IT Support

Tips & Tricks for iMIS Database Views

By |2021-08-19T14:40:24-04:00August 19th, 2021|Hosting, iMIS, IT Support, Uncategorized|

In iMIS you are often forced to use direct tables or views in IQAs and Business Objects if you are looking for something. Tables contain the raw information but, sometimes you need information which is stored in multiple tables and do not wish to spend time formatting and pulling in data from different tables; this is where views come in and can be used to speed things along. Here are some views that contain information that will be useful when creating IQAs and business objects.

Views Related to Users

Login – Contains information related to a user’s login information, such as login ID, iMIS ID, username, full name, and company name

Name_All – Contains all the name information about the contacts including their address and company

vBoContact – Contains the contact status code with the name of the contact

vBoIndividual – Similar to the contact view, but contains more information on the institute of the contact

vBoUser – Various views containing user keys, ID, login, emails and more. Look through each view to determine which one is best suited for your needs. vBoUserData is the table that would be most useful for most purposes

Other Useful Views

vBoDocument – This view is related to the documents that have been uploaded to iMIS so you can see the document keys and the name of the document

vBoSystem – These views contain various information related to the iMIS configuration, if you need to find what some setting is in iMIS look through these views to find what you need

For more information on iMIS database views or general information on iMIS, feel free to contact us.

The Basics of iMIS Database Tables – Part 2

By |2021-05-18T10:03:14-04:00May 18th, 2021|Hosting, iMIS, IT Support, Uncategorized|

When looking through your iMIS database you may see a lot of tables and not know what many of them are for. If you need to write custom SQL queries or do troubleshooting with some issues, it is quite useful to know what information is stored where. Here are some more tables to get you started.

Users Tables:
  • ContactMain table contains all the contacts you have inside iMIS.
  • GroupMain table contains all groups and organizations you have inside iMIS.
Website Tables:
  • Content table contains the content used on the iMIS website. You can view when a content page was created, last changed by who, settings of the page and the location.
  • DocumentStorage table contains information related to the documents that have been uploaded to iMIS. Related to the DocumentMain table but might contain more relevant information to you.
Transactions Tables:
  • GatewayTransaction table contains transactions that have gone through the payment gateways.
  • Invoice table contains invoice information.
  • Order table contains orders requested. Includes failed and successful orders.
Misc Table:
  • Error Table contains errors that have occurred and have been recorded to the database. An additional troubleshooting step if you need to check for errors. Usually, this table is empty.

For more information on iMIS database tables or general information on iMIS, feel free to contact us.

Best Password Security Tips – How Hackers Steal Your Passwords

By |2021-03-18T12:35:36-04:00March 18th, 2021|Cyber Security Awareness, Dark Web Monitoring, IT Support, Uncategorized|

Unless you live under a rock, most people have at least one password in use. In reality, it’s more like most people have 20+ different accounts online that require a username and password! But we all know how hard it is to have a different and unique password for all of our accounts, and that’s why most people cheat. In fact, about 80% of people use the same password or a variation for more than one account!

So what? What’s the big deal of using the same password? The real problem is cybercrime. To say it’s a problem is an understatement. Cybercrime is the most lucrative criminal activity in the world, passing illegal drugs in 2014. Hackers want your passwords, if they don’t have them already. Whether they’re stealing your passwords to sell on the dark web, to gain access to your system, or to blackmail you into paying a ransom, it’s a huge opportunity to gain money.

How do hackers steal your passwords?

There are so many ways, and I’ve highlighted a few of the most common ways.

  1. Buying them on the dark web.
    You might have heard of the world’s biggest data breaches, including Facebook, Twitter, Microsoft, Capitol One, and more. Anytime there is a major data breach, the information is bought and sold on dark web marketplaces.
  2. Brute Force Attacks
    These are automated guesses of billions of passwords a minute until the correct one is found.
  3. Key Logging
    A program is downloaded onto your computer where a hacker is watching all your keystrokes as you type them.
  4. Manual Guessing
    Personal information, such as name and date of birth can be used to guess common passwords.
  5. Social Engineering
    Attackers use social engineering techniques to trick people into revealing passwords.
  6. Stealing Passwords
    Insecurely stored passwords can be stolen – this includes handwritten passwords hidden close to the devices.
  7. Shoulder Surfing
    Observing someone typing in their passwords.
  8. Searching
    IT infrastructure can be searched for electronically stored password information.
  9. Interception
    Passwords can be intercepted as they are transmitted over a network
 Given all this information, what are the best password security tips?
  1. Have a different UNIQUE password for every account.
    Minimum 8 characters in length, with a combination of letters, numbers and symbols. Some of the worst passwords we still see today: Password123, letmein, testtest, basketball, qwerty.
  2. Keep passwords tough to guess, where even a family member couldn’t figure it out.
    Do not use something from your everyday life like your family member’s name, a favourite sports team, or your gym you visit. Through social engineering, a hacker knows what you do and where you go on a regular basis, and the first passwords they’ll try will be about those details in your life.
  3. Change your passwords every 3-6 months.
    With all the data breaches that occur everyday to the major companies we trust; your passwords are already out there on the dark web being sold. It’s important to change your passwords every 3-6 months because the old ones the hacker already has are no longer in use.
  4. Use a password manager app to help create and secure passwords (KeePass, LastPass).
    This is a safe way to keep all your passwords in one place and encrypted. Some password managers can even create strong passwords for you and automatically load them for you.
  5. Enable two-factor authentication (2FA) for an additional level of security.
    Wherever you can, enable 2FA so when you’re logging into an account, a code is sent to a separate device that you own. It’s important that the code is sent to a SEPARATE device because a hacker could have access to your device, and a security code to the device they have access to is rendered useless. If you’re logging in on your laptop, have the code sent your phone, for example.

Of course, the most educated internet users know that even having the best password security does not prevent you from cyber attacks. Do you need help with fighting cyber crime? Start with checking out our Ultimate Cyber Security Package and our Remote Worker Cyber Security Package!

The Basics of iMIS Database Tables – Part 1

By |2021-02-08T15:38:14-05:00February 8th, 2021|Hosting, iMIS, IT Support, Uncategorized|

When looking through your iMIS database you may see a lot of tables and not know what many of them are for. If you need to write custom SQL queries or do troubleshooting with some issues, it is quite useful to know what information is stored where. These are some of the basic tables to get you started:

Users Tables:
  • Users table shows you all the staff users that have been created.
  • UsersMain table shows you all the created users.
  • Name table contains the users and contacts and their personal information.
  • Aspnet table contains various system information about user accounts.
Transaction Tables:
  • Trans table holds all the transactions, and you can see the debit, credit description and for who the transaction was completed for.
System Tables:
  • System_Params table holds the parameters for iMIS settings.
  • System_Variable table holds the iMIS variables.
  • SystemConfig table holds the configurations for iMIS.
Other Tables:
  • Cart table holds the current carts of the users. You may sometimes need to delete all the carts to resolve some issues.
  • CommunicationLog table is one of the biggest tables which holds all the email information that have been sent through iMIS.
  • DocumentMain table is usually the biggest table and holds all the documents that have uploaded to iMIS in blobs.

For more information on iMIS database tables or general information on iMIS, feel free to contact us.

End of Life for Microsoft Office 2010 + Office 2013 on 365

By |2020-11-18T14:20:03-05:00November 18th, 2020|IT Support, Office 365 & G Suite, Uncategorized|

If you’re still running your business on Microsoft Office 2010 applications, your luck is starting to run out. According to Microsoft, Office 2010 has stopped receiving support since October 13th, 2020. Microsoft will also no longer support Office 2013 connecting to Office 365. Now is the time to upgrade to latest version of Microsoft Office, 2019.

What does this mean for you?

You can continue to use Office 2010 without any issues, but after October 13th, you will no longer be provided with technical support, bug fixes, or security fixes for Office 2010 vulnerabilities that may be reported or discovered. This includes security updates which can help protect your PC from harmful viruses, spyware, and other malicious software. Any functionality issues with Office 2013 or earlier connecting to Office 365 will be a billable service as it is no longer supported.

Why should I upgrade?

You might ask, are security and feature updates really that important for my business operations. The answer is a resounding yes!

The well-informed might remember the worldwide cyber attack known as “WannaCry” that struck over 200 000 computers in 2017. This form of ransomware encrypted the computer’s files and demanded ransom payments from companies in order to get them back. How could this happen? WannaCry attacked computers who were still running older Windows operating systems and had not yet been upgraded to the most recent security upgrades.

If you get a security breach, the amount of downtime and recovery could be devastating to deal with especially if you’re a small business or non-profit.

How can E-Tech help?

The best practice with all security risks is to act on them as soon as possible. You can be sure that you’re at risk immediately when the support ends. We can initiate your upgrade seamlessly for you, leaving you stress-free. We encourage you to contact us to to get started.

>

Title

Go to Top