Wednesday, December 21, 2011
Armando D'Accordo to speak at FEI
Wednesday, December 14, 2011
Happy Holidays from CMIT Solutions!
Twas the night of the deadline
The systems were choking
I had twelve programs open
My computer was smoking
Emails wouldn’t send
Excel wouldn’t add
My desktop had blue-screened
Someone stole my iPad
From down the hall “Just reboot it”
Someone shouted aloud
But there’s no server here
We had moved to the cloud
But then on my screen
The cursor did fly
A Log Me In session
It was the IT guy
He wiped out the virus
And patched Windows 7
Upgraded my iTunes
While Jobs smiled down from heaven
And I heard him tweet loudly
As he ended our call
“Whether Mac or PC
Happy Holidays to All”
CMIT Solutions would like to wish you a Happy & Healthy Holiday Season :)
Thursday, December 1, 2011
Please vote for CMIT Solutions of South Nassau for Long Island Press' Best of L.I. 2012 Competition!! CMIT Solutions of South Nassau can be found under the "Computer Services" category as well as the "Green Company" category.
Click the link below to vote for us!
http://vote.longislandpress.com/engine/YourSubmission.aspx?contestid=40972
We appreciate your votes & support!!
Tuesday, November 29, 2011
Protect your Data from Phishing Scams
Here is a recent example of a phishing attack associated with Verizon Wireless...
Remember:
Do not open suspicious emails. Look for misspellings, awkward requests or inconsistent grammar.
A Web site link included in an email can make getting to a Web site easy, but it can also be used to send you to a malicious Web site.
Never type sensitive personal information in a reply email.
Use spam filters to block suspicious emails.
Use anti-virus and anti-malware software to automatically detect and eliminate malicious software.
Always be cautious when opening and reading your e-mails. Most viruses and scams are covered up with names of companies you trust. Just be careful what you open and click!
Monday, November 7, 2011
Armando D'Accordo Speaking at CPA Seminar
Disaster Recovery, Business Continuity Best Practices and Compliance Issues for the Financial Profession.
This is a must attend for CPA's and Private Accountants
Limited Seating Available
$20 fee per person
2 CPE Credits
Time & Location:
November 15th, 2011
8:00am - 10:00am
Crowne Plaza Hotel
1730 North Ocean Avenue
Holtsville, NY
For More Information or to Register - Click here
Friday, November 4, 2011
Google Search Tips: Bonus Edition!
Search within a Numeric Range:
Sunday, October 30, 2011
Don't be Spooked by Zombies, Viruses, and Bot Nets!
Wednesday, October 19, 2011
MORE Tips for the Google Search Box!
Define a word -- Put that Oxford English Dictionary away. Look up definitions using Google by entering "define:word" in the search box (replace 'word' with the term you wish to define, and don't use quotes).
Track a package --
Simply enter a tracking number into the search box. This works with UPS, Fedex, DHL, and most other large shippers.
Get the weather--
Simply type "weather:nameofcity" and Google will return the forecast for the location in the search results. If you're looking for your local weather, just type "weather," and Google will determine your location based on your IP address.
Convert Measurements--
Can't recall how many gallons there are in a hogshead? Google has the answer. Also works with more conventional unit conversions, such as cups to ounces.
Search a website--
Google isn't just for searching the Web at large. You can use Google's search engine to dig into a specific URL. It's very handy for searching sites with large archives, such as news outlets. To do so, enter the keyword you wish to find, then "site:exampleurl.com" (without quotes), substituting the domain you wish to search for exampleurl.com. In this example, we're searching the New York Times for mentions of Mario Batali's Babbo restaurant.
Sunday, October 16, 2011
Technician Position for CMIT Long Island
Use the Google Search Box for More than Searching!
Sunday, October 9, 2011
Tips to Strengthen Your Email Marketing
However, even if your message has made it past the spam filter, there are still lots that can go wrong. Here are a few tips on getting the most out of your email marketing efforts.
1. Carefully consider the way you use images. In many email clients, the default settings automatically block embedded images, so don't rel solely on images to convey important information. Make sure any vital information that appears in the images (such as our phone number or other contact info) also appears elsewhere as text. Whatever you do, don't send emails that include only images or images with very little text.
2. Use a table of contents in lengthy message. If the content of the email comprises more that a few short paragraphs (for example, in an eNewsletter), include a Table of Contents so the recipient can easily locate topics of interest.
3. Test, test, test. The best way to avoid formatting errors is to view the message in as many email clients as possible, including Outlook, Outlook Express, iOS (iPhone, iPad, etc.) Thunderbird, Gmail, Yahoo!, Hotmail, and Windows Live. Set up your own unique email accounts in as many of these as possible, and send a test version of your email before releasing it to the masses. For an automated method of doing this, consider using a tool like Campaign Monitor.
4. Don't forget to include a Call to Action. You don't want your recipient merely to contemplate the content of your message. You want them to DO SOMETHING! Whether that action is to call you, email you, or visit your website, now is not the time for modesty. Ask and you shall receive!
Wednesday, September 28, 2011
Rethinking the "Never Reply to Spam" Rule
The best practice is to have a robust spam filter in place like CMIT's Anti-spam to keep unwanted messages from clogging your inbox. However, for those message that sneak through, you may wish to consider an alternative course of action, so long as the spam messages meet certain criteria.
The main question to ask is, "Is the message from a legitimate company?" Sometimes the answer is difficult to ascertain, but if it's trying to sell you diet pills or any kind of "enhancements," just ignore it. Companies that send mass emails are required, as part of the CAN-SPAM Act of 2003, to include an opt-out link in every message, and to comply with such requests from recipients. Some companies even go as far as to use a third-party service, such as Safe Unsubscribe, to handle opt-out requests without revealing the requestor's email address to the message's sender.
So, if you find your inbox cluttered with newsletters that you no longer wish to receive or special offers from companies with which you have done business, following the unsubscribe instructions probably won't do you any harm. It's a less drastic step than blocking the sender's domain, which might prevent you from receiving legitimate emails such as order confirmations or recall notices.
Monday, September 26, 2011
Watch Out for PayPal E-mail Scam
Do Not click on any links
Check for incorrect spelling as this is a common sign that it is an e-mail scam
Delete the e-mail so you dont accidently open any links or attachments
Always be cautious when opening and reading your e-mails. Most viruses and scams are covered up with names of companies you trust. Just be careful what you open and what you click!
Thursday, September 15, 2011
5 Most Glaring Holes in Small Business IT Security
1. Backup and Disaster Recovery (BDR) - A company's electronic data is one of its most valuable and fragile assets. A shocking number of small businesses either rely on manual backups or just keep their fingers crossed. For maximum protection, a business needs not only an automated backup system (to minimize human error), but also a thoroughly tested and simple-to-implement disaster recovery plan in order to get the business back up and running.
2. Adherence to Security Protocols - Your car alarm won't give you much protection if you leave your keys on the hood. As with many security systems, the human factor is often one of the weakest links. Poor login management, shared passwords, and other shortcuts leave your computers and network open to threats. Educating your staff about the importance of adhering to security measures (and making sure they do) is of utmost importance.
3. Outdated Equipment - This especially applies to network infrastructure such as routers, switches, and firewalls. Just because a device still works, doesn't mean it is working securely. As security protocols have progressed, especially in the wireless space, manufacturers have had to increase performance to keep up with increasingly complicated encryption schemes. Running older hardware makes you an easier target (and therefore more attractive) for hackers.
4. Unsecured Mobile Devices - Yes employees love the convenience of accessing their email via a smartphone, but smartphones are also easy to lose (as are laptops and USB drives). What if that device held sensitive information? Or provided a direct path into your corporate server? Again, adherence to proper security protocols is a paramount. All devices need to be protected with robust, regularly changing passwords, and all employees need to understand and adhere to a written "acceptable use" policy.
5. Lack of Cohesive IT Strategy - Most companies expand their IT infrastructure as their business grows. As such, they often find themselves with a patchwork system. Smart business owners see IT as a strategic business asset, not just a necessary evil. Investing in a coherent, well-designed IT infrastructure not only provides security and increased performance, but also does good things for your bottom line.
Tuesday, September 13, 2011
Armando D'Accordo Inducted to Merrick Kiwanis!
Monday, September 12, 2011
Happy that you still have Windows XP? So are the Hackers.
Why so popular? Its successor Windows Vista, was an utter flop. As grumblings from users and tech media grew, the business community dug in their collective heels and stuck with the tried and true XP ( it didnt help that several popular business apps initially didn't run well or at all on Vista, either). Many of those that had already switched to Vista sough to return to XP (in fact, a Google search for "downgrade from Vista to XP" still returns about 130,000 hits). So, when Windows 7 finally rolled out a few years later, many users viewed it with health skepticism, even though it has since proven itself a worthy successor to XP.
Whatever the reasons for not upgrading, if you're still running XP, you may want to consider the following:
Hackers tend to write Malware with the intent of getting it onto the most computers possible. Because of its large installed user base and less-than-cutting-edge technology, machines running XP are a prime target.
Microsoft has a habit of outing its own security exploits. Hackers pay close attention to security fixes released by Microsoft and note what holes the patches are intended to fix, many of which are not widely known. This makes any machine that is not immediately patched and updated very vulnerable.
Windows 7 was built with multiple, robust layers of security. It will run on all but the most outdated of machines.
Even Microsoft thinks you'd be a fool to keep running XP. Though they've caved to users demands to continue extended support (i.e., patching) for XP through 2014, they went through the trouble to produce an hour-long video with some of their top engineers discussing the pitfalls of continuing to use XP. See the video via our home blog.
Monday, August 29, 2011
Surviving After the Storm...
- Use a flashlight for emergency lighting. Never use candles or open flames indoors.
- When cutting up fallen trees, use caution, especially if you use a chain saw. Serious injuries can occur with these powerful machines, they may snap or break.
- Assess damage to home and contents. Photograph all damage.
- Make temporary repairs to protect the building and contents.
- Remove and discard all porous organic materials that have become visibly wet or contaminated.
- When using a generator, be sure that the main circuit breaker is off and locked out prior to starting the generator.
- Do not attempt to drive across flowing water. As little as six inches of water may cause you to lose control and two feet of water will carry away most cars.
Read more on the after the storm checklist at abc.com
Thursday, August 25, 2011
Prepare for Hurricane Irene
Hurricane Irene, a powerful Category 3 hurricane, is threatening the east coast and it looks like we may get hit hard with the storm. Lastest projections show the hurricane hitting Long Island on Sunday.
Prepare Your Technology
Be sure you have a full backup of all your important data. (both on and off-site preferably)
If you have a UPS battery (Uninterruptible Power Supplies with surge protection) be sure the unit is connected and the auto shutdown software is installed and working.
If you do not have a UPS battery on each device, we recommend shutting
down your PC's and servers if you expect, or are prone to power outages. A sudden loss of power will damage computer equipment. At the very least be sure you have surge protectors if you do not have UPS units.
We advise you to unplug your PC if you do not have a proper UPS or surger protector.
If your in flood prone area, make sure to keep all your computers and hardware off the floors.
**If you have a server and multiple PC's, it might be safest for you to shut down your office for this weekend to protect your systems. Before you take this action, please contact Armando and discuss if this is the best way to prepare for your site**
Office number: (516) 208-4161
Wednesday, August 24, 2011
Take Control of your Cellphone Camera
Its easy to fumble over functions like zoom, shutter speed, and aperture size. Fortunately, an army of apps awaits, offering tools and options to give you better control over these variables.
Hipstamatic - the $2 app gives your iPhone camera a distinctly analog feel, producing images reminiscent of cheap-o medium-format cameras like the Holga and Lomo. Hipstamatic offers a variety of lenses and film types from which to choose, including several add-on packs for an additional charge.
Camera360 Ultimate - Similar to the Hipstamatic app, but with more features and available for Android-based phones, Camera360 give you Lomo-like effects, but also adds HDR, high contrast reversal film stock simulation, tilt-shift, selective focus (on compatible hardware), alignment grids, and a timer for self-portraits. $4 from the Android store.
PicPlz - This app offers some basic filters and effects, but the real selling point is its integrated social networing capabilities including fast and simple sharing on Facebook, Twitter, Flickr, Tumblr, and Foursquare, as well as syncing with Dropbox. Available for free from the Android store.
ProHDR - Compatible with 3GS and newer iPhones, ProHDR offers superior control over the HDR default presets in the iPhone 4's native OS and also lets 3GS users in on the HDR fun. $2 in the iTunes store.
Darkroom - One of the biggest knocks against the iPhones integrated camera is poor low-light performance. Darkroom helps you snap better photos in dim situations by lessening blur cause by insufficient lighting and accidental motion. Available for iPhone only. Free from the iTunes store.
Adobe Photoshop Express - Not a camera app, per se, but a very useful (and FREE) image manipulation tool for iPhone and Android. Crop, rotate, and touch-up your images, as well as apply filters and adjust color, brightness and contrast.
Friday, August 19, 2011
Manage Your Google Gadgets!
Well we're going to show you!
Open the below Google Gadgets link in a browser window, then watch the video on how to manage your gadgets.
Google Gadgets Lab
Video: How to Manage your Google Gadgets
Thursday, August 4, 2011
CMIT Sponors StudentLifeLine
Armando D'Accordo of CMIT Solutions of South Nassau proudly sponsored Student Lifeline in their goal to protect the youth of America. Since 1988, this organization has been dedicated to providing taxi and limo services to bringing home youngsters safely.
Drunk driving continues to be the number one cause of death in this age group. Also, over 1 million children and teenagers are reported missing or abducted each year. Studentlifeline provides car rides home at no cost by sending out cards to schools, law enforcement agencies and commercial entities nationwide. If a teenager is in desperate need of a ride home, Studentlifeline is here to get them home safely.
Armando sponsored the dispersal of these free transportation service cards in the Wantagh area. The cards were distributed throughout the Wantagh school district and the local King Kullen in Wantagh.
This organized effort to keep our youth safe is a great way to decrease the occurrences of drunk drivers and missing children reports.
Wednesday, July 27, 2011
Ensuring Your Computer Works in Public
Sometimes you might want to connect your laptop in public but want to prevent sharing your machine with everyone. Sharing files and accessing printers is okay when you’re home, but there of course files or settings you might not want everyone in a public hotspot to retrieve.
Changing your security settings and file-sharing permissions each time you are in a new location, try creating a separate user account for each place, such as “Home”, “Office” or “Public”. Administrators often make a “Guest” account too, so that users can log on but don’t have access to all your files. In order to create these profiles, go to your Control Panel--User Account.
If you would like a file to be opened from all accounts, you must log in from administrator, put them in Window 7’s “Public Documents” folder (Shared Documents in XP). If you right-click on that folder, pick the option that says “Share with” and you can choose the users you would like. You can also place the files you only want to view in certain locations in the “My Documents” folder for the appropriate user profile. Then, configure accounts by logging in to each one and adjusting your setting in Control Panel. Any time you want to install new software, log in as administrator and select the “Install for All Users” option. Above all, be sure that file sharing is disabled (Control Panel--Network and Sharing Center--Advanced sharing settings). You can also protect them with a strong password on your “Public” profile. Otherwise, you can share everything on your hard drive with everyone in the same Wi-Fi network.
Wednesday, July 20, 2011
Managing Multiple Monitors
Once plugged in, Windows should recognize both monitors. If not, right click on your desktop, select "Screen Resolution" and use the "Detect" and "Identify" buttons to configure the second display. Once this is up and running, you are free to organize your windows however you please. Some people choose to keep email and chat programs open on one screen while working on a document on the other.
If you have questions about multiple monitors, feel free to call us at CMIT and we can help you decide what is the best option for you adn can help you with your hardware purchases.
Before you purchase anything however, you want to make sure that a second monitor is supported by your PC. You can do this by seeing if your computer has more than one video output. (A second one can be installed as well.) Different connections are okay—you can use both DVI and VGA, as shown in the picture below.Once plugged in, Windows should recognize both monitors. If not, right click on your desktop, select “Screen Resolution” and use the “Detect” and “Identify” buttons to configure the second display. Once this is up and running, you are free to organize your windows however you please. Some people choose to keep email and chat programs open on one screen while working on a document on the other.
You can put them in “Duplicate” mode to show the same display on both screens, or only show one monitor at a time, depending on what you are doing. Press “Windows key + P” to look through all the configurations, or view the options in the “Screen Resolution” control panel.
If you have questions about multiple monitors, feel free to call us at CMIT and we can help you decide what is the best option for you and can help you with your hardware purchases.
Wednesday, July 13, 2011
Going Digital: A Paperless Office
When PCs were revolutionizing the way businesses operated in the mid-90s, the so-called "paperless office" held the promise of eliminating the mass amounts of paper that clogged file cabinets and inboxes. It required careful organization and storage in order to keep track of everything.
The reality was much different, however. Computer crashes, software glitches, and even the occasional server-room fire necessitated maintaining hard copies of just about everything as a backup. Perhaps you recall when people used to print copies of every email "just in case." In addition, government regulations required certain industries to maintain paper archives or face consequences.
However, technological advances in data security, including reliable, redundant backup systems, along with regulatory acceptance now make the paperless office (or, less-paper office) not only a reality, but in many cases, a competitive necessity.
At a recent NYeHealth summit, Maria Trusa, executive director of the Scarsdale Medical Group, stated "In 2004 I had to convince 11 physician partners that EHR (electronic health records) was something we needed to do. The cost of running our practice was beginning to skyrocket. The staff was always looking for charts and as a result things were getting out of control. We had two full-time and two part-time employees dedicated to finding charts. And because those charts took up so much room, we were considering moving because we physically needed more space."
Trusa's group quickly needed to adopt EHRs or face the significant expense of moving to new offices, all because they were drowning in paperwork.
On a good note, you don't have to wait until there is a fiscal gun to your head to start reaping the benefits of the paperless office. Going digital will save you money, not only on physical storage space, but also on labor. No more wasting time spending hours digging through the file cabinets to track down one misplaced invoice. Even if you already conduct much of your business digitally, there is almost always opportunities for increased efficiency, convenience, and cost savings by leveraging technology.
Wednesday, June 29, 2011
Go Multimedia with Windows Live Writer
First, download the software package here.
Once you've got it installed, open Windows Live Writer, and you'll be asked which blog site you use. Choose the service you're using, or pick a new one.
We chose to create a new blog using WordPress.
Enter the login credentials for your blog into Writer, and you'll see an editing window like this:
Enter a title for the post and begin typing! If you'd like to add a link, select the "hyperlink" button on the top right corner of the editor.
Writer will automatically create the appropriate HTML code for your links.
Adding images and web video is just as simple. Choose from the "Picture" or "Video" drop-down menus below the "Hyperlink" button, and select the source. You can add media either stored on your computer or out on the web.
Alternatively, click on the "insert" tab for more media-embedding options.
Once you're ready to put it up on the web, just hit the "Publish" button, and you'll be taken to your latest post.
Congratulations! Your blog now has content!
Stay tuned for more QuickTips on how to use Windows Live Writer to get the most exposure for your business, including search-engine tools, best-practices, and social media.
Thursday, June 23, 2011
Beware of Shortened Web Links
Shortened URLs essentially condense a link so it can fit in a smaller space. This is especially ideal for sites like Twitter that restrict the number of characters used. Popular shorteners include TinyURL and Bit.ly. While it may seem helpful to abridge a link, this can also be a major security risk. Now users can’t immediately tell if they are being redirected to a faulty or infected site. We generally advise people to be wary of links in general, but shortened URLs should especially be paid attention to.
To check the legitimacy of a link, hover over it and look in the lower left corner of the screen to see if the link matches. With shortened URLs, it is impossible to complete this particular verification method. Because of this, cybercriminals are taking advantage and using these “abbreviations” as a way to spread malware. This is especially the case on various social networks, since it can appear like they are sent from friends.
If you are hesitant about a link you come across, there are a couple ways that you can check if you are being taken to a safe site. One way is to use verification sites such as AVG’s Linkscanner that can detect faulty pages behind shortened URLs. Also be sure you anti-virus software is up-to-date. This way, just in case you click on a link, your software can help protect you.