Powered Protection Inc. provides security systems, fire alarm systems, surveillance systems, and access control systems. 24 Hour monitoring service of your security system and fire alarm system. Fire inspections and service on security systems, fire alarm systems, surveillance systems, and access control systems.
Using Today View View in iOS 12 (2019) | Quick Tips - YouTube
iOS 12 brings a lot to the table and you will want to take full advantage of it to get the most out of your device. The Today View in iOS 12 is one feature that is worth exploring to determine how you can leverage it to make your workday and personal life more organized. As the name implies, the Today View is there to let you know what is going on right now. But there are a lot of different information points that your device can inform you of, so customizing your Today View and learning to navigate it is essential to getting more out of your iPhone.
The Today View in iOS 12
Your iPhone is designed to keep you organized and updated on the things that matter most to you. As a business user, that means staying abreast of what is going on in your department, your company and your industry. If you are like most business users, it also means managing your professional life and your personal life on the same device.
Taking care of all these needs requires using a variety of apps. In the olden days of earlier smartphones, those apps would need to be opened to see what they had to offer. But today, with your iPhone and iOS 12, you can get most of the information you need from each app on your Today View—at least the fundamental information that you are likely to want access to at a glance. Instead of having to go to your Home screen to get the information you need, you can just do a quick swipe and see what you need more quickly and more conveniently than you would if you have to open each app individually.
One of the most useful things about the Today View is that you do not even need to unlock your phone to access it. As long as you have your security settings established where your Today View shows on your Lock screen—which is the way your phone comes by default—you can check your Today View at any time whether the phone is locked or unlocked.
How to Access Your Today View
Whether you are on your iPhone’s Lock screen or on your Home screen, your action to get to the Today View is the same. You will simply swipe to the right side of your phone screen. You can start your swipe from the left side of the phone, from the middle of the phone screen and even from pretty close to the right edge of the screen. Wherever you begin your swipe, as long as you slide your finger off the right edge of the screen, your Today View will pop up.
When you want to leave the Today View, you perform the opposite gesture. Swipe to the left edge of your screen to leave the Today View both on your Home screen and on your Lock screen.
What Does the Today View Show You?
The things that you will see on your Today View will vary based on the apps you have installed and the widgets you have told your phone to include on the Today View. For instance, you will see FAVORITES that shows some of your favorite contacts that you have called recently. You will also see other widgets that are based on the apps that you have recently used. Like if you have used Maps recently, your Today View will show a MAPS DESTINATIONS widget with a destination that you are likely to want to go to—such as your home.
Many of your widgets will give you an option to show more information if you need it. The option to Show More will show to the right of the name of the widget. Just click the Show More section and the widget will expand. For example, your FAVORITES widget will only show four favorite contacts initially, but if you click Show More you will see eight contacts.
Some of the widgets on your phone will give you the option of launching the app just by tapping the widget. For instance, the Maps app widget, MAP DESTINATIONS, will launch Maps if you tap the widget and create a map to the destination offered in the widget—like your home address.
You can add or remove widgets from your Today View by tapping Edit at the bottom of the Today View and tapping the minus or plus symbol to the left of the app name. You can also reorganize your widgets by tapping and holding the three horizontal lines to the right of an app name, then shifting the app up or down the list.
When it comes to watching videos online, no name comes to mind more often than YouTube. They host nearly 2 billion users each month. 60% of people now prefer watching YouTube to watching TV. 80% of people under 49 are watching videos on YouTube.
It’s popular. We get it. Everyone is on it. And there’s a huge variety of content from funny cat videos to videogame walkthroughs to guided meditation. And the fact is that regardless of whether or not you have any reason to hide what you’re watching, it’s no one’s business what you watch on YouTube as long as it’s not illegal. And even that can be a gray area.
But first, what does YouTube do with your viewing history?
A.I., Automation & Analytics
YouTube is owned by Google, one of the biggest and most powerful tech companies in the world. Through Google’s many tech assets, they can gather endless amounts of data about you. While we don’t believe Google has any nefarious intentions for this data, we do know that Google puts this data to work to expand the empire they’ve built, primarily by enhancing their ad platform.
In a practical sense, they use this data to learn about individual and demographic behavior. What ads do you click? What makes you click? How long do you watch videos? What do you watch? All of this information helps a company like Google show you more relevant and targeted ads that may be hard not to click because they’ve been engineered with such precision.
Modern analytics allows Google to glean endless amounts of data and aggregate it into a useable form. Using artificial intelligence (A.I.), they can automate this entire process. Each time you visit, it learns something new and continually adjusts the algorithm to deliver more targeted ads.
In YouTube specifically, they can also use viewing data to make relevant recommendations to you.
This technology is actually great. It has opened the doors for personalization and relevancy in advertising that can’t otherwise be achieved. And people love that. 57% of people say they’re willing to share more data for a more personalized experience. But you have a right to control this flow of information.
How to Set up Incognito in YouTube
These instructions are the same whether you’re on Apple or Android. In order for this to work, you do need to log into your YouTube account. And before we go any further, let’s get one misunderstanding out of the way. Just because you don’t log in doesn’t mean they don’t track you. They put cookies on your device to track every visitor.
Follow these steps.
Open the YouTube app.
Tap the profile icon
Tap “turn on incognito”.
Check to see that your profile icon is replaced with the “incognito symbol” to know you can privately watch YouTube videos.
Whenever you go into YouTube, check for this icon first to know that it’s active.
When you finish private viewing, we recommend that you turn this feature off.
Tap the profile icon again.
“Turn off incognito”.
YouTube is again tracking what you do.
Switch back and forth, as needed. It’s so easy to do so.
But you may still have a pressing question. We’d like to address it.
Why Would You Want YouTube to Track You?
Personalization is pretty cool. YouTube can very quickly figure you out and recommend things that you weren’t even thinking to search for but would love to view. YouTube’s personalization is kind of like having your own personal assistant that knows you so well that they can always recommend the perfect thing.
Sometimes that you might want to consider privately watching include:
If you’re viewing something somewhat embarrassing. Seriously, it’s no one’s business.
If you want to view something without seeing ads for it later.
If you’re letting your child, spouse, etc. watch on your account. This way they don’t see recommendations intended for you, which may not be appropriate. And their viewing on your account doesn’t mess with the algorithm. Otherwise, YouTube is recommending children’s cartoons for a month after you let your 4-year-old use your phone.
Remember, You Have the Power
Yes, YouTube and their parent company Google are collecting a lot of data about you. They use this data to enhance your online experience. And most of the time, personalization is awesome. But you may not always want this data collected. And you have the power to say when you’d prefer not to share. Use incognito to watch YouTube videos privately when you want to and turn it back off to get the best recommendations.
Local Guides have contributed content about hundreds of thousands of businesses. They get together and have held meetups and conducted projects in Europe, India, South America, North America, Australia, and Asia.
How Are Google’s Local Guides Different From Google Users?
People have been contributing reviews, photos, and videos to Google for years. Google Local Guides are part of a program that offers benefits provided through Google Maps.
The Local Guides provide a way for Google to improve its maps and local business information. Local Guides can post photos, reviews, and answer questions about businesses — all tied to Google Maps.
What Do Google Local Guides Get From Contributing?
The Local Guides program offers a rewards program for participants. The points-based program offers a way for guides to get points for contributing nine different kinds of information based on their local area.
The types of information and points include:
Answers: 1 point
Edits: 5 points
Fact Checks: 1 point
Photos: 5 points
Places: 15 points (for places and roads)
Q & A Answers: 3 points
Ratings: 1 point
Reviews: 10 points, plus additional 10 points for reviews over 200 words
Videos: 7 points
Guides advance through the point system. They start at Level 1 and can achieve Level 10. People using Google Maps can see the Guide’s level and use it to decide the trust level and authenticity of the information.
What Other Benefits Do Local Guides Get?
Local Guides have access to perks from Google’s partners and also get early access to Google features. They can also get badges and recognition from other Google Maps users.
Google Local Guides have profiles that display badges and recognition. Recognition from users shows next to the Guide’s level on their profile.
How Do Local Guides Level Up?
Local Guides advance through Levels by accumulating points from their contributions. Level 1 Guides are just starting out. They have 0 points. By Level 2. guides have achieved 15 points.
Here are the other Local Guide levels and points needed to achieve them:
Level 1: 0 points
Level 2: 15 points
Level 3: 75 points
Level 4: 250 points and a badge
Level 5: 500 points and a new badge
Level 6: 1,500 points and a new badge
Level 7: 5,00 points and a new badge
Level 8: 15,000 points and a new badge
Level 9: 50,000 points and a new badge
Level 10: 100,000 points and the highest badge
Level 10 is a high level of achievement requiring many contributions over a significant period. As of 2018, members of the Local Guide community identified over 500 Level 10 Local Guides around the world. The number of Local Guides of different levels in each area shows on each Local Guide’s profile.
How Do You Become a Google Local Guide?
Anyone with a Google account can visit the Local Guides page and choose “Join Local Guides” to get started. Provide your home location and confirm the details, and then sign up.
Hackers Now Using HTTPS To Trick Victims Via Phishing Scams
Everything you’ve heard about the safety of https sites is now in question. According to a recent FBI public service announcement, hackers are incorporating website certificates (third-party verification that a site is secure) when sending potential victims phishing emails that imitate trustworthy companies or email contacts.
These phishing schemes are used to acquire sensitive logins or other information by luring people to a malicious website that looks secure.
Can You Still Count On HTTPS?
The “s” in the https along with a lock icon is supposed to give us an indication that a website is secure. And your employees may have heard this in their Security Awareness Training. All training will now need to be updated to include this latest criminal tactic.
What Should You Do?
Be Suspicious of Email Names and Content
The FBI recommends that users not only be wary of the name on an email but be suspicious of https links in emails. They could be fake and lead you to a virus-laden website. Users should always question email content to ensure authenticity.
Look for misspellings or the wrong domain, such as an address that ends in “com” when it should be “org.” And, unfortunately, you can no longer simply trust that a website with “https” and a lock icon is secure.
If you receive a suspicious email that contains a link from a known contact, call the sender or reply to the email to ensure that the content is legitimate.
If you don’t know the sender of the email, the FBI warns that you shouldn’t respond to it.
Don’t click links in any emails from unknown senders.
If You Run A Business Ask Your IT Service Company About New-School Security Awareness Training For Your Employees
This will give your staff the latest information about cyber threats and exploits. They’ll learn what they need to know to avoid being victimized by phishing and other scams.
Why Use New-School Security Awareness Training?
Your employees are the weakest link when it comes to cybersecurity. You need current and frequent cybersecurity training, along with random Phishing Security Tests that provide a number of remedial options if an employee falls for a simulated phishing attack.
New-School Security Awareness Training provides both pre-and post-training phishing security tests that show who is or isn’t completing prescribed training. And you’ll know the percentage of employees who are phish-prone.
New-School Security Awareness Training…
Sends Phishing Security Tests to your employees to take on a regular basis.
Trains your users with the world’s largest library of security awareness training content, including interactive modules, videos, games, posters and newsletters, and automated training campaigns with scheduled reminder emails.
Phishes your users with best-in-class, fully automated simulated phishing attacks, and thousands of templates with unlimited usage, and community phishing templates.
Offers Training Access Levels: I, II, and III with an “always-fresh” content library. You’ll get web-based, on-demand, engaging training that addresses the needs of your organization whether you have 50, 500 or 5,000 users.
Providesautomated follow-up emails to get them to complete their training. If they fail, they’re automatically enrolled in follow-up training.
Uses Advanced Reporting to monitor your users’ training progress, and provide your phish-prone percentage so you can see it reduce as your employees learn what they need to know. It shows stats and graphs for both training and phishing, ready for your management to review.
Your employees will get new learning experiences that are engaging, fun and effective. It includes “gamification” training, so they can compete against their peers while learning how to keep your organization safe from cyber attacks.
Add New-School Security Awareness Training To Your Current Employee Training
The use of https is just the latest trick that hackers are using to fool victims into falling for malicious emails. Hackers have many more “up their sleeves.” This is why regular, up-to-date New School Security Awareness Training is so important for any organization.
CBD Reports 100,000 Photo and License Plate Breach
The U.S. Customs and Border Protection (CBP) reported today that nearly 100,000 travelers’ photos and license plate data were breached. If you’ve driven in or out of the country within the six-week period where the data was exposed, you could have been victimized.
The department said on June 10th that the breach stemmed from an attack on a federal subcontractor. CBP learned of the breach on May 31st.
“Initial reports indicate that the traveler images involved fewer than 100,000 people; photographs were taken of travelers in vehicles entering and exiting the United States through a few specific lanes at a single land border Port of Entry over a 1.5 month period.”
CBP hasn’t reported when this 6-week period was.
Who Was The Subcontractor That Was Affected By The Breach?
CBP hasn’t said who the subcontractor was either. But the Register reports that the vehicle license plate reader company Perceptics based in Tennessee was hacked. And, these files have been posted online.
Additionally, the Washington Post reports that an emailed statement was delivered to reporters with the title: “CBP Perceptics Public Statement.”
Perceptics’ technology is used for border security, electronic toll collection, and commercial vehicle security. They collect data from images on license plates, including the number, plate type, state, time stamps and driver images.
Where Were The License Plate Readers Installed?
Perceptics license plate readers were installed at 43 U.S. Border Patrol checkpoint lanes in Texas, New Mexico, Arizona, and California.
CBP reports that “No passport or other travel document photographs were compromised and no images of airline passengers from the air entry/exit process were involved.”
CBP uses cameras and video recordings at land border crossings and airports. The images they capture are used as part of a growing agency facial-recognition program designed to track the identity of people entering and exiting the U.S.
Do We Know Whose Data Was Exposed?
No, we don’t. And to date, CBP hasn’t said if this data will be released. If we hear differently, we’ll be sure to report any updates, so keep watching this space.
Is Facial-Recognition A Security Threat?
Facial-recognition is a hot topic right now. The American Civil Liberties Union states:
“This incident further underscores the need to put the brakes on these efforts and for Congress to investigate the agency’s data practices. The best way to avoid breaches of sensitive personal data is not to collect and retain such data in the first place.”
Congressional lawmakers have questioned whether the government’s expanded surveillance with facial recognition could threaten constitutional rights and open millions to identity theft.
Today’s technology can recognize and track us without our knowledge or an option to prevent it. It’s inevitable that a new battle between surveillance and privacy will be taking place as more breaches occur.
Spam emails can be incredibly annoying. Not only that, it can be downright dangerous, considering the phishing schemes and other email scams that are prevalent today. We can’t avoid spam completely and hope to have any kind of digital life, because so many services require an email address as part of the sign-up process. These can tend to clutter our inboxes with (technically not spam) promotional emails, and the less scrupulous of these may send real spam. That’s not to mention the frequency with which these companies’ databases are breached, creating a whole new layer of spam potential.
How to Avoid Seeing Spam
All of the most prevalent email services offer some degree of spam protection. Great spam protection is one of the reasons Gmail rose to such prominence a decade ago. Most services enable spam filtering by default, but check your email service’s settings to ensure that this setting is turned on.
If you’re still seeing a lot of spam, or if you’re using a service that doesn’t offer much in the way of spam filtering, here are some other suggestions.
Create Filters or Rules
You can create your own rudimentary spam filter by setting a filter or a rule. The terminology varies based on your email service, but you should find something by a similar name. You can create rules that auto-route email based on certain characteristics. For example, you can create a rule that sends any message containing NSFW language straight to the trash. Simply insert all those explicit terms in the field “message contains” and select “move to trash” as the action that is taken.
You can use filters or rules to move less important messages to a folder, too. If you still want to know about the latest sales at a few retailers, but you don’t want to be inundated right alongside emails that are actually important, create a rule that sends these emails to a “Retail” folder that you can check when you get the shopping urge.
In the same area of settings, you should also have the option to block specific email addresses or even all addresses from a particular domain. Granted, it’s rare these days for spammers to frequently reuse the same address, but this function can still help with overly persistent individuals as well as companies or domains that refuse to take you off their mailing lists.
How to Stop Spam from Ever Arriving
There are other tools available to stop spam from ever showing up in your inbox.
Use “Report Spam” Button
The spam filters from email services like Gmail aren’t static. They can actually learn from you. When a spam message leaks through, you can help the spam filter learn. Look at the menu options available on the message. You should see one that looks like a stop sign with an exclamation point. Click this button to report to Gmail that the message is spam, and you should never see a similar message again.
If Gmail recognizes that your spam message is actually from a mailing list, it will try to unsubscribe for you if you click that option.
Set Up a Spam or Throwaway Account
Another savvy way to avoid spam is to set up a “spam account” that you use only for email signups, website logins, and the like. Give your main email address only to those personal and professional contacts you actually want to hear from, and sign up for everything else using your “spam account.”
If your current account is beyond hope, turn it into your spam account. Create a new main account, and let all your real-life contacts know about the switch.
These tips should help cut down on the chaos in your inbox. Got your own tips? Let us know!
Are You One Of Many Affected By The LabCorp Data Breach?
Financial & Personal Information of 7.7 Million Exposed
Just yesterday we wrote about the Quest Diagnostics’ breach affecting nearly 12 million. Today we’re writing to tell you about a LabCorp breach affecting 7.7 million people. Both of these breaches were caused by a third-party; the American Medical Collection Agency (AMCA). AMCA provides billing collection services to both LabCorp and Quest Diagnostics.
AMCA has informed LabCorp that it is in the process of sending notices to approximately 200,000 LabCorp consumers whose credit card or bank account information may have been accessed. AMCA has not yet provided LabCorp with a list of the affected LabCorp consumers or more specific information about them.
“AMCA’s affected system also included credit card or bank account information that was provided by the consumer to AMCA for those who sought to pay their balance. LabCorp provided no ordered test, laboratory results, or diagnostic information to AMCA. AMCA has advised LabCorp that Social Security Numbers and insurance identification information are not stored or maintained for LabCorp consumers.”
The information included in the breached system includes:
Bank account information,
Credit card information,
First and last name,
Date of birth,
Address and phone,
Date of service and provider, and
Forensic experts are investigating the breach. It’s possible that the AMCA breach could impact other companies and millions of more consumers.
What Should You Do?
Anyone who was affected by the data breach should freeze their credit report to prevent criminals from opening credit card accounts in their name. They should also be concerned that their Social Security numbers were exposed.
If you believe that your information has been leaked, you can contact LabCorp customer service on their contact page.
Quest Diagnostics is one of the largest blood-testing providers in the U.S.
Anyone who has ever been a patient at a Quest Diagnostics medical lab could be affected by the breach.
AMCA provides billing collection services to Optum360, which is a Quest contractor. AMCA first notified Quest about the breach on May 14th. Quest reports said that they are no longer using AMCA and that they are notifying affected patients about the data exposure.
The information included in the breached system includes:
Bank account information
Credit card information
Social Security Numbers
Other personal information
In its filing, Quest reported:
“Quest Diagnostics takes this matter very seriously and is committed to the privacy and security of patients’ personal, medical and financial information.”
What Should You Do?
Anyone who was affected by the data leak should freeze their credit report to prevent criminals from opening credit card accounts in their name. They should also be concerned that their Social Security numbers were exposed.
If you believe that your information has been leaked, you can contact Quest Diagnostics’ customer service at 1 (866) 697-8378 or on their contact page.
Microsoft PowerPoint is the industry leader in presentation software, a venerable application that’s over 30 years old. Awesome PowerPoint slides can greatly enhance the visual impact of a meeting presentation. The inverse is also true: terribly designed PowerPoint slides can create serious distraction and disinterest. Many a speaker has been undermined by his or her slides.
Today’s tech tip will teach you how to make your Microsoft PowerPoint slides awesome. View online here or watch the video below.
Create beautiful professional slides fast with Microsoft PowerPoint - YouTube
Step 1: Choose a Theme
PowerPoint offers a variety of prebuilt themes. Choose one that fits the tone of your presentation and your company. To do so, open PowerPoint and click the Design tab in the menu ribbon. One of the sections is named Themes. Click on a theme to apply it to the default slide. Don’t like it? Try another.
PowerPoint also allows you to find additional themes online. Click the drop-down arrow in the Themes pane and select “Browse for Themes…” to start that process.
Bonus tip: If you have a presentation that’s already filled with content, you can still experiment with changing the look by changing themes. Changing themes never removes or erases existing content, though it will change fonts and sometimes reposition text.
Step 2: Insert Your Raw Data
Whether you’re typing all your content in manually or pasting it in from another document, now’s the time to get the raw data into your file. Don’t worry very much about looks at this point. Just get the information in there.
If you’re working in a theme, remember to right-click on each new slide and select the appropriate layout. Placing content into slides with the proper layout now will save you headaches later.
Bonus tip: Not all themes have the same set of slide layouts available. Make sure the theme you choose has all the ones you need.
Step 3: Check Out Design Ideas
A new feature in Office 365, Design Ideas is a powerful, AI-assisted tool. It will dynamically analyze the contents of a slide and suggest a handful of alternative ways of displaying the information. It’s truly marvelous when it works just right (for example, turning a bulleted list into a sleek timeline), and you have to see it in action to fully appreciate it.
To access Design Ideas, click on the Design tab in the menu ribbon. At the far right, you’ll see a Design Ideas button in the Designer section of the ribbon. Click this button to open a sidebar. You may see “Generating design ideas…” for a few seconds. Next, a handful of design ideas will appear. Click through them and select the one that works best for you.
Using Design Ideas is the easiest way to create awesome, powerful PowerPoint presentations. Check it out today!
Show your screen during a meeting in Microsoft Teams - YouTube
Microsoft Teams is an amazingly powerful collaboration tool that’s available as a part of the Microsoft Office suite.
At its core, it’s kind of like Slack on steroids, but that core functionality is just the tip of the iceberg. Because it’s integrated with the rest of Microsoft Office, it has so many powerful features.
One feature area in Microsoft Teams is the ability to host and join virtual meetings. Users can join or host meetings from desktop or mobile. Mobile users can share files with the group, and we covered that in a previous post. Desktop users can share screens with other users, and with a surprising degree of control. Here’s how to take advantage of this feature.
Step 1: Create a Meeting
The Share Screens feature works from within the Meetings function, so the first step is to create or join a meeting. Locate the tabs bar (usually on the left side), where you’ll see icons like Activity, Chat, Teams, Meetings, and Files. Select Meetings, and then create a meeting (or join a meeting that someone else is hosting). The Meetings tab is tied into your Outlook calendar, allowing you to see potential conflicts.
Quick note: Teams features can be enabled or disabled at the enterprise level. If you don’t see a Meetings tab at all, your IT department hasn’t enabled it yet. Contact IT and plead your case for enabling this awesome feature.
Step 2: Click the Share Button
Once the meeting is in progress, you’ll see a series of buttons in the bottom middle of your screen. If you don’t see them, move your mouse to that location to make them show up. You’ll see buttons for video (if enabled), microphone (for muting yourself), ending the call, and more. The one you want looks like a rectangle with an upward arrow. This button, aptly named the Share button, represents screen sharing. Click it to continue.
Step 3: Choose What to Share
Screen sharing isn’t exactly new technology, but the implementation here is particularly well done. When you click the Share button, Teams doesn’t immediately share your entire screen. Instead, you have options. “Desktop” allows you to share one of your desktops. “Window” lets you choose a single window or app to share. “PowerPoint” shares the presentation you choose. There are even more options available under “Browse”.
This level of granular control makes screen sharing in Teams a killer feature, and there’s so much more that Teams can do for you. Team-based chat, productivity tools, and real-time collaboration on nearly any Office file are a few more ways it can help. If you’re ready to keep exploring, contact us to keep learning.