RSS

Category Archives: Internet Security

Tips to stay safe Online

Tips to stay safe Online

Computer security, we all know, is of paramount importance these days, whether it be a personal computer, used solely for personal purposes or one used for official or business purposes. Every computer needs to be kept secure, especially since much of our day-to-day life today is centered around the computer and the internet. Here are some valuable tips that could help keep your computer safe…
Computer Security

Tip 1: Use good antivirus, internet security suite
This is the most basic thing. Have a good antivirus or a good internet security suite. There might be the argument that antivirus programs may not be able to keep all viruses out, but that antivirus software is key to a computer’s security is an undeniable truth. Go for antivirus software with the best of features, which would guarantee maximum security.

Tip 2: Encrypt the hard drive(s)
Encrypting the hard drive(s) in a computer makes it impossible for anyone to steal data from the system. In case the system gets stolen or anyone unauthorized gets access to the system, it would be easy to bypass the Windows password set. Encrypting the hard drive(s) would guarantee confidentiality and security of the data on the system.

Tip 3: Secure Wi-Fi Connection(s)
An unsecured Wi-Fi connection can make hacking a system is easy. A system with unsecured Wi-Fi connection(s) is always vulnerable. Hence it’s always good to secure Wi-Fi with passwords and by encrypting the connection.

Tip 4: Stay safe from tech support scams
Tech supports scams are common these days. Cold calls or pop-up alerts saying you have computer security issues and that you need to sort them out may be scams. Once you decide to seek their help, they’d offer remote tech support. Giving them remote control of your system would mean exposing all data, all files, and documents that are there on the system. Thus it’s always good to stay safe from tech support scams.

Tip 5: Browse safe, stay safe from phishing emails etc
Ensure safe internet browsing habits. Stay away from spammy websites, make payments or purchases only through secure websites and always be wary of phishing emails and links.

Advertisements
 

Tags:

Businesses Getting Started with Mobile Device Management

More businesses than ever before are finding themselves in a position where they need to figure out a way to fully embrace mobile device use that goes beyond their executive and sales teams. In a s…

Source: Businesses Getting Started with Mobile Device Management

 
Leave a comment

Posted by on December 1, 2016 in Internet Security

 

How to install Comodo One – Easy Guide

Comodo RMM, you must have an active Comodo One Account and have added devices and users to the Comodo IT and Security Manager (ITSM) module. Once you have added devices to ITSM, you will be able to download the  RMM console and push the RMM client to managed endpoints.

Basic Setup:

  1. Add devices, endpoints and users to Comodo IT and Security Manager as described above.
  2. Enable the RMM extension in Comodo IT and Security Manager (‘Settings’ > ‘Extensions’ > set RMM switch to ‘ON’)
  3. Install the RMM Admin console. The console is used to monitor endpoints, define policies and configure endpoint service desk requests, and should be installed on a local workstation or server. To download the console, open ITSM > Devices > Device List. Select any endpoint from the list and click ‘Takeover’. This will allow you to download the console setup files to your local machine.
  4. Install the RMM client software on target endpoints. The agent facilitates communication between endpoints and the admin console. The agent is automatically installed on managed endpoints once the RMM extension is enabled in ITSM (step ii, above). Should the need arise, you can also install the agent manually by clicking Devices > Device List, selecting your target endpoints then clicking ‘Install MSI/Packages’ > ‘RMM Agent‘.

 

 
Leave a comment

Posted by on August 25, 2016 in Internet Security, RMM

 

Tags: ,

Unfriendly Service Desk Systems Frustrate End Users

There are plenty of Service Desk Systems from many vendors in the market. But not all of them are user-friendly to end users, service desk staff and service desk administrators. Most systems…

Source: Unfriendly Service Desk Systems Frustrate End Users

 
Leave a comment

Posted by on August 12, 2016 in Internet Security

 

Unfriendly Service Desk Systems Frustrate End Users

There are plenty of Service Desk Systems from many vendors in the market. But not all of them are user-friendly to end users, service desk staff and service desk administrators. Most systems are either friendly to the end users or to the administrators. They are not the best for both. Advanced Service Desk Systems are part of Complete IT Management Platforms offered by major vendors, and these platforms include IT and security management (ITSM) with remote monitoring and management (RMM), patch management and service desk management.

Whenever end users face issues they raise them as a ticket in the Service Desk System, which is also called as a Help desk system or ticket management system. The users specify the priority, due date and other conditions with which the issue must be addressed usually in a Customer Web Portal. Service level agreements are maintained between the end user’s enterprise/ company and the service provider. Based on the kind of Service Desk Systems, tickets are assigned automatically or manually by service desk staff. The tickets are assigned to the concerned department, who would be able to monitor the ticket and its details, and then take appropriate action.

The Customer Web Portal is the place where many users find it difficult to handle. Some are designed with too many criteria to specify, some are too complicated, and some do not have customized fields for specifying the issues or requests. Their unfriendly nature has in many cases lead enterprises/ corporates to resort to a system wherein the end user directly contacts the IT support staff through phone or email and conveys the issue. The IT support staff create the ticket on behalf of the end users and rest of the process is the same.

If the Customer Web Portal component is friendly enough then the end users would be able to monitor the state of their request (in real-time) and communicate with the IT support personnel on any clarification or change in details. Better communication facility leads to better, speedy solutions.

In fact, some IT support service providers maintain that providing a Customer Web Portal is not a good idea at all. They are totally against this idea, citing reasons that in most companies the process is cumbersome. The end-user has to provide information such as name, username, and contact details such as – phone number and e-mail address, and then the problem details and the problem category, plus there may be other details too. The issue by itself creates frustration in the end user, and as adding fuel to fire – specifying data and answering numerous questions about the issue-at-hand adds to their frustrations.

This is where the IT department of any enterprise must take the correct decision and identify an easy but robust Service Desk System that is simple enough for end users to handle.

Useful Source:

Get Free RMM Software here: https://one.comodo.com

 
Leave a comment

Posted by on August 12, 2016 in Internet Security, MSP

 

Tags: , ,