July/August 2019 In this issue:
► |
80% of all Brand Deception Phishing Scams Targeting Execs Pretend to be Microsoft |
► |
Are you prepared for the end of Windows 7? |
► |
What is a rootkit? And how to stop them |
► |
Transposing Rows and Columns in Excel |
► |
Business Continuity Tip: Mobile Phone Security Checklist |
► |
Cartoon and Quote |
|
Business Continuity Tip |
Mobile Phone Security Checklist
Remember that good "device hygiene" is important to avoid degraded performance, but also to avoid security risks. Here's a quick list of actions to periodically check to make sure your device is healthy and well-maintained.
- Digital cleaning: Remove any unused apps.
- Respect access: Review app permissions.
- Secured: Install or update anti-virus software.
- Locked: Turn on password protection and lock screen when inactive.
- Wi-fi security: Install and use a VPN.
- Updated: Enable auto-update for security patches
Read more
|
Cartoon of the Month |
|
Quote of the Month |
"Ah, summer, what power you have to make us suffer and like it.."
Russell Baker
|
|
|
80% of all Brand Deception Phishing Scams Targeting Execs Pretend to be Microsoft |
|
by Stu Sjouwerman The prevalence of Office 365 and the Windows OS has caused cybercriminals to choose the software titan as their primary brand used in identity deception phishing scams.
If you were a cybercriminal and wanted to get the attention of the most potential victims possible, youd obviously use a household name that nearly everyone either uses or is familiar with.
Read more
|
Are you prepared for the end of Windows 7? |
|
Windows 7 and Windows Server 2008 are popular and well-loved — and they're completely unsupported after January 2020. Have you prepared to upgrade yet?
When Windows 7 reaches end of life and end of support in 6 months, it will no longer be a secure, compliant operating system. Microsoft will no longer releases updates or security patches.
Read more
|
What is a rootkit? And how to stop them |
|
Used with permission from Norton by Symantec by Dan Rafter Computer viruses and other malware are real threats. And rootkits might be the most dangerous, both in the damage they can cause and the difficulty you might have in finding and removing them.
Rootkits are a type of malware that are designed so that they can remain hidden on your computer. But while you might not notice them, they are active. Rootkits give cybercriminals the ability to remotely control your computer.
Read more |
Transposing Rows and Columns in Excel |
|
What's transposing in Excel? "To transpose" means to make items change places with each other, or to flip a grid or table such that columns become rows and rows become columns. This may be a little hard to grasp, but it's something that you may frequently want to do in Excel: Read more |
|
|
Progressive Computer Systems, Inc. 615 Eastowne Drive, Chapel Hill, NC 27514 (919) 929-3080 www.pc-net.com |
|
|