FAA Eases Restrictions? In a move that is most certainly a sign of the apocalypse, The FAA relaxed restrictions on the use of mobile devices during takeoffs and landings. Months of study apparently have proven what we have long suspected. E-readers don’t bring down planes. The bad news is that devices that transmit will still not be allowed. This means no in-flight calls on your cell phone.
Use extreme caution when opening .TIFF files and when visiting unknown websites
Microsoft has identified a “zero-day” vulnerability involving .TIFF files. This means that neither Microsoft nor the antivirus companies have been able to develop tools to address this vulnerability. Because this is a zero-day vulnerability, the only way to protect yourself is to exercise extreme caution when opening .TIFF files, no matter how they reach you—whether via Exchange or Lync or through unknown websites. Alll users need to be very careful with .TIFF files. Anti-virus and firewall protection applications may not stop this threat. Do not open any files with a filename ending in .tiff – either through your personal mail or Exchange mail.
Buying professional computers is a quirky business because a professional grade machine looks basically identical to a “home” machine to the untrained eye. Usually once or twice a year we prepare a quote for, let’s say six professional-grade laptops, and submit to a client for approval. The client then turns around and buys six laptops from Best Buy. Comedy (and tragedy) ensues.
From our perspective, the big box computers should never even be considered for business use, unless you are a sole proprietor working from home. Even then, we still wouldn’t advise it.
Google Takes to the Sea. Is it a floating data center? Is it a floating Google Glass store? Those who know aren’t saying, but Google is building a floating something-or-other in the San Francisco bay. The first thought was data center because Google happens to own a patent on just such a floating facility. The smart money seems to be on the data center, but the Google Glass store seems more fun. Either way, it can truly
Malware has changed a lot over the years. If memories of the ILOVEYOU worm or the Anna Kournikova virus evoke memories of lost time and money, then the malware of today might, at first glance, seem more benign. This would be an incorrect assumption. While we have gotten more sophisticated in our prevention methods, the malware itself has gotten more sinister.
What would you do with four extra hours of free time per week? The technology exists for massive efficiencies… if you know the secrets. We’ve condensed our favorite productivity hacks into a single entertaining, inspiring presentation that is guaranteed to save you valuable time and money. How did Promethius save over $1,000 and three weeks of time with one hack? Join us to find out!!
Three-Finger Salute a Mistake. Microsoft founder Bill Gates said in an interview session last week that the Ctrl-Alt-Del three key login should have been made easier. The login was used in development. The thought was that since both hands were required it would prevent accidental reboots. Mr.
All too often I hear from a customer liaison that he/she “didn’t want to bother us with such a silly problem.” I am hereby stating for the record that we want to be bothered with all IT issues, no matter how trivial they may seem. In fact, our system only truly works if we are entrusted with the trivial as well as the more severe.
BlackBerry to Go Private. One of the early pioneers in the world of smartphones is really smarting today after announcing last week that they expect to post a second quarter loss of nearly $1 billion and agreeing to a buyout of less than $5 billion ($9 per share) to take the company private. It’s been quite a ride for the company since it released its first BlackBerry device in 1999 (the company was known as Research In Motion, or RIM, at that time).
Have you ever wondered what your legal exposure is if one of your employees breaks the law using his/her company laptop? Under what circumstances can e-mail be subpoenaed? What are the liability implications if client data is compromised from your server? As a business owner or manager, it’s crucial to keep updated on the legalities surrounding IT. Make sure your IT policies are structured to protect your business. If you don’t have IT policies in place, now is the time to develop them!