Article

A Bit of Buzz on the New Windows Phone 7

When it comes to smartphone operating systems, there are many options to choose from, and one very viable and promising platform that’s making waves recently is the new Windows Phone 7 OS. A growing tech trend these days is the steady increase of smartphone use, as more and more people discover the value – both business and personal – of constant connection to the internet and the ability to remain productive even on the go. There are many options to choose from, and one very viable and promising smartphone platform/OS that’s making waves recently is the new Windows Phone 7 OS, released late last year. A successor of sorts to Microsoft’s Windows Mobile, WP7 has been rebuilt from the ground up and is packed with new features designed to make it perform at par (or better in some cases) than the competition. One major improvement in Windows Phone 7 is the new user interface, which is much more fluid and easy to navigate. It also allows for more customization and organization according to user preferences. Another plus for the platform is the generally faster performance, as well as the smooth response of the virtual keyboard. The WP7 OS will also be available in different smartphones, so you need not worry about it being locked to a single device. A downside of Windows Phone 7 is the lack of applications at this time, though this is largely due to the relative newness of the platform. However, reviews of Windows Phone 7 have been largely positive, and more apps are expected to become available as the platform gains steam in the market. So if you are in the market for a new smartphone, in addition to checking out the standard leaders such as iPhone, Blackberry, and the Google Android-based smartphones, you might want to consider giving the Windows Phone 7 a look as well.

A Bit of Buzz on the New Windows Phone 7 Read More »

Dangerous Bug Found in Windows Opens Your PC to Hackers

A new vulnerability in Windows can potentially allow hackers into your PC A new vulnerability found in Microsoft’s Windows operating system can potentially open up your PC to remote attackers. On top of compromising the data within your PC, hackers can also introduce malware into the vulnerable machines to possibly enlist them unwittingly in criminal botnet rings. The newly found bug is particularly dangerous as it can be triggered by just viewing a folder containing a specially crafted image thumbnail, or opening up a malicious graphic file which can be embedded in any Office document. The bug exists in the Windows graphics rendering engine, and although Microsoft has acknowledged the issue, no fix has yet been released. Users of Windows XP, Windows Vista, Windows Server 2003, and Windows Server 2008 are affected by the bug. Windows 7 and Windows Server 2008 R2, the latest versions of Windows for PCs and servers respectively, are not affected. Users are advised to be vigilant in monitoring patches or fixes from Microsoft and make sure to install a fix when one does become available. No time or resources to do so? We offer services that can help automate the process of monitoring, updating, and managing your systems for you. Get in touch with us today.

Dangerous Bug Found in Windows Opens Your PC to Hackers Read More »

Find your Lost Gadget With These Apps

With ongoing improvements in technology, manufacturers of many gadgets have also developed apps that can help locate your lost or stolen gadget. Find out which app is best for you. Technology has become part of mankind’s daily existence. Everywhere you look, somebody is sporting a new gadget or two, and sometimes even more. In fact, many use a cell phone, laptop computer, iPod, and even an iPad as part of their daily routines. With multiple gadgets being used by a single person, one is bound get misplaced occasionally – or worse, stolen. This can be very annoying and even devastating, especially if the gadget contains sensitive information. Fortunately, with ongoing improvements in technology, manufacturers of many gadgets have also developed apps that can help locate a lost or stolen gadget. 1.       Find My iPhone, Find My iPad, and Find My iPod touch These three apps work the same way, featuring MobileMe, and now they’re free on every iPhone 4, iPad, and iPod touch 4 th generation with iOS 4.2. If you misplace your gadget, you just sign in to me.com using any computer web browser (or use the Find My iPhone, iPad or IPod touch app on another device) to display the misplaced gagdet’s approximate location on a map. Another option is to write a message and display it on the screen of your gadget. Your message will appear even if the screen is locked. Also, if your gadget is nearby but you can’t find it because it’s under a pile of papers or your bed, you can tell Find My iPhone to play a sound that will override the gadget’s volume or silent setting. 2.       Lookout The Lookout app supports Android, Blackberry, and Windows Mobile. With this app, you can locate your missing phone on a map from your PC or from another smartphone. If your phone is nearby and you still can’t find it, you can sound an alarm which will play even if your phone is on silent. 3.       BlueRetriever The BlueRetriever app supports Apple (iPhone original, iPhone 3G/3GS, iPhone 4, iPod Touch), Blackberry (Curve, Storm, Bold, Pearl), Palm (Pre), and Google (G1). This app enables you to create a wallpaper for your phone that includes a site URL and ID number on it. When someone finds your phone, they just go to the website and type in the ID number to learn who owns the phone. With this app, you have the option to offer a reward, which you can set up to $100 in gift cards from Amazon, Target, or Starbucks, or you can give donations with Kiva. 4.       iTag The iTag app supports the Android phone. If you misplace your Android, you can view its location using the website, and you can also make it ring even if it is in silent mode or vibrate. So there’s no longer need to need to panic if you lose your cell phone. Just make use of these apps to help secure your phone or other gadget from loss or theft.

Find your Lost Gadget With These Apps Read More »

Clever Scammers Using SEO to Bait More Victims

Legitimate online marketing and SEO are the only ways to make yourself more visible on the web. However, clever scammers will try to fool you into thinking otherwise – by sending you an invoice with a deadline, asking you for a registration fee for better listings on search engine results. As more and more people are becoming increasingly conscious about online scams, it’s expected that scammers and fraudsters need to step up their game and look for better ways to fool people into falling for their swindles. One new tactic these unscrupulous people have employed involves a notice or invoice sent to would-be victims indicating a need to pay a registration fee to be seen on a search engine. The price isn’t very high, less than $100, for a year’s “registration”. The notice claims that without the registration your website will be significantly more difficult to locate through search engines. It also sends you a deadline date indicating that the offer expires soon. The fact is, there is no such thing as an online “registration” for your website to be viewable in search engines. It’s still plain old SEO that gets you listed and seen, and no registration, much less a registration fee, is needed to be included in search engine search results. Cases have been filed against several companies caught sending such invoices. If you want your website to be marketed correctly, it’s best to consult legitimate internet marketing and SEO companies. They’ll give you all the right advice and they’ll have the tools and skills to market your website properly. As for these “offers”, the best thing is to delete them on sight. Don’t click on the links, as these also flag your email as a target for more spam and scams to be sent your way. If you are looking to increase your website’s online visibility, please don’t hesitate to contact us and we’ll be happy to discuss a detailed and customized program SEO program that works for you.

Clever Scammers Using SEO to Bait More Victims Read More »

Are You in Compliance with Identity Theft Regulations?

The federal government’s Red Flag Rule requires all businesses that are potential identity theft targets develop plans to spot red flags and prevent theft. How can you comply? Regulations designed to minimize identity theft went into effect in June of 2010. Are you complying with them? The federal government’s so-called “Red Flag Rule” requires all businesses that are potential identity-theft targets develop plans to spot red flags and prevent theft. Red flags include suspicious photo IDs, unverifiable addresses and Social Security numbers, and questionable account activity, to name just a few. While many companies think the Red Flag Rule only applies to financial institutions, it actually applies to all creditors — with creditors being defined as “businesses or organizations that regularly provide goods and services first and allow customers to pay later,” according to a Frequently Asked Questions guide prepared by the Federal Trade Commission, which will enforce the Red Flag Rule. In other words, if you invoice customers for your goods or services, you’re a creditor — and the Red Flag Rule applies to you. How can you comply?  You’ll need to have a written policy that specifically addresses how you will prevent and handle identity theft. Other recommendations include data encryption, annual updates of your written policy, and staff training. While this may seem onerous, you don’t want to ignore the legislation. Fines are $3,500 per violation — and the threat of a lawsuit from customers whose identity has been stolen. Related articles Do You Comply with the FTC’s Red Flag Fule?

Are You in Compliance with Identity Theft Regulations? Read More »

Red Flags Rules Apply to You—Yes, You

While many companies think the federal Red Flag Rule applies only financial institutions, if you invoice customers for your goods or services, it applies to you, too. Regulations designed to minimize identity theft went into effect in June of 2010. Are you complying with them? The federal government’s so-called “Red Flag Rule” requires all businesses that are potential identity-theft targets develop plans to spot red flags and prevent theft. Red flags include suspicious photo IDs, unverifiable addresses and Social Security numbers, and questionable account activity, to name just a few. While many companies think the Red Flag Rule only applies to financial institutions, it actually applies to all creditors — with creditors being defined as “businesses or organizations that regularly provide goods and services first and allow customers to pay later,” according to a Frequently Asked Questions guide prepared by the Federal Trade Commission, which will enforce the Red Flag Rule. In other words, if you invoice customers for your goods or services, you’re a creditor — and the Red Flag Rule applies to you. How can you comply?  You’ll need to have a written policy that specifically addresses how you will prevent and handle identity theft. Other recommendations include data encryption, annual updates of your written policy, and staff training. While this may seem onerous, you don’t want to ignore the legislation. Fines are $3,500 per violation — and the threat of a lawsuit from customers whose identity has been stolen. Related articles Do You Comply with the FTC’s Red Flag Fule?

Red Flags Rules Apply to You—Yes, You Read More »

How Not to be a Victim of Email Hackers

The internet has made life a lot easier for us in transacting business, researching, and communicating in a matter of minutes. Unfortunately, it has also made it easier for hackers to get into email accounts that contain sensitive information. Email hacking is becoming a common problem of web users. As more people have become dependent on the internet for almost everything they need, a vast amount of sensitive information is now within reach of unscrupulous individuals known as hackers. Cybertopcops.com defines a hacker as “someone who gains unauthorized access to a computer system.” Most hackers just like the thrill of breaking through a computer security system, but there are others who may not be as harmless. Some hack into email accounts and use all the sensitive information that they can access, for own their benefit. How can you tell if your email was hacked? You can’t log into your email account. Your sent folder contains messages that you never sent. Your email contacts inform you that they have been receiving spam messages from your account. What can you do if your email has been hacked? Change your password. If you learn that your email has been hacked, change your password immediately. Choose one that won’t be guessed easily. Check all your other accounts: email, social networks, blogs, etc. Many people use one password for all their accounts because it’s easier to remember. While this may be more convenient, think of the major losses you could suffer if a hacker gets into all your accounts. Delete all accounts that you have not been using for a long time. Hackers love to get into email accounts that you don’t use anymore, since it takes a longer time for you to realize that you’ve been hacked – giving the hacker more time to do damage. Send an apology to all your email contacts. While most internet users are aware that email hackers are the ones sending the spam, some may not understand and may be angry with you. So, it is best to send all your email contacts an explanation and an apology. How can you prevent hackers from getting into your email account? Choose a password that cannot be easily guessed. Many people use easy-to-guess passwords such as their own names with their birthdates at the end, which is very easy for hackers to crack. It’s best to combine upper case and lower case letters along with numbers and symbols such as the ampersand, dollar or percent sign. Change your password at regular intervals. To make it more difficult for email hackers to crack your password, change your password every one to three months. Avoid giving your email address to every website that asks for it. Give your email address only to people and organizations that you trust. Some websites exist only to sending out malware or spyware. Think twice before you provide your email address to websites that you browse. The internet has certainly made life a lot more convenient but unfortunately, it’s also made it easier for hackers so you must be vigilant. Take all necessary precautions so that your email account is always secure.

How Not to be a Victim of Email Hackers Read More »

Need A Break? Tax Law Extends Single-year Equipment Deduction Through 2011

When you acquire equipment for your businesses, you can deduct the entire cost in a single year, thanks to a tax break that’s been extended through the end of 2011. In the past, business equipment such as computers and machinery had to be deducted over a number of years. Then a new tax code provision was enacted to help spur economic growth. That provision, called Section 179, allowed taxpayers to deduct the cost of equipment as an expense rather than requiring the cost of the property to be capitalized and depreciated. In other words, single-year deductions were permitted — much to the benefit of small and medium businesses. The Section 179 deduction started out at $25,000, increased to $125,000 then $250,000, and finally ended up at $500,000. And many assets qualify for the tax break, including computers, software, office machines and furniture, manufacturing equipment, and vehicles that weigh more than 6,000 pounds. How does it work? Lets’ say you have a $600,000 profit and don’t want to pay taxes on that entire amount. At the same time, you need new computer equipment. You can buy that new equipment for $500,000 and only owe taxes on $100,000 of your profits. Section 179 was set to expire at the end of 2010, but it’s now been extended. The Tax Relief Act of 2010, signed on 12/17/10, allows business owners to take Section 179 deductions through the 2011 tax year. That means 2011 is a great year to consider purchasing equipment, because the immediate writeoff helps businesses such as yours keep more cash free for other purposes. “There is a big advantage to having that cash flow right away,” says Abe Schneier, a senior manager at the American Institute of Certified Public Accountants. “Even in the best of times, it is hard for many small businesses to borrow money for any sizeable investment.” Related articles: Equipment eligible for the Section 179 deduction

Need A Break? Tax Law Extends Single-year Equipment Deduction Through 2011 Read More »

Malware-infected websites growing in number

Malicious websites that spread malware are growing in number, according to a new study by security research firm Dasient. Dasient , a company specializing in combating malware on websites, has released a new report claiming that over 1.2 million websites were found to be infected by malware in the third quarter of 2009 , more than double the number during same period last year. These infected websites are especially dangerous since, unlike other forms of malware vectors, they don’t require the user to click on a link or open an attachment. They infect users through “drive-by-downloads” or by just visiting the infected website. Hackers take advantage of the dynamic and interactive features of today’s modern websites and social networking sites to deliver their payload. Other dangerous forms of infected websites are those hosting fake antivirus scams, which fool users into downloading malware posing as legitimate antivirus software, as well as malvertisements, which pose as legitimate advertisements but instead are malware vectors. With the growing threat of malware, how confident are you that your systems are safe? Contact us today and find out how we can help.

Malware-infected websites growing in number Read More »

USB Drives Are at a Major Risk of Malware Threats

Malware attacks on USB devices like memory sticks, including any mass-storage capacity device (digital cameras, mobile phones, MP3 players), are becoming commonplace nowadays. If you’re sure that you’re simply transferring files and not a virus onto your computer, think again. Read on to identify the reasons your business might be at risk of malware attacks caused by infected USB devices. A USB device is indeed a useful, economical way to transfer data. In fact, according to Gartner IT research and advisory company, there were roughly 222 million USB devices shipped in 2009. However, a recent study shows that though USB devices are a convenient means of transferring information, they can also serve as channels to transmit potential threats. In fact, 25% of malware these days is built to spread via USB devices. Most small businesses particularly are utilizing USB drives for the convenience they bring. But as consumers become more technically savvy about malicious attacks via email and other modes, cyber offenders are now shifting to USB devices to spread malware. Moreover, they want an easier and faster way of hacking into secured computers, making malware distribution via USB devices a viable option. Being a small to medium-sized business, your company might also be at risk for the following reasons: Outdated operating systems. Newer versions of operating systems like Windows Vista and Windows 7 definitely provide more security against malware-infected USB devices. If you’re still running on Windows XP, contact us immediately and we will update your operating system to avoid unwillingly sharing your confidential business information to servers across the globe. We will ensure that you have the latest version of Windows, Macintosh, or whatever OS your company uses. Insufficient security knowledge. Not all employees are familiar with malware attacks via USB devices. Some may even plug a misplaced flash drive into their work PC, hoping to find its rightful owner—without knowing that it contains a script that can search sales record and or contact list. As your IT service provider, we will help you implement security guidelines against unsafe USB use to prevent potential malware attacks that can ultimately harm your business operations. No other options to share information. Most small businesses solely rely on USB devices to share data with their employees. While it is convenient, using them on a daily basis can be unreliable and risky. Talk to us about cloud-based solutions and other better and more secure methods to share and store files. We believe that USB-spread malware is even more perilous than email and other means of transmitting malware.  That’s why companies, no matter how big or small, should take this alarming issue seriously. Contact us soon and let us help you protect your business from any would-be malware attacks.

USB Drives Are at a Major Risk of Malware Threats Read More »

Scroll to Top