Integrated IT Acquires New England Network Group
Integrated IT Solutions is starting 2012 off with a bang! We are pleased to announce that we have recently acquired New England Network Group (NENG). NENG is a managed IT service provider located in Peabody, MA. We have done extensive research and have found NENG to be one of the best in the industry. NENG has over 15 years of experience helping clients throughout New England use their IT investments to drive innovation, productivity and growth to achieve higher performance, greater security and larger profits.
We look forward to introducing you to the team of elite engineers joining forces with us. They come to us with multiple certifications as well as a broad range of experience across the technology spectrum. By expanding our technical knowledge base, we hope to be able to provide you with the best possible service along with the ability to meet all of your IT needs. Please help us welcome Guy Dickinson, David Ducharme, Sean Miller, Robert O'Keefe and Jeff Woodward to our team.
We are committed to providing you with the highest level of customer satisfaction possible. We know technology is constantly changing. As your needs change, we want to help you evaluate those needs and offer you the services that enable you to achieve your new goals.
Beware of a New Online Banking Fraud
A new account theft scheme has been making the rounds this past holiday season. The new online banking scam is unusual because it is executed after you exit your browser. Post transaction attacks occur after the deed has already been done and the account holder has closed the online banking session. These are designed to conceal illegitimate activity for as long as possible to either allow money to transfer to its final destination, uninterrupted, or continue to control the account and perform further transactions.
The attack unfolds over through three major steps:
- First a man-in-the-browser attack is launched on an online banking session and debit card data is captured
- Then the debit card data is used to commit fraud
- The next time the customer logs into their online banking site a post transaction attack is launched that hides fraudulent transactions from the victim and changes the transaction amount to balance the totals.
If you still receive your statement through the mail, you will see these fraudulent transactions. But with so many of us going "paperless" it may take months to detect them. This is why we advise multiple layers of security on your computers. Please make sure when you do your online banking you enable privacy mode on your browser!
Customer Satisfaction Survey - Onsite Visits
A few months ago we began attaching surveys to our help desk tickets, asking for feedback on our support. We have received a lot of positive response and have recently expanded it to include onsite visits as well.
We welcome all of you to continue providing comments and suggestions, as we are always looking for ways to improve service delivery. Thank you for taking the extra time to help us out!
Office 2010 Tip of the Month
Create Your Own Keyboard Shortcuts
Office 2010 has dozens of built-in keyboard shortcuts, but it also allows you to create your own, which can be different for each office application. To create a keyboard shortcut:
- Right-click on the ribbon and select Customize Ribbon. The options window appears.
- Click the Customize button next to Keyboard Shortcuts. A Customize Keyboard window appears.
- Choose a Tab in the left pane and a command in the right pane. Then enter a new shortcut key in the Press New Shortcut Key field. It's best to use a combination of keys that includes CTRL or ALT.