541-779-4777 Facebook Twitter LinkedIn
November 2016  |  Welcome  |  Safe Online Shopping Tips for the Holiday Season  |  10 Ways to Keep Your Mobile Devices (and the Data on Them) More Secure  |  5 Email Security Tips for Employees and Organizations  |  Business Continuity Tip  |  Just for Laughs  |  Monthly Quote 
Welcome
We had an interesting problem a few weeks ago. A client called in and said that their internet was very slow. During our investigation we found that the Linksys router being used had been compromised and was causing the internet slow down. This Linksys device was being used as the firewall between the company network and the internet. It had been taken over using a known exploit. Pretty scary since this device could see the local network with all of the PC’s.

Since this client was not on a contract with us this device was not being maintained and the bad guys got in. Here is a good example where in today’s internet connected environment it is critical that you have all of your network connected devices monitored and maintained on a regular basis. We provide this service under our TekProtect-Gold Maintenance Agreements. If you would like us to review your existing firewall for possible issues, please give us a call 541-779-4777.

Have a Happy Thanksgiving!
Scott Christopherson - President, Tekmanagement Inc.
Safe Online Shopping Tips for the Holiday Season
used with permission from Norton by Symantec
by Nadia Kovacs
The shopping season is coming and if you're a modern consumer you're going to be doing at least some of your holiday shopping online. The problem is that some of the most dangerous places on the web aren't places selling products and services. So while that super special deal on the hottest new toy or gadget might seem hard to resist, you'll be paying for it time and again if you purchase from a compromised website.

One of the worst things that can happen when you're using the Internet is for your financial information to be compromised, but that's exactly what can happen when you use the Internet for purchases. A third-party attacker can gain access to your financial information and wreak havoc on your bank account through malicious or fake websites.

Read more →
10 Ways to Keep Your Mobile Devices (and the Data on Them) More Secure
used with permission from SBA.gov
by Anita Campbell
Mobile devices pose heightened security risks. Those risks come in several forms.
  • Devices — including business data saved on them such as call records, contacts, images, videos, documents and email messages — can be lost or stolen.
  • If you use mobile apps or cloud software accounts with saved logins, anyone could conceivably access your business data through those apps or accounts via a stolen or lost mobile device.
  • Devices used over insecure connections such as public Wi-Fi, can expose data to hackers and eavesdroppers who steal login credentials, banking and credit card information, emails, and more.
Read more →
 
5 Email Security Tips for Employees and Organizations
We send an astonishingly huge amount of email: over 205 billion emails per day. And the number is still growing.

Email is a critical communication tool for businesses. It's also a gateway for hackers, viruses, and other nasties. Here are 5 email security tips for keeping your email and your information secure.

1. Stay watchful and cautious

It's easy for an unauthorized person to email you and pretend to be a vendor or business partner. Be cautious and double-check before responding to sensitive requests.

Read more →
Business Continuity Tip:
The Cost of Free Wi-Fi

Over the remainder of the year, many of us will be traveling for the holidays. Chances are you'll be taking mobile devices with you and will want to connect to Wi-Fi. Public wi-fi is convenient, but it does come with risks. Be aware of the lack of security and follow these tips!

Think before you connect. Confirm the network name and login credentials with staff before hopping on. Try using your own (usually more secure) mobile network connection if you can.

Don't conduct sensitive activities. Most hotspots are not secure or encrypted, so avoid online shopping, banking, or any other sensitive work.

Keep software up to date. Install app and operation system updates immediately, whch include patches and security fixes for vulnerabilities.

Just for Laughs

Quote of the Month

"Life is divided into three terms — that which was, which is, and which will be. Let us learn from the past to profit by the present, and from the present, to live better in the future."

William Wordsworth
800 O'Hare Parkway  |  Medford, OR  97504  |  (541) 779-4777
www.tekmanagement.com