March 2015
In This Issue...

"As a business owner, you don't have time to waste on technical and operational issues. That's where we shine! Call us and put an end to your IT problems finally and forever!"
– JR Hazenfield,
Professional
Telecommunications
Services, Inc.
|
3 Easy Protections You Need To Put In Place NOW To Protect Your Bank Account From Cybercrime Schemes
82,000. Do you know what that number is? It's the number of NEW
malware threats that are being designed and launched online EVERY
SINGLE DAY. That may explain why 74% of small businesses report
having experienced online bank fraud in a recent survey by the Ponemon
Institute, and why they're calling 2014 "A Year of Mega-Breaches."
There's no doubt about it: cybercrime is a thriving business that is
on the rise; and simply having an antivirus software and firewall isn't
enough anymore to protect yourself. Worse yet, businesses do NOT enjoy
the same protections as consumers. If money is wired from your account
or drawn by ACH draft, the likelihood of getting that back is SLIM and
the bank is not responsible for replacing funds stolen. If you want to
avoid being a victim, here are three simple precautions you can take right
now.
-
Lock Down Your Environment. If you do online banking, ONLY
access your account via a dedicated PC that you don't use for
accessing social media sites, web browsing or e-mail. This will limit
the chances of a keylogger (a malware program that records your
keystrokes) from being installed on your PC to grab your keystrokes.
-
Get Notified. Sign up for e-mail notifications for withdrawals.
Many online banking services will allow you to sign up for e-mail
alerts whenever a certain amount of money is withdrawn from
your account. Since speed of notification is CRITICAL to stopping a
cybercriminal from robbing you blind, this could give you the quick
notification that a large sum of money has been withdrawn. Notify
your bank IMMEDIATELY of any suspicious activities.
-
Have a Unified Threat Management (UTM) in place. Cybercriminals are far more sophisticated in their attacks and can easily bypass traditional firewalls and antivirus software. With the proliferation of
mobile devices accessing your network and the growing use of cloud applications and free social media web sites (Twitter, Facebook and even online reviews), the chances of an employee accidentally infecting your network are growing exponentially. Don't bring a knife to a gunfight; call us today to discuss how we can protect you.
|
10 Secret Tricks, Tools And Cool Features Hiding In Google
If you use Google for searching the web,
you're going to love these 10 features, available
to everyone that you probably didn't know about.
The best way to find these is to simply search for
the item in Google.
1. Google's Dictionary Extension for Chrome.
Add this plug-in and you can highlight words
on a web page to look them up and see how
they're pronounced without leaving the page!
2. Google Forms. Need to create a quick survey?
Poll your friends on where to go to dinner?
Collect RSVP information to organize a party?
Google Forms will allow you to do all of this
quickly and for free.
3. Google Keep. This free productivity app is
similar to Evernote, allowing you to keep
lists, web pages, documents and information
organized on the web and on your smartphone.
4. Google Public Data Explorer. This free
application makes large datasets (like world
development indicators or unemployment
statistics) easy to explore, visualize and
communicate.
5. Google Fonts. Want a unique font to use
on your web site?
|
This public database of typefaces is free and offers a myriad of font
choices and selections.
6. Google Mortgage Calculator. Want to know if
that new house is within your budget? Google
mortgage calculator can quickly calculate a
monthly payment for your home for free.
7. Google Sky. For my fellow "trekkies" and sci-fi
fans, check out Google Sky. From this page
you can view celestial objects, including stars,
galaxies, planets and tons of other cool photos
taken from space.
8. Google Unit Conversions. Need to convert
kilometers into miles or vice versa? Just type
in "unit converter" and Google will pop up a
web-based converter that will do the math for
you in seconds.
9. Google Flight Tracker. Type in any flight
number and Google will report its status.
10. AdBlock. This is the most popular Chrome
extension out there. AdBlock, which works
in Chrome, Opera and Firefox, will remove
banner advertisements that can make reading
some sites difficult.
|
FREE Report: What Every Small Business Owner Must Know About Protecting And Preserving Their Company's Critical Data And Computer Systems
|
|
This report will outline in plain, non-technical English common
mistakes that many small business owners make with their
computer network that cost them thousands in lost sales,
productivity and computer repair bills, as well as providing an
easy, proven way to reduce or completely eliminate the financial
expense and frustration of these oversights.
|
NEC Univerge E911 Security Notification At A Glance
• Pinpoints exact location
of 911 caller
• Notifies on-site staff in
real-time
•Updates the Automatic
Location Information
(ALI) database
• Speeds on-site response
through real-time
monitoring of
911 calls for all users
• Seamlessly integrates
with NEC UNIVERGE
Communications
Analyst
• Meets E911 compliance
legislation
|
Is Your Multi-Site PBX E911 Compliant?
Overview
Providing a safe, secure environment is one of a business's most important responsibilities.
One of the first steps in the process to keep people safe and secure during an emergency is
providing a 911 system that accurately pinpoints the caller's location and directs appropriate
emergency response resources to the scene.
With NEC's UNIVERGE E911 Security Notification (ESN)
application businesses will have the tools necessary to protect their most valuable asset –
their people. ESN pinpoints a 911 caller's location and passes that information along to the
Public Safety Answering Point (PSAP). This
reliable, automatic transfer of information helps businesses provide vital, lifesaving
information to the 911 public safety network while notifying the appropriate on-site
personnel that an emergency call is in progress; an immediate and accurate response results.
E911 Security Notification is a comprehensive, cost-effective solution for small to medium
enterprises with multiple sites / campuses / buildings. This solution is ideal for
organizations with single or multiple locations.
Solution
Pinpoints Exact Location of Caller
E911 Security Notification provides the exact location of the 911 call—not just a billing
address—to be passed to a 911 answering point. In cases where the caller cannot verbally
provide this information, ESN software enables first responders to quickly reach the
emergency and avoid confusion about where to go.
UNIVERGE® E911 Security Notification Notifies On-Site Staff In Real-Time
ESN's software provides real-time, on-site notification through 24x7 monitoring when a 911
call is dialed. With this feature, on-site designated personnel are alerted of the event through
a screen-pop or audible message played through their PC speakers. This provides them with
a quick snapshot of what's happening so that they can mobilize on-site resources to provide
immediate assistance—instead of just waiting for the 911 team to arrive. This kind of alert
saves precious time in getting help to those that need it.
Locations on the network such as staff at security desks, guard shacks, attendant locations, or
any other location in the enterprise can be easily alerted. By alerting the appropriate
personnel, it enables them to meet and direct first responders to the exact location of the
emergency, provide first responders access to secured locations or
provide other assistance as deemed necessary. ESN also provides additional alert methods
through its ability to
send notifications via email or NEC's Communications Server's overhead paging feature that
can broadcast pre-recorded messages.
Meets E911 Compliance Legislation
It is important to understand how compliance legislation fits into the E911 picture. Most
locales within the United States require that all organizations provide E911 service. NEC has
extensive experience in helping customers comply with both state and federal regulations.
E911 Security Notification meets E911 compliance legislation for Analog, TDM as well as IP
phones.
|
Are Credit Monitoring Services Worth The Money?
With so much attention on the recent data
breaches, consumers and business owners are
concerned about the security of their own personal
information. When your credit card information
is out there and you've entrusted it with other
businesses, you want to know it is secure and is not
going to wind up in the hands of identity thieves.
Many consumers and businesses are turning to
credit monitoring services, hoping to gain an extra
level of protection and additional peace of mind
when sharing credit card information online and
with other businesses. The question is, are these
services really worth it? How much protection do
they offer?
The answer is: it varies.
Up front, there are services that claim to offer
protection from identity theft and fraud. The
problem is, that's not how they work. They do offer
some protection, but it comes down to how you
use the service. Typically, these services will notify
|
you when a new line of credit is opened in your
name (or an attempt is made). Some will notify you
if a certain limit is exceeded.
The problem is, like cyber-breach insurance, credit
monitoring services aren't actively protecting
you. They aren't going to do anything to stop
an identity thief from taking and using your
personal information. As the name suggests,
they merely monitor activity and notify
you. Ultimately, the success of the service is
dependent on how quickly you act when you are
notified of fraudulent activity. It's up to you to
contact your credit issuer and the credit bureaus
to halt and mitigate damage.
|
|