Logo-small1 Tobin Solutions Newsletter
We guarantee a better technology experience!
May 2014

Tobin Solutions provides a full line of computer support and management services 

Logo-small1
- Managed Services
- Software/Hardware
- Networks
- Onsite & Remote
   Support
- System Monitoring
- Virus Protection
- Spam Blocking 
- Remote Servers
- Web & FTP Hosting
- Training
- Disaster Planning
  & Recovery 
  
Contact us for more information
Quick Links
Sevice Assistance
 Tobin Helpdesk
or call
414-443-9999

 pencil-join
Join our Mailing List
  Feel free to share this newsletter with friends and associates

 

  

Tobin Solutions Newsletter

Our goal is to provide information about emerging technology, present money-saving and efficiency-improving ideas, and offer tips that will help you get more from your computers.
 For topic sugestions and feedback, please send an e-mail to:

 

Most Viruses Spread Through Deception

A recent security report noted that 70% of computer infections were transmitted through deception.

 

Computer users were fooled into clicking links and opening attachments in emails and websites that appeared legitimate. In fact, these were carefully crafted malicious fakes that look just like real sites we use every day.

 

Emails and sites that look like something you'd receive from Amazon, FedEx, UPS, ADP, Apple, Google, your bank, your mortgage company, and more lulled people into a false sense of security through familiarity. People clicked or opened an attachment and their computer was infected.

 

Even with the best firewalls and up to date anti-virus and anti-spam software, some users were infected. There is no 100% solution. All platforms including Windows and Macs are susceptible.

 

Security is not something you buy. It's a process you follow. In addition to having the right tools, you need the right education. Spread this around to your team, family, and friends.

  • Do not open attachments unless you are 100% certain they are legitimate. Take a moment and evaluate whether this is something you were expecting. If it seems strange that you received this then it's likely a fake.
  • Hover your mouse over any links (don't click) and see what the bubble reveals as the actual website you will be directed to. Look carefully for strange spellings that at first glance look okay but are in fact malicious. For example note the difference between amazon.com and amaz0n.com. The first is right and the second is a fake using a zero.
  • If you receive an alert or request from a bank or vendor, go directly to the website via your browser not by clicking on the email. Or call an 800 number from the website to ask if the email is for real.
  • If in doubt, contact your IT professional for help. A quick call can save hours of dealing with a virus.

What is the Internet of Things?

You and I and our computers are on the Internet. The phrase 'Internet of Things' refers to all the other devices that are getting connected to the Internet. TVs, appliances, game consoles, wearable items like upcoming smart watches and clothing, thermostats, get-fit devices, and more are all getting connected to the Internet.

 

This is all fun, possibly useful, and it will be interesting to see where it all goes. It's clearly inevitable however that the implications are just now being considered.

 

One issue that should be on your radar now is security. As companies rush to bring you the Internet of Things, security will likely be an afterthought. As you connect these devices to your corporate and home networks, each may become a point of attack. As you program these devices with your ID and passwords to share information and connect to your online accounts, it increases the possibility that information will be stolen.

 

Enjoy the Internet of Things - just beware. Here is some advice:

  • Stick with name-brand device manufacturers that make a commitment to support and will update and fix their products when security holes are identified. Watch for updates and apply them to your devices.
  • Consider whether you truly want to provide your ID and password to the device.  Is it essential? 
  • Setup guest networks at work and home. Guest networks are easy to setup and are separate from your main network. This will let you give Internet of Things devices WiFi Internet access without giving them direct access to your servers and other important systems.

"Follow" us at https://twitter.com/tobinsolutions Follow us on Twitter   

 ________________________________________________________
We sincerely hope you appreciate our service
as much as we appreciate your business!
Please mention Tobin Solutions to people who might benefit from our services. Give us a potential client's name, and we'll make the contact. 
The best compliment is a referral!