<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Webmaster Archives</title>
	<atom:link href="https://info.globalit.com/category/webmaster/feed/" rel="self" type="application/rss+xml" />
	<link>https://info.globalit.com/category/webmaster/</link>
	<description>The Global IT blog website</description>
	<lastBuildDate>Mon, 30 Jun 2025 16:49:33 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://info.globalit.com/wp-content/uploads/2024/02/favico-globalit-60x60.png</url>
	<title>Webmaster Archives</title>
	<link>https://info.globalit.com/category/webmaster/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>What You Need to Know About Ransomware</title>
		<link>https://info.globalit.com/what-you-need-to-know-about-ransomware/</link>
					<comments>https://info.globalit.com/what-you-need-to-know-about-ransomware/#respond</comments>
		
		<dc:creator><![CDATA[Tony Rare]]></dc:creator>
		<pubDate>Fri, 21 Oct 2016 21:21:08 +0000</pubDate>
				<category><![CDATA[Computer Security]]></category>
		<category><![CDATA[Desktop Tips]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[IT Services]]></category>
		<category><![CDATA[Tech News]]></category>
		<category><![CDATA[Web Mail]]></category>
		<category><![CDATA[Webmaster]]></category>
		<guid isPermaLink="false">http://info.globalit.com/?p=1477</guid>

					<description><![CDATA[<p>If you have never heard of or experienced ransomware? If not, you can consider yourself very lucky. In this age of growing cyber crimes and online terrorism are on the rise. It is important that everyone know what ransomware is and how to fight it. Our nation’s critical infrastructure, including both private and public sector… <a href="https://info.globalit.com/what-you-need-to-know-about-ransomware/" class="read-more-link">read more &#8594;</a></p>
<p>The post <a href="https://info.globalit.com/what-you-need-to-know-about-ransomware/">What You Need to Know About Ransomware</a> appeared first on <a href="https://info.globalit.com">info.globalit.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>If you have never heard of or experienced ransomware? If not, you can consider yourself very lucky. In this age of growing cyber crimes and online terrorism are on the rise. It is important that everyone know what ransomware is and how to fight it.</p>
<p><span class="pullquote align-right">Our nation’s critical infrastructure, including both private and public sector networks, are targeted by adversaries. American companies are targeted for trade secrets and other sensitive corporate data, and universities for their cutting-edge research and development. Citizens are targeted by fraudsters and identity thieves, and children are targeted by online predators. &#8211;<a href="https://www.fbi.gov/investigate/cyber" target="_blank" rel="noopener noreferrer">FBI</a></span></p>
<p><strong>What Is Ransomware?</strong><br />
The simple answer to defining ransomware is that it is a virus that takes hold of your computer and demands payment to a criminal organization to get the password that will release the virus. This affects personal and corporate computers, and it has become a big business for the criminal world. It is estimated that cyber-ransoms will become a billion dollar industry in 2016, and that only includes the paid ransoms. That figure does not include the costs for repairing the computers or recovering the information.<br />
Once ransomware is downloaded, you will get a message telling you that your computer has been locked and you will be told that you need to take some kind of action to pay the ransom. The consequences of not paying include having all of your data erased, or permanently locking up your computer.<br />
The more complicated description of ransomware is that it preys on your more vulnerable software applications and encrypts your computer. Normally, encryption is used to protect your data. But in this case, it locks you out of your computer and requires a password that only the criminal knows. When you pay the ransom, you hope to get the password that will open up your system. In some cases, the password is not provided after the ransom has been paid.</p>
<p><img fetchpriority="high" decoding="async" class="aligncenter wp-image-1501" src="https://info.globalit.com/wp-content/uploads/2016/10/protect-against-ransomware.png" alt="protect-against-ransomware" width="601" height="423" srcset="https://info.globalit.com/wp-content/uploads/2016/10/protect-against-ransomware.png 700w, https://info.globalit.com/wp-content/uploads/2016/10/protect-against-ransomware-300x211.png 300w" sizes="(max-width: 601px) 100vw, 601px" /></p>
<p><span class="pullquote align-right">The FBI doesn’t support paying a ransom in response to a ransomware attack. Paying a ransom doesn’t guarantee an organization that it will get its data back—there have been cases where organizations never got a decryption key after having paid the ransom. Paying a ransom not only emboldens current cyber criminals to target more organizations, it also offers an incentive for other criminals to get involved in this type of illegal activity. And by paying a ransom, an organization might inadvertently be funding other illicit activity associated with criminals.-<a href="https://www.fbi.gov/investigate/cyber" target="_blank" rel="noopener noreferrer">FBI</a></span><strong>How do you get Ransomware?</strong><br />
In corporate settings, ransomware usually arrives in an employee&#8217;s email account as what looks like a safe and secure attachment. But when the attachment is open, the ransomware is loaded and it may start to move its way through the rest of the network.<br />
In any setting, email is the most common way that ransomware gets loaded onto a computer. The second most common way is clicking on an infected website and having it loaded directly onto your computer. As frustrating as these can be, these delivery methods give us clues on how to combat these attacks.</p>
<p><strong>Avoiding Ransomware</strong><br />
Always use a reputable  antivirus software vendor and can scan your received emails and warn you against websites that are infected. Never use a free AV. You should always have good antivirus operating on your computer, and you should keep your antivirus updated constantly. Corporate IT directors should keep their firewall software up to date, and have a policy in place that prohibits employees from opening email attachments.<br />
Never open an email attachment from a sender you do not recognize. Many of these criminals try to disguise their emails as being from legitimate banks or communications providers, but you should never fall for it. One way to tell if an email is from your bank is to hover your mouse pointer over any link in the email and read the associated link at the bottom of the browser. If the link does not come from your bank, then the email is a phishing email that is looking for victims.</p>
<p><a href="https://globalit.com/services/technical-services/it-risk-management/" target="_blank" rel="noopener noreferrer"><img decoding="async" class="wp-image-1479 size-full alignnone" src="https://info.globalit.com/wp-content/uploads/2016/10/internet-security.png" alt="internet security" width="345" height="53" srcset="https://info.globalit.com/wp-content/uploads/2016/10/internet-security.png 345w, https://info.globalit.com/wp-content/uploads/2016/10/internet-security-300x46.png 300w" sizes="(max-width: 345px) 100vw, 345px" /></a></p>
<p>Make sure you look over the data in the email carefully. If you are not familiar with the vendor or the prospective client, call the phone number listed in the email. Here is an example of a fraudulent company that looks legitimate. If you look closely, you can see that there are (3) s’ in the email address dave@bluegrassscontracting.com. This is easy to miss.</p>
<p><img decoding="async" class=" wp-image-1481 alignnone" src="https://info.globalit.com/wp-content/uploads/2016/10/10-16-ransomware.png" alt="ransomware" width="986" height="357" srcset="https://info.globalit.com/wp-content/uploads/2016/10/10-16-ransomware.png 1165w, https://info.globalit.com/wp-content/uploads/2016/10/10-16-ransomware-300x109.png 300w, https://info.globalit.com/wp-content/uploads/2016/10/10-16-ransomware-768x278.png 768w, https://info.globalit.com/wp-content/uploads/2016/10/10-16-ransomware-1024x371.png 1024w" sizes="(max-width: 986px) 100vw, 986px" /></p>
<p>Corporate and personal users should always have their computers backed-up to a resource that is not online. For example, personal users can get a large capacity USB drive and back their computers up to that drive every Friday. Corporate users can utilize offline back-up systems that are constantly updated with any changes to the network in case of an attack.</p>
<p><a href="https://globalit.com/services/cloud-services/cloud-backup-services-los-angeles/" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" class="size-full wp-image-1478 alignnone" src="https://info.globalit.com/wp-content/uploads/2016/10/cloud-backup.png" alt="cloud backup" width="345" height="53" srcset="https://info.globalit.com/wp-content/uploads/2016/10/cloud-backup.png 345w, https://info.globalit.com/wp-content/uploads/2016/10/cloud-backup-300x46.png 300w" sizes="(max-width: 345px) 100vw, 345px" /></a></p>
<p><strong>What To Do If You Have Been Attacked</strong></p>
<p>If you open an attachment in your corporate email account and you get the ransomware warning page, then contact your manager immediately. If your manager is not available, then contact the IT manager directly and alert the trusted IT group to the problem.<br />
If you get ransomware on your personal computer, then you should call a computer support professional immediately. Do not try to take care of the problem yourself because it could become worse.</p>
<p><a href="https://globalit.com/services/technical-services/managed-it-msp-los-angeles/" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" class="alignnone wp-image-1480 size-full" src="https://info.globalit.com/wp-content/uploads/2016/10/managed-it.png" alt="managed it" width="345" height="53" srcset="https://info.globalit.com/wp-content/uploads/2016/10/managed-it.png 345w, https://info.globalit.com/wp-content/uploads/2016/10/managed-it-300x46.png 300w" sizes="(max-width: 345px) 100vw, 345px" /></a></p>
<p>Ransomware is just one of the growing threats that honest Internet users face every day. By practicing safe computer use habits, you can reduce your chances of getting attacked and have yourself covered in case you need to have your hard drive reloaded.</p>
<p>The post <a href="https://info.globalit.com/what-you-need-to-know-about-ransomware/">What You Need to Know About Ransomware</a> appeared first on <a href="https://info.globalit.com">info.globalit.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://info.globalit.com/what-you-need-to-know-about-ransomware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Increase Your Ranking With Customer Reviews</title>
		<link>https://info.globalit.com/importance-of-online-customer-reviews-for-marketing/</link>
					<comments>https://info.globalit.com/importance-of-online-customer-reviews-for-marketing/#respond</comments>
		
		<dc:creator><![CDATA[Tony Rare]]></dc:creator>
		<pubDate>Mon, 16 Dec 2013 18:22:09 +0000</pubDate>
				<category><![CDATA[Online Marketing]]></category>
		<category><![CDATA[Webmaster]]></category>
		<guid isPermaLink="false">http://info.globalit.com/?p=552</guid>

					<description><![CDATA[<p>How Customer Reviews Affect Your Organic Rankings As a business, you want your online presence to stand out among the competition. One of the best ways to do so is by encouraging your audience to complete customer reviews online. As seen in Moz’s breakdown of local search ranking factors, there are a variety of things… <a href="https://info.globalit.com/importance-of-online-customer-reviews-for-marketing/" class="read-more-link">read more &#8594;</a></p>
<p>The post <a href="https://info.globalit.com/importance-of-online-customer-reviews-for-marketing/">Increase Your Ranking With Customer Reviews</a> appeared first on <a href="https://info.globalit.com">info.globalit.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong><img loading="lazy" decoding="async" class="size-medium wp-image-1333 alignright" src="https://info.globalit.com/wp-content/uploads/2013/12/fastest_broadband_internet_connection_in_cambridge-300x225.jpg" alt="fastest_broadband_internet_connection_in_cambridge" width="300" height="225" srcset="https://info.globalit.com/wp-content/uploads/2013/12/fastest_broadband_internet_connection_in_cambridge-300x225.jpg 300w, https://info.globalit.com/wp-content/uploads/2013/12/fastest_broadband_internet_connection_in_cambridge.jpg 500w" sizes="(max-width: 300px) 100vw, 300px" />How Customer Reviews Affect Your Organic Rankings</strong><br />
As a business, you want your online presence to stand out among the competition. One of the best ways to do so is by encouraging your audience to complete customer reviews online. As seen in Moz’s breakdown of <a title="local ranking factors" href="https://moz.com/blog/top-20-local-search-ranking-factors-an-illustrated-guide" target="_blank" rel="noopener noreferrer">local search ranking factors</a>, there are a variety of things that contribute to your business&#8217;s visibility online. While it’s important to consider all of them, there are a few that stand out for business owners.</p>
<p>In addition to providing your business with valuable feedback, customer reviews will improve your ranking online. Businesses gain positive exposure online with consistent customer reviews while effectively boosting rankings through sites like Google+ and other online directories.</p>
<p>Google+<br />
Reviews left on Google+ Local Pages help other potential customers in the area quickly refer to highly-rated businesses. With Google+, slow and steady is the key. Customer reviews that appear at a natural pace are less likely to be automatically removed and result in a higher organic ranking.</p>
<p>Third-party directories, like Yelp and TripAdvisor, are included in Google’s search for information about your business. Accumulating reviews in third-party directories will contribute to an increase in your organic ranking.</p>
<p><strong>Top 5 Directories for Reviews</strong><br />
Among the vast number of directories available online, five, in particular, stand out as most beneficial when trying to improve your business’s organic ranking.</p>
<ol>
<li><strong>Google+</strong><br />
<a title="Google+" href="https://plus.google.com/" target="_blank" rel="noopener noreferrer">Google+</a> is being used by more businesses than ever to connect with their audience and stay a part of industry conversation. With over 540 million monthly active users, businesses can count on their interactions with customers on Google+ to improve organic rankings for their site.</li>
<li><strong>Yelp</strong><br />
As one of the leading third-party review sites, <a title="yelp" href="https://www.yelp.com/" target="_blank" rel="noopener noreferrer">Yelp</a> reels in more than 47 million local reviews and 117 million unique visitors each quarter. Since it has become one of the leading review sites on the internet, businesses improve their chance of higher rankings when customer reviews are listed on Yelp.</li>
<li><strong>YellowPages</strong><br />
Although their big yellow books are no longer a popular resource, <a title="yellowpages" href="https://www.yellowpages.com/" target="_blank" rel="noopener noreferrer">YellowPages.com</a> remains alive and well as a source of information online. Including your business listing in the YellowPages will make your information available to over 3 million visitors monthly.</li>
<li><strong>Superpages</strong><br />
Averaging over 3.5 million page views per day, <a title="superpages" href="https://www.superpages.com/" target="_blank" rel="noopener noreferrer">Superpages</a> is another great listing option for businesses that want to improve organic search rankings. Since the website makes it easy for mobile users to peruse its pages, Superpages helps businesses reach more customers.</li>
<li><strong>Yahoo</strong><br />
As one of Google’s strongest competitors, <a title="yahoo" href="https://local.yahoo.com/" target="_blank" rel="noopener noreferrer">Yahoo</a> is an attractive option for businesses that want to improve their rankings. Each week, Yahoo earns over 2.2 million visitors, nearly half of which are search-related.</li>
</ol>
<p><strong>Valid Reviews are Essential</strong><br />
In order to improve your business’ organic rankings with integrity, valid reviews are essential. The use of fake reviews in an online forum or directory will only serve to hurt your business’ image. Fake reviews are:</p>
<ul>
<li><strong>Easy to Spot</strong><br />
Consumers these days are savvy. The increased amount of time spent online daily has increased general consumer awareness of red flags, allowing fake online content to be spotted easily. Some <a title="how to spot a fake review" href="https://howto.cnet.com/8301-11310_39-57554335-285/how-to-spot-fake-user-reviews-while-shopping-online/" target="_blank" rel="noopener noreferrer">tell-tale signs of a fake review</a> include a focus on only good qualities of a company or product, multiple raving reviews around a certain date, or a salesman-like tone to the review.</li>
</ul>
<ul>
<li><strong>On Their Way Out</strong><br />
With major search engines like Google and Yahoo taking a decided stance against black hat SEO practices, fake reviews continue to be a source of frustration provoking an active attempt to eliminate them. There will soon be (if not already) strict consequences in search results for businesses that publish fake reviews.</li>
</ul>
<ul>
<li><strong>Caught By Directories</strong><br />
As the computing world transforms to include better, more intuitive technology, it’s becoming easier for directories to effectively weed out fake reviews. Directories are better able to spot red flags, like reviews originating from the same IP address or an unnatural burst of reviews all at once, and respond accordingly. Businesses are at risk of everything from removed listings to complete bans from service.</li>
</ul>
<ul>
<li><strong>Harmful to the Trust-Building Process</strong><br />
Improving your business’ organic rankings is an important part of growing your company and must be treated with integrity. Publishing fake reviews about your services or products is bound to get uncovered at some point. When it does, what you’ve truly lost is the ability to <a title="online reviews" href="https://searchengineland.com/2013-study-79-of-consumers-trust-online-reviews-as-much-as-personal-recommendations-164565" target="_blank" rel="noopener noreferrer">keep your customers’ trust</a>.</li>
</ul>
<p><strong>Earn Customer Reviews the Right Way</strong><br />
Receiving a steady flow of customer reviews is your business’s reward for providing unrivaled service. Instead of soliciting reviews with incentives, be consistent with your business listings and make reviews easy for your customers.</p>
<ul>
<li><strong>Make Reviews Easy</strong><br />
It’s much easier to earn a customer’s review of your business when the process is simple, takes only a few seconds, and is outlined clearly. You’re more likely to gain a customer review if you send instructions in an email, <a title="global it reviews" href="https://globalit.com/testimonials/" target="_blank" rel="noopener noreferrer">list instructions on your website</a>, or send a sample review that your customer can quickly edit and add to the listing of their choice.</li>
</ul>
<p>When requesting a review, be sure to ask questions about your customer’s needs, how your business met their needs and their satisfaction level with your company.</p>
<ul>
<li><strong>Be Consistent</strong><br />
To improve your organic rankings, maintain a professional online presence, and reduce confusion about your company. It’s essential to be consistent. When entering information into business listings online, first develop a master copy with your company’s contact, website, and profile information.</li>
</ul>
<p>Use this information on each one of your business listings to prevent changes in capitalization or punctuation. Before a listing goes live, re-check your draft to ensure there are no typos and your site’s link is working properly. <a title="local marketing" href="https://moz.com/blog/top-20-local-search-ranking-factors-an-illustrated-guide#three" target="_blank" rel="noopener noreferrer">Inconsistency</a> can damage your credibility with search engines.</p>
<p><strong>Local Marketing Prevails</strong><br />
As far as Google is concerned, local marketing is a large part of the future of search. In fact, Google’s push for an emphasis on local marketing is allowing businesses the opportunity to reach out to the customer base right in their backyard. Google’s ongoing changes to its search algorithm continually favor local search and local businesses.</p>
<p>Reports indicated that as many as <a title="local seo" href="http://www.searchenginejournal.com/how-to-improve-local-seo-with-kris-jones-of-referlocal/" target="_blank" rel="noopener noreferrer">half of all searches</a> on Google are made with the intent to find something local. Naturally, this number increases significantly for mobile users who are in need of information on the go. As a result, local marketing strategies are becoming more defined as businesses try to tap into their local audience.</p>
<p><strong>Tips, Insights, and Trends for Local Marketing</strong><br />
Long before Google began to put emphasis on local search, local SEOs knew that the importance of the local search for businesses would bloom. One of the top tips for businesses includes building a <a title="small business marketing" href="https://searchengineland.com/8-tips-for-planning-your-small-business-2014-marketing-strategy-179004" target="_blank" rel="noopener noreferrer">complete and accurate listings presence</a>.</p>
<p>Seasoned online marketing professionals are predicting increased use of <a title="location based marketing" href="https://socialmediatoday.com/ubersocialmedia/1866556/9-marketing-insights-drive-online-success-2014" target="_blank" rel="noopener noreferrer">location-based marketing </a>platforms, such as Google Places and Google+ Local, and will place further emphasis on the importance of building the presence of a listing.</p>
<p>Statistics report that approximately <a title="digital marketing" href="https://www.clickz.com/clickz/column/2309955/top-5-digital-marketing-trends-of-2014" target="_blank" rel="noopener noreferrer">91% of adult mobile phone users</a> keep their phone within arm’s reach. With apps like Google Wallet and PayPal, virtual commerce is becoming seamless, allowing consumers to make instant purchase decisions from the convenience of their mobile device.</p>
<p>Improving your business’s organic search ranking through customer reviews is a great way to increase your visibility online while expanding your reach to new customers. In order to be effective, your business’ marketing campaign needs to include a plan to obtain customer reviews online while maintaining the presence of a consistent listing. If you need help improving your organic search rankings, contact <a href="https://globalit.com" target="_blank" rel="noopener noreferrer">GLOBAL IT</a> for more information at (877) 822-5565.</p>
<p>The post <a href="https://info.globalit.com/importance-of-online-customer-reviews-for-marketing/">Increase Your Ranking With Customer Reviews</a> appeared first on <a href="https://info.globalit.com">info.globalit.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://info.globalit.com/importance-of-online-customer-reviews-for-marketing/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Global IT Webmail &#8211; User Access Instructions</title>
		<link>https://info.globalit.com/how-to-access-your-global-it-web-mail-account/</link>
					<comments>https://info.globalit.com/how-to-access-your-global-it-web-mail-account/#respond</comments>
		
		<dc:creator><![CDATA[Shaun Kellogg]]></dc:creator>
		<pubDate>Thu, 12 Dec 2013 19:03:29 +0000</pubDate>
				<category><![CDATA[Desktop Tips]]></category>
		<category><![CDATA[How-To]]></category>
		<category><![CDATA[Web Mail]]></category>
		<category><![CDATA[Webmaster]]></category>
		<guid isPermaLink="false">http://info.globalit.com/?p=481</guid>

					<description><![CDATA[<p>1. First, open your favorite internet browser for this write up I will be using Fire Fox 2. Navigate to this page, https://globalit.com/web-mail and enter the e-mail address provided to you by the Global IT support team 3. Now you will see a page with a log in box like the one bellow You will… <a href="https://info.globalit.com/how-to-access-your-global-it-web-mail-account/" class="read-more-link">read more &#8594;</a></p>
<p>The post <a href="https://info.globalit.com/how-to-access-your-global-it-web-mail-account/">Global IT Webmail &#8211; User Access Instructions</a> appeared first on <a href="https://info.globalit.com">info.globalit.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: left;">1. First, open your favorite internet browser for this write up I will be using Fire Fox</p>
<p style="text-align: left;">2. Navigate to this page, <a title="Global IT Web Mail Portal" href="https://web11.globalit.com:2096/" target="_blank" rel="noopener noreferrer">https://globalit.com/web-mail</a> and enter the e-mail address provided to you by the Global IT support team</p>
<p style="text-align: left;">3. Now you will see a page with a log in box like the one bellow</p>
<p><a href="https://info.globalit.com/wp-content/uploads/2013/12/step-3.jpg"><img decoding="async" class=" wp-image-528 alignnone" src="https://info.globalit.com/wp-content/uploads/2013/12/step-3.jpg" alt="step-3" width="600" srcset="https://info.globalit.com/wp-content/uploads/2013/12/step-3.jpg 646w, https://info.globalit.com/wp-content/uploads/2013/12/step-3-300x85.jpg 300w" sizes="(max-width: 646px) 100vw, 646px" /></a></p>
<ul>
<li>You will need to enter your username, this is the entire e-mail address provided to you by the Global IT support team</li>
</ul>
<div>
<p>4. Next you will be prompted to select from three different web mail applications; Horde, RoundCube and SquirrelMail.</p>
<p><a href="https://info.globalit.com/wp-content/uploads/2013/12/step-4.jpg"><img decoding="async" class=" wp-image-536 alignnone" src="https://info.globalit.com/wp-content/uploads/2013/12/step-4.jpg" alt="step-4" width="600" srcset="https://info.globalit.com/wp-content/uploads/2013/12/step-4.jpg 768w, https://info.globalit.com/wp-content/uploads/2013/12/step-4-300x177.jpg 300w" sizes="(max-width: 768px) 100vw, 768px" /></a></p>
<h2>Horde, RoundCube and SquirrelMail</h2>
<p>Horde, RoundCube and SquirrelMail are three webmail applications available to every Global IT client. Each has a different interface and set of features, but they all access the same mailbox.</p>
<ul>
<li><strong>Horde</strong> may have the most features: a mobile device interface; calendar and task organizer, custom filters; along with the ability to share content with others.</li>
<li><strong>RoundCube</strong> and <strong>SquirrelMail</strong> are more streamlined with fewer features and both are easy to use as well.</li>
</ul>
<p>We encourage our clients to experiment with each application and find that one that suits their needs.</p>
<p>After you have selected your webmail application you are ready to read and send e-mail from your webmail portal.</p>
</div>
<p>The post <a href="https://info.globalit.com/how-to-access-your-global-it-web-mail-account/">Global IT Webmail &#8211; User Access Instructions</a> appeared first on <a href="https://info.globalit.com">info.globalit.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://info.globalit.com/how-to-access-your-global-it-web-mail-account/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Global IT IP KVM &#8211; User Access Instructions</title>
		<link>https://info.globalit.com/ipkvm-access-instructions/</link>
					<comments>https://info.globalit.com/ipkvm-access-instructions/#respond</comments>
		
		<dc:creator><![CDATA[Tony Rare]]></dc:creator>
		<pubDate>Wed, 04 Dec 2013 19:07:40 +0000</pubDate>
				<category><![CDATA[Cloud]]></category>
		<category><![CDATA[IT Services]]></category>
		<category><![CDATA[Webmaster]]></category>
		<guid isPermaLink="false">http://info.globalit.com/?p=446</guid>

					<description><![CDATA[<p>1.    Open Internet Explorer, IE is required to be used for the IP KVM software. 2.    Enter the IP KVM URL provided to you by the Global IT support team. 3.    Click on &#8220;Continue to this website …&#8221; Twice 4.    Click on &#8220;Continue&#8221; on “Security Warning” pop-up window 5.    Check box next to &#8220;I accept… <a href="https://info.globalit.com/ipkvm-access-instructions/" class="read-more-link">read more &#8594;</a></p>
<p>The post <a href="https://info.globalit.com/ipkvm-access-instructions/">Global IT IP KVM &#8211; User Access Instructions</a> appeared first on <a href="https://info.globalit.com">info.globalit.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: left;">1.    Open Internet Explorer, IE is required to be used for the IP KVM software.</p>
<p style="text-align: left;">2.    Enter the IP KVM URL provided to you by the Global IT support team.</p>
<p style="text-align: left;">3.    Click on &#8220;Continue to this website …&#8221; Twice</p>
<p><a href="https://info.globalit.com/wp-content/uploads/2013/12/step_3.jpg" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="wp-image-447 aligncenter" src="https://info.globalit.com/wp-content/uploads/2013/12/step_3.jpg" alt="step_3" width="600" height="429" /></a></p>
<p style="text-align: left;">4.    Click on &#8220;Continue&#8221; on “Security Warning” pop-up window</p>
<p><a href="https://info.globalit.com/wp-content/uploads/2013/12/step_4.jpg" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="wp-image-448 aligncenter" src="https://info.globalit.com/wp-content/uploads/2013/12/step_4.jpg" alt="step_4" width="600" height="385" /></a></p>
<p style="text-align: left;">5.    Check box next to &#8220;I accept the risk &#8230;&#8221; and click on &#8220;Run&#8221;</p>
<p><a href="https://info.globalit.com/wp-content/uploads/2013/12/step_5.jpg" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="wp-image-449 aligncenter" src="https://info.globalit.com/wp-content/uploads/2013/12/step_5.jpg" alt="step_5" width="600" height="384" /></a></p>
<p style="text-align: left;">6.    You will see the Client open.</p>
<p style="text-align: center;"><a href="https://info.globalit.com/wp-content/uploads/2013/12/step_6.jpg" target="_blank" rel="noopener"><img decoding="async" class=" wp-image-450 aligncenter" src="https://info.globalit.com/wp-content/uploads/2013/12/step_6.jpg" alt="step_6" width="600" /></a></p>
<p style="text-align: left;">*If there is already a profile for the connection, skip to step 11</p>
<p style="text-align: left;">7.    To create a new profile, click on &#8220;Connection&#8221; and then &#8220;New Profile&#8221;</p>
<p><a href="https://info.globalit.com/wp-content/uploads/2013/12/step_7.jpg" target="_blank" rel="noopener"><img decoding="async" class="aligncenter wp-image-451" src="https://info.globalit.com/wp-content/uploads/2013/12/step_7.jpg" alt="step_7" width="600" /></a></p>
<p style="text-align: left;">8.    You will see the &#8220;Add Connection&#8221; pop-up window</p>
<p style="text-align: center;"><a href="https://info.globalit.com/wp-content/uploads/2013/12/step_8.jpg" target="_blank" rel="noopener"><img decoding="async" class="aligncenter wp-image-452" src="https://info.globalit.com/wp-content/uploads/2013/12/step_8.jpg" alt="step_8" width="600" /></a></p>
<p style="text-align: left;">9.    Enter the following information: Description: IPKVM (Or name of your choosing); IP Address: IP KVM Address provided by Global IT Support and click on &#8220;OK&#8221;</p>
<p><a href="https://info.globalit.com/wp-content/uploads/2013/12/step_7.jpg" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="aligncenter wp-image-451" src="https://info.globalit.com/wp-content/uploads/2013/12/step_9.jpg" alt="step_9" width="369" height="366" /></a></p>
<p style="text-align: left;">10.    You will now see the newly create profile</p>
<p style="text-align: center;"><a href="https://info.globalit.com/wp-content/uploads/2013/12/step_10.jpg" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-451" src="https://info.globalit.com/wp-content/uploads/2013/12/step_10.jpg" alt="step_10" width="600" height="384" /></a></p>
<p style="text-align: left;">11.    Right click on the profile and click &#8220;New Connection&#8221;</p>
<p style="text-align: center;"><a href="https://info.globalit.com/wp-content/uploads/2013/12/step_11.jpg" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="aligncenter" src="https://info.globalit.com/wp-content/uploads/2013/12/step_11.jpg" alt="step_11" width="600" height="384" /></a></p>
<p style="text-align: left;">12.    Enter the provided Username and Password in the &#8220;New Connection&#8221; Pop-up window and click &#8220;OK&#8221;</p>
<p style="text-align: center;"><a href="https://info.globalit.com/wp-content/uploads/2013/12/step_12.jpg" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="aligncenter" src="https://info.globalit.com/wp-content/uploads/2013/12/step_12.jpg" alt="step_12" width="600" height="384" /></a></p>
<p style="text-align: left;">13.    You will now see a list of connections under the profile.</p>
<p style="text-align: left;"><a href="https://info.globalit.com/wp-content/uploads/2013/12/step_13.jpg" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="aligncenter" src="https://info.globalit.com/wp-content/uploads/2013/12/step_13.jpg" alt="step_13" width="600" height="384" /></a></p>
<p style="text-align: left;">14.    Right click the device you wish to access and click on &#8220;New Connection&#8221;</p>
<p style="text-align: left;"><a href="https://info.globalit.com/wp-content/uploads/2013/12/step_14.jpg" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="aligncenter" src="https://info.globalit.com/wp-content/uploads/2013/12/step_14.jpg" alt="step_14" width="600" height="384" /></a></p>
<p style="text-align: left;">15.    After the connection has been established, you will now see the display to the connected device and you will be able to interact with it using your keyboard and mouse.</p>
<p style="text-align: left;"><a href="https://info.globalit.com/wp-content/uploads/2013/12/step_15.jpg" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="aligncenter" src="https://info.globalit.com/wp-content/uploads/2013/12/step_15.jpg" alt="step_15" width="600" height="384" /></a></p>
<p style="text-align: left;">16.    When you are finished accessing your device, <span style="text-decoration: underline; color: #ff0000;"><strong>DO NOT</strong></span> just close the window. This will keep the connection locked and you will not be able to access it again.</p>
<p style="text-align: left;">17.    To close out the connection properly, right click on the selected device and click &#8220;Disconnect&#8221;</p>
<p style="text-align: center;"><a href="https://info.globalit.com/wp-content/uploads/2013/12/step_17.jpg" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="aligncenter" src="https://info.globalit.com/wp-content/uploads/2013/12/step_17.jpg" alt="step_17" width="600" height="384" /></a></p>
<p style="text-align: left;">18.    To terminate your session properly, right click on the profile and click &#8220;Disconnect&#8221;</p>
<p style="text-align: center;"><a href="https://info.globalit.com/wp-content/uploads/2013/12/step_18.jpg" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="aligncenter" src="https://info.globalit.com/wp-content/uploads/2013/12/step_18.jpg" alt="step_18" width="600" height="384" /></a></p>
<p style="text-align: left;">19.    Now close out the application by clicking on &#8220;Connection&#8221; in the top left and click on &#8220;Exit&#8221;</p>
<p style="text-align: center;"><a href="https://info.globalit.com/wp-content/uploads/2013/12/step_19.jpg" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="aligncenter" src="https://info.globalit.com/wp-content/uploads/2013/12/step_19.jpg" alt="step_19" width="600" height="384" /></a></p>
<p style="text-align: left;">20.    Click &#8220;Yes&#8221; on the &#8220;Confirm action&#8221; pop-up window</p>
<p style="text-align: center;"><a href="https://info.globalit.com/wp-content/uploads/2013/12/step_20.jpg" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="aligncenter" src="https://info.globalit.com/wp-content/uploads/2013/12/step_20.jpg" alt="step_20" width="600" height="384" /></a></p>
<p>The post <a href="https://info.globalit.com/ipkvm-access-instructions/">Global IT IP KVM &#8211; User Access Instructions</a> appeared first on <a href="https://info.globalit.com">info.globalit.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://info.globalit.com/ipkvm-access-instructions/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Selecting The Right Business Profile Picture</title>
		<link>https://info.globalit.com/selecting-the-right-business-profile-picture/</link>
					<comments>https://info.globalit.com/selecting-the-right-business-profile-picture/#respond</comments>
		
		<dc:creator><![CDATA[Tony Rare]]></dc:creator>
		<pubDate>Wed, 13 Nov 2013 20:30:01 +0000</pubDate>
				<category><![CDATA[Online Marketing]]></category>
		<category><![CDATA[Webmaster]]></category>
		<guid isPermaLink="false">http://info.globalit.com/?p=411</guid>

					<description><![CDATA[<p>Selecting a personal image to be used for business purposes poses the question; business professional or business casual attire? This question is generally industry specific, so if you are in a corporate environment where you regularly wear professional attire, we suggest a business professional picture. If you decide to go with business casual, think flattering… <a href="https://info.globalit.com/selecting-the-right-business-profile-picture/" class="read-more-link">read more &#8594;</a></p>
<p>The post <a href="https://info.globalit.com/selecting-the-right-business-profile-picture/">Selecting The Right Business Profile Picture</a> appeared first on <a href="https://info.globalit.com">info.globalit.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-medium wp-image-1335" src="https://info.globalit.com/wp-content/uploads/2013/11/photo-300x300.png" alt="photo" width="300" height="300" srcset="https://info.globalit.com/wp-content/uploads/2013/11/photo-300x300.png 300w, https://info.globalit.com/wp-content/uploads/2013/11/photo-150x150.png 150w, https://info.globalit.com/wp-content/uploads/2013/11/photo-60x60.png 60w, https://info.globalit.com/wp-content/uploads/2013/11/photo.png 361w" sizes="(max-width: 300px) 100vw, 300px" />Selecting a personal image to be used for business purposes poses the question; business professional or business casual attire?</p>
<p>This question is generally industry specific, so if you are in a corporate environment where you regularly wear professional attire, we suggest a business professional picture. If you decide to go with business casual, think flattering and wear colors that make you look healthy, shapes (opencollar, v-necks, business jackets) that cut a professional figure, and make sure everything is ironed.</p>
<p>Here are some suggestions to consider.</p>
<p>1. Always use a photo that can be used multiple times, for example LinkedIn profiles with a photo are seven times more likely to be viewed than ones without a photo.</p>
<p>2. Use a recent photo of yourself. If people are surprised when they meet you in person because you look nothing like your picture, they may wonder why you posted such a misleading photo.</p>
<p>3. You should be the only subject in the photo. It&#8217;s your professional profile picture, so it should focus on you. This means no inanimate objects, group shots, or photos of you with your significant other, child, or pets.</p>
<p>4. Your face should be in focus. The background can be slightly out of focus, but your features need to be sharp, not blurred. If there are darker shadows in the background, make sure they aren&#8217;t obscuring your face.</p>
<p>5. Wear appropriate professional or business casual attire. Appear as you usually would in a business situation, this may also mean that you are freshly shaven or wearing [business appropriate] makeup and jewelry. Never post a photo of yourself at the beach, in a night club, or even running a marathon.</p>
<p>6. Keep your head straight and upright. Women, in particular, tend to tilt their heads in photos, which makes them look less self-assured. Again, this is your professional photo, so you need to look confident and capable in it.</p>
<p>7. Use a pleasant facial expression. You need to look like someone others will want to work with. This means looking pleasant and confident and not having a &#8220;too serious&#8221; look on your face. Photos should express confidence, edgy and full of life and not sad, angry, or a vacant stare. Also, stick to color rather than black and white shots.&#8221;</p>
<p>8. Don&#8217;t use your company&#8217;s product or logo as a photo. People want to connect with you as an individual, so avoid displaying your company&#8217;s logo — unless it&#8217;s your company&#8217;s page.</p>
<p>&nbsp;</p>
<p>The post <a href="https://info.globalit.com/selecting-the-right-business-profile-picture/">Selecting The Right Business Profile Picture</a> appeared first on <a href="https://info.globalit.com">info.globalit.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://info.globalit.com/selecting-the-right-business-profile-picture/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Identifying IT Security Threats</title>
		<link>https://info.globalit.com/identifying-it-security-threats/</link>
					<comments>https://info.globalit.com/identifying-it-security-threats/#respond</comments>
		
		<dc:creator><![CDATA[Tony Rare]]></dc:creator>
		<pubDate>Tue, 17 Sep 2013 19:22:53 +0000</pubDate>
				<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Webmaster]]></category>
		<guid isPermaLink="false">http://info.globalit.com/?p=313</guid>

					<description><![CDATA[<p>The Complexity of IT Security Modern businesses – of all sizes – are becoming increasingly vulnerable to security breaches even as they enable their workforces with state-of-the-art technologies. Cyber attacks are up 100% since 2010. Cyber attacks can be costly. The average time to resolve a cyber attack is 24 days at an average cost… <a href="https://info.globalit.com/identifying-it-security-threats/" class="read-more-link">read more &#8594;</a></p>
<p>The post <a href="https://info.globalit.com/identifying-it-security-threats/">Identifying IT Security Threats</a> appeared first on <a href="https://info.globalit.com">info.globalit.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>The Complexity of IT Security</h2>
<p>Modern businesses – of all sizes – are becoming increasingly vulnerable to security breaches even as they enable their workforces with state-of-the-art technologies.<br />
<img loading="lazy" decoding="async" class="alignleft size-medium wp-image-325" src="https://info.globalit.com/wp-content/uploads/2013/09/cyber-attacks-on-rise-284x300.jpg" alt="cyber-attacks-on-rise" width="284" height="300" srcset="https://info.globalit.com/wp-content/uploads/2013/09/cyber-attacks-on-rise-284x300.jpg 284w, https://info.globalit.com/wp-content/uploads/2013/09/cyber-attacks-on-rise.jpg 434w" sizes="(max-width: 284px) 100vw, 284px" /></p>
<ul>
<li>Cyber attacks are up <span style="color: #3366ff;"><strong>100%</strong></span> since 2010.</li>
</ul>
<ul>
<li>Cyber attacks can be costly. The average time to resolve a cyber attack is 24 days at an average cost of $591,780, or nearly <span style="color: #3366ff;"><strong>$25,000</strong></span> per day.</li>
</ul>
<ul>
<li>The most costly cyber-crimes are caused by malicious code, denial of service, stolen or hijacked devices, and malevolent insiders.</li>
</ul>
<h2></h2>
<h2></h2>
<h2></h2>
<h2><span style="color: #3366ff;">Threat 1:</span> Data Loss &amp; Leakage</h2>
<ul>
<li>Unintentional distribution<img decoding="async" class="alignright wp-image-327" src="https://info.globalit.com/wp-content/uploads/2013/09/information-leakage-224x300.jpg" alt="information-leakage" width="225" srcset="https://info.globalit.com/wp-content/uploads/2013/09/information-leakage-224x300.jpg 224w, https://info.globalit.com/wp-content/uploads/2013/09/information-leakage.jpg 557w" sizes="(max-width: 224px) 100vw, 224px" /><br />
of sensitive data:</p>
<ul>
<li>financial</li>
<li>employee</li>
<li>customer data</li>
<li>intellectual property</li>
</ul>
</li>
<li>Due to:
<ul>
<li>loss or theft of laptops or mobile phones.</li>
<li>electronic transmissions, such as unencrypted emails, IM, webmail and file transfer tools, hacking, virus</li>
</ul>
<p>&nbsp;</li>
</ul>
<p>&nbsp;</p>
<h2><span style="color: #3366ff;">Threat 2:</span> Denial of Service Attacks</h2>
<p><img decoding="async" class="alignleft wp-image-332" src="https://info.globalit.com/wp-content/uploads/2013/09/denial-of-service-attacks-224x300.jpg" alt="denial-of-service-attacks" width="225" srcset="https://info.globalit.com/wp-content/uploads/2013/09/denial-of-service-attacks-224x300.jpg 224w, https://info.globalit.com/wp-content/uploads/2013/09/denial-of-service-attacks.jpg 558w" sizes="(max-width: 224px) 100vw, 224px" /></p>
<ul>
<li>DoS attacks <strong><span style="color: #3366ff;">flood a network</span></strong> with more traffic than it can handle, consuming bandwidth or server resources.</li>
<li>Distributed DOS attacks <strong><span style="color: #3366ff;">use multiple systems</span></strong> to launch the offensive, making them difficult to shut down.</li>
<li>DDOS attacks are growing in size – to more than <strong><span style="color: #3366ff;">50GBps</span></strong> in 2012 ‒ and last more than 30 hours, according to data from Prolexic.</li>
</ul>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h2><span style="color: #3366ff;">Threat 3:</span> Malware</h2>
<ul>
<li>Malicious software (aka malware) is <span style="color: #3366ff;">unwanted software</span> installed without consent.<img decoding="async" class="alignright wp-image-333" src="https://info.globalit.com/wp-content/uploads/2013/09/malware-300x215.jpg" alt="malware" width="225" srcset="https://info.globalit.com/wp-content/uploads/2013/09/malware-300x215.jpg 300w, https://info.globalit.com/wp-content/uploads/2013/09/malware.jpg 680w" sizes="(max-width: 300px) 100vw, 300px" /></li>
<li>Examples include:
<ul>
<li>viruses</li>
<li>worms</li>
<li>Trojan horses</li>
<li>spyware</li>
<li>Botnets, Zombie</li>
</ul>
<p>&nbsp;</li>
</ul>
<p>&nbsp;</p>
<h2><span style="color: #3366ff;">Threat 4:</span> Phishing/Social Engineering</h2>
<p><img decoding="async" class=" wp-image-337 alignright" src="https://info.globalit.com/wp-content/uploads/2013/09/phishing-social-engineering-300x237.jpg" alt="phishing-social-engineering" width="225" srcset="https://info.globalit.com/wp-content/uploads/2013/09/phishing-social-engineering-300x237.jpg 300w, https://info.globalit.com/wp-content/uploads/2013/09/phishing-social-engineering.jpg 673w" sizes="(max-width: 300px) 100vw, 300px" /></p>
<ul>
<li>Cyber criminals use phishing and “social engineering” schemes to trick people into sharing personal information, such as:
<ul>
<li>account information</li>
<li>credit card data</li>
<li>social security numbers</li>
<li>passwords</li>
</ul>
</li>
<li>Phishing  and social engineering are done typically with links to fill-in forms from:
<ul>
<li>e-mails</li>
<li>Websites</li>
<li>social media</li>
</ul>
</li>
</ul>
<h2><span style="color: #3366ff;">Threat 5:</span> Human Error/Malevolence</h2>
<p><img decoding="async" class="alignright wp-image-340" src="https://info.globalit.com/wp-content/uploads/2013/09/human-error-malevolence-265x300.jpg" alt="human-error-malevolence" width="225" srcset="https://info.globalit.com/wp-content/uploads/2013/09/human-error-malevolence-265x300.jpg 265w, https://info.globalit.com/wp-content/uploads/2013/09/human-error-malevolence.jpg 434w" sizes="(max-width: 265px) 100vw, 265px" /></p>
<ul>
<li>More than 50% of security problems are due to employees or IT staff inadvertently:
<ul>
<li>failing to follow procedure</li>
<li>being careless</li>
<li>lacking expertise</li>
</ul>
</li>
<li>Insiders or former insiders, such as disgruntled or malicious employees or contractors can be dangerous attackers because they know the organization’s:
<ul>
<li>security codes  and measures</li>
<li>computers and applications</li>
<li>actions that will cause the most damage</li>
</ul>
<p>&nbsp;</li>
</ul>
<h2>Understanding Data-Centric Security</h2>
<p>Before you even think about technology, you need to determine who will be responsible for security. The development and communication of your security strategy is critical.</p>
<ul>
<li>Understand present, potential and future risks<a href="https://info.globalit.com/wp-content/uploads/2013/09/complexity-of-it-security.jpg" target="_blank" rel="noopener"><img decoding="async" class=" wp-image-326 alignright" src="https://info.globalit.com/wp-content/uploads/2013/09/complexity-of-it-security-272x300.jpg" alt="complexity-of-it-security" width="225" srcset="https://info.globalit.com/wp-content/uploads/2013/09/complexity-of-it-security-272x300.jpg 272w, https://info.globalit.com/wp-content/uploads/2013/09/complexity-of-it-security.jpg 716w" sizes="(max-width: 272px) 100vw, 272px" /></a></li>
</ul>
<ul>
<li style="list-style-type: none;">
<ul>
<li>Employee vulnerabilities</li>
<li>Internet, cloud vulnerabilities</li>
<li>LAN vulnerabilities</li>
<li>Premises security</li>
</ul>
</li>
</ul>
<ul>
<li>Implement
<ul>
<li>Minimum security codes and measures</li>
<li>Define business and personal computer and applications use</li>
<li>Define consequences for violating company security policies</li>
<li>Educate users</li>
</ul>
</li>
</ul>
<p>The post <a href="https://info.globalit.com/identifying-it-security-threats/">Identifying IT Security Threats</a> appeared first on <a href="https://info.globalit.com">info.globalit.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://info.globalit.com/identifying-it-security-threats/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to Configure Spam Settings</title>
		<link>https://info.globalit.com/edit-spam-settings/</link>
					<comments>https://info.globalit.com/edit-spam-settings/#respond</comments>
		
		<dc:creator><![CDATA[Tony Rare]]></dc:creator>
		<pubDate>Tue, 27 Aug 2013 00:25:30 +0000</pubDate>
				<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Webmaster]]></category>
		<guid isPermaLink="false">http://blog.globalit.com/?p=292</guid>

					<description><![CDATA[<p>How to increase or decrease your spam settings and how to add users to the blacklist or whitelist. Most users will just use steps 1 through 5. Step 6 is for advanced configuration, should only be used by advanced users. 1.  Access Control Panel Type: https://yourdomainname.com:2083 into your preferred Internet browser. Enter your Control Panel username into… <a href="https://info.globalit.com/edit-spam-settings/" class="read-more-link">read more &#8594;</a></p>
<p>The post <a href="https://info.globalit.com/edit-spam-settings/">How to Configure Spam Settings</a> appeared first on <a href="https://info.globalit.com">info.globalit.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>How to increase or decrease your spam settings and how to add users to the blacklist or whitelist.</p>
<p>Most users will just use steps 1 through 5. Step 6 is for advanced configuration, should only be used by advanced users.</p>
<div>
<h2><b>1.  </b><b>Access Control Panel</b></h2>
</div>
<p><img decoding="async" class="alignleft size-large wp-image-294" src="http://blog.globalit.com/wp-content/uploads/2013/08/cpanel_log_in-1024x906.jpg" alt="cpanel_log_in" width="620" height="" srcset="https://info.globalit.com/wp-content/uploads/2013/08/cpanel_log_in-1024x906.jpg 1024w, https://info.globalit.com/wp-content/uploads/2013/08/cpanel_log_in-300x265.jpg 300w, https://info.globalit.com/wp-content/uploads/2013/08/cpanel_log_in.jpg 1064w" sizes="(max-width: 1024px) 100vw, 1024px" /></p>
<ol start="1">
<li>Type: https://yourdomainname.com:2083 into your preferred Internet browser.</li>
<li>Enter your Control Panel username into the <i>Username</i> field.</li>
<li>Enter your password into the <i>Password</i> field.</li>
<li>Click <i>Log in</i>.</li>
</ol>
<div>
<h2><b>2.  </b><b>Access SpamAssassin Settings</b></h2>
</div>
<p><img loading="lazy" decoding="async" class="alignleft wp-image-304" src="http://blog.globalit.com/wp-content/uploads/2013/08/access_spamassasin.jpg" alt="access_spamassasin" width="620" height="563" srcset="https://info.globalit.com/wp-content/uploads/2013/08/access_spamassasin.jpg 768w, https://info.globalit.com/wp-content/uploads/2013/08/access_spamassasin-300x272.jpg 300w" sizes="(max-width: 620px) 100vw, 620px" /></p>
<div>
<h2><b>3.  </b><b>Enable SpamAssassin</b></h2>
</div>
<p>To enable SpamAssassin:</p>
<ul>
<li>Simply click the <i>Enable SpamAssassin</i> button on the SpamAssassin home screen.</li>
</ul>
<p><img loading="lazy" decoding="async" class="alignleft wp-image-300" src="http://blog.globalit.com/wp-content/uploads/2013/08/enable_spamassasin1.jpg" alt="enable_spamassasin" width="620" height="563" srcset="https://info.globalit.com/wp-content/uploads/2013/08/enable_spamassasin1.jpg 768w, https://info.globalit.com/wp-content/uploads/2013/08/enable_spamassasin1-300x272.jpg 300w" sizes="(max-width: 620px) 100vw, 620px" /></p>
<div>
<h2><b>4.  </b><b>Automatically Delete Spam</b></h2>
</div>
<p>This function automatically deletes messages that meet or exceed the score limit. Activate this function by clicking the <em>Auto-Delete Spam</em> button under the <em>Filters</em> heading.</p>
<p>WARNING &#8211; Email tagged as spam will be deleted completely from the server.</p>
<p><img loading="lazy" decoding="async" class="alignleft wp-image-306" src="http://blog.globalit.com/wp-content/uploads/2013/08/auto-delete.jpg" alt="auto-delete" width="620" height="563" srcset="https://info.globalit.com/wp-content/uploads/2013/08/auto-delete.jpg 768w, https://info.globalit.com/wp-content/uploads/2013/08/auto-delete-300x272.jpg 300w" sizes="(max-width: 620px) 100vw, 620px" /></p>
<p>When you click <em>Configure SpamAssassin</em>, you can add email addresses that should be filtered automatically by typing the address into the “blacklist_from” box. A whitelist can be created in the same way at the bottom of the page. It is also possible to specify scores that SpamAssassin should use for each particular test.</p>
<p>&nbsp;</p>
<div>
<h2><b>5.  </b><b>Set Required Spam Score              </b></h2>
</div>
<p>&nbsp;</p>
<p>SpamAssassin examines every email message for spam characteristics, then assigns it an overall score. Enter the score required for a message to be considered spam.</p>
<p><img decoding="async" class="alignleft wp-image-308" src="http://blog.globalit.com/wp-content/uploads/2013/08/changing_score.jpg" alt="changing_score" width="620" srcset="https://info.globalit.com/wp-content/uploads/2013/08/changing_score.jpg 767w, https://info.globalit.com/wp-content/uploads/2013/08/changing_score-300x269.jpg 300w" sizes="(max-width: 767px) 100vw, 767px" /></p>
<p>5 is the default setting, this is not very aggressive.<br />
1 is very aggressive and in most cases, this setting is never used.</p>
<p>We recommend, adjusting 1 point setting each day until you achieve the desired result.</p>
<p>&nbsp;</p>
<div>
<h2><b>6.  </b><b>Configuration SpamAssassin        </b></h2>
</div>
<p>This feature allows you to add emails and/or domains to blacklist (spam, blocked) or whitelist (clean, allowed through).</p>
<p><img decoding="async" class="alignleft wp-image-310" src="http://blog.globalit.com/wp-content/uploads/2013/08/configure_spamassasin.jpg" alt="configure_spamassasin" width="620" srcset="https://info.globalit.com/wp-content/uploads/2013/08/configure_spamassasin.jpg 768w, https://info.globalit.com/wp-content/uploads/2013/08/configure_spamassasin-300x272.jpg 300w" sizes="(max-width: 768px) 100vw, 768px" /></p>
<p>Note: You can always email <a href="mailto:support@globalit.com">support@globalit.com</a> for assistance with black or white listing of emails and IP addresses.</p>
<div>
<h3>6.1 Add Addresses to the Blacklist</h3>
</div>
<p>Enter addresses whose email is often allowed past the spam filter, but from whom you do not wish to receive email.</p>
<p>You may use <code>*</code> as a wildcard for multiple characters, or <code>?</code> as a single-character wildcard.</p>
<ul>
<li><code>user@example.com</code> — Blacklists a single email address.</li>
<li><code>*@example.com</code> — Blacklists all the addresses at <code>example.com</code>.</li>
<li><code>?ser@example.com</code> — For example, <code>User@example.com</code> would be blacklisted, but <code>AUser@example.com</code> would not be blacklisted.</li>
</ul>
<p>By default, 5 text boxes appear, allowing you to add 5 addresses. To add more than 5 addresses:</p>
<ol start="1">
<li>Fill in the first 5 text boxes.</li>
<li>Click <em>Save</em>.</li>
</ol>
<p>When you return to the page, more text boxes will appear.</p>
<p>&nbsp;</p>
<div>
<h3>6.2 Add Addresses to the Whitelist</h3>
</div>
<p>Enter addresses whose email is often blocked, but from whom you wish to receive email.</p>
<p>You may use <code>*</code> as a wildcard for multiple characters, or <code>?</code> as a single-character wildcard.</p>
<ul>
<li><code>user@example.com</code> — Whitelists a single email address.</li>
<li><code>*@example.com</code> — Whitelists all the email addresses at example.com.</li>
<li><code>?ser@example.com</code> — For example, <code>User@example.com</code> would be added to the whitelist while <code>AUser@example.com</code> would not be added.</li>
</ul>
<p>By default, 5 text boxes appear, allowing you to add 5 addresses. To add more than 5 addresses:</p>
<ol start="1">
<li>Fill in the first 5 text boxes.</li>
<li>Click <em>Save</em>.</li>
</ol>
<p>When you return to the page, more text boxes will appear.</p>
<p>&nbsp;</p>
<p><b>Remember:</b></p>
<ul>
<li>Click <i>Save</i> to store the configuration changes.</li>
<li>A whitelisted address is automatically allowed past the filter.</li>
<li>A blacklisted address will automatically be filtered by SpamAssassin.</li>
</ul>
<p>&nbsp;</p>
<p>The post <a href="https://info.globalit.com/edit-spam-settings/">How to Configure Spam Settings</a> appeared first on <a href="https://info.globalit.com">info.globalit.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://info.globalit.com/edit-spam-settings/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Why Moving Toward RWD (Responsive Web Design) Has a Direct Effect on Your Marketing</title>
		<link>https://info.globalit.com/marketing-with-responsive-web-design/</link>
					<comments>https://info.globalit.com/marketing-with-responsive-web-design/#respond</comments>
		
		<dc:creator><![CDATA[Tony Rare]]></dc:creator>
		<pubDate>Fri, 31 May 2013 01:07:54 +0000</pubDate>
				<category><![CDATA[Online Marketing]]></category>
		<category><![CDATA[Web Design]]></category>
		<category><![CDATA[Webmaster]]></category>
		<guid isPermaLink="false">http://blog.globalit.com/?p=279</guid>

					<description><![CDATA[<p>Mobile has demonstrated that it is here to stay. As more and more users begin to utterly depend on their mobile device to connect them with the world, it has become even more essential for companies to institute an effective mobile strategy for their website. Since new mobile devices appear every day, web designers must… <a href="https://info.globalit.com/marketing-with-responsive-web-design/" class="read-more-link">read more &#8594;</a></p>
<p>The post <a href="https://info.globalit.com/marketing-with-responsive-web-design/">Why Moving Toward RWD (Responsive Web Design) Has a Direct Effect on Your Marketing</a> appeared first on <a href="https://info.globalit.com">info.globalit.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="size-medium wp-image-1343 alignright" src="https://info.globalit.com/wp-content/uploads/2013/05/RWD-300x176.jpg" alt="RWD" width="300" height="176" srcset="https://info.globalit.com/wp-content/uploads/2013/05/RWD-300x176.jpg 300w, https://info.globalit.com/wp-content/uploads/2013/05/RWD-768x452.jpg 768w, https://info.globalit.com/wp-content/uploads/2013/05/RWD-1024x602.jpg 1024w, https://info.globalit.com/wp-content/uploads/2013/05/RWD.jpg 1500w" sizes="(max-width: 300px) 100vw, 300px" />Mobile has demonstrated that it is here to stay. As more and more users begin to utterly depend on their mobile device to connect them with the world, it has become even more essential for companies to institute an effective mobile strategy for their website. Since new mobile devices appear every day, web designers must figure out a way to make sure that their websites are compatible with every new gadget that shows up on the market. Responsive web design is one of the most popular methods of achieving this goal.</p>
<h2>What is Responsive Web Design?</h2>
<p>Although responsive web design (RWD) is still in its early stages, Google already supports the technique as the best practice for developing a mobile website. <a title="Responsive Web Design" href="http://alistapart.com/article/responsive-web-design" target="_blank" rel="noopener">An article by Ethan Marcotte</a> spawned the concept of RWD as Marcotte toyed with the idea of transferring the idea of responsive architectural design to web design. Essentially, RWD is a system of building a site that responds to user behavior so that users enjoy a high quality experience no matter what device is used. There are three primary characteristics of responsive web design:</p>
<ul>
<li>A fluid grid</li>
<li>Response to media queries</li>
<li>Flexible images</li>
</ul>
<p>With these three elements, a website is capable of shifting and adapting for a user based on the platform, screen size, and orientation. Fluid grids allow a website to quickly reconfigure itself to accommodate a new device with appropriate size, margins, and spacing. Different sections of a layout are assigned to different segments of the grid so that the layout can shift to promote the most relevant information.</p>
<p>By responding to CSS media queries, RWD is capable of using the appropriate configuration of the flexible grid. The smallest screens may only see one component of the grid at a time, while larger devices will trigger a more comprehensive view of the site. RWD uses the media queries to detect the type of device, so in addition to presenting the suitable grid the site can adjust its resolution and configure itself for a landscape or portrait view.</p>
<p>The final element of responsive web design is flexible images. Images are designed so that they also adjust to fit a device through a number of methods, such as:</p>
<ul>
<li>Hiding or revealing portions of the image</li>
<li>Sliding composite images</li>
<li>Scalable images</li>
</ul>
<p>Thanks to these techniques, viewers will never again be frustrated by an image that is too large or refuses to properly load on a mobile device. RWD ensures that images as well as other media are appealing and manageable in a mobile format.</p>
<h2>The Growth of Mobile</h2>
<p>The need for such a revolutionary method of mobile web design is the direct result of the boom in mobile device usage in recent years. The statistics about the growth of mobile are staggering and are hard proof as to why it is essential for companies to expand their marketing campaign to target mobile devices. Consider the following statistics:</p>
<ul>
<li>84% of people surveyed around the world say they couldn’t go a single day without using their cell phone.</li>
<li>Global mobile data traffic grew by 70% in 2012, while smartphone usage increased by 81%.</li>
<li>45% of American adults own a smartphone and 31% of them have a tablet.</li>
<li>In 2013, the number of mobile-connected devices is projected to overtake the number of the world’s population.</li>
</ul>
<p>If your company is not targeting this massive audience, you are certainly losing opportunities to engage consumers and promote your brand.</p>
<h2>A Versatile Viewing Experience</h2>
<p>So why is RWD so great? One of the most popular benefits of RWD is that it eliminates the need for developing a unique site for every device that appears on the market. Theoretically, RWD prepares your site to handle any new gadget that will appear in the near future, however bizarre or revolutionary it may be. Streamlining your web development needs to one design reduces the time and money necessary for an effective website.</p>
<p>However, RWD is not simply beneficial for your company. It also offers a number of advantages to visitors to the site, primarily the all-important high quality viewing experience and complete versatility. Since consumers are beginning to buy more tablets, notebooks, and smartphones than computers, the quality of the viewing experience of your mobile site is just as important as your original site.</p>
<p>As RWD adapts to each type of device, your site can enable special features for touch screens, such as links and buttons that are thumb-friendly or the ability to swipe between different columns. With RWD, the website functions seamlessly through any device so that users can access all of the information on your site from any gadget with no decrease of site quality.</p>
<h2>Optimizing For Search Engines</h2>
<p>As mentioned above, Google is a strong supporter of responsive web design, largely due to the fact that RWD works well with search engines. Search engines appreciate RWD because it allows for clean, organized code that is easy to search and analyze.</p>
<p>In addition, RWD cuts out the risk of being penalized for creating duplicate content, since there is ultimately only one version of your site. If you were to set up a separate mobile site improperly, you would quickly incur a ranking penalty and therefore lose visitors and conversions. RWD lets your company maintain consistent information across the board.</p>
<h2>Marketing Success With RWD</h2>
<p>RWD is so effective that it directly increases the success of marketing efforts. For instance, sites that utilize RWD experience fewer abandoned checkouts because they are easier to use on mobile devices. Also, the time invested in your marketing campaign is more efficient because there is no need to continually update multiple sites. Furthermore, your analytics are immediately simplified since you only have one site to track.</p>
<p>In an increasingly mobile world, advancements like responsive web design can prove invaluable to your business. Although RWD may cost more initially to design and set up, the long-term benefits are invaluable. Responsive web design creates an innovative site so that your marketing endeavors can reach their full potential on every mobile device.</p>
<p>The post <a href="https://info.globalit.com/marketing-with-responsive-web-design/">Why Moving Toward RWD (Responsive Web Design) Has a Direct Effect on Your Marketing</a> appeared first on <a href="https://info.globalit.com">info.globalit.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://info.globalit.com/marketing-with-responsive-web-design/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Spyware and Adware</title>
		<link>https://info.globalit.com/spyware-and-adware/</link>
					<comments>https://info.globalit.com/spyware-and-adware/#respond</comments>
		
		<dc:creator><![CDATA[Tony Rare]]></dc:creator>
		<pubDate>Fri, 28 Dec 2012 16:37:19 +0000</pubDate>
				<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Webmaster]]></category>
		<category><![CDATA[ad-aware]]></category>
		<category><![CDATA[adware]]></category>
		<category><![CDATA[spam]]></category>
		<category><![CDATA[spybot]]></category>
		<category><![CDATA[spyware]]></category>
		<guid isPermaLink="false">http://blog.globalit.com/?p=146</guid>

					<description><![CDATA[<p>Spyware and Adware are programs that are installed on a computer that perform operations that the user probably doesn’t want. Spyware is a program that was created for the purpose of collecting information and sending it to a designated entity. The information it gathers can be from which terms or phrases you are searching and… <a href="https://info.globalit.com/spyware-and-adware/" class="read-more-link">read more &#8594;</a></p>
<p>The post <a href="https://info.globalit.com/spyware-and-adware/">Spyware and Adware</a> appeared first on <a href="https://info.globalit.com">info.globalit.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="size-full wp-image-1352 alignright" src="https://info.globalit.com/wp-content/uploads/2012/12/Spyware-adware.jpg" alt="Spyware-adware" width="222" height="227" srcset="https://info.globalit.com/wp-content/uploads/2012/12/Spyware-adware.jpg 222w, https://info.globalit.com/wp-content/uploads/2012/12/Spyware-adware-60x60.jpg 60w" sizes="(max-width: 222px) 100vw, 222px" />Spyware and Adware are programs that are installed on a computer that perform operations that the user probably doesn’t want. Spyware is a program that was created for the purpose of collecting information and sending it to a designated entity. The information it gathers can be from which terms or phrases you are searching and which websites you are visiting, to personal and financial information like your date of birth, social security number, or credit card information. Adware has a different purpose. It will usually ‘pop-up’ advertisements in websites when you search for a specific term or phrase, or it may be an entirely separate pop-up window on your desktop that advertises something.</p>
<p>Now you may be thinking: “Who would install such a program?” The answer is: “More than you would think.” These programs are typically installed without the knowledge of the user. They are usually packaged together with other ‘free software’ downloaded from the internet. Think of the phrase “nothing in life is free.” This holds true for computer software. If you got it for free, there is a big chance the creator is making money somehow. Often it’s by accepting payment from companies in return for adding these programs to their ‘free software’.</p>
<p>Here are some identifiers that may indicate your computer is infected:</p>
<ul>
<li>Your computer is slowing significantly</li>
<li>You are redirected to a different website than the one you entered</li>
<li>You get random informational or advertising pop-ups</li>
<li>Your internet connection seems very slow or stops working</li>
</ul>
<p>There are some things you can do to prevent the installation of these programs. Some software has the option of ‘Customized Installation’ which allows you to deselect the spyware or adware program from being installed. Another way is to read the ‘Agreement’ for any indication that these programs are included, granted they are being honest in disclosing that in addition to their program, other ‘alternate’ or ‘third party applications will be installed. However, these methods do not guarantee that you won’t have spyware or adware installed. Many programs may not disclose this or the program will not function without it. Sometimes these programs can be installed by visiting an unreliable website.</p>
<p>The only surefire way to avoid having spyware and/or adware being installed on your computer is to only install trusted software from trusted sources, and visit only trusted websites. Trusted companies like Apple, Microsoft, Adobe, and others do not include these programs in their installation packages. More and more methods are being developed to deploy these unwanted programs.</p>
<p>If you suspect your computer contains spyware or adware, use a special program to find and remove these unwanted programs. Some reliable programs that are highly recommended are Ad-aware and Spybot. Remember though, some spyware and adware programs might have already done some damage to your computer that may require a qualified technician to repair. Global IT, a leader in <a href="https://globalit.com/services/computer-security/global-eye-computer-security/" target="_blank" rel="noopener noreferrer">internet security</a>, staffs certified technicians that can restore your computer back to a level of optimal performance.</p>
<p>The post <a href="https://info.globalit.com/spyware-and-adware/">Spyware and Adware</a> appeared first on <a href="https://info.globalit.com">info.globalit.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://info.globalit.com/spyware-and-adware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
