On Wednesday, Mecklenburg County, North Carolina’s most populous county, announced it has bet big on the Microsoft platform by selecting Microsoft Office 365 as its communications and collaboration platform, Windows Azure as its cloud storage solution, and Microsoft Surface Pro for its mobility needs.
Together, the seamless mobility, productivity and flexibility aspects of these solutions have already helped various departments within the county collaborate better with staff, integrate across a number of crucial systems, and streamline and improve daily responsibilities. For instance, the county’s Youth and Family Services department is reporting $3.2 million in productivity savings per year due to Mecklenburg’s Surface Pro pilot launch. Meanwhile, by switching to Windows Azure, the county’s cloud storage costs have reduced dramatically.
“With the mobility factor of Surface Pro and Office 365, we are able to do so much more,” said Cliff DuPuy, technical services director at Mecklenburg County. “Not only do our Youth and Family Services folks love the devices for the flexibility and productivity the combination provides to them, but they appreciate the toughness of the devices, the touch aspects and the ability to document benefits while they are visiting clients. We are working toward ensuring that all our employees have their own device, and we can’t keep up with the demand we’re receiving from excited workers. It really has helped to increase their enthusiasm around how they do their jobs.”
Just as important, the county’s technical services director, Cliff Dupuy, acknowledged that these modern devices and services have increased employee productivity and excitement. In addition, the investment in Microsoft technology enables the county to reap all the benefits of the cloud while maintaining its commitment to privacy and security.
In addition to the Department of Youth and Family Services, a number of other departments within the county have recognized the value and mobility benefits provided by the Surface devices when combined with Office 365 and custom-built apps specific to each line of business. For example, the county’s Food Services Department has used these solutions to ensure Food and Restaurant Inspectors can utilize state applications, while the county’s Medical Examiners are benefitting from the note-taking abilities with their tablets. Meanwhile, Mecklenburg County’s Parks and Recreation employees, all of whom are moving to Surface 2 devices, are using these solutions to help them collect payments, book venues easily and tie seamlessly into the county’s financial system. In addition, due to an overwhelming demand for more devices, the county will increase the number of Surface Pro devices it is using to more than 1,000 by Aug. 1, 2014.
With 1.6 million emails sent per day by county employees, the cloud storage that Office 365 provides and the ability for employees to use Office on up to five devices has proved beneficial to all levels of employees within the organization. The emphasis on privacy and security in the cloud was a driving factor for the county to select the Microsoft solution. Similarly, the ability to use Surface Pro tablets with Office 365 has been a killer combination for the county: The Youth and Family Services Department is reporting $3.2 million in productivity savings per year after participating in the county’s Surface Pro pilot launch.
Selecting Windows Azure for its cloud storage was a natural fit for the county — its interoperation with Office 365 and Surface makes the user experience seamless. In addition, with key disaster recovery capabilities, Windows Azure makes more sense from a planning perspective, but also from a cost savings point of view. For instance, the county can ramp up quickly and take significant workloads out of its local datacenters, saving significant dollars.
“The cost savings with Windows Azure are tremendous,” DuPuy said. “Our storage costs used to be $21 per GB; now, with Windows Azure, we are around 30 cents per GB.”
“Mecklenburg County is leading the way in harnessing the power of the cloud and new mobile device form factors to deliver better government services to citizens, while at the same time lowering costs,” said Michael Donlan, vice president of Microsoft’s State and Local Government business. “Whether it’s field inspection, delivering better services to youth and families, or making it easier for business and citizens to enjoy the county’s parks and venues, Mecklenburg is using Office 365, Windows Azure and Surface to transform the business of government all within a solution that best meets their requirements for security and privacy.”
Across the board, county employees have embraced the switch to the cloud, and they have been vocal in their support.
“We have people telling us on a consistent basis that these mobile and flexible solutions, tightly tied together, have collectively changed their working lives,” DuPuy said. “Whether they have used these tools in the past, or they are just learning the breadth of Microsoft’s capabilities, we’ve consistently heard that our teams are really enjoying the new lease on productivity and efficiencies that they now have. That’s really humbling for us IT folks.”
Across the nation, state and local governments are constantly pressured to deliver more services with fewer resources. They are tasked with finding and investing in modern and secure solutions that help them save time and money, while ensuring employees can use these tools in the office and on the go. With Microsoft’s suite of solutions, Mecklenburg County is helping address these challenges.
This very unsuspecting phone charger is actually a Spy Device that was built to sniff out all the keystrokes off your wireless keyboard. Yes this little tricky fake charger is known as a Key Sweeper and its whole purpose is to find out your private personal information like email, password, social security and credit card numbers. Obviously the list can go on and on when put in the hands of a maleficent being. Currently it can only be used on Microsoft Wireless keyboard that specifically use 2.4 ghz.
This charger lights up if you plug a usb device into it and it will charge whatever usb device you’ve plugged into it. However, if you unplug the charger from the wall it is still capable of recording keystrokes. That’s because inside of the wall unit is a rechargeable battery. It will record every single keystroke on a memory card inside the charger or for a little extra money it will actually send alerted phrases via SMS or text messages to wherever in the world.
This sophisticated type of invention could be used to potentially cause high levels of chaos in this new age of technology so its best to properly educated yourself and be more aware of the situations, people and objects around you. Keep that in mind next time you see a lonely charger or someone walking around with an old school pager
(Reuters) – The U.S. Secret Service refused to provide data on its computer security systems to the Department of Homeland Security in 2014, preventing it from being able to verify if it was complying with security policies, an inspector general’s report said on Monday.
The service, which has faced withering criticism after several security lapses including a White House breach in September, “refused to comply with mandated computer security policies,” according to the report by the DHS inspector general.
The review also said DHS agencies were not doing enough to protect computer systems from such high-risk bugs as Heartbleed, which allowed hackers to spy on computers but not take control of them.
The report said FEMA and the U.S. Citizenship and Immigration Service still use the Microsoft Windows XP operating system, which may be vulnerable to hackers and that Microsoft stopped providing software updates for in April.
“DHS has worked to improve and secure its vast IT resources,” said Inspector General John Roth. “But those improvements can only be effective if component agencies fully adhere to the rules and DHS management vigorously enforces compliance.
“Failure to do so will pose a serious threat to DHS and its Homeland Security missions.”
The inspector general’s office said the Secret Service has agreed to begin providing the required data to the DHS chief information officer. It made six recommendations to improve security, which the department accepted.
Homeland Security combined 22 different federal departments and agencies into one when it was established in 2002.
(Reporting by Doina Chiacu; Editing by Andrew Hay)
Photo Courtesy of: http://www.flickr.com/photos/instantvantage/
This term is used quite a bit in cyber security, it is the use of multiple security principles and countermeasures to protect information and assets within a organization. I think this same thought can be used for parents, we can use multiple tiered counter measures to help secure our kids safety online. Let’s start at the perimeter of our home’s Internet connection, the Router that was provided by your Internet provider. One way to keep all the devices safe is to use a Kid friendly DNS service, such as Open DNS’s parental control offering, basically we setup the OpenDNS servers on our router, and the settings will be effective for every device in our network, such as computers, tablets, Xbox, PlayStation, Wii etc.
This service will also block adult Web sites without messy configuration changes. Let’s move further down the chain. For our computers, we definitely want to use a “smarter browser” such as Google Chrome or Mozilla Firefox and add key free plugins that will block any inappropriate sites to our kids. If your home computer is a Mac or Windows, create a separate account for your kids, and enable parental controls on that account, this way you can limit the time they spend on the Internet, filter a list of words you do not want them to see, filter the sites that your kids can visit and a lot more. For personal devices such as iPads and android tablets, turn on restrictions on the devices so you can disable safari and YouTube, turn off app downloads, and turn off In-App purchases.
And incase you do need to install a particular app for your kids, install them via iTunes instead of on the device. On a android tablet or phone, I generally use a restricted profile (kitkat 4.4) or “Kid’s Shell – safe launcher” and create a separate account for my son, this way I can add specific apps that I want him to have access to and remove any that are not suited such as settings, notifications or any social media applications. Another really solid application that I rely on is called Mobcip, It is known as a parental software for all mobile devices as well as our computers. We create user profiles for our kids using their online interface and a management login that we use. We can monitor what apps are being used the most, view browsing history, set time limits, and custom filters, it is a really robust piece of software.
I hope these quick tips help you childproof your devices and computers, please check out other Cyber Security Tips for Parents
Article Source: http://EzineArticles.com/?expert=Vinny_Sinbad
For most companies, it is part of their protocol to back up important business documents. What is the sense of keeping two or more copies of the same file when it only adds to your costs?
Most computer experts would argue that a back up is done not only because its part of the standard procedure, but because it ensures the safety and integrity of your files. What if someone hacked your computer and modified its contents? How can you retrieve your original data without a backup? Also, there is a possibility of your computer being infected with a virus. Without a back up, you might not be able to continue your work, or worse, you’ll start again from scratch.
What to Back Up
It goes without saying that you should back up all the important files in the computer. Here are some examples.
* Documents, music, pictures and videos. Your documents in school or work, your favorite mp3s, your childhood memories stored in pictures, or your latest downloaded series: whatever personal file it is, keep a copy of it.
* Application settings and program installers. In case of a virus or a system crash, you can easily reinstall your frequently-used programs through these files.
* Bookmarks. If you have a list of websites that you visit daily, better back it up.
What Not to Back Up
* Not every file in your system needs to be backed up, such as the ones listed below.
* Windows operating system. If your operation system gets corrupted, you can reinstall it anyway. So why bother backing them up?
* System files. Likewise, you can get the system-related contents of your local drive upon reinstallation.
* Program files. You can also reinstall your programs so you don’t need to duplicate its folders in another place.
* Internet cache. Although these data may help you load web pages faster, you don’t need this. Your browser can just download these small files again once you access the webpage.
Where to Back Up
It is a matter of preference on where you want to back up your documents. There are three different areas which you can choose as your backup locations.
Local backup. This refers to another physical drive apart from your PC. Of course, the essence of backing up your files is that you will have a reserve copy of your data in case something bad happens in it. Therefore, creating a backup in the same location defeats the purpose of this process. As such, the most popular avenue for backups is through external drives or in a drive in another computer.
Online backup. During the dial-up days, backing up online is considered to be time consuming and expensive. Fortunately, with the level of internet speeds today, this has become a practical option for a lot of reasons. First, your file isn’t stored in a physical hardware, which can get corrupt. Also, an online backup removes the risk of losing your data from device theft. Thus, you don’t have to worry too much on finding your stolen computer as you have a backup online.
System imaging. You can also back up your system as well. This process is called system imaging. Unlike in a file backup where the backup location should be different from the actual file, in system imaging your computer creates a copy of your system in your drive. As such, you can completely restore your system in case it crashes. However, the only limitation is that you need to have a considerable amount of disk space in order to perform this process.
When to Back Up
You may not know when accidents will happen so it is better if you can back up your files daily. This is pretty much easy if you are using online backup, especially if you are configured to be on auto-sync with an online database. On the other hand, if you are using a local storage such as an external drive to store data, you may have a hard time sorting all your folders for new files. To make this process easier, you can just back up only your most important files on a regular basis. All the other files get another treatment; they can be backed up every month or so, depending on their size and importance.
As a saying goes, “Prevention is better than cure.” Don’t wait for your precious files to be damaged or deleted before you create a back up. And now that you’re well-equipped with the basics of backing up, you should start this process immediately.
Sign up today for free & stay current with local IT news.