Monday, March 7, 2016

ABS Building Systems Integrators

ABS is a full service contractor offering an array of personnel, trades, and experience to ensure the completion of your project on time and under budget.
Strong client relationships are fundamentally important to ABS Building Systems Integrators. We believe that success is achieved through active and dedicated connections with our clients. We carry this fundamental process into all services we provide. ABS understands working in a cooperative and safe manner is essential to meeting our clients’ needs, along with completing the project on time and as pledged. Choosing ABS guarantees that your project will turn out the way it was envisioned. Regardless of size or scope, we utilize our talents to get the job done right. We maximize every tool at our disposal to continually innovate and improve how we deliver your next landmark project.


Monday, February 29, 2016

JR Hall Excavating

JR Hall Excavating has been in business for 32 years and offers a wide array of services for both residential and commercial projects. Fully insured and licensed for Pennsylvania, Ohio, and West Virginia, our experienced employees are experts in their field.  Being the Tri-State area's largest supplier of fill dirt and topsoil, JR Hall has been successfully filling large truck orders since 1984.





Friday, February 5, 2016

The Top 10 Reasons to Attend Business Networking Events

The Top 10 Reasons to Attend Business Networking Events
By Leni Chauvin

There are many, many reasons to attend networking events. Here are my Top 10:
1. To increase your visibility.
Establishing top of mind awareness is critical in any marketing campaign, and make no mistake about it, attending business networking events is a key marketing strategy if done properly. One of the most important elements—and one of the most overlooked—to getting the biggest bang for your networking buck is to make sure your face and your message get in front of the same—and the right—people on an ongoing basis.
2. To start relationships that will lead to strategic alliances, joint ventures, and referrals.
Contrary to popular belief, very few people walk away from a few hours spent at a business networking event with a fistful of contracts. Meeting people at the networking function is merely the important first step towards reaching your client attraction goals. It's what you do after the event that is more important. Follow-up is key to deepening the relationships that will increase your bottom line.
3. To stay current on trends in your industry (and those of your target market).
Attending networking events given by your professional association—or associations related to your target market—allows you to glean information about current and future trends. The information you gather at these functions can easily give you a leg up on your competition.
4. To become connected to key influencers in your industry and within your target market.
Instead of going to every business networking event in town, select the networking events you attend wisely and attend regularly. Do some research. Find out which organizations attract the people you want to meet and you will get the biggest return on your investment of time, money, and energy.
5. To learn from and to be motivated by powerful speakers.
Many business networking events have speakers who are experts in fields that will be of interest to you and to your target market. In addition to imparting important information, many of these speakers can often be the spark that jolts you into action.
6. To find suppliers and solutions to your problems.
Most people think of networking events as a place to pursue business. Equally important though, is the fact that we might be able to give business to other attendees and solve some of our problems at the same time. Networking events can be a great place to find accountants, printers, salespeople, etc. for yourself and your clients.
7. To hone your marketing message.
Use business networking events to practice and refine your elevator speech. Make sure it conveys in 30 seconds or less what solutions you provide, for whom you provide them, and the benefits of doing business with you. Practice, practice, practice until you feel confident that you are conveying your message in the most powerful and compelling way.
8. To socialize.
Human beings are social animals and need the type of stimulation available when interacting face-to-face with others. Today, as more and more people work out of their attics, basements, or spare bedrooms, it has become increasingly important for us to socialize, recharge our batteries, and preserve our sanity.
9. To recruit talent.
If you are looking to expand your business and hire staff, business networking events are a good starting point for your exploration of the marketplace. You will be able to enter into conversations with potential employees and get clear on what your needs are. You may well find what you are looking for right in front of you!
10. To uncover the "hot buttons" of your target market.
To deliver powerful solutions that will make life easier for members of your target market, you've got to know what challenges they face and what they are looking for. Capitalize on the conversations you have at business networking events to uncover what makes prospective clients tick and what ticks them off. Then create products or services that will alleviate their pain and make you a hero/ine in their eyes.

Copyright 2006 Leni Chauvin

Saturday, January 30, 2016

Party On! Entertainment

Party On! Entertainment is Pittsburgh's premier mobile entertainment company. We provide a wide range of mobile entertainment services including DJ services, Karaoke, Name That Tune Bingo, Derby 'N' Dance Parties, and Mobile Cinema.

Contact us when planning your next Corporate Event, School Dance, Fundraiser, Private Party, Bar Entertainment or Wedding.


Wednesday, January 27, 2016

Village Tavern and Trattoria

Welcome to Village Tavern and Trattoria, a traditional Italian family restaurant serving Pittsburgh and its surrounding areas. Steeped in the history of the Pittsburgh's West End and born of the legacy of rustic and open "Trattorie" style dining in Italy, Village Tavern and Trattoria offers a vast selection of choice Italian dishes and other choice selections.





Monday, January 18, 2016

Backup Your Data, Backup Your Data, Backup Your Data

Recently I had the experience of working with a client that has an effective data backup plan, which is always a good thing. On this particular occasion I was working with an employee that began experiencing issues after opening an email attachment that was forwarded to them by the company president. Upon opening the attachment, their computer began running slowly, and the icons on their desktop began to disappear.  As the employee provided details over the phone regarding what had happened, I realized that this could have greater ramifications than expected. I immediately remote accessed their computer and began reviewing processes and event logs – all the typical things IT support techs will do. When I saw what was taking place, I asked them to immediately turn off their computer and under no circumstances should they turn it back on.  This was serious and I needed to go onsite.
As fate would have it, this particular user was infected with the CryptoLocker virus – a file-encrypting Ransomware that can bring a company to its knees. The goal of Ransomware is to prevent or limit access to computer systems and/or data. Ransomware attempts to force victims to pay a monetary ransom using various online payment methods in order to regain access to their computers or files.
CryptoLocker and Cryptowall are ugly types of Ransomware that will encrypt a variety of documents and file types on your hard drive or mounted network drives. They typically use what is referred to as an RSA key to perform the encryption, and can only be unencrypted using the private key held by the individual or group that sent the virus.  When you attempt to access your files a message will be displayed showing payment information needed to regain access to your system. The idea is that if you pay the desired financial amount, you will be given the key required to unencrypt your files.  This is extortion in the digital realm.
When I arrived at the customers’ location, I found that all the files within this users “My Documents” folder had been affected.  Additionally, since this user had a mapped network drive to the company server, the virus began encrypting files on the server as well. I quickly realized that this could turn out to be a nightmare for the client. However, since this particular client follows a strict procedure of data backup, the damage was greatly minimized.  The company takes periodic backups of important information throughout the day, and stores them offsite. They also have their employees store the critical documents on the server that is backed up, rather than on their local computer. However, it takes time to restore files. Had this user not contacted me when the issue began, I would have to have spent much more time restoring files that were residing on the company server. This would have brought company productivity to a halt. A rather scary thought comes to mind – what would have happened if this company wasn’t backing up their data?
The problem with viruses like Cryptolocker and Cryptowall is that traditional Anti-virus software is often unable to detect it. This means that regardless of the Anti-virus software you utilize, there is a very good chance that you can still get infected.  Because of this, the best protection that is agreed upon in the IT community is to, Backup Your Data, Backup Your Data, Backup Your Data!
While backing up your data is vital, it is also important that the backup is not just a copy of your files on an external hard drive. Remember, Ransomware can encrypt files on hard drives that are accessible from your computer, including USB drives or a mapped network drives. For this reason it is always a good practice to have a backup strategy that includes offsite backup (e.g. using software that makes a copy of your data to a remote location) or at the very least, have a full backup of your data on an external hard drive, then disconnect the hard drive for safe keeping.
Data security is a learned behavior, and by practicing safe procedures you can ensure that you are one step ahead of the virus creators.  In addition to backing up your data I always recommend the following:
1.       By default Windows enables a setting that hides file extensions – disable this setting so that you can see the file type when looking at its name within Windows Explorer.  File extension are the characters that come after the period at the end of a file name (typically three characters).  They tell Windows what type of file it is, and Windows associates the file type with a particular application that can access it.  When the file extension is hidden, you are not able to see the full file name.  This can be a problem if someone sends an attachment that is named “my-resume.pdf.exe.”  When you view the attachment in your email application it may appear as “my-resume.pdf” – which when double-clicked may cause a nasty virus infection on your computer. While the file appears to be a PDF document, it is in fact an executable file that could create problems.  To show file extensions go to your Control Panel, click on Folder Options, select the View Tab, then scroll down and deselect “Hide extensions for known file types.” Your screen may flash, and when viewing Windows Explorer you will see a variety of new characters in your file names.

2.       Immediately turn off your computer if it begins to behave erratically after opening an email attachment (or files from external sources).  If your computer is off the malware cannot run and infect your computer.  Your hard drive can be scanned through a variety of means including a variety of bootable Anti-malware utilities.

3.       Install a good Anti-virus software and Anti-malware application.  Not all Anti-virus software is effective at preventing malware infections.  For this reason I use both.  There are a variety of Anti-malware applications on the market that work very well.  Personally, I use Malwarebytes (https://www.malwarebytes.org/).  Most importantly, however, is that you ensure your Anti-virus and Anti-malware applications are being regularly updated, and that you are taking the time to schedule full scans of your computer systems.

4.       Keep your system up to date with Windows patches and updates.  Microsoft releases updates on a regular basis to address a variety of issues and it is good practice to ensure you are taking advantage of these.

5.       Scan all email attachments and files you receive regardless of where they came from. For example, your best friend may be infected by a virus that automatically sends out infected messages to entries in their contact list. If you receive an email with an attachment – save it to your hard drive and scan it before opening it (especially .ZIP, .RAR and .7Z files).  Also, never open executable files (files that end in .EXE) if you are not expecting them or aware of their origin. Another area of prevention if when working with clients that pass along files on USB flash drives.  If they are unknowingly infected and you connect the flash drive to your system, you could potentially get infected as well.  Developing a procedure to scan anything coming in to your system is always a good practice.

6.       Ensure that you have Windows System Restore enabled. Having restore points to fall back on in an emergency is a good practice to follow.  To make sure this feature is running, go to your Control Panel, click on the System icon, the System Protection.  There you will be able to see what drive(s) have the feature enabled or disabled.

There are a variety of advanced practices to help prevent Ransomware infections on company systems and home computers.  Some of these include not having your user running as an Administrator on your computer, configuring Group Policies that prevent executable files from running (.EXE files), as well as a variety of advanced strategies that are available in corporate environments.  For a general overview of some of these practices and Cryptolocker information in general, here are some related links:
AVG Cryptolocker Video on YouTube:
https://www.youtube.com/watch?v=cYVqJ0N0FDY

Watch Cryptolocker in Action on YouTube:
https://www.youtube.com/watch?v=Gz2kmmsMpMI

Saturday, January 16, 2016

Katie's Kandy

Katie's Kandy offers a wide variety of candy, chocolate, nostalgic items, kosher items, sugar-free sweets, cards, pinatas, and more!


http://katieskandy.com/