The Enstep Blog
Get the latest technology insights and IT tips.
Using IT Consulting for Streamlining Business Operations
If you wonder how to harness IT consulting for streamlining business operations, you're in the...
Phishers Siphon Off Hundreds of Thousands of Dollars in Minutes
Another reason to keep your computer malware free: cyber-pirates raided several businesses as well as a school in recent attacks through the Automated Clearing House (ACH) Network. The losses, which ranged from $150,000 to more than $400,000, were accomplished by the crooks in mere minutes. Luckily for these companies, the banks managed to reverse some of the transfers. If they hadn’t, the losses would have amounted to $700,000 up to a whopping $1.2 million. The modus operandi of the hackers is simple. Making use of the ACH network, they send out “phishing” emails to account holders. When the recipient clicks on the link, malicious software – a Trojan horse or virus – automatically downloads itself to the recipient’s computer, allowing the hacker to infiltrate the system. Keylogging software (software that tracks keystrokes) is installed, which gives phishers access account numbers, names, and passwords. They then divert the company’s funds into their own accounts. ACH fraudsters can also use the same method to not only siphon off money into their own pockets, but also to establish “ghost employees”, which they insert into the payroll and qualify to receive regular paychecks. While banks are doing their best to strengthen the system, they can only do so much, and experts admit that the ACH network is a very old system compared to today’s standards. The volume of money that flows through the ACH is also so massive that it is difficult to keep track of specific amounts for specific accounts. Despite its shortcomings, the ACH system still remains widely used, and the best defence is to guard your system well. For our clients, we have firewalls and anti-malware software in place, but you should also make sure your bookkeepers and staff are briefed on how to avoid being the victim of fake phishing emails. If you have any questions or concerns please give us a call. For more details about this story, visit http://www.computerworld.com/s/article/9136334/Cyber_attackers_empty_business_accounts_in_minutes?taxonomyId=17&pageNumber=1.
E-mail marketing still works according to Entrepreneur.com
Entrepreneur magazine columnist Gail Goodman offers an insightful look into email marketing and its relevance in today’s social network marketing -crazy world. She argues that despite the rise of Twitter, LinkedIn , Facebook , blogging, and other Web 2.0 tools for direct marketing, she argues that they will not likely displace email soon. Goodman points out several arguments in support of her case. Among them: email is still valuable for relationship-building and meaningful interaction and dialogue with customers. Also, social networking has its place as a complementary channel to the marketing mix , and research from MarketingSherpa seems to bear this out. Another is that young people continue to use email despite their fascination with social networking sites. If you rely on Internet, email, or direct marketing in your business, then be sure to continue using email as well. Related articles: Report: Social Networks Growing while Other Social Media Sites … Why Do People Use Online Social Networks : Internet Marketing …
Fake Security Software Could be Compromising your Security
A new report by PandaLabs , Panda Security’ s malware analysis and detection laboratory, examines the proliferation of so-called “rogueware” – malicious software that attempts to convince people that their computers are infected with malware in order to trick them into buying their “security software”. Rogueware misleads users in that it tells them that it is protecting them from annoyances (such as online ads) or harm (such as from viruses or other malware) – even if it’s not. Often these programs themselves are not malicious beyond displaying false information. However, in some cases they can be the source of harm themselves, creating a backdoor for other Trojans or viruses to enter the system. According to Panda’s research, as many as 35 million computers are newly infected with rogueware each month, many through social networking websites such as Facebook , MySpace , Twitter , Digg . Ads featuring free downloadable software are often featured, containing links or reminders to get the paid versions after first use—which earn the fraudsters as much as $34 million per month, Panda estimates. To ensure you use only legitimate security software, make sure you only use systems from trusted software vendors that are vetted by your IT advisor. For advice and help, contact us today! Related articles: Cyber-criminals targeting social networking sites Blog – Can Twitter and Facebook be Both Social and Secure? Forget about malware, rogueware is where its at!
Windows 7 Will Have Better Support for WindowsXP-only Applications
Microsoft recently announced the availability of the Release Candidate for Windows XP Mode . According to Microsoft, this release was specifically designed to ease the migration path for small to medium-sized businesses by providing additional compatibility for their older applications that may not be compatible with Windows Vista or the upcoming Windows 7. Windows XP mode runs a virtualized instance of Windows XP in Windows 7, and requires a PC equipped with additional 1 GB of RAM, 15 GB of available disk space, and a processor capable of hardware virtualization with AMD-V or Intel VT turned on in the BIOS . Because of these system requirements, older PCs are not able to run the software. In the blog post by the Windows 7 Development team, they suggest that users first try the Native Windows 7 mode when running their applications before resorting to Windows XP mode. Windows XP Mode was developed to address some users’ concerns about compatibility, considering that Windows 7 uses the same kernel as Windows Vista. Some businesses had been holding back from upgrading their operating systems since some business applications built for XP proved incompatible with Vista. Windows XP Release Candidate will work with both the RC and RTM (Release To Manufacturing) versions of Windows 7. If you need more information, please contact us today and we’ll assess whether you can safely upgrade to the new release of Windows 7, or you need Windows XP compatibility mode for your business applications. Related articles: Windows XP Mode RC now available Microsoft Clarifies Windows XP Mode For Windows 7 Windows XP Mode for Windows 7 Release Candidate available
Windows 7 Allows Easy Upgrades
Microsoft recently announced that Windows 7 will include a feature to allow instant upgrades from lower editions of Windows 7 to a higher edition (i.e., from Starter to Home Premium) with the click of a button. The feature, called “Windows Anytime Upgrade” or WAU, will make the process of upgrading much simpler and more convenient than before. Typical scenarios for upgrading include: Users running Windows 7 Starter Edition on their netbooks , who wish to upgrade to Home Premium to take advantage of Aero Peek and other enhanced functionality from their OS such as Taskbar Previews . Desktop themes are also enabled, and so is Remote Media Streaming. Users running Home Premium on their laptops who wish to connect to their office network’s domain or run their old custom business applications using Windows XP Mode can upgrade to Professional. Users running Home Premium or Professional who want to encrypt and secure their USB devices. With Microsoft’s early announcements of pricing and upgrade options for the upcoming Windows 7 release, you have the opportunity to plan now for the investment strategy you will use when the time comes to upgrade. If you need information or advice about your options, don’t hesitate to call us. Related articles: Windows 7 RTM reviewed For Some, Move To Windows 7 Will Be Tough Windows 7 pricing announced: cheaper than Vista Microsoft announces pricing for Windows 7 family pack, upgrading
Upgrading to Windows 7 from Windows XP?
Information Week has posted a helpful guide to assist those planning to upgrade to the upcoming release of Microsoft Windows 7 on their existing Windows XP machine. Long story short: there is no direct upgrade from XP to Windows 7. You can’t simply insert the Windows 7 installation DVD, upgrade your running XP installation, and have all your programs and data remain intact. However, this article does explain what you can do, including any of the following: Install a copy of Windows 7 on the same computer, in parallel with your existing XP install. Install a copy of Windows 7 on the same computer and replace your existing XP install entirely. Obtain an entirely new computer with 7 installed, and migrate your existing XP data and application settings to it. To learn more, visit Information Week . If you need help with preparing your business for Windows 7, contact us – we are here to help. Related articles: For Some, Move To Windows 7 Will Be Tough Windows 7 RTM reviewed Backwards compatibility can kill you
4 Keys to Avoiding Malware
From annoying to destructive, malware is a bane to any computer system and the person who uses it. The benevolent Wikipedia defines malware (short for malicious software) as: “software designed to infiltrate or damage a computer system without the owner’s informed consent.” The good news though, is that there are simply ways to avoid getting infected by malware. Clearly having the right anti-virus and security installed and up to date is critical – that’s where we help. But it’s also important to know how you can make a difference. Here are few simple tips to help you keep your system malware-free: 1. Never click indiscriminately These days, there are ads and pop-ups, designed to induce a PC user to click on them. From sexy models to seemingly too-good-to-be-true offers and promotions, many web advertisers are counting on people’s curiosity and the impulse to click away. The thing is, many of these ads lead you to unsecure sites filled with malware. 2. Cancel Autorun. When you plug in a portable hard disk or flash drive, you computer automatically opens a window with preset options to enable file viewing for that drive. Immediately opening a flash drive allows infections to access your system, so cancel the window and scan first before opening the drive or any file inside it. 3. Never open suspicious emails. Unsolicited email is always best unopened and deleted immediately. If you don’t know who sent it, send it straight to the trash bin and delete it forever. 4. Only download if you must and only from trusted sites. Installing peer to peer downloads may be a great source of free music, media and software. But it’s not only piracy and is probably prohibited by your company policy – it’s also a fertile breeding ground for files embedded with Trojans, worms, and other forms of malware. Download files only when necessary and only do so from legitimate and trusted sites. You make the difference Your behavior online plays a big factor in making your PC and your system malware free. Especially if you’re on a network, failing to exercise caution not only compromises your system, but everyone else who’s connected to the same network. A simple click on a wayward link or ad can cause your whole company to be bombarded by spam, so always be careful in what sites you go to and what files you open and download. If you’d like us to come in and talk to your staff about this and other safe-computing habits just let us know.
Why Enable a Mobile Workforce?
If you enable your employees to work where and when they like, at any hour of any day, you’ll likely see big gains in productivity. With traditional network infrastructure, when employees are away from the office—because they’re traveling for business purposes are or are taking time off—collaboration is impossible and productivity is lost. As a result, many companies are helping their employees to work remotely. A 2007 study by Nemertes Research revealed that 83 percent of organizations now consider themselves virtual, with workgroups spread across multiple locations and geographies. In addition, 91 percent of employees work outside of headquarters, and 96 percent use some form of real-time collaboration tools. A mobile workforce may involve: Real-time access to desktops and documents; Internet and instant messaging access through mobile devices; Real-time collaboration tools (such as editing documents simultaneously); and Audio and video conferencing. Companies that effectively enable a mobile workforce: Improve productivity through ongoing access to information; Drive business responsiveness through constant communication between employees and clients; and Support work-life balance and improve job satisfaction—which helps attract and retain talent. However, there are challenges to enabling a mobile workforce: Deployment can be disruptive to your current IT infrastructure; Devices and applications may be incompatible with your current infrastructure; Employees may not know how to use new tools; and Mobile devices and data may not be protected. We can help you avoid these problems when enabling a mobile workforce—and at the same time, minimize your investment in technology with products that scale to support your evolving needs. Contact us for more information.
MS Office 2010 Promises Easier Online Collaboration for SMBs
At the recently concluded Microsoft World Wide Partners Conference , the company gave partners a preview of upcoming features in Microsoft Office 2010 that could be very useful for small and midsized companies. Among them: Microsoft Word, PowerPoint, and OneNote 2010 now lets several people work on a document at the same time. Users of the desktop versions of the software will be able to send out a text link that will let anyone click on the link and use Windows Live to open the document and work on the live, with all parties seeing each others’ changes. Outlook 2010 will have a new feature which will allow users to ignore email threads, deleting everything in that conversation, including existing messages and any new ones that come in. PowerPoint 2010 will have a Broadcast feature will create a URL that users can share via e-mail or IM. Clicking on the link will let other users see a slideshow streaming directly from the author’s desktop. To find out more about these new features, visit the Microsoft WWPC website. Related articles: Microsoft Office 2010 in Videos [Video Demonstration] Office 2010 revealed in great detail via Microsoft videos Microsoft Offie 2010 to have free online version like google docs
Webcams, video conferencing, and all that jazz
The internet makes a great number of tasks more convenient for many people, especially in the area of communication. The power of the internet allows millions of people around the world to talk to each other over voice programs and even videos – all in real time. While the benefits to personal communications are obvious, the larger value implications of this type of technology is evident in business, where travel costs are greatly reduced through the use of video conferencing technology. Imagine a group of people in the United States being able to see and communicate in real time with another group in Australia. This is possible with video conferencing, which allows the two parties simply agree on a time (with the time zone difference considered, of course) and then hold a meeting in the comfort of their own offices. Video conferencing not only saves the fares and accommodation expenses, but also saves time spent travelling. It’s also valuable to employees in the field who need to report to a main office. A webcam, a mike, and a decent internet connection allows those in the field to report in real time to the main office at any time, eliminating the need to leave their post or assignment. Programs you can use: Citrix GoToMeeting – one of the most popular software for web conferencing, costing $49.00 per month or $468 for an annual plan that gives you unlimited conferences (including both video and voice) with up to 10 attendees. The interface is easy to use and meetings can be set up in a flash. The only downside is that Mac users can only participate in, and not set up, meetings. Microsoft Live Meeting – another popular bundle of decently priced and stable conferencing software. However, the interface is much more complicated than Citrix GoToMeeting, and may confuse first-time users. Another possible concern is its “per use” charging system. WebEx MeetMeNow – at $39 – $49 a month, this option offers the best value for the money, with its unlimited monthly use with up 10 participants and a very user-friendly installation and interface. Acrobat Connect Professional – this option offers the most flexible payment plans, making it best suited for occasional users. It also boasts customization features allowing users to tailor the program based on their needs. Video conferencing is a simple and practical way to communicate in real time with personal and business contacts, wherever they are in the world, at a fraction of the cost of more traditional methods. Need help choosing equipment and getting set up? We’ll be happy to lend a hand.
Protect Your Systems from Organized Crime Networks
While software companies have made significant progress in protecting customers from malicious online threats, these threats continue to evolve, and now a new player has entered the game: organized crime. Malware, short for “malicious software,” is designed to infiltrate a computer system without the owner’s consent. It includes viruses, worms, trojan horses, spyware, and even adware. The total amount of malware removed from computers worldwide grew more than 43 percent during the first half of 2008, according to a security intelligence report by Microsoft. According to the report, based on the type of malware most frequently found, financial gain appears to be attackers’ top motivation. And it may only get worse, because now organized crime networks are distributing malware. Don’t think American mafia; this type of organized crime is more typically loosely organized criminals from underdeveloped parts of the world. Australia’s Verizon investigative response team, which handles data breaches on behalf of that country’s major corporations, has reported that 91 percent of the breaches it found in 2008 could be traced to organized crime activity rather than insider or other threats. These organized crime networks plot to infiltrate computers—primarily American ones, which have information from which they can profit—and steal data. They may also seek out intellectual property for its potential value. “If a single piece of intellectual property is compromised, and it happens to be the secret formula to your company’s product, then that’s a business-changing event,” said the Verizon report. Although most of the malware Verizon found could not be detected by current antivirus products, around 87 per cent of breaches could have been avoided by using simple controls, according to Verizon, whose report stated that “on the whole, criminals are still not required to work very hard to breach corporate information systems.” Here’s what you can do to help protect your systems: Enable a firewall. Install and maintain up-to-date anti-virus and anti-spyware programs that provide increased protection from malicious and potentially unwanted software. Almost 40 per cent of victims Verizon investigated in 2008 did not regularly update their security software. Check for and apply software updates on an ongoing basis, including updates provided for third-party applications. Open links and attachments in e-mail and instant messages with caution. Need help implementing these safeguards? We’re here to assist!
Microsoft Releases Fixes and a Workaround for Several Vulnerabilities
The web is indeed becoming a dangerous place. These days, your PC could become infected with malware or vulnerable to a hacker attack just by innocently browsing a website or opening an email. Last July 14th, Microsoft released six bulletins with fixes for at least nine known security vulnerabilities that put users at risk in a range of Microsoft products. Many of the vulnerabilities, if not patched, can allow “remote code execution” or allow a hacker or malicious software to take over your PC and run unauthorized commands. ZDNet’s Ryan Naraine has posted a helpful summary of the released fixes: MS09-029 : This update covers two privately reported vulnerabilities in the Microsoft Windows component Embedded OpenType (EOT) Font Engine, which could allow remote code execution. Rated “critical” for all supported editions of Microsoft Windows 2000, Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. MS09-028 : This update fixes three separate vulnerabilities ( one publicly disclosed and under attack! ) in Microsoft DirectShow, which could allow remote code execution if a user opens a specially-crafted QuickTime media file. MS09-032 : This update resolves a privately reported vulnerability in Microsoft Video ActiveX Control. The vulnerability could allow remote code execution if a user uses Internet Explorer to view a specially-crafted Web page that uses the ActiveX control . This vulnerability is currently being exploited in the wild! Rated “critical” for all supported editions of Windows XP and “moderate” for all supported editions of Windows Server 2003. Some of the vulnerabilities, notably one in Microsoft Office Web Components, do not yet have a patch. An attacker who successfully exploits this vulnerability could potentially gain the same user rights as a local user, allowing the attacker to modify or remove files on the PC remotely. This could potentially happen simply by using Internet Explorer to visit a website. A workaround exists by downloading a free utility from Microsoft called FixIt , which prevents the Microsoft Office Web Components from running in Internet Explorer. Users, as always, are advised to immediately download the updates and utilities, or use Microsoft’s Windows Update service. If you need help installing the patches or workarounds, or if you feel your PCs are at risk, contact us immediately. Related articles: Microsoft Security Advisory 972890 Released Microsoft warns of Internet Explorer security hole Microsoft issues patches, including one for IE exploit Internet Explorer’s ActiveX Security Mitigations in Use Microsoft Warns of Security Hole
Businesses Should Replace PCs Every Three Years
For many small and medium-sized businesses, the cost of maintaining an old PC may be more expensive than upgrading to a new one. This insight comes from a survey conducted by research firm Techaisle , which polled 630 companies across seven countries. Their research suggests that the average cost for SMBs to repair PCs over three years old can be 1.65 times as expensive as repairing PCs under three years old. Repairs include replacements, usually from hardware failure, and the cost to fix software crashes. Small business respondents with PCs older than three years experienced network card failures nearly eight times more than respondents with PCs less than three years old. This was followed by power supply failures, motherboard failures, software crashes, and virus attacks. Midmarket respondents experienced a similar trend, with network card failures at six times higher, followed by power supply failures and motherboard failures. In addition, respondents said desktops that have been in use for more than three years are more susceptible to attacks from malware and viruses (28 percent), while older notebooks are 58 percent more likely to endure a virus attack. The cost of related lost worker productivity should also be factored in by companies wishing to hold on to outdated hardware. Are you hanging on to old PCs in an attempt to money? Contact us today. We can help you assess the health and condition of your PCs, as well as determine the cost of maintaining existing PCs versus upgrading or replacing them.
Microsoft Announces Windows 7 Pricing
Microsoft has finally announced the pricing for the much anticipated new version of its flagship product, Microsoft Windows , expected to go on sale this October. Users will be pleasantly surprised that Microsoft has announced aggressive promotional pricing for the product and its different editions. According to the Windows team blog , estimated retail prices for the upgrade packaged retail product of Windows 7 in the US are: Windows 7 Home Premium (Upgrade): $119.99 Windows 7 Professional (Upgrade): $199.99 Windows 7 Ultimate (Upgrade): $219.99 Estimated retail prices for full packaged retail product of Windows 7 in the US are: Windows 7 Home Premium (Full): $199.99 Windows 7 Professional (Full): $299.99 Windows 7 Ultimate (Full): $319.99 The Windows 7 Home Premium full retail product is $40.00 less than today’s Windows Vista Home Premium price. Pre-orders will be limited, and Microsoft has not commented yet on what the supply limitations will be. Pre-orders will launch Friday, June 26 – July 11 in the US, Canada, and Japan, ending sooner if supplies are depleted. The UK, France, and Germany preorders launch July 15 – August 14, also ending sooner if supplies are depleted. Microsoft has launched a new website where users can find more information about upgrade offers. Related articles: Buy a PC tomorrow and get Windows 7 or pre order Week in Microsoft: Windows 7 gets priced Microsoft taking half-price pre-orders for Windows 7
Get the Most out of Microsoft Outlook
Outlook is surely one of Microsoft’s most popular products, widely recognized as a standard application alongside Word, Excel, and Powerpoint. Bundled inside Microsoft Office, Outlook is the personal information manager component of the ubiquitous office suite, blending email, contact management, a calendar, and task management into one package. Here are some tips to ensure you are making the most out of this popular application: Use Outlook with Microsoft Exchange and Microsoft Sharepoint. Microsoft Outlook is a rich and powerful tool on its own, but when used with Microsoft Exchange Server and Microsoft Sharepoint, it provides enhanced functions for collaboration within organization, such as the ability to share mailboxes and calendars. With Exchange, you can create shared folders for important email communication and company-wide memos, as well as invite others to meetings and share your availability information. You can even create a company-wide address book of key contacts for shared use. With Microsoft Sharepoint, you can post all of this information in the company Intranet, and even expose some of this information to customers and partners in the company extranet or public website – allowing you to share information and collaborate more easily with people outside of the organization as well. Use Outlook Web Access. If you don’t have access to your PC, such as when traveling, you can still use Outlook if you use it with Exchange. Just access Outlook Web Access (OWA) using your browser and any internet connection. OWA is the webmail service of Microsoft Exchange Server 5.0 and later, packaged as a part of Microsoft Exchange Server 2007 and previous versions of Exchange. Its interface resembles the interface in Microsoft Outlook. Sync your data. Because of the popularity of Outlook, there is a host of third-party applications and plug-ins you can use to sync your data. Always on the go? Sync Outlook with your mobile phone, PDA, and even your iPOD or Blackberry. Want to have your data accessible on any PC or device? Sync your email and calendar data to hosted services such as Google Calendar or Google Apps. Need to call a contact from your desktop? No problem – Outlook can integrate with Skype to allow you to do one-click calling from Outlook. Want integration with your company applications and systems? A host of enterprise applications from billing and accounting, CRM, and even ERP systems can sync key data such customer contact information to Outlook. Use add-ons. Many other third-party add-ons and plug-ins are available for Outlook to further expand its already considerable features. One favorite is a tool called Xobni (Inbox in reverse), which allows you to more easily search and organize your inbox. Google Desktop plugs in to Outlook so that you can search the web, your desktop files, and your email and file attachments from within Outlook in one place. There are many more available to check out. Learn Outlook inside and out. Dozens of websites provide useful tips on how to complete tasks faster, make your experience with the application smoother, and simplify your workflow. A good place to start is Microsoft’s website , which regularly offers handy, free tips for using Outlook to its fullest. Microsoft Outlook is widely used because it is a robust and versatile tool for information management, not only for individual users but for groups within an entire business as well. Time spent learning how to maximize its use is well worth it in terms of saved time and increased productivity. Call us now for ideas on how to get started!
Where do you go
from here?
Reach out and find out how great Enstep support can be!








