40
Tech Toys November 21, 2013

Tech committee presentation november

Embed Size (px)

DESCRIPTION

This month we cover tech toys - Tablets, Google Chromecast, portable scanners, and an important tech tip on safe computing! iPad Air and the new iPad Mini, The Google Nexus 7, the Dell XPS 10, Microsoft Surface, Google Chromecast (this is so cool!), the Neat Receipts scanner, Fujitsu ScanSnap, and information on Cryptolocker and safe computing.

Citation preview

Page 1: Tech committee presentation november

Tech Toys

November 21, 2013

Page 2: Tech committee presentation november

The purpose of this meeting is to inform and introduce

technology to Chamber members, not necessarily to give a complete education on the topics discussed.

Some of the technologies discussed are quite often available through Chamber member companies, including several of the volunteers in the subcommittee. Other topics are presented as classes by the Chambers.

If you would like to discuss any of these topics more in-depth, please contact one of the subcommittee members after the meeting and we’ll get you in touch with the best contact for your interest.

Mission

Page 3: Tech committee presentation november

Sub-Committee

Chamber Member Companies working together to bring you the information on the technological topics that interest you and can benefit your business!

Co-Chairman

Ken Tucker, Changescape Web

Mark Peimann, EPC Computers

Andy Kastrup, ProTronics Technologies, Inc.

Art & Candy Zemon, Hen’s Teeth Network

Beth Richter, ProTronics Technologies, Inc.

Don & David Weir, Managed Computer Services

Paul Barthel, Minuteman Press

Randy Downs, Independent Consultant

Page 4: Tech committee presentation november

Facebook Events Check-in facebook.com/STCCTechComm

Page 5: Tech committee presentation november

iPads

Page 6: Tech committee presentation november

iPad Air

It’s just 7.5 millimeters thin and weighs just one pound.

From $499

Page 7: Tech committee presentation november

iPad Air We want everyone to have the best possible experience with the products we

make. That’s why iPhoto, iMovie, GarageBand, Pages, Numbers, and Keynote

are now free with every Mac and iOS device.

Page 8: Tech committee presentation november

Google Nexus 7

Nexus 7 Powerful, portable and made for what matters to you. Now thinner, lighter, and faster — Nexus 7 brings you the perfect mix of power

and portability and features a sharp 7” screen. MEMORY

Nexus 7

$349

Page 9: Tech committee presentation november

Dell XPS 10 XPS 10 (XPS10-3636BLK) at a glance... Processor: Dell XPS 10 Tablet with Qualcomm® Snapdragon™ S3 1.5GHz DC processor and 64GB Flash Storage Display: 10.1" High Definition (1366x768) IPS with Gorilla Glass Operating system: Windows RT [Win 8 edition for ARM] Memory (RAM): 2GB LP-DDR2 Storage (hard drive): 64GB eMMc Optical drive: No Optical Drive Audio: Stereo Speakers Preinstalled software: Microsoft® Defender (included with Win 8 OS), Microsoft® Office Home & Student 2013 RT

Page 10: Tech committee presentation november

Microsoft Surface

Page 11: Tech committee presentation november

Microsoft Surface Pro 2 “One Device for Everything in Life”

Obviously trying to appeal more to the business user

Now really highlighting the fact that this can be your only

device

From desktop to laptop to tablet

Accessories highlight this:

Docking Station (for the Pro models) – adds 4 USB ports,

Ethernet, audio, mini display port

Type Cover 2 – backlit keys

Power Cover – extends battery life

Page 12: Tech committee presentation november

Google Chromecast The cheap & easy way to bring online video & music to your TV

HBO Go – added this morning

Hulu Plus

Pandora

Netflix

YouTube

Google Play TV, Music & Movies

Chrome tabs (with the Chromecast Extension on your Chrome browser)

$35

Page 13: Tech committee presentation november

Neat Scanners Neat Connect $499.95

Cloud Based (No computer needed)

Neat Desk $ 399.95 Desktop ADF scanner with unique paper input tray

Faster scanning

Proprietary industrial design

Neat Receipts $ 179.95 All new proprietary industrial design and software

Automatically extracts key information from scanned

receipts; can export to Excel, Quickbooks, TurboTax,

and more

Scans are IRS-accepted digital copies, making tax

preparation a snap

USB interface also provides power so no AC adapter

needed

Highly portable

Software is the draw here

Page 14: Tech committee presentation november

Fujitsu ScanSnap

Price: $295

Page 15: Tech committee presentation november

Fujitsu ScanSnap

Page 16: Tech committee presentation november

- Ransomware/encryption Trojan virus.

Unlike other ransomware such as the FBI

virus, this virus does actual damage.

Infection occurs (typically through an

email attachment or link in an email),

encryption starts in the background while

you continue to work, then after the

damage is done, you get a pop-up similar

to the picture on the right

This is a game-changer virus and it is

ever-evolving

Your BEST defense is to be smart!!!

Quick Tips:

Don’t click on attachments unless you

know what it is & who it came from

Don’t click on links in emails – unless you

know it is valid!! Do a mouseover!!

TechTip NASTY NEW VIRUS ---

CryptoLocker

REVIEW OUR SAFE COMPUTING TIPS FROM OUR MAY TECH COMM!!

Page 17: Tech committee presentation november

November 21, 2013

Presented by:

Tech Toys

Please fill out your survey & drop it in the box before you leave

Art & Candy

Zemon

Mark Peimann Ken Tucker Andy Kastrup

Beth Richter

Paul Barthel Randy Downs Independent

Consultant

Don & David Weir

Page 18: Tech committee presentation november

Safer Computing

May 16, 2013

Page 19: Tech committee presentation november

What is malware? Malware: Is malicious software that’s specifically

designed to gain access or damage a computer

without the knowledge of the owner

Includes:

viruses

worms

trojan horses

spyware

dishonest adware

crimeware

scareware

ransomware

most rootkits

other malicious and

unwanted software

Page 20: Tech committee presentation november

What is malware? #1 goal: REPRODUCTION / PROLIFERATION

Causing damage to computer systems, destroying

data, or stealing sensitive information are ALL

Secondary objectives, HOWEVER,

much of malware today is created for profit

through forced advertising (adware), stealing sensitive

information (spyware), spreading email spam or lewd

photography (zombie computers), or to extort money

(ransomware)

originally created as experiments and pranks, but

eventually led to vandalism and destruction of targeted

machines

Page 21: Tech committee presentation november

Anti-malware any program that combats malware, whether it’s

real-time protection or detection and removal of

existing malware.

Anti-virus, anti-spyware applications and malware

scanners are examples of anti-malware.

Like a “flu-shot” for your computer – it doesn’t

guarantee you won’t get infected

Page 22: Tech committee presentation november

Common Methods of Infection Email

Attachments: executables, .zip files, videos

Misdirecting Links: phishing, spam

Password hacks (brute-force attacks)

Web

Hi-jacking

Social networking websites

Banner ads

Unreputable web sites

Pop-ups

USB drives – pre-infected

Page 23: Tech committee presentation november

Examples – Spoofing Several things about this one, but notice the address is citybank, not citibank

Page 24: Tech committee presentation november

Examples - FAKE I don’t know of a single law enforcement agency that will send you an email

about legitimate business. Not to mention, it wouldn’t come from a gmail or

yahoo account.

Page 25: Tech committee presentation november

Examples “Mouseover” To do a “mouseover”, hover your mouse cursor over the link

it will show where the link is actually taking you! Notice they don’t match!!

Page 26: Tech committee presentation november

Common Viruses Trojans: conceals itself inside software that seems

legitimate – “trojan horse” from Greek Mythology

Cyber-crooks often use viruses, trojans and worms

together. They design a trojan that ‘drops’ a virus or

worm onto the victim’s computer thus initiating a brand

new infection. This virus or worm is usually called the

‘payload’ of the trojan. Trojans can also drop spyware.

These are often referred to as a “Virus Cocktail”

Rogue Antivirus Software viruses

(scareware/ransomware)

FBI virus (ransomware/scareware)

Page 27: Tech committee presentation november

Examples

Page 28: Tech committee presentation november

Examples

Page 29: Tech committee presentation november

Examples

Page 30: Tech committee presentation november

Examples

Page 31: Tech committee presentation november

Examples

Page 32: Tech committee presentation november
Page 33: Tech committee presentation november

Examples

Page 34: Tech committee presentation november

Examples

Page 35: Tech committee presentation november

Examples

Page 36: Tech committee presentation november

Examples

Page 37: Tech committee presentation november

Tips & Tricks / Best Practice You’ve already taken the 1st step: EDUCATION

Know what your anti-malware program looks like &

Keep it updated

Install program updates as needed & often

“Patch Tuesday” or “zero hour” viruses

“mouse-over” links before clicking

Don’t use the same login & password for all

accounts

Disable plug-ins

Page 38: Tech committee presentation november

More Info Why is it “always” Windows?

It is not – Macs are not impervious to viruses

It’s a matter of numbers

Smartphones can get them too

Infection is 5.5 times more likely with no anti-malware

¼ of all PCs have no anti-malware

Ransomware explained: http://www.youtube.com/watch?v=-qR3D-Jx6FQ

Page 39: Tech committee presentation november

What to do after infection If possible, run a scan with your anti-malware

software

Some malware disables this ability

If the computer is “locked down” or won’t let you run

a scan…shut the computer down & call your IT

Professional for help!

The longer you ignore it, or leave the machine on, the

worse the infection can get (depends on infection)

“Virus cocktails”

Page 40: Tech committee presentation november

Tech Tip: Backup!!!

Seriously though, we will talk about Backups more in depth in January!!