443-992-7394

Gmail Smart Labels for Social Updates and other Email Helpers

Are you tired of weeding through a seemingly endless string of emails? Of course you are. We all are. But what other options do we have? Well, now thanks to Google’s new Smart Labels, you are able to filter your email more efficiently, allowing you to receive only the content you want to read!

Enabling Google Smart Labels

  1. Go to your Gmail settings menu
  2. Click “Labs”
  3. Enable Google Smartlabels

Smart Labels automatically categorizes bulk, notification, forum messages, and more, leaving your Inbox free from unwanted clutter.

Other Email Helpers

  • Boomerang: Boomerang gives you control of when you send and receive email messages.
  • Rapportive: Rapportive gives you immediate access to the biographical information of your contacts, including what people look like, where they’re based, where they work, and more.
  • Mailstrom: Mailstrom is one of the smartest and fastest ways to clean out your inbox, deleting or archiving hundreds or even thousands of messages at once. “I’ve cleared out 60% of my mailbox already,” said Working Nets own David Spigelman.

If you have any questions about Google Smart Labels and other Email Helpers, please contact Working Nets by calling (443) 992-7394 or visit WorkingNets.com today!

Troubleshooting Services: Productivity is crucial in any business. When trouble appears, we’ll figure it out and provide the right solution that gets your business up and working again.

Welcome to Working Nets – your virtual IT Department!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

 

Windows 8 is set to be released next Week. What is the Public saying?

The release of Windows 8 is right around the corner. But why does no one seem excited? According to Microsoft, Windows 8 is “Windows reimagined and reinvented from a solid core of Windows 7 speed and reliability.” But what does the public think?

Unfortunately for Microsoft, public opinion has not been in favor of Windows 8. In fact, the closer Microsoft gets to unveiling its newest operating system and the more the public learns about Windows 8, the less likely they are to implement it.

Windows 8 Reviews

 

  1. “We really don’t think Windows 8 will get significant traction as a PC OS in a corporate environment,” said Gartner analyst Steve Kleynhans. “Why? Because Windows 8 is a “plumbing” upgrade. This is an upgrade that drastically changes the technology without adding significant improvements.”
  2. According to ZDNet.com, even hard-core Windows 8 fans prefer Windows 7 by a two to one margin.
  3. “An SMB is unlikely to decide ‘Windows 7 is no longer good enough, I must have Windows 8!’,” said Analysys Mason analyst Patrick Rusby. “Windows 7 is proven and popular.”
  4. “[Windows 8] really seems to be designed for tablets and phones,” said Working Nets own David Spigelman. “While you can install and run it on a desktop or notebook, it’s really not designed for that.”

Checkout How People React to Windows 8

Do you think you will make the switch to Windows 8?

If you have any questions about Windows 8, please contact Working Nets by calling (443) 992-7394 or visit WorkingNets.com today!

At Working Nets, we work closely with each client to determine their IT needs, and how to meet them quickly and inexpensively. We’ll meet with you and perform an extensive system review before creating a detailed, comprehensive strategy to meet your unique needs.

Welcome to Working Nets – your virtual IT Department!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

 

Windows 7, Windows XP, & Malware Infections: Is your Computer at risk?

According to the latest Microsoft Security Intelligence Report (volume 13), the average number of infected Windows 7 SP1 machines has increased in 2012 by 23% on 32-bit systems and 7% on 64-bit systems, compared to the last quarter of 2011. Meanwhile, the average number of malware-infected Windows XP SP3 PCs has increased by around 10%.

According to the report: “A similar trend of slowly increasing infection rates was observed for Windows Vista between 2007 and 2009, prior to the release of Windows 7.” But why? Well, as more and more people adopt software, security suffers. Early adopters are often well versed in cybersecurity techniques. However, the general populous is not.

“As the Windows 7 install base has grown, new users are likely to possess a lower degree of security awareness than the early adopters and be less aware of safe online practices,” according to the Microsoft security report.

Quick Security Tips from Working Nets

  1. Avoid questionable behavior. If you engage in questionable behaviors; if you don’t have SOME healthy skepticism about clicking on links to who-knows-where; if you download “drivers” or “players” willy-nilly, so that you can see that “new video”, and especially if you don’t have some form of anti-virus software, you’re going to get hurt.
  2. Trying to avoid paying for software by downloading license key generator, also known as Keygen, software to allow you to install a full-version of whatever software you’re talking about is not only illegal, it constitutes “questionable behavior.” Remember what we just talked about. There is plenty of free software, and if the software you want to use isn’t free, and is that important to you, it’s probably worth paying for. It’s usually cheaper than having to have viruses uninstalled, and is certainly cheaper than having financial credentials stolen.

If you have any questions about Cybersecurity, please contact Working Nets by calling (443) 992-7394 or visit WorkingNets.com today!

Virus/Spyware Protection Services: Viruses and spyware are time-consuming and costly. The virus protection we offer is top-notch and consistently updated. Our monitoring software ensures your business is safe.

Welcome to Working Nets – your virtual IT Department!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

Sources:

Windows 7 Malware Infection Rates Soar

 

Cybersecurity News: Microsoft PCs are infected before reaching Consumers

It has not been a good couple of weeks for Microsoft. First, they discovered that Hackers had found a Security Hole in Internet Explorer. Now, the computer company has discovered that many of their PCs and laptops made in China were embedded with malicious software before ever reaching the consumer. The computer virus allows hackers to switch on a microphone or Webcam, record keystrokes, and access login credentials and online bank accounts.

And because computer companies rely on such a long and complex supply line, the malicious software could have been uploaded at any point, something Richard Domingues Boscovich, the assistant general counsel for the Microsoft Digital Crimes Unit, called “especially disturbing.”

“It’s one of the toughest cybersecurity challenges out there,” said Tom Kellermann, vice president of cybersecurity at Trend Micro. “There’s not really a solution unless you start to only build computers in the USA again.”

This isn’t the first time this has happened either. In 2008, the Defense Department and Federal Aviation Administration unknowingly purchased counterfeit Cisco routers, which were pre-loaded malicious software. FBI investigators found the routers allowed hackers to “gain access to otherwise secure systems.”

Then in May, the Senate Armed Services Committee released  a report citing 1,800 cases of counterfeit electronics from China, electronics used in the Air Force’s largest cargo plane and Special Operation helicopters.

“Companies are in a competitive dogfight to make products cheaper and hit the market faster,” said Scott Aken, a former FBI special agent who dealt with cyber counterintelligence. “They’re not spending time or money to ensure those products they are sourcing from overseas are devoid of counterfeits.”

So what are consumers to do?

Boscovich offers this simple advice: Consumers can often spot dangerous counterfeit technology if the deal “appears too good to be true.”

“However, sometimes people just can’t tell, making the exploitation of a broken supply chain an especially dangerous vehicle for infecting people with malware.”

If you have any questions about Cybersecurity, please contact Working Nets by calling (443) 992-7394 or visit WorkingNets.com today!

Welcome to Working Nets – your virtual IT Department!

At Working Nets, we support your business by providing top-notch Information Technology (I.T.) services to companies like yours: Companies that don’t need full-time I.T. services, but do need someone to turn to, when they are having a problem. We provide services like Network Design, Monitoring and Maintenance. We troubleshoot technical issues when they arise, and give you options for solving them. We help you use your technology investment to achieve your business goals.

At Working Nets, our focus is on your needs!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

Sources:

Pre-Infected PCs Expose Flaws In Global Supply Chain

Cybersecurity News: Hackers have found a Security Hole in Internet Explorer

It was recently reported that security researcher Eric Romang of Zataz.com discovered a major cybersecurity issue with Internet Explorer (IE) versions 6, 7, 8, and 9. The popular Internet browser has a major hole, a hole that hackers have already discovered.

The fresh “zero day” vulnerability allowed cyber attackers to install malicious software – a form of the old Poison Ivy Trojan – on Windows computers. This allowed the hackers to take control of the victim’s computer.

It is thought that the hackers behind the IE attack may also be the group responsible got last month’s exploitation of Oracle’s Java browser plug-in.

Microsoft Responds to the Cybersecurity Threat

Microsoft quickly responded with a security advisory, including an extensive list of work-arounds. Unfortunately for IE users, these work arounds are somewhat burdensome.

“I would recommend not using Internet Explorer until this issue is patched,” Sophos’ Chet Wisniewksi tells me. “While the exploit is not in widespread use, it could be integrated into popular attack kits like the Blackhole Exploit Kit any time now.”

The Solution: Make the switch to another browser, like Google Chrome, Mozilla Firefox, or Opera. You can always come back to IE after Microsoft issues a patch.

If you have any questions about Cybersecurity, please contact Working Nets by calling (443) 992-7394 or visit WorkingNets.com today!

Welcome to Working Nets – your virtual IT Department!

At Working Nets, we support your business by providing top-notch Information Technology (I.T.) services to companies like yours: Companies that don’t need full-time I.T. services, but do need someone to turn to, when they are having a problem. We provide services like Network Design, Monitoring and Maintenance. We troubleshoot technical issues when they arise, and give you options for solving them. We help you use your technology investment to achieve your business goals.

At Working Nets, our focus is on your needs!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

Source:

Hackers Just Found a Big Hole in Internet Explorer. Should You Switch Browsers?

Updating the Virus Signature: Why it isn’t enough

What is a Virus Signature?

A virus signature, sometimes referred to as a definition file or a DAT file, is an algorithm or hash used by antivirus software to identify a specific virus or threat. However, signatures are only affective at detecting previously known viruses. When a new virus arises, a new signature must also be created.

What it means to Update the Virus Signature

When a new virus is discovered that is not detectable by an existing signature, a new signature must be created and tested by the antivirus vendor. This new signature is then pushed to the public in the form of a signature update, adding the detection capability to the scan engine.

Why it isn’t enough to just Update the Virus Signature

Because it is not practical for antivirus companies to release individual signatures, they often release several at a time on a set schedule. Still, keeping your signatures up to date will not guarantee a new virus will not slip through. To better protect yourself, it is recommended that you purchase the latest version of the antivirus software.

It’s important to keep the actual software current; not just the virus signatures!

If you have any questions about Antivirus Software, please contact Working Nets by calling (443) 992-7394 or visit WorkingNets.com today!

Welcome to Working Nets – your virtual IT Department!

At Working Nets, we support your business by providing top-notch Information Technology (I.T.) services to companies like yours: Companies that don’t need full-time I.T. services, but do need someone to turn to, when they are having a problem. We provide services like Network Design, Monitoring and Maintenance. We troubleshoot technical issues when they arise, and give you options for solving them. We help you use your technology investment to achieve your business goals.

At Working Nets, our focus is on your needs!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

Olympic-Themed Internet Phishing Scams :: Cybersecurity Tips

Every four years, the best athletes gather from around the globe to compete in the Olympics. Unfortunately, the Olympics also provide Internet scammers with a new outlet to try and phish information from unsuspecting and trustworthy individuals.

What is Phishing?

Phishing refers to attempting to acquire personal information – such as usernames, passwords, and credit card information – and money by masquerading as a trustworthy entity.

Olympic-Themed Phishing Scams

  • London 2012 Ticketing Team: This phishing scam sees scammers pose as ticketing officials offering unsuspecting individuals with an once-in-a-lifetime opportunity to purchase Olympic tickets that have been made available because of a previous bidder’s inability to pay for them. However, unlike the previous bidder, you are expected to pay upfront. This is why the original email is followed by a phone call asking for credit card information.
  • London Olympic Cash Officer: Unsuspecting individuals are sent an email from the “London Olympic Cash Officer” stating that the recipient has been randomly selected to receive a cash prize of 1.6 million GBP. However, to receive the payment the individual must provide personal information.
  • Dr. Beavis: Unsuspecting individuals are sent an email (signed by Dr. Beavis) stating that they, along with 6 other individuals, have been randomly selected as the winners of 7 million GBP. And, of course, they must provide personal information to claim their prize.
  • You are needed … Get Back to Us: Unsuspecting individuals are sent an email headed “You are needed … Get Back to Us.” It informs the recipient that they are needed to participate in the Olympics as a coordinator or event staffer. The individual is then directed to a site where they must input personal information and provide payment for the placement services.
  • Ring Steward: Unsuspecting individuals are sent an email (or letter) informing them that they have been selected to be a ring steward in the Olympics. Recipients are asked to call a phone number for additional details. And guess what? They are then asked to provide personal information.
  • Text Message Scams: Yep, phishing scams can include text messages, as well. This phishing scam involves a text message stating that the recipient has won 300,000 pounds in the London 2012 lottery. Recipients are then asked to call a phone number and provide personal information to claim their prize.

And this is just the beginning!

If you have any questions about Internet Phishing Scams and IT Security, please contact Working Nets by calling (443) 992-7394 or visit WorkingNets.com today!

Welcome to Working Nets – your virtual IT Department!

At Working Nets, we support your business by providing top-notch Information Technology (I.T.) services to companies like yours: Companies that don’t need full-time I.T. services, but do need someone to turn to, when they are having a problem. We provide services like Network Design, Monitoring and Maintenance. We troubleshoot technical issues when they arise, and give you options for solving them. We help you use your technology investment to achieve your business goals.

At Working Nets, our focus is on your needs!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

Sources:

10 Olympics-Themed Phishing Scams To Avoid At All Costs

Another Website Hacking Incident: What the LinkedIn & DropBox Hacks mean

First there was the infamous LinkedIn hack a few months ago. Now, another major website has been attacked, Dropbox.

“Our investigation found that usernames and passwords recently stolen from other websites were used to sign in to a small number of Dropbox accounts,” said Aditya Agarwal, VP of engineering at Dropbox. “We’re sorry about this, and have put additional controls in place to help make sure it doesn’t happen again.”

In instances such as these, hackers breach a website to steal usernames and passwords in hopes that these login credentials work for other services, as well. If they do, these hackers harvest personal data to use in future scams.

Protecting your Information: Simple IT Security Tips

The only way to truly prevent cyber-attacks is completely avoid using the Internet, which is nearly impossible these days. There are, however, several ways in which you can make your business network more secure. These security tips include:

  • Stop Password Reuse: Do not use the same password for multiple accounts. Yes, using multiple passwords will not be as easy to remember, but it will make you much less susceptible to cyber-attack.
  • Reset your Passwords Regularly: Security experts advise people to regularly change their passwords.
  • Choose your Security Question Carefully: Don’t make it too easy for hackers to access your information. Do not use personal information or basic information that can be found on the Internet.
  • Be Careful: Only access the Internet over a secure network.
  • Keep Everything Up to Date: Keep your operating system, browser, anti-virus and other critical software up to date.
  • Outsourced IT Security Services from Working Nets: Data protection is crucial. Working Nets assures that your vital business data is available when you need it by implementing tools to protect you!

If you have any questions about Hackers, Hacking, and IT Security, please contact Working Nets by calling (443) 992-7394 or visit WorkingNets.com today!

Welcome to Working Nets – your virtual IT Department!

At Working Nets, we support your business by providing top-notch Information Technology (I.T.) services to companies like yours: Companies that don’t need full-time I.T. services, but do need someone to turn to, when they are having a problem. We provide services like Network Design, Monitoring and Maintenance. We troubleshoot technical issues when they arise, and give you options for solving them. We help you use your technology investment to achieve your business goals.

At Working Nets, our focus is on your needs!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

Outsourced Preventative Computer & Network Maintenance Program

Productivity is crucial in any business.  For this reason, we at Working Nets have put together a preventative maintenance program to analyze your computer systems for potential problem areas to keep your business running smoothly, reducing costly downtime. And by reducing downtime, your office remains more productive, more often.

The Benefits of Working Nets’ Preventative Maintenance Program

  • Productivity: As we have already touched on, Working Nets can identify and remedy problems before they result in downtime, meaning your employees can remain productive.
  • Minimize Breakdowns: Besides keeping productivity high, preventative maintenance helps eliminate most costly breakdowns.
  • Keep Data Secure: You rely on your business information to stay profitable. So doesn’t it make sense to do whatever you can to protect your business critical information?
  • Optimize Machine Performance: Regular maintenance can help you get the most out of your machines.
  • Reduce Intrusion: Hackers can be a business’s worst nightmare. Is your network secure?

Performing proactive maintenance, by taking care of the overall health of your network,  is the most cost-effective and efficient way to prevent system problems and minimize breakdowns.

If you have any questions about Prevetative Maintenance or Outsourced IT Services, please contact Working Nets by calling (443) 992-7394 or visit WorkingNets.com today!

Welcome to Working Nets – your virtual IT Department!

At Working Nets, we support your business by providing top-notch Information Technology (I.T.) services to companies like yours: Companies that don’t need full-time I.T. services, but do need someone to turn to, when they are having a problem. We provide services like Network Design, Monitoring and Maintenance. We troubleshoot technical issues when they arise, and give you options for solving them. We help you use your technology investment to achieve your business goals.

At Working Nets, our focus is on your needs!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

Password Changes with Google Apps Outlook Sync Tool

Okay, so today I had a client call with a problem that should have been obvious, but wasn’t. Seems one of her users had reset her Google Apps password, and now the Outlook Sync Tool (GAOST) wasn’t working anymore. Further, there didn’t seem to be any way to reset that password – at least, nothing was prompting for it. Further, I couldn’t find anything on the Internet about how to fix this issue, so here it is:

  1. Close Outlook.
  2. Click: Start | All Programs | Google Apps Sync | Delete Saved Google Apps Password.
  3. Identify the profile you want to change and click Delete Stored Password. Then click OK when it tells you it’s been done.
  4. Close the application. You can click Cancel if you like – it doesn’t matter.
  5. Start Outlook (and make sure you’re using the correct profile, if prompted).
  6. A window should pop up giving you the opportunity to enter the new password. If so, do so, and click the Remember This Password box. If it doesn’t pop up… (and this was our issue today…)
  7. Check to see whether Outlook says “Offline” in the lower right corner. It probably does. Either way, check the File menu, and look for whether there is a check-mark next to “Working Offline”. If there is, click it to turn it off. If you don’t see “Working Offline,” you might need to click the double-down-arrow button which shows the options you haven’t used recently.
  8. Restart Outlook.

That’s it. Hope this helps someone else.