Category Archive for ‘Internet Security’

Best Remote Desktop Access Security Configuration

Best Remote Desktop Access Security Configuration Many users continue to leave wide open remote control software which can be easily exploited by a hacker. It is highly recommended to use secure methods for remote access and control stations; for example, the use of a VPN connection. Below you will find… read more →

Best Practices for Cash Register and PoS Security

Best Practices for Cash Register and PoS Security Security policies should be implemented for all aspects of a network from top to bottom. Here you will find the best network security practices for cash registers and POS systems. While not all the policies listed below may be necessary, it is… read more →

Best Network Security Practices for Merchant Processing

Best Network Security Practices for Merchant Processing Protecting and securing consumer data should be an imperative policy. Securing consumer data can increase consumer shopping confidence and add value to your business reputation. Here are some guidelines for safeguarding merchant terminals from internet hackers. While not all the policies listed below… read more →

Protecting Against Common Computer Threats

There are two types of common threats most non technical staff will encounter. “Phishing” for information “Viruses” never friendly What to do Phishing Develop a healthy skepticism when reading any email that asks for sensitive information and take a couple of simple steps to protect you. Familiar alarmist messages from… read more →

Identifying IT Security Threats

The Complexity of IT Security Modern businesses – of all sizes – are becoming increasingly vulnerable to security breaches even as they enable their workforces with state-of-the-art technologies. Cyber attacks are up 100% since 2010. Cyber attacks can be costly. The average time to resolve a cyber attack is 24… read more →

How to Configure Spam Settings

How to increase or decrease your spam settings and how to add users to the blacklist or whitelist. Most users will just use steps 1 through 5. Step 6 is for advanced configuration, should only be used by advanced users. 1.  Access Control Panel Type: https://yourdomainname.com:2083 into your preferred Internet browser. Enter… read more →

Beware of Yellow Pages Online Directory Scam

There is a reoccurring scam going on where companies (they go by various names) are soliciting business listings and misleading people to believe that they are free.  Here is an example of one that was faxed, https://globalit.com/reports/yellow-pages-scam.pdf.  These type of forms are being sent via email, fax and mail. As… read more →

Beware of Scammers Posing as Global Tech, Global PC or Global IT

If you have been contacted by a telemarketer informing that you have been sending out viruses or adware from your computer, this is a SCAM and we are recommending that you follow the following steps.  This company is known to pose as Global Tech, Global PC or Global IT and… read more →

Spyware and Adware

Spyware and Adware are programs that are installed on a computer that perform operations that the user probably doesn’t want. Spyware is a program that was created for the purpose of collecting information and sending it to a designated entity. The information it gathers can be from which terms or… read more →

Back to Top