National Disaster Preparedness Month Is Here…Are You Prepared?

National Disaster Preparedness Month Is Here…Are You Prepared?

It’s National Disaster Preparedness Month: Is Your Small Business Prepared for the Worst?

September is National Disaster Preparedness Month, and it’s never been timelier. Whether you face the risk of hurricanes, fires, floods or theft, it’s important for even the smallest business to consider that the worst may happen. But, let’s focus on the “preparedness” part of the month. Here’s you should do to make sure you’re ready for the worst.            
Conduct an IT Risk Assessment
Risk assessments determine what disasters your business is most at risk from, and what sort of damage those disasters can do. There are professional risk assessment services you can use, similar to a third-party audit. Ask your managed services provider if they conduct risk assessments.
The IT research firm Gartner predicts that by 2020, 30% of companies will have been directly compromised by independent cyber activists or cyber criminals. A Risk Assessment can prevent this. It also determines if your technology is in danger from:

Accidental deletions and human error.
Natural and manmade disasters.
Unauthorized access.
Data breaches.
Computer viruses and malware.
Email hackers.

Small companies may be able to conduct their own risk assessment, although a consultation with an expert can still prove helpful. Find out what disasters have historically been common in your area, what similar businesses are prepared for, and what current risks are on the rise. This will help you prepare properly!
Find a Way to Secure Data Offsite
Today’s companies run on data. When that data is destroyed, the company itself is at risk, especially smaller businesses that are still building a client base and don’t have any alternatives if their data is stolen or wiped clean.
That means that keeping all your data backups at the office is a bad idea – a single fire or flood could ruin everything you have. A key part of preparedness is keeping an updated copy of your valuable data away from your work location in case something bad happens. The common method is to arrange for cloud storage backup services through your web host or a similar service that automatically uploads data to faraway, protected services.
Study and Update Your Business Insurance
Business insurance ranges from required insurance for certain practices, to an array of potential policies and riders to cover all sorts events. It’s might not be fun paying for something you many never need, but if you do, you’ll be happy you have it.

Data insurance: This helps you recover from data theft or loss. It typically covers costs associated with lawsuits and getting the business back on its feet. General liability insurance won’t cover data loss issues.
Disaster insurance: This can be expensive, but if your company operates in an area that’s prone to a particular disaster that could threaten everything, it may be worth the cost. Again, general liability insurance rarely covers these disasters.
Interruption insurance: This policy is designed to help businesses recover from periods where they lose the ability to do business.

Have an Evacuation Plan Ready
Your evacuation plan doesn’t need to be complicated, but you should have one readily available. Create a file with details on the right roads to use for evacuation from your business, a meet-up location for employees to check on everyone, the nearest emergency shelters and medical services, and so on. The cost and time to create the plan are minimal, but you’ll be glad you have it in a disaster.
Plan for Distance Work in Case of Environmental Issues.
Let’s say something bad happens, and your work location is gone. You probably won’t be able to go back for weeks or months, if at all. Small companies have a choice at this point: Either hibernate and hope to survive when everything is over (a risky proposition), or try to find a way to carry on with recovered data and current employees. The latter course allows the company to continue making revenue, but it requires a distance-work plan. Look into remote work sites that would allow your core business to keep operating even if you can’t get to the office.
Know Your RPO and RTO
These are two common terms in disaster recovery: RPO means “recovery point objective” and RTO means “recovery time objective.” Basically, RPO asks how old the files can be for effective recovery (how often you need to update data backups), and RTO asks how fast you need that data back online to resume normal operations.
Consider both questions carefully, and base your disaster-recovery plans on your specific needs in these areas. These factors will become increasingly important as the company grows, so starting early is important.
It’s tempting to give a best-practice summary of RPO and RTO, but the truth is that they can vary considerably based on the size of the company and the type of business, as well as the backup services that you use. RPO might be only a few hours, or it might be several days. (However, the timeframe is decreasing as data grows more important.) RTO depends greatly on the type of disaster, but worst-case scenarios should see an RTO of only several days at the most – if possible. Lesser disasters should see a same-day or next-day RTO, which often means having a thorough plan for quickly identifying and getting rid of malware, as well as dealing with the fallout from data theft. As you can see, it’s: RPO and RTO goals will help you keep on track.
Control How Your Devices and Services are Used.
You should try to prevent malware and other viruses from attacking your company in the first place. You can’t really prevent a flood, but you can certainly prevent hacking attempts with the right security. That means limiting access to important data, reviewing employee actions, watching for suspicious account behavior, and of course having authentication and firewalls in place. This is not purely digital strategy, either: Employee training and awareness are a key defense against phishing schemes. And your recovery will go much more quickly if everyone is aware of the guidelines they need to follow.
As you can see, disaster preparedness involves a lot of planning. If you aren’t sure where to begin or if your company needs a specific service, ask us! {company} in {city} provides a range of data services and consultations for businesses just like yours. Contact us at {phone} or {email} to learn more.

Do You Know What Your Children Are Doing When They’re Online?

Do You Know What Your Children Are Doing When They’re Online?

The only thing more essential than online privacy protection, in general, are the laws, rules, and regulations designed to protect the most vulnerable among us: our children. Here’s what you need to know.  

Wow! Did you know that as of June 20, 2017, there were approximately 3.88 billion Internet users worldwide? To put this into perspective, that’s about 51.7% of the total population of planet Earth!
However, most discussions regarding the ubiquitous use of digital resources fail to place proper emphasis on the people who are actually being affected the most: our children. Make no mistake, primary age children are more connected, more mobile and more social than their parents or grandparents ever were thanks to the wonders of the World Wide Web. This poses a number of interesting (and potentially dangerous) implications in terms of online privacy that are essential for us to explore.
Children and the Internet: Facts and Figures
According to a study conducted by the experts at Kids Matter:

Nearly 95% of children between the ages of eight and 11 years of age have had access to the Internet at least once in the last four weeks.
Those who fall into this age range are also much more likely to use more multiple Internet-enabled devices than their “grown up” counterparts.
The average 10 to 11-year-old child uses three devices throughout the course of their day. These aren’t just laptops and desktop computers, either—They extend to game consoles, iPads, music devices and so much more.

 
In a world where 21% of children between kindergarten and second grade have cell phones, do we really think that we’re doing enough to protect their privacy on the Internet?
Also, consider statistics like the following compiled by the experts at GuardChild.com:

17% of 12 and 13-year-old kids said that they’ve received an email or some other type of online message that contained photos or words that made them feel uncomfortable. Only 7% of parents, however, were actually aware of this.
44% of children who fell into the same age bracket said that they’ve watched something online they knew their parents wouldn’t approve of. Only 28% of parents said that they were aware of this.
Girls are much more likely to become the target of cyber bullying than boys.
Only 15% of parents said that they felt like they were “in the know” about the social networking habits of their children. Plus, many of them were totally unaware about how these activities and behaviors could lead to much more serious problems like cyber bullying.

 
It’s true that steps have been taken to protect the privacy of children online. Most social networking sites require users to be at least 13 years old before they can get approved for an account. However, these “safeguards” are incredibly easy to get around with just a few quick mouse clicks. It’s clear that something more must be done, which is where regulations like COPPA come into play.
What is COPPA?
Short for “Children’s Online Privacy Protection Rule,” COPPA was created by the Federal Trade Commission in the United States in an effort to better protect children when they use the Internet. It imposes a number of requirements on both website and online services that are specifically directed at those under 13 years of age. It details what personal information can be collected, how that information must be stored and protected, and much more.
The law itself was proposed in 1998, and first went into effect in April of 2000. As technology in general and the Internet have evolved rapidly since then, it should come as no surprise that the law has done the same.
Some of the more important requirements of COPPA for compliance include, but are not limited to the following:

Websites must post a “clear and comprehensive” online-privacy policy that outlines what information they are collecting from people under the age of 13.
Websites must make a “reasonable effort” to provide direct notice to a child’s parents about the above information collection.
If any child under the age of 13 is going to sign up for a particular site or service, they need to obtain “verifiable” parental consent.
Website and online services operators must provide a “reasonable means” for a parent to review ALL personal information collected from a child. They must also have the ability to maintain that information or refuse its further use.

 
As one might expect with a topic this important, COPPA violations can be incredibly severe. In 2006, for example, the website Xanga was fined $1 million for repeatedly allowing children under the age of 13 to sign up for and to use accounts without getting verifiable parental consent. Mrs. Fields Cookies, The Hershey Company, Kidswirl and Imbee are also examples of high profile sites that have been on the receiving end of COPPA violations in the past.
Online privacy protection is one of the most important topics of the digital era. However, during all of the discussions about massive data breaches and business intelligence, we must not forget to acknowledge and look after those who need it the most: our children.
Kids these days are being exposed to technology and the Internet at an increasing rate, and at a far earlier age than any other generation in human history. It’s up to all of us to work together to make sure they can enjoy the many advantages, with as few of the downsides as possible.
If you’re in {city} and would like to find out more about this or any other essential IT topic, please don’t delay—Contact {company} at {phone} or {email}.

How To Bounce Back From Failure

How To Bounce Back From Failure

Technology is the foundation of everything that your business does, from minor tasks to major operational functions. Losing access to any part of that technology for any reason is a recipe for disaster, and one that most businesses are wholly unprepared to deal with. Statistics gathered in January of 2017 show that 43% of small and mid-sized businesses have already experienced at least one catastrophic network failure at some point in their existence, and recovered from those incidents with varying degrees of success.

The best way to handle a system or network failure is to take steps now to avoid ever having a failure happen in the first place. Prevention measures truly can make all the difference, especially when every minute counts – both literally and figuratively. Downtime costs a small business an average of $25,806, which is a hefty sum for a smaller operation to face losing. In fact, the financial damage alone that results from a long stretch of downtime can sometimes be enough to sink a business completely.
Unfortunately, even the best-laid plans can be subject to unforeseen circumstances. So while stopping downtime before it happens should be your main goal, having a solution in place to minimize downtime when issues arise is crucial. This is where cloud-based technology proves to be incredibly useful. The cloud can protect your business against the most drastic consequences of a system or network failure – data loss, loss of accessibility, and loss of productivity. You might not be able to control the weather or the actions of a hacker or a careless employee, but with cloud-based data backups in place, you can control what happens to your data.
Avoiding System and Network Failure
Keeping your systems and network up and running can spare you and your employees a whole lot of headaches. The common causes of network failure, in particular, can more often than not be avoided completely by putting three simple tricks into practice.

Spot Hardware Issues Before They Happen – Your system and network likely rely heavily on your internal hardware in order to take time to make sure that servers and computer towers are being stored in well-ventilated areas and are kept free of dust can help keep your hardware healthy. Make a note of when hardware was purchased and installed, and be mindful of what the useful lifespan of these items are. Outdated equipment can often be a disaster waiting to happen. Alternatively, you can look at migrating to a cloud-based environment that instead relies on off-site hardware that is monitored and maintained by your cloud provider and takes the bulk of the faulty hardware threat out of the equation for your business.
Keep An Eye Out For Suspicious Activity – Network failure caused by a hacker or scammer seems to come out of nowhere. But the reality is that many threats have tells, and a keen observer can spot some of them. Antivirus and anti-malware software can and should protect your network against the bulk of these threats, but you shouldn’t count on these solutions alone. Weird CPU spikes or unusual network traffic can be a major red flag and aren’t something you should ignore. A good IT provider will monitor your network for these types of odd behaviors, and step in to neutralize threats before you ever become aware that they’re there.
Automate Update and Reboot Processes – Little communication hiccups between your server and system happen. Technology is imperfect, and small, mostly harmless errors will pop up as a result. You can avoid a sudden network outage by making sure that your servers are set up to reboot automatically when one of these communication issues happens, saving you the trouble of having to complete a manual reboot and go without your needed services while the problem is identified and sorted out. Once again, moving to a cloud-based environment can eliminate this issue completely by leaving that task in the hands of your cloud provider.

Protect Your Network In 5 Easy Steps

Improve Access Controls – Lackluster access controls leave your network open to unauthorized users, which can lead to cyber attacks and data breaches. Make sure access to both your network and workstations that can access your network are password protected, taking advantage of additional measures like Two-Factor Authentication where possible. Strict access controls allow you to limit the scope of access your employees have as well, which can cut down on innocent mistakes made by staff who might stumble into applications or systems they don’t have a solid grasp on using. These innocent mistakes can quickly cause network crashes and data loss.
Keep Software Up To Date – System and software updates are a critical component of good network security. Updates are released by manufacturers and vendors to correct known flaws or vulnerabilities that can either be exploited by a hacker to gain access to your network or can cause software to “glitch,” leading to frozen or crashed systems. When systems and software are hosted in the cloud, your cloud provider will handle these updates for you, ensuring nothing important is missed.
Make Full Use Of Your Network Protections – Typical network security measures include antivirus and antimalware software, firewall software, and spam and content filtering. But it’s important to remember that just having these solutions in place is not enough to protect your network. Makes sure all of your software’s advanced features are enabled and configured to your specific network and have a system in place to monitor your endpoint protection measures in order to keep them up to date and working effectively.
Train Your Staff – Human error is often the biggest threat to network security and the health of your network in general. Ensure your staff is well-versed in cyber security best practices and can spot threats like phishing scams can keep threats out of your network. It’s just as important to make sure your staff understands the technology they’re using each day and follows your policies and protocols. Employees who take shortcuts around security measures or routinely save files in the wrong place can jeopardize the integrity of your data and make your data backups less effective. Businesses with cloud-based networks and data storage solutions can avoid misplaced files disappearing by limiting where and how data can be saved.
Have Data Backups In Place – Good data backups are the single most important part of protecting your network in the event of any type of As long as your backups are updated at minimum once a day and stored in a secure, offsite location, even if the absolute worst were to happen to your network your files will still be safe.

Data Backup Is Key
At the end of the day, no other precautions or preventative measures can replace the need for a great data backup and recovery system. This system needs to be reliable, flexible, and accessible under any set of circumstances. While there are a few different approaches you can take here, none can offer the same level of adaptability that the cloud can.
Cloud-based backups have the benefit of existing separate from your internal network, helping to insulate them from malware threats or other issues that can corrupt data stored on your network. If you were to find yourself facing a ransomware infection, you could simply wipe your systems clean and restore your data and applications from your cloud-based backups, saving you the cost of a ransom fee and minimizing your downtime and lost profits. Your cloud provider can also offer failover solutions to protect you from service outages, making sure your data is always accessible when you need it most.
Data stored in the cloud can be restored from anywhere, allowing you the option of running your business from a temporary base of operations if your network failure is caused by inclement weather or another source that damages your physical location as well as disrupting your network services.
Ready to seriously consider cloud-based data backups for your business? Contact {company} at {email} or {phone} to learn more about the cloud solutions we have to offer. We’re the trusted IT professionals for businesses nationwide.

Architects— “Wow” Your Clients with AR & VR. 

Architects— “Wow” Your Clients with AR & VR. 

Architects who embrace the full vision of augmented and virtual reality can reap significant rewards: Quick approval on complex projects, and a richer experience for their clients.  
If you’ve played with virtual reality (VR) or augmented reality (AR) apps you probably went through a “Wow!” phase. Now you can use them to win over your clients.

The same technology behind games such as Pokémon Go and the myriad of ghost-hunting apps is helping to solve real world problems for architects, engineers, contractors, and designers.
VR and AR can provide an immersive experience for your clients, and help them visualize how your project will look when completed.  They’re a massive boom for an industry that requires others to realize a vision. The top augmented reality and virtual reality apps are game-changers and offer you the competitive edge your architectural firm needs.
Architecture and Design Challenges
To translate a two-dimensional image into three-dimensional space, and then walk through it, is close to science fiction for most people.  While augmented reality and virtual reality play a part in our daily lives with map platforms and gaming apps, most haven’t “walked through” a design that doesn’t actually exist.
Graphics continue to improve, as do the formulas that generate virtual worlds— And they come with more detail than ever before. Imagine being able to walk through a new apartment building to assess space utilization and deciding whether or not your furniture will fit before the building even exists! That’s the benefit virtual and augmented reality apps bring to the architectural and design space.
Augmented Reality and Virtual Reality
While the terms are sometimes used interchangeably, these two types of computer-driven environments are fundamentally different. Virtual reality provides a fully-immersive, non-real world that users can interact with—While augmented reality is made up of a computer-based overlay on the real world.
Although you’ve likely heard more about these technologies in recent years, virtual reality first came into prominence around 1957 with the interactive Sensorama theater concept. The idea of interacting with computer-based environments was shared with broader audiences in the 1980s and 90s in several popular films such as 1992’s Lawnmower Man, an adaptation of a Stephen King novel.  The AR/VR world of 2017 is much different than these initial incarnations of applied science and mathematics.
Building Design
Apps such as ViewAR provide custom-fit, augmented, mixed and virtual reality solutions that can be configured for various types of businesses. This type of augmented reality is the ideal sales tool for real estate developers and architects, as it allows visualization in a real-life surrounding complete with furniture. Architects will find this technology especially useful, as it provides the ability to present buildings in their future state as if they already exist.
Feeling Scale
VR headsets such as Oculus Rift and HTC Vive provide fluid movement between current reality and the future reality—showing not only what’s actually there, but what’s possible. The full dimension of scale and visceral feeling provide a more human-like experience that’s relatable and understandable. Programs like Iris VR can even use Google Cardboard to walk through a building in real-time, climb stairs, walk in all directions, and overlay an architect’s three-dimensional drawings and notes into space.
Versioning with Confidence
Have you ever wanted to change a design but were concerned because it could result in an expensive re-work?  Now you can and without the expense. With AR, you can judge the difference before and after.
This forward-thinking functionality provides a way for you to engage your audience at an earlier stage of the design process, and to ensure that future versions of your designs are dialed into the client’s desires and requirements.
The Ultimate Upsell
If you try to sell a concept that clients won’t approve because of cost or other concerns, using virtual reality may help to show them the impact it can have, and ultimately convince them it’s the way to go.
Simply stating that marble floors would be the ideal selection for a hotel entryway may seem like an unnecessary expense, until investors can view the difference it will make.
The exciting advances in virtual and augmented reality allow you to communicate your vision in a richer way than is possible with a two-dimensional drawing. These systems are now so sophisticated that they can reveal how either natural or artificial lights interact with an environment. This makes it easier for your clients to envision your designs and embrace them.
Want to learn more about how augmented reality, virtual reality and other technologies can enhance your architectural projects?  Contact {company} at {phone} or {email}. Our technology professionals stay up-to-date on the latest advances, and can work with you to turn your visions into reality.

Don’t Get Spooked Out This Halloween MS Outlook Users

Don’t Get Spooked Out This Halloween MS Outlook Users

“What’s This About an Updated Protocol in Outlook on Halloween?  Should I Be Concerned?”
If you’re like most people, you rely on Outlook email to maintain connections both inside and outside your business.  Now there’s critical protocol change in Outlook that could negatively affect your ability to use it if you’re not informed.

If you’re running Office 2007, 2010, 2013 or 2016, take heed – The winds of change (or perhaps a hurricane) are coming your way.
On October 31, 2017, Microsoft will officially replace RPC over HTTP protocol in Exchange Online with the more modern MAPI over HTTP. No, it’s not a trick for Halloween, however it can trip you up if you’re not prepared. Whether your specific configuration is affected depends on a variety of factors, such as whether you’re running on premise or cloud-based software.
At a bare minimum, you should review your current control settings to ensure the latest patches and updates were applied.
The Updated Protocol
In May 2014, Microsoft released an updated protocol called MAPI over HTTP to create a modern networking environment that supported seamless mobility, regardless of the device used. This release included a time schedule to retire RPC over HTTP, a 10+ year old protocol that doesn’t provide the same ability to hop between networks as the updated MAPI convention.
Remote Procedure Calls, or RPCs, were revolutionary in their day, as they allowed Outlook Anywhere to transport information without the need for a firewall or VPN (virtual private network) –as long as a secure HTTPS connection was enabled. Microsoft’s utilization of this protocol allowed Outlook clients to reduce dependence on extended synchronization sessions and tiresome dial-up connections, and move into the new wave of WiFi connectivity and mobile computing.
Today, the enhanced functionality from MAPI over HTTP enables additional sign-on scenarios, removes dependence on legacy technology, and improves overall connection resiliency when the network drops packets in transit.
“Will My Platform Be Affected?”
Organizations are currently using an on-premise Exchange Server will continue business as usual and experience no adverse effects from the protocol migration. (If you run Windows 10 Mobile, Outlook on the Web, Outlook for Mac, iOS, Windows Mobile or Android you won’t be affected by the switch.)
However, businesses connected to Exchange Online mailboxes in Office 365, and that use Outlook for Windows must review their current setup and determine which upgrade path makes sense (or they risk losing system functionality and availability).
“What Upgrade Recommendations Do You Advise?”
In many cases, the best recommendation is to bring your Outlook installation into a more contemporary platform, such as the latest version of Outlook 2016 within Office 365 (part of Office 365 ProPlus).
However, if this option isn’t feasible for you to do before October 31, 2017, there are a few options that will allow you to continue using your corporate email and avoid disruptions in connectivity until you can put a more permanent solution in place.
The minimum updates are listed below:

Office 2016: December 8, 2015 update, MSI: 16.0.4312.1001
Office 2013: Office 2013 Service Pack 1 (SP1) and December 8, 2015 update, MSI: 15.0.4779.1002
Office 2010: Office 2010 Service Pack 2 (SP2) and December 8, 2015 update, MSI: 14.0.7164.5002

However, while these updates should provide you the ability to maintain usability of your Outlook software, it’s recommended that you move to Office 365.
Remember, maintaining a solid update schedule for your office productivity software ensures you’ll have access to security patches for identified vulnerabilities.
“What Are the Benefits of Migrating to Office 365?”
While some organizations are still most comfortable with an on-premise solution, Office 365 offers a variety of benefits. Since all upgrades are handled on the server side, there’s no need to update individual workstations, or even push an upgrade to users.
Office 365 provides a variety of benefits over on-premise solutions, including:

Scalable options that allow you to right-size your licensing over time.
There’s no need to overspend on licensing when planning for future growth.
You can select the pricing level that fits your budget and needs.
It provides the flexibility to install one license for up to five individual devices.
It reduces the overall risk of data loss due to rigorous backup and disaster- recovery protocols.
There’s no need to perform upgrades, as new functionality is available immediately.

While migration can be a bit challenging, with the support of a managed service provider, you can successfully achieve a fast adoption of Office 365 online.
If you need assistance with your Outlook Exchange or Office 365 migration, contact the professionals at {company} at {phone} email}. Our security and infrastructure professionals will work closely with you to ensure you’re receiving the best possible pricing and support for your office productivity needs.

Windows 10 Fall Creators Update

Windows 10 Fall Creators Update

Should I Consider the Windows 10 Fall Creators Update for My Business?
The Windows 10 Fall Creators Update is right around the corner—And it’s coming with a number of incredible new features that you’ll definitely want to take advantage of.

To say that Microsoft’s Windows 10 operating system is popular is something of an understatement – Particularly as far as adoption rates are concerned. By the end of 2016, Windows 10 was already running on more than 270 million devices around the world. This put it on track to reach one billion users a bit faster than expected!
A large part of this had to do with Microsoft’s massive course correction from the poorly received (yet widely used) Windows 8. After the initial and disastrous launch of the 8 operating system, (and in an effort to fix as many of the flaws as possible) Microsoft responded quickly with Windows 8.1. This was a bit more in line with the previous (and more popular) Windows 7. However, by that time, it was “too little, too late.”
The Windows 10 Fall Creators Update—You’re Sure to Like It.
Windows 10 users already received one fairly popular “Creators Update” earlier this year. Another is right around the corner, as the Windows 10 Fall Creators Update is set to launch. It brings a number of changes that business users, in particular, are definitely going to applaud.
Expected to launch in October 2017, the Fall Creators Update can be summed up in a single word: “improvements.” This isn’t a “reinvent the wheel” update—And for many, not nearly as drastic as the previous 2017 update that rolled out in May, June and July. It does, however, bring a variety of “under-the-hood” and productivity improvements that are more than worth exploring.
The biggest set of changes involve the Windows Shell, which is the main part of the operating system. Made up of components like the Start Menu, the Taskbar and File Explorer, the new version of the operating system will bring with it the following new enhancements:

The Action Center that features a more fluent User Interface design, and will share the same acrylic background as the Start Menu.
A variety of new icons added to the Start Menu.
The Start Menu that can be resized diagonally – something that we’ve all been clamoring for.
The ability to resize the Start Menu, particularly horizontally—now a much smoother experience.
Improved OneDrive integration with File Explorer. It’s now possible to see files that have been saved to the cloud with a new “On-Demand Sync” option.

Microsoft’s Edge browser will also see some much-needed improvement, particularly with the way it handles file compatibility with formats like PDF and EPUB. It’s now possible to “ink” onto PDFs directly within Microsoft Edge.  This prevents the need to download a file and open it in a separate program. You can also see the table of contents from within a PDF, and directly interact with forms within a document. This brings Edge much closer in line to applications like Adobe Reader.
Settings: Some of the most relevant changes for enterprise users come in the way of settings adjustments.

The “About” area of the “Settings” app has been completely redesigned to display more relevant information and paint a much clearer picture regarding the health of a particular machine.
“Storage Sense” is also a new feature making its debut. It allows the operating system to automatically delete files in the “Download” folder after a period of 30 days. “Storage Sense” can also be used to automatically delete previous versions of Windows after a successful upgrade has taken place.
Remote Desktop functionality, now in the “Settings” app, brings it more in line with how you’ll actually interact with this feature.

Updates: Each update file has its own individual progress indicator when downloading and installing – making it easy to see what’s going on “behind the scenes,” and how much time is left before updates are available. There’s also a new “Activity Monitor” that shows comprehensive statistics on downloads, updates and other essential factors that occurred during the previous month.
General Improvements: The Fall Creators Update now allows Windows 10 to run on the ARM64 architecture (Advanced RISC Machine, a family of reduced instruction set computing (RISC) architectures for computer processors). This will let you “future proof” your machines in a much more effective way.
Windows is also now “smart” enough to throttle inactive programs, which should go a long way towards generating incremental performance improvements across the board.
Cortana, Microsoft’s Siri-like voice assistance, will also support dedicated speaker devices – something that should improve compatibility with peripheral hardware, and address certain accessibility concerns that some had in the past.
Our Advice? –-You Should Definitely Consider Windows 10 Fall Creators Update for Your Business. 
Windows 10 has come a long way since its original release, especially in terms of the productivity and collaborative benefits that it can bring to enterprise users in particular. For a company still struggling to recover from the lukewarm reception to operating systems like Windows 8 (and the outright disaster of Windows Vista), the Windows 10 Fall Creators Update proves that Microsoft is willing to listen to the people who matter the most of all: its users.
If you’d like to find out more information about the Windows 10 Fall Creators Update—Or for answers to your IT questions—Contact {company} at {phone} or {email}. We’re {city}’s trusted, IT Managed Service Providers.