We often talk about unauthorized people “hacking” into computer systems, accounts, networks, and electronic devices. What may be surprising to you is that usually there’s no real “hacking” involved. Sometimes these people gain access to their victim’s systems through human interaction via a process known as social engineering.
“Social Engineering”, or, “Nigeria: The land of Princes”
Passwords P@ssw0rd$, Pa55wordz,!
A dad brings home a new puppy for his young son. The boy is so excited to have his first pet. Dad says, “Make sure you pick a good name, it will be your password hint for the rest of your life”. It’s funny how 20 years ago passwords were something most people rarely used in daily life.
Q & A: What happens when I power off, log off, or lock my system?
Q. If I close the lid does it shut off my laptop?
A. Simply put, a shutdown computer is turned off. It can’t be accessed remotely so it can’t receive patches and updates. For this reason a Desktop PC under F1 management should not be left shut down for an extended period of time (more than a week). On the other hand, laptops should be shut down if they are going to be put into their case or if they aren’t on AC power and not being used.
Google Changes it’s Search Algorithms
Google searches made from mobile devices will now favor mobile-friendly Sites
It was announced this week that Google is changing their search algorithm, the method that Google uses to rank websites in order to deliver the most relevant sites when searches are made.
Best Place To Work – Nominee
Treating our staff like family and creating a nice and supportive work environment has been James and Jennifer’s goals from Day 1. The staff at F1 works so incredibly hard to support clients, because they care. Our staff is our company! Treating them with respect, caring and understanding helps to sharpen our greatest resource.
Data Safety: Backup Plan, Disaster Recovery and Business Continuity : 3 part series: Business Continuity part 3
Business Continuity:
Business Continuity is being able to run your business with minimal interruption even during computer outages. Backups are a component of Business Continuity but only at a very low level. If you are backing up your data once per day you could lose up to 2 days of business should you experience a data catastrophe.
F1 Solutions: Technical Product Offering for Medical Clients – SPHER
SPHER Audit Log monitoring Program
Many of our Medical Clients have asked us to explain the HIPAA requirement that states you must monitor your logs in your EMR/EHR systems to look for any suspicious access. Simply put, when you log on or off of your EMR/EHR software there is a log that records:
What you looked at
What you changed
When you accessed it.
Data Safety: Backup Plan, Disaster Recovery and Business ContinuityDisaster Recovery part 2
Disaster Recovery:
Disaster Recovery is being able to recover your data if everything else is gone. Insurance will replace the computer network but no amount of insurance can replace data. Your Accounts Payable will find you, but I doubt your Accounts Receivable will come knocking.
F1 Solutions: New Product for Secure File Sharing
F1 Sync File Share and Storage: Securely share files with remote end users
Many of our clients have come to us over the last year asking if we knew of another file share service that they could see that wasn’t Dropbox. This is mainly due to some drawbacks to a Dropbox implementation that create pain within their companies.
Data Safety: Backup Plan, Disaster Recovery and Business Continuity, 3 part series: Backup part 1
Data Safety: Back Up Plan
I have supported businesses and their networks for over 17 years. I have evaluated thousands of different computer networks and servers and continue to see new configurations every month. It still amazes me that only 1 in 10 networks I review have reliable backup systems in place.