Java updating further, Firefox won’t be viable

For the past year, if your business utilizes java online, you’ve had to hop around to different browsers to find one which had the right extensibility and features to run your site.

Old code and legacy webapps are to blame – as security tightens online, old features are identified as risks and locked down, rendering related functions inoperable.

For now, FireFox the web browser offers a lower level of security and a higher level of usefulness when compared to other browsers – though that carries a higher risk.

Java, while used to allow you to submit and interact with data, is a framework which allows actors including computer hackers, to interact with your computer.

Oracle, the company behind Java, is finalizing a push to remove this framework from the web, advising  that modern browsers and webapps move to “the plugin-free Java Web Start technology”.


Read more here

and here:

Don’t rely on autocomplete

In browser, or in your email’s “TO” field – autocomplete is a handy feature, but very transient.

In outlook especially, you should create and save contacts for things you want to keep. When you save or create a CONTACT, that data is easily backed up and migrates with you. When you rely on autocomplete, that list may become full and push other entries off, without setup doesn’t migrate with you and if it becomes corrupt, must be rebuilt. That means downtime.

Instead, use a data  management solution for web browsing, and not rely on saving passwords to your browser, because if the system must be cleaned, or you change computers, that data will not move with you in most circumstances and must be rebuilt.

Ask us how we can help protect your investment in field data & security today!

Security Threat: Cryptolocker

Cryptolocker is a virus which often masqurades as a zip, excel or word document, attached to an email. In actuality is an .exe or program and in our experience, comes through as an email making demands or offering severe consequences like “you’re party in a law suit, please see the attached for more info” or “IRS requesting more information, please fill out the attached PDF.”

It utilizes built in windows features to encrypt whatever data it can touch and often gets away with this with whatever privileges a user holds – meaning without administrator privileges!

With privileges, cryptolocker will destroy multiple types of backups, remove access and take over your network, infecting things like phone systems, copiers or other smart devices.  The fix then being a wipe and complete retooling of your business network.

The most effective prevention is knowledge. Users should be aware from whom they are opening attachments.

MarKel makes attempts at preemptively stopping this, but as with many successful viruses, new versions are released often, circumventing the fixes which stopped the virus previously.

If you have a questionable email or something which seems funkey please save us all hours of work and headache by simply calling us and asking. I promise, we’ll be appreciative.

Windows key + L Locks your computer

If you need to step away from your computer, LOCK IT!

As Shannon will attest, leaving your computer unlocked can have security implications, like having your background changed to photoshopped images of yourself. Or more dramatically, confidential data viewed or copied off.

If you look at your keyboard, you’ll notice a Start Button key, also known as the windows key. This key frequently has the MS Windows logo on it and occupies the space between control and alt.

This button is the master key to any number of windows functions – not simply opening your start menu!

For example,

Windows key + L will lock the machine and NOT log you out. This will requireyou to enter your password when you get back.

Windows Key + D, will minimize everything and show your desktop

Windows Key + Arrows will move the window in focus around so that it affixes itself to the side of your monitor (left & right arrow keys) , minimizes or maximizes (up and down arrow keys)

For a more detailed list of shortcuts, check out (and perhaps print!) the photo found HERE