Mobile Security, Tech Trends, French Toast

June 2017 - Newsletter 

Hi there!

Welcome to the new Sagiss newsletter, we're excited to be speaking to you again! We've been busy moving to our new website, so be sure to check it out. 

One of our top priorities for 2017 is to provide you with regular technology news updates that inform and empower. Keep an eye out for upcoming newsletters each month, and follow us on Twitter and Linkedin for daily technology news updates.

This month we're focused on security, specifically mobile cybersecurity. Mobile devices, while equally susceptible to cyberattack as their desktop counterparts, are often overlooked and improperly secured in business environments. Thankfully, instituting some basic best practices can greatly reduce your risk of a data breach or other cyberattack. Our article below summarizes 10 things you (and your team) can start doing immediately to stay secure on-the-go.

Also, be sure to check out the latest internet technology updates from Mimecast, a trusted Sagiss partner and leading cybersecurity organization. This list covers the most important technology trends that businesses need to be aware of right now.

Finally, check out our recipe at the bottom of this newsletter for Stephen Sipher's Famous French Toast Casserole! 

Thank You, 

The Sagiss Team

Stay Secure On The Go! 10 Mobile Cybersecurity Best Practices

Follow these tips to safeguard your personal information when shopping on your mobile device. For questions on these or any other cybersecurity issues, click the blue button at the bottom of this email labeled "I Have an IT Question!" and we'll reach out to you within 1 business day to assist.

Original article from Sagiss here.

 

  1. Don’t Click Email Links: Also called "phishing", this is the oldest trick in the book for cyber-scammers. Don't be fooled by emails offering amazing deals, even if it is from a well-known site. Instead, visit the website directly to search for the sale. If you don't see it there, then the email is most likely a scam.                                             
  2. Only Enter Credit Card Information on sites with SSL Security: SSL (secure socket layer) security ensures that a website is secure. Before you enter any personal information, make sure that the website URL begins with https:// and not http:// The "S" signifies that the website is secure.                                                                
  3. Pay with Credit Cards Only: Using a credit card rather than a wire transfer or other non-plastic payment allows you to dispute an item on your bill and report any fraud to your credit card company, possibly freeing you from any false charges.                                                    
  4. Ensure Your Antivirus is Up to Date: That way, if you do happen to end up on a malicious site, you have the best protection available. Also ensure that your browsers, plug-ins and apps are patched and up to date as well.                                                                      
  5. Use a Modern Web Browser: The latest versions of Chrome, Mozilla Firefox, Internet Explorer and Safari will offer protection against malicious activity and help steer you away from suspicious websites.                                        
  6. Practice Password Prudence: (Try saying that three times fast.) Avoid using weak or default passwords for any online site, and try to use a different password for each site you visit. A handy tip for creating memorable yet complex passwords is to make a “passphrase” e.g. “Alaskais2cold”                                                                   
  7. Be Wary of Banking Emails: If you receive an email that asks you to download a new banking certificate or token because yours is out of date, call your financial institution using a phone number that is not provided in the email in order to verify its sincerity.                                                                       
  8. Keep a Paper Trail: Save all your records of online transactions, including receipts, product descriptions, terms of the sale, and any email transactions with the seller. Also read all your credit card statements carefully and report any discrepancies or suspicious charges immediately to your bank.                                                                         
  9. Use Secure Wi-Fi: While it may be tempting to knock out a little holiday shopping in your local Starbucks, you should avoid sharing any personal or financial information over an unsecured network (one that doesn’t require a password for access.) You never know who else could be lingering on a Wi-Fi hotspot.                                                              
  10. Dedicate a Computer for Financial Accounts: If possible, dedicate one computer solely for accessing financial accounts and paying bills. This computer should not be used for surfing the web or emailing—as these are the main portals for cybercrime.                                                                   
mobilesecurity.jpg

Trending in Cybersecurity 2017 from Mimecast

Founded in 2003, Mimecast services reduce the risk, complexity and cost traditionally associated with protecting email. Sagiss partners with Mimecast to deliver cutting-edge email security to all Sagiss clients, protecting your business from spam, phishing and other forms of cyberfraud. This article from Mimecast's blog highlights some of the most important technology trends happening right now.

Original article from Mimecast here.

 

  1. Android Clickjacking Attacks Possible from Google Play Apps via Search Security: Android's latest release of Android 6.0 Marshmallow doesn’t completely protect users from possible clickjacking attacks via Google Play Apps. http://mim.ec/2qxzB2                                                                                       
  2. Ransomware based on leaked NSA tools spreads to dozens of countries via Tech Crunch: A ransomware attack seemingly based on leaked NSA hacking tools is spreading like wildfire among unpatched Windows systems worldwide.http://mim.ec/2raKmVk                                                                   
  3. Amazon’s Third-Party Sellers Get Ripped Off By Hackers via NBC News: Hackers exploit third-party Amazon sellers by taking over dormant accounts and changing banking information. They then post fake merchandise, make the sell and collect the cash. http://mim.ec/2o1jOnp                                                                                        
  4. CIA Tools Exposed By Wikileaks Linked to Hacking Across 16 Countries via ZD Net: Security researchers confirm that the CIA hacking tools exposed by Wikileaks were used in at least 16 different countries. http://mim.ec/2nEMYg8                                                                               
  5. Cultivating a Cybersecurity-First Corporate Culture via SC Magazine: Focusing on a corporate culture that encourages employees to think about cyber security can help defend against threats. http://mim.ec/2nZi2qR                                                                                  
  6. How to Avoid Being Attacked by Ransomware via PC World: This article shares 7 tips on how to avoid becoming a victim of a ransomware attack: http://mim.ec/2o7BGRN                                                                               
  7. Location Tracking Android Spyware Found in Google Play Store via ZD Net: Android malware capable of accessing smartphone users' location and sending it to cyberattackers remained undetected in the Google Play store for three years, according to a security company. http://mim.ec/2q3ItvL                                                                                   
  8. Top 5 email security best practices to prevent malware distribution via CSO Online: Ryan Francis of CSO Online shows tips via a slideshow on how to prevent malware distribution in the office. http://mim.ec/2o2HL0E                                                                                                                                       
  9. Downtime is key cost of ransomware attack via Information Age: A survey from Imperva has highlighted downtime as the key cost of ransomware attacks, with respondents revealing an attack could cost businesses $5,000 to $20,000 a day on average. http://mim.ec/2n7BUYB                                                                              
  10. Profiling The Insider Threat - Breaking Down a Complex Security Term via Info Security: This article helps identify the five insider threats that can cause a breach and highlights the complexity of understanding the insider threat. http://mim.ec/2q4176V                                                                                          
Mimecast

Stephen Sipher's Famous French Toast Casserole

Nothing satisfies quite like exquisitely prepared french toast. Between it's crispy soft texture and loads of sweet & savory flavor, this dish has long been a cornerstone on the list of breakfast classics.

Here to present his Texas twist on this classic favorite is Stephen Siphers of our Network Operations Center. Whether you need bite-sized treats for your next deck party or a hearty meal on a rainy Sunday, these bit-sized delights are sure to satisfy.

If there are any culinary delights you'd like to see showcased on our newsletter, please feel free send them over. We'll pick one from the submissions to include on our next issue!

Ingredients

 

Casserole

1 loaf french or Italian bread
8 eggs
2 1/3 cup whole milk
1 cup brown sugar
2 tbsp Almond Extract

 

Topping

2 sticks butter (cold)
1 cup brown sugar
1 cup chopped pecans (or more)
1 tbsp cinnamon

Directions

  1. Pre-heat oven to 350
  2. Mix the Casserole ingredients together
  3. Break bread into small 1 inch pieces and place within a casserole dish
    1. Ensure all bread ends are facing down (so the mixture you will pour over it absorbs)
  4. Once bread has been placed into the casserole dish, pour the casserole mixture over the bread.
    1. Pour evenly over the bread ensuring the mixture is absorb into as much bread as possible
  5. While the mixture is soaking into the bread, start preparing the topping
  6. Mix the topping together with a potato masher in a large bowl.
    1. You have to mash the topping together, DO NOT whisk.
  7. Once topping is mixed (very lumpy is good), distribute atop the casserole
  8. Place in middle of over (ensure nothing is close to the top as the casserole will rise)
  9. Bake for 50+ minutes or until the casserole mixture is bubbling and the top has darkened
  10. Let cool for 10 minutes and enjoy                                                                                                                                                      

 Unusbscribe 

PA1B23_Baked-French-Toast-Casserole-with-Maple-Syrup_s4x3.jpg.rend.hgtvcom.616.462.jpeg
Refer a Friend & Save Up To $1000 Off Your Next Invoice!
Help!  I Have An IT Question.
   

Something Powerful

Tell The Reader More

The headline and subheader tells us what you're offering, and the form header closes the deal. Over here you can explain why your offer is so great it's worth filling out a form for.

Remember:

  • Bullets are great
  • For spelling out benefits and
  • Turning visitors into leads.