Jon Ongtingco
Computer Service
I wrote my first program on an Apple IIe in 1985. I enjoy hiking and camping with my family as much as I enjoy working in technology. Quote a movie to me and I bet I can name it.
I wrote my first program on an Apple IIe in 1985. I enjoy hiking and camping with my family as much as I enjoy working in technology. Quote a movie to me and I bet I can name it.
Member
Chris took his family to Orlando and used the hotel wifi. It did not require a password, only his room number and last name. He turned on a monthly VPN service that he purchased online. During the day, he left his PC unattended and connected to the wifi network. Because the network was open, anyone else connected would have the ability to see and potentially access his laptop. The hotel staff would also have access to his laptop when they entered the room. My solution is to setup an automatic logout connected to his cellphone so that when he walks away the system locks, a private VPN connection, and a monitor that checks for malicious attempts to access his PC. He can now enjoy his family vacation without worrying about his laptop back at the hotel. I am a great referral for your client that works while they vacation. I can secure their system to prevent bad actors from accessing it.
InfoMinute
Business Services | Technology
Computer Service
Filing Cabinet
Endorsement Letters I've Given
678-213-2309
445 Windy Hill Road
Suite 100
Marietta, GA 30060
Customers do not always want to hear how it was fixed, they would rather just have it work. I keep technology working so they can keep working.
Company
Endorsement Letters I've Received
Development
Contribution
Lisa Harris
Joined on 08/30/2006
Team
Sponsorship
New security standards in IT seem to come everyday. 2FA, or MFA, which stands for either Two Factor Authentication or MultiFactor Authentication has been around for some time and is an absolute necessity in this era of constant digital exploitation. First, I help choose a method, Google Authenticator, Microsoft Authenticator, there are many choices and it is important the end user is comfortable with the type used. Email and SMS (text messaging) are the weakest forms but are better than nothing at all. Once setup, MFA will prevent most attempts at accessing an account and should be used whenever available. Accounts that it should be used on without question: Bank Accounts. Admin Accounts for any system. Email access. Any other account that can draw money. For instance, I had a customer with who's merchant account was accessed and used to buy multiple gift cards. They then paid off the account because their bank account was linked to it already and then repeated the process. A total of 20K was stolen. Most of it was recovered after I was brought in. I helped them pull a credit report to identify all accounts under their name and then we went through the process of contacting each account, changing the password and adding MFA to each account to prevent future nefarious access. They repeated the same process for all accounts with purchasing options like Amazon, Sams Club, and even their utilities.
Referral Trigger Response