Whoelseissickofspam?,p1
How often do you need to Train Employees on Cybersecurity Awareness?, p2
Are you blacklisting or whitelisting?, p3
Get more unplugged laptop time with these battery-saving hacks, p4 5 ways Microsoft 365 can enable the hybrid office, p5 Summer Sports VS Scams, p6
TEKNOLOGY INSIDER
2022 AUGUST VOLUME 20
WHOELSEISSICKOF SPAM?
We have a new address!
See page 8 for more details
For business owners, spam is bad news.
Not only is it annoying, but it’s also eating up hours of your team’s time each year. In fact, it’s estimated that people who get more than a hundred emails every day could be losing arou 80 hours of their time each year, sorting out spam.
As well as the impact on productivity, have you considered how else it might be harming your business?
For example, how many of the emails that you send out – especially your marketing messages are being marked as spam?
Spam filters give each email a score based on t sender reputation, domain name and many other factors. They also read the emails to spot common words and phrases used by spammers.
Using one “spammy” word in an email isn’t a disaster in itself. But using too many can give you a higher spam score, and your message could be filtered into the spam folder
Villain of the month, p7 Staff Highlight, p8 Elon Musk is about to demonstrate a household robot, p9 Faxing Made Simple, p10 Entertainment, p11 Featured CustomerA family-owned, full service accounting & tax business operating in Ottawa, Ontario since 2017, p12
POPULAR SMISHING SCAMS
‘being a member’, ‘free trial’, ‘unlimited’, and even ‘amazing’
Next time you’re creating a marketing email, take a moment to consider how spammy your email could be perceived before you hit send. Staying out of the spam folder improves deliverability and open rates.
1 CapitalTek Teknology Insider 613-227-HELP (4357) help@capitaltek ca capitaltek ca YOUR MONTHLY NEWSLETTER, WRITTEN FOR HUMANS, NOT GEEKS
TOOLS AND SOFTWARE
DIGITAL INTEREST
HOW OFTEN DO YOU NEED TO TRAIN EMPLOYEES ON CYBERSECURITY AWARENESS?
You’vejustcompletedyourannualphishing trainingwhereyouteachemployeeshowtospot phishingemails.You’refeelinggoodaboutit,until about5-6monthslaterwhenyourcompany suffersacostlyransomwareinfectionbecause someoneclickedonaphishinglink
Youwonderwhyyouseemtoneedtotrainonthe sameinformationeveryyear,andyetstillsuffer fromsecurityincidents.Theproblemisthatyou’re nottrainingyouremployeesoftenenough
Peoplecan’tchangebehaviorsiftrainingisn’t reinforcedregularly.Theycanalsoeasilyforget whatthey’velearnedafterseveralmonthsgoby.
So,howoftenisoftenenoughtoimproveyour team’scybersecurityawarenessandcyber hygiene?Itturnsoutthattrainingeveryfour monthsisthe“sweetspot”whenitcomesto seeingconsistentresultsinyourITsecurity.
WhyIsCybersecurityAwarenessTrainingEach 4-MonthsRecommended?
TherewasastudypresentedattheUSENIXSOUPS securityconferencethatlookedatusers’abilityto detectphishingemailsversushowoftentheywere trainedonphishingawarenessandITsecurity. Employeesweretestedatseveraldifferenttime increments:
4-months
6-months
8-months 10-months 12-months
Itwasfoundthatfourmonthsaftertheirtraining, theywerestillabletoaccuratelyidentifyand avoidclickingonphishingemails.
However,after6months,theirscoresstartedto getworse.Thentheycontinuedtodeclinefurther
themoremonthsthatpassedaftertheirinitial training.
So,tokeepemployeeswellpreparedtoactasa positiveagentsinyouroverallcybersecuritystrategy, it’simportanttheygettrainingandrefreshers regularly.
TipsonWhat&HowtoTrainEmployeesto DevelopaCybersecureCulture
Thegoldstandardforemployeesecurityawareness trainingistodevelopacybersecureculture.Thisis onewhereeveryoneiscognizantoftheneedto protectsensitivedata,avoidphishingscams,and keeppasswordssecured.
Unfortunately,thisisnotthecaseinmost organizations.Accordingtothe2021SophosThreat Report,oneofthebiggestthreatstonetwork securityisalackofgoodsecurityknowledgeand practices.
Thereportstates,“Alackofattentiontooneor moreaspectsofbasicsecurityhygienehasbeen foundtobeattherootcauseofmanyofthemost damagingattackswe’veinvestigated.”
Well-trainedemployeessignificantlyreducea company’sriskoffallingvictimtoanynumberof differentonlineattacks.
Tobewell-traineddoesn’tmeanyouhavetoconduct alongdayofcybersecuritytrainingeveryfour months It’sbettertomixupthedeliverymethods
Herearesomeexamplesofengagingwaystotrain employeesncybersecuritythatyoucanincludein yourtrainingplan:
Self-servicevideosthatgetemailedonceper month
Team-basedroundtablediscussions Security“TipoftheWeek”incompany newslettersormessagingchannels
(Continued on next page)
2 CapitalTek Teknology Insider 613-227-HELP (4357) help@capitaltek ca capitaltek ca NEWS | MAIN STORIES
(Continued from page 2 )
Training session given by an IT professional
Simulated phishing tests
Cybersecurity posters
Celebrate Cybersecurity Awareness Month in October
When conducting training, phishing is a big topic to cover, but it’s not the only one. Here are some important topics that you want to include in your mix of awareness training.
ARE YOU BLACKLISTING OR WHITELISTING?
Youknowwhatitmeanstobe blacklisted,right?(wedon’t meanthroughpersonal experience,ofcourse).
Blacklisting is where you block something you don’t trust. It’s used to keep networks and devices safe from bad software and cyber criminals
But there’s another, safer way of doing that – and that’s called whitelisting.
Rather than trying to spot and block threats, you assume everyone and everything is a threat, unless they’ve been whitelisted.
But which is the right approach when it comes to keeping your business data safe? This debate rages on, with many IT professionals holding different views
Here are the main differences…
Blacklisting blocks access to suspicious or malicious entities
Whitelisting allows access only to approved entities
Blacklisting’s default is to allow access
Whitelisting’s default is to block access
Blacklisting is threat-centric Whitelisting is trust-centric here are pros and cons to each approach. Whilst blacklisting is a simple, low maintenance approach, it will never be comprehensive as new threats emerge daily It’s also easy to miss a threat, as cyber criminals design software to evade blacklist tools.
Whitelisting takes a stricter approach and therefore comes with a lower risk of access. But it’s more complex to implement and needs more input. It’s also more restrictive for people using the network and devices.
Confused? You’re not alone! If you’d like to discuss which approach is best for your business, get in touch.
3 CapitalTek Teknology Insider 613-227-HELP (4357) help@capitaltek ca capitaltek ca NEWS | CONTINUATION OF MAIN STORIES
HOME SECURITY: WHY YOU SHOULD PUT IOT DEVICES ON A GUEST WI-FI NETWORK
The number of internetconnected devices in homes has been growing exponentially over the last decade. A typical home now has more than 10 devices connected to the internet.
IoT stands for Internet of Things, and it basically means any other type of “smart device” that connects online besides computers and mobile devices.
Here are two alarming statistics that illustrate the issue with IoT security:
During the first six months of 2021, the number of IoT cyberattacks was up by 135% over the prior year.
Over 25% of all cyberattacks against businesses involve IoT devices
Hackers Use IoT Devices to Get to Computers & Smartphones
Smart devices are a risk to any other device on a network because they are typically easier to breach, so hackers will use them as a gateway into more sensitive devices, like a work computer.
ImproveSecuritybyPuttingIoT onaSeparateWi-FiNetwork
Just about all modern routers will have the ability to set up a second Wi-Fi network, called a “guest network.”
By putting all your IoT devices on a separate guest network from your devices that hold sensitive information, you eliminate that bridge that hackers use to go from an IoT device to another device on the same network.
Just make sure that you secure your Guest Network with a strong passphrase.
NeedHelpUpgradingYour HomeCybersecurity?
With so many remote workers, hackers have begun targeting home networks because they can target your sensitive business and personal data in a typically less secure environment than they would face in a business setting.
POPULAR SMISHING SCAMS TO WATCH OUT FOR
Smishing is a form of phishing that uses text messages (as opposed to emails) to trick unknowing recipients into clicking a malicious link or otherwise “mining” personal information through their replies. They became a particularly popular method of attack during the COVID-19 pandemic and preyed on peoples fear and easy spread of misinformation
Some popular methods include:
Text Messages Being Sent to You That Spoof Your Own Number
Problem With a Delivery
Fake Appointment Scheduling
Offer of a Free Gift
Security issue with your account (often impersonates Netflix or Amazon)
GET MORE UNPLUGGED LAPTOP TIME WITH THESE BATTERYSAVING HACKS
Laptops today boast ridiculously powerful batteries, a far-cry from the roughly 2-3 hours we used to get. Most Apple laptops nowadays can easily provide up to 12 hours of batter life.
(Continued on next page)
NEWS | FINISH OF MAIN STORIES
4 CapitalTek Teknology Insider 613-227-HELP (4357) help@capitaltek ca capitaltek ca
(Continued from page 4 )
So, if you’re laptop battery doesn’t seem to get you past a few hours of use, try the following tips:
Lower the Display Brightness
Reduce PC Battery Use in Power/Sleep Settings
Enable Battery-Saver Mode
Use the Manufacturer’s Battery Calibration Tool
5 WAYS MICROSOFT 365 CAN ENABLE THE HYBRID OFFICE
“Hybrid office” has become more than a buzzword It is now the reality for many companies.
63% of high-growth companies utilize a “productivity anywhere” hybrid work approach.
Here are some of the ways you can use Microsoft 365 to optimize a productive hybrid office:
Microsoft Teams & Expanded Features
Webinar Registrations
Full VoIP phone system
New Meeting Options for RSVP in Outlook
RSVP in person or virtually
Better Framing for More Engaging Meetings
The ability to adjust
the room view to see faces clearer
An upcoming technology called Cameo will integrate seamlessly with Teams and allow you to appear alongside your presentation
Use Microsoft Edge Browser on PC or Safari on Apple for their Efficiency Settings
Turn Off Unnecessary Apps Don’t Expose Your Laptop to Extreme Temperatures
Speaker Coach
Personalized feedback on how to improve your presentations
TECHNOLOGY | TOOLS FOR YOUR BUSINESS 5 CapitalTek Teknology Insider 613-227-HELP (4357) help@capitaltek ca capitaltek ca
Using PowerPoint to Present
CYBERSECURITY | PROTECT YOURSELF
SUMMER SPORTS SCAMS VS
This summer, sports fans should remain cyberaware throughout the season, but especially during big games or important matches. Scammers know that these events get the most traction, and they monopolize on current events to trick the public.
TICKET TICKET SSCAMS CAMS
Scammers have drafted online ads selling tickets to live sporting events. Once a fan has finalized the purchase, they receive an e-ticket with bogus barcodes, while their credit card information is now with the scammer.
STREAMING STREAMING SSCAMS CAMS
Scammers have drafted online ads selling tickets to live sporting events. Once a fan has finalized the purchase, they receive an e-ticket with bogus barcodes, while their credit card information is now with the scammer.
Typically, highly publicized and international events are a scammer's playing ground. When it comes to summer sporting events (and events throughout the rest of the year), keep your eye on the ball, and follow these tips:
BETTING BETTING SSCAMS CAMS
Phishing emails and fake websites that offer betting opportunities or contests can also be a part of sport scams. Fans are often tricked into offering up their personal information with the lure of winning big.
CapitalTek Teknology Insider 613-227-HELP (4357) help@capitaltek ca capitaltek ca
6
Double check the authenticity of a website before offering up PII. Stick
Verify the legitimacy of too-goodto-be- true opportunities.
to official online vendors, or buy tickets in person at the venue.
VILLAIN OF THE MONTH
Each month we highlight a scam that demonstrates tactics criminals are using RIGHT NOW, that way you'll be better prepared when the next scam hits.
Georgia was planning to move to a new city for her job, and so she started the search for a rental. Every day she checked top housing websites, keeping her eye out for the perfect one. To her dismay, there wasn't much that her budget could afford in the area, but she kept looking. Until, she found it! A cute one bedroom with a park view. The price was listed well below other rentals in the area, but the Agent would be able to show her the property within the week (for a small fee). The owner was out of the country on business and so they did not want a lot of people in and out of the house unless they were serious. Before Georgia could respond to the Agent's outreach with potential times to view the property, they replied that the week had already booked up with viewings. The Agent said the location wouldn't last long with it's low price, and recommended that Georgia skip the formalities and sign the lease, directly wiring the deposit to the owner, so that should could lock in the space.
DID YOU SPOT THE RED FLAGS?
Therentalwasmuchlowerinpricethanthatoftheother propertiesinthearea.
Georgiawasrequestedtopayforaviewing,whichisnot atypicalpracticeofviewingrentalproperties.
TheAgentusedhigh-pressuretacticstourgeGeorgiainto placingadepositquickly.
Even legitimate housing websites can be host to fraudulent homes and rentals. Should you encounter such a scam, be sure to report it to the website or app where the post was listed.
Wiring money is essentially the same as sending cash. Once it's sent, it's gone. If you wouldn't feel comfortable sending cash for something like a deposit, think twice before agreeing to wire money.
Scammers typically like to stay on-trend. And since summer is peak moving season for those considering a change in residence, use caution when looking into properties during these warmer months, or when searching around areas that have seen a lot of recent growth or an increaseinpopulation.
CYBERSECURITY | PROTECT YOURSELF
Staff highlight: Rica Salonga
Rica holds a bachelor’s degree from an all-girls university where she majored in Computer Science and Paleontology
She joined Capitaltek three and a half years ago as an Administrative Assistant to the General Manager. Throughout the year of working with Sergey, she developed skills in email migration, website updates, and basic computer troubleshooting.
Being promoted as a general manager, she is now responsible for recognizing employees’ talent and potential so that they can provide adequate training to help her team develop their skills.
Rica has always shown initiative in performing her duties. She even went on to ensure that the team delivers the expected outputs before the deadline. Rica is a powerful force in the workplace and uses her positive attitude and tireless energy to encourage others to work hard and succeed.
When not busy working, Rica can be found strolling around the city with her Persian cats Tilda and Freya
It's her Birthday month and we wish your everyday would be filled with happiness, good health, and a momentous year ahead!
General Manager
rica@capitaltek.ca
MEDIA & ARTS | UPCOMING WEBINAR Wehavea Wehavea newaddress! newaddress! HAPPY TO ANNOUNCE 301 Moodie Dr, Unit 109 Ottawa, ON K2H 9C4 CapitalTek Teknology Insider 613-227-HELP (4357) help@capitaltek ca capitaltek ca
8
Hit send too soon in Outlook?
We’ve all accidentally sent an email before it was ready. Or sent it to the wrong person
And while Outlook’s recall is a
TECH FACTS
popular feature, historically it hasn’t always worked. It was only reliable if the recipient used Outlook too.
Great news. An update due for release next month will make
As people become more suspicious of technology, new phobias develop. Technophobia is the fear of technology and cyberphobia is the fear of computers
Want to know how old you were when the internet was born? Visit www.howoldistheinter.net
In the 1950s, computers were called ‘Electronic Brains’. Shall we stick with ‘computer’?
email recall work regardless of here the recipient gets their email.
INSPIRATIONAL QUOTE INSPIRATIONAL QUOTE OF THE OF THE MONTH MONTH
The humanoid Optimus robot (aka the Tesla Bot) will be able to take on the repetitive and dangerous tasks that people hate. It’ll be 5’8” tall, will carry up to 45lbs and walk at 5mph
Soundslikeagood shoppingcompanion...
Elon’s shifted his planned AI day from later this month to the end of September. He hopes to have a working prototype ready to show us.
Which househ tasks w you han to a Tes Could y use for workpla
TECHNOLOGY UPDATE | MICROSOFT 365 NEW TO MICROSOFT 365 9 CapitalTek Teknology Insider 613-227-HELP (4357) help@capitaltek ca capitaltek ca
NOT JUST CONTENT TO FILL OUR ROADS WITH HIS ELECTRIC VEHICLES, NOW TESLA’S ELON MUSK IS ABOUT TO DEMONSTRATE A HOUSEHOLD ROBOT.
“Technology will never replace great teachers but technology in the hands of great teachers is transformational.”
George Couras, Innovative Teaching, Learning, and Leadership Consultant
Digital Fax – Faxing Made Simple
No doubt, a fax machine is an outdated technology, but unfortunately, many individuals and businesses still use it. Faxing is still relevant, but fax machines are not. However, business owners need to make the switch from old analog fax machines to digital fax. Here, we’ll discuss how to transition from traditional faxing machines to electronica fax. Moreover, we’ll share some of the many benefits of online fax as well. So, let’s start.
Why
Should Businesses Switch
from Faxing Machines to Digital Fax?
Some industries like real estate,
insurance, law, and healthcare still rely on old fax machines. No doubt, it’s an outdated tool for communication, but professionals still prefer it for sharing confidential documents like binding signatures. Nowadays, the internet is available for everyone, and people are moving rapidly to mobile platforms. Therefore, standing over a physical fax machine doesn’t look like a good idea. In contrast, online faxing provides instant results and offers plenty of benefits over traditional faxing.
5 Benefits of Online Fax
Saves Time and Money
Keeps Your Documents organized
Environmentally Friendly Saves Space
Better Security
Read more here:
OUR OFFER | SERVICE HIGHLIGHT CapitalTek Teknology Insider 613-227-HELP (4357) help@capitaltek ca capitaltek ca
10
The Funnies
1. 2 3. 4 5
How many programming languages are currently in use?
What’s the name of a website designed just to be used for sharing information inside a company?
Which mobile operating system does Google control?
What does PDF stand for?
What is a computer trojan a form of?
The answers are below
Q&As
Q: What’s an insider threat?
A: It’s the name for when someone within your business gives cyber criminals access to your devices or network Usually, it’s not malicious But it’s why regularly training your team in cyber security is a must
Q: How do I choose the right backup for my data?
5) Malware
4) Portable Document Format
3) Android
2) An intranet
1) It’s really hard to say. Wikipedia has a list of about 700. But some programmers claim there are up to 9,000 languages in active use
A: Security and reliability should be your main considerations. Get in touch and we’ll tell you what we recommend.
Technology Vocab
ACROSS
2. A machine you can use to write, connect to the internet and play games
4. The service the brings internet service to your computer or phone
6. A short letter sent by phone
8. A place on the internet which gives you information
9. Some computers, tablets and phones have this type of screen 12. A fun way to spend time
DOWN
1 A phone you can carry about with you
3. A small tool which you can use to move your pointer on the computer screen, or a small rodent.
5 You use this apparatus to write on a computer
7. A computer you can easily carry
10 The part of a computer or phone that allows you to see the information
11. A letter sent on the internet
11 CapitalTek Teknology Insider 613-227-HELP (4357) help@capitaltek ca capitaltek ca ENTERTAINMENT
| PUZZLES AND CROSSWORDS Tech Quiz
HomeTown Accounting&Tax
A family-owned, full service accounting and tax business operating in Ottawa, Ontario since 2017, Hometown Accounting and Tax handles accounting, taxes, bookkeeping, payroll, and various other consulting needs for small- and medium-sized businesses.
Whether you’re a new or existing business, non-profit, or seeking individual advice, their team
They are focused on providing a customer-first experience. They understand how important it is to treat their customers and make sure they always feel like a top priority.
They create long-lasting relationships with their clients. By getting to know them and their business, they look to become a trusted partner and someone you can rely on.
Ensuring their client's satisfaction
Set
613-227-HELP (4357) help@capitaltek.ca capitaltek.ca
Sadiq Alwani HomeTown Accounting & Tax sadiq@hatinc.ca
is always a top priority for them. They want to make sure that every client has a great experience and that they do everything they can to go over and above for you.
Award-winning managed IT services for small to medium-sized companies in Ottawa. We combine essentials with a comprehensive platform to keep you running worry-free 24/7.
COMPUTER MAINTENANCE MANAGED NETWORK BUSINESS PHONE BUSINESS EMAIL DATA BACKUP WEB HOSTING
ABOUT FOUNDER & CEO, SERGEY POLTEV
Founder and CEO Sergey Poltev, has been fixing computers since he was a kid. He immigrated to Canada to seek new opportunities, where he launched CALLGEEK (later renamed to CAPITALTEK) in 2008. Sergey was recognized in 2021 with a Forty Under 40 Awards from the Ottawa Board of Trade & Ottawa Business Journal.
FEATURE | CUSTOMER HIGHLIGHT CapitalTek Teknology Insider 613-227-HELP (4357) help@capitaltek ca capitaltek ca
12
We're now taking on new clients!
up a 30 minute explanatory video call at www.capitaltek.ca/talk-to-an-expert