pageflex server [document: prod ci17050139938982 20170508 ... · if you are considering cloud...

4
N o matter how “bomb-proof” we make your network, you and your employees can still invite a hacker in if you click on a link or open an attachment in an e-mail sent by a cybercriminal. Some spam is obvious (can you say, “Viagra at a discount”?) but others are VERY cleverly designed to sneak past all the filters and trick the recipient into opening the door. Known as a “phishing” e-mail, this still is the #1 way hackers circumvent firewalls, filters and antivirus, so it’s critical that you and your employees know how to spot a threatening e-mail. Here are four types of e-mail ploys you should be on high alert for. The Authority E-mail. The most common phishing e-mails are ones impersonating your bank, the IRS or some authority figure. The rule of thumb is this: ANY e-mail that comes in where 1) you don’t PERSONALLY know the sender, including e-mails from the IRS, Microsoft or your “bank,” and 2) asks you to “verify” your account should be deleted. Remember, ANY important notification will be sent via old-fashioned snail mail. If it’s important, they can call you. The “Account Verification” E-mail. Any e-mail that asks you to verify your password, bank information or login credentials, OR to update your account information, should be ignored. No legitimate vendor sends e-mails asking for this; they will simply ask you upon logging in to update or verify your information if that’s necessary. The Typo E-mail. Another big warning sign is typos. E-mails coming from overseas (which is where most of these attacks come from) are written by people who do not speak or write English well. Therefore, if there are obvious typos or grammar mistakes, delete it. The Zip File, PDF Or Invoice Attachment. Unless you specifically KNOW the sender of an e-mail, never, ever open an attachment. That includes PDFs, zip files, music and video files and anything referencing an unpaid invoice or accounting file (many hackers use this to get people in accounting departments to open e-mails). Of course, ANY file can carry a virus, so better to delete it than be sorry. t ' n o d u o y , r e n w o s s e n i s u b a s A l a c i n h c e t n o e t s a w o t e m i t e v a h s ' t a h T . s e u s s i l a n o i t a r e p o d n a n a t u p d n a s u l l a C ! e n i h s e w e r e h w d n a y l l a n s m e l b o r p T I r u o y o t d n e " ! r e v e r o f 7 1 0 2 y a M s w e n a r a e h u o y , k e e w y r e v e y l r a e N e g r a l a n o k c a t t a - r e b y c a t u o b a y r o t s r e v e n l l ' u o y k n i h t u o y e b y a M . y n a p m o c r e l l a m s a e r ' u o y e s u a c e b d e t e g r a t e b k c a t t a s k o o r c e s e h t , y l k n a r F . y n a p m o c r e g r a l n a h t E R O M s e s s e n i s u b l l a m s n a e r ' u o y e s u a c e b y l p m i s , s e i n a p m o c t a h t e r u s % 0 0 1 u o y e r A . t e g r a t y s a e y r e v e n o s u r i v - i t n a g n i k r o w e v a h u o y y r e v e s I ? r e v r e s r u o y D N A r e t u p m o c n a n g i s o t d e r i u q e r e e y o l p m e o g r e d n u d n a y c i l o P e s U e l b a t p e c c A e r u s t o n e r ' u o y f I ? n o i t a c u d e g n i u n i t n o c a e r a u o y n e h t , f o o r p t e l l u b e r ' u o y f i . s k c a t t a - r e b y c e s e h t r o f t e g r a t E M I R P ! y a d o t l l a c a s u e v i G y l h t n o m s i h T d e d i v o r p n o i t a c i l b u p k r a M f o y s e t r u o c n a b e t s E & s n e n a B s r e d n u o F , o d a g l e D . S S T I Z I B f o e w e r e h w s ' t a h T . s e u s s i l a n o i t a r e p o d n a l a c i n h c e t n o e t s a w o t e m i t e v a h t ' n o d u o y , r e n w o s s e n i s u b a s A " ! r e v e r o f d n a y l l a n s m e l b o r p T I r u o y o t d n e n a t u p d n a s u l l a C ! e n i h s e t a d p U y t i r u c e S e h T f O % 9 9 n O n w o D t u C o T s U l l a C g n i t t e G e r u o Y s l i a m - E m a p S e t i s n o e m o c l l e w d n a h t n o m s i h t s u l l a C n o i t c e t o r p - m a p s e e r f a m r o f r e p o t - 6 8 7 t a y a d o t s u t c a t n o c y l p m i S . s i s y l a n a e v r e s e r o t m o c . s s t i z i b @ o f n i r o 0 0 2 8 - 6 6 7 m o s n a r a e r o f e b w o n t i o D . s r u o y r u o y n i p u s w o h s e s r o w r o d n a m e d . x o b n i

Upload: others

Post on 08-Jul-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Pageflex Server [document: PROD CI17050139938982 20170508 ... · If you are considering cloud computing or Office 365 to save money and simplify IT, it is extremely important that

No matter how “bomb-proof” wemake your network, you andyour employees can still invite

a hacker in if you click on a link or open an attachment in an e-mail sent by a cybercriminal. Some spam is obvious (can you say, “Viagra at a discount”?) but others are VERY cleverly designed to sneak past all the filters and trick the recipient into opening the door. Known as a “phishing” e-mail, this still is the #1 way hackers circumvent firewalls, filters and antivirus, so it’s critical that you and your employees know how to spot a threatening e-mail. Here are four types of e-mail ploys you should be on high alertfor.

The Authority E-mail. The most common phishing e-mails are ones impersonating your bank, the IRS or some authority figure. The rule of thumb is this: ANY e-mail that comes in where 1) youdon’t PERSONALLY know the sender,including e-mails from the IRS, Microsoftor your “bank,” and 2) asks you to“verify” your account should be deleted.Remember, ANY important notificationwill be sent via old-fashioned snail mail.If it’s important, they can call you.

The “Account Verification” E-mail. Any e-mail that asks you to verify your password, bank information or login credentials, OR to update your account

information, should be ignored. No legitimate vendor sends e-mails asking for this; they will simply ask you upon logging in to update or verify your information if that’s necessary.

The Typo E-mail. Another big warning sign is typos. E-mails coming from overseas (which is where most of these attacks come from) are written by people who do not speak or write English well. Therefore, if there are obvious typos or grammar mistakes, delete it.

The Zip File, PDF Or Invoice Attachment. Unless you specifically KNOW the sender of an e-mail, never, ever open an attachment. That includes PDFs, zip files, music and video files and anything referencing an unpaid invoice or accounting file (many hackers use this to get people in accounting departments to open e-mails). Of course, ANY file can carry a virus, so better to delete it than be sorry.

t'nod uoy ,renwo ssenisub a sA“ lacinhcet no etsaw ot emit evah

s'tahT .seussi lanoitarepo dna na tup dna su llaC !enihs ew erehw dna yllanfi smelborp TI ruoy ot dne

"!reverof

7102 yaM

swen a raeh uoy ,keew yreve ylraeN

egral a no kcatta-rebyc a tuoba yrots

reven ll'uoy kniht uoy ebyaM .ynapmoc

rellams a er'uoy esuaceb detegrat eb

kcatta skoorc eseht ,ylknarF .ynapmoc

regral naht EROM sessenisub llams

na er'uoy esuaceb ylpmis ,seinapmoc

taht erus %001 uoy erA .tegrat ysae

yreve no suriv-itna gnikrow evah uoy

yreve sI ?revres ruoy DNA retupmoc

na ngis ot deriuqer eeyolpme

ogrednu dna yciloP esU elbatpeccA

erus ton er'uoy fI ?noitacude gniunitnoc

a era uoy neht ,foorptellub er'uoy fi

.skcatta-rebyc eseht rof tegrat EMIRP

!yadot llac a su eviG

ylhtnom sihT dedivorp noitacilbup

kraM fo ysetruoc nabetsE & snenaB srednuoF ,odagleD

.SSTIZIB fo

ew erehw s'tahT .seussi lanoitarepo dna lacinhcet no etsaw ot emit evah t'nod uoy ,renwo ssenisub a sA“ "!reverof dna yllanfi smelborp TI ruoy ot dne na tup dna su llaC !enihs

etadpU ytiruceS

ehT fO %99 nO nwoD tuC oT sU llaC gnitteG er’uoY sliam-E mapS

etisno emoc ll’ew dna htnom siht su llaC noitcetorp-maps eerf a mrofrep ot

-687 ta yadot su tcatnoc ylpmiS .sisylanaevreser ot moc.sstizib@ofni ro 0028-667

mosnar a erofeb…won ti oD .sruoy ruoy ni pu swohs – esrow ro – dnamed

.xobni

Page 2: Pageflex Server [document: PROD CI17050139938982 20170508 ... · If you are considering cloud computing or Office 365 to save money and simplify IT, it is extremely important that

Keeper Security, a company specializing in secure password management, conducted a review of the 10 MILLION passwords that became public in 2016 from various hacker attacks. What they found was shocking. One of the most common passwords used was “123456” with the second being QWERTY, which are the top keys on a keyboard – and these were used by webmasters to “protect” the digital keys to your website’s kingdom!

Another very common mistake was that many passwords were six characters or

shorter, which any brute-force password-cracking software can descramble in SECONDS. So while remembering all

those passwords and changing them is a major pain in the butt, getting your website hacked or your bank account wiped out is even worse. Our advice is to create a password that is at LEAST 12 characters, with uppercase and lowercase letters, and numbers and characters such as ! or #. Of course, if you need help in remembering and organizing your passwords, there are several very good password management software tools such as LastPass and RoboForm that can keep all

the passwords secure AND make it easy to cut off an employee’s access to various passwords and sites easily if they are let go or they quit.

One of the most common passwords used was “123456”

with the second being QWERTY, which are the top

keys on a keyboard – and these were

used by webmasters to “protect” the

digital keys to your website’s kingdom!

10 Million Passwords Became Public; The Findings Were Astonishing

troperduolc/moc.sstizib.www//:ptth :yadoT ypoC eerF ruoY teG

TI ruoy ot dne na tup dna su llaC !enihs ew erehw s'tahT .seussi lanoitarepo dna lacinhcet no etsaw ot emit evah t'nod uoy ,renwo ssenisub a sA“ "!reverof dna yllanfi smelborp

7102 yaM 7102 yaM

roF gnitupmoC duolC gniredisnoC erA uoY fI :daolnwoD tropeR eerF …sihT daeR uoY litnU ,T’NOD ,ynapmoC ruoY

si ti ,TI yfilpmis dna yenom evas ot 563 ecfifO ro gnitupmoc duolc gniredisnoc era uoy fI ssenisuB yrevE stcaF lacitirC 5“ ,troper laiceps siht daer dna teg uoy taht tnatropmi ylemertxe

”.duolC ehT oT krowteN riehT gnivoM erofeB wonK tsuM renwOatad ,gnitupmoc duolc fo snoc dna sorp eht smret lacinhcet-non ,elpmis ni sessucsid troper sihT

TI tsom taht stcaf nwonk-elttil eerht sa llew sa ,redivorp duolc a esoohc ot woh ,ytiruces uoy gnisuac pu dne dluoc taht gnitupmoc duolc tuoba uoy llet t’now ro wonk t’nod stnatlusnoc

.detapicitna uoy naht yenom erom uoy gnitsoc dna smelborp EROMnoitamrofni thgir eht uoy evig lliw troper siht ,tey duolc eht ot evom ot ydaer t’nera uoy fi nevE

.semoc emit eht nehw ksa ot snoitseuq dna

Page 3: Pageflex Server [document: PROD CI17050139938982 20170508 ... · If you are considering cloud computing or Office 365 to save money and simplify IT, it is extremely important that

How do great leaders inspire others to commit themselves to their goals? It’s not just that they have charismatic personalities, or that they give a lot of high-energy motivational talks. What they do is communicate their vision so effectively that other people adopt it as their own.

Inspiring people is what great leaders like John F. Kennedy did best. In the early ’60s, President Kennedy set his sights on putting a man on the moon and told the American people, “We can do it!” He said it with such conviction that people believed it and committed themselves to making it happen. And, sure enough, we made it to the moon. That’s the formula for any leader to inspire commitment: clear goals, a solid plan of action and a strong conviction.

Of course, leadership takes more than inspiration. One of the most insightful tips I learned about leading others is that people do things for their reasons, not for your reasons or for mine. So how can you move past the empty rhetoric and translate your vision into concrete actions your people can identify with and get excited about? Let me suggest seven proven techniques for building a solid team:

Recognize outstanding performance.

Everyone likes to look good in the presence of their peers. When you find someone doing something right, make sure you give them public recognition. If they do really well, throw in a tangible benefit, bonus or gift. It will boost the whole team’s mood and productivity.

Constantly ask for input and ideas.

People are usually much more enthusiastic about supporting decisions and plans they helped create. So get ideas and input from any person whose job will be affected by any upcoming decision. When your team quits talking about the company, and starts talking about our company, you know you’ve got a team.

Give them proper coaching and training.

If you’re lucky, you’ll have one or two people who can plow into almost anything

How To Get Your Employees To Commit To Achieving BIG Goals

with little to no instruction from you. But most people need a lot of training, mentoring, coaching and guidance in the beginning. Without that, people can become frustrated quickly and lose interest in hitting a big goal.

Just be a nice person.

Make people feel valued and important by treating them with dignity and respect. If you have to correct someone’s mistake, do it privately, and counter it with a sincere compliment. Attacking someone and belittling them is never a useful way to get the most out of a team member.

Get rid of underperformers fast.

You’ve heard the phrase “Hire slow and fire fast.” This is a piece of advice we all need to keep in mind. Make sure you weed out the bad apples before they spoil your culture. That’s because keeping someone on the team who is not performing, is not trying and is clearly not doing their job sends a message that it’s okay – which is incredibly demotivating to high performers who are striving to hit big goals.

It takes a lot of patience and effort to build a solid team of people who will share and help you fulfill your vision, but the results will be well worth all you put into it.

Dr. Nido Qubein is president of High Point University, an undergraduate and graduate institution with 4,300 students from 40 countries. He has authored two dozen books and audio programs distributed worldwide. As a business leader, he is chairman of the Great Harvest Bread Company, with 220 stores in 43 states. He serves on the boards of several national organizations, including BB&T (a Fortune 500 company with $185 billion in assets), the La-Z-Boy Corporation (one of the largest and most recognized furniture brands worldwide) and Dots Stores (a chain of fashion boutiques with more than 400 locations across the country). As a professional

speaker, Dr. Qubein has received many distinctions, including the Golden Gavel Medal, induction into the International Speaker Hall of Fame and as the founder of the NSA Foundation in Arizona. To learn more about Dr. Qubein, go to: http://www.nidoqubein.com/

dna "redisnI TI" tuobA .edivorP ew secivreS

uoy gnirb ot si laog ruO

hcae ecnegilletni ssenisub selcitra emos elihW .htnom

ygolonhcet a evah thgim elos eht eb t’now taht ,sucof

siht fo esoprup evah uoy fI .rettelswen

su ekil dluow uoy snoitseuq elcitra na etirw ot

ebircsbus ot tnaw uoy fi ro ,no tnirp siht ot dneirf a liame tsuj ,rettelswen

.moc.sstizib@snenabm ta em

.gnitlusnoC TI :secivreS ruO ytiunitnoC ssenisuB

.gninnalP .ytiruceS krowteN

.gnirotinoM krowteN .secivreS TI deganaM

retsasiD dna pukcaB .yrevoceR

.snoituloS duolC .noitazilautriV

.563 ecfifO .noitcetorP mapS/liamE

.ynohpeleT PIOV

ta yadot llac a su eviG yna ssucsid ot 0028-667-687

ro sdeen lanoitidda .evah yam uoy snoitseuq

eW secivreS reffO

TI ruoy ot dne na tup dna su llaC !enihs ew erehw s'tahT .seussi lanoitarepo dna lacinhcet no etsaw ot emit evah t'nod uoy ,renwo ssenisub a sA“ "!reverof dna yllanfi smelborp

7102 yaM 7102 yaM

Page 4: Pageflex Server [document: PROD CI17050139938982 20170508 ... · If you are considering cloud computing or Office 365 to save money and simplify IT, it is extremely important that

Want More Customers? Use This FREE Google Marketing Trick. If you want your business to show up first when potential customers are searching for you or for the services and product you provide, you MUST claim your business on Google. This free service allows you to enter data about your company, products, services and location that will greatly improve your search-engine ranking. Make sure you enter COMPLETE data and information, including hours of business, your phone and photos of your location. You can even post internal photos of your store or office, but you must hire a Google certified photographer (a simple search with Google will allow you to find one in your area). Remember, Google displays search results based on relevance, so the more specific information you can provide on what you do, the better your chances are of coming up in search-engine rankings. For more information, just search “Google My Business” to get started.

The Latest Way Hackers Are Stealing Your Identity That You Won’t Believe. Researchers at Japan’s National Institute of Informatics report that fingerprints can be easily reproduced from photos without using any advanced technology. If the image is clear and well-lit, fraudsters can mimic your fingerprints. Swiping biometric data is nothing new. In 2015 a famous hacker recreated German chancellor Angela Merkel’s iris from a photo to unlock a test. The problem is, once biometric data is resold on the dark web, the risk it will be used against you persists for life. New technologies, such as a scanner that also analyzes underlying tissue and pulse, promise to “go deeper,” making this type of theft more difficult. Until then, however, think twice before flashing that peace sign on your next selfie. Telegraph.co.uk, 01.17.17

How Businesses Hurt Sales And Their Reputation On Social Media. If you have any type of social media presence – Facebook, Twitter, LinkedIn,YouTube or others – one ofthe things you must be onCONSTANT alert for is customercomplaints. According to a studyconducted by Edison Research,consumers post their complaintson social media in order to solicita FASTER response than goingthrough the normal channels.That’s because smart companiesdon’t want an unhappy client’scomments hanging out there forthe world to see, unansweredand unaddressed. So IF youare going to have a presenceon social media, make sureyou or someone on your teamis constantly monitoring it forclient complaints.

New 360 video cameras let you deliver a whole new customer experience. 360 video lets your customers visit a location without actually being there. How you use it depends on your business, but the sky’s the limit – literally. Realtors and property managers, for instance, can give prospective buyers or renters a view from the kitchen where they can look in all directions and get a feel for the place that they just can’t get from 2-D shots. 360 video cams consist of two back-to-back fish-eye lenses and software that “stitches the seam” between them. Just be sure to position the camera where viewers can see everything all around them. With the right camera and headset, you can now put your customers “on location” – virtually. Wired, 02.24.17

TI ruoy ot dne na tup dna su llaC !enihs ew erehw s'tahT .seussi lanoitarepo dna lacinhcet no etsaw ot emit evah t'nod uoy ,renwo ssenisub a sA“ "!reverof dna yllanfi smelborp

7102 yaM 7102 yaM