<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Desktop Solutions Software</title>
	<atom:link href="https://desktopsolutions.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://desktopsolutions.com/</link>
	<description>Custom software specialists since 1996</description>
	<lastBuildDate>Sun, 05 Jan 2025 23:15:16 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>

<image>
	<url>https://desktopsolutions.com/wp-content/uploads/2015/10/cropped-favicon1-1-32x32.jpg</url>
	<title>Desktop Solutions Software</title>
	<link>https://desktopsolutions.com/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Desktop Solutions creates website for Houston Dog Rescue</title>
		<link>https://desktopsolutions.com/desktop-solutions-creates-website-for-houston-dog-rescue/</link>
		
		<dc:creator><![CDATA[frank]]></dc:creator>
		<pubDate>Sun, 05 Jan 2025 22:58:32 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://desktopsolutions.com/?p=5431</guid>

					<description><![CDATA[<p>Desktop Solutions Software has created a website for the Houston Dog rescue, Waiting Under the Willow Foundation. The website at https://wuwf.org includes a number of features including a database of adoptable dogs, donation forms, videos, photos and information about the foundation and more. Using the website, volunteers can submit interest, donations may be made in&#8230;</p>
<p>The post <a href="https://desktopsolutions.com/desktop-solutions-creates-website-for-houston-dog-rescue/">Desktop Solutions creates website for Houston Dog Rescue</a> appeared first on <a href="https://desktopsolutions.com">Desktop Solutions Software</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Desktop Solutions Software has created a website for the Houston Dog rescue, Waiting Under the Willow Foundation. The website at <a href="https://wuwf.org">https://wuwf.org</a> includes a number of features including a database of adoptable dogs, donation forms, videos, photos and information about the foundation and more.</p>



<p>Using the website, volunteers can submit interest, donations may be made in memory of a loved one, dogs can see searched, foster homes can be arranged and more.<br><br>The website includes many slideshows of adopted dogs, volunteers caring for the animals, and staff explaining what to expect when adopting a dog.</p>



<p>In addition a page is devoted to the foundations sponsors &#8211; <a href="https://compucycle.com/">CompCycle,</a> <a href="https://www.czechrddog.com/">Czechrd Dog</a> and <a href="https://desktopsolutionscom/">Desktop Solutions Software</a>.</p>



<p>Angelique Strickler is the founder of WUWF and has been instrumental in the site design and function.  </p>



<p><strong>About The Waiting Under The Willow Foundation (WUWF)<br></strong><br>The mission of WUWF is to save as many dogs off the streets as well as dogs on euthanasia lists at shelters across Texas.<br><br>They spay and neuter all dogs in hopes of reducing the number of unwanted dogs in our state.<br>Our goal is to find them homes full of love and compassion.<br></p>
<p>The post <a href="https://desktopsolutions.com/desktop-solutions-creates-website-for-houston-dog-rescue/">Desktop Solutions creates website for Houston Dog Rescue</a> appeared first on <a href="https://desktopsolutions.com">Desktop Solutions Software</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Webinar: Fortify and Mobilize: Navigating the Security Landscape in Web and Mobile Applications</title>
		<link>https://desktopsolutions.com/webinar-fortify-and-mobilize-navigating-the-security-landscape-in-web-and-mobile-applications-2/</link>
		
		<dc:creator><![CDATA[frank]]></dc:creator>
		<pubDate>Mon, 29 Jul 2024 20:03:35 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://desktopsolutions.com/?p=5404</guid>

					<description><![CDATA[<p>The post <a href="https://desktopsolutions.com/webinar-fortify-and-mobilize-navigating-the-security-landscape-in-web-and-mobile-applications-2/">Webinar: Fortify and Mobilize: Navigating the Security Landscape in Web and Mobile Applications</a> appeared first on <a href="https://desktopsolutions.com">Desktop Solutions Software</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fl-builder-content fl-builder-content-5404 fl-builder-content-primary fl-builder-global-templates-locked" data-post-id="5404"><div class="fl-row fl-row-fixed-width fl-row-bg-none fl-node-5xjszu9o2hk7 fl-row-default-height fl-row-align-center" data-node="5xjszu9o2hk7">
	<div class="fl-row-content-wrap">
						<div class="fl-row-content fl-row-fixed-width fl-node-content">
		
<div class="fl-col-group fl-node-je974idysfxq" data-node="je974idysfxq">
			<div class="fl-col fl-node-6qra80gd1ftw fl-col-bg-color" data-node="6qra80gd1ftw">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-video fl-node-co5d7e4h9jm0" data-node="co5d7e4h9jm0">
	<div class="fl-module-content fl-node-content">
		
<div class="fl-video fl-embed-video">
	<iframe title="Webinar: Fortify and Mobilize: Navigating the Security Landscape in Web and Mobile Applications" width="500" height="281" src="https://www.youtube.com/embed/Hx7WMRztCHE?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></div>
	</div>
</div>
<div class="fl-module fl-module-rich-text fl-node-gtuc0rzn6mv8" data-node="gtuc0rzn6mv8">
	<div class="fl-module-content fl-node-content">
		<div class="fl-rich-text">
	<p><a href="https://www.youtube.com/@AGILEInfowaysPvtLtd"></a></p>
</div>
	</div>
</div>
</div>
</div>
	</div>
		</div>
	</div>
</div>
</div><p>The post <a href="https://desktopsolutions.com/webinar-fortify-and-mobilize-navigating-the-security-landscape-in-web-and-mobile-applications-2/">Webinar: Fortify and Mobilize: Navigating the Security Landscape in Web and Mobile Applications</a> appeared first on <a href="https://desktopsolutions.com">Desktop Solutions Software</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Ransomware: A New Security Threat to Your Site</title>
		<link>https://desktopsolutions.com/ransomware-a-new-security-threat-to-your-site/</link>
		
		<dc:creator><![CDATA[frank]]></dc:creator>
		<pubDate>Mon, 13 Jul 2020 15:53:55 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://desktopsolutions.com/?p=5278</guid>

					<description><![CDATA[<p>IMPORTANT ALERT ABOUT RANSOMWARE AND YOUR SITERansomware, once a menace mainly for consumers, has recently become a significant threat to business websites, even small ones. Please read the following important notice about this new risk and our recommendations for mitigating it. WHAT EXACTLY IS RANSOMWARE?Ransomware is a form of malware that encrypts or hides a&#8230;</p>
<p>The post <a href="https://desktopsolutions.com/ransomware-a-new-security-threat-to-your-site/">Ransomware: A New Security Threat to Your Site</a> appeared first on <a href="https://desktopsolutions.com">Desktop Solutions Software</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><strong>IMPORTANT ALERT ABOUT RANSOMWARE AND YOUR SITE</strong><br>Ransomware, once a menace mainly for consumers, has recently become a significant threat to business websites, even small ones. Please read the following important notice about this new risk and our recommendations for mitigating it.</p>



<p><strong>WHAT EXACTLY IS RANSOMWARE?</strong><br>Ransomware is a form of malware that encrypts or hides a victim&#8217;s files. The attacker then demands a ransom from the victim to restore access to the data, usually via bitcoin payment so the attacker can remain anonymous.</p>



<p><strong>HOW RANSOMWARE WORKS</strong><br>Hackers, employed by sophisticated criminal enterprises and governments like China and Russia, continually attack websites until they gain access. Once inside a website’s administration panel, they kidnap the site’s data files (by moving them or encrypting them) until a ransom is paid to release them.</p>



<p>In the case of most Desktop Solutions clients, the files affected could be a database of items in inventory system, or simply pages in a WordPress website. But the most important thing to know is that at the end of the process, the files cannot be decrypted without a mathematical key known only by the attacker. The user is presented with a message explaining that their files are now are now inaccessible and will only be decrypted if the victim sends an untraceable Bitcoin payment to the attacker. The costs can range from a few hundred dollars to thousands, payable to cybercriminals in Bitcoin.</p>



<p><strong>THOUSANDS OF ATTEMPTED ATTACKS IN THE LAST TWO WEEKS</strong><br>Unfortunately, we have experienced thousands of attempted attacks in the last two weeks. Through diligent monitoring and mitigation tactics, we have been able to thwart all the attacks to date and keep our clients’ sites protected. Part of this Since attacking small business websites is a very new phenomenon, we have reported our findings to the OWASP and the FBI.</p>



<p><strong>WHAT WE’RE DOING TO PROTECT YOUR SITE</strong><br>In an effort to protect our clients’ data, we have made significant changes to our data back-up systems. We are now storing all site back-up materials on a separate server, so your data is better protected in the event of an attack.</p>



<p><strong>ADDITIONAL SECURITY MEASURES WE RECOMMEND</strong><br>Although we have taken measures to protect our data servers from these attacks, we strongly advise that all clients take the following actions:</p>



<p><strong>Improve passwords and update them monthly:</strong></p>



<ol class="wp-block-list">
<li>Make sure your password is a combination of alphanumeric characters, symbols, upper and lower case characters and is at least 12 characters long.</li>



<li>Do not use the same password for all your different website logins.</li>



<li>Change your passwords monthly to keep them doubly secure.</li>



<li>Store users’ passwords in encrypted form. This ensures that even if there is a security breach, attackers do not get their hands on actual user passwords.<br>Upgrade to two-factor authentication<br>We recommend that all client sites implement two-factor authentication for all logins. That means we’ll install an additional security feature on your site, that requires you to enter an additional code to login to the site, usually sent to your cell phone via text message.</li>
</ol>



<p><strong>More frequent back-ups</strong><br>We currently back-up all sites daily. If you’d like us to increase the frequency of back-ups, we can prepare an estimate to accommodate the frequency of your changes.</p>



<p><strong>Add a web application firewall to your hosting package</strong><br>A Web Application Firewall (WAF) inspects incoming traffic and weeds out malicious requests –- before a hacker gets to your site. These could-based systems are available to add to your site for a small monthly fee added to your hosting.</p>



<p><strong>WHAT HAPPENS IF YOU DON’T IMPLEMENT THESE RECOMMENDATIONS?</strong><br>Implementing these recommendations can allow you to avoid or mitigate the effect of a ransomware attack. Without them, should an attack occur, your site could experience prolonged downtime (24 hours or more) while we work to restore your data. And, without a recent back-up, some of your data could be lost forever. We also reserve the right to charge standard hourly labor rates for restoration of your data.</p>



<p>To learn more, please consult the <a href="https://www.zdnet.com/article/ransomware-is-now-your-biggest-online-security-nightmare-and-its-about-to-get-worse/">following article</a>, courtesy of ZDNet.</p>



<p></p>



<p></p>
<p>The post <a href="https://desktopsolutions.com/ransomware-a-new-security-threat-to-your-site/">Ransomware: A New Security Threat to Your Site</a> appeared first on <a href="https://desktopsolutions.com">Desktop Solutions Software</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Working at Home: Tips on Maximizing Your Productivity</title>
		<link>https://desktopsolutions.com/working-at-home-tips-on-maximizing-your-productivity/</link>
		
		<dc:creator><![CDATA[frank]]></dc:creator>
		<pubDate>Tue, 17 Mar 2020 18:39:28 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://desktopsolutions.com/?p=5216</guid>

					<description><![CDATA[<p>We&#8217;ve been working remotely since 2007, so we&#8217;d like to share some tips on making your work-at-home experience as productive as possible. Hardware: Most people have a laptop that they can use in any room of the house, but some people will need additional hardware like pcs, printers and scanners for team members to work&#8230;</p>
<p>The post <a href="https://desktopsolutions.com/working-at-home-tips-on-maximizing-your-productivity/">Working at Home: Tips on Maximizing Your Productivity</a> appeared first on <a href="https://desktopsolutions.com">Desktop Solutions Software</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>We&#8217;ve been working remotely since 2007, so we&#8217;d like to share some tips on making your work-at-home experience as productive as possible.</p>



<p><strong>Hardware:</strong> Most people have a laptop that they can use
in any room of the house, but some people will need additional hardware like
pcs, printers and scanners for team members to work effectively from home.
Companies like <a href="https://www.carrxerox.com/">Xerox</a> are offering
surprisingly inexpensive work-at-home packages to get you up and running
quickly.</p>



<p><strong>Online Meeting Software: </strong>Most people are using
Microsoft Office at this point, but not everyone uses the Teams tool. For
internal meetings especially, this tool is great for group chats, group voice
calls and screen sharing. The old saying, “A picture paints a thousand words”,
holds true. Sometimes there is no substitute for seeing someone else’s screen
when trying to explain something.</p>



<p>Another great tool is <a href="https://slack.com/"><strong>Slack</strong></a><strong>.</strong>
It has some additional tools for classifying projects, organizing conversations
and storing information and files in a searchable archive.</p>



<p>For outside clients, online meeting tools are a great way to
do make presentations, address technical support issues, do product
demonstrations, and present proposals. I have used almost every tool out there
including <a href="https://www.gotomeeting.com/"><strong>Gotomeeting</strong></a>, <a href="https://www.skype.com/en/"><strong>Skype</strong></a><strong>,</strong> and <a href="https://zoom.us/"><strong>Zoom</strong></a>. I prefer Gotomeeting personally, as I
like its ability to switch back and forth between presenters, draw on the
screen, and record important meetings. I rarely use the webcam feature on any
of these systems, as I feel they are a bit jumpy and distract from the meeting
content.</p>



<p><strong>Create an agenda:</strong> Ever been on a conference call
where the presenter rambles on with seemingly no point? Me too. It’s one of
most people’s biggest pet peeves. Whatever technology you are using, stop to
create a quick agenda of topics to cover before you begin the meeting. I will
keep everyone on track and help you develop a reputation for being focused and
professional.</p>



<p><strong>Know when to use what tool:</strong> It’s great that we have
this technology available to us, but let’s face it, sometimes it gets on the
way. I often find that for quick questions, a phone call is often faster than a
lengthy email or an online meeting. Most people are busy, and appreciate
brevity when it’s called for.</p>



<p><strong>Minimize Distractions with a Structured Day:</strong> For some
people, the flexibility of working at home can also mean being distracted by
kids home from school, household chores, and other day-to-day things that you
don’t have to worry about in your office. To keep you focused, I recommend
using what I refer to as a ‘structured day’. This simply means dividing up your
day into a few different parts. How long you spend on each section depends a
lot on what you do, so keep that in mind.</p>



<p><strong>Part One – Responding, organizing
and meetings. </strong>The couple of hours of each day, I spend my time reading and
responding to emails, making phone calls, having meetings, organizing tasks, and
getting things in place to move to the next part of the day, which I refer to
as ‘groove time’.</p>



<p><strong>Part Two &#8211; Groove time.</strong> This
is the part of the day where I produce work. For me it could be writing a
marketing plan, doing research, designing something, writing copy, or posting
on social media. For you it may be totally different, but regardless of what
you do, it is supposed to be uninterrupted time to concentrate on whatever you
are working, without distractions like the answering the phone, checking email,
having meetings or dealing with the kids. It can be as short or as long as
necessary – whatever it takes to accomplish what you’ve set out to be done that
day.</p>



<p><strong>Part Three –</strong> <strong>Clean up,
more meetings and planning.</strong> I usually reserve a couple of hours toward the
end of the day to respond to emails and calls that came in throughout the day,
have more meetings if necessary, and organize tasks and materials for the next
day.</p>



<p>For more information about tips for working at home, <a href="https://www.npr.org/2020/03/15/815549926/8-tips-to-make-working-from-home-work-for-you"><strong>NPR
has a great article.</strong></a></p>
<p>The post <a href="https://desktopsolutions.com/working-at-home-tips-on-maximizing-your-productivity/">Working at Home: Tips on Maximizing Your Productivity</a> appeared first on <a href="https://desktopsolutions.com">Desktop Solutions Software</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Is your website ADA compliant?</title>
		<link>https://desktopsolutions.com/is-your-website-ada-compliant/</link>
		
		<dc:creator><![CDATA[frank]]></dc:creator>
		<pubDate>Mon, 11 Feb 2019 16:06:16 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://www.desktopsolutions.com/?p=5141</guid>

					<description><![CDATA[<p>Due to some recent court decisions in California and Florida, we are advising that all clients consider making their websites ADA compliant. Although no definitive regulations exist yet, two of our clients have received letters from attorneys seeking damages on behalf of blind clients who cannot access their websites. According to the legal experts we&#8230;</p>
<p>The post <a href="https://desktopsolutions.com/is-your-website-ada-compliant/">Is your website ADA compliant?</a> appeared first on <a href="https://desktopsolutions.com">Desktop Solutions Software</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Due to some recent court decisions in California and Florida, we are advising that all clients consider making their websites ADA compliant. Although no definitive regulations exist yet, two of our clients have received letters from attorneys seeking damages on behalf of blind clients<br> who cannot access their websites. According to the legal experts we consulted, the combination of these court decisions in the absence of specific laws, means that these suits may have merit.</p>



<p>To avoid incurring costs for legal fees and damages from sight impaired visitors, we strongly recommend that you consider revising your site to be compliant with <a href="https://www.w3.org/WAI/standards-guidelines/wcag/"><strong>ADA guidelines</strong></a> before you receive a demand letter. The scope of work required for your ividual site will probably require a quotation based on its functionality and design. To get an idea of the steps required, feel free to test your site here <a href="http://wave.webaim.org/">http://wave.webaim.org/</a></p>



<p></p>
<p>The post <a href="https://desktopsolutions.com/is-your-website-ada-compliant/">Is your website ADA compliant?</a> appeared first on <a href="https://desktopsolutions.com">Desktop Solutions Software</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Why https?</title>
		<link>https://desktopsolutions.com/why-https/</link>
		
		<dc:creator><![CDATA[frank]]></dc:creator>
		<pubDate>Mon, 30 Jul 2018 16:30:13 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://www.desktopsolutions.com/?p=5123</guid>

					<description><![CDATA[<p>Recent changes in Google Chrome might mean you should purchase a secure certificate to prevent your search engine rankings from declining. What Is HTTPS? The “s” at the end of the “http” part of a URL means the website is secure. When installed on a web server, an SSL certificate activates a secure protocol that&#8230;</p>
<p>The post <a href="https://desktopsolutions.com/why-https/">Why https?</a> appeared first on <a href="https://desktopsolutions.com">Desktop Solutions Software</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Recent changes in Google Chrome might mean you should purchase a secure certificate to prevent your search engine rankings from declining.</p>
<p><strong>What Is HTTPS?</strong><br />
The “s” at the end of the “http” part of a URL means the website is secure. When installed on a web server, an SSL certificate activates a secure protocol that allows secure connections from a web server to your browser. This ensures that a user’s activity cannot be tracked, that their information stolen, and that data files cannot be corrupted as they’re transferred. But having (or not having) an SSL certificates can also affect search engine rankings!</p>
<p><strong>How does HTTPS impact SEO?</strong><br />
Google has encouraged webmasters to make the migration to a secure site for a while now and is now giving an increasing amount of weight in ranking boosts to websites that are HTTPS. Although only less than 1% of all websites are secure 40% of Google’s page one organic search results feature an HTTPS site.</p>
<p>The post <a href="https://desktopsolutions.com/why-https/">Why https?</a> appeared first on <a href="https://desktopsolutions.com">Desktop Solutions Software</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Power of Video Marketing</title>
		<link>https://desktopsolutions.com/the-power-of-video-marketing/</link>
		
		<dc:creator><![CDATA[frank]]></dc:creator>
		<pubDate>Mon, 30 Jul 2018 16:22:19 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://www.desktopsolutions.com/?p=5120</guid>

					<description><![CDATA[<p>Why Video Marketing? Because of its ability to inform, entertain, motivate and inspire, video is one of the best ways to build your brand, engage new customers and improve your search engine optimization. With approximately 500 million viewers per month, YouTube is currently the second largest search engine on the planet proving that customers like&#8230;</p>
<p>The post <a href="https://desktopsolutions.com/the-power-of-video-marketing/">The Power of Video Marketing</a> appeared first on <a href="https://desktopsolutions.com">Desktop Solutions Software</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Why Video Marketing?</strong><br />
Because of its ability to inform, entertain, motivate and inspire, video is one of the best ways to build your brand, engage new customers and improve your search engine optimization. With approximately 500 million viewers per month, YouTube is currently the second largest search engine on the planet proving that customers like and are looking for video. Statistics show that video helps customers engage with your site more effectively and spend more time on your site once they get there.</p>
<p><strong>Video Gets You Ahead of Your Competition</strong></p>
<p>Multimedia content has a big impact on your company&#8217;s credibility. For instance, consumers are more likely to retain information when it’s alongside some form of visual medium. According to a recent survey by Animoto, &#8220;71 percent of consumers say that videos leave a positive impression of a company.&#8221; Cisco estimates 80 percent of consumer Internet traffic will be made up of online video.</p>
<p><strong>Video Increases Customer Engagement.</strong><br />
Social networking sites such as Instagram, LinkedIn and Facebook (to name a few), have the ability to provide video to massive audiences and increase customer engagement because we like, comment and share on the things we find helpful, entertaining or informative. Some social networks even have the ability to target specific types of customers or industries making video an excellent way of marketing and communicating with your customers.</p>
<p>If you’re looking for video marketing we are here to help. We can help you produce high quality, affordable videos, create and optimize your YouTube Channel, and develop a video internet marketing strategy to build your audience.</p>
<p>The post <a href="https://desktopsolutions.com/the-power-of-video-marketing/">The Power of Video Marketing</a> appeared first on <a href="https://desktopsolutions.com">Desktop Solutions Software</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Hacking &#038; Web Security &#8211; What You Need to Know</title>
		<link>https://desktopsolutions.com/hacking-need-know/</link>
		
		<dc:creator><![CDATA[frank]]></dc:creator>
		<pubDate>Wed, 18 Jan 2017 19:13:58 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://www.desktopsolutions.com/?p=3845</guid>

					<description><![CDATA[<p>Given all the news of late about hacking and its potentially harmful effects, we thought outing together a useful guide to hacking would be helpful to our clients. In computer networking, hacking is any technical effort to manipulate the normal behavior of network connections and connected systems. A hacker is any person engaged in hacking.&#8230;</p>
<p>The post <a href="https://desktopsolutions.com/hacking-need-know/">Hacking &#038; Web Security &#8211; What You Need to Know</a> appeared first on <a href="https://desktopsolutions.com">Desktop Solutions Software</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h4>Given all the news of late about hacking and its potentially harmful effects, we thought outing together a useful guide to hacking would be helpful to our clients.</h4>
<p>In computer networking, hacking is any technical effort to manipulate the normal behavior of network connections and connected systems. A hacker is any person engaged in hacking. The term &#8220;hacking&#8221; historically referred to constructive, clever technical work that was not necessarily related to computer systems. Today, however, hacking and hackers are most commonly associated with malicious programming attacks on the websites, email accounts and other computer networks.</p>
<p><strong>Common Network Hacking Techniques</strong><br />
Hacking on computer networks is often done through scripts and other network software. These specially-designed software programs generally manipulate data passing through a network connection in ways designed to obtain more information about how the target system works. Many such pre-packaged scripts are posted on the Internet for anyone &#8211; typically entry-level hackers &#8211; to use. More advanced hackers may study and modify these scripts to develop new methods. Hacking techniques on networks include creating worms, initiating denial of service (DoS) attacks, or in establishing unauthorized remote access connections to a device.</p>
<p><strong>What do they want with my website?</strong><br />
You might now be wondering what this has to do with your company website that does not store users’ credit card information or nude pictures of Scarlett Johansson. Well, hackers can turn your website into an advertisements for questionable products like designer-imposter handbags or porn sites. By injecting your site with their content, they are hoping to use your good search engine positioning to improve theirs, by leveraging Google’s in bound links algorithm. They can also hijack the hosting server to be used in botnet DDoS attacks on other servers, meaning that they use your server’s address to cover their trail. And even worse, they can hack into your website databases and destroy or manipulate important information, or even send sensitive user data to other hackers.</p>
<p><strong>Protecting Against Hacking</strong><br />
Luckily there are things that you can do to secure your website from hackers and becoming a target for online vandals. Here’s a roundup of the easiest steps you can take:</p>
<p><strong>1) Keep All Software Updated</strong><br />
Whether your website was built from scratch by your development team or you chose to create a DIY site on a third party turnkey platform, as a site owner it’s your job to ensure that every piece of software you run is up to date. At Desktop Solutions, we run round the clock diagnostics on all of our servers, and install regular security patches and updates to all content management systems to make our sites less vulnerable to these attacks.</p>
<p><strong>2) Use Strong Passwords, Change Regularly</strong><br />
Using strong passwords is an effective way to limit if not completely eliminate brute force and dictionary attacks. Strong passwords are not just a requirement for your email or financial transactions online, they are also imperative for your website server, admin and database passwords. Make sure your password is a combination of alphanumeric characters, symbols, upper and lower case characters and is at least 12 characters long to prevent brute force attacks.<br />
Do not use the same password for all your different website logins. Change your passwords regularly to keep them doubly secure. Store users’ passwords in encrypted form. This ensures that even if there is a security breach, attackers do not get their hands on actual user passwords.</p>
<p><strong>3) Switch to HTTPS</strong><br />
HTTPS or Hyper Text Transfer Protocol Secure, is a secure communications protocol that is used to transfer sensitive information between a website and a web server. Moving your website to the HTTPS protocol essentially means adding an encryption layer of TLS (Transport Layer Security) or SSL (Secure Sockets Layer) to your HTTP making your users’ and your own data extra secure from hacking attempts. While HTTPS is a necessity for all online transactions, the rest of the website is usually on HTTP in most cases. However, all that is about to change with Google’s recent announcement that HTTPS will be a search ranking factor. Besides the security aspect of things, it now makes even more sense to shift your entire website to HTTPS to improve your search rankings simultaneously.</p>
<p><strong>4) Web Application Firewalls</strong><br />
Just as you lock your doors before leaving your house and install antivirus software on your desktop computer before browsing the web, you should also have a security system to serve as your website’s first line of defense against hacking attacks. A Web Application Firewall is that first line of defense. These solutions are designed to inspect incoming traffic, provide and weed out malicious requests –- offering protection from SPAM, brute force attacks, SQL Injections, Cross Site Scripting and other OWASP Top 10 threats.</p>
<p>Until just a few years ago, Web Application Firewalls were only available as hardware appliances, but today providers are revolutionizing the industry by using cloud technology to cut down prices of security solutions previously found only in enterprise level setups.<br />
Consequently, all website owners can now “rent” a cloud-based Web Application Firewall, without committing to pricey security appliances or even owning a dedicated hosting server. Better yet, these plug-and-play services don’t require you to hire security experts or attempt to learn every aspect of web security. (Most of us just don’t have the time to become cybersecurity experts too.)</p>
<p>With hundreds of thousands of websites hacked every year, it’s becoming clear that even well-managed sites and vigilant hosting firms are still vulnerable to these attacks. Cloud-based Web Application Firewalls are filling that void.</p>
<p><strong>Conclusion</strong><br />
Most of us go through life with the philosophy ‘It won’t happen to me’. However, that philosophy has been proven not to be true in the world of online security. A successful attack on your site not only leads to compromising of users’ data and your own information, it can also lead to a blacklisting of your site by Google and other search providers as your infected site risks spreading malicious content throughout the web.<br />
Erring on the side of caution works best in this area. Implement at least these basic steps right away, to avoid being a soft target for malicious hackers.</p>
<p>The post <a href="https://desktopsolutions.com/hacking-need-know/">Hacking &#038; Web Security &#8211; What You Need to Know</a> appeared first on <a href="https://desktopsolutions.com">Desktop Solutions Software</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>New Logo and Website for Long Island Metro Business Action</title>
		<link>https://desktopsolutions.com/new-logo-website-long-island-metro-business-action/</link>
		
		<dc:creator><![CDATA[frank]]></dc:creator>
		<pubDate>Tue, 17 Jan 2017 20:07:29 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://www.desktopsolutions.com/?p=3854</guid>

					<description><![CDATA[<p>Desktop Solutions is proud to announce the launching of a new online brand for LIMBA, the Long Island Metro Business Action. LIMBA&#8217;s new look includes an redesigned logo and clean, mobile-friendly website. The new site is designed to highlight LIMBA&#8217;s great line-up of government, education, business, scientific, and environmental leaders that present their ideas to improve the quality&#8230;</p>
<p>The post <a href="https://desktopsolutions.com/new-logo-website-long-island-metro-business-action/">New Logo and Website for Long Island Metro Business Action</a> appeared first on <a href="https://desktopsolutions.com">Desktop Solutions Software</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Desktop Solutions is proud to announce the launching of a new online brand for <strong><a href="http://limba.net/">LIMBA</a></strong>, the Long Island Metro Business Action. LIMBA&#8217;s new look includes an redesigned logo and clean, mobile-friendly website. The new site is designed to highlight <strong><a href="http://limba.net/calendar/">LIMBA&#8217;s great line-up</a></strong> of government, education, business, scientific, and environmental leaders that present their ideas to improve the quality of life for Long Islanders.</p>
<p>A new look is not the only update to this important organization. LIMBA announced recently that it will partner with premier law firm <strong><a href="http://cmmllp.com/">Campolo, Middleton &amp; McCormick, LLP,</a></strong> Suffolk County’s premier law firm, LIMBA has expanded its reach in the community. Future meetings will feature an updated format in which CMM Managing Partner Joe Campolo will interview representatives from various levels of government, municipal agencies, and the local economy on issues of importance to Long Islanders. The first joint meeting will feature <a href="http://limba.net/join-us/?e=NDg1Nw=="><strong>U.S. Congressman Lee Zeldin on Friday, March 3, 2017</strong></a> at the Courtyard Marriott in Ronkonkoma at 8:00 a.m.</p>
<p>LIMBA officers and hosts Ernie Fazio and Bill Miller also announced the expansion of LIMBA’s Board of Directors to include representatives from various segments of the community including Desktop Solutions own Lynellen Nielsen.</p>
<p>The post <a href="https://desktopsolutions.com/new-logo-website-long-island-metro-business-action/">New Logo and Website for Long Island Metro Business Action</a> appeared first on <a href="https://desktopsolutions.com">Desktop Solutions Software</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Desktop Solutions Lectures on Website Interface Design at Stony Brook</title>
		<link>https://desktopsolutions.com/desktop-solutions-guest-lectures-stony-brook/</link>
		
		<dc:creator><![CDATA[frank]]></dc:creator>
		<pubDate>Mon, 16 Jan 2017 16:33:41 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://www.desktopsolutions.com/?p=3836</guid>

					<description><![CDATA[<p>Thanks to professor Tony Scarlatos from Stony Brook Computer Science Department for asking Desktop Solutions&#8217; Frank Imburgio and Lynellen Nielsen to guest lecture on web interface design. We were honored to speak with seniors in the multimedia lab about user interface best practices and real world design challenges.</p>
<p>The post <a href="https://desktopsolutions.com/desktop-solutions-guest-lectures-stony-brook/">Desktop Solutions Lectures on Website Interface Design at Stony Brook</a> appeared first on <a href="https://desktopsolutions.com">Desktop Solutions Software</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Thanks to professor Tony Scarlatos from <strong><a href="https://www.cs.stonybrook.edu/">Stony Brook Computer Science Department</a></strong> for asking Desktop Solutions&#8217; Frank Imburgio and Lynellen Nielsen to guest lecture on web interface design. We were honored to speak with seniors in the multimedia lab about user interface best practices and real world design challenges.</p>
<p>The post <a href="https://desktopsolutions.com/desktop-solutions-guest-lectures-stony-brook/">Desktop Solutions Lectures on Website Interface Design at Stony Brook</a> appeared first on <a href="https://desktopsolutions.com">Desktop Solutions Software</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
