By LMS January 30, 2019

Tech Talk – January 2019

A Note from the President

You are going to hear a common theme from me this year, and as much as it should be about cybersecurity (which will be the 2nd theme), it’s going to be the number 40. Yes, it’s January 2019, and LMS is celebrating its 40th year of business! In the technology industry, turning 40 is an unbelievable accomplishment, an accomplishment we greatly owe to our staff (everyone that played a part) and our clients. We have always had a special team of engineers and managers and our clients are simply the greatest! We thank each and every one!

As we turn 40, we continue to grow, we continue to provide world class support and security to our clients, we continue to provide unparalleled response time, and continue to be available 24/7. Like a fine wine, or Tom Brady (who continues to amaze at a young 41), LMS is just getting better with age.

We’ll be celebrating our 40th anniversary all year and invite you to join in on the festivities by reaching out to us and speaking to me about your IT/Cybersecurity needs, concerns, thoughts, etc. I look forward to speaking with you!

Our Founder and CEO wrote a blog this week below titled “The Birth of Lev, Number 8”, please be sure to click the link in the text to read his entire blog.

Best,

Scott Shatzkamer
President

The Birth of Lev, Number 8.

by Larry Schulman, CEO

Lev, my newest grandson was born a few days ago. I have been alongside 15 of 16 babies being born to my family. My eight children and 7 of the 8 grandchildren. I missed one of them due to a hard choice I made a few years back.

Something special happened this time. Surrounded by both sides of our families, I had been able to be part of the most exciting part of life in a semidetached fashion. Maybe it was driven by experience, but I was able to focus on everyone else, their emotions, their happiness, their excitement. It felt like I was watching the definition of life unfold around me.

In a period of less than 30 seconds, they all cried, and smiled, hugged and kissed, and stared into each other’s eyes. Blended love, washed away fears, and connected touch just took over a dull white hallway outside the hospital maternity wing. It happened so fast, like a scripted movie, but it wasn’t. It was pure life at its best.

Read more

3 steps to take immediately if your phone is stolen or lost

used with permission from Norton by Symantec

The loss or theft of a phone can be very upsetting. After all, you have a lot of important information on that device. But if you take the right steps the moment you realize it’s gone, you may be able to minimize the pain.

What to do if your smartphone is stolen or irretrievably lost

If you’ve determined that your phone isn’t just temporarily misplaced, it’s wise to take more advanced steps to protect your information and identity.

1. Report the loss to your cell phone carrier immediately

Your carrier can suspend or disconnect service to your missing phone, in order to avoid unauthorized cellular usage. You should call your carrier if possible, but if you do not have access to a phone, you may also be able to report it on their website by logging into your account.

Read more

Dealing with spam text messages and unwanted calls

used with permission from Norton by Symantec

They’re about as welcome as robot calls and junk mail — spam text messages.

They show up as unwanted and unexpected text messages on our phone screens. That’s aggravating enough, but it gets worse. Whoever is sending you a spam text message is usually trying to defraud you.

Most spam text messages aren’t coming from another phone. They’re usually originating from a computer and being delivered to your phone — at no cost to the sender — via an email address or an instant messaging account.

Don’t despair. There are steps you can take to reduce unwanted text messages and help prevent them from showing up on your phone and other mobile devices.

Spam text messages dos and don’ts

Read more

Check email header information for signs of spoofing

Think about this scenario: A friend tells you that they received a message from your email address that wasn’t really sent from you. They think you’ve been hacked and your account is sending malicious emails to friends. How do you know if your email address account has been compromised, or if this malicious attempt is just spoofing your email address?

Email “spoofing” means that an attacker is impersonating you by pretending to send an email from your account. The recipient of the email will see your email… but if you dig deeper into the email message’s contents, you can often see whether the email was truly sent from your account or only made to appear so.

Read more