Avoiding Malicious Links

Avoiding "bad links" isn't easy. Like many of you, we constantly receive emails with hyperlinks to websites. The vast majority of what makes to our inboxes is "legit".  Our internal lines of defense primarily come from our SonicWall routers,  Mimecast eMail Security and Sophos Antivirus/Antispam software that all trap suspicious emails and links. Still, it pays to be watchful of what you're being sent. Here are some techniques that will help.

Whether it’s in reference to an interesting article or information on a great new restaurant, “send me the link” is a commonly used phrase in the internet era. This is equally true in professional circumstances, where coworkers communicate and collaborate as a part of their jobs. In today’s threat-filled environment, where large and small businesses alike are facing unprecedented cybersecurity attacks, link safety is an essential part of employee security training.

CyberEdge Group’s 2019 Cyberthreat Defense Report found that 78 percent of networks had been breached in the previous year and that malware, ransomware, and spear-phishing “cause the most headaches.” In a separate study, risk advisory firm Willis Towers Watson found that 90 percent of breaches were enabled by human error. Any seasoned IT pro worth their salt knows how to recognize malicious links, but the average employee likely does not, and one wrong click can have devastating consequences.

Basic employee security training generally involves coaching employees on picking out suspicious attachments, but that training is incomplete unless link safety is also on the agenda. Emails with malicious links are just as much of a threat as emails with malicious attachments. There are a number of tips and tricks to keep in mind when trying to determine whether a link is safe.

[More]

Upgrading your PCs

We get it! Like the majority of our clients, The Computing Center is a small business. For us to continue to be successful, we need to carefully plan all our equipment purchases. And like many of our clients, we do keep some of our equipment longer than what's recommended by manufacturers. But when it's time, we carefully select the right machine for the job at hand. We also select machines that will last. 

Is it time to consider replacing your business computers?

So, you’re a small business owner and confident you’re on the path to success. You’ve defined your target market. Set realistic goals. Carved out your budget. Hired top talent. Even solidified your marketing plan. As a result, you’re thriving. Congratulations!
But what about your company’s computers? Sure, when you launched your small business, you researched and purchased the most current equipment available - at the time. But as new technology continues to emerge, and operating systems evolve, your hardware may not be very up to date.

Whether you’re working solo or leading a small group of successful team members, here are four reasons why you might want to consider investing in more powerful business computers:

[More]

Securing Your iPad

The Computing Center does NOT sell Apple iPads, however we do support them. iPads are by-far the most popular "pad" used by our clients and that's quite understandable. Many many software applications have iPad versions, developers understand the consistencies of iPads and take advantage of their many features. However, like all devices these days, iPads need to be kept secure. This article discusses how best to do just that.

iPads and other tablet computers are everywhere: in the coffee shop, at your children’s school, at your book club, at the department store. Chances are, you or someone you know uses a tablet computer regularly. But should you be worried about security? Are tablet computers like the iPad any less secure than a standard laptop?

Some dos and don’ts for keeping your iPad secure

Although iPad devices are safer than most, their popularity makes them an attractive target for would-be cybervillains. Since Apple has made a point of building a lot of privacy features into all of their devices and operating systems, why not use them to your advantage?

[More]

Dreams of the Future - 5G

HP is looking ahead a bit in this article about 5G wireless networking and what it will be able to do. But as always, the future is right around the corner.

5G means much more than pure speed
The fifth generation of wireless technology is about to enter the mainstream, as all the major wireless carriers prepare to launch their own 5G wireless networks in the not-too-distant future. But 5G is much more than just a 4G upgrade - and it’s going to affect a lot more than your phone.

So really, how fast is 5G?
Just like the switch from 3G to 4G moved us from a few megabits per second into the hundreds, 5G will blaze past 4G - in fact, a recent simulation by Qualcomm at the Mobile World Congress showed 5G performing at 10 times the speed of our current standard. This extra capacity will make for a more reliable connection, too.

[More]

Windows 10 - More Choices for Updates

 Many clients are in the midst of updating or replacing with PC systems using Windows 10. Microsoft has been improving update messaging so users aren't interrupting important updates. If you're not sure or have questions, we can help. 

Thanks to the Windows 10 May 2019 Update, you’ll see fewer interruptions when Windows updates.

Now you have the option to let Windows Update adjust active hours based on you device-specific usage patterns.

We know that sometimes, updates can come at inconvenient times. So, now you’ll be able to pause both feature and monthly updates for up to 35 days (seven days at a time, up to five times).

And when there’s an update requiring you to restart your device, you’ll see a new notification: a colored dot on the Power button in the Start menu and on the Windows icon in your taskbar.

Check it out in action:

 

Previous Entries / More Entries