Back Office Geeks
Category
General Information
Locality: Pleasant Hill, California
Phone: +1 925-291-0811
Address: 3380 Vincent Rd., Site HUB 94523 Pleasant Hill, CA, US
Website: backofficegeeks.com/contact-us/
Likes: 85
Reviews
Facebook Blog
If you are interested in sending or receiving a confidential message, you should read this: https://www.usatoday.com//how-keep-your-chats-/3909981002/
Some of these are old school and some are online related. All can be defeated with the right checks and balances.
Sadly, there are apps that use IE as their base, and the organizations that built those apps are ignorant of IE flaws. Even Microsoft wants you to stop using IE.
I've been seeing a lot of fishing exploits of late. Many of them are very well targeted and packaged. https://www.forbes.com//the-state-of-cybersecurity-perta/
Here is an eye opener: I heard a report today that was noteworthy -- Last year over HALF A BILLION people had their personal information compromised while using their cell phone via Wi-Fi. As we know good habits go a long way. Do it always, but particularly while traveling, and protect your identity and personal information by taking a few precautions: ... 1. Do not use "free" Wi-Fi access points simply because it sounds like the right guest access name. Know this: Hackers set up "free Wi-Fi" access points specifically for the purpose of hacking the information on your phone by using a name that, for example, resemble or imitate your hotel Wi-Fi, or the airport Wi-Fi name. Hackers name their fake Wi-Fi connections specifically to "trick" you into using their connection. Once you are connected, they can obtain your info. 2. Properly configure the connection behavior for Wi-Fi on your phone. This means that, if done properly, your phone will not auto-join an available network. It will require that you "select" a Wi-Fi connection. This is particularly important while traveling. 3. If you must use Wi-Fi at the airport, for example, check around for the official guest Wi-Fi provided there. There are usually signs displaying its name or someone who can tell you the "real" guest Wi-Fi name they offer. It is still less secure than using your own Wi-Fi access at home as a general rule, so... 4. ...if you must use the internet via free Wi-Fi, avoid conducting activity on your phone or other device that may require that you enter your credit card or personal information. If you must do so, then instead use your cellular connection versus Wi-Fi for conducting that type of internet activity. Your cellular connection is more secure. then when done, you can go back to using the "authorized" Wi-Fi offered by your hotel, airport, etc. 5. Install anti-virus software like Norton anti-virus on your phone and laptops/tablets. 6. Every hour or two on a public Wi-Fi network, adjust your phone settings to forget the network, then log back in again. If you are concerned, try purposely logging onto the public Wi-Fi with the wrong password. If you can get on anyway, that's a sign that someone is monitoring you and you're not secure. As they say, an ounce of prevention....
This is a good comprehensive guide for local businesses that want to be found in Google. Don't have time for this? Give us a call.
If you ever wondered how voice over IP (VoiP) and Session Initiation Protocol (SIP) works, capabilities, and basically, the 411... https://www.telstraglobal.com//key-differences-between-sip
Come to the Celebrate Love Dinner / Dance on February 16, 2019.
Security is the word of the day. Keep your devices updated, people... http://bgr.com/2018/02/08/iphone-iboot-source-code-leak/amp/
We think of security issues having to do with computers and servers, but this article talks about ATM's and credit card machines - not the machines themselves, but the card readers. https://krebsonsecurity.com/all-about-skimmers/
You can only benefit from educating and arming yourself--know what to look for and what surfing habits to avoid. It will reduce the chance that your information or privacy will be compromised. Good read: https://us.norton.com/internetsecurity-malware-5-ways-you-d
We've been working with Amazon Workmail, and it's an interesting alternative to the other cloud office suites, like Office365 and G Suite. https://backofficegeeks.com/project/amazon-workmail/
How to keep a hacker out of your network. - You have to operate under the assumption that anyone with sufficient motivation, resources, and skills will be able to get in. The whole idea is to make it harder and make it so it’s just not worth it for them to invest the time and energy into getting in."
Popular Listings
Duverger Macarons
1445 Stellar Drive 93033 Oxnard, CA, US
+1 805-248-7742
Business service, Food and drinks company
BMC
2222 W Hillcrest Drive 91320 Thousand Oaks, CA, US
+1 805-375-8000
Business service, Business supplies service
Duverger Macarons
1445 Stellar Drive 93033 Oxnard, CA, US
+1 805-248-7742
Business service, Food and drinks company