ITSolution | IT solution Srl https://itsolutionsrl.it/?lang=en Assistenza tecnica hardware, software, reti a Rovigo Mon, 29 Nov 2021 13:57:58 +0000 en-US hourly 1 https://wordpress.org/?v=6.7.1 https://itsolutionsrl.it/wp-content/uploads/2022/08/cropped-favicon-mamagari-3-32x32.png ITSolution | IT solution Srl https://itsolutionsrl.it/?lang=en 32 32 158874615 Deactivation of CSP subscription for spam or other https://itsolutionsrl.it/2021/11/deactivation-of-csp-subscription-for-spam-or-other/?lang=en Mon, 29 Nov 2021 13:57:58 +0000 https://itsolutionsrl.it/2021/11/deactivation-of-csp-subscription-for-spam-or-other/ Microsofttakes security very seriously. The Microsoft Azureplatform allows subscribers to use their own cloud applications and services by leveraging a wide range of security-focused tools and features. Subscription to the platform takes place through a cloud service provider (CSP), which provides cloud-based storage, application, infrastructure or platform services. Among the tasks of a provider is…

The post Deactivation of CSP subscription for spam or other first appeared on IT solution Srl.]]>
Microsofttakes security very seriously.
The Microsoft Azureplatform allows subscribers to use their own cloud applications and services by leveraging a wide range of security-focused tools and features.

Subscription to the platform takes place through a cloud service provider (CSP), which provides cloud-based storage, application, infrastructure or platform services.
Among the tasks of a provider is the management of security procedures, which consists of protecting data, managing the identities that access it, protecting equipment from malfunctions and much more.

With regard to this aspect, Microsoft has noticed a suspicious increase in spamming, in the last period, among customers subscribing to the Azureplatform.
Spamming is the indiscriminate sending, without the recipient’s consent, of e-mail messages: it is therefore an activity that risks damaging the functioning of the service and that violates the conditions for the use of Microsoft Azureservices.

 

Behaviors deemed harmful

Spamming isn’t the only violation of Microsoft’s acceptable use policy, it’s also considered malicious behavior:

  • Piracy and resale of pirated subscriptions.
  • Distributed Denial of Service (DDoS) attacks, the sending of large amounts of data from different sources to a target to prevent access.
  • Mining of cryptocurrencies.
  • Distribution of malware, malicious software used to damage networks and devices.

In cases where the algorithms detect these activities, Microsoft can deactivate customer subscriptions without any kind of notice!

Cloud Service Providers can also detect anomalous behavior among their customers and can intervene both in person, informing the customer that he is violating the established conditions and that his subscription will be deactivated by Microsoft, or by informing Microsoft that it will do so later.

In the event that Microsoft directly deactivates the customer’s subscription, its Cloud Service Provider will have to take care of repeating the message to the person concerned.

Very often it happens that, when opening an account, the Terms and Conditions of Useare not read thoroughly, but their acceptance and compliance is essential for use.
Customers who see their subscription canceled will no longer be able to access it as they immediately lose access to Microsoft resources, but will be able to fill out the unlock request form.

 

The post Deactivation of CSP subscription for spam or other first appeared on IT solution Srl.]]>
8763
SIAE under attack: 60 GB of data were stolen https://itsolutionsrl.it/2021/10/siae-under-attack-60-gb-of-data-were-stolen/?lang=en Fri, 22 Oct 2021 06:40:09 +0000 https://itsolutionsrl.it/2021/10/siae-under-attack-60-gb-of-data-were-stolen/ Cyber attacks by cybercriminals are the order of the day. Pandemic and the every-growing symbiosi between man and technology will be accomplices, but the activy of these cybercriminals towards our compter system is increasingly frequent.   The attack to SIAE The last important hacker attack inItaly was recorded on 18 October 2021 and targeted SIAE…

The post SIAE under attack: 60 GB of data were stolen first appeared on IT solution Srl.]]>
Cyber attacks by cybercriminals are the order of the day.
Pandemic and the every-growing symbiosi between man and technology will be accomplices, but the activy of these cybercriminals towards our compter system is increasingly frequent.

 

The attack to SIAE

The last important hacker attack inItaly was recorded on 18 October 2021 and targeted SIAE (Italian Society of Authors and Publishers), the company that manages the rights of artists from the world of entertainment and culture, from the recording to the television and publishing.
The criminals’ loot is composed of about60 gigabytes of sensitive data.

From the first evaluations it seems to be a ransomware by Everest Team, a type of malware that limits the access to the device or that codes user’s data that infects Requires a ransom to be paid to remove the restriction or to prevent the publication of decrypted data.

The hacker of the case in question have already published on the Dark Web a small part of the stolen data to prove the authenticity of the hack and they have requested a ransom of 3 million euros in Bitcoin to prevent the publication of the remaining data

The SIAE seems to be not willing to pay the ransom, “We can’t give in to blackmail of criminal persons, we have already made the complaint to the postal police ant to the guarantor of privacy as usual, we will constantly monitor the situation” announces Gaetano Blandini, the general manager of the company.

Among the stolen and published data there are: identity documents, contracts between artists and companies, recognition of works, IBAN:a real tragedy for the victims of this story.

But this, as anticipated, is only the latest in a long series. On August 19, it was the Regional Health Agency of Tuscany to be under attack, on July 31 the information system of the Lazio region, on October 6 the Twich platform and many others…

The only solution to these phenomena is to take strong precautionary measures, because cybercriminals will not end up here.

Don’t wait for a hacker to “knock on your door”… it could be the beginning of the end for your company. Take cover with our security solutions.

 

DISCOVER OUR SOLUTIONS

 

The post SIAE under attack: 60 GB of data were stolen first appeared on IT solution Srl.]]>
8657
Mandatory Green Pass from 15 October: what you need to know https://itsolutionsrl.it/2021/10/mandatory-green-pass-from-15-october-what-you-need-to-know/?lang=en Thu, 21 Oct 2021 09:40:46 +0000 https://itsolutionsrl.it/2021/10/mandatory-green-pass-from-15-october-what-you-need-to-know/

The Legislative decree of 21.09.2021 establishesthe requirement to verify the Green Pass for access in companies, for customers and employees, from 15 October to 31 December, day in which the emergency state ends.
Currently in Italy, over 3 millions workers are not vaccinated, and this measure has a duel purpose: to safeguard workers and prevent new outbreaks and new closures.

Can not access to the company those without:

  • Green certification “Green Pass”
  • Covid-19 recovery certification in the previous six months
  • Negative result of a swab (rapid antigen performed within the last 48 hours/ molecular test performed within the last 72 hours)

Are exemptfrom the Green Pass requirement in the workplace Those who can show a certificate issued by their doctor or a specific QR code that will be relased soon, wich certify the impossibility of receiving the vaccination for health reasons or because they are still awaiting its release (in the case of last minute vaccination).

 

Privacy treatment

The personal data processed will be: name and surname, date of birth, result of the verification of the Green COVID-19 certificate validity. The provision of data is mandatory for access to the company. The decree expresses the prohibition to memorize and keep such data, much less to transfer them to third parties.

 

Consequences

For the worker: In order to protect the health and safety of workers in the workplaces, if an employee declares to be without the Green Pass, he is considered in unjustified absence and he will lose his salary until he adapts to the new legislation. The employment relationship is suspended, but the employee will not lose the ownership of his position, neither he will receive a disciplinary sanction.

In the situation in which an employee without a Green Pass enters the company ignoring the prohibition, there is an administrative penalty ranging from 600 to 1.500 euros.

For the employer: if the empolyer does not appoint a manager and consequently does not carry out the necessary checks, a penalty ranging from 400 to 1000 euros will be incurred.

 

Verification method

These checks should be carried out at the time of access to the workplace; where not possible, a sample check can take place when the staff is already inside the offices. The Government wanted to leave full organizational autonomy, in order to manage the question according to its own reality.

The employer is required to verify the recpect of the provisions and to identify with a formal deed the persons in charge of ascertaining violations and contesting of any violations

Are you wondering what tools to use for verification?

If there is a person in charge of checking the certification, the App VerificaC19 can be downloaded to his device; instead, if you prefer that resource to cover other tasks, we have the solution that’s right for you: the Green Pass reader for thermal imaging cameras!

It’s an additional device to the Covid-19 thermal imaging camera, which in addition to controlling the body temperature and the presence of the protective mask, allow an accurate and immediate verification of the Green Pass in a few seconds anda automatically.

 

DISCOVER OUR SOLUTIONS
The post Mandatory Green Pass from 15 October: what you need to know first appeared on IT solution Srl.]]>
8637
National Cybersecurity Agency https://itsolutionsrl.it/2021/10/national-cybersecurity-agency/?lang=en Thu, 21 Oct 2021 09:40:45 +0000 https://itsolutionsrl.it/2021/10/national-cybersecurity-agency/ Did you know that in 2020 Italy was the 3° most affected country in the world by malware, the 2° hit by ransomware and ranks 24th among the countries analyzed for vulnerability for cybercrime? Covid-19 has been damaging from the users point of view, who have received numerous attacks, but has increased several initiatives aimed…

The post National Cybersecurity Agency first appeared on IT solution Srl.]]>
Did you know that in 2020 Italy was the 3° most affected country in the world by malware, the 2° hit by ransomware and ranks 24th among the countries analyzed for vulnerability for cybercrime?

Covid-19 has been damaging from the users point of view, who have received numerous attacks, but has increased several initiatives aimed at strenghthening cyber security in our country
To tackle the problem of cyber attack, the Government wanted to establishthe National Cybersecurity Agency (ACN). Legitimized by the legislative decree of 4 August 2021, its purpose is to promote the culture of cyber security, the awareness of the public, private amd civil sectors on cyber risks and threats.

The agency operates under the President of the Council of Ministers and the Delegated Authority for the Security of the Republic responsibility, in close contact with the Information System for the security of the Republic.
Roberto Baldoni is at the leader, after leaving his role of Deputy Director of the Information Security Department (DIS)

 

Agency’s duties

Agency’s duties for national cybersecurity can be summarized as follows:

  • It exercises the functions of National Authority in the cybersecurity sector
  • Dvelop national prevention, monitoring, detection and mitigation capabilities to tackle cyber attacs
  • It contributes to raising the security of the Information and Communication Technology system, of subjects included in the national cyber security perimeter, of public administrations, of essential services operators and digital service providers.
  • It increase the development of idustrial technological and scientific skills through project aimed at stimulating a solid labour power in the change of cybersecurity (with a view to national autonomy in the sector)
  • It assumes the function of a single national interlocutor for public or private entities on the subject.

The Agency has also established the Cybersecurity NucleusPresident of the Council of Ministries for aspects relating to prevention and a preparation for any crisis situations and for the activation of alert procedures.
Finally, the decree consitutes the Inter-ministerial Committee for cybersecurity, with advisory, proposal and supervision functions

Information security is achieved thanks to the National Cybersecurity Strategy, which has the task of identifying the profiles and evolutionary trends of the threats and vulnerabilities of national systems, specifying the tasks of the various public and private subjects, the procedures and tools with which to adapt them.
The path taken by the Government seems to go in the right direction. Strengthening cyber security is a necessity to guarantee the availability, integrity and prrivacy of information and data in the Information System.

The post National Cybersecurity Agency first appeared on IT solution Srl.]]>
8636
The internships continue: let’s get to know Camilla better! https://itsolutionsrl.it/2021/10/the-internships-continue-lets-get-to-know-camilla-better/?lang=en Thu, 21 Oct 2021 09:40:44 +0000 https://itsolutionsrl.it/2021/10/the-internships-continue-lets-get-to-know-camilla-better/ My name is Camilla Barbin and I am attending the third year of the three-year degree course in Communication Sciences and Technologies at the University of Ferrara. Today an interesting and important new experience begins for me, the internship. IT Solution will give me the opportunity to practice the knowledge that I acquired in these…

The post The internships continue: let’s get to know Camilla better! first appeared on IT solution Srl.]]>
My name is Camilla Barbin and I am attending the third year of the three-year degree course in Communication Sciences and Technologies at the University of Ferrara.
Today an interesting and important new experience begins for me, the internship. IT Solution will give me the opportunity to practice the knowledge that I acquired in these three years of study, carrying out 300 hours of field work.

The degree course I am attending aims to train specialist in public and social communication, ready to support companies in everything releated to the communication process. Particular attention is paid to marketing, to advertising and to effective communication techniques to keep in touch the company with its customers and to satisfy their every single necessities.

I will carry out my internship in the Marketing office, where I will have the opportunity to follow Giorgia, my company tutor, and to see how business communication is managed.
I am very excited to be able to understand how the various professional programs work, to create and publish articles for corporate websites and to keep their social networks active.

I can’t wait to start!

The post The internships continue: let’s get to know Camilla better! first appeared on IT solution Srl.]]>
8635
IT solution and Sophos team up to block ransomware and save your data https://itsolutionsrl.it/2021/09/it-solution-and-sophos-team-up-to-block-ransomware-and-save-your-data/?lang=en Tue, 28 Sep 2021 13:30:53 +0000 https://itsolutionsrl.it/2021/09/it-solution-and-sophos-team-up-to-block-ransomware-and-save-your-data/

Ransomware is a problem that continues to plague organizations.
A survey in which several companies in 30 countries participated found that more than a third had experienced a ransomware attack in the past 12 months.
These attacks are characterized by an increasing level of complexity and are carried out by hackers who are more and more able to take advantage of network and system vulnerabilities. The consequencesfor organizations are hefty costs to repair the damage, with a staggering average that amounts to more than double that recorded last year!
Modern firewalls are an effective resource for protecting against these types of attacks.

 

Hackers’ targets

Who are the targets of hackers? The short answer is: everyone. In a recent survey of 5,400 IT managers in mid-sized organizations located in 30 different countries, 37% of respondents revealed that they had been affected by ransomware in the past year.
Searching for the term “ransomware attack” in the news, you’ll find that there are a lot of them occurring every week, most of them successful.
The effects are dismantling: ransom demands, long periods of inactivityand a huge impact on business, in addition to reputational damage, data loss and the auctioning of victims’ sensitive data.

 

How ransomware attacks act to infiltrate the network

Hackers use an extensive variety of different Tactics, Techniques and Procedures (TTPs) to penetrate their victims’ networks. SophosLabsand the Sophos Managed Threat Response team have noticed an increase in the number of attacks in which cybercriminals are working to find a way to penetrate their victim’s network.
As it turns out, the main entry point of ransomware is files downloaded or sentto users as part of a spam or phishing attack.
It is therefore essential not to leave security in the hands of users: to prevent this kind of attack it is advisable to protect your organization with powerful and effective firewall protection systems… and we can help you with that!

 

How a ransomware attack works

How to maintain proper protection against ransomware

To properly protect your organization against ransomware, you need to take three main actions.

  1. Upgrade your IT security system

Firewall and endpoint protection can prevent network intrusionsby blocking the attack during the initial stages, and should an attack somehow make it past this barrier, it prevents it from spreading and infecting other systems. But not all firewall and endpoint protection solutions have this capability, so you need to choose an IT security system that is effective. Make sure you have available:

  • Accessible sandboxing capabilities to analyze the behavior of the file at execution before it reaches the network.
  • The latest machine learning technologies to identify zero-day malware variants in files that cross the firewall barrier
  • IPS in the firewall with real-time signature updates, to block network exploits
  • A simple, free remote access VPN so you can manage your network remotely without compromising on security
  • Endpoint protection with anti-ransomware capabilities

 

  1. Isolate remote access and management

In the context of network protection, every party in contact with the outside world represents a possible vulnerability, just waiting to be exploited by a ransomware attack. Isolatethe company’s accessto the Remote Desktop Protocol, avoid leaving ports open, and limit the use of other management protocols are some of the most effective precautions for protecting systems against targeted attacks.
One of the most common ways to do this is to require the use of a VPN before users can access resources such as RDP, and to make sure that access to the VPN is limited to a list of known IP addresses. You should then also protect and strengthen server security, use complex passwords that should be changed frequently, and implement multi-factor authentication.

 

How to proceed securely

Best practices for firewall and network configuration can be summarized as follows:

  • Be sure to use the best possible protection, which should include a high-performance Next-Gen firewall equipped with IPS, TLS inspection, sandboxing for zero-day threats, and anti-ransomware protection with Machine Learning technologies.
  • Isolate RDP and other services with the firewall. The firewall must be able to restrict access only to users using a VPN and to approved and permitted IP addresses.
  • Limit the size of the attack surface as much as possible by controlling and modifying all port forwarding rules to eliminate any unnecessary open ports. Each open port represents a potential entry point to your network. Whenever possible, instead of port forwarding, use VPN to access internal resources from outside the network.
  • Ensure that all open ports are properly secured by applying the right IPS protection to the rules set for the traffic in question.
  • Enable TLS inspection that supports the latest TLS 1.3 standards for web traffic to prevent threats from infiltrating the network using encrypted traffic streams.
  • Reduce the risk of lateral movement within the network by segmenting LANs into smaller, isolated areas or secure VLANs connected by a firewall. Be sure to apply appropriate IPS policies to the rules you set for traffic passing through these LAN segments to prevent the spread of exploits, worms, and bots between LAN segments.
  • Automatic isolation of infected systems. When an infection strikes, it is important that your IT security solution is able to quickly identify compromised systems and isolate them immediately until they can be disinfected (for example, with Sophos Synchronized Security).
  • Use complex passwords and multi-factor authentication for remote management and file sharing tools, so that these passwords cannot be cracked with brute force hacking tools.

 

IT Solution’s help with Sophos security systems

Sophos offers the ultimate IT security solution to protect your systems against the latest types of ransomware. Sophos not only provides the best possible protection on all levels, but also the benefits of years of integration between firewall and endpoint solutions.
All of this translates into tremendous benefits in terms of visibility into network integrity status and the ability to automatically respond to security incidents.
Sophos Firewall is a solution designed to prevent attackers from infiltrating the network in the first place. If ransomware does reach your network, however, the other side of this dual protection comes into play: Sophos Firewall can automatically nip ransomware attacks in the bud, thanks to integration with Sophos Intercept X, an industry-leading endpoint protection platform. It’s like putting your network protection on autopilot – a big help that multiplies your resources and therefore the effectiveness of your security team.

 

In conclusion

Despite being a perennial cyber threat, ransomware will continue to evolve. While ransomware will likely never be completely eradicated, observing the firewall best practices outlined in this document can ensure your organization is more likely to remain protected against the latest types of ransomware and other threats.

At IT solution, we view data security and service efficiency as a must – cyber threats are an increasing concern for organizations that need their services to be as functional as possible. This is why we offer security solutions capable of intercepting all possible threats that risk jeopardizing not only the functioning of systems, but also and above all the security of company data.

Don’t underestimate the risk of malware! Request a free consultation to evaluate the best protection strategy for your business with our Sophos centralized security solutions, here.

The post IT solution and Sophos team up to block ransomware and save your data first appeared on IT solution Srl.]]>
8473
The importance of backup https://itsolutionsrl.it/2021/09/the-importance-of-backup/?lang=en Mon, 20 Sep 2021 14:01:08 +0000 https://itsolutionsrl.it/2021/09/the-importance-of-backup/

We’ve been nagging our customers about backupfor some time now, a topic that, while sometimes boring, remains at the forefront of our thoughts and should be for all computer system users as well. Emblematic are the data associated with this issue (specifying that backup is a procedure of some relevance to all users of data storage devices, i.e. not only PCs but also tablets and smartphones): on average, 113 cell phones are lost or stolen every minute in the world; 10% of PCs are affected by at least one virus every month, and 29% of data loss problems are the result of serious human errors. The problem in question takes on a very negative tone when you consider that 90% of computer system users don’t know how to manage backup and even 30% of them have never done it.

The evolution of computer devices is helping us: until now, Windows users have always been penalized compared to Mac users because they were forced to use an external ad hoc software to make backups. The advent of Windows10 has eliminated this problem by providing an efficient integrated backup management program (similar to Time Machine, the corresponding program for Apple devices).

Whether or not you have the latest version of Windows or are an Apple user, we recommend reading the following tips.

  • One copy is not enough: Don’t think that having only one copy of your data will be enough to keep you safe. It happens very often that external media get damaged or files get corrupted, making it ineffective if you need to restore them.
  • Always test your backups: are you sure that you can restore your backup if you need to? Remember to test once you have created your file… waiting for an accident to happen is not recommended.
  • Use the right software: don’t go searching on the web for the first free program recommended by softonic, it could turn out to be a hoax and you’ll end up “cuckolded”!
  • The modularity of the backup is important: it often happens that you have to recover a single file and not an entire system, so it is always good to have a way to do it without great loss of time.
  • The importance of the report: it is always good to configure an smtp server in order to receive error and backup notifications.
  • The cloud exists: we all know it by now and we should also know it… why not take advantage of it to have a copy of our files available wherever we are and from any device?
  • Beware of cryptolocker: ransomware also reaches backup devices so it is strongly recommended not to use network paths by mounting them as drives.

Contact us or visit us for more information and to learn more about the Synecareconverged solution (firewall, router and storagein one hardware).

[contact-form-7]
The post The importance of backup first appeared on IT solution Srl.]]>
8417
iPhone 13: everything you need to know https://itsolutionsrl.it/2021/09/iphone-13-everything-you-need-to-know/?lang=en Mon, 20 Sep 2021 09:10:04 +0000 https://itsolutionsrl.it/2021/09/iphone-13-everything-you-need-to-know/ Apple’s new models have begun to pique the interest of all kinds of people, from the fanatic to the curious, from the loyal customer to the new buyer. And here they come! The latest generation of iPhones: iPhone 13, iPhone 13 mini, iPhone 13 Pro and iPhone 13 Pro Max, as scheduled, were unveiled at…

The post iPhone 13: everything you need to know first appeared on IT solution Srl.]]>
Apple’s new models have begun to pique the interest of all kinds of people, from the fanatic to the curious, from the loyal customer to the new buyer.
And here they come! The latest generation of iPhones: iPhone 13, iPhone 13 mini, iPhone 13 Pro and iPhone 13 Pro Max, as scheduled, were unveiled at the California Streaming Event on September 14, 2021.
Apple also revealed that the new iPhone operating system, iOS 15, will be available for download starting September 20.

Pre-orders for all new models in the series are open and from Friday, September 24, the new iPhones will officially be available for purchase. Those who pre-order, however, will receive the new iPhone directly to their doorstep on the day of worldwide release.

 

The main innovations introduced by Apple

Let’s go, therefore, to analyze the innovations introduced by the latest product from Apple:

  • Display and aesthetics:

    iPhone 13 features a flat-edge design and protective Ceramic Shield, with IP68 certification against dust and water infiltration (up to 6 meters deep for up to 30 minutes).There are five new colors for the standard and mini models: Pink, Blue, Midnight, Galaxy and Red.
    The design is very similar to the iPhone 12 series, except for the notch, which Apple tells us is 20% smaller. iPhone 13 and iPhone 13 mini are slightly thicker, with a thickness of 7.65mm higher than the 7.4mm of iPhone 12.
    The Super Retina XDR displaywith OLED technology of iPhone 13 and iPhone 13 mini are 6.1″ and 5.4″ respectively. Display. The refresh rate is 60Hz, so in this respect there is nothing new for the two less expensive models in the series. iPhone 13 Pro and iPhone 13 Pro Max are available in Graphite, Gold, Silver and a new shade of blue called Sierra Blue.
    The Proline features Super Retina XDR display with 1000 nits of maximum outdoor brightness and 120Hz refresh rate. This is the first time we’ve seen a 120Hz screen on an iPhone. This means the user experience will be much smoother.
    Apple’s proprietary technology automatically adjusts the refresh rate based on the content on your iPhone’s display. The technology is very similar to that already seen on iPads and other Android smartphones. Like its predecessors, the iPhone 13 Pro and iPhone 13 Pro Max have a 6.1-inch and 6.7-inch display, respectively, with a resolution of 1170 x 2532 and 1284 x 2778, respectively.

  • Camera:

    The iPhone 13’s rear camera sensors are positioned diagonally. iPhone 13 and iPhone 13 mini have a 12MP f/1.6 main camera and a 12MP f/2.4 wide-angle lens that should provide superior performance compared to iPhone 12.iPhone 13 Pro and iPhone 13 Pro Max feature three12MP cameras. There is a mainsensor with f/1.5 aperture, an ultra-wide-angle sensor with f/1.8 aperture and a telephoto sensor with f/2.8 aperture. The new telephoto lens has a focal length of 77mm and a 3x optical zoom. The total optical zoom extension is 6x.
    According to Apple, the iPhone 13 Pro’s camera can capture up to 2.2 times more light in low-light conditions, while the iPhone 13 Pro Max’s camera delivers up to 1.5 times better performance than its predecessors. Wide-angle cameras deliver up to 92 percent better resultsin low light, and with the new ultra-wide-angle lens, macro photography is coming to iPhone for the first time.
    Perhaps in some time, the ProResfeaturewill arrive for Pro models. The function is used to shoot and edit professional videos in ProRes or Dolby Vision, completing projects directly on the iPhone. The ProRes format records 4K video at 30fps directly with the Camera app on all Pro line models except the 128GB models. In this case, the resolution will be locked at 1080p.
    The new Photo Styles aren’t long in coming either: the Hue and Temperature levels you choose as your favorites are applied to every shot. Unlike the filters, however, they don’t alter natural aspects such as the tone and charge of the sky. We can find, of course, predefined styles created by Apple (including Brilliant, High Contrast, Warm and Cold), and directly others entirely editable at will.
    The new Cinemamodemakes shooting video innovative: it senses when a new subject is about to enter the frame, and focuses on it as soon as it appears. In addition, you can change focus and adjust the bokeh effect on saved video.

  • Specifications and performance:

    The iPhone 13 series features the A15 Bionic chip, which is compatible with 5G. The new SoC includes a CPU and GPU that are up to 50% faster than the competition, and the 16-core Neural Engine is capable of performing 15.8 trillion operations per second.For iPhone 13 and iPhone 13 mini, you can choose from 128GB, 256GB and 512GB of storage. The 64GB option is no longer available. iPhone 13 Pro and iPhone 13 Pro Max are also available in a 1TB version.
    As with iPhone 12, there is no charger included in the box, only the USB-C to Lightning cable. Wireless charging has a 15W speed on all four models.

    When it comes to the battery, Apple claims that the iPhone 13 series models provide superior battery life:

    • iPhone 13 mini achieves 90 minutes longer battery life than iPhone 12 mini.
    • iPhone 13 lasts 2.5 hours longer than iPhone 12
    • iPhone 13 Pro and iPhone 13 Pro gain 2.5 hours of battery life
    • iPhone 13 Pro Max can boast the longest battery life of any iPhone ever created.

    This was made possible thanks to some optimizations to the A15 processor and the new iOS 15 software.

 

The post iPhone 13: everything you need to know first appeared on IT solution Srl.]]>
8365
Windows 11: news and features https://itsolutionsrl.it/2021/09/windows-11-news-and-features/?lang=en Mon, 20 Sep 2021 06:49:46 +0000 https://itsolutionsrl.it/2021/09/windows-11-news-and-features/ We have already talked within our blogabout the release of a revolutionary Windows update: Windows 11. Microsoft says Windows 11 will be released by the holidays later this year, but as early as next week you’ll be able to access various beta builds through the Insider Preview channel. You can join the Insider channel via…

The post Windows 11: news and features first appeared on IT solution Srl.]]>
We have already talked within our blogabout the release of a revolutionary Windows update: Windows 11.

Microsoft says Windows 11 will be released by the holidays later this year, but as early as next week you’ll be able to access various beta builds through the Insider Preview channel.
You can join the Insider channel via your PC settings by going to Updates and Security, > Windows Insider Program.
As for the cost, it has been confirmed that the upgrade to Windows 11 will be free, even for users coming from Windows 7 and Windows 8.1.
The goal that Microsoft has with the release of its new operating system is certainly to unify its platform: to focus, therefore, on a free update for users seems to be the best way!
The only difference from previous updates will be the installation method: Windows 11 in fact won’t be downloadable from Windows Update, but you’ll have to use Media Creation Tool to create an external installation media or run the update directly on your PC.

 

New features

  • Renewed design: one of the main novelties of the new Windows will be the renewal of the design with the new Fluent Design, which will modify graphic interface, icons and animations. In the past months there has been a lot of talk about this aspect and the novelties that we would see in Windows Sun Valley: in addition to a new UI, the new Windows should integrate anew clipboard accessible with the key combination Win + V, which in addition to having a history will also allow the insertion of Emoji and GIF, also will offer the possibility to fix at the top the most used elements and paste text without formatting.
  • Photo App and Clock App: the new ones Photos App seems to have been designed on the same basis as its predecessor while adding refinements and new features: in fact, it seems that the full photo view will give users the ability to view multiple photos at a time, showing a timeline of recent shots at the bottom.
    On the other hand, as far as the Clock app is concerned, Focus Sessions will be available in the new version, perfect for those moments of study or work when maximum concentration and distraction removal is required.
  • New disk management system: the new system will feature a modern interface that will allow you to manage partitions and volumes directly from the Settings screen, an improved system for battery monitoring and new features for the task manager.
    Apart from this, the new Windows will also offer better GPU management: in computers equipped with more than one GPU, Microsoft will let you select which one to use to run the various apps and programs. Users will then be able to decide whether to use the power-saving or the high-performance GPU directly from the Settings app.
  • Microsoft Surface: the “Wake On Touch” feature will be available, allowing devices to exit standby mode by simply touching the display. Probably this feature is still in the testing phase, as in the latest build leaked online it’s not immediately accessible from Settings, but you have to search for it specifically in the Windows search bar.
  • Start Menu and Jump List: these elements will become dynamic, upon specific user customization, and will no longer be anchored to any vertex of the screen. The customizations would also include the possibility of displaying more rounded and bevelled corners, instead of the classic squared corners. The Microsoft Store will be redesigned, through which the company aims to favor developers by increasing the flow of money into their hands.
  • Windows Snap function: one of the most appreciated novelties will most likely be the Windows Snap function, which will make it possible to optimally simplify the organization of the windows open on the screen, allowing the user to choose between four predefined layouts.
    Actually, this feature was already present on Windows 10 as well, but with the new update , the procedure has been simplified even further: to rearrange the active windows, it will be enough to place the cursor on the magnify button of one of the open windows and choose between the four available layout templates.
  • Dark Mode: it will also be possible to set the operating system to “Dark Mode”, which also offers the possibility of having more relaxing system sounds than the “Light” mode (already set by default): Microsoft has confirmed that it has focused on the “make technology relaxing“, modifying the general sound effect of Windows 11 in Dark Mode with a more subdued profile and with sounds characterized by a much rounder wavelength.

 

The removal of Internet Explorer

Users will find themselves saying goodbye to a faithful companion that has always been one of the cornerstones of the Windows operating system: we are talking about Internet Explorer, which has been officially removed by Microsoft to make room for the IE mode within Microsoft Edge.

The post Windows 11: news and features first appeared on IT solution Srl.]]>
8334
New Technical Support Center https://itsolutionsrl.it/2021/09/new-technical-support-center/?lang=en Thu, 16 Sep 2021 13:23:03 +0000 https://itsolutionsrl.it/2021/09/new-technical-support-center/ Our customers are the central driver of our business and satisfyingthem fully is one of the main goalswe try to pursue on a daily basis. Modern consumers are increasingly self-sufficient, and many prefer to find answers on their own instead of calling a support line. IT Solution, always in step with the news and dedicated…

The post New Technical Support Center first appeared on IT solution Srl.]]>
Our customers are the central driver of our business and satisfyingthem fully is one of the main goalswe try to pursue on a daily basis. Modern consumers are increasingly self-sufficient, and many prefer to find answers on their own instead of calling a support line.
IT Solution, always in step with the news and dedicated to improving its lines of communication, has decided to offer its customers an additional tool: the Technical Support Center.

 

The Technical Support Centre

The Technical Support Center is currently online and can be easily located through our website at https://supporto.itsolutionsrl.it/.
The Center is dedicated to receiving requests for assistance and cataloging useful information for our customers.
There are several sections, including a FAQs category, where our customers can easily find a direct and illustrated solution to their problem, even before being followed by one of our technicians.
This section contains the most frequently asked questions, the most common doubts of the community and their answers from customer support.
The Technical Support Center aims to help our customers, through remote support. Our new service is totally and completely free of charge, ready to receive your requests.

 

Benefits

The benefits of this Support Center are many:

  1. When you need our assistance, you don’t have to waste time contacting us by phone or waiting to speak to the first available technician. Just access the site and with a few clicks your request will arrive directly to our technicians.
    Requests for support will therefore arrive quickly and immediately, allowing us to work immediately on the type of assistance required.
  2. As a result, our technicians will also provide an equally quick response, ensuring that your service is satisfactory and fast.
The post New Technical Support Center first appeared on IT solution Srl.]]>
8238