(608) 755-1524 sales@computer-center.com
Your time is limited, so don’t waste it living someone else’s life.
Steve Jobs

IT Security Tip #12: The DANGERS of Dropbox and Other File Sync Apps

If you’re using Dropbox, OneDrive, Google Drive or other consumer-grade file sync and sharing cloud applications, listen up! These applications pose a huge threat to your company because company data can be spread far and wide without central oversight of what information is being shared with whom. Further, over 7 MILLION Dropbox accounts have been hacked, giving cybercriminals a path into the company’s network.

This is even MORE important if your company has access to and/or stores financial, medical or other sensitive data. Using file-sharing applications like these are a clear and direct violation of data breach and compliance laws. Bottom line, DON’T USE THEM FOR COMPANY DATA and use only company-approved, business-grade file-sharing applications.

Microsoft Teams: Connect Your Team to the World with Connectors

Did you know you can set up a Twitter feed for your Team? And many other services, too, including Trello, GitHub, Bing News, and more. With Office 365 Connectors, it’s easy to connect many of your favorite apps and services. Here’s how:

  1. Right-click the channel you want to add a connector to.
  2. Select Connectors.
  3. Search for the connector(s) you want to add to the channel.
  4. Click Add, and follow the prompts.

Keyboard Keys

Shortcut of the Week

Forgot to bookmark a web page you once visited? Don’t fret! Quickly find your site by searching your browser history. Press Ctrl + H or Command + H on a mac to open the browser’s history. Once there, type a keyword that you remember about that page.

Tech Corner

A security vulnerability in one of the world’s most commonly used enterprise video conferencing tools could have allowed hackers to eavesdrop on private business meetings. researchers at cybersecurity company Check Point found it was possible to exploit the way Zoom generated URLs for virtual conference rooms and use this to eavesdrop on meetings. By using automated tools to generate random meeting room IDs, researchers found that they could generate links to genuine Zoom meetings without password protection 4% of the time during tests. In order to counter the potential for cyber criminals exploiting any form of teleconferencing software by using any potential vulnerabilities in other platforms, it’s recommended that businesses ensure that calls are password protected.”

Have an unfortunate co-worker that’s not getting a copy of the TCC Tuesday Tidbits? Forward them your copy. Or, better yet, have them sign up at http://computer-center.com/tidbits/

Submit your TCC Tuesday Tidbit requests and ideas to me by calling (608) 755-1524.

Sincerely,

James Pearson, President The Computer Center 39 S. Main St. – Upper Janesville, WI 53545 (608) 755-1524