April 2011 a publication of Business System Solutions, Inc. How To Be Safe And Smart On Social Networking Sites Did you know*… Inside This Issue… • What Are QR Codes And How Can You Profit From Them In Your Business?........……………….................Page 2 More than 90,000 registered sex offenders were removed from one popular social networking site…and those were only the ones who used their real names. • According to the Al Qaeda Handbook, terrorists search social net‐ working sites for “government personnel, officers, important person‐ alities and all matters related to them (residence, workplace, times of leaving and returning, children and places visited). • Social networking sites have become a haven for identity thieves and con artists, and social networking viruses are on the rise. Shiny New Gadget Of The Month……………………………...Page 2 Client Bill Of Rights #10………...Page 2 How To Spot An E-mail Hoax.....Page 3 On The Lighter Side……...............Page 3 From Bill’s Desk...………..……....Page 4 Think about it: Facebook, Twitter and other social media web sites have become the world’s largest database of personal information, all served up intentionally by the user. It’s practically every scammer’s dream come true! 9 Smart Tips To Stay Safe Protecting yourself requires some awareness of how cyber criminals use the sys‐ tem against you. Here are a few things you need to know: 1. Keep your firewall’s security and anti‐virus software up‐to‐date. Business System Solutions specializes in providing management level responsibility for all the technology in your business. This includes support for your computer network and working with other hardware and software vendors whose technology you use. We do this with friendly, proactive, and responsive service. Our services can lower your costs, and we guarantee our work! 2. Never log in from public hotspots. Social networking sites generally do not have secure logins available (that’s the https with the lock icon in the search bar). That means your username and password can be swiped at any time. Log in only from trusted wireless networks. 3. Use strong passwords that contain a mix of upper‐ and lowercase let‐ ters, symbols and numbers. 4. Remember the golden rule: If you wouldn’t do it or say it on a public street, don’t post it online. 5. Be wary of all links and files. Hackers often post links in comments to try and trick you into downloading an “update,” “security patch” or “game.” 6. Keep an eye on what your friends post about you. Many people have been fired or lost an important client because of online pictures and content. 7. Be careful who you ‘friend.’ Yeah, it feels great to have hundreds (or thousands!) of friends, but the reality is, you really know only a frac‐ Page 2 Volume 4, Issue 4 tion of those people. 8. Be wary of all add‐ons. Many of the games and plug ‐ins are written by third‐party companies, not the social network itself. 9. Do a search on yourself. You might be surprised at just how much information comes up! If it’s more than you feel comfortable with, restrict your profile online. What Are QR Codes And How Can You Profit From Them In Your Business? The last time you were flipping through your favorite magazine, you may have noticed a small, digital-looking image on one or more of the advertisements. What is it? A “Quick Response” code or QR code for short. A QR code is a specific matrix barcode (or twodimensional code), readable by dedicated QR barcode readers and camera phones. The code consists of black modules arranged in a square pattern on a white background. The information encoded can be text, URL or other data. This concept was initially created by Toyota for tracking parts in vehicle manufacturing; however, QR codes have been largely adopted by advertisers that want to target mobile phone users (known as mobile tagging). QR codes can be used to display text to the user, to add a vCard contact to the user's device, to open a URL or to compose an e-mail or text message. Users can also generate and print their own QR codes for others to scan and use by visiting one of several free QR code–generating sites. So how could you use this? Some companies are smartly using this technology to drive sales by allowing people flipping through a magazine or waiting at a bus stop to get more information on a product, connecting the dots to get people to buy much faster than these types of media originally offered. Others are putting QR codes on permanent coupons or on their business cards to allow would-be prospects an instant way to get more information about a business. You can get a free QR code by going to: http:// qrcode.kaywa.com Shiny New Gadget Of The Month www.WorkFlowy.com Who doesn’t want to be more organized? You’re less likely to forget important projects, dates and tasks, which in turn will reduce your stress and wasted energy. But if you think getting (and staying) organized is tough, maybe you just haven’t found the right tool. If so, you should check out WorkFlowy. WorkFlowy makes capturing and organizing your ideas, projects and “to-do” list simple. It's based around the idea of outlines. Just pick a topic to organize and start typing. The outlining is handled almost automatically through its intuitive interface. You can create outlines within outlines and break up a large project into smaller actionable tasks. It's great for multi-step processes or even planning your week. Best of all, it's all online so you can access it from anywhere. All you need to do is create a free account and install Google’s Chrome browser. Since it’s free, you’ve got nothing to lose for giving it a try! Client Bill Of Rights #10 You have a right to a single point of contact for all your technical issues or concerns. We pledge to help with and IT related issue in your business, such as helping with any vendor you use, and with all technologies including anything IP based or connected to the computer, phone system and service, security, etc. Page 3 Volume 4, Issue 4 How To Spot An E-mail Hoax With the Internet and e-mail providing a free, viral platform for online scammers, hackers and cyber criminals, there’s no doubt that at some point you’ll receive an e-mail hoax. Some are harmless, but many can lead to virus infections, identity theft or worse. Here are some common themes to watch out for: ∗ Supposedly free giveaways in exchange for forwarding e-mails ∗ Bogus virus alerts ∗ False appeals to help sick children ∗ Pointless petitions that lead nowhere and accomplish nothing ∗ Dire, and completely fictional, warnings about products, com- panies, government policies or coming events Probably the most common indicator that an e-mail is a hoax is the "Send this e-mail to everyone in your address book" request. Hoax writers want their material to be spread as far and wide as possible, so almost every hoax e-mail will have this request built into the message. In some cases, e-mail hoaxes will even give you a specific number of people to send the message to in order to collect a prize or get something for free. Another surefire indicator that an e-mail is a hoax is that they don’t provide a checkable reference to back up claims. Genuine competitions, promotions, giveaways or charity drives will almost always provide a link to a company website or publication. Real virus warnings should only come from your installed antivirus software. E-mails containing government or company policy information are likely to include references to checkable sources such as news articles, websites or other publications. A third indicator is often the actual language used. E-mail hoax writers have a tendency to use an emotive, "over-the-top" style of writing peppered with words and phrases such as "Urgent,” “Danger,” “Worse virus ever,” and so on. Another indication is that these messages contain ALL CAPITAL LETTERS for added emphasis. When in doubt, don’t forward the message or take the action requested. The Lighter Side… While YOU would never use a lame excuse like one of these, according to CareerBuilder.com, these are a few of the reasons employees have given their bosses for skipping work: • Employee said a chicken attacked his mom. • Employee had a bad hair transplant. • Employee called in sick from a bar at 5:00 p.m. the night before. • Employee had to mow the lawn to avoid a lawsuit from his home owners’ association. • Employee’s finger was stuck in a bowling ball. • Employee fell asleep at his desk at work, hit his head and had a neck injury. Legal-eez? Attorneys go to college for years to get a degree. But here are some court transcripts that will leave you wondering what they actually learned! Attorney: “Doctor, how many of your autopsies have you performed on dead people?” Witness: “All of them. The live ones put up too much of a fight.” Attorney: “How was your marriage terminated?” Witness: “By death.” Attorney: “And by whose death was it terminated?” Witness: “Guess.” 928 Robinson Street West Lafayette, IN 47906 Phone: 765-742-3440 E-mail: [email protected] If you know of someone that might like to receive our newsletter, please send us an email at [email protected]. In your email, ask about our client referral program. From Bill’s Desk It’s a common enough story. In order to save on software costs, a business just installs the free version of a popular antivirus program on all its computers. It’s up to each user to run periodic system scans and updates. Invariably, somebody forgets to run a system scan. Or they get so frustrated with the performance hit to their computer when a scan is running that they stop it before it’s complete. Their system goes without the proper updates for a while, and eventually the user accidentally visits the wrong web site or clicks on the wrong email attachment and downloads a nasty virus. Or consider this scenario: a company leaves one employee in charge of running backups. That employee goes on vacation or stays home sick one day, so the backups don’t run. And that’s the day the server fails. ness stays safe and up-to-date no matter who’s in the office and who remembers to do what. As odd as it sounds, you cannot rely solely on human effort to keep your computer systems safe. You must automate if you’re going to have consistent, reliable updates to your security software and backup systems. And you need processes to run independent of any particular individual. Business System Solutions can automatically run system scans, software updates, virus and malware definition updates with our Total Care managed services plan. We also offer automatic data backups as part of the BSS Datavault backup and disaster recovery service. Call us at (765) 742-3440 or visit www.bssconsulting.com to find out more. If you’re a business owner, or if you’re the person in charge of running updates and performing regular maintenance, it can be hard to relinquish control. But you’ll free up untold amounts of time and spare yourself endless headaches if you aren’t in charge of everything. Automatic updates and scans, deployed systemwide, ensure that your whole busi- “Work with enthusiasm, as though you were working for the Lord rather than for people.” Ephesians 6:7
© Copyright 2024