Blog

  • Protecting Your Passwords: Treat Them Like Underwear

    In the digital age, passwords are the first line of defense against cyber threats. They guard our personal and professional information from unauthorized access. Given their crucial role, it’s essential to handle passwords with the utmost care. An effective and memorable way to think about password security is to treat your passwords like underwear. This analogy may sound amusing, but it underscores several key practices that can significantly enhance your digital security. Here’s how you can apply the “underwear rule” to your passwords:

    1. Change Them Regularly

    Just as you wouldn’t wear the same pair of underwear for days on end, you should not keep the same password indefinitely. Changing your passwords regularly is a simple yet effective way to minimize the risk of them being compromised. Passwords should be updated every few months, especially for accounts that hold sensitive information, such as your email, banking, and social media accounts. Regular changes help ensure that even if a password is leaked, it won’t provide long-term access to your accounts.

    1. Don’t Share Them

    Sharing your passwords is akin to sharing your underwear—it’s something you simply don’t do. Your passwords are personal and should remain private. Sharing them increases the risk of unauthorized access and data breaches. If you need to grant someone access to an account, consider using secure methods such as password management tools that allow shared access without revealing the actual password. Always remember that once a password is shared, it is no longer secure.

    1. Keep Them Private

    You wouldn’t leave your underwear lying around in public for everyone to see, and the same should apply to your passwords. Avoid writing down passwords in places where they can be easily found, such as sticky notes on your desk or in a notebook that is not secured. Instead, use a password manager to store and manage your passwords. These tools encrypt your passwords and make them accessible only to you, ensuring that your credentials are kept private and secure.

    1. Use Strong, Unique Ones

    Just as high-quality underwear provides better comfort and durability, strong and unique passwords offer better protection against cyber threats. A strong password typically includes a mix of upper- and lower-case letters, numbers, and special characters. Avoid using easily guessable information such as names, birthdates, or common words. Each of your accounts should have a unique password. This way, even if one password is compromised, the others remain secure.

    1. Keep Them Clean

    In the same way that you keep your underwear clean, ensure that your passwords are “clean” from being reused across multiple sites. Reusing passwords increases your vulnerability because if one account is breached, all accounts using the same password are at risk. Keep track of your passwords with a password manager, which can also help you generate strong, unique passwords for each of your accounts.

    1. Beware of Exposure

    Just as you wouldn’t expose your underwear to the public, be cautious about exposing your passwords online. Be wary of phishing scams and malicious websites that try to trick you into revealing your passwords. Always check the legitimacy of websites and never enter your password on a site that you do not trust. Additionally, enable two-factor authentication (2FA) wherever possible to add an extra layer of security. This ensures that even if your password is exposed, an attacker would still need the second form of verification to access your account.

      Conclusion

      Treating your passwords like underwear might seem humorous, but it serves as a powerful reminder of the importance of password security. By changing them regularly, keeping them private, using strong and unique passwords, and being cautious about exposure, you can significantly reduce the risk of unauthorized access to your accounts. Remember, your passwords are the keys to your digital kingdom – protect them with the same care and attention you give to your personal belongings.

    1. An Ultimate Guide to Formatting Word Documents

      Introduction

      If you are using Microsoft Word for your business operations, you need to understand the essentials of formatting and creating a word document. After reading this article, you will ably format your word documents like a PRO.

      What is word document formatting?

      It is how a document is laid out on a page, the way it looks, and its visual organization. Word document formatting addresses elements like font size, margins, spacing, columns, alignment, lists, indentation, font selection, and presentation (in terms of bolding or italicizing)

      Once you’ve correctly formatted your Word document, it becomes correct, consistent, and easy to read and understand by your target audience.

      How to Format Word Documents in MS-Office 2019

      1. Attach and format text in your Word document
        • Select the text you want to format in your Microsoft Office Word document. To select one word in the document, double-click on it. If you’re going to choose one line of text, click to its left side.
        • Select an option to adjust the font, font size, font color, or bold the text, italicize and underline it.
      1. How to do copy formatting
        • Select the text in the document with the formatting you want to copy.
        • Click on Format Painter on the home tab. Select the text in the document you want to copy the formatting to. Always double-click Format Painter whenever you want to copy the formatting in more than one location.
      1. Create a numbered or bulleted list in your word document

      To begin a numbered list in your Word document, type 1, a period like this: (.), hit the space bar, and type some text. Press Enter. MS-Office Word will automatically begin a numbered list.

      To form a bulleted list, type * and hit the space bar before your text to make Word create a bulleted list.

      If you want to complete your list, press Enter until you notice the numbers or bullets turn off.

      How you can create a list from existing text

      • Select the text you want to appear in the form of a list.
      • Go to the home tab, choose the bullets icon or Go to the home tab and choose the numbering icon.

      You can find various bullet styles and numbering formats by clicking the down arrow next to Bullets or Numbering.

      1. Adjust the line spacing in your Word document
        • Select Design and then choose Paragraph Spacing.
        • Hover your cursor over every option to see a preview before selecting the option you want.

      If you want a single spacing, select No Paragraph Space.

      Change the line spacing for a section of your word document.

      • Select the paragraphs you want to adjust.
      • Select the Home Tab, then Line and Paragraph Spacing, and choose the spacing you desire.
      1. Apply styles in your Word document
        • Select the text you want to format. When you put your cursor in a paragraph, the style is applied to the entire paragraph. If you select a particular text, only the selected text is formatted.
        • On your Home Tab, point to a style to preview it and go for what you want. In case you don’t see the style you want, click on the More button to expand the gallery.
        • Select a style.
      1. How to apply themes in your Word document
        • Quickly format your whole word document and give it a modern, professional look by applying a theme to it.
          • Select Design and Themes.
          • Point your cursor to a theme to preview how it will look in your Word document.
          • Select your preferred theme.

      Adjust the theme colors

      • Select Design and then Colors.
      • Point to any color with the cursor to preview how it will look in your document.
      • Select your preferred color scheme.

      Change the theme fonts

      • Select Design and then Fonts.
      • Point to a font you want to preview how it will appear in your word document.
      • Select a font that you want.
      1. How to create Microsoft business forms templates
        • Display the “Developer” Tab. The tools you need to add form controls to your Microsoft word business forms templates are present in the “Developer” section, hidden by default. Click on “File” to display this “Developer” tab. Now, click “Options.”
          • Under the “Options” section, do the following:
            • Select the “Customize Ribbon,” which is visible in the left-hand sidebar.
            • In the Tabs area displayed on the right, tick the box next to the “Developer” tab, then press “OK.”
        • Opening the form template to base your form on. Make sure that you begin with a form to minimize time wastage.

      Choosing your form template

      – Go into the “File” section, click the “New” button.

      –  In the “Search online templates box,” enter the type of form template you want to create and then press on “Enter.”

      –  Click on the template you find suitable for your form and click on “Create.”

      Choosing a blank template

      • Go into the “File” section and then the “New” tool, and select “Blank document.”
      • Add Form Controls
        • Go into the “Developer” section. Here, you will find a collection of form control fields under the “Controls” group. The following are the summarized form controls:
          • Date Picker: It is a control responsible for bringing up a mini-calendar that you can select a date from.
          • Dropdown or Combo Selection Control. Preferences can be included in this control from which you can choose from.
          • Plain Text Content Control. This control does not allow you to format the text you input in this text area.
          • Rich Text Content Control. This lets you format the text typed in this text area.

      If you want to add a form control to the template, click on the document’s area where you want to put the control and click on the icon symbolizing this control you want to add.

      To quickly modify the default placeholder on the control, select “Design Mode.” Additionally, to alter the control properties, select “Properties.”

      • Setting restrictions or editing protection to your template.

      If you want to limit other users from editing your template, do the following;

      • Click on the Developer tab.”
      • Select “Restrict Editing.”
      • In the “Restrict Editing” sidebar, which you can view on the right, tick the box under “Editing restrictions” and then adjust the dropdown to “Filling in Forms.”
      • Press on “Yes.” Start Enforcing Protection.”

      Conclusion

      Formatting word documents is a huge step to make your information reader-friendly and engaging. Use it to create high-quality business documents that you will be proud to display.

    2. Don’t Fall for Scammers

      I have written before about being caught out by scammers, and also how to spot a scammer.

      The latest round, isn’t relating to Computers but with puppies.  Everyone needs to be aware.  I have recently read an article from ScamWatch,  What the scammers are doing is posting photos of adorable looking puppies on sites such as Facebook offering them for sale, and asking for money to clear them through customs & quarantine.  The problem is, that the actual puppies do not exist, and that you have actually lost your money.

      If you are looking for a dog (or puppy), either go to your local animal rescue – or if you are looking at paying a little extra for a pure bred, contact your local Kennel Control for a registered breeder.

      Puppy Dog Scammers – Scamwatch

    3. Christmas Greetings – 2017

      Christmas Greetings – 2017

      I hope all my clients and colleagues had a very Merry Christmas this year, and may 2018 be prosperous for us all.

      While this year has seen an increase of work in some areas, it has also seen a decrease of work in others.  I look forward to 2018 and invigorating myself and the business and come back with a fresh lease on life and adding benefits to those I work with

    4. CommBank Phishing Scam Update

      Well, they are at it again, I just received another message this morning, saying that my account was locked and to go to a particular link in the message to unlock the account.

      Once bitten, twice shy – I now at least have a number which I can pass onto CommBank for their investigation team to investigate as well.

      I was lucky that the CommBank security team picked up on the activity, locked the account and sent me a message.  I wonder how many others that get caught out, and the banks don’t pick up on until after the fact and then it takes time to get the funds returned.

    5. CommBank Phishing Scam

      I have been an advocate of ensuring you know what you are doing, and double check everything before acting upon, so you don’t fall foul of phishing scams.

      I can’t be more amendment on the fact, as you don’t know who is out their trying to get your hard earn cash.

      Back Story

      Earlier this week, I was phoned by a call centre claiming to be from the Australian Tax Office (ATO) with a recorded message saying that I had outstanding debts and was also implicated in Tax Fraud, and that there was a warrant out for my arrest.  I knew this was a scam, as I have been targeted 4 time before, as well as another family member.

      Anyway, I wasn’t going to let this go unanswered, so I rang the number back, strung them along for a little while, then mentioned I worked for the Australian Federal Police (which of course I don’t).  This is where the abuse started – they realised they had been caught out, and let lose with all asunder with foul language that I won’t even repeat.  For the next 3 hours, I repeatedly redialled the number, and just left the line opened until they hung up.  Occasionally, I would engage them, by saying I am returning a call – and when they asked for my name, giving them a fictitious name – which threw them in a loop as it wasn’t the name they had against my service number (they’ve obviously scraped the details from somewhere).

      Finally, they got that sick of me, that they actually blocked my number.

      The reason I did this, is depending on where they are located, is while I had them on the line – it was one less person they were talking too, and if they were overseas, it was costing them money in the local to international call costs.  It wasn’t costing me any more, as my phone plan has unlimited mobile to national landlines at no extra cost.

      The Story

      Well, I fell victim of a phishing scam.  Yes, even the best of us do things without thinking.  I got an SMS on my mobile (smartphone) with a link to a website.  I naturally didn’t think twice, as I thought it was from the bank and followed through.

      The basis of the SMS was that the Commonwealth Bank was testing their SMS and needed me to do some checks, which included me giving them my mobile then a special code.  The first clue should have been, they were asking for my mobile number – but it didn’t click.  Did what they asked, and didn’t think twice about it.  Yep – was busy, and didn’t really think.

      Anyway – what I had done was give someone enough information to try and do a card less transaction at an ATM.    Anyway, I guess they tried to withdraw more than the account had, and Commonwealth Bank put a stop on my account, sent me an email, which meant I needed to go to the nearest branch and deal with it,

      What it means:-

      • They will need to close the account.
      • Create a temporary account.
      • I submitted a Statutory Declaration saying someone tried accessing my account without my express permission (i.e. phishing scam).
      • CommBank open a new account.
      • New Cards (possibly).
      • And any direct debits / scheduled transactions need to be changed.

      In short, with financial institutions especially, if you get an SMS with a link to a web page to test things, before you do it check with them.  They usually have this sorted before going live.  Even the best of us, can slip up.

    6. Computer Security Precautions

      On a sunny Friday afternoon, I had a frantic phone call from a client. They had a phone call from a person claiming to be from their phone and internet carrier, claiming that their method of connecting to the internet would be out of service for several weeks and that they needed to show them how to get around the outage.

      Sounds plausible, right?  Without thinking too hard about it, you might say sure, what do I need to do.  The caller instructed my client to go to a website, and download TeamViewer (a tool that several support staff use to connect to a computer remotely); the company that developed TeamViewer is reputable and had no connection with the caller, and install the software.

      The installation of the software was configured in such a way, that gave the caller unattended access to my client’s computer.  Now the caller had complete access to my client’s computer, and started opening various applications while trying to gather other personal information over the phone, like which bank they dealt with and how much money they had in the account.

      In short, this was a definite case of someone wanting control of the computer to gather information about my client, get banking details, and to even possibly install ransom-ware (software that is installed on the victim’s computer or digital device, encrypts, and holds the data hostage until a ransom is paid).

      In short, the telecommunication/internet providers in Australia (unless it is an unplanned outage) notify users via letter, email or text message of an impending outage and advised them of a number to call if they have any concerns.

      My role in this situation was to uninstall the version of TeamViewer, restore the computer to an earlier point, check for any other software that may have been installed and remove, then run a virus checker over the computer to ensure any software signatures that the virus checker knew of as being a threat was removed.  I also installed a backup utility from CrashPlan which will backup data files to a remote site (or data centre) to protect your music, photos and other documents you might have. This way, if something goes wrong with your computer, such as hardware failure (yes – I have had a motherboard and hard disk drive fail and lost data) or virus infection or ransom-ware, you can recover most of your data prior to the issue. The reason I say most, is in the case of CrashPlan, it will only be able backup remotely while connected to the internet.

      My advice to anyone going forward, report this incident to the police fraud squad, contact his phone and internet carrier and the bank (if you have given details) to advise of the possible breach in security and organise measures to be put in place to prevent any further loss.

      Going forward, if you get a phone call in future from anyone claiming to be from their internet provider, to get some sort of authentication from them – that is, get them to give you some sort of details about the account that they would have in front of them (i.e. account number) if they were from the provider.  If they can’t do that, get a name from the person and a phone number and then tell them you’ll call back.

      Then contact the provider’s support number, which will be on their website, and any bills they send for providing the service, explain that you had a call from person x and they were walking you through a process to do something, and could they transfer you through to them. If the provider cannot find such a person in their system, or the process that they were going to walk you through isn’t something that they know about or do, then all you have lost is the cost of a phone call, and a little time in protecting yourself.

    7. Phishing Attack Uses Domains Identical to Known Safe Sites

      I have just read an interesting article where Chrome and Firefox (two common browsers for the internet), can show you a website that you think is legitimate, but is actually a phishing website  hoping to get your login details.

      This is done by using special code (which can then be converted into English for readability), and thus fooling you into thinking you are the website you were directed too,  To learn more, please read this aritcle.

    8. A Small Australian Business Supporting the World

      A Victorian company is providing an Australian call centre service for their clients across Australia and New Zealand.

      In Australia, there has been a move over the last several years to take call centres off-shore. New technology such as NBN, allows IT Solutions and Marketing, a small, home based business in picturesque George Town Tasmania, to compete with the larger corporations and provide excellent customer support.

      The company is expanding into new territories across the globe, which means increased work for Ven Grollmus of IT Solutions and Marketing.

      Ven commented that “As long as I have systems and procedures in place, I have the technological skills to handle the extra work.” Ven has travelled interstate on several occasions to attend training sessions to ensure he has a complete understanding of the product.

      Ven is also looking at forging strategic alliances with other home based business operators in the field of information technology and marketing to ensure that he can meet the demand, while remaining both efficient and cost effective.

      IT Solutions and Marketing is a new business which strongly supports home based businesses, making them aware that with the use of new technology, they can compete with larger businesses while supplying quality solutions at a competitive price.

    9. Make Your Website Mobile Friendly

      Is your website and blog ‘mobile’ friendly? This means, are they set up so that they can be viewed on mobile phones, tablets etc.

      Google has decided that your websites and blog will be given a lower ranking if they do not comply to mobile requirements.

      You therefore have to make a decision….is it important for your website to be found when being searched for by potential clients and do you want your website or blog to be looked at by folk using mobile phones etc.? It the answer is ‘yes’ to either of these, then you need to get your existing sites changed over.

      Unfortunately this is not all that easy; it is like rebuilding the site from scratch. The good news is, you already have the content (text and images) from the existing site, but you will now need web building software that is responsive (allowing the website to be viewed on mobile devices).

      More good news. You can get such responsive software for your website for free, if you build your site on WordPress.  WordPress has become more and more user friendly and many new website builders use it today (even those designers you are paying for) – but you can do it yourself if needs be. There are lots of plugins and it will do most things you want it to do.

      Have a look at this WordPress, responsive site:-

      www.ITSolutionsAndMarketing.com

      If you also look at it from an iPod, iPad or iPhone (or Android or Windows), you will notice that it automatically changes some of the layout of your web page to better fit the size of the mobile device you are using.

      If you want someone to do this for you as inexpensively as possible, why not have a word to Ven, from ‘IT Solutions and Marketing’? He has just made this site mobile friendly and they are very happy with it, as many of their potential clients want to view it from their iPhone while out shopping, looking for wedding suppliers.

      www.WriteYourLifeStory.com

      Just remember – don’t put off what could be a very important business tool for you.