Windows 10 is Retiring:
A Full Review of Carbonite, an Cloud Backup Service

Carbonite is one of the world’s most popular cloud backup services, and for good reason.

All of their backup plans are unlimited and come with a lot of features, putting Carbonite near the top of my list of unlimited cloud backup plans.

Carbonite has been around since 2006 and has a massive customer base, making this company one of the more established among cloud backup providers.

Keep reading for details on Carbonite’s backup plans, updated pricing information, and a complete list of features. My extensive Carbonite Tour should also give you a better idea about how Carbonite works.

Epsilon Systems Consultants, LLC, is an approved Carbonite distributor. If you have any questions about the software, feel free to contact us.

Read More

Epsilon is Giving Away Two Tickets to Science on Tap
936600_945871598781673_4945603949774993957_nRichmond is a craft beer city and the Science Museum of Virginia is tapping into the enthusiasm with Science on Tap! Hosted by the Emerging Leaders Council, this event features a host of Virginia’s finest craft beers and ciders and also offers an exciting look at the science behind brewing. Food trucks, local vendors and live music add to a home-grown festival atmosphere you won’t want to miss!
Epsilon Systems Consultants is a proud sponsor of Science on Tap, May 7th at the Science Museum of Virginia, and we want you to be a part of it!  We are giving away 2 tickets to the event to one lucky Twitter follower.   The winner will receive two admission tickets, two signature pint glasses, and two drink vouchers.
To register to win, simply click below and follow Epsilon Systems Consultants on Twitter.  For more information on the SMV’s Science on Tap event, click the logo above. The deadline to register is April 30, 2016.twitterbutton
Why Do You Need LinkedIn?

linkedin-icon-logo-vector-400x400We have Facebook and Twitter and Instagram and Pinterest and who knows how many other forms of social media out there.  We have places to post birthday pictures, sell an old television, rant about political figures, and share our favorite recipes.  Some of us are nearly burnt out on social media.  So why do we need one more social media?  Why do we need one more app on our phones to check everyday?  Is LinkedIn really necessary?

These were the questions I had when I attended a workshop on using LinkedIn, led by Rick Curry, Director of Business Development for Addison Clark Online, Social Selling Coach, and LinkedIn Trainer.  During the seminar, Rick took participants through an understanding of current day sales strategies, helping participants understand how drastically the sales landscape has changed in recent years and the power of social selling.

Rick Curry
Rick Curry, Social Selling Coach and LinkedIn Trainer

LinkedIn provides a variety of benefits in helping you and your business to utilize your existing relationships in your sales.  Describing LinkedIn as “Facebook with Ties,” Rick explained in the workshop how, coupled with other means of networking, LinkedIn allows you to optimize your existing business connections to forge new connections and relationships.  LinkedIn provides a forum in which you can establish your brand and create an online presence that provides valuable reinforcement to your business reputation.  He also takes participants through an understanding of the dos and don’ts on LinkedIn, such as “don’t try and ‘connect’ with someone on LinkedIn until you have an existing relationship with them.”

Want to learn more about LinkedIn and the concept of Social Selling?  Check our Rick’s profile on LinkedIn at https://www.linkedin.com/in/rickjcurry and his LinkedIn group, RVA Social Selling Systems.  Rick is here in the Richmond area and provides corporate and group training in Social Selling and Using LinkedIn.  Do not miss out on the opportunity to use the powerful tool that is LinkedIn in boosting your business’s sales and reputation.

Brad Robins
Business Development
Epsilon Systems Consultants

The Wrong Cable Can Fry Your Laptop

The cost of cables and other computer accessories can get pricey, so it makes sense to look to the discount websites for the significant savings they can offer on those office essentials.  Sometimes, though, going cheaper isn’t always the best decisions for our IT systems.  Check out this article from CNN’s David Goldman looking at ways to make sure the cables you are using with your computer are safe:

Cables That Can Fry Your Laptop

For questions on finding safe accessories for your computers and help with all of your IT needs, contact Epsilon Systems Consultants at 804-427-6567.

What’s in Your Email? How to Secure Your Company’s Inboxes

email_1827026b

Security threats can attack a company from all angles. You might have a security guard at the door to keep out unwanted visitors. Perhaps you have security cameras to keep an eye on things when you are not around. You likely have an anti-virus software to prevent a technical attack. But what do you do when a scammer tries to trick one of your employees into giving up sensitive information through an email?

This type of security threat is called Social Engineering. TechTarget.com defines this as follows:

Social engineering is a non-technical method of intrusion hackers use that relies heavily on human interaction and often involves tricking people into breaking normal security procedures. It is one of the greatest threats that organizations today encounter.

–TechTarget.com

A social engineering scam is one that targets the individual (rather than the computer) by posing as a trusted source, claiming to be, for example, a vendor. At first glance, nothing looks suspicious about these emails, as they are coming from an address that appears familiar, the language is professional, and they are making a reasonable business request.  It could be presented as a vendor is asking you to change their banking information or a client is asking you to send payment to a new location.

Your employees need to know that these kinds of scams exist. If someone asks for personal or banking information, and you or your employee gives it away, there is nothing that your IT personnel can do to recover that data. The only protection is preemptive education.

Here is a list the FBI has provided to avoid this kind of scam along with some thoughts on each point:

  • Verify changes in vendor payment location and confirm requests for transfer of funds.
    • Have a second form of contact (like a phone call or a text message) so you can confirm the need to make changes to banking information or payment details.
  • Be wary of free, web-based e-mail accounts, which are more susceptible to being hacked.
    • In addition to being easily hacked, they are also easily spoofed. It is very easy for someone to make an email address through Google or Yahoo that is one letter different from an address you recognize.
  • Be careful when posting financial and personnel information to social media and company websites.
    • Let us say you are a CEO and you’re posting on Twitter that you will be on vacation and out of touch for the next two weeks. If a scammer is looking for a good time to pounce, that’s it. Scammers can also better personalize the scam if they know, for example, your specific bank and can say, “Hi, I’m Gary from Bank XYZ.” Or if they know that only Debra deals with vendor banking info and can ask for her by name.
  • Regarding wire transfer payments, be suspicious of requests for secrecy or pressure to take action quickly.
    • The world of business is fast-passed but you can always make time for dealing with money. Go the extra step and verify where your money is going. Pressure to rush should be a red flag.
  • Consider financial security procedures that include a two-step verification process for wire transfer payments.
    • In other words, have a second method of contact in place, especially when wiring money. Know that each request for funds is followed up with a phone call or a text.
  • Create intrusion detection system rules that flag e-mails with extensions that are similar to company e-mail but not exactly the same. For example, .co instead of .com.
    • Partner with your IT technician to property filter your email if you don’t know how to yourself.
  • If possible, register all Internet domains that are slightly different than the actual company domain.
    • One way a scammer might spoof you email address is registering a domain that is one letter off from your email address. If your address is MyExample.com, they might use www.MyExamples.com
  • Know the habits of your customers, including the reason, detail, and amount of payments. Beware of any significant changes.
    • Use common sense. If a regular habit is broken or significant changes are requested, use the second mode of verification previously established to confirm the change.

If you have a question on the validity of the information in an email, and you have not established a secondary form of verification, rather than replying to that email, forward it. This gives you a chance to type in the address—manually—yourself.

Remember, the best way to avoid these scams is by educating your employees and letting them know it is okay to ask questions.  If you would like more information or would like to schedule a training session with your employees, please contact Epsilon Systems  at info@epsilon-e.com or by phone at 804.427.6567.

Dale Beck
Director of Technology
Epsilon Systems Consultants

How to Manage All of Those Passwords
Thinking up a strong password that you can remember is hard enough; doing it for every website is nearly impossible-unless you use a password manager.
 
Passwords are everywhere.  Most of us cannot even remember how many passwords we have, let alone what they all are.  We tend to use the same ones repeatedly, which is a huge security risk.  How can you manage all of those passwords and still keep your data and identity secure?  Check out the article below for some great ideas:
The Small Business Holiday Season Survival Guide

The Small Business Holiday Season Survival Guide

The holiday season is a long haul for small to midsize businesses (SMBs), stretching from Black Friday and Cyber Monday through late December. The influx of shoppers both online and in person presents a ton of logistical challenges for which to account-from keeping track of inventory assets to securing and ensuring smooth point of sale (POS) transactions.  Is your business prepared?  Click below for information that will help your company through this busy season:

Holiday Season Survival Guide

For all of your IT support needs, contact Epsilon Systems Consultants at 804-427-6567.

Tips for your network when leaving for Thanksgiving

Tips for your network when leaving for Thanksgiving

We hope this week you will be able to take some time and get away from the office and enjoy being with family and friends.  If you are going to be away from the office for several days, here are a few tips for what to do with your computers and network:
  1. If your server is in a cabinet, make sure the cabinet is locked while you are away.
  2. Before you leave for the holiday, make sure all users are logged out of the server.
  3. It is actually a good idea to leave your computers on (if there are no weather concerns) while you are way.  Off hours are a good time to run antivirus scans and Windows updates.
  4. If you do leave your computers on, be sure to log out of your systems.
  5. If you expect to connect remotely over the holiday in order to check email and such, make sure to give your system a fresh reboot before you leave.
  6. Make sure the office is locked and secured for the long holiday weekend.

To your family, from all of us at the Epsilon family, we wish you and yours a safe and happy Thanksgiving!