Safeguarding Network & Customer Credentials

This sotry is a bit long, kind of dense, but definitely worth the time to read. Years in the making, this FTC case shows how much damage a "bad actor" can cause to public facing networks.

Suppose a lunch companion says, “I think there’s something wrong with this tuna salad.” To determine if the problem is tuna not to their taste vs. tuna gone bad, would you scarf it down? Probably not. Now remove tuna salad from the example and substitute a web browser extension. (Stay with us here.) Let’s say you’ve been warned that an unknown extension could be used for fraud. Should you download it and let it marinate in your company’s network? The FTC says that’s what the owner of ClixSense.com did, and it’s just one example of conduct challenged as deceptive or unfair.

[More]

Tax Related Identity Theft

April 15 has come and gone, but that doesn't mean the scammers have moved on. 

Tax-related identity theft is prominent on the IRS’s 2019 Dirty Dozen list of Tax Scams. Tax-related identity theft is not limited to stealing personal information of individuals. Because of successful efforts to crack down on such identity theft, thieves have shifted their focus to businesses. They create and use, or attempt to use, the identifying information of businesses to obtain tax benefits. For example, as the IRS has noted, cybercriminals that obtain a business’s tax identification number may file a return claiming a tax refund because of a fuel credit or a research credit used as a Social Security tax offset.

[More]

Calendar Tricks that will help Productivity

Nearly all of us are connected to electronic calendars these days. Although this article references Microsoft Outlook, these tricks will work with any electronic calendar and will help make you more productive.

What’s the secret to maximizing productivity and efficiency? There’s no single silver bullet, but one sure-fire way to make gains is with calendar tricks that will keep you organized and focused. From scheduling “no meeting” time blocks to integrating mobile so you never miss a meeting—the art of calendar optimization is crucial.

Here are seven simple calendar tricks you can use to bring your productivity to the next level:

  1. Schedule “no meeting” time blocks—Instead of multitasking, set aside time without interruptions. “When people multitask, often they do multiple things badly,” says David Sanbonmatsu, University of Utah professor of Psychology. “A lot of times, the people who multitask the most are the worst at it…it’s individuals who lack impulse control.” (From Forbes.)

    [More]

5G and Wi-Fi 6 - Evolution & Revolution

One of the few constants in technology is change. Scott Gurvey writing for Cisco provides a detailed, but not overly technical overview about two upcoming changes in the way data is handled wirelessly. When fully developed these technologies will make possible what is not possible today, change the face of mobile technology, and will fully connect the world.

5G and Wi-Fi 6 both promise great increases in the data handling capabilities, enabling a new generation of applications.

As you can tell by all the marketing hype, 5G is upon us. The mobile telephone carriers are touting their plans to roll out 5G, the Fifth Generation of wireless service, although specifics about the timetable, fees and applications are difficult to come by.

Wi-Fi 6 is somewhat more obscure. That’s because the branding has never really caught on with the equipment makers who instead opted to describe their gear with the string of numbers and letters referencing the IEEE standard which defines the technology. Wi-Fi 6 is 802.11ax. And that is a mouthful for consumers to remember.

[More]

The Importance of Data Backup

Yeah, we regularly write about data backup. At least monthly, we'll be contacted by someone with an issue that a regular backup could have made much easier to deal with. The Computing Center provides all the backup solutions mentioned in this article and helps clients with backup strategies, best practices, and management of their backup systems. 

Have you ever lost a lot of really important data? Or, short of that, have you ever felt a moment of panic where you thought you did?

Whether it’s images of a family vacation, a report from work, or a semester’s worth of homework, you probably have data on your computer’s hard drive or your mobile device that’s not just valuable, it’s too valuable to lose.  

Data loss can happen to anyone. Having a backup strategy can help you to avoid the crushing feeling that comes with finding out that all your hard work and treasured memories are gone.

It’s a good idea to make backing up data a part of your cyber hygiene. If you happen to lose your data due to a hardware defect or ransomware attack, having a backup could be the respite you’re looking for.

[More]

Previous Entries / More Entries