Cybersecurity for Travelers

Cybersecurity experts generally agree that about 20 percent of travelers are subject to cyber targeting when abroad. All agree that travel puts you at additional information security risk. While some countries are known to host far more serious and focused attacks, data and identity thieves operate across the globe. When you enter their backyard, you are a target of opportunity.

Your Value as a Target

  • If you represent leading business, research, media, academic or governmental entities, there’s no doubt that you’re of interest to attackers.
  • If the country you’re visiting is unfriendly to the United States, and/or if there is civil unrest, violence and crime, you’re a top target for cyber-attack, cybercrime, monitoring and surveillance.
  • Even the average American tourist represents value to attackers. Their electronic devices are tools to mount attacks against others, and to increase their circles of stolen data and exploited networks.
  • It may not only be the host country targeting you. Third-country criminals and governments often leverage the accessibility, deniability and reduced prosecution risk of having their target anywhere overseas.

Accessing the Internet

  • Refrain from accessing sensitive data and networks when traveling.
  • Limit remote access to your device. Disable Bluetooth and Wi-Fi. While all Bluetooth devices have some inherent vulnerabilities, the older versions are far more susceptible to hacking and eavesdropping.
  • Use your smartphone to create a Wi-Fi “hotspot.” While suspect in some foreign countries, cellular service remains the safer alternative.
  • Use a Virtual Private Network (VPN) to encrypt your data. While a VPN can slow your connection, it’s better than losing your data.

In recent years, the authorities and actions of border and immigration officials have increased both in the United States and overseas. To a far greater degree than any time before, electronic communication devices are subject to involuntary official governmental review and possible duplication of hard drive contents.

The U.S. Department of Homeland Security advised in 2008 that border agents are allowed to search through files on laptops, smartphones or other digital devices when you enter the country, even when there is no reasonable cause. They can keep data or the entire computer, copy what they want and share this data with other agencies, and force you to give the password if the data is encrypted. A good rule to follow is that a device out of your control during “secondary screening” should be assumed to have been exploited. 

At the conclusion of your trip, it is best to turn over your devices to your corporate IT staff for their forensic inspection, wiping and operating system reloading.

Office 365 Training Tips

Due to high demand for Office 365 training materials, wE have joined Microsoft and LinkedIn to start providing basic tips to help you and your staff improve their Office 2016 skills. We hope you find these tips helpful.

 Improve how you work with top training tips. Did you know that Microsoft Office 2016 is always up to date with the latest features? Use this email to learn about how Outlook, Excel, Word, and PowerPoint can take your productivity to the next level.

Office 365

Improve how you work with top training tips

Did you know that Microsoft Office 2016 is always up to date with the latest features? Use this email to learn about how Outlook, Excel, Word, and PowerPoint can take your productivity to the next level.

Here’s what you can do

Outlook

Get started and get access to your emails by adding your email accounts to Outlook.
Watch the video

Easily let business contacts and coworkers know when you’re away by setting an out-of-office reply.
Watch the video

Add a personal touch to outgoing emails by creating an email signature.
Watch the video

Get even more Outlook tips

 

→

 

Excel

Speed up data entry without sacrificing accuracy by creating and managing drop-down lists in Excel.
Learn more

Quickly and easily manage complex sets of data by creating PivotTables.
Watch the video

Get even more Excel tips

 

→

 

Word

Cleanly arrange and present your data by drawing a table in Word.
Learn more

Create a shareable, uneditable doc by converting a Word file to a PDF file.
Watch the video

Get even more Word tips

 

→

 

PowerPoint

Start building a professional presentation by using one of several templates, available in a variety of styles and colors, and suitable for any industry.
Watch the video

Maximize visual impact by adding images to slides‍—‍even in place of where you might want text.
Watch the video

Get even more PowerPoint tips

 

→

Cybersecurity Tips

hands.PNG

According to a PricewaterhouseCoopers survey, in 2014, 69% of business executives expressed concern about cyber threats, including a lack of data security. In 2015, an updated survey increased that number to 86%.1 These numbers indicate that it’s clear there’s a pressing need for better cybersecurity. The issue is not going away anytime soon. If anything, it’s only getting worse.

Stronger cybersecurity has become a global priority over the last few years as hackers penetrate the IT infrastructure of government and enterprises with increasing frequency and sophistication. According to a study conducted by the Identify Theft Resources Center, the total number of data breaches reported in the US grew from approximately 400 in 2011 to approximately 750 in 2015. This represents an increase of more than 60% and does not include breaches that went unreported—a fgure that is likely much higher.1 Coupled with the Internet of Things (IoT) and the explosive growth of mobile devices, the threat landscape and potential for data leaks is even more significant

cybersecurity.PNG

Partnering with a Managed Services Provider (MSP) that focuses on IT security can bolster your cybersecurity defenses. This is especially true when it comes to end user error. All the tools and solutions in the world won’t protect your business from every attack. Human error is still highly dangerous, and many employees grow complacent at some point as they fail to follow best practices.

Here’s a sampling of the benefts a mobile device management MSP can provide:
• Keeps employee devices updated with the latest antivirus and antimalware software.
• Applies updates to programs and applications when new versions and fxes become available.
• Applies operating system patches when frst available on a regular schedule that you can confgure.
• Provides security assessments to identify weaknesses in your existing mobile security program.
• Offers guidance on how to mitigate any mobile security program risks


As your business begins the journey to enhance its cybersecurity posture, it all starts with educating your employees. The tips provided within this eBook along with some basic common sense can go a long way in making sure sensitive information does not fall into the wrong hands.

Succeeding in applying the necessary cybersecurity measures is paramount to your long-term business success. In today’s world of advanced hackers, who revel in breaching corporate networks, confdential information will always be at risk. Businesses must take the necessary steps to protect their intellectual property, their confdential information and their reputations while also safeguarding their employees, customers and business partners.

Proactively identify and thwart potential attacks as well as react expediently if a successful attack occurs. This is where a managed IT services provider can assist. They eliminate the need for your business to keep up on the latest antivirus, antimalware and alert technologies. You also don’t need to expend the necessary resource time to deploy and manage such solutions, which often fall beyond the bandwidth and expertise of internal teams.

Want to donate your old computer for a good cause?

We are looking for generous individuals and organizations who would like to donate old computer equipment, including desktops, laptops, monitors, keyboards, mice, that are no longer in use or broken. 

We are part of a non-profit organization in Pasadena, CA that refurbishes and rebuilds computers out of old parts and we give them to children, families and schools in low inclome areas in Los Angeles. We are passionate about extending the lifespan of computer hardware to reduce over consumption & waste in electronics. We will take any computers and laptops working or not from any individual or organization. 

The hard-drives in donation machines are then securely wiped using Department of Defense standards. Then we attempt to refurbish donations so they are back to working order. Those that cannot be refurbished  we strip for parts and responsibly E-waste the leftovers.

Please contact us if you or your organization would like to donate old computer equipment. We can schedule the pick up at your convenience in the Greater Los Angeles Area.

For more information contact us at: evsupport@ev-consultech.com or call us at 626-405-8987 Ext. 101. We really appreciate your contribution to this great cause.