Have You Implemented These Security Best Practices?

  • Published byadmin
  • June 15, 2018

Have You Implemented These Security Best Practices?

If your business hasn’t put protections in place for your technology infrastructure, that needs to be moved to the top of your to-do list, yesterday. It isn’t as though the increasing number of threats are going to avoid you until your network is prepared to deflect them. Therefore, you need to take action now. To help, we’ll review some of the most important security considerations to make for your organization.

Latest blog entries

These Four Technologies can Give Your Business a Boost

  • Published byadmin
  • June 8, 2018

These Four Technologies can Give Your Business a Boost

Small business owners need to find creative ways to build a strong, productive operation. The best way to create the kind of productivity required to successfully grow a business is to ensure that everything works in concert. Today, we will look at a four technologies that can go a long way toward helping any small business grow their organizational productivity.

Latest blog entries

Take These Steps to Make IT Security Top of Mind

  • Published byadmin
  • March 30, 2018

Take These Steps to Make IT Security Top of Mind

Here’s the thing about IT security: it requires a little more than a decent firewall and a reasonably-strong password. We talk a lot about how to ensure that your business’ network stays a top priority, and the best way to do that is to implement what we call a Unified Threat Management (UTM) solution. An enterprise security system like a UTM can provide a considerable improvement for the way you protect your organization, but even something as simple as a little bit of user error could bypass these protocols.

Hackers and cyber criminals have a lot of tricks up their sleeves, and it’s easy to forget that they can be extremely crafty with how they use threats like malware and phishing scams. The past few years have shown that hackers are doing much more than just infecting computers with threats. Instead, they are turning to social engineering and phishing tactics that are designed to weasel their way past even the most experienced workers. They know how to look legitimate and genuinely fool someone into handing over everything they need to succeed. Therefore, there’s only one way to make sure that your company stays safe from these hackers: stay alert and watch out for threats.

But How Do You Stay Cautious?
The best way to stay safe is to make sure everyone is looped in on what’s needed to keep your business secure. To get to this level, it’s best to start with management and administration to ensure that even those at the top of the ladder are taking security seriously. Be sure to keep your C-suite employees looped in on any major security advancements, as well as your HR office to give security the sense of importance that it deserves.

Security Shouldn’t Be a Hassle
Policies such as two-factor authentication or password protection can often be seen as an unnecessary way of making things more difficult for employees to do their jobs as efficiently as possible. You’ll likely get a lot of pushback, even if it’s meant to be a good thing for the company. Instead of lashing out and telling them to do what they’re told, try to get them to understand why the measures are necessary in the first place. The best employees are always the ones that care the most, so do your best to make them care not just on a corporate level, but on an individual level.

Implement Regular IT Check-Ups
Once you’ve figured out the best way to maintain IT security, you should do your part in keeping everyone up to date by holding regular meetings regarding security. It’s important that you make sure to stick to this schedule, as the higher priority your company places on security meetings, the more urgency will be associated with it by default.

Carefully Reinforce Security Measures
It’s imperative that your employees not only understand the importance of security, but that they understand why these processes and procedures are important in the first place. Be sure to document your business’ security best practices in a way which is easy to access, like in the company handbook. Follow this up with training videos, security handouts, or posters around the office. They should also be ready and willing to adapt to change, as the same threats that are a danger to your business now may not be so in the future.

Once most of your team understands that security is crucial, you should establish repercussions for failing to adhere to company security policies. It’s important to remember that most issues can easily be solved, so a first-time offender shouldn’t have their head bit off for forgetting something related to security. Of course, recurring offenses or blatant disregard to company policies should be treated with requisite severity, as all it takes is one unaware employee to completely cripple your organization’s security.

Encourage Reporting and Support Requests
One of the greatest benefits of working with technology is that you can easily put in a support request or report suspicious behavior. However, if an employee isn’t comfortable with doing this, they might not report something important that could have prevented a considerable amount of pain. Furthermore, if they make a mistake, they might be reticent to report it for fear of being punished. Therefore, you should make it clear that you not only encourage reporting issues, but that you expect it.

Catalyst Technology Group wants to be the organization that your business turns to for reinforcement of your company security policies. We can help enforce, audit, and support your business in a way which your internal IT department simply doesn’t have time for. If you don’t have an in-house IT department, we would be happy to act as one for you. To learn more, reach out to us at (317) 705-0333.

Latest blog entries

These Gifts Can Come with Security Issues

  • Published byadmin
  • December 29, 2017

These Gifts Can Come with Security Issues

The holiday season is coming to a close, with meals shared and gifts opened. You may have even received a new gizmo or doodad that you’re looking forward to trying out. Not to burst your bubble, but there is unfortunately a chance that the gizmo you had hoped to get (or purchased for a loved one) may lead to a security breach.

Smart Home Hubs and Assistants
These devices were touted as useful gadgets to have around the house as a mix between a media center and reference source. The trouble with devices like these is that they are always listening for you to speak, with microphones that automatically activate. Think about everything you say in the privacy of your own home. A cybercriminal could listen in, taking that privacy away and quite possibly learning some invaluable information.

To make this situation worse, many “smart home” devices also have cameras, invading your privacy in yet another way.

Admittedly, the thought of controlling one’s house by telling it what to do is, for lack of a better term, pretty cool. However, the questionable security that many of these devices suffer from gives cybercriminals the unique opportunity to spy on you, whether you use the assistant at home or in the office. This is also important to keep in mind if a young person you know recently received one of these devices.

Smart and Connected Toys
While many connected devices are clearly meant for an older demographic, there is an equal amount that are intended for children. For example, many toys are now capable of functioning in a way quite similar to a smart home hub, and others have features that are outright creepy. For example, if a child has a Toymail Talkie, a cybercriminal could use it to communicate directly to that child. Other connected toys offer cybercriminals with intimate details about the schedule of a child. For instance, the connected bath toy, Edwin the Duck, can be used to tell a hacker the general time that a child is in the bath and when they are put down for the night.

Connected and Smart Appliances
Grown-ups have to have their toys, too. Appliances and accessories with “smart” capabilities are becoming increasingly common, but unfortunately lack the security required to protect them from cyberattack and intrusion. Assorted wearable tech, like fitness trackers, and Internet of Things devices, or any of those devices that aren’t a computer or laptop but still utilize the Internet, are becoming more and more popular. Unfortunately, because their security is sub-par, these devices can easily be leveraged as a part of a botnet, or can also be used to extract data from their surroundings.

DNA Tests
It would seem that there was a sizable push to frame these ancestry testing kits as the perfect holiday gift this year, despite there being host to numerous privacy issues. Consider what you have to provide to the company. By handing over a vial of your spit, you’re giving them the most unique piece of personally identifiable information you possess: your genetic code, also known as your DNA.

This information quickly becomes very valuable once the topic of research is brought up.

When using one of these services, there are plenty of agreements to sign. These agreements will often give the company the leeway to use your genetic data as they please, including selling a digitized version to whomever is willing to pay.

Despite the Genetic Information Nondiscrimination Act of 2008 forbidding the use of genetic information to justify discriminatory acts, like firing someone because they have a predisposition to a medical condition, it isn’t easy to prove this kind of discrimination. After all, an employer could easily find some other reason to terminate someone’s employment–the fact that they were predisposed to a medical condition that would keep them out of work would just be a “coincidence.”

While we hope that your holidays were as bright and cheerful as they should be, we don’t want an unexpected data breach to spoil those memories. For more products that could put your security at risk, check out Mozilla’s handy guide.

Did you have any of these items on your wishlist? Is it worth keeping them around despite the risk to your data security? Leave your thoughts on the matter in the comments section!

Latest blog entries

Without These Tools, Your Network Isn’t Secure

  • Published byadmin
  • December 7, 2017

Without These Tools, Your Network Isn’t Secure

Your business might have a limited budget, but this shouldn’t hold you back from implementing the best and strongest security solutions. However, security isa complicated process for any business. This is problematic, especially since common threats and vulnerabilities show up frequently in the business environment. We’ll walk you through some security basics so that you can optimize your organization’s protection.

First and foremost, the basic tasks of security tools can be accomplished through the use of preventative solutions found in a Unified Threat Management (UTM) device. A UTM includes a firewall, antivirus, spam blocker, and content filter, allowing you to reduce the number of threats your business is exposed to and prevent hacking attacks entirely.

Firewalls
Firewalls are generally considered the bouncers to your business’ network, as they keep track of the traffic that flows into and out of it. This keeps harmful threats from entering and causing trouble, and keeps dangerous traffic from spreading to other parts of your network. You can then isolate and destroy any threats that are identified as problematic. Most computers these days come with a consumer-grade firewall pre-installed, but you don’t want to rely on these for your business’ security. An enterprise-grade firewall found in a UTM can be just the thing you need to keep your network secure.

Antivirus
While your firewall is busy keeping threats out of your network, the antivirus will be the force responsible for quarantining and eliminating any that do slip past the defenses. Antivirus programs scan your computer for any abnormalities, and then take action to eliminate them.

Spam Protection
Spam is something that even the average PC user will encounter, as these messages in your inbox waste your time and threaten the security of potentially important information. If you don’t take a preventative stance against spam, it could bother your employees and trick them into clicking on the wrong links or attachments. Spam is the preferred method of travel for threats, as it’s easy to hide malicious code in embedded links or images, as well as attachments. With spam protection, you can keep these messages from getting to your inbox in the first place, saving you the time and effort required to comb through it for threats.

Content Filtering
If you have some employees who can’t seem to keep themselves off of social media or YouTube, how do you keep them on task? The best solution to this is a content filter, which allows your organization control over the website users’ access on the Internet. This also allows you to keep your employees from accessing sites that contain malicious, dangerous, or distracting content, allowing you to get more productivity out of your workers while maximizing security.

To take your business’s security to the next level, consider a UTM solution. To learn more, reach out to Catalyst Technology Group at (317) 705-0333.

Latest blog entries

Would Your Users Fall For These Social Engineering Schemes?

  • Published byadmin
  • November 29, 2017

Would Your Users Fall For These Social Engineering Schemes?

Social engineering is one of the trickiest parts of protecting your organization. It might sound like something out of a science fiction flick, but it’s one of the most dangerous attacks that a hacker can use against your business. Social engineering attempts to manipulate the target into giving away sensitive credentials or personal information for the purpose of stealing identities and other malicious intentions.

Here are some of the most popular social engineering hacks that you’ll have to watch out for in the business world.

  • Vishing: More people are aware of phishing attacks than ever before, so naturally hackers had to pick up the slack somehow. Vishing is the alternative option that they are now trying to use, which features a voicemail asking for personal information.
  • HTTPS: SSL certificates can make sure that users are aware of whether or not a website is secure enough to protect your personal information. However, HTTPS doesn’t necessarily mean that a website is using security. Hackers can lure in victims by providing “free” SSL certificates to organizations, providing them with a false sense of security. You need to find proof that the website using SSL has an extended validation (EV-SSL), which is not offered for free at all. You’ll see a green bar in the URL bar when this type of encryption is available.
  • Website Copycats: Some scammers have even gone so far as to make websites that look exactly like reputable sites that are designed to harvest credentials or infect computers with malware. One example of this is the Equifax data loss incident which occurred in June 2017. Equifax had set up a website to help clients who had their information stolen, which used the URL equifaxsecurity2017.com. However, hackers capitalized on this event and created a spoof website using the domain securityequifax2017.com. The result tricked Equifax themselves. Here are some tips to help you avoid these spoofed websites:
    • Make sure the URL is correct
    • Don’t give information to sites that aren’t using EV-SSL
    • Look for seals of trust from reputable IT security websites
    • Be on the lookout for spelling errors, typos, or broken English
  • Every Word Password Theft: Hacking tools have certainly developed into more sophisticated threats, going so far as to utilize every single word in the dictionary to crack passwords. These password crackers can create hundreds of thousands of credentials in a matter of minutes, all using a dictionary attack against unwary users. Therefore, the best approach to creating strong passwords is to use numbers, letters, and symbols to make a mixture that nobody would expect.

Online threats can be a considerable problem for your organization, especially when they use each and every exploit against you. Thankfully, with some proactive measures that can keep your business safe, you’ll have a much easier time going about your online duties without exposing your data to threats. To learn more about how to protect your business, reach out to us at (317) 705-0333.

Latest blog entries

Holiday Shopping Just Got Easier–Check out These Gadgets!

  • Published byadmin
  • November 23, 2017

Holiday Shopping Just Got Easier--Check out These Gadgets!

It can often be difficult to figure out what to get someone for a holiday gift. Fortunately, there is almost always a new gadget or gizmo that can make someone with particular interests happy. In this blog, we’ll go over a few cool gadgets that make excellent special-interest gifts.

For the Connected User
There has been a recent influx of Internet of Things and otherwise connected devices in the marketplace. This means that there are plenty of options to choose from when shopping for someone who dreams of a home they can control and customize with software and apps. From gifts designed to introduce someone to the connected concept, like the Philips Hue Starter Kit, to the person who is always talking to one digital assistant or another, like the Amazon Echo, Echo Spot, and Echo Show, Google Home, Home Max and Home Mini, there are plenty of devices suited for someone who has wanted to automate and computerize their environment.

For the Entertainment-Obsessed
If there’s anything that gadgets and gizmos are developed to do, it’s to provide entertainment. For those who love to take in the latest media via the latest devices, there are plenty of items that would make perfect gifts. From the highly popular Nintendo Switch to Microsoft’s Xbox One X, to the Amazon Kindle Oasis e-reader, to the Samsung 4K HD and Sony A1E series OLED 4K televisions. Admittedly, these items tend to fall under the “big-ticket” category, but aren’t the people we care about worth it?

For the Photographer in All of Us
Photography has evolved, with technology making it easier and easier for anyone to pick up a camera and take a half-decent picture. Whether the recipient is more interested in using their mobile device or a true camera, there are plenty of options for gifts that are sure to please. Mobile photogs would be happy to receive a lens adapter, selfie light or selfie remote, while hobbyists would very likely appreciate receiving a point-and-shoot like the Sony Cyber-shot DSC-RX100 V camera or Nikon D5500, or a useful accessory like a tripod. Finally, any photographer would appreciate a solid backup and editing system they could use on-the-go, like a GNARBOX.

Of course, you may find some other gift that works even better for someone who combines technology with their passions to improve upon their experience. What gifts have you given that have proven to be successful and well-used? Let us know in the comments!

Latest blog entries

These Smartphones May Make Your Holiday Season Brighter

  • Published byadmin
  • November 20, 2017

These Smartphones May Make Your Holiday Season Brighter

The holiday season is upon us, which means that many will soon be opening packages in the hopes of finding a mobile phone nestled inside. Perhaps you or a loved one are one of these people. However, deciding upon a phone to request has become more difficult, as the market has become inundated with options.

To help you decide which mobile device is best suited to your needs, here’s a side-by-side comparison of the most popular smartphones and their specifications this holiday.

The New iPhones: 8, 8 Plus, and X
Apple has three iPhones that might fit the bill. The 8 and 8 Plus models have a feel to them that many reviewers have said feels similar to the weight of the iPhone 6. This weight is the result of the glass that covers its aluminum casing.

The iPhone X offers a truly impressive display, and while it utilizes the same camera as the 8 and 8 Plus, the improved glass used on the iPhone X boosts its camera to best-in-class. However, the price difference between the 8/8 Plus and the X is a considerable one, so the choice of device may come down to cost.

iphone 8

Model: iPhone 8
Construction: Front/back glass & aluminum frame
Screen Size: 4.7-inch
Display: LED-backlit IPS LCD, 16M Colors, 1,334 x 759 (~326 ppi)
SIM: Nano-SIM
Chipset: Apple A11 Bionic
CPU-GPU: Hexa-core (2x Monsoon + 4x Mistral) – Apple GPU
Operating System: iOS 11

Memory

Internal: 64GB or 246 GB models; 2GB of RAM
Expandable: None

Cameras

Primary: 12 MP, f/1.8, 28mm, phase detection autofocus, OIS, quad-LED flash
Front-Facing: 7 MP, f/2.2, face detection

Audio: Built-in stereo speakers, No 3.5mm headphone jack
Sensors: Fingerprint, accelerometer, gyro, proximity, compass, barometer
Features: Fast charging, Qi Wireless charging, Siri commands and dictation, iCloud integration
Battery size-life: 1,821 mAh battery – 66 hours
Available Colors: Silver, Space Grey, Gold
Price: $ 699.99-to-$ 899.99

iphone 8 plus

Model: iPhone 8 Plus
Construction: Front/back glass & aluminum frame
Screen Size: 5.5-inch
Display: LED-backlit IPS LCD, 16M Colors, 1920×1080 (~401 ppi)
SIM: Nano-SIM
Chipset: A11 Bionic
CPU-GPU: Hexa-core (2x Monsoon + 4x Mistral) – Apple GPU
Operating System: iOS 11

Memory

Internal: 64GB or 246 GB models; 3GB of RAM
Expandable: None

Cameras

Primary: Dual 12 MP, f/1.8, 28mm and f/2.8, 56mm) phase detection autofocus, 2x optical zoom, quad-LED flash
Front-Facing: 7 MP, f/2.2, face detection

Audio: Built-in stereo speakers, No 3.5mm headphone jack
Sensors: Fingerprint, accelerometer, gyro, proximity, compass, barometer
Features: Fast charging, Qi Wireless charging, Siri commands and dictation, iCloud integration
Battery size-life: 2,691 mAh battery – 81 hours
Available Colors: Silver, Space Grey, Gold
Price: $ 799.99-to-$ 999.99

iphone x

Model: Apple iPhone X
Construction: Front/back glass & stainless steel frame
Screen Size: 5.8-inch
Display: Super AMOLED, 16M Colors, 2,436×1,125 ( ~458 ppi)
SIM: Nano-SIM
Chipset: Apple A11 Bionic
CPU-GPU: Hexa-core 2.39 Ghz (2x Monsoon + 4x Mistral) – Apple GPU
Operating System: iOS 11.1

Memory

Internal: 64 and 256 GB models; 3GB RAM
Expandable: None

Cameras

Primary: Dual 12 MP, f/1.8, 28mm and f/2.4, 52mm) phase detection autofocus, 2x optical zoom, quad-LED flash
Front-Facing: 7 MP, f/2.2, face detection

Audio: Built-in stereo speakers, No 3.5mm headphone jack
Sensors: FaceID, accelerometer, gyro, proximity, compass, barometer
Features: Fast charging, Qi Wireless charging, Siri commands and dictation, iCloud integration
Battery size-life: 2,716 mAh battery – 74 hours
Available Colors: Silver, Space Grey
Price: $ 999.99-to-$ 1,149.99

Samsung Galaxy s8 and Note 8
Again, the choice between these two devices will boil down to your needs and preferences. Also protected by aluminum and glass cases, the Galaxy s8 and Note 8 both have a considerable resistance to water.

However, the Note 8 offers a bit more to the power user, including a stylus and a larger display with more pixels per square inch. The Note 8 also has a better camera, and its 50% more RAM allows it to handle a little more.

galaxy s8

Model: Samsung Galaxy s8
Construction: Front/back glass (Gorilla Glass 5) & aluminum frame.
Screen Size: 5.8-inch
Display: Super AMOLED, 16M Colors, 2,960 x 1,440 (~570 ppi)
SIM: Nano-SIM
Chipset: Qualcomm MSM8998 Snapdragon 835
CPU-GPU: Octa-core (4 x 2.35 GHz & 4 x 1.9 GHz Kyro) – Adreno 540
Operating System: Android 7.0, Touchwiz

Memory

Internal: 64 GB, 4 GB RAM
Expandable: microSD (up to 256)

Cameras

Primary: 12 MP, f/1.7, 26mm, OIS, LED flash
Front-Facing: 8 MP, f/1.7

Audio: Dual stereo speakers, 3.5 mm headphone jack
Sensors: Iris scanner, fingerprint reader, accelerometer, gyro, proximity, compass, barometer, heart rate, SpO2
Features: Samsung DeX, Fast battery charging, Qi/PMA wireless charging
Battery size-life: 3,000 mAh – 84 hours
Available Colors: Midnight Black, Orchid Gray, Arctic Silver, Coral Blue, Maple Gold
Price: $ 725.99-to-$ 825.99

galaxy s8 20171116 145741 1

Model: Samsung Galaxy s8 Plus
Construction: Front/back glass (Gorilla Glass 5) & aluminum frame.
Screen Size: 6.2-inch
Display: Super AMOLED, 16M Colors, 2,960 x 1,440 (~529 ppi)
SIM: Nano-SIM
Chipset: Qualcomm MSM8998 Snapdragon 835
CPU-GPU: Octa-core (4 x 2.35 GHz & 4 x 1.9 GHz Kryo) – Adreno 540
Operating System: Android 7.0

Memory

Internal: 64 GB, 4 GB RAM or 128 GB, 6 GB RAM
Expandable: microSD (up to 256)

Cameras

Primary: 12 MP, f/1.7, 26mm, OIS, LED flash
Front-Facing: 8 MP, f/1.7

Audio: Dual stereo speakers, 3.5 mm headphone jack
Sensors: Iris scanner, fingerprint reader, accelerometer, gyro, proximity, compass, barometer, heart rate, SpO2
Features: Samsung DeX, Fast battery charging, Qi/PMA wireless charging
Battery size-life: 3,000 mAh – 84 hours
Available Colors: Midnight Black, Orchid Gray, Arctic Silver, Coral Blue, Maple Gold
Price: $ 799.99-to-$ 899.99

galaxy note 8

Model: Samsung Galaxy Note 8
Construction: Front/back glass (Gorilla Glass 5) & aluminum frame
Screen Size: 6.3-inch
Display: Super AMOLED, 16m colors, 2,960 x 1,440 (~521 ppi)
SIM: Nano-SIM
Chipset: Qualcomm MSM8998 Snapdragon 835
CPU-GPU: Octa-core (4 x 2.34 GHz Kryo & 4 x 1.9 GHz Kryo)
Operating System: Android 7.1.1

Memory

Internal: 64, 128, 256 GB options, 6GB RAM
Expandable: microSD (up to 256GB)

Cameras

Primary: Dual 12 MP (26mm, f/1.7, PDAF & 52mm, f/2.4, AF) OIS, autofocus, 2x options zoom, LED flash.
Front-Facing: 8 MP, f/1.7, face detection

Audio: Dual stereo speakers, 3.5 mm
Sensors: Iris scanner, fingerprint scanner, accelerometer, gyro, proximity, compass, barometer, heart rate, SpO2
Features: Samsung Desktop Experience, Fast battery charging, Qi/PMA wireless charging, s-Pen integration
Battery size-life: 3,500 mAh battery – 88 hours
Available Colors: Midnight Black, Maple Gold, Orchid Grey, Deep Sea Blue
Price: $ 949.99-to-$ 1149.99

Google Pixel and Pixel XL 2
As a relatively brand-new face in the smartphone offering lineup, the Pixel line of phones has raised the bar. With an impressive list of specifications and features, the Pixel was powered by Snapdragon processors. The Pixel 2 leverages processors that are even stronger.

While the Pixel 2 has sacrificed the headphone jack, it has added front-loaded speakers as a trade-off. In addition, Google plans to offer support for Pixel 2 devices for 3 years. This means that the OS will be reliable for a long time, compared to other mobile devices.

pixel 2

Model: Google Pixel 2
Construction: Aluminum unibody with hybrid coating, Gorilla Glass 5
Screen Size: 5.0-inches
Display: AMOLED, 16m, 1,920 x 1.080 (~441 ppi)
SIM: Nano-SIM
Chipset: Qualcomm MSM8998 Snapdragon 835
CPU-GPU: Octa-core (4 x 2.35 GHz Kryo, 4 x 1.9 GHZ Kryo) – Adreno 540
Operating System: Android 8.0

Memory

Internal: 64 and 128 GB options, 4GB RAM
Expandable: None

Cameras

Primary: 12.2 MP, f/1.8, laser autofocus, dual-LED flash
Front-Facing: 8 MP, f/2.4

Audio: Dual stereo speakers, no 3.5mm headphone jack
Sensors: Fingerprint, accelerometer, gyro, proximity, compass, barometer
Features: Fast charging
Battery size-life: 2,700 mAh – 75 hours
Available Colors: Kinda Blue, Just Back, Clearly White
Price: $ 649.99-to-$ 749.99

pixel 2 xl

Model: Google Pixel 2 Plus
Construction: Aluminum unibody with hybrid coating, Gorilla Glass 5
Screen Size: 6.0-inch
Display: P-OLED, 16m colors, 2,880 x 1,440 (~538 ppi)
SIM: Nano-SIM
Chipset: Qualcomm MSM8998 Snapdragon 835
CPU-GPU: Octa-core *4 x 2.35 GHz Kryo & 4 x 1.9 GHz Kryo) – Adreno 540
Operating System: Android 8.0

Memory

Internal: 64GB and 128 GB options, 4GB RAM
Expandable: None

Cameras

Primary: 12.2 MP, f/1.8, OIS, phase detection & laser autofocus, dual-LED flash
Front-Facing: 8 MP, f/2.4

Audio: Dual stereo speakers, no 3.5 mm headphone jack
Sensors: Fingerprint, accelerometer, gyro, proximity, compass, barometer
Features: Fast charging
Battery size-life: 3,520 mAh battery – 88 hours
Available Colors: Just Black, Black & White
Price: $ 849.99-to- $ 949.99

Of course, you could find that a phone produced by another brand might serve your needs just as well. Here are some of today’s best options:

motorola z 2

Model: Motorola Z2 Force
Construction: front plastic w/ Moto Shattershield, back plastic
Screen Size: 5.5-inch
Display: P-OLED, 16M colors, 2,560 x 1,440 (~534 ppi)
SIM: Nano-SIM
Chipset: Qualcomm MSM8998 Snapdragon 835
CPU-GPU: Octa-core (4 x 2.35 MHz Kyro & 4 x 1.9 GHz Kryo) – Adreno 540
Operating System: Android 7.1.1

Memory

Internal: 128 GB, 6 GB RAM
Expandable: microSD (up to 256 GB)

Cameras

Primary: Dual 12 MP, f/2.0, laser autofocus, dual-LED flash
Front-Facing: 5 MP, f/2.2, dual LED flash

Audio: One front-facing speaker, no 3.5mm headphone jack
Sensors: Fingerprint, accelerometer, gyro, proximity, compass, barometer
Features: Fast charging, Motorola Mods (insta-share projector, 360 camera, gamepad, JBL SoundBoost 2, turbopower pack, style shell w/ wireless charging, power pack, Hasselblad True Zoom, vehicle dock)
Battery size-life: 2,730 mAh battery – 69 hours
Available Colors: Super Black, Fine Gold, Lunar Grey
Price: $ 720.00

lg v30

Model: LG V30
Construction: front/back glass, aluminum frame
Screen Size: 6.0-inch
Display: P-OLED, 16M colors, 2,880 x 1,440 (~537 ppi)
SIM: Nano-SIM
Chipset: Qualcomm MSM8998 Snapdragon 835
CPU-GPU: Octa-core (4 x 2.45 GHz Kyro & 4 1.9 GHz Kyro) – Adreno 540
Operating System: Android 7.1.2

Memory

Internal: 64 or 128 GB options, 4 GB RAM
Expandable: microsSD (Up to 256 GB)

Cameras

Primary: Dual 16 MP (f/1.6, OIS, 3-axis, laser & phase detection autofocus) _ 13 MP (g/1.9) LED flash
Front-Facing: 5 MP, f/2.2

Audio: Dual speaker stereo, 3.5mm headphone jack
Sensors: Fingerprint, accelerometer, gyro, proximity, compass, barometer, color spectrum
Features: Fast charging, wireless charging
Battery size-life: 3,300 mAh – 87 hours
Available Colors: Aurora Black, Cloud Silver, Moroccan Blue, Lavender Violet
Price: $ 819.99-to-$ 929.99

blackberry keyone

Model: BlackBerry KEYone
Construction: Aluminum, Gorilla Glass 4, with soft-touch plastic, physical keyboard
Screen Size: 4.5-inch
Display: IPS LCD, 16m colors, 1,620 x 1,080 (~433 ppi)
SIM: Nano-SIM
Chipset: Qualcomm MSM8953 Snapdragon 625
CPU-GPU: Octa-core 2.0 GHz Cortex-A53
Operating System: Android 7.1

Memory

Internal: 32 GB with 3 GB RAM or 64 GB with 4 GB RAM
Expandable: microSD (up to 256 GB)

Cameras

Primary: 12 MP, f/2.0, phase detection autofocus, dual-LED flash
Front-Facing:8 MP, f/2.2

Audio: Dual speaker stereo
Sensors: Fingerprint, Accelerometer, gyro, proximity, compass
Features: Full programmable keyboard, fast charging
Battery size-life: 3,505 mAh – 107 hours
Available Colors: Black & Silver, Black
Price: $ 499.99-to-$ 559.99

nokia 8

Model: Nokia 8
Construction: Glass Aluminum
Screen Size: 5.3-inch
Display: IPS LCD, 16m colors, 2,560 x 1,440 (~554 ppi)
SIM: Nano-SIM
Chipset: Qualcomm MSM8998 Snapdragon 835
CPU-GPU: Octa-core (4 x 2.5 GHz Kyro & 4 x 1.8 GHz Kyro) – Adreno 540
Operating System: Android 7.1.1

Memory

Internal: 64 GB, 4 GB RAM or 128 GB, 6 GB RAM
Expandable: microSD (up to 256 GB)

Cameras

Primary: Dual 13 MP, f/2/0, laser and phase detection autofocus, Carl Zeiss optics, OIS, LED flash
Front-Facing: 13 MP, f/2.0, phase detection autofocus

Audio: Two-speaker stereo, 3.5mm headphone jack
Sensors: Fingerprint, accelerometer, gyro, proximity, compass, barometer
Features: Fast charging
Battery size-life: 3,090 mAh – 78 hours
Available Colors:Tempered Blue, Polished Blue, Steel, Polished Copper
Price: $ 479.99-to-$ 559.99

Is there a particular smartphone you’d be thrilled to unwrap this holiday? Let us know which one it is in the comments, and don’t forget to visit our blog for answers to all of your technology questions.

Latest blog entries

Are You Guilty of These Computer Goofs?

  • Published byadmin
  • November 16, 2017

Are You Guilty of These Computer Goofs?

Everyone makes mistakes. This is especially true when it comes to the technology that is used by your organization every single day. For this week’s tip, here are some things to avoid when using your computer.

Not Reading Terms
It’s something we’re all guilty of–reflexively clicking ‘Okay’ or ‘Next’ when confronted by a wall of text. However, not reading the terms and conditions of whatever it is you are trying to do (usually downloading and installing software) can potentially put you at risk. These options often include consent to have bloatware and other unpleasant programs installed on your system. Before you click through, make sure you are aware of what each prompt is having you agree to–or better yet, have your IT professional handle any installations.

Not Updating
There is an arms race being waged between software developers and hackers behind the scenes of your computer. Hackers are always seeking out vulnerabilities and weak points in the programs that you have installed. Likewise, developers are also constantly at work, patching and removing the threats caused by those vulnerabilities. If you aren’t regularly updating your solutions, you aren’t receiving the improved protections that these updates deliver, leaving you vulnerable to threats.

Not Using Surge Protection or Uninterruptible Power Supplies
Electricity is a fickle thing. The right amount will power your computer and allow you to use it, while too much can cause a damaging surge that will ruin many of a modern computer’s components. Lightning strikes hitting nearby power lines are notorious for causing these power surges. A good means of protecting your computer is to–rather than plugging it directly into the wall–power it through a surge protector. Better yet, use an Uninterruptible Power Supply, or UPS, to protect your devices. Not only do they also protect against surges, they can maintain your system briefly after a power outage so that you can avoid data loss.

Not Keeping a Backup
This is a subject that we will never stop impressing the importance of–whether or not you have a backup system in place can make or break your business. While it is always tempting to assume “Nothing like that could ever happen to me,” fires, natural disasters, and old-fashioned user error don’t discriminate. Your data’s best insurance is a comprehensive data backup. This backup should meet a few requirements, the first of which being that it is not the only copy of your data, and secondly, that these multiple copies are not stored in the same place. Ideally, your backup would be stored in the cloud, where it could be accessed once you were ready to do so.

Yes, we all make mistakes. Catalyst Technology Group is here to help you avoid making too many with your IT. For help with recovering when mistakes are made, call us at (317) 705-0333 for more information.

Latest blog entries

Are These 3 Challenges Holding Your Patch Implementation Back?

  • Published byadmin
  • November 14, 2017

Are These 3 Challenges Holding Your Patch Implementation Back?

How many applications does your business use on a daily basis? Managing and maintaining them all can be quite the challenge for a number of reasons–particularly if your organization doesn’t have a dedicated IT technician. It’s important that you take a look at your current situation and determine what roadblocks there are that could cause problems for your organization’s securty.

First, a short explanation of why patching and security updates are important. Software is often issued with considerations made for the latest cybersecurity threats. However, the current state of network security is typically fluid. New threats develop every day, which results in what is effectively a “state of emergency” for many small businesses. If patches and security updates aren’t implemented properly, you could be exposing your organization to unnecessary threats and risks. Therefore, the need to keep your software as up-to-date as possible is of the utmost importance.

We’ll go over some of the most common roadblocks that are presented with software deployment:

Upper-Level Administration
It’s understandable for upper-level executives, like the CEO and COO, to want a say in the implementation of security solutions for your IT. However, if all options for technology must be run through administration, it’s difficult to get anything greenlit. When it comes to patching, you don’t have time to wait around for this to happen, as threats could be knocking at your door.

Software Developers
It’s important that you remain in contact with the company that develops any software you use. The reasoning is simple: they will be the ones to distribute any software patches, as they will be the ones developing it in the first place. If they aren’t effectively communicating that a new version or patch is available for download, you’re running the risk of threats overtaking your system.

Time and Resources
If you don’t have an internal IT department, chances are that you are having your employees deploy patches and security updates as they are released. However, they are only implemented if you have the time and resources to make it happen. Furthermore, if they are deployed, they could be implemented incorrectly, which means that the patches would have to be installed twice–wasting valuable time and money which could be saved for other ventures.

By working closely with a managed service provider, you can eliminate many of these troubles with remote patching and maintenance. We’ll work directly with your software vendors, should the need arise, to make sure your patches are implemented as swiftly and efficiently as possible. Thanks to remote technology, all of this can be done without an on-site visit, freeing up more time and resources than ever before–all while making security a top priority for your business.

For help with implementing patches and security updates, be sure to reach out to Catalyst Technology Group at (317) 705-0333.

Latest blog entries