Best Practices - Machado Consulting's News You Can Use | Worcester, Massachusetts | Machado Consulting

Login

Machado Consulting's News You Can Use

Welcome to our blog where you can find everything from tech-tips to keeping your data secure. Have any questions? We'd love to hear from you!

Why Does Rebooting Your PC Take Care of So Many Issues?

b2ap3_thumbnail_what_does_a_reboot_do_400.jpgWhen you call tech support, you’re probably going to get the same response every single time: “Have you tried turning it off and on again?” There’s a reason that this happens so often, and it’s because restarting your computer is a great, low-tech way to resolve some basic issues with your system. However, it’s still good to be cautious about more serious issues that a reboot won't fix. We’ll walk you through what a reboot does, and it can be effective at fixing minor issues with your PC.

Continue reading
0 Comments

Tip of the Week: 4 Brilliant Ways to Get More Work Done

b2ap3_thumbnail_productivity_tips_400.jpgThere are some workdays where distractions are abound and you can’t even remember what you’re supposed to be doing. In trying times like these, you need all the help you can get, just to stay focused and on task. Here are four simple adjustments to your work routine that have been proven to do wonders to increase productivity.

Continue reading
0 Comments

Tip of the Week: 5 Simple Ways to Stay On Top of Network Security

b2ap3_thumbnail_network_security_practices_400.jpgSecurity is a top priority in today’s business environment, especially following high-profile hacks of notable enterprises. Unfortunately, the fact of the matter is that these hacks could have been prevented if both the employees and employers of these organizations followed strict security best practices for their technology. Thankfully, it doesn’t have to be hard to teach your team how to properly use technology.

Continue reading
0 Comments

Tip of the Week: How to Uninstall Unwanted Apps and Programs in Windows 10

b2ap3_thumbnail_uninstall_programs_in_windows_400.jpgOne of the most basic functions that the average Windows user should understand is how to get rid of applications and programs that are unnecessary or potentially threatening. Previous versions of Windows made users jump through hoops to get rid of their unwanted apps and programs, but Windows 10 makes it much easier to do so. In fact, there are three easy ways to eliminate your unnecessary apps and programs.

Continue reading
0 Comments

Tip of Week: Manage Your Photo’s File Sizes to Save Disk Space

b2ap3_thumbnail_resize_images_that_you_share_400.jpgToday, just about everyone has a digital camera in their pockets, which has led to an unprecedented amount of picture taking compared to the days when photos had to be developed. Having more cameras has turned us into a more visual society, but not every amateur photographer understands how to best manage all of their photos, which causes problems.

Continue reading
0 Comments

Tip of the Week: 3 PC Best Practices You Need to Know

b2ap3_thumbnail_pc_practices_400.jpgSometimes the best thing you can do for yourself is return to the basics. For example, you can know all of the keyboard shortcuts in the world, but that doesn’t help you properly shut down your computer. Here are three tips for every computer user who wants to make sure that they’re using PC best practices.

Continue reading
0 Comments

Tip of the Week: 5 Common Sense Tactics to Safeguard Your Online Identity

b2ap3_thumbnail_anonymous_internet_use_400.jpgThe Internet can be a dangerous place thanks to the anonymity it provides. Yet, this anonymity is limited, especially if you take part in questionable Internet browsing activities. Take, for instance, the hack of Ashley Madison, a website dedicated to cheating on one’s spouse. This July, a hacker group called the “Impact Team,” infiltrated the site and is now threatening to expose these cheaters.

Continue reading
0 Comments

Tip of the Week: How to Put the Power Back into Your Laptop’s Battery

laptop battery saving tips 400A laptop with no power can be a pain, especially when it only lasts a minimal amount of time. Sometimes it feels like you can’t operate at full capacity without leaving your laptop plugged in at all times. Thankfully, you don’t have to suffer from this, and with a little bit of troubleshooting and basic PC maintenance, you can prolong the life of your laptop’s battery significantly.

Continue reading
0 Comments

Look Out: Critical Microsoft Office Flaw Finally Patched

b2ap3_thumbnail_microsoft_office_vulnerability_400.jpgDoes your office practice proper maintenance and security against the latest threats, like Sandworm and CryptoWall 2.0? You should, or else your business might get a nasty holiday gift in the form of the Schannel vulnerability in Microsoft Office. This particular threat allows a hacker to take over the entire system, making it an exceptionally dangerous vulnerability that you can’t ignore. Thankfully, a patch is available to the general public, so you want to apply it as soon as possible.

Continue reading
0 Comments

To Understand the Hacker, You Must Become the Hacker

b2ap3_thumbnail_hacker_information_400.jpgHackers are mysterious. Not much is known about them - until they get caught, at least. But until the divine hammer of justice is brought down upon them, they will continue to stalk the shadows and wait for us to unknowingly hand over our personal information. What they don't want you to know is that they generally act according to a few particular variables, and that it is possible to avoid their pitfalls.

Continue reading
0 Comments

Tip of the Week: How to Reorganize Your IT Infrastructure

b2ap3_thumbnail_get_your_it_in_order_400.jpgEveryone needs a tip occasionally. Therefore, we want to provide our followers with what we like to call, "Tips of the Week." These helpful tidbits are targeted toward helping you understand certain aspects of business technology. For our first tip, we will walk you through how to reorganize your IT infrastructure. For more tips, see our previous blog articles.

Continue reading
0 Comments

Are You Sure Your Former Employees Won’t Stab You in the Back?

b2ap3_thumbnail_former_employee_theft_400.jpgAs a business owner, you've probably had the misfortune of letting a valued (or not-so-valued) employee go. The reasons might vary, but one thing is consistent: they're gone, and could potentially use their newfound residual malice to strike your business right where it hurts. How can you prepare yourself against former employees you may have once called "family?"

Continue reading
0 Comments

Make Lasting Business Connections with LinkedIn

b2ap3_thumbnail_linkedin_for_business_400.jpgIt's no secret that social media has opened a lot of doors for businesses that may not have been there a short time ago. LinkedIn in particular has been an immensely useful tool for people looking for employment, and for employers to find prospective hires.

Continue reading
0 Comments

Prevent the Summer Heat from Roasting Your Servers with this Portable Solution

b2ap3_thumbnail_severs_get_hot_400.jpgTechnically speaking, it needs to be 158°F for a raw egg to become firm. The summer heat doesn't get that hot, but outdoor objects like sidewalks and car hoods that come in contact with it can. Thus the phrase, "It's so hot you can fry an egg on the sidewalk!" When it's hot outside, you need to keep your server units cool inside.

Continue reading
0 Comments

What is your Identity Worth to You?

Your identity has quite a lot of value, especially in the wrong hands. Security firm ZoneAlarm put together some numbers in 2011 concerning identity fraud, and it even shocked us. Let's talk about a few of these statistics and what it means.

First of all, what shocked us the most is that according to the FTC, in the United States, 9 million individuals have their identities stolen each year. Identity theft is a little different than identity fraud, however. Theft is when personal information is exposed and taken without permission. This is happening all the time by malicious software like spyware, but it can also happen when legitimate websites and services get infiltrated by cybercriminals. If a reputable online store (or even a database for a brick and mortar store) gets hacked into, your personal information can be stolen. That's identity theft.

Identity fraud is when that data is misused for financial gain. This is when things start to get very dangerous. In 2009, $56 billion dollars were accumulated by cyber criminals through identity fraud. The good news is in 2010 that number went down to "only" $37 billion. What does that mean to the average person? On average, victims of identity fraud had $4,841 dollars stolen per victim. Trouble is, the world has had to improve drastically to protect consumers from identity fraud. This means higher costs of doing business which then get reflected on prices of products and services. In other words, because of identity fraud, we all lose.

How does your data get stolen?  There are plenty of ways, but here are a few popular methods:
 

  1. Hackers can pick up credentials via public Wi-Fi and public PCs.
  2. Credit Card Skimming - a process that involves your credit card data being stolen when your credit card is swiped at a standard ATM or credit card terminal.
  3. Selling or discarding used computer equipment that isn't properly wiped can expose personal information.
  4. Hackers can infiltrate networks and databases.
  5. Dumpster diving and paper mail theft.
  6. Malware and viruses
  7. Phishing.


In almost half of reported identity theft cases, the victim knew the criminal.

What do you do if your identity is stolen?

Almost half of all reports of identity frauds are discovered by the user first, although banks and credit card companies have methods in place to stay on top of it as well. If your financial credentials are stolen, you need to contact your bank and/or credit card companies immediately, both by phone and in writing. You'll want to file a police report with details about where your identity was stolen, what you believe was or could have been stolen, and documented proof of the crime.

You don't want to risk identity fraud. Monitor your credit reports closely, shred sensitive mail and documents before throwing them away, and ensure your computers and network are running latest security updates and antivirus, as well as other security measures. For a complete review of your security, contact us at (508) 453-4700 and we will help pinpoint vulnerabilities and fill in the cracks before a costly event occurs.

Continue reading
0 Comments

Microsoft Excel Tips and Tricks

There are two kinds of Microsoft Excel users in the world: Those who make neat little tables, and those who amaze their colleagues with sophisticated charts, data analysis, and seemingly magical formula and macro tricks. You, obviously, are one of the latter—or are you? Check our list of 11 essential Excel skills to prove it—or discreetly pick up any you might have missed.

Vlookup

Vlookup is the power tool every Excel user should know. It helps you herd data that's scattered across different sheets and workbooks and bring those sheets into a central location to create reports and summaries.

 

Vlookup helps you find information in large data tables such as inventory lists.

Say you work with products in a retail store. Each product typically has a unique inventory number. You can use that as your reference point for Vlookups. The Vlookup formula matches that ID to the corresponding ID in another sheet, so you can pull information like an item description, price, inventory levels and other data points into your current workbook.

Summon the vlookup formula in the formula menu and enter the cell that contains your reference number. Then enter the range of cells in the sheet or workbook from which you need to pull data, the column number for the data point you’re looking for, and either “True” (if you want the closest reference match) or “False” (if you require an exact match).

 

Continue reading
0 Comments

Craigslist Scam

Internet fraud and scams are the fastest growing crimes in America today. Each day thousands of people fall victim to these scams. The perpetrators of these scams are almost never caught due to a number of legal boundaries authorities are not able to penetrate. One of the most useful and widely used websites ever created is a honeypot for unsuspecting fraud victims.

Craigslist can be used to find anything from appliances to apartments, but be careful, Craigslist is the home of numerous scams. One of the most common scams on Craigslist targets sellers. These scammers will usually target small electronics that are being sold. An unsuspecting person will list an item that they wish to sell. Shortly after listing the item the sell will receive an email or text message from what looks like a potential buyer. This buyer almost always offers the seller a lot more money than they are asking for the item. This should be your first red flag that something is amiss. The buyer will offer you more money with the caveat that you must ship the item, usually to their “granddaughter at college” or something similar. The buyer will offer to pay you using the online service PayPal. PayPal is a legitimate online service used for purchasing goods online without divulging your personal bank information to the third party. However, in this scam the buyer will send an email that looks just like an email one would receive from PayPal. In the email it says that your money will be released into your account when the item is received by the buyer. The email looks very convincing as it will contain your name, email address, phone number, and physical address, all of this information obtained from the scammer through simple Google searches based on any information you have given to them. In the end the unsuspecting victim mails off their iPad or laptop to the “buyer” and receives nothing in return.

When doing any sort of transactions online, the user must be cautious and aware of the sites they are putting their personal and financial information into. As long as you are careful and practice good common sense when dealing with buyers and sellers online, you should be good to go. If you run into any issues, though, Machado Consulting is always just a phone call away!

Continue reading
0 Comments

Online Job Scams

The job market hasn’t quite bounced back like we expected. It has put increased stress and urgency to find a worthwhile job. This doesn’t mean while in your search you should jump at any opportunity thrown your way. Always be aware of who is replying back stating they need someone just like you; you may be in for an unpleasant surprise.

One scam, involving fake training and a promised job, has emerged due to vulnerability of the unemployed since the recession. Normally, you would think it all sounds too good to be true, but you have bills to pay, right? This has been a problem in 2013 - 2014, and if it stays lucrative for the scammer, there’s no reason for them to disappear either. Scammers will post to Craigslist or other job sites asking to sign up for training, and upon completion, receive a guaranteed job. Do yourself a favor, take the time and research the company you’re about to invest your time into. If it sounds too good to be true, it may be just that. The scammer will ask you for your personal information and then you won’t hear from them again. And as you can see from our article on phishing scams, you do not want all your personal information in the hands of a scammer.

  • Here’s some red flags you should be aware of and what to avoid when job searching online:

  • Background checking services

  • Credit check or credit report

  • Sites where you are directed to enter your resume, bank account or credit card numbers, or other personal information

  • Sites where you are asked to sign up for a "free" trial offer

  • Sites offering fee-based training or education

  • Sites offering opportunities for making money

  • Survey or focus group sites

  • Sites designed to deliver malware or misuse your personal information

Only send information applicable to the job once you can confirm the legitimacy of the company. Always make sure you know 100% where and who you are sending your information to. Even on the job hunt, always stay on your toes! 

Continue reading
0 Comments

How to Identify a Phishing Scam

Recently there has been a lot of talk about phishing scams. But what are they really? A phishing scam is when someone contacts you for sensitive information supposedly on behalf of a reputable company. For instance, you may receive a phone call or an email from someone claiming to be from a company such as Paypal requesting information about yourself as well as your account in order to continue using their services. The scammers may do this by providing you with a link to a fake website where you are asked to enter the information. They may simply have a form embedded in an email for you to fill out. They may even directly ask for the information via phone or email.

You may be asking yourself, “Why do I care about these phishing scams?” You definitely should not brush them aside. Scammers who successfully receive this information can do a lot of harm to yourself as well as your business. When scammers get a hold of login information to an account (i.e. your online banking account) they will likely first change the password so that you cannot login and change it yourself. They will then take advantage of the access by transferring funds to their own accounts or even making purchases on your behalf using your money. These scammers can even go as far as stealing your identity which gives them endless possibilities. Once a scammer has enough information to steal your identity, they can open bank accounts, credit cards, mortgages, car loans, and many other forms of financing and they will not pay the bills. This means that all of this debt that this scammer is building up in your name, you will have to pay off whether it be monetarily or with jail time.

But how does one tell the difference between a legitimate request for information and a scammer trying to steal your identity? Phishing scams either by phone or email will almost always request sensitive information of some type in some form. These emails will all likely be addressed universally since they are sent to so many people at a time. Most companies, banks, and other financial institutions will not request such information in this manner. An easy way to avoid having this information stolen would be to simply not enter the information. The likelihood of a reputable company requesting information using a mass email blast is highly unlikely. If the company needed to contact you about your account they would address you directly.

If you think you have received a scam email, DO NOT click the links within it, do not supply any of the requested information, do not attempt to contact the sender of the email, do not open any attachments supplied with the email. Give us a call or send the email in a ticket to the Machado Consulting help desk. We can review the email and let you know whether if it is legitimate or a scam. If you think that you may have already supplied information to a scammer please let us know and we can assist you with the necessary steps to protect your account from being compromised.

Continue reading
0 Comments

Search Blog

Subscribe to Our Blog