Back to Top

Tech, Web, Cloud & Cabling Services

Category: BigBeagle.com

BigBeagle.com Category

Research: Apple rated highest for security on mobile devices

Mobile devices are almost universal in the enterprise in 2016. Tech Pro Research conducted a survey to see what devices employees are using for work, and how safe these devices are.

In new research conducted by Tech Pro Research, 98% of respondents said they use mobile devices for work. Smartphones and laptops were the most common, with 94% of respondents who use mobile devices using them. 74% of mobile device users said they work with tablets. Wearables haven’t found a widespread usage base in the workplace, with only 14% reporting using them. When users rated the security of devices based on vendors, Apple got the best ratings in all categories.smartphones

For smartphones Apple’s high ratings could be partially attributed to familiarity since 67% of respondents said employees at their company use iPhones. Only Samsung was close to Apple in terms of prevalence, and the company was way behind Apple in security ratings.

tablets

Apple also had the largest share of tablet use, and the highest security rankings, among respondents. 53% said they and their colleagues use iPads and 46% of users ranked security as very good or excellent.

laptops

Dell was the most popular brand among respondents, in terms of use for work, but it got third place in security ratings.

wearables

Security on wearables appears to still be developing, based on the mediocre security ratings among all brands, and the fact that security feature usage isn’t the norm for wearables yet.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

How to avoid ransomware attacks: 10 tips

As ransomware increasingly targets healthcare organizations, schools and government agencies, security experts offer advice to help IT leaders prepare and protect.

Nigerian princes are no longer the only menaces lurking in an employee’s inbox. For healthcare organizations, schools, government agencies and many businesses, ransomware attacks—an especially sinister type of malware delivered through spear phishing emails that locks up valuable data assets and demands a ransom to release them—are a rapidly-growing security threat.

“We’re currently seeing a massive explosion in innovation in the types of ransomware and the ways it’s getting into organizations,” says Rick McElroy, security strategist for cyber security company Carbon Black Enterprise Response. “It’s a big business, and the return on investment to attackers is there—it’s going to get worse.”

While ransomware has existed for years, 2015 saw a spike in activity. The FBI received 2,453 complaints, with losses of over $1.6 million, up from 1,402 complaints the year before, according to annual reports from the bureau’s Internet Crime Complaint Center. And the numbers are only growing in 2016, the FBIreports.

“The Dark Web and Bitcoin allow almost anyone to sell stolen data without identification—cyber criminals understand they can make easy cash without the risk of being jailed,” says Ilia Kolochenko, CEO of web security company High-Tech Bridge. And hackers—most of which are located in developing countries—are growing more sophisticated, even developing downloadable ransomware toolkits for less-experienced hackers to deploy, according to the 2016 Institute for Critical Infrastructure Technology Ransomware Report.

“The days of grammatically incorrect, mass spam phishing attacks are pretty much over,” says James Scott, senior fellow and co-founder of the Institute for Critical Infrastructure Technology, and co-author of the report. Hackers can now check a victim’s social media accounts, and create a fake email address pretending to be a friend or contact in order to get them to click on an infected link or attachment. “It’s much more targeted, and will exploit a particular vulnerability in a device, application, server or software,” Scott adds.

A typical ransom demand is $300, according to a report from security firm Symantec.

Health threats

The healthcare sector is highly targeted by hacker attacks, due to antiquated or misconfigured computer security systems and the amount of sensitive data they hold, says David DeSanto, director of projects and threat researcher at Spirent Communications.

The large number of employees at most hospitals also makes cyber security safety training difficult, DeSanto says. Experts commonly see attacks occur through spear phishing—targeted emails with attachments with names such as “updated patient list,” “billing codes” or other typical hospital communications that employees may click on if not warned.

In 2015, over 230 healthcare breaches impacted the records of 500-plus individuals, according to data from the U.S. Department of Health and Human Services Office for Civil Rights.

A February ransomware attack launched against Hollywood Presbyterian Medical Center in southern California locked access to certain computer systems and left staff unable to communicate electronically for 10 days. The hospital paid a $17,000 ransom in bitcoin to the cybercriminals, says CEO Alan Stefanek.

Following security best practices can help healthcare organizations protect themselves. “The best way is to make regular backups of all systems and critical data so that you can restore back to a known good state prior to the ransomware being on the system,” DeSanto says.

Without security best practices, healthcare organizations may be left with few options to retrieve information. In these cases, healthcare organizations may choose to pay the ransomware fee. Some make enough money that paying the ransom for a few infected computers is low compared to the cost of maintaining the infrastructure to protect these attacks, DeSanto adds.

Schools and businesses

Hackers are gaining traction and using new methods across other industry verticals as well. In 2014, a large European financial services company (whose name was not disclosed) discovered with the help of High-Tech Bridge that a hacker placed a back door between a web application and a data set.

For six months, the hacker encrypted all information before it was stored in a database, undetected by company staffers. Then, they removed the encryption key, crashing the application, and demanded $50,000 to restore access to the database.

However, the company did not end up paying, thanks to mistakes made by the hackers, Kolochenko says.

Other victims are not as lucky, says Engin Kirda, professor of computer science at Northeastern University. “If the ransomware hacker does the encryption well, once the data is encrypted it’s nearly impossible to decrypt,” he adds.

Such was the case for South Carolina’s Horry County School District this February, when hackers froze networks for 42,000 students and thousands of staff. District technology director Charles Hucks tried to shut down the system, but within minutes, the attackers immobilized 60 percent of Horry County’s computers. The district paid $8,500 in Bitcoin to unlock their systems.

Tips for IT leaders

To prevent a ransomware attack, experts say IT and information security leaders should do the following:

  1. Keep clear inventories of all of your digital assets and their locations, so cyber criminals do not attack a system you are unaware of.
  2. Keep all software up to date, including operating systems and applications.
  3. Back up all information every day, including information on employee devices, so you can restore encrypted data if attacked.
  4. Back up all information to a secure, offsite location.
  5. Segment your network: Don’t place all data on one file share accessed by everyone in the company.
  6. Train staff on cyber security practices, emphasizing not opening attachments or links from unknown sources.
  7. Develop a communication strategy to inform employees if a virus reaches the company network.
  8. Before an attack happens, work with your board to determine if your company will plan to pay a ransom or launch an investigation.
  9. Perform a threat analysis in communication with vendors to go over the cyber security throughout the lifecycle of a particular device or application.
  10. Instruct information security teams to perform penetration testing to find any vulnerabilities.

Mitigating an attack

If your company is hacked with ransomware, you can explore the free ransomware response kit for a suite of tools that can help. Experts also recommend the following to moderate an attack:

  • Research if similar malware has been investigated by other IT teams, and if it is possible to decrypt it on your own. About 30 percent of encrypted data can be decrypted without paying a ransom, Kolochenko of High-Tech Bridge says.
  • Remove the infected machines from the network, so the ransomware does not use the machine to spread throughout your network.
  • Decide whether or not to make an official investigation, or pay the ransom and take it as a lesson learned.

“There is always going to be a new, more hyper-evolved variant of ransomware delivered along a new vector that exploits a newly-found vulnerability within a common-use application,” Scott of ICIT says. “But there are so many technologies out there that offer security—you just have to use them.”

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Now Microsoft Office 365 tackles ‘fake CEO’ email spoofing attacks

Microsoft is rolling out a host of new email security features for Office 365 later this quarter, as it looks to thwart hackers and criminals.

‘Insider spoofing’ or faking the CEO’s email address to trick the CFO into transferring millions to criminal bank accounts is big business. Now Microsoft is using big data and reputation filters to try and squish the threat.

According to the FBI, between October 2013 and August 2015, 7,066 US businesses have fallen prey to ‘business email compromise’, netting criminals an estimated $747m.

Non-US victims lost a further $51m over the period, with the FBI estimating a 270 percent increase in identified victims since January 2015, when it first released figures about the threat category.

As Microsoft notes, when a corporate email domain is spoofed, it makes it hard for existing filters to identify the bogus email as malicious.

However, Microsoft reckons it has achieved a 500 percent improvement in counterfeit detection using a blend of big data, strong authentication checks, and reputation filters in Exchange Online Protection for Office 365.

It’s also rolling out new phishing and trust notifications to indicate whether an email is from a known sender or if a message is from an untrusted source, and therefore could be a phishing email.

The company is also promising a faster email experience as it vets attachments for malware and new tools to auto-correct messages that are mis-classified as spam. The aim is to boost defences without impairing end-user productivity.

Malicious email attachments remain a popular way for attackers to gain a foothold in an organization and, as RSA’s disastrous SecurID breach in 2011 showed, a little social engineering can go a long way to ensuring someone opens it.

Microsoft’s new attachment scanner, called Dynamic Delivery of Safe Attachments, looks to reduce delays as it checks attachments for potential threats.

Currently it captures suspicious looking attachments in a sandbox with a ‘detonation chamber’ where it analyses it for malware in a process takes five to seven minutes.

Microsoft hasn’t figured out a faster way to analyse the attachment, but instead of holding up the email as it conducts the scan, it will send the body of the email with a placeholder attachment. If the attachment is deemed safe, it will replace the placeholder and if not, the admin can filter out the attachment.

The feature is part of Microsoft’s Office 365 Exchange Online Protection and Advanced Threat Protection services.

The company is also tackling false-positive spam, or legitimate messages that are mis-identified as spam, and vice versa, with a new feature called Zero-hour Auto Purge, which allows admins to “change that verdict”.

“If a message is delivered to your inbox and later found to be spam, Zero-hour Auto Purge moves that message from the inbox to the spam folder; the reverse is true for messages misclassified as spam,” Microsoft notes.

Microsoft is testing this approach with 50 customers and says it will be rolled out for all Exchange Online Protection global clients in the first quarter of 2016.

Have questions?

Get help from IT Experts/Microsofts Cloud Solutions Partner
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

11 awesome back-to-school gadgets for students

Whether you’re just starting high school or about to graduate college, our list of essential gear for students will ensure that you have a productive—and fun—school year.

SchoolGadgets1

New school year, new school gear

With classes back in session (or about to begin), hopefully you already have everything from your back-to-school list. Laptop? Check. The perfect bag for said laptop? Check. Schedule and text books? Check and check. Though your laptop and books are, of course, your school lifeline, there are some other gadgets you can add to your list to make your life easier. From practical picks (mice, keyboards, hard drives) to streaming sticks (hey, it’s all about that work/life balance!), our gear guide is full of recommendations designed to aid you in all the demands of student life.

SchoolGadgets2

Logitech K480 Bluetooth Multi-Device Keyboard

Your standard laptop keyboard is fine, but a wireless Bluetooth keyboard that you can sync with your mobile devices might be more comfortable for serious study work.Logitech’s K480 ($50 MSRP, $30 on Amazon) can be connected to three devices at once on any platform—Mac, PC, iOS, or Android—with familiar shortcut keys for all. It also has a handy groove at the top to prop up your phone or tablet.

SchoolGadgets3

Logitech MX Master

Your laptop’s trackpad, however, is not going to cut it for extended use—you’ll be much more comfortable with a mouse. The MX Master ($100 MSRP, $70 on Amazon), also by Logitech, has customizable buttons, supports trackpad gestures, and is comfortable to use. It’s a wireless mouse; pick between Bluetooth or 2.4GHz radio frequency to connect.

SchoolGadgets4

Bose QuietComfort 35 wireless headphones

A good pair of noise-cancelling headphones is a must—something to block out roommates (If you have them) or excess library/coffee shop sounds as you’re cranking out your midterm paper. Bose’s QuietComfort 35 ($349.95 MSRP, same price onAmazon) is a pricey pair, but worth it—they’re wireless, so they won’t get in the way as you’re moving about. There’s no way to disable the noise-cancelling feature, but that’s okay—they run for 20 hours on a single charge. While the audio quality varies, the noise-cancelling feature is second to none.

SchoolGadgets5

Altec Lansing Mini Life Jacket 3

You’ll want a great-sounding Bluetooth speaker, but one that’s easy to schlep around from party to party, and one that won’t die if it gets into an accident with a red cup.Altec Lansing’s Mini Life Jacket 3 ($100 MSRP, same price on Best Buy) has a rugged exterior that’s also waterproof—it can survive a dunk for up to 30 minutes—so it’s up for the challenge. We were impressed with its good fidelity and sound quality, and loved that it comes with a hardware kit for you to mount the speaker on your bike as you cruise around campus. And at $100, it’s priced for students, too.

SchoolGadgets6

Seagate Backup Plus Slim Portable

A hard drive may not be the most exciting thing on our list, but it’s the most practical—you’ll need something to back up your hard work just in case your laptop crashes.Seagate’s Backup Plus Slim Portable ($50 to $90 MSRP, same price on Amazon) will do just that. It’s compact, comes in a variety of capacities, and is available in four different colors and finishes.

SchoolGadgets7

Fitbit Alta

A smartwatch or fitness tracker is a must-have for maintaining your work-study balance. If you’re looking for a device that handles your push notifications, reminders, and more, then go with an all-around smartwatch that’s an extension of your phone. For iPhone users, that’s easy—go with the Apple Watch ($299 MSRP and up, available at the Apple Store). For Android users, we like the Huawei Watch ($350 MSRP and up, $299 and up on Amazon) for its style, features, and customizable options.

If it’s just the fitness stuff you’re after, you can’t go wrong with the Fitbit Alta ($129.95 MSRP, $119 on Amazon). This sleek activity tracker monitors your workouts, steps, and sleep automatically, and pairs it all within the Fitbit app on your phone (it’s compatible with both iOS and Android phones) so that you can keep an eye on your habits. Reminding yourself to stay active in between study sessions has never been so easy.

SchoolGadgets8

Livescribe 3

Spend one lecture with the Livescribe 3 Smartpen ($150 MSRP, $138.84 on Amazon) and corresponding app for your smartphone, and you’ll never want to go back to a regular old Bic. As you write in the Livescribe’s specialty notebooks, the smartpen sends a digital copy of your hand-written notes to your phone via Bluetooth, so you can access them at any time. It can also record audio notes through the Livescribe app on your smartphone, which get linked to your hand-written notes. When reviewing notes later, tap any word to hear what your professor was saying at that moment. If you’ve left yourself a doodle, abbreviation, or mnemonic device, tapping that word will bring you right back to the lecture. The pen itself can last 14 hours on a single charge.

SchoolGadgets9

Roku Streaming Stick

Your dorm may include a cable hookup for your TV, but it won’t play well with your Netflix subscription. The solution? Roku’s Streaming Stick ($50 MSRP, $39.01 onAmazon) a thumb-sized device that plugs into your TV or monitor’s HDMI port that streams web-based content—Netflix, Hulu, HBO Now, and more. It’s fast, has a dedicated remote, and is compatible with most of the major streaming content players.

SchoolGadgets10

OtterBox Universe Case System

Some school days, you never know what kind of gear you’ll need. Will your smartphone make it through the day without needing a recharge? Will you want to snap a picture of something being presented during lecture? What if you need to quickly transfer a file to a classmate?

OtterBox’s Universe Case System ($49.95 MSRP for the base, modules are extra; $44.95 on Amazon) has extra add-ons that can help you do all of those things. This system consists of various accessory modules that you can attach to your iPhone via its protective case—so you can snap on a battery pack ($50 on Amazon), a flash drive (64GB for $60 on Amazon), a tripod ($30 on Amazon), and more in a pinch.

SchoolGadgets11

Anker PowerCore 20100

A one-device battery pack might not cut it—you may want a dedicated battery pack for a long school day, to power up your tablet or other gear besides your phone. Anker’s PowerCore 20100 ($80 MSRP, $43 on Amazon) is small, light, and powerful, with two USB ports to charge two devices at once. Its whopping 20,000mAh battery can charge your phone seven times, or your iPad mini (or other small tablet) twice.

SchoolGadgets12

Stir Kinetic Desk M1

Standing desks are still having a moment in the health-tech spotlight, so if you’re considering a splurge on a new desk setup, dream big with Stir’s Kinetic Desk M1 ($2,990 MSRP, same price on Amazon). This smart desk is a well-built, comfortable workstation that smoothly adjusts between sitting and standing positions set to your preferences. You can tell the desk how often you’d like to stand up, and it will gently “nudge” you into your standing position by slightly raising up to coax you to move. The future is here, and this desk is proof.

Don’t have an extra $3,000 lying around? Grovemade’s Desk Collection (pictured in first slide) will keep your desk organized—and make it look like a million bucks for a fraction of the cost.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Microsoft withdraws update causing Outlook to start in Safe Mode (with fix)

outlook-safe-mode

Microsoft has withdrawn the released Windows Update KB3114409 because it causes Outlook to start in Safe Mode. This loads the email client without customizations and plugins. Fortunately it can be easily fixed.

The patch was actually released to stop Outlook from starting in Safe Mode, but it appears something didn’t go the right way. Microsoft has decided to withdraw the update for now.

Users affected by the update can easily stop Outlook from starting in safe mode by uninstalling the KB3114409 update.

This can be done this way: Go to your Control Panel. Go to ‘Programs and Features’ and left click ‘View installed updates’. Find KB3114409. Once you’ve found the appropriate update, click ‘Uninstall’.

(Tip: copy/paste KB3114409 and enter it in the search field at the top right.)

After a reboot of the computer Outlook will no longer start in safe mode.

Have questions?

Get help from IT Experts/Microsofts Cloud Solutions Partner
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Goodbye, Hotmail. Hello, Outlook.com

Summary: Microsoft’s flagship mail service for consumers gets a new name and a “modern” Metro-style interface. Here’s how to sign up for a preview and what to expect. So long, Hotmail. It was nice to know you. Microsoft unveiled a major update to its consumer mail platform today, with a new look, a slew of new features, and a new name that is surprisingly familiar.

The “modern email” service has been in super stealth mode for several months under the codename NewMail. With its formal launch as an open-to-the-public preview, the service gets a new name: Outlook.com. I’ve been using the NewMail beta for a week now and can share some first impressions here. Outlook, of course, is the serious, business-focused mail client included with Office. Microsoft used the brand with Outlook Express, its lightweight email client in Windows XP, but dumped the name with the launch of Windows Vista in 2006. Restoring the Outlook name to Microsoft’s consumer email service accomplishes two goals. First, it dumps the Hotmail brand, which is tarnished beyond redemption, especially among technically sophisticated users who have embraced Google’s Gmail as the default standard for webmail. More importantly, it replaces the Hotmail domain with a fresh top-level domain that’s serious enough for business use. (If you have an existing Hotmail.com or Live.com address, you can continue to use it with the new Outlook interface. But new addresses in the Outlook.com domain are up for grabs. if you have a common name, I recommend that you get yourself over to Outlook.com now to claim your preferred email address while it’s still available.) The Outlook.com preview will run alongside Hotmail for now, but when the preview ends, this will be the replacement for all Hotmail and Live Mail users. With Outlook.com, Microsoft is taking dead aim at Gmail, positioning Google’s flagship service as the old and tired player that is ready for retirement. Gmail, they point out, is eight years old, and its interface and feature set aren’t exactly modern. It doesn’t play well with any social media except its own, it handles attachments in a stodgy and traditional way, and it’s not particularly elegant when it comes to managing the deluge of email we all have to deal with every day. So what’s new about NewMail—sorry, Outlook.com? And why would anyone consider switching from Gmail? The most obvious change in the web interface, of course, is the overall design, which gets the full Metro treatment.

That three-pane layout follows the familiar Outlook standard, but the typography is definitely new. It’s clean and crisp with no wasted ornamentation or clutter. It should come as no surprise that the default organization is optimized for use on touch-enabled devices. A pane on the right shows different content, depending on the context. If you’re communicating with a friend of colleague who’s in your address book or connected via a social-media service, you’ll see updates about that person on the right side, with the option to chat with them (via Messenger or Facebook chat) in that pane. In a demo, Microsoft showed off Skype integration and said it will be coming later in the preview. If you’ve selected no message, the right pane might show ads, which appear in Metro style boxes with text–an image preview appears if you hover over the ad. As part of its positioning against Google, Microsoft has taken pains to note that your messages aren’t scanned to provide context-sensitive ads, as they are with Gmail. This is a pure HTML interface, which means the functionality is consistent across different browsers and on alternative platforms. I tested NewMail on a Mac using Safari and Chrome and in both Firefox and Chrome on several Windows PCs. Everything worked as expected. I also tested the web-based interface in mobile Safari on an iPad, where it also displayed perfectly (after switching from the default mobile layout). On mobile devices, you’ll be able to use native apps. An app for iOS devices should be available immediately. Microsoft promises an Android app “soon” that will enable Exchange ActiveSync support for older Android versions. A command bar at the top of the page provides access to commands as needed. If a command isn’t available in the current context, it’s not visible on the screen.

The preview pane (a feature that’s still experimental in Gmail even after eight years) lets you read and reply to messages without leaving the main screen. Action icons that appear when you move the mouse over an item in the message list let you file, delete, or flag the message with a single click or tap.

The new Outlook has some impressive mail management smarts built in. It automatically recognizes newsletters and other recurring types of mail. A Schedule cleanup option in the message header (also available on the command bar), lets you create rules on the fly that automatically delete or file similar messages to reduce clutter. You can specify, for example, that you want to keep only the most recent message from a “daily deals” site. You can also define how many messages you want to keep from a particular sender or automatically delete/file newsletters after a set number of days.

For newsletters that don’t contain an obvious unsubscribe link, the new Outlook adds a universal unsubscribe feature at the bottom of the message. When you select this option the web service sends an unsubscribe request on your behalf and creates a message-blocking rule. One huge differentiator between old-school webmail services like Gmail is the new Unified Address Book in Outlook.com. It takes a page from Microsoft’s People hubs in Windows 8 and the Windows Phone platform to pull together your traditional address book—where you manage names and details—and combine it with social media services of which you’re a member.

The advantage, of course, is that you always have the most up-to-date contact information for friends and colleagues, assuming they update their profiles. The new Outlook does a pretty good job of combining records. If you have contacts that appear in multiple locations, you can manually link or unlink those records as needed. Supported services include anything you can link to your Microsoft account, including Facebook, Twitter, LinkedIn, and Flickr. You can import contacts from Google and Facebook if you want to keep them locally. In terms of creating and sending photos and file attachments, the new Outlook integrates exceptionally well with SkyDrive, so that you can email large attachments and photo albums, storing them on SkyDrive with well-integrated links that the recipient can access with a click. The spec sheet says single attachments can be up to 300 MB in size. If they’re stored on SkyDrive, you don’t have to worry about the message being rejected by the recipient’s mail service. And of course, the service incorporates all of the Office Web Apps, which makes the process of sharing Word documents, PowerPoint slide decks, and Excel workbooks much more seamless. On the back end, the interface for managing an email account is cleaner. You can still create aliases that you use for sites and contacts where you don’t want to share your real address. And if you just want to experiment with the new service, you can redirect your Gmail messages temporarily to the new account or sign in with an existing Hotmail or Live address. (I’ve had my Gmail account redirected to Hotmail for a year without problems.)

To View Full Article Click Here

South Jersey Techies

Shark Tank host, Barbara Corcoran loses $388,700 in phishing scam

Barbara Corcoran of ABC’s “Shark Tank” has lost nearly $400,000 in a phishing scam this week. Corcoran told “People” that she was tricked as a result of an email scheme sent to her team.

The high-powered businesswoman told People that she received a scam invoice approving a real estate renovation, but she didn’t think twice about verifying it because she invests in real estate. It was only until her bookkeeper caught Corcoran’s assistant’s email was misspelled by 1 letter and it was later found to be the address used by the scammer.

“I was upset at first, but then remembered it was only money,” Corcoran told the magazine.

Corcoran’s assistant Emily Burke told CNN Business that the “Shark Tank” star wouldn’t provide any additional comment “at the advisement of her attorneys until the authorities are done investigating.”

However, Corcoran tweeted: “Lesson learned: Be careful when you wire money!” with a link to a TMZ story.

In addition to being an investor and a judge on the hit ABC show, Corcoran formerly owned the global real estate agency that shares her name. She sold it for $66 million in 2001.

Corcoran fell for a phishing scam. It’s common, too: Nearly 30,000 people reported being a victim of that type of scam last year. Together they reported nearly $50 million in losses, according to the FBI’s 2018 Internet Crime Report.

Phishing attacks are common methods of stealing usernames, passwords and money. Hackers pretend to be a trustworthy source to convince you to share personal data. To be safe, it’s important to make sure the sender is authentic before clicking on a link. Google has rolled out security protections that warns people of potential unsafe emails.

If you or your team have any questions or concerns please contact support at (856) 745-9990.



Microsoft IIS: Disabling the SSL v3 Protocol

 

Depending on how your Windows servers are configured, you may need to disable SSL v3.

Note that older versions of Internet Explorer may not have the TLS protocol enabled by default. If you disable SSL versions 2.0 and 3.0, the older versions of Internet Explorer will need to enable the TLS protocol before they can connect to your site.

For a Simpler Way to Disable the SSL v3 Protocol:

DigiCert is not responsible for any complications or problems if you decide to use this .zip file to disable the SSL v3 protocol on your server.

  1. Log into your server as a user with Administrator privileges.
  2. Download DisableSSL3.zip, extract the .zip file contents, and then double-click DisableSSL3.reg.
  3. In the Registry Editor caution window, click Yes.
  4. Restart server.

If you prefer to do it yourself, follow the steps in the instruction below.

Microsoft IIS: How to Disable the SSL v3 Protocol

  1. Open the Registry Editor and run it as administrator.For example, in Windows 2012:
    1. On the Start screen type regedit.exe.
    2. Right-click on regedit.exe and click Run as administrator.
  2. In the Registry Editor window, go to:HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\
  3. In the navigation tree, right-click on Protocols, and in the pop-up menu, click New > Key.
  4. Name the key, SSL 3.0.
  5. In the navigation tree, right-click on the new SSL 3.0 key that you just created, and in the pop-up menu, click New > Key.
  6. Name the key, Client.
  7. In the navigation tree, right-click on the new SSL 3.0 key again, and in the pop-up menu, click New > Key.
  8. Name the key, Server.
  9. In the navigation tree, under SSL 3.0, right-click on Client, and in the pop-up menu, click New > DWORD (32-bit) Value.
  10. Name the value DisabledByDefault.
  11. In the navigation tree, under SSL 3.0, select Client and then, in the right pane, double-click the DisabledByDefault DWORD value.Windows Registry Key
  12. In the Edit DWORD (32-bit) Value window, in the Value Data box change the value to 1 and then, click OK.
  13. In the navigation tree, under SSL 3.0, right-click on Server, and in the pop-up menu, click New > DWORD (32-bit) Value.
  14. Name the value Enabled.
  15. In the navigation tree, under SSL 3.0, select Server and then, in the right pane, double-click the Enabled DWORD value.
  16. In the Edit DWORD (32-bit) Value window, in the Value Data box leave the value at 0 and then, click OK.
  17. Restart your Windows server.You have successfully disabled the SSL v3 protocol.

For instructions about disabling browser support for the SSL v3 protocol, see Disabling Browser Support for the SSL 3.0.

 

Create Your Own Online Web Store

Everything you need to open your own online store.

You don’t need technical skills to build a successful Web store. Quick Shopping Cart makes it easy to create an eye-catching store that accepts credit cards, integrates with Google® and eBay® and offers multiple shipping options – all with no set-up fees!

Powerful features that are there when you need them.

Quick Shopping Cart makes it easy for anyone to build an online web store, but it also has a rich collection of advanced features that allow you to enhance, manage and promote your store.

Easy, Flexible Web Store Design:

  • Select from over 1,500 design and color combinations, 14 Category page styles and 11 Product Detail page styles.
  • Personalize with your logo, brand and product images.
  • Make changes easily with click-&-type editing.
  • Easily customize navigation to integrate your store with your main Website.
  • Add impact to your shopping cart with royalty-free photos from Fotolia®. All plans include 10 free download credits.

Simple Catalog Set Up:

  • Navigate quickly and easily with a step-by-step Store Setup wizard.
  • Specify product details, including SKU, description, pricing, options and inventory tracking.
  • Add and manage product images, including enlargements. Deluxe and Premium plans support up to five images per product.
  • Configure your product search options.
  • Create nested categories to help your customers browse through your catalog.

Multiple Payment & Shipping Options:

  • Accept all major credit cards through FrontStream Payments®, Intuit® Authorize.net®, Innovative Merchant Solutions®, PayPal Express Checkout, PayPal Website Payments Pro, PayPay Website Payments Standard.
  • Pay no setup or percentage-of-sales fees.2
  • Get real-time U.S. and international shipping rate quotes from UPS, FedEx and the USPS – or create your own custom shipping rate table.
  • Use built-in shipping and tax calculators.

Coupons, up-sells & Featured Products:

  • Showcase featured products in your sidebar navigation. Specify multiple products for a rotating display.
  • Create product cross-sells and up-sells that suggest related products (ie: “You may also like…”).
  • Create coupon codes for an amount-off, percent-off or free shipping. Coupons can also require a minimum purchase amount.
  • Create product bundles with special discounts.

Market your Online Store:

  • Increase the visibility of your online store with search engine-friendly page URLs.
  • Track the response of your marketing campaigns with auto-generated links that include your promotional code.
  • Easily add your products to Google® Product Search and eBay®.

Manage your Orders & Customer:

  • See new orders, inventory status and member activity at a glance.
  • Search and filter orders and export information to a Microsoft® Excel file.
  • Capture credit card payments, enter shipping and tracking information and print shipping labels.
  • Receive email notification for orders.
  • Track product inventory and set minimum thresholds.

Hosting & Security:

  • FREE web hosting with guaranteed 99.9% network uptime.
  • Phone and online support.
  • SSL Certificate enabled to securely process credit cards.
  • PCI compliance verified by independent auditor.
  • Fraud Module
  • Offer easy and secure customer login and checkout.

Integrate your Store:

  • WebSite Tonight: Combine your store with a content-rich website using one of more than 200 common designs.
  • eBay: Quick Shopping Cart is a certified eBay listing tool.
  • Google Product Search: Help customers find your products online.
  • Microsoft Excel: Import and export data with ease.
  • Atandra T-HUB: Integrate with QuickBooks, UPS, USPS, and FedEx with T-HUB multi-channel order manager.

All Plans Include:

  • 1,500+ quick-start design and color combinations
  • Fast and easy setup
  • No set-up or per-sale fees
  • Accept credit cards, PayPal Express® or phone orders
  • UPS®, USPS®, and FedEx® shipping with real-time rates
  • Add your products to eBay and Google Product Search
  • FREE web hosting with guaranteed 99.9% network uptime!
  • Phone, email and Web support

Call (888) 505-1532 to get started now

Windows Server 2003 end of life guide

How to organize your migration from Windows Server 2003

 

Following on from end of support for Windows XP in April 2014, we are now rapidly approaching Windows Server 2003 end of life.

Despite Microsoft warning about end of life for Windows Server 2003 as early as April 2013, many organisations are yet to begin their migration away from the server platform. Worse still, many organisations and IT pros are unaware of the huge financial costs and security risks should they continue running Windows Server 2003 past the end of life date.

Reports from HP claim that more than 11 million systems are still running Windows Server 2003. With fewer than 240 days left until end of life, this a huge problem as the estimated time required to migrate a datacentre of 100 or more servers can range from a minimum of three months and upwards of 18 months.

If you own even one of those 11 million servers and you have yet to begin migration, you should be worried. Luck for you, the following guide will migrate you to a position of safety. We will cover the following:

• Windows Server 2003 End of Life date
• Understanding what end of support means for Windows Server 2003 and the associated impacts
• An outline of how to migrate Windows Server 2003
• Resources to aid migration

Windows Server 2003 End of Life date

According to the Microsoft Support Lifecyle section on 14 July 2015, Microsoft will end extended support on all versions of Windows Server 2003/R2.

Understanding what end of support means for Windows Server 2003

From then on, this means no more updates or patches from Microsoft, which can result a less secure and less stable infrastructure for your business. What this really means:

• Maintenance Costs – running legacy servers is expensive. Intrusion detection systems, advanced firewalls and network segmentation are required to protect a now vulnerable Windows Server 2003 platform. You will also have increasing cost from maintaining aging hardware. Current estimates in a TechNet post from Alex Fu place the cost of custom support post end of life at US$200,000 on average. In a Q&A with David Mayer, practice director of Microsoft Solutions for Insight Enterprises, he estimated a support cost of $1500 per server per year.

• No Updates – there will be no more updates to fix bugs, performance issues and security vulnerabilities. To put this into perspective, 2013 saw the release of 37 critical updates for Windows Server 2003/R2. Past the end of life date, these critical issues will remain unfixed leaving you open to cybersecurity dangers such as malicious attacks or electronic data loss.

• No Compliance – once support ends, your organisation will almost certainly fail to meet industry wide compliance standards. Regulations such as HIPAA, PCI, SOX & Dodd-Frank all require regulated industries to run on supported platforms. The impact is twofold: Non-compliance could result in the loss of business, while high transaction fees and penalties from non-compliance could dramatically increase the cost of doing business.

• Software and Hardware Compatibility Issues – new software and hardware devices will not be built to integrate with Windows Server 2003. Sticking with a legacy server means you will likely run into compatibility issues and may not be able to run new instances of software or communicate with the latest devices.

• No Safe Haven – without continued support from Microsoft, virtualized and physical instances of Windows Server 2003/R2 and Microsoft Small Business Server (SBS) 2003 will not pass a compliance audit.

How to migrate from Windows Server 2003

Do not underestimate the task that lies ahead. Migrating applications and server workloads is no easy task. Worryingly, a study by App Zero suggests that 62 per cent of organisations do not have a plan to upgrade or migrate, or even know that EOS is coming.

• Discover – first up is discovering and cataloguing all the software and workloads that are running on Windows Server 2003/R2 at present. Download the Microsoft Assessment and Planning toolkit as this will be a worthy support document.

• Assess – now you have a list it’s time to analyse and categorise all your applications and workloads based on type, criticality, complexity and risk. This helps you prioritise for migration as well as identify issues and opportunities.

• Target – in this step, you must choose a destination for each application and workload. This could be the perfect time to evolve your organisation to the next level and embrace the cloud. Microsoft offers a series of destinations for each application or workload which could include:

billionphotos-1008218 (1)

o Windows Server 2012 R2
o System Center 2012 R2 (Private Cloud)
o Microsoft Azure (Public Cloud)
o SQL Server 2014
o Office 365

• Migrate – now is the time choose a migration plan. Microsoft offers a fantastic Migration Planning Assistant which covers all four steps. Look for official Microsoft training courses to give you an in-depth understanding of the new platforms you are planning to migrate to.

Resources to aid migration

Due to the widespread requirement to migrate, there is a range of fantastic resources to aid migration. These include:

Microsoft Virtual Academy – arguably the largest and best collection of free self-study resources from Microsoft experts including videos, slide decks and self-assessments. Check out the section on migrating to Windows Server 2012, or the Microsoft zure JumpStart.

Windows Server 2003 Roles Migration Processdownload this document and turn it into an A3 poster, stick it on your wall and use it to visualise the whole process.

Microsoft Deployment Toolkitdownload this fantastic resource, which provides a collection of processes, tools and guidance for automating new desktop and server deployments.

Free Software Trials – Microsoft have a series of trials so you can check out the new software. Here they are:

Windows Server 2012 R2 trial
System Center 2012 R2 trial
Microsoft Azure one-month trial
Office 365 trial
SQL Server 2014 trial

Windows Server Migration Services – there are a series of organisations that offer assistance in migrating away from Windows Server 2003. Big players include:

• Dell
• RackSpace
• HP

Time is running out — start your migration away from Windows Server 2003 today. Fail to do so and you find yourself facing some organisation-crippling consequences

Have questions?

Our Business IT Server Migration Specialists in NJ, PA & DE are here to help.
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/server-support/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

CALL US NOW!