Monday
Oct142024

Hotdog.com a source for comparing cord-cutting services

I received an e-mail today regarding an article I had written a while back on YouTube TV in the Pittsburgh area that describes a website dedicated to helping you to make sense of the many services available to you for an alternate to cable services. Called Hotdog, the site claims to have become the go-to destination for cord-cutting.

Over the years, HotDog.com has become the go-to destination for cord-cutting tutorials, streaming reviews, and industry news. If it has to do with watching video content without a cable contract, you’ll likely find it here. And if you can’t, you can email us or post a comment, and we’ll try to help!

To learn more about this service visit Hotdog.com!

Wednesday
Aug142024

How to communicate with PAconnect...

PAconnect has several systems in place to help you communicate with our Help Desk, provide remote access to your workstation, review your ticketing portal, and access our payment portal. Each of these sites provides you with quite a few bits of information about your account with us as well as methods of communicating with our staff.

 

Generating a service ticket. – This can be done by sending an email to support@paconnect.com. Be sure that you include information about who you are and how to contact you, the name of your organization, the problem that you are having and who would be the best person to contact in your organization to help with the issue. This will generate a ticket in our system and we will respond to that. Be sure you give us the phone number for contacting you in case we need to acquire more information from you.

 

Remote Access Control System - https://control.itsupport247.net   This URL will give you access to your remote access portal. If you never were set up for this you will need to contact our Help Desk or your account manager to have this feature made available to you for your account.

 

Ticketing System: https://paconnect.myportallogin.com/ The PAconnect Client Service Portal gives you access to your accounts service tickets, and the ability to submit a new ticket to our Service Desk. You will be given a choice of 9 categories to select from for your issue that you are requesting help with. When you choose an issue a list of questions will be provided for informing us what issue you are requesting help with and some preliminary things you might do to fix the issue yourself. Please fill out the information as completely as possible to help us to prepare to help you.

 

Billing System: https://paconnect.connectboosterportal.com/admin  Our ConnectBooster Payment  Portal will give you access to your current invoices as well as past ones. You can set up an Autopayment with rules of how to authorize payments, to schedule payments, see pending payments that are scheduled, view any credits on your account and the total balance remaining on your account. Only authorized persons that have been assigned by your organization can access this information and they will need to contact our business office to be setup.

Friday
Jul192024

Microsoft / CrowdStrike outage: work around and all the latest news

Just a received an article from one of our distributors on this.

It is an article from Forbes discussing a work around.

CrowdStrike Windows Outage—What Happened And What To Do Next (forbes.com)

Tuesday
Jul022024

Local libraries offer a diverse range of services to their communities.

I remember the excitement always had as young person when I had the chance to go to our local library and pick out several new books to read through a week. This past Saturday when I brought my mother to her local library to pick up a new book to read, I was amazed at the all of the other media that now is available to access. Your local library is more than a source of books or research resources, but much more…

Here are some common ones:

  • Research Assistance: Libraries provide help with research, whether it’s finding information for school projects, academic papers, or personal interests.
  • Technology Access: Many libraries offer public computers, Wi-Fi, and assistance with digital literacy. They’re great places for job seekers, online learners, and anyone needing internet access.
  • Multimedia Resources: Libraries house books, audiobooks, e-books, and DVDs. You can borrow these materials for free, expanding your knowledge and entertainment options.
  • Educational Programs: Libraries host workshops, book clubs, and classes on various topics. From language learning to financial literacy, there’s something for everyone.
  • Community Events: Libraries organize events like author talks, art exhibitions, and cultural celebrations. They’re hubs for community engagement.
  • Children’s Services: Storytime sessions, homework help, and fun activities keep kids engaged and foster a love for reading.
  • Specialized Collections: Some libraries have unique collections—rare books, local history archives, or resources for specific groups.

Remember, libraries are more than just book repositories; they’re vibrant community spaces that promote learning, connection, and growth! 

Tuesday
Jul022024

Sophos Update

Removal of Inactive Devices for Endpoint and Server

  • Sophos Central can be configured to remove devices automatically (Delete) if these have been inactive for a specified length of time
  • Removing devices mean that these will no longer be listed on the Devices page and won't be managed by Sophos Central
  • Removal does not delete Sophos software from the devices.
  • Devices can be included in setup based on how long these have not checked in to Central, and exclusions can be set up as well.

Tuesday
Jul022024

Sophos Update

Restore deleted devices and recover Tamper Protection passwords

  • Recently deleted devices can be restored within 30 days. Deletion removes devices from Sophos Central management.
  • Tamper Protection passwords can be recovered for up to 180 days if Sophos software needs to be uninstalled from previously deleted devices.

 

Monday
Jul012024

Sophos DNS Protection is now available

Sophos is announced in mid June that they have added DNS Protection as part of their Xstream Protection to licensed Firewall customers.

Sophos DNS Protection is a valuable service that enhances network security. Here’s what you get:

  • Malicious Domain Blocking: Sophos DNS Protection instantly blocks access to unsafe and unwanted domains across all ports, protocols, and applications. It covers both managed and unmanaged devices, providing an extra layer of security.
  • Real-Time Threat Intelligence: Backed by SophosLabs’ AI-powered threat intelligence, it offers real-time protection from high-risk domains. When a malicious domain is detected, this information is instantly shared across all customers, ensuring immediate protection for everyone1.
  • Easy Deployment: You can set up Sophos DNS Protection in just a few minutes. It’s a cloud-based service managed via Sophos Central.
  • Policy Controls: You can configure policies to control domain categories or specific domain lists. This allows you to tailor the protection to your organization’s needs.
  • Visibility and Reporting: The service provides comprehensive dashboarding and reporting, giving you insights into the domains visited from your network.
  • Integration: Sophos DNS Protection’s log data and intelligence are shared with other Sophos products, enhancing overall threat detection and response.

Remember, it’s available at no extra charge for Sophos Firewall customers with the Xstream Protection bundle. So, it’s a win-win in terms of security and cost savings!

Thursday
Apr042024

Searching in Outlook

Since Office 365 and version 2019 has been released, the capabilities of the Outlook Search function has greatly improved. To get started look for the Seach field at the top of the Outlook screen. This will get you started. Also, take a look at Microsoft’s Support page located here. This will provide you with the syntax you can use to further detail your search criteria to the results you are looking for.

Wednesday
Apr032024

BE WARY OF INBOUND EMAILS THAT CONTAIN ENCRYPTED .PDF FILES

By now, everyone’s antennae should stand at attention whenever an email lands in your inbox that has a file attachment. The latest attempt to install malware onto computers via email phishing campaigns is courtesy of the Russian hacking crew “Coldriver”. The email possesses an encrypted .PDF file that the recipient is urged to open – the hackers respond to the plea for help to receive the decryption password they reply with a malicious hyperlink that downloads/installs malware onto the recipient’s machine.
Monday
Apr012024

Apple device owners are being targeted for password reset requests

A report coming through The Register is reporting that Apple device owners are being targed by a multi-factor authentication bombing campaign.

This isn't anything new that is occurring but an ongoing issue as one of the methods of phishing attempts to trick you into sharing your password with bad actors. But according to The Register Apple device owners are being targeted and should be more aware of this happening to you.

Always check the e-mail address to help you determine whether information coming through is coming from a known source or not. But an even better way to protect yourself is never to use the links that are provided in an e-mail request to change or update a password. Always log into the site by typing in the URL yourself for the site that you are attempting to make any changes in. If the source of the request for a password change his real that message should show up as being generated at that site which you can check at that time.

Be careful not to give away any of your security lockdowns.

Friday
Mar292024

What should I consider when purchasing a new tablet?

This is an interesting question because there are a lot of things that you need to consider when purchasing a tablet. The first of course is which world you want to live in whether it is the Apple iOS environment or if you I want to be in the Android environment.

Next you need to decide whether or not you are willing to work only on Wi-Fi or whether you want the added capability of having Internet access through cell towers as well. Of course having wireless cell connectivity will cost you more but if you do need to have Internet access no matter where you're located then that might be an option that you need to consider. If you already have a cell phone understand that if you need to have cellular connection most cell phones do have the ability to act as a mobile hotspot and you can turn them into that as needed for your other Wi-Fi devices to utilize that connectivity. It is a matter of what your needs are and how comfortable you are in being able to switch back and forth between connectivity options with your cell phone.

The last thing you need to consider it's how you use the tablet. In other words what applications do you need to run to do the things that you like to do with your tablet. For example, I decided to go to an Android device from a company called Boox that produces a tablet that is mainly used for handwriting. The tablet screen is based on the same technology as the Kindle so it works well both indoors and outdoors, that's backlit so it's good in the dark, and has special hand touch recognition circuitry so that it lends itself to handwriting with a pen very well. But it's not good for primarily our videos. The screen is not responsive enough for that purpose. For most people this would not be a good choice because they all want to use the tablet has a portable video screen.

Another consideration is choosing A vendor who's device is more generic then specialized to allow you the greatest latitude of applications and functions for that device over time. I would consider a device from a company like Samsung over Amazon’s fire series for that reason unless do you like the integration with Amazon services that the fire tablets have built in.

Try to look for a tablet that has the newest version of the operating system available so that you get the longest functionality out of the device over time. Realize that the operating systems on these tablets have an end of life time that make them less usable years down the road. I have an old iPad 2 that I can currently only use with a short list of applications because it's not compatible anymore with most of the current video programs like Netflix, HULU and YouTube TV to extend you video streaming consumption. It's the issue we have with manufacturers building obsolescence into their system so you have to continue to purchase new ones over time.

I hope this helps with getting you started in making some decisions on what your best choices are in purchasing a new tablet for yourself.

Thursday
Jan182024

Sophos - Leader for the 14th Time

 

Threats change. Sophos continues to be recognized.

For the 14th consecutive time, Sophos has been named as a Leader in the 2023 Gartner® Magic Quadrant™ for Endpoint Protection Platforms.

We believe this ongoing recognition is a testament to our relentless innovation, deep threat expertise, and continuing adaptation that enables us to defend customers from even the most sophisticated adversaries.

Endpoint protection that works for you and with you

Sophos Endpoint delivers unparalleled threat protection and powerful EDR and XDR tools. Designed for real-world environments and real-world threats, highlights include:

 

  • CryptoGuard anti-ransomware protection that detects and rolls-back both local and remote ransomware attacks
  • 60+ exploit mitigations that are deployed automatically – no configuration required
  • Adaptive Attack Protection which automatically applies more aggressive protection when a device is under attack
  • Critical Attack Warning that identifies an active estate-wide attack and proactively notifies customers so they can take immediate preventative action

 

 

Wednesday
Jan172024

Sophos wins BIG in CRN's ARC Awards

Scott Barlow, VP of Global MSP, Cloud Alliances at Sophos, spoke about the company’s impressive performance in the 2023 CRN Annual Report Card Awards. Sophos emerged as the top winner in five security categories, including data security, extended detection and response (XDR), cloud security, and SMB and enterprise network security.
In a video interview with CRN, Barlow attributed the company’s success to its commitment to the channel and its partner programs. Sophos’ MSP program, cloud security program, and the Sophos Partner Program have been well-received by partners, who appreciate the ability to manage all their security solutions from a single portal.
Congratulations to Sophos on their well-deserved wins!

Learn More

Friday
Nov032023

Planned Power Outage, West Penn Power, Sunday 12a-6a, Eastern Westmoreland Area 

Per West Penn:

There will be a planned power outage during this coming weekend. West Penn Power will be performing work Sunday night, between 12:00 am and 6:00 am. Areas to be affected are New Alexandria, Latrobe, Derry and Blairsville.

 

Monday
Oct302023

DUCKTAIL Spread via Compromised LinkedIn Profiles

By Cluster25 Threat Intel Team
October 25, 2023

Linkedin has been targeted as reported above using LinkedIn messages as a vector for executing identity theft attacks.

If it’s not enough for North Korean and Iranian hackers using this ultra-popular professional networking web site for cyber espionage, other groups are using it to distribute malware. Cybersecurity experts have tracked a malware strain known as ‘Ducktail’ on the platform that is targeting Italian company employees. Hackers are leveraging fraudulent profiles that offer lucrative job via the platform’s messaging system. The email proclaims that an attached .PDF file contains job details - but contains the Ducktail malware to infect the recipient’s system(s).Worth a quick read to be aware!

Click Here to read the article.

Friday
Oct272023

Microsoft List-Field Types

Microsoft List supports various field types and options that enable users to customize their lists according to their needs. Some of the field types and options that are available are:

  • Text: This field type allows users to enter any text value, such as names, descriptions, comments, etc. Users can also specify the maximum number of characters allowed for this field type.
  • Number: This field type allows users to enter any numeric value, such as quantities, prices, ratings, etc. Users can also specify the minimum and maximum values allowed for this field type, as well as the number of decimal places to display.
  • Date and Time: This field type allows users to enter a date and/or a time value, such as deadlines, start dates, end dates, etc. Users can also choose to display only the date or only the time, or both.
  • Choice: This field type allows users to select one or more options from a predefined list of choices, such as categories, statuses, priorities, etc. Users can also specify whether the choices are displayed as a drop-down list, radio buttons, or checkboxes.
  • Yes/No: This field type allows users to indicate a yes or no answer, such as completed, approved, active, etc. Users can also choose to display this field type as a toggle switch or a checkbox.
  • Person or Group: This field type allows users to select one or more people or groups from the organization's directory, such as owners, assignees, members, etc. Users can also choose to display the name only or the name and email address of the selected person or group.
  • Hyperlink or Picture: This field type allows users to enter a URL or upload an image file, such as links to websites, documents, images, etc. Users can also choose to display the URL as a hyperlink or an image preview.
  • Lookup: This field type allows users to select one or more values from another list in the same site, such as products, customers, orders, etc. Users can also choose which column from the source list to display in the lookup field.
  • Calculated: This field type allows users to create a formula that calculates a value based on other fields in the same list, such as totals, averages, percentages, etc. Users can also choose the data type and format of the calculated value.
  • Location: This field type allows users to enter a physical address or a geographic coordinate, such as locations, venues, coordinates, etc. Users can also choose to display the address as a map or a text.
Thursday
Oct262023

What is Microsoft List and How can I use it?

Microsoft List is a powerful tool that allows you to create and manage lists of data, tasks, events, and more. You can use Microsoft List to organize your work and personal life, collaborate with others, and access your lists from anywhere. Here are some of the benefits of using Microsoft List:

 

  • You can customize your lists with different views, filters, sorting, and formatting options.
  • You can integrate your lists with other Microsoft 365 apps, such as Teams, SharePoint, Outlook, and Power Automate.
  • You can use templates to create lists quickly and easily, or start from scratch and build your own.
  • You can share your lists with others and control their permissions and access levels.
  • You can use smart rules and alerts to automate workflows and get notified of changes or updates.

 

Microsoft List is a versatile and flexible solution that can help you manage your information and projects more efficiently and effectively. To learn more about Microsoft List, visit https://www.microsoft.com/en-us/microsoft-365/microsoft-lists/lists-app

Wednesday
Oct112023

Two-Factor Authentication (2FA) in Office 365: A Shield for Your Data

In the digital age, data security is paramount. Office 365’s Two-Factor Authentication (2FA) provides an extra layer of protection to ensure the safety of your personal and work files.

When you set up 2FA, you add an extra layer of security to your Microsoft 365 account sign-in. After entering your password, you’re prompted to provide a second form of authentication, such as a verification code provided by an authenticator app or sent to your phone.

The benefits of implementing 2FA in Office 365 are manifold1. It offers an additional layer of protection from unauthorized access, mitigates phishing threats, and is more efficient than traditional passwords. A maximum passcode entry limit prevents cybercriminals from hacking and accessing sensitive data.

Moreover, the process is manageable and user-friendly. There’s no need for a hardware token generator, and SMS authentication is the most common method of implementation.

In conclusion, setting up 2FA in Office 365 not only simplifies the user experience but also significantly enhances data security. It’s a small step towards safeguarding your digital assets but a giant leap in fortifying your online security.

Friday
Oct062023

Comparison Scores for the Account Health Check

The Account Health Check capability makes it easy for Sophos Endpoint and Server users to optimize their security posture and has already proved hugely popular. We continue to extend this feature, and customers can now compare their own health scores with the average scores of other organizations with a similar number of devices, providing context and motivation for improvement.

In the example below, the customer has an overall score of 49 which is well below the average score of 97. Customers can also compare each of the individual health check scores (e.g., protection installed, policies) to identify where to focus. The drop-down on the right enables users to select their desired comparison cohort.

Thursday
Oct052023

Continued Industry Recognition

Sophos Endpoint continues to garner high praise from experts across the industry, and recent recognition includes:

  • 100% Total Protection Score and two AAA awards in the SE Labs Q2 Endpoint Protection report. Sophos detected and stopped  both commodity, real-world cyberattacks and simulated targeted attacks with 100% accuracy
  • Sophos named a Leader by Frost & Sullivan in their inaugural XDR Radar Report
  • Sophos awarded Best Endpoint Security in the CRN® Tech Innovator Awards
  • Sophos named a Leader in the 2022 Gartner®️ Magic Quadrant™️ for Endpoint Protection Platforms

To learn more about Sophos Endpoint and start a free trial for yourself, visit our website or speak to your Sophos representative or partner.

Gartner, Magic Quadrant for Endpoint Protection Platforms, Peter Firstbrook, Chris Silva, 31st December 2022

GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, Magic Quadrant is a registered trademark of Gartner, Inc. and/or its affiliates and are used herein with permission. All rights reserved.

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.