Encryption: A positive tool, in the right hands

Encryption, We hear the term used often. Some associate it with security and protection. Others with breaches and destruction. It is at the heart of many new problems, solutions, and innovations. But what is encryption? And why can it be seen as either a good or bad thing?

Encryption is the process of converting readable data into unreadable data, only to be made readable again if decrypted with the proper decryption key. It was created to secure the transfers of sensitive data, and has its roots dating back to the enigma machines of World War II (pictured in featured image), cracked by the English computer scientist and mathematician Alan Turing. Today encryption is used to protect sensitive data such as banking information, medical records transmissions, and critical business data. But is Encryption a very secure process? And how is it done?

In a nutshell encryption scrambles up data and saves it. The only way the data can be unscrambled is if the user has a decryption key or algorithm to unscramble or decrypt the data. To demonstrate I created a small Python program with a very basic encryption algorithm to demonstrate: click here to learn more.

There are many positive ways encryption can be used. The AES encryption standard is used by the U.S. Government and many business such as Automated Business Solutions MaxxD cloud backup Services. It prevents outsiders from prying in on your personal data. This is especially effective when your data is saved on a space such as the cloud.

But there are some ways encryption can be used negatively. In the case where data is encrypted without access from the proper user such as in ransomware. Ransomware can infiltrate a computer or network through methods such as email phishing, or insecure sites.  Once it infects a system it can encrypt data away from the proper user. By doing this, the virus creator can hold data ransom from a user, withholding the encryption key until a certain amount of money is sent usually via Bitcoin. The best way to secure your network from this type of malicious use of encryption would be through Automated Business Solutions MaxxP protection services, which is powered by Barracuda email filters that prevent phishing scams from ever reaching your network, And MaxxM monitoring services that provide Bitdefender Antivirus and patching services that can provide immunity from a cyber-attack via ransomware.

The last area where we see encryption technology is an area such as Bitcoin, in this area, rather than securing data from other users or accounts, the publicity of the data becomes the security of it. When transactions occur with bitcoin, an encrypted key is assigned to the owner of the coins, only the owner of the coins can decrypt them to their public key to use for transactions.

In conclusion, encryption is a powerful technology. The best way for our networks to survive in an encrypted world is to use the technology effectively.

A Closer Look at Encryption

I created this basic encryption program that converts a line of text into their ordinal numbers (i.e. A=97, space= 32) then runs a mathematical function on the numbers to scramble the data. In this simple example the program adds 2 to each of the ordinal numbers.

Write what you would like to encrypt: a b c d

[‘a’, ‘ ‘, ‘b’, ‘ ‘, ‘c’, ‘ ‘, ‘d’]


This is the unencrypted ordinal numbers

[97, 32, 98, 32, 99, 32, 100]


This is the encrypted ordinal numbers

[99, 34, 100, 34, 101, 34, 102]


This is the encrypted data

[‘c’, ‘”‘, ‘d’, ‘”‘, ‘e’, ‘”‘, ‘f’]


In this case it is very easy to see how the algorithm works, abcd became cdef  and instead of spaces, they were replaced with quotation marks. So this would be an easy encryption algorithm to break. Let’s see how it works with a complete sentence:


Write what you would like to encrypt: The quick brown fox jumps over the lazy dog

[‘T’, ‘h’, ‘e’, ‘ ‘, ‘q’, ‘u’, ‘i’, ‘c’, ‘k’, ‘ ‘, ‘b’, ‘r’, ‘o’, ‘w’, ‘n’, ‘ ‘, ‘f’, ‘o’, ‘x’, ‘ ‘, ‘j’, ‘u’, ‘m’, ‘p’, ‘s’, ‘ ‘, ‘o’, ‘v’, ‘e’, ‘r’, ‘ ‘, ‘t’, ‘h’, ‘e’, ‘ ‘, ‘l’, ‘a’, ‘z’, ‘y’, ‘ ‘, ‘d’, ‘o’, ‘g’]


This is the unencrypted ordinal numbers

[84, 104, 101, 32, 113, 117, 105, 99, 107, 32, 98, 114, 111, 119, 110, 32, 102, 111, 120, 32, 106, 117, 109, 112, 115, 32, 111, 118, 101, 114, 32, 116, 104, 101, 32, 108, 97, 122, 121, 32, 100, 111, 103]


This is the encrypted ordinal numbers

[86, 106, 103, 34, 115, 119, 107, 101, 109, 34, 100, 116, 113, 121, 112, 34, 104, 113, 122, 34, 108, 119, 111, 114, 117, 34, 113, 120, 103, 116, 34, 118, 106, 103, 34, 110, 99, 124, 123, 34, 102, 113, 105]


This is the encrypted data

[‘V’, ‘j’, ‘g’, ‘”‘, ‘s’, ‘w’, ‘k’, ‘e’, ‘m’, ‘”‘, ‘d’, ‘t’, ‘q’, ‘y’, ‘p’, ‘”‘, ‘h’, ‘q’, ‘z’, ‘”‘, ‘l’, ‘w’, ‘o’, ‘r’, ‘u’, ‘”‘, ‘q’, ‘x’, ‘g’, ‘t’, ‘”‘, ‘v’, ‘j’, ‘g’, ‘”‘, ‘n’, ‘c’, ‘|’, ‘{‘, ‘”‘, ‘f’, ‘q’, ‘i’]


As we can see, even an algorithm this simple can make the data unreadable, “The quick brown fox jumps over the lazy dog” became “Vjg”swkem”dtqyp”hqz”lworu”qxgt”vjg”nc|{“fql” . All it takes to decrypt this data would be to run it through a decryption program that subtracts two from each ordinal number and outputs the numbers back to letters.

Encryption becomes more secure as the function that scrambles the data gets more complex. There are standards of encryption which are often defined by a bitrate. The bitrate defines the amount of bits that the decryption key uses. The most common form of encryption is AES, it is trusted as the standard by the U.S. government. It ciphers data at 128-bits, 192-bits, or 256-bits. AES Encryption is used in Automated Business Solutions MaxxD backup Solutions powered by Barracuda.

Black Friday Special Tech Talk: Augmented Reality Shopping

There are always new and exciting ways to use technology. This year has been big for augmented reality,Microsoft announced Mixed Reality headsets and has made available AR hardware from 3rd parties such as Dell, Acer, and Lenovo.

Apple announced ARkit and released iOS 11 with new augmented reality features.

Apple ARKit was announced at Apple WWDC 2017

One of the most immediate uses of Augmented reality is Amazon’s AR view. All you need is iOS 11 and the Amazon app, select the little camera in the upper right hand corner and tap AR view. There are a list of items available on Amazon to be viewed in your own space via Augmented Reality. I tried it out on my iPhone and found it to be fairly robust.

Here are some pictures in the office here at ABS:

What if this were my office chair?
You could call this a real life image of a DOS machine.

This is a fun way to shop and allows you to avoid the the black friday horror stories in style. We wish you all a happy Thanksgiving weekend, happy shopping, and happy holidays from all of us here at ABS!

Smart Things versus Privacy

Since the dawn of Internet of things, the tech giants have brought us a wave of new products that fit every nook of our homelife. Among the most revolutionary are smart speakers. Each device is activated by a wake word (“Alexa”, “Hey Siri”, “Ok Google”, “Hey Cortana”) after which it listens for a command or question: “…what’s the weather like tomorrow?” “Order more paper towels”, ” play classical radio on Apple music” “Turn on the lights” are just a few of the types of commands these virtual assistants will answer to. According to Techcrunch.com on a report by Juniper Research, 55% of U.S. households are expected to have a smart speaker. That is 70 million households with a device with microphones capable of capturing sound across a home!

Amazon brought us the Echo lineup, Google brought us Google Home, and Microsoft and Apple recently stepped into the smart speaker world with the Harmon Kardon Invoke smart speaker powered by Microsoft’s Cortana, and Apple’s recently announced HomePod powered by Apple’s Siri. The products function as speakers that can listen for commands, and execute applications and activate other smart home devices.

Amazon Echo 2 is Amazon’s hardware answer for their virtual assistant Alexa. powered by Amazon cloud services (image from Amazon.com)

With this newfound convenience there are concerns about privacy. Google recently revealed that a flaw in the design of the Google Home mini was causing it to record conversations without activation by the wake word. When privacy flaws emerge it does make the average consumer more hesitant to adopt such a powerful device. After all these are devices that were designed to control the rest of the smart things we install in our homes including smart locks, cloud security cameras, and smart thermostats.

Google Home Mini, powered by Google Assistant (Image from store.Google.com)

The concerns many people face today with smart speakers are similar to the concerns we faced at the dawn of cellular phones and in a new wave with smartphones. Suspicions of government or corporate spying on our day to day lives became a concern for some and subject of debate. Since that time, new protocols have been implemented to assure autonomy in personal phone use. Apple encrypts text message conversations in iMessage, and Snapchat launched encrypted picture communications.


Apple HomePod, powered by Apple’s Siri (image from Apple.com)

Based on this history, we can expect a similar evolution to occur as smart things begin to integrate more and more into our daily lives and privacy becomes a weightier concern. already, strides have been made in the programming of these devices to answer privacy concerns Microsoft’s Cortana saves personal data it collects locally to a computer rather than to the cloud in a place called Cortana’s Notebook. If a user chooses to sync data to the cloud, Microsoft provides a highly secure 2 factor authentication on personal accounts. Users can edit or remove data stored there at any time. Apple programmed Siri to hold the personal data it collects encrypted in iCloud storage, so you control what data Apple retains for use of Siri. Google’s privacy site allows you to delete your search history either by voice assistant or by text from Google’s servers at privacy.google.com, all encrypted and secured by your Google account. Amazon has made it clear they wish to prevent exploitation of their users by banning repugnant ads from the Alexa platform .

Harmon Kardon Invoke powered by Microsoft Cortana, (image from PCMag.com)


Every company producing Smart speakers has a strong privacy policy and each can be found below:
















Voice-enabled smart speakers to reach 55% of U.S. households by 2022, says report


ABS is Going Green

Automated Business Solutions is proud to announce new partnership with Goodwill Industries of Rhode Island! Goodwill Industries of Rhode Island has a proud heritage of helping those with barriers to employment find employment. This is done by providing training, education, and other services in order to enhance a persons capacity for independent living, increased quality of life and work. Donations from individuals, corporations, small businesses, educational institutions, healthcare facilities, and government agencies, help provide Goodwill Industries the revenue to continue to offer educational and training opportunities to the Rhode Island community.

At Automated Business Solutions, we believe engaging in our community is very important. Our new partnership with Goodwill Industries of Rhode Island will not only allow us to help strengthen our community involvement, but also help to protect our environment. Beginning in September, all ABS electronics and toner cartridges will now be recycled through Goodwill Industries Electronic Waste (EWASTE) Recycle Program. Used and end-of-life computers, laptops, monitors, audio and video equipment, printer and toner cartridges, and various other electronics will now be properly recycled in accordance to The Responsible Recycling Practices Standard (R2). The R2 Standard is recognized by the Environmental Protection Agency (EPA) and designed to promote and assess responsible practices for electronics recyclers. By certifying to this Standard, used and end-of-life electronic equipment will be managed in an environmentally responsible manner, and protective of the health and safety of workers and the public. Because of this, Automated Business Solutions can proudly and confidently promote a “greener” community.

Password Security: It’s Time for a Change


Your favorite password probably isn’t safe. As you can see in the cartoon above, we’ve all been using passwords that are hard for us to remember and easy for computers to guess.

It’s never been more important to have strong passwords. As you likely already know, credit reporting agency Equifax has been hacked. If you haven’t already, you should take these steps to protect yourself immediately. That aside, who’s to say someone logging into your bank account with your correct information and password isn’t you? It’s imperative that we all do the best we can to protect ourselves as hacks similar to this one seem to be happening left and right.

Creating strong passwords and remembering them is a pain, but I promise it is less painful than finding out someone has stolen your identity. Just last month, a person in Russia hacked into my eBay account and purchased an iPhone and some clothing. He then tried to get the shipping address changed.

It made no difference to Viktor Petryashin that I hadn’t used my eBay account in years. He cracked my old password from middle school “Awesome7” and went on a shopping spree.

The best way to protect yourself? Use a password manager. You can check out the best here. Most will create complex passwords for you, save them for easy copy/paste and utilize browser extensions to automatically type them in for you. All you need to remember is one strong master password. Then you can let the password manager handle the rest. Once it’s set up, clear the saved passwords from your browser and never save them there again.

Remember, these common password set-ups are NOT okay.

It feels less and less likely that our data is safe online. If these major companies can be hacked, what’s to stop anyone from hacking me? Our last line of defense is a strong password.

You wouldn’t install a home security system and leave the safe wide open. Protect yourself.


Battle of the Browsers

“The only use for Internet Explorer is to download another browser.”
It seems millions of others agree. Google Chrome surpassed Internet Explorer in 2012 and has only increased it’s share of users since then. The popular browser continues to grow as web developers optimize their websites for the browser most people are viewing their site with. The chart below shows an estimated browser market share.
It’s important to keep in mind that more people are browsing from their mobile devices than ever before. Android (developed by Google) is the most popular mobile OS worldwide. The default browser installed on Android devices is Chrome, further padding their lead ahead of Apple’s Safari.
But not everyone is happy with Chrome’s massive presence. Mozilla, the creator of Firefox, deployed a Billboard recently likening Google to Orwell’s Big Brother in 1984.
Shortly after the Billboard went up, Mozilla announced Firefox 57 which promises to be a “night and day” difference to the current Firefox 55. A new design, several significant performance increases, and potentially a new logo add to the hype around the latest release.
Not all browsers are created equal. Some of the underdogs don’t mind. Opera has developed an experimental browser based off of Chrome called Neon. Neon uses your desktop wallpaper as it’s background and displays your most visited pages in bubbles that “float” to the top the more you use them.
Though it may not matter to you which browser you use, it does matter to developers. The good news for us is that more competition in the browser market will continue to produce new features and improve overall experience across platforms.
And hey, if you like Internet Explorer, keep doing your thing.

Ransomware: The Phantom Menace


A disturbing global trend in recent years is the increase in popularity and potency of ransomware viruses. Ransomware is a fairly new type of virus that finds and encrypts your files and won’t decrypt until you pay a ransom to the developer. Most recently the Petya ransomware virus targeted several hospitals and government buildings taking in about $10,000 worth of payments. WannaCry developers took in around $50,000 earlier this Spring, and new copycat variations of each are popping up rapidly.
Though early forms of ransomware have been around since 1989, the first encrypted locker software to hit the web surfaced in 2013. CryptoLocker, and its primary creator are responsible for over 100 million dollars in losses according to the FBI. The Russian hacker responsible is still at large.
We all have an antivirus software installed, so how do these threats keep spreading? McAfee put together a list of the most common ways.
The best way to protect yourself is to remain vigilant when using the internet. Unfortunately, no matter how much you spend on antivirus or how often you update Windows, even the most tech-savvy user is the weakest part of a network. We must all continue to be careful when opening emails and following links, even if they come from coworkers or friends.

Office Equipment Center Joins Automated Business Solutions

Office Equipment Center joins Automated Business Solutions!


Automated Business Solutions is pleased to announce the acquisition of Office Equipment Center.


Warwick, RI (May 23, 2017) – Automated Business Solutions, a leading provider of office productivity solutions, including Office Equipment, IT infrastructure, IT support, and document management solutions, today announced that they have acquired Office Equipment Center, a company with a rich history specializing in business technology solutions.


“We look forward to welcoming all of the current Office Equipment Center employees into our Automated Business Solutions family. Since our corporate cultures and values were consistent, the integration of all employees within both companies has already begun to take place. Our mutual clients will be able to access more comprehensive solutions, delivered by the same familiar people and with the same high quality standards they have come to expect and deserve!” stated Alan Albergaria, President of Automated Business Solutions.


Office Equipment Center (OEC) began servicing Connecticut businesses, municipalities and schools in the early 1970’s. It was purchased by Michael Ardry in 1988 who has grown the business from its roots as a typewriter and calculator company into a leader in the office technology sector. With Michael’s foresight, OEC began its Information Technology division in 2000. David Wilson joined OEC in 2005 to lead the IT division bringing new technologies to their growing customer base.


Michael Ardry, former President of OEC said, “We are extremely excited about joining the Automated Business Solutions (ABS) team. Their additional resources throughout New England will help us to better serve both our printer/copier and IT customers.   In addition, because of ABS’s expanded product offerings, we will be able to provide exciting new technologies, products and services to our current clients.”


Alan went on to say, “The combined expertise of our two technology firms is outstanding. We will now be able to offer our superior line of products and services that fit the needs for companies of any size throughout CT, MA and RI!”


About Automated Business Solutions

Automated Business Solutions was founded in 1992 by Alan Albergaria and Robert Maceroni. Since their inception, the company has grown while maintaining the same personalized service their original customers had come to expect. Today, we have a staff of over 60 employees, which includes 17 professionally trained technicians. Utilizing the skills that these technicians bring, Automated’s client base has grown to over 4,000, covering a wide array of industries and sizes. This client base includes Start-Ups looking for a business partner they can leverage to take them to the next level as well as established industry leaders, some who have as many as 1,000 devices. We offer Document Management & Retention solutions for any sized organization. Our Information Technology Department offers monitoring support on desktops, mobile devices, servers, and networks. This includes sales, preventative maintenance and issue remediation.


For more information please contact:


Alan Albergaria, President & CEO

Automated Business Solutions

415 Kilvert Street

Warwick, RI 02886

Phone: 800-832-2729

Email: alana@ABSNE.com