Tech Talk Newsletter – May 2016 – Computer Security

computer repair newsletter

What’s New

Datto Drive

Dave Cooksey
Chief Operating Officer
TS Conard, Inc. Technology Solutions

Normally, I’m pretty skeptical when it comes to offers that look too good to be true. In this case however, I’ll make an exception. Our partner, Datto, the industry’s best provider of hybrid backup and disaster recovery, is offering a new product called “Datto Drive”.

Datto Drive a robust Cloud File Storage & Sharing solution designed for business from the ground up. With Datto Drive, users can access files on any device, anywhere, anytime. For a limited time, Datto is offering one Terabyte of cloud storage on Datto Drive FREE for a whole year. That’s right, FREE. After that, it’s only $10 bucks a month.

Benefits of Datto Drive:

  • Whether files reside on a desktop, Datto drive cloud storage
    laptop or mobile device, Datto Drive enables users to access, move and share this information easily and securely.
  • Unlimited users across your account.
  • Documents can be shared with employees or outside your company without having to send files via email.
  • All files are versioned, you can “rollback” to older versions of the files.
  • If there is ever an accidental overwrite or file deletion, Datto Drive users can recover lost data on your own terms without contacting a support line.
  • Automatically sync’s data on across all devices.

The ability to access your files when you need them, built in versioning, and security compliance while in transit and at rest. You get one Terabyte of space to use and not limit to the number of users that can access it! And the best part… it’s FREE for the first year!

This is a great deal. Just follow the link provided and sign your company up today! If you need help just give us a call and we can guide you through the process.

To get your Datto Drive, CLICK HERE!!  or see how Datto Drive stacks up against the competition below:

Datto drive cloud storage

Featured Article

Your #1 Computer Security Threat data security computer repair
(And How To Defeat It)

If you thought spam (junk e-mail) was just an annoying nuisance, think again.

Unfortunately, human beings communicating by e-mail often turn out to be the weakest link in your network’s defenses. That’s why cyber criminals often rely on spamming to inject their toxic code into their victims’ computers. And, just as malware is becoming ever more potent, so are the tactics used by spammers to dupe the unwary. All of which is to say…

Spam may pose the greatest threat to your data.

So what tactics are spammers using these days to deliver their malicious payloads to your computer? The ruse of appearing as a credible sender with an urgent and alarming inquiry, such as an overdue notice from the IRS, or an e-mail from a familiar-looking vendor with an attached invoice asking why payment wasn’t made, can trigger an emotional response in even the most coolheaded of today’s harried e-mail recipients.

Attached files now carry familiar extensions, such as *.gif, *.tiff, *.docx, *.pdf, *.png and *.jpg, and the message may seem like it’s all part of a day’s correspondence. In a recent typical scenario, an HR manager at an expanding company had asked several job candidates to e-mail her their résumés. Within minutes after clicking on what she thought was a résumé, all her data was encrypted and she was faced with a ransom message demanding $800 to unlock it.

Outrageous? Yes.

And, unfortunately, all too common. Spam may well be THE weapon of choice for computer criminals because it can be so devastatingly effective against unwary victims. What’s particularly troubling is that the malware it delivers via booby-trapped e-mails can infect not only the victim’s computer, but the entire network as well. And once installed, it can be very hard to detect. So, what can you and your IT manager or consultant do about it?

Here are four ways to “FITE” back:

  1. Filter.   Performance varies widely among spam filters. Look for the highest degree of accuracy in identifying spam, with the least number of false positives. You also want a filter that’s easy to use and won’t bog down your system.
  2. Identify.   Watch for tip-offs that an e-mail may be spam if 1) you don’t know the sender, 2) you’re asked for a password, money or account information, or 3) you detect anything fishy about the sender, subject line or body of the e-mail.
  3. Think before taking action.   If you don’t know the sender, don’t even open the e-mail. By opening a spam e-mail, you are signaling to the sender that your e-mail address is active. More spam is sure to follow. If the e-mail looks at all suspicious, DO NOT CLICK any links or download any documents. If it’s obviously spam, delete it or mark it as spam. If you’re not sure, verify with the sender by separate e-mail or phone call before clicking or downloading anything. Keep your e-mail address private and read privacy statements before revealing it. Use an alias when providing your e-mail address to commercial sites to keep your personal address from being shared.
  4. Educate.   Don’t let untrained users into your network who are not aware of the dangers of e-mail spam. Train your team in best practices. Remember, they’ll benefit as well. After all, who wants to lose an important personal document or family photo due to an ill-advised click?

As spammers become more sophisticated, the threat goes beyond mere annoyance. Your company’s data and financial security are at risk. Now is the time to update your spam protection practices – it’s far less costly than dealing with the aftermath of an attack.

FREE Spam & Endpoint Protection Checkup!
data security computer repair
When was the last time your company’s spam protection program had a checkup? Now, through the end of May, we will provide a FREE Spam & Endpoint Checkup to the first seven companies that request it.

Contact us today at (816) 233-3777 to reserve yours while you still can. Do it now…before a ransom demand – or worse – shows up in your in-box.

Useful Tidbits

IFTTT connects the apps you love.
Create simple connections between apps like Facebook, Dropbox or Gmail – or any physical device that links to the web, such as your fridge, thermostat or light dimmers. The beautifully simple concept “IF This, Then That” connects a Trigger (If This) with an Action (Then That). For instance, a movement detected by your Nest camera at home sends you an e-mail, text or other warning. Each trigger-action pairing is what IFTTT terms a “recipe.” You can easily whip up your own recipes, or use any of the thousands already created at Or get “IF” at the App Store or Google Play. With IFTTT, the only limit to your productivity may be your imagination.     –Live-Smart

Considering a web conferencing service?

Adobe Connect, WebEx, Citrix, and Zoom lead the pack in online conferencing services. They all allow you to meet anyone online, anytime, anywhere you have a mobile or desktop device linked to the web. While Adobe Connect is more suited for larger-scale enterprise environments, seems aimed at smaller companies and solos. Still, each one of the top dogs listed here covers a wide range of features and pricing, and each includes a robust feature set worth considering. Aspects to compare include technical capabilities, AV quality, ease of use and value. And most offer a low-end free plan you can try out, to sample their wares, with varying restrictions.

Facebook Audience Insights helps you build awesome ad campaigns.

Imagine a treasure trove of highly granular data about your ideal audience – all yours for the taking. Facebook helps you target by age, income, education, career, gender, location, buying behavior and Facebook activity. With that data, you can define your audience according to your desired conversion goal. From there you can fine-tune your marketing strategy, discover popular content and start attracting more attention. For example, if you notice that a lot of your visitors follow a certain publisher, you may want to strike up a deal for a private ad buy with that publisher. Just be aware that the data Facebook provides may not be applicable in other media, such as Twitter or Google Adwords.

End article clutter forever with this dynamic duo.

Smartphone app Pocket lets you easily clip articles you want to read later, but can get cluttered with articles you’ve already read. Evernote, on the other hand, is great for articles you want to keep, but can get cluttered with articles you’ve already read and don’t want to keep. Team them up and say, “Goodbye, clutter!” Here’s how: dump clippings from web articles, Twitter and your RSS reader into Pocket. Check off the ones you’ve read, delete what you don’t want to keep and store the keepers for long-term reference in Evernote. That way, Evernote becomes your uncluttered storage tool and Pocket helps you capture all those “read later” pieces.    –Lifehacker

“App overwhelm” got you down?
With so many apps online these days, it’s tough to know where to start – and stop. Here’s how to overcome app overwhelm: 1) To start, pick three or four apps. Learn each one thoroughly. Take a class, read or check out YouTube. And don’t forget good ol’ trial and error – whatever works for you. 2) Give yourself at least 30 days to see how each works in your life and business. Then reevaluate. If you like it, keep it. If not, hit delete – don’t let it clutter up your life. 3) Avoid “bright shiny object” syndrome – stay focused and stick with what works for you. At the end of the day, that’s what counts.     –

data security computer repair