(630) 844-9434 info@trtechnologies.net

All About Windows 10 Version 1803

All About Windows 10 Version 1803 aka Windows 10 April 2018 Update On April 30th, Microsoft is releasing the newest update to Windows 10 Version 1803. In this update there are some new features that have been added, as well as some features that have been removed. The following discusses the release date and rollout, features and changes with this update, how to get the update, how to delay installation of the update, known bugs of the update, and how to remove Windows 10 Version 1803. Release Date and Rollout of Windows 10 Version 1803 Microsoft announced that April 30th will be the release date of this update 1803. Beginning on April 30th, devices that are deemed ready for the update by Microsoft will start to see the update available. Following these devices, then Microsoft will begin rolling out the update to other devices. Features and Changes There are many feature updates available and are listed here. For further description of each however, visit Microsoft’s site. Additionally, this page on ZDNet’s site is also a very good reference. The following is a list of features added Windows Autopilot Windows 10 in S mode Windows 10 kiosk and Kiosk Browser Windows 10 Subscription Activation DISM Commands Windows Setup SetupDiag Windows Update for Business (WUfB) Feature update improvements Co-management OS uninstall period Windows Hello for Business Accessibility Privacy Security Baselines Windows Defender Antivirus Windows Defender Exploit Guard Windows Defender ATP Windows Defender Application Guard Windows Defender Device Guard Windows Information Protection Office 365 Ransomware Detection Upgrade Readiness Update Compliance Device Health Microsoft Edge for iOS and Android The following list is...

How to Turn On or Off the Focused Inbox

As of December 22, 2017, Microsoft Office 365 has completely replaced the clutter folder for email with the focused and other views for the inbox. What this means for you is that if you were using clutter, it will no longer exist as a separate folder and any items that were previously destined for the clutter folder, will now remain in the inbox but will show up with under the view of ‘other’. The default view of ‘focused’ will now contain your important emails and the ‘other’ view will be a view of emails determined to be less important. This feature of focused or clutter has existed since November 11, 2014, but not all users have noticed this experience. Over the past few weeks, more and more users have had this feature added to their Outlook view. Why was this introduced? The clutter feature added a separate folder that had to be checked. If important emails were inadvertently directed to the clutter folder, they potentially could have gotten missed. Obviously, there were a lot of people that didn’t like this feature. With the focused/other views, the clutter feature has been changed into a view of items that are now not moved but all remain in the inbox. This view can be turned on or off. How to Turn On or Off the Focused Inbox This feature can be turned off for different platforms following this article. In most cases in Outlook, Select the View tab. Select Show Focused Inbox. If the ‘Show Focused Inbox’ is turned off, the Focused and Other tabs will disappear from the top of your...

How to Join an Android Phone to Office 365 Exchange Online Email

On your phone, you’ll need to do the following: Click the Apps button Find Settings and tap the Settings button Tap Accounts   Tap +Add account   Tap Exchange   Enter your email then tap NEXT >   Type your password then tap NEXT >   Tap NEXT > again At Redirect request, click OK Tap NEXT > At Remote security administration, click OK Click ACTIVATE Tap NEXT...

How to Prevent Business Identity Theft

Can Identity Theft Affect Your Business? How to Prevent Business Identity Theft Identity theft is becoming more and more common in the digital age, with around 7% of American adults affected each year. Amid the huge data breaches from the likes of Yahoo! and LinkedIn, a serious and growing issue is being swept under the rug–business identity theft. This underexposed crime is particularly concerning, because it tends to target small and medium-sized businesses more often, since they don’t have the same security mechanisms as their larger rivals. What Is Business Identity Theft? In its most simple sense, identity theft occurs when someone pretends to be someone else, usually for nefarious means. In the business context, it usually involves a thief accessing a business’s sensitive information, often through social engineering, and then using that to impersonate the business for financial gain. Thieves may steal credentials from unwitting employees or even falsify records to gain access. Business identity theft can involve many different scams, such as criminals opening new accounts under the name of the business, draining funds from existing accounts, and even establishing lines of credit for fraudulent transactions. Business identity theft can be tremendously destructive. It can ruin a business’s credit rating and make it much more difficult to access loans. Companies don’t just have to worry about the theft of their own assets, but also the theft of any personal data from customers. Data breaches can be damaging to a brand’s reputation and expensive to deal with.  Why Are Businesses Being Targeted? Business identity theft is becoming popular with criminals because there are several characteristics that make it...

9 Essential Items When Creating a Small Business Network Yourself

9 Essential Items When Creating a Small Business Network Yourself Essential Items Creating Small Business Network Yourself When designing a computer network for a small business these following items must be considered.  When all pieces are in place, you will have a network that is reliable, scalable, and efficient. Network Switch This is what makes the whole thing work.  All devices that will be connected to the network connect to this piece of equipment.  This device is crucial for allowing more than one network device communicate with other network devices.  This can also include wireless access points that allow wireless network devices to connect with the network. Firewall/Router This device is what connects your network to the Internet and protects your local network from Internet traffic.  These can be separate devices.  Most simply put, the router directs all network traffic.  It takes information from one computer and knows how to make that information go to another computer. The firewall is the device that determines what the information is and if it should allow information to go from one computer to another.  The firewall and the router are two separate entities; however you will often see these packaged in one single device. Server A server is the central computer that handles the needs of all the network devices.   In most cases a server acts as a central file location.  It can also perform the duties of a database, an email server, and a print server. Disaster Recovery Plan and Devices Disaster recovery consists of having backup devices and plans in place in case something does go wrong.  This will usually...

Considerations for Your Data Backup Plan

Your data is your businesses biggest asset. What would happen to your business if all of your data was compromised and lost, either partially or completely? Would you be able to recover from this kind of data loss? Having a backup plan is the first step in protecting this valuable asset. You can save yourself time, money, and stress by starting a plan and sticking to that plan. The following are the basic things to consider when developing a data backup plan. Audit your data for requirements When you only have one shared drive, or you only need a single copy of a shared folder, backups are not too involved and are pretty simple to plan for and run. However, once you start adding mail servers, databases, separate servers, different directories, and have different retention periods or archival purposes, backups can start to get more complicated and what’s needed to perform those backups becomes more complicated as well. Performing an audit of your data and requirements can give you a clearer picture of your backups and what to include in your backup plan. When performing your audit, make sure to inventory all the servers that need to be backed up, what function each server holds, as an example if it’s a database server, a mail server, a file server, etc., and how far you need to go back to retrieve data before it’s no longer needed.  Once this is determined you can find software or a service provider that will adhere to these requirements. What will you backup to? With faster Internet speeds and with storage becoming so inexpensive,...