July/August 2019
In this issue:

80% of all Brand Deception Phishing Scams Targeting Execs Pretend to be Microsoft
Are you prepared for the end of Windows 7?
What is a rootkit? And how to stop them
Transposing Rows and Columns in Excel
Business Continuity Tip: Mobile Phone Security Checklist
Cartoon and Quote


Business Continuity Tip
 


Mobile Phone Security Checklist

Remember that good "device hygiene" is important to avoid degraded performance, but also to avoid security risks. Here's a quick list of actions to periodically check to make sure your device is healthy and well-maintained.
  • Digital cleaning: Remove any unused apps.
  • Respect access: Review app permissions.
  • Secured: Install or update anti-virus software.
  • Locked: Turn on password protection and lock screen when inactive.
  • Wi-fi security: Install and use a VPN.
  • Updated: Enable auto-update for security patches
Read more
Cartoon of the Month



 

Quote of the Month


"Ah, summer, what power you have to make us suffer and like it.."

— Russell Baker
80% of all Brand Deception Phishing Scams Targeting Execs Pretend to be Microsoft

by Stu Sjouwerman

The prevalence of Office 365 and the Windows OS has caused cybercriminals to choose the software titan as their primary brand used in identity deception phishing scams.

If you were a cybercriminal and wanted to get the attention of the most potential victims possible, you’d obviously use a household name that nearly everyone either uses or is familiar with.

Read more

Are you prepared for the end of Windows 7?

Windows 7 and Windows Server 2008 are popular and well-loved — and they're completely unsupported after January 2020. Have you prepared to upgrade yet?

When Windows 7 reaches end of life and end of support in 6 months, it will no longer be a secure, compliant operating system. Microsoft will no longer releases updates or security patches.

Read more

What is a rootkit? And how to stop them

Used with permission from Norton by Symantec
by Dan Rafter


Computer viruses and other malware are real threats. And rootkits might be the most dangerous, both in the damage they can cause and the difficulty you might have in finding and removing them.

Rootkits are a type of malware that are designed so that they can remain hidden on your computer. But while you might not notice them, they are active. Rootkits give cybercriminals the ability to remotely control your computer.

Read more
 
Transposing Rows and Columns in Excel

What's transposing in Excel? "To transpose" means to make items change places with each other, or to flip a grid or table such that columns become rows and rows become columns.

This may be a little hard to grasp, but it's something that you may frequently want to do in Excel:

Read more
 
Progressive Computer
Systems, Inc.

615 Eastowne Drive, Chapel Hill, NC 27514
(919) 929-3080
www.pc-net.com