Tech Talk – February 2019
A Note from the President
Two months of 2019 are gone, I feel like it was just New Year’s – time flies as they say! 40 years ago, LMS was founded and our main service was fixing imaging equipment in hospitals. This year, cloud takes center stage for us.
‘Cloud’ has been the hot phrase for years now, and LMS has been providing individual cloud technologies to our clients as part of our core services, targeted to a specific aspect of the business, such as email, backup, security, application, etc. With the advancements of cloud technology and security, our cloud offering is being strolled down on the red carpet (it is Oscars week).
LMS is introducing our “serverless office” campaign and we are ready and available to discuss this offering with you right now. We have built our cloud offering that our clients can access their data from any device, anytime and anywhere. Coupled with our increased focus on security in this growingly complicated world we live in, the combination of our “serverless office” and our security offerings is a winning one for any growing business.
This 40 year old company is super excited about the serverless office campaign! Going back in a time machine to our 1 year old company 40 years ago, we wouldn’t believe it’s even a possibility. Two months or 40 years, time flies. Take advantage of it!
Best,
Scott Shatzkamer
President
2019 cybersecurity trends
used with permission from HP Tech@Work
Lev, my newest grandson was born a few days ago. I have been alongside 15 of 16 babies being born to my family. My eight children and 7 of the 8 grandchildren. I missed one of them due to a hard choice I made a few years back.
Something special happened this time. Surrounded by both sides of our families, I had been able to be part of the most exciting part of life in a semidetached fashion. Maybe it was driven by experience, but I was able to focus on everyone else, their emotions, their happiness, their excitement. It felt like I was watching the definition of life unfold around me.
In a period of less than 30 seconds, they all cried, and smiled, hugged and kissed, and stared into each other’s eyes. Blended love, washed away fears, and connected touch just took over a dull white hallway outside the hospital maternity wing. It happened so fast, like a scripted movie, but it wasn’t. It was pure life at its best.
Cybersecurity for small business: Email authentication
used with permission from FTC.gov by Andrew Smith, Director, FTC Bureau of Consumer Protection
As a business person, you know about phishing, of course. At first glance, the email looks like it comes from a recognized company, complete with a familiar logo, slogan, and URL. But it’s really from a cyber crook trying to con consumers out of account numbers, passwords, or cash. In addition to the serious injury these scams inflict on consumers, there’s another victim of phishing: the reputable business whose good name was stolen by the scammer.
Fraudsters don’t just masquerade as global financial institutions or industry giants. They impersonate small businesses, too. But there is good news on the fraud-fighting front. There are steps you can take to make it harder for scammers to send phishing emails that look like they’re coming from your company. Tech types use the phrase “email authentication” to refer to tools that work behind the scenes to help a server verify that a message that says it’s from yourbusiness.com really is from you. Those tools also will block messages or send them to a quarantine folder if they bear the telltale signs of a phishing attempt.
When we sat down with small businesses to see how we can help your cybersecurity efforts, you asked for more information about email authentication. The FTC’s Cybersecurity for Small Business campaign features new resources designed to fill that need.
Keep your devices and data safe using these simple security best practices
used with permission from Windows Blog by Steve Clarke
They’re about as welcome as robot calls and junk mail — spam text messages.
Ransomware, botnets and phishing scams were at an all-time high in 2018 and attackers are taking every opportunity to steal data for their own gain. In 2018 alone, Microsoftfound that “More than 75 percent of phishing mails include malicious URLs to phishing sites. Other variations include malicious phishing attachments and links in attachments.” But there’s a lot you can do to protect yourself — including using the tips below and keeping proactive security features, like Windows 10 in S mode, Windows Defender Antivirus protection and auto-updates, turned on.
Our customers’ security is of the utmost importance to Microsoft and we’ve designed our solutions to enable productivity while providing a secure, streamlined experience.
Use Microsoft 365 to help protect your devices and data, and follow these easy best practices:
Beware of phishing scams. Don’t risk clicking on unfamiliar links, and carefully review notifications from banks to track potential damage to your accounts. Personalized emails that appear to be from a credit company can suggest an urgent need to act. If the email and link look the slightest bit suspicious, open a new window (don’t click the link), and go directly to the website or call the main phone number to check your status.