If you’re having trouble viewing this email, you may see it online.

 

 

Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Complete Info-Tek Logo5

 

 

A Kansas City

Computer

Consulting Firm

 

 

 

 

Technology Tips and News for Busy Professionals

 

 

5 ways to secure personal info

               

Description: Security_Sep30_CIf you are a small business owner or manager you are likely the person that everyone turns to when things are going well, and not so well. One problem you may face is a security breach, where private information is stolen or leaked. If this were to happen, you will likely be asked questions and maybe even held accountable. Therefore, it is advisable to take steps to ensure that the personal information in your systems is secure.

 

As October is Cyber Security month in the US, it’s the perfect time to take a look into ways you can make your business and systems more secure. One of the best places to start is to look at how your company stores and protects personal information. Here are five tips that can help you protect personal information in your company.

 

1. Change your passwords

One of the weakest links, in terms of security, is not the programs, networks, or systems, it’s actually the passwords used to access these. You should ensure that your passwords are strong – at the very least use a mixture of capital and lowercase letters, numbers and special characters like ! or @. This makes passwords harder to crack.

 

It is a good idea to change your passwords on a regular basis. You should change them at least once a year, but far preferable is to change these every 90 days. This will minimize the chances of your password being hacked and likely increase overall security.

 

2. One password shouldn’t rule them all

The number of password protected systems and sites that we use on a daily basis is increasing and it can be tempting to have one or two passwords for all of these systems. This is not a good idea though because if one password is compromised, a hacker could gain access to all of your systems and the personal information stored on them.

 

The best solution is to have a unique password for each system and one that is as different as possible. Using a password manager like Dashline or LastPass might be worth looking into but just be sure to use a separate password to access to this system as well!

 

3. Don’t keep everything

While passwords are a common way hackers can access systems, another popular way they get in is through malicious links in email, social media posts or online advertising. These links can be viruses and trojans that install backdoors to systems, allowing hackers access to files and potentially sensitive information.

 

In order to maximize security, you should look at every link and ensure it is legitimate before you click on it. The best way to do this is to look at the sender’s email address and ensure there are no spelling mistakes or weird characters. Look for any strange spelling, and if possible check there is https:// at the beginning of all links. This indicates that the page is legitimate. If a link seems even remotely suspicious, simply delete it.

 

4. Don’t react immediately

Communications, especially in online ads and emails, often urge you to click immediately. Pause for a moment, inspect the email or links and try to verify them. As a rule of thumb, if it sounds too good to be true, it is. Therefore, think first and don’t click the link.

 

5. Develop policies

In order to secure your systems and protect information stored within, you should develop a policy for all staff to follow. Be sure to look at how you plan to protect information, where it is stored and how it is stored, as well as who has access to it, how can it be accessed, and what happens when the policy is breached. How do mobile devices/devices brought in by employees fit into the plan?

 

Once you have developed a policy, communicating it to your employees and ensuring that they are all on the same page in following it is essential. We know it can be challenging to develop an effective policy, so why not contact us? We may be able to help not only secure your private information but also develop a sound policy that is workable.

 

How to block calls on Android

 

Description: AndroidPhone_Sep24_AThe problem with technology allowing us all to be so instantly accessible is that there is a danger that people you don't want to reach you actually can. However, in business, it's vital to be constantly connected and not being reachable is not an option. So how can you filter who gets hold of you? If you have an Android device, one option at your disposal is to block calls.

 

There are actually a number of different ways you can block calls, and it really depends on the type of phone you have. For most devices, call blocking options can usually be enabled from the contact app on your device. Here's how you can access and enable call blocking:

 

[ Read more ]

 

Types of Internet connections

 

Description: Hardware_Sep30_AThe Internet is by now an essential part of our daily lives. From connections at home, to our mobile devices and the office, many of us spend almost all of our waking hours connected and online. The thing is, not all Internet connections are the same. Are you aware of the different kinds of Internet connection available?

 

Below is a brief overview of the three major types of Internet connection available to many businesses.

 

Dial-up Dial-up uses a modem that is usually in your computer and connected to a phone line which in turn is connected to other modems. When you connect, your modem dials the other modems, which are usually owned by the phone provider, and establishes a connection, allowing you to access the Internet.

 

[ Read more ]

 

Secure your business in 5 ways

 

Description: Security_June12_AMost computer users, including business owners and managers, know that while computers are incredibly useful, they can pose a security risk. While a security breach for personal users can be serious, it is potentially even more so for businesses. This is why, when it comes to company use, those in charge want to make sure that their systems are secure. The problem is that this is seen to be not only expensive but a drain on time and other valuable resources. In truth though it doesn't have to be.

 

Here are five low-cost things you can do to ensure that your business is secure.

 

 [ Read more ]

 

 

Your Data.  Your Network.  Our Responsibility

When you need help with your computers or computer network, I'm hopeful that you will consider calling:  INFO-TEK @ 816.914.8826.

 

Description: cartoon

 

 

Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: LogoGlobeI N F O T E K

The Computer Guys

 

Your Computer & Network Specialists

 

816-914-8826

 

 20% OFF

For new clients

 

www.info-tekweb.com

 

* Coupon good for Service only.  Limit one per customer and not to be used in combination with any other offer from INFO-TEK.  Please present coupon at time of service.  Expires 12/19/2013

 

Volume 5, Number 9

 

 

INFO-TEK is celebrating their first DECADE!

Thank you for your support over the years!

 

“Building good relationships between people and their technology 365 days a year.”

 

 

COMMUNITY CALENDAR

 

Irish Music Awards

 

January 24, 2014 @ 3pm

 

Click here for more information

 

 

 

More about INFO-TEK

www.info-tekweb.com

 

 

Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: newlogo

Having Computer or Network Problems?

Call INFO-TEK Today

816-914-8826

or email us

tech@info-tekweb.com

 

 

NetManage

Stop waiting for your technology to break

When something goes wrong with your IT, everything grinds to a halt. With a standard break/fix service contract, you have to wait for something to break before your provider can fix it. That equation seems to make sense – even though it could easily result in hours of downtime. But what if you could keep your IT from breaking in the first place?

With NetManage services from INFO-TEK, you can expect:

·         Peace of mind – your systems are monitored 24/7

·         Less downtime – we identify and fix issues before they cause problems

·         Fewer disruptions –we provide most services remotely or overnight

·         Predictable budgeting – all-inclusive, all-you-can-use, flat-rate IT services that include hardware and software.

 

Call us today!

816-914-8826

 

 

“INFO-TEK manages your technology, so you can focus on your business!”

 

If you have found this Newsletter helpful, please pass it along. 

 

Remember, if you need help in implementing any of this month’s tips, contact us — we’re here to help.

 

Click here to unsubscribe this to this newsletter.  If there’s a different address you would like to receive this at, reply with the new address. 

 

Sincerely,

 

Brian Greenstreet

INFO-TEK, Enterprises, LLC

Your local IT service provider

.

© 2013 INFO-TEK Enterprises, LLC. All rights reserved