TCS Data-bits
April 2016   
    In this issue. . .
- Biometrics: How Do They Work? Are They Safe?
- How the Internet of Things is transforming digital marketingDon'ts of Secure Online Tax Filing
- How to work from home and look good doing it
- Sneaky Spammer Tactics and How To Avoid Them
- Business Continuity Tip
- Quote & Cartoon
         
 

Let TCS Help You With Your IT Needs

Phishing Attack


Business Continuity Tip
Taking Shelter During Severe Weather

Unlike the arctic storms of winter, or the hurricanes of summer, the severe weather that manifests this time of year and throughout spring are some of the most unpredictable weather disasters that occur.

Often, these events only offer a few moments notice before severe flooding, damaging winds and life-threatening tornadoes strike.

We recently saw this situation unfortunately play out as a string of severe storms devastated parts of the southeast in a matter of no time.

Take a moment to review and share this free information from NOAA about best practices for taking shelter in the event you find yourself in such a storm.
  

Laugh a Little


I love those who can smile in trouble, who can gather strength from distress, and grow brave by reflection. 'Tis the business of little minds to shrink, but they whose heart is firm, and whose conscience approves their conduct, will pursue their principles unto death.

- Leonardo da Vinci

 

Biometrics: How Do They Work? Are They Safe?
used with permission from Norton by Symantec
by Nadia Kovacs


Biometrics are part of the cutting edge of technology. Put simply, biometrics are any metrics related to human features. Fingerprinting is a very early and simple version of biometrics, like when you login to your phone using your fingerprint. As with any emerging technology, the first question you should ask is if they are safe.

How Do Biometrics Work?

If you've ever put your fingerprint into an device, you have a vague idea of how biometrics work. Basically, you record your biometric information, in this case a fingerprint. The information is then stored, to be accessed later for comparison with "live" information. Anyone else in the world can put their finger on you device's touch circle and it's not going to open your phone.

Read more

How the Internet of Things is transforming digital marketing
used with permission from IBM Big Data & Analytics Hub
by Ryan Begley, Product Manager IoT Division - Connected Products, IBM


Ever heard of John Wanamaker? No? Born in 1838, Wanamaker was a merchant and religious, civic and political figure, and he was considered by some to be one of the first marketing geniuses in American business. A huge proponent of advertising, Wanamaker said: "Half the money I spend on advertising is wasted; the trouble is, I don't know which half."

Fast-forward nearly 160 years to 1995 and another pivotal moment in history—the first time I got on the Internet, which was through a dial-up modem. Not really knowing what to do on the Internet, I surfed the web, but back then there wasn't much content. The waves weren't big, so I turned off my surfboard, or my Compaq desktop, and probably put on a CD or something else 90ish.re a few precautions and safety tips that can help you safely utilize the benefits of E-filing.

Read more

How to work from home and look good doing it
used with permission from Microsoft Office Blogs

In the last decade, the mobile workforce has increased by more than 100 percent—not that surprising when we consider the abundant improvement in technology over that same time period. Telecommuting offers wonderful benefits to companies and workers alike, with an improved work-life balance topping the charts. Not only that, but a 2015 Gallup poll shows that telecommuters are more likely to be more engaged in their jobs, and being engaged can lead to higher profitability, mobile productivity, customer engagement and other positive business outcomes.

But mobile teams experience problems of their own. At the forefront is the disconnection that naturally occurs when team members work separate from the rest of the team. Not only do telecommuters sometimes miss out on deeper relationships with co-workers, they don't get to experience office culture and can easily miss important announcements. A case study conducted among full-time telecommuters at a Chinese travel agency even showed that mobile workers were up to 50 percent less likely to receive promotions.

If you're part of the mobile workforce, here are some things you can do to make your experience as successful as possible:

Read more

Sneaky Spammer Tactics and How To Avoid Them
used with permission from Norton by Symantec
by Nadia Kovacs


 
Spam is a problem on the Internet, coming at us from just about every angle of the online space. Some spammers develop sophisticated, well-planned strategies, while others can be sloppy and still drive results. Either way, spam tactics come in a variety of shades, and it's up to users to identify signals early on and avoid unsolicited content.

Here's a look at some spam tactics used in popular Internet spaces. Become familiar with these tactics to help identify them and avoid them whenever possible.

Spam on Social Media

A lot of the time, spam on social media is just bad social media marketing, or content marketing gone array. Being on either end (sending or receiving) of social media spam is not a good place to be. For receiving parties, it can be frustrating and even dangerous, depending on what the intention of the spammer is; and for senders, it's extremely unprofessional and not a good way of building rapport with an audience.

Read more

168 Thatcher Rd.    |   Greensboro, NC  27409   |    336-632-0860   |   tcsusa.com

Symantec - Microsoft - Sonicwall - VMWare