LAN Logo
 
March/April 2008 
Welcome to LAN Systems eNewsletter
 
Greetings!

We hope you enjoy the first edition of our bi-monthly eNewsletter.  If you have suggestions for articles or other additions to include in future editions, please send an email to [email protected].
 
Thank you for the opportunity to be of service to you and your organization.  If you need anything, just call - we'll be there!
How do I protect myself from computer malware?
Each year the damages from computer malware cost US businesses billions of dollars.  These costs are not only in lost productivity, but permanent loss of critical business data.  Arguably, most if not all infections are preventable with the proper understanding, training and protection.  Don't be the next victim, take the steps now to ensure protection and recovery if the worst should happen.
 
First, let's understand computer malware.  Often the term virus is used to describe all malware.  Technically speaking, there are viruses, Trojan horses, worms and
spyware.  The attack method may differ but they are all malicious.
 
A virus is a program that runs itself and replicates itself.  It can affect files or the boot sector and can delete all your data.  The "Melissa" and "I Love You" viruses
gained global attention.
 
A Trojan horse allows access to your system without your knowledge. Often a Trojan looks like a useful piece of software but in fact they are back or trap doors.
 
Computer worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes.  Once on the system, worms do not need to attach to
another program and can run themselves. Worms cause a denial of service attack making the network unusable.  In general, worms target the network and viruses attack files.
 
Spyware is computer software that is installed on a personal computer to intercept or take control of the PC.  Spyware can hijack a computer and cause serious
problems by gathering and transmitting personal data, loading undesirable software or redirecting browsers to a malicious sites.
 
Protecting yourself -
  1. Use a firewall
  2. Keep your system updated with the latest security patches 
  3. Install and update anti-virus and anti-spyware software
  4. Do not open email from anonymous, unknown or suspicious sources 
  5. Do not download files or software from anonymous, unknown or suspicious sources 
  6. Do not navigate to suspicious or promiscuous websites
  7. Regularly scan your system 
  8. Be sure that you have a good backup so that you can restore your full system if needed 
  9. If you think you have been attacked, act quickly to isolate the infected computer and remove the malware.  Call us at the LAN Systems HelpDesk 770 662-0312 if you have questions or concerns.
We suggest a three prong approach to keep your system safe: educate, protect, monitor. We offer support programs that include protection and monitoring for the various threats.  Please be watchful of the sites you visit, the software you download and the email you open as the threats to your system change daily. 

Understanding Exchange Server

is a messaging and collaborative software product. It allows businesses to be more efficient and productive because all vital information is readily available to all stakeholders. For messaging, the Mail Server supports POP, IMAP, web mail clients and Microsoft Outlook. The Collaboration Server allows users to share information through public folders such as calendars, common address books and much more. With Exchange Server you efficiently manage your day-to-day tasks and keep vital information about your company at your fingertips.

If your information sharing and access demands have increased, consider migrating to Exchange Server.  If you already have Exchange, take another look at the features for built-in protection, anywhere access and operational efficiency to find something that can help you work smarter.

eNewsletter
Join Our Mailing List
In This Issue
Protecting yourself from malware
Understanding Exchange Server
Network group

Solutions and Services to help you grow your business

Strategy and Design Align business and IT strategy
Manage IT costs
Plan for growth
 
Architecture Review
Assess system needs
Define objectives 
Recommend upgrades
 
System Installation
Hardware implementation
Software implementation
LAN / WAN Design & Integration
Turn key installation and testing
 
Support Services
Packages that bundle on-site and remote support with HelpDesk to provide comprehensive service level agreements
Help Desk support (remote access/phone support)
24 x 7 maintenance contracts Hardware & Software support and troubleshooting
Printer repair
 
Internet Solutions
High Speed Business Internet Access
Business Email
Web design & hosting
Wi-Fi HotSpots
 
Structured Cabling
Data cabling
Voice (telephone) cabling
Intercom
Fiber optic specialists
 
Emergency Services
Server, network, hardware Business critical software

Earn free HP products for your office with HP PurchasEdge.

What's in it for you? 

Earn free products-including HP printers, scanners and digital cameras-just for continuing to purchase the same HP supplies you already use. Get instant access to account information, program news and special promotions via a password-protected website, plus a quarterly account summary. Hassle-free invoicing-your participating reseller will send your invoices to HP for you. Receive 150 welcome points for joining.

To sign up call us at 770 662-0312 or email [email protected]