Important Notices & Announcements
A blog on the latest advice, best practices and tips for making the most of technology.
What You Need Know...
There's some bad news if you do business with consumer credit monitoring agency Equifax. Your sensitive personal info — including Social Security and drivers license numbers — may be in the hands of data thieves.
What to Do Now...
- Go to Equifax's website to see if your data was compromised.
- Follow Consumer.gov's advice on what to do if the stolen data includes your information.
- Look into getting an identity protection service.
Equifax today, September 7, 2017, finally reported a security breach that could impact 143 million US & Canadian consumers. That's not nearly as large a breach as others recently; Some compromised up to 1 billion customer accounts. Equifax discovered the breach on July 20. Hackers used a website vulnerability to access files, with the breach occurring from mid-May through July, according to Equifax's investigation.
The greatest cause for concern, as we see it, is the type of data accessed.
- Social Security numbers
- Birth dates
- Driver’s License Numbers (in some instances)
This is critical to your privacy and security of your identity.
It gets worse. Equifax says credit card numbers for roughly 209,000 people were accessed by hackers, as were dispute documents with "personal identifying information" for about 182,000 people.
“This is clearly a disappointing event for our company, and one that strikes at the heart of who we are and what we do. I apologize to consumers and our business customers for the concern and frustration this causes,” said Chairman and Chief Executive Officer, Richard F. Smith.
Equifax has established a dedicated website, www.equifaxsecurity2017.com, to help consumers determine if their information has been potentially impacted and to sign up for credit file monitoring and identity theft protection. They're offering an identity protection service, called TrustedID Premier, includes 3-Bureau credit monitoring of Equifax, Experian and TransUnion credit reports; copies of Equifax credit reports; the ability to lock and unlock Equifax credit reports; identity theft insurance; and Internet scanning for Social Security numbers – all complimentary to U.S. consumers for one year.
In addition to the website, Equifax will send direct mail notices to consumers whose credit card numbers or dispute documents with personal identifying information were impacted.
The easiest method to obtain any text and images from a website is to select it, copy it using CTRL+C keys and then paste it using CTRL+V. What if the pasted material is not what you copied from the website? Surely you’ll copy-paste again, and the results might be the same. It’s risky, and we’ll talk why.
Your IVR system is like the front door of your business - It's the first thing people see and the first impression callers get. It's also a crucial part of your customer communication. When coupled with well-written voice prompts, the IVR system helps callers navigate your phone system and reach an agent efficiently.
The company’s automated attendant greeting on your business telephone system is the first thing your customers and business associates will hear when they call your company. For first time callers, you only have one chance to make a good first impression.
We all know about Google's web browser, Chrome. which has become very popular among all Internet users. You can download it using this link. Once you start downloading, it downloads a very small installer which again downloads the required setup files from Google server.
Google has made it even easier to use two-factor authentication. With 9to5Google, there are no more excuses for not adding an extra layer of security. We will show you how to make use of this new feature.
For the past few years, two-step authentication has become one of the most common methods to secure our online accounts as it adds an additional layer of security in the form of TOTP (Time-based One-time Password). One of the most well-known apps for two-factor authentication is the Google Authenticator app by Google itself.
Microsoft is all about Windows Updates lately. Between forcing Windows 10 updates on everyone, and generally doing a lot to make its users mad with the way updates are handled, it seems like we need to spend more time figuring out to fight updates than using our PC.
Put away your wget and curl, your SOAP clients and WSDLs, WebDAV servers, REST APIs and JSON callbacks; when it comes to moving data off websites and on to your computer the sticky stuff that greases the wheels is copy and paste.
FileZilla has an evil twin that steals FTP logins.
Maliciously modified versions of the popular FTP application FileZilla look and act just like the real thing, but include extra code that steals the login data typed in by users and sends it to an unauthorized server using the same FTP operation launched by the user without going through a firewall that might spot what it's doing
Every week seems to bring news of another case of ransomware.
It’s nasty stuff. Nasty enough that the US and Canada on Thursday issued a rare joint cyber alert warning about the recent surge in ransomware attacks, in which data is encrypted and crooks demand payment for it to be unlocked.
You may not even know it, however, you’ve probably experienced the effect of a Distributed Denial of Service attack. But what exactly does that mean? And why can such major, generally secure services be impacted by these attacks?
Denial-of-service attacks have been around for the equivalent of eons in the internet age. Online video game services are no strangers to being targets of DDoS attacks; previous generations of gaming have experienced them, though there has been a frequent spate of successful attacks against multiple networks over the past year.
Why are they so difficult to defend against?
When emergencies happen, our first instinct is often to call 911. In the U.S., this has long been a universal service – at least in our homes. Today, that service is known as E911, and whether you know that or not, most people don’t give much thought as to how it works. This is particularly problematic for businesses since most environments do not fully or properly support E911. Not only are the technologies and solutions largely inadequate, but in most states, E911 support for businesses is not mandatory.
Disappointed at some of the gaps in Windows 10's software? Here are five apps you'll want to pick up to plug those holes.
What about headless server, where isn’t any web based browser and the main point is, most of the servers are headless. The another bottleneck of such web browser based speed testing is that, you can’t schedule the speed testing at regular interval. Here comes an application “Speedtest-cli” that removes such bottlenecks and let you test the speed of Internet connection from command line.
Microsoft gave Windows 7 users a way to run older applications via Windows XP Mode. With Windows 8, however, that mode is no longer officially supported, and if you want to run Windows XP in a virtual machine, you need the license for it. Here's a workaround.
Regardless of the product or service you sell, problems will arise and customers will be quick to tell you about them. These issues can escalate in a heartbeat, and suddenly you’re getting yelled at in ALL CAPS.
If you’ve spent more than a day on the front lines of support, it’s guaranteed that you’ve had to bear the brunt of major customer frustration at some point. It comes with the territory.