Wednesday, January 4, 2012

Importance of Data Backup

Why is Computer Backup Important?

If you've ever been in a situation in which you've almost completed an important project, only to have your computer spontaneously crash seconds before hitting the "save" button, you understand how frustrating losing your data can be.

Now, imagine losing all your important files - everything from business files, to family photos, to your tax returns - permanently. Although many of us prefer to adhere to the mantra of "it'll never happen to me", the truth is, it could. And as computers continue to become the principle way in which many people conduct important transactions, this type of thinking is becoming increasingly risky.

What's worse, the modern computer is ever more vulnerable to the imminent threats multiplying on the Internet - everything from adware, to spyware, to viruses.

Do I Need to Backup All of my Computer Data?
The short answer to this question is no, you do not need to back up all of the files on your computer. However, there are certain files you should definitely backup, so that in the event your computer decides it's time is up, you won't be at a total loss.

So just what files should you be backing up? Although the choice is ultimately a personal one, here are some suggestions:

  • Information and files relating to banking or other financial transactions 
  • Digital photos 
  • Purchased/downloaded music from the Internet 
  • Purchased/downloaded software from the Internet 
  • Important work/school projects 
  • Email contact list 
  • Internet browser bookmarks 
Where is the Safest Place to Store My Important Computer Data?
Depending on what backup software you use, some will limit the locations from which your data will be stored. For example, they may only backup data found in the following locations on your PC.

  • \My Documents and subdirectories on any drive, except for My Videos, My Pictures, and My Music 
  • C:\Documents and settings and subdirectories 
  • C:\Windows\favorites 
  • C:\Windows\profiles 
  • Outlook Personal Folders (pst files) 
For this reason, it is generally recommended that you store your most important files in your "My Documents" folder.

Although our work, family, and social obligations often fill our days, the excuse of not having sufficient time to backup your computer is simply not a worthy one. With the backup software currently available, it has never been easier or faster to ensure your files are safe and secure.

If you have any questions or need assistance with backing up your important data please give us a call today.

What is “Phishing”?

Pronounced "fishing", An email or website that appears to come from Ebay, your bank, etc. requesting your password, Social Security number or other personal information. NEVER respond to one of these. Look for "https" ("s" for secure) in the web address. 

Example:

Dear eBay customer, 

Your Account has been Suspended. We will ask for your password only once. We will charge your account once per year. However you will receive a confirmation request in about 24 hours after the make complete unsuspend process.You have 24 hours from the time you'll receive the e-mail to complete this eBay Request. 

Note: Ignoring this message will cause eBay to delete your account forever. 

To make unsuspend process please use this link: 

http://fakeaddress.com/ebay 

eBay will request personal data(password;and so on) in this email. 

Thank you for using eBay! 

http://www.ebay.com/ 

-------------------------------------------------------------------------------- 

This eBay notice was sent to you based on your eBay account preferences. If you would like to review your your notification preferences for other communications, click here. If you would like to receive this email in text only, click here. 

To a user who frequently uses eBay or any online service, these e-mails may appear as if they have come from the company described in the e-mail. However, phishing e-mails are designed to deceive the user and trick them into visiting the links in the e-mail that are designed to steal personal information such as usernames, passwords, credit card information, etc. Below are some helpful tips on identifying these e-mails and how to handle them.