March 2015
In this issue
> |
Avoid Hackers, Spammers, and Identify Thieves |
> |
Malware 101 |
> |
Methods for
Searching Your Email in Outlook 2013 |
> |
Office 365 is
Your Complete Office in the Cloud |
> |
Planning for Windows Server 2003/R2 End of
Support |
> |
Mobile Scams |
> |
Two-Factor Authentication |
> |
Cartoon/Quote |
|
Mobile
Scams: How to Identify Them and Protect Yourself
used with permission
from Norton by Symantec Nadia Kovacs
Identity theft is one of the most dangerous threats on
the Internet Landscape. If a cybercriminal gains access
to your financial information, it can be a potential
catastrophe. Here we outline how you can keep your
personal data protected from prying eyes.
Read more
|
|
The Importance of Two-Factor
Authentication
used with permission
from Norton by Symantec Nadia Kovacs
The significance of employing secure passwords is more
important than ever. Hackers are hungry for passwords,
as they have substantial monetary value.
Read more
|
Please forward this newsletter to anyone else in your
organization who might be interested!
|
Avoid Hackers,
Spammers, and
Identify Thieves with These 5 Simple Tips
used with permission
from Microsoft at Work
Whether at work, home, or mobile, keeping your computer and
other devices secure is important. There are any number of threats
to security on the web, but keeping your personal and work data
safe is relatively easy. It may take a few minutes to get things
set up, but after that, things mostly take care of themselves
and you can sit back, relax, and enjoy worry-free computer time.
Passwords
How many different passwords do you have? If the answer is
"one" or "a few," then you run the risk of all your password-protected
accounts being compromised as soon as one of them is. A leak
from one site means every other site with that same password
is at risk. If you use that same password for your email accounts,
hackers could take that over, too, which would leave you locked
out of your account and unable to change any of your passwords
once you realize it's been compromised.
Read
more |
|
Malware 101: What Is Malware?
used with permission
from Norton by Symantec by Nadia Kovacs
Spyware,
ransomware, and bots, oh my! A lot of these terms
are prevalent on the Internet, but it may seem impossible to
know what all these terms mean, and how they actually affect
your devices and personal information.
The term, "virus" has been the commonplace word for all malicious
software programs for years now; however, a virus is just one
type of malicious threat. A virus is classified as a self-replicating
piece of malicious code that travels by inserting itself into
files or programs. The threats on the cyber landscape have evolved
into more than just viruses, and can cause much more damage
than viruses can. All of the threats on the Internet landscape
are types of malicious software, and therefore now fall under
the umbrella term, "malware."
Read more |
|
Methods for
Searching Your
Email in Outlook 2013
Do you have thousands of emails stored in your Outlook account?
Do you sometimes need to find the one email from five months
ago that mentions the access key for a software program you
didn't think anyone was still using?
We all have times when we need to dig through the haystack
of email to find the needle. This can be very challenging even
if you carefully manage emails with folders and categories.
Here are some tips for searching your Outlook email!
Read
more |
|
Office 365 is
Your Complete
Office in the Cloud
Office 365 is your complete office in the cloud and is a
great choice for businesses of all sizes, especially since 43%
of SMB employees work at more than one location. Whether it
be from your car, home, or office, you can access your documents
that are stored in the cloud from anywhere. Every user can install
Office on up to 5 PCs or Macs so you have access anytime, from
PC to smartphone and tablet.
At its heart is Office itself - the familiar Office applications
businesses use every day - now offered as a cloud service, so
it's always up to date. But Office 365 is also so much more.
It's about bringing enterprise-grade services to organizations
of all sizes, from online meetings to sharing documents to business-class
email.
Read
more |
|
Planning for Windows Server
2003/R2 End of Support
used with permission
from Microsoft
On July 14, 2015, Microsoft will end support for Windows
Server 2003 and Windows Server 2003 R2. Organizations that fail
to migrate from Windows Server 2003/R2 before this date will
be out of compliance with certain existing business standards
and possibly expose themselves to vulnerabilities.
Fortunately, migrating to a supported server operating system
can help you mitigate these risks and deliver valuable benefits
and efficiencies that are not available in Windows Server 2003/R2.
To take advantage of this opportunity, your organization will
need a clear understanding of the different on-premises and
cloud migration options available.
Read
more |
|
|
"Everybody is a genius. But if you judge a fish
by its ability to climb a tree, it will live its
whole life believing that it is stupid."
-
Albert Einstein
|
|
|
|
Databranch, Inc.
132 North Union Street, Suite 108
|
Olean, New York 14760
(716) 373-4467 - Olean |
(607) 733-8550 - Corning/Elmira
www.databranch.com |
|
|
|