Blog

April 23rd, 2010

tip1The single most visible change in Windows 7 is the new “dock style” taskbar, which shows icons instead of buttons, with all application windows combined within a single button. The first question many people will have is “How do I turn it off?” – and this article will show you how.

Read more

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
April 13th, 2010

spamA survey conducted by the Messaging Anti-Abuse Working Group or MAAWG reveals that a almost half of computer users in North America and Western Europe not only open spam emails, but also click on the links and open attachments found within these messages intentionally. This not only invites more spam, but potentially exposes them to a large number of security risks as well.

Data from the survey revealed that:

  • Nearly half of those who have accessed spam (46%) have done so intentionally – to unsubscribe, out of curiosity, or out of interest in the products or services being offered.
  • Four in ten (43%) say that they have opened an email that they suspected was spam.
  • Among those who have opened a suspicious email, over half (57%) say  they have done so because they weren’t sure it was spam and one third (33%) say they have done so by accident.
  • 84% were aware of the concept of bots. Yet, most think that they are immune from these viruses, with only a third saying they consider it likely that they could get a bot on their computer.

Spammers have mechanisms which allow them to track whether their emails are accessed or not. Opening or even unsubscribing from spam messages further invites them to send even more spam. Furthermore, Spam messages these days are not only vehicles to solicit or sell goods and services of dubious source and value, but are increasingly being used as vectors to spread malicious software or malware. Clicking on a link, opening an attachment, or just viewing it can potentially open users’ computers to vulnerabilities in the operating system or installed applications. This in turn can turn compromised systems into “bots”, or unwitting accomplices in spreading more spam or malware.

It pays to be aware of this next time you receive suspicious email – and make sure that your employees understand the risks as well. Sometimes even your antivirus software isn’t enough to protect you – so please ask us about our Managed Security Services and how we can help you not only fight spam but prevent it from reaching your Inbox in the first place.

Related articles:

Brazil-originated spam levels topping 13% says Panda Security (infosecurity.com)

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
April 9th, 2010

chargerDo you use the the Energizer DUO USB battery charger? If so, you’ll be interested to know that the United States Computer Emergency Response Team (US-CERT) has warned that software included in this charger contains a software “backdoor” or Trojan that allows hackers to remotely access vulnerable systems.

In its advisory, the US-CERT warned that the installer for the Energizer DUO software places files in your system that allow an attacker to potentially remotely control your system, including the ability to list directories, send and receive files, and execute programs. The backdoor operates with your logged-on privileges and starts every time you start your computer. Furthermore, the Trojan operates whether the charging device it works with is connected or not.

Energizer has acknowledged the issue in a statement released at its website. The company said it has discontinued sale of this product and has removed the site to download the software. In addition, Energizer is directing consumers to uninstall or otherwise remove the software from your computers.

This incident illustrates the fact that these days threats to your computer and/or network can come from anywhere–including something as seemingly innocuous as your USB battery charger. As always, we advise our clients to be constantly vigilant against such threats. If you don’t have the time or resources to do this yourself (and most don’t!), perhaps it’s time to consider our Managed Security services. Give us a call – we’ll be glad to help.

Related articles:

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
April 5th, 2010

cloudAs we begin to store more and more of our data on the Internet and in the “Cloud,” the threat of that data being accessed and used by someone or something outside of our knowledge or control becomes very real. Data such as credit card information, banking transactions, work history, private addresses and numbers, email and much more are now stored and searchable in everything from Facebook, Google, Twitter, and a host of other applications.

In a June report titled “Assessing the Security Risks of Cloud Computing“, analyst firm Gartner recommends that businesses work closely with their IT department or trusted IT services provider and consultant to understand the risks of storing data in the cloud.

Not stopping there, Microsoft has called for even greater government oversight. Recently, Microsoft General Counsel Brad Smith travelled to Washington to urge the US Congress to enact legislation that would protect information that’s stored in the cloud.

Microsoft is proposing legislation that would call for:

  • Reforming the Electronic Communications Privacy Act
  • Modernizing the Computer Fraud and Abuse Act
  • Helping consumers and businesses manage how their information is collected and shared
  • Addressing data access issues globally

The move coincides with Microsoft’s recent efforts to offer cloud-based services not only for its consumer and corporate customers, but the government as well.

Is your business ready for the cloud? What security and privacy policies do you have in place regarding your employees’ use of cloud-based services? Not sure? Contact us today to find out how we can help.

Related links:

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
March 31st, 2010

facebookMcAfee posted on its blog recently news about e-mail purportedly coming from Facebook urging recipients to open an attachment to get their new password on the site. Unfortunately the email is a scam to get not only users’ password of the popular social networking website, but potentially any accounts they use while using their computer as well.

This is the latest in a wave of malware and phishing scams specifically targetting uses of social networking websites. As the popularity of these websites grow, so do their attractiveness to online crooks. It is estimated that Facebook alone has over 350 million users, and just recently has surpassed Google as the most popular destination on the Internet. Even if just a small percentage of users fall for the scam, this would still make a sizable number of compromised profiles and accounts.

As always, be extra careful when opening any sort of attachment in email messages. Also make sure to double check the sender of the message, the context and its content. For example, Facebook rarely asks users to update their account information via email. In addition, the message in the bogus email mentioned here is supposedly full of awkward sentences and wrong spellings, which should clue users in on its authenticity. Of course customers enrolled in our managed security services won’t have to worry, as we block these types of messages before they reach their Inbox. Worried about threats coming in through your email? Contact us and see how we can help.

Related links:

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
March 26th, 2010

ransomewareUsers beware of ransomware: malicious software that extorts money from users in exchange for freeing the user’s computer or data. One particularly nasty version was recently discovered by researchers at CA which came bundled with a software download called uFast Download Manager. The malware blocks Internet access for users until they pay the publisher a fee via SMS. Users who download the software are immediately infected, seeing a message posted in Russian demanding a ransom under the guise of activating the uFast Download Manager application. To keep your computer environment safe, always be wary of downloading suspicious free software on the Internet. If you need help or are unsure, please contact us first so we can help!

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
March 23rd, 2010

smartphoneHold on to your mobile devices: IDC predicts 20.9% growth in smartphone sales from 2009 through 2013. Symbian and Research In Motion (RIM) remain the market leaders, but you can be sure that competition will intensify with giants Microsoft, Google and Apple in the mix.

A few weeks ago, Microsoft announced the release of Windows Mobile 7, officially named Windows Phone. The announcement, made at the Mobile World Congress in Barcelona, came soon after the debut of Apple’s iPad. Early hardware partners were announced, including Dell, Garmin-Asus, LG, Samsung, Sony Ericsson, and HP. While hesitant to give any specific dates, Microsoft says to expect Windows Phone handsets to hit the shelves “in time for the Holiday season of 2010.″

Business users will find the ”Office” particularly interesting: a center where users can access Office, Outlook, OneNote, and SharePoint Workspace on their mobile device. A feature called the “Marketplace” will also be useful, allowing you to easily find and download certified applications and games.

Meanwhile, news has been circulating recently on websites such as The Wall Street Journal, Mashable and VentureBeat about Google’s plans to sell third-party software for its Android mobile platform. While an app store for their smartphone OS has existed for some time, many have criticized it for not being business ready, with its lack of a more stringent review and vetting process for apps. However, all that’s expected to change with the launch of a new app store completely filtered for business-ready apps.

You can be sure that Symbian, through its sponsor Nokia, is not taking all of this sitting down. Soon, you’ll be able to download the popular VoIP product, Skype, for free from Nokia’s Ovi Store. The app will work over a Wi-Fi or mobile data connection – GPRS, EDGE, and 3G – and you’ll be able to call, instant message, text message, share photos and videos, receive alerts when your contacts are online, and import a phone’s address book.

Not to be left behind, RIM also made a recent announcement of its plans to develop a new browser for its Blackberry products. Many have felt that the company’s products has been outperformed by the competition in terms of its web capabilities and UI. With this announcement, it’s believed that the Blackberry will finally have support for websites with AJAX, CSS, and HTML5, although no mention of flash was made.

It’s truly exciting times for mobile device users. If you spend your day connected to customers, partners, and employees, you can see the value in these capabilities, with even more useful useful devices that really help you stay in touch and work on the go.

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
March 23rd, 2010

backupYou can’t have a disaster recovery plan until you first have a good backup solution. Is your backup solution good—or just good enough?

The traditional backup process is done to tape – which has a number of limitations including high cost (particularly as capacity increases), difficult upgrades, degradation over time, and slow backup and restoration.
Over the past three to five years, there has been a transition to hard-disk-based backup solutions that generally offer the ability to easily increase capacity as well as backup and restore much faster.

Whichever solution you use, there are many risks to your data.

Traditional backup processes capture only one snapshot of your information per day. So if your backup is scheduled to take place at 12 a.m., you risk losing the entire following day’s work in the case of a disaster.

The backup process traditionally involves significant manual labor. Someone has to ensure that the correct media is in the drive. Someone has to look at the results of the backup to ensure that it is complete (and ideally perform periodic data restorations). Then, when the backup is complete, someone has to take it offsite for safekeeping.

While some businesses have the capabilities to perform all of these backup-related tasks, many others don’t—and therefore have no idea if their backups will be there when needed.

How can you make your backup system better?

  • First, you should be absolutely sure that every bit of your data is backed up multiple times per day.
  • Second, the human element should be completely eliminated from the equation.
  • Third, restoration should be quick and flexible, so you can bring back any part of your data or all of it, depending on your needs.
  • Finally, the impact on your business should be minimal. In fact, you should be unaware that a backup is even in progress.

We can help you set up and maintain a backup solution perfect for your needs. Contact us for more information.

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
March 22nd, 2010

jumplistFinding a way to easily access recently used files, folders, and websites was annoying to some in previous versions of Windows.  In Windows 7, the new Jump List feature allows you to those items quickly.

Read more

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
March 22nd, 2010

marchmadnessIt’s March again, and many hoops fans are once again in a frenzy – creating fantasy basketball drafts, watching streamed basketball games, and researching basketball trends, rumors, and other related information. That’s “March Madness” for you.

Most of the activity of March Madness is internet based, with gambling and betting at an all-time high, especially as the tournament draws to a close with the Elite Eight Teams whittling down to the Final Four. Fans spend a lot of time watching streamed videos of games and gathering information on the tournament online, distracting them from their official duties and potentially wasting company bandwidth.

How much does this impact your company? A lot, says the research. A 2008 Newsweek article reports that the March Madness phenomenon cost a total of $1.7B in lost productivity. And that’s not counting the high bandwidth consumed from all the video streams and the research activities.

In more recent research findings reported by national outplacement firm Challenger, Gray & Christmas, the losses due to March Madness are expected to continue.

“Those who insist there will be no impact are kidding themselves,” says John Challenger, CEO of the Challenger, Gray & Christmas. “It might be a slight drop in output, or it could be slow Internet connections as bandwidth is sapped by employees watching streaming feeds of the games,” he adds.

If you’re concerned about your company’s bandwidth during this period and want to look for ways to better manage it, we’d be happy to discuss a possible roadmap.

Sources:

http://www.star-telegram.com/2010/03/17/2048029/college-basketball.html

http://www.newsweek.com/id/124404

Published with permission from TechAdvisory.org. Source.
Bookmark and Share