Friday 29 August 2014

Top 10 card fraud prevention tips for the e-shopping enthusiast

Top 10 card fraud prevention tips for the e-shopping enthusiast
So you've found something that you want to buy online, but need a bit of reassurance before you commit to paying. You'll probably want to make sure that your card data is being used responsibly and that your details aren't going to be compromised... here's what to look out for:
  1. HTTPS: Hypertext Transfer Protocol more commonly known as Http is used for most webpages.  However when you come to entering your card details online, watch out for the change from http to https ensuring the page is using a secure connection.  However be warned, if not properly implemented, https is not fail safe so read on for some more top tips...
  2. Padlock: Always ensure when you are entering card details, you can see a locked padlock or unbroken key symbol next to the address bar or at the bottom of the page.  Double clicking on the padlock symbol will display further security information for the site.
  3. Website policies: Have a look for the sites Security policy.  This should detail what information they are going to collect and how they are going to use it.
  4. 3D Secure: If you come across 3D Secure and haven’t registered, make sure you do.  3D Secure provides an additional layer of protection by asking you to enter a password that has been registered with your bank.   This way if your card information is obtained illegally, it will help to prevent funds being spent in your name.
  5. Confirmation: Keep hold of any confirmation emails that you receive.  Always check goods against your card statements.  This way you can easily identify charges that you don’t recognise.
  6. Payment Card Industry compliance: Make sure the retailer you are shopping with has some level of PCI compliance.  If you can’t find the information you’re looking for, don’t be afraid to contact the retailer and ask.
  7. Contact details: It may sound obvious but make sure there are contact details on the site including a physical address.
  8. Reviews: Check online for reviews.  With social media more popular than ever, if a customer has received bad service, the chances are they will have put it online.
  9. Credit vs. Debit cards: Try using a credit card rather than debit-It will offer you more consumer protection.
  10. Chargebacks: If you haven’t received your goods and are unable to contact the company in question, contact your bank for a chargeback
Before you type your card details into a website, ensure that the site is secure. Look out for a small padlock symbol in the address bar (or elsewhere in your browser window) and a web address beginning with https:// (the s stands for 'secure').
You also need to check that the website is trustworthy. Here are a few suggestions for ways in which you can reduce the risk of using an untrustworthy site:


  • Be suspicious of offers that seem too good to be true. This could indicate that a site might be selling illegal or pirated items.
  • If you're not familiar with the website, you could ask trusted friends, colleagues or family members for their opinion. They might be able to offer you recommendations for alternatives. 

6 ways to ensure your email gets read

6 ways to ensure your email gets read
If you’re like a lot of us, you get so much email every day that you might spend as little as 15 seconds scanning a message to determine how it applies to you. Now, imagine that other people are reading your email the same way. If they can't quickly identify the purpose of your message, they’ll probably delete it or leave it in the Inbox for "later"— if later ever comes.

1. Make the purpose of the message clear
When recipients receive your email message, they should be able to see at a quick glance how the message relates to them and why it’s important. They may be looking at a preview of your message in Microsoft Outlook or on a Windows phone or Windows Mobile device, such as a personal digital assistant (PDA). Or they may see only Subject lines in their Inbox. If your Subject line is confusing and irrelevant, your email will surely get deleted in a hurry. Here are some examples of what can be included in Subject lines to make sure the reader opens your mail:
·         A standard subject heading such as "Action Requested," "Response Requested," "FYI," or "Read Only," depending on the action indicated in the body of the message.
·         The meaningful objective or supporting project that the message relates to, for example, "FY '05 budget forecasting."
·         The required action if applicable, for example, "Consolidate departmental budget spreadsheets."
·         The due date if applicable, for example, "Due by July 7."
An example of an effective Subject line is "Action Requested—Consolidate all department spreadsheets for FY '06 budget and return to me by June 15th."


2. Tell recipients what action you want them to take
Be completely clear about the actions you want the recipients to take. Be specific and put all the material that is related to an action in one place. To get even faster responses, talk about how the action relates to the recipient's objectives, and always give due dates. It's also important to clarify what type of action you want the recipient to take. There are basically four types of actions you could request. If you make this level of detail clear, the recipient will be most likely to read the email and take the action right away. The four actions include:
·         Action: The recipient needs to perform an action. For example, "Provide a proposal for a 5% reduction in Travel & Entertainment expense."
·         Respond: The recipient needs to respond to your message with specific information. For example, "Let me know if you can attend the staff meeting at 9:00 A.M. on Friday."
·         Read only: The recipient needs to read your message to make sure they understand something. No response is necessary. For example, "Please read the attached sales plan before our next staff meeting on August 12th."
·         FYI only: The recipient should file your message for future reference. No response is necessary. In fact, even reading the message is optional. For example, "Enclosed for your records are your completed expense reports."


3. Provide the proper data and documents
Make sure you give recipients all of the information they need to complete an action or respond successfully to your request. Your co-workers shouldn't have to come back to you asking for information, whether it is a supporting document or a link to a file on a shared website. You can include supporting information in the body of the message, in an attached file, or in an attached email. In Windows Live Hotmail, you can use the Quick Add feature, which lets you search for and insert content such as images, video, restaurant details, maps, and movie times into your email messages, without ever leaving Hotmail. In addition, if you want recipients to fill out a form, it's a good idea to attach a sample copy of the form that shows how it should be filled out.


4. Send the message only to relevant recipients
Target your message to the appropriate audience. Only people who have to complete an action on the Subject line should receive your message. Be thoughtful and respectful when you enter names on the To line. People observe your thoughtfulness and the results are more effective. Here are two simple questions to help you filter the To line recipients:
·         Does this email relate to the recipient's objectives?
·         Is the recipient responsible for the action in the Subject line?


5. Use the CC line wisely
It's tempting to put loads of people on the CC line to cover your bases, but doing so is one of the fastest ways to create an unproductive environment. Here are some things to consider when using the CC line:
·         No action or response should be expected of individuals on the CC line. The recipient needs to only read or file the message.
·         Only those individuals whose meaningful objectives are affected by the email should be included on the message. If you are not sure that the information is related to a co-worker's objectives, check with that person to see if they want to receive your email on that topic.


6. Ask "final questions" before you click Send
The final thing you want to do is check your work to be sure you are supporting meaningful actions. Sending clear, well-defined messages can reduce the volume of email you send and receive, encouraging correct action, saving time, and limiting email trails. Make sure you ask the following questions before you send the message:
·         Have I clarified purpose and actions?
·         Have I included supporting documents and written a clear Subject line?
·         Did I write the message clearly enough that it does not come back to me with questions?
·         Am I sending the message to the correct recipients?
·         Have I run the spelling checker and edited the message for grammar and jargon?


Bonus: Don't send junk email
One of the quickest ways to get onto your recipients' "delete radar" is to overwhelm them with meaningless email. Responding to email with "I got your email, thanks," or sending out lots of irrelevant data that you think they might want to know about is a quick way to create a track record of sending unproductive mail.
To summarize, it is incredibly easy to create an unproductive culture using email. Follow these guidelines and you can be sure you and your team are able to keep focused on meaningful objectives and don't create email overload.


Thursday 28 August 2014

Six iPhone and iPad Security Features to Protect Data and Privacy

Six iPhone and iPad Security Features to Protect Data and Privacy

Fast growing mobile technology is making it increasingly difficult to prevent theft of personal data and intrusion of privacy of users. Many have become victims of cyber attacks or cyber crimes and have had their passwords, identifications, and credit card details stolen.

Core Group Africa's Marketing  Executive, Kerry Taoushiani in a media chat highlighted a few key tips to help secure your confidential data using a few security measures, which are as follows:

Add a Passcode or Enable Touch ID

Adding a passcode is the most basic level of protection for your iPhone and iPad, wherein you will be prompted to register one at the time of setting up your device during the first use.

However, if you forgot to set it up earlier, you can do so manually by going to Settings > Touch ID & Passcode and then hit Turn Passcode On. As a thumb rule, security experts often recommend use of alphanumeric words for passwords as they are difficult to hack and not easily guessed by the perpetrator.

Alternatively, users can enable Touch ID via Settings > Touch ID & Passcode by registering up to five fingers with the Touch ID fingerprint sensor to unlock the device.

Enable Find My iPhone in iCloud Settings
Enable the second level of security on your iPhone to protect your phone from data theft and misuse, if ever it gets stolen in future.

To do this, go to Settings > iCloud and turn on Find My iPhone function which enables you to locate the missing device, erase, or ring your device remotely from the comfort of another device, using the Find My iPhone app or via iCloud.com.

Encrypt Your Data

Data encryption is the most effective way of hiding your data from cyber criminals and hackers, especially if you own tons of personal info such as credit card details, contacts, videos and photos on the device.

To do this: just go to Settings > Touch ID & Passcode and then scroll down to the bottom and check if Data Protection is enabled.

Enable Automatic Data Wipe After 10 Failed Passcode Attempts
The final layer of security can be enabled by pushing the toggle switch for Erase Data to On in Settings > Touch ID & Passcode, which will automatically delete iPhone's data following 10 failed attempts.

Never Share your Passcode

Remember to keep your passcode safe by memorizing. Be wary of scribbling passcodes indiscriminately on papers and note pads around as this could encourage unwanted access to your device, expose your personal data and compromise security.

Visit iStore

Core Group Africa is the official Value Added Distributor (VAD) for Apple in Nigeria and custodians of iStore, Ikeja Mall, the home of all official Apple devices and accessories where customers can get all Apple products like iPad, iPhone and iMac with genuine warranty, after sales support, and free product training.
From the ikeja Apple IStore- the home of everything Apple in Nigeria

Get an email notification when someone tries to log into your computer

Get an email notification when someone tries to log into your computer

 Most of the people in this world use computer with Microsoft Operating System. There is a feature in Microsoft OS to lock the desktop. This is among the tens of thousands features of Microsoft OS. But what if you forgot to lock down your system when you go for lunch or for a quick coffee break from your work. Now you have some kind of feeling in your mind that some outsiders in your office whom you don’t know used or tried to login into your computer while you are out. How do you get notified when such an attempt is made to intrude into your computer? 
Daily, people from around the world are doing hard work to secure the computer system. In this run, thousands of new websites with amazing features have been developing. Among those websites, a new website named MouseLock.co came up with simple solution to identify the intruder trying to intrude into your computer. This site will send you an email alert along with a picture (picture will be sent only if there is a camera in the computer system) of the intruder as soon as someone tries to use your computer.
So you are wondering how mouselock.co works, right?
First you sign-in with your Google Account (they’ll send the alert to your Gmail address) and then select a secret pin no (1-10) on the screen. Next, put your mouse cursor in a designated area on the Mouse Lock website and leave the machine.
secret-pin
Now when someone moves the mouse, they will also have to enter the original pin which you have entered before leaving the machine. If they fail to do that in the first few seconds, Mouse Lock will send you an email and, if the computer has a webcam, it will use that to take  a picture of the intruder.
Mouse Lock won’t prevent the intrusion but will at least notify you the minute it happens. And the beauty of this site is that no installation is required because this is a web application.

This web site has used  JQuery mouseLeaveEvent in order to detect the movements of the mouse while the webcam photographs are captured using the getUserMedia() API. These event handlers are currently supported only in Chrome and Firefox. The alerts, possibly due to a bug, are triggered even when any of the keys are pressed and that makes it a little less useful since there’s no way to lock the computer after setting up the monitor.

Lenovo YOGA Tablet With 18-hour battery now in Nigeria

Lenovo YOGA Tablet With 18-hour battery now in Nigeria

Lenovo, the largest PC company in the world, has announced the availability of YOGA Tablet 10 HD+ in gold and silver at Slot and Microstation outlets in Nigeria. The multimode Android YOGA Tablet 10 HD+, with its incredible battery of up to 18 hours incorporates  the latest technologies including a Full HD screen, Qualcomm Snapdragon processor and a sharp high resolution camera.
                                                                                                       
The new Lenovo Yoga Tablet, comes with a 20/20 Vision display graphics, as well as a Full HD resolution, which makes movies and photos look crystal clear and more like real life. With the new Smart Display, the tablet automatically adjusts the images and text on the screen to the ambient light, making it gentler on users’ eyes in all its modes. 

Built for accessing multimedia on the go, apps and files load quickly thanks to its new Qualcomm Snapdragon 400 Processor. The new Lenovo  tablet also features rich Dolby audio sound, 10 point multitouch, a micro USB port, a new high definition 8MP rear camera and an optional keyboard

The tablet’s signature three modes – Hold, Tilt and Stand – continue to give users a better way to use the tablet in nearly any situation. The tablet’s unique cylindrical battery allows them to hold it for reading or browsing the Internet, or they can place it in Tilt Mode for a better viewing angle on a desk or tablet.
The Lenovo YOGA also has a new special package of "DOit" apps for effective  sharing, synching and protecting data. With "SHAREit", users can instantly share pictures, videos, music files, documents, contacts and even apps with up to five devices without an Internet connection. It wirelessly transfers information between devices at up to 40 times faster than Bluetooth.  "SECUREit" optimizes and protects users’ mobile data with its menu of data-protection tools. With a single touch, it protects against viruses, spam and malware, and if the tablet becomes lost or stolen, anti-theft protection locks it down.

"SYNCit" serves as a personal backup assist by backing up contacts, text messages and call logs in the cloud. Users can reload the content to their tablet or another Android device. "SNAPit" Camera gives users unprecedented flexibility for shooting in specific modes (such as panorama or burst mode) for wide-angle shots, low-light situations and more. It also offers special filters and effects.The YOGA Tablet 10 HD+ is available now in gold and silver at Slot and Microstation outlets in Nigeria for NGN 59,990. 

Lenovo is a US$39 billion personal technology company, the largest PC company in the world, serving customers in more than 160 countries. Dedicated to building exceptionally engineered PCs and mobile internet devices, Lenovos business is built on product innovation, a highly-efficient global supply chain and strong strategic execution.  Formed by Lenovo Groups acquisition of the former IBM Personal Computing Division, the company develops, manufactures and markets reliable, high-quality, secure and easy-to-use technology products and services. Its product lines include legendary Think-branded commercial PCs and Idea-branded consumer PCs, as well as servers, workstations, and a family of mobile internet devices, including tablets and smartphones.