Nexus 7 Drawing!
CLICK HERE TO ENTER

 
September's Nexus 7 drawing.
YOU MUST ENTER EACH MONTH

Winner will be announced  HERE.

If you are not already a subscriber to the Digital Agent Newsletter you will become one by entering this contest.

It pays to subscribe to the Digital Agent Newsletter. You don't have to be a Digital Agent customer to win.



Congratulations:
Rhonda Poore
SK Commercial Realty


- on winning last month's Nexus 7. Good luck with your new gadget!


How To Safely and Securely Use USB Memory Sticks
used with permission from Norton by Symantec
by Nadia Kovacs

.
You may have noticed growing reports in the media about the dangers of using USB memory sticks. It is true, they are susceptible to being exploited like everything else, however, and these exploits aren't terribly easy to carry out by hackers. Mostly because an attacker needs physical access to your computer in order to infect it.

What Can a "Bad" USB Stick Do?

A malicious device can install malware such as backdoor Trojans, information stealers and much more. They can install browser hijackers that will redirect you to the hacker's website of choice, which could host more malware, or inject adware, spyware or greyware onto your computer. While the ramifications of these threats can range from annoying to devastating, you can stay protected from these threats.

Read more

5 easy-to-fix tech troubles you can solve yourself
used with permission from HP Technology at Work

Technology issues are a thorn in the side of many businesses. Even an action as simple as opening and printing out an email attachment can come with its fair share of bumps in the road. And the whole process of calling for support and waiting for service—that can often be as painful as the issue itself. Wouldn't it be great if you could just fix these problems yourself? Well, sometimes you can. Here are DIY solutions to five all-too-familiar tech problems:

Problem #1: You can't open an email attachment

Possible solutions: The most common cause for this annoying—yet easily fixable—roadblock is that you don't have the correct software needed to open the file. To determine whether this is the case, look at the attachment's file extension to see what program is required. For example, if the extension is .pdf, check to see if you have a recent version of a PDF reader.

Read more


Overcoming barriers to tech adoption in education
Used with the permission of http://thenetwork.cisco.com
by Travis Allen, President and CEO, iSchool Initiative


How to overcome tech adoption barriers to help students learn in today's digital world.

Technology has become a significant part of the classroom and facilitates student success by enabling today's learner to go where they want to learn, when they want to learn, and how they want to learn.

As I visit schools in Finland, Sweden, the United States and elsewhere, I find that not only do we make the same mistakes in deploying education technology as other countries do, but also schools within the same district are even making the same mistakes!

Schools, districts, and entire countries all seem to "recreate the wheel" - implementing mobile deployments that suffer from similar setbacks. More cross-pollination and sharing of best practices are essential for school districts to create a learning initiative that leads to success. This is why I think it's important to know reoccurring barriers to mobile technology adoption and how to overcome these barriers to help students learn in today's digital world.

Read more


Ransomware: When Cybercriminals Hold Your Computer Hostage
used with permission from Norton by Symantec
by Nadia Kovacs


Ransomware is a form of malware that will lock files on a computer using encryption. Encryption converts files into another format, like a secret code and can only be decoded by a specific decryption key.

Types of Ransomware

Ransomware can present itself in two forms.
  • Locker ransomware will encrypt the whole hard drive of the computer, essentially locking the user out of the entire system.
  • Crypto ransomware will only encrypt specific, seemingly important files on the computer, such as word documents, PDFs and image files.

Read more


September Newsletter
In this issue
How To Safely and Securely Use USB Memory Sticks
5 easy-to-fix tech troubles you can solve yourself
Overcoming barriers to tech adoption in education
Ransomware: When Cybercriminals Hold Your Computer Hostage
Inserting and Using Drop Down Lists in Excel
Cartoon and Quote

Follow:

Inserting and Using Drop Down Lists in Excel

A helpful tool when working in Excel spreadsheets is the drop down codes. These can be used a variety of ways. For this example we'll use a spreadsheet with names and address that we are tracking for how a customer was contacted.

In the Status column I want drop down choices for the following:
  • Direct Mail
  • E-Mail
  • Phone Call
  • Face To Face
  • No Contact
Here's how we'll insert these choices. 
  1. First, you'll add a new spreadsheet to your Excel workbook to hold your drop down choices. I named mine KEY.
Read more

Just for Laughs


Quote of the Month

I attribute my success to this - I never gave or took any excuse.

- Florence Nightingale

Digital Agent  |  1000 Cir 75 Pkwy Ste 550  |  Atlanta, Georgia  30339  |  404.446.3111  |  www.digitalagent.net