News & Events

Handwriting Recognition

Handwriting recognition technology is rocketing away at the speed of light.

To take advantage of handwriting recognition on PC’s you just need a capacitive (avoid resistive) touch screen with a fine-tipped (keep away from dome-tipped) stylus. To download a HTG information sheet on the differences between these screens and styli click HERE). The software is built into Windows, so you do not have to pay extra for it.

Windows 10 handwriting recognition can only be described as ‘sock-blowing’.

I started using Windows handwriting recognition from Windows 95 and in each successive release of Windows, Microsoft has dramatically improved the accuracy of the software. The latest Windows 10 handwriting recognition can only be described as ‘sock-blowing’.

Generally, you can use the technology to enter data into any program: your patient management system, Microsoft Outlook emails, websites, Microsoft Word or Excel; you can hand write into anywhere that you can use your keyboard to enter data into.

Read more
EMAIL INVOICE FRAUD

While this scam is not new, many businesses are still falling for it.
Read how you can prevent being a victim.

Because of its interest in cybersecurity, the HTG Cybersecurity Team receives a lot of news (some actual and some anecdotal) about cybersecurity threats throughout the world. There are so many of them that if we were to send you an alert every time we hear of one, you will truly be overwhelmed.

However, we are keen to send you warnings of threats that are either new and highly risky, or ones that we believe are worth your knowing or being reminded of. This is especially of attacks that have snared local businesses.

This warning is about email invoice fraud.

Read more
WhiteLines® – A Little $3 Swedish Notetaking Gem

For this article, I want to share with you a Swedish productivity gem that I came across by accident when I went with one of my girls to shop for school stationery at Warehouse Stationery.

On one of its shelves was an ordinary looking $3 exercise book called WhiteLines® but which comes with a label that says, “Write, scan & save your notes with Whitelines® Link”

I knew I struck something profound when upon reaching home, I was able to immediately write some notes on the pages of the book with an ordinary ballpoint pen, download the free app, and convert the notes into electronic form within seconds.

I have always been on the lookout for ways in which technology and non-technical people can work together. All too often, workers have to adapt their ways of working to suit the computer. Once in a long while, I discover a nugget where computing has been adapted to work the way that workers work. This article is about Whitelines, one such jewel.

Once in a long while, I discover a nugget where computing has been adapted to work the way that workers work. This article is about Whitelines, one such jewel.

At its simplest, Whitelines consists of a notebook made of ordinary paper but with special markings on the pages, and a freely downloadable mobile app for converting the pages into electronic form. All this is done almost without any technical knowledge and within seconds. The cost is almost negligible.

This is how it works.

Read more
SPAM FILTERING – The necessary evil?

Junkmail-paperwaste-MAINA technology market research firm called The Radicati Group recently estimated the number of email users worldwide at 3.7 billion and that 269 billion emails are sent per day. This translates to around 2.4 million emails per second.

Of this, 49.7% is digital junk mail or spam and 2.3% have malware attached to them.

This means that spam-filtering systems have to sift around 269 and remove 135 billion emails a day. That is a lot of work.

If you want to know how important spam filters are to your online experience, try turning them off for just a few minutes. Your network will probably end up looking like this office below.

Read more
New Dangerous Variant of CryptoLocker Reaches Waikato. Do not click on unknown resumes!

In my nearly 30 years of advising clients on IT security I have never come across a more aggressive and successful piece of malware as CryptoLocker. ‘Successful’ from the angle of the perpetrator, not from the perspective of the network owner, regrettably. Since the beginning of this year, HTG has been aware of wave after wave of CryptoLocker attempts on Waikato businesses. Unfortunately, sufficient of these attacks were effective to cause a lot of disruption and consequential monetary loss to the victims.

To some degree networks can be protected against CryptoLocker through technology. Clients who are subscribers to HTG Fortress, for instance, benefit from a higher level of protection than is obtainable from normal defences. However, there is nothing that can prevent successful infection through users momentarily or unknowingly letting their guard down and opening unsolicited email attachments or clicking on links to infected websites.

I believe that there wouldn’t be many users out there who are not aware that clicking on unsolicited email attachments or suspicious links is risky. However, the perpetrators are getting smarter and smarter and each new generation of Ransomware is dressing up to look more and more like legitimate correspondence.

Read more