Reasons for Company Executives to Take Security Training

We read about this all to often - a top executive at small and not so small organizations get scammed or spoofed into providing critical company information or make payments that are not legitimate. Of course we also see other employees getting tricked as well. 

For most companies the individuals at the top actually pose the most risk, due to having the most access to sensitive information and critical systems. They need to be the most aware, but when we and others conduct security awareness training, some executives and organizations leaders are noticably absent!

[More]

Dealing with spam text messages

 We find that spam text messages seem to come in waves. Just when you think that you've got them totally blocked, a new batch shows up. Like spam emails, it's a constant battle to keep these unwanted texts off of your smartphones.

They’re about as welcome as robot calls and junk mail — spam text messages.

They show up as unwanted and unexpected text messages on our phone screens. That’s aggravating enough, but it gets worse. Whoever is sending you a spam text message is usually trying to defraud you.

Most spam text messages aren’t coming from another phone. They’re usually originating from a computer and being delivered to your phone — at no cost to the sender — via an email address or an instant messaging account.

Don’t despair. There are steps you can take to reduce unwanted text messages and help prevent them from showing up on your phone and other mobile devices.

[More]

Is that Website you are on Safe?

 Not all websites are safe. Scamsters will copy popular website home pages to try and trick people into clicking. Some of those clicks are relatively benign; they just take you to a sales site while others are truly malicious and can literally take control of your computer and your systems. Here's a review of good practices to keep that from happening.

Would it surprise you to learn that there are over 4 billion internet users in 2018? With over half of the population around the world now surfing the net, there may be an increased opportunity for malware attacks by those with malicious intent. As internet scams continue to evolve, it’s important to make sure the websites you visit don’t pose a threat.

Arm yourself with knowledge to help you avoid potentially dangerous sites by familiarizing yourself with these three red flags.

1. Odd-looking domain names 

Let’s say you get an email from your bank. At least, it looks just like the emails your bank sends, addressing you by your full name. The email presents an offer you’d like to explore. Naturally, there are a couple of links and a big button making it easy for you to reach the right page in one click.

[More]

Maximizing Your IT Resources with IT Services

Why use The Computing Center or any other IT Services Company when many believe they can do it all themselves? Certainly some can or hire technology people for their staffs.This article discusses what we call a hybrid approach to IT Services - do some of the work internally while having an outsourced technology services company available for certain specialty work. 

Of all the professions in this world, you’d be hard-pressed to find one with a more pervasive DIY spirit than IT. From cobbling together your first network of 300+ machines to tapping into your first private cloud deployment, there’s a unique satisfaction brought about when you build it yourself.

That said, IT outsourcing services shouldn’t be a taboo topic, especially when your IT resources need to be smartly allocated. There are some things you simply won’t be able to tackle effectively and efficiently. Fortunately, others can, which can help you make the most of your resources.

[More]