December 11, 2019
Sales Engagement - The Definitive Guide
Top 10 Security Deployment Actions with Microsoft 365
Microsoft increases productivity and protects assets with OneDrive for Business
View: Microsoft increases productivity and protects assets with OneDrive for Business
December 10, 2019
Dynamics 365 automates complex transactions and business processes
View: Dynamics 365 automates complex transactions and business processes
Making the shift to a modern desktop with Microsoft 365
View: Making the shift to a modern desktop with Microsoft 365
Belgrade Nikola Tesla Airport
TEI Microsoft Dynamics 365 For Finance Operations
Microsoft 365 Windows 10 Flyer
December 9, 2019
Customer Story: Park Place Technologies builds personal relationships to drive global sales
Office 365 keeps your business compliant - around the clock
December 4, 2019
How to bake automation into your company's architecture, from the ground up
Workplace agility: The true secret to improving productivity and efficiency
Mapping Data Protection Strategies For The New Year
Don't Miss Another Post from Bay Area IT Solutions, Inc.
View: Don't Miss Another Post from Bay Area IT Solutions, Inc.
December 3, 2019
Modernize Your Sales Productivity in Hours, Not Days
Unlocking Future Potential with Dynamics 365 and Power BI
I have solutions from many vendors in my IT environment. How can Microsoft help me secure our entire digital landscape?
Customer story: Zespri
Map to your customers' sales expectations
December 2, 2019
Customer story: M-KOPA Solar
Customer story: Goodyear
How small businesses can safeguard their data
November 26, 2019
Experience is everything: Here's how to get it right
How can Microsoft help me understand my current security posture and get recommendations on how to improve?
Managing the enterprise cloud with Operations Management Suite
View: Managing the enterprise cloud with Operations Management Suite
What is Microsoft Azure?
Do more beyond the Core Microsoft Dynamics 365 + SAP
November 25, 2019
Deploying Windows 10 at Microsoft as an in-place upgrade
View: Deploying Windows 10 at Microsoft as an in-place upgrade
Customer Story: Compass Group serves up a global solution with Microsoft Dynamics 365
Modernize your ERP with a multi-tiered deployment for Operations Finance
View: Modernize your ERP with a multi-tiered deployment for Operations Finance
Microsoft 365 Office Flyer
Your Data is Safe with Office 365
November 20, 2019
How Do We Design Workplaces For Maximum Productivity
Five Ways to Effectively Optimize Your Business Operations
Three steps to a new paradigm for disaster recovery and backup
November 19, 2019
Customer story: Maersk
How do I find and manage shadow IT and rogue devices, and put policies in place to ensure we remain secure?
Customer Story: Dell
Customer Story: Michael Hill
Five revenue killers and how to defeat them
November 18, 2019
Defend, protect, secure. IT heroes in action.
November 13, 2019
Five revenue killers and how to defeat them
Protect your data in files, apps, and devices, within and across an organization
View: Protect your data in files, apps, and devices, within and across an organization
November 12, 2019
Protecting Azure resources with Recovery Services vault
View: Protecting Azure resources with Recovery Services vault
Backup and Disaster Recovery
Creating an immigration workflow management solution with Dynamics 365
View: Creating an immigration workflow management solution with Dynamics 365
Increasing employee productivity with Microsoft Search in Bing and PowerApps
View: Increasing employee productivity with Microsoft Search in Bing and PowerApps
Modernize your ERP Operations Finance
November 11, 2019
Microsoft 365 Powered Device Pilot Datasheet
Customer Story: BP deploys Microsoft 365 to improve user experience and security
November 6, 2019
Increasing Agility in the Enterprise with Digital Technologies
November 5, 2019
13 Tech Experts Predict The Industry's Biggest Challenges In 2019
Be A Prepper: The Keys To A Digital Disaster Recovery Plan For Business Leaders
Customer story: Nakilat
Don't miss another post! Subscribe now.
Discover threats quickly, remediate immediately, and mitigate the impact of malware and breaches
November 4, 2019
Customer story: Renault Sport Formula One
Customer story: Xiaoyi Technology
Breaches happen. Learn how to protect your organization.
View: Breaches happen. Learn how to protect your organization.
October 30, 2019
Forrester Wave: Sales Force Automation Solutions
Using cloud technologies to improve disaster recovery
October 29, 2019
Azure Backup datasheet
A breach is inevitable. How can Microsoft help me detect and respond fast?
View: A breach is inevitable. How can Microsoft help me detect and respond fast?
Transforming facilities management with Dynamics 365 at Microsoft
View: Transforming facilities management with Dynamics 365 at Microsoft
Exploring Windows 10
Microsoft Dynamics 365 for Finance and Operations
October 28, 2019
Why your business should shift to a modern desktop with Microsoft 365 on a new device
View: Why your business should shift to a modern desktop with Microsoft 365 on a new device
The Minnesota Vikings streamline operations with Microsoft
Customer Story: Guarding university data with a holistic security model
October 23, 2019
Why SMEs Should Embrace The Flexi-Time Movement
10 Things To Consider When It Comes To Disaster Recovery
October 22, 2019
Customer story: Allscripts
The Top Digital Transformation Trend For 2019
Don't miss another post! Subscribe now.
Microsoft Security Intelligence Report: Volume 23
Customer story: Lay Bare
October 21, 2019
Customer story: Qantas Airways
3 ways modern sales productivity technologies drive results for high-growth SMBs
Microsoft identity-driven security
October 16, 2019
Don't miss another post from Bay Area IT Solutions, Inc.
View: Don't miss another post from Bay Area IT Solutions, Inc.
October 15, 2019
Customer story: Fleet Complete
Microsoft 365 Holistic Security
4 Sales Trends That You Need To Know About In 2019
Customer story: Team Rubicon
October 14, 2019
Customer story: TD Bank
Modernize sales productivity
October 9, 2019
Bootiful Azure: Taking Your First Steps with Microsoft Azure (1/6)
October 8, 2019
Customer Experience in Financial Services and the Influence of Technology
Workplace Agility: The True Secret To Improving Productivity And Efficiency
Don't miss another post! Subscribe now.
Intelligent security for the modern workplace
Modernizing the Data Estate with Azure | Rohan Kumar
October 7, 2019
Customer story: Moneris and Dynamics 365
Customer Story: Puma and Office 365
Streamline seller workflows
Modernizing the Data Estate with Azure | Rachita Sundar
October 2, 2019
User experience overview animation
Don't let Cloud security fall through the cracks
October 1, 2019
THE MICROSOFT DIGITAL TRANSFORMATION SERIES Part 2: Engaging Customers
View: THE MICROSOFT DIGITAL TRANSFORMATION SERIES Part 2: Engaging Customers
Don't miss another post! Subscribe now.
Dynamics 365 for Customer Service - Create lifetime customers
View: Dynamics 365 for Customer Service - Create lifetime customers
Why Cloud Customer Flyer
September 30, 2019
Kelly Roofing keynote demonstration
Customer Story: Kier Group PLC
Azure SQL Database Managed Instance
September 25, 2019
Azure SQL or SQL Server: Which one is right for you?
The millennial arrival and the evolution of the modern workplace
September 24, 2019
Why a 'Personal' Customer Experience Is Critical to Your Business' Success
AI leveling the playing field with Dynamics 365
Customer story: Special Olympics
Customer story: Miral
Smooth success: How we gained manufacturing insights with Dynamics 365 Business Central
September 23, 2019
Don't miss another post! Subscribe now.
How to fight back if you've been hacked
Customer Story: SitePro - part 6
September 18, 2019
Business Central AI infographic
The feds and the states are embracing privacy law - what that means to your business
Listening to customer feedback with Azure Machine Learning
View: Listening to customer feedback with Azure Machine Learning
September 17, 2019
How Microsoft planned and deployed Skype for Business to the Office 365 Enterprise E5 cloud
View: How Microsoft planned and deployed Skype for Business to the Office 365 Enterprise E5 cloud
Business Central UK Authority
Business central capabilities
5 Reasons your organization should move to the cloud
Customer Story: Qantas Airways Limited
September 16, 2019
SQL Server and Azure SQL Database GDPR Guidance
Growing SQL Server: Features from 2008 to 2017
Customer Story: SitePro - part 5
September 10, 2019
Transforming The Customer Experience: Personalization
Modern Digital Workplace: 5 Current Trends Making Waves In The Office
Microsoft Dynamics 365 Business Central solution proposal guide
View: Microsoft Dynamics 365 Business Central solution proposal guide
Don't miss another post! Subscribe now.
Customer Story: 24 Hour Fitness
September 9, 2019
Customer story: Hershey
Why SMBs should be running their business in the cloud
Securely run and grow your business
SQL Database Engine Blog: What is Azure SQL Database Managed Instance?
September 4, 2019
Dynamics 365 Business Central Webinar
5 key areas to focus on while integrating cloud-based strategies
September 3, 2019
Dynamics 365 automates complex transactions and business processes
View: Dynamics 365 automates complex transactions and business processes
Office 365 helps secure Microsoft from modern phishing campaigns
View: Office 365 helps secure Microsoft from modern phishing campaigns
Game-changing trends E-book
Customer Service Key Capabilities
Day in the life Retail
September 2, 2019
Customer Story: Kelly Roofing 5
Customer Story: Goodyear Tire and Rubber Company
WS + SQL 2008 Extended Security Updates FAQ
Discover the benefits of modernization and save with Azure SQL Database Managed Instance
View: Discover the benefits of modernization and save with Azure SQL Database Managed Instance
Customer Story: SitePro - part 4
August 28, 2019
Three reasons why Windows Server and SQL Server customers continue to choose Azure
How To Win With A Tech-Forward Customer Experience
August 27, 2019
What is Cloud Migration and Why is it Important
Microsoft Dynamics 365 Business Central capabilities doc
View: Microsoft Dynamics 365 Business Central capabilities doc
Don't miss another post from Bay Area IT Solutions, Inc.
View: Don't miss another post from Bay Area IT Solutions, Inc.
Customer story: Jumeirah Hotels
Customer story: Toronto Zoo
August 26, 2019
SMB security: infographic
Customer Story: SitePro - part 3
August 20, 2019
Business owners guide E-book
With GDPR Disrupting Email Marketing, LinkedIn Is the Best Alternative
Transforming sales: Microsoft removes obstacles and gives back time with Dynamics 365
View: Transforming sales: Microsoft removes obstacles and gives back time with Dynamics 365
Microsoft migrates 150,000 mailboxes to Exchange Online
View: Microsoft migrates 150,000 mailboxes to Exchange Online
August 19, 2019
Microsoft Dynamics for Customer Service
Day in the life--Financial services
Kelly Roofing - Taking Business to the Next Level with Microsoft Dynamics
SQL Server 2008 and 2008 R2 end of support is coming
The total economic impact of Microsoft Azure SQL Database managed instance
View: The total economic impact of Microsoft Azure SQL Database managed instance
Customer story: RLH Corporation
August 14, 2019
Announcing new options for SQL Server 2008 and Windows Server 2008 End of Support
August 13, 2019
Why Cloud (By Default) Gives You Security You Couldn't Afford Otherwise
Technology Trends That Will Radically Change The Face Of Customer Care
It's time for small and midsized businesses to finally move beyond information silos
Don't miss another post from Bay Area IT Solutions, Inc.
View: Don't miss another post from Bay Area IT Solutions, Inc.
Customer story: TransBlue
Don't miss another post! Subscribe now.
August 12, 2019
Customer story: Providence St. Joseph Health
Kelly Roofing - Providing excellent customer service with the support of Microsoft Dynamics
Security - common mistakes
Customer Story: SitePro video 2
Customer Story: SitePro
August 5, 2019
Dynamics 365 better together with Office 365 E-book
How The Compliance Function Is Evolving In 2018 -- Five Key Findings
Kelly Roofing uses Dynamics 365 to connect and grow their business
Customer Story: Kelly Roofing
Customer Story: Marshall Public Schools
July 30, 2019
Don't miss another post from Bay Area IT Solutions, Inc.
View: Don't miss another post from Bay Area IT Solutions, Inc.
July 29, 2019
Affinity Workforce secures its future with Microsoft 365
May 28, 2019
Fake cryptocurrency apps crop up on Google Play as bitcoin price rises
ESET researchers have analyzed fake cryptocurrency wallets emerging on Google Play at the time of bitcoin’s renewed growth
- it can’t to do any harm to Trezor users given Trezor’s multiple security layers;
- it is connected to a fake cryptocurrency wallet app named “Coin Wallet – Bitcoin, Ripple, Ethereum, Tether”, which is capable of scamming unsuspecting users out of money; and
- both these apps were created based on an app template sold online.
We have reported the fake Trezor app to Google’s security teams and reached out to Trezor about the publication of this blogpost. Trezor confirmed the fake app did not pose a direct threat to their users. However, they did express concern that the email addresses collected via fake apps such as this one could be later misused for phishing campaigns targeted against Trezor users.
At the time of writing, neither the fake Trezor app nor the Coin Wallet app are available on Google Play.
The fake Trezor app
The app masquerading as a mobile wallet for Trezor was uploaded to Google Play on May 1, 2019 under the developer name “Trezor Inc.”, as seen in Figure 1. Overall, the app’s page on Google Play appeared trustworthy – the app name, developer name, app category, app description and images all seem legitimate at first glance. At the time of our analysis, the fake app even came up as the second result when searching for “Trezor” on Google Play, right after Trezor’s official app.What does it do?
The convincing disguise, however, begins and ends on Google Play. After installation, the icon that appears on users’ screens differs from the one seen on Google Play, which serves as a clear indicator of something fishy. The icon of the installed app has “Coin Wallet” in it, as seen in Figure 2.Furthermore, when users launch the app, a generic login screen is displayed, with no mention of Trezor, as seen in Figure 3. This is another indicator we are not dealing with a legitimate app. This generic screen is used to phish for login credentials – but it is unclear exactly what credentials, and what possible use they could be to attackers. Either way, whatever users enter into the fake login form is sent to the attacker’s server, as shown in Figure 4.
As seen in Figure 4, the server used to harvest credentials from the fake Trezor app is hosted on coinwalletinc[.]com. Looking into the domain led us to another fraudulent app, named “Coin Wallet” on its website and “Coin Wallet – Bitcoin, Ripple, Ethereum, Tether” on Google Play. This app is described in the following section of this blogpost.
The Coin Wallet app
The Coin Wallet app and the fake Trezor app described in the previous section have a lot in common – besides using the same server, they also overlap in code and interface. The Coin Wallet app uses the same icon that we have seen in the fake Trezor app after installation.
On its website, the Coin Wallet app is described as the “World’s leading Coin Wallet”, as seen in Figure 5.
The website contains a link to Google Play, where the app was available from February 7, 2019 until May 5, 2019 under the name “Coin Wallet – Bitcoin, Ripple, Ethereum, Tether”, as seen in Figure 6. During that time, it was installed by more than 1000 users.
The website also appears to link to Apple’s App Store, but clicking the “Available on the App Store” button only leads to the URL of the PNG image.
What does it do?
The app claims it lets its users create wallets for various cryptocurrencies. However, its actual purpose is to trick users into transferring cryptocurrency into the attackers’ wallets – a classic case of what we named wallet address scams in our previous research of cryptocurrency-targeting malware.
How this works is that the app pretends to generate a unique wallet address where users can transfer their coins. In reality, this address belongs to the attackers’ wallet, as only they have the private key necessary for accessing the funds. The attackers have one wallet for each supported cryptocurrency – 13 wallets altogether – and all victims with any specific targeted cryptocurrency are given the same wallet address.
Looking at the shared graphic elements of this and the fraudulent Trezor app, it seems that both have been created on the same basis. A Google search for “coinwallet app template” returns a generic “Android cryptocurrency wallet template” available for $40. The template itself is a benign asset turned malicious in the hands of attackers; however, we see here how such assets may be used by more attackers to create deceptive apps quickly and cheaply.
How to stay safe
If bitcoin continues its growth trend, we can expect more cryptocurrency scam apps to emerge in the official Android app store and elsewhere. When installing apps, it is important to stick to some basic security principles – even more so when money is at stake.- Only trust cryptocurrency-related and other finance apps if they are linked from the official website of the service
- Only enter your sensitive information into online forms if you are certain of their security and legitimacy
- Keep your device updated
- Use a reputable mobile security solution to block and remove threats
March 21, 2019
Facebook staff had access to millions of people's passwords
The company said it discovered the passwords during a security review in January and launched an investigation. Facebook did not say for how long they had been storing passwords in this way.
It will be notifying hundreds of millions of Facebook users and tens of thousands of Instagram users if their passwords were involved.
"To be clear, these passwords were never visible to anyone outside of Facebook and we have found no evidence to date that anyone internally abused or improperly accessed them," Pedro Canahuati, a Facebook vice president wrote on Thursday.
He added that Facebook typically "masks people's passwords when they create an account so that no one at the company can see them."
The news was first reported by Krebs on Security.
March 20, 2019
The iPhone 11 could scan the veins in your face to unlock
Apple’s upcoming iPhone 11 may use a form of Face ID that scans veins to determine who’s picking it up, according to newly discovered patents.
The patent, filed in February 2018 and discovered by BGR, shows a front-facing camera on a device which scans the veins and blood vessels in a user’s face to determine who’s using it, a feature called 'subepidermal imaging'.
This camera would scan your face, possibly using infrared, and the device’s processor would compute the information using a range of processes that are also detailed in the patents, which involve scoring the scan based on previous templates and scans.
While a patent is no guarantee that a feature will be included in a device – this patent was filed before the release of the iPhone XS, and the feature didn’t make it into that phone – it would be a small but useful step in improving the security of Apple’s handsets.
Why not Face ID?
If Apple did choose to use this feature for the iPhone 11, it wouldn’t be the first company to use vein recognition as a way to unlock a phone – the LG G8 ThinQ will also have this tech when it releases at some point in mid-2019.The reason many companies are moving from face recognition to veins is that some phones, like the Samsung Galaxy S10, can be tricked into unlocking for the wrong user by masks or photographs, but subepidermal imaging removes this risk.
The patent includes a rough sketch of whatever iPhone or iPad would use this technology, including its camera, which would have a flood illuminator and speckle illuminator, two forms of imaging technology, as well as the main sensor – but we can’t tell anything else about the device from the picture.
The iPhone 11 launch is still a way out, given that Apple always launches its flagship handset towards the end of the year
How to set up emergency location sharing on Android, iOS
Smartphones are spectacular for snapping photos, scanning the news, and sending messages, but they can also be literal lifesavers if you take the time to set them up before the need arises.
Both Android and iOS have easy-to-use systems for sharing your location with a friend, family member, or other trusted contact in an emergency. You can even create connections that’ll allow you to check up on loved ones to see if their phone has detected movement lately and then request an automated location update if you’re unable to reach them.
The key to all of this is to configure your emergency system ahead of time so it’ll be available in case an actual emergency occurs. Take two minutes now, and then rest easy knowing your phone’s ready.
The simple option for iOS
If you’ve got an iPhone, Apple offers a built-in Emergency SOS system that gives you a quick way to call 911 (or the equivalent emergency service provider) and then alert a group of predefined emergency contacts — all in one fell swoop
To start, you need to tell your phone who your emergency contacts are:
- Open the Health app.
- Tap the “Medical ID” tab.
- Tap “Edit.” (If you haven’t yet created a medical ID, you’ll need to do that first.)
- Find the “Add emergency contact” option, and add however many people you want.
Apple’s iOS Health app holds the key to configuring emergency location sharing on an iPhone.
Now, if you’re ever in an emergency situation with an iPhone 8 or later:
- Press and hold the power button along with either volume button, and you’ll see an “Emergency SOS” countdown appear on your screen.
- Keep holding both buttons until the countdown ends.
- Your iPhone will automatically call 911, and as soon as the call disconnects, the phone will text your emergency contacts with your current location.
The simple option for Android
Android doesn’t have a similar all-in-one function, though it does provide a way to offer emergency services information about a preassigned emergency contact from the lock screen. While the setup may differ somewhat depending on what phone you have and which version of Android it runs, the basics should be the same.
- Go to your phone’s lock screen. (You don’t have a screen lock set? Why not?)
- Look for the word “Emergency” at the bottom of the lock screen. Tap on that.
- Tap on “Emergency information” and then on the pencil symbol (or, depending on your phone, on “Add”). You’ll be asked to put in your PIN or lock pattern.
- This will bring you to your Emergency information screen where you can add personal information (such as blood type or any existing medical conditions) and any contacts you want to be notified.
For a more robust setup in which you can share and request locations with trusted contacts — without needing to make a 911 call — download Google’s Trusted Contacts app for Android or iOS. Once you’ve signed in, create your list of connections.
- Tap the “Add Contacts” box on the app’s main screen.
- Find and tap the name of anyone you want to add.
- Once that person has approved your request (and installed the app onto their phone as well), you’ll always be able to see if they’ve been active recently and also if their phone’s battery is critically low.
- On the app’s main screen, select the person with whom you want to share your location.
- Tap “Send location alert now.”
- Your location will be shared for 24 hours or until you hit the “Stop” button.
And to request someone else’s location:
- Tap the person’s name on the app’s main screen.
- Tap “Ask for [person’s] location.”
- The app will alert the person to your request, and if they don’t respond within a set period of time, it’ll automatically share their location with you.
By default, Google’s Trusted Contacts app will share a requested location after five minutes without a response.
It’s the type of thing you hope you’ll never need, but with loved ones, in particular, it can bring valuable peace of mind to have it standing by just in case.