Blog

September 9th, 2014

Office365_Sep08_CCloud-based solutions that are public oriented, such as Microsoft's Office 365, offer a wide variety of features that the majority of business users want and need. As a result, the service tends to look the same for all and the ability to customize how Office 365 looks has often been a requested feature. In an effort to make the cloud-based suite more useful, Microsoft has recently announced the ability to customize Office 365.

Coming soon to Office 365 (if not already): Themes

In early September, Microsoft announced that in the following weeks the company would be rolling out a couple of new options that will allow businesses to personalize the look of Office 365. In fact, there are not one, but two new personalization options available for Office 365 users with business subscriptions.

Option 1: Company-wide custom themes

The idea of establishing company brand is not a new concept to business owners, who realize that one of the factors to success is creating positive brand recognition amongst stakeholders, including employees. One of the best ways to achieve this is to include identifiable visuals and colors repeated in as many places as possible. Almost every company has colors that they use as part of their corporate image and brand identity.

To help cement your brand with your employees, you can now customize the theme of Office 365 so that the theme is applied to all users in your organization. When it comes to customizing your theme Microsoft has noted that you will be able to:

  • Pick the color scheme, which includes a base color and text/icon colors. Set the base as blue for example, and the menu bar across the top will be that color. Set the text as yellow and all icons/text in the menu bar will also be yellow.
  • Set the color of the Office 365 logo. You can pick up to three colors for the Office 365 logo.
  • Upload a custom logo. You can upload your company logo and have it applied to the top-left of all Office 365 menu bars.
  • Make the logo a clickable link. Once you set a logo, you can also make it clickable by adding a custom URL. When a user clicks the logo, they will be taken to the predefined URL.
If you would like to apply your company's brand to Office 365, and have it automatically applied to all users in the company, you will need to be the admin, or to log in as an administrator. Once you are logged on, click on Admin from the main Office 365 screen. Then, click on your company's hyperlink located at the top-right of the Admin screen (right below the menu bar) and select Custom theming.

In the screen that opens, you will be able to set your desired theme, and when you are finished simply hit Save and the theme should be applied.

Option 2: Personalized themes

While company users can set a theme related to their brand, individual users in the organization can also select their own theme from a list of 22 provided by Microsoft. Each theme changes:
  1. The top navigation bar color scheme
  2. Menu colors
  3. Background
  4. Office 365 logo colors
You can change the theme of Office 365 by logging into your account, pressing the Settings cog at the top-right of the screen and clicking Change theme. Once you have selected a theme you like, press Save and it should be applied immediately.

If you are looking to learn more about Office 365 and how you can get the most out of it, contact us today for a chat.

Published with permission from TechAdvisory.org. Source.

September 5th, 2014

HealthcareIT_Sep03_A

As of June 30, 2014, more than 1,000 data breaches affecting more than 500 patients each have been reported to the Department of Health & Human Services - for a total of roughly 32,000,000 people who have had their privacy compromised. And, according to the annual Redspin Breach Report, published in February of 2014, 7.1 million patient records were breached in 2013, a 137.7% increase over 2012.

And, the threat is getting broader. Once caused primarily by snooping or negligent employees, data breaches are now increasingly caused by cybercriminals who realize the potential financial value of medical records. Case in point: The Chinese hacker attack on the 206-hospital Community Health Systems which resulted in the breach of 4.5 million patient records, the second-largest HIPAA breach ever reported.

No physician practice should consider itself immune. While large hospital systems may be most attractive to hackers, Eric Perakslis, executive director of Harvard Medical School's Center for Biomedical Informatics, recently wrote in a New England Journal of Medicine article that 72 percent of cyberattacks have been aimed at hospitals, group practices and other provider organizations.

Perakslis recommends an "active learning approach” that involves real-time surveillance of emerging threats - and that includes an intimate knowledge of one's own network and vigilance at one's own practice. One of the most effective ways you can do this is to work with a company like ours who can help not only ensure security of your systems but also help teach you and your staff about common security issues.

Published with permission from TechAdvisory.org. Source.

September 4th, 2014

Security_Sep02_CWhat do you do when your smartphone needs to be charged but your charger is not at hand? A handy solution is to turn to a public charging kiosk. But what you might not be aware of is the fact that this can lead to juice jacking of your smartphone. To avoid this security threat, it’s time to get a comprehensive view of what juice jacking is and how you can protect your smartphone from it.

What’s juice jacking?

Regardless of the kind of smartphone you have, whether it’s an Android, iPhone or BlackBerry, there is one common feature across all phones: the power supply and the data stream pass over the same cable. This setup allows for juice jacking during the charging process whereby user access is gained on your phone by leveraging the USB data/power cable to illegitimately access your phone’s data and/or inject malicious code onto the device.

The attack can be as simple as an invasion of privacy, wherein your phone pairs with a computer concealed within the charging kiosk and information such as private photos and contact information are transferred to a malicious device. However, on the other hand, it can also be as invasive as an injection of malicious code directly into your phone. According to security researchers at this year’s Black Hat security conference, your iPhone can be compromised within one minute of being plugged into a harmful charger.

Exposure to a malicious kiosk can also create a lingering security problem even without the immediate injection of malicious code. Once a device is paired to a computer, it can access a host of personal information on the device, including your address book, notes, photos, music, sms database, typing cache, and even initiate a full backup of your phone, all of which can be accessed wirelessly at anytime.

How do I avoid it?

The most effective precautions center around simply not charging your phone using a third-party system. Here are some tips to help you avoid using public kiosk charger:
  • Keep your devices topped off: Make it a habit to charge your phone at your home and office when you’re not actively using it or are just sitting at your desk working.
  • Carry a personal charger: Chargers have become very small and portable, from USB cables to power banks. Get one and throw it in your bag so you can charge your phone anytime you’re at the office or while on-the-go if you use a power bank.
  • Carry a backup battery: If you’re not keen on bringing a spare charger or power bank, you can opt to carry a full spare battery if your device has a removable battery.
  • Lock your phone: When your phone is truly locked as in inaccessible without the input of a pin or equivalent passcode, your phone should not be able to be paired with the device it’s connected to.
  • Power the phone down: This technique only works on phones on a model-by-model basis as some phones will, despite being powered down, still power on the entire USB circuit and allow access to the flash storage in the device.
  • Use power only USB cables: These cables are missing the two wires necessary for data transmission and have only the two wires for power transmission remaining. They will charge your device, but data transfer is made impossible.
Even the tiniest detail like charging your phone from a kiosk charger could affect the security of your device. While there are many substitutes to using a third-party system, ultimately the best defense against a compromised mobile device is awareness. Looking to learn more about today’s security and threats? Contact us today and see how we can help.
Published with permission from TechAdvisory.org. Source.

Topic Security
September 3rd, 2014

BCP_Sep02_CWhile it’s important for businesses to perform risk assessments, it’s equally important to initiate a business impact analysis (BIA) in order to maximize business continuity. Why? Simply because the crux of any recovery is about whether it is achieved in a reasonable time, and BIA, if performed effectively, will determine exactly that. Knowing this, isn’t it time you for you to have a look at some tips for successful business impact analysis?

Five tips for successful business impact analysis:

  1. Treat it as a (mini) project: Define the person responsible for BIA implementation and their authority. You should also define the scope, objective, and time frame in which it should be implemented.
  2. Prepare a good questionnaire: A well structured questionnaire will save you a lot of time and will lead to more accurate results. For example: BS (British standard) 25999-1 and BS 2599902 standards will provide you with a fairly good idea about what your questionnaire should contain. Identifying impacts resulting from disruptions, determining how these vary over time, and identifying resources needed for recovery are often covered in this. It’s also good practice to use both qualitative and quantitative questions to identify impacts.
  3. Define clear criteria: If you’re planning for interviewees to answer questions by assigning values, for instance from one to five, be sure to explain exactly what each of the five marks mean. It’s not uncommon that the same event is evaluated as catastrophic by lower-level employees while top management personnel assess the same event as having a more moderate impact.
  4. Collect data through human interaction: The best way to collect data is when someone skilled in business continuity performs an interview with those responsible for critical activity. This way lots of unresolved questions are cleared up and well-balanced answers are achieved. If interviews are not feasible, do at least one workshop where all participants can ask everything that is concerning them. Avoid the shortcut of simply sending out questionnaires.
  5. Determine the recovery time objectives only after you have identified all the interdependencies: For example, through the questionnaire you might conclude that for critical activity A the maximum tolerable period of disruption is two days; however, the maximum tolerable period of disruption for critical activity B is one day and it cannot recover without the help of critical activity A. This means that the recovery time objective for A will be one day instead of two days.
More often than not, the results of BIA are unexpected and the recovery time objective is longer than it was initially thought. Still, it’s the most effective way to get you thinking and preparing for the issues that could strike your business. When you are carrying out BIA make sure you put in the effort and hours to do it right. Looking to learn more about business continuity? Contact us today.
Published with permission from TechAdvisory.org. Source.

August 27th, 2014

socialmedia_Aug26_CBusinesses in many industries rely on visuals to sell their products. From that bicycle shop on the corner to the bakery down town, and even the local electronics retailer, having high quality images of your products will help attract customers. What many business owners want to know is how some businesses have such appealing images and how they can add these quality visuals on platforms such as Instagram.

The truth behind some of Instagram's best images

Those awesome Instagram photos we see aren't always taken using mobile phones. Instead, many users use digital cameras which offer much better image quality. You can capture some amazing shots with a higher end DSLR cameras with multiple lenses.

If you have one of these cameras and are looking to create high-quality images for Instagram, or any other social media site, you may be slightly confused as to how to get the images onto the platform - especially since many of us use this via the mobile app. To make uploading a little easier, here is a brief guide detailing how to get images from your digital camera onto Instagram.

1. Transfer and process images

Once you have taken photos with your camera, you will need to get them off of your camera's memory and onto your computer's hard drive. Most camera's have apps that allow you to do this, so be sure to follow the instructions in the app that came with it.

When your images have been transferred to your computer, you are likely going to want to process them a little bit. This is especially true if you have a DSLR or other high-end point-and-shoot which takes RAW images. These can be quite large and are not compatible with Instagram.

Most images taken with a camera are quite large in size, so you are going to need to use an image editing program like Adobe Photoshop, or free tools like Pixlr to process them. What you are looking to do is to crop your images so that they are square.

If you are used to the advanced photo editing features, then do your edits before cropping. When you crop your images you should crop or resize them so that they are 640X640 pixels. This is the size of all images taken using Instagram's camera app.

Also, be sure to save the images as JPEGs, as this is the image format used by most smartphone cameras.

2. Save processed images in their own folder

It helps to create a folder somewhere on your hard drive (we recommend in the same folder where you save all of your other folders) that is specifically for images you want to post on Instagram.

When you have processed and edited the images to your liking, save the images here. Try using an easy to use file name like the date and a letter or note so you can easily tell which images are which, so you know which to use.

3. Move the images to your device

You can move images using the cloud or by manually transferring the images to your phone. If you decide to manually transfer your files, you will need to plug your device into your computer.

For users with iPhones, you can open iTunes and click on your device followed by Photos. Then select the box beside Sync photos from. Select the file you created in the step above and then Sync to transfer the images over.

For users with Android devices, plug your phone into the computer and drag the folder you created in the step above into the Photos folder of your Android device.

For Windows Phone users, plug your device into your computer and open My Computer on your desktop. You should see your device listed in the window that opens. Open the file system for your device and drag the image files you created above into the Photos folder of your phone.

If you choose to use the cloud to transfer your files, use the operating system's cloud (e.g., iCloud, Google Drive, or OneDrive) to upload the files. Just be sure to use the same account as the one on your phone.

4. Add images to Instagram

Once the photos are either on your device, or in the cloud, you can now upload them to Instagram. This can be done by:
  1. Opening the app and tapping on the camera icon.
  2. Tapping on the button in the bottom left of the screen.
  3. Selecting where the image is located on your device. E.g., the Gallery app if you placed the photos in your phone's hard drive, or the cloud service you used.
  4. Editing them as you see fit.
Once this is complete, you should be able to post your images as you usually do with any other Instagram image on your phone. Take the time to add filters, and hashtags as well as a good description before you post.

If you would like to learn more about using Instagram to share your images then get in touch and we will show you the advantages of the bigger picture.

Published with permission from TechAdvisory.org. Source.

Topic Social Media
August 27th, 2014

office365_Aug26_CChances are high that you spend a good amount of time editing or compiling Microsoft Word documents. Regardless of what you are editing, there will come a time when you are working on a file and the words are replaced as you type new ones. This could cause some problems, especially if you are unsure how to turn this feature off.

Word's two editing styles

Every version of Word used in businesses these days has the same two editing styles or modes:
  1. Insert mode: This is the default editing mode where words are inserted where the blinking cursor is placed. All text that comes to the right of the cursor will be moved to the right with newly typed text coming before it.
  2. Overtype mode: This mode replaces text to the right of the blinking cursor. So when you type new text any existing text to the immediate right will be replaced with the new letters.
While the vast majority of users prefer to use insert mode, overtype mode can be useful when editing documents and replacing words, or rewording paragraphs and keeping track of what needs to be rewritten.

Turning overtype on and off

On some older versions of Word, and on some computers, overtype mode is already enabled, and simply hitting Insert on the numberpad of your keyboard will turn it on. You will know overtype is active by looking at the status bar at the bottom of your document. The words OVR should be visible in bold letters.

If you don't see a status bar, try clicking on File > Preferences > View. Once in the View window, scroll down to the Windows section and tick Status Bar. Finally, press Ok and the bar should pop up at the bottom of the window.

Managing overtype

If you find that overtype cannot be activated, or have received a document where it is already activated and can't figure out how to turn it off, you can manage overtype by:
  1. Right clicking on the status bar at the bottom of the document.
  2. Clicking on Overtype to add it to the status bar.
  3. Clicking on OVR in the status bar to turn it on or off.
You can also activate or deactivate overtype by:
  1. Clicking on File followed by Options.
  2. Selecting Advanced.
  3. Scrolling down to Editing options.
  4. Ticking or unticking Use overtype mode.
If you untick Use overtype mode you will disable the feature, meaning you won't be able to hit Insert to switch between the two editing modes.

Looking to learn more about using Word in your office? Contact us today as we specialize in this area and have great tips, advice and solutions for you.

Published with permission from TechAdvisory.org. Source.

August 25th, 2014

Security_Aug18_CSince the advent of the Internet, hackers have been actively trying to exploit it. Over the past few years, many have targeted different websites to obtain user account details like usernames and passwords. There seems to be a trend where the number of accounts compromised with each new security announcement is rising. In early August, news broke that possibly the largest breach to date has been uncovered.

The latest big-scale breach

In early August, it emerged that a Russian hacker ring had amassed what is believed to be the biggest known collection of stolen account credentials. The numbers include around 1.2 billion username and password combinations, and over 500 million email addresses.

According to Hold Security, the company that uncovered these records, the information comes from around 420,000 sites. What is particularly interesting about this particular attack is that such a wide variety of sites were targeted when compared this with other attacks which tend to either attack large brand names or smaller related sites.

How did this happen?

Despite what many believe, this was not a one-time mass attack; all sites that were compromised were not attacked at the same time. Instead, the hacker ring - called the Cyber Vor - was likely working on amassing this data over months or longer. How they were able to amass this much information is through what's called a botnet.

Botnets are a group of computers infected by hackers. When the hackers establish a botnet, they attack computers with weak network security and try to infect them with malware that allows the hacker to control the computer. If successful, users won't even know their computer has been hacked and is being used by hackers.

Once this botnet is established, the hackers essentially tell the computers to try to contact websites to test the security. In this recent case, the computers were looking to see if the websites were vulnerable to a SQL injection. This is where hackers tell the computers in the botnet to look for fillable sections on sites like comment boxes, search boxes, etc. and input a certain code asking the website's database to list the stored information related to that box.

If the Web developer has restricted the characters allowed in the fillable text boxes, then the code likely would not have worked. The botnet would notice this, and then move onto the next site. However, if the code works, the botnet notes this and essentially alerts the hacker who can then go to work collecting the data.

So, is this serious and what can I do?

In short, this could be a fairly serious problem. While 420,000 sites may seem like a large number, keep in mind that the Internet is made up of billions of websites. This means that the chances of your website's data being breached by this ring are small. That being said, there is probably a good chance that one of the sites related to your website may have been breached.

So, it is a cause for concern. However, you can limit the chance of hackers gaining access to your information and a website's information.

1. Change all of your passwords

It seems like we say this about once a month, but this time you really should heed this warning. With 1.2 billion username and password combinations out there, there is a chance your user name for at least one account or site has been breached.

To be safe, change all of your passwords. This also includes passwords on your computer, mobile devices, and any online accounts - don't forget your website's back end, or hosting service. It is a pain to do, but this is essential if you want to ensure your data and your website is secure from this attack.

2. Make each password different

We can't stress this enough, so, while you are resetting your password you should aim to ensure that you use a different one for each account, site, and device. It will be tough to remember all of these passwords, so a manager like LastPass could help. Or, you could develop your own algorithm or saying that can be easily changed for each site. For example, the first letter of each word of a favorite saying, plus the first and last letter of the site/account, plus a number sequence could work.

3. Test your website for SQL injections

If you have a website, you are going to want to test all text boxes to see if they are secure against SQL injections. This can be tough to do by yourself, so it's best to contact a security expert like us who can help you execute these tests and then plug any holes should they be found.

4. Audit all of your online information

Finally, look at the information you have stored with your accounts. This includes names, addresses, postal/zip codes, credit card information, etc. You should only have the essential information stored and nothing else. Take for example websites like Amazon. While they are secure, many people have their credit card and billing information stored for easy shopping. If your account is hacked, there is a good chance hackers will be able to get hold of your card number.

5. Contact us for help

Finally, if you are unsure about the security of your accounts, business systems, and website, contact us today to see how our security experts can help ensure your vital data is safe and sound.
Published with permission from TechAdvisory.org. Source.

Topic Security
August 19th, 2014

Facebook_Aug18_CFor many users, Facebook is one of the best places to get to read great articles and content, largely because it is where our friends share interesting content. The problem with this is that not all of us have time to read articles or content immediately and finding these links when we do have time can be tough. To help, Facebook has introduced the Save feature.

About the Save feature

The idea behind the Save feature is that it allows users to save longer-form content like articles posted on a News Feed. So, if someone has posted a link to an article on your favorite blog and you would like to read it later, you can now save it.

While this feature is similar to various apps like Pocket and Readability, which allow users to save content on the Web to read later, Facebook's version goes a little deeper. In a blog article announcing the feature, the company noted that the Save feature allows users to, "Save items like links, places, movies, TV and music."

Let's say you are at work, and during your break you quickly check Facebook. You come across a post where your friends have shared a link to a restaurant's Facebook Page. If you don't have time to visit the page right at that moment you can save it to view later.

While this feature will prove useful for many users, it is worth noting that when you save content, e.g., an article, you will need to have an Internet connection to access it in the future. Knowing Facebook however, they may integrate a feature like this in the future.

How to save content for later

Facebook has integrated this feature into all versions of Facebook, including the mobile app and browser-based versions. You can save content and links by:
  1. Scrolling through your News Feed until you find an article, link, Place, etc. that you would like to save for later.
  2. Clicking on the downward facing grey arrow at the top-right of the post.
  3. Selecting Save 'content name'. Note: The name will be based on the name of the link in the post.

Accessing your saved content

If you are looking at Facebook in your browser, then you should see a tab called Saved show up in the upper part (the area just below your profile image) of the left-hand vertical bar of the page. For users who access Facebook via the mobile app, press the three horizontal bars at the top-right of the app (located just below the magnifying glass) and you should see a section called Saved under Favorites.

When you click on Saved you should see a new screen open with the content you have saved. It will be divided into different types including:

  • All
  • Links
  • Places
  • Music
  • Books
You can interact with each item by either:
  • Tapping on it - This will open the page, link, or content.
  • Sliding it to the left - This will allow you to archive the content or press More to review, share or Like the content.
If you are looking to learn more about the Save feature, or Facebook in general and how it can be used effectively in your business, contact us today.
Published with permission from TechAdvisory.org. Source.

August 15th, 2014

Virtualization_Aug11_CThere are a number of beneficial tech solutions available to business owners who are looking to improve system efficiency or reduce operating costs. One of the most useful is virtualization, or the migration of physical systems to virtual counterparts. When virtualization is successful it can really help and support a business. However, there is always a chance that it can fail if it isn't implemented in the right way. To help avoid this, here are five reasons virtualization fails, so you can be on guard.

1. Migration is forced before it is ready

One of the biggest reasons virtualization fails is that it is pushed before the company is ready for it. For example, it could be that the IT team is forced to fast-track virtualization, resulting in staff being forced to drop all other tasks and focus on migration.

If you rush, the chances of failure and mistakes always rise. And when it comes to changing systems from physical to virtual, mistakes can be compounded, thus increasing overall migration time and costs.

To avoid this you should take the time to conduct research on solutions available, workloads, applications to the move, and your specific business needs. Once you are across this, you should also take the time to get to know your systems and test them before migration.

2. Trying to implement a management plan after virtualizing systems

Some companies decide to virtualize first, and then try to figure out how to manage systems after migration is complete. This will almost always result in inefficiencies and frustration as the pressure is on not just to learn how to manage but also how to use this solution.

In order to see a more successful virtualization, you should have a management plan in place before you migrate your systems. You should look at how virtual machines will be managed, who will be doing what, as well as what systems you are going to use, and more. One of the best times to develop an overall management plan is when you are in the testing phase, well before actual migration. This will give you an idea of how systems will work in reality and how you can manage them.

3. Virtualization without employee buy-in, or involving employees

We have seen companies implement a virtualization solution without having full buy-in from the employees who will be using and managing the system. What this results in is confusion, resentment, lost efficiency, and, in some extreme situations, sabotage.

In order to successfully introduce a virtualized solution, you should ensure that all employees who will be using the system are not only aware of it but are trained on how to use it and have been given a fair chance to air their opinions. If you can achieve employee buy-in, there is a better chance that the systems will be used more effectively, and employees will be more open to other solutions being implemented.

4. Assuming one solution that works for others will work for you

An easy mistake to make is to only consider solutions successfully implemented by other businesses. The fact is, every business is different, and you should be looking for a solution that meets your specific needs.

If you go with a ready-made solution, or one-size-fits-all solution, it will likely work to some extent. However, there is a good chance that it will not completely meet your needs. This will likely result in either lost efficiency or increased investment in order to get what you need.

We recommend looking for a provider who can meet your virtualization needs with tailor made solutions. This way you will get what you need straightaway and likely not need to invest more in the future.

5. Not managing your virtual solution after implementation

Unlike some tech solutions, virtualization is not really a 'set it and forget it' type of solution. You will need to manage it from the start if you want to be able to get the most out of your systems. This includes ensuring resources are being allocated properly; machines are created and shut down properly; apps and systems are updated; and more.

While virtualized solutions do require less management than their physical counterparts, they still require some management and you will need people to help you do that. One of the best solutions is to work with an IT partner like us who can help manage your systems and ensure that they are working efficiently.

In fact, we offer a wide variety of virtualization solutions. By working with us, we can help take some of the virtualization load off and allow you to focus on running your business. If you would like to learn more, contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

August 13th, 2014

AndroidTablet_Aug11_CWhile Android is one of the most popular mobile operating systems out there, many business owners often view it as being not secure enough, or being difficult to manage. In an effort to make the system even more useful for businesses, and more secure, the company has announced a new program called Android Work which will be released with the next version of Android.

What exactly is Android Work?

Android Work is a program that is being developed by Google that will be introduced in the next version of Android - Android L. Because of the overall open and somewhat fragmented nature of Android, many businesses have been struggling to manage devices. In an effort to attract business customers, device manufactures have come up with their own business-centric suite of features that boost device security and manageability.

While there are a number of options out there, Samsung has had the most success with KNOX. This is essentially a secure version of Android that can be managed by businesses. With devices running KNOX, administrators can separate personal and work features, as well as manage and secure business apps and content on a user's device.

The best way to think of this program is that it enables a completely separate business profile, that can be managed by a company, on a personal device. Users with a system like this will be able to separate work and personal apps, content, and data, but still be able to use the same device. This is what mobile experts refer to as containerization - business apps and data are essentially stored in a container that is kept within the overall Android system.

Google found this idea of being able to separate personal lives and work on the same device to be something worth investing in, and have subsequently developed Android Work based on the KNOX platform. This will allow all Android users, not just users with Samsung devices, to take advantage of this program.

When launched there will be a number of key business oriented features beyond just the KNOX support. Here are two of the most talked about.

Seamless transition between personal and work data

Containerization is usually referred to as creating a separate system on one device, kind of like having a work and personal profile on your computer. While this is great, it can be annoying to switch between profiles on your device. So, Google has decided to modify the way containers work, making them more seamless.

With Android Work, IT will be able to install and manage apps on a user's device - they have to agree to this of course. Only, these apps will appear on the device beside personal apps and will be useable just like any other app. In the background however, the Android Work managed apps will sit in their own container. This container will apply heavy encryption to related data going in and out of the device, and restrict what users can do with the app (based on whatever rules the IT admin has set).

The key here is that while the apps and security are separate, the user will not notice any major difference and will be able to interact with both personal and business apps from the same profile. They will be able to tell the difference between work and personal apps as apps installed, managed or related to Android Work will have an identifying badge on the icon.

Easier deploying and managing of apps

With Android Work, IT admins or managers will be able to bulk purchase apps from the Google Play store and have them automatically installed on user's devices. If you use separate apps, or have developed apps for use in-house, you will also be able to push these to devices.

Beyond that, there will be admin panels that can push updates to apps on all devices, or even bulk manage existing apps. While the user will see no real difference, the apps in the Work container are managed by the administrator, not the user.

Will Work be useful?

Many business owners have been asking this question over the past few months, and the answer really depends on how you use devices in the office. If you support BYOD (Bring Your Own Device), you will be able to easily manage the apps, data, and security of just the business related apps, while still allowing personal apps and data to be installed on the same device.

Companies who provide their employees with mobile phones or tablets will also find Android Work useful as it will enable easier management and enhanced security across a variety of Android devices.

When will Android Work be available?

As of now, Android Work is still in development, but Google has noted that it will be released as a feature of the next version of Android, which is slated to be released this fall.

If you are looking to learn more about Android Work, or how to manage Android devices, contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.