- Edit PDFs
- Collaborate in Real Time
I was just talking to my wife about how I don't trust privacy of social media sites. Here is a report showing half of Americans are in the same boat. See the report at the link below. If you haven't already, download our checklists to keep you business secure. http://www.newport-solutions.com/computer-security-employee-education/ Many Americans do not trust modern institutions to protect their personal data – even as they frequently neglect cybersecurity best practices in their own personal lives. http://www.pewinternet.org/2017/1/26/americans-and-cybersecurity/
Taking a quick break from software viruses, ransomware, etc. in the middle of flu season for a few quick tips on fighting infection.
- Clean Your Keyboard and Mouse with an Approved Electronics Cleaning Cloth or Solution
- Don't Eat around Your Computer
- Wash Your Hands, Please
- Sneeze Away from Your Computer
Free up your precious space, storage, phone closet or server utility room. If you have old equipment collecting dust and taking up room, contact us to schedule a free e-waste pickup. Example items accepted are computers, laptops, monitors, fax machines, printers, scanners, battery backup, cables, etc. If you need help determining what network equipment is or is not in use, call us. 714-660-1811
Had coffee with a colleague today, had some great conversations about the IT industry and even shared some war stories. Here's an example of how doing something yourself can turn into a major data loss. Even though we think something is simple, you should hire an IT Pro to complete the task. In this painful example the client's server kept powering off. The IT consultant quickly reminded the business owner they really need a battery backup unit for their server. The client took it upon themselves and bought a UPS or better know as Battery Backup. They plugged it in, connected the server and 'thought' they were protected. Fast forward 2 months and the power went out again. The IT pro was called to the scene to find the server off, even though the battery backup was plugged in. He tested the UPS unit, and as soon as it was unplugged it shut off again, no battery backup. Depending on the UPS manufacture the battery is usually installed backwards (disconnected!) for shipping. When they first setup the unit not only did they fail to read the instructions, they also never tested to see if the battery back up worked. Unfortunately this was a hard lesson for this small business, as they were not on any type of managed backup either. The newest working backup was 2 months old, they lost 2 months of company work and files! 2 full months, could you imagine? Can you afford to loose 2 months of data? Please contact your IT provider even if it seems like a simple task. We will even spec out the correct sized backup unit for your equipment.
There are not many ways to break into a bank; however, gaining access to personal bank accounts is becoming a very common way for criminals to get in. One way this is achieved is by clicking on a link within an email. Spam is very cost effective for cyber criminals, as emailing is a near free service to send tens of thousands of messages in very little time. And the fake emails are often disguised to look like a message sent from the bank. Email is an open door into your network; data passes through it every day. If you are like most small businesses, each email address receives a ton of messages. If criminals want to break in, some will be
Considering VoIP? There are many factors.
The two attacks are the largest known security breaches of one company’s computer network.
We recommend changing your passwords, if you are using Yahoo biz mail for your organization please contact our office for a more business centric email service.
The newly disclosed 2013 attack involved sensitive user information, including names, telephone numbers, dates of birth, encrypted passwords and unencrypted security questions that could be used to reset a password. Yahoo said it is forcing all of the affected users to change their passwords and it is invalidating unencrypted security questions — steps that it declined to take in September.further details found here: http://www.nytimes.com/2016/12/14/technology/yahoo-hack.html
Do you reuse passwords? If so, it's just a matter of time before the bad guys break into your network, your laptop, your bank account, and your business. Since computers were invented, we have had to balance use-ability with security. And business owners have always hated passwords. I can't tell you how many times I've been told that I should make a password easy to remember.