alt tag

Security Posts


Android and IOS: Is the Device Just Old, or Is It Obsolete?

Tuesday, May 23rd, 2017

clocks-33832_640

When trying to determine if a piece of technology is simply old or completely obsolete, keep in mind that there are different criteria for Android and iOS devices than for desktop and laptop computers. An employee stuck using an obsolete device is likely, after all, to argue that replacing it would increase their productivity.

On the flip side, replacing functional devices too often can spiral out of control into unnecessary expenses.

An IT consulting firm can help your business understand how long a device should remain in use, a safe time range for buying older models, and how to plan upgrade cycles.

How Long Before It’s Over?

The general rule is that a device becomes obsolete about four years after its release. This means that trying to save money by purchasing older devices on the cheap may not work out well, as they are unlikely to receive updates as long as a newer device. Usually you can buy only the most recent and second most recent smartphone devices new, but older refurbished devices are readily available.

The Issues with Old Devices

Determining if a device is aging vs. obsolete is pretty straightforward: If the employee can still complete all necessary work with the device, it is not yet obsolete.

However, older devices often have performance issues; notably, they may operate slower than the latest models. Older devices using Android often receive updates late, too, so users won’t receive security and interface improvement patches as soon as they’re available.

Obsolete Device Issues

Forbes paints a pretty grim picture of aging devices, declaring that smartphones have about two years before they’re obsolete. Still, users can typically continue on without any major problems for an additional year or two.

Once obsolete, however, many devices are prone to disruptive conditions:

  • Security updates are no longer provided.
  • Vital applications are no longer compatible with the operating system.
  • The web browser ceases to display web pages correctly.

The Apple Situation

Officially, Apple considers any product more than five years old obsolete, meaning the company tends to support their devices for a little longer than Android distributors. Apple usually supports iOS devices with the latest operating system for about four years. At this point the device will not receive updates, but it will still likely work for a while longer.

The device typically hits the obsolete category when it no longer runs the most recent version of iOS. If you buy an iOS device that’s already been on the market for two years, you’ll have to plan to replace it in another two years. A one-year-old device will be good for at least three years.

The Android Situation

Android devices have a two-tier obsolescence system in which system updates stop coming and applications stop working. Android is a much more difficult case to gauge because updates need to come through Google, go to the manufacturer, and then reach the phone provider.

Android users can expect operating upgrades for two years after the phone is released, and a few additional months of security updates; both are soft obsolescence moments. What finally ends an Android device’s life (or, at least, its usefulness) is application incompatibility after about four years, which is dependent on the developer. Most try to support the oldest version possible, but this is not always the case.

If you want to make sure your employees are using up-to-date devices that increase productivity, MPA Networks can provide an IT and productivity assessment. Contact us today.

Scheduling Security: Take Control of Your OS Updates

Wednesday, May 10th, 2017

update-1672385_640

It happens to everyone: You turn your computer back on after you intended to leave the office, or come in early to get a head start on a new project, only to be greeted by a 20-minute operating system (OS) update session. This common workplace frustration turns what should have been a four-minute job into a half-hour ordeal, forcing you to stay behind or defeating any time gains from starting early.

OS updates provide essential security fixes that keep your business safe, but the platforms have a knack for pushing updates at what feels like “the worst possible time.”

Here’s what you can do to remain one step ahead of your updates at all times.

Change the Default Settings

Don’t leave operating system updates on their default settings, because they’re likely to interfere with work when you need the devices. The solution to this productivity- and attitude-killing problem is to adjust the system settings to force the updates at a specified time when your team won’t need them. Other software, like Office, Photoshop, and web browsers, tend to be less of a problem, since their update sessions are usually much quicker.

Updates Are a Security Issue

The worst solution to update inconvenience is to disable automatic updates. While updates that don’t add any new features may seem irrelevant, they’re actually doing lots of work keeping you safe behind the scenes in areas like IT security and virus/malware prevention.

According to TrendMictro, malware and other security exploits tend to target known security holes that have already been closed through updates and patches. Instead of finding new exploits, it’s easier for hackers to continue to exploit the old ones and take advantage of users who do not update their computer software.

Schedule Around Work to Increase Productivity

Microsoft usually posts their updates on the second Tuesday of every month, which is commonly known as “Patch Tuesday.” However, this may not work well with your business if it disables employee computers Tuesday night or Wednesday morning. The ideal time for updates will differ depending on your business, but for the typical Monday-to-Friday 9-to-5 office, you will be best served by installing updates around 2 a.m. on Sunday morning. Devices can even be individually customized for each employee based on their personal schedule.

The IT Consulting experts at MPA Networks are ready to help your business make technology work for you, not against you. Scheduling updates is a desktop management and support issue, which IT Managed Services can deliver. Contact us today to find out how we can help you better manage your office computers.

The Three Copies Rule: Why You Need Two Backups

Wednesday, May 3rd, 2017

usb-932180_640

Anyone who has ever lost years of work due to computer failure will tell you that backing up your devices can save you considerable heartache and frustration. Reliable, redundant, and regular data backups are your business’s best strategy for disaster recovery—but two copies of your data may not be enough.

IT pros across the world have developed the “3-2-1” backup philosophy to maximize your restoration capacity following a data disaster.

The “3-2-1” Concept

The “3-2-1” approach is simple:

  1. Store three copies of your data.
  2. Utilize multiple storage formats.
  3. Keep one copy off-location.

TrendLabs says that having two backups of your data (meaning three copies total) is all about redundancy. IT professionals have nightmares about experiencing computer or server failure and preparing to restore the backup, only to find that the backup has failed as well. Your business can prevent this situation only by keeping two backup copies of all your important data.

We can’t stress often enough that three copies means three separate devices. Backing up data to a second hard drive in the same computer, or a connected SD card, does not count. This will only protect your data in the event that one of the hard drives breaks.

Some useful backup devices include:

  • External hard drives
  • NAS
  • Cloud storage
  • DVD/Blu-Ray discs
  • Flash drives
  • SD cards

Two Formats: Diversify Storage Media

Using different types of storage for backup improves reliability: It not only diversifies the factors that could cause the backup to fail, but also acts as an extra layer of protection. For example, if both backups are on external hard drives and exposed to a large magnet, both would be destroyed. However, a second copy stored on optical media or a flash drive would survive.

The two backup locations could include a backup external hard drive and cloud storage, or a DVD archive and an onsite NAS server. According to PC & Tech Authority, NAS servers are a great backup option for offices with several networked computers. We’ve discussed storage format longevity in previous blog posts if you need help deciding which one is right for you.

Keep at Least One Copy Offsite for “Catastrophe Recovery”

Catastrophe recovery is another way to describe a worst-case disaster recovery scenario: for instance, the hard drive didn’t fail, but a flood leveled your office, or someone stole both the computer and the backup in a burglary. In order to prevent an outright catastrophe, it’s not safe to keep every copy of your important data under the same roof.

This means, of course, that one of your backup copies should be stored in a secondary locationthe farther the better. The offsite backup could be, for example, a cloud backup, or an external hard drive stored in a bank deposit box. When working with a non-cloud, off-site solution, it helps to swap out two storage devices on a weekly basis.

If your company is looking to streamline its disaster recovery practices with IT Managed Services, contact the experts at MPA Networks today.

Top 5 Security Tips for Email and Social Media Accounts

Wednesday, April 26th, 2017

email-2151046_640

Email and social media accounts provide a wealth of cyber security challenges for businesses. Hackers often look for exploits in account operations to steal information and seize control—both of which can be extremely damaging and difficult to combat.

A compromised account is a problem for any business, but the confidential nature of financial, legal, and healthcare data means the stakes are even higher for these industries.

The following five tips highlight ways your business can protect its digital assets from malicious seizure and abuse.

1. Protect Yourself with Internal Accounts

Old, unused email and social media accounts aren’t just clutter: They’re metaphorical Trojan horses. Staff should use an internal email address (e.g., yourbusiness.com) whenever this is feasible. It’s possible that an email or social media provider will recycle unused account names at some point, which can be used to steal access to any contingent account still tied to the original. However, internal accounts may not always be possible in cases like Google services requiring a Google account.

2. Use Stronger Authorization Credentials

While only available on some platforms like Google and Apple, 2-step verification is among the best available security practices to keep your accounts safe. These systems work by sending a text message with a time-sensitive code to your mobile device that needs to be entered any time someone logs in to the account using a new device. Even if the password is compromised, 2-step verification prevents account access without the associated mobile device.

3. Avoid Reusing Passwords

If you can’t use 2-step verification, a strong, unique password is your next best option. Email addresses are often used by different online services as an account identifier and password recovery method. If someone is able to reactivate an old email account, or create a new one that uses the same address, they can use “forgot” or “reset” password commands for accounts tied to that email address in order to seize access.

This situation is especially hazardous when staff members use the same password for all accounts. In these cases, email-based password recovery systems will not just restore access, but hand over the password.

4. Delete Over Deactivate

Make sure accounts are actually deleted, not just deactivated. Old, deactivated accounts become low-hanging fruit for hackers that your staff isn’t paying attention to. To put it bluntly, the more accounts tied to your company’s internal services, the more venues hackers have to exploit. Limit your exposure by closing unused accounts.

5. Remove Contingent Permissions

If you’ve deleted an account, it’s wise to remove any internal permissions in other services tied to it to prevent someone else from creating a new account with the same details. Email-related logins may still work on other services even after the account has been deleted.

For example, don’t just delete a departing employee’s Gmail account; remove their account permissions from Google Analytics and Facebook account management as well. Your team should also make sure any contingent service accounts connected to that email address are removed. It may help to work with an IT consulting service to devise a cleanup procedure for employee departures.

If your business is looking to secure its digital assets, MPA Reliable Networks Email service is a great place to start—not just for its risk mitigation security benefits, but also its productivity and continuity perks. Contact us today for more information.

This Is the End: Microsoft Takes a Hard Stance on Phasing Out Older Windows Versions

Tuesday, April 11th, 2017

windows-10-1995434_640

If your business hasn’t already made the switch from Windows 10’s predecessors to a new operating system, it’s time to make the initiative a priority. While your IT staff doesn’t need to upgrade every computer in your office, it’s necessary to make sure all vital software is compatible with Windows 10 because new replacement devices won’t fully support older Windows versions.

According to ZDNet,

computers running Intel’s 7th-generation Core CPUs and AMD’s Ryzen CPUs will no longer receive operating system updates for Windows 7 and 8.

Without updates, you are likely to experience IT security issues.

The Writing Is on the Wall

The change does not affect computers built and purchased before the last few months of 2016, but it matters for any new computer running new hardware. Back in January of 2016, Microsoft announced that new CPUs will only be compatible with Windows 10, so anyone looking to buy new hardware and put an older version of Windows on it is out of luck. However, Microsoft will continue to support Windows 7 and 8, with extended support for security updates through 2020 and 2023 respectively.

Plan Your Transition: Business Continuity Concerns

This change in policy means that moving over to Windows 10 will eventually be the only option. Your business should begin to develop a migration strategy with the help of IT consulting services to phase in Windows 10 devices as you replace older systems running incompatible hardware. Also, if your business plans to look into other options like Macs and Chromebooks, this is the perfect time to do it.

Make sure to consider these issues in your transition away from older versions of Windows:

  • Run a pilot Windows 10 system to ensure continuity for your existing work environment. Test your employees’ daily workflow on this system.
  • Install all the software your business uses on this system and see if it works with Windows 10. Your tests may identify legacy software that’s no longer supported but that you’re currently using for important operations. This can lead to expensive, painful transitions to replacement software.
  • Adjust your upgrade strategy to accommodate your findings. This could involve changing the schedule to allow more time for employees that run incompatible software to work out a solution. It’s most efficient to plan to upgrade to Windows 10 upon device replacement; however, if your tests don’t find any problems, you may opt to upgrade existing systems early. Note that the Windows 10 free upgrade period ended in July 2016.

Legacy Software Concerns

Your company may find that some of the software you’ve been using for the past 15 years without any problems will not work under Windows 10, which puts your business in a difficult position. Replacing software that’s vital to day-to-day operations can be a very disruptive process. Managed services providers can help your business devise a contingency plan to keep the old software running, but it’s a best practice to migrate to a contemporary solution eventually. There are a few options your company has to keep those older systems running so you can keep using the old software, including upgrading/repairing the old systems and running older versions of Windows through a virtual machine.

The experts at MPA Networks are ready to help your business find its best OS solution to balance productivity with security. Contact us today.

Mac- and Linux-Based Malware Targets Biomedical Industry

Tuesday, March 14th, 2017

virus-1920629_640

The malware infection, discovered in late January, that’s been hiding out on Mac and Linux devices for more than two years doesn’t mean the security floodgates are open, but it is a reminder that these devices aren’t invincible. Apple is calling this new malware “Fruitfly,” and it’s being used to target biomedical research. While not targeted for Linux devices, the malware code will run on them.

This attack may hit a little too close to home for those industries MPA Networks specializes in protecting, including healthcare and biotech. That makes this a good time to reexamine security best practices for devices that aren’t commonly targeted for attacks.

Attacks Are Rare, But Not Impossible

Broadly speaking, any device that isn’t running Windows has benefited from a concept called “security through obscurity,” which means hackers don’t bother going after these devices because of a smaller market share.

Mac OS X and Linux provide more secure options than Windows for various reasons, but neither is an invincible platform.

Every so often, hackers strike the Mac community with malware—and when the attacks are successful, it’s typically because users don’t see them coming. The lesson here, of course, is to never let your guard down.

You may not need an active anti-virus program on a Mac, but occasional anti-malware scans can be beneficialAccording to Ars Technica, “Fruitfly” uses dated code for creating JPG images last updated in 1998 and can be identified by malware scanners. Anti-malware programs like Malwarebytes and Norton are available for Mac devices. MPA Networks’ desktop support and management can also improve user experiences on non-Windows devices.

Keep Your Macs and Linux Machines Updated

The old IT adage that says “keeping your programs updated is the best defense against security exploits” is still true when it comes to Mac OS X. While Mac OS X upgrades have been free or low-cost for years, not everyone jumps on to the latest version right away. For example, less than half of Macs were running the latest version of the OS in December of 2014. This means all the desktop and laptop devices running older versions of Mac OS X are exposed to security holes Apple patched with updates.

Typically, Apple only supports the three most recent versions of their operating system, which usually come in annual releases. Your workplace computers should, at the very least, be running a version still supported by Apple. The good news is that Apple quickly issued a security fix to address Fruitfly. The bad news? This isn’t the first Mac OS vulnerability malware has managed to exploit, and it won’t be the last.

The IT consulting experts at MPA Networks are ready to help your company find the right tools to increase productivity and improve security on all your office devices. Contact us today to get started.

Network-Attached Storage: Data Backup and Transfer Options for Small Businesses

Thursday, March 9th, 2017

upload-2013228_640

Network-Attached Storage (NAS) servers are a great asset for small businesses managing data. For the uninitiated, NAS is essentially a streamlined server designed specifically for sharing files between devices.

Because of their simplified nature, NAS devices are typically easier to use and substantially more cost-effective than full-fledged servers.

While most NAS solutions are space-efficient standalone server boxes, some higher-end routers can also be used as NAS devices by attaching an external hard drive. If your office is looking to increase productivity and improve disaster recovery, NAS may be worth its weight in gold.

Easy-to-Use Data Storage

NAS devices work as an inexpensive, easy-to-use data storage option for your business. These devices are so simple to configure that your office doesn’t even need to have a local IT staff to use them. Once configured, accessing the storage can be as simple as using Explorer or Finder as you would with any internal storage device.

Practical Backup and Recovery

In their most practical form, NAS devices can be used as a backup and disaster recovery option for office computers. This way, if a computer hard drive fails or a laptop gets destroyed, your staff can recover recent versions of important documents and files.

However, NAS does not replace the need for Cloud or off-site backups for vital information. An office fire, for example, would wipe out desktop computers and the NAS. Combining both NAS and Cloud backup processes gives your business the best level of protection from data loss.

Faster Information Sharing

NAS is also a viable business continuity option as it does not require Internet connectivity to work. Employees who use multiple devices, such as a laptop, desktop, and tablet, can use the NAS to access the same files from any deviceThese data servers are also excellent for employees collaborating on the same files; gone is the need to use email or Cloud storage to sync or send updates.

Cost-Effective Hardware Comes at a Price

NAS devices aren’t as sophisticated as traditional servers. Designed only to focus on sending and receiving data, they offer substantially less processing power. You won’t be able to use a NAS device to run an email server, for example, or to run any server-based applications. For these, you’ll need to look into server management solutions.

Because of this trade-off, however, NAS devices cost a fraction of the price of a dedicated server. Moreover, your business doesn’t need to worry about wasting money buying too much or too little storage because you can install additional hard drives in the NAS device as needed.

Security Issues

As mentioned above, NAS servers should not be used as a replacement for an off-site, Cloud-based backup. IT professionals often recommend storing important data in at least three locations: two “on-site,” which includes the computer and the NAS, and one “off-site,” like a Cloud service. Additionally, if your business is using NAS storage, you’ll want to make sure it is only visible to authorized individuals. Security in this case could include something as simple as password-protecting the Wi-Fi.

Use our wealth of knowledge at MPA Networks to your advantage to meet your business’s server and storage needs. Contact us today.

8 Spring Cleaning Tips for Your Office Computers

Wednesday, March 1st, 2017

bucket-303265_640

When it comes to your office computers, a little bit of spring cleaning goes a long way. Sure, cleaning office computers can seem tedious. But think of it like preventative maintenance on a vehicle: In the best-case scenario, you’ll never know all the breakdowns you avoided.

Keeping your office computers clean and healthy minimizes your risk of downtime and increases productivity.

Here are 8 tips for your next round of spring cleaning:

1. Update All Software

Run updates and patches for the operating system, commonly used programs, and security software on every system. Program and operating system updates don’t just add features; they’re loaded with security updates that keep your devices safe. Most problems with computer security exploits stem from outdated software that allows hackers to break through established breaches that the developer already closed, so running updates and patches is your best line of defense.

2. Run a Full Anti-Virus Scan

After updating all the software on the computer, run a full anti-virus scan to catch any malicious software hanging out on the device. Active anti-virus protection does a good job of safeguarding the system against infections, but sometimes malware slips through the cracks.

3. Run a Full Anti-Malware Scan

Anti-virus programs go after specific, high-risk malware infections, meaning lower-level malware can still find its way onto your computers. Anti-malware programs including Malwarebytes and Spybot are better equipped to identify and remove malware that the anti-virus misses.

4. Defragment the HDD

Older PCs with traditional Hard Disk Drives (HDDs) may experience load time improvements from an annual drive defragmentation. However, newer Windows systems—and all currently supported Mac OS versions—handle this process in the background, so you don’t need to worry about it. If the computer is running a Solid State Drive (SSD), do not bother with the defragmentation process.

5. Remove Unnecessary Launch Programs

It may seem like every program installed on your computer wants to launch itself at startup—even those you rarely use. Removing unnecessary programs from the system startup can help improve performance and reduce login times. Windows 10 features a handy “Startup” tab on the Task Manager that lets users quickly toggle which programs launch with the system.

6. Check and Create Restore Points

Restore points can be a major time saver in returning a compromised computer to full operation. Restore points reverse most of the damage caused by malware and bad configurations, all with minimal effort. Check whether the computer is already using them, and create one if it isn’t.

7. Run a Full Backup

Backups are like restore points for when very bad things happen to a computer. It’s best practice to make at least two backups of a given computer’s files, and store them in different physical locations. This ensures that in the event of catastrophic loss, all the data saved on the computer up until the backup point is preserved. Mashable recommends verifying if automated backup services like Time Machine and Windows Backup and Restore are actually working.

8. Bust Dust on Desktops

This part of the spring cleaning process is literal. As we’ve previously discussed, excessive dust inside a computer obstructs airflow, which can cause crashes due to overheating and even damage components. CNET has a helpful guide on how to go about the dustbusting process.

A little spring cleaning makes for a more efficient office and stronger disaster recovery. The expert desktop support and management staff at MPA Networks is ready to help your workplace in San Mateo, San Francisco, the South Bay, and other Bay Area cities implement better practices. Contact us today for more information.

Getting a Clean Start: Managing Windows Startup Programs

Thursday, February 23rd, 2017

windows-8-1995430_640

It’s quite common that, over time, Windows systems accumulate a laundry list of programs that load when a user signs in.

While generally benign, most of these “startup” programs are unlikely to actually benefit the user—so the computer ends up doing a whole lot of work for no reason.

Fortunately, it’s very easy for someone with a little computer experience to control which programs launch at startup. Read on to find out more about the what, why, and how.

Benefits of Trimming Startup Programs

The primary benefit of trimming the startup program list is a substantially faster login process. If your employees don’t have to wait for useless programs to launch, they can access a fully-loaded desktop several minutes faster. Moreover, the system will have more available memory to run programs that are actually being used. This means the computer will be less likely to fall back on the slower-performing hard drive to operate programs, eliminating a major cause of lag.

Cutting down on startup programs also removes bloatware and other unnecessary programs the computer manufacturer installed on the device. These often extend the boot time, waste available memory, and cause errors—so you’re much better off without them. Employees who don’t reboot as often as they should will be more easily encouraged and motivated to do so if the process doesn’t drag on and on.

Accessing and Using the Built-In Startup Manager

Starting with Windows 8, Microsoft moved the Startup Manager to the Task Manager window, which can be accessed by pressing “Ctrl+Shift+Esc” and clicking the “Startup” tab. The Manager can be found on older systems by pressing “Windows Key+R,” entering “msconfig,” clicking “OK,” and selecting the “Startup” tab.

In the Windows 8 and later Managers, simply select the programs you wish to enable or disable and click the “Enable/Disable” toggle button. Enable or disable programs by checking or unchecking the box next to the desired programs in older versions of the Startup Manager, and press “OK” to finalize the changes.

At this point it’s best practice to restart the machine and ensure the system is in working order before moving on. If something vital is missing, access the Startup Manager again and turn it back on.

What to Disable, What to Keep

Generally speaking, the only programs that need to remain in the system startup are security-related: that is, anti-virus, firewall, and remote access applications. Most of the programs featured in the Startup Manager should have familiar names—so if a program doesn’t immediately strike you as essential, it can probably be disabled. PCWorld recommends researching unknown programs before disabling them.

If you’re unsure of which programs can be disabled, free applications like “Should I Remove It” can help guide you. MakeUseOf.com has a handy list of 10 common startup programs that can be safely disabled for (sometimes significant) performance improvements.

If your business is looking to increase productivity by running more efficient technical infrastructure, the IT Managed Services experts at MPA Networks can help. Contact us today for more information.

Digital Sticky Notes: A Time-Saver for Your Entire Team

Wednesday, February 15th, 2017

sticky-notes-938602_640

It’s a familiar sighting in the workplace: the employee with half a dozen sticky notes attached to their computer monitor. While not the most confidential or elegant solution, these employees are on to something.

Fortunately, technology has stepped in to embrace this practice and increase productivity through digital sticky notes. Teaching your staff how to use this feature helps keep your office not only more organized, but also more secure.

Boosting Productivity and Security

Like their physical counterparts, digital sticky notes have countless helpful applications: They can serve as reminders, cheat sheets, and to-do lists, to name a few.

Employees can create and destroy as many digital sticky notes as needed without wasting any paper. And digital sticky notes actually work better than making notes in a Word or Google doc, because they are continually accessible/viewable when switching between tasks.

Digital sticky notes have the following advantages over physical versions:

  • Content on the notes can be rearranged, edited, and erased at will. Reworking the list does not mean drafting a new note.
  • They serve as excellent interactive to-do listshelping employees stay organized.
  • No physical waste is created when the sticky note is no longer being used.
  • They are more secure because they’re not visible when the screen is off, the user logged out, or the system locked.
  • They come with theoretically unlimited space. Digital sticky notes allow for scrolling when more space is needed.
  • They offer an easy place to store login credentials that all employees in the workplace can access.
  • They provide a simpler platform to manage important, frequently used links than an ever-expanding bookmark list in a web browser.
  • Employees can use simple copy-and-paste commands between programs to add to the sticky note.
  • The notes facilitate email communication between devices and people.
  • They won’t fall or get knocked off the screen.

Sticky Notes with a PC

Windows calls its digital notation program “Sticky Notes.” It behaves similarly to program windows and can be accessed via the Start Menu. Searching for “Sticky Notes” in the search bar may locate the program faster.

Accessing the application will expose all existing notes; if there are none, it will create one. Users can drag and expand these digital notes to any size they deem appropriate. Click the “+” icon on an existing note to make additional notes, and click the “X” icon to delete unwanted notes. Notes can also be color-coded via the “right-click” menu. Power-users may like the available keyboard shortcuts as well.

Sticky Notes with a Mac

Macs also support a built-in digital sticky note solution called “Stickies,” which can be accessed via the “Applications” folder. Users can drag and drop the Stickies to any desired locations and resize the windows by clicking and dragging the corner icons. Employees can customize individual note colors through the “Color” menu and can add shortcuts to media files by dragging and dropping icons over notes as well.

Mac OS even features a handy keyboard shortcut to create a sticky note from highlighted text: “Command + Up Shift + Y.”

Both of these applications are free and included with the computer your employees are already using. Some employees may find digital sticky notes an incredibly valuable tool—but, if nothing else, they will help your team create a cleaner, more secure workplace. If your business is looking to boost its productivity through stronger IT practices, contact the experts at MPA Networks today.