Tip of the Week: Scan Picture or Document to PDF in Android

a man is cutting a piece of paper on a desk

Many people don’t realize that their mobile device can double up and offer them many of the same great features that a PC or laptop could. A hidden secret that very few people take advantage of is the fact that Google Drive offers you the chance to scan a document or picture and create a PDF of it on your Android device. Today we’re going to show you how to make the most of this great feature so that you can preserve all of your most important documents and memories in the future.

How to Scan Documents with Google Drive to Create a PDF

Thanks to this feature from Google Drive, you no longer need to have a scanner in your office or home to create PDFs of your pictures or documents. Instead, you just need a good camera and a Google Drive account.

The first step is to head to Google Drive on your mobile phone. You’ll then hit the plus sign button, which is what you would do if you want to add a new file to your Google Drive. Then, select Scan from the list of options you are presented with.

At this point, you’ll be offered the option to open your Camera app, which you may need to grant Google Drive the access to do. You’ll then set up your camera to frame the document or picture, before tapping OK to say that it’s in place and ready to go.

One of the amazing things about this feature is that Google Drive will automatically adjust your picture, but you can also make manual edits as needed. Then, click Add Page if you need to add another page and Save to complete the process. You’ll just need to give the file a name and choose the folder you want to add it to, and you’ll be good to go. As you can see, it’s a very quick and easy process and saves you from always needing to have a bulky scanner on hand when traveling for work. 

What would you like to learn in our future weekly tips? We hope this week’s tip helps you to make the most of your Android device and Google Drive account so that you can preserve your pictures and documents for years to come.

Contact Us Today and Check Out Our Blog!

Tip of the Week: How to Remove or Hide Desktop Icons

For many people, the desktops of computers or laptops often get extremely cluttered with various icons and files. Fortunately, there is a way to delete and/or hide those icons from your screen view which will allow for increased productivity and improved organization. Continue reading to learn how this can be done using a Windows PC. 

An important thing to remember, which is also a common misconception that many people are unaware of, is that when you delete an icon from your desktop, it does not remove the program from your computer. Deleting the icon from your desktop will simply remove the shortcut to the application. If you want to delete the entire application from your computer, you should follow a completely different protocol. 

How to Delete Icons from Your Desktop

There are a couple different options you can use to delete icons from your Windows desktop, making it very convenient and easy to accomplish. To begin with, you must identify which icon or icons you want to delete. If you want to choose several icons, you can hold down the Ctrl key and then click on the icons you want to delete. Once all icons have been selected, you will then right-click on any of the icons and choose the option Delete from the drop down menu. 

Another option you can do to delete icons from your desktop is simply click and drag the icon or icons to your Recycle Bin to delete them.

By doing so, this will send the selected icon or icons to the Recycle Bin where the icon or icons can later be found in the future, if you ever need them. 

How to Hide Icons

Instead of deleting icons from your desktop, you also have the option to hide them on your desktop. This alternative is also easy and straightforward to do. The first step you have to do is right-click on your desktop. You will then hover over the View option in the drop down menu. Then, you must uncheck the option for Show Desktop Icons. This will hide them all from view. In order to see your icons again, you will just have to re-check the option. It is important to remember that this is an all or nothing option. You will be unable to select which icons you want to hide. This option will hide all icons on your desktop.

For additional questions regarding hiding or removing desktop icons or for any questions related to your IT needs, we at WheelHouse IT are here to help. Contact us today at 954.474.2204.

Contact Us Today and Check Out Our Blog!

How to Record Screenshots, Audio, and Video on Windows 10

Screenshot of cheerful confident Asian male CEO discussing statistics review with charts graphs.

If you have ever had to write up a report or process for a particular task, you know that images can go a long way toward helping people understand what exactly needs to be done. For Windows 10 users, there is a built-in tool that you can utilize to take screenshots, record video, and even record audio alongside all of this: the Xbox Game Bar.

Before we dive into the details about how to use this feature natively available on Windows 10 devices, we would like to point out that it is entirely possible that the Xbox Game Bar has been disabled or uninstalled completely from your work-related devices. Due to its nature, it is mostly used for gaming purposes, so your organization may have disabled it for this reason. If you need to use this solution for any reason, be sure to check with your IT department to determine whether or not it is the right tool for your current needs; don’t just go installing software on your workstation all willy-nilly!

That said, if it’s not disabled by default, why not use the tool to solve a current problem? It beats downloading an expensive screen recording software!

Start-Up the Xbox Game Bar

To start up the Xbox Game Bar, all you have to do is hold the Windows key and hit the G key. This will open up the overlay. The overlay has four main features, from left to right:

  • Take a Screenshot: The screenshot button does exactly what you think it does; it takes a screenshot of your screen. You can use the keyboard shortcut here for easy access: Windows key + Alt + Prt Sc.
  • Record the Last 30 Seconds: This feature can be used to record video if you’ve missed something retroactively. This is kind of a clunky one to use, though, as it does not always recognize the application you might be trying to record (remember, this solution is for video games normally). You can use the keyboard shortcut for this feature, too: Windows key + Alt + G.
  • Start Recording: This button will start recording your screen. A separate window showing some basic controllers will pop up, including enabling or disabling audio input. You can use the keyboard shortcut to start recording: Windows key + Alt + R.
  • Turn Mic On/Off While Recording: When you hit the Audio option from the overlay, you will see the window that details which devices, including your microphone and playback device (usually your speakers or a headset), are being used when recording. You can adjust the audio mix at this time. To quickly disable or enable audio recording, you can use the keyboard shortcut: Windows key + Alt + M.

There are a couple of shortcomings of this application, though, namely that it cannot record File Explorer, and it cannot record more than one application at a time.

Some Practical Uses for This Feature

Now that we’ve put the idea in your brain, let’s go ahead and outline how this feature might be used. Here are some common ways that you might use the Xbox Game Bar:

  • Recording a video tutorial
  • Writing up documentation for a task
  • Identifying a problem to be addressed later on

All of that said, if you want a solution that is meant for more than gaming, we recommend reaching out to AE Technology Group for help. We can equip your business with enterprise-grade tools that might be a better fit for getting your work done. To learn more, reach out to us at (516) 536-5006.

6 Cyber Security Tips for Remote Workers

cyber security tips

As we transition into the #WorkFromHome life, staying safe remains our top priority. Don’t forget to consider data security and cyber threats while working remote. Viruses of a different kind can throw a wrench in productivity and compromise core systems and information. Stay safe at home with these 6 Cyber Security Tips for Remote Workers.

Best Practices for The Best Remote Office Experience

Transitions are the perfect opportunity to review best practices and ensure your company is operating at maximum efficiency. Preventing cyber attacks begins with a thorough review of your organization’s security and compliance. 

Review employee password requirements and ensure your company is following the recommended security protocol to keep your sensitive information from slipping into the wrong hands. Protect your clients and your team by requiring two-factor authentication and passwords that consistent of a phrase or sentence with capitals, numbers, and special characters.

Ensure employees have logged out of all devices aside from their designated work computer. Be clear with your team that personal devices should not be used for work purposes. These devices are unsecured and may compromise integral security. This includes transferring files with confidential information between work and personal devices.

Support your crew with sufficient resources such as tablets, work phones, and laptops for on-the-go business instead. For easy data transfer, opt for convenient and secured Cloud storage solutions.

Secure Wi-Fi Networks

Portals, email, and CRM’s aren’t the only platforms that require strong security. Remote work should always be conducted via a secured Wi-Fi network. This ensures that sensitive information is not transmitted through compromised channels. For staff that are currently working from home, offer a DIY IT workshop to get them started. 

Change the router password to meet best practice standards and consider installing firmware updates and cracking down on encryption levels. 

Protect Privacy

Cyberspace is a dangerous realm. You never know who may be viewing your information and tracking your supposedly private IP address. From advertisers to phishing scams, accessing sensitive information and demographics is surprisingly easy.

Get your team outfitted with the protection of a virtual private network or VPN. A company wide VPN supports secured browsing by masking the IP address (or digital footprint) of each user. These helpful tools encrypt internet traffic, keeping company data protected and private information secured.

Check for Updates

Good anti-virus software is only as good as its last update. Think twice before hitting the “later” button on daily or weekly updates. Although keeping software and applications in top shape can seem like an extra annoyance in your busy day, these updates contain essential information and patches for vulnerabilities.

Firewalls, anti-malware, and anti-virus software are the most critical components to prioritize. These programs are constantly adapting to capture and quarantine new, evolving threats. Ensure an automatic update schedule has been enabled. Taking a few minutes to streamline applications will save you a lot of grief in the event of a cyber attack.

Don’t Be a Victim of Cyber Crooks

There’s no better time for a company refresher on the importance of cyber safety. Phishing scams are on the rise since the increase in remote workers. These devious cyber crooks typically operate by sending scam emails, calls, or texts in order to gain personal and financial information on their target. Make your team aware of recent scams and threats while keeping each member up to speed on what they can do to prevent a data breach.

A few SOP’s for remote work might include a cheatsheet of information you should never give out via phone, text, or email, as well as helpful tips on how to spot a phishing scheme.

Be Prepared

One positive element to the ongoing COVID-19 crisis is that the current situation underscores the value of preparedness. Data loss can happen to anyone, whether by human error or cyber breach. Be sure your company is prepared with a backup plan in case the unexpected happens.

Investing in a robust Cloud storage system provides a sufficient backup in case of disaster. This simple solution is typically the most convenient and cost effective for small to mid-sized businesses. If all else fails, AETechnology Group has your back(up) with disaster recovery options for our Long Island and New York business clients.

Contact our experts today for all your remote work needs as we continue to empower businesses to prioritize safety alongside productivity.

Computer Tip of the Day: Internet Speed And Your Business

computer tip of the day internet speed and your business

If a positive internet “surfing” experience is desired, whether at home or at the place of employment, the following points should be considered:

  • Bandwidth
  • Latency
  • Computer health
  • Internet Browser Extensions

Bandwidth is the allowance of data that may be downloaded per given unit of time. For example, if a typical DSL plan of 1-20 Megabits/sec is purchased, that means the ISP (internet service provider) will allow downloading approximately 1-20 megabits of data per second. To put that into better perspective, contrast it with the speed of a dial-up Internet connection plan of approximately 20-30 kilobits per second, which is only a very small fraction of 1 megabit. Therefore, if high-speed internet is desired, it’s probably better to not choose a dial-up internet connection plan.

However, don’t be fooled by only looking at the data allowance per second when choosing a plan. There’s a variable one must consider called network latency, and can usually only be determined by reading the reviews of a given ISP. Latency refers to the delay that data must endure after given the command to transfer, and many different factors can contribute to latency. For example, if one is considering purchasing a satellite internet plan, keep in mind that although the data allowance per second might look good, it just so happens that the latency of a satellite network could be such that it will not feel like you are using a high-speed internet connection; the internet connection will feel very slow.

After the above is considered and the internet plan is purchased, it’s pretty much up to the computer user to make sure the device being used to access the internet is in good health. Even with the fastest internet plan available, a computer in poor health will diminish the speed of the internet service being used such that all that glorious speed will not be noticeable. This means making an effort to become familiar with computer maintenance. An internet service provider might offer computer maintenance as part of a purchased plan, but it would save a lot of money to do a little research and become familiar with maintenance.

Using the internet typically happens via an internet browser. With the explosion of internet usage in the last decade, internet browsers such as Internet Explorer, Firefox, and Chrome have made available extensions or add-ons which can enhance the internet experience. Adding these to your browser, each with a specific purpose, can come with a negative side. Sometimes these extensions can cause a browser to become slow or to crash, therefore, using too many of these simultaneously can greatly diminish the speed of the internet. It would be in a computer user’s best interest to learn how to turn extensions and add-ons off.

Please contact us for a consultation.