Are you prepared for the end of Windows 7?

Windows 7 and Windows Server 2008 are popular and well-loved — and they’re completely unsupported after January 2020. Have you prepared to upgrade yet? When Windows 7 reaches end of life and end of support in 6 months, it will no longer be a secure, compliant operating system. Microsoft will no longer releases updates or security patches. If you continue using it, you will be putting your data at risk. Hackers love to target unsupported applications and take advantage of vulnerabilities in legacy software. You don’t want to be in the cross-hairs. Consider too that other services and manufacturers will…

READ MORE

Multiple Computer Monitors: Advantages and Disadvantages

Multiple Computer Monitors: Advantages and Disadvantages used with permission from SBA.gov by Anita Campbell Are you looking to increase productivity in your small business? Some entrepreneurs and professionals find it helpful to have access to multiple computer monitors. This type of setup can potentially improve collaboration, productivity and even location flexibility. But there are also some potential drawbacks, from money and space constraints to the potential for distractions. If you’re considering investing in dual monitors for your own office, here are some of the pros and cons to consider. Pros of Using Multiple Computer Monitors Easy Switching Between Programs As…

READ MORE

Safeguard your network and customer credentials: Tips from the latest FTC data security case

Safeguard your network and customer credentials: Tips from the latest FTC data security case Suppose a lunch companion says, “I think there’s something wrong with this tuna salad.” To determine if the problem is tuna not to their taste vs. tuna gone bad, would you scarf it down? Probably not. Now remove tuna salad from the example and substitute a web browser extension. (Stay with us here.) Let’s say you’ve been warned that an unknown extension could be used for fraud. Should you download it and let it marinate in your company’s network? The FTC says that’s what the owner of…

READ MORE

Convert your office IT into a mobility force

used with permission from Tektonika (HP) by Karen Gilleland As an office IT decision-maker, you’re concerned with making employees’ lives easier and more productive—that’s why you’re always on the hunt for new tech solutions that add convenience. And in the current environment, office IT convenience means utilizing mobile apps. Mobile apps, which have long been platforms for more trivial matters like gaming, are quickly emerging as the dominant business interface. But while companies are rushing to extend mobility to customer interfaces, executives are slow to grant their own employees mobile access, according to a study by Accenture. Currently, only about 40 percent…

READ MORE

How to Avoid Tax-Related Identity Theft

used with permission from SBA.gov by Barbara Weltman Tax-related identity theft is prominent on the IRS’s 2019 Dirty Dozen list of Tax Scams. Tax-related identity theft is not limited to stealing personal information of individuals. Because of successful efforts to crack down on such identity theft, thieves have shifted their focus to businesses. They create and use, or attempt to use, the identifying information of businesses to obtain tax benefits. For example, as the IRS has noted, cybercriminals that obtain a business’s tax identification number may file a return claiming a tax refund because of a fuel credit or a research credit…

READ MORE

Cybersecurity for small business: Hiring a web host

used with permission from FTC.gov by Andrew Smith, Director, FTC Bureau of Consumer Protection Your website is the online face of your business. Some companies have the in-house capability to manage their web presence. Others hire a web host to handle it for them. When launching a new business or upgrading their site, savvy business owners comparison shop for web hosting services. At the top of your shopping list should be the security features built into what you’re buying. In our meetings with small business owners across the country, you asked for more advice on selecting a security-conscious web host….

READ MORE

Is that website you are on safe?

used with permission from Norton by Symantec Would it surprise you to learn that there are over 4 billion internet users in 2018? With over half of the population around the world now surfing the net, there may be an increased opportunity for malware attacks by those with malicious intent. As internet scams continue to evolve, it’s important to make sure the websites you visit don’t pose a threat. Arm yourself with knowledge to help you avoid potentially dangerous sites by familiarizing yourself with these three red flags. 1. Odd-looking domain names Let’s say you get an email from your bank….

READ MORE

Keep your devices and data safe using these simple security best practices

used with permission from Windows Blog by Steve Clarke Ransomware, botnets and phishing scams were at an all-time high in 2018 and attackers are taking every opportunity to steal data for their own gain. In 2018 alone, Microsoftfound that “More than 75 percent of phishing mails include malicious URLs to phishing sites. Other variations include malicious phishing attachments and links in attachments.” But there’s a lot you can do to protect yourself – including using the tips below and keeping proactive security features, like Windows 10 in S mode, Windows Defender Antivirus protection and auto-updates, turned on. Our customers’ security…

READ MORE

2019 cybersecurity trends

used with permission from HP [email protected] What the experts say Did you know nearly 60 percent of all malware attack victims this past year were small businesses? Many owners of startups and modest-sized companies assume that because they haven’t reached the financial heights of a Starwood/Marriott, Under Armor, Facebook or Panera Bread (all hacked in 2018), that they’re somehow immune. Nothing could be further from the truth. The simple fact is that most hackers prefer going after soft target – online assets that are inadequately protected and less likely to hunt them down with the big budgets of major corporations. Most…

READ MORE

Malware May Be Lurking on Your Smartphone

The Google Play Store is full of great apps to keep you connected and productive—but something dangerous may be hitching a ride when you download a new app. That’s right: developers have figured out a way to sneak malware into the Google Play Store, and ultimately onto your Android phone or tablet. Using a crafty code known as “droppers,” app developers hide malware code deep within apps and proceed to attack Android devices in stages. If your phone or tablet is suddenly slow, riddled with pesky pop-ups, or using too much data, you may be the latest victim. How to…

READ MORE