Trouble Seeing this Email? Try viewing it in a web browser.

www.ptscinti.com (513) 232–7700

THE IT INSIDER...
Insider Tips To Make Your Business Run Faster, Easier and More Profitably

March 2015

In This Issue...


JR Hazenfield

"As a business owner, you don't have time to waste on technical and operational issues. That's where we shine! Call us and put an end to your IT problems finally and forever!"

– JR Hazenfield, Professional Telecommunications Services, Inc.

3 Easy Protections You Need To Put In Place NOW To Protect Your Bank Account From Cybercrime Schemes

82,000. Do you know what that number is? It's the number of NEW malware threats that are being designed and launched online EVERY SINGLE DAY. That may explain why 74% of small businesses report having experienced online bank fraud in a recent survey by the Ponemon Institute, and why they're calling 2014 "A Year of Mega-Breaches."

There's no doubt about it: cybercrime is a thriving business that is on the rise; and simply having an antivirus software and firewall isn't enough anymore to protect yourself. Worse yet, businesses do NOT enjoy the same protections as consumers. If money is wired from your account or drawn by ACH draft, the likelihood of getting that back is SLIM and the bank is not responsible for replacing funds stolen. If you want to avoid being a victim, here are three simple precautions you can take right now.

  • Lock Down Your Environment. If you do online banking, ONLY access your account via a dedicated PC that you don't use for accessing social media sites, web browsing or e-mail. This will limit the chances of a keylogger (a malware program that records your keystrokes) from being installed on your PC to grab your keystrokes.
  • Get Notified. Sign up for e-mail notifications for withdrawals. Many online banking services will allow you to sign up for e-mail alerts whenever a certain amount of money is withdrawn from your account. Since speed of notification is CRITICAL to stopping a cybercriminal from robbing you blind, this could give you the quick notification that a large sum of money has been withdrawn. Notify your bank IMMEDIATELY of any suspicious activities.
  • Have a Unified Threat Management (UTM) in place. Cybercriminals are far more sophisticated in their attacks and can easily bypass traditional firewalls and antivirus software. With the proliferation of Protect Your Bank Account From Cybercrime Schemesmobile devices accessing your network and the growing use of cloud applications and free social media web sites (Twitter, Facebook and even online reviews), the chances of an employee accidentally infecting your network are growing exponentially. Don't bring a knife to a gunfight; call us today to discuss how we can protect you.

10 Secret Tricks, Tools And Cool Features Hiding In Google

If you use Google for searching the web, you're going to love these 10 features, available to everyone that you probably didn't know about. The best way to find these is to simply search for the item in Google.

1. Google's Dictionary Extension for Chrome. Add this plug-in and you can highlight words on a web page to look them up and see how they're pronounced without leaving the page!

2. Google Forms. Need to create a quick survey? Poll your friends on where to go to dinner? Collect RSVP information to organize a party? Google Forms will allow you to do all of this quickly and for free.

3. Google Keep. This free productivity app is similar to Evernote, allowing you to keep lists, web pages, documents and information organized on the web and on your smartphone.

4. Google Public Data Explorer. This free application makes large datasets (like world development indicators or unemployment statistics) easy to explore, visualize and communicate.

5. Google Fonts. Want a unique font to use on your web site?

This public database of typefaces is free and offers a myriad of font choices and selections.

6. Google Mortgage Calculator. Want to know if that new house is within your budget? Google mortgage calculator can quickly calculate a monthly payment for your home for free.

7. Google Sky. For my fellow "trekkies" and sci-fi fans, check out Google Sky. From this page you can view celestial objects, including stars, galaxies, planets and tons of other cool photos taken from space.

8. Google Unit Conversions. Need to convert kilometers into miles or vice versa? Just type in "unit converter" and Google will pop up a web-based converter that will do the math for you in seconds.

9. Google Flight Tracker. Type in any flight number and Google will report its status.

10. AdBlock. This is the most popular Chrome extension out there. AdBlock, which works in Chrome, Opera and Firefox, will remove banner advertisements that can make reading some sites difficult.


FREE Report: What Every Small Business Owner Must Know About Protecting And Preserving Their Company's Critical Data
And Computer Systems

FREE Report

This report will outline in plain, non-technical English common mistakes that many small business owners make with their computer network that cost them thousands in lost sales, productivity and computer repair bills, as well as providing an easy, proven way to reduce or completely eliminate the financial expense and frustration of these oversights.

Download Your FREE Copy Today!


NEC Univerge E911 Security Notification At A Glance

• Pinpoints exact location of 911 caller

• Notifies on-site staff in real-time

•Updates the Automatic Location Information (ALI) database

• Speeds on-site response through real-time monitoring of 911 calls for all users

• Seamlessly integrates with NEC UNIVERGE Communications Analyst

• Meets E911 compliance legislation

Is Your Multi-Site PBX E911 Compliant?

Overview
Providing a safe, secure environment is one of a business's most important responsibilities. One of the first steps in the process to keep people safe and secure during an emergency is providing a 911 system that accurately pinpoints the caller's location and directs appropriate emergency response resources to the scene.

With NEC's UNIVERGE E911 Security Notification (ESN) application businesses will have the tools necessary to protect their most valuable asset – their people. ESN pinpoints a 911 caller's location and passes that information along to the Public Safety Answering Point (PSAP). This reliable, automatic transfer of information helps businesses provide vital, lifesaving information to the 911 public safety network while notifying the appropriate on-site personnel that an emergency call is in progress; an immediate and accurate response results.

E911 Security Notification is a comprehensive, cost-effective solution for small to medium enterprises with multiple sites / campuses / buildings. This solution is ideal for organizations with single or multiple locations.

Solution
Pinpoints Exact Location of Caller E911 Security Notification provides the exact location of the 911 call—not just a billing address—to be passed to a 911 answering point. In cases where the caller cannot verbally provide this information, ESN software enables first responders to quickly reach the emergency and avoid confusion about where to go.

UNIVERGE® E911 Security Notification Notifies On-Site Staff In Real-Time ESN's software provides real-time, on-site notification through 24x7 monitoring when a 911 call is dialed. With this feature, on-site designated personnel are alerted of the event through a screen-pop or audible message played through their PC speakers. This provides them with a quick snapshot of what's happening so that they can mobilize on-site resources to provide immediate assistance—instead of just waiting for the 911 team to arrive. This kind of alert saves precious time in getting help to those that need it. Locations on the network such as staff at security desks, guard shacks, attendant locations, or any other location in the enterprise can be easily alerted. By alerting the appropriate personnel, it enables them to meet and direct first responders to the exact location of the emergency, provide first responders access to secured locations or provide other assistance as deemed necessary. ESN also provides additional alert methods through its ability to send notifications via email or NEC's Communications Server's overhead paging feature that can broadcast pre-recorded messages.

Meets E911 Compliance Legislation
It is important to understand how compliance legislation fits into the E911 picture. Most locales within the United States require that all organizations provide E911 service. NEC has extensive experience in helping customers comply with both state and federal regulations. E911 Security Notification meets E911 compliance legislation for Analog, TDM as well as IP phones.


Are Credit Monitoring Services Worth The Money?

With so much attention on the recent data breaches, consumers and business owners are concerned about the security of their own personal information. When your credit card information is out there and you've entrusted it with other businesses, you want to know it is secure and is not going to wind up in the hands of identity thieves.

Many consumers and businesses are turning to credit monitoring services, hoping to gain an extra level of protection and additional peace of mind when sharing credit card information online and with other businesses. The question is, are these services really worth it? How much protection do they offer?

The answer is: it varies.

Up front, there are services that claim to offer protection from identity theft and fraud. The problem is, that's not how they work. They do offer some protection, but it comes down to how you use the service. Typically, these services will notify

you when a new line of credit is opened in your name (or an attempt is made). Some will notify you if a certain limit is exceeded.

The problem is, like cyber-breach insurance, credit monitoring services aren't actively protecting you. They aren't going to do anything to stop an identity thief from taking and using your personal information. As the name suggests, they merely monitor activity and notify you. Ultimately, the success of the service is dependent on how quickly you act when you are notified of fraudulent activity. It's up to you to contact your credit issuer and the credit bureaus to halt and mitigate damage.

laptop

cats with tablets