301-740-9955    Get SUPPORT

ImageSys LLC Blog

ImageSys LLC has been serving the Gaithersburg area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Facebook Privacy a Concern, Part III

Facebook Privacy a Concern, Part III

Most of us have a love-hate relationship with social media. A particularly controversial platform we discuss quite a bit on our blog is Facebook. Privacy is a monumental concern in the digital age, so today we thought we would go over settings you might not even realize are enabled on your Facebook profile. 

0 Comments
Continue reading

Facebook Privacy a Concern, Part II

Facebook Privacy a Concern, Part II

If you haven’t read part one of our Facebook privacy blog, it wouldn’t hurt for you to go back and read that one first. Today, we will be building off of that blog, teaching people how to properly configure their accounts to give them the best chance to lock down their private information.

Of course, Facebook, being one of the predominant web-based services in the world, has a checkered history when it pertains to individual’s privacy. In fact, I think a fair share of its ongoing troubles when it comes to individual privacy have a lot to do with their overwhelming success.

0 Comments
Continue reading

Facebook Privacy a Concern, Part I

Facebook Privacy a Concern, Part I

Would you consider Facebook to be popular? It’s an interesting question. It’s like asking people if they think McDonalds is popular. These days Facebook is used by one in every four people in the world, yet there are very few people that will actively come to the social media giant’s defense, let alone admit to spending nearly half of their time online on the site (either via an Internet browser or via an app).

0 Comments
Continue reading

Former Fraudster Says to Stop Using Debit Cards

Former Fraudster Says to Stop Using Debit Cards

When over 16 million people are scammed out of over $16 billion, there’s likely some type of problem that needs to be addressed. Famous con artist, Frank Abagnale, the man immortalized in Steven Spielberg’s Catch Me If You Can, a movie that was based off his own memoir, has been working as a security consultant with the Federal Bureau of Investigation for over 45 years. In that time, he has become an expert in cybersecurity and fraud prevention.

0 Comments
Continue reading

The Wild Ride That Is Data Privacy, Part II

The Wild Ride That Is Data Privacy, Part II

Earlier this week, we published the first part of our blog, “The Wild Ride That Is Data Privacy” where we went over the systems in place in society that are designed to put your privacy at risk. We continue the article today. Please visit our blog to re.

0 Comments
Continue reading

The Wild Ride That Is Data Privacy, Part I

The Wild Ride That Is Data Privacy, Part I

Data Privacy is a huge topic these days. We often talk about data security when it comes to protecting your organization’s information, but we often don’t go into a lot of depth when it comes to protecting an individual’s information. It’s important to understand how personal information moves around, so you know what you are up against when it comes to protecting your privacy online. This post is going to be a bit of a deep rabbit hole, but I really want to shine some light on the subject for my readers.

0 Comments
Continue reading

Google Location Services and How They Apply to the Average User

Google Location Services and How They Apply to the Average User

In the dog days of summer, the news media started running a story about how Google’s location tracking services continue to track people even after they order their mobile device’s OS to quit it. A researcher from Princeton proved these claims by traveling through New York and into New Jersey after turning location services off on for hi Android smartphones, only to be tracked through all the Interstate travel. We’ll take an in-depth look at why Google seemingly knows exactly where you are if you want them to or not.

0 Comments
Continue reading

Taking a Look at Facebook’s Recent Controversies

Taking a Look at Facebook’s Recent Controversies

The past few years certainly haven’t been very good for Facebook. After going public in 2012, Facebook acquired several organizations and applications to make waves in the market. The company is now responsible for a considerable amount of data, which has led to several data breaches, exacerbating the media and creating skepticism toward the social media giant.

0 Comments
Continue reading

How Your Kids Can be Hurt by Devices (and Vice Versa)

How Your Kids Can be Hurt by Devices (and Vice Versa)

As technology advances and improves at an exponential rate, it is little wonder that today’s youth are growing up with a closer relationship to technology than any other generation before them. While this has opened up many beneficial opportunities for them, it can also be the source of many serious issues without the proper supervision.

0 Comments
Continue reading

Tip of the Week: Improving Your Online Privacy

Tip of the Week: Improving Your Online Privacy

Most users are aware that their browsers offer a “secure” browsing experience. Google Chrome has Incognito mode, Microsoft’s Edge browser allows you to surf the Internet “InPrivate,” and Apple’s Safari offers Private Browsing as well. The trouble is, these “secure” browsing options aren’t actually all that secure. For today’s tip, we’ll discuss ways to actually keep your Internet browsing private.

0 Comments
Continue reading

Your Computer Might Be Sharing Data with its Manufacturer

Your Computer Might Be Sharing Data with its Manufacturer

It is our hope that you are aware of how much of a risk spyware can pose to your business. Your business generates, collects, and leverages truly considerable amounts of data each day that is intended for your business only. While spyware that is introduced by a hacker is clearly a bad thing, what if the manufacturer of the device installed a program that pulled data from your machine?

0 Comments
Continue reading

Password Security Needs to Be a Priority

Password Security Needs to Be a Priority

Passwords are everywhere. It seems that every account requires a password, in addition to the devices we use to access these accounts. This is a good thing, as it only helps to increase security - assuming that the password is strong. After all, a password that anyone can guess can hardly be called a password at all.

0 Comments
Continue reading

Sexy Scam Relies on Your Belief that Someone Was Watching

Sexy Scam Relies on Your Belief that Someone Was Watching

Internet scams are major threats to individuals and business because all it takes is one wrong click of the mouse and a user is embroiled in an unenviable situation. One such scam that is happening today is designed to catch users with their pants down, so to speak.

0 Comments
Continue reading

What is your Identity Worth to You?

Your identity has quite a lot of value, especially in the wrong hands. Security firm ZoneAlarm put together some numbers in 2011 concerning identity fraud, and it even shocked us. Let's talk about a few of these statistics and what it means.

0 Comments
Continue reading

How Safe is Your Email?

Email is (and has been) a prime method of communication for businesses of all sizes. With email comes a whole slew of issues that are essentially synonymous with the technology; spam, information overload, phishing, and information privacy. Even Gaithersburg small businesses that only do business locally are at risk of these issues. Personal email accounts are equally at risk. Employing proper precautions and practices whenever communicating via email is very important to prevent the risk of security compromises, monetary loss, and even legality issues.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite