Computer Services and Support Terminology

Seras provides computer support to businesses throughout the greater Columbia SC area. We know that our service is superior and provides the best value available, but we need our customers to be able to find us.

Computers or Information Technology? Services or Support?

After discussing this dilemma with many of our customers, there really is no clear terminology about what people are typing into their search engines when they need computer help at work. If you had a technology problem at work, what would you type into your search engine in order find a technician that could come out to your office and solve your computer problem?

Transfer Page

 

 

 

 

 

 

 

 

 

 

 

google search bar

 

 

 

 

 

 

 

Family Promise of the Midlands helps families who are experiencing homelessness to achieve sustainable independence. Their mission is accomplished through local faith-based congregations who provide shelter, food, and hospitality to our guest families.

Two weeks from now we will tally the results and donate $1.00 to Family Promise of the Midlands for every relevant comment that we receive.   Help out this great organization and help Seras provide great service to more people throughout the greater Columbia SC area!

 

Like us on Facebook to be updated on all of our community outreach events and services.

Data Security: Policy vs. Reality

Every company small or big, no matter the industry, has policies and procedures. Each policy has it's own purpose; from safety to marketing, from sales to operational efficiency, from data security to company image. Whatever the purpose, the policies are there to guide the employees toward accomplishing the overall goals and vision of the company.  Often these policies are neglected.

When that happens, at best the goals of the company are not met and at worst the company is dealing with catastrophe that may lead to it's demise.

One such policy which is often not followed by employees is the company's Data Security Policy.  Companies need a data security policy in place in order to help prevent theft, damage from natural disasters, corruption, and much more. There are consequences that are often overlooked until they end in disaster. A few weeks ago we discussed how to enhance your company's data security. Take a look back at that article to see some actionable steps that you can take to help protect your company from hackers, viruses and natural disasters.

Let's face reality.  Are your employees following the policies that your company has put in place to protect it?  That is a question that you will need to find the answer to.  Otherwise your company is at risk.  To put it into perspective, the folks at Code42 have put together this brilliant info-graphic detailing Data Security Policy vs. Reality:

data security

 

Are you ensuring that your employees are following your data security policy? Or are they ignoring it, either intentionally or even unintentionally?  Make sure your employees are trained and educated on the risks and proper use of their computers and all other technology.   Ensuring your employees are following the data security policy can potentially be the difference between a breach from a hacker, corruption due to malware, or physical damage due to lack of proper storage of equipment.

For help on establishing, reviewing and enforcing a data security policy that will help protect your company from the many dangers out there, contact Seras here or call us today: 803.233.9216!

How to Remember a more Secure Password

Seras technicians work on customer PCs in the greater Columbia area everyday and quite often they need access to a customer's password in order to access and test computer hardware, software, and other network components.  Quite often customers say, "I use 'abc123' for everything" (or something to that effect).

Hackers use "dictionary attack" programs to quickly run through a long list of known words to attempt to hack into unknowing users' accounts.  Often these hacking programs can uncover a password within minutes, therefore a one word password is not going maintain any significant level of security.Secure Password Computer Services Columbia SC

So what now?  How do you create a more secure password that is also easy to remember?  The answer: Phrases.

For example, think of your favorate restaurant:

outback

Now think of a way to talk about making it the best:

outbackisbest

Now add a capital letter:

Outbackisbest

Now add a number:

Outbackis1

Now add a symbol:

Outbackis#1

This process virtually eliminates the possiblity of a "dictionary attack" and creates a more secure password than most that is also very easy to remember.  For help with passwords or anything else computer or IT related, contact us here.  Now go out there and create your new passwords!

Enhanced Data Security for any Organization

All businesses have important data and other information that need to be protected. In order to protect that data, businesses need to implement several safeguards and take pro-active steps to increase their data security.

Data Security refers to protective digital privacy measures that are applied to prevent unauthorized access to computers, databases and websites. Data security also protects data from corruption and is the main priority for organizations of every size and genre.

Whether you are a company that has been in business for several years or a start up company, data security needs to be a top priority. Older companies need to review and refresh their data security plans annually while start ups need to begin formulating a plan.

Data Security

Steps Towards Better Data Security:

PDCA: Plan-Do-Check-Act (PDCA). This is a protocol for many businesses in any industry. Plan your security processes ahead of time. Do the hard work of integrating this plan and security processes. Check that they are being followed and Act quickly in cases of non-compliance. Using PDCA as a guide will help you focus on what you need to do and how you can help accomplish better data security within your organization.

Auditing: Proper planning and policy making is great, however, if you don't follow your own policies then they aren't doing you any good. That is why it is important to do a regular audit by a third party to ensure that your policies are being followed properly by all team members.

Identify Assets: Make a list of all hardware, software, media, data and applications that contain sensitive data.

Hiring: Did you know that over half of all data security breaches are caused by insiders rather than malware or web-based attacks? For the most part it is negligence, but sometimes it can be done by deliberate sabotage.  To sum up, your employees are the greatest risk to your data. Policies need to be in place to minimize the risk of data loss. Proper screening during the hiring process needs to be taken seriously. documents need to be protected, and access should have proper permissions.

Controlling Access: Permissions need to be set up on your data and documents for certain employees. Should the janitor have access to the personnel files in HR? Ensure that appropriate access to each data type is in place.

Training: As stated previously, 50 percent of all data security breaches are caused by insiders. Most of the time it is because of negligence. Keep your staff trained on proper use of each software, hardware and other IT equipment. We know training is the magic word that automatically gives you and your staff a headache.  However, we believe that investing the time to train your staff will be far less severe than the headache that occurs when your data has been compromised because one of your untrained staff clicked an email or link that they should not have.

Back-Up: Requirements for backing up data will vary according to your industry. We recommend at a minimum a daily back up of all files that have changed in the past 24 hours and a complete backup on a weekly basis. Data should also be regularly archived for long-term storage.

Physical Security: Keeping proper access to physical files is important. Physical files and other sensitive resources should be properly secured by key locks, key code locks or other security measures. On top of that it is critical to keep servers, workstations and cables protected from damage by floods, fires, and other natural disasters.

24/7 Monitoring: Threats towards your data security are always evolving. Malware and viruses are always changing and adapting. The best way to maintain best data security is to implement a real time monitoring of all of your IT systems.  For more information about detecting malware, check out our recent article here.

Stay updated: Keeping your IT resources updated will reduce the likelihood of breaches and will help your team to better respond to threats.

Proper Disposal: Extremely sensitive data can still be recovered even when it has been deleted or removed from a workstation.  Make sure you use proper wiping utilities and ensure that old equipment is properly destroyed/demagnetized to prevent sensitive data from being recovered.

Data security safe

We want your business goals to not only be met, but to be exceeded abundantly!  A big part of your company's ability to accomplish it's goals is to ensure proper data security. Contact Seras today to help ensure that your company is safe from data security threats.

Wateree Community Actions Inc. Golf Tournament

We had a great time participating in the Wateree Community Actions Inc Classic Golf Tournament on Monday April 25th.  There was a great turn out, the weather was great and the fellowship was great!

WCA Golf 2

 

Wateree Community Actions, Inc. (WCAI) is a private non-profit community action agency founded in 1969 encompassing five counties in South Carolina. WCAI is committed to enhancing the social and economic self-sufficiency of low income families and individuals in the following communities: Clarendon, Kershaw, Lee, Richland, and Sumter counties.  The agency fosters relationships and conducts a wide range of custom designed services and activities geared toward reducing poverty and making each community a better place to live. To learn more about WCAI click here to visit their website.

Seras provides IT services to Wateree Community Actions, Inc for all seven of their offices in the five hours. Contact us to see how we can help serve your business' Computer and IT needs.

Symptoms of Malware Infection

If you manage or own a company, chances are you or your employees are using computers. At some point you or your employees will use the internet - for work purposes, for lunch-time browsing, or even when supposed to be working.  Using the internet makes your IT security more vulnerable to many hackers and viruses.

malware

 

 

 

 

 

 

 

 

It is important to recognize and understand when your computer systems are under attack from malware and other viruses.  But what are the symptoms of malware infection?  How can you find out if your computer or worse your entire network is infected?  Here are a few warning signs and symptoms of malware infection.

You are unknowingly sending out spam through emails and social media

Are your friends telling you that you've been sending them random emails with pretty sketchy links?  Or are you sending them links through facebook or twitter or other social media platforms?  Then you might be a victim of spyware.  This may be caused from setting weak passwords or even forgetting to log out of them.

Pop-ups and Toolbars

Pop-Ups are easy signs that your computer is infected with malware.  If you see a pop-up ad it is likely that you may have clicked on a suspicious page, answered a service or an ad. When pop-ups appear, do not click on their content.  Close them and immediately run your anti-malware software to remove the malware.

How often do you download free applications over the internet?  Often, free application software comes with malware.  Did your default web browser change? Did your default search engine change?  What about your toolbar in your web browser?  Many times hidden in the fine print of these free software options are details of how it will change these settings. Be cautious when seeing these links for free software and download now. Sometimes it is best to avoid downloading altogether. Contact your IT company to ensure any program you download is safe.

Blue Screen of Death

Does your computer crash frequently? That could be a sign of a technical problem or even worse a malware infection. Consult your IT service provider when this occurs to ensure the problem isn't that you haven't installed the latest drivers for your device or other technical problems with your PC. If it isn't anything wrong with your PC then your computer may be infected by malware.  Consult with your IT provider anytime this occurs to ensure the security of your computer systems.

Computer running slow

This is one of the most common symptoms.  Is it taking an unusually long time to start up or run any programs? You may be infected with a virus.  It is best not to immediately assume you have a virus just because your computer is running slow.  Do a quick check to see if you might actually be running out of RAM.  For windows, open your task manager by pressing and holding down Ctrl-Alt-DEL and go to the performance tab and check how many gigabytes of RAM you are using under the memory section.  You may also be running out of space on your hard drive or have damaged hardware. If that is not the problem then it's likely a virus.

Programs are shutting down randomly

Are you working on a program and it randomly closes?  Does the program start when you never told it to start? That can be a sign that your PC is infected with malware.

As a manager or business owner it is important that you know and recognize the symptoms of malware infection on your PCs.  It is important for your IT security to train your employees to recognize these symptoms and to have a plan and procedures in place for how to help resolve the situation as soon as possible.  We recommend performing regular malware scans on all of your PCs even if the symptoms aren't showing in order to ensure the data and systems are secure.

To learn more about malware and IT security contact Seras here or by calling 803.233.9216.