January 2010
In this issue. . .
~ Guidelines for Safe Online Banking
~ Upcoming Event: CMR-17
~ Windows 7 "GodMode"
~ USB 3.0 Debuts

Discover "GodMode"

GodMode is a secret feature in Windows 7 that allows users access to all of the operating system's control panels from within a single folder. To access it, simply create a new folder and then rename the folder to the following: GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}

The folder's icon changes to look like a control panel and it contains many control options in one centrally located place.


Introducing USB 3.0

The new "SuperSpeed USB" 3.0 is advertised as having 10 times the data transfer rate of USB 2.0, which has been the standard for the last 8 years. It is backward compatible, meaning it can still handle previous peripherals. USB 3.0 is also more efficient than the previous version - it uses one third of the power of 2.0. HP has already begun shipping its Envy and EliteBook laptops with this technology and more will follow in upcoming weeks. Please let us know if you are interested in any of the new USB 3.0 products.


Monthly Quote

"You must be the change you wish to see in the world."

Mahatma Gandhi


Follow Us!

Integrated It Solutions is on Twitter! Follow us and be among the first to get the latest technology news, updates and special offers!

 

Guidelines for Safe Online Banking

The criminal takeover of online banking accounts has become so widespread among small and midsize businesses that experts are recommending that account holders take immediate safeguards.

The FBI, the Federal Deposit Insurance Corp. and the Federal Reserve have all issued warnings in the past two months.

The FBI says it has investigated more than 200 cases, mostly in 2008 and 2009, in which cyber-robbers carried out fraudulent transfers totaling around $100 million — and successfully stole $40 million.

Banking and tech security experts say many more cases of ACH and wire transfer fraud are going unreported primarily because the attacks are new and there are no laws protecting the rights of online business account holders, the way consumer-rights laws protect individual accounts. The result: many cases end in civil disputes in which small businesses often lose.

From a USA Today online survey, the percentage of small and midsize businesses who do not utilize the following cybercrime defenses:

Web filtering

52%

http://images.usatoday.com/_common/_images/ipr/grey.gif

Threat training

39%

http://images.usatoday.com/_common/_images/ipr/grey.gif

Anti-spam

29%

http://images.usatoday.com/_common/_images/ipr/grey.gif

Anti-spyware

22%

http://images.usatoday.com/_common/_images/ipr/grey.gif

Firewall

16%


What account holders should do:


Conduct online banking transactions only from a stand-alone PC that is never used for e-mail or Web browsing. A dedicated PC is less likely to get infected by malicious programs found everywhere on the Web.
As an alternative to dedicating a single-use PC: use IE8 or Google browsers' Privacy Mode, or a locked-down browser from Authentium, or the Ubuntu open-source browser, launched from a CD or USB memory stick.
Require your bank to fully explain its policies regarding fraud losses.
Maintain current anti-virus and anti-spyware subscriptions.
Monitor your accounts daily and report discrepancies immediately.
Stay informed about the latest threat advisories

Small businesses must understand the risks of online banking before it's too late. Again, there are no laws yet to protect online business account holders so if the bank thinks you were negligent, they are under no obligation to pay you back.


 

CMR-17 Information Security Seminar January 20th

Six million Massachusetts residents were victims of Identity Theft in the last two years.

There are a few seats remaining for our seminar. The new MA Information Security regulations (201 CMR-17) take effect March 1, 2010. Non compliance will result in significant penalties to your business and jeopardize your reputation as well as business revenue.

Who should attend: HR Representatives, Accounting, and IT professionals.

IITS will help you:

  • Assess your current level of compliance to the law
  • Develop a written Information Security program necessary for compliance
  • Evaluate your management processes: how to safeguard data
  • Recommend IT enhancements that are required

 

To reserve your place at this event, click here. Seats are limited, RSVP today!

For more info on the new regulations, visit our website.