ATTENTION: Please read the Spike of Phishing During This Pandemic posted in this page.

 
Newsletters
Inside YCS

Inside YCS newsletters are available online for everybody to download.

Inside YCS Vol. 1.
Inside YCS Vol. 2.
Inside YCS Vol. 3.
Inside YCS Vol. 4.


Newsletter Submission Form.

NOTE: You need to sign-in using your email credentials when you reach the Newletter Submission Form.


Internal Ads

Help Wanted

Looking for a change? Browse the latest openings here.


IT Corner
  YCS Goes Office 365

  Error: Punch Rejected! No location data. in Internet Explorer 9/10

This error occurs when you punch-in/out to a device where the location is not registered in the system, or you are punching using a desktop computer where location is not accurate enough for geofencing.

Geofencing accuracy is inconsistent on most desktop computers, and added to this issue is each Internet browser has different policies and method for acquiring geofencing data. We tested several Internet browsers and we found Microsoft Edge and Google Chrome to work perfectly with UKG geofencing.

Therefore, if you are experiencing problems with our new Time Keeping apps, please try Microsoft Edge browser to punch-in/out. Microsoft Edge is automatically installed and the default browser in Windows 10 operating system. If the desktop you are using to clock-in/out doesn’t have Microsoft Edge or Google Chrome installed, please call Helpdesk and we are happy to help you.

*Geofencing (or virtual boundary) is a location-based service that triggers an action when a device enters or exit a virtual boundary set up around a geographical location.

  Spike of Phishing During This Pandemic

Our fears are “business opportunities” to some, and so we see the rise of cyber-attacks all over the world, and YCS systems and network are no exemption. In fact, cyber-attacks have almost doubled in the months of February and March this year. Cyber criminals are exploiting the current pandemic, and use it as emotional bait in sending phishing emails.

Most of these phishing emails have Microsoft Word or PDF attachments laced with malware that present fictitious safety measures or infection maps about COVID-19, or hyperlinks to donation page to help victims of corona virus asking you to donate money in a form of bitcoin. Other malicious emails entice you to download and install apps which gather personal information about you when you use these trojan horse programs.

Cyber criminals don’t limit themselves to phishing. Some of these criminals bought domain names, the reason why there are hundreds of potentially shady websites that suddenly popped up on the Internet that claim to offer discounted face masks, and other virus-protection related gears. Beware, there is no guarantee that some of these products even exist.

With public concerns around COVID-19 are growing, there will be scam attempts referencing the corona virus. Thus, we encourage you to be extra cautious despite the SPAM filtering device we put in place that block unwanted emails going unto our mail servers. Here are some friendly suggestions on how to protect yourself from these malicious emails and fraudulent websites:

Against Malicious Emails:

  • Make sure you know the sender of an email.
  • Do not click the links of an email or open any attachments unless you are absolutely sure the email is authentic.
  • Should you really feel to open a link, place your mouse pointer over the link to see if it is actually sending you to the right website.
  • Be extra cautious if the email tone is urgent.

Against Malicious Websites:

  • Make sure URLs are spelled correctly.
  • Directly type the URL in the search bar instead of clicking a provided link.
  • When shopping on the Internet, check to see if the website address starts with HTTPS or there is a padlock icon.
  • Never use unsecured public WIFI when shopping or doing banking online.

--YCS IT Team

What is Phishing?

Phishing is a criminal act of stealing identity with the use of illegitimate website.  This authentic-looking website hosted by the spammer will ask for PIN, credit card or social security number.

As an example, a spammer will send out an email with a heading, “Western Union: Locked Account Notice”. This email will be sent by the spammer to millions of email addresses he/she harvested or bought from email harvester. This email will then direct the intended victims to a phishing website and ask them to input their social security or credit card number.

WHAT TO DO: 
  • Enable Phishing Filter and Pop-up Blocker in your Internet Browser. All YCS computers are set up to have this feature enabled, and just in case it is not, do the following on IE 7: Open the Tools menu, go to Phishing Filter, and then choose Turn On Automatic Website Checking .
  • Do not give out your credit card or bank account number unless you are very sure of the website's identity. A legitimate website that solicits confidential information has an issued digital certificate from major certificate authority. Once you are re-directed to a secured site, the URL will change from HTTP to HTTPS.  The letter S indicates a security protocol that provides encryption and proper server identification  through the use of digital certificate.
  • Do not send or post your email address to blogs, forums, newsgroups or chat. Spammers use special programs to harvest email addresses from websites and Usernet postings. (and there are also websites that collect email addresses and sell them) If you really need to post your email address for whatever reason, use Yahoo, MSN, Hotmail, Gmail or other free email services.

  • Use BCC (blind carbon copy) instead of CC when forwarding email outside of YCS. There is a great deal of chance that email addresses of people you CCed  in your email will end up in the spammers' list if you are forwarding emails outside of YCS. Most email users have the tendency of not deleting email thread(s) when sending out their emails whereby exposing all email addresses you CCed.

  • If you receive a too-good-to-be-true email, it is most likely a spam.  Discard it! The notoriety of 419 Fraud, a.k.a. Nigerian Scam is all over the Internet and on TV yet many people succumbed to this kind of fraud. Please verify the sender’s intent or story, on http://www.snopes.com/fraud/topscams.asp
Happy and safe computing to everyone,
YCS IT Team
Download Microsoft Office 2010 (64-Bit) here.
Download Microsoft Office 2010 (32-bit) here.
Download Teamviewer here.
Download Temporary File Cleaner here.