Bonza Mobile Computer Repairs | Bonzawebsites | Adwords Management


Bookmark and Share
 

Are you a Pebcac, a Picnic or a Geek?
Published October 23rd, 2010 by Roslyn Garavaglia  

His Geekiness, Wayne (our senior technician), often endearingly calls me a PEBCAC (“Problem Exists Between Chair And Computer) or sometimes a PICNIC (“Problem In Chair Not In Computer”). The acronyms imply a lack of computer savvy asserting the user is at fault when a computer problem arises. Oh, alright! I admit it, I make mistakes.

I HATE COMPUTERS! I’m not a super geek, I just know how to use one to do my job. 

Typically, errors are caused by typing in a password with the caps lock on, by an unplugged device, by hitting the wrong key and by accepting a message dialogue without reading and understanding it, by an unplugged network cable or a session timeout. And by opening an email attachment or going to a particular web page.

Innocent errors with the capacity to cause severe downtime and expense for your business!

However, the biggest human error is lack of vigilance.

The focus of this article is not whether you’re a geek, a computer power user or Pebcac, it’s about cyber security.

A couple of nights ago the 7.30 Report had a segment on cyber crime. Did you see it? Here is a link to the transcript Cyber crime on the rise!

The report mentioned some startling statistics, but failed to provide anything substantial that we haven’t heard before. You’ve heard news stories before about credit card numbers being stolen and email viruses spreading. Maybe you’ve even been a victim yourself.

One of the best defenses is understanding the risks and knowing what you can do to protect yourself against them.

What are the risks?
Viruses erasing your entire system, someone breaking into your system and altering files, someone using your computer to attack others, or someone stealing your credit card information and making unauthorized purchases. Unfortunately, there’s no 100% guarantee that even with the best precautions some of these things won’t happen to you, but there are steps you can take to minimize the risks.

What can you do?
The first step in protecting yourself is to recognize the risks and being vigilant.

General security

•Choose and Protect your Passwords and change them regularly

•Understand your Anti-Virus Software

•Understand your Firewalls

•Coordinate Virus and Spyware Defense

•Have Good Security Habits

•Safeguard Your Data with offsite backups

Attacks and threats

•Understand Hidden Threats: Corrupted Software Files

•Understand Hidden Threats: Rootkits and Botnets

•Recognize and Avoid Spyware

•Avoid Social Engineering and Phishing Attacks

•Understand Denial-of-Service Attacks

•Identify Hoaxes and Urban Legends

Email and communication

•Understand Your Computer: Email Clients

•Use Caution with Email Attachments

•Reduce Spam

•Understand Benefits and Risks of Free Email Services

•Understand Benefits of Blind Carbon Copy (BCC)

•Understand Digital Signatures

•Use Instant Messaging and Chat Rooms Safely

•Stay Safe on Social Network Sites

Mobile devices

•Protect Portable Devices: Physical Security

•Protect Portable Devices: Data Security

•Use Caution with USB Drives

•Secure Wireless Networks

•Protect Cell Phones and PDAs Against Attack

Privacy

•How Anonymous Are You?

•Protect Your Privacy

•Understand Encryption

•Effectively Erase Files

Safe browsing

•Understand Your Computer: Web Browsers

•Evaluate Your Web Browser’s Security Settings

•Shop Safely Online

•Browse Safely: Understand Active Content and Cookies

•Understand Web Site Certificates

•Understand Internationalized Domain Names

•Understand Bluetooth Technology

Software and applications

•Understand Patches

•Understand Voice over Internet Protocol (VoIP)

•Understand Risks of File-Sharing Technology

•Review End-User License Agreements

•Understand Your Computer: Operating Systems

Are you a Geek? I’m not!  I get Wayne to handle all of the above, the do-it-yourself method is not an option.

Small businesses like yours and mine, can’t operate without computers. Without an IT expert on your staff means someone else’s time is being used inefficiently to deal with computer problems. It’s imperitive you have the best security measures in place for your computer systems and a trustworthy firm giving you the best professional service and impeccable after sales service. And that’s Bonza!

Don’t wait to see which virus, hacker, spy, hard drive crash, barrage of time-wasting spam, or other problem is going to derail your business operations.

  • Call to Action:  “What would your thoughts be on having an initial conversation with us about a Systems Audit? What is your availability over the next few weeks?”

It’s easy to get started. Just pick up the phone and call 1800 280 440

Tags: , , , , , , , ,


This entry was posted on Saturday, October 23rd, 2010 at 2:44 pm and is filed under Computer Problems . You can follow any responses to this entry through the RSS 2.0 feed. Both comments and pings are currently closed.

Comments are closed.


Bonzamobilecomputerrepairs.com