siteadmin

About siteadmin

This author has not yet filled in any details.
So far siteadmin has created 26 blog entries.

Crypto Virus

used with permission from ezMicro There is a new and very serious virus named CryptoLocker that is currently circulating the Internet. The threat involves an e-mail attachment that, if opened, will evade most anti-virus and anti-spyware software and encrypt data on your individual computer and your network, making it appear to be inaccessible. Please inform everyone to be extra vigilant about not opening attachments from questionable sources. The delivery is very clever and very malicious. [...]

By |2018-04-22T09:03:56-05:00November 12th, 2013|News Alerts|Comments Off on Crypto Virus

Mobile Tech and the Fear of Missing Out

Used with the permission of //thenetwork.cisco.com by Jason Deign Twitchy because you haven't checked Facebook in a while? Then you could be in Fear of Missing Out, and that smartphone in your pocket isn't helping. We've all experienced the scene. A family gathering, a group of friends, in a bar or a restaurant. All chatting. But not to each other. Instead, they sit hunched over their mobile phones, interacting with people far away and ignoring [...]

By |2018-04-22T09:05:43-05:00November 12th, 2013|Newsletter Articles|Comments Off on Mobile Tech and the Fear of Missing Out

How to Protect Against Phishing

used with permission from Norton by Symantec Phishing is an online con game, and phishers are nothing more than tech-savvy con artists. In a typical phishing scam, phishers send out emails, which appear to come from a legitimate company, in an attempt to scam users into providing private information that will be used for identity theft. Phishers use a variety of sophisticated devices to steal information—including pop-up windows, URL masks which simulate real Web addresses, [...]

By |2018-04-22T09:07:38-05:00October 27th, 2013|Newsletter Articles|Comments Off on How to Protect Against Phishing

Your Customers Are Your Sales Team

by Debra J. Schmidt Most companies have a budget and a marketing plan but do not devote enough resources to ensuring the highest standards of customer service. Offering the best products in the world will not build customer loyalty. If your customers aren’t happy with the service they receive, they won’t purchase from you, they won’t come back and they’ll tell others to stop doing business with you. However, if you have a reasonable product [...]

By |2018-04-22T09:09:09-05:00October 25th, 2013|Newsletter Articles|Comments Off on Your Customers Are Your Sales Team

Facebook Privacy Settings Got you Down?

Rik Ferguson: Making the Most Out of Facebook's Privacy Settings Facebook’s privacy settings – opaque at best to even the savviest users and constantly changing – can seem like a hurdle even when you’re strongly motivated to lock your account down. Rik Ferguson, Vice President of Security Research at Trend Micro, has written a helpful guide on how to configure your Facebook account’s privacy settings. His tips include keeping snoopers out of your account controlling [...]

By |2018-04-22T09:10:45-05:00October 25th, 2013|Newsletter Articles|Comments Off on Facebook Privacy Settings Got you Down?

It’s Not My Job: Attitudes that Inhibit Teamwork and Effectiveness

by Marlene Chism, www.stopworkplacedrama.com   I'm known to say, "It's not about the person, circumstance or situation, it's about the pattern." That's why when I speak I share so many personal examples. I can guarantee that any workplace issue has at the root, a pattern in place, and that pattern is of the non-physical type. In other words, it's the mindset, attitudes, and beliefs that contribute to the expression of the problem at hand. In [...]

By |2018-04-19T20:31:48-05:00June 25th, 2013|Newsletter Articles|Comments Off on It’s Not My Job: Attitudes that Inhibit Teamwork and Effectiveness

Phone Ethics for Business

used with permission by HP Technology at Work Cellphones are a visible symptom of our addiction to technology. We use them for everything; we can’t be separated from them and we clutch at them constantly – even obsessively. Since habits and addictions often become automatic, it’s important to do a bit of self-analysis sometimes. Our all-important interactions with our cellphones can have a big impact on our professional image. Consider that colleague who is constantly [...]

By |2018-04-22T09:12:31-05:00June 25th, 2013|Newsletter Articles|Comments Off on Phone Ethics for Business

It’s the Right Thing to Do

by Craig Kitch - www.craigkitch.com I read a great story about President Dwight D. Eisenhower, relayed by one of his staff members. Apparently the Eisenhower cabinet had been in a tussle over a difficult decision. Each of the cabinet officers argued the subject endlessly from his perspective. The secretary of defense argued that if his idea were not implemented, it would damage national security. The secretary of state argued a point that would protect foreign [...]

By |2018-04-22T09:14:07-05:00May 8th, 2013|Newsletter Articles|Comments Off on It’s the Right Thing to Do

Think Before Sharing

used with permission by HP Technology at Work Many online alerts and notifications signal your real-life movements to the outside world. Location-based apps are trusted tools for keeping clients, colleagues and friends updated on your whereabouts. However, before you “Check in” everywhere, all the time, it is important to think about who exactly can access this information. Your old school friends? That funny guy you met at the airport? Their connections? Awareness is key in [...]

By |2018-04-22T09:15:45-05:00May 8th, 2013|Newsletter Articles|Comments Off on Think Before Sharing

Cybercrime Goes Mobile

Mobile devices have become an essential tool for everyday life. We check in for flights, make online purchases, access bank accounts, and connect to social media all on mobile-enhanced websites and newly developed applications. The worldwide adoption of the smartphone has prompted cyber criminals to shift their focus toward mobile users and away from the traditional PC environment. According to Norton's Cybercrime Report, 1 in 4 adults have been a victim of mobile and social [...]

By |2018-04-22T09:19:44-05:00April 18th, 2013|Newsletter Articles|Comments Off on Cybercrime Goes Mobile