Login 

Call Us Now:

Weston Technology Solutions Blog

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Categories
    Categories Displays a list of categories from this blog.
  • Tags
    Tags Displays a list of tags that have been used in the blog.
  • Archives
    Archives Contains a list of blog posts that were created previously.
Subscribe to this list via RSS Blog posts tagged in Email

Microsoft Word Vulnerability

Posted by on in Alerts

Microsoft Word 2013 logoA vulnerability has been discovered in Microsoft Word that could allow malware to get into your system. Microsoft is working on a fix or this, but for at least the next couple of weeks be especially vigilant if you receive a Microsoft Word attachment from someone that you don't know.

If you get a document from someone that you do know that you were not expecting, it is a good idea to check with them and make sure that they sent it. It only takes a minute to check versus the hours to clean up and the possible loss of data if something gets through.

This is a good reminder that it's a cruel digital world out there so definitely don't click on links or attachments from anyone you don't know, and view with suspicion any links or attachments from someone you do know that you were not expecting (especially those that are asking for you to pay an invoice or transfer money). WestonBlock and our antivirus software should block most of these but nothing beats plain old vigilance.

More technical info on the Microsoft Word vulnerability for those of you interested can be found here

Don't hesitate to contact us at if you have any further questions.

-- Your Weston Support Team

Email Out of Control? Six Tips to Tame Your Inbox

Posted by on in How To

ComputerFrustrationEmail is the lifeblood for many businesses. From quick little notes to co-workers to contracts sent to clients, email has a pile of different uses for you and your business. But if you’re like most folks, your inbox can get totally out of control, causing you to lose focus on the important messages. It’s time to tame your inbox with these six tips.

Tagged in: Email Outlook Spam Tips

Avoid "Budget Forecast" Emails

Posted by on in Alerts

windows 7 zip iconOver the last few days, we have seen an uptick in folks receiving an email with subject “budget forecast” (or something similar). This email has an attachment in zip format. Please do not open this or any other attachments in zip format from anyone that you do not know. Even if it is from someone that you do know, make sure and check with the purported sender to make sure that they actually sent it. Those zip files generally contain malware, usually in the form of virus-ridden Excel or Word documents (which we've discussed before on our blog).

You'll see what the icon looks like (roughly, as it's different, depending on the version of Windows you're using) to the right of this text.

As a reminder, always view attachments with suspicion and do not open any that are from someone that you do not know. Or, as stated above, even if it is from someone you know, make sure that they sent it. Apply the same rules to emails with links that invite you to click on them (here are some tips to recognize phishing scams).

It only takes a few minutes to check the validity of an email, where it can take hours to clean up a virus, not to mention the downtime and potential loss of files it can cost you.

Thanks and stay vigilant!

Tagged in: Email Security Tips Virus

Tweaking Your WestonBlock Settings

Posted by on in How To

WestonBlockWe mentioned earlier this year that changes were coming to backend services that powered WestonBlock. We migrated all but a couple folks to the new system now. The new system allows you to tweak your own personal settings so that WestonBlock works the way you want to. In this article, we go through a few of those settings that will allow you to personalize WestonBlock to best fit your usage habits.

Tech Tip: How Can You Verify An E-mail Is Valid?

Posted by on in How To

identityHave you ever wondered if you could check if an email address you have on file for somebody is valid? Say you were talking to a client on the phone and they gave you an email address or you are trying to decipher an email address from a sign-up sheet. You might want to verify it’s valid before sending. While there are no foolproof method for e-mail verification, there are some ways you can at least make an attempt at checking.