Important Alert: The FDIC “Misunderstanding” That Business Owners Need To Know About

Here’s an important question about your finances with a shocking answer: If a cyber-criminal were to gain access to your company’s bank account and steal all of the money in it, could you get it back? In many cases, the answer is no.

Many small business owners falsely believe they are protected by Federal Deposit Insurance Corporation (FDIC) laws and that the bank (or Federal government) would replace money stolen by a thief. Not so. The FDIC protects bank accounts against bank failures, not theft or embezzlement. So if your money is taken by a criminal—be it a completely anonymous person or even a “trusted” employee or vendor—the bank is not responsible for replacing the funds.

What’s really concerning about this is the fact that online criminals are becoming more and more sophisticated in their attacks. Criminals are also targeting small businesses since they are the “low hanging fruit”—small businesses often don’t have the security systems in place to prevent these attacks.

One Real Example That Cost One Business Close To $100,000

Sign Designs Inc. is an electric-sign maker in Modesto, California that had almost $100,000 stolen from their account by an unknown group in Eastern Europe. The first sign of trouble was a phone call from Bank of Stockton, their local community bank. It had just received a call from Chase Bank’s anti-fraud team regarding a $9,670 electronic payment to a Chase customer in Michigan. The owner confirmed he had not set up or authorized that payment, and when he looked further, he discovered that 17 similar transactions had already been processed the previous day from his bank account.

Although the owner’s bank notified all the banks that had received the funds, a large chunk of the money had already been withdrawn by “money mules” (people who launder money for online criminals, usually in Eastern Europe). The biggest problem for Sign Designs is that the Bank of Stockton isn’t accepting responsibility for the losses, claiming its systems were never breached. Hackers had planted a malicious program on the computer of Sign Designs’ controller and used that program to steal his online-banking credentials. The bank also points out that Sign Designs failed to implement proper security measures on its network that might have averted the losses.

How To Protect Yourself

  1. Keep Your Network SECURE!
    Hackers are focusing on small business computer networks because they are far easier to crack than a bank’s network. Weak passwords, out-of-date anti-virus, security patches that aren’t updated, and unmanaged (or non-existent) firewalls are the simple security checks that hackers are counting on you to neglect. Don’t be an easy target! Of course, our <> clients know that we’re watching over their network and making sure the gateway to your data is safe.
  2. Educate Your Staff
    While up-to-date anti-virus will protect you against a LOT of threats, it’s not 100% effective in protecting you. That’s because the most common way criminals access financial accounts is through e-mail: phishing scams, malware attachments in documents or links, or brute-force password guessing/reset attacks. The first two are made possible through human error; employees or trusted account holders “giving” hackers access by accidentally downloading malware, typing passwords in an e-mail, clicking on a link in an e-mail they believe to be safe, and so on. That’s why it’s important that anyone accessing financials should know NOT to click on strange links, open questionable attachments or send any account information via e-mail.
  3. Talk To Your Bank
    Find out exactly what their policy is for fraud and what you can do to prevent problems. Ask your bank to set up “dual controls” on your account so that each transaction requires the approval of two people. You might also establish a daily limit on how much money can be transferred out of your account, and require that all transfers be prescheduled by phone or confirmed via phone call or text message. If possible, impose restrictions on adding new payees.
  4. Watch Your Account Daily
    You should also get into the habit of checking your accounts daily at the end of the day and notifying your bank immediately of any questionable withdrawals. Money is laundered quickly; the sooner you catch the mistakes, the better your chances are of recovering the funds.
  5. Make Sure Your Accountant Has Proper Security Controls
    If you have someone doing your payroll and/or accounting, make sure they are following the same strict security procedures of your own computer network. Sign Designs was hacked by accessing the controller’s PC and using his credentials to make the transfers. Therefore, it’s essential that any and every employee, vendor or person accessing your financial accounts is following even tighter security controls on their PCs or other devices used to log into your bank, credit card account, etc.

If you’re not certain your computer network is secure from these attacks, call us for a FREE Network Security Audit and find out for sure if you’re protected…or not: xx-xxx-xxxx or e-mail: ((email)).

Posted in Articles | Tagged , , , , | Leave a comment

Google’s New Privacy Policy: What You Need To Know

On March 1st, Google implemented a new, unified privacy policy that affects the browsing history and information Google has on you, both past and present. Prior to this change, your Google history of the searches you made and sites you visited was not shared with Google’s other services, particularly advertisers. Naturally, Google is one of the biggest media and marketing companies in the world, and your preferences and search information is pure gold from a marketing standpoint. Marketers armed with that information would know exactly what products and services to display to you as you use the search engine.

However, your search history can reveal a lot about you including details on your location, interests, age, sexual orientation, religion, health concerns and more. If you want to keep Google from combining your web history with the data they have gathered about you in their other products, such as YouTube or Google Plus, you may want to remove all items from your web history and stop your web history from being recorded in the future. To do this, sign into your Google Account and go to the “History” section, then select “Remove All History.”

Of course, clearing the web history in your Google account will not prevent Google from gathering and storing your preferences, searches and information and using it for internal purposes. It also does not change the fact that any information gathered and stored by Google could be obtained and used against you by law enforcement.

With web history enabled, Google will keep these records indefinitely; with it disabled, they will be partially anonymized after 18 months, and certain kinds of uses, including sending you customized search results, will be prevented. This brings up a whole other topic of what kind of information should you post about yourself (or store) online. Facebook is another site that gathers tons of personal information about you, including your location, date of birth, friends and family, age, preferences and much, much more. In the future, I believe that cyber security will become an increasingly important issue for all of us.

Posted in Articles | Tagged , , | Leave a comment

Who Else Wants To Win A $25 Gift Card?

Take my monthly “Trivia Challenge” and you could win too!

The Grand Prize Winner of last month’s Trivia Challenge Quiz is ((name of winner and town!)) He or she was the first person to correctly answer my quiz question from last month: What event directly caused the creation of “April Fool’s Day?”

The correct answer was a) The addition of January, February & March to the original calendar.

Now, here’s this month’s trivia question. The winner will receive a gift card to ((NAME OF STORE OR RESTAURANT)).

Which of the following is true about a mother and her babies?
a) A mother giraffe often gives birth while standing
b) A female oyster over her lifetime may produce over 100 million young
c) Kittens are born both blind and deaf, but their mother’s purring is used to signal them
d) All of the above are true

Call me right now with your answer!

XXX-XXX-XXXX

Posted in Articles | Tagged , | Leave a comment

The Most Shocking Security Threat To Your Small Business

Hopefully by now you realize you need to keep a close watch over the security of your PC and other devices (or you’re smart enough to hire us to do it for you). Either way, cybercrime is BIG business, and small business owners are seen as the low hanging fruit by attackers who are looking for easy-to-steal financial data, passwords and the like. Some do it for profit, others do it for fun.

But there’s a much bigger threat to small business data security that can not only portend to leak your information out to the masses, but can also corrupt or erase data, screw up operations and bring everything to a screeching halt. What is it? Surprisingly, it’s your employees.

“Human error” is the #1 leading cause of data loss, system failure and virus attacks. In some cases, it’s an innocent “Ooops! I deleted it.” Other times it’s a malicious act of revenge from a disgruntled employee who didn’t get the raise they wanted or simply feels taken advantage of. Recently, a disgruntled employee working for oDesk, a third party content management firm, leaked Facebook’s highly detailed rulebook for flagging inappropriate posts. This document contained shocking guidelines regarding sexual content, death and disfigurement as well as racially charged content. Apparently, sexual acts should be blocked, but crushed heads are okay.

The above incident, while a problem, is a mild case. Often employees seeking revenge will steal and post client data, financials or other competitive information online. In some cases, they sell it. Other times, employees delete critical files to either cause harm to the organization or to cover their tracks. And when it’s your client’s data that gets stolen or compromised, you have a major PR nightmare to deal with aside from the costs and problem of recovering the data.

At a minimum, first, make sure you back up all critical data remotely. Second, monitor employee’s usage of data. Simple content filtering software can detect not only when employees are visiting inappropriate sites, but also detect if they delete or alter large amounts of data–all signs that something could be amiss. And finally, it’s worth a little bit of money to find a good employment attorney to help you craft various policies on using and accessing confidential information.

Posted in Articles | Tagged , , | Leave a comment

Can’t Stand The Thought Of Losing Your Smartphone’s Data?

(Then Here’s How You Back It Up)

Seems like just yesterday phones were simple devices for making and receiving phone calls. These days, smartphones are as functional as full-fledged desktop PCs and hold valuable applications, e-mail messages, photos, videos, documents and, of course, phone numbers and contact information. If losing the data on your phone would be a true disaster, then you’ll want to back up your phone as regularly and carefully as you do your other devices.

Major smartphone platforms can back up their data to a computer or to a cloud backup via the Internet. Here are a couple of resources you can use with popular Android smartphones to ensure that all of your data is properly backed up.

iPhone
iCloud is Apple’s new service for backing up your iPhone and other media you purchase through iTunes. When you sign up, iCloud will automatically backup the mail, calendar and contacts on your iPhone, as well as any music, books, apps, videos or media on your iPad, Mac or even your PC. iCloud uses the power of cloud computing to sync your devices automatically, so you don’t have to dock your device to keep things in sync.

Android
Start with the settings on your phone; go to “Settings > Privacy” on your phone and make sure the “Back up my settings” and “Automatic restore” options are checked. Next, go to “Settings > Accounts” and sync, open your Gmail account, and check off all options. With these settings in place, your contacts, system settings, apps, calendar, and e-mail will be restored whenever you set up a new Android phone with that same Gmail account. However, this is only a basic backup; it won’t save the photos and text messages on your phone.

For a more complete backup, you might try MyBackup Pro ($5 plus 50 MB online storage for free and $1 to $2 per month for more online storage). The program runs automated scheduled backups, supports a wide range of Android phones and will back up app install files that do not have copyright protections programmed into them. If your phone is rooted, you might consider Titanium Backup ($5.99 for Pro), which backs up all apps, all data associated with them and the Android Market links that show you’ve paid for them. It also saves most phone Pro versions and will integrate with Dropbox.

Posted in Articles | Tagged , , | Leave a comment

How To Clear The Internet Cache In Firefox 6

First of all, why should you even worry about clearing your cache? There are two main reasons:

Reason 1: It frees up space on your computer. After a while, the cache fills up and needs to be cleared so your Web browser will function most efficiently.

Reason 2: It will protect your privacy. This is especially true when several people use the same computer in a workplace or home. If you have privacy concerns, you should regularly clear your cache.

Now, here’s how you can do it:

  1. Open Mozilla Firefox 6.
  2. Click the Firefox button and then choose Options.
  3. With the Options window now open, click the Privacy tab.
  4. Please Note: If using the menu bar, choose Tools and then Clear Recent History. Skip to Step 5 below.
  5. In the History area, click the clear your recent history link.
  6. In the Clear Recent History window, set the Time range to Everything.
  7. In the list at the bottom of the window, unchecked everything except for Cache.
Posted in Articles | Tagged , , | Leave a comment

Who Else Wants To Win A $25 Gift Card?

Take my monthly “Trivia Challenge” and you could win too!

The Grand Prize Winner of last month’s Trivia Challenge Quiz is <>! He or she was the first person to correctly answer my quiz question from last month:

What is Halloween called in some parts of Ireland?
a) Fright Night b) Pooky Night c) Spooky Sundown

The correct answer is b) Pooky Night. Congratulations, << winner name >>, you’ve won a << $25 Gift Card >>!

Now, here’s this month’s trivia question. The winner will receive a gift card to << NAME OF STORE OR RESTAURANT >>

In addition to Thanksgiving and Veteran’s Day, what else takes place in November in the United States?

a) National Beard Month b) National Tobacco Awareness Month c) National World Kindness Day d) All of the above

Call me right now with your answer! XXX-XXX-XXXX

Posted in Articles | Tagged , , | Leave a comment

9 Steps You Must Know To Prevent A Server Crash

Here are a few simple things you can do to prevent your server and network equipment from overheating and crashing:

  1. Tidy up the server room; a neater room will increase air flow.
  2. If you have more than one server, arrange them in a row so that the cold air comes from the front and is expelled out the back.
  3. Keep the doors to the server room closed and seal off the space.
  4. Make sure cold air reaches all the equipment.
  5. Have a redundant A/C that is specifically designed for computers.
  6. Buy a rack enclosure where the cooling is built in to the bottom of the rack.
  7. Keep the temperature at no more than 77 degrees.
  8. Use blanking panels over any empty spaces on your server rack.
  9. Consider virtualization or hosting in a cloud environment so you are generating a lower amount of heat in the first place.
Posted in Articles | Tagged , , | Leave a comment

Positioning Yourself For Success

Power positioning is presenting yourself to the right person, at the right time and place, in the right way, with the right message. If you can do that all day long, every day, you will be an incredibly successful professional. This applies to most every profession. We’re always trying to sell something whether it’s a product, a service, an image—you name it.

What separates the real pros from the amateurs is their ability to make whatever they are providing of vital importance to every prospect.

Such positioning is not something you can achieve quickly, or once for all time. It’s a continuous process of discovering new ways to take charge of the way your clients and prospects see you.

The better you plan your strategy for positioning yourself, the more successful your efforts are going to be. There are, in fact, ten crucial factors to consider as you think through your own positioning strategies and tactics.

  1. You position yourself first in your own mind. The way you see yourself will shape the way others see you. The way you think about yourself determines how you do everything. It affects the way you prospect, the way you interview, the way you present, the way you close, the way you manage your time—it shapes everything you do. As a result, people will see you the way you perceive yourself.
  2. You position yourself with your attitude. Some people walk into a room and say, “Here I am!” Other people walk into a room and say, “Ah, there you are!” The difference is whether we are self-centered or client-centered…Whether we are ego-driven or value-driven. Our attitudes toward our clients and prospects will always show up in the way we treat people. And, more than any other single factor, the way we treat others will determine the way they respond to us.
  3. You position yourself with your appearance. First impressions get set in stone very quickly. And, like it or not, the way you look is the most important factor in shaping those first and lasting impressions. To do to see how vital good appearance is, all you have to do is reflect on your own reactions to the people you meet. Don’t you pay more attention to people who look important than you do to people who look sloppy? Most crucial, your prospects judge your importance by the way you look.
  4. You position yourself with your actions. Your prospects determine your importance, your intentions, your reliability—and many other critical factors—by watching everything you do.
  5. You position yourself with your words. Every word you say positions you either as a person to be considered important or as someone to be dismissed as quickly as possible.
  6. You position yourself with your focus. The most pressing question on your prospect’s mind is always, “What’s in it for me?” The real pros position themselves as consultants and business partners to their clients. They always keep the focus precisely where it belongs—on the client, not on themselves or their products.
  7. You position yourself with your presentation. The way you go about setting up and making your presentation says a lot to prospects about how important it is to listen to you.
  8. You position yourself by the way you handle objections. Amateurs see objections as excuses for not buying or as invitations to do battle. But real pros recognize that objections show a prospect’s legitimate concerns—issues which must be cleared up before the prospect will make a decision to buy.
  9. You position yourself by the way you close. The way you ask for an assignment can position you as a true professional with an offer which provides value for the prospect. Or the way you close can make it look like you’re an amateur who’s trying to get a prospect to do you a favor. The difference is tremendous.
  10. You position yourself with the way you follow-up. One of the most vital factors in positioning yourself as a professional is what you do once a sale has been made. Professionalism involves developing a long-term, mutually beneficial relationship with every client. It’s turning one-time customers into clients who view you as a valuable resource in your area of expertise.

What really counts is not what you know or believe, but what your prospects think and feel. You make them believe in you by positioning yourself as a professional.

Posted in Articles | Tagged , , | Leave a comment

If Disaster Strikes, How Fast Could You Be Back Up & Running?

You hear it all the time from us—back up your data, keep your virus protection current and install and maintain a firewall to protect yourself from hackers and other online threats. However, while these precautions will certainly help you avoid problems, they CAN’T do anything if you don’t have a good backup and disaster recovery plan in place.

Are You A Sitting Duck?

We all know that an ounce of prevention is worth a pound of cure; yet, disaster recovery planning often takes a distant second to the daily deadlines and pressures of running a business. That means that most businesses, including your own, may end up offline and without important data after a simple lightning storm.

Don’t think that could ever happen to you? Consider this: “data-erasing disasters” can also take the form of office fires and broken water pipes, not just earthquakes, floods and tornadoes. If a fire started in your building, the parts that weren’t burned beyond recovery would probably be destroyed by the firemen’s efforts. But even more common is software corruption, hardware failures and human error!

7 Disaster Recovery Questions You Need To Answer

A disaster recovery plan doesn’t have to be complicated, time-consuming or expensive. Start by asking yourself the following questions…

  1. Do you back up your company’s data daily to both an onsite and offsite location?
  2. Are you absolutely certain that your backup copy is valid, complete and not corrupt? How do you know for sure?
  3. If disaster strikes, HOW would you get your data back, and how long would it take? In many cases it takes days and often weeks; what would you do during that period of time?
  4. Do you have copies of all the software licenses and discs in a safe location that could be accessed in the event of having to rebuild your server?
  5. Would you and your employees have a way to access your network remotely if you couldn’t get to the office?
  6. Do you store important passwords in a secure place that company officers can access if you are unavailable?
  7. Do you have a UPS (uninterruptible power supply) device in place to keep your network and other critical data operations running during a power outage?

Call XXX-XXX-XXXX to schedule your Disaster Recovery Assessment so we can be sure you are ready BEFORE a disaster ever strikes.

Posted in Articles | Tagged , , | Leave a comment
  • Categories

  • Categories

  • Archives