Article

ThinkPoint, Another Fake AV threat hits thousands of innocent web users

Do not be fooled by the seemingly legitimate looking ThinkPoint scam. This rogue antispyware application will not benefit your PC at all, but instead work against you to trick you out of your money. ThinkPoint comes bundled with the well known and much hated Microsoft Security Essentials Alert scam. Once the ThinkPoint infection takes root […]

ThinkPoint, Another Fake AV threat hits thousands of innocent web users Read More »

Outlook Social Connector: Allows Your MS Outlook Account to Integrate With Social Networking Websites

MS Outlook introduces new application: the Outlook Social Connector. With the Outlook Social Connector, you can now connect your social networking accounts with your MS Outlook account. Outlook has long been the staple in many business communications – it is truly one of Microsoft’s feats of genius given how prevalent it is in professional correspondence between businesses and organizations today. In order for the platform to conform and adjust to current norms, the people behind MS Outlook have now integrated social networking into the entire system through what they call the Outlook Social Connector (OSC). What the Outlook Social Connector basically does is enable the user to connect his or her email account with his or her LinkedIn, Facebook, MySpace, and Windows Live accounts. You’ll be able to receive updates from these social networking websites through MS Outlook. Outlook Social Connector is compatible with versions of MS Outlook beginning with 2003 and up, and boasts features such as adding friends into social networking websites through the new Outlook People Pane, as well as receiving updates from friends and contacts whose email address is also listed in their social network account. Also, like a social network, the OSC allows you to set privacy settings and select the kind of information you want made public.

Outlook Social Connector: Allows Your MS Outlook Account to Integrate With Social Networking Websites Read More »

Rogue “Antiviruses” Annoy You into Getting Scammed

Scammers and hackers like to trick people into their scams by launching annoying popup attacks that force users to download malware disguised as an antivirus. However, there are simple ways to protect yourself. The modus operandi is this: say you’re browsing a random website, and a message suddenly pops up warning that your computer is infected with a deadly virus and you need to go to their website and download the proper antivirus software. If you close the window, another appears, saying the same message, and this happens over and over again until you visit their site. Naturally, the antivirus they want you to download is fake. The file is usually some sort of malware that doesn’t solve your problem, but compounds it. The key is to address this without having to download anything or visit any suspicious sites. When the popup problem, well . . . pops up, simply press ALT+F4 on your keyboard to force your browser to close, or go to the Task Manager (CTRL+ALT+DEL) and close your browser there. That usually does the trick. Of course, you will need to start a new browser session or else risk going back to the same site the popup attack came from in the first place Another technique scammers use to deceive users into going to their websites is to use a hot news item or trending topic as a lure to get you there. To avoid this, just notice what website you’re going to before you click a link, and only go to websites and news websites that you trust. It’s admittedly a bit of effort on your part to avoid getting scammed or hacked, but it’s a lot more inconvenient if your system becomes majorly messed up by malware. If you want to know more about staying safe from rogue antiviruses and other forms of malware, give us a call and we’ll be happy to discuss genuine antivirus protection with you.

Rogue “Antiviruses” Annoy You into Getting Scammed Read More »

Remanufacturing Toners: Good or Bad?

Many are touting the supposed benefits of using services such as ink refilling, re-manufactured toners, but over time, you may find that it’s much more trouble and expense than what it’s worth. Throughout recent months, we’ve seen more and more outfits offering services such as ink refilling, re-manufactured toners, and the like. The main selling point of such services is the significantly reduced price compared to buying new ink cartridges, and naturally, many businesses are attracted to these services in order to save on operating costs. However, when you look on a deeper level, using refilled ink cartridges, re-manufactured toners, generic printer cartridges, and other similar products actually costs more in the long run. Here’s why: Generic and refilled cartridges produce lower quality prints, and in many businesses mediocre output is unacceptable. Many times you’ll have to reprint pages, wasting both ink and paper (not to mention time). Generic and refilled cartridges frequently cause alignment problems with your printer, and some may even leak. This type of damage to your printer can result in unexpected repair costs or even the need to completely replace the printer. Studies show that 40% of refilled/generic cartridges or toners result in some sort of problem with the printer. Some say that using refilled/generic cartridges is safer for the environment. This is NOT the case. Reprinting costs you wasted energy, productivity, and materials such as paper. On top of that, many brand-name manufacturers have a recycling program, as opposed to generic cartridges which end up in landfills. On the surface, going for these “cheaper” alternatives might seem to be a great idea to cut costs, but over time it’s much more trouble and expense than what it’s worth. So it’s best to stick with using genuine ink cartridges and toners – you’ll enjoy better quality prints and less trouble in the long run.

Remanufacturing Toners: Good or Bad? Read More »

GPS: A Guide for Small Businesses

GPS is everywhere – and thanks to technology you can use GPS to work for your business GPS has lately become a near ubiquitous feature in many mobile devices such as car accessories and smart phones. GPS, which stands for Global Positioning Systems, is primarily a navigation system enabled by satellites in orbit around Earth that transmit positional information to devices with a GPS receiver. The system was originally set up by the US government for military or government purposes, but now has been opened up for private use as well. Because GPS is so pervasive and inexpensive to use, there have been a host of applications providing innovative ways to use the system. Today, GPS is instrumental in activities such as navigation, tracking, mapping, surveying, communications, and recreation – as well as many other activities for business and commerce. For many businesses, including small establishments, GPS can be used to boost the bottom line in a number of ways. Here are some of them: Track key assets in the field. Businesses can use GPS to track the location of people and items in the field such as delivery trucks, important packages, field stations, personnel, and more. This allows businesses to more easily monitor movement – and to better control cost and security (such as routes taken and stops along the way) as well as provide key information in real time that may be of value to partners and customers (such as the location of their shipment). Improve speed. By knowing where your people and assets are at any time, you can potentially improve the speed of decision making and response time – especially in areas such as product delivery or resource redeployment. Increase efficiency and optimize resources. Businesses in industries such as logistics and distribution can use GPS to make sure that trucks and personnel are following the proper and best possible routes – optimizing fuel expenses, minimizing maintenance and repair costs, and eliminating idle time. Businesses can also use GPS to eliminate costs associated with maintaining paper logs and the back-and-forth communication expenses associated with them. GPS has the potential to increase the productivity of your business in a big way by providing real-time, dynamic updates on the location and status of your key investments at any time. Contact us for ideas and help in implementing GPS in your operations today.

GPS: A Guide for Small Businesses Read More »

JavaScript from Unfamiliar Sites Can Be A Bridge for Malware

The popularity of JavaScript, a dynamic programming language in widespread use, makes it a tool that hackers and other unscrupulous programmers can use to hack into a system. JavaScript makes the web experience very dynamic, enhancing the interactivity of many websites – you’ll see it everywhere, from Facebook to the most obscure sites on the web. Another reason it’s popular is that it’s compatible with all browsers, from Internet Explorer to Mozilla and even Mac’s Safari. Unfortunately, this popularity and wide range of use also makes JavaScript a tool that hackers and other unscrupulous programmers can use to infiltrate and hack into a system. The attacks can be simple or complicated, ranging from simple spam to more elaborate scams. The degree simply depends on the purpose of the script’s designer. What’s more, a quick visit to an infected website can trigger an attack, if your browser is enabled to allow JavaScript to execute from that site. The good news is that you can protect yourself from these kinds of attacks. Simply block JavaScript from executing from sites you aren’t familiar with – better safe than sorry. For Internet Explorer , go to Tools > Internet Options > Security, and set your bar to High. You can also input a list of trusted sites. For Firefox users, a free application called NoScript gives you control over which websites can execute JavaScript on your browser. Google Chrome users can select a universal disabling of JavaScript from all sites, and then add a list of sites exempted from the ban. Other browsers also have options to either disable JavaScript execution or prompt you for permission before the script is run from any website. You should also be particularly wary of JavaScript attacks originating from malicious PDF files. Antivirus and security firm Symantec reports that almost half of all web-based attacks come from infected PDF files. You can disable JavaScript in Adobe Acrobat Reader by selecting Edit > Preferences > JavaScript, and then removing the check on “Enable Acrobat JavaScript”. It might seem inconvenient to guard yourself from these sorts of attacks, but in the long run it pays to keep your system secure. If you want to know more about keeping your system clean and safe from attacks, give us a call and we’ll be happy to help you develop a customized plan that meets your particular needs.

JavaScript from Unfamiliar Sites Can Be A Bridge for Malware Read More »

National Cyber Security Awareness Campaign Challenge a Huge Success

The United States Homeland Security Department’s National Cyber Security Awareness Campaign Challenge was a huge success, with more than 80 security proposals submitted with the goal of increasing awareness regarding threats to cyber security. Out of the over 80 submitted entries, seven were chosen to receive awards at a ceremony at the White House recently. One noteworthy proposal was a 5k run dubbed “Trot Against Bots”, which aims to intentionally cause traffic jams to demonstrate the effect of security problems causing disruptions in internet traffic, bagging the Best Creative Approach award. Cisco Systems, Inc., also got a nod for their “Cybersecurity is Everyone’s Responsibility” Publicity and Marketing plan, which highlights the importance of using cyberspace responsibly as an individual compared to the shared effort of making the internet a safe place for all. Another notable proposal was the “Think Before You Click” campaign from Deloitte & Touche, LLP, which won the Best Iconic and Overall Structure. As the name suggests, the campaign aims to curb the pervasive habit of clicking links before analyzing the possible content of the website to be accessed or the file to be downloaded. Other winners include: Best Local/Community Plan – Securing Our eCity San Diego and MyMaine Privacy; Best Individual Plan – “Cybersecurity Starts Here: Home, School and Main Street” by Melissa Short; and Best Educational Plan – Pennsylvania State University’s “CyberLink Games”. Homeland Security plans to utilize the winning concepts and integrate them into their National Cybersecurity Awareness Campaign. Source: https://www.dhs.gov/files/cyber-awareness-campaign.shtm

National Cyber Security Awareness Campaign Challenge a Huge Success Read More »

New Trend: CRM Services + Social Networking

With the growing popularity of social networking, CRM services are picking up on the trend and tapping into social networking platforms and principles to strengthen client relationships. With the popularity of social networking mechanisms and websites continuing to grow, more and more businesses are adapting their service offerings to include features that are linked into common social networking websites / platforms such as LinkedIn, Facebook, Twitter, MySpace, and the like. Some are even developing their own features that mimic social networking functions applied specifically for their own customer base – and many are doing both. CRM, or customer relationship management, services especially are seeing the vast potential of tapping into the social networking phenomenon. With the goal of CRMs being to establish and nurture a company’s relationship with both existing and potential clients, it is only logical for such service providers to use a platform that boasts billions of interactions daily. Microsoft CRM, for example, has integrated third-party applications such as social media accelerators, social network developers, and the like that enable businesses to develop and use social media platforms, both internal and external, for their own purposes and strategies. Using social networking – both through developing their own apps and / or integrating with existing ones – CRMs are able to get a better and bigger sense of current and possible client bases. Interaction goes much faster, is much more real-time and genuine, and feedback is easier to gather. Small and medium-sized businesses are especially benefitting from these developments, since their client bases are much smaller and thus much easier to manage and keep track of through the social networking medium.

New Trend: CRM Services + Social Networking Read More »

Backup, Disaster Recovery, and Business Continuity: 3 Steps to Seamless, Fool-Proof Operations

When disasters occur, unprepared companies suffer consequences ranging from prolonged system downtime to considerable revenue loss – and even going out of business. On the other hand, those who are disaster-ready can easily handle any type of crisis and survive, without much loss of productivity. Small to medium-sized businesses usually think that disaster plans are only important for large enterprises. However, these days even small businesses can’t afford to operate without a disaster plan. Plus, recent technology innovations make disaster planning reasonably priced for virtually every business, regardless of size. For any business owner, three objectives exist for disaster planning:  1) the assurance of never losing critical information, 2) reducing downtime when emergencies happen, and 3) quick recovery after a loss of data. These three objectives translate into three IT services: Backups The process of protecting your data by copying it to a secure device so that it can be easily and and quickly recovered in case of loss. Disaster recovery The process of reinstating crucial business data and procedures after a disaster happens. Business Continuity A carefully constructed plan that specifies exactly how your company will recover and re-establish disrupted functions after disaster strikes. Of these three tasks, Business Continuity is the most comprehensive since it entails much more than a simple discussion of IT matters—it’s a thorough, systematic action plan. And though you definitely need to consider protecting your IT infrastructure and data, you must also consider what you and your staff should do if a disaster occurs. Is there a meeting place where your staff could gather in the event of a building evacuation? Do you have a plan to get in touch with all your staff and their emergency contacts to relay important information? Is there a way for you to communicate with customers to advise when you’ll resume operations? What will you do if one of your main dealers experiences a disaster? The significance of these three services should never be taken lightly, but unfortunately many small and medium-sized businesses ignore them.  Why? Simply because when people think about disaster, the first things that pop in their minds are earthquakes, floods, and fires, and they figure there’s a low chance of those happening. But remember that there are also human-induced disasters such as hackers, unhappy employees who sabotage, and employees who thoughtlessly erase important data. Any of these could easily happen to you. You may already have a backup system in place, and perhaps, you have all three—backup, disaster recovery, and a business continuity plan. However, since business goals and technical environments constantly change, your plan requires regular assessment to ensure it’s still accomplishing all your needs. We can assist you in evaluating your existing disaster preparedness or suggest options if you don’t have plans yet. Contact us now for more details on how we can help you.

Backup, Disaster Recovery, and Business Continuity: 3 Steps to Seamless, Fool-Proof Operations Read More »

Scroll to Top