Jon Ongtingco
Computer Service
I wrote my first program on an Apple IIe in 1985. I enjoy hiking and camping with my family as much as I enjoy working in technology. Quote a movie to me and I bet I can name it.
I wrote my first program on an Apple IIe in 1985. I enjoy hiking and camping with my family as much as I enjoy working in technology. Quote a movie to me and I bet I can name it.
Member
In an effort to reduce spam and fraud, email hosts are locking down security making the way we used to use email difficult. Even after setting up your domain perfectly with an SPF Record (Sender Policy Frame), a DKIM record (Domainkeys Identified Mail), and a DMARC record (Domain-based Message Authentication, Reporting, and Conformance); if you send out tens of thousands of emails a day, you will still be flagged by many carriers as an offender, even if the emails are all legitimate. Email now requires monitoring, especially for large organizations. Lack of monitoring lead to the block placed by AT&T on Microsoft. Microsoft "trusted" its users to perform their own in house security and monitoring which lead to widespread abuse and negligence causing rampant spam from their servers which now affects those who did the right thing as well as those that did not. The next time an email "didn't go through", ask them when their last domain review was and refer them to Jonathan Ongtingco.
InfoMinute
Business Services | Technology
Computer Service
Filing Cabinet
Endorsement Letters I've Given
678-213-2309
445 Windy Hill Road
Suite 100
Marietta, GA 30060
Customers do not always want to hear how it was fixed, they would rather just have it work. I keep technology working so they can keep working.
Company
Endorsement Letters I've Received
Development
Contribution
Lisa Harris
Joined on 08/30/2006
Team
Sponsorship
New security standards in IT seem to come everyday. 2FA, or MFA, which stands for either Two Factor Authentication or MultiFactor Authentication has been around for some time and is an absolute necessity in this era of constant digital exploitation. First, I help choose a method, Google Authenticator, Microsoft Authenticator, there are many choices and it is important the end user is comfortable with the type used. Email and SMS (text messaging) are the weakest forms but are better than nothing at all. Once setup, MFA will prevent most attempts at accessing an account and should be used whenever available. Accounts that it should be used on without question: Bank Accounts. Admin Accounts for any system. Email access. Any other account that can draw money. For instance, I had a customer with who's merchant account was accessed and used to buy multiple gift cards. They then paid off the account because their bank account was linked to it already and then repeated the process. A total of 20K was stolen. Most of it was recovered after I was brought in. I helped them pull a credit report to identify all accounts under their name and then we went through the process of contacting each account, changing the password and adding MFA to each account to prevent future nefarious access. They repeated the same process for all accounts with purchasing options like Amazon, Sams Club, and even their utilities.
Referral Trigger Response