issues such as dealing with distractions, burnout, and technical problems. However,
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
            even for those who have been working from home consistently for the last 6 months, remaining productive during the workday given the realities of life can be a challenge.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If you are currently working remotely and find yourself struggling to remain productive, here are some additional steps you can take to be at your best during the workday.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      
           Plan a Task List for the Day
          &#xD;
    &lt;/b&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/b&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Start your workday by spending the first 5-10 minutes defining a list of tasks that you plan on finishing by the end of the day. It can be a mental list but we recommend you write it down on paper or on your computer where you will frequently see it. Make sure the tasks you define are reasonable for you to accomplish during your day, and check them off as you complete them.
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/b&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/b&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Get the Hardware you Need for the Job
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/b&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/b&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          If you find it hard to keep track of all the windows you have open on your computer, consider investing in a second display to keep your tasks more organized. Additionally, if you are working off of a laptop, purchasing a wireless mouse can help you finish the tasks you need to get done much more efficiently.
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      
           Help your Network Keep Up with You
          &#xD;
    &lt;/b&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/b&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Are you working on a wireless connection and finding your internet speed is slow? Consider setting up shop a little closer to your router, so you retain a strong signal at all times. Still having trouble with a slow connection? Hook your computer up with a wired connection, which can boost your internet speed significantly. If neither of these options seem to help, we encourage you to check with your ISP to see what plans they have available to better support your home office needs.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/b&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          &lt;br/&gt;&#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/b&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      
           Don't be Afraid to Save Time with a Phone Call
          &#xD;
    &lt;/b&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/b&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          For many of us, it can be much easier to send an email or text message than to make a phone call. However, it is often  more efficient to make a phone call right away and get the information you need or take care of that outstanding task, instead of waiting for a response from another party before proceeding.
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          &lt;br/&gt;&#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/b&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      
           Keep a Healthy Work-Life Balance
          &#xD;
    &lt;/b&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/b&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;span&gt;&#xD;
        
            If possible, keep work tasks, software, and research away from your personal computer or smartphone. Doing so may help you feel more refreshed during your shift, since it encourages you to put away work when it's time to rest or spend time with family. This works the other way around too - keep personal tasks, internet browsing, and other distractions away as much as possible. This part can takes commitment, so commit now and you'll find it much easier to focus on finishing the tasks you started during the day.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/b&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/b&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      
           Practice Makes Perfect
          &#xD;
    &lt;/b&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/b&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;span&gt;&#xD;
        
            We hope these tips have been both helpful and encouraging for you. If you commit to practicing good habits now, they will support you long-term and help you do the best job you can while working from home.
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/b&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/Working%2BFrom%2BHome%2B2.jpg" length="2844944" type="image/png" />
      <pubDate>Wed, 09 Sep 2020 23:45:26 GMT</pubDate>
      <guid>https://www.ev-consultech.com/more-tips-for-efficient-remote-work</guid>
      <g-custom:tags type="string">Productivity,IT Managed Services,Covid-19,Work from Home,EV-Consultech,Security,Remote Workers,Business</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/Working+From+Home+2.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/Working%2BFrom%2BHome%2B2.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Protect Your Office 365 Business Data with Cloud App Security (CAS)</title>
      <link>https://www.ev-consultech.com/protect-your-office-365-data-with-cloud-app-security-cas</link>
      <description>We've partnered with SonicWall to offer Cloud App Security to protect you from advanced phishing attacks and other modern cyber security risks.</description>
      <content:encoded>&lt;h3&gt;&#xD;
  &lt;b&gt;&#xD;
    
          Protect Your Office 365 Business Data with Cloud App Security (CAS)
         &#xD;
  &lt;/b&gt;&#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  
         Investments in information security are some of the most important investments a business can make. In today's world, the more information a company possesses about technology, its industry, and its clients, the more strategically it can market itself, serve its customers, and be prepared for unexpected threats. As a result, companies that want to succeed must have a plan established and continually improved upon to safeguard their data.
         &#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Office 365 &amp;amp; Spear-Phishing
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          Fortunately, many companies specializing in security are already providing for this need. Businesses using Microsoft Office 365 are able to enjoy intuitive, local and cloud-based applications for office work, complete with cloud storage and built-in security features throughout. Nevertheless, cyber-attacks are becoming more sophisticated and it is increasingly challenging for companies to plan for every contingency. 
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          For example, even data secured by Office 365 2-Factor Authentication and additional security measures can be bypassed by a successful spear-phishing attack. In fact, these phishing attacks have become increasingly successful, as attackers disguise themselves as well-known companies and other trusted contacts. Even well-intentioned employees who are aware of common phishing methods can fall prey to these attacks due to their apparent authenticity. The results of a successful phishing attack can be critical information, account, or financial loss.
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Protect Your Data through Cloud App Security
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          However, there is an added layer of security beyond 2-Factor Authentication that can halt phishing attempts and other security threats in their tracks, and keep your business data secure. 
          &#xD;
    &lt;span&gt;&#xD;
      
           SonicWall's Cloud App Security (CAS) is a next generation security solution for SaaS applications including Office 365, Google Suite, Dropbox, and others. CAS offers the following security measures for businesses:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;ul&gt;&#xD;
      &lt;li&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Advanced protection from targeted phishing, malicious software hidden in email attachments, and URLs.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Inbound, outbound and internal email scanning in Exchange Online and Gmail.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Consistent security policies across authorized cloud applications.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Automated incident detection and response through machine learning and behavior analytics.
            &#xD;
        &lt;/span&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Real-time dashboard monitoring of the cloud environment.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        &lt;span&gt;&#xD;
          
             And more!
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/li&gt;&#xD;
    &lt;/ul&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;span&gt;&#xD;
        
            We've partnered with SonicWall to offer Cloud App Security to protect you from advanced phishing attacks and other modern cyber security risks. 
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Interested in CAS for your business? We would love to talk with you and learn how we can provide for your business security needs.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/div&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;a href="/it-managed-services"&gt;&#xD;
        
            Contact us here for more details
           &#xD;
      &lt;/a&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/CAS-031ed279-df4d422f.jpg" length="3703393" type="image/png" />
      <pubDate>Sat, 05 Sep 2020 02:47:29 GMT</pubDate>
      <guid>https://www.ev-consultech.com/protect-your-office-365-data-with-cloud-app-security-cas</guid>
      <g-custom:tags type="string">IT Managed Services,Cyber Security,Phishing,Breach,Work from Home,EV-Consultech,Attack,Cloud App Security,Business</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/CAS-031ed279.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/CAS-031ed279-df4d422f.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Managing Remote Security During the Covid-19 Era</title>
      <link>https://www.ev-consultech.com/managing-remote-security-during-the-covid-19-era</link>
      <description />
      <content:encoded>&lt;h3&gt;&#xD;
  &lt;b&gt;&#xD;
    
          Managing Remote Security During the Covid-19 Era
         &#xD;
  &lt;/b&gt;&#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  
         Covid-19 has changed the way people work, forcing many to adjust to performing their jobs from home. While some organizations are taking steps towards operating from an office again, many other companies are encouraging their employees to remain at home and work remotely for the time being. 
         &#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          Whether you find your business in one category or the other, it is unlikely that this remote work trend will disappear anytime soon. Why? Because people have found that it works, and that there are many benefits to be enjoyed from performing their job from the comfort of home.
          &#xD;
    &lt;div&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      
           However, because many employees are now working remotely, security has become much more important. While traditional business networks are protected by firewalls and other security measures, not all home networks are in the same boat. Because of this, it is crucial that certain security measures and practices be put in place, so company data and technology are properly secured from threats.
          &#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      
           The following three topics are recommendations for companies currently operating with remote employees.
          &#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;span&gt;&#xD;
        
            1. Phishing Awareness
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      
           Employees working from home 
           &#xD;
      &lt;span&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             must
            &#xD;
        &lt;/span&gt;&#xD;
        &lt;span&gt;&#xD;
          
              be aware of common phishing practices
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
             if they are to operate safely while on the job.
            &#xD;
        &lt;a href="https://www.microsoft.com/security/blog/2020/03/20/protecting-against-coronavirus-themed-phishing-attacks/" target="_blank"&gt;&#xD;
          
             Microsoft states that
            &#xD;
        &lt;/a&gt;&#xD;
        
            phishing attacks tend to have the following characteristics:
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;ul&gt;&#xD;
        &lt;li&gt;&#xD;
          &lt;b&gt;&#xD;
            
              Poor Spelling/Grammar: 
             &#xD;
          &lt;/b&gt;&#xD;
          &lt;span&gt;&#xD;
            
              Email messages with frequently misspelled words and improper grammar are likely to be fake. Phishing messages are often sent out to mass numbers of email accounts, and as a result the body text of these messages are not usually designed to look personal or authentic.
              &#xD;
            &lt;br/&gt;&#xD;
          &lt;/span&gt;&#xD;
        &lt;/li&gt;&#xD;
        &lt;li&gt;&#xD;
          &lt;b&gt;&#xD;
            
              Suspicious Links or Attachments: 
              &#xD;
            &lt;span&gt;&#xD;
              
               Email messages containing unexpected links or strange attachments are likely phishing attempts. If these messages are from an unknown contact, they should not be interacted with. If they are from a familiar contact, the contact should be consulted for legitimacy before any user action is taken.
              &#xD;
            &lt;/span&gt;&#xD;
          &lt;/b&gt;&#xD;
        &lt;/li&gt;&#xD;
        &lt;li&gt;&#xD;
          &lt;b&gt;&#xD;
            
              Threats or Urgent Action Required: 
              &#xD;
            &lt;span&gt;&#xD;
              
               Email messages or phone calls containing threats of financial or judicial nature are often attempts to gain access to critical company data or user credentials through the use of a fear tactic. The best response is to remain calm and analyze the situation before taking any action.
              &#xD;
            &lt;/span&gt;&#xD;
          &lt;/b&gt;&#xD;
        &lt;/li&gt;&#xD;
        &lt;li&gt;&#xD;
          &lt;b&gt;&#xD;
            
              Impersonation of Legitimate Email Accounts or Services: 
              &#xD;
            &lt;span&gt;&#xD;
              
               Often phishing attempts may appear to come from a known email account or online service such as Facebook or Amazon. In these cases, it is best to first consult either the user the email appeared to originate from, or call the company to verify the authenticity of the claim.
              &#xD;
            &lt;/span&gt;&#xD;
          &lt;/b&gt;&#xD;
        &lt;/li&gt;&#xD;
      &lt;/ul&gt;&#xD;
      &lt;div&gt;&#xD;
        &lt;span&gt;&#xD;
          
             While phishing attempts are not limited to the techniques listed above, these are some of the most common most users see. In most cases, phishing attacks succeed when users are quick to respond and take action rather than verify the legitimacy of the threat or request. Employees working from home must be educated on recognizing phishing techniques and responding properly to them if they are to work safely from home.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/div&gt;&#xD;
      &lt;div&gt;&#xD;
        &lt;span&gt;&#xD;
          &lt;br/&gt;&#xD;
        &lt;/span&gt;&#xD;
      &lt;/div&gt;&#xD;
      &lt;div&gt;&#xD;
        &lt;span&gt;&#xD;
          &lt;b&gt;&#xD;
            
              2. Personal Devices and Company Data
             &#xD;
          &lt;/b&gt;&#xD;
        &lt;/span&gt;&#xD;
      &lt;/div&gt;&#xD;
      &lt;div&gt;&#xD;
        &lt;span&gt;&#xD;
          &lt;b&gt;&#xD;
            &lt;br/&gt;&#xD;
          &lt;/b&gt;&#xD;
        &lt;/span&gt;&#xD;
      &lt;/div&gt;&#xD;
      &lt;div&gt;&#xD;
        
            Since many employees are working remotely, it may be all the more tempting to use personal email accounts, cloud subscriptions, or a personal desktop computer to share or store company data. However, as business IT infrastructures are commonly designed around security and are much more protected than a home IT infrastructure, managers must ensure employees are operating safely and keeping company data in the corporate environment. Not only does this lead to better security of critical business information, but also a better work-life balance for employees working from home.
           &#xD;
      &lt;/div&gt;&#xD;
      &lt;div&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/div&gt;&#xD;
      &lt;div&gt;&#xD;
        &lt;span&gt;&#xD;
          
             3. Home Network Security
            &#xD;
        &lt;/span&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/div&gt;&#xD;
      &lt;div&gt;&#xD;
        &lt;span&gt;&#xD;
          &lt;br/&gt;&#xD;
        &lt;/span&gt;&#xD;
      &lt;/div&gt;&#xD;
      &lt;div&gt;&#xD;
        
            Another important aspect for managers to consider is their employees' home network security. Even when employees are complying with company policies regarding secure remote work, a poorly secured home network is an invitation to unwanted intruders who might be able to gain access to crucial business data. How will you ensure your remote employees are able to securely access the resources they need, without any fear of a security breach?
           &#xD;
      &lt;/div&gt;&#xD;
      &lt;div&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/div&gt;&#xD;
      &lt;div&gt;&#xD;
        
            We are partnering with ZeroOutages to provide for this need by offering the 
            &#xD;
        &lt;span&gt;&#xD;
          
             ZeroOutages Home Office SD-WAN Teleworker Wifi Router for just $49/month. 
            &#xD;
        &lt;/span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             This router is embedded with the following features:
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/div&gt;&#xD;
      &lt;div&gt;&#xD;
        &lt;ul&gt;&#xD;
          &lt;li&gt;&#xD;
            &lt;span&gt;&#xD;
              
               Built-In Wifi for Easy Deployment
              &#xD;
            &lt;/span&gt;&#xD;
          &lt;/li&gt;&#xD;
          &lt;li&gt;&#xD;
            &lt;span&gt;&#xD;
              
               Extend the Enterprise Network to the Home Office with Secure Encrypted VPN (no software client required)
              &#xD;
            &lt;/span&gt;&#xD;
          &lt;/li&gt;&#xD;
          &lt;li&gt;&#xD;
            &lt;span&gt;&#xD;
              
               Even Simpler Deployment with 4G Integration (add-on that includes automated home office redundancy)
              &#xD;
            &lt;/span&gt;&#xD;
          &lt;/li&gt;&#xD;
          &lt;li&gt;&#xD;
            &lt;span&gt;&#xD;
              
               Endpoint Protection Client (add-on that stops malware and ransomware)
              &#xD;
            &lt;/span&gt;&#xD;
          &lt;/li&gt;&#xD;
          &lt;li&gt;&#xD;
            &lt;span&gt;&#xD;
              
               Up to 1Gbps throughput
              &#xD;
            &lt;/span&gt;&#xD;
          &lt;/li&gt;&#xD;
        &lt;/ul&gt;&#xD;
      &lt;/div&gt;&#xD;
      &lt;div&gt;&#xD;
        &lt;span&gt;&#xD;
          
             If you are interested in this service and would like to learn more, or would like to discuss your business remote security needs, we would love to learn about your company and how we can support you during this challenging season.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/div&gt;&#xD;
      &lt;div&gt;&#xD;
        &lt;span&gt;&#xD;
          &lt;br/&gt;&#xD;
        &lt;/span&gt;&#xD;
      &lt;/div&gt;&#xD;
      &lt;div&gt;&#xD;
        &lt;span&gt;&#xD;
          &lt;a href="/it-managed-services"&gt;&#xD;
            
              Contact us here for more details
             &#xD;
          &lt;/a&gt;&#xD;
        &lt;/span&gt;&#xD;
      &lt;/div&gt;&#xD;
    &lt;/div&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/Managing%2BRemote%2BSecurity.jpg" length="2919578" type="image/png" />
      <pubDate>Sat, 22 Aug 2020 03:44:51 GMT</pubDate>
      <guid>https://www.ev-consultech.com/managing-remote-security-during-the-covid-19-era</guid>
      <g-custom:tags type="string">IT Managed Services,Cyber Security,Covid-19,Phishing,Work from Home,Network Security,Home Office,Security,Remote Workers,Business</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/Managing+Remote+Security.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/Managing%2BRemote%2BSecurity.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>How To Work Productively From Home</title>
      <link>https://www.ev-consultech.com/how-to-work-productively-from-home</link>
      <description>It can be challenging to work efficiently when we are doing so remotely from the comfort of our homes. While there may be certain benefits we enjoy, distractions, difficulties in communication, and slow internet speeds can all hamper our ability to be productive from home. So, is there a simple solution?</description>
      <content:encoded>&lt;h3&gt;&#xD;
  &lt;b&gt;&#xD;
    
          How to Work Productively From Home
         &#xD;
  &lt;/b&gt;&#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;font&gt;&#xD;
    &lt;span&gt;&#xD;
      
           It can be challenging to work efficiently when we are doing so remotely from the comfort of our homes. While there may be certain benefits we enjoy such as greater flexibility, saved commute time, and more family time, there are also considerable disadvantages to working from home. Distractions, difficulties in communication, and slow internet speeds can all hamper our ability to be productive from home.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/font&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;span&gt;&#xD;
        
            So, is there a simple solution? Well, one decision alone won't fix the problem of job inefficiency. However, there are a number of habitual changes or decisions we can all make that will greatly increase our productivity during this stay-at-home season.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Define your workspace
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      
           It is crucial for every employee working remotely to set apart a specific place in their house for their job alone - preferably one in a secluded room relatively clutter-free. Believe it or not, clutter can have a significant impact on mental focus, and a quieter and distraction-free workspace will promote a clear mind and improve your productivity greatly.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;b&gt;&#xD;
        
            Dress for the job
           &#xD;
      &lt;/b&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Just as clutter and noise can distract you from your job, so can the way you dress. If you wear leisure clothes during your workday, you are more likely to consider the home aspect of working from home instead of the work itself. However, if you wear the clothes you would normally wear to work, you will be much more likely to be focused on the job at hand.
           &#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;b&gt;&#xD;
        
            Ensure your technology works for you
           &#xD;
      &lt;/b&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;span&gt;&#xD;
        
            We have all at some point experienced the feeling of working with a slow computer or inadequate internet speed. Our computers and internet should be working for us, not the other way around. Nevertheless, often we can find ourselves making do with what we have to save us money or the hassle of upgrading. But it is hard to argue against the fact that an outdated computer or slow internet speeds will not be very likely to help us work efficiently. So upgrade your systems or home internet if you need to. You'll thank yourself later!
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;b&gt;&#xD;
        
            Take a break
           &#xD;
      &lt;/b&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;b&gt;&#xD;
        &lt;span&gt;&#xD;
          
             When out of the house at work, most of us take breaks periodically. Even though this time is not spent working, it does help retain mental clarity, keeping us productive and reducing the risk of burnout. So make sure you take short breaks regularly to keep you working at your best capacity.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/b&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;b&gt;&#xD;
        &lt;span&gt;&#xD;
          &lt;br/&gt;&#xD;
        &lt;/span&gt;&#xD;
      &lt;/b&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;b&gt;&#xD;
        
            Minimize unnecessary distractions
           &#xD;
      &lt;/b&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      
           No matter how efficient you may work at home, it is very difficult to replicate the same productivity that is possible in an office space where the environment is centered around work. There are certain distractions that may be unavoidable in your home, such as taking care of your children. Nevertheless, make sure those unnecessary distractions are taken care of. 
          &#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;ul&gt;&#xD;
        &lt;li&gt;&#xD;
          
             Are you prone to use your smartphone for non-work related activities? Silence those notifications or turn off your phone if it isn't being used during your workday.
            &#xD;
        &lt;/li&gt;&#xD;
        &lt;li&gt;&#xD;
          
             Is your home environment generally noisy? Purchase a pair of noise-cancelling headphones to help your mind concentrate on tasks that matter.
            &#xD;
        &lt;/li&gt;&#xD;
        &lt;li&gt;&#xD;
          
             Are you often tired or hungry during your workday? Make sure to eat before your shift and brew a cup of coffee so you have the strength and awareness you need to function well in all you do.
            &#xD;
        &lt;/li&gt;&#xD;
      &lt;/ul&gt;&#xD;
      &lt;div&gt;&#xD;
        &lt;span&gt;&#xD;
          
             You're a choice away from efficient working!
            &#xD;
        &lt;/span&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/div&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      
           Although it would be great if they did, habits don't appear overnight. They must be practiced! If you want to increase your productivity at home, commit to changing some of the patterns you may have established and practice what will help you succeed at your job now, You won't regret it.
          &#xD;
    &lt;/div&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/Work+From+Home-ed7e7f52.jpg" length="598777" type="image/jpeg" />
      <pubDate>Mon, 13 Jul 2020 22:28:07 GMT</pubDate>
      <guid>https://www.ev-consultech.com/how-to-work-productively-from-home</guid>
      <g-custom:tags type="string">Network Speed,IT Managed Services,Managed IT Services,Covid-19,Technology,Tools,Computer,Employees,Remote Workers,Business,Tips</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/Work+From+Home-ed7e7f52.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/Work+From+Home-ed7e7f52.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>How to Boost Efficiency by Outsourcing IT to an MSP</title>
      <link>https://www.ev-consultech.com/how-outsourcing-it-needs-to-an-msp-can-boost-efficiency</link>
      <description>Do you have employees who are competent in technical processes and can take care of the IT aspects of your company? If not, it may be time to look outside of the company to outsource your IT needs. Why? Because partnering with a Managed Service Provider (MSP) can actually be a significantly more cost-efficient, dependable method of making sure your IT needs are met exactly when they need to be - all the time.</description>
      <content:encoded>&lt;h3&gt;&#xD;
  &lt;b&gt;&#xD;
    
          How Outsourcing  IT Needs to an MSP can Boost Efficiency
         &#xD;
  &lt;/b&gt;&#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           COVID-19 has had a greater impact in the world than many of us imagined it would. Many industries and firms have been tested, healthcare has been challenged, and the economy has all but stalled completely in recent months. As a result, countless firms have been forced to make rapid strategic decisions to stay afloat, even if those decisions have meant laying off employees, even those who were skilled in their work.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           ﻿
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Despite the gradual increase in the world's economic state many companies are hesitant to return to their pre-pandemic mode of operations, and rightly so. This has led to some employees continuing to work from home, many employees being furloughed, and others who have lost their jobs entirely and are currently looking for new positions elsewhere.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If your business is currently in this situation, and you have had to furlough or lay off employees due to financial strain on your firm, you've likely noticed that this has placed a burden on employees still working with the company, many of which may now be working overtime or in multiple departments trying to keep the company afloat.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           This can be especially challenging when it comes to IT staff, as technicians deal with many important and complicated aspects of the business, such as integrating older and newer systems, ensuring company data is secure, and troubleshooting issues that arise during daily operations. If your business is now operating without a dedicated IT staff, how are these technical aspects being addressed? Do you have employees who are competent in technical processes and can take care of the IT aspects of your company?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If not, it may be time to look outside of the company to outsource your IT needs. Why? Because partnering with a Managed Service Provider (MSP) can actually be a significantly more cost-efficient, dependable method of making sure your IT needs are met exactly when they need to be - all the time.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Here are a few reasons why outsourcing IT to an MSP can boost your business efficiency:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Constant network monitoring so issues are addressed as soon as they surface..
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Data backup and disaster recovery so you never lose crucial business information.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Automated and manual maintenance measures
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            so your systems are always in top shape and able to handle the tasks you need them to perform.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Proactive security actions so your data is protected and accessible only to those who need it..
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Technology systems and services tailored for your specific company needs.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Dedicated IT staff who are committed to the excellence of your business.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Interested in partnering with an MSP to outsource your IT? Find out if
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           EV-Consultech
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            is the right choice for your business. We would be happy to setup a free consultation with you to discuss your needs and how we can support you along the way.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Contact
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Us:
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.ev-consultech.com/contact-us" target="_blank"&gt;&#xD;
      
           Click Here
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/MSP%2BBlog%2BImage.jpg" length="3278096" type="image/png" />
      <pubDate>Sat, 20 Jun 2020 01:21:34 GMT</pubDate>
      <guid>https://www.ev-consultech.com/how-outsourcing-it-needs-to-an-msp-can-boost-efficiency</guid>
      <g-custom:tags type="string">Cyber Security,Covid-19,EV-Consultech,MSP,IT,Security,Remote Workers,IT Managed Services,Data Backup and Recovery,Efficiency,Technology,Outsourcing,IT Services,Business</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/MSP+Blog+Image.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/MSP%2BBlog%2BImage.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Greater Encryption for Meetings in Zoom, Plus Other Communication Options for Business</title>
      <link>https://www.ev-consultech.com/greater-encryption-zoom-plus-other-communication-options-for-business</link>
      <description>Wherever we are during this crisis, it has become much clearer how greatly we depend and thrive on communication . For businesses and individuals during this time, there are many communication tools available to keep people connected even in isolation. One of these tools most people are well aware of is Zoom, the videoconferencing software which has recently taken the world by storm.</description>
      <content:encoded>&lt;h3&gt;&#xD;
  &lt;b&gt;&#xD;
    
          Greater Encryption for Meetings in Zoom, Plus Other Communication Options for Business
         &#xD;
  &lt;/b&gt;&#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;b&gt;&#xD;
        
            The Need for Communication
           &#xD;
      &lt;/b&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;font&gt;&#xD;
    
          It is now nearing the 2 month mark since the beginning of the economic lockdown caused by the coronavirus pandemic, which has affected all of us in many ways. In addition, many of the world's businesses have been forced to change the way they operate just to remain afloat during this trying season. For many companies, this has meant laying off employees, or sending employees home to work remotely instead of at the office.
         &#xD;
  &lt;/font&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      
           Wherever we are during this crisis, it has become much clearer how greatly we depend and thrive on communication. For businesses and individuals during this time, there are many communication tools available to keep people connected even in isolation. One of these tools most people are well aware of is Zoom, the videoconferencing software which has recently taken the world by storm. 
          &#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;b&gt;&#xD;
        
            Enter Zoom
           &#xD;
      &lt;/b&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      
           Founded in 2011 but only lately becoming world-renowned, the company has received significant scrutiny in recent days from major security issues such as unwanted intruders and inappropriate content as a result. The company has responded quickly and pushed out a number of patches dedicated solely to improving the software's security.
          &#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;span&gt;&#xD;
        
            New Features in Zoom 5.0
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      
           In the latest of Zoom's rapid security patches, encryption is the primary focus as the company is beginning to implement a global AES 256-bit GCM encryption standard, which is practically impenetrable by brute force techniques and very difficult to bypass using any other methods, either.
          &#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      
           In addition to increased encryption standards, Zoom has released a number of quality updates such as new host and meeting settings, including increased password security and customization, secured access to recordings, and secure contact sharing.
          &#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;a href="https://blog.zoom.us/wordpress/2020/04/22/zoom-hits-milestone-on-90-day-security-plan-releases-zoom-5-0/" target="_blank"&gt;&#xD;
          
             Click here
            &#xD;
        &lt;/a&gt;&#xD;
      &lt;/font&gt;&#xD;
      &lt;font&gt;&#xD;
        
            to read about the new encryption standard and a number of other new features available now.
           &#xD;
      &lt;/font&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Alternatives to Consider
            &#xD;
        &lt;/span&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;font&gt;&#xD;
        
            During this time we have also seen a number of other companies consistently release security patches for their meeting and videoconferencing software, like Microsoft Teams, Cisco Webex, GoToMeeting, and more.
           &#xD;
      &lt;/font&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;font&gt;&#xD;
        
            Wondering which videoconferencing solution is the best choice for your business? Take a look at
            &#xD;
        &lt;a href="https://www.techrepublic.com/article/top-10-zoom-alternatives-for-video-conferencing/"&gt;&#xD;
          
             this article
            &#xD;
        &lt;/a&gt;&#xD;
        
            to read a summary of the other videoconferencing software solutions available for you to choose from.
           &#xD;
      &lt;/font&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;b&gt;&#xD;
          
             Contact Us
            &#xD;
        &lt;/b&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;font&gt;&#xD;
        
            If you are currently looking for a business to provide IT support for you during this stay-at-home season, 
           &#xD;
      &lt;/font&gt;&#xD;
    &lt;/font&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;a href="https://www.ev-consultech.com/contact-us" target="_blank"&gt;&#xD;
        
            click here
           &#xD;
      &lt;/a&gt;&#xD;
      
            to contact us by filling out a short form. We would be more than happy to meet you and discuss how we can provide the support you need during this season.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      
           We hope you are staying safe and healthy! 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/Zoom%2BBlog%2BImage.jpg" length="2653145" type="image/png" />
      <pubDate>Sat, 09 May 2020 02:39:00 GMT</pubDate>
      <guid>https://www.ev-consultech.com/greater-encryption-zoom-plus-other-communication-options-for-business</guid>
      <g-custom:tags type="string">Microsoft Teams,Covid-19,Support,Communications,EV-Consultech,Videoconferencing (New Tag),Security,Office 365,Remote Workers,IT Managed Services,Zoom,IT Services,Business</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/Zoom+Blog+Image.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/Zoom%2BBlog%2BImage.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Resources for Your Business During COVID-19</title>
      <link>https://www.ev-consultech.com/resources-for-your-business-during-covid-19</link>
      <description>EV-Consultech is here to help you and your remote workers with your IT needs, in the office and at home. Here are some resources you can take advantage of during COVID-19.</description>
      <content:encoded>&lt;h3&gt;&#xD;
  &lt;span&gt;&#xD;
    &lt;b&gt;&#xD;
      
           Resources for Your Business During COVID-19
          &#xD;
    &lt;/b&gt;&#xD;
  &lt;/span&gt;&#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;font&gt;&#xD;
    
          There have been many illnesses in recent years which have deeply impacted the lives of many individuals and their families around the world. However, none of these have come close to affecting all people on a global scale as the recent Coronavirus has, causing millions to be quarantined to their homes and slowing or stopping many business processes altogether, which has effected the global economy in powerful ways.
         &#xD;
  &lt;/font&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          Even so, many companies have stepped up during this uncertain time and have provided resources to assist business owners in optimizing their operations. Here is a sample of several resources which you can take advantage of during COVID-19:
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;ul&gt;&#xD;
      &lt;li&gt;&#xD;
        &lt;span&gt;&#xD;
          
             A comprehensive list of free software and services for your business during the outbreak.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Free training on Microsoft Teams for business.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Free legal advice for small businesses.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Various webinars on topics such as improving information security for employees working remotely, and applying for a $10,000 SBA Grant.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/li&gt;&#xD;
    &lt;/ul&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          We encourage you to look over these available options and more, as many of them are free and can significantly improve your business efficiency despite the various frustrations caused by the global impact of the virus.
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;a href="https://www.visionary360.com/blog/navigating-the-course-during-the-covid-19-uncertainty/" target="_blank"&gt;&#xD;
      &lt;font&gt;&#xD;
        
            Click here
           &#xD;
      &lt;/font&gt;&#xD;
    &lt;/a&gt;&#xD;
    
          to review a list of resources aggregated by Visionary 360 that your business can take advantage of during COVID-19.
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          More importantly, please stay safe and remain home as much as possible during this time to avoid unnecessary exposure of yourself and others to the virus. Follow federal, state, and local guidelines so that we can all move past this season as soon as possible and return to the standard of living we normally are so blessed to enjoy.
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          Thank you for reading and take care!
         &#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/COVID+Image.jpg" length="94393" type="image/jpeg" />
      <pubDate>Wed, 01 Apr 2020 18:46:05 GMT</pubDate>
      <author>jrodriguez@axxiomdata.com (Juan Rodriguez)</author>
      <guid>https://www.ev-consultech.com/resources-for-your-business-during-covid-19</guid>
      <g-custom:tags type="string">Covid-19,IT Services,Managed IT services,Remote Workers,Business,Resources,EV-Consultech</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/COVID+Image.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/COVID+Image.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Article - G Suite vs. Office 365: What's the best office suite for business?</title>
      <link>https://www.ev-consultech.com/article-g-suite-vs-office-365-what-s-the-best-office-suite-for-business</link>
      <description>There are many tools available in the business world to improve the efficiency of routine tasks, whether those tasks involve real-time communication between remote employees, data storage and manipulation, or word processing for professional flyers or reports. Two of the most widely used office software suites used for these kinds of tasks are Google's G Suite and Microsoft's Office 365. While both of these packages have similar features, they each have differences and distinct advantages over the other.</description>
      <content:encoded>&lt;h3&gt;&#xD;
  &lt;span&gt;&#xD;
    &lt;b&gt;&#xD;
      
           Article - G Suite vs. Office 365: What's the best office suite for business?
          &#xD;
    &lt;/b&gt;&#xD;
  &lt;/span&gt;&#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;font&gt;&#xD;
  &lt;/font&gt;&#xD;
  &lt;font&gt;&#xD;
    &lt;span&gt;&#xD;
      
           There are many tools available in the business world to improve the efficiency of routine tasks, whether those tasks involve real-time communication between remote employees, data storage and manipulation, or word processing for professional flyers or reports. Two of the most widely used office software suites used for these kinds of tasks are Google's
          &#xD;
    &lt;/span&gt;&#xD;
    
           
          &#xD;
    &lt;b&gt;&#xD;
      
           G Suite
          &#xD;
    &lt;/b&gt;&#xD;
    
           
          &#xD;
    &lt;span&gt;&#xD;
      
           and Microsoft's
          &#xD;
    &lt;/span&gt;&#xD;
    
           
          &#xD;
    &lt;b&gt;&#xD;
      
           Office 365
          &#xD;
    &lt;/b&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/font&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      
           While both of these packages have similar features, they each have differences and distinct advantages over the other. With this in mind, how do you determine which software suite is best suited to tackle your needs as a business? 
          &#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
    &lt;/font&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;font&gt;&#xD;
        
            This question is exactly what the following article on
           &#xD;
      &lt;/font&gt;&#xD;
      &lt;font&gt;&#xD;
      &lt;/font&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;font&gt;&#xD;
          &lt;span&gt;&#xD;
            
              computerworld.com
             &#xD;
          &lt;/span&gt;&#xD;
        &lt;/font&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;font&gt;&#xD;
      &lt;/font&gt;&#xD;
      &lt;font&gt;&#xD;
        
            aims to answer, and it does so by providing a very helpful in-depth comparison and contrast of the various programs and features of both office suites:
           &#xD;
      &lt;/font&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;font&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;i&gt;&#xD;
          
             "
            &#xD;
        &lt;/i&gt;&#xD;
        &lt;span&gt;&#xD;
          &lt;font&gt;&#xD;
            
               
             &#xD;
          &lt;/font&gt;&#xD;
          &lt;font&gt;&#xD;
            &lt;i&gt;&#xD;
              
               G Suite and Office 365 have much in common. Both are subscription-based, charging businesses per-person fees every month, in varying tiers, depending on the capabilities their customers are looking for. Although G Suite is web-based, it has the capability to work offline as well. And while Office 365 is based on installed desktop software, it also provides (less powerful) web-based versions of its applications.
              &#xD;
            &lt;/i&gt;&#xD;
          &lt;/font&gt;&#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          &lt;font&gt;&#xD;
            &lt;i&gt;&#xD;
              
               Both suites work well with a range of devices. Because it’s web-based, G Suite works in most browsers on any operating system, and Google also offers apps for Android and iOS. Microsoft provides Office client apps for Windows, macOS, iOS and Android, and its web-based apps work across browsers.
              &#xD;
            &lt;/i&gt;&#xD;
          &lt;/font&gt;&#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          &lt;font&gt;&#xD;
            &lt;i&gt;&#xD;
              &lt;br/&gt;&#xD;
            &lt;/i&gt;&#xD;
          &lt;/font&gt;&#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          &lt;font&gt;&#xD;
            &lt;i&gt;&#xD;
              
               The suites also offer the same basic core applications. Each has word processing, spreadsheet, presentation, email, calendar and contacts programs, along with videoconferencing, messaging and note-taking software. Each has cloud storage associated with it. But those individual applications are quite different from one suite to the other, as are the management tools for taking care of them in a business environment. And both suites offer scads of additional tools as well. So it can be exceedingly difficult to decide which suite is better for your business. . . .
              &#xD;
            &lt;/i&gt;&#xD;
          &lt;/font&gt;&#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;i&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/i&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;i&gt;&#xD;
      &lt;font&gt;&#xD;
      &lt;/font&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;font&gt;&#xD;
          
             We offer a detailed look at every aspect of the office suites, from an application-by-application comparison to how well each suite handles collaboration, how well their apps integrate, their pricing and support and more.
            &#xD;
        &lt;/font&gt;&#xD;
        &lt;font&gt;&#xD;
        &lt;/font&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;font&gt;&#xD;
      &lt;/font&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;b&gt;&#xD;
          &lt;font&gt;&#xD;
            
              "
             &#xD;
          &lt;/font&gt;&#xD;
        &lt;/b&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/i&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;i&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;b&gt;&#xD;
          &lt;font&gt;&#xD;
            &lt;br/&gt;&#xD;
          &lt;/font&gt;&#xD;
        &lt;/b&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/i&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;a href="http://computerworld.com/article/3515808/g-suite-vs-office-365-whats-the-best-office-suite-for-business.html" target="_blank"&gt;&#xD;
          
             Click here to read the full article
            &#xD;
        &lt;/a&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Stay safe during these uncertain times!
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/Picture2-aa1f7a26.png" length="74432" type="image/png" />
      <pubDate>Wed, 18 Mar 2020 18:58:02 GMT</pubDate>
      <author>jrodriguez@axxiomdata.com (Juan Rodriguez)</author>
      <guid>https://www.ev-consultech.com/article-g-suite-vs-office-365-what-s-the-best-office-suite-for-business</guid>
      <g-custom:tags type="string">G Suite,Google Suite,Google Docs,Google Sheets,Google Slides,Google Hangouts,Google Drive,Office 365,Word,Excel,PowerPoint,Teams,OneDrive,SharePoint,Business,Cloud Computing,Cloud Storage,Technology,Managed IT Services</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/Picture2-aa1f7a26.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/Picture2-aa1f7a26.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Article - 5 Soon-to-Be Trends in Artificial Intelligence And Deep Learning</title>
      <link>https://www.ev-consultech.com/article-5-soon-to-be-trends-in-artificial-intelligence-and-deep-learning</link>
      <description>While AI is still in many ways an upcoming technology, its research and development holds promise for everyone in the digital age. It certainly has potential to free up time in the day, enabling professionals and consumers to focus on the most important issues in the day - not those which are time-consuming yet often so trivial.</description>
      <content:encoded>&lt;h3&gt;&#xD;
  &lt;b&gt;&#xD;
    
          Article - 5 Soon-to-Be Trends in Artificial Intelligence And Deep Learning
         &#xD;
  &lt;/b&gt;&#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;font&gt;&#xD;
    
          There are many hot topics in the technology world today - Cybersecurity, Cloud Computing, and Artificial Intelligence (AI) are among the top. While each of these areas offer enormous value alone, it's quite possible that nothing holds more opportunity for achievement in the future than AI.
         &#xD;
  &lt;/font&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      
           While AI is still in many ways an upcoming technology, its research and development holds promise for everyone in the digital age. It certainly has potential to free up time in the day, enabling professionals and consumers to focus on the most important issues in the day - not those which are time-consuming yet often so trivial.
           &#xD;
      &lt;br/&gt;&#xD;
    &lt;/font&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;font&gt;&#xD;
        
            The following text is from an article on 
           &#xD;
      &lt;/font&gt;&#xD;
      &lt;font&gt;&#xD;
      &lt;/font&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;font&gt;&#xD;
          &lt;font&gt;&#xD;
            
              f
             &#xD;
          &lt;/font&gt;&#xD;
          &lt;font&gt;&#xD;
            
              orbes.com
             &#xD;
          &lt;/font&gt;&#xD;
        &lt;/font&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;font&gt;&#xD;
      &lt;/font&gt;&#xD;
      &lt;font&gt;&#xD;
        
            ,
           &#xD;
      &lt;/font&gt;&#xD;
      &lt;font&gt;&#xD;
        
             which describes how despite the enormous undertaking in artificial intelligence research and achievements, AI advances may not be that far away after all - especially in the realms of telecommunications, retail, and simply the mundane daily tasks that we all face:
           &#xD;
      &lt;/font&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;b&gt;&#xD;
          
             "
            &#xD;
        &lt;/b&gt;&#xD;
        &lt;font&gt;&#xD;
          
              
            &#xD;
        &lt;/font&gt;&#xD;
        &lt;i&gt;&#xD;
          &lt;font&gt;&#xD;
            
              Artificial intelligence is frequently discussed yet it’s too early to show real gains. AI’s major headwind is the cost of the investment, which will skew returns in the short-term. When the turnaround occurs, however, companies who are making the investment can expect to be rewarded disproportionately with a wide performance gap. In a recent report, McKinsey predicts AI leaders will see up to double the cash flow. . . .
             &#xD;
          &lt;/font&gt;&#xD;
        &lt;/i&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;i&gt;&#xD;
          
             We see other companies taking on massive and expensive AI projects, such as Baidu, Facebook, Tesla, Alibaba, Microsoft and Amazon. Except for Tesla, these companies are flush with cash and can afford the transition costs and capital expenditures required for artificial intelligence.
            &#xD;
        &lt;/i&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;i&gt;&#xD;
          &lt;br/&gt;&#xD;
        &lt;/i&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;i&gt;&#xD;
          
             Despite tech giants pouring cash into AI investments, most of the industries that stand to benefit are not in the tech industry, per se. . . .
            &#xD;
        &lt;/i&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;i&gt;&#xD;
          &lt;font&gt;&#xD;
            
              Here are a few ways that AI is slated to make an impact sooner rather than later:
             &#xD;
          &lt;/font&gt;&#xD;
          &lt;font&gt;&#xD;
            
               
             &#xD;
          &lt;/font&gt;&#xD;
        &lt;/i&gt;&#xD;
      &lt;/font&gt;&#xD;
      &lt;b&gt;&#xD;
        
            "
           &#xD;
      &lt;/b&gt;&#xD;
      &lt;font&gt;&#xD;
        
             
           &#xD;
      &lt;/font&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;a href="https://www.forbes.com/sites/bethkindig/2020/01/31/5-soon-t0-be-trends-in-artificial-intelligence-and-deep-learning/#2f35925d5e56" target="_blank"&gt;&#xD;
          
             Click here to read the full article
            &#xD;
        &lt;/a&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/div&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          What ways will you be able to take advantage of AI technology in your business or home in the next few years? We all must be alert, because this development will be here sooner than we think.
         &#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/artificial-intelligence-3382507_1920.jpg" length="1135748" type="image/jpeg" />
      <pubDate>Mon, 17 Feb 2020 21:37:29 GMT</pubDate>
      <author>jrodriguez@axxiomdata.com (Juan Rodriguez)</author>
      <guid>https://www.ev-consultech.com/article-5-soon-to-be-trends-in-artificial-intelligence-and-deep-learning</guid>
      <g-custom:tags type="string">AI,Artificial Intelligence,Deep Learning,Technology,Trends,Telecommunications,Business,Consumers,Managed IT Services</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/artificial-intelligence-3382507_1920.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/artificial-intelligence-3382507_1920.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Article - You've Got Cloud. Now, What?</title>
      <link>https://www.ev-consultech.com/article-you-ve-got-cloud-now-what</link>
      <description>Whether you have already invested in cloud computing and storage tools for your business or have no interest at all in pursuing cloud technology, this article features helpful information for anyone in the business world. Plus, it's always good to stay current on the latest technology trends and features you can take advantage of.</description>
      <content:encoded>&lt;h3&gt;&#xD;
  &lt;b&gt;&#xD;
    
          Article - You've Got Cloud. Now, What?
         &#xD;
  &lt;/b&gt;&#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;font&gt;&#xD;
    
          It's a new year (and decade), and technology's capabilities will continue to grow as new tools and methods are developed, which will continue to revolutionize business as we know it. While cloud computing has been in development for some time now, it is still an incredibly powerful business tool if used effectively.
         &#xD;
  &lt;/font&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          Whether you have already invested in cloud computing and storage tools for your business or have no interest at all in pursuing cloud technology, this article features helpful information for anyone in the business world. Plus, it's always good to stay current on the latest technology trends and features you can take advantage of.
          &#xD;
    &lt;br/&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;font&gt;&#xD;
        
            Here's an excerpt of an article on
            &#xD;
        &lt;font&gt;&#xD;
          
             e
             &#xD;
          &lt;span&gt;&#xD;
            &lt;font&gt;&#xD;
              
               ntrepreneur.com
              &#xD;
            &lt;/font&gt;&#xD;
          &lt;/span&gt;&#xD;
        &lt;/font&gt;&#xD;
        
            , which provides a concise and insightful summary of some of the modern cloud storage and computing tools available for your business today:
           &#xD;
      &lt;/font&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;b&gt;&#xD;
          
             "
            &#xD;
        &lt;/b&gt;&#xD;
        
             
            &#xD;
        &lt;i&gt;&#xD;
          
             So, you've managed to sell the idea to your CEO that your company should move to the productivity and efficiency heaven that is the cloud. And he or she agrees.
            &#xD;
        &lt;/i&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;i&gt;&#xD;
          &lt;br/&gt;&#xD;
        &lt;/i&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;i&gt;&#xD;
          
             And, why not? No longer just a cost-cutting solution, the cloud today, with its many facets, has become a business enabler, offering companies large and small the ability to be fast, agile and innovative.
            &#xD;
        &lt;/i&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;i&gt;&#xD;
          
             But while multi-cloud adoption is through the roof, many businesses realize too late that the real battle begins only after the cloud has been adopted. From not sizing bandwidth needs to assuming the cloud is secure just because someone else is handling it, these unsuspecting companies' failure to define the cloud has taken a toll on many of them.
            &#xD;
        &lt;/i&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;i&gt;&#xD;
          &lt;br/&gt;&#xD;
        &lt;/i&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;i&gt;&#xD;
          
             Don't let your company be one of them. Make sure that you get the best bang for your buck by using the following suggested four strategies to make your cloud experience the best one yet . . .
            &#xD;
        &lt;/i&gt;&#xD;
        
             
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;b&gt;&#xD;
        
            "
           &#xD;
      &lt;/b&gt;&#xD;
      &lt;span&gt;&#xD;
        
             
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;a href="https://www.entrepreneur.com/article/318363" target="_blank"&gt;&#xD;
          
             Click here to read the full article
            &#xD;
        &lt;/a&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/div&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          We hope this article has been a helpful read, and we wish you all a happy new year!
         &#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/network-3396348_1920-0d703ba2.jpg" length="4535492" type="image/png" />
      <pubDate>Mon, 06 Jan 2020 22:22:52 GMT</pubDate>
      <author>jrodriguez@axxiomdata.com (Juan Rodriguez)</author>
      <guid>https://www.ev-consultech.com/article-you-ve-got-cloud-now-what</guid>
      <g-custom:tags type="string">Cloud,Cloud Computing,Cloud Storage,Business,Tools,Technology,Trends,Managed IT Services</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/network-3396348_1920.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/network-3396348_1920-0d703ba2.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Article - The Top Cybersecurity Trends That Will Shape 2020</title>
      <link>https://www.ev-consultech.com/article-the-top-cybersecurity-trends-that-will-shape-2020</link>
      <description>We are just around the corner from closing out 2019 and beginning a whole new year, full of opportunities but not without its own risks. As information continues to grow exponentially in its importance to us, cybersecurity is rising itself as one of the next big topics that deserves our attention. We all must ask ourselves, "Is my information truly safe from threats?"</description>
      <content:encoded>&lt;h3&gt;&#xD;
  &lt;span&gt;&#xD;
    &lt;b&gt;&#xD;
      
           Article - The Top Cybersecurity Trends That Will Shape 2020
          &#xD;
    &lt;/b&gt;&#xD;
  &lt;/span&gt;&#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  
         We are just around the corner from closing out 2019 and beginning a whole new year, full of opportunities but not without its own risks. As information continues to grow exponentially in its importance to us, cybersecurity is rising itself as one of the next big topics that deserves our attention. We all must ask ourselves, "Is my information truly safe from threats?"
         &#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          This simple question which may not seem a big deal to us could soon become a critical issue to our businesses - costing us significant time and money - if left unaddressed. We don't need to be afraid of the cybersecurity risks to our homes and companies, but we should be aware of them and know the current trends as they come, as well as have a backup plan in case we find ourselves in a similar situation.
          &#xD;
    &lt;br/&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      
           Here's an excerpt from a great article on 
           &#xD;
      &lt;span&gt;&#xD;
        &lt;font&gt;&#xD;
          
             cyberark.com
            &#xD;
        &lt;/font&gt;&#xD;
      &lt;/span&gt;&#xD;
      
           , which addresses some of the current issues (such as ransomware, cloud storage, and biometrics) facing all businesses who handle information on a regular basis:
          &#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;b&gt;&#xD;
          &lt;i&gt;&#xD;
            
              " 
             &#xD;
          &lt;/i&gt;&#xD;
        &lt;/b&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;i&gt;&#xD;
        
            From a cybersecurity perspective, there are a lot of questions about what’s coming. What are the big technology trends and what risks will they pose?
           &#xD;
      &lt;/i&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Will attackers be interested in new technologies like AI and biometrics or will they focus on infiltrating conventional systems in new and innovative ways? What will the attack vectors be? Will traditional attack methods continue to reign supreme or will new approaches emerge?
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;span&gt;&#xD;
        
            As we head into a new decade, there’s no doubt that attackers will try to use innovation against us, but determining where they will focus is always a challenge. Here are the top security trends we believe will impact both businesses and consumers in 2020 . . .
            &#xD;
        &lt;span&gt;&#xD;
          &lt;b&gt;&#xD;
            
              " 
             &#xD;
          &lt;/b&gt;&#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          &lt;b&gt;&#xD;
            &lt;br/&gt;&#xD;
          &lt;/b&gt;&#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;a href="https://www.cyberark.com/blog/the-top-cybersecurity-trends-that-will-shape-2020/" target="_blank"&gt;&#xD;
          
             Click here to read the full article
            &#xD;
        &lt;/a&gt;&#xD;
      &lt;/font&gt;&#xD;
      &lt;b&gt;&#xD;
      &lt;/b&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      
           We wish you all a Merry Christmas and a Happy New Year!
          &#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/div&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/earth-2254769_1920.jpg" length="677450" type="image/jpeg" />
      <pubDate>Mon, 23 Dec 2019 20:39:21 GMT</pubDate>
      <author>jrodriguez@axxiomdata.com (Juan Rodriguez)</author>
      <guid>https://www.ev-consultech.com/article-the-top-cybersecurity-trends-that-will-shape-2020</guid>
      <g-custom:tags type="string">Cybersecurity,Cyber Security,Trends,2020,Ransomware,Cloud Storage,Business,Information,Managed IT Services</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/earth-2254769_1920.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/earth-2254769_1920.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Now is the Time for Cyber Security</title>
      <link>https://www.ev-consultech.com/now-is-the-time-for-cyber-security</link>
      <description>Cyber security is becoming almost as important as physical security. Just as someone may break into your house and steal your valuable possessions if your house isn't properly secured, now they can do that with your personal information as well.  So the question to ask now is, what steps can we take to safeguard what is important to us?</description>
      <content:encoded>&lt;h3&gt;&#xD;
  &lt;b&gt;&#xD;
    &lt;span&gt;&#xD;
      
           N
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           ow is the Time for Cyber Security
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/b&gt;&#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;font&gt;&#xD;
    
          We live in an information-driven culture. It comes as no surprise to anyone that information and research drive the majority of our decisions every day, whether we are at home or work. Today that information is increasingly stored online, with businesses moving to cloud storage and many home devices now communicating online through the Internet of Things (IoT). 
         &#xD;
  &lt;/font&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      
           As a result, cyber security is becoming almost as important as physical security. Just as someone may break into your house and steal your valuable possessions if your house isn't properly secured, now they can do that with your personal information as well.  So the question to ask now is, what steps can we take to safeguard what is important to us? 
          &#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      
           Following are several important notes to observe about cyber security as it stands today:
          &#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;font&gt;&#xD;
          
             Everyone is at Risk
            &#xD;
        &lt;/font&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;font&gt;&#xD;
        
            "Well of course cyber security attacks are a risk out there, but I'm not in that category." 
           &#xD;
      &lt;/font&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;font&gt;&#xD;
        
            Well that sounds kind of silly, doesn't it? But
            &#xD;
        &lt;font&gt;&#xD;
          
             in reality many of us find ourselves thinking this way
            &#xD;
        &lt;/font&gt;&#xD;
        
            , even if it is subconsciously. One of the first steps we all can take in defending ourselves against threats in an online world is to simply understand that we are not exempt from these risks. Even the most well protected systems today have been infiltrated by unwanted visitors, so naturally we would be a little unwise to think ourselves free of danger.
           &#xD;
      &lt;/font&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;b&gt;&#xD;
          
             Research, Research, Research!
            &#xD;
        &lt;/b&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font color="#000000"&gt;&#xD;
      
           The digital landscape is drastically changing in a relentless cycle, both for good and for bad. New technologies make the development of even faster, more efficient technology possible. New systems are established for protecting crucial information online, and new methods of breaking into those systems are being developed simultaneously.
          &#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font color="#000000"&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;font&gt;&#xD;
        
            While it is unlikely that this cycle will break any time in the near future, we can do our part to stay ahead of the curve by understanding the newest technology and systems available for the protection of our company's (and our personal) information. So make sure to spend a few minutes every week in research, so that you and your business are equipped with the technology and wisdom to fight the security battle well.
           &#xD;
      &lt;/font&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Replace Old Technology with Better Systems
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;font&gt;&#xD;
        
            When was the last assessment done in your business about the state of your systems? While some of us may have updated our systems quite recently, others may have held off on investing in newer technologies, whether it be for financial or operational reasons. Nevertheless, current systems offer increased protection against security breaches, and can save you and your company a lot of time and money in the long run.
           &#xD;
      &lt;/font&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;font&gt;&#xD;
        
            Certain older machines - especially those running Windows 7 - may be at an increased risk for cyber attacks, as the end of life phase for Windows 7 begins on January 14, 2020. At this time, systems still running the operating system will no longer be supported by Microsoft, and security updates will cease being issued.
           &#xD;
      &lt;/font&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;font&gt;&#xD;
        
            Be sure that your company's machines are consistently updated (and upgraded, if the time is necessary) so they are equipped with the newest security systems and your information is protected in an online world.
           &#xD;
      &lt;/font&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;font&gt;&#xD;
        
            (Click
            &#xD;
        &lt;a href="https://www.microsoft.com/en-us/microsoft-365/windows/end-of-windows-7-support" target="_blank"&gt;&#xD;
          
             here
            &#xD;
        &lt;/a&gt;&#xD;
        
            for more information about the end of life phase for Windows 7)
           &#xD;
      &lt;/font&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;b&gt;&#xD;
          
             Now is the Time
            &#xD;
        &lt;/b&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;b&gt;&#xD;
          &lt;br/&gt;&#xD;
        &lt;/b&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;font&gt;&#xD;
        
            Now is the time for cyber security: to understand the risks, research both new technologies and new threats, and to make sure that all of us and our systems are current and safe from unnecessary threats.
           &#xD;
      &lt;/font&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;font&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/font&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;font&gt;&#xD;
        
            We hope this has been an interesting and helpful read. Stay safe out there!
           &#xD;
      &lt;/font&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/Cyber%2BSecurity%2B-%2B01%2B-282-29.jpg" length="514657" type="image/png" />
      <pubDate>Fri, 25 Oct 2019 20:26:14 GMT</pubDate>
      <guid>https://www.ev-consultech.com/now-is-the-time-for-cyber-security</guid>
      <g-custom:tags type="string">Cybersecurity,Cyber Security,Technology,Risks,Research,Managed IT Services</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/Cyber+Security+-+01+%282%29.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/Cyber%2BSecurity%2B-%2B01%2B-282-29.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>3 Tips for using Windows 10 More Efficiently</title>
      <link>https://www.ev-consultech.com/3-tips-for-using-windows-10-more-efficiently</link>
      <description>3 Tips for using Windows 10 More Efficiently. Do you ever seem to have way too many windows open on your PC? Wish it were easier to multitask on your compputer? Today we have a few tips that may make it easier! You may have heard of some of these, but you may be surprised by a few as well!</description>
      <content:encoded>&lt;h3&gt;&#xD;
  
                  
         Work efficiently with Windows 10
        
                &#xD;
&lt;/h3&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/windows-10.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  
                  
         Do you ever seem to have way too many windows open on your PC? Wish it were easier to multitask on your computer? Today we have a few tips that may make it easier! You may have heard of some of these, but you may be surprised by a few as well!
         
                  &#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
           Make these windows…disappear!
          
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          Sometimes, you just need to clear the clutter, or take a moment to admire that lovely picture of a sunny beach that you set as your wallpaper before getting back to work. Just open your settings, open Personalization and then Taskbar, and activate “Use peek to preview the desktop.” Next time you need a break, use your mouse to hover or click on the bottom right-hand corner of your screen. Move your mouse or click again and you’re back to work!
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
           Shaking?  
          
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          Do you have a ton of windows open, but just want to look at one of them? Just select a window that you want  and shake it up and down a few times. The windows you don’t want will be minimized and out of your way for the time being. If you can’t get it at first, be patient. This one takes practice! Want to resurrect those windows? Just shake the open window one more time.
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
           Alt+Tab no more
          
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          Are you still using the key combination Alt+Tab to swap windows? Ever get the feeling that there is a better way? Well, there is. Try pressing the windows key plus the tab key at the same time to get a lovely overview of everything that you have going on. 
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          We hope you’ve enjoyed these tips, stay tuned for more!
         
                  &#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/windows-10-87d8d999.jpg" length="87580" type="image/png" />
      <pubDate>Wed, 04 Sep 2019 20:34:13 GMT</pubDate>
      <guid>https://www.ev-consultech.com/3-tips-for-using-windows-10-more-efficiently</guid>
      <g-custom:tags type="string">Windows 10,Tips,Tricks</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/windows-10.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/windows-10-87d8d999.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>NYC Cybersecurity Conference</title>
      <link>https://www.ev-consultech.com/nyc-cybersecurity-conference</link>
      <description>New York City for a Cybersecurity conference put on by Data Connectors. It was a great opportunity for us to hear from industry leaders in both the public and private sectors, and to interact with other Cybersecurity professionals.</description>
      <content:encoded>&lt;h3&gt;&#xD;
  
                  
         Data Connectors Cybersecurity Conference
        
                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  
                  
         Last week, members of our team traveled to New York City for a Cybersecurity conference put on by Data Connectors. It was a great opportunity for us to hear from industry leaders in both the public and private sectors, and to interact with other Cybersecurity professionals.
        
                &#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/cyber_conference.jpg" alt="NYC Cybersecurity Conference" title="Cybersecurity Conference"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  
                  
         The threats that face your business are constantly changing. We must constantly change to meet them. Events like this are a large part of how we do that.
        
                &#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/cyber_conference.jpg" length="240001" type="image/jpeg" />
      <pubDate>Wed, 04 Sep 2019 20:25:52 GMT</pubDate>
      <guid>https://www.ev-consultech.com/nyc-cybersecurity-conference</guid>
      <g-custom:tags type="string">Cybersecurity,Security,Cyber,IT Services,MSP,Professionals,Professionals</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/cyber_conference.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/cyber_conference.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Keep in touch with site visitors and boost loyalty</title>
      <link>https://www.ev-consultech.com/keep-in-touch-with-site-visitors-and-boost-loyalty</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    There are so many good reasons to communicate with site visitors. Tell them about sales and new products or update them with tips and information.
  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    Here are some reasons to make blogging part of your regular routine.
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
      Blogging is an easy way to engage with site visitors
    
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    Writing a blog post is easy once you get the hang of it. Posts don’t need to be long or complicated. Just write about what you know, and do your best to write well.
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;b&gt;&#xD;
    
                    
    Show customers your personality
  
                  &#xD;
  &lt;/b&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    When you write a blog post, you can really let your personality shine through. This can be a great tool for showing your distinct personality.
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;b&gt;&#xD;
    
                    
    Blogging is a terrific form of communication
  
                  &#xD;
  &lt;/b&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    Blogs are a great communication tool. They tend to be longer than social media posts, which gives you plenty of space for sharing insights, handy tips and more.
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;b&gt;&#xD;
    
                    
    It’s a great way to support and boost SEO
  
                  &#xD;
  &lt;/b&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    Search engines like sites that regularly post fresh content, and a blog is a great way of doing this. With relevant metadata for every post so  search engines can find your content.
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;b&gt;&#xD;
    
                    
    Drive traffic to your site
  
                  &#xD;
  &lt;/b&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    Every time you add a new post, people who have subscribed to it will have a reason to come back to your site. If the post is a good read, they’ll share it with others, bringing even more traffic!
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;b&gt;&#xD;
    
                    
    Blogging is free
  
                  &#xD;
  &lt;/b&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    Maintaining a blog on your site is absolutely free. You can hire bloggers if you like or assign regularly blogging tasks to everyone in your company.
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;b&gt;&#xD;
    
                    
    A natural way to build your brand
  
                  &#xD;
  &lt;/b&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    A blog is a wonderful way to build your brand’s distinct voice. Write about issues that are related to your industry and your customers.
  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irt-cdn.multiscreensite.com/md/dmtmpl/dms3rep/multi/man_walking_street.jpg" length="285531" type="image/jpeg" />
      <pubDate>Fri, 23 Aug 2019 02:29:08 GMT</pubDate>
      <author>jrodriguez@axxiomdata.com (Juan Rodriguez)</author>
      <guid>https://www.ev-consultech.com/keep-in-touch-with-site-visitors-and-boost-loyalty</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irt-cdn.multiscreensite.com/md/dmtmpl/dms3rep/multi/man_walking_street.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irt-cdn.multiscreensite.com/md/dmtmpl/dms3rep/multi/man_walking_street.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Tips for writing great posts that increase your site traffic</title>
      <link>https://www.ev-consultech.com/tips-for-writing-great-posts-that-increase-your-site-traffic</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    Write about something you know. If you don’t know much about a specific topic that will interest your readers, invite an expert to write about it.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irt-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/desktop/photo-1455849318743-b2233052fcff.jpg" alt="" title=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;b&gt;&#xD;
    
                    
                    
    Speak to your audience
  
                  
                  &#xD;
  &lt;/b&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    You know your audience better than anyone else, so keep them in mind as you write your blog posts. Write about things they care about. If you have a company Facebook page, look here to find topics to write about
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;b&gt;&#xD;
    
                    
                    
    Take a few moments to plan your post
  
                  
                  &#xD;
  &lt;/b&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    Once you have a great idea for a post, write the first draft. Some people like to start with the title and then work on the paragraphs. Other people like to start with subtitles and go from there. Choose the method that works for you.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;b&gt;&#xD;
    
                    
                    
    Don’t forget to add images
  
                  
                  &#xD;
  &lt;/b&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    Be sure to include a few high-quality images in your blog. Images break up the text and make it more readable. They can also convey emotions or ideas that are hard to put into words.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;b&gt;&#xD;
    
                    
                    
    Edit carefully before posting
  
                  
                  &#xD;
  &lt;/b&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    Once you’re happy with the text, put it aside for a day or two, and then re-read it. You’ll probably find a few things you want to add, and a couple more that you want to remove. Have a friend or colleague look it over to make sure there are no mistakes. When your post is error-free, set it up in your blog and publish.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irt-cdn.multiscreensite.com/md/dmtmpl/dms3rep/multi/woman_coffee_street.jpg" length="417830" type="image/jpeg" />
      <pubDate>Fri, 23 Aug 2019 02:29:08 GMT</pubDate>
      <author>jrodriguez@axxiomdata.com (Juan Rodriguez)</author>
      <guid>https://www.ev-consultech.com/tips-for-writing-great-posts-that-increase-your-site-traffic</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irt-cdn.multiscreensite.com/md/dmtmpl/dms3rep/multi/woman_coffee_street.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irt-cdn.multiscreensite.com/md/dmtmpl/dms3rep/multi/woman_coffee_street.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Making a difference in our community, one computer at a time</title>
      <link>https://www.ev-consultech.com/making-a-difference-in-our-community-one-computer-at-a-time</link>
      <description>Making a difference in our community, one computer at a time</description>
      <content:encoded>&lt;h3&gt;&#xD;
  
                  
         Manage IT Services at work!
        
                &#xD;
&lt;/h3&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/LAcityclub.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  
                  
         This past Wednesday (July 17, 2019), we had the opportunity to represent ourselves at the
         
                  &#xD;
  &lt;a href="https://www.clubcorp.com/Clubs/City-Club-Los-Angeles/Our-Story/Calendar/Business-Tech-Conference-Empowering-Rapid-Business-Growth-Through-Advanced-Business-Tech" target="_blank"&gt;&#xD;
    
                    
          Business Tech Conference
         
                  &#xD;
  &lt;/a&gt;&#xD;
  
                  
         , hosted by the Los Angeles City Club. The event drew nearly 200 LA business and tech professionals to the club’s beautiful 51st story event center. We were able to showcase two important aspects of what we do.
         
                  &#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          First, we specialize in offering Information Technology Services to local businesses with a ample dose of friendly customer service and individualized attention. This is something our larger competitors simply cannot do.
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          More importantly, we were able to spread the word about
          
                    &#xD;
    &lt;a href="https://handscomputers.weebly.com/" target="_blank"&gt;&#xD;
      
                      
           Helping Hands Computers,
          
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
          a non-profit we are heavily involved in. If you have never heard of Helping Hands, it is a Christian ministry located in the Pasadena area dedicated to supplying free refurbished computers and laptops to children and families in need. We strongly believe that computers empower people to stay current and productive. Our company’s role is to collect the following donations from generous individuals and organizations.
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;ul&gt;&#xD;
      &lt;li&gt;&#xD;
        
                        
            Desktops
           
                      &#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        
                        
            Monitors
           
                      &#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        
                        
            Mice and Keyboards
           
                      &#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        
                        
            Laptops
           
                      &#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        
                        
            Printers
           
                      &#xD;
      &lt;/li&gt;&#xD;
    &lt;/ul&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          The condition of these items does not matter. We either repair the hardware or responsibly E-Waste what is left over. Any and all hard drives we receive will be securely wiped of all data to Department of Defense standards: we want to protect our donor’s privacy and security. We re-purpose the finished computers by installing GNU/Linux operating systems and other free software that is optimized for day to day computing. We would love it if you would visit the
          
                    &#xD;
    &lt;a href="https://handscomputers.weebly.com/" target="_blank"&gt;&#xD;
      
                      
           Helping Hands
          
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
          website and consider donating some of your old tech!
         
                  &#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/LAcityclub.jpg" length="45607" type="image/jpeg" />
      <pubDate>Sat, 20 Jul 2019 02:31:26 GMT</pubDate>
      <guid>https://www.ev-consultech.com/making-a-difference-in-our-community-one-computer-at-a-time</guid>
      <g-custom:tags type="string">Helping Hands,Computer,Donation,Business,Tech,Conference</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/LAcityclub.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/LAcityclub.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>A Cyberattack Hobbles Atlanta, and Security Experts Shudder</title>
      <link>https://www.ev-consultech.com/a-cyberattack-hobbles-atlanta-and-security-experts-shudder</link>
      <description>ATLANTA — The City of Atlanta’s 8,000 employees got the word on Tuesday that they had been waiting for: It was O.K. to turn their computers on.  

But as the city government’s desktops, hard drives and printers flickered back to life for the first time in five days, residents still could not pay their traffic tickets or water bills online, or report potholes or graffiti on a city website. Travelers at the world’s busiest airport still could not use the free Wi-Fi.</description>
      <content:encoded>&lt;h3&gt;&#xD;
  
                  
         Cyberattack Hobbles Atlanta
        
                &#xD;
&lt;/h3&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/28atlanta-superJumbo-v2.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  
                  
         ATLANTA — The City of Atlanta’s 8,000 employees got the word on Tuesday that they had been waiting for: It was O.K. to turn their computers on.  
         
                  &#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          But as the city government’s desktops, hard drives and printers flickered back to life for the first time in five days, residents still could not pay their traffic tickets or water bills online, or report potholes or graffiti on a city website. Travelers at the world’s busiest airport still could not use the free Wi-Fi.  
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;a href="https://www.nytimes.com/2018/03/27/us/cyberattack-atlanta-ransomware.html"&gt;&#xD;
      
                      
           Read More
          
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/28atlanta-superJumbo-v2.jpg" length="39701" type="image/jpeg" />
      <pubDate>Wed, 26 Jun 2019 03:06:01 GMT</pubDate>
      <author>jrodriguez@axxiomdata.com (Juan Rodriguez)</author>
      <guid>https://www.ev-consultech.com/a-cyberattack-hobbles-atlanta-and-security-experts-shudder</guid>
      <g-custom:tags type="string">Cyberattack,Security,Breach,Attack</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/28atlanta-superJumbo-v2.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/28atlanta-superJumbo-v2.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>4 Things You Need to Do to Ensure Secure File-Sharing at Your Company</title>
      <link>https://www.ev-consultech.com/4-things-you-need-to-do-to-ensure-secure-file-sharing-at-your-company</link>
      <description>4 Things You Need to Do to Ensure Secure File-Sharing at Your Company</description>
      <content:encoded>&lt;h3&gt;&#xD;
  
                  
         Secure File-Sharing
        
                &#xD;
&lt;/h3&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/secure-file-sharing.png" alt="Secure File Sharing"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          In a survey by Biscom, 95 percent of employees polled said they were able to take from their companies data they didn’t work on themselves. This scenario occurs despite the methods companies have put into place to transfer data in and out of their companies securely.
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          Related: 10 Data-Security Measures You Can't Do Without
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          Most businesses already rely on file-sharing software to ensure the effective communication and transfer of confidential documents within their offices. But those businesses now rely heavily on the internet for file storage and communication, too.
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          And, unbeknownst to most people, much of this online data is stored by their internet service provider (ISP), thus making a company's files, passwords and communication vulnerable. Having these company files get into the wrong hands can lead to serious problems like identity theft or even fraud.
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          Certainly, file-sharing services come with several benefits, like the ability to transfer larger files. However, the ease with which files can be shared within the office environment leaves them vulnerable to threat.
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          How can you prevent your files from being transferred to unauthorized people? And, as a business owner, what can you do to make sure your business isn’t at risk of having its sensitive documents compromised? Here are four things you need to know about file-sharing in your company.
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;a href="https://www.entrepreneur.com/article/315793?utm_campaign=syndication&amp;amp;utm_medium=related&amp;amp;utm_source=applenews" target="_blank"&gt;&#xD;
      
                      
           Read More
          
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/secure-file-sharing.png" length="52802" type="image/png" />
      <pubDate>Tue, 03 Jul 2018 20:46:21 GMT</pubDate>
      <guid>https://www.ev-consultech.com/4-things-you-need-to-do-to-ensure-secure-file-sharing-at-your-company</guid>
      <g-custom:tags type="string">File Sharing,Secure,Security</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/secure-file-sharing.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/secure-file-sharing.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Phishing Your Employees for Security</title>
      <link>https://www.ev-consultech.com/phishing-your-employees-for-security</link>
      <description>Employees are the weakest link when it comes to enterprise security, and unfortunately hackers realized this years ago. All an attacker needs to use some social engineering tactics against employees of companies and organizations they want to target.</description>
      <content:encoded>&lt;h3&gt;&#xD;
  
                  
         Phishing Your Employees
        
                &#xD;
&lt;/h3&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/fishing%2Byour%2Bemployees.PNG"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  
                  
         Employees are the weakest link when it comes to enterprise security, and unfortunately hackers realized this years ago. All an attacker needs to use some social engineering tactics against employees of companies and organizations they want to target. 
         
                  &#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
          A massive 91% of successful data breaches at companies started with a social engineering and spear-phishing attack. A phishing attack usually involves an e-mail that manipulates a victim to click on a malicious link that could then expose the victim’s computer to a malicious payload.
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          So what is the missing link to manage the problem of employees being Social engineered?
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          The answer is very simple – Educate your Employees and reinforce good security procedures at the same time.
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          Phish your Employees!
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;a href="https://thehackernews.com/2015/07/phishing-security-test.html" target="_blank"&gt;&#xD;
      
                      
           Read More
          
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/fishing%2Byour%2Bemployees.PNG" length="143583" type="image/png" />
      <pubDate>Fri, 29 Jun 2018 03:18:37 GMT</pubDate>
      <guid>https://www.ev-consultech.com/phishing-your-employees-for-security</guid>
      <g-custom:tags type="string">Phishing,Employees,Security</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/fishing%2Byour%2Bemployees.PNG">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/fishing%2Byour%2Bemployees.PNG">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Cumulative update brings fixes for Windows 10 April 2018 Update PCs</title>
      <link>https://www.ev-consultech.com/cumulative-update-brings-fixes-for-windows-10-april-2018-update-pcs</link>
      <description>Microsoft is pushing another round of fixes out to April 2018 Update PCs

We're two weeks past June's monthly Patch Tuesday release, but Microsoft is issuing another range of fixes for PCs on the latest version of Windows 10. Cumulative update KB4284848 is now rolling out for the Windows 10 April 2018 Update, ticking the build number up to version 17134.137 with a lengthy list of bug fixes.</description>
      <content:encoded>&lt;h3&gt;&#xD;
  
                  
         Cumulative Updates on Windows 10
        
                &#xD;
&lt;/h3&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp-cdn.multiscreensite.com/md/dmtmpl/dms3rep/multi/blog_post_image.png"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  
                  
         We're two weeks past June's monthly Patch Tuesday release, but Microsoft is issuing another range of fixes for PCs on the latest version of Windows 10. Cumulative update KB4284848 is now rolling out for the Windows 10 April 2018 Update, ticking the build number up to version 17134.137 with a lengthy list of bug fixes.  
         
                  &#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          Microsoft is pushing another round of fixes out to April 2018 Update PCs
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          We're two weeks past June's monthly Patch Tuesday release, but Microsoft is issuing another range of fixes for PCs on the latest version of Windows 10. Cumulative update KB4284848 is now rolling out for the Windows 10 April 2018 Update, ticking the build number up to version 17134.137 with a lengthy list of bug fixes.
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          Here's a look at what's new:
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;ul&gt;&#xD;
      &lt;li&gt;&#xD;
        
                        
            Addresses an issue that causes the Video Settings HDR streaming calibration slider to stop working. This is caused by a conflict with the panel brightness intensity settings configured by certain OEMs.
           
                      &#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        
                        
            Addresses streaming compatibility issues with certain live TV streaming content providers.
           
                      &#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        
                        
            Addresses an issue where media content previously generated by Media Center doesn't play after installing the Windows 10 April 2018 update.
           
                      &#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        
                        
            Addresses an issue in which SmartHeap didn't work with UCRT.
           
                      &#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        
                        
            Addresses performance regression in App-V, which slows many actions in Windows 10.
           
                      &#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        
                        
            Addresses an issue that causes Appmonitor to stop working at logoff if the Settingstoragepath is set incorrectly.
           
                      &#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        
                        
            Addresses an issue that causes Appmonitor to stop working at logoff, and user settings are not saved.
           
                      &#xD;
      &lt;/li&gt;&#xD;
    &lt;/ul&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;a href="https://www.windowscentral.com/cumulative-update-brings-fixes-windows-10-april-2018-update-pcs" target="_blank"&gt;&#xD;
        
                        
            Read More
           
                      &#xD;
      &lt;/a&gt;&#xD;
    &lt;/div&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/cumulative-update.jpg" length="24429" type="image/jpeg" />
      <pubDate>Thu, 28 Jun 2018 07:00:00 GMT</pubDate>
      <guid>https://www.ev-consultech.com/cumulative-update-brings-fixes-for-windows-10-april-2018-update-pcs</guid>
      <g-custom:tags type="string">Windows 10,Updates,Bugs</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/cumulative-update.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/cumulative-update.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>OFFICE 365 USERS TARGETED IN NEW PHISHING SCAM</title>
      <link>https://www.ev-consultech.com/office-365-users-targeted-in-new-phishing-scam</link>
      <description>Recognizing phishing emails and implementing a strong defense system are ways to protect you and your company against the new Office 365 threat. Contact your IT  team for more tips on how to spot this type of scam and plan security measures.</description>
      <content:encoded>&lt;h3&gt;&#xD;
  
                  
         Phishing Scam
        
                &#xD;
&lt;/h3&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/office-365-phishing-scam-alert.png" alt="Phishing Scan" title="Blog Article"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  
                  
         Recognizing phishing emails and implementing a strong defense system are ways to protect you and your company against the new Office 365 threat. Contact your IT  team for more tips on how to spot this type of scam and plan security measures.
         
                  &#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          There are more than 100 million active subscribes of Office 365, which has inevitably attracted the attention of hackers who’ve revamped an deep-rooted trick. The distinctly targeted and thoughtfully-crafted lance phishing attack is even more difficult to identify. Here’s what you need to know.
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          The new threat uses spear-phishing, an old trick in which hackers send emails pretending to be from trusted sources and trick you into disclosing sensitive information. The e-mail messages are harder to spot because they are free of the usual telltale signs like misspelled words and suspicious attachments. You may need to update your knowledge about phishing scams because this new threat is well-disguised.
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/b&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
           How does it work?
          
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          The hackers, pretending to be from trusted sources, create personalized messages to send to your inbox. The messages may contain a link or PDF file that leads to a non-suspicious landing page. The user is prompted to enter their credentials, which hackers then use to dispatch attacks within the organization.
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          As for the phishing emails with PDF attachments, the document may be locked and prompt you to enter a username and password to view the document. Once you do, your account is compromised and no longer yours. They may also send an invoice that requires you to log on to view the file which can be used to trick you into forward sensitive information.
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
           What can you do?
          
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          It’s important to use multi-factor authentication to secure your account. The function exists within Office 365. Here is a step-by-step guide on how to activate it.
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          Training yourself and employees to spot common phishing techniques is vital. Make sure you verify the accuracy of the wording and sensibility of the requests. For added measure, your company can install an email-validation system designed to detect and prevent email spoofing.
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          Recognizing phishing emails and implementing a strong defense system are ways to protect you and your company against the new Office 365 threat. Contact your IT  team for more tips on how to spot this type of scam and plan security measures.
         
                  &#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/office-365-phishing-scam-alert.png" length="8130" type="image/png" />
      <pubDate>Tue, 26 Jun 2018 03:11:09 GMT</pubDate>
      <author>jrodriguez@axxiomdata.com (Juan Rodriguez)</author>
      <guid>https://www.ev-consultech.com/office-365-users-targeted-in-new-phishing-scam</guid>
      <g-custom:tags type="string">Office 365,Phishing,Scam,Security</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/office-365-phishing-scam-alert.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/office-365-phishing-scam-alert.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Office 365 Training Tips</title>
      <link>https://www.ev-consultech.com/office-365-training-tips</link>
      <description>Due to high demand for Office 365 training materials, we have joined Microsoft and LinkedIn to start providing basic tips to help you and your staff improve their Office 2016 skills. We hope you find these tips helpful.</description>
      <content:encoded>&lt;h3&gt;&#xD;
  
                  
         Training Tips
        
                &#xD;
&lt;/h3&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/Office365-Training.jpg" alt="Office 365 Training" title="Training Tips Office 365"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  
                  
         Due to high demand for Office 365 training materials, we have joined Microsoft and LinkedIn to start providing basic tips to help you and your staff improve their Office 2016 skills. We hope you find these tips helpful.  
         
                  &#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          Did you know that Microsoft Office 2016 is always up to date with the latest features? Use this email to learn about how Outlook, Excel, Word, and PowerPoint can take your productivity to the next level.  
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          Here’s what you can do
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          Get started and get access to your emails by adding your email accounts to Outlook. 
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;a href="https://support.office.com/en-us/article/video-add-an-outlook-com-or-office-365-account-7c031aff-0ceb-435a-ada9-a389cfc8ddca?ui=en-US&amp;amp;rs=en-US&amp;amp;ad=US" target="_blank"&gt;&#xD;
      
                      
           Watch the video
          
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          Easily let business contacts and coworkers know when you’re away by setting an out-of-office reply. 
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;a href="https://support.office.com/en-us/article/video-set-up-an-automatic-reply-cc0e480f-973e-4412-a27b-8a52108d6d51?ui=en-US&amp;amp;rs=en-US&amp;amp;ad=US" target="_blank"&gt;&#xD;
      
                      
           Watch the video
          
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          Add a personal touch to outgoing emails by creating an email signature. 
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;a href="https://support.office.com/en-us/article/video-create-an-email-signature-31fb24f9-e698-4789-b92a-f0e777f774ca?ui=en-US&amp;amp;rs=en-US&amp;amp;ad=US" target="_blank"&gt;&#xD;
      
                      
           Watch the video
          
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;a href="https://support.office.com/en-us/article/outlook-training-8a5b816d-9052-4190-a5eb-494512343cca?ui=en-US&amp;amp;rs=en-US&amp;amp;ad=US"&gt;&#xD;
      
                      
           Get even more Outlook tips
          
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/Office365-Training.jpg" length="21964" type="image/jpeg" />
      <pubDate>Wed, 08 Nov 2017 04:00:19 GMT</pubDate>
      <guid>https://www.ev-consultech.com/office-365-training-tips</guid>
      <g-custom:tags type="string">Office 365,Training,Tips</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/Office365-Training.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/Office365-Training.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Cybersecurity Tips</title>
      <link>https://www.ev-consultech.com/cybersecurity-tips</link>
      <description>Stronger cybersecurity has become a global priority over the last few years as hackers penetrate the IT infrastructure of government and enterprises with increasing frequency and sophistication. According to a study conducted by the Identify Theft Resources Center, the total number of data breaches reported in the US grew from approximately 400 in 2011 to approximately 750 in 2015.</description>
      <content:encoded>&lt;h3&gt;&#xD;
  
                  
         Cybersecurity Tips
        
                &#xD;
&lt;/h3&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/cyber-security-tips.png"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  
                  
         According to a PricewaterhouseCoopers survey, in 2014, 69% of business executives expressed concern about cyber threats, including a lack of data security. In 2015, an updated survey increased that number to 86%.1 These numbers indicate that it’s clear there’s a pressing need for better cybersecurity. The issue is not going away anytime soon. If anything, it’s only getting worse.
         
                  &#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          Stronger cybersecurity has become a global priority over the last few years as hackers penetrate the IT infrastructure of government and enterprises with increasing frequency and sophistication. According to a study conducted by the Identify Theft Resources Center, the total number of data breaches reported in the US grew from approximately 400 in 2011 to approximately 750 in 2015. This represents an increase of more than 60% and does not include breaches that went unreported—a fgure that is likely much higher.1 Coupled with the Internet of Things (IoT) and the explosive growth of mobile devices, the threat landscape and potential for data leaks is even more significant
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          cybersecurity.PNG
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          Partnering with a Managed Services Provider (MSP) that focuses on IT security can bolster your cybersecurity defenses. This is especially true when it comes to end user error. All the tools and solutions in the world won’t protect your business from every attack. Human error is still highly dangerous, and many employees grow complacent at some point as they fail to follow best practices.
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          Here’s a sampling of the benefts a mobile device management MSP can provide:
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          • Keeps employee devices updated with the latest antivirus and antimalware software.
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          • Applies updates to programs and applications when new versions and fxes become available.
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          • Applies operating system patches when frst available on a regular schedule that you can confgure.
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          • Provides security assessments to identify weaknesses in your existing mobile security program.
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          • Offers guidance on how to mitigate any mobile security program risks
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          As your business begins the journey to enhance its cybersecurity posture, it all starts with educating your employees. The tips provided within this eBook along with some basic common sense can go a long way in making sure sensitive information does not fall into the wrong hands.
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          Succeeding in applying the necessary cybersecurity measures is paramount to your long-term business success. In today’s world of advanced hackers, who revel in breaching corporate networks, confdential information will always be at risk. Businesses must take the necessary steps to protect their intellectual property, their confdential information and their reputations while also safeguarding their employees, customers and business partners.
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          Proactively identify and thwart potential attacks as well as react expediently if a successful attack occurs. This is where a managed IT services provider can assist. They eliminate the need for your business to keep up on the latest antivirus, antimalware and alert technologies. You also don’t need to expend the necessary resource time to deploy and manage such solutions, which often fall beyond the bandwidth and expertise of internal teams.
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          eBook: Cybersecurity Tips for Employees 
         
                  &#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/cyber-security-tips.png" length="14361" type="image/png" />
      <pubDate>Tue, 24 Oct 2017 20:58:48 GMT</pubDate>
      <author>jrodriguez@axxiomdata.com (Juan Rodriguez)</author>
      <guid>https://www.ev-consultech.com/cybersecurity-tips</guid>
      <g-custom:tags type="string">CyberSecurity,Tips,Tricks</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/cyber-security-tips.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/7ed1db60/dms3rep/multi/cyber-security-tips.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
  </channel>
</rss>
