It’s a jungle out there – be smart online

Recently, I posted a job on craigslist for a senior systems and network engineer.  Although craigslist is a popular site, I have never used it and had some concerns about posting on a site that has received so much bad press. After researching, I decided to post our job and have been very happy with the response. But it’s a jungle out there and I knew to expect some scam artists to use the ad to try an attack. Then today, I received an email from updates-craigslist: Updates!New Terms – Accept: June 29, 2011 with the following message: ———————————————————————- craigslist ———————————————————————- Dear Customer, We need your help resolving an issue with your account. To give us time to work together on this, we’ve temporarily limited what you can do with your account until the issue is resolved. We noticed some unusual activity .  How you can help? You must reverify … [Read more...]

Why does China want your gmail account?

Google is certain that the latest hacking attempt comes from Jinan, China as a phishing scam to obtain gmail passwords. This type of attack happens all the time, but since senior level US government officials, military personnel and political activists were targeted the intent seems much more sinister. The attacks were common phishing schemes that are not very sophisticated opening speculation that this was testing the water and that the information may be used for broader attacks. If someone has your username and password, they can hijack your account.  Not only will they have access to your email, but they can change account settings, forward email and send email as you.  If you are unaware that your account has been compromised, the hacker can play havoc with your information and identity. Certainly, you have heard these warnings: create a strong password, don’t divulge username … [Read more...]

Social Media Tactics: Part 2

The second part of our tactics for social media includes LinkedIn and blogging.  LinkedIn is widely used by business professionals to promote their business and to job search.  It’s easy to set up  a personal and/or business LinkedIn page and you can keep it current using built in tools that won’t take too much of your time. Upon creation of your LinkedIn profile, be sure to craft a flattering position summary for your company to promote. Deciding how you will accept connections is important, as well. LION (LinkedIn Open Network) members connect to almost anyone that requests whether they know them or not. More conservative members only link to people they personally know. This is your choice and you can adjust your settings to share or hide your connections. There are many security settings that control how much or how little of your information is shared. If you are concerned … [Read more...]

Social Media Tactics: Part 1

By now you have heard that Social Media is a revolution.  A big change is coming in the way businesses market and communicate their message.  To understand Social Media you have to spend time studying the concept, method and strategy.  Don’t worry if it seems complicated and time consuming at first.  We have a few proven strategies that we personally use to give your social media campaign a boost. We’ll start with Twitter and Facebook. Twitter – Twitter is a social networking site which enables news sharing and connectivity among people and businesses through short updates. It’s hard for some to understand the Twitter sensation.  Why would anyone tweet their lunch menu or location? There is a great deal of self-indulgence on Twitter and you should always be conscious of your personal safety. Try these few tips to propel you to the top. 1)      Be interactive – reply to and retweet … [Read more...]

How to Protect Your Computer Against Malware

Each year the damages from computer malware cost US businesses billions of dollars. These costs are not only in lost productivity, but permanent loss of critical business data. Arguably, most if not all infections are preventable with the proper understanding, training and protection. Don’t be the next victim, take the steps now to ensure protection and recovery if the worst should happen. First, let’s understand computer malware. Often the term virus is used to describe all malware. Technically speaking, there are viruses, rootkits, Trojan horses, worms and spyware. The attack method may differ but they are all malicious. A virus is a program that runs itself and replicates itself. It can affect files or the boot sector and can delete all your data. The “Melissa” and “I Love You” viruses gained global attention. A rootkit or Trojan horse allows access to your system without … [Read more...]