TekReport November 2015

by | Nov 19, 2015 | Blog




November 2015  |  Welcome  |
The myth of time management  |
Ransomware: 5 Do’s And Don’ts   |  Customizing the Ribbon
in Outlook 2013  |  Business Continuity Tip  |
Just for Laughs  |  Monthly Quote
One of our clients was hit with
the CryptoLocker ransomware attack last month and was only using an antivirus/malware product
at the time. We installed OpenDNS to help with the discovery and
reinfection prevention. The system infected with ransomware has to go
out to the internet to get instructions. After we installed OpenDNS, we
were able to block those ransomware internet requests, and pinpoint the
exact internal system making them.This is why I recommend a
layered security approach which includes antivirus, SPAM filtering, web filtering, DNS
filtering and user security awareness training.With the
holidays coming up, your employees may be spending a little more time
surfing the internet for those Black Friday deals. Please give me a call
to schedule a review of your current security measures so we can keep
your business safe.Scott Christopherson – President, Tekmanagement Inc.
The myth of time management
by Joe Serio,

If you’re like most people, you may think you have a time
management problem.

You may frequently find yourself saying, “I’m too busy!”
“I don’t have enough time!” “I can’t get everything done!” “I
need more hours in a day!”

I bet you often find yourself in that position, racing around,
trying to get everything done, feeling like you can never catch
up because there just isn’t enough time. You’ve convinced yourself
that you have bad time management skills.

There’s one important myth to dispel: there is no such
thing as time management.

Read more →

Ransomware: 5 Do’s And Don’ts
used with permission from Norton by
By Kevin Haley, Director, Symantec Security Response

I despise all forms of bullying. Perhaps the one I hate most
of all is where the bully takes a personal item, snatching it
from you, and refuses to give it back. It’s dangled right in
front of you, but held just out of reach. You’ll only get it
back after doing whatever the bully wants.

is an on-line form of the bully’s game of keep-away. Here, the
bully gets on your computer and takes your personal files -words
documents, photos, financial information, all the things you
care about. Those files are still on your computer, dangling in
from of you, but they are encrypted now, useless to you.
Read more →


Customizing the Ribbon in Outlook 2013

Did you know you can customize the Ribbon in multiple windows
in Outlook? If you want to permanently add or remove options
to declutter unused tools or make your workflow more efficient,
here’s how!

There are two types of tabs by default in Outlook.
Main Tabs are the Ribbon items you see while
in your Inbox or in Mail view: Home, Send/Receive, Folder, and

Tool Tabs are the tabs on the Ribbon for
Calendar, Task, Search, Attachment, and Compose windows. For
example, when you go to Calendar > New Appointment, the New
Appointment window has its own Ribbon with Tool Tabs.
Read more →

Business Continuity Tip:
with permission from SBA.gov
Bridget Weston Pollack
Seasonal Changes Present Ideal Time to Review
Emergency Preparedness

As summer turns to fall, it’s easy to get caught up in seasonal
activities like choosing Halloween costumes, picking apples
and pumpkins, or for small business, even getting ready for
the hustle and bustle of the holiday season.

But if a
disaster struck your business, would you be ready? Seasonal
changes provide an ideal time to check your business’s emergency
preparedness plans, especially for weather-related emergencies.
FEMA reports that between 40 and 60 percent of small businesses
never reopen following a disaster.

Read more →

Just for Laughs
Quote of the Month
“If you judge people,
you have no time to love them.”- Mother Teresa
800 O’Hare Parkway  |  Medford, OR  97504  |  (541) 779-4777



This entry was tagged , , , OpenDNS, , . Bookmark the permalink.