Wilson Technology Group and More

Your One Stop IT and Telecommunications Firm


Leave a comment

The Spotlight On Data Security

Why is there a spotlight on data security?  Data breaches plus identity theft equal liability.  Recall the recent data breach with Target.  Seventy million records were compromised along with 40 million cards.  This resulted in 100+ lawsuits and numerous investigations by AG’s, FTC, and more.

HIPAA related breaches are impacting more than 31  million individuals and includes class action law suits and government investigations.

Florida is the number one state for various types of fraud including identity theft, tax fraud, credit card, phone, utilities and more.  Identity theft equals damages.

Protect yourself.  Hire a reputable vendor to proactively protect your data.

 

For more information, go to http://www.wilsontechgroup.com

Find us on:  Facebook and LinkedIn


Leave a comment

B.Y.O.D. (Bring Your Own Device) – Security Challenges

What are some of the B.Y.O.D security challenges?   They include:

  • personal devices plugged into corporate computer networks via USB
  • personal devices connecting to corporate Wi-Fi networks
  • data exfiltration and data theft from lost or stolen devices a)  applications such as office readers on phones b) dropbox used to sunc documents from a work laptop to a personal phone c) potentially sensitive corporate e-mail left on phones

For more information on this topic, contact your local IT vendor or Wilson Technology Group @  http://www.wilsontechgroup.com


Leave a comment

Windows XP End of Life

April 8th, 2014 is fast approaching.  At this time, no new patches will be released for vulnerabilities discovered.  It is a high probability that attackers have exploits developed,  just waiting to be released.

Windows XP is 12 years old.  What can you do to protect yourself?  Upgrade to Windows 7 or beyond.   If that is not possible, isolate all Windows XP machines from the internet.   This will lessen the risk but risk still exists.

 

For more information, go to:   wilsontechgroup.com

Find us on Facebook and LinkedIn.


Leave a comment

How to Get Rid of Unwated Toolbars

Unwanted toolbars are meant to be short cuts.   The problem is, that the more tool bars you have, the less screen real estate you have.  They also eat up system resources and will slow your system.  They can also interfere with search results.

Internet Explorer- the  one most likely to have unwanted toolbars

1)  Click on wrench or gear

2) Choose internet options

3)  Program tab – manage add-ons

4)  On left, check search providers

5)  To change home page, go back to the general tab

Mozilla Firefox

1)  Click the Firefox button

2)  Choose add-ons, extensions

3)  To reset your homepage, go back to the Firefox button, options, general tab and start up button

Safari

1)  Hit the Cog ico

2Choose preferences

3)  Then, click extensions

Google Chrome

1)  Click the Three-LIned icon

2)  choose settings, extension

3)  Hit trash can or updates

Prevention

1)  Understand the cost of ‘free’

2)  Slow down your clicking – next!

wilsontechgroup.com

Find us on Facebook, LinkedIn

Taken from:  Computer Tips 101


Leave a comment

Remove Unneeded Files

Every time you log on to the Internet or otherwise use your computer, temporary files are generated. They are usually only needed once; however, they don’t disappear on their own. Instead, they accumulate over time until they are cluttering up your computer’s file system and affecting its performance. While it’s possible to remove these files one-by-one, it’s much easier and quicker to use a PC cleaning tool that’s designed for the purpose. Try to do so about one time per week to keep your computer humming along with ease.

 

wilsontechgroup.com

Find us on Facebook and LinkedIn


Leave a comment

Minimum Basics of Network Security

If you don’t use your computer for much more than browsing the web, creating a couple documents, and storing family photos, then you don’t need to do much to keep everything safe.

1. Keep your software up to date: Software updates aren’t just about adding new features, they’re often about patching security holes. Thankfully, the update process is very simple. On Windows, click the Start Menu > All Programs > Windows Update. On Mac, click the Apple menu, and choose Software Update. Both update programs run periodically on their own, but it’s always good to check for a new update if you hear about a security issue.

2. Change your router’s security settings: If you’re still running your router’s default settings, then pretty much anyone can get into your home network and peek in on your computers. It’s not hard to crack WEP passwords or WPA passwords, but you should at least enable a non-default password and network name on your router.

3. Backup your photos and documents: Perhaps you’re not all that worried about what would happen if your $200 computer dies because you don’t do that much with it. Still, chances are you have a resume or some vacation photos on the hard drive. Backing up those few important files is easy. Cloud storage like Dropbox, Box, and Skydrive take very little time to set up. Once you do, your few important documents will be saved online.

4. Prevent downloaded software from installing automatically: Malware often comes in the form of a download you don’t notice happening, but it’s easy to stop. On Windows, disabling AutoRun can stop around 50% of Malware threats, and all you need is the free software Disable Autorun. On Mac, downloads shouldn’t run automatically, but if you’re using OS X Mountain Lion you can set up GateKeeper (System Preferences > Security & Privacy > General) to only allow applications from the Mac App Store for added security.

These are just the basics. If your computer is your livelihood, you need to do a few more things to keep your data secure.

-LifeHacker.Com

www.wilsontechgroup.com

Find us on Facebook and LinkedIn