TICs y Formación http://ift.tt/1b3eM1L Via Alfredo Vela y www.bscformacion.com
28 herramientas gratuitas para Instagram #infografia #infographic #socialmedia
TICs y Formación http://ift.tt/1b3eM1L Via Alfredo Vela y www.bscformacion.com
Cómo cuidar a tus clientes con Redes Sociales #infografia #infographic #marketing #socialmedia
TICs y Formación http://ift.tt/1fILo05 Via Alfredo Vela y www.bscformacion.com
Radiografía de las gafas de Google #infografia #infographic
TICs y Formación http://ift.tt/1erwcG0 Via Alfredo Vela y www.bscformacion.com
Gadgets para regalar en San Valentin #infografia #infographic #tech
TICs y Formación http://ift.tt/LzWGZ4 Via Alfredo Vela y www.bscformacion.com
Jansport Still Wowing Customers, Fixing Broken Backpacks
Over a year ago, we shared with you a tale of consumer joy from a Jansport backpack owner who sent his bag to the company in a pizza box and got his worn-out backpack replaced with an even nicer one. They’re not all about swapping old backpacks for new ones over in Jansportland, though. Sometimes, all you need is a replacement zipper.
Reader Rishi was surprised to learn of the company’s lifetime warranty, and even more surprised when his bag came back to him in what seemed like no time at all. He was a longtime Jansport customer, and checked the company’s site to find out whether they offered warranty repairs. He copied us on his e-mail of effusive praise to Jansport.
“I was ready to buy a new bag when I thought to check your website about possible warranty service. I was surprised to see your lifetime warranty policy so I decided to fill out the form and mail my bag in,” he wrote. Surely no company really means a lifetime warranty today, though. Do they?
Here’s the timeline of Rishi’s bag’s travels:
January 16: Mailed backpack.
January 18: Backpack is scheduled to arrive at the repair facility.
January 20: Federal holiday. No mail.
January 21: Jansport lets Rishi know that the bag has arrived in their facility for repair.
Sounds reasonable. Only when Rishi got home from work on the 21st, the bag was sitting at the door, freshly re-zippered and ready for use. “I can only guess that you guys fixed it and shipped it back on the same day you received it,” he wrote to Jansport. “And for that, a very sincere thank you!”
by Laura Northrup via Consumerist
Los escándalos de FaceBook #infografia #infographic #socialmedia
TICs y Formación http://ift.tt/1brXYfB Via Alfredo Vela y www.bscformacion.com
Impacto del smartphone en la empresa española #infografia #infographic #internet
TICs y Formación http://ift.tt/1auJIYr Via Alfredo Vela y www.bscformacion.com
Cómo fueron los 10 primeros años de FaceBook #infografia #infographic #socialmedia
TICs y Formación http://ift.tt/1kVxB7V Via Alfredo Vela y www.bscformacion.com
Credentials Used For Target Hack Reportedly Stolen From HVAC Vendor
Okay, so the hackers didn’t actually go through the ventilation system, but tell us this isn’t the first thing you thought of.
When it was first revealed that the hackers who compromised Target’s in-store payment processing system had used stolen vendor credentials to breach the retailer’s network, many probably assumed that the vendor was some sort of IT or security consultant. But a new report from cybersecurity expert and journalist Brian Krebs says it appears that the entry point into the system was through a refrigeration, heating and cooling company in Pennsylvania.
So in a way, it’s just like all those action movie and video game cliches where people bypass complicated alarm systems through ridiculously large ventilation ducts…
Anyway, Krebs’s sources say that the attackers first slimed their way into Target’s system on Nov. 15 using network credentials stolen from the Mechanicsburg, PA, HVAC contractor that had been hired to work on numerous Target stores.
The president of the company confirmed to Krebs that his business had recently been visited by the Secret Service, which is in the process of investigating the massive breach, but couldn’t give any further details as he was not there at the time.
So how and why would an HVAC vendor have unfettered access to Target’s network?
The retailer isn’t saying, but Krebs has a theory. A source at another large retailer explains that many retail chains try to save on electric and gas bills by routinely monitoring stores’ energy consumption and temperatures. Thus, any outside vendor involved in this monitoring would need remote access, not just for the purpose of checking the data, but also for patching and updating the monitoring software.
Once the hackers were into the system, they tested their malware by uploading it to a handful of cash registers between Nov. 15 and Thanksgiving. Apparently happy with their results, they then unleashed the malware on the majority of the payment system in a matter of two days.
For more details on the hack, including info on how the attackers collected and stored stolen data on hijacked computers at unwitting businesses, check out the full story on KrebsOnSecurity.com.
by Chris Morran via Consumerist
Redes Sociales: 2013 frente a 2010 #infografia #infographic #socialmedia
TICs y Formación http://ift.tt/N4sPcR Via Alfredo Vela y www.bscformacion.com