CapitalTek August Newsletter Vol. 20

Page 7

Whoelseissickofspam?,p1

How often do you need to Train Employees on Cybersecurity Awareness?, p2

Are you blacklisting or whitelisting?, p3

Get more unplugged laptop time with these battery-saving hacks, p4 5 ways Microsoft 365 can enable the hybrid office, p5 Summer Sports VS Scams, p6

TEKNOLOGY INSIDER

2022 AUGUST VOLUME 20

WHOELSEISSICKOF SPAM?

We have a new address!

See page 8 for more details

For business owners, spam is bad news.

Not only is it annoying, but it’s also eating up hours of your team’s time each year. In fact, it’s estimated that people who get more than a hundred emails every day could be losing arou 80 hours of their time each year, sorting out spam.

As well as the impact on productivity, have you considered how else it might be harming your business?

For example, how many of the emails that you send out – especially your marketing messages are being marked as spam?

Spam filters give each email a score based on t sender reputation, domain name and many other factors. They also read the emails to spot common words and phrases used by spammers.

Using one “spammy” word in an email isn’t a disaster in itself. But using too many can give you a higher spam score, and your message could be filtered into the spam folder

Villain of the month, p7 Staff Highlight, p8 Elon Musk is about to demonstrate a household robot, p9 Faxing Made Simple, p10 Entertainment, p11 Featured CustomerA family-owned, full service accounting & tax business operating in Ottawa, Ontario since 2017, p12

POPULAR SMISHING SCAMS

‘being a member’, ‘free trial’, ‘unlimited’, and even ‘amazing’

Next time you’re creating a marketing email, take a moment to consider how spammy your email could be perceived before you hit send. Staying out of the spam folder improves deliverability and open rates.

1 CapitalTek Teknology Insider 613-227-HELP (4357) help@capitaltek ca capitaltek ca YOUR MONTHLY NEWSLETTER, WRITTEN FOR HUMANS, NOT GEEKS
TOOLS AND SOFTWARE
DIGITAL INTEREST

HOW OFTEN DO YOU NEED TO TRAIN EMPLOYEES ON CYBERSECURITY AWARENESS?

You’vejustcompletedyourannualphishing trainingwhereyouteachemployeeshowtospot phishingemails.You’refeelinggoodaboutit,until about5-6monthslaterwhenyourcompany suffersacostlyransomwareinfectionbecause someoneclickedonaphishinglink

Youwonderwhyyouseemtoneedtotrainonthe sameinformationeveryyear,andyetstillsuffer fromsecurityincidents.Theproblemisthatyou’re nottrainingyouremployeesoftenenough

Peoplecan’tchangebehaviorsiftrainingisn’t reinforcedregularly.Theycanalsoeasilyforget whatthey’velearnedafterseveralmonthsgoby.

So,howoftenisoftenenoughtoimproveyour team’scybersecurityawarenessandcyber hygiene?Itturnsoutthattrainingeveryfour monthsisthe“sweetspot”whenitcomesto seeingconsistentresultsinyourITsecurity.

WhyIsCybersecurityAwarenessTrainingEach 4-MonthsRecommended?

TherewasastudypresentedattheUSENIXSOUPS securityconferencethatlookedatusers’abilityto detectphishingemailsversushowoftentheywere trainedonphishingawarenessandITsecurity. Employeesweretestedatseveraldifferenttime increments:

4-months

6-months

8-months 10-months 12-months

Itwasfoundthatfourmonthsaftertheirtraining, theywerestillabletoaccuratelyidentifyand avoidclickingonphishingemails.

However,after6months,theirscoresstartedto getworse.Thentheycontinuedtodeclinefurther

themoremonthsthatpassedaftertheirinitial training.

So,tokeepemployeeswellpreparedtoactasa positiveagentsinyouroverallcybersecuritystrategy, it’simportanttheygettrainingandrefreshers regularly.

TipsonWhat&HowtoTrainEmployeesto DevelopaCybersecureCulture

Thegoldstandardforemployeesecurityawareness trainingistodevelopacybersecureculture.Thisis onewhereeveryoneiscognizantoftheneedto protectsensitivedata,avoidphishingscams,and keeppasswordssecured.

Unfortunately,thisisnotthecaseinmost organizations.Accordingtothe2021SophosThreat Report,oneofthebiggestthreatstonetwork securityisalackofgoodsecurityknowledgeand practices.

Thereportstates,“Alackofattentiontooneor moreaspectsofbasicsecurityhygienehasbeen foundtobeattherootcauseofmanyofthemost damagingattackswe’veinvestigated.”

Well-trainedemployeessignificantlyreducea company’sriskoffallingvictimtoanynumberof differentonlineattacks.

Tobewell-traineddoesn’tmeanyouhavetoconduct alongdayofcybersecuritytrainingeveryfour months It’sbettertomixupthedeliverymethods

Herearesomeexamplesofengagingwaystotrain employeesncybersecuritythatyoucanincludein yourtrainingplan:

Self-servicevideosthatgetemailedonceper month

Team-basedroundtablediscussions Security“TipoftheWeek”incompany newslettersormessagingchannels

(Continued on next page)

2 CapitalTek Teknology Insider 613-227-HELP (4357) help@capitaltek ca capitaltek ca NEWS | MAIN STORIES

(Continued from page 2 )

Training session given by an IT professional

Simulated phishing tests

Cybersecurity posters

Celebrate Cybersecurity Awareness Month in October

When conducting training, phishing is a big topic to cover, but it’s not the only one. Here are some important topics that you want to include in your mix of awareness training.

ARE YOU BLACKLISTING OR WHITELISTING?

Youknowwhatitmeanstobe blacklisted,right?(wedon’t meanthroughpersonal experience,ofcourse).

Blacklisting is where you block something you don’t trust. It’s used to keep networks and devices safe from bad software and cyber criminals

But there’s another, safer way of doing that – and that’s called whitelisting.

Rather than trying to spot and block threats, you assume everyone and everything is a threat, unless they’ve been whitelisted.

But which is the right approach when it comes to keeping your business data safe? This debate rages on, with many IT professionals holding different views

Here are the main differences…

Blacklisting blocks access to suspicious or malicious entities

Whitelisting allows access only to approved entities

Blacklisting’s default is to allow access

Whitelisting’s default is to block access

Blacklisting is threat-centric Whitelisting is trust-centric here are pros and cons to each approach. Whilst blacklisting is a simple, low maintenance approach, it will never be comprehensive as new threats emerge daily It’s also easy to miss a threat, as cyber criminals design software to evade blacklist tools.

Whitelisting takes a stricter approach and therefore comes with a lower risk of access. But it’s more complex to implement and needs more input. It’s also more restrictive for people using the network and devices.

Confused? You’re not alone! If you’d like to discuss which approach is best for your business, get in touch.

3 CapitalTek Teknology Insider 613-227-HELP (4357) help@capitaltek ca capitaltek ca NEWS | CONTINUATION OF MAIN STORIES

HOME SECURITY: WHY YOU SHOULD PUT IOT DEVICES ON A GUEST WI-FI NETWORK

The number of internetconnected devices in homes has been growing exponentially over the last decade. A typical home now has more than 10 devices connected to the internet.

IoT stands for Internet of Things, and it basically means any other type of “smart device” that connects online besides computers and mobile devices.

Here are two alarming statistics that illustrate the issue with IoT security:

During the first six months of 2021, the number of IoT cyberattacks was up by 135% over the prior year.

Over 25% of all cyberattacks against businesses involve IoT devices

Hackers Use IoT Devices to Get to Computers & Smartphones

Smart devices are a risk to any other device on a network because they are typically easier to breach, so hackers will use them as a gateway into more sensitive devices, like a work computer.

ImproveSecuritybyPuttingIoT onaSeparateWi-FiNetwork

Just about all modern routers will have the ability to set up a second Wi-Fi network, called a “guest network.”

By putting all your IoT devices on a separate guest network from your devices that hold sensitive information, you eliminate that bridge that hackers use to go from an IoT device to another device on the same network.

Just make sure that you secure your Guest Network with a strong passphrase.

NeedHelpUpgradingYour HomeCybersecurity?

With so many remote workers, hackers have begun targeting home networks because they can target your sensitive business and personal data in a typically less secure environment than they would face in a business setting.

POPULAR SMISHING SCAMS TO WATCH OUT FOR

Smishing is a form of phishing that uses text messages (as opposed to emails) to trick unknowing recipients into clicking a malicious link or otherwise “mining” personal information through their replies. They became a particularly popular method of attack during the COVID-19 pandemic and preyed on peoples fear and easy spread of misinformation

Some popular methods include:

Text Messages Being Sent to You That Spoof Your Own Number

Problem With a Delivery

Fake Appointment Scheduling

Offer of a Free Gift

Security issue with your account (often impersonates Netflix or Amazon)

GET MORE UNPLUGGED LAPTOP TIME WITH THESE BATTERYSAVING HACKS

Laptops today boast ridiculously powerful batteries, a far-cry from the roughly 2-3 hours we used to get. Most Apple laptops nowadays can easily provide up to 12 hours of batter life.

(Continued on next page)

NEWS | FINISH OF MAIN STORIES
4 CapitalTek Teknology Insider 613-227-HELP (4357) help@capitaltek ca capitaltek ca

(Continued from page 4 )

So, if you’re laptop battery doesn’t seem to get you past a few hours of use, try the following tips:

Lower the Display Brightness

Reduce PC Battery Use in Power/Sleep Settings

Enable Battery-Saver Mode

Use the Manufacturer’s Battery Calibration Tool

5 WAYS MICROSOFT 365 CAN ENABLE THE HYBRID OFFICE

“Hybrid office” has become more than a buzzword It is now the reality for many companies.

63% of high-growth companies utilize a “productivity anywhere” hybrid work approach.

Here are some of the ways you can use Microsoft 365 to optimize a productive hybrid office:

Microsoft Teams & Expanded Features

Webinar Registrations

Full VoIP phone system

New Meeting Options for RSVP in Outlook

RSVP in person or virtually

Better Framing for More Engaging Meetings

The ability to adjust

the room view to see faces clearer

An upcoming technology called Cameo will integrate seamlessly with Teams and allow you to appear alongside your presentation

Use Microsoft Edge Browser on PC or Safari on Apple for their Efficiency Settings

Turn Off Unnecessary Apps Don’t Expose Your Laptop to Extreme Temperatures

Personalized feedback on how to improve your presentations

TECHNOLOGY | TOOLS FOR YOUR BUSINESS 5 CapitalTek Teknology Insider 613-227-HELP (4357) help@capitaltek ca capitaltek ca
Using PowerPoint to Present

CYBERSECURITY | PROTECT YOURSELF

SUMMER SPORTS SCAMS VS

This summer, sports fans should remain cyberaware throughout the season, but especially during big games or important matches. Scammers know that these events get the most traction, and they monopolize on current events to trick the public.

TICKET TICKET SSCAMS CAMS

Scammers have drafted online ads selling tickets to live sporting events. Once a fan has finalized the purchase, they receive an e-ticket with bogus barcodes, while their credit card information is now with the scammer.

STREAMING STREAMING SSCAMS CAMS

Scammers have drafted online ads selling tickets to live sporting events. Once a fan has finalized the purchase, they receive an e-ticket with bogus barcodes, while their credit card information is now with the scammer.

Typically, highly publicized and international events are a scammer's playing ground. When it comes to summer sporting events (and events throughout the rest of the year), keep your eye on the ball, and follow these tips:

BETTING BETTING SSCAMS CAMS

Phishing emails and fake websites that offer betting opportunities or contests can also be a part of sport scams. Fans are often tricked into offering up their personal information with the lure of winning big.

CapitalTek Teknology Insider 613-227-HELP (4357) help@capitaltek ca capitaltek ca
6
Double check the authenticity of a website before offering up PII. Stick
Verify the legitimacy of too-goodto-be- true opportunities.
to official online vendors, or buy tickets in person at the venue.

VILLAIN OF THE MONTH

Each month we highlight a scam that demonstrates tactics criminals are using RIGHT NOW, that way you'll be better prepared when the next scam hits.

Georgia was planning to move to a new city for her job, and so she started the search for a rental. Every day she checked top housing websites, keeping her eye out for the perfect one. To her dismay, there wasn't much that her budget could afford in the area, but she kept looking. Until, she found it! A cute one bedroom with a park view. The price was listed well below other rentals in the area, but the Agent would be able to show her the property within the week (for a small fee). The owner was out of the country on business and so they did not want a lot of people in and out of the house unless they were serious. Before Georgia could respond to the Agent's outreach with potential times to view the property, they replied that the week had already booked up with viewings. The Agent said the location wouldn't last long with it's low price, and recommended that Georgia skip the formalities and sign the lease, directly wiring the deposit to the owner, so that should could lock in the space.

DID YOU SPOT THE RED FLAGS?

Therentalwasmuchlowerinpricethanthatoftheother propertiesinthearea.

Georgiawasrequestedtopayforaviewing,whichisnot atypicalpracticeofviewingrentalproperties.

TheAgentusedhigh-pressuretacticstourgeGeorgiainto placingadepositquickly.

Even legitimate housing websites can be host to fraudulent homes and rentals. Should you encounter such a scam, be sure to report it to the website or app where the post was listed.

Wiring money is essentially the same as sending cash. Once it's sent, it's gone. If you wouldn't feel comfortable sending cash for something like a deposit, think twice before agreeing to wire money.

Scammers typically like to stay on-trend. And since summer is peak moving season for those considering a change in residence, use caution when looking into properties during these warmer months, or when searching around areas that have seen a lot of recent growth or an increaseinpopulation.

CYBERSECURITY | PROTECT YOURSELF

Staff highlight: Rica Salonga

Rica holds a bachelor’s degree from an all-girls university where she majored in Computer Science and Paleontology

She joined Capitaltek three and a half years ago as an Administrative Assistant to the General Manager. Throughout the year of working with Sergey, she developed skills in email migration, website updates, and basic computer troubleshooting.

Being promoted as a general manager, she is now responsible for recognizing employees’ talent and potential so that they can provide adequate training to help her team develop their skills.

Rica has always shown initiative in performing her duties. She even went on to ensure that the team delivers the expected outputs before the deadline. Rica is a powerful force in the workplace and uses her positive attitude and tireless energy to encourage others to work hard and succeed.

When not busy working, Rica can be found strolling around the city with her Persian cats Tilda and Freya

It's her Birthday month and we wish your everyday would be filled with happiness, good health, and a momentous year ahead!

rica@capitaltek.ca

MEDIA & ARTS | UPCOMING WEBINAR Wehavea Wehavea newaddress! newaddress! HAPPY TO ANNOUNCE 301 Moodie Dr, Unit 109 Ottawa, ON K2H 9C4 CapitalTek Teknology Insider 613-227-HELP (4357) help@capitaltek ca capitaltek ca
8

Hit send too soon in Outlook?

We’ve all accidentally sent an email before it was ready. Or sent it to the wrong person

And while Outlook’s recall is a

TECH FACTS

popular feature, historically it hasn’t always worked. It was only reliable if the recipient used Outlook too.

Great news. An update due for release next month will make

As people become more suspicious of technology, new phobias develop. Technophobia is the fear of technology and cyberphobia is the fear of computers

Want to know how old you were when the internet was born? Visit www.howoldistheinter.net

In the 1950s, computers were called ‘Electronic Brains’. Shall we stick with ‘computer’?

email recall work regardless of here the recipient gets their email.

INSPIRATIONAL QUOTE INSPIRATIONAL QUOTE OF THE OF THE MONTH MONTH

The humanoid Optimus robot (aka the Tesla Bot) will be able to take on the repetitive and dangerous tasks that people hate. It’ll be 5’8” tall, will carry up to 45lbs and walk at 5mph

Soundslikeagood shoppingcompanion...

Elon’s shifted his planned AI day from later this month to the end of September. He hopes to have a working prototype ready to show us.

Which househ tasks w you han to a Tes Could y use for workpla

TECHNOLOGY UPDATE | MICROSOFT 365 NEW TO MICROSOFT 365 9 CapitalTek Teknology Insider 613-227-HELP (4357) help@capitaltek ca capitaltek ca
NOT JUST CONTENT TO FILL OUR ROADS WITH HIS ELECTRIC VEHICLES, NOW TESLA’S ELON MUSK IS ABOUT TO DEMONSTRATE A HOUSEHOLD ROBOT.
“Technology will never replace great teachers but technology in the hands of great teachers is transformational.”
George Couras, Innovative Teaching, Learning, and Leadership Consultant

Digital Fax – Faxing Made Simple

No doubt, a fax machine is an outdated technology, but unfortunately, many individuals and businesses still use it. Faxing is still relevant, but fax machines are not. However, business owners need to make the switch from old analog fax machines to digital fax. Here, we’ll discuss how to transition from traditional faxing machines to electronica fax. Moreover, we’ll share some of the many benefits of online fax as well. So, let’s start.

Why

Should Businesses Switch

from Faxing Machines to Digital Fax?

Some industries like real estate,

insurance, law, and healthcare still rely on old fax machines. No doubt, it’s an outdated tool for communication, but professionals still prefer it for sharing confidential documents like binding signatures. Nowadays, the internet is available for everyone, and people are moving rapidly to mobile platforms. Therefore, standing over a physical fax machine doesn’t look like a good idea. In contrast, online faxing provides instant results and offers plenty of benefits over traditional faxing.

5 Benefits of Online Fax

Saves Time and Money

Keeps Your Documents organized

Environmentally Friendly Saves Space

Better Security

Read more here:

OUR OFFER | SERVICE HIGHLIGHT CapitalTek Teknology Insider 613-227-HELP (4357) help@capitaltek ca capitaltek ca
10

The Funnies

1. 2 3. 4 5

How many programming languages are currently in use?

What’s the name of a website designed just to be used for sharing information inside a company?

Which mobile operating system does Google control?

What does PDF stand for?

What is a computer trojan a form of?

The answers are below

Q&As

Q: What’s an insider threat?

A: It’s the name for when someone within your business gives cyber criminals access to your devices or network Usually, it’s not malicious But it’s why regularly training your team in cyber security is a must

Q: How do I choose the right backup for my data?

5) Malware

4) Portable Document Format

3) Android

2) An intranet

1) It’s really hard to say. Wikipedia has a list of about 700. But some programmers claim there are up to 9,000 languages in active use

A: Security and reliability should be your main considerations. Get in touch and we’ll tell you what we recommend.

Technology Vocab

ACROSS

2. A machine you can use to write, connect to the internet and play games

4. The service the brings internet service to your computer or phone

6. A short letter sent by phone

8. A place on the internet which gives you information

9. Some computers, tablets and phones have this type of screen 12. A fun way to spend time

DOWN

1 A phone you can carry about with you

3. A small tool which you can use to move your pointer on the computer screen, or a small rodent.

5 You use this apparatus to write on a computer

7. A computer you can easily carry

10 The part of a computer or phone that allows you to see the information

11. A letter sent on the internet

11 CapitalTek Teknology Insider 613-227-HELP (4357) help@capitaltek ca capitaltek ca ENTERTAINMENT
| PUZZLES AND CROSSWORDS Tech Quiz

HomeTown Accounting&Tax

A family-owned, full service accounting and tax business operating in Ottawa, Ontario since 2017, Hometown Accounting and Tax handles accounting, taxes, bookkeeping, payroll, and various other consulting needs for small- and medium-sized businesses.

Whether you’re a new or existing business, non-profit, or seeking individual advice, their team

They are focused on providing a customer-first experience. They understand how important it is to treat their customers and make sure they always feel like a top priority.

They create long-lasting relationships with their clients. By getting to know them and their business, they look to become a trusted partner and someone you can rely on.

Ensuring their client's satisfaction

Set

613-227-HELP (4357) help@capitaltek.ca capitaltek.ca

is always a top priority for them. They want to make sure that every client has a great experience and that they do everything they can to go over and above for you.

Award-winning managed IT services for small to medium-sized companies in Ottawa. We combine essentials with a comprehensive platform to keep you running worry-free 24/7.

COMPUTER MAINTENANCE MANAGED NETWORK BUSINESS PHONE BUSINESS EMAIL DATA BACKUP WEB HOSTING

ABOUT FOUNDER & CEO, SERGEY POLTEV

Founder and CEO Sergey Poltev, has been fixing computers since he was a kid. He immigrated to Canada to seek new opportunities, where he launched CALLGEEK (later renamed to CAPITALTEK) in 2008. Sergey was recognized in 2021 with a Forty Under 40 Awards from the Ottawa Board of Trade & Ottawa Business Journal.

FEATURE | CUSTOMER HIGHLIGHT CapitalTek Teknology Insider 613-227-HELP (4357) help@capitaltek ca capitaltek ca
12
We're now taking on new clients!
up a 30 minute explanatory video call at www.capitaltek.ca/talk-to-an-expert

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.