March 2015
In this issue

> Avoid Hackers, Spammers, and Identify Thieves
> Malware 101
> Methods for Searching Your Email in Outlook 2013
> Office 365 is Your Complete Office in the Cloud
> Planning for Windows Server 2003/R2 End of Support
> Mobile Scams
> Two-Factor Authentication
> Cartoon/Quote

Mobile Scams: How to Identify Them and Protect Yourself
used with permission from Norton by Symantec
Nadia Kovacs

Identity theft is one of the most dangerous threats on the Internet Landscape. If a cybercriminal gains access to your financial information, it can be a potential catastrophe. Here we outline how you can keep your personal data protected from prying eyes.

Read more


The Importance of Two-Factor Authentication
used with permission from Norton by Symantec
Nadia Kovacs

The significance of employing secure passwords is more important than ever. Hackers are hungry for passwords, as they have substantial monetary value.

Read more


Follow us!




Please forward this newsletter to anyone else in your organization who might be interested!

Avoid Hackers, Spammers, and Identify Thieves with These 5 Simple Tips
used with permission from Microsoft at Work

Whether at work, home, or mobile, keeping your computer and other devices secure is important. There are any number of threats to security on the web, but keeping your personal and work data safe is relatively easy. It may take a few minutes to get things set up, but after that, things mostly take care of themselves and you can sit back, relax, and enjoy worry-free computer time.

Passwords

How many different passwords do you have? If the answer is "one" or "a few," then you run the risk of all your password-protected accounts being compromised as soon as one of them is. A leak from one site means every other site with that same password is at risk. If you use that same password for your email accounts, hackers could take that over, too, which would leave you locked out of your account and unable to change any of your passwords once you realize it's been compromised.

Read more

Malware 101: What Is Malware?
used with permission from Norton by Symantec
by Nadia Kovacs


 
Spyware, ransomware, and bots, oh my! A lot of these terms are prevalent on the Internet, but it may seem impossible to know what all these terms mean, and how they actually affect your devices and personal information.

The term, "virus" has been the commonplace word for all malicious software programs for years now; however, a virus is just one type of malicious threat. A virus is classified as a self-replicating piece of malicious code that travels by inserting itself into files or programs. The threats on the cyber landscape have evolved into more than just viruses, and can cause much more damage than viruses can. All of the threats on the Internet landscape are types of malicious software, and therefore now fall under the umbrella term, "malware."

Read more


Methods for Searching Your Email in Outlook 2013

Do you have thousands of emails stored in your Outlook account? Do you sometimes need to find the one email from five months ago that mentions the access key for a software program you didn't think anyone was still using?

We all have times when we need to dig through the haystack of email to find the needle. This can be very challenging even if you carefully manage emails with folders and categories.

Here are some tips for searching your Outlook email!

Read more

Office 365 is Your Complete Office in the Cloud

 
Office 365 is your complete office in the cloud and is a great choice for businesses of all sizes, especially since 43% of SMB employees work at more than one location. Whether it be from your car, home, or office, you can access your documents that are stored in the cloud from anywhere. Every user can install Office on up to 5 PCs or Macs so you have access anytime, from PC to smartphone and tablet.

At its heart is Office itself - the familiar Office applications businesses use every day - now offered as a cloud service, so it's always up to date. But Office 365 is also so much more. It's about bringing enterprise-grade services to organizations of all sizes, from online meetings to sharing documents to business-class email.

Read more

Planning for Windows Server 2003/R2 End of Support
used with permission from Microsoft

On July 14, 2015, Microsoft will end support for Windows Server 2003 and Windows Server 2003 R2. Organizations that fail to migrate from Windows Server 2003/R2 before this date will be out of compliance with certain existing business standards and possibly expose themselves to vulnerabilities.

Fortunately, migrating to a supported server operating system can help you mitigate these risks and deliver valuable benefits and efficiencies that are not available in Windows Server 2003/R2. To take advantage of this opportunity, your organization will need a clear understanding of the different on-premises and cloud migration options available.

Read more

Quote of the Month

"Everybody is a genius. But if you judge a fish by its ability to climb a tree, it will live its whole life believing that it is stupid."

- Albert Einstein


Databranch, Inc.
132 North Union Street, Suite 108    |     Olean, New York 14760
(716) 373-4467 - Olean    |    (607) 733-8550 - Corning/Elmira
www.databranch.com


Databranch does not knowingly participate in SPAM.   If you wish to be removed from this list, please follow the link below and you will be taken off this list.  Thank you for your interest in our e-newsletter.