Tag IT Department

Tag IT Department

Different Types of Data Backups for Your Business

Tags: , , , , , Disaster Recovery

Last week we helped you make the data backup plan for your company. However, while you’ve come up with a plan of what needs to be backed up monthly, daily, weekly, and ever single time it’s edited, you haven’t figured out how best to back it up.  When it comes to the different types of data backups, it can get really confusing. That’s why, this week, Working Nets has a guide to the different types of data backups available, and brief overviews of their advantages and disadvantages.

Magnetic Tape

Magnetic tape is an older solution and is rapidly losing relevancy in today’s technology. It can backup more, faster, then secondary hard drives, for cheaper, but it’s rapidly losing it’s slight edge in this department. Also, to backup and retrieve data from backup you have to run the tap sequentially. Which means you don’t pick and choose the data you retrieve, it has to all be retrieved, and then you sort through the data. However, for the time being, magnetic tape is the best for backing up large amounts of data quickly, and retrieving them quickly. Read More

How Can I Create A Secure Password? Tips from Your Baltimore IT Company

Tags: , , , , , , , , Computer Security Baltimore

Creating a secure password isn’t that difficult, but why do so many people have a hard time doing that? Simple, because they don’t want to have to remember the difficult password. This is why so many people use ‘password’ as their password. It is easy to remember.

However, if a website is asking you to create a password, it is important that you create a strong password; especially, if you want to keep your sensitive information private (Bank Account, Facebook, Twitter, etc.). Below, your Baltimore IT company has compiled a list of tips for having a secure password.

  • It should be at least eight characters long
  • Does not contain your name or the username
  • Is not a complete word, use a phrase instead
  • Is not the same as all of your other passwords
  • Contains:
    • One uppercase letter
    • One lowercase letter
    • A number
    • A unique symbol (!@#$%)

If you feel you must write down your password in order to remember it, make sure you don’t label it as your password, and keep it in a safe place. The last thing you want is to become the victim of your accounts being hacked. The more confusing your password is, the safer it is.

Welcome to Working Nets – your virtual IT Department in Baltimore!

At Working Nets in Baltimore, we support your business by providing top-notch Information Technology (I.T.) services to companies like yours: Companies that don’t need full-time I.T. services, but do need someone to turn to, when they are having a problem. We provide services like Network Design, Monitoring and Maintenance. We troubleshoot technical issues when they arise, and give you options for solving them. We help you use your technology investment to achieve your business goals.

At Working Nets, our focus is on your needs!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

What’s That Strange Charge On My Phone Bill? The Missed Call Scam

Tags: , , , , , Computer Security Baltimore

Scammers are always coming up with new ways to trick you out of your money. Their latest plan involves the missed call function on your cell phone. In short, a scammer will call your phone and then hang up immediately. On your phone, you will see a missed call and because you are curious you will call back. Then the scammer charges you for the call for every minute you’re on the line. This scam is called the “One Ring Scam.”

The trick here is when the scammer calls you, your phone only rings once. So you still have the missed call notification but they don’t have to pay for long distance charges.

When you call the number back, you get charged once to connect to the call, and then additional charges incur for every minute you’re still on the phone.

This one is fairly easy to avoid getting sucked into, but below are a list of tips so you can avoid getting scammed

  • If you don’t know the number, don’t call it back
  • Google the number before calling it back, if it’s a scam someone will identify the number as a scam and save you the fees.
  • Check your phone bill for charges that you believe are fraudulent.

Welcome to Working Nets – your virtual IT Department!

At Working Nets, we support your business by providing top-notch Information Technology (I.T.) services to companies like yours: Companies that don’t need full-time I.T. services, but do need someone to turn to, when they are having a problem. We provide services like Network Design, Monitoring and Maintenance. We troubleshoot technical issues when they arise, and give you options for solving them. We help you use your technology investment to achieve your business goals.

At Working Nets, our focus is on your needs!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

Source:

http://techcrunch.com/2014/02/02/missed-call-scam/?ncid=tcdaily

Is There An Unexplained Charge on your Credit Card? You May Be a Victim of Fraud!

Tags: , , , , Computer Security Baltimore

Unfortunately, credit card fraud has become increasingly more common recently. Target was hacked and so are countless other websites and apps. Last week, the Better Business Bureau issued a fraud alert for people to check their bank statement for unexplained charges of $9.84. When scammers steal your credit card information, they test your account by charging a relatively small amount and see if you detect it. If the charge goes undetected by you, the scammers now have access to your card and will begin racking up other charges as time goes on.

So How Do I Fix This?

Fortunately for you, if you noticed this charge then you are in good shape. Simply call your bank and report the fraud. If your bank does not offer you a new card, simply request one to prevent this from happening to you again.

It is important to be diligent in checking over your bank statements and make sure that all charges that appear are ones you have personally authorized. Unfortunately, scammers are not a thing of the past and your credit card information will always be at risk but as long as you know how to search your bank statements, you should be in good shape from a potentially disastrous financial scam.

Welcome to Working Nets – your virtual IT Department!

At Working Nets, we support your business by providing top-notch Information Technology (I.T.) services to companies like yours: Companies that don’t need full-time I.T. services, but do need someone to turn to, when they are having a problem. We provide services like Network Design, Monitoring and Maintenance. We troubleshoot technical issues when they arise, and give you options for solving them. We help you use your technology investment to achieve your business goals.

At Working Nets, our focus is on your needs!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

Source:

http://www.huffingtonpost.com/2014/01/27/984-charge-credit-debit-card-fraud_n_4675054.html?ncid=edlinkusaolp00000009

How Can Cloud Computing Benefit Me?

Tags: , Computer Security Baltimore

Cloud computing is one of the big buzzwords right now. But why? Clearly if everyone is talking about it then there must be something to it. Cloud computing offers many benefits to users.  Whether you know it or not, you may already be using cloud based storage. That photo you just uploaded to Facebook, that is stored in the cloud so you can share the content with other members.

The benefits to cloud computing are very straightforward. Your data becomes accessible from anywhere if you have the correct permissions. Additionally, data in the cloud is safer, it requires security backups and firewalls to protect your sensitive data from prying eyes.

In short, cloud computing is beneficial regardless of the reasons which you chose to use it and it also provides a much greater accessibility rate for its users.

At Working Nets, we were founded to provide small businesses in Baltimore and the surrounding area, businesses like yours, with the expert information technology support they need to not only survive, but thrive. Our disaster recovery services help ensure your vital business data is kept safe and secure, providing you with a peace of mind that is unequalled.

Did you know that 43% of companies that experience major data loss never recover? 51% close within 2 years. Don’t let this happen to you. Pick up the phone, call Working Nets today, and stop playing Russian roulette with your business.

If you have any questions about cloud computing, please contact Working Nets by calling (443) 992-7394 or visit WorkingNets.com today! You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

Source:

https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/Dataprotection/QA/QA10

Gmail Smart Labels for Social Updates and other Email Helpers

Tags: , , , , Explanations, IT industry, IT Tips Baltimore, Review / Opinion

Are you tired of weeding through a seemingly endless string of emails? Of course you are. We all are. But what other options do we have? Well, now thanks to Google’s new Smart Labels, you are able to filter your email more efficiently, allowing you to receive only the content you want to read!

Enabling Google Smart Labels

  1. Go to your Gmail settings menu
  2. Click “Labs”
  3. Enable Google Smartlabels

Smart Labels automatically categorizes bulk, notification, forum messages, and more, leaving your Inbox free from unwanted clutter.

Other Email Helpers

  • Boomerang: Boomerang gives you control of when you send and receive email messages.
  • Rapportive: Rapportive gives you immediate access to the biographical information of your contacts, including what people look like, where they’re based, where they work, and more.
  • Mailstrom: Mailstrom is one of the smartest and fastest ways to clean out your inbox, deleting or archiving hundreds or even thousands of messages at once. “I’ve cleared out 60% of my mailbox already,” said Working Nets own David Spigelman.

If you have any questions about Google Smart Labels and other Email Helpers, please contact Working Nets by calling (443) 992-7394 or visit WorkingNets.com today!

Troubleshooting Services: Productivity is crucial in any business. When trouble appears, we’ll figure it out and provide the right solution that gets your business up and working again.

Welcome to Working Nets – your virtual IT Department!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

 

Cybersecurity News: Microsoft PCs are infected before reaching Consumers

Tags: , , , , , , , , , , , Computer Security Baltimore, IT Tips Baltimore

It has not been a good couple of weeks for Microsoft. First, they discovered that Hackers had found a Security Hole in Internet Explorer. Now, the computer company has discovered that many of their PCs and laptops made in China were embedded with malicious software before ever reaching the consumer. The computer virus allows hackers to switch on a microphone or Webcam, record keystrokes, and access login credentials and online bank accounts.

And because computer companies rely on such a long and complex supply line, the malicious software could have been uploaded at any point, something Richard Domingues Boscovich, the assistant general counsel for the Microsoft Digital Crimes Unit, called “especially disturbing.”

“It’s one of the toughest cybersecurity challenges out there,” said Tom Kellermann, vice president of cybersecurity at Trend Micro. “There’s not really a solution unless you start to only build computers in the USA again.”

This isn’t the first time this has happened either. In 2008, the Defense Department and Federal Aviation Administration unknowingly purchased counterfeit Cisco routers, which were pre-loaded malicious software. FBI investigators found the routers allowed hackers to “gain access to otherwise secure systems.”

Then in May, the Senate Armed Services Committee released  a report citing 1,800 cases of counterfeit electronics from China, electronics used in the Air Force’s largest cargo plane and Special Operation helicopters.

“Companies are in a competitive dogfight to make products cheaper and hit the market faster,” said Scott Aken, a former FBI special agent who dealt with cyber counterintelligence. “They’re not spending time or money to ensure those products they are sourcing from overseas are devoid of counterfeits.”

So what are consumers to do?

Boscovich offers this simple advice: Consumers can often spot dangerous counterfeit technology if the deal “appears too good to be true.”

“However, sometimes people just can’t tell, making the exploitation of a broken supply chain an especially dangerous vehicle for infecting people with malware.”

If you have any questions about Cybersecurity, please contact Working Nets by calling (443) 992-7394 or visit WorkingNets.com today!

Welcome to Working Nets – your virtual IT Department!

At Working Nets, we support your business by providing top-notch Information Technology (I.T.) services to companies like yours: Companies that don’t need full-time I.T. services, but do need someone to turn to, when they are having a problem. We provide services like Network Design, Monitoring and Maintenance. We troubleshoot technical issues when they arise, and give you options for solving them. We help you use your technology investment to achieve your business goals.

At Working Nets, our focus is on your needs!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

Sources:

Pre-Infected PCs Expose Flaws In Global Supply Chain

Cybersecurity News: Hackers have found a Security Hole in Internet Explorer

Tags: , , , , , , , , , , , Computer Security Baltimore, IT industry, IT Tips Baltimore

It was recently reported that security researcher Eric Romang of Zataz.com discovered a major cybersecurity issue with Internet Explorer (IE) versions 6, 7, 8, and 9. The popular Internet browser has a major hole, a hole that hackers have already discovered.

The fresh “zero day” vulnerability allowed cyber attackers to install malicious software – a form of the old Poison Ivy Trojan – on Windows computers. This allowed the hackers to take control of the victim’s computer.

It is thought that the hackers behind the IE attack may also be the group responsible got last month’s exploitation of Oracle’s Java browser plug-in.

Microsoft Responds to the Cybersecurity Threat

Microsoft quickly responded with a security advisory, including an extensive list of work-arounds. Unfortunately for IE users, these work arounds are somewhat burdensome.

“I would recommend not using Internet Explorer until this issue is patched,” Sophos’ Chet Wisniewksi tells me. “While the exploit is not in widespread use, it could be integrated into popular attack kits like the Blackhole Exploit Kit any time now.”

The Solution: Make the switch to another browser, like Google Chrome, Mozilla Firefox, or Opera. You can always come back to IE after Microsoft issues a patch.

If you have any questions about Cybersecurity, please contact Working Nets by calling (443) 992-7394 or visit WorkingNets.com today!

Welcome to Working Nets – your virtual IT Department!

At Working Nets, we support your business by providing top-notch Information Technology (I.T.) services to companies like yours: Companies that don’t need full-time I.T. services, but do need someone to turn to, when they are having a problem. We provide services like Network Design, Monitoring and Maintenance. We troubleshoot technical issues when they arise, and give you options for solving them. We help you use your technology investment to achieve your business goals.

At Working Nets, our focus is on your needs!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

Source:

Hackers Just Found a Big Hole in Internet Explorer. Should You Switch Browsers?

Olympic-Themed Internet Phishing Scams :: Cybersecurity Tips

Tags: , , , , , , , , , , , Computer Security Baltimore, IT industry, IT Tips Baltimore

Every four years, the best athletes gather from around the globe to compete in the Olympics. Unfortunately, the Olympics also provide Internet scammers with a new outlet to try and phish information from unsuspecting and trustworthy individuals.

What is Phishing?

Phishing refers to attempting to acquire personal information – such as usernames, passwords, and credit card information – and money by masquerading as a trustworthy entity.

Olympic-Themed Phishing Scams

  • London 2012 Ticketing Team: This phishing scam sees scammers pose as ticketing officials offering unsuspecting individuals with an once-in-a-lifetime opportunity to purchase Olympic tickets that have been made available because of a previous bidder’s inability to pay for them. However, unlike the previous bidder, you are expected to pay upfront. This is why the original email is followed by a phone call asking for credit card information.
  • London Olympic Cash Officer: Unsuspecting individuals are sent an email from the “London Olympic Cash Officer” stating that the recipient has been randomly selected to receive a cash prize of 1.6 million GBP. However, to receive the payment the individual must provide personal information.
  • Dr. Beavis: Unsuspecting individuals are sent an email (signed by Dr. Beavis) stating that they, along with 6 other individuals, have been randomly selected as the winners of 7 million GBP. And, of course, they must provide personal information to claim their prize.
  • You are needed … Get Back to Us: Unsuspecting individuals are sent an email headed “You are needed … Get Back to Us.” It informs the recipient that they are needed to participate in the Olympics as a coordinator or event staffer. The individual is then directed to a site where they must input personal information and provide payment for the placement services.
  • Ring Steward: Unsuspecting individuals are sent an email (or letter) informing them that they have been selected to be a ring steward in the Olympics. Recipients are asked to call a phone number for additional details. And guess what? They are then asked to provide personal information.
  • Text Message Scams: Yep, phishing scams can include text messages, as well. This phishing scam involves a text message stating that the recipient has won 300,000 pounds in the London 2012 lottery. Recipients are then asked to call a phone number and provide personal information to claim their prize.

And this is just the beginning!

If you have any questions about Internet Phishing Scams and IT Security, please contact Working Nets by calling (443) 992-7394 or visit WorkingNets.com today!

Welcome to Working Nets – your virtual IT Department!

At Working Nets, we support your business by providing top-notch Information Technology (I.T.) services to companies like yours: Companies that don’t need full-time I.T. services, but do need someone to turn to, when they are having a problem. We provide services like Network Design, Monitoring and Maintenance. We troubleshoot technical issues when they arise, and give you options for solving them. We help you use your technology investment to achieve your business goals.

At Working Nets, our focus is on your needs!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

Sources:

10 Olympics-Themed Phishing Scams To Avoid At All Costs

Outsourced Preventative Computer & Network Maintenance Program

Tags: , , , , , , , , , , , Computer Security Baltimore, IT industry, IT Tips Baltimore

Productivity is crucial in any business.  For this reason, we at Working Nets have put together a preventative maintenance program to analyze your computer systems for potential problem areas to keep your business running smoothly, reducing costly downtime. And by reducing downtime, your office remains more productive, more often.

The Benefits of Working Nets’ Preventative Maintenance Program

  • Productivity: As we have already touched on, Working Nets can identify and remedy problems before they result in downtime, meaning your employees can remain productive.
  • Minimize Breakdowns: Besides keeping productivity high, preventative maintenance helps eliminate most costly breakdowns.
  • Keep Data Secure: You rely on your business information to stay profitable. So doesn’t it make sense to do whatever you can to protect your business critical information?
  • Optimize Machine Performance: Regular maintenance can help you get the most out of your machines.
  • Reduce Intrusion: Hackers can be a business’s worst nightmare. Is your network secure?

Performing proactive maintenance, by taking care of the overall health of your network,  is the most cost-effective and efficient way to prevent system problems and minimize breakdowns.

If you have any questions about Prevetative Maintenance or Outsourced IT Services, please contact Working Nets by calling (443) 992-7394 or visit WorkingNets.com today!

Welcome to Working Nets – your virtual IT Department!

At Working Nets, we support your business by providing top-notch Information Technology (I.T.) services to companies like yours: Companies that don’t need full-time I.T. services, but do need someone to turn to, when they are having a problem. We provide services like Network Design, Monitoring and Maintenance. We troubleshoot technical issues when they arise, and give you options for solving them. We help you use your technology investment to achieve your business goals.

At Working Nets, our focus is on your needs!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.