On September 13, 2021, Google will be applying ‘resource keys’ to existing shared files as a security measure for Google Drive data. This security add-on will change the behavior of Drive data only when links are requested by NEW viewers — anyone who already has access to an existing shared file won’t need to do anything. This ‘resource key’ will be embedded in the new shared link that the sender provides. A New viewer who receives a link with this embedded key will be able to access the shared document via the link. We appreciate your bringing us your concern over this security change and hope you will not hesitate to contact us with any other questions.
Google Drive for Desktop Update
As you may have been seeing, Google will be unifying their ‘Backup and Sync’ and ‘File Stream’ features into one program called ‘Google Drive for Desktop’. This new ‘Drive’ program will work in a similar way to both of the previous features; users can backup selected folders or photos, access their files from other devices, and save directly to their online G Drive from their desktop.
If you are already a ‘Drive’ user then you should be able to continue working as you are. However, those who are currently using ‘Backup and Sync’ or ‘File Stream’ please feel free to contact us with any concerns about this update as it rolls out over the next few months. For those who currently aren’t using a cloud storage system, we highly recommend using this ‘Drive on Desktop’ program.
IMPORTANT If you are a current ‘Backup and Sync’ user and/or have the pictured icon in the lower right corner of your screen next to your clock, we highly recommend you set up a time with us to discuss your options for backing up your information and important files.

Google’s changes will affect current users of ‘Backup and Sync’ and will replace the way that users backup storage for their files. If you wish to further discuss these changes, any concerns, your options, and/or how to use them, please feel free to contact us to set up a time so that we can help.
No One Likes Waiting for Their Computer to Startup

Why is my startup So Slow? – it’s often slow and sometimes slower still! One reason that startups can become slow is due to updates and patches that Microsoft has pushed to our computers in response to a security concern. Everyone is concerned with security these days — and Microsoft is updating our computers almost daily.
We can ensure the fastest boot times with a few simple steps:
- Leave your computer on at all times – your computer is receiving updates from Microsoft regularly and we should be ready to receive them at any time
- Before you leave for lunch, the end of the day, or for the weekend, reboot your computer. We often have to reboot our computers when first sitting at our desks in the morning, however, our reboot may actually be triggering our computers to apply the Windows update it just received! Rebooting when we are ready to leave our desk, however, will allow updates to be applied/downloaded or applied automatically without other open programs that interfere with an automatic reboot.
- Leaving our computers on does not consume much power and is not less secure if we are password protecting Windows.
Please let us know if you have any questions about the above!
A Welcome Back from Covid
Free Consultation – A RETURN FROM COVID
As Covid becomes more of our past instead of our present — and our offices fill with staff — we wanted to offer a special invitation to our select clients to bring your technology back to its best performance and allow your team to return to full speed.
We are currently scheduling consultations in your office – free from obligation or cost – to review your technology issues and determine how to get the best from your computers and software post-Covid.
Are applications slowing down? Is a program update not completing? Is phishing becoming a concern?
Please email help@yougetIT.net to secure a time for a meeting as spots are filling fast! You may also use the ‘schedule’ link below.
Schedule a Meeting
We look forward to meeting and establishing your best plan for returning to full productivity. Welcome back!
Webroot Cybersecurity
Although your office may be using McAfee products that came bundled with your new computer or our previously recommended ESET Endpoint Antivirus subscription, we now provide Webroot as our recommended antivirus and antimalware solution. Webroot’s solution against security threats works with the cloud allowing continuous scanning of your files and updating of its security database – not slowing your computer with long, scheduled scans. The service installs instantly and silently and protects against viruses, malware and identity (Ransomware) threats. Please review their video here. We recommend this solution even in your are currently paying a subscription for another solution.
Pricing is $3 per month per user and a free trial is available.


Windows 7 Upgrades to Windows 10 Now Possible!

We had mentioned in an earlier email and newsletter that your Windows 7 computers would eventually need to be replaced by the end of 2020. After some research and testing, we found that Microsoft has enabled a method that will allow us to upgrade select computers that are running Windows 7 without the need to replace them.
Microsoft is providing this upgrade FREE OF CHARGE and the only cost is our labor to perform the upgrade.
We can quickly determine the computers in your office that are good candidates to upgrade.
Contact us for next steps!!
Working from home? Let us help!
How To Marie Kondo Your Inbox, According To A Google Productivity Expert
New pricing for G Suite Basic and Business Editions
The Journey of G Suite
(from Google’s Update Blog)
More than a decade ago, we introduced Gmail—our first cloud-native productivity app—to help make email safer and easier for everyone. Since then, we pioneered more ways for teams to collaborate in real-time with products like Google Calendar, Docs, Drive and Hangouts. Together, these apps make up G Suite, our set of intelligent, secure productivity and collaboration tools.
We’ve brought businesses more than a dozen new G Suite services to help them reimagine how they work, including powerful video conferencing (Hangouts Meet), secure team messaging (Hangouts Chat) and enterprise-grade search capabilities(Cloud Search). We’ve also infused our products with advanced artificial intelligence to make it easier to respond to emails, gather insights from data and protect against phishing attacks before they happen.
Today, more than four million organizations use G Suite to collaborate efficiently and securely, and analysts have taken notice. IDC’s Wayne Kurtzman notes, “Google has established G Suite as a secure, enterprise-ready, AI–powered productivity and collaboration platform. With its broad set of capabilities, G Suite offers a strong value proposition to customers.”
For existing G Suite Basic or Business edition customers on the Flexible Plan, the new list prices will go into effect on April 2, 2019. For customers on the Annual Plan, the new prices will go into effect the first time their plan renews on or after April 2, 2019. These changes will not impact current contracts or any renewal events prior to April 2, 2019.
Additionally, for those Basic and Business Edition customers who receive their bill from Google, we’ll send an email with details specific to their domains no later than February 28, 2019. Any customer that licenses G Suite through a reseller should hear from their partners directly regarding the new pricing, or they can reach out to their partners proactively.
We are grateful for the many businesses that use G Suite to empower their teams to work collaboratively, and we remain committed to expanding its functionality to help our customers succeed. Feel free to reference this edition guide to learn more about each offering.
Security Best Practices
Security Best Practices
Passwords
Tip: Use an 8+ character password with mixed case/numbers/symbols along with 2FA (Two-Factor Authentication)
Passwords are among the first lines of defense to fail. It won’t surprise anyone that the two most commonly used passwords are ‘123456’ and ‘password’. Many of us are afraid to create complex passwords for fear of forgetting them.
The easiest method to harden your password security is to think of at least three 8+ character passwords with mixed case/numbers/symbols. ‘Mentally label’ each of the three passwords as green/yellow/red. Choose the green password for the lowest security sites that have no real personal info — save the red passwords for banking or shopping sites that retain your account numbers and credit cards. As these passwords are used for more and more sites, rotate out your green password and replace it with yellow and red — making them the new green password. Lastly, establish a new red password for your highest security sites.
Even an 8+ character password, though, can be guessed by special hacking computers within 5-6 hours. We must also pair our complex passwords with 2-step verification or 2-factor authentication where a successful login then prompts us to confirm our identity with a code sent to our mobile phone or email address. Google has supported 2-Step-Verification for years and if not already using it for your Google/Gmail accounts, you should enable it immediately.
Any site that holds sensitive information that does not support 2FA, should really be reconsidered as a site you continue using or at least should have a 12 or 15 or 20 character complex password — or better, passphrase such as, “my b1rthplace 1s Cleveland” (include spaces).
Website Security
Tip: Login to websites only if they display a ‘lock’ in the address bar
Websites that require a user to login with an established username and password are responsible for protecting the information they retain — passwords, addresses, credit card info, etc — with a security protocol called SSL. This protocol prevents unauthorized websites to mimic or ‘pose’ as valid sites and also prevents ‘eavesdropping’ of data while traveling between your computer and the site.
You can recognize websites that have established this security certification by looking in the web browser address bar when visiting the site.
Make it a policy to check for this security ‘lock’ before logging into any website and entering any personal information.
Web Browser
Tip: Use a Standards Compliant Web Browser such as Chrome, Firefox or Safari.
Your continued use of Microsoft’s Internet Explorer may be the cause of your past computer infections. The standards used to deliver web data have been notoriously non-standard when involving Internet Explorer historically. Though recent versions (like Microsoft Edge) have improved, there is little reason to maintain a loyalty to IE. Even if a website recommends its use, consider an alternative website that does NOT require it. Your security may be at risk.
Popular browsers like Chrome, Firefox and Safari allow for plug-ins, or helper programs, to add features and functionality by 3rd party software companies. We recommend adding the HTTPS Everywhere plug-in to your web browser. This plugin enforces the use of SSL or https on websites.
VPNs
Tip: Install a browser based or standalone VPN (Virtual Private Network) service for ~$4/month
Although mostly used by computer techies and foreign dissidents speaking out against their censoring governments, the use of VPNs is gaining attention in today’s security addled climate. This PC Magazine article best describes the function of a VPN and the excerpt below offers a brief summary.
We use and recommend KeepSolid’s VPN Unlimited which is reviewed in the article and selected as an Editor’s Choice.
What Is a VPN?
A VPN is a lot more than just something you need for remotely accessing your work files. When you switch on your VPN, it creates an encrypted tunnel between your computer and the VPN server, which can foil hackers or even government snoops trying to eavesdrop on your activities. From the server, your web traffic travels off into the public internet, but your actual IP address remains hidden. Data-hungry website advertisers see the IP address of the VPN server instead of your own. We recommend using a VPN as often as you can, but especially when your PC is connected to a public Wi-Fi network. When you hop on an unsecured network at the airport or coffee shop, you have no way of knowing whether the network is what it claims to be. Instead of a convenience offered to thirsty customers and weary travelers, the network could have been created by a hacker looking to intercept your data. VPNs can also be used to disguise your actual location, which is why these services are often used by journalists and political activists operating in countries with restrictive internet controls.