<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>internet safety &#8211; SolvereOne</title>
	<atom:link href="https://www.solvereone.com/tag/internet-safety/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.solvereone.com</link>
	<description>SolvereOne Site</description>
	<lastBuildDate>Mon, 16 May 2022 21:49:03 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>Email Security More Critical in 2022 Than Ever</title>
		<link>https://www.solvereone.com/email-security-more-critical-now-than-ever/</link>
		
		<dc:creator><![CDATA[solvereone]]></dc:creator>
		<pubDate>Mon, 02 May 2022 12:30:51 +0000</pubDate>
				<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Managed IT]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[email]]></category>
		<category><![CDATA[internet safety]]></category>
		<category><![CDATA[outlook]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">http://solvereone.com/?p=3934</guid>

					<description><![CDATA[Why Is Email Security More Critical Now than Ever With cybercrime growing more and more sophisticated, having a robust email security program in place is mandatory. There are several ways to approach email security, each with different benefits for small-to-medium sized businesses. If you are looking for an email security program for your DC-area company, [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1>Why Is Email Security More Critical Now than Ever</h1>
<p>With cybercrime growing more and more sophisticated, having a robust email security program in place is mandatory.</p>
<p>There are several ways to approach email security, each with different benefits for small-to-medium sized businesses.</p>
<p><span id="more-3934"></span></p>
<p>If you are looking for an email security program for your DC-area company, take a look at the options below and call Solvere One at (202) 905-2722 to learn more.</p>
<h2>Email Encryption for Business</h2>
<p>Encryption prevents emails from being accessed by anyone other than the sender and intended recipient.</p>
<p>You can use an encryption program to only encrypt messages that have specific content (attached files, personally identifiable information, etc.). Another option is to encrypt all of your outgoing email.</p>
<p>The challenge for most small-to-medium sized businesses is that encryption software can be complicated to the point of becoming a hindrance to efficient communication. This is why Solvere One encourages clients to apply a user-friendly email security program like Encryptics for Email.</p>
<h3>Making Email Encryption Easy</h3>
<p>Encryptics for Email can be used with Microsoft Outlook to secure communication with all recipients and senders. A simple software download is all that is needed for outside parties to have their replies encrypted. This program also allows you to subject your sent messages to certain protocols—like disallowing printing, forwarding, copying, and saving.</p>
<p>Companies whose employees work via mobile device or remote office can use Encryptics for Email just as easily, as also protects mobile communication and can function as the data security component of a broader Mobile Device Management (MDM) solution.</p>
<h2>Email Security for DC, Maryland, and Virginia Businesses</h2>
<p>Solvere One can help you determine what level and style of email security is right for your company or organization. <a href="http://solvereone.com/more/contact/" target="_blank" rel="noopener">Contact us</a> for effective email security solutions!</p>
<h3>More Network Security Solutions from Solvere One</h3>
<ul>
<li><a href="http://solvereone.com/services/virus-firewall-protection-monitoring-business/" target="_blank" rel="noopener">Virus and firewall protection and monitoring for business</a></li>
<li><a href="http://solvereone.com/services/secure-instant-messaging/" target="_blank" rel="noopener">Secure instant messaging</a></li>
<li><a href="http://solvereone.com/services/content-filtering/" target="_blank" rel="noopener">Content filtering</a></li>
</ul>
<p>&nbsp;</p>
<p><a href="http://solvereone.com/services/securitytest/" target="_blank" rel="noopener">Get a free network security review</a> from Solvere One!</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Defending Against Cryptolocker</title>
		<link>https://www.solvereone.com/defending-against-cryptolocker/</link>
		
		<dc:creator><![CDATA[solvereone]]></dc:creator>
		<pubDate>Tue, 14 Apr 2015 19:44:58 +0000</pubDate>
				<category><![CDATA[Backup/DR]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Data Backup]]></category>
		<category><![CDATA[internet safety]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">http://solvereone.com/?p=3911</guid>

					<description><![CDATA[How To Defend Against Cryptolocker Cryptolocker is just as creepy as its name sounds. This phishing scam encrypts data from your system and holds it ransom until you transfer money to the criminals behind it. And even when people do pay, they often don’t get their files back. An earlier version of Cryptolocker was demolished [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1>How To Defend Against Cryptolocker</h1>
<p>Cryptolocker is just as creepy as its name sounds. This phishing scam encrypts data from your system and holds it ransom until you transfer money to the criminals behind it. And even when people do pay, they often don’t get their files back.</p>
<p>An earlier version of Cryptolocker was demolished in 2014 but a new version has recently emerged.</p>
<p>How can you protect your company’s network from Cryptolocker? Establish protocols, update your security system, and make sure you have a strong backup system in place.</p>
<p>First, let’s take a look at how Cryptolocker gets inside your network.<span id="more-3911"></span></p>
<h2>How Does Cryptolocker Work?</h2>
<p>The Cryptolocker malware is quick, streamlined, and nefarious.</p>
<ul>
<li>The criminals behind Cryptolocker will use recognizable corporate names like Amazon and send phony delivery slips and invoices via email. Opening an attachment from these emails allows the malware to infiltrate local hard drives and mapped network drives.</li>
<li>The malware then contacts a server run by its senders. The systems exchange information and the encryption begins. Cryptolocker can encrypt every file it finds.</li>
<li>To inform the user of the virus, the malware presents a screen that tells you how much money it wants (usually anywhere from $300 to $500, accepted in bitcoin or another untraceable currency) to decrypt your files by a specific deadline.</li>
</ul>
<p>&nbsp;</p>
<p>Some companies and individuals that have chosen to pay the ransom never got their decrypted files. The best protection from Cryptolocker is prevention.</p>
<h2>How to Protect Your Network from Cryptolocker</h2>
<p>Having a solid security system in place is critical. Having staff protocols in place is priceless.</p>
<p>Behind the scenes:</p>
<ul>
<li>Make sure your antivirus software is updated. Although some experts say that antivirus is no match for Cryptolocker</li>
<li>Update your security system on time</li>
<li>Install intrusion prevention systems</li>
<li>Implement the 3, 2, 1 backup rule – Keep three copies of every important file: one original, one stored on another type of media and one stored offsite</li>
<li>Consider blocking attachments</li>
</ul>
<p>&nbsp;</p>
<p>In the office:</p>
<ul>
<li>Insist on safe computing practices – make security a priority and get buy-in from your team</li>
<li>Make sure employees know to never click a link or open an attachment from an unfamiliar or suspicious source—and to notify IT immediately if they encounter anything questionable</li>
<li>Encourage employees to increase their web browser security settings</li>
</ul>
<h2></h2>
<h2>Get MSS Support in DC, Maryland, and Virginia</h2>
<p>If you are looking for <a href="http://solvereone.com/services/managed-network-security/" target="_blank" rel="noopener">network security solutions </a>custom-designed for your business, <a title="Contact Solvere One for MSS" href="http://solvereone.com/more/contact/" target="_blank" rel="noopener">contact Solvere One today</a>!</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Keeping Employee Smartphones Secure</title>
		<link>https://www.solvereone.com/keeping-employee-smartphones-secure/</link>
		
		<dc:creator><![CDATA[solvereone]]></dc:creator>
		<pubDate>Tue, 24 Feb 2015 21:36:10 +0000</pubDate>
				<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[blackberry]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Data Backup]]></category>
		<category><![CDATA[internet safety]]></category>
		<category><![CDATA[iPhone]]></category>
		<category><![CDATA[wifi]]></category>
		<category><![CDATA[wireless security]]></category>
		<guid isPermaLink="false">http://solvereone.com/?p=3839</guid>

					<description><![CDATA[With most employees using their personal smartphones to connect with work, clients, and even conduct business, data security is critical. What can you do to keep your company data secure on employee smartphones? Smartphone Security Risks Smartphones, with all their convenience and utility, are at high risk for data breach. Common risks include: Physical theft [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>With most employees using their personal smartphones to connect with work, clients, and even conduct business, data security is critical. What can you do to keep your company data secure on employee smartphones?<span id="more-3839"></span></p>
<h2>Smartphone Security Risks</h2>
<p>Smartphones, with all their convenience and utility, are at high risk for data breach. Common risks include:</p>
<ul>
<li><strong>Physical theft</strong> – Even <a href="http://www.cnet.com/news/apple-loses-another-unreleased-iphone-exclusive/" target="_blank" rel="noopener">Apple employees leave their phones—even prototype iPhones!—unattended</a> long enough to get stolen. When a phone’s data isn’t properly encrypted, a thief, no matter how tech-savvy, can access not only the phone owner’s personal information, but company data including emails, documents, and more.</li>
<li><strong>Data theft from discarded phones </strong>– When someone gets a new phone, it’s typically easy to transfer data from their old phone to the new model. But it’s not as simple to completely erase, or wipe, data from the old phone. When data isn’t properly removed and destroyed, it is up for grabs to anyone who gets access to the device.</li>
<li><strong>Unintentional or unknowing disclosure </strong>– Smartphone apps and location services can gain access to a lot of a phone or phone user’s information. Your employee may not realize how much access they are allowing when they download an app or upload a photo while using location services.</li>
<li><strong>Phishing </strong>– It happens on desktops, laptops, tablets, and smartphones—phishing. If an employee isn’t knowledgeable about phishing scams, an attacker can access and collect a great deal of data.</li>
</ul>
<h2></h2>
<h2>How to Keep Employee Smartphones Safe</h2>
<ul>
<li>Require employees to use a password, PIN, or other means to control access to their phones. Encourage them to change the password often and keep it secret.</li>
<li>Consider requiring employees to install anti-malware and anti-virus on their phones.</li>
<li>Have your IT support set up SSL VPN access to company systems. When you establish a Secure Socket Layer virtual private network (SSL VPN), it will encrypt smartphone traffic while in transit between the device and the company network.</li>
<li>Ask your IT support team what the <a href="http://solvereone.com/services/wireless-business-network-security/" target="_blank" rel="noopener">best wireless security measures</a> are and have those measures in place.</li>
<li>If you issue company smartphones to employees, consider using device identification technology, which assigns a unique number to each phone and allows your IT support team to remotely disable the device if necessary.</li>
<li>Encourage your employees to only download applications from trusted sources, such as their phone service providers’ app stores.</li>
</ul>
<h2></h2>
<h2>Your IT Support Can Help Protect Smartphone Data</h2>
<p>Stay productive and secure with wireless security from your trusted <a href="http://solvereone.com/services/business-it-support/" target="_blank" rel="noopener">IT support team</a>. To learn more about employee smartphone security and best practices for your business, call <a href="http://solvereone.com/" target="_blank" rel="noopener">Solvere One</a> at (202) 905-2722.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Information Security on the Web</title>
		<link>https://www.solvereone.com/577-2/</link>
		
		<dc:creator><![CDATA[solvereone]]></dc:creator>
		<pubDate>Fri, 25 Jun 2010 19:00:18 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Resources]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[email]]></category>
		<category><![CDATA[internet safety]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">http://solvereone.com/?p=577</guid>

					<description><![CDATA[Information Security on the Web We all have information that we wouldn&#8217;t want shared with strangers. Keeping your personal information and passwords private is essential to avoid identity theft, protecting bank accounts &#8211; basically maintaining your personal privacy. You wouldn&#8217;t leave your bank statements lying in public view, so how can you prevent people from [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1>Information Security on the Web</h1>
<div style="background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: #ffffff; font: normal normal normal 13px/19px Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-family: Times; line-height: normal; font-size: small; padding: 0.6em; margin: 0px;">
<p>We all have information that we wouldn&#8217;t want shared with strangers. Keeping your personal information and passwords private is essential to avoid identity theft, protecting bank accounts &#8211; basically maintaining your personal privacy. You wouldn&#8217;t leave your bank statements lying in public view, so how can you prevent people from seeing your personal data stored on the Web, your personal computers and computers at work?  The best way to prevent unwanted eyes from seeing your sensitive data is to know where and when it is safe to digitally store your personal information.</p>
<p><strong>Social Networking</strong></p>
<p>First off, social networks are inherently insecure.  Posting to Facebook and other social networks is not necessarily private &#8211; even if you keep your account private, people can still view comments you made on your friend&#8217;s pages (if their pages are not private). It is not hard to get around the flimsy protections put in place on these sites. Many employers use social networks to gather information about potential employees or partners. Youtube videos are not always private even though you set them as such. Although anonymous account are allowed on many websites, you are not anonymous to the web server hosting your data. Each time you visit a website, your computer’s connection information is stored in the server which can then be traced back to you. Even if you are aware of how to change privacy settings, it is best to err on the side of caution and not post personal information. Overall, the internet, and social networking in particular, is not private. Do not post private information, pictures, or any other type of data that is not meant to be seen by all.</p>
<p><strong>Email Safety</strong></p>
<p>Recently, there have been increased attempts by malicious companies and individuals to get through spam filters.  You may have seen emails from friends or family that contain advertisements. In the past few weeks, Yahoo, Hotmail, and Gmail account credentials have been stolen and then used to send spam emails to the contact lists of those accounts. This is a innovative way to get you to open spam mail, as you will see the message as coming from a trusted source.</p>
<p>If your email account is compromised you will need to take swift measures to protect yourself.  First and most importantly, change the password to your email account and make sure you use a secure password (we recommend a minimum of 8 characters containing letters, numbers, symbols, and capitals).  Next run a malware scan program (like Malwarebytes) on the computers you use to access the compromised account. Malware is often designed to harvest passwords and personal information from your computer, so if you don&#8217;t get rid of it the attackers will be able to compromise you again.  While there is certainly cause for alarm, there is no need to panic; most often passwords are compromised by hackers stealing them main authentication database of your email provider.</p>
<p>Do not open attachments in emails unless you know the source and know that it is not malicious. It never hurts to email the sender back and confirm that the attachment is legitimate. Also be careful of links that you receive in emails. If you hover the mouse over a link such as this <a href="http://yahoo.com" target="_blank" rel="noopener">http://google.com</a> you will notice that the link may not be what it seems. The true link is the one displayed when you hover your mouse over the blue text.</p>
<p><strong>What Can Be Done to Protect your Information?</strong><br />
Be careful supplying personal information to anyone on line. Unless you trust a site, don&#8217;t give your address, password, or credit card information. Look for indications that the site uses SSL to encrypt your information (if they do the URL will start with https:// &#8211; notice the s). Although some sites require you to supply your social security number (such as those associated with financial transactions for loans or credit cards), be especially wary of providing this information online. A final method of attack is through browser cookies which temporarily store data so that you don&#8217;t have to keep typing in your info over and over. If an attacker can access your computer, he or she may be able to find personal data stored in cookies. However, you can limit the use of cookies with just a few simple changes to your browser settings. Be careful which websites you visit; if it seems suspicious, leave!  The longer you linger the more time malicious individuals have to compromise your computer.   Finally be diligent about keeping your virus definitions up to date, scanning your computer for spyware regularly, and make sure you have the latest security patches from the manufacturer.</p>
</div>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
