Jon Ongtingco

Jon Ongtingco

Computer Service

I wrote my first program on an Apple IIe in 1985. I enjoy hiking and camping with my family as much as I enjoy working in technology. Quote a movie to me and I bet I can name it.

Member

Email Domain Monitoring

In an effort to reduce spam and fraud, email hosts are locking down security making the way we used to use email difficult. Even after setting up your domain perfectly with an SPF Record (Sender Policy Frame), a DKIM record (Domainkeys Identified Mail), and a DMARC record (Domain-based Message Authentication, Reporting, and Conformance); if you send out tens of thousands of emails a day, you will still be flagged by many carriers as an offender, even if the emails are all legitimate. Email now requires monitoring, especially for large organizations. Lack of monitoring lead to the block placed by AT&T on Microsoft. Microsoft "trusted" its users to perform their own in house security and monitoring which lead to widespread abuse and negligence causing rampant spam from their servers which now affects those who did the right thing as well as those that did not. The next time an email "didn't go through", ask them when their last domain review was and refer them to Jonathan Ongtingco.

InfoMinute

Business Services | Technology

Computer Service

Managed Services

Installations

Data Backup

Low Voltage Cabling

Anti-Virus

Filing Cabinet

Endorsement Letters I've Given

SOHO Data and Voice

SOHO Data and Voice

678-213-2309

445 Windy Hill Road
Suite 100
Marietta, GA 30060

Website

Customers do not always want to hear how it was fixed, they would rather just have it work. I keep technology working so they can keep working.

Company

Endorsement Letters I've Received

Team

PowerLinks Certificate 10/27/2006
Enter The Filing Cabinet | online WorkRoom 04/19/2023
How to Benefit from an Association 10/03/2022
How to Build a Referral Marketing Plan 06/20/2022
7-Minute Presentation Workshop 09/17/2018
Platinum Card WorkRoom 01/23/2017
Purple Card WorkRoom 12/19/2016
Filling The Filing Cabinet WorkRoom 12/19/2016
Best Client Workshop 05/16/2016
InfoMinute Seminar 05/16/2016
Filling the Filing Cabinet Workshop 08/05/2014
Orientation Essentials 07/03/2014
GateOpener Workshop 12/04/2008

Development

AlphaTester 09/02/2021
Angel Officer 08/09/2018
Coach 08/07/2017
PowerWings 04/09/2015
Angel Officer 04/09/2015

Contribution

Cumberland Team

Introduced by:

Lisa Harris

Lisa Harris

Joined on 08/30/2006

Leadership

TeamCoOrdinator 06/05/2023
ParticipationCoOrdinator
VisitorCoOrdinator
MembershipCoOrdinator 04/04/2024
MentorCoOrdinator
Hand Pin 07/18/2013
100% Club 12/22/2022

Membership

15-year Pin 09/02/2021
10-year Pin 09/15/2016
5-year Pin 09/29/2011
3-year Pin 10/29/2009

Team

Members I've Invited

Michael Smith

Michael Smith

Stefanie Haley

Stefanie Haley

Sponsorship

INTROMinutes I've Given

New security standards in IT seem to come everyday. 2FA, or MFA, which stands for either Two Factor Authentication or MultiFactor Authentication has been around for some time and is an absolute necessity in this era of constant digital exploitation. First, I help choose a method, Google Authenticator, Microsoft Authenticator, there are many choices and it is important the end user is comfortable with the type used. Email and SMS (text messaging) are the weakest forms but are better than nothing at all. Once setup, MFA will prevent most attempts at accessing an account and should be used whenever available. Accounts that it should be used on without question:  Bank Accounts. Admin Accounts for any system. Email access. Any other account that can draw money. For instance, I had a customer with who's merchant account was accessed and used to buy multiple gift cards. They then paid off the account because their bank account was linked to it already and then repeated the process. A total of 20K was stolen. Most of it was recovered after I was brought in. I helped them pull a credit report to identify all accounts under their name and then we went through the process of contacting each account, changing the password and adding MFA to each account to prevent future nefarious access. They repeated the same process for all accounts with purchasing options like Amazon, Sams Club, and even their utilities.

Referral Trigger Response