If you’re having trouble viewing this email, you may see it online.

 

 

Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Complete Info-Tek Logo5

 

 

A Kansas City

Computer

Consulting Firm

 

 

 

 

 

Technology Tips and News for Busy Professionals

IN THIS ISSUE

 

 

Greetings!                                                                                                        Volume 4, Number 1

We hope you enjoy and benefit from these technology tips and news for busy professionals.  We bring this to you because we are committed to bridging the gap between people and their technology.

 

INFO-TEK employs a full time staff of trained and certified computer & network specialists who are quick to respond, easy to talk with and people you can trust. 

 

We specialize in small business and home office clients and we have helped thousands of people in the greater Kansas City area with their computer service needs at very competitive and affordable rates.

Balancing Freedom and Security

 

Managing In-house Social Networks

 

The 25 Worst Passwords, Ever

 

Rule of Thumb

 

 

NEWS:  Bill sponsor says SOPA hearing to resume in February

“Building good relationships between people and their technology 365 days a year.”

 

 

Balancing Freedom and Security

 

 

Description: Description: http://i2.createsend3.com/ei/r/0E/896/0F1/211748/csimport/freedom-and-security-a_1.jpgSecurity experts are predicting a rise in the use of personal gadgets to access company data which means that you will have less control over what kind of data goes in and out of your IT system. The best way to rectify this is by having a concrete and comprehensive IT policy that secures your data without compromising the freedom of your employees to use their mobile devices.

As technology continues to become more affordable and accessible to consumers, it’s an inevitable fact that employers will see more and more of their employees using their own personal devices such as laptops and mobile phones to access the company’s IT system.

This can be a dangerous thing. Since these devices aren’t company owned and regulated, you have limited access and control over how they are used. Employees could download all sorts of malware and viruses on their devices and pass the infection along to your IT system when they access it.

The solution: a comprehensive IT security policy. It’s important that you find a compromise between the freedom of the employee to use the device as desired and your need to keep your IT system safe from viruses and other threats to your data’s security. Steps such as having employees run mobile device management (MDM) software on their devices is one of many actions you can take to lessen the risk of security breaches. You may also want to implement applications and software that check and screen for malware, both for laptops and mobile devices. And don’t forget that while Android seems to have a bigger problem with malicious software, Apple isn’t exactly virus-free, either.

Employees have a right to use their personal devices as they see fit, but not at the expense of important company information stored in your IT system. Running a tight ship in terms of security is an effective way to protect your business interests and your sensitive company data. If you are interested in knowing more about developing a concrete and effective IT security policy for personal device use as well as general system access, please don’t hesitate to give us a call so we can sit down with you and discuss a custom security blueprint that’s just right for you.

 

 [back to top]

 

Managing In-house Social Networks

 

The use of social networks has changed the way many people communicate with each other online. In the same vein, internal social networks can also enhance communications within a given organization, but only if the right policies to govern its use are developed and implemented by the company it belongs to.

With the waves created by social networking in how companies do business nowadays, many have also utilized the same principle to develop internal social networks to enhance their in-house communications as well. However, the use of this new medium of communication also requires that companies develop new policies to cover its use.

Read more...

[back to top]

The 25 Worst Passwords, Ever

 

Passwords are an integral part of securing both IT systems and online accounts. In order to keep your system and information safe, it is important to take the time to create strong passwords that hackers and online thieves won't easily figure out.

If you think using 'password' as your password is no big deal, then it's time to rethink.

Security experts have recently compiled a list of the worst passwords users can choose, and 'password' is at the very top of the list. Weak passwords make your information more vulnerable simply because hackers can guess them. It may be easier to pick a password that you don't have to think about, but it's a choice that you may come to regret.

 Read more...

[back to top]

COMMUNITY CALENDAR

 

Heartland SPCA

Martinis Gala 2012

Heart the ‘80’s!

 

Overland Park Convention Center

 

February 4, 2012

 

Click here for more information

 

 

 

More about INFO-TEK

www.info-tekweb.com

 

 

Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: newlogo

Having Computer or Network Problems?

Call INFO-TEK Today

816-914-8826

 

 

Don’t forget to spay or neuter your pets!

 

www.heartlandspca.org

 

 

Rule of Thumb

 

If you carry your laptop with you wherever you go, it’s important to protect the data that resides on it.  Most laptops have the capability of placing a password on your hard drive. This will require you to put in the password before the machine boots up and it will not boot up without it.  Even if you take the drive out and put it in another machine, it’s still going to require the password.  Without the password, the drive doesn’t exist, which means the data is inaccessible.  With that being said, it’s important to put that password in a safe, retrievable location.

 

[back to top]

 

NEWS:  Bill sponsor says SOPA hearing to resume in February

 

IDG News Service - A hearing to amend and debate the controversial Stop Online Piracy Act should resume in February, its chief sponsor said, even in the face of new opposition to the copyright enforcement bill.

 

The House Judiciary Committee held three days of so-called markup hearings on SOPA in December, but opponents of the bill flooded the committee with more than 20 amendments. In a markup hearing, a committee votes on amendments to a bill and votes on whether to approve the bill and send it to the full House for action.

 

Representative Lamar Smith, the lead sponsor of SOPA and chairman of the Judiciary Committee, said Tuesday he intends to resume the markup session next month. "To enact legislation that protects consumers, businesses and jobs from foreign thieves who steal America's intellectual property, we will continue to bring together industry representatives and members to find ways to combat online piracy," Smith, a Texas Republican, said in a statement.

Read more...

[back to top]

 

 

 

 

 

INFO-TEK manages your technology, so you can focus on your business!

 

Description: Description: cartoon

 

Your Data.  Your Network.  Our Responsibility

When you need help with your computers or computer network, I'm hopeful that you will consider calling INFO-TEK @:  816-914-8826.

 

 

Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: LogoGlobeI N F O T E K

The Computer Guys

 

Your Computer & Network Specialists

 

816-914-8826

 

 20% OFF

For new clients

 

www.info-tekweb.com

 

* Coupon good for Service only.  Limit one per customer and not to be used in combination with any other offer from INFO-TEK.  Please present coupon at time of service.  Expires 2/29/2012

 

 

If you have found this Newsletter helpful, please pass it along. 

 

Remember, if you need help in implementing any of this month’s tips, contact us — we’re here to help.

 

If you would like to unsubscribe to this Newsletter, reply with “Unsubscribe” in the subject line.  If there’s a different address you would like to receive this at, reply with the new address. 

 

Sincerely,

 

Brian Greenstreet

INFO-TEK, Enterprises, LLC

.