Author: Jon Isenberg

ELIJAH Digest | January 10, 2018

IN THE NEWS Internet of Things set for growth in 2019? January is an important month in technology history: the opening of the first underground railway service in London in 1863; in 1927, the first commercial transatlantic phone service was made available; the ordering of the development of a space shuttle program by President Nixon in 1972; and the unveiling of Mac OS X in 2000. In January 2019, the Internet of Things seems poised to really take off (“IoT”). IoT, as defined by Wikipedia, “is the network of devices such as vehicles and home appliances that contain electronics, software, actuators, and connectivity which allows these things to connect, interact and exchange data. Embedded with technology, these devices can communicate and interact over the Internet, and they can be remotely monitored and controlled.” The most common IoT device is your Smartphone. Other examples include wireless thermostats, doorbell cameras, smart watches,… Read more »

ELIJAH Digest | December 13, 2018

IN THE NEWS Data & Email Management How do you communicate with your co-workers and clients that you will be out of the office? Do you take the same care in drafting your out-of-office message that you do with drafting your emails? Here are some of the messages that we have recently received from clients that are out on vacation or traveling for business: “I am out of the office on vacation. Thanks, (name)” “I am out until the 20th.” “I am out of the office with limited access to email and voicemail. My response may be delayed.” “Thank you for your email. I am currently out of the office.” “I am out of the office. I will respond to you upon my return. Thanks.” While it is clear that the person is out of the office, there is not much more being conveyed. For example, items 1, 3, 4,… Read more »

Elijah Digest – November 29, 2018

IN THE NEWS Manage Your IT – Time to plan for the demise of Windows 7 On January 14, 2020, Microsoft will stop supporting one of the world’s favorite operating systems, Windows 7. That’s 415 days from today. On that date, Microsoft will no longer issue security patches or fix flaws and bugs. You can still run the Windows 7 operating system – but be at your own risk. Here are some answers to the most commonly asked questions. Why talk about this now? As you start to plan your budget for 2019, consider factoring in the cost of upgrading or replacing any desktops or laptops running Windows 7. These upgrades and replacements should be rolling several months in advance to transition smoothly and avoid any down time or costly interruptions. Do I really need to take action? When Microsoft ended support for the Windows XP operating system in 2014,… Read more »

Elijah Digest – November 15, 2018

IN THE NEWS Data Breach – What Would You Do If You Received An Email Like This? Imagine receiving an email from yourself telling you that the sender is really a computer hacker that has taken possession of your computer and knows everything about you: your passwords, what websites you go to, and other things that you would prefer to keep private. And, if that’s not bad enough, the hacker now wants money to go away. Would this scare you? It did for one of our clients. Both the CEO & COO received the following email within hours of each other: If you received this email, what would you do? Should you pay the hacker? In most circumstances, the short answer is NO. This particular email was simply a scare tactic to convince them to pay. The prevailing belief is that if you pay them once, you will pay them… Read more »

Elijah Digest – November 1, 2018

IN THE NEWS Better Data Security: Don’t Be Tricked By A Phishing Email Every day we get hundreds of emails. Every day, we are pressed for time to get our work done. Every day, we open emails with attachments, sometimes without even thinking. For many, it is simply now a reflex. But, we must be vigilant and cautious of what messages we read. There are hackers and cyber thieves we need to be on guard for. Hackers and other criminals are getting better at trying to gain access to our private information through the use of Phishing email. Phishing is an email that appears to be from a legitimate company asking you to provide sensitive information. This is usually done by a link in an email message that will take you to the company’s website to fill in your information. But, the “company’s website” is actually an image of the… Read more »

Elijah Digest – October 18, 2018

IN THE NEWS October 2018 Is Cybersecurity Awareness Month National Cybersecurity Awareness Month is commemorating its 15th year as an annual initiative to raise awareness about the importance of cybersecurity. NCSAM 2018 is a collaborative effort between government and industry to ensure every American has the resources they need to stay safer and more secure online, while increasing the resiliency of the Nation during cyber-threats. Most of us have heard the term Cybersecurity, but what does it mean? Cybersecurity is defined as the protection of internet-connected systems, including hardware, software and data, from cyberattacks. This is comprised of both physical security and application security. One of the most challenging elements of cybersecurity, is the continuous evolving nature of security risks. Historically, we have been reactive to events that have occurred, such as the 2018 attack on Under Armour’s MyFitnessPal application in late February. This cyberattack compromised usernames, email addresses and… Read more »

Elijah Digest – October 04, 2018

IN THE NEWS Latest website cybersecurity attack affecting over 50 million users: Facebook On Friday, September 27, 2018, the website was hacked due to an application vulnerability. Approximately 2.5% of Facebook’s more than 2 Billion monthly active users were affected. This equates to over 50 million people. Facebook says that the attackers could see everything in the victim’s profile. Facebook isn’t alone as many sites were attacked by hackers in 2018. This list includes British Airways, Orbitz, and Under Armour. Complete list can be found at: Do you think that your website isn’t vulnerable? So, let’s ask a question. Is it True or False: Cyber Hackers only access large websites. Answer: False. Even a small website can generate a substantial amount of money Cybercriminals and web hackers can make money with your compromised website by distributing malware, spam and can set up e-mail spam servers and phishing sites.… Read more »

Elijah Digest – September 20, 2018

IN THE NEWS Employee Data Theft As employers, we usually train then share our company secrets and documentation with our employees. We also inform our employees that regardless of where the Documentation and Intellectual Property is stored – on computers, tablets, smart phones, etc. – this information and data belongs to the company and that it needs to be safeguarded. Despite this, roughly two thirds of all departing employees take company data when they leave. When an employee that quits, gets fired, or otherwise leaves, AND keeps company data, it is called Employee Data Theft and is often the subject of law suits and violations of law. In their final days, employees can often deliberately or inadvertently retain possession of client lists, trade secrets, and other important information. Some employees are predictably more likely to engage in fraud, embezzlement and other types of misconduct. Disgruntled employees, who may not be… Read more »

Elijah Digest – September 06, 2018

IN THE NEWS Wi-Fi Security: What you don’t know can harm you. Did you know that on this date in history, September 6th, several events happened that changed the course of history? For example, in 1901, President William McKinley is shot; in 1995 Cal Ripkin, Jr. breaks the record for consecutive baseball games played with 2,131 breaking Lou Gehrig’s record; in 1997 some 2.5 billion TV viewers watch Princess Diana’s funeral and Elton John performs a rewritten “Candle in the Wind” at the same funeral. Did you also know that data theft by hackers continues to get worse every day and that your data and possibly your identity may be compromised? Of the different ways hackers can gain access to your data, Ransomware may be the worst. Ransomware is where the virus attacks computers and demands that a ransom be paid else your data will be stolen and/or deleted. The… Read more »

Elijah Digest – August 23, 2018

IN THE NEWS Email: Be careful what you click on What method of communication is used more than talking or texting? Electronic mail (or email). Statistics show that there are about 124.5 billion business emails sent and received per day. So, with so much email, how do we know if the messages we receive are actually legitimate? Did you know that the first email system was developed in 1971? Did you know that the average office worker receives 121 emails and sends out 40? Did you know that 86% of professionals name email as their favorite mode of communication? Did you know that 49.7% of all mail is considered spam? Did you know that 2.3% of emails have a malicious attachment? So, how do we determine what is a good attachment or a malicious attachment? Fake emails may contain a malicious attachment that can be used for Phishing, which is… Read more »