There’s been a lot of talk lately about the end of Microsoft support for XP. With the deadline of April 8, 2014 fast approaching I wanted to talk to you about why the end of support for XP is a threat to your business.
Any questions? Please post your questions or comment below.
Smart phones and tablets today provide improved communication and easier access to internet-based features and programmes. The fact that you can work with just a mobile phone or tablet is amazing. However, the features that make most smart phones “smart” are also the same factors which make your devices susceptible to several security issues.
A very easy way to secure your device from malicious use is through enabling the password and PIN. Most smartphones and tablets come with a password protection feature, although the process of activating and setting it up may vary depending on the operating system. [...]
According to Microsoft, Phishing are emails, websites or phone calls designed to steal money. In general, Phishing refers to online fraud. You get an email, click on the downloadable link and you end up with malicious software that retains your passwords, credit card details and other relevant information that ‘phishers’ can use to extort money from you. And despite the latest improvements in internet security, phishing remains one of those cases that just won’t go away, no matter how bad you want it to.
Just recently, Websense Security Labs conducted a research study on the latest Phishing trends to help educate people on what is a “phishing line” and what is not. Here are the results for the top 10 phishing hosting countries and the top 5 most dangerous ‘phishing lines’: [...]
So, you need send an email out to a client but you can’t do it alone because you’re on the move and you’re in a hurry. So you whip out your trusty iPhone or iPad and ask a colleague to give you a few bulletpoints by email, then you want to forward that on with a few of your own intelligent thoughts.
You finally have the perfect email… only now there is a horrible black bar that iOS sticks in the left hand column of your email for some stupid reason. It looks unprofessional to you, and you want to get rid of it, but how?
Sure, it’s not the end of the world but this is a big client and you really don’t want to look like you flung something together at the pub, even though you might have.
Here’s what you can do: [...]
It’s time for another laptop review. And, this time it’s for one of HP’s detachable laptops – The HP Split x2. Learn more about what I think of this 2-in-1 notebook and tablet by clicking the play button below.
Have any questions regarding the HP Split x2? Post your questions or comments below.
I recently lost the charger to my Ultrabook during one of my travels and Lenovo immediately came to the rescue by sending me a demo T440p business notebook. Click the play button below to see my review of Lenovo’s T440p notebook.
Any questions? Please post your questions or comment below.
Most people think that when they’ve got anti-virus software up and running, they can just sit back, relax and forget the threats that the World Wide Web presents. While anti-virus software can help, it cannot completely eliminate the risks the internet poses in terms of security. One wrong click can lead to data loss and meltdown. Even if you have an anti-virus software installed, you have to be vigilant and always on the lookout for threats.
Here are some of the most common internet security mistakes and threats that people fall victim to:
1. Weak Passwords
Weak passwords leave your online accounts, your computer and even your router vulnerable. Weak passwords are susceptible to software that re-enter passwords until one fits the bill. When choosing a password, never choose your name, your birth date, or something that is directly linked back to you. Instead, create a [...]
Confronted with a bomb-ticker like something out of an 80′s Lethal Weapon Movie?
The Cryptolocker virus can easily infect any PC in your IT environment and what at first seems like some sort of ridiculous joke “You have 72 hours to act”, can quickly turn in to a nightmare if you don’t take serious action.
The Cryptolocker virus quickly takes control of any shared files or folders that the infected PC has access to and begins encrypting all of your data. If you’re a business, this means any PC in your office that has access to the company network. And if you think your system is immune because you have antivirus, think again. Most antivirus software does not capture the threat, and there are widespread stories of government agencies and corporations paying the ransom to avoid being locked away from their data forever.
Once you’re infected with Cryptolocker you have three choices. A. Pay the ransom (somewhere in the realm of 300 euros) B. Attempt to remove the virus and hope it works out (because a botched attempt can inflame the situation leaving you with no way of accessing your data) or C. Cut the blue wire… OK, I made up that last option but you may be tempted to run and find shelter until this crisis is over.
Because we don’t negotiate with terrorists at I Know IT we opted for B. and wanted to share the steps with you to save you time, and hopefully save your data and your business.
Removing the Cryptolocker Virus:
Before you begin it is absolutely vital you have a backup of your data. These steps will simply remove the virus, they will not decrypt your affected files. If you’ve been infected and you don’t have a backup then these steps will not help you get your information back. Sorry. [...]
In all of the examples below, you start by pressing the Windows Logo key on your keyboard:
Windows logo key +Tab
|This little gem allows you to cycle through any recently used apps on your Windows 8 PC.|
Windows logo key +start typing
Need to search for something quickly? Holding down the Windows Logo key and typing with any letter or numeral on the keyboard allows you to search for anything you need on your PC
Windows logo key +Shift+period (.)
Make room for more. Quickly snap an app to the left of your display.
Windows logo key +period (.)
Looking for something? Cycle through all of your open apps with this cheeky shortcut.
There’s a lot to learn on the new Windows 8 platform. What are your tips and tricks for getting more from your Windows 8 PC or Tablet?
I’d like to say “I can’t believe another year has gone by” but you know, I guess I can. It seems the longer you are in business the faster everything goes – especially technology.
In fact, this month marks our 11th year in business. I can remember being told by other business owners at the time: “just get through your first year”, then after that “just get through 5 years”. The reality is [...]