Saturday, January 23, 2016

Tabula Rosa Systems Core Netiquette For Subject Fields

 



Top Netiquette Subject-Line Entries

It is tantamount that a subject line is consistent with the content of the email itself; if it isn’t, the likelihood of the recipient opening a future message will be greatly reduced.
The following are some tips on things to include in the body of the email if you want it to have an impact on the recipient and generate a response:

1.       Mention the person who referred you, including the full name and tile of the person.
2.       Add the name of a successful sendee’s company item (e.g., a new product).
3.       Include a very specific identifier with job description (i.e., job title, responsibilities, ID number, and so on).
4.       If making a cold inquiry, be direct.
5.       Use any prestigious titles you possess, such as CEO, CTO, and so forth.
6.       Ask for the person’s professional advice, e.g., “your opinion is requested” if this is your primary reason for the message.
7.       Tantalize the reader by mentioning special content, e.g., new information.
8.       Use power words.
9.       Avoid overhyping yourself. A second opinion may be helpful (e.g., having someone else read it). 
10.  Promote yourself by mentioning favorable customer reviews you’ve received.

==============================================
 
For a great satire on email, please see the following:
https://www.youtube.com/watch?v=HTgYHHKs0Zwscoop_post=bcaa0440-2548-11e5-c1bd-90b11c3d2b20&__scoop_topic=2455618
=============================================== 
Good Netiquette And A Green Internet To All! 

Special Bulletin - My just released book

"You're Hired. Super Charge our Email Skills in 60 Minutes! (And Get That Job...) 

is now on sales at Amazon.com 

Great Reasons for Purchasing Netiquette IQ
·         Get more email opens.  Improve 100% or more.
·         Receive more responses, interviews, appointments, prospects and sales.
·         Be better understood.
·         Eliminate indecision.
·         Avoid being spammed 100% or more.
·         Have recipient finish reading your email content. 
·         Save time by reducing questions.
·         Increase your level of clarity.
·         Improve you time management with your email.
·        Have quick access to a wealth of relevant email information.
Enjoy most of what you need for email in a single book.

 =================================

**Important note** - contact our company for very powerful solutions for IP
 management (IPv4 and IPv6, security, firewall and APT solutions:
www.tabularosa.net
==================================================

Another Special Announcement - Tune in to my radio interview,  on Rider University's station, www.1077thebronc.com I discuss my recent book, above on "Your Career Is Calling", hosted by Wanda Ellett.   

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.


I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.

Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace.Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.
=============================================================

Tabula Rosa Systems Blog Of 1/23/2016 Greynet (or graynet) Definition

 
Greynet (or graynet) Definition
Posted by: Margaret Rouse
Greynet is a term for the use of unauthorized applications on a corporate network. A greynet application is a network-based program that corporate network users download and install without permission from their company's IT department. Common examples of greynet applications include instant messaging, peer-to-peer collaboration and conferencing programs, streaming media players, and RSS readers.
Many greynet applications, such as instant messaging and collaboration programs, have legitimate business use and help boost user productivity. Other greynet applications, like peer-to-peer file and music sharing programs, pose serious security risks and can drain network resources. User-downloaded programs also can include malicious programs like spyware components for tracking and reporting information without the user's knowledge. Greynet usage by employees is thought to be a major contributor to the growth of spyware-related incidents.
All greynets, even those that benefit the end-user, can be detrimental to a company network. Because they use corporate bandwidth, the programs often have negative effects on overall network performance. They introduce security risks, including client code vulnerabilities and new avenues for attack, and can lead to data loss and property or identity theft. Greynets can be difficult to eliminate because many use encryption and port agility (the ability to dynamically send and receive traffic across any open network port), which makes them difficult to detect and block.

==============================================
For a great satire on email, please see the following:
https://www.youtube.com/watch?v=HTgYHHKs0Zwscoop_post=bcaa0440-2548-11e5-c1bd-90b11c3d2b20&__scoop_topic=2455618
=============================================== 
Good Netiquette And A Green Internet To All! 

Special Bulletin - My just released book

"You're Hired. Super Charge our Email Skills in 60 Minutes! (And Get That Job...) 

is now on sales at Amazon.com 

Great Reasons for Purchasing Netiquette IQ
·         Get more email opens.  Improve 100% or more.
·         Receive more responses, interviews, appointments, prospects and sales.
·         Be better understood.
·         Eliminate indecision.
·         Avoid being spammed 100% or more.
·         Have recipient finish reading your email content. 
·         Save time by reducing questions.
·         Increase your level of clarity.
·         Improve you time management with your email.
·        Have quick access to a wealth of relevant email information.
Enjoy most of what you need for email in a single book.

 =================================

**Important note** - contact our company for very powerful solutions for IP
 management (IPv4 and IPv6, security, firewall and APT solutions:
www.tabularosa.net
==================================================

Another Special Announcement - Tune in to my radio interview,  on Rider University's station, www.1077thebronc.com I discuss my recent book, above on "Your Career Is Calling", hosted by Wanda Ellett.   

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.


I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.

Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace.Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.
=============================================================

Friday, January 22, 2016

Tabula Rosa Systems Blog Of 1/22/2016 - Most Internet Devices Run Known Security Vulnerabilities: Cisco Report

 

Most Internet Devices Run Known Security Vulnerabilities: Cisco Report
BY CHRIS BURT ON TUESDAY, JANUARY 19 2016 www.thewhir.com

Regulators and investigators expect businesses to manage risk exposure in 2016, but executives are not sure they’re up to the challenge, according to the Cisco 2016 Annual Security Report, released Tuesday. Vulnerabilities from aging infrastructure, SMBs in the enterprise supply chain, and a disconnect between DNS experts and security teams are contributing to difficulties in adapting to the current threat landscape.
While 92 percent of executives surveyed said that regulators and investigators expect enterprises to manage cybersecurity risks, only 45 percent are confident in the effectiveness of their security posture. The report notes increasing transparency and board-level concern, which are likely to benefit enterprise security in the long run, but as of the report seem mostly to have increased anxiety. Some enterprise security cynics will say this anxiety is long overdue.
Inadequate infrastructure upkeep is a growing issue, as Cisco says that 92 percent of Internet devices are running known vulnerabilities, 31 percent are no longer supported or maintained by the vendor, and the number of organizations that consider their security infrastructure up-to-date declined by 10 percent from 2014 to 2015.
The report also found that attackers are using compromised servers, such as those used by content and social media platforms, to launch attacks. WordPress domains used by criminals increased 221 percent from February to October 2015. Ransomware attacks alone now generate $34 million in annual criminal proceeds. Breaches from malicious browser extensions have affected 85 percent of organizations, and over 90 percent of “known bad” malware uses DNS as a key capability, according to the report.
“Security is resiliency by design, privacy in mind, and trust transparently seen,” said John N. Stewart, senior vice president, chief security and trust officer, Cisco. “With IoT and digitization taking hold in every business, technology capability must be built, bought, and operated with each of these elements in mind. We cannot create more technical debt. Instead, we must meet the challenge head on today.”
The report is not all bad news. While the number of SMBs using web security dropped over 10 percent from 2014 to 2015, SMB security outsourcing leaped from 14 to 23 percent, providing more robust security for those who do implement it. The outsourcing trend also extends to all sizes of enterprises. Despite lengthy estimates for breach detection time, Cisco reduced its own detection time from 46 to 17.5 hours since its 2015 Cisco Midyear Security Report, the company says.
==============================================
For a great satire on email, please see the following:
https://www.youtube.com/watch?v=HTgYHHKs0Zwscoop_post=bcaa0440-2548-11e5-c1bd-90b11c3d2b20&__scoop_topic=2455618
=============================================== 
Good Netiquette And A Green Internet To All! 

Special Bulletin - My just released book

"You're Hired. Super Charge our Email Skills in 60 Minutes! (And Get That Job...) 

is now on sales at Amazon.com 

Great Reasons for Purchasing Netiquette IQ
·         Get more email opens.  Improve 100% or more.
·         Receive more responses, interviews, appointments, prospects and sales.
·         Be better understood.
·         Eliminate indecision.
·         Avoid being spammed 100% or more.
·         Have recipient finish reading your email content. 
·         Save time by reducing questions.
·         Increase your level of clarity.
·         Improve you time management with your email.
·        Have quick access to a wealth of relevant email information.
Enjoy most of what you need for email in a single book.

 =================================

**Important note** - contact our company for very powerful solutions for IP
 management (IPv4 and IPv6, security, firewall and APT solutions:
www.tabularosa.net
==================================================

Another Special Announcement - Tune in to my radio interview,  on Rider University's station, www.1077thebronc.com I discuss my recent book, above on "Your Career Is Calling", hosted by Wanda Ellett.   

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.


I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.

Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace.Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.
=============================================================

Tabula Rosa Systems Security Bulletin On The Internet Of Things (IoT) - FBI Alert Number I-091015-PSA


FBI Alert Number I-091015-PSA
BI Alert Number I-091015-PSA is a public service announcement from the United States Federal Bureau of Investigation to inform individuals and organizations about the importance of Internet of Things (IoT) security, including potential vulnerabilities and protective measures that should be taken to mitigate risk associated with them.

The title of the public service announcement is “Internet of Things poses opportunities for cyber crime.” The essence of the IoT is the idea that almost anything can be equipped with a unique identifier and the ability to communicate over a network. What that means is that the number of connected devices is increasing quickly and exponentially and the potential attack surface is increasing at least as rapidly and significantly. What may be lagging, however, is the security measures required to protect that expanding attack surface.
Much of the increase in IoT communication comes from computing devices and embedded sensor systems used in industrial machine-to-machine (M2M) communication, smart energy gridshome and building automationvehicle to vehicle communication and wearable computing devices. Because the idea of networking such items as home appliances and other non-computing devices is relatively new, products that can be IoT devices (things) may not be designed with security in mind.
The FBI lists the following examples of IoT devices:
  • Automated devices which remotely or automatically adjust lighting or HVAC
  • Security systems, such as security alarms or Wi-Fi cameras, including video monitors used in nursery and daycare settings
  • Medical devices, such as wireless heart monitors or insulin dispensers
  • Thermostats
  • Wearables, such as fitness devices
  • Lighting modules which activate or deactivate lights
  • Smart appliances, such as smart refrigerators and TVs
  • Office equipment, such as printers
  • Entertainment devices to control music or television from a mobile device
  • Fuel monitoring systems
Any device in that list can be hacked if connected to the Internet and not adequately protected. Furthermore, hacked devices can provide an attacker with access to sensitive data on the same network. During her keynote address at the 2015 IoT Security Conference in Boston, FBI CISO Arlette Hart discussed how the growth rate of the Internet of Things is outpacing security efforts and implored enterprises to take action before disaster strikes. Hart remarked that in technology, "Cool trumps safe. The capabilities, themselves, are almost always developed without security in mind. We need to change that."
=====================================================
**Important note** - contact our sister company for very powerful solutions for network, security and systems management!

www.tabularosa.net

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has also been published. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications. 

Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.
==============================================

Thursday, January 21, 2016

Tabula Rosa Blog for 1/21/2016 - Netiquette For Kids - Make Your Own Kid-Friendly Home Internet Access

 

Make your own kid-friendly home internet access
January 20, 2016  http://www.smh.com.au/
Adam Turner
It's not hard to filter out the worst of the internet without installing crippling net nanny software on every device in your home.
There comes a time when every parent is forced to consider the best way to keep their children safe online. The child-friendly plug n' play hub is one solution, creating a separate filtered Wi-Fi network for the youngsters in your house, but there are other solutions if this doesn't suit your needs.
The advantage of the plug n' play hub is that you don't need to install filtering software on your end devices, which is useful because you're unlikely to find software to protect every internet-enabled device in your home such as the browser on your Smart TV. Net nanny software also has a tendency to cripple end devices as it tries to block content on the fly.
The disadvantage of the plug n' play hub solution is that it relies on a separate Wi-Fi network. This might not suit you if you're happy with your existing wireless router, especially if you rely on Wi-Fi extenders to reach the far corners of your home. The plug n' play hub also fails to protect devices which are connected to your home network via Ethernet cables rather than Wi-Fi.
Look it up
The plug n' play hub doesn't inspect every webpage on the fly, instead it relies on custom DNS servers. These are the telephony directories of the internet, helping your devices look up webpages. By default every device in your home probably uses your internet service provider's DNS settings, but it's easy to change this -- across your entire home or just on individual devices.
Services like OpenDNS and Norton ConnectSafe offer custom DNS servers which modify the listings for inappropriate webpages, serving up a "page blocked" message instead. They offer free and paid options, granting you different levels of control over what's blocked.
The paid services are linked to your home IP address, which can be a problem if your IP address changes whenever you reboot your modem. There are websites and apps which make it easy to notify the service of your new IP address, or you might find it easier to pay extra to your internet service provider for a fixed IP address. This also comes in handy if you're using DNS-based geo-dodging services like Unblock US to sneak into US Netflix.
Pick and choose
If you want to protect your entire home then it's just a matter of changing the DNS settings in your modem, so it automatically hands out the address of your child-friendly DNS server to every device.
Alternatively you can protect individual devices by just changing their DNS settings, which lets you stick with one Wi-Fi network. The process of editing the DNS settings works slightly different on various devices, but a quick Google search will help you along your way.
For example, on an iGadget you can't create a default DNS setting for every Wi-Fi network, you can only change the DNS settings for specific networks. This is useful in that you can configure child-friendly DNS settings on an iPad at home and know these settings won't cause trouble when your child connects their iPad to their school's network. Unfortunately you can't enforce your child-friendly DNS over 3G/4G or when connecting to a new Wi-Fi network.
Not a magic bullet
DNS-based filtering is handy if you want to prevent young children stumbling upon inappropriate content, but it's much more challenging to stop older children who go actively looking for it.
Tech-savvy kids can beat DNS filtering by changing the DNS settings themselves, using a VPN or proxy server to bypass the filtering or simply switching to an unprotected Wi-Fi network. You can lock some of these options down on a computer by ensuring your kids don't have administrator rights, but it's harder to do on mobile devices.
Remember that at the end of the day web filtering is not a substitute for adult supervision, so it's important to take an interest in your children's online activities and discuss the dangers. How do you keep the youngsters in your home safe when they're online?
==============================================For a great satire on email, please see the following:
https://www.youtube.com/watch?v=HTgYHHKs0Zwscoop_post=bcaa0440-2548-11e5-c1bd-90b11c3d2b20&__scoop_topic=2455618
=============================================== 
Good Netiquette And A Green Internet To All! 

Special Bulletin - My just released book

"You're Hired. Super Charge our Email Skills in 60 Minutes! (And Get That Job...) 

is now on sales at Amazon.com 

Great Reasons for Purchasing Netiquette IQ
·         Get more email opens.  Improve 100% or more.
·         Receive more responses, interviews, appointments, prospects and sales.
·         Be better understood.
·         Eliminate indecision.
·         Avoid being spammed 100% or more.
·         Have recipient finish reading your email content. 
·         Save time by reducing questions.
·         Increase your level of clarity.
·         Improve you time management with your email.
·        Have quick access to a wealth of relevant email information.
Enjoy most of what you need for email in a single book.

 =================================

**Important note** - contact our company for very powerful solutions for IP
 management (IPv4 and IPv6, security, firewall and APT solutions:
www.tabularosa.net
==================================================

Another Special Announcement - Tune in to my radio interview,  on Rider University's station, www.1077thebronc.com I discuss my recent book, above on "Your Career Is Calling", hosted by Wanda Ellett.   

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.


I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.

Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace.Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.
=============================================================