Tips Archives - Les Olson IT https://lesolson.redpeppersoftware.net/blog/tag/tips/ Your Office Technology Partner Thu, 26 Jan 2023 22:41:02 +0000 en-US hourly 1 https://wordpress.org/?v=6.1.6 https://lesolson.redpeppersoftware.net/wp-content/uploads/2021/11/cropped-LO_ITfavicon-1-1-32x32.png Tips Archives - Les Olson IT https://lesolson.redpeppersoftware.net/blog/tag/tips/ 32 32 Compliance with the FTC Safeguard Rules Deadline – 9 New CyberSecurity Standards https://lesolson.redpeppersoftware.net/blog/ftc-safeguards-rules-for-cybersecurity-compliance/ Wed, 28 Dec 2022 16:20:26 +0000 https://lesolson.com/?p=17454 Business compliance with the upcoming FTC Safeguards Rules deadline! Nine new standards for cybersecurity and why they are crucial for consumer privacy and data security.

The post Compliance with the FTC Safeguard Rules Deadline – 9 New CyberSecurity Standards appeared first on Les Olson IT.

]]>
[cz_image id=”cz_89327″ image=”17457″][/cz_image]

 

Date: December 28, 2022
By Barry Preusz
Edited and reviewed by Michael Moorehead, Senior MIT Engineer Lead, PCSNA, CCNA, MCSA, CSIS, CSCP, CIOS, CSSS, CCAP, CLNP

 

The Federal Trade Commission (FTC) develops and deploys regulations and rules to thwart the onslaught of cybercrime and data security breaches. The FTC accomplishes its cybersecurity mission by imposing protective standards upon businesses that collect and store consumer data. This blog article will offer an overview of cyberfraud and the current rules governing businesses involved with collecting consumer data. The article will also present proposed solutions to protect consumer privacy and maintain the security of customer information.

What businesses do the cyber protection rules affect?

The scope of financial institutions subject to this law consists of businesses undertaking certain monetary activities rather than how others may categorize the company. These financial institutions must fall under the jurisdiction of the FTC. They cannot be subject to another regulatory authority falling under the Gramm-Leach-Bliley Act (GLBA), 15 U.S.C. Section 6805. The companies affected by these rules include businesses engaged in transactions and customer data collection.


List of Businesses Required to Implement FTC Safeguard Rules

  • Mortgage lending
  • Payday loans
  • Financing
  • Accounting
  • Check cashing
  • Wire transfers
  • Collections
  • Credit counseling
  • Financial advising
  • Tax preparation
  • Investment advising (not registered with the SEC)
  • Credit unions (not FDIC insured)
  • Companies that bring buyers and sellers together to complete a transaction
  • Financial institutions and other businesses that record, use, and maintain information or connect to a system containing customer information, including industrial/process controls systems, telephone switching and private branch exchange systems, and environmental controls systems1
  • Retailers who extend layaway, deferral payment plans, or accept payment terms utilizing credit cards issued by other institutions do not fall under the provisions of these rules. However, businesses that provide credit purchases through their company’s financial services or promote their own credit cards for purchases are subject to these laws2


Whom does the law protect?

The design of the law is to protect consumer privacy and personal information. Consumers include anyone who has a customer relationship with a business entity.3


Why was this FTC network security rule enacted?

Most businesses collect customer information to process payments and complete transactions. This information is then stored and often used in subsequent purchases. These records contain nonpublic personal information about the customer. This data may take on two forms, a paper record or an electronic transcription. In either form, the records are vulnerable to discovery and digital exploitation attacks. The FTC rules seek to protect consumer privacy, personal information, and financial data from known threats.

Cybercrime losses exceeded $6.9 billion in 2021 according to the Investigation’s (FBI) Internet Crime Complaint Center (IC3).4 Since 2019, the combination of phishing, vishing, smishing, and pharming constituted the highest number of incidents among the tools employed by cybercriminals. During 2021, this combination of cyber threats accounted for 323,972 incidences5 and $44,213,023 in losses.6 Ransomware losses to infrastructure entities cost nearly $50,000,000 in 2021. Healthcare and public health sectors experienced high numbers of attacks. Even government is subject to these attacks, accounting for the fifth highest target.7 The T-Mobile confirmation of one of the largest breaches of cybersecurity occurred on August 17, 2021. The T-Mobile data breech reported the confirmed loss of the social security number, name, address, date of birth and driver’s license identification numbers--all the information needed for identity theft--for 40 million customers.8

Cyber threats are rampant. Many occur without detection for an extended time. Electronic thieves constantly work to develop new ways to steal data and derive profit from criminal activity. Most disturbing are cybercriminals posing as technical support or IT professionals, offering to resolve data breach issues in an effort to further exploit and commit additional fraud and theft. The IC3 received 23,903 complaints about Tech Support Fraud from victims in 70 countries. The losses amounted to more than $347 million in 2021.9 Below is a list of common forms of cybersecurity crimes and 2021 losses.


The Cost of Cybercrimes

Cyberfraud Loss
Email Fraud $2,395,953,296
Investment $1,455,943,193
Confidence Fraud $956,039,740
Personal Data Breach $517,021,289
Real Estate $350,328,166
Tech Support $347,657,432
Non-Payment/Non-Delivery $337,493,071
Identity Theft $278,267,918
Credit Card $172,998,385
Corporate Data Breach $151,568,225
Government Impersonation $142,643,253
Advance Fee $98,694,137
Civil $85,049,939
Spoofing $82,169,806
Other $75,837,524
Lottery/Sweepstakes/Inheritance $71,289,089
Extortion $60,577,741
Ransomware *$49,207,908
Employment $47,231,023
Phishing/Vishing/Smishing/Pharming $44,213,707
Overpayment $33,407,671
Computer Intrusion $19,603,037
Intellectual Property/Copyright/Counterfeit $16,365,011
Healthcare $7,042,942
Malware/Scareware/Virus $5,596,889
Terrorism/Threats of Violence $4,390,720
Gambling $1,940,237
Shipping $631,466
Denial of Service/TDoS $217,981
**Crimes Against Children $198,950

*Regarding ransomware adjusted losses, this number does not include estimates of lost business, time, wages, files, or equipment, or any third-party remediation services acquired by a victim. In some cases, victims do not report any loss amount to the FBI, thereby creating an artificially low overall ransomware loss rate. Lastly, the number only represents what victims report to the FBI via the IC3 and does not account for victim reporting directly to FBI field offices/agents.10
**Crimes against children incur a significantly higher cost than any financial burden.


The Growth of E-commerce and Information Technology

Retail e-commerce sales rose to approximately 5.2 trillion U.S. dollars globally in 2021,11 a 17.1% growth rate12. Statista studies and projects year-over-year (YOY) growth of e-commerce. In the United States, e-commerce growth projections show an increase of 56% through 2026.13 This explosive growth utilizes information technology (IT) to help businesses expand their markets while reducing transaction costs.

Business is not the only entity benefiting from using IT. Governments also benefit by allowing consumers to pay taxes and utilities, register vehicles, and request building permits online. As the use of IT grows to serve increasing business needs, the risk of cyber security threats also grows. Malware, trojans, ransomware, DDoS attacks, spam, and viruses yielded by cyber criminals are rampant. Government laws and regulations seek to reduce consumer cyber risks by requiring businesses to “employ reasonable security measures.”14 Most often, these protective security measures experience delays and implement long after significant breaches occur. Indeed, the detection of security vulnerabilities occurs after criminal exploitation, not before.


What are the FTC Safeguard Rules?

The Safeguard Rules adopted many core concepts of the New York Department of Financial Services Cybersecurity Regulation. These new measures direct businesses to reduce the vulnerability of information to cybercriminals and impose breach notification procedures.15 Legal researchers Daniel Solove and Woodrow Hartzog assert that the FTC’s privacy laws are currently equivalent to common law rather than contract law. They further suggest that these laws should enforce privacy and stand as regulatory stipulations rather than merely policy.16 The new FTC Safeguard Rule along with other government rules on cybersecurity are not without objections; some indicate that the regulations employ an inflexible “one-size-fits-all” tactic toward data security. Therefore, additional rules enacted on January 10, 2022, provide financial institutions the flexibility to design an information security program appropriate to the size and complexity of the financial institution, the nature and scope of its activities, and the sensitivity of any customer information at issue.17

The rules require businesses, particularly financial institutions, that record consumer information to develop, implement, and maintain an information security program with administrative, technical, and physical safeguards. The security program must protect customer confidentiality and guard against unauthorized access to consumer information. The provisions provide nine standards for a rosbust information security program (ISP).

Nine Standards for CyberSecurity

  1. Appoint a qualified individual to supervise the ISP.
  2. Conduct a risk assessment.
  3. Implement security safeguards to control the identified risks, including safe information storage, encryption, multi-factor authentication, information disposal after 2-years of non-use, and maintaining a log of authorized user activity. To meet these safeguards, some IT companies offer three separate Network and Data Security Plans.
  4. Periodically monitor and test.
  5. Train staff members on security awareness. Some IT Service Companies offer FREE Cybersecurity Training.
  6. Monitor service providers.
  7. Regularly update the ISP.
  8. Develop a written incident response plan.
  9. The ISP supervisor must provide at least annually a written report to the company board of directors. The annual report must include an overall assessment of the company’s compliance, risk assessment, risk management, control decisions, test results, security events, management response, recommendations, and service provider agreements.18


When will businesses be accountable for implementing the new cybersecurity rules?

The Federal Trade Commission establishes a deadline for businesses to comply with the FTC Safeguards Rules by June 9, 2023. Announced on November 15, 2022, this date is an extension of six months over a previous deadline. The extended deadline offers businesses more time to assess their data vulnerabilities and put the nine standards of information security in place.19


Future Cybersecurity Measures

Besides the government, many individuals and organizations are active in developing solutions to global cybersecurity issues. Proposals for future measures to protect consumers from privacy and data breaches include the following six proposals.

  1. Develop cybersecurity partnerships that share information on prospective threats.20
  2. Develop a cybersecurity knowledge graph to construct a knowledge base for increased cybersecurity situation awareness and intrusion detection.21 & 22
  3. Develop a web-based blockchain-enabled cybersecurity awareness system23 & 24
  4. Employ an unsupervised deep learning technology like an Auto Encoder (AE) or a Restricted Boltzmann Machine (RBM). 25
  5. Engage governments under binding international treaties to enact and enforce cybersecurity laws, particularly China and Russia.26
  6. Stimulate regulations of cybersecurity within the European Union through the Cybersecurity Resilience Act.27


Summary

Privacy and security threats are not going away. Businesses cannot rely on government legislation to curb the tide of data security breaches. Implementation of the nine standards for consumer privacy and information security included in the FTC Safeguard Rules will help protect against known network vulnerabilities. The above proposed security measures may also contribute to stemming data theft. The starting point for most businesses is to implement a Comprehensive Network Analysis. From this point, the development of a strong security plan follows to comply with federal rules and to protect consumers.



Footnotes




The post Compliance with the FTC Safeguard Rules Deadline – 9 New CyberSecurity Standards appeared first on Les Olson IT.

]]>
Cybersecurity in the Home https://lesolson.redpeppersoftware.net/blog/cybersecurity-in-the-home/ Mon, 31 Oct 2022 20:19:17 +0000 https://lesolson.com/?p=17412 In this increasingly wireless world, the steps households should take in terms of cybersecurity have changed. Most homes now run networks of devices linked to the internet, including computers, gaming systems, TVs, tablets, and smartphones that access wireless networks.

The post Cybersecurity in the Home appeared first on Les Olson IT.

]]>
[cz_image id=”cz_13705″ image=”17416″][/cz_image]
[cz_gap height_tablet=”8px” height_mobile=”7px”]
[cz_title id=”cz_42365″]

3 Steps Households can take

The COVID-19 pandemic forced millions of Americans to embrace working from their own home; a concept they had limited or no experience with at the time. And while many employees have returned to the office, a recent University of Chicago study found that 72% of those workers surveyed would like to continue working from home for at least 2 days a week, and 32% said they would like to work from home permanently. In this new reality, having your household safe and secure from cyber threats needs to be a top priority.

 

In this increasingly wireless world, the steps households should take in terms of cybersecurity have changed. Most homes now run networks of devices linked to the internet, including computers, gaming systems, TVs, tablets, and smartphones that access wireless networks. Thus, having the right tools in place will instill confidence that your family members can use the internet safely and securely for personal and work-related endeavors.

 

Below are 3 steps households can take to better protect themselves against cyber-attacks:

 

[/cz_title]

[cz_gap height_tablet=”8px” height_mobile=”7px”]
[cz_image id=”cz_106228″ image=”17399″][/cz_image]
[cz_title id=”cz_24917″]

Secure Your Wireless Router

Using a wireless router is an increasingly convenient way to allow multiple devices to connect to the internet from different areas of your home. However, unless your router is secure, you risk the possibility of individuals accessing information on your computer, and worse, using your network to commit cybercrimes. Needless to say, all wireless devices using this router are vulnerable if your router is not protected.

 

Some simple ways to secure this piece of hardware include changing the name of your router. The default ID is typically assigned by the manufacturer, so changing your router to a unique name that won’t be easily guessed by others is a simple way to keep your router protected. Another important step is changing the preset passphrase on your router. Leaving the default password in place makes it significantly easier for hackers to access your network. In fact, according to  NCA’s 2021 Oh Behave! Report, only 43% of participants reported creating long and unique passwords for their online accounts “very often” or “always”. Additionally, almost a third (28%) stated that they didn’t do this at all. Embracing unique and strong passwords is a huge and simple step to securing your home from all types of cyber threats.[/cz_title]

[cz_gap height_tablet=”8px” height_mobile=”7px”]
[cz_image id=”cz_48022″ image=”17400″][/cz_image]
[cz_title id=”cz_67663″]

Install Firewalls and Security Software On All Devices

Firewalls are essential because they help keep hackers from using your device which otherwise could result in your personal information being sent out without your permission. They guard and watch for attempts to access your system while blocking communications with sources you don’t permit. Installing a firewall on wireless routers is a necessity. Furthermore, make sure all devices that are connected to the wireless network have security software systems installed and updated. Many of these gadgets have automatic update features, so households should make sure they are on for all available technology. The most up-to-date security software, web browsers, and operating systems are the best defense against online threats such as viruses and malware.[/cz_title]

[cz_gap height_tablet=”8px” height_mobile=”7px”]
[cz_image id=”cz_41219″ image=”17401″][/cz_image]
[cz_title id=”cz_54694″]

Back-Up All Household Data

While steps can be taken to avoid your network, devices and accounts being hacked or compromised, they can never be 100% effective. Households need to embrace backing up data, especially as it relates to important information. Users can protect their valuable work, photos, and other digital information by making electronic copies of important files and storing them safely. This can be done using cloud software in addition to manual storing devices like USBs. Regardless, storing data in an alternative location that is safe and secure provides another layer of protection.

 

Taking simple, proactive steps to keep family, friends, and yourself safe from cyber criminals inside your household should no longer be viewed as optional but rather a necessity. Between technological devices being introduced and updated at a rapid pace and employees continuing to embrace working from home in some capacity, everyone has an ethical responsibility to actively minimize the risks of breaches and attacks inside their home.

[/cz_title]

[cz_gap height_tablet=”8px” height_mobile=”7px”]
[cz_image css_position=”relative;display: table;margin:0 auto” link_type=”custom” id=”cz_103096″ image=”16120″ link=”url:http%3A%2F%2Fstaysafeonline.org%2Fcybersecurity-awareness-month%2F|target:_blank”][/cz_image]
[cz_gap height_tablet=”8px” height_mobile=”7px”]

The post Cybersecurity in the Home appeared first on Les Olson IT.

]]>
4 Tips to Keep Your Business Safe and Secure https://lesolson.redpeppersoftware.net/blog/4-tips-to-keep-your-business-safe-and-secure/ Fri, 28 Oct 2022 15:26:16 +0000 https://lesolson.com/?p=17390 Keeping information safe and secure is challenging developments for businesses of all sizes over the last few years. Expeditious shifts from in-person to online to hybrid workplaces forced companies to change, or at least reexamine, their cybersecurity practices and protocols, and far too often they weren’t prepared.

The post 4 Tips to Keep Your Business Safe and Secure appeared first on Les Olson IT.

]]>
[cz_image id=”cz_28376″ image=”17397″][/cz_image]
[cz_gap height=”40px” height_tablet=”10px” height_mobile=”10px”]
[cz_title id=”cz_110338″]

4 Tips to Keep Your Business Safe and Secure

 

Keeping information safe and secure is a challenging development for businesses of all sizes over the last few years. Expeditious shifts from in-person to online to hybrid workplaces forced companies to change, or at least reexamine, their cybersecurity practices and protocols, and far too often they weren’t prepared. In fact, according to Cyber Edge’s Cyberthreat Defense Report, 85% of organizations suffered from a successful cyberattack in 2021.

 

Now, businesses that have suffered cyberattacks along with companies that’ve been fortunate enough to avoid being a victim of breaches and hacks are looking at ways they can bolster their defenses and safeguard their data. But which plans, practices, and services should these organizations invest in?

 

Below are 4 steps businesses of all shapes and sizes can take to better protect themselves against cyber-attacks:[/cz_title]

[cz_gap height=”40px” height_tablet=”10px” height_mobile=”10px”]
[cz_image id=”cz_102562″ image=”17399″][/cz_image][cz_title id=”cz_74799″]

Identify “Crown Jewels” of Your Business 

 

Understanding what information cybercriminals are after most is essential to combating cyber-attacks. Therefore, creating an inventory list of the valuable data and assets within your organization, including manufacturer, model, hardware, and software information, is of the utmost importance. In addition, take note of who has access to important data and information while also accounting for all storage locations. This practice will ensure that business leaders have a track record of accessibility so that they know where to look in case of a vulnerability or breach.[/cz_title]

[cz_gap height=”40px” height_tablet=”10px” height_mobile=”10px”]
[cz_image id=”cz_105277″ image=”17400″][/cz_image]
[cz_title id=”cz_105770″]

Protect Assets by Updating and Authenticating

 

At the end of the day, protecting your data and devices from malicious actors is what cybersecurity is all about. To accomplish this, make sure your security software is current. Investing in the most up to date software’s, web browsers, and operating systems is one of the best defenses against a host of viruses, malware, and other online threats. Furthermore, make sure these devices have automatic updates turned on, so employees aren’t tasked with manually updating devices. Additionally, make sure all data is being backed up either in the cloud or via separate hard drive storage.

 

 

Another important way to keep your assets safe is by ensuring staff are using strong authentication to protect access to accounts and ensure only those with permission can access them. This includes strong, secure, and differentiated passwords. According to a 2021 PC Mag study, 70% of people admit they use the same password for more than one account. Using weak and similar passwords makes a hacker’s life a lot easier and can give them access to more materials than they could dream of. Finally, make sure employees are using multi-factor authentication. While this may result in a few extra sign-ins, MFA is essential to safeguarding data and can be the difference between a successful and unsuccessful breach.[/cz_title]

[cz_gap height=”40px” height_tablet=”10px” height_mobile=”10px”][cz_image id=”cz_66083″ image=”17401″][/cz_image]
[cz_title id=”cz_59373″]

Monitor and Detect Suspicious Activity

 

Companies must always be on the lookout for possible breaches, vulnerabilities, and attacks, especially in a world where many often go undetected. This can be done by investing in cybersecurity products or services that help monitor your networks such as antivirus and antimalware software. Moreover, make sure your employees and personnel are following all established cybersecurity protocols before, during, and after a breach. Individuals who ignore or disregard important cybersecurity practices can compromise not only themselves, but the entire organization. Paying close attention to whether your company is fully embracing all your cybersecurity procedures and technology is incumbent upon business leaders.

.[/cz_title]

[cz_gap height=”40px” height_tablet=”10px” height_mobile=”10px”]
[cz_image id=”cz_60998″ image=”17402″][/cz_image]
[cz_title id=”cz_63888″]

Have a Response Plan Ready

 

No matter how many safeguards you have in place, the unfortunate reality is that cyber incidents still occur. However, responding in a comprehensive manner will reduce risks to your business and send a positive signal to your customers and employees. Therefore, businesses should have a cyber incident response plan ready to go prior to a breach. In it, companies should embrace savvy practices such as disconnecting any affected computers from the network, notifying their IT staff or the proper third-party vendors, and utilizing any spares and backup devices while continuing to capture operational data.

 

 

Another important way to keep your assets safe is by ensuring staff are using strong authentication to protect access to accounts and ensure only those with permission can access them. This includes strong, secure, and differentiated passwords. According to a 2021 PC Mag study, 70% of people admit they use the same password for more than one account. Using weak and similar passwords makes a hacker’s life a lot easier and can give them access to more materials than they could dream of. Finally, make sure employees are using multi-factor authentication. While this may result in a few extra sign-ins, MFA is essential to safeguarding data and can be the difference between a successful and unsuccessful breach.[/cz_title]

[cz_gap height=”40px” height_tablet=”10px” height_mobile=”10px”]
[cz_image css_position=”relative;display: table;margin:0 auto” link_type=”custom” id=”cz_57025″ image=”16120″ link=”url:http%3A%2F%2Fstaysafeonline.org%2Fcybersecurity-awareness-month%2F|target:_blank”][/cz_image]
[cz_gap height=”55px” height_tablet=”10px” height_mobile=”10px”]
[cz_image id=”cz_63489″ image=”17219″][/cz_image]
[cz_gap height_tablet=”10px” height_mobile=”10px”][cz_title id=”cz_45205″]

Cyber Security Summit Videos are Up!

[/cz_title][cz_button title=”Watch Now!” btn_position=”cz_btn_center” text_effect=”cz_btn_txt_move_down” id=”cz_79326″ link=”url:https%3A%2F%2Flesolson.com%2Fsecuritysummit%2F|title:Security%20Summit” sk_button=”border-radius:5px;padding-left:30px;padding-right:30px;text-align:center;font-size:24px;line-height:20px;background-color:unset !important;background-image:linear-gradient(0deg,#5b0000,#ba0230);” sk_hover=”color:#ffffff;” sk_icon=”border-radius:4px;padding:10px 10px 10px 10px;margin-left:-8px;margin-right:12px;background-color:#ffffff;” alt_title=”Cybersecurity Info” alt_subtitle=”FREE FREE FREE”]

The post 4 Tips to Keep Your Business Safe and Secure appeared first on Les Olson IT.

]]>
The Anatomy of a Data Breach: What are They and What to do When You Spot One? https://lesolson.redpeppersoftware.net/blog/the-anatomy-of-a-data-breach-what-are-they-and-what-to-do-when-you-spot-one/ Mon, 17 Oct 2022 23:40:08 +0000 https://lesolson.com/?p=17354 How to spot a possible breach? The best way to stop a data breach is to stop it before it even starts. This includes taking steps from making sure passwords are long and complex to report suspicious emails. If you do suspect that you have been the victim of a breach, immediately contact your IT department or device provider to notify them and follow subsequent protocols to help them scan, detect, and remediate any issues that exist.

The post The Anatomy of a Data Breach: What are They and What to do When You Spot One? appeared first on Les Olson IT.

]]>
[cz_image id=”cz_47371″ image=”17357″][/cz_image]
[cz_title id=”cz_54269″]Arguably no phrase has dominated the tech world in the last 24 months more than the term “data breach.” From breaches that have impacted critical infrastructure like the Colonial Pipeline to hackers compromising healthcare records at UC San Diego Health, the last two years have been saturated by headlines of cybersecurity mishaps. Yet, despite the prevalence of the breach-centric news cycle, many everyday individuals may not know what exactly a data breach is, how they typically start, and why they occur.

According to IBM, the average time it takes to identify that a breach has occurred is 287 days, with the average time to contain a breach clocking in at 80 days. And with 81% of businesses experiencing a cyberattack during COVID, it is essential that individuals are familiar with the anatomy of a data breach so that they can keep their data, as well as their colleague’s and customers’ data, safe.

With that in mind, here is some helpful background on what data breaches are and why they are so problematic.[/cz_title]

[cz_title id=”cz_36093″]

What is a data breach? 

While it may seem like a complex concept, once the jargon is removed, a data breach is straightforward to explain. According to Trend Micro, a data breach is “an incident where information is stolen or taken from a system without the knowledge or authorization of the system’s owner.” And while data breaches can be the result of a system or human error, a vast majority of data breaches are the result of cyber-attacks, where a cybercriminal gains unlawful access to sensitive system data. In fact, 92% of the data breaches in Q1 2022 were the result of cyberattacks.

What kind of data can be breached?

Unfortunately, cybercriminals look to get their hands on any information that they possibly can ranging from more obvious sensitive information such as social security numbers and credit card information to more obscure data like past purchase history.

What are some of the tactics used to execute data breaches?

Cybercrime is getting more sophisticated each day. However, cyberattack tactics do not have to be cutting-edge or advanced to be very effective. Here are a few examples of popular tactics used by cybercriminals:[/cz_title]

[cz_gap height=”100px”]
[cz_service_box type=”vertical” title=”Malware” icon=”fa fa-check” id=”cz_21794″ sk_overall=”border-bottom-style:solid;border-color:#cccccc;border-top-style:solid;border-right-style:solid;border-left-style:solid;padding:30px 40px 40px 40px;border-width:3px 3px 3px 3px;margin-top:0px;” sk_title=”font-size:36px;color:#ba0230;font-weight:400;” sk_icon=”font-size:36px;color:#ba0230;” sk_icon_con=”border-bottom-style:solid;border-color:#cccccc;border-top-style:solid;border-right-style:solid;border-left-style:solid;border-width:3px 3px 3px 3px;margin-top:5px;” cz_service_box=””]Another tried-and-true method for cybercriminals is malware. Malware is malicious software that secretly installs itself on devices – often by way of a user engaging with fake links and content – and quietly gains access to the data on an individual’s device or a business network.[/cz_service_box]
[cz_service_box type=”vertical” title=”Phishing” icon=”fa fa-check” id=”cz_56040″ sk_overall=”border-bottom-style:solid;border-color:#cccccc;border-top-style:solid;border-right-style:solid;border-left-style:solid;padding:30px 40px 40px 40px;border-width:3px 3px 3px 3px;margin-top:0px;” sk_title=”font-size:36px;color:#ba0230;font-weight:400;” sk_icon=”font-size:36px;color:#ba0230;” sk_icon_con=”border-bottom-style:solid;border-color:#cccccc;border-top-style:solid;border-right-style:solid;border-left-style:solid;border-width:3px 3px 3px 3px;margin-top:5px;” cz_service_box=””]Phishing is when a cybercriminal pretends to be a legitimate party in hopes of tricking an individual into giving them access to personal information. Phishing is one of the oldest tricks in the book for cybercriminals, but it is just as effective as ever. For example, 80% of security incidents and 90% data breaches stem from phishing attempts[/cz_service_box]
[cz_service_box type=”vertical” title=”Password Attack” icon=”fa fa-check” id=”cz_43298″ sk_overall=”border-bottom-style:solid;border-color:#cccccc;border-top-style:solid;border-right-style:solid;border-left-style:solid;padding:30px 40px 40px 40px;border-width:3px 3px 3px 3px;margin-top:0px;” sk_title=”font-size:36px;color:#ba0230;font-weight:400;” sk_icon=”font-size:36px;color:#ba0230;” sk_icon_con=”border-bottom-style:solid;border-color:#cccccc;border-top-style:solid;border-right-style:solid;border-left-style:solid;border-width:3px 3px 3px 3px;margin-top:5px;” cz_service_box=””]Through password attacks, cybercriminals look to gain access to sensitive data and networks by way of “cracking” user passwords and using these credentials to get into networks and extract data from a given network.[/cz_service_box]
[cz_gap height=”100px”]
[cz_title id=”cz_81201″]

How to spot a possible breach?

 The best way to stop a data breach is to stop it before it even starts. This includes taking steps from making sure passwords are long and complex to reporting suspicious emails. If you do suspect that you have been the victim of a breach, immediately contact your IT department or device provider to notify them and follow subsequent protocols to help them scan, detect, and remediate any issues that exist.[/cz_title]

The post The Anatomy of a Data Breach: What are They and What to do When You Spot One? appeared first on Les Olson IT.

]]>
Concerned About Cyber? 4 Easy Steps for Staying Secure in 2022 https://lesolson.redpeppersoftware.net/blog/concerned-about-cyber-4-easy-steps-for-staying-secure-in-2022/ Fri, 30 Sep 2022 18:29:57 +0000 https://lesolson.com/?p=17307 Cybersecurity has become one of the biggest hot topics both inside and outside of technology circles over the last two years. From securing learning devices due to a rise in digital learning during the COVID-19 pandemic to coping with the fallout of high-profile breaches of national infrastructure such as the Colonial Pipeline, there is a seemingly endless news cycle dedicated to cybersecurity mishaps and concerns.

The post Concerned About Cyber? 4 Easy Steps for Staying Secure in 2022 appeared first on Les Olson IT.

]]>
[cz_image id=”cz_74627″ image=”17331″][/cz_image]
[cz_gap height=”30px”][cz_title id=”cz_99764″]Cybersecurity has become one of the biggest hot topics both inside and outside of technology circles over the last two years. From securing learning devices due to a rise in digital learning during the COVID-19 pandemic to coping with the fallout of high-profile breaches of national infrastructure such as the Colonial Pipeline, there is a seemingly endless news cycle dedicated to cybersecurity mishaps and concerns.

 

And with this onslaught of negative news, it can be easy for everyday individuals to become overwhelmed and feel powerless in the face of the “insurmountable” threats posed by cybersecurity. But nothing could be further from the truth.

 

With all the jargon that is typically thrown around in relation to cybersecurity, there is a longstanding misperception that cybersecurity is beyond everyday people and that it should be left to professionals. Moreover, there is a prevailing sense among the public that breaches are simply a fact of life and that we should just learn to deal with them. But this just isn’t true. In fact, everyday people have a huge role to play in cybersecurity threat prevention, detection, and remediation. For example, according to IBM, 95% of breaches have human error as the main cause. Therefore, everyday day technology users are very much the first line of defense when it comes to thwarting cybercrime. Unfortunately, though, many individuals are not aware of some of the best practices for boosting cybersecurity and how easy they are to use.

 

With that, here are a few key best practices that everyday people can implement today to enhance their own cybersecurity and create a more secure world for everyone.[/cz_title]

[cz_gap height=”100px”]
[cz_gap height=”25px” height_tablet=”10px” height_mobile=”10px”][cz_image parallax_h=”true” parallax=”-6″ image=”17315″ id=”cz_57663″ sk_css=”padding-right:30px;margin:0 auto;position:relative;”][/cz_image]
[cz_gap height=”40px” id=”cz_13892″ height_tablet=”30px”][cz_title bline=”cz_line_after_title” smart_fs=”true” id=”cz_36977″ sk_lines=”background-color:#ba0230;width:60px;top:0px;”]Watch out

For Phishing

[/cz_title][cz_gap height=”30px” id=”cz_58641″]

Phishing – when a cybercriminal poses as a legitimate party in hopes of getting individuals to engage with malicious content or links – remains one of the most popular tactics among cybercriminals today. In fact, 80% of cybersecurity incidents stem from a phishing attempt. However, while phishing has gotten more sophisticated, keeping an eye out for typos, poor graphics and other suspicious characteristics can be a tell-tale sign that the content is potentially coming from a “phish.” In addition, if you think you have spotted a phishing attempt be sure to report the incident so that internal IT teams and service providers can remediate the situation and prevent others from possibly becoming victims.

[cz_gap height=”100px”]
[cz_gap height=”40px” id=”cz_13892″ height_tablet=”30px”][cz_title bline=”cz_line_after_title” smart_fs=”true” id=”cz_78857″ sk_lines=”background-color:#ba0230;width:60px;top:0px;”]Update your Passwords or Use

a Password Manager

[/cz_title][cz_gap height=”30px” id=”cz_58641″]

Having unique, long, and complex passwords is one of the best ways to immediately boost your cybersecurity. Yet, only 43% of the public say that they “always” or “very often” use strong passwords. Password cracking is one of the go-to tactics that cybercriminals turn to access sensitive information. And if you are a “password repeater,” once a cybercriminal has hacked one of your accounts, they can easily do the same across all your accounts.

One of the biggest reasons that individuals repeat passwords is that it can be tough to remember all the passwords you have. Fortunately, by using a password manager, individuals can securely store all their unique passwords in one place. Meaning, people only must remember one password. In addition, password managers are incredibly easy to use and can automatically plug-in stored passwords when you visit a site.

[cz_gap height=”25px” height_tablet=”10px” height_mobile=”10px”][cz_image parallax_h=”true” parallax=”6″ image=”17320″ id=”cz_62832″ sk_css=”padding-left:32px;margin:0 auto;position:relative;”][/cz_image]
[cz_gap height=”100px”]
[cz_gap height=”25px” height_tablet=”10px” height_mobile=”10px”][cz_image parallax_h=”true” parallax=”-6″ image=”17325″ id=”cz_47699″ sk_css=”padding-right:30px;margin:0 auto;position:relative;”][/cz_image]
[cz_gap height=”40px” id=”cz_13892″ height_tablet=”30px”][cz_title bline=”cz_line_after_title” smart_fs=”true” id=”cz_52772″ sk_lines=”background-color:#ba0230;width:60px;top:0px;”]Enable

Multi-Factor Authentication

[/cz_title][cz_gap height=”30px” id=”cz_58641″]

Enabling multi-factor authentication (MFA) – which prompts a user to input a second set of verifying information such as a secure code sent to a mobile device or to sign-in via an authenticator app – is a hugely effective measure that anyone can use to drastically reduce the chances of a cybersecurity breach. In fact, according to Microsoft, MFA is 99.9 percent effective in preventing breaches. Therefore, it is a must for any individual that is looking to secure their devices and accounts.

[cz_gap height=”40px” id=”cz_13892″ height_tablet=”30px”][cz_title bline=”cz_line_after_title” smart_fs=”true” id=”cz_62625″ sk_lines=”background-color:#ba0230;width:60px;top:0px;”]Activate

Automatic Updates

[/cz_title][cz_gap height=”30px” id=”cz_58641″]

Making sure devices are always up-to-date with the most recent versions is essential to preventing cybersecurity issues from cropping up. Cybersecurity is an ongoing effort, and updates are hugely important in helping to address vulnerabilities that have been uncovered as well as in providing ongoing maintenance. Therefore, instead of trying to remember to check for updates or closing out of update notifications, enable automatic update installations whenever possible.

[cz_gap height=”25px” height_tablet=”10px” height_mobile=”10px”][cz_image parallax_h=”true” parallax=”6″ image=”17320″ id=”cz_37090″ sk_css=”padding-left:25px;margin:0 auto;position:relative;”][/cz_image]
[cz_gap height=”100px”]
[cz_image id=”cz_19172″ image=”17219″][/cz_image]
[cz_gap height_tablet=”10px” height_mobile=”10px”][cz_title id=”cz_75729″ cz_title=””]

Learn even more about Cybersecurity

with industry professionals

[/cz_title][cz_gap height_tablet=”10px” height_mobile=”10px”][cz_button title=”Security Summit Overview” btn_position=”cz_btn_center” text_effect=”cz_btn_txt_move_down” id=”cz_77690″ link=”url:https%3A%2F%2Flesolson.com%2Fsecurity-summit%2F|title:Security%20Summit” sk_button=”font-size:24px;text-align:center;line-height:20px;background-color:transparent;background-image:linear-gradient(0deg,#5b0000,#ba0230);padding:20px 30px 35px;border-radius:5px;” sk_hover=”color:#ffffff;” sk_icon=”border-radius:4px;padding:10px 10px 10px 10px;margin-left:-8px;margin-right:12px;background-color:#ffffff;” alt_title=”Register” alt_subtitle=”FREE FREE FREE” cz_button=””]

[cz_gap height=”100px”]
[cz_gap height=”100px”]

The post Concerned About Cyber? 4 Easy Steps for Staying Secure in 2022 appeared first on Les Olson IT.

]]>
Les Olson IT Announces Commitment to Growing Global Cybersecurity Success by Becoming a Cybersecurity Awareness Month 2022 Champion https://lesolson.redpeppersoftware.net/blog/les-olson-it-announces-commitment-to-growing-global-cybersecurity-success-by-becoming-a-cybersecurity-awareness-month-2022-champion/ Wed, 28 Sep 2022 21:54:40 +0000 https://lesolson.com/?p=17296 Building on annual success Cybersecurity Awareness Month 2022 is set to highlight the growing importance of cybersecurity in our daily lives and look to empower everyday individuals and business to take cybersecurity steps by making cyber more accessible

The post Les Olson IT Announces Commitment to Growing Global Cybersecurity Success by Becoming a Cybersecurity Awareness Month 2022 Champion appeared first on Les Olson IT.

]]>
[cz_image id=”cz_106251″ image=”17297″][/cz_image][cz_gap height=”40px” height_tablet=”10px” height_mobile=”10px”]
[cz_title id=”cz_65462″]Building on annual success Cybersecurity Awareness Month 2022 is set to highlight the growing importance of cybersecurity in our daily lives and look to empower everyday individuals and businesses to take cybersecurity steps by making cyber more accessible[/cz_title]
[cz_gap height=”40px” height_tablet=”10px” height_mobile=”10px”]
[cz_title id=”cz_34924″]Les Olson IT today announced that it has signed on as Champion for Cybersecurity Awareness Month 2022. Founded in 2004, Cybersecurity Awareness Month, held each October, is the world’s foremost initiative aimed at promoting cybersecurity awareness and best practices. The Cybersecurity Awareness Month Champions Program is a collaborative effort among businesses, government agencies, colleges and universities, associations, nonprofit organizations, and individuals committed to the Cybersecurity Awareness Month theme of ‘It’s easy to stay safe online.’

 [/cz_title]

[cz_quote name=”John Huston” subname=”Corporate Managed IT Sales Manager at Les Olson IT” rating=”” quote_position=”absolute;top: calc(50% – 60px);right: calc(50% – 60px)” id=”cz_54277″ sk_name=”font-size:26px;color:#ba0230;font-weight:700;”]We are excited to bring free educational content to our community and share best practices for building a cybersecurity culture for your business.[/cz_quote]
[cz_title id=”cz_64844″]From mobile to connected home devices, technology is becoming more intertwined with our lives every day. And while the evolution of technology is moving at the speed of sound, cybercriminals are working just as hard to find ways to compromise technology and disrupt personal and business life. Cybersecurity Awareness Month aims to highlight some of the emerging challenges that exist in the world of cybersecurity today and provide straightforward actionable guidance that anyone can follow to create a safe and secure digital world for themselves and their loved ones.

 

This year, Cybersecurity Awareness Month’s main focal areas revolve around four key fundamental cybersecurity best practices:[/cz_title]

[cz_stylish_list id=”cz_27133″ items=”%5B%7B%22title%22%3A%22Recognizing%20and%20reporting%20phishing%20%22%2C%22subtitle%22%3A%22is%20still%20one%20of%20the%20primary%20threat%20actions%20used%20by%20cybercriminals%20today.%22%2C%22icon_type%22%3A%22icon%22%2C%22icon%22%3A%22fa%20czico-071-interface-1%22%2C%22icon_color%22%3A%22%23ba0230%22%7D%2C%7B%22title%22%3A%22Understanding%20the%20benefits%20of%20using%20a%20password%20manager%22%2C%22subtitle%22%3A%22and%20dispelling%20existing%20myths%20around%20password%20manager%20security%20and%20ease%20of%20use.%22%2C%22icon_type%22%3A%22icon%22%2C%22icon%22%3A%22fa%20czico-071-interface-1%22%2C%22icon_color%22%3A%22%23ba0230%22%7D%2C%7B%22title%22%3A%22Enabling%20multi-factor%20authentication%22%2C%22subtitle%22%3A%22on%20personal%20devices%20and%20business%20networks.%20%22%2C%22icon_type%22%3A%22icon%22%2C%22icon%22%3A%22fa%20czico-071-interface-1%22%2C%22icon_color%22%3A%22%23ba0230%22%7D%2C%7B%22title%22%3A%22Installing%20updates%20on%20a%20regular%20basis%22%2C%22subtitle%22%3A%22and%20turning%20on%20automated%20updates.%22%2C%22icon_type%22%3A%22icon%22%2C%22icon%22%3A%22fa%20czico-071-interface-1%22%2C%22icon_color%22%3A%22%23ba0230%22%7D%5D” sk_icons=”font-size:36px;” sk_overall=”padding-left:2em;”]
[cz_gap height=”30px” height_tablet=”10px” height_mobile=”10px”][cz_title id=”cz_20387″]Now in its 19th year, Cybersecurity Awareness Month continues to build momentum and impact with the goal of providing everyone with the information they need to stay safer and more secure online. Les Olson IT is proud to support this far-reaching online safety awareness and education initiative which is co-led by the National Cyber Security Alliance and the Cybersecurity and Infrastructure Agency (CISA) of the U.S. Department of Homeland Security.

 

For more information about Cybersecurity Awareness Month 2022 and how to participate in a wide variety of activities, visit staysafeonline.org/cybersecurity-awareness-month/. You can also follow and use the official hashtag #BeCyberSmart on social media throughout the month.[/cz_title]

[cz_gap height=”35px” height_tablet=”10px” height_mobile=”10px”]
[cz_title id=”cz_100357″ cz_title=””]

About Les Olson IT Security Summit Event

Save the Date for our Les Olson IT Cybersecurity Summit. October 12th in honor of Cybersecurity Awareness Month. We have a passion for security and want our families, communities, and businesses to be protected. The threat landscape is always changing and we’ve put together a strong lineup of experts in their fields to share with our local business leaders the vision of what they can do to lead with cybersecurity in mind. The event will be tailored to business executives no matter their skill level in IT, but IT leadership will benefit as well. Registration is open now for both virtual an in person attendance. I Hope to see you there. For more information, visit https://lesolson.redpeppersoftware.net/security-summit/[/cz_title]

[cz_gap height=”35px” height_tablet=”10px” height_mobile=”10px”]
[cz_title id=”cz_74109″]

About Cybersecurity Awareness Month

 

Cybersecurity Awareness Month is designed to engage and educate public- and private-sector partners through events and initiatives with the goal of raising awareness about cybersecurity to increase the resiliency of the nation in the event of a cyber incident. Since the Presidential proclamation establishing Cybersecurity Awareness Month in 2004, the initiative has been formally recognized by Congress, federal, state, and local governments, and leaders from industry and academia. This united effort is necessary to maintain a cyberspace that is safer and more resilient and remains a source of tremendous opportunity and growth for years to come. For more information, visit staysafeonline.org/cybersecurity-awareness-month/[/cz_title]

[cz_gap height=”35px” height_tablet=”10px” height_mobile=”10px”]
[cz_title id=”cz_95862″]About National Cybersecurity Alliance

The National Cybersecurity Alliance is a non-profit organization on a mission to create a more secure, interconnected world. We advocate for the safe use of all technology and educate everyone on how best to protect ourselves, our families, and our organizations from cybercrime. We create strong partnerships between governments and corporations to amplify our message and foster a greater “digital” good. National Cybersecurity Alliance’s core efforts include Cybersecurity Awareness Month (October); Data Privacy Week (Jan. 24-28th); and Cybersecure My Business™, which offers webinars, web resources, and workshops to help businesses be resistant to and resilient from cyberattacks. For more information, please visit https://staysafeonline.org.[/cz_title]

The post Les Olson IT Announces Commitment to Growing Global Cybersecurity Success by Becoming a Cybersecurity Awareness Month 2022 Champion appeared first on Les Olson IT.

]]>
Prioritizing Cybersecurity in a Hybrid Workplace https://lesolson.redpeppersoftware.net/blog/prioritizing-cybersecurity-in-a-hybrid-workplace/ Fri, 22 Oct 2021 14:56:16 +0000 http://lesolson.com/?p=16174 These are just a few simple steps towards achieving the best online safety possible. Staying safe online is an active process that requires constant overseeing at every stage - from purchasing and setting up a device, to making sure that your day-to-day activities are not putting anyone at risk. By following these steps, you are doing your part to keep yourself and your company safe from malicious online activity.

The post Prioritizing Cybersecurity in a Hybrid Workplace appeared first on Les Olson IT.

]]>
[cz_image id=”cz_39726″ image=”16175″][/cz_image][cz_gap height=”28px”]
[cz_title id=”cz_95491″]

Week 4: Prioritizing Cybersecurity in a Hybrid Workplace

 

Currently, employees are more connected than ever. The hybrid workplace is here to stay, and for employees, this means relying on connected devices from their home office setups. According to recent data, smart home systems are set to rise to a market value of $157 billion by 2023, and the number of installed connected devices in the home is expected to rise by a staggering 70% by 2025. In this new normal where smart devices and consequently online safety are a must, here are some tips for securing those devices.

 

Remember Smart Devices Need Smart Security

Make cybersecurity a priority when purchasing a connected device. When setting up a new device, be sure to set up the privacy and security settings on web services and devices, bearing in mind, that you can limit who you are sharing information with. Once your device is set up, remember to keep tabs on how secure the information is that you store on it, and to actively manage location services so as not to unwittingly expose your location.

 

Put Cybersecurity First in Your Job

Make cybersecurity a priority when you are brought into a new role. Good online hygiene should be part of any organizations onboarding process, but if it is not, then take it upon yourself to exercise best practices to keep your company safe. Some precautions include performing regular software updates, and enabling multi-factor authentication.

 

Make Passwords and Passphrases Long and Strong

Whether or not the website you are on requires it, be sure to combine capital and lowercase letters with numbers and symbols to create the most secure password. Generic passwords are easy to hack. If you need help remembering and storing your passwords, don’t hesitate to turn to a password manager for assistance.

 

Never Use Public Computers to Log in to Any Accounts

While working from home, you may be tempted to change scenery and work from a coffee shop or another type of public space. While this is a great way to keep the day from becoming monotonous, caution must be exercised to protect yourself and your company from harm’s way. Make sure that security is top-of-mind always, and especially while working in a public setting, by keeping activities as generic and anonymous as possible.

 

Turn off Wi-Fi and Bluetooth When Idle

The uncomfortable truth is, when Wi-Fi and Bluetooth are on, they can connect and track your whereabouts. To stay as safe as possible, if you do not need them, switch them off. It’s a simple step that can help alleviate tracking concerns and incidents.

 

These are just a few simple steps towards achieving the best online safety possible. Staying safe online is an active process that requires constant overseeing at every stage – from purchasing and setting up a device, to making sure that your day-to-day activities are not putting anyone at risk. By following these steps, you are doing your part to keep yourself and your company safe from malicious online activity.


[/cz_title][cz_gap height=”41px”][cz_image css_position=”relative;display: table;margin:0 auto” id=”cz_78734″ image=”16120″ css_width=”50%”][/cz_image][cz_gap height=”41px”]

[cz_image link_type=”custom” id=”cz_16225″ image=”7812″ link=”url:%2Fservices%2Fit-services%2Fnetwork-analysis%2F|||”][/cz_image]
[cz_title id=”cz_59995″ link=”url:%2Fservices%2Fit-services%2Fnetwork-analysis%2F|||”]

Get a FREE, Comprehensive Network Analysis

Let us provide a no-obligation health assessment of your computer network and business technology. We will analyze your network to identify vulnerabilities. Depending on what we uncover, we will also make suggestions on ways to augment security systems and get more out of your existing technology infrastructure.[/cz_title][cz_gap][cz_button title=”Request Your Free” btn_position=”cz_btn_block” text_effect=”cz_btn_txt_move_down” id=”cz_21447″ subtitle=”NETWORK ANALYSIS” link=”url:%2Fservices%2Fit-services%2Fnetwork-analysis%2F|||” sk_button=”font-size:18px;text-align:center;line-height:20px;background-color:#ba0230;padding-right:30px;padding-left:30px;border-radius:0px;” sk_hover=”color:#ffffff;background-color:#e8283b;” sk_subtitle=”font-size:17px;color:rgba(255,255,255,0.6);font-weight:400;” sk_icon=”border-radius:4px;padding:10px 10px 10px 10px;margin-left:-8px;margin-right:12px;background-color:#ffffff;”]

The post Prioritizing Cybersecurity in a Hybrid Workplace appeared first on Les Olson IT.

]]>
Struggling to Find Time to Run your Business https://lesolson.redpeppersoftware.net/blog/does-running-your-business-take-time-away-from-you-actually-doing-your-business/ Mon, 30 Aug 2021 16:30:24 +0000 http://lesolson.com/?p=15999 When you start your new business, it seems almost impossible to walk away from it. Initially, you are energetic enough to give 100% to your business and work tirelessly for it. However, over time you realize that your life is revolving around hectic tasks and business management, and you are not reaping the rewards you were hoping for.

The post Struggling to Find Time to Run your Business appeared first on Les Olson IT.

]]>
[cz_image id=”cz_78464″ image=”15997″][/cz_image]
[cz_gap][cz_title id=”cz_95301″ cz_title=””]

When you start your new business, it seems almost impossible to walk away from it. Initially, you are energetic enough to give 100% to your business and work tirelessly for it. However, over time you realize that your life is revolving around hectic tasks and business management, and you are not reaping the rewards you were hoping for.

Today we will discuss whether running your business takes time away from doing your business. This article also covers the importance of seeking professional help so you will be able to nurture other parts of your life and maintain balance.

 Let’s see why it is so important to get away from your business and let the professionals work on your behalf!

 

1. You Get Time to Think About How to Add Innovation to Your Business

It is an obvious fact that you may lose your innovation while handling numerous tasks without getting any free time. Moreover, you do not find yourself in the best position to decide on where you want your business to go. It impacts the overall success of your business because the customers are actively looking for innovation and stagnation results in reducing the overall ranking of your business. As a result, your competitors may get an edge.

Remember, you are the owner of your business, and no one knows your business better than you. It is up to you to receive inspiration by thinking outside the box and introducing more innovation to your business. It is possible only when you are relaxed enough to focus and research your competitors.

 

2. You Regenerate Your Energy & Come Back with More Enthusiasm

Getting outside of your business for some time simply means that you are going to recharge your battery and regain your mental power. It also helps your brain to work more efficiently because you get some time to work on brand new ideas and do something different from the routine.

No matter how tight you are on your budget and how much time your business needs, refueling is necessary to maintain your health and overall happiness.

 

3. Taking A Break Keeps You Away from Mental Stress

When you workday and night without taking rest, it results in a stressful and anxious mental state. As a result, your brain loses all its focus, and your overall output also gets badly affected.

Keep in mind that you are the boss of your business. It is your responsibility to keep yourself in a happy mental state because the happiness of the boss impacts the performance of the employees, and they feel easy to focus on work in the presence of the boss with a light mood.

When you are in a stressful state, nothing is done which happens due to the adaptation of your parasympathetic nervous system.

 

4. Stepping Away Gives You More Insight About the Business

Have you been struggling with some problems regarding your business and not finding the right solutions? The best solution is to step away from the business for some time.

You will notice that remarkable and excellent solutions have started coming to your mind.

 

5. You Can See How Your Business Can Run Without You

Sometimes, you should go on vacation or take some break to see how your employees can manage in your absence. Remember that your presence is not important all the time and you should also give a chance to your employees to show their proficiency.

Moreover, it will also keep you fresh because the study revealed that 82% of the business owners enjoy an improvement in their mental performance after taking a break.

Just think, what is the use of money when you cannot use it for your comfort?

Well, now you have read the reasons why taking some break from the business is important, let’s see how to manage it with the help of professionals.

 


Finally, Partnering with Les Olson Company on your IT will free up more time for you all while providing a greater level of IT security


Are you looking for professionals who can manage your business on your behalf?

IT professionals at Les Olson Company are specialized to provide IT support to businesses of all sizes.

Here is how we can help you in running your business.

The Les Olson Company is your ultimate office Technology partner. Being the cost-effective alternative to in-house management, we believe in helping businesses by providing managed IT solutions, document management software, and much more.

We have an expert team of professionals who can perfectly manage IT, computer issues, cybersecurity, networking projects, Hardware, and Software.

 

The best part?

We are partnered with Sharp, HP, DocuWare, Sophos, Formax, Microsoft, and many other IT companies.

If you also want to know how our IT professionals can help your business succeed, BOOK A FREE CONSULTATION right now.

[/cz_title][cz_button title=”Get a Consultation” btn_position=”cz_btn_block” btn_effect=”cz_btn_fill_right” sk_button=”font-size:17px;color:#ffffff;font-family:Assistant;background-color:#ba0230;border-style:solid;” id=”cz_67143″ link=”url:http%3A%2F%2Flesolson.com%2Fcontact%2Frequest-quote%2F” sk_hover=”color:#ffffff;background-color:#e9283b;” cz_button=””]

[cz_gap height=”35px”]
[cz_title id=”cz_18442″]

But Don’t Take Our Word for It

We recently had a customer testimonial with our partners at Rocky Mountain Consulting Engineers. Dave talks about owners of companies having to wear several hats (Responsibilities) and needing to work tirelessly to run the businesses. We focused on the importance of professional support, and how hiring a tech company like Les Olson Company who specializes in IT can help lift the weight off so they can focus on other things. Watch it here.[/cz_title]

[cz_gap]

The post Struggling to Find Time to Run your Business appeared first on Les Olson IT.

]]>
Erase Specified Range on Your Sharp Copier https://lesolson.redpeppersoftware.net/blog/erase-specified-range-on-your-sharp-copier/ Thu, 23 Apr 2020 18:38:13 +0000 https://lesolson.com/?p=13490 Whiteout is so last decade. With your Sharp copier, you can scan documents in and select specific parts to be erased, before printing or emailing it. This is a great way to correct errors, remove sensitive information, or remove blemishes from your documents. In this article we'll walk you through the Erase Specified Range function of your Sharp copier so you can try it for yourself.

The post Erase Specified Range on Your Sharp Copier appeared first on Les Olson IT.

]]>
[cz_image id=”cz_37036″ image=”13493″][/cz_image][cz_gap height=”25px”][cz_title id=”cz_103599″]Whiteout is so last decade. With your Sharp copier, you can scan documents in and select specific parts to be erased, before printing or emailing it. This is a great way to correct errors, remove sensitive information, or remove blemishes from your documents. In this article we’ll walk you through the Erase Specified Range function of your Sharp copier so you can try it for yourself.[/cz_title][cz_title icon_before_type=”number” id=”cz_102959″ number=”1″ sk_icon_before=”font-size:25px;color:#323232;”]

Place your document face-up in the document feeder and touch the Copy button.

[/cz_title][cz_image id=”cz_69330″ image=”13497″][/cz_image][cz_title icon_before_type=”number” id=”cz_73626″ number=”2″ sk_icon_before=”font-size:25px;color:#323232;”]

Touch the Preview button. This will scan the document in and bring up a preview on your touchscreen. In this mode you can pinch and zoom to review your document, much like you would on a tablet or smartphone.

[/cz_title][cz_title icon_before_type=”number” id=”cz_18228″ number=”3″ sk_icon_before=”font-size:25px;color:#323232;”]

Touch the Edit button on the bottom of the screen. It has an icon with a photo and a pencil.

[/cz_title][cz_image css_position=”relative;display: table;margin:0 auto” id=”cz_73565″ image=”13500″][/cz_image]

[cz_title icon_before_type=”number” id=”cz_47247″ number=”4″ sk_icon_before=”font-size:25px;color:#323232;”]

Once in edit mode, select the page you want to edit by touching it, then touch the Erase Specified Range button.

[/cz_title]

[cz_image css_position=”relative;display: table;margin:0 auto” id=”cz_26862″ image=”13502″][/cz_image]
[cz_title icon_before_type=”number” id=”cz_93856″ number=”5″ sk_icon_before=”font-size:25px;color:#323232;”]

You can now zoom in on the document to the area you would like to edit, next tap on the spot where your range will start and touch the button that says “This is Start Point”.

[/cz_title]

[cz_image css_position=”relative;display: table;margin:0 auto” id=”cz_76287″ image=”13505″][/cz_image]
[cz_title icon_before_type=”number” id=”cz_30100″ number=”6″ sk_icon_before=”font-size:25px;color:#323232;”]

Tap on the spot where your range will end and touch the button that says “This is End Point”.

[/cz_title]

[cz_image css_position=”relative;display: table;margin:0 auto” id=”cz_99128″ image=”13507″][/cz_image]
[cz_title icon_before_type=”number” id=”cz_37315″ number=”7″ sk_icon_before=”font-size:25px;color:#323232;”]

You will see a box covering the area that will be erased. You can move or adjust the size of the box with the arrows at the edges of the box. Once you are happy with the placement of your erased area, touch the Execute button.

[/cz_title]

[cz_image css_position=”relative;display: table;margin:0 auto” id=”cz_19279″ image=”13509″][/cz_image]
[cz_title icon_before_type=”number” id=”cz_77984″ number=”8″ sk_icon_before=”font-size:25px;color:#323232;”]

You can erase up to four areas on a single page by specifying additional ranges, or you can touch the Exit button if you choose to only erase one.

[/cz_title]

[cz_image css_position=”relative;display: table;margin:0 auto” id=”cz_104684″ image=”13511″][/cz_image]
[cz_title icon_before_type=”number” id=”cz_64380″ number=”9″ sk_icon_before=”font-size:25px;color:#323232;”]

Touch the Edit End button

[/cz_title]

[cz_image css_position=”relative;display: table;margin:0 auto” id=”cz_103284″ image=”13515″][/cz_image]
[cz_title icon_before_type=”number” id=”cz_110408″ number=”10″ sk_icon_before=”font-size:25px;color:#323232;”]

In your final preview, you will see the section you erased has been removed. Touch the Number Pad on the top right to specify your desired number of copies. You can also select your other copy settings from this screen.

[/cz_title][cz_title icon_before_type=”number” id=”cz_106081″ number=”11″ sk_icon_before=”font-size:25px;color:#323232;”]

Touch the Start button to make your copies.

[/cz_title]

[cz_image css_position=”relative;display: table;margin:0 auto” id=”cz_82190″ image=”13517″][/cz_image][cz_image css_position=”relative;display: table;margin:0 auto” id=”cz_35812″ image=”13518″][/cz_image]
[cz_gap height=”25px”][cz_title id=”cz_39992″]That’s it! You’ll now have the same document as before, but without any information you choose to remove. Don’t forget to check our our library of helpful copier tutorial videos. You can also download and print our handy instruction sheet for the Erase Specified Range function.[/cz_title]
[cz_gap height=”60px”][cz_title id=”cz_70652″]

Get a Demo or Quote on a New Sharp Copier

[/cz_title][cz_gap]

[cz_gap][cz_button title=”Download Instructions” btn_position=”cz_btn_block” id=”cz_71131″ cz_button=”” link=”url:http%3A%2F%2Flesolson.com%2Fwp-content%2Fuploads%2F2020%2F04%2FErase-Specified-Range-Instruction-Sheet.pdf|||” sk_hover=”color:#ffffff;background-color:#323232;” icon=”fa czico-194-download”][cz_image link_type=”custom” id=”cz_63247″ image=”13522″ link=”url:http%3A%2F%2Flesolson.com%2Fwp-content%2Fuploads%2F2020%2F04%2FErase-Specified-Range-Instruction-Sheet.pdf|||”][/cz_image]

The post Erase Specified Range on Your Sharp Copier appeared first on Les Olson IT.

]]>
How to Digitize Documents with Free PaperScan App https://lesolson.redpeppersoftware.net/blog/how-to-digitize-documents-with-free-paperscan-app/ Tue, 21 Apr 2020 16:18:06 +0000 https://lesolson.com/?p=13469 With so many people working from home, digitizing documents is more important than ever. But if you don't have a scanner at home, you're out of luck, right? Wrong! DocuWare has a free mobile scanning app that works with, or independently of DocuWare. In this article, we'll discuss some of the features of the PaperScan App, and how you can use it to digitize and distribute your paper documents from home.

The post How to Digitize Documents with Free PaperScan App appeared first on Les Olson IT.

]]>
[cz_image id=”cz_34312″ image=”13475″][/cz_image][cz_gap height=”25px”][cz_title id=”cz_72401″]With so many people working from home, digitizing documents is more important than ever. But if you don’t have a scanner at home, you’re out of luck, right? Wrong! DocuWare has a free mobile scanning app that works with, or independently of DocuWare. In this article, we’ll discuss some of the features of the PaperScan App, and how you can use it to digitize and distribute your paper documents from home.

 

The PaperScan App is an incredibly handy tool that is available to download to your Apple or Android smartphone. Once you have it, you can scan documents to applications like DropBox, GoogleDrive, and DocuWare. This is a great solution to address gaps in scanning hardware across home offices since it’s free and works with, or without DocuWare. It enables you to share high-quality scans of documents with your co-workers across locations, so you can share information in real time. If you do use DocuWare, you can use PaperScan to quickly upload your documents directly to DocuWare to integrate with your current workflows.

 

Using the app is as easy as opening it on your smartphone and placing your device above the document you want to scan. PaperScan then automatically recognizes the documents, and triggers an image capture. The app will also automatically optimize the scanned image by adjusting the contrast correcting distortions, and cropping the edges so your scan looks nice and neat. You can scan all kinds of documents of any size and you’ll get great scan quality, even if the light in your home isn’t ideal. There’s even a batch scan mode, and you’ll have the ability to email, print, and AirDrop single-page documents.

 

We hope this simple and free tip helps you stay productive. If you would like information about how DocuWare can help your business manage document workflow for remote workers, check out our helpful article, or contact us.[/cz_title][cz_gap]

[cz_gap height=”60px”][cz_title id=”cz_86837″ cz_title=””]

Get a Demo or Quote on DocuWare

[/cz_title][cz_gap]

[cz_gap]

DocuWare Cloud

DocuWare Cloud is a best-in-class document management and workflow automation content services for teams and companies of any size — delivered on a multitenant cloud platform.

The post How to Digitize Documents with Free PaperScan App appeared first on Les Olson IT.

]]>