FlexITechs
FlexITechs Newsletter
Tech News from FlexITechs
August 30, 2013
In This Issue
10th Anniversary Approaching!
Benefits of Technology
Sneaky Software Updates
BizTech -- Bank Cyber Policies
Find us on Facebook 
FlexITechs'
10th Anniversary
Approaching!
Eric Magill

FlexITechs is now in its ninth year of serving Sussex County residents and businesses, WITH OUR 10TH ANNIVERSARY COMING UP IN OCTOBER 2013!

 

After two years as the computer services arm of our sister company, Sussex County Online, FlexITechs was formed to better define the computer services offered by owner Eric Magill.

We thank all of our customers who have made it possible for us to close in our 10th anniversary!

Quick Links...
Join Our Mailing List

FREE Security Audit for your Business!

 

Dear (Contact First Name),
 

Thank you for your continued interest in FlexITechs. If you'd prefer not to receive our occasional email newsletters, use the "Unsubscribe" link above.

Also, be sure to:
Follow us on Twitter and Like us on Facebook and Find us on Yelp and View our profile on LinkedIn.

Sincerely,
Eric Magill, FlexITechs

Benefits of Technology Hit Home

 

Sometimes clients who have been hacked or infected by a virus or experienced some other trauma wonder out loud whether technology is worth the risk.

I understand the sentiment. I seem to spend a lot of time warning you about the dangers of technology here. 

It's probably the most common sentiment I hear, right up there with "How did we survive before we had all of this technology?"

So How Did We Survive?

Since we moved my daughter into her dorm for her freshman year of college last weekend, I've been reminded again of the many benefits technology brings our lives.

Dropping her off in a big city three hours away didn't seem nearly as traumatic to me as it might have 30 years ago when I was in college.

Then, you dropped your kids off and it would be days, if not weeks or months, before you would hear from them again. Keeping up with their progress at school was pretty much impossible.

Remember Pay Phones?

When I was a college student in the early '80s, the big thrill was coming back to my room and having a message on my message board that someone called.

I'd run down to the one pay phone we had for 30 guys and if it wasn't busy, immediately pop a bunch of quarters into the phone or call collect (remember 'collect calls'? remember pay phones?).

Technology Keeps Us Connected

Fast forward 30 years to 2013. My daughter has been in school for less than a week. Thanks to social media and cell phones and Internet phone technologies, we've been in almost constant contact with her. 

We know what she's been doing every day via Facebook and Twitter, have talked to her face-to-face on Skype twice, and have texted a few times. It generally feels like she's still home, except for the empty bedroom.

Without the benefits of modern technology, none of this would be possible. So to me, despite the problems I deal with on a daily basis for clients, the benefits definitely outweigh the risks.

Sneaky Software Updates
 

Has the look of your web browser suddenly changed?

Do you suddenly have McAfee Security Scan, in addition to your regular security programs?

Has the Ask toolbar suddenly appeared in your browser?

If you've noticed any of these strange occurrences, you were probably the "victim" of a sneaky Adobe or Java update.

Adobe UpdateAdobe is the developer of the Flash and Adobe Reader applications that allow you to view videos and other multi-media content or open portable document files (.pdf) that look like regular documents.

Java is used by some web sites to provide additional functionality not possible with regular html code.

The software serves a valuable purpose for Internet users but their update tactics leave something to be desired.

Adobe typically offers McAfee or the Google Chrome web browser (see graphic above) along with its updates. But instead of making them optional, they make the installation of those programs the default choice by checking the box to install them for you.

You must uncheck that box to avoid their installation. Otherwise, you end up with a useless security program or a web browser that is missing things like your Favorites or Bookmarks.

The same is true for Java, which offers the Ask toolbar as a default installation along with its updates.

When you install any update or any new application, don't just click through the installations. Read each page of the installation and watch for automatically checked check boxes. If you don't want what's being offered, uncheck them.

BizTech -- Know Your Banks' Cyber Policies

  

When we think of cyber fraud, we often think of a hacker stealing credit card numbers. Even though it concerns us, we're comfortable in the knowledge that the credit card company will refund any fraudulent charges, minus a small fee.

That same peace of mind doesn't apply to business banking accounts, however. Banks are under no obligation to recover your money if cyber heisters steal it from your accounts.

This realization, and how seriously banks are taking cyber fraud, was driven home earlier this month when a client inadvertently clicked on a file attachment in an email whose subject line was very close to a deal she had been working on recently.

Opening that one file attachment triggered a chain of events that alarmed her bank enough to require us to replace the client's hard drive, perform an intensive two-day wipe of the drive, or replace the entire computer before it would give her access to her online accounts again.

A similar incident at another client the following week alarmed me enough to ask that client's bank representative just what the bank's cyber policies were regarding external fund transfers.

In that case, I learned that the client didn't have online funds transfer capabilities to external accounts, so any hacker that managed to steal the client's user name and password wouldn't have been able to transfer funds outside the client's accounts anyway.

The bank official went on to say that customers who do have the ability to initiate ACH or wire transactions must pass multiple authentication schemes. The bank also puts daily limits on total withdrawals and per item and transaction limits.

The banking official said regulations only allow banks a 48-hour window to return an unauthorized ACH debit and that banks, unlike credit card companies, are not liable for money lost to computer/electronic fraud.

Her advice: check your bank account balances and transactions regularly, at least daily, because you only have 24 hours after a fraudulent transaction is initiated to notify the bank to stop it.

If you don't know your bank's cyber fraud and cyber security policies, you should get them in writing ASAP so you know your rights and what you could lose if you are victimized by a hacker.

It's important, too, to take security measures to mitigate the risk of a hacker compromising your computer or network and gaining access to your online banking information. Those measures will vary depending on how much you would stand to lose.

For a security audit for your company, contact Eric Magill at 302-537-4198 or ericm@flexitechs.com

We thank you for your past business and hope we can continue to fulfill your technology needs in the future. If you have any questions about current technology issues, feel free to contact us at 537-4198.
Sincerely,
Eric Magill
FlexITechs
Microsoft Small Business Specialist 
Backups

FREE Security Audit!
Now through Sept. 30, 2013, you can receive a FREE Security Audit for your business. We'll examine your existing network security measures and help you determine if they sufficiently mitigate the risks your company faces.
Offer Expires:
September 30, 2013