443-992-7394

Disaster Recovery Services, from Working Nets in Baltimore

As a smart business owner, you know you need to protect your business. You backup your data in multiple locations and invest in security technology both for your network as well as for your physical location. However, there are some things that will catch your business by surprise. Local weather emergencies can shut down access to your building. Power outages can disrupt your systems and networks. Hard drives crash and networks are hacked. Natural disasters like floods or fires can damage your building. Not only does your business suffer in the short term as it rebuilds, it suffers in the long term you lose competitiveness in the marketplace due to the time and resources it takes to rebuild. Your reputation can be damaged, and customer confidence can erode.

In order to ensure that your business can continue to function in the event of an emergency, Working Nets offers business continuity and disaster recovery services. Our engineers will perform a comprehensive audit and look for additional ways to protect both your network and your physical business. Off-grid power sourcing allows you to continue operations even when the main grid goes down. We will implement risk reduction strategies for your network and advanced data protection and storage methods. We will assess the feasibility of implementing a telework program so your employees can work from home in the event that the office can’t be opened. Our action plans will help you get through a crisis, and we will address the legal exposure, regulatory compliance problems, and public relations issues that can come about when your business hits and unanticipated speed bump.

It does not matter if you are a new startup or an established business, Working Nets, your virtual IT department is here to help you succeed.

Schedule a consultation with us today to identify how to reach your target audience the right way.

Welcome to Working Nets – your virtual IT Department!

At Working Nets, we support your business by providing top-notch Information Technology (I.T.) services to companies like yours: Companies that don’t need full-time I.T. services, but do need someone to turn to, when they are having a problem. We provide services like Network Design, Monitoring and Maintenance. We troubleshoot technical issues when they arise, and give you options for solving them. We help you use your technology investment to achieve your business goals.

At Working Nets, our focus is on your needs!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

Source

http://www.infoworld.com/d/the-industry-standard/global-it-spending-outlook-better-subpar-2014-forrester-says-233308

Hackers Are At It Again – Their Target, Snapchat

Recently a major security flaw has been exposed in the picture messaging app, Snapchat. If you are unfamiliar, Snapchat is a mobile only app for sending pictures and videos that self-destruct after ten seconds. The point of the app is to be able to share images and videos without wondering who else will see them.

A group of hackers recently discovered a flaw in the app’s security and threatened to expose it if the founder of the app did not attempt to fix it. The app was not fixed and on December 31, 2013 SnapchatDB.info was born. On the site, there is a list of 4.6 million usernames and phone numbers of people that use Snapchat.

So you use Snapchat and you’re worried – now what?

Fortunately, the hackers don’t plan on doing anything malicious with the information they uncovered. But if you want to see if your personal information is safe. Head over to http://lookup.gibsonsec.org/ and type in your username. It will search the database to see if your username and phone number has been compromised.

If your information has been shared, the safest thing you can do is delete your account. Unfortunately, it will not remove your phone number from the website though.

Welcome to Working Nets – your virtual IT Department!

At Working Nets, we support your business by providing top-notch Information Technology (I.T.) services to companies like yours: Companies that don’t need full-time I.T. services, but do need someone to turn to, when they are having a problem. We provide services like Network Design, Monitoring and Maintenance. We troubleshoot technical issues when they arise, and give you options for solving them. We help you use your technology investment to achieve your business goals.

At Working Nets, our focus is on your needs!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

Source:

http://techcrunch.com/2013/12/31/hackers-claim-to-publish-list-of-4-6m-snapchat-usernames-and-numbers/?utm_source=Daily+Skimm&utm_campaign=f5611fb713-daily_skimm&utm_medium=email&utm_term=0_74efee6205-f5611fb713-23660825

Has My Password Been Compromised?

There is a new website which launched recently and the main purpose is to identify if you’ve been pwned.

Pwned is internet slang for the word ‘owned’ and is used frequently to describe dominance over someone regarding the internet.

When your computer has been hacked and your personal data is now available to someone that you did not give consent to having it, that is considered being pwned.  When your data has been compromised, passwords or otherwise, it is best to change your password as soon as possible to protect yourself.

By going to http://haveibeenpwned.com/ and putting in your email address it can check any recent major security breaches and let you know if your account is safe or it has been compromised.

The website lets users know if their passwords were compromised in high-profile attacks against Adobe, Stratfor, Gawker, Yahoo, Pixel Federation, and Sony. All told the website currently scans more than 150 million compromised accounts.

Staying safe online is important and this website is an easy way to keep yourself safe!

Welcome to Working Nets – your virtual IT Deptartment!

At Working Nets, we support your business by providing top-notch Information Technology (I.T.) services to companies like yours: Companies that don’t need full-time I.T. services, but do need someone to turn to, when they are having a problem. We provide services like Network Design, Monitoring and Maintenance. We troubleshoot technical issues when they arise, and give you options for solving them. We help you use your technology investment to achieve your business goals.

At Working Nets, our focus is on your needs!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

Be sure to check out all the information we have to offer about IT Services.

Source:

http://haveibeenpwned.com/

Cybersecurity News: Los Angeles Creates Cyber Security Command Center

Around the world e-security is one of our biggest threats. In Los Angeles, steps are being taken to combat the risks. The Cyber Intrusion Command Center was created to secure all city agencies against cyberattacks. The mayor of Los Angeles wants to make sure that the city is protected from all future potential cyberattacks.

Technology allows the government to be more efficient at a lower cost, but security can be sometimes compromised. That’s where the cybersecurity command center comes in. The purpose of the command center is to protect the computer systems from potential hackers. Federal officials have warned city officials that the next terrorist attack could be through computers as technology continues to be more prevalent in society. The goal of the cybersecurity command center is to fight electronic terrorism.

The center will identify cyberthreats, ensure incidents are quickly investigated and see that information on the threats are sent out.

Welcome to Working Nets – your virtual IT Department!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

Source:

http://www.dailynews.com/government-and-politics/20131030/la-mayor-eric-garcetti-creates-cyber-security-command-center

The Importance Of Virus Protection

Most computer users blindly download, install, and ascribe to an anti-virus program without actually fully understanding the necessity of such software. At Working Nets, we provide top-notch virus protection at affordable prices to ensure your business, files, and computers remain safe and functioning smoothly.

What are threats?

Malware, short for “malicious software,” is the catchall phrase for potentially damaging threats to your computer: viruses, trojan horses, worms, spyware, and the like. Generally this software is created to either disrupt or worse – destroy – files and programs on your computer.

What happens when malware infects your computer?

Without a reliable anti-virus program, your infected computer often becomes unusable, requiring the hard drive to be wiped clean, and your computer’s operating system reinstalled. To avoid lost data and a dysfunctional system, effective malware-combatants are necessary.

What does Antivirus software do?

Antivirus software serves double duty, both removing preexisting malware and working to prevent them from occurring in the first place. Taking the precaution against harmful viruses will save you money and time in the long run, protecting your computer and by extension, your business. Let the Information Technology professionals at Working Nets, Inc. help you do just that, by outsourcing your computer support needs from our company.

If you have any questions about Antivirus Software, please contact Working Nets by calling (443) 992-7394 or visit WorkingNets.com today!

Welcome to Working Nets – your virtual IT Department!

At Working Nets, we support your business by providing top-notch Information Technology (I.T.) services to companies like yours: Companies that don’t need full-time I.T. services, but do need someone to turn to, when they are having a problem. We provide services like Network Design, Monitoring and Maintenance. We troubleshoot technical issues when they arise, and give you options for solving them. We help you use your technology investment to achieve your business goals.

At Working Nets, our focus is on your needs!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

Source:

The Importance of Antivirus and Security Software

Phishing Scam Requests Credit Card Info, How to Stay Protected

Unfortunately, scammers are becoming more creative with their attempts to lure you out of your finances. Not only are scammers getting more creative, they are also outsmarting many internet users and getting them to hand over their credit card info. Some common fraudulent behavior includes a scammer using the name of a well-established company such as Microsoft to help establish some trust with the person being scammed.

A common fraud is sent in the form of an email. The email sender claims to be from Microsoft stating that your account is ‘blocked’ and can only be unblocked with a credit card number. The email is actually not from Microsoft. A way to keep yourself safe is to never give out any sort of personal information in an email like this. As a matter of fact, you should not even bother replying. It is best to report the email and contact Microsoft directly if you think there actually is a problem.

At Working Nets, we were founded to provide small businesses, like yours, with expert information technology support they needed. Our disaster recovery services help ensure your vital business data is kept safe and secure!

If you have any questions about Disaster Recovery, please contact Working Nets by calling (443) 992-7394 or visit WorkingNets.com today! You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

Source:

http://blogs.technet.com/b/firehose/archive/2013/08/02/phishing-scam-asks-for-credit-card-info-to-unblock-email.aspx

Hackers Will Be Attacking Windows XP Users in the Next Year

Some people do not like change; they become so accustomed to a certain way of doing things. This is not only in regards to a daily routine, or a habit that needs breaking, but a certain type of software as well. Many Microsoft users still have Windows XP installed on their computers (whether it is a home or office computer), not because it is the best operating system, or even the easiest to use. But because people get comfortable with what is familiar. However this may pose an issue in the next year.

Apparently, hackers are storing information that exploits vulnerabilities in Windows XP and will unleash them when Microsoft stops  supporting the Windows XP operating system next year.

What Does This Mean for Windows XP Users?

If you are a Windows XP user worried about the safety of your computer and documents in the future you are now left with two options.

  1. Accept the change and upgrade to Windows 7 or Windows 8. Both of these operating systems come with a slew of new features and upgrades that you will probably love once you adapt to change.
  2. Pay Microsoft the high premium they are charging to have them continue to support Windows XP so you don’t have to adapt to a new operating system. However this won’t save you. No matter how many future vulnerabilities are discovered, Microsoft will no longer be updating Windows XP. The hackers know this and will begin taking over machines that run Windows XP en masse.
This is not a small problem. There are millions of people still running XP on business machines with critical information on them, or on home machines with all the credit card accounts listed in a file somewhere. These could all become compromised.

Disaster Recovery Services from Working Nets in Baltimore, Maryland

At Working Nets, we were founded to provide small businesses, like yours, with expert information technology support they needed. Our disaster recovery services help ensure your vital business data is kept safe and secure!

If you have any questions about Disaster Recovery, please contact Working Nets by calling (443) 992-7394 or visit WorkingNets.com today! You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

Source:

http://bgr.com/2013/08/13/windows-xp-hacking-vulnerabilities/

Google Apps Break With New Microsoft Office

When it comes to updating your software, newer is always better, right? Unfortunately, that is not the case with Microsoft Office 2013. To be clear there are some great changes that have been made to the software. Microsoft Office 2013 is using a model called ‘click-to-run’ which will stream the application to you instead of storing a huge file on your computer.

Some of the benefits of a click-to-run model are:

  • Quick installation
  • Automatic software updates
  • Virtualized (this will eliminate the risk of getting a virus)

While there are many benefits to using this type of model, the virtualized Microsoft Office presents a problem when it comes to using add-ons. Because the programs are being hosted in the cloud, the add-ons do not have a place to secure themselves to, causing them to break.

At the moment, Google Apps outlook Sync Tool (GAOST) does not work with the click-to-run model. As great as GAOST is, the only way to continue using it is to not update to the newest version of Microsoft Office or to use the web based interface for Outlook, which undermines the purpose of actually using outlook.

Over time, this will get worse, not better. It may be best to leave GAOST behind like the older versions of Microsoft Office.

At Working Nets, we were founded to provide small businesses in Baltimore and the surrounding area, businesses like yours, with the expert information technology support they need to not only survive, but thrive. Our disaster recovery services help ensure your vital business data is kept safe and secure, providing you with a peace of mind that is unequalled.

Did you know that 43% of companies that experience major data loss never recover? 51% close within 2 years. Don’t let this happen to you. Pick up the phone, call Working Nets today, and stop playing Russian roulette with your business.

If you have any questions about cloud computing, please contact Working Nets by calling (443) 992-7394 or visit WorkingNets.com today! You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

Is My Password Secure?

Have you ever asked yourself that? Either that or “How can I make my password secure?” Unfortunately, it’s not quite that simple. Security isn’t really a thing you can do, it is part of an overall plan you set up for your business.

The more convenient something is, the less secure it is, and vice versa.

What can we do?

One fairly simple thing you can do to help protect yourself, and your business, is to improve your password policies. Here are some suggestions for improve your passwords:

  • Use at least 8 characters
  • Use at least 3 of the 4 types of characters (Uppercase, Lowercase, Numeric and Symbol)
  • Change your password at least twice a year. More frequently would be better, but at least twice
  • Don’t keep your passwords where they could be found. Under the keyboard, in your desk drawer, or on your bulletin board all qualify as “where they could be found”
  • Use character substitutions to help make passwords more complex, yet easy to remember
    • becomes @
    • becomes $
    • becomes 1
    • becomes 0
    • becomes 3
    • WorkingNets becomes W0rk1ngN3t$
  • Consider some of the following when making a complex password, to help make it memorable:
    • Passphrases: OnceUponATime
    • Misspellings: SkubaDyver
    • Themes: MilesDavis, SonneyStitt, TheloniusMonk (old Jazz Musicians)
    • Combinations: M1l3$D@v1$, 0nc3Up0n@T1m3, $kub@Dyv3r
  • Wherever possible, don’t share passwords. There are other ways to get into important data, if you have to.

Using some of these basic methods can go a long way towards protecting your business, and yourself, from fraud.

At Working Nets, we were founded to provide small businesses in Baltimore and the surrounding area, businesses like yours, with the expert information technology support they need to not only survive, but thrive. Our disaster recovery services help ensure your vital business data is kept safe and secure, providing you with a peace of mind that is unequalled.

Did you know that 43% of companies that experience major data loss never recover? 51% close within 2 years. Don’t let this happen to you. Pick up the phone, call Working Nets today, and stop playing Russian roulette with your business.

If you have any questions about cloud computing, please contact Working Nets by calling (443) 992-7394 or visit WorkingNets.com today! You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

Source:

Acceptable Internet Use While At Work

Much concern has been raised by many business owners, about how to handle inappropriate Internet use at work. Frankly, business owners probably aren’t concerned enough. Let’s look at some interesting statistics. Now mind you. these statistics are from 2006, but I think we can safely presume the situation hasn’t gotten any better:

Stats are from the LocalTel Business Content Web Filter site.

  • 64% of employees admit to using the Internet for personal interest during working hours.
  • 70% of all pornography traffic occurs during the nine-to-five work day.
  • 60% of all online purchases are made during working hours.
  • 37% of at-work internet users in the US had visited an X-rated Web Site from work.
  • 37% of employees report searching for jobs online at work.
  • 27% of Fortune 500 companies have defended themselves from claims of sexual harassment stemming from inappropriate e-mails and Internet use.

All this results in an estimated 30% – 40% loss of productivity. And this doesn’t even consider the effect of the bandwidth spent on this and other things like streaming audio, which could impact even the performance of the users who are trying to use the Internet for business purposes.

In cases where employees download pirated software, music or videos, the businesses could be found liable – even if they didn’t know about it.

And that’s not even to mention the lawsuits that can be brought, particularly if the material is sexual in nature, against the company if a hostile workplace suit is brought.

Bottom line: You need to protect your business.

How? Well, there are a number of components to this, and technical solutions can play an important part of it. But the most important piece, and the one that most businesses – especially small businesses – don’t do, is to put an Internet Acceptable Use Policy in place. This is a policy that explains what is and is not acceptable, and the consequences of non-compliance. If the employees don’t have such a policy, they can always claim they didn’t know it wasn’t okay. Click here for some sample policies.

Once the policy is made available, there are technologies that can be put into place to help monitor and safeguard access. Systems can be as rigid or flexible as the company feels appropriate, while still being protected from inappropriate use.

Keep your business safe!

Disaster Recovery Services from Working Nets in Baltimore, Maryland

At Working Nets, we were founded to provide small businesses, like yours, with expert information technology support they needed. Our disaster recovery services help ensure your vital business data is kept safe and secure!

If you have any questions about Disaster Recovery, please contact Working Nets by calling (443) 992-7394 or visit WorkingNets.com today! You can also follow us on Facebook, Twitter, LinkedIn, and Google+.