Pittsburgh’s IT Service and Support Specialists

 

Pittsburgh, Cranberry, Greensburg, Indiana
Uniontown and throughout Southwestern PA

4th Quarter 2015- Shiloh Sound

Subscribe Today

Subscribe to Shiloh Sound e-Newsletter

Click the Envelope to subscribe to your FREE Quarterly e-Newsletter

Visit our Newsletter Archives

Windows 10 Free Download

Is it Really an Offer Too Good to Pass Up?

If you own a computer running Windows 7 or 8, by now you’ve seen the notifications encouraging you to upgrade to Windows 10, free of charge!

It seems too good to be true... an entirely upgraded operating system loaded with new features available to you free of charge, and without having to do anything more than follow the onscreen prompts.

Some of you may be wondering whether or not you should take advantage of this opportunity, and there are a few important things that need to be considered before making the switch, especially if you plan on installing Windows 10 on a number of computers at your business.

Windows 10 is definitely an improvement compared to Windows 7 and 8.

  • Starts faster and uses less memory
  • Offers a significant number of productivity-oriented features, some upgrades of familiar Windows software, others brand new
  • It is more reliable in terms of crashes and crash-handling
  • Better online search and improved security

shiloh service windows tenTo see all of the new features included with Windows 10, view this comprehensive list of new and upgraded features on Microsoft's website.

Important Factors to Consider Before You Upgrade

While the advantages may seem abundant, as with any installation process, everyone who plans on taking advantage of this free upgrade should be aware of the potential risks. If your plan is to upgrade your business systems, you should be doubly careful.

First, this free upgrade opportunity is just that, an upgrade. In order to install on a fully wiped computer, it would be necessary to purchase an actual copy of Windows 10. The upgrade is only effective on machines with Window 7 or 8 currently installed and only available until July 29, 2016.
Some potential risks to consider are:

  • The potential for errors and bugs with freshly-fielded software
  • Failed installations
  • Device and driver compatibility Issues
  • Problems with software designed for older versions of Windows

Instead of marveling at new features, you could find yourself dealing with printers that won’t print, a network that won’t network, or swearing at a plastic brick that simply refuses to boot.

If you are interested in upgrading your business computers to Windows 10, consult with Shiloh Service first.

We have experience installing Windows 10 across a range of computers, and we can advise you as to whether Windows 10 is the right thing for you, or a nightmare just waiting for you to press “install.”

Don't delay, complete our easy to use contact form, or call us today at 724-863-0190.

PCI DSS 3.0 Compliance Becomes Mandatory in 2015

pci dss 3.0 complianceIf You Processes Credit Cards, This Affects Your Business

Taking effect in July of 2015, a number of changes were made to the Version 3.0 of the PCI Data Security Standard regarding businesses which process credit card information.

Many of these changes were in response to the Target "point of sale" breach which occurred in December of 2013 and resulted in the theft of the credit and debit card numbers of 110 million customers. Since then, the standards have been revamped in multiple aspects not only in terms of maintaining a secure system, but as well as establishing liability.

Additionally, in the interests of preventing "finger pointing" in the event of a case such as the Target breach, formal documentation of responsibility in credit card processing is now required, as well as the formal presentation of acknowledgement of responsibility as presented in the PCI DSS 3.0.

Is Your Business in Compliance?

Many businesses think they are in compliance after implementing proper IT security standards and firewall protections... but this is often an incorrect assumption.

The new standards require that all unrelated systems in the same network handling credit card processing must not only be compliant to the security standards as presented in the PCI DSS 3.0, but must also undergo yearly "penetration tests" to validate that the network is indeed secure.

This matter is not being taken lightly. Failure to comply with these standards can result in fines imposed by payment brands and their partners ranging from $5,000 to $100,000 per month depending on the violation.

Does your business meet all of the new requirements?

Separate Your Credit Card Machine from Your Network

One simple, physical step to help with compliance is this: separate your credit card machine from your network. Since every machine on your network is a possible “break in point,” having your credit card processing isolated to one secure station may be best.

While Shiloh is not a PCI compliance consultant, we often work closely with credit card processing providers, delivering whatever equipment or software is needed for our customers to meet the latest compliance standards.

First, seek advice from your credit card processor, then contact Shiloh for any needed hardware or software upgrades.

Cyber Security

cyber internet network securityEven if you don’t use card swipes or handle highly sensitive customer information, how safe is your network?

More and more frequently hackers rely on the use of an unsuspecting, unknowing party to gain access to your secure network and do untold damage or physically steal critical information from your business.

While modern firewall systems and virus protection are performing better than ever, viruses and direct hacking attempts are still a serious threat. Today, the bad guys often rely on you to pull the trigger of your own destruction by using trickery and deception.

One you may have run into yourself is the Social Media scam that appears to come from a close friend of yours and begs you for help with the message “Help, I’m stranded, and I need cash now!”

You can find more information about similar attacks in our 2nd quarter 2015 newsletter How Interactive Viruses Trick You.

Threats from All Angles

If you found a flash drive laying in the parking lot of your work office, what would you do with it? Many would pick it up and plug it in, some in an attempt to find and return it to its owner, others simply out of curiosity.

That’s just what happened to the Department of Defense in 2008 involving what has been described as the worst breach of U.S. military computers in history.

The attack occurred when a flash drive containing a malicious virus was left in the parking lot of a Department of Defense facility.

The flash drive was discovered and plugged into a DoD computer, which happened to be in network with United States Central Command. This attack seriously compromised the Pentagon’s network and took nearly 14 months to fully clean up the infection.

And when you are hacked?

In today’s world, there are only 3 types of companies: those that have been hacked and know it, those who will be hacked when they least expect it, and those who have been hacked and don’t know it.

Which are you? And what will you do to fix things and make things right once it happens?

Call Shiloh Service today at 724-863-0190 to ensure that your network is safe and to prepare for the day when the inevitable may happen.

Benefits of Touch Screen Technology

touch screen technology in businessSomething that was cutting-edge and out-of-reach for the general population even 10 years ago, touch screen technology, has taken over as a part of our daily lives.

Just eight short years after the introduction of the iPhone, it is difficult or impossible to find a smart phone that doesn’t make use of a touch screen. Furthermore, almost all tablet devices also rely on touch screen technology.

Touch Technology Finds Its Place in the Business World

In the past few years, touchscreen technology has seen more and more use in productivity-oriented applications due to advantages like:

  • Efficiency – Touch screen displays are used by access portals such as modern time clocks and ATMs, allowing for speedy data entry without the use of keyboards and peripheral devices.
  • Ease of use - The simplest interaction for any user on any device is to scroll with the swipe of a finger.
  • Reduction of device size – A device that would normally be connected to a keyboard and mouse can be practically as small as the display itself!
  • Convenience – Many establishments rely on touch screen devices for placing food orders, allowing customers to simply tap the screen to make selections on an interactive menu, or to play games while waiting for dinner.

How could touch-screen technology make a difference in your business?

  • Catalog browsing and product selection?
  • Data entry and inventory control?
  • Collaborative design and communication across work sites?

For more information on how using a touch-screen can improve your business processes, contact Shiloh Service today. Or give us a call at 724-863-0190.

Return to Top