Our Blog

Our Blog

Losing Control of your Digital Life: Tablet Cybersecurity Tips

Tags: , , , , , , Computer Security Baltimore, IT Tips Baltimore

Happy New Year!

In 2012, we started to outline several ways in which your tablet could be putting you at risk, from wireless hotspots to unencrypted email servers to downloading apps from untrustworthy sources. Well, it may be a new year, but we are going to continue our countdown, unveiling the rest of our Tablet Cybersecurity Tips.

  1. Virtual Private Networks (VPN): If available through your mobile service provider, always use a VPN. This offers tablet users, like you, a safe and secure way to surf the Internet without compromising your sensitive data.
  2. Physical Thieves: Cybersecurity threats are ever present, but you must not ignore physical threats, as well. This is why it is so important to have a strong PIN code or passphrase to prevent unauthorized access.
  3. Security Apps: A good security app could be the difference between safely surfing the net and putting your sensitive data at risk. These apps are similar to computer security software and can help protect your tablet from malware and other online threats.
  4. Update your Software: It is critical that you keep your tablet and software up to date. This is the best way to protect your tablet and your data. Many updates contain vital security fixes. If you ignore these updates, you could unknowingly be putting your data at risk.

So please be safe!

If you have any questions, please contact Working Nets by calling (443) 992-7394 or visit WorkingNets.com today!

Welcome to Working Nets – your virtual IT Department!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

Source: Securing a tablet for web browsing in six easy steps

Hurricane Sandy Relief Efforts and Working Nets

Tags: , , , , Uncategorized

Several weeks ago, Hurricane Sandy devastated the East Coast, from Maryland to New York and everywhere in between. And residents of these areas, specifically New York and New Jersey, are still reeling from the damage. One community in particular, Sea Gate, a Jewish community adjacent to Coney Island, is struggling to recover.

The gated community, which consists of about 800 homes, sustained considerable damage. As a result, 90% of residents are still displaced from their homes.

“We have been completely devastated,” said Esther Zicherman, a lifelong resident of Sea Gate. “An entire community has been displaced. The government forgot about us. We are the lost community.”

Luckily, volunteers are coming from far and wide to assist, volunteers who include Working Nets’ own David Spigelman. He was among several hundred volunteers who spent the day in Sea Gate last Sunday.

“We all grouped into groups of five men, and were given assignments,” wrote David in an email to The Jewish Week. “We went to the houses and did what they needed us to do. Someone had previously gone around and offered assistance to all the residents, asking that if they wanted volunteer help, to sign up on the list.”

Please help the Sea Gate Jewish Community!

If you would like to help, there are several ways in which you can make an impact, including:

  1. Monetary Donations: The Sea Gate Jewish community has set up a mailing address for donations to the CYS (Seagate) Hurricane Relief Fund at 3832 Lyme Ave., Sea Gate, NY 11224. Phone pledges may be made (718) 705-9666. Or you can donate online at sgsandy.com.
  2. Volunteering: Sea Gate is in desperate need of volunteers, able and strong, to help families carry out loads of water soaked  possessions, including furniture and heavy appliances.  If you can volunteer, please call us at 718-705-9666.
  3. Food and Equipment: There are many volunteers and victims at Sea Gate that need food. Residents are also in need of generators, gasoline, cleaning supplies, and so much more!

If you have any questions, please contact Working Nets by calling (443) 992-7394 or visit WorkingNets.com today!

Welcome to Working Nets – your virtual IT Department!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

Image Source

The Karma of Networking Events: Patience is the Secret to Lead Generation

Tags: , , IT industry, IT Tips Baltimore

The other night I attended a networking event. It’s an annual event, but this is the first time I’ve gone. I was fascinated as to how many people I knew at this event. Many from events I still regularly attend, but others from groups I used to go to, or even groups that just are no more. I met some knew, and re-established contact with folks with whom I’d been long out of touch.

This morning, I emailed someone who was at the event, who doesn’t do very much networking for his business, and asked him what he thought of it. His response was, “As far as the event, I met a couple of people that I will follow up on. If anything positive comes out of that, it will have been worth it, otherwise, not.” Now, to me, that perspective is… bizarre. But I have come across it many times before. So I responded to his email, but I’d like to share it with all of you who use networking as part of your business-marketing plan:

My philosophy on networking events is that it’s almost always worth it. If nothing solid comes out of it, you met some people. Next time, you’ll run into some of them, and now you’re not strangers anymore. You talk a little bit about whatever – the Ravens, vacation spots, whatever. The next time they’ll smile when they see you and say “HIIIII – How ARE you?” And after that, you schedule a one-on-one, etc… Like other marketing initiatives, this is a game of brand awareness. The more you get to know them; the more they get to know you, the more likely they will feel comfortable thinking of you as “the accountant” when they have issues, or when they talk to other business owners.

I go to two networking meetings pretty much every week. And for those folks, I am the “computer guy.” I don’t always get leads from them, but when I do, it’s business. I’ve gotten $10,000+ deals from these meetings. Only a few, but to me, that justifies my attending them. I also go to several other events, as I catch them. And very often, I meet people that I know from other events, and they introduce me to other people I didn’t know. And the cycle goes round…

For example, I met someone from a networking group I was in years ago, whom I haven’t seen in a long time. He’s now working for a different company, and when we were talking, I asked him whom his targets are. One of his targets turned out to be the company that one of my friends works for, and he was there last night. I introduced them. He’s so happy; he wants to buy me dinner! A woman I met at the same event is a target for another one of my friends, who was also there last night. I introduced them. Now whether or not they actually wind up doing business together, those people will remember that I tried to help them. And if they have the opportunity to refer someone back to me, or if they even meet someone who wants to work with small IT companies, chances are I’m going to get that referral. That’s the power of networking.

That’s not to say be a mercenary and pretend that you want to help others in order to receive some future gain. It doesn’t work like that. It’s more like… karma. You put good stuff out there; good stuff will come back. I believe that, and I’ve seen it in my business.

So if you go to meetings and events, and don’t immediately meet people that are looking for what you do, don’t give it up as a worthless endeavor. Keep going. Meet more people. Get to know the ones you’ve already met, better. And help people, even if you don’t think they can help you. Because you never know…

If you have any questions, please contact Working Nets by calling (443) 992-7394 or visit WorkingNets.com today!

Security & Disaster Preparedness Services: Data protection and recovery is crucial. Working Nets assures that your vital business data is kept secure if disaster strikes.

Welcome to Working Nets – your virtual IT Department!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

 

Gmail Smart Labels for Social Updates and other Email Helpers

Tags: , , , , Explanations, IT industry, IT Tips Baltimore, Review / Opinion

Are you tired of weeding through a seemingly endless string of emails? Of course you are. We all are. But what other options do we have? Well, now thanks to Google’s new Smart Labels, you are able to filter your email more efficiently, allowing you to receive only the content you want to read!

Enabling Google Smart Labels

  1. Go to your Gmail settings menu
  2. Click “Labs”
  3. Enable Google Smartlabels

Smart Labels automatically categorizes bulk, notification, forum messages, and more, leaving your Inbox free from unwanted clutter.

Other Email Helpers

  • Boomerang: Boomerang gives you control of when you send and receive email messages.
  • Rapportive: Rapportive gives you immediate access to the biographical information of your contacts, including what people look like, where they’re based, where they work, and more.
  • Mailstrom: Mailstrom is one of the smartest and fastest ways to clean out your inbox, deleting or archiving hundreds or even thousands of messages at once. “I’ve cleared out 60% of my mailbox already,” said Working Nets own David Spigelman.

If you have any questions about Google Smart Labels and other Email Helpers, please contact Working Nets by calling (443) 992-7394 or visit WorkingNets.com today!

Troubleshooting Services: Productivity is crucial in any business. When trouble appears, we’ll figure it out and provide the right solution that gets your business up and working again.

Welcome to Working Nets – your virtual IT Department!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

 

Disaster Preparedness: Hurricane Sandy, Battery Backups, Redundancy & more

Tags: , , , , , Explanations, IT industry

As the weather finally begins to clear, the full aftermath of Hurricane Sandy is being realized. Countless businesses along the east coast were devastated by the storm. Was your business one of them? How did you fare during Hurricane Sandy?

If you had a disaster recovery plan and offsite data backup in place, you are probably okay. Yet, astonishingly, only 25% of computer users regularly backup their data! And major data loss can be devastating for a business. Of companies that experience a major loss of business data 51% close within 2 years, while 43% never recover.

That means that only 6% of businesses that experience major data loss survive!

So what can you do to ensure that your business does not become another statistic? You can plan ahead.

Whether you call it disaster preparedness, emergency preparedness, disaster recovery, or business continuity, the goal is the same: to get your business back up and running as quickly as possible in the event of a disruption.

  • Communication: You need to ensure that each of your employees knows what to do in the event of a disaster. Where will they do, how will they do their jobs, and how will they communicate?
  • Batter Backup: Battery backups are designed to provide power to your business when the grid is knocked out by natural disaster.
  • Off-Site Backup: If disaster strikes and you store your backups onsite, you could STILL lose all of your vital business information. Data loss can cripple any business. So make sure your vital business information is kept safe by utilizing off-site backup.
  • System Redundancy: The more redundant your systems, the less you will suffer, within reason. That’s the idea behind data backups, but there are other things you will need “backed up,” besides your data itself. These additional items include copies software, passwords, vendor information, and more!

Disaster recovery is not just for Fortune 500 companies. But what do you do if you cannot afford to hire an in-house IT technician? You outsource, of course!

If you have any questions about Disaster Preparedness, please contact Working Nets by calling (443) 992-7394 or visit WorkingNets.com today!

Security & Disaster Preparedness Services: Data protection and recovery is crucial. Working Nets assures that your vital business data is kept secure if disaster strikes.

Welcome to Working Nets – your virtual IT Department!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

 

Windows 8 vs. Windows RT: Microsoft’s new Operating Systems explained

Tags: , , , , Explanations, IT industry, Review / Opinion

As you probably know, Microsoft is expected to launch its newest operating system, Windows 8, later this week. And in our last blog post, we posted several opinions (mostly negative) about the upcoming launch of Microsoft Windows 8. But what you may not know is that Microsoft is also debuting a second operating system, Windows RT.

PCs and Tablets powered by x86 processors (both 32-bit and 64-bit platforms) will run Windows 8 or Windows 8 Pro. Devices on an ARM platform or WOA will run Windows RT.

  • Windows 8: Touted as Microsoft’s “full” version of Windows, 8 supports all of the same software as Windows 7, Vista, and XP, but also runs a batch of new, tablet-like apps available through the Windows Store.
  • Windows RT: Windows RT is a feature-limited tablet version of Windows 8 designed to run on ARM processors. Unlike Windows 8, RT will not support any older Windows software. Windows RT runs only Windows Store apps and built-in software. This means you won’t be able to download any software that is made to run in the desktop environment. This means no third-party browsers…no third-party games…no third-party anything for that matter.

Windows 8 and Windows RT look the same, but behave completely differently. And as you can imagine…or as you may be experiencing…this can be quite confusing for consumers.

If you have any questions about Windows 8 and Windows RT, please contact Working Nets by calling (443) 992-7394 or visit WorkingNets.com today!

At Working Nets, we work closely with each client to determine their IT needs, and how to meet them quickly and inexpensively. We’ll meet with you and perform an extensive system review before creating a detailed, comprehensive strategy to meet your unique needs.

Welcome to Working Nets – your virtual IT Department!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

 

Windows 8 is set to be released next Week. What is the Public saying?

Tags: , , , , , , , , , , , IT industry, IT Tips Baltimore, Review / Opinion

The release of Windows 8 is right around the corner. But why does no one seem excited? According to Microsoft, Windows 8 is “Windows reimagined and reinvented from a solid core of Windows 7 speed and reliability.” But what does the public think?

Unfortunately for Microsoft, public opinion has not been in favor of Windows 8. In fact, the closer Microsoft gets to unveiling its newest operating system and the more the public learns about Windows 8, the less likely they are to implement it.

Windows 8 Reviews

 

  1. “We really don’t think Windows 8 will get significant traction as a PC OS in a corporate environment,” said Gartner analyst Steve Kleynhans. “Why? Because Windows 8 is a “plumbing” upgrade. This is an upgrade that drastically changes the technology without adding significant improvements.”
  2. According to ZDNet.com, even hard-core Windows 8 fans prefer Windows 7 by a two to one margin.
  3. “An SMB is unlikely to decide ‘Windows 7 is no longer good enough, I must have Windows 8!’,” said Analysys Mason analyst Patrick Rusby. “Windows 7 is proven and popular.”
  4. “[Windows 8] really seems to be designed for tablets and phones,” said Working Nets own David Spigelman. “While you can install and run it on a desktop or notebook, it’s really not designed for that.”

Checkout How People React to Windows 8

Do you think you will make the switch to Windows 8?

If you have any questions about Windows 8, please contact Working Nets by calling (443) 992-7394 or visit WorkingNets.com today!

At Working Nets, we work closely with each client to determine their IT needs, and how to meet them quickly and inexpensively. We’ll meet with you and perform an extensive system review before creating a detailed, comprehensive strategy to meet your unique needs.

Welcome to Working Nets – your virtual IT Department!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

 

Windows 7, Windows XP, & Malware Infections: Is your Computer at risk?

Tags: , , , , , , , , , , , Computer Security Baltimore, Explanations, IT industry, IT Tips Baltimore

According to the latest Microsoft Security Intelligence Report (volume 13), the average number of infected Windows 7 SP1 machines has increased in 2012 by 23% on 32-bit systems and 7% on 64-bit systems, compared to the last quarter of 2011. Meanwhile, the average number of malware-infected Windows XP SP3 PCs has increased by around 10%.

According to the report: “A similar trend of slowly increasing infection rates was observed for Windows Vista between 2007 and 2009, prior to the release of Windows 7.” But why? Well, as more and more people adopt software, security suffers. Early adopters are often well versed in cybersecurity techniques. However, the general populous is not.

“As the Windows 7 install base has grown, new users are likely to possess a lower degree of security awareness than the early adopters and be less aware of safe online practices,” according to the Microsoft security report.

Quick Security Tips from Working Nets

  1. Avoid questionable behavior. If you engage in questionable behaviors; if you don’t have SOME healthy skepticism about clicking on links to who-knows-where; if you download “drivers” or “players” willy-nilly, so that you can see that “new video”, and especially if you don’t have some form of anti-virus software, you’re going to get hurt.
  2. Trying to avoid paying for software by downloading license key generator, also known as Keygen, software to allow you to install a full-version of whatever software you’re talking about is not only illegal, it constitutes “questionable behavior.” Remember what we just talked about. There is plenty of free software, and if the software you want to use isn’t free, and is that important to you, it’s probably worth paying for. It’s usually cheaper than having to have viruses uninstalled, and is certainly cheaper than having financial credentials stolen.

If you have any questions about Cybersecurity, please contact Working Nets by calling (443) 992-7394 or visit WorkingNets.com today!

Virus/Spyware Protection Services: Viruses and spyware are time-consuming and costly. The virus protection we offer is top-notch and consistently updated. Our monitoring software ensures your business is safe.

Welcome to Working Nets – your virtual IT Department!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

Sources:

Windows 7 Malware Infection Rates Soar

 

Cybersecurity News: The Current State of the Cybersecurity Act of 2012

Tags: , , , , , , , , , , , Computer Security Baltimore, Explanations, Politics
The Cybersecurity Act of 2012: “To enhance the security and resiliency of the cyber and communications infrastructure of the United States.”

As you may or may not know, The Cybersecurity Act of 2012, sponsored by Joseph Lieberman (I–CT) and Susan Collins (R–ME), was defeated in the Senate after failing to gain the 60 votes necessary to move the bill past cloture and go up for a full vote. Obviously, the Act is still not ready, at least in the eyes of the Senate. And Senator Al Franken (D-Minn), a strong proponent for national cybersecurity, agrees. But he also acknowledges that something must be done.

“News reports and experts confirm that our nation’s critical infrastructure-such as our water systems, our power grid, and so forth-are vulnerable to attacks from hackers and foreign governments,” said Sen. Franken. “…Our nation needs to respond to those threats.”

Luckily, Franken has a solution. Rather than scrapping the Cybersecurity Act of 2012 all together, Franken believes it can be amended.

“The Cybersecurity Act is not perfect, but when it comes to striking a balance between cybersecurity and privacy and civil liberties, it is the only game in town,” said Sen. Franken. “Unfortunately, it’s hard to write a good cybersecurity bill-because when you try to make it easier for the government or Internet companies to detect and stop the work of hackers or other bad actors, you often end up making it very easy for those same entities to snoop in on the lives of innocent Americans.”

Franken has proposed several amendments that would remove provisions found in Section 701 of the Cybersecurity Act of 2012 that allow Internet Service Providers (ISPs) the authority to monitor and take actions against their users. It is the Senator’s hope that these amendments will alleviate many of the issues that his fellow Senators have with the Act.

“And I hope that my colleagues here in the Senate will join me in passing this amendment,” added Sen. Franken.

If you have any questions about Cybersecurity, please contact Working Nets by calling (443) 992-7394 or visit WorkingNets.com today!

Welcome to Working Nets – your virtual IT Department!

At Working Nets, we support your business by providing top-notch Information Technology (I.T.) services to companies like yours: Companies that don’t need full-time I.T. services, but do need someone to turn to, when they are having a problem. We provide services like Network Design, Monitoring and Maintenance. We troubleshoot technical issues when they arise, and give you options for solving them. We help you use your technology investment to achieve your business goals.

At Working Nets, our focus is on your needs!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

Sources:

Sen. Franken: Improved Cybersecurity Bill Will Better Protect Privacy, Civil Liberties, but Still Needs Work

Franken Amendment Would Remove Worst Part of Cybersecurity Bill

 

Cybersecurity News: Microsoft PCs are infected before reaching Consumers

Tags: , , , , , , , , , , , Computer Security Baltimore, IT Tips Baltimore

It has not been a good couple of weeks for Microsoft. First, they discovered that Hackers had found a Security Hole in Internet Explorer. Now, the computer company has discovered that many of their PCs and laptops made in China were embedded with malicious software before ever reaching the consumer. The computer virus allows hackers to switch on a microphone or Webcam, record keystrokes, and access login credentials and online bank accounts.

And because computer companies rely on such a long and complex supply line, the malicious software could have been uploaded at any point, something Richard Domingues Boscovich, the assistant general counsel for the Microsoft Digital Crimes Unit, called “especially disturbing.”

“It’s one of the toughest cybersecurity challenges out there,” said Tom Kellermann, vice president of cybersecurity at Trend Micro. “There’s not really a solution unless you start to only build computers in the USA again.”

This isn’t the first time this has happened either. In 2008, the Defense Department and Federal Aviation Administration unknowingly purchased counterfeit Cisco routers, which were pre-loaded malicious software. FBI investigators found the routers allowed hackers to “gain access to otherwise secure systems.”

Then in May, the Senate Armed Services Committee released  a report citing 1,800 cases of counterfeit electronics from China, electronics used in the Air Force’s largest cargo plane and Special Operation helicopters.

“Companies are in a competitive dogfight to make products cheaper and hit the market faster,” said Scott Aken, a former FBI special agent who dealt with cyber counterintelligence. “They’re not spending time or money to ensure those products they are sourcing from overseas are devoid of counterfeits.”

So what are consumers to do?

Boscovich offers this simple advice: Consumers can often spot dangerous counterfeit technology if the deal “appears too good to be true.”

“However, sometimes people just can’t tell, making the exploitation of a broken supply chain an especially dangerous vehicle for infecting people with malware.”

If you have any questions about Cybersecurity, please contact Working Nets by calling (443) 992-7394 or visit WorkingNets.com today!

Welcome to Working Nets – your virtual IT Department!

At Working Nets, we support your business by providing top-notch Information Technology (I.T.) services to companies like yours: Companies that don’t need full-time I.T. services, but do need someone to turn to, when they are having a problem. We provide services like Network Design, Monitoring and Maintenance. We troubleshoot technical issues when they arise, and give you options for solving them. We help you use your technology investment to achieve your business goals.

At Working Nets, our focus is on your needs!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

Sources:

Pre-Infected PCs Expose Flaws In Global Supply Chain