September 2015
In this issue
> |
5 Easy-to-Fix Tech Troubles You Can Solve
Yourself |
> |
A Word About Passwords |
> |
Getting the Biggest Bang for Your Buck as a
Small Business Owner |
> |
Ransomware: When Cybercriminals Hold Your
Computer Hostage |
> |
How To Safely and Securely Use USB Memory Sticks |
> |
Inserting and Using Drop Down Lists in Excel |
> |
Business Continuity Tip |
> |
Cartoon/Quote |
|
Business Continuity Tip
Non-Weather Related Threats
While all disasters pose a serious threat, sometimes it�s the ones we least
expect that cause the most damage. Specifically, non-weather related disasters
including burst pipes, theft, chemical spills, arson, pest infestation and more
can have a serious impact on your organization. To help you prepare,
check out Agility�s Isolated Events Whitepaper to learn:
♦ How to think about and plan for the unexpected
♦ Types of disruptions you might experience
♦ Case studies from companies that have successfully responded to isolated
incidents
Anticipating and planning for these types of events can make all the difference.
Get started and prepare your organization!
Databranch can help provide a
solution for your company�s business continuity and
disaster recovery needs. If you would like to learn
more, please call us today to speak with an Account
Manager, or visit
www.databranch.com/Data-Disaster-Recovery. |
|
Please forward this newsletter to anyone else in your
organization who might be interested!
 |
5
Easy-to-Fix
Tech Troubles You Can Solve Yourself
used with permission
from HP Technology at Work
Technology issues are a thorn in the side of many businesses.
Even an action as simple as opening and printing out an email
attachment can come with its fair share of bumps in the road.
And the whole process of calling for support and waiting for
service�that can often be as painful as the issue itself. Wouldn't
it be great if you could just fix these problems yourself? Well,
sometimes you can. Here are DIY solutions to five all-too-familiar
tech problems:
Problem #1: You can't open an email attachment
Read
more
|
|
A Word About
Passwords
used with permission
from FTC Business Center Blog by Lesley Fair
On the old game show "Password," the host whispered a word
to contestants, who then gave clues to celebrities. The first
to guess correctly advanced to the Lighting Round. The loser
went home with a year's supply of car wax.
The legacy
of "Password" lives on, but in the 21st century version,
hackers use tidbits they know about your employees to
guess their passwords.
Read
more
|
|
Getting the
Biggest Bang for Your Buck as a Small Business Owner
used with permission
from Microsoft for Work
Companies are always looking for places to save money without
really cutting corners, but in a lot of cases, it's smarter
to make investments up front that will pay dividends for a longer
period of time. At other times, the best way to save money is
to control expenses by buying only what you actually use. The
seven tips below concentrate on different technologies and how
they can save you money in the short and long term.
Read more
|
|
Ransomware:
When Cybercriminals Hold Your Computer Hostage
used with permission
from Norton by Symantec by Nadia Kovacs
Ransomware is a form of malware that will lock files on a
computer using encryption. Encryption converts files into another
format, like a secret code and can only be decoded by a specific
decryption key.
Types of Ransomware
Ransomware can present itself in two forms.
Read more |
|
How To Safely
and Securely Use USB Memory Sticks
used with permission
from Norton by Symantec by Nadia Kovacs
You may have noticed growing reports in the media about the
dangers of using USB memory sticks. It is true, they are susceptible
to being exploited like everything else, however, and these
exploits aren't terribly easy to carry out by hackers. Mostly
because an attacker needs physical access to your computer in
order to infect it.
What Can a "Bad" USB Stick Do?
Read more |
|
Inserting
and Using Drop Down Lists in Excel
A helpful tool when working in Excel spreadsheets is the
drop down codes. These can be used a variety of ways. For this
example we'll use a spreadsheet with names and address that
we are tracking for how a customer was contacted.
In the Status column I want drop down choices for
the following:
Read
more |
|
 |
"I attribute my success to this - I
never gave or took any excuse.
Florence Nightingale
|
|
|
 |
Databranch, Inc.
132 North Union Street, Suite 108
|
Olean, New York 14760
(716) 373-4467 - Olean |
(607) 733-8550 - Corning/Elmira
www.databranch.com |
|
|
|