Most people associate pop-ups with annoying advertisements that must be closed to continue reading the web page underneath. However, there are times when you need pop-ups to use a webpage as it was intended to be used. Learn to control how pop-ups behave when using IE8 on the web. Read more
Are You in Compliance with Identity Theft Regulations?
The federal government’s Red Flag Rule requires all businesses that are potential identity theft targets develop plans to spot red flags and prevent theft. How can you comply? Regulations designed to minimize identity theft went into effect in June of 2010. Are you complying with them? The federal government’s so-called “Red Flag Rule” requires all businesses that are potential identity-theft targets develop plans to spot red flags and prevent theft. Red flags include suspicious photo IDs, unverifiable addresses and Social Security numbers, and questionable account activity, to name just a few. While many companies think the Red Flag Rule only applies to financial institutions, it actually applies to all creditors — with creditors being defined as “businesses or organizations that regularly provide goods and services first and allow customers to pay later,” according to a Frequently Asked Questions guide prepared by the Federal Trade Commission, which will enforce the Red Flag Rule. In other words, if you invoice customers for your goods or services, you’re a creditor — and the Red Flag Rule applies to you. How can you comply? You’ll need to have a written policy that specifically addresses how you will prevent and handle identity theft. Other recommendations include data encryption, annual updates of your written policy, and staff training. While this may seem onerous, you don’t want to ignore the legislation. Fines are $3,500 per violation — and the threat of a lawsuit from customers whose identity has been stolen. Related articles Do You Comply with the FTC’s Red Flag Fule? Fighting Fraud with the Red Flags Rule: A How-To Guide for Business
Red Flags Rules Apply to You—Yes, You
While many companies think the federal Red Flag Rule applies only financial institutions, if you invoice customers for your goods or services, it applies to you, too. Regulations designed to minimize identity theft went into effect in June of 2010. Are you complying with them? The federal government’s so-called “Red Flag Rule” requires all businesses that are potential identity-theft targets develop plans to spot red flags and prevent theft. Red flags include suspicious photo IDs, unverifiable addresses and Social Security numbers, and questionable account activity, to name just a few. While many companies think the Red Flag Rule only applies to financial institutions, it actually applies to all creditors — with creditors being defined as “businesses or organizations that regularly provide goods and services first and allow customers to pay later,” according to a Frequently Asked Questions guide prepared by the Federal Trade Commission, which will enforce the Red Flag Rule. In other words, if you invoice customers for your goods or services, you’re a creditor — and the Red Flag Rule applies to you. How can you comply? You’ll need to have a written policy that specifically addresses how you will prevent and handle identity theft. Other recommendations include data encryption, annual updates of your written policy, and staff training. While this may seem onerous, you don’t want to ignore the legislation. Fines are $3,500 per violation — and the threat of a lawsuit from customers whose identity has been stolen. Related articles Do You Comply with the FTC’s Red Flag Fule?
How You Can Comply with the Red Flag Rule
To comply with the federal government’s Red Flag Rule, you’ll need to have a written policy that specifically addresses how you will prevent and handle identity theft — and more. Regulations designed to minimize identity theft went into effect in June of 2010. Are you complying with them? The federal government’s so-called “Red Flag Rule” requires all businesses that are potential identity-theft targets develop plans to spot red flags and prevent theft. Red flags include suspicious photo IDs, unverifiable addresses and Social Security numbers, and questionable account activity, to name just a few. While many companies think the Red Flag Rule only applies to financial institutions, it actually applies to all creditors — with creditors being defined as “businesses or organizations that regularly provide goods and services first and allow customers to pay later,” according to a Frequently Asked Questions guide prepared by the Federal Trade Commission, which will enforce the Red Flag Rule. In other words, if you invoice customers for your goods or services, you’re a creditor — and the Red Flag Rule applies to you. How can you comply? You’ll need to have a written policy that specifically addresses how you will prevent and handle identity theft. Other recommendations include data encryption, annual updates of your written policy, and staff training. While this may seem onerous, you don’t want to ignore the legislation. Fines are $3,500 per violation — and the threat of a lawsuit from customers whose identity has been stolen. Related articles Do You Comply with the FTC’s Red Flag Fule?
Unwanted Hyperlinks in Excel
Tired of having Excel convert what you type into active hyperlinks? You can make it stop. Read more.
Securing Yourself on Shared Wi-Fi
Using shared Wi-Fi networks can be really convenient, but it is not without risks of its own. These days, more and more people are on the go, and many of them bring their work with them. And in this day and age, it’s ideal if you’re working – or playing for that matter – while connected to the internet, which is often through public Wi-Fi hotspots. While connecting to public and open-access Wi-Fi hotspots is indeed convenient, using open networks also poses risks that endanger your security. The open nature that allows anyone to use the connection also enables unscrupulous people to gain access to your private information. The whole act of stealing information from people who are using public Wi-Fi networks is called ‘sidejacking’. There are applications such as Firesheep, for example, that provide an easy-to-use platform that others can exploit to spy and harvest personal, sensitive information from you. And since Firesheep is a Mozilla Firefox plug in, virtually anyone can download and use it to sidejack people on the same network. You can’t be too cautious with your personal and business data these days, so you always need to have the proper laptop configuration and security infrastructure to protect your system, especially when you frequently avail of open and public networks. To know more about this, please feel free to give us a call and we’ll be happy to draw up some security options that meet your specific needs.
Force Firefox to Display Webpages with a Specific Font
Sometimes websites use fonts that are too small or otherwise difficult to read. Learn how to set up Firefox to display all webpages with a specific font and size of your choosing. Read more
Beware Software Bogeymen
Malicious cyber thieves might be scaring you into buying and downloading software that may harm your computer. Security firm McAfee has published a report early in the year showing that up to a million people worldwide fall victim to so-called “scareware” each year. Scareware, or rogueware, is software that poses as legitimate security software but in reality are dupes to steal credit card information from users, or even worse are Trojan Horses to spread malware. Scareware is distributed primarily through the Internet via malicious websites that pop out windows that fool users into thinking their system may be infected. Users who click on the popup windows are redirected to a website which encourages them to buy fake security software online. Scareware are especially dangerous as it hits users in many ways: by duping them out of their money, injecting viruses or other forms of malware into their system, or even holding them ransom — for instance, by taking over users’ systems then demanding more payment to free the data stored in the infected computer. It’s a good thing that there are many ways to protect your system against scareware. One is using security software from legitimate and well established software vendors — through their legitimate sales channels. Another is by being prudent with offers and downloads when online. For a small business there are other ways such as blocking or filtering these malicious websites to ensure the security of the entire business. If you want to find out more about these solutions to protect small business networks — let us know. We offer managed security services for small business that can protect against online threats.
Alphabetizing Last Names in Word
Sorting lists of names by last name is easy if they are listed in a LAST, FIRST order. But what if the names are in FIRST LAST order? This tip explains features in Word that make this possible. Read more.
Where do you go
from here?
Reach out and find out how great Enstep support can be!










