NetWorthy Systems Blog

NetWorthy Systems has been serving the Beaumont area since 2004, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Prevent your Web Browser from Storing Passwords

For sites you need to log into often, having your browser remember your password can save you time logging in, especially if you are using secure passwords that you might need to look up otherwise. There are circumstances where you might want to manage what personal information gets stored in your web browser.

Continue reading

Protect your Dropbox with Two-Step Authentication

Dropbox, a popular file-hosting service for both home-users and businesses, recently added a new security feature to prevent unauthorized access to your Dropbox files and folders. You can enable Dropbox to send a security code to your mobile phone whenever you log in.

Continue reading

Ransomware: Computers Held Hostage

As computer technology around us continues to advance, so too does the development of computer viruses, spyware and malware. The latest digital plague is called ransomeware, malicious software that takes over the hard drive of infected computers until ransom is paid.

Tags:
Continue reading

World's Third-largest Botnet Brought Down, Global Spam Cut in Half

Everyone who uses e-mail has become accustomed to finding the occasional Spam e-mail. No matter how careful you are, it's only a matter of time before you receive a Viagra testing e-mail, the South African Inheritance Tied Up in Legal Battles, or the Winning of a Sweepstakes that you never signed up for. Where do those e-mails come from?

Tags:
Continue reading

Android Malware on the Rise

Android users may have some cause for concern. Considering its surging popularity, there is going to be a certain amount of rouge applications and other malware that targets the top iPhone OS. According to the popular anti-virus maker, Trend Micro, there are at least 20,000 applications that are malicious that target Google's Android OS. That is an increase of at least 400% since the beginning of 2012. By Christmas of this year, experts have given a conservative estimate that puts potential malware and rouge apps at around 150,000 different applications.

Continue reading

Don't Let a Storm Put You Out of Business

Nature can be pretty impressive. It can interrupt the day-to-day operations of businesses, cause major damage, and cost your business in expensive downtime. Having a good business continuity plan (and ensuring you have it set in place) can make or break your company when mother nature comes knocking at your door.

Continue reading

How Beaumont Small Businesses Reduce Computer Issues with the Bridge Metaphor

Does it seem like every day your network is suffering from a different issue? How about the same old issues that keep coming back? Think about how much time is wasted every day while you and your employees have to cope with viruses, malware, and oddball technology issues. What if we told you there is an easy solution that will eliminate 99% of these problems?

Continue reading

The Best Defense: Universal Threat Management

Protecting your business network from the threats lurking on the Internet is crucial for a small business. Threats of all shapes, sizes, and severities are out there and if they get into your network you could be looking at some serious issues ranging from data theft to extended downtime. Fortunately, there is a single solution available that can deliver a total security package to protect your business from virtually any outside threat.

Continue reading

The BYOD Revolution

Today, your employees are more and more technologically empowered. With the consumer electronics market teaming with amazing gadgets and high-end devices, cool tech is no longer reserved for fancy geek toys. With employees bringing in their own smartphones and tablets, mobile security becomes a big concern for small businesses.

Continue reading

6 Million Passwords Stolen from LinkedIn

LinkedIn, the popular social network geared towards business networking and communication, has reported a major breach in security. A file containing over six million passwords was leaked and posted on the Internet.

What does this mean for you, and what course of action should you take?

Continue reading

Why Small Businesses Need to Properly Manage Active Directory

The purpose of a solid business network is to iron out the chaos of running multiple computers whose users need to access and share files and documents. With sharing comes the need to restrict some users from certain files, all while protecting your IT infrastructure from the inside and out.

Continue reading

Mobile Botnets and Zombie Phones

Once considered impossible, the threat of malware on mobile devices is becoming a serious reality. Malware used to just be a plague to PC's, however, in the last few years we have seen a rise in Mobile Malware specifically the threat of Mobile Botnets.

Continue reading

Is it Time to Ditch Windows XP?

Windows XP was released back in October 2001, and still today, many users and businesses still use it every day. Even in 2012, XP's market share is around 27%. Is your business still using Windows XP? How much longer should XP be kept around?

Tags:
Continue reading

Is your Business a Victim of Email Spoofing?

Is your email sending out mass-mail spam messages? Have you ever received a complaint about sending unsolicited ads or obvious spam messages? Have you ever received bounced emails by the boatload that look like they have been sent from your own account, even though you know you didn't send them?

Tags:
Continue reading

Computer Infected? The FBI is turning off your Internet

Computer viruses are pretty serious threats, and can cause huge expensive issues for businesses. Many cases of malware and computer viruses actually use your computer to commit real crimes. The FBI states that hundreds of thousands of people will likely lose the ability to surf the web if they have a particular piece of malware.

Tags:
Continue reading

Mac Malware on the Rise

It looks like Mac users won't be getting a break from malware as another trojan is breaking out on OS X. In February, malware known as Flashback infected around 600,000 Macs. This month a new trojan called SabPub is making its rounds.

Continue reading

Removing the Hidden Data in Microsoft Word

Most people might not realize this, but a Microsoft Word Doc can retain a lot of information pertaining to the history of the document, your personal information, annotations, and other invisible elements. This can be a huge security risk! Read on to learn how to remove that extra information.

Continue reading

Public Safety Tip: Wi-Fi Hotspot Security

When traveling with your trusty laptop or tablet, it's pretty common to find publicly accessible Wi-Fi networks that you can connect to, enabling you to surf the web. Where ever you are, whether it's a coffee shop, hotel, airport, or anywhere else, it's important to be safe about public surfing.

Continue reading

Securing your Wi-Fi is More Important Than Ever

Does your Wi-Fi require a secure password to allow users to access your network with their mobile devices? And no, the word "password" is not a suitable password. If your wireless network is easy to gain access to, you are opening up your sensitive data to anyone within range.

Continue reading

What to do if your Laptop is Stolen

The problem with carrying around an expensive, portable piece of equipment is that it's possible for someone to pick it up and run with it. According to LoJack, a security firm that focuses on stolen property, two million laptops are stolen each year. What should you do if you are a victim of laptop theft?

Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Blog Archive