I’m sure most Mac users know Command-C means copy and Command-V means paste, but there’s a host of other useful shortcuts that make a Mac user’s life much easier. I’ve assembled this short collection to illustrate this truth:
Web Attack Survival Guide
The Internet has quickly become the frontline in an ongoing battle with industrial espionage, sabotage and cyber terrorism. This results in lost revenue, stolen data, service interruptions and damaged reputations. Prepare for attack!!! Follow these 7 rules to protect your organization..
Ransomware can bring your business operations to a halt, encrypting sensitive data, and forcing you to pay the attacker to regain access. Keeping your organization safe requires a fundamental shift toward prevention, and away from simply detecting and requiring remediation after infection. The right architecture can make prevention real, and you can use this checklist to implement a true prevention-based platform.
Digital Security Travel Hacks
Its summertime and everyone is traveling. Have you considered your digital security while you travel? We have some tips to keep you safe so you can have a Bon Voyage.
1. Click the active (front most) window and move it left and right with your mouse.
2. They make navigation so much easier, but they only work on precision touchpads (like the ones on Surface tablets).
First, check to see if your laptop has precision touch by going to Settings > Change PC Settings > PC and devices > Mouse and touchpad. You should see Your PC has a precision touchpad.
Then you can try 3 finger swipe up to see "task view," which shows you all open windows.
3. Three finger swipe down: Show desktop.
4. Three finger flick left or right: Return to previous app (left) or go back to current app (right)
5. Three finger tap: Opens Cortana Search.
How to see who is on your Wi-Fi
Is your internet moving a little slower than usual? Are you seeing hints of devices you don't recognize in Windows Explorer, or when you cast media to your TV? If you suspect a neighbor is stealing your Wi-Fi, here's how to check (and boot them off).
"So someone's watching Netflix on my internet," you may say. "What's the big deal?" Even if you have a little bandwidth to spare, you probably don't want other people on your network, especially if it's unsecured. If someone has access to your network, they have access to all the computers on that network, and that's dangerous. They could access files you're unknowingly sharing, they could infect you with malware, and in certain situations they could even steal your passwords and other personal information.
As a result, you should take care to make sure each device connected to your network is one you can trust. Thankfully, there are free tools that'll help you see everyone on your Wi-Fi right now.
See Who's On Your Network
Windows users can download a free, portable program called Wireless Network Watcher (scroll down to the Zip download link below "Feedback" to get it), and Mac users can download a free, slightly more complex program called Who Is On My WiFi from the Mac App Store. Both tools will provide a list of every device currently connected to your network, so you can identify the ones that belong to you.
Wireless Network Watcher
To use Wireless Network Watcher, just launch the program, and it will immediately begin scanning your network. This will take a minute or two—you'll know it's working if the bottom-left corner reads "Scanning..." Once it's done, that message will disappear, and you'll be presented with a full list of connected devices.
The resulting list may look a little cryptic, especially if you aren't super tech-savvy, but don't worry. You can ignore the IP address and MAC address listings for now. If you're using Wireless Network Watcher, just focus on the "Device Name" and "Network Adapter Company" columns. For example, I see an item named "Dulce" in Wireless Network Watcher, which is the name of my wife's MacBook. I see another with no name, but with "Philips Lighting BV" as the network adapter manufacturer, which means it's probably the hub for my Philips Hue lights. You can double-click on a device to add "User Text" that helps you identify each device, which will help you narrow down all the items in this list.
If your organization uses a Google Apps account to handle email and you’re an Outlook 2013 user, it makes a lot of sense to configure that account to send and receive email through Microsoft’s email client.
That way, it’s much easier to never miss an important email and answer it the second it comes in.
Configuring Outlook 2013 to work with your Google Apps email account isn’t too difficult, as long as you follow the steps below exactly.
GOOGLE APPS EMAIL IN OUTLOOK 2013
Step 1: Start Outlook 2013 and click File in the top menu of Microsoft’s email client.
Step 2: Make sure Info is selected in the menu on the right side of your Outlook 2013 window (not the Options one you used when enabling the Auto Complete feature).
Step 3: Let’s start configuring your account. In order to start doing this, click the Add account button.
Step 4: I probably don’t need to mention this, but I will anyway: the next step requires you to have your Google Apps email account username and password close by. You’ll need them for it.
Set the configuration process to Manual setup or additional server types and then click the Next button.
Step 5: Select POP or IMAP in the window that comes up, then click Next to proceed to the next step.
Step 6: This is the fun part, the one where you fill in all the settings needed. Worry not, if you do it right, it’s the last time you’ll be required to go through it (at least for this email account).
Start by setting the email account to IMAP, under Server information, like I did in the screenshot you’re seeing below.
If you’re looking to keep your computer safe from malware, viruses, and other online threats, then there are a few tips and tricks that you can use in order to ensure that you’re covering all of your bases. Most of the time it’s a bit of simple knowledge about how viruses are spread, and a few things not to do in order to prevent yourself from accidentally downloading a bad piece of software.
Check out these tips that you can easily implement today:
1.) Don’t Open Suspicious Email – this goes without saying, and it’s probably the most common tip out there. Unless you’ve been living under a rock then you should know that the bottom line is that if an email looks fishy, it probably is. Modern spam filters tend to block most of the crap, but occasionally if a friend’s email gets hacked some spam and malicious links or files can slip through the cracks.
2.) Don’t Click Suspicious Email Links – this goes with the tip above. If you get an email from a friend that looks suspicious, don’t click the link or open the attachment. Ask your friend if he or she sent the email first.
3.) Stay In Internet Safe Zones – when browsing the internet, stick to well known sites. The more you go off the beaten path into the internet’s seamy underbelly, the more likely you are to pick up a virus. Adult sites, gambling, and hacking sites are the most well known spreaders of malware and viruses. You sometimes only have to visit the infected site to become infected yourself in what’s known as a “drive by” installation.
4.) Stay Up On The Latest News – bookmark a few good blogs such as Krebsonsecurity.com and CNet’s Security And Privacy home page. This way you’ll be up to date on the latest news in the world of cybercrime, and you’ll be the first to know of data breaches and password hacks.
5.) Change Your Passwords – this is something probably only 2% of people actually do, but it’s a way to ensure your accounts stay safe. Change your passwords on a regular basis, and use different passwords for each account.
6.) Only Online Shop From Trusted Retailers – if a site looks too good to be true, or if it looks suspicious in any way, Google a bit about it to ensure that it’s safe. Look for “https://” in your web browser to ensure that the site is encrypted and has a secure connection. Do not put credit card payment or other info into a site if it doesn’t have “https://”.
7.) Employ The Use Of Antivirus Software – Having antivirus software and antimalware software (such as Norton 360) are absolutely necessary, and if you don’t have them you’re just asking for it.
8.) Ensure Windows Is Up To Date – have you been putting off that scheduled Windows update? Don’t! It’s highly important to ensure that Windows is entirely up to date with the latest patches. Microsoft is constantly working for you to fix security holes before they become an issue, so take them up on that! Don’t put off that Windows update any longer.
9.) Ensure All Other Software Is Up To Date – Ensure that all web browsers and other software is up to date as well. This goes for things like Adobe Flash, Air, Reader, etc. It also goes for your antivirus software – ensure that it’s getting the latest definitions on a daily basis. Don’t be lazy about putting off an update.
10.) Back Up Your Data – this will always be number one. Ensure that you back up your data to an external hard drive (or better yet, a cloud storage drive) on a regular basis to cover yourself in the event that a virus or malware program slips by your security and good habits. Even the best laid plans often go awry, and even the most professional computer experts can still get a virus or malware.