Avoiding Coronavirus Phishing Scams

As concern increases regarding the coronavirus outbreak, the bad guys are increasing their efforts to part you with your data and/or money. The following article from Consumer Reports does a good job in describing these scams and providing tips:  https://www.consumerreports.org/phishing-vishing/how-to-avoid-coronavirus-phishing-scams/With this said, let’s also review some of the main tips in avoiding a phishing attack: If you are ever...

“There is nothing more deceptive than an obvious [FAX].”

Sir Arthur Conan Doyle actually said “There is nothing more deceptive than an obvious fact.” in one of his Sherlock Holmes stories. In other words, perceived facts can be misleading, and we shouldn’t believe everything we see without thinking it through.This quote is certainly true when it comes to phishing attempts. Bad guys are counting on users acting without thinking. With this said, we are seeing numerous “fax-based” scams which have...

Windows 7 – R.I.P.

Yesterday (1/14/2020) was the last day of Windows 7’s illustrious life. We bid farewell to an operating system that will be missed and was beloved by those who knew it. It had a long life of 10 years and we will cherish the memories.   As previously mentioned, NetAscendant is assisting our customers in upgrading/replacing their existing Windows 7 business machines but strongly recommends that users take immediate action on any home machi...

What’s Hot in Phishing?

To clarify upfront, this is not an article on the hottest bass lakes in Texas or what color crankbait is hauling in the lunkers. The fishermen in the audience may have quit reading, but we wanted to take a few minutes to talk about the phishing attacks that we are seeing the most. The two most common at the current time are the gift card scam and the voicemail scam. Please see the following for a refresher on these two surprisingly effective c...

‘Tis the Season … for Scammers

During the 2018 holiday season, U.S. shoppers spent a whopping $126 Billion on online shopping. In addition, charitable giving greatly increases over the holiday season. Since all of these dollars attract cybercriminals like bees to honey, be extra cautious and adhere to the following tips: • Avoid clicking on links in unsolicited emails and be wary of email attachments. • Do not enter your email address and email/network password online as 99% ...

Windows 7 – End of an Era

Coming on the heels of the misfire that was Windows Vista, Microsoft really needed to score with their next operating system. Well, Windows 7 scored in a big way when introduced 10 years ago. The extremely popular operating system was a hit with users but will now go end-of-life on January 14th, 2020. This retirement means that existing instances of Windows 7 will no longer receive security and feature updates, making it more vulnerable t...

Internet Security – Common Misconceptions

Many misconceptions exist about what constitutes “safety” on the Internet, but don’t believe everything you hear. The bad guys are always looking for an angle, so we cannot become complacent and must always remain vigilant.  With this said, please review these common Internet safety myths: If I see the lock icon, I am safe.Just because you see the lock icon in your browser, do not assume that your connection is secure. Yes, ...

Time to Study – Back-To-School Scams

We are all familiar with the expenses incurred when our kids go back to school, and we all are interested in “good deals”. Well, scammers are aware of this as well and are always looking to part you from your money. Webroot (a leading antivirus provider) provides the following tips to consider in order to avoid these scams: SMS Giveaways and Freebies Congratulations! You’ve just received a text message ...

Microsoft Outlook Tips

Microsoft Outlook is one of the most used email clients on the planet. It has been around since the 90’s and has evolved to the point to where it is one of the most important business tools that we all use. To get the most out of this vital application, please see the following tips: Utilize a signature line:In an email on the Message tab, select “Signature -> Signatures”. Select New to create your signature. Feel free to add graphics...

The Danger of Digital Clutter

We all have some degree of clutter in our lives. Whether we are talking about untouched, dust-covered boxes sitting in the garage, stacks of documents and mail strewn about the house, or clothes that you will absolutely never wear again. In the 21st century, we also have tons of “cyber clutter” such as unused email/social media accounts, old computers or devices, obsolete hard/flash drives, or antiquated documents to name a few. The problem with...