Photos
Videos
David Sawyer wins iPad 2 from SupportChoice.com
1
2
Posts

Mystery shopping gigs can be a lot of fun, but many online scammers use it as an opportunity to prey on well-meaning consumers. If you’re interested in working in this field, avoid any opportunity, including so-called “certification” programs, that requires you to pay any amount of money.

Image may contain: 1 person

Shopping online provides a convenient way to get all the best deals - seems like a real win on the surface! However, these transactions can increase your risk of identity theft that could ruin your credit. But there are strategies for staying safe and drastically lowering your chances of fiscal harm!

Learn more in our blog:

Ecommerce stands as the most popular way to purchase goods and services, with over $227 billion worth of internet-based transactions conducted in 2012 alone. Since it is such a popular platform, consumers should take time to educate themselves about how to stay safe from identity thieves and other f…
supportchoice.com
Posts

SupportChoice wishes you and yours a joyous Father’s Day!

Image may contain: 3 people
Unsecure Wi-Fi networks have been a well-known vulnerability in the tech industry for years. They can let even an unsophisticated hacker capture your traffic and possibly steal your identity.
n.pr

SupportChoice offers a variety of backup and recovery services to help you and your business bounce back quickly following a virus, malware or other breach. Learn more: http://www.supportchoice.com/backup-and-recovery/

Image may contain: one or more people

“Now or never” deals, transactions via email, and “free” services requiring a credit card number aren’t inherently bad – but they do require an extra level of caution.

Before making your first purchase through an online retailer, see if the business checks out with The Better Business Bureau: http://www.bbb.org/online/consumer/default.aspx

No automatic alt text available.

Google’s new Google Apps Message Encryption (GAME) service encrypts messages outside of Gmail and could make its cloud-based service more appealing to businesses who use encrypted email.

No automatic alt text available.

Use this SupportChoice tool to help you, your company and your family avoid scams, spam and other potentially devastating computer issues:

Unfortunately, there’s no such thing as a universal strategy for preventing viruses, identity theft, phishing scams and other problems that can wreak havoc on your machine. However, there are some simple steps that home and business owners should take in order to best protect themselves, their famil…
supportchoice.com

The Chameleon virus was created in a lab to study the vulenability of wireless, public computer networks. Thankfully, Chameleon exists only in a lab, but there are other viruses out there that go after wireless users. Our latest blog explains what you need to protect yourself when using Wi-Fi.

Since the early 1980s, viruses typically took on the form of Trojans hidden in emails and communication software, or phony and malicious websites built to hijack one’s browser. Now, as the world becomes increasingly more mobile and the need to be desk-bound in order to access the Internet a thing of…
supportchoice.com

Wishing you a safe and blessed Memorial Day.

Image may contain: sky and outdoor

Still confused about Heartbleed? Xkcd has the best, simplest explanation of how it works. See the full thing here:

Warning: this comic occasionally contains strong language (which may be unsuitable for children), unusual humor (which may be unsuitable for adults), and advanced mathematics (which may be unsuitable for liberal-arts majors).
xkcd.com

Step one in preventing scammers from scamming your personal and professional files? Know thine enemy.

We really like this primer on how attacks are carried out, the different types of hackers, and the strategies they deploy: http://images.globalknowledge.com/…/WP_CI_HackersHackingand…

Image may contain: one or more people, laptop and screen

Mobile platforms have given a big boost to businesses and customers alike. But mobile also means more opportunities for scams. Find out how to prevent leaks!

Courtesy Note: This link will begin downloading a whitepaper.

While consumerization offers many benefits for both end users and the enterprise in terms of convenience, efficiency and productivity, it presents important challenges for IT departments, especially in terms of endpoint backup and data security. To reap the benefits of consumerization while avoiding…
itwhitepapers.com

Now that you’ve changed your passwords and most sites have patched the Heartbleed bug, stay on the lookout for other types of online fraud.

Heartbleed dominated the discussion about cyber security last month. Understandable, of course, but narrowing all the media attention to a single security bug obscures the fact that other, more dangerous bugs still pose a threat to individuals and networks. Resources should be allocated toward defen…
supportchoice.com

Be Happy!

Why settle for clapping along? Cast yourself in Pharrell Williams's megahit song & video and spread the "Happy!"
jibjab.com

Why you should be cautious about what you like and share on Facebook:

When you click or press the Like button, you may be disclosing more about yourself than you imagine. You may also be contributing to the bank accounts of Internet scammers.
cnet.com