7 Devastating Ways You Can Lose Data from Your Cloud Services
Do you feel safe and secure that nothing will happen to your data because it’s in the cloud? Unfortunately, it might not be as safe as you think.
It’s easy to get a false sense of security when using cloud platforms because your data is available from anywhere, you can access it from any device, and those cloud services, like Microsoft 365, have uptime guarantees, right?
While all those things might be true, that also may not protect you from cloud data loss.
Services like Microsoft also warn users that if they don’t back up their cloud data with a 3rd party service, that it could be lost. Only, the warning is buried deep in their services agreements, which most users don’t read.
If you think you’ve got it made in the shade and don’t need any cloud service management or backup, you could end up with some devastating data loss because you weren’t properly protected.
Work from home (WFA) has now become an acronym and employers have
realized that having employees work remotely can be a bonus.
With the pandemic forcing businesses in Tucson and throughout the country to
operate remotely, companies were initially thrown for a loop. But now, many of
them see the benefits of utilizing a remote workforce, either part or full-time.
But wait? Aren’t there any downsides to having employees work from home?
It’s true, not everything is perfect when employees are working remotely. A big
downside (but one that can be mitigated) is the risk of a data breach.
Remote security can be a big challenge for companies that are used to doing
everything on-premises, including applying business IT security measures.
36% of surveyed organizations said they experienced a security incident
due to an insecure remote employee.
With the proper remote security best practices in place, you and your employees
can enjoy the flexibility of working remotely without paying a big cybersecurity
Keep Remote Workers Secure Using These Tips
Whether you want to allow employees to work from home or not, the pandemic
has shown us that it’s not always a choice. In the event of a crisis that requires
you to leave your office, working remotely is the only way to stay operational.
So, you might as well be sure that it’s done safely! Here are several “must do”
tips to make that happen.
Have Employees Connect with a Business VPN
Unless you want to go around to each employee’s home and secure their router,
you’re going to have to assume they’re working on an unsecure Wi-Fi and take
A virtual private network (VPN) is a service that will encrypt connections to the
internet and make the user’s IP address anonymous. VPNs can be used on
computers and mobile devices from anywhere. It will act as a secure tunnel to
keep data transmissions private, even if on an unsecure public Wi-Fi.
Can I have employees use a free personal VPN?
No, not really! It’s best to use a business VPN, that way you get business-grade
security, can control users that are added to your account, and have important
Make Sure All Devices Are Updated Regularly
Whether an employee has their work computer at home or is using their personal
PC to access their work, those devices need to have regular security patches
and updates applied.
In 2019, 60% of security breaches involved system vulnerabilities that had a
patch, but the user never applied it.
How can you make sure employees are keeping their devices at home updated?
Here are two ways:
1. Use managed IT services from an IT specialist that will handle all that
computer security stuff for you; or
2. Use an endpoint device management app that will give you visibility into
all staff devices and allow you to apply updates remotely
Use the Router Segmenting Trick
When an employee computer is on a work network, it’s like hanging out in the
business district. Devices are all suited up properly and have business-minded
But when a work computer is being used at home, you don’t know what kind of
neighborhood it could be exposed to. You have the corner of risky voice
assistants over here and teen gaming computer boulevard over there.
The point is that if you have a work device with sensitive data on the same Wi-Fi
network as less secure family devices, it’s at a bigger risk of being breached.
One way to remove that threat is to put it in its own separate Wi-Fi neighborhood
through router segmenting.
Use Important Device Protection Applications
There are a few key security applications that should be on all devices that
remote employees are using for work. These work together to help stop things
like phishing attacks and malware infections.
Use a Cloud Access Security App
Cloud account security becomes even more important when you have
employees accessing your business apps from multiple locations. It makes it
easy for a hacker to pose as an employee and breach your account.
A cloud access security app is like a firewall for all your cloud accounts. It
controls access to your cloud platforms, monitors for any suspicious activity
(such as a login from outside the U.S.), and can implement companywide
security and compliance policies throughout your different applications.
Are Your Remote Workers Properly Protected?
Deploying a remote workforce doesn’t have to be a security nightmare. ECN IT
Solutions can work with your team to ensure they’re using best cybersecurity
We’re here… just waiting to help you. Reach out at 520-355-7553 or through our
New Report Shows 7 Ways Your Employees Can Destroy Your Business. How to Protect Yourself!
No business owner likes to think that their own employees are a threat to the security of their business. But if you don’t take insider threats seriously you could end up blindsided.
A new report by Cybersecurity Insiders, a community of 400,000 information security professionals, shows just how dangerous employees can be to your business. The 2020 Insider Threat Report lays out several security threats that happen from negligent and malicious employees.
How big of a deal are insider threats, anyhow?
A pretty big one. Over half (52%) of security professionals state that internal attacks are more difficult to detect and prevent than external cyberattacks. This is because by definition, an “insider” attack is coming from someone with legitimate login credentials.
Even if you have excellent IT management for your Phoenix or Tucson business, if a legitimate user is logged into your system, it’s going to be difficult to detect them as a threat until they do something malicious.
There can be four main reasons for an insider threat:
In the case of the poorly trained or negligent employee, the “insider” is actually a malicious outside entity, such as a hacker that’s managed to get a hold of an employee’s login credentials.
So, how do you stop your employees from putting your company in danger of a major cybersecurity breach or malware infection?
Know what you’re up against and know how to stop it.
How to Stop the Biggest Insider Threats
Here are seven of the biggest threats your employees pose to your business and how to safeguard against them.
1. Poor Password Habits
Did you know that 42% of organizations rely on sticky notes to “manage” passwords? Sticky notes!!
Weak and breached passwords are a major threat to companies because once a hacker has legitimate login credentials their malicious activities can go undetected for months.
Asking users to please use strong passwords just isn’t going to cut it. There are often too many passwords for users to possibly remember. You need to put safeguards in place that can keep even unsecure passwords safe.
The way to do that is to add multi-factor authentication (MFA) to all your logins. Using MFA with a single sign-on (SSO) tool that grants access to all apps after one successful login, can make the process less time intensive.
Microsoft says that MFA stops 99.9% of attempted account hacks.
2. Unsecure Mobile and Remote Connections
Most companies in the U.S. learned just how difficult the security of remote workers could be due to the COVID-19 pandemic. Employees connecting to your network from unsecure Wi-Fi (either home or on the road) are a big security risk.
Having everyone use a business VPN (virtual private network) can add a layer of encryption to all connections, even if employees are on public Wi-Fi at an airport or coffee shop.
3. Use of Shadow IT
Just the name “Shadow IT” says “don’t trust me!” And you shouldn’t… at least not until you’ve had a chance to check it out.
Shadow IT is an application that employees start using for work without getting proper clearance. They may or may not be unsecure, but you have no idea because they’re being used without your knowledge.
79% of professionals say that a security incident is the biggest risk when employees use non-approved apps for work.
You can nip shadow IT in the bud by putting app usage policies in place for employees and also using a Cloud Access Security Broker (CASB) which tracks all employee app use.
4. Unsecure Personal Devices Used for Work
Many offices rely on employees using their own mobile devices to access business apps and work. But if those devices are unsecure, that invites things like data leakage (data being accidentally compromised) or a malware incident.
Use a mobile device management app (like Microsoft Intune) that can be placed on employee devices to separate the “work” from the “personal” and ensure your apps and data are protected.
5. Having Too Much Access
One big mistake that many companies make is to just assign everyone as an admin so they don’t have problems getting to things they might need. But privilege levels were put into place specially to prevent someone with too much access from doing harm (i.e. a disgruntled employee).
Use the Rule of Least Privilege when setting up new users on your system and cloud apps. This means giving employees the absolute lowest access privilege level possible for them to do their job. This helps reduce the amount of damage any single employee can do.
6. Not Properly Securing Devices
There have been examples of health care companies being fined for a HIPAA violation because an employee left patient information on an open laptop that was unattended.
Data privacy violations are no joke and can be very costly. Both in fines and lost customer trust.
Put policies in place that require device security, like screen locks and physical security for devices when they’re not in use.
7. Using Lax Document Security
An employee grabbing the wrong file in a shared cloud storage account could accidentally email your company’s big trade secret to an outside contractor. When sensitive data is compromised, it can lead to major costs.
A negligent employee can easily expose sensitive data if they’re not paying attention and there are no backstops in place.
Take data security out of your employees’ hands and make it automatic by using a system like Microsoft 365’s sensitivity labels. These label documents and email with a security level as they’re created, and the label applies preset security policies (like watermark or “do not copy”).
Employee-Proof Your Business with Help from ECN IT Solutions
Don’t run the risk of insider threats destroying your business. We can help you automate your security processes to protect you from threats, both inside and outside your network.
We’re here… just waiting to help you. Reach out at 520-355-7553 or through our website.
References linked to:
Growing through a recession
Remaining profitable during a recession is difficult as it is, but growing may feel impossible. After all, if nobody wants to buy, nobody wants to buy what you sell. Right?
I am not a marketer. We pay people for that. But I do understand people and business, and how going the opposite way of others can lead to huge returns. If you are in danger of closing your doors within a month, you need cash. If you are set and can continue operating, you have an excellent opportunity to set yourself up as a market leader.
Economic recessions have the fantastic effect of making you and your business quickly cut fat and push employees to deliver. Within weeks you realize how much unnecessary extras you were paying for, signed up for, or had hired. Services you thought you needed to get canceled, and your business seems as usual at the moment.
While I do advocate for cutting unnecessary expenses, there is one thing you should never do. NEVER (did I say never?) cut any service you will be taking back on as a business owner that has a lower value than what you do. Don’t cut janitorial if you will be spending 10 hours a week scrubbing a toilet. I wouldn’t even give it to a staff member unless they are in danger of being laid off, and you otherwise would like to keep them. But, you may think, I have extra time, so why not fill it with something I am already paying for to reduce cost? It seems perfectly rational in hard times to pull up your bootstraps and get to work.
There are two reasons why this could destroy your business.
First, your value, as a business owner, is likely quite a bit higher than you perceive. As a business owner, you call the shots, set up the processes, make sure your product is up to standards, and you fix issues when they occur. No business owner should ever have extra time, so you will be choosing between scrubbing the bathroom and growing the business. Can you imagine what would happen if you actively spent 10 hours a week focused on growth? Your business would explode with new potential. And if you get too busy, you can start to narrow down on your favorite customers to work with and find more like them, letting sub-optimal ones go along the way.
The second is capacity. Your efforts during a recession are never in vain and can quickly start to pay off as things begin to recover. Once your workload starts to overflow, your business will be choked, not able to deliver a consistent customer experience, wasting time on trivial, and easily outsourced tasks. Remember that janitorial company you fired? Well, now they are super busy and can’t take on new customers, and you are stuck looking for a new one while your customers are suffering because you have to clean the toilet. The other option is that the bathroom gets neglected, which may result in some miserable employees.
Growing during a recession takes more than just leaning out the company. This may keep your profits stable, but if you want to grow, you need to focus. And with everyone in a state of trying to cut expenses, your voice becomes magnified through lack of market competition. When everyone cuts their marketing budgets (I KNOW you have thought about it), you will be increasing yours. You may even find some good deals along the way-after all, a bunch of marketing companies just lost a ton of customers.
When recovery begins, you will be so far ahead of everyone else they won’t even be relevant. And with the massive inflow of business and cash, you can start your fund to use when the next recession hits.
With Office 365, it seems common sense has finally prevailed, giving business the changes they actually want. It’s still Office, and your staff will still know exactly how to work it, but they’ll get so much more done.
1. The whole Mac/Windows drama is over
Office 365 brings with it a stack of benefits, but perhaps the most relieving is the in-built file compatibility across all platforms. No more converting (or corrupting) files back and forth, productivity black holes have essentially been eliminated.
2. It’s always ready to go
Microsoft is so confident in their cloud-based software and data storage; they’re giving a 99.9% uptime guarantee. You can even call a real life human for support.
Work online, offline or mobile – the choice is yours.
3. Security is built in
A large part of Microsoft’s uptime certainty comes from their extremely robust security protocols. Office 365 offers enterprise-grade admin controls at your end, as well as government-grade security at their end.
4. Generous data allowances
Each user gets 1TB of cloud space for file storage, which can be shared at folder or file level.
5. Work anywhere, anytime
Previously, staff needed to establish a VPN or manage security concerns which made working off-site difficult and cumbersome. Office 365 has solved that problem and working from anywhere is now easy.
6. Integrated organization
Calendar, email and contacts are all synced and updated across multiple devices: Laptop, desktop & mobile.
7. Yours for no upfront costs
Once upon a time, updating your Office version meant paying a small fortune and half a day downtime. Office 365 changes that, with no upfront cost or installation delay.
8. Mailbox storage through the roof
Forget the days of ‘user mailbox is full’ – each user is given a whopping 50GB in a gorgeous, easy-to-use mailbox.
9. Built in malware and spam protection
Data security doesn’t stop at file storage: email is scanned for malware and spam, protecting your organization from all manner of attacks before they happen.
10. Collaboration tools and virtual meeting
Cancel your 3rd party services and bring all your collaborations into the one platform.
11. Integrated Team planning
Schedule tasks, meetings and track allocations from a top-down level to know exactly how projects are progressing.
We can help with your Office 365 migration and setup – give us a call today at 520-355-7553!
The executives of your company are the big fish in your sea. Yet cybercriminals think of them as whales. In fact, whaling is a new cybersecurity threat targeting the C-suite level.
You’ve likely heard of phishing attacks. Phishers use scam emails or spoofed websites to obtain user credentials or financial information. This might be an email that looks like it is from your bank asking you to log in and update your details, or a supposed tax alert needing immediate action.
A vishing attack is another fraudulent attempt to steal protected data, but the cybercriminals are going to use the phone to make contact. They might pretend to be a vendor needing to confirm account details for bill payment.
There’s also spear phishing. In these cases, the attackers do their homework first and target a specific company. They scour directories and employee social media to gather information to gain credibility.
Now, there are whaling attacks, too. The high-value target is a senior-level employee. The fraudster typically also impersonates one of the target’s C-suite counterparts.
What You Need to Know About Whaling
A whaling attack uses the same methods as phishing but focuses on top-level targets. The goal is to get “whales” to reveal sensitive information or transfer money to fraudsters’ accounts.
Whale attacks are intentional. Phishing can see attackers baiting hundreds of hooks to get nibbles. In whaling, information gathered in advance adds credibility to the social engineering. The target has higher value, so it’s worth their time to appear knowledgeable and make a request to and from someone important.
The sender’s email address will look convincing (e.g. from email@example.com instead of firstname.lastname@example.org). The messages will have corporate logos and legitimate links to the company site. Because humans want to help, the communications typically involve an urgent matter.
Whaling attacks are on the rise. In 2016, Snapchat admitted compromising employee data after receiving an email, seemingly from its CEO, asking for payroll information.
In another high-profile example, Mattel nearly transferred $3 million to a Chinese account. Company policy required two signatures, but the attackers (taking advantage of a recent shakeup) faked the new CEO’s signature. The second executive went ahead and added a signature. The only thing that saved the company was that it was a Chinese bank holiday.
Protecting Against Whale Attacks
As with phishing or vishing, the primary way to protect against whaling attacks is to question everything. Train your key staff members to guard what they share on social media. Encourage them to question any unsolicited request. If they weren’t expecting an attachment or link, they should follow up. If a request is unusual, they should trust their spidey-sense and proceed with caution.
It’s also a good idea to develop a policy for handling requests for money or personal information. By requiring that two people must always weigh in, you're more likely to catch a scam before it’s too late.
Also, train all your employees to look carefully at email addresses and sender names. They should also know to hover over links (without clicking on them) to reveal the full URL.
Security awareness is crucial. It’s also a good idea to test your employees with mock phishing emails.
Need help training employees or testing social engineering? Contact our experts today, call us at 520-355-7553.
Let’s address the (ahem …) hippo in the room. HIPAA compliance continues to be a real challenge for small and midsized businesses.
HIPAA is an acronym for the Health Insurance Portability and Accountability Act, which has very specific rules and regulations around a patient’s health information.
Larger healthcare organizations – hospitals and insurance companies – have in-house information technology teams, but smaller businesses don’t have the same depth of IT help on hand. Yet they must abide by the same rules.
Risking a HIPAA violation can be costly. Fines reach up to $50,000 US dollars per occurrence.
Common violations include:
Be aware of HIPAA requirements. Smaller businesses can have a tougher time remaining up to date on technology and guidelines. But that doesn’t make them any less accountable for understanding HIPAA compliance. It’s important to do the research and get educated, or partner with an IT provider with the expertise to prevent possible violations.
Embrace encryption. If your business deals with any confidential information, encryption and firewalls are necessary. Prevent outside traffic from accessing your systems. Ensure data can’t be read if there is unauthorized access. If there is a breach, or a lost or stolen device, the HIPAA penalties are reduced if encryption is used.
Protect all your endpoints. Any mobile devices that have access to patient data need to be secured. With mobile device management, for instance, you can lock down and wipe lost or stolen devices.
Err on the side of caution. Employees gossiping over coffee in a dentist’s office could share patient information, or someone might be sending an email with unencrypted data, or a health announcement with recipient names visible. All these are HIPAA violations. Humans will make mistakes, yes, but it’s less likely if you educate about regulations and the importance of being careful.
Get a HIPAA Check-Up
HIPAA has been around since 1996. In 2005, regulators got more serious about electronic versions of PHI. Yet there are still some businesses out there with only a vague idea of what it means to be compliant.
Heavy hitters in healthcare already take HIPAA seriously. You should, too. So, you haven’t been audited yet, but that doesn’t mean you won’t be. A $50,000 HIPAA fine could make the difference in your business staying afloat another year.
HIPAA compliance is critical for many organizations. Set policies and procedures. Put in place security awareness training. Start using encryption, and assess for risks.
Be proactive with your IT management. By working with IT experts, you can stay on top of HIPAA and remain complaint. A managed services provider can assess risk, identify improvement areas, and propose new tech.
Call us at 520-355-7553 to get your IT and access management policies in healthy shape.
How to Make Computer Issues A Thing of the Past
We repair many computers and laptops each week, but unfortunately this is often ‘closing the barn door after the horse has bolted’. Computers have a habit of dying at the worst possible time – like when an important project is due tomorrow, or before you copy family photos to a backup. We’ve combined our repair services with preventative measures to ensure this doesn’t happen to you. Our managed IT services can remotely take care of all the computers in your house, protecting you against both threats and system failure.
Anti-virus always up-to-date: While many homes have anti-virus software installed, they don’t often have the latest virus and threat definitions. These systems are at risk every minute they spend online, as the anti-virus simply will not pick up and stop an unknown threat.
New viruses and hacking threats arise every day, and there are entire companies dedicated to creating anti-virus updates to catch them. We can make sure your anti-virus definitions are always up-to-date, keeping your computer secure against even the newest viruses.
Software patches: Hackers like to spend their time figuring out new ways to break into computer systems. Software companies like Microsoft and Apple release regular patches to close these security holes. The patches are supposed to be applied automatically, but we often find that isn’t the case – patches didn’t download, were canceled or produced an error. Our services involve remotely checking that each patch has been applied successfully, and troubleshooting if required. As an added advantage, any time new features are packaged into an update, you’ll find them already installed for you.
Early failure detection: Some parts in your computer send out alarm bells when they’re about to die. Unfortunately, they’re not literal alarm bells (that would be too convenient), but information in the background that needs to be interpreted or manually checked. We can monitor these and advise repairs as required.
Data protection: Hard drives which store your information do eventually wear out, but they’re one of the parts that send out early failure warnings. We can monitor this and give you ample warning so that you have time to back up your important files. When it’s time, we’ll work with you to arrange drive replacement, making sure to either clone or re-install your operating system, whichever suits your needs best.
Tune-ups: Even the most cared for computer will slow down over time. Hard drives become cluttered, operating systems corrupt and ghosts of uninstalled programs still remain. We can remotely schedule and run a regular maintenance routine that will keep your system running in top condition and lightning speeds.
Our managed IT service happens entirely behind the scenes, so there is no disruption to your experience. You simply enjoy the benefits of having your own IT specialist team at one flat, low cost. You and your family continue to use your computer/s as normal, the only difference is problems are fixed BEFORE they happen and your system has the very best security against threats.
To Backup or To Archive? ’Tis The Question
Hamlet worried about whether to be or not. You may be more preoccupied with whether backup or archiving is better for your business. You know you need to secure your data, but how? This article examines the different benefits of both options.
Back in the day, businesses kept important information on paper. They stored important records and notes in nearby filing cabinets for easy access.
When there were too many files to close the cabinet drawers any longer, someone would do a big clean out. Older, important documents would get boxed for the basement or other storage area. They might still be needed for tax, or compliance, or other reasons. But you didn’t need those files readily accessible any longer.
A similar scenario is true of digital business data. You can back it up to recover from hardware failure, cyberattack, or disaster event. Or you might archive the data for space management and long-term retrieval.
Deciding Between Backup and Archive
When it comes to the right form of data storage you’ll need to weigh:
Backing up data, an operating system, or application files, doesn't delete the originals. However, your older backup may be deleted when you make the new copy. If not, the backup can have another use. It can allow users to go back and review or recover earlier versions.
It’s not a bad idea to have several backups. We recommend the “3-2-1” backup strategy. You’ll have three copies of your business data. One would be on the cloud, the other two on different devices (e.g. on your local computer and on a backup drive).
Archiving puts a copy of business data into long-term storage. This is the data equivalent of moving that box of files to the basement. Typically, the archived version becomes the only available copy of that data.
The archives’ permanent record of data may prove useful in future legal disputes. Archived data is often tagged to enable streamlined search down the road. Moving information to archive can also improve processing speed and storage capacity.
While a backup may be overwritten, archived data is generally not altered or deleted. In fact, it’s often physically disconnected from the computer or network. So, you’ll turn to a backup to restore your data if necessary, and to archives to retrieve information data.
Both backup and archive can prove useful. It’s not going to happen every day, but entire digital archives can be lost if a server is drowned by a flash flood. All the paper backups can be burnt to cinders in an electrical fire. That external hard drive could be stolen or crushed by falling debris in a hurricane.
It’s best to avoid having a single point of failure. Both backing up and archiving business data is a smart precaution. Ensure business continuity by preparing for the worst. Our computer experts can help you backup, archive, or both. Start securing your business data with our support today! Call us at 520-355-7553.
The new year can mean resolutions and promises for a “new you.” One way to start this year feeling more in control is to clean up your computer. Follow these simple steps!
Tackle the inbox
We do a lot of shopping at the end of the year. Whether you shop online or in stores, you’re asked to provide your email address when you buy, which multiplies the number of mailing lists you’re on. Don’t start the new year deluged by unwanted newsletters and advertising emails.
The extra messages in your inbox distract you from the messages that matter. Instead of deleting every new unread message from “Let’s Make Cookies,” click on one and unsubscribe. Usually, there’s a link that lets you do this at the bottom of the email. If you’re a Gmail user, start your effort to cut down on unwanted mail in your Promotions tab. Google’s algorithm sends sales pitches here, so cut messages from this section first.
The internet is built for browsing. We’ve all lost hours to clicking and linking in this vortex of information. “Wait. How did I end up here looking at kittens eating cupcakes?!” To make things easier, we’ll bookmark sites we visit often or put a page we want to return to on a reading list.
By the end of the year, we have marked many sites that we don’t even remember favoriting in the first place. “When was I interested in this?” Getting rid of any bookmarks for passing interests can help you navigate the Web better this year.
In Google Chrome, click on the three dots in the upper-right of your browser window (to the left of your profile icon). The drop-down menu will have a Bookmarks option. Click on this to see another drop-down menu with Bookmark Manager on it. On the next screen every one of your bookmarks will have three dots beside it. Click on this to select the delete option, and get rid of the ones you don’t need any longer.
Safari users can click on Bookmarks on the top menu or the sidebar icon on the tool bar (to the right of the arrows on the left). Then edit your bookmarks by clicking on sites you no longer want and hitting your delete button.
Sort through downloads
We also download a lot of stuff in a year. Sometimes, because we’re impatient or don’t realize we’ve already hit download, we get multiple copies of the same file! A full download folder takes up storage space on your computer and can slow your computer down.
On a Mac, go to the Finder and click on Downloads on the “Go” drop-down menu. You’ll find a folder filled with .pdfs, .docs, and .jpegs you long forgot about. Click on those you don’t need any more and drag them to your trash can.
On Windows, you can usually go to the “This PC” icon and then the “Downloads” Folder. Right-click on the files you don’t want, and choose “Delete.”
Empty trash/recycling bins
Items you put in the trash or recycling bins at home take up space until you take those bins to the curb or the dump, and the same is true of your computer trash or recycling. Empty these bins by selecting “empty trash” on your Mac Finder menu, or “empty recycle bin” after clicking on the bin icon in Windows 10.
Remove unused programs/apps - If you’re not using a program or app, don’t give it computer space. On a Mac, you can click on the icon for that program and drag it to the Trash. With Windows, you’ll open the Start menu, click on Settings, then System, then Apps and Features from the left pane to select what you want to uninstall. Click the uninstall button, and you’ve decluttered your computer that little bit more for the new year. If you need help with any of these streamlining measures, let us know. We can help! Call 520-355-7553.