Memo From IT Department
Q2, 2011 

Network Source One is sending this quarterly newsletter brief, 'Memo from IT Department', to our contacts.  It contains short tidbits of current information from the world of I.T. that we hope you find useful.  If you do not want to receive this information from us, please use the safe unsubscribe link below to have your e-mail address removed from our newsletter list.  Thank you for your consideration.

In This Issue
SmartPhone Security Tips
What is "The Cloud?"
Top Social Media Threats To Your Business
5 Ways to Protect Your Network

5 Ways to Protect Information on your SmartPhone


Woman holding SmartphoneProtect your device from prying eyes.

Our mobile gadgets are loaded with PII - personally identifiable information - and other nuggets of private data. Making matters worse, our handheld devices are easy to misplace. (Just ask the Apple employee who left his iPhone prototype at the bar . . . .)

Here's a sampling of the sensitive info that's found on most smartphones:

Passwords to unencrypted websites (Facebook, web-based email providers, etc.)

Wi-Fi network info

Personal information stored in third-party apps

Calendars and contacts

Notes, documents, photographs, and more

In the wrong hands . . . well, let's not think about it. Fortunately, there are a few ways (requiring varying levels of effort) to protect your smartphone - and yourself - from snoops. Here are five ways to protect yourself and your information.

1) Easy. Set up a password lock:

For Android: Go to Menu > Settings > Location & Security

For Blackberry: Go to Options > Security Options > General Settings

For iPhone: Go to Settings > General > Passcode Lock

For added security, you can set up automatic wipe-out protection when someone repeatedly enters the wrong password.

2) Essential. Set up remote data-wipe capability.  If you lose your phone, this allows you to remotely erase data.

For iPhone: Go to Find My Phone

For Android, BlackBerry and Windows Phone: Go to Lookout Mobile Security

3) Best practice. We know, we know. Staying current with OS updates can seem like a fulltime job. But it's worth it. These updates often include important security patches.

4) Smart. Read the fine print before installing third-party apps. What kind of information will these services collect or share? Do an overall "sniff test" before downloading anything, and make sure it comes from a reputable source (i.e., an official app marketplace).

5) Gold-star material. Install a malware detector and firewall (for Android, Windows 7, or Blackberry).


 If you have any questions or would like help securing your business SmartPhones, please contact our support department at



Lost in the Cloud?


Cloud LandscapeOne of the most popular (and overused) terms in the world of technology today is the "cloud".  We have people asking us daily "what exactly is the cloud?"  Well the answer is simple...and growing more complicated all the time.

The cloud started simply as a reference to the internet.  When drawing network diagrams a company's internet connection was depicted by a line connected to a cloud formation. The cloud formation represented the unknown number of paths that data could flow through the world-wide web. 

The majority of uses of the term still equate to the internet.  It is through the Internet that you can use many services or products from various companies (i.e. cloud offerings).

However, as the term becomes more popular, some companies are trying to expand the definition.  For instance, some have used the term "private cloud" in various ways.  It could mean a Wide-Area Network of connections solely owned by a particular company.  It is even being used to describe an internal company network where users get computing resources from a centrally managed location.

There are many great benefits of "Cloud computing", however, there are also limitations and risks.  Don't blindly fly into the cloud without doing your due could encounter some thunderstorms.  If you have any questions about the structure, benefits, limitations, or risks of particular cloud offerings, please feel free to give us a call!

5 Top Social Media Security Threats 


Laptop usersBy Chris Nerney, Network World  

Social media platforms such as Twitter, Facebook and LinkedIn increasingly are being used by enterprises to engage with customers, build their brands and communicate information to the rest of the world.


But social media for enterprises isn't all about "liking," "friending," "up-voting" or "digging." For organizations, there are real risks to using social media, ranging from damaging the brand to exposing proprietary information to inviting lawsuits.

Here are five of the biggest social media security threats:


1. Lack of Social Media Policy

2. Your Employees

3. Social Networking Sites

4. Social Engineering

5. Mobile Apps 


To read the full Network World article, click here:



Protect Your Company's Computer Network




As threats to your network and information become increasingly more complex and malicious, it has become critically important to have a comprehensive and layered protection strategy.  This includes the following: 

1. A properly configured Firewall
2. Current Anti-Virus Software
3. A strong E-Mail Security/Anti-Spam Solution
4. A highly effective Web/Internet Filtering Solution 
5. Critical updates applied to your software as they become available. 


Network Source One offers Remote Update Management and Monitoring of your network for a small monthly fee.  We can help ensure your software and security systems are up to date.  We also can detect problems that develop or pro-actively identify issues that may cause trouble. 


Please contact to find out more about Security Products or our Remote Monitoring service.


If you have any suggestions for news or information that we can present in an upcoming newsletter 'memo', please let us know! 


Thank you.

 Your I.T. Team
Network Source One, Inc.
 (248) 536-1001