alt tag

Productivity Posts


Mesh Networking for SMB Offices

Tuesday, March 28th, 2017

wireless-35062_640

If the sounds of disgruntled employees complaining about poor Wi-Fi connectivity are all too familiar in your SMB, it’s time to consider switching to a mesh network.

Unlike traditional Wi-Fi networks that use a single point of origin and optional extender networks, mesh networks utilize a series of nodes to create a single, wide-reaching network.

According to the technology analysts at ZDNet, the cost of implementing mesh networking has dropped to the point where it is now practical for small businesses. Mesh networking is a great way to increase productivity in your office by ensuring a strong network connection in every location.

Decentralized Access: A Better Solution for Resolving Wi-Fi Deadzones

A traditional Wi-Fi network tasked with covering a wide area features a singular router connecting to Wi-Fi extenders. However, the main problem with this configuration is that extenders cannot daisy chain, so you’re still forced to use the router as a centralized access point. If a single extender doesn’t adequately boost the Wi-Fi signal, you’re out of luck. This can be a problem for small-to-medium sized offices where the main Internet connection comes in at one side of the building, limiting coverage and expansion potential.

Mesh Wi-Fi still uses a single Internet connection, but features multiple nodes that can daisy-chain and sport multiple node connectivity to provide signal as far as necessary. A traditional Wi-Fi network would have the router at the access point and an extender in a centralized location, while a mesh network can feature nodes at the access point, a centralized location, and anywhere else in the office that requires coverage.

Mesh networks eliminate the need to run expensive wires throughout the office to compensate for traditional network limitations. Moreover, this system helps to improve stability and performance because traffic can take different node paths if a part of the network is overloaded or not functioning.

Singular Network Solution

Wi-Fi extenders can be difficult to configure and require a change of Wi-Fi networks depending on where you are. The hand-off solution is not very elegant, because the extenders behave like additional networks. For example, you may still get great signal from the main router in your office, but not in the conference room; if you move your laptop to the conference room you’ll still get poor signal from the main router and need to manually change your laptop’s Wi-Fi settings to use the extender.

Mesh networks behave like a singular network between each of the nodes, so there’s no need to change networks as you move around the office. This can be very helpful for smartphones and other devices as well.

An Easier-to-Manage Environment

Mesh networks are much easier to set up and manage. When adding Wi-Fi extenders, each device needs to be managed and set up independently, whereas all nodes in a mesh network share the same setup and management process. Setting up a traditional network means configuring the router and individual extenders one at a time, but you can set up a mesh network all at once. Users may find managing mesh gear easier because it’s typically performed through an Android or iOS app instead of a web page.

If your office is fed up with running multiple Wi-Fi networks and Wi-Fi extenders, it may be worthwhile to invest in a mesh network. Contact the experts at MPA Networks today to see how your business can better approach networking solutions.

The Benefits of Laptop Docks and At-Desk Peripherals

Tuesday, March 21st, 2017

macbook-926121_640

With a little bit of effort, your staff can reap all the benefits of a laptop, and many of the perks of a desktop, with a little bit of planning and some additional hardware. It’s a common perception that laptops lead in portability, while desktops specialize in expandability. But improvements in peripheral device connection standards including USB 3.0, eSATA, and Thunderbolt have reduced (if not eliminated) the performance differences between external and internal devices. The main caveats of using external devices to enhance laptop capabilities include the need to physically haul extra pieces of hardware around, which defeats the portability perks.

If your business is looking to boost productivity and improve business continuity, it’s worth looking at configuring employee desks to work as laptop extension environments through docking stations and peripheral hubs.

Docking Stations

Docking stations are devices that connect to laptop computers to convert them (more or less) into desktop computers.

Docks feature a wide range of ports and may include built-in augmentation components like extra storage. The user can connect all their peripheral devices to the dock in advance and utilize them simultaneously just by connecting the laptop to the dock. This supports business continuity for employees who are often in and out of the office, eliminating the need to use two different devices for the same tasks.

USB and Thunderbolt Hubs

Advances in peripheral port bandwidth have made devices like USB and Thunderbolt hubs viable alternatives to docking stations that function as a “choose-your-features” option.

Hubs are essentially a collection of ports that can be used to connect several devices to computer through a single port.

This means utilizing all the hub devices is as easy as connecting a single cable to the laptop. Hubs can also be self-powered so the laptop is no longer limited by powering external devices.

Peripheral Rundown

  • External Monitors: One or more external monitors can be added to docks or hubs to suit employee needs. The worker may prefer a singular, larger monitor, using multiple external screens or using an external display as an extended desktop. Employees may find having more viewable space than a laptop offers a productivity booster.
  • Additional Storage: Attaching external storage devices to the dock or hub serves two primary purposes: It acts as a backup solution for the “three copies” strategy, and it lets employees store extra data that would be a burden on the laptop’s built-in storage. This is a big help when it comes to disaster recovery; in the event that the laptop is damaged, destroyed, or stolen, you’ll have a recent backup on hand.
  • Keyboard and Mouse: Adding a keyboard and mouse to the dock or hub not only helps boost productivity, but also improves ergonomics by allowing employees to position devices where they are most comfortable. Employees who prefer a mouse over a touchpad and want to add a number pad to a laptop that doesn’t carry one will find this solution helpful.
  • Wired Network Connection: Hubs and docks can be configured to connect to the local network via Ethernet. This is a great option for offices already wired for connections that have inconsistent Wi-Fi.
  • Speakers, Webcams, and Microphones: Docks and hubs can also connect to external versions of the laptop’s audio/video devices for an enhanced experience.

The IT and productivity assessment experts at MPA Networks are ready to help your business find a hardware configuration that works best for you. Contact us today.

Mac- and Linux-Based Malware Targets Biomedical Industry

Tuesday, March 14th, 2017

virus-1920629_640

The malware infection, discovered in late January, that’s been hiding out on Mac and Linux devices for more than two years doesn’t mean the security floodgates are open, but it is a reminder that these devices aren’t invincible. Apple is calling this new malware “Fruitfly,” and it’s being used to target biomedical research. While not targeted for Linux devices, the malware code will run on them.

This attack may hit a little too close to home for those industries MPA Networks specializes in protecting, including healthcare and biotech. That makes this a good time to reexamine security best practices for devices that aren’t commonly targeted for attacks.

Attacks Are Rare, But Not Impossible

Broadly speaking, any device that isn’t running Windows has benefited from a concept called “security through obscurity,” which means hackers don’t bother going after these devices because of a smaller market share.

Mac OS X and Linux provide more secure options than Windows for various reasons, but neither is an invincible platform.

Every so often, hackers strike the Mac community with malware—and when the attacks are successful, it’s typically because users don’t see them coming. The lesson here, of course, is to never let your guard down.

You may not need an active anti-virus program on a Mac, but occasional anti-malware scans can be beneficialAccording to Ars Technica, “Fruitfly” uses dated code for creating JPG images last updated in 1998 and can be identified by malware scanners. Anti-malware programs like Malwarebytes and Norton are available for Mac devices. MPA Networks’ desktop support and management can also improve user experiences on non-Windows devices.

Keep Your Macs and Linux Machines Updated

The old IT adage that says “keeping your programs updated is the best defense against security exploits” is still true when it comes to Mac OS X. While Mac OS X upgrades have been free or low-cost for years, not everyone jumps on to the latest version right away. For example, less than half of Macs were running the latest version of the OS in December of 2014. This means all the desktop and laptop devices running older versions of Mac OS X are exposed to security holes Apple patched with updates.

Typically, Apple only supports the three most recent versions of their operating system, which usually come in annual releases. Your workplace computers should, at the very least, be running a version still supported by Apple. The good news is that Apple quickly issued a security fix to address Fruitfly. The bad news? This isn’t the first Mac OS vulnerability malware has managed to exploit, and it won’t be the last.

The IT consulting experts at MPA Networks are ready to help your company find the right tools to increase productivity and improve security on all your office devices. Contact us today to get started.

Network-Attached Storage: Data Backup and Transfer Options for Small Businesses

Thursday, March 9th, 2017

upload-2013228_640

Network-Attached Storage (NAS) servers are a great asset for small businesses managing data. For the uninitiated, NAS is essentially a streamlined server designed specifically for sharing files between devices.

Because of their simplified nature, NAS devices are typically easier to use and substantially more cost-effective than full-fledged servers.

While most NAS solutions are space-efficient standalone server boxes, some higher-end routers can also be used as NAS devices by attaching an external hard drive. If your office is looking to increase productivity and improve disaster recovery, NAS may be worth its weight in gold.

Easy-to-Use Data Storage

NAS devices work as an inexpensive, easy-to-use data storage option for your business. These devices are so simple to configure that your office doesn’t even need to have a local IT staff to use them. Once configured, accessing the storage can be as simple as using Explorer or Finder as you would with any internal storage device.

Practical Backup and Recovery

In their most practical form, NAS devices can be used as a backup and disaster recovery option for office computers. This way, if a computer hard drive fails or a laptop gets destroyed, your staff can recover recent versions of important documents and files.

However, NAS does not replace the need for Cloud or off-site backups for vital information. An office fire, for example, would wipe out desktop computers and the NAS. Combining both NAS and Cloud backup processes gives your business the best level of protection from data loss.

Faster Information Sharing

NAS is also a viable business continuity option as it does not require Internet connectivity to work. Employees who use multiple devices, such as a laptop, desktop, and tablet, can use the NAS to access the same files from any deviceThese data servers are also excellent for employees collaborating on the same files; gone is the need to use email or Cloud storage to sync or send updates.

Cost-Effective Hardware Comes at a Price

NAS devices aren’t as sophisticated as traditional servers. Designed only to focus on sending and receiving data, they offer substantially less processing power. You won’t be able to use a NAS device to run an email server, for example, or to run any server-based applications. For these, you’ll need to look into server management solutions.

Because of this trade-off, however, NAS devices cost a fraction of the price of a dedicated server. Moreover, your business doesn’t need to worry about wasting money buying too much or too little storage because you can install additional hard drives in the NAS device as needed.

Security Issues

As mentioned above, NAS servers should not be used as a replacement for an off-site, Cloud-based backup. IT professionals often recommend storing important data in at least three locations: two “on-site,” which includes the computer and the NAS, and one “off-site,” like a Cloud service. Additionally, if your business is using NAS storage, you’ll want to make sure it is only visible to authorized individuals. Security in this case could include something as simple as password-protecting the Wi-Fi.

Use our wealth of knowledge at MPA Networks to your advantage to meet your business’s server and storage needs. Contact us today.

8 Spring Cleaning Tips for Your Office Computers

Wednesday, March 1st, 2017

bucket-303265_640

When it comes to your office computers, a little bit of spring cleaning goes a long way. Sure, cleaning office computers can seem tedious. But think of it like preventative maintenance on a vehicle: In the best-case scenario, you’ll never know all the breakdowns you avoided.

Keeping your office computers clean and healthy minimizes your risk of downtime and increases productivity.

Here are 8 tips for your next round of spring cleaning:

1. Update All Software

Run updates and patches for the operating system, commonly used programs, and security software on every system. Program and operating system updates don’t just add features; they’re loaded with security updates that keep your devices safe. Most problems with computer security exploits stem from outdated software that allows hackers to break through established breaches that the developer already closed, so running updates and patches is your best line of defense.

2. Run a Full Anti-Virus Scan

After updating all the software on the computer, run a full anti-virus scan to catch any malicious software hanging out on the device. Active anti-virus protection does a good job of safeguarding the system against infections, but sometimes malware slips through the cracks.

3. Run a Full Anti-Malware Scan

Anti-virus programs go after specific, high-risk malware infections, meaning lower-level malware can still find its way onto your computers. Anti-malware programs including Malwarebytes and Spybot are better equipped to identify and remove malware that the anti-virus misses.

4. Defragment the HDD

Older PCs with traditional Hard Disk Drives (HDDs) may experience load time improvements from an annual drive defragmentation. However, newer Windows systems—and all currently supported Mac OS versions—handle this process in the background, so you don’t need to worry about it. If the computer is running a Solid State Drive (SSD), do not bother with the defragmentation process.

5. Remove Unnecessary Launch Programs

It may seem like every program installed on your computer wants to launch itself at startup—even those you rarely use. Removing unnecessary programs from the system startup can help improve performance and reduce login times. Windows 10 features a handy “Startup” tab on the Task Manager that lets users quickly toggle which programs launch with the system.

6. Check and Create Restore Points

Restore points can be a major time saver in returning a compromised computer to full operation. Restore points reverse most of the damage caused by malware and bad configurations, all with minimal effort. Check whether the computer is already using them, and create one if it isn’t.

7. Run a Full Backup

Backups are like restore points for when very bad things happen to a computer. It’s best practice to make at least two backups of a given computer’s files, and store them in different physical locations. This ensures that in the event of catastrophic loss, all the data saved on the computer up until the backup point is preserved. Mashable recommends verifying if automated backup services like Time Machine and Windows Backup and Restore are actually working.

8. Bust Dust on Desktops

This part of the spring cleaning process is literal. As we’ve previously discussed, excessive dust inside a computer obstructs airflow, which can cause crashes due to overheating and even damage components. CNET has a helpful guide on how to go about the dustbusting process.

A little spring cleaning makes for a more efficient office and stronger disaster recovery. The expert desktop support and management staff at MPA Networks is ready to help your workplace in San Mateo, San Francisco, the South Bay, and other Bay Area cities implement better practices. Contact us today for more information.

Getting a Clean Start: Managing Windows Startup Programs

Thursday, February 23rd, 2017

windows-8-1995430_640

It’s quite common that, over time, Windows systems accumulate a laundry list of programs that load when a user signs in.

While generally benign, most of these “startup” programs are unlikely to actually benefit the user—so the computer ends up doing a whole lot of work for no reason.

Fortunately, it’s very easy for someone with a little computer experience to control which programs launch at startup. Read on to find out more about the what, why, and how.

Benefits of Trimming Startup Programs

The primary benefit of trimming the startup program list is a substantially faster login process. If your employees don’t have to wait for useless programs to launch, they can access a fully-loaded desktop several minutes faster. Moreover, the system will have more available memory to run programs that are actually being used. This means the computer will be less likely to fall back on the slower-performing hard drive to operate programs, eliminating a major cause of lag.

Cutting down on startup programs also removes bloatware and other unnecessary programs the computer manufacturer installed on the device. These often extend the boot time, waste available memory, and cause errors—so you’re much better off without them. Employees who don’t reboot as often as they should will be more easily encouraged and motivated to do so if the process doesn’t drag on and on.

Accessing and Using the Built-In Startup Manager

Starting with Windows 8, Microsoft moved the Startup Manager to the Task Manager window, which can be accessed by pressing “Ctrl+Shift+Esc” and clicking the “Startup” tab. The Manager can be found on older systems by pressing “Windows Key+R,” entering “msconfig,” clicking “OK,” and selecting the “Startup” tab.

In the Windows 8 and later Managers, simply select the programs you wish to enable or disable and click the “Enable/Disable” toggle button. Enable or disable programs by checking or unchecking the box next to the desired programs in older versions of the Startup Manager, and press “OK” to finalize the changes.

At this point it’s best practice to restart the machine and ensure the system is in working order before moving on. If something vital is missing, access the Startup Manager again and turn it back on.

What to Disable, What to Keep

Generally speaking, the only programs that need to remain in the system startup are security-related: that is, anti-virus, firewall, and remote access applications. Most of the programs featured in the Startup Manager should have familiar names—so if a program doesn’t immediately strike you as essential, it can probably be disabled. PCWorld recommends researching unknown programs before disabling them.

If you’re unsure of which programs can be disabled, free applications like “Should I Remove It” can help guide you. MakeUseOf.com has a handy list of 10 common startup programs that can be safely disabled for (sometimes significant) performance improvements.

If your business is looking to increase productivity by running more efficient technical infrastructure, the IT Managed Services experts at MPA Networks can help. Contact us today for more information.

Digital Sticky Notes: A Time-Saver for Your Entire Team

Wednesday, February 15th, 2017

sticky-notes-938602_640

It’s a familiar sighting in the workplace: the employee with half a dozen sticky notes attached to their computer monitor. While not the most confidential or elegant solution, these employees are on to something.

Fortunately, technology has stepped in to embrace this practice and increase productivity through digital sticky notes. Teaching your staff how to use this feature helps keep your office not only more organized, but also more secure.

Boosting Productivity and Security

Like their physical counterparts, digital sticky notes have countless helpful applications: They can serve as reminders, cheat sheets, and to-do lists, to name a few.

Employees can create and destroy as many digital sticky notes as needed without wasting any paper. And digital sticky notes actually work better than making notes in a Word or Google doc, because they are continually accessible/viewable when switching between tasks.

Digital sticky notes have the following advantages over physical versions:

  • Content on the notes can be rearranged, edited, and erased at will. Reworking the list does not mean drafting a new note.
  • They serve as excellent interactive to-do listshelping employees stay organized.
  • No physical waste is created when the sticky note is no longer being used.
  • They are more secure because they’re not visible when the screen is off, the user logged out, or the system locked.
  • They come with theoretically unlimited space. Digital sticky notes allow for scrolling when more space is needed.
  • They offer an easy place to store login credentials that all employees in the workplace can access.
  • They provide a simpler platform to manage important, frequently used links than an ever-expanding bookmark list in a web browser.
  • Employees can use simple copy-and-paste commands between programs to add to the sticky note.
  • The notes facilitate email communication between devices and people.
  • They won’t fall or get knocked off the screen.

Sticky Notes with a PC

Windows calls its digital notation program “Sticky Notes.” It behaves similarly to program windows and can be accessed via the Start Menu. Searching for “Sticky Notes” in the search bar may locate the program faster.

Accessing the application will expose all existing notes; if there are none, it will create one. Users can drag and expand these digital notes to any size they deem appropriate. Click the “+” icon on an existing note to make additional notes, and click the “X” icon to delete unwanted notes. Notes can also be color-coded via the “right-click” menu. Power-users may like the available keyboard shortcuts as well.

Sticky Notes with a Mac

Macs also support a built-in digital sticky note solution called “Stickies,” which can be accessed via the “Applications” folder. Users can drag and drop the Stickies to any desired locations and resize the windows by clicking and dragging the corner icons. Employees can customize individual note colors through the “Color” menu and can add shortcuts to media files by dragging and dropping icons over notes as well.

Mac OS even features a handy keyboard shortcut to create a sticky note from highlighted text: “Command + Up Shift + Y.”

Both of these applications are free and included with the computer your employees are already using. Some employees may find digital sticky notes an incredibly valuable tool—but, if nothing else, they will help your team create a cleaner, more secure workplace. If your business is looking to boost its productivity through stronger IT practices, contact the experts at MPA Networks today.

Breathing New Life into Middle-Aged Computers

Wednesday, February 8th, 2017

monitor-23352_640

Your employees’ computers may not be up to speed anymore after two or three years of use, but in many cases your staff can upgrade or tune up these devices to keep pace with work demands. Upgrades can often be purchased and installed for under $100 a system, offering an inexpensive way to extend the life of a desktop or laptop computer.

Talk with your IT staff or your IT managed services partner to learn more about your options for addressing the classic employee complaint “My computer is too slow.”

Upgrade to Solid State Drives for Faster Loading

Outside of cost-per-gigabyte storage rates, Solid State Drives (SDDs) are a comprehensive upgrade to traditional hard disk drives. If your employees are complaining about long load times when opening programs or accessing files, an SSD upgrade can make a world of a difference. According to the manufacturer Crucial, SSDs are more durable, faster, lighter, and more energy-efficient than their disk-based predecessors.

A few years back, the opportunity cost may have been prohibitive, especially when it comes to your entire staff. But now that prices have dramatically dropped, going SSD makes financial sense.

RAM Upgrade

While CPU upgrades are usually impractical, a computer’s other main performance component often represents a simple, far-reaching upgrade option: RAM. The RAM, or the system’s main memory, handles all the active applications on the system; when it runs out, the computer has to fall back on the far slower HDD/SDD storage. However, the law of diminishing returns applies to this upgrade, and adding more memory than the computer utilizes at a maximum won’t improve performance. Your business may be able to upgrade a few computers’ RAM for free by pulling compatible modules from decommissioned, broken, or unused machines.

Newer Laptops = Fewer Upgrade-Ready Parts

Desktop computers are still the kings of upgrade-ability, but their portable counterparts can’t say the same. The industry is trending toward integrating parts together instead of in a modular configuration, so the RAM and storage may not be upgradeable on some devices. For example, as of 2015, Apple started using soldered RAM and proprietary SDDs, making upgrade-ability and repairs extremely difficult (if not impossible).

Backup and Reinstall Windows/Other Software

This tip applies specifically to Windows devices that are approaching the middle of their lifespan: Back up all important data, nuke the main hard drive, reinstall Windows, and restore all useful applications. Because of the way Windows operating systems work, a part of the code called the “registry” is changed over time with newly installed/updated applications, leading to slower performance. While newer iterations of Windows aren’t affected as badly by this problem, it still exists—and the best way to fix it is to reinstall Windows.

If you’re looking for ways to ensure employee devices keep up with workload demands, the IT experts at MPA Networks are ready to help. Contact us today to get started.

Using Snap and Split-Screen Modes for Increased Productivity

Wednesday, February 1st, 2017

microsoft-windows-23244_640

Multi-tasking wizards have a secret: Modern operating systems offer a handy technique for managing multiple windows while maximizing available screen space, significantly increasing productivity. Depending on the OS, this feature may be referred to as “snapping” or “split-screen mode.” The concept, however, remains the same: Users can quickly dock windows on both sides of their screen using simple shortcuts.

Are your employees wasting valuable seconds shuffling back and forth between windows or screens?

This window management trick can make day-to-day work smoother and more efficient.

Modern Display Shifts Make It Possible

Two major changes in our expectations of screen displays created an environment where window docking thrives. The first is a general push to make both application and web content display effectively in both landscape and portrait mode. The second is the widespread adoption of 16:9 monitors in the desktop and laptop world. This combination of factors means that users today can take a single-landscape monitor and comfortably display two applications in landscape mode at once (though it’s worth noting that this method works better on monitors with an aspect ratio wider than 16:9).

Using Windows Snap

Windows 7 first popularized this technique via the “Aero Snap” feature and now uses a retooled version for Windows 10 called “Snap Assist.” The Snap feature is easy to use via a mouse and keyboard shortcut. Mouse users can drag the window against the side of the screen to make the content automatically extend full-vertical and half-horizontal. Windows 10 expands this functionality by displaying a selection of windows to fill the other side of the screen.

The following keyboard shortcuts can then be used based on preference:

  • Ctrl+Up Arrow: Shrink to quarter-screen or expand to full-screen
  • Ctrl+Down Arrow: Un-dock or minimize window
  • Ctrl+Left Arrow: Dock window on the left-side
  • Ctrl+Right Arrow: Dock window on the right-side

Repeatedly pressing either “Ctrl+Right Arrow” or “Ctrl+Left Arrow” lets the user alternate which half-screen segment of their monitor the window occupies, which is extra-handy when using more than one screen.

Split-Screen in Mac OS

Mac OS added this feature in the El Capitan update. To activate this feature on supported apps, click and hold down the green app window corner button, then drag the window to the desired half of the screen. The operating system will display a selection of compatible apps in the free side of the screen; simply click on one to expand it to occupy the available side.

Snapping in Chrome OS

Chrome OS features a similar window management method. Dragging windows to the side of the screen will activate a gray outline that represents where the window will expand in half, quarter, third, or two-thirds orientation. Pressing either “Alt+[“ or “Alt+]” activates left-side and right-side docking respectively.

These tips are even more helpful for employees using dual- or multi-monitor configurations. If your business is looking to increase productivity through IT managed services and IT consulting, contact the experts at MPA Networks today.

An Expert’s Guide to Avoiding Phishing Scams

Tuesday, January 24th, 2017

hacker-1944673_640

Unlike most IT security threats, phishing scams attack the human element instead of the machine element. Phishing scams try to bait a person into exposing confidential information by posing as a legitimate, reputable source, typically by email or phone. Most often, the culprits seek users’ account login details, credit card numbers, social security numbers, and other personal information.

By properly educating your employees and following a handful of best practices, your business can significantly reduce the threat of phishing scams.

Here’s how:

1. Treat every request for information—whether by email, phone, or Instant Message—like a phishing scam until proven otherwise.

Meeting any request for confidential information with skepticism, regardless of how trivial it sounds, is your employees’ best defense against phishing scams. Even innocent information like a person’s first car, pet’s name, or birthday can be used to steal accounts through password recovery. Generally speaking, no professional organization or company would ever ask for personal information when contacting you—so any information request of this type is more likely to be fraudulent than real.

2. Familiarize your staff with scheduled emails for password resets.

Many companies use regularly scheduled password reset policies as a security measure; however, hackers can exploit this system to get people to hand over account login information. Your company’s best protection in this case is to familiarize employees with which services actually send out these requests. If possible, enable 2-step verification services, or avoid scheduled password changes altogether.

3. Never click a “reset password” link.

One of the easiest ways a hacker can steal information is to include a spoofed link claiming to be a password reset page that leads to a fake website. These links typically look exactly like the legitimate reset page and will take the “account name” and “old password” information the person enters. If you need to reset an account or update your information, navigate to the site manually and skip these links.

4. Never send credentials over email or phone in communication that you did not initiate.

Many sites utilize legitimate password reset emails and phone calls; however, a person has to go to the site and request it. If someone did not request a password reset, any form of contact to do so should be met with extreme skepticism. If employees believe there is a problem, they should cease the current contact thread and initiate a new one directly from the site in question.

5. Don’t give in to fear.

One common phishing scam emulates online retailers, claiming they will cancel an order because a person’s credit card information is “incorrect.” These scams rely on a sense of urgency to get a potential victim to hand over information without stopping to think. If the account really is compromised, chances are the damage is already done.

6. Report suspected phishing attempts.

Phishing attacks like this typically target more than one person in an organization, whether it be from a “mass-scale” or “spear” phishing attack. Therefore, it’s safe to assume that if one person receives a phishing email, others will, too—so contact both your company’s IT department and the organization the hackers were imitating.

If your business is looking to improve its IT security practices and avoid falling victim to phishing scams and other attacks, contact the experts at MPA Networks for help today.