<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>IBS</title>
	<atom:link href="http://infobsys.com/feed/" rel="self" type="application/rss+xml" />
	<link>http://infobsys.com</link>
	<description>Your I.T. Partner</description>
	<lastBuildDate>Thu, 07 Aug 2014 17:48:56 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=3.9.27</generator>
	<item>
		<title>Computer security steps&#8230;</title>
		<link>http://infobsys.com/post5/</link>
		<comments>http://infobsys.com/post5/#comments</comments>
		<pubDate>Fri, 30 May 2014 06:38:30 +0000</pubDate>
		<dc:creator><![CDATA[Brian]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://infobsys.com/?p=77</guid>
		<description><![CDATA[1. Keep personal Web browsing at home. 2. Keep confidential data confidential. 3. Always use secure connections. 4. Ask employees to speak up if something is wrong with their device or PC. 5. Make sure employees know the security policy. Then enforce it. 6. Always lock your computer screen. 7. Use passwords for everything. By [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>1. Keep personal Web browsing at home.<br />
2. Keep confidential data confidential.<br />
3. Always use secure connections.<br />
4. Ask employees to speak up if something is wrong with their device or PC.<br />
5. Make sure employees know the security policy. Then enforce it.<br />
6. Always lock your computer screen.<br />
7. Use passwords for everything.</p>
<p>By instituting best practices for computer security, you can build better awareness among employees. Once workers understand why good security is necessary, it is easier for those practices to be followed.</p>
]]></content:encoded>
			<wfw:commentRss>http://infobsys.com/post5/feed/</wfw:commentRss>
		<slash:comments>5</slash:comments>
		</item>
		<item>
		<title>Paid software is not the only solution&#8230;.</title>
		<link>http://infobsys.com/post-4/</link>
		<comments>http://infobsys.com/post-4/#comments</comments>
		<pubDate>Fri, 30 May 2014 06:37:58 +0000</pubDate>
		<dc:creator><![CDATA[Brian]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://infobsys.com/?p=74</guid>
		<description><![CDATA[From simple bookkeeping packages to full-blown ERP systems, open source software can provide free options for small businesses that don&#8217;t have the budget for big-ticket enterprise applications. There is a wealth of free software out there. Take some time and look into this before your next software purchase.]]></description>
				<content:encoded><![CDATA[<p>From simple bookkeeping packages to full-blown ERP systems, open source software can provide free options for small businesses that don&#8217;t have the budget for big-ticket enterprise applications. There is a wealth of free software out there. Take some time and look into this before your next software purchase.</p>
]]></content:encoded>
			<wfw:commentRss>http://infobsys.com/post-4/feed/</wfw:commentRss>
		<slash:comments>10</slash:comments>
		</item>
		<item>
		<title>Malware, the king of computer infections&#8230;.</title>
		<link>http://infobsys.com/post3/</link>
		<comments>http://infobsys.com/post3/#comments</comments>
		<pubDate>Fri, 30 May 2014 06:37:30 +0000</pubDate>
		<dc:creator><![CDATA[Brian]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://infobsys.com/?p=71</guid>
		<description><![CDATA[What is Malware? Malware is a catch-all term for various malicious software, including viruses, adware, spyware, browser hijacking software, and fake security software. Once installed on your computer, these programs can seriously affect your privacy and your computer&#8217;s security. For example, malware is known for relaying personal information to advertisers and other third parties without [&#8230;]]]></description>
				<content:encoded><![CDATA[<h2>What is Malware?</h2>
<p>Malware is a catch-all term for various malicious software, including viruses, adware, spyware, browser hijacking software, and fake security software.</p>
<p>Once installed on your computer, these programs can seriously affect your privacy and your computer&#8217;s security. For example, malware is known for relaying personal information to advertisers and other third parties without user consent. Some programs are also known for containing worms and viruses that cause a great deal of computer damage.</p>
<p><a id="Types of Malware" name="Types of Malware"></a></p>
<h2>Types of Malware</h2>
<ul>
<li><strong>Viruses </strong>which are the most commonly-known form of malware and potentially the most destructive. They can do anything from erasing the data on your computer to hijacking your computer to attack other systems, send spam, or host and share illegal content.</li>
<li><strong>Spyware</strong> collects your personal information and passes it on to interested third parties without your knowledge or consent. Spyware is also known for installing Trojan viruses.</li>
<li><strong>Adware</strong> displays pop-up advertisements when you are online.</li>
<li><strong>Fake security software </strong>poses as legitimate software to trick you into opening your system to further infection, providing personal information, or paying for unnecessary or even damaging &#8220;clean ups&#8221;.</li>
<li><strong>Browser hijacking software</strong> changes your browser settings (such as your home page and toolbars), displays pop-up ads and creates new desktop shortcuts. It can also relay your personal preferences to interested third parties.</li>
</ul>
]]></content:encoded>
			<wfw:commentRss>http://infobsys.com/post3/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Virus protection &#8230;</title>
		<link>http://infobsys.com/post2/</link>
		<comments>http://infobsys.com/post2/#comments</comments>
		<pubDate>Fri, 30 May 2014 06:37:00 +0000</pubDate>
		<dc:creator><![CDATA[Brian]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://infobsys.com/?p=68</guid>
		<description><![CDATA[The five steps that help the average personal computer user to fight viruses and worms include: Watch for new software downloads that add to new layers of protection. Do not open attachments from unrecognized email sources. Install anti-virus software. Download updates on your anti-virus software. New viruses require new solutions and companies like McAfee are [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>The five steps that help the average personal computer user to fight viruses and worms include:</p>
<ol class="article-list">
<li><strong>Watch for new software downloads that add to new layers of protection.</strong></li>
<li><strong>Do not open attachments from unrecognized email sources.</strong></li>
<li><strong>Install anti-virus software.</strong></li>
<li><strong>Download updates on your anti-virus software.</strong> New viruses require new solutions and companies like McAfee are constantly – 24 hours a day, every day of the year – building new protective measures against the latest outbreak.</li>
<li><strong>Finally, back up your critical information to preserve it in a worst-case scenario.</strong></li>
</ol>
]]></content:encoded>
			<wfw:commentRss>http://infobsys.com/post2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>It’s not just about backups…..</title>
		<link>http://infobsys.com/post-1/</link>
		<comments>http://infobsys.com/post-1/#comments</comments>
		<pubDate>Fri, 30 May 2014 06:36:02 +0000</pubDate>
		<dc:creator><![CDATA[Brian]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://infobsys.com/?p=64</guid>
		<description><![CDATA[Backing up your data is very important, but it’s not the end all. Recovery as in “Backup and Recovery” are the ying and yang in protecting your business data. What good is a backup if your office has been destroyed? How are you going to resume your business operations? This is where recovery comes into [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Backing up your data is very important, but it’s not the end all. Recovery as in “Backup and Recovery” are the ying and yang in protecting your business data. What good is a backup if your office has been destroyed? How are you going to resume your business operations? This is where recovery comes into play. A solid recovery plan along with backups will insure you can get your business back into the game and reduce the expense of downtime.</p>
]]></content:encoded>
			<wfw:commentRss>http://infobsys.com/post-1/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
	</channel>
</rss>
