March 2014
In this issue
:
 
Learn About the Cryptolocker Virus
Clean out your inbox with improved Sweep and Search
Windows XP: Time is running out, are you ready?
Maslow and Malware: Developing a Hierarchy of Needs for Cybersecurity
Business Continuity Tip
Cartoon and Quote
Business
Continuity Tip

Mobile Cybercrime

With the recent uptick of in-store data-breaches, it's important to also remember the vulnerabilities associated with mobile devices, and social media platforms.


According to Nortonís Cybercrime Report, 1 in 4 adults have been a victim of mobile and social cybercrime. So what can we do to protect our mobile devices and guard our personal information?

♦ Regularly update your operating system for security patches.
♦ When you enter a website (especially financial) make sure that "https" appears in the address bar, which means connection is secure.
♦Turn the Bluetooth function off after using it. It is another way unknown applications or viruses can access your cell phone.
♦ Know how to perform a remote wipe to remove data from your device if lost or stolen.

Quote for Today


Clear thinking requires courage
rather than intelligence.

Thomas Szasz


Just for Laughs


 
Learn About the Cryptolocker Virus
 

Clean out your inbox with improved Sweep
and Search

used with permission from Microsoft
by Mike Schackwitz

 
If youíre like the average Outlook.com customer, youíll receive over 10,000 personal emails over the next 12 months, and 80% of that will be the newsletters, offers and updates that often clutter your inbox. Thatís a lot of email to deal with. Itís why the Outlook.com team spends much of our energy on giving you tools that make it easy to get to the email you care about. We hear from a lot of you that you love the tools weíve built, like Sweep, that help address a lot of the commercial email. But we also hear, even among the savviest customers, that there are still a few tools and advanced features you havenít tried.

Read more

Windows XP: Time is running out, are you ready?
used with the permission of HTS
 

One of the most popular and longest lived Microsoft operating systems that we all know and love, Windows XP, has almost run its course. The clock is ticking... And on April 8, 2014, Windows XP will officially be ďdeadĒ, with no more extended support, andómore importantlyóno more security patches. Hopefully, this news does not come as a surprise, as Microsoft has foretold the fate of XP since its release back in 2001.

Microsoft will no longer support Windows XP and Small Business Server 2003 so itís time to make the change to ensure you remain on supported versions of Windows and Office.

What does this mean for you?

Read more


Maslow and Malware: Developing a Hierarchy of Needs for Cybersecurity
used with permission from the Microsoft Security Blog

 

The pervasive use of computing and the Internet means that cybersecurity is now a major concern for organizations around the world. In response, decision makers are developing plans that seek to ensure key assets, systems and networks remain protected in this new environment, while preserving the benefits that come with broad connectivity. However, these approaches vary considerably, according to the different needs and stages of development of individual countries.

To explore the question of how different countries think about using cybersecurity, we recently partnered with Oxford-Analytica to develop a report that looks at how they can seek to maximize the benefits of the Internet by matching their cybersecurity priorities to the needs of their citizens.

Read more


    

Idealogical Systems Inc.
2900 John St.- Suite 400 |  Markham, ON  |  L3R 5G3  |  416-410-5030  |  www.idealogical.com