• Home
    Home This is where you can find all the blog posts throughout the site.
  • Tags
    Tags Displays a list of tags that have been used in the blog.
  • Team Blogs
    Team Blogs Find your favorite team blogs here.

Are You Paying 80% Of Your Employees To “Cyberloaf” On The Internet, Watching Cat Videos, Searching For A Better Job Or Accidentally Downloading A Virus On Your Network?

     Recently, we have seen a dramatic increase in the number of local businesses suffering significant financial and productivity losses due to employees inappropriately using their Internet access during work hours – and much of this is fueled by social media sites such as Facebook and YouTube. Studies have shown that between 60 and 80 percent of people’s time on the Internet at work has nothing to do with work!      What makes this situation so dangerous is that the majority of business owners don’t even realize that it’s going on until it’s too late. By then they have found themselves in the middle of a costly and embarrassing lawsuit because an employ... Last modified on Continue reading

If We Knew A Dozen Or More Ways That Cyber-Criminals Could Steal Thousands Of Dollars From Your Company’s Bank Account, Damage Your Reputation And Cripple Your Operations Wouldn’t You Want Us To Tell You About It?

CyberCuffs032014
     Imagine walking into your office one morning to discover your computer network was breached by a hacker, exposing not only YOUR company’s data, but also your clients’. Imagine the embarrassment of having to notify your clients that, because of you, their personal information may now be in the hands of cyber-criminals. And hopefully that’s the only damage done…      Operations could be halted or severely limited for days, possibly weeks. Your data corrupt to the point of being useless. Clients lost. Potential lawsuits and government fines for violating data-breach laws. The exorbitant emergency IT fees to get everything restored to working order fast. ... Last modified on Continue reading

Shiny New Gadget Of The Month:

Nest032014
Nest Protect The Nest Protect Motto: Safety shouldn’t be annoying. We have all experience it. That annoying low-battery chirp that 9 times out of 10 wakes you from a dead sleep. Why is it that the smoke alarm battery inevitably runs low in the middle of the night? Then it happen…in your half-awake stupor, you rip it from the wall with intentions of re-hanging it in the morning. More times than not, you forget to replace the batteries and re-hang it and then there you are with no warning system should a fire break out in your home. This annoyance has now become a safety issue. According to the National Fire Protection Association (NFPA), almost two-thirds of US home fire deaths happened ... Last modified on Continue reading

Green IT Item of the Month

GA
Think Spring! If you live in the Northeast, you might be trying to ignore the last 12 inches of snow that just dumped on us this past week. I have already shifted my sights on spring and have already begun planting seeds in compostable egg cartons. Why not get a jumpstart on the garden and better yet: put them on the window sill of your office to lift your and your colleagues’ spirits! Read More! Password Tip! Want an easy-to-remember password that’s super-secure? Try mixed-entry passwords. While JohnSmith12345 could fairly easily be broken, J1o2h3n4S5mith (inserting the same numbers between each letter in the password) would take about 1,800 years to crack, and is almost as easy to rem... Last modified on Continue reading

Another Reminder Of Why You Can’t Use Home Routers In Your Business

NoHomeRouter032014
     This past Christmas, a hacker reportedly stumbled upon a back door to Linksys and Netgear DSL modems that allow an attacker to reset the router’s configuration and gain Admin access. Not good!      Some routers have this “back door” open to the local computer network while others are open to the Internet side of things, opening up users of these devices to remote Internet attacks. This essentially means that someone could easily gain access to the network and all files located on it.      In the past, this may have taken weeks or months to get out, leaving plenty of time for the manufacturer to get in contact with their clients, r... Last modified on Continue reading

Find out why

You should only hire an IT firm that holds a CompTIA Trustmark.

CompTIA IT Security Trustmark Managed Services - CompTIA MSP Partners Trustmark

Click here to
learn more.

Click here to
learn more.
 

Feedback & Suggestions

Is there a topic or feature you Ellen Sargentwould like included in a future issue? Opinions and feedback are welcome and encouraged. Send me an e-mail!

Ellen Sargent

E-mail: esargent@jenaly.com

Live Remote Tech Support

CompTIA Certified IT Support - Computer Repair

Green Managed IT Support Services

Newsletter Signup

Email*
First Name*
Last Name*
Newsletter