Saturday, January 4, 2014

Trailer for my Netiquette IQ book is out!


My new trailer for my book has now been posted. The book is email etiquette (Netiquette) for business, students, job seekers, oversees emailers and children. Enjoy it at www.netiquetteiq.com

++++++++++++++++++++++++++

 About Netiquette IQ:
My book, "Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email" and the Kindle version are now available on Amazon. Please visit my profile at:
My other sites of Netiquette resources include:

www.tabularosa.net Internet products and services website

    

10 Ways to Improve Netiquette with Security for Home Computers





















Netiquette and email etiquette for businesses, students and jobseekers relies, in no small part, with having good cyber security. This blog has stressed many times the need for Netiquette security. Email etiquette starts with ensuring content will not be filtered, viruses spread or sensitive information compromised. Even the slightest omissions of Netiquette practices by students, kids, jobseekers, employees, businesses or sales people can have devastating results. Now with the explosive growth of social networking, the need for Netiquette and social networking etiquette has grown even more.

You can never have too much security!

The article below will outline very solid tips and suggestions to assist any of the groups previously mentioned with their Netiquette and online etiquette policies.

Great Netiquette to all!

++++++++++++++++++++++++++++++++++++++

Ten Ways to Improve the Security of a New Computer
Jennifer Kent and Katie Steiner from US-CERT

1.    Connect to a Secure Network

Once your computer is connected to the internet, it’s also connected to millions of other connected computers, which could, in turn, allow attackers to connect to your computer. Information flows from the internet to your home network by first coming into your modem, then to your router, which most people have, and finally to your computer. Because your modem doesn’t have security settings, it’s crucial to secure your router—the first securable device that receives information from the internet. Be sure to secure it before you connect to the internet to improve your computer’s security. If you don’t have a router, contact your service provider to learn how you can best secure your network.

The default configurations of most home routers offer little security. Though it may seem cumbersome to spend time configuring your router’s settings, it’s well worth it because a secure router is one of the best initial lines of defense. To secure your router, consult its user’s guide, which will direct you to a predefined URL or IP address where you can do the following:

               Configure the wireless network to use WPA2-AES encryption for data confidentiality.

               Change the default login username, if permitted (refer to the user’s guide), and password. (The default passwords are published in manufacturer’s publications and are readily accessible.)

               Conduct MAC address filtering (a form of whitelisting, or identifying wirelessly connected computers you trust).

               Change the default wireless SSID.

Learn more about each of these configurations and others in the document “Small Office/Home Office Router Security” (http://www.us-cert.gov/reading_room/HomeRouterSecurity2011.pdf).

 2. Enable and Configure a Firewall

A firewall is a device that controls the flow of information between your computer and the internet, similar to a router. Most modern operating systems include a software firewall. In addition to the operating system’s firewall, the majority of home routers have a firewall built in. Refer to your user’s guide for instructions on how to enable your firewall. Once your firewall is enabled, consult the user’s guide to learn how to configure the security settings and set a strong password to protect it against unwanted changes.

 3. Install and Use Antivirus and Antispyware Software

Installing an antivirus and antispyware software program and keeping it up to date is a critical step in protecting your computer. Many types of antivirus and antispyware software can detect the possible presence of malware by looking for patterns in the files or memory of your computer. This software uses virus signatures provided by software vendors to look for malware. New malware is discovered daily, and vendors frequently make new signatures available, so

Antivirus software will be most effective if the signatures are up to date. Many antivirus and antispyware programs offer automatic updating. Enable that feature so your software always has the most current signatures. If automatic updates aren’t offered, be sure to install the software from a reputable source, like the vendor’s website or a CD from the vendor.

4. Remove Unnecessary Software

Intruders can attack your computer by exploiting software vulnerabilities (that is, flaws or weaknesses), so the less software you have installed, the fewer avenues for potential attack. Check the software installed on your computer. If you don’t know what a software program does and don’t use it, research it to determine whether it’s necessary. Remove any software you feel isn’t necessary after confirming the software is safe to be removed.

Back up important files and data before removing unnecessary software in case you accidentally remove software essential to the operating system. If possible, locate the installation media for the software in case you need to reinstall it.

5. Disable Nonessential Services

Like unnecessary software, nonessential services increase the opportunities for attack. Two services to look for are file sharing and print sharing, which enable you to share files, such as photos and music, with other computer users and print to other computers on your network. The Conficker malware used file sharing to infect computers and spread the infection to others. Disabling file sharing would have eliminated one of the ways Conficker infected computers at the time of the Conficker malware infection.

If those services are enabled in your operating system, disable them if you only have one computer connected to your network or don’t use them. Because services differ depending on your operating system and many of them are critical to your computer’s operation, research any services you aren’t sure about or don’t use before disabling them.

6. Modify Unnecessary Default Features
 
Like removing unnecessary software and disabling nonessential services, modifying unnecessary default features eliminates opportunities for attack. Review the features that came enabled by default on your computer and disable or customize those you don’t need or plan on using. As with nonessential services, be sure to research these features before disabling or modifying them.

The AutoRun feature in Microsoft Windows systems was a default feature at the time of the Conficker malware and was one of the three ways computers became infected. When the AutoRun feature is enabled on Windows computers, Windows detects when removable media, such as CDs and USB storage devices, are inserted into the computer and automatically executes the media’s contents.

 7. Operate Under the Principle of Least Privilege

In most instances of a malware infection, the malware can operate only under the rights of the logged-in user. To minimize the impact the malware can have if it successfully infects a computer, consider using a standard or restricted user account for day-to-day activities and only

Logging in with the administrator account (which has full operating privileges on the system) when you need to install or remove software or change system settings from the computer.

8. Secure Your Web Browser

Web browsers installed on new computers usually don’t have secure default settings. Securing your browser is another critical step in improving your computer’s security because an increasing number of attacks take advantage of web browsers. Before you start surfing the internet, secure your browser by doing the following:

               Disable mobile code (that is, Java, JavaScript, Flash, and ActiveX) on websites you’re not familiar with or don’t trust. While disabling these types of code on all sites will significantly reduce your risk of being attacked, the websites you visit may not function as they normally do.

               Disable options to always set cookies. A cookie is a file placed on your computer that stores website data. Attackers may be able to log onto a site you’ve visited (like a banking site) by accessing the cookie with your login information. To prevent that, configure the browser to ask for permission before setting a cookie, allow cookies for sessions only, and disable features that keep you logged in to a site or that retain information you’ve entered, such as text you type into forms and the search bar.

               If you’re using Internet Explorer, set the security levels for trusted sites (websites you most often visit and trust) to the second highest level. At the highest level, websites may not function properly.

Learn how to adjust these and other critical settings for the three most common browsers— Internet Explorer, Mozilla Firefox, and Apple Safari—in the document “Securing Your Web Browser” (http://www.us-cert.gov/reading_room/securing_browser/).

 9. Apply Software Updates and Enable Future Automatic Updates

Most software vendors release updates to patch or fix vulnerabilities, flaws, and weaknesses (bugs) in their software. Because intruders can exploit these bugs to attack your computer, keeping your software updated is important to help prevent infection.

The third way Conficker attacked computers was by exploiting a vulnerability in Windows systems. Microsoft provided an update for this vulnerability. If people would have applied the update in a timely manner, they would have eliminated the opportunity for Conficker to infect their computers through this software vulnerability and helped reduce the spread of further Conficker infections across the internet.

When you set up a new computer (and after you have completed the previous practices), go to your software vendors’ websites and check for and install all available updates. Enable automatic updates if your vendors offer it; that will ensure your software is always updated, and you won’t have to remember to do it yourself. Many operating systems and software have options for automatic updates. As you’re setting up your new computer, be sure to enable these options if offered. Be cautious, however, because intruders can set up malicious websites that look nearly identical to legitimate sites. Only download software updates directly from a vendor’s website, from a reputable source, or through automatic updating.

10. Use Good Security Practices

You can do some simple things to improve your computer’s security. Some of the most important are

               Use caution with email attachments and untrusted links.
 
               Malware is commonly spread by people clicking on an email attachment or a link that launches the malware. Don’t open attachments or click on links unless you’re certain they’re safe, even if they come from a person you know. Some malware sends itself through an infected computer. While the email may appear to come from someone you know, it really came from a compromised computer. Be especially wary of attachments with sensational names, emails that contain misspellings, or emails that try to entice you into clicking on a link or attachment (for example, an email with a subject like that reads, “Hey, you won’t believe this picture of you I saw on the internet!”).
 
               Use caution when providing sensitive information.
       
               Some email or web pages that appear to come from a legitimate source may actually be the work of an attacker. An example is an email claiming to be sent from a system administrator requesting your password or other sensitive information or directing you to a website requesting that information. While internet service providers may request that you change your password, they will never specify what you should change it to or ask you what it is.

               Create strong passwords.

Passwords that have eight or more characters, use a variety of uppercase and lowercase letters, and contain at least one symbol and number are best. Don’t use passwords that people can easily guess like your birthday or your child’s name. Password detection software can conduct dictionary attacks to try common words that may be used as passwords or conduct brute-force attacks where the login screen is pummeled with random attempts until it succeeds. The longer and more complex a password is, the harder these tools have to work to crack it. Also, when setting security verification questions, choose questions for which it is unlikely that an internet search would yield the correct answer.

Where Can I Learn More?

Implementing the practices in this paper will significantly improve your computer’s security. The more you can implement, the more secure your computer will be. Even after implementing all ten of these practices, you still may not be protected from all of the risks you and your computer may encounter. It’s important to continue investigating and implementing new ways to secure your computer because new risks will arise and old risks evolve. Learn more from these US-CERT resources:

               Small Office/Home Office Router Security
(http://www.uscert.gov/reading_room/HomeRouterSecurity2011.pdf)

               Socializing Securely: Using Social Networking Services
(http://www.uscert.gov/reading_room/safe_social_networking.pdf)

               Securing Your Web Browser
(http://www.uscert.gov/reading_room/securing_browser/)

 ++++++++++++++++++++++++++

 About Netiquette IQ:
My book, "Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email" and the Kindle version are now available on Amazon. Please visit my profile at:
My other sites of Netiquette resources include:

www.tabularosa.net Internet products and services website.

Friday, January 3, 2014

8 Netiquette tips For Sales, Business, Students and Kids Cover Emails



 
Netiquette for email is increasingly important as a means of capturing the attention of the email recipient. Even with great attention to email etiquette or Netiquette in areas for jobs seekers, students, sales information, proposals and many other situations, an email with great content can be given little or no attention. This is true particularly when attachments are involved.

In order to fully optimize Netiquette, here are some great suggestion from a recent article.

++++++++++++++++++++++++++
Eight Tips for Better Email Cover Letters

By Larry Buhl  from Monster

As the saying goes, you don't get a second chance to make a first impression. If you're doing a
job search or resume submission via email, the first impression any employer will have is from your cover letter.
Some tips for creating successful email cover letters are the same as for paper cover letters: Be professional, with correct spelling and grammar, and -- very important -- do use them. Other tips pertain only to the electronic medium, and when disregarded, could ruin your chances before your foot is in the door.

Here's what you should you consider when crafting an email cover letter.
Don't Waste Your Subject Line

What you write in the subject line can determine whether your letter gets read, according to Lydia Ramsey, business etiquette expert and author of
Manners That Sell. "Don't ever leave the subject line of your email blank and don't waste it by just inserting the job number," Ramsey says. "The subject line should be clear and specific to the job you're looking for." An example: "Bilingual CPA seeks account manager position."

Use Standard Cover Letter Protocol

Write your letter as the body of the email and include a salutation (use the receiver's actual name if you know it) and a standard closing. ("Sincerely" or "Warm regards" work well.) Leave blank lines between paragraphs, and use appropriate signature and closing lines. Include all the information in your signature line you would have on your business card, including snail mail address, phone number and email address. "Remember, your email address doesn't always automatically show up on the receiver's email program," Ramsey says.
Keep It Short and Dynamic

Managers and recruiters are busy. They want to get the gist of your pitch in 150 words or fewer. The first paragraph is crucial, according to Ramsey. "Hook the reader in the first paragraph by selling him or her your abilities," she says. "Use short paragraphs and short sentences to give a very brief bio on who you are and what you can do for them, and wrap it up in the second paragraph."


Keep It Simple

If you write a cover letter in a word-processing program, strip away all formatting and save the file as plain text. The ideal line length is 40 characters. Some email packages automatically do word wrap for you, so your cover letter doesn't arrive in fragments. If your program doesn't do this, go to FormatIt.com, drop in your text and the free service will format your email for you.
Don't get cute. Save emoticons, abbreviations, and wild colors and fonts for your nonprofessional emails. The same goes for humor. Chances are, the reader won't think it's funny, and may even find it irritating.

Be Specific

Don't respond to an ad for a copywriter when you're really a graphic designer, says Diana Qasabian, talent director at Syndicatebleu. "It may be the tight job market, but we've been receiving more and more letters responding to a specific job from candidates who are not at all qualified for it," she says.

"We look for specifics in email cover letters, which means skills and abilities," she adds. "Embellishment and fluff are not necessary. It's not necessary to write, 'I'm a hard worker.' That goes without saying."

Keywords Are Key

Because many companies use applicant tracking systems (ATSes) to find and screen candidates, skill-oriented keywords will boost your chance at being discovered, a recruiter at a large technology company says.

"ATS tools track keywords that identify skill sets," she says. "So even if you're not right for the job you're seeking, strong keywords improve the chance that your cover letter and resume will be retrieved in a future search or be selected for a more appropriate job."

Play by Their Rules

Take the time to learn the company guidelines for submitting resumes, and follow them. Many companies list these guidelines on their Web sites. Also, don't include attachments unless they are requested. Some companies block all emails with attachments to prevent viruses.

Check It Again

Thoroughly spell-check and proofread your email letter. And remember, your email software's spell-checker won't catch grammar mistakes. Send it to a friend first and ask him to check it for content and style. If all your friends are tapped out, or even if they aren't, test your email cover letter by emailing it to yourself, and put yourself in the mind-set of an employer when you read it.
 ++++++++++++++++++++++++++

 About Netiquette IQ:
My book, "Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email" and the Kindle version are now available on Amazon. Please visit my profile at:

My other sites of Netiquette resources include:


www.tabularosa.net Internet products and services website.

 Paul Babicki and Frank Kovacs are co-authoring a new book on Netiquette IQ for jobseekers, recruiters and employers (no official title as yet!). This book is a follow up to Paul’s current release. This book will be a part of the forthcoming Netiquette IQ compendium featuring a series of books on specific areas of Netiquette; education, sales, social media, etc. We would desire and encourage feedback from anyone who would like to contribute their thought ideas, even a segment to include in the book.

We wish to have the book to cover as many pertinent topics as possible for the job seeker, recruiter and employer. There will be an acknowledgement page in the book listing those whose ideas or suggestions are used. The persons with the five top ideas will be sent a complimentary signed copy of my current book and a copy of the new one. Comments will be closed on 1/31/2014. Kindly submit your suggestion(s) to my blog post of 12/26/2013 in the comment field. 

Netiquette Security For Business, Students and Kids

In a couple of my recent blogs, I have discussed and provided information for email and cyber security and how they are a vital part of Netiquette and communication etiquette.  The Department of Homeland Security cyber Awareness Coalition
StopThinkConnect has a wealth of good information for all. There is value here for any user! I hope this information will be useful

 

 

 

 

 

 

 

 

Stop.Think.Connect. 2013 Year in Review

  • Stay Cyber Safe While on the Go this Holiday Season
  • Make Cybersecurity Part of Your New Year’s Resolution
  • DHS Component Spotlight: Transportation Security Administration
  • Partner Spotlight: Identity Theft Resource Center  

Stop.Think.Connect. 2013 Year in Review

The Stop.Think.Connect.™  Campaign had a busy 2013. Below is a quick snapshot of the Campaign’s activities and how much the National Network and Cyber Coalition have grown.  

Stay Cyber Safe While on the Go This Holiday Season


The holidays are a popular time to travel, with over 93 million Americans traveling by car, plane, train, or bus. People want to stay connected while they travel, and with the popularity of Internet-enabled mobile devices45% of adults own a smart phone, 35% of adults own a tablet these gadgets are sure to be on many packing lists. As you travel, be careful about the physical and cyber safety of your devices. Keep an eye on your devices as they go through airport security and do not leave your devices unattended anywhere else.
The need for cybersecurity does not end when you leave your home or office. Being cyber safe while on the go is important, so before you pack up your laptops, tablets, and cellphones, remember these tips from the Stop.Think.Connect.  Safety Tips for Mobile Devices tip sheet:
  • Keep a Clean Machine. Treat your mobile device as you would a personal computer. Make sure you have the latest operating system, security software, and browser to help your mobile device protect against malware and viruses.
  • Protect Your Personal Information. Password-protect or lock your devices when not in use. Review the privacy policy of an application before you download. Only give your phone number to people you trust. Disable the geotagging feature on your phone or tablet.
  • Connect with Care. When connected to an unsecured Wi-Fi hotspot, limit the type of business you conduct and adjust the security settings on your device to limit who can access your phone. When banking or shopping, check to be sure the sites are security enabled – look for secure addresses that begin with "https://" or "shttp://. The “s” stands for “secure.” Do not respond to calls or texts requesting personal information or immediate action. These are most likely scams to get your information.
 

Make Cybersecurity a Part of Your New Year's Resolution

New Year’s is a great time to start fresh and make resolutions to help improve your life. This year, consider making a resolution to be more cyber safe. Below are some simple, measurable ideas for your cyber resolutions:
  • Change the passwords for your devices and your major accounts (email, banking, and social media) on a regular (i.e., bi-monthly) basis.
  • Check regularly to ensure your operating system and security software is up to date.
  • Check the privacy and security settings on your mobile devices and delete any applications you do not regularly use.
Set reminders on your calendar to keep on track with your cybersecurity resolutions.

++++++++++++++++++++++++++

 About Netiquette IQ:
My book, "Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email" and the Kindle version are now available on Amazon. Please visit my profile at:

My other sites of Netiquette resources include:


www.tabularosa.net Internet products and services website.

 Paul Babicki and Frank Kovacs are co-authoring a new book on Netiquette IQ for jobseekers, recruiters and employers (no official title as yet!). This book is a follow up to Paul’s current release. This book will be a part of the forthcoming Netiquette IQ compendium featuring a series of books on specific areas of Netiquette; education, sales, social media, etc. We would desire and encourage feedback from anyone who would like to contribute their thought ideas, even a segment to include in the book. We want the book to cover as many pertinent topics as possible for the job seeker, recruiter and employer. There will be an acknowledgement page in the book listing those whose ideas or suggestions are used. The persons with the five top ideas will be sent a complimentary signed copy of my current book and a copy of the new one. Comments will be closed on 1/31/2014.
Kindly submit your suggestion(s) to my blog post of 12/26/2013 in the comment field.