Your Package Has Been Returned and Your SSL Certificate is Suspended!

We have a very good Spam filter, but still every now and then a phishing email will slip through.  My business email is easy to find so I get  a wide assortment of unsolicited emails. This week I received a deviation on a scam that has been around for years - your package was returned and click this link to get it.  I also received one that my LogMein SSL Certificate had been suspended - click here to fix. Of course, the links are malicious and at least, would come with some irritating pop-ups and at worse, steal your identity, seize your system and ruin your computer. These exploits are designed to cause an immediate emotional response that will make you click before your think.  Because if you look closer, the fraud is apparent.  The mail and parcel carriers do not typically use email for package routing information although some will let you elect mobile or email notification.  The … [Read more...]

Honeypots and SCADA Systems

Guest Blog by Rusty O’Neal System Specialist/SCADA Admin, Canoochee EMC and Secretary, GEMC Distribution Transmission Automation Group (DTAG) "A honeypot consists in an environment where vulnerabilities have been deliberately introduced in order to observe intrusions and attacks"(Pouget & Dacier, 2004, p. 2). The great thing about honeypots is that you can put them into any environment to observe malicious traffic. This could be used to monitor traffic locally or a wide area. Honeypots have been used for over twenty years now to watch for such traffic. The great thing about using a honeypot is that it is used to set a trap to detect, deflect, and in some manner counteract unauthorized access. A honeypot looks just like any other network including computers, data, and a network site that appears to be part of the corporate network, but is actually put in place to be closely … [Read more...]

Creating a 2010 Outlook Signature with Hyperlinks

Want to jazz up your email signature in Outlook 2010? Add social media links to your email signature for LinkedIn, Facebook, Twitter and your blog. You can make a hyperlink to your social media sites so mail recipients just "click" right to them. Follow these simple steps to add your signature. Get your logos. You will need your company logo and logos for the social media sites to hyperlink. There are many logos to choose from that are in the public domain. If you want to use a logo that requires payment or special permission, make sure to satisfy all requirements before using. Get your hyperlinks. Go to each of your social media sites and cut/copy the links to that site. Be sure that you use the links that do not require login to the site. For instance, when you login to Twitter your homepage is: http://twitter.com/home. For others to see you, use the link to your account. For … [Read more...]

Top IT Trends for 2013

In keeping with our new year’s tradition, we have compiled our list of the top IT trends for 2013. We scanned the available data, reviewed our previous predictions and focused on the explosion of processing power for mobile devices. This year will be interesting for tablets and all touch devices as we find new ways for computers to be an extension of the human experience. Everything goes Mobile – It’s not just smart phones and tablets leading the charge for mobility.  Everything we do for business and personal will be mobile.  From storing data to updating our social sites to every type of paperwork imaginable will be done with the help of our mobile devices. This need for mobility will fuel Cloud services and applications.  Look for things you never expected to do on the go and add them to the list of mobile activities. The Cloud is up close and personal – This is one of the IT … [Read more...]