fbpx

What to do After a Power Outage

Power outages causing issues with your internet or TV service? While there’s not always much we can do to avoid it, we can walk you through some tips to try and get things back up and running. You can also give us a call anytime- we’re here to help!

Our first advice is always to reboot- reboot- reboot! Which means unplugging from power and then plugging back in. If your internet isn’t working, reboot your router. If TV is the issue, reboot your TV boxes or Firestick (or other streaming device).

If that doesn’t do the trick, you can then remove the battery backup from your power supply, which is usually found in your utility room or where the Dakota Central equipment comes in your home. Here is a quick video tutorial on how to do that!

E-mail Account Best Practices

As with many things new, it takes some time to adjust! With our recently updated e-mail accounts, we wanted to share some best practices, tips and tricks for your daktel.com e-mail.

eScout Quarantine Digest- the message you are probably receiving daily or weekly from eScout is another word for your Spam Quarantine Summary you had receive previously. This shows all the messages that have been delivered to your spam filter instead of your inbox. Unless you need to find a specific message in your spam filter, you can disregard this message. To adjust your protection level, click on the subject of one of the messages in the summary to visit eScout, or go to “e-scout.daktel.com,” then click on “Settings” on the left menu. There are two sections that show up in the digest also shows the delivered messages, the “Suspected Spam” is your actual spam, and the “Delivered Messages” section shows messages that were sent through to your inbox. We understand this can be confusing, but hopefully it’s starting to make a little more sense!

Speaking of spam filtering, if you are getting promotional emails in your actual inbox, you might want to unsubscribe to help clean up your inbox.

Another thing you can do you ensure your account is secure is to make sure you have a strong password.

Tips for Creating a Secure Password:

  • Longer = Stronger.
  • Use a random sequence of words and/or letters.
  • Add numbers to the base word to make it more secure.
  • Use punctuation and symbols to complicate it further.
  • Create complexity with upper and lowercase letters.
  • Generate similar but altered passwords for each account, using similar base words.

If all else fails, please call our helpdesk at 652-3184 or 952-1000

Tech Tips: Internet Security FAQs, Answered

Explaining Endpoint Security

In today’s digital age, where organizations rely heavily on technology and remote work has become the norm, protecting your data and network has never been more crucial. Endpoint security is a vital component of any comprehensive cybersecurity strategy. Let’s dig into what endpoint security is and why it’s so important for safeguarding your business.

First Things First, What is "Endpoint Security"?

Endpoint security, also known as endpoint protection, refers to the practice of securing individual devices, or “endpoints,” within a network. These endpoints can include computers, laptops, smartphones, tablets, and other devices that connect to your network. Endpoint security focuses on protecting these devices from a wide range of threats, including malware, ransomware, phishing attacks, and data breaches.

Key Components of Endpoint Security Include: 

Antivirus and Antimalware Software: This software is designed to detect and remove malicious software, such as viruses, Trojans, and spyware, that could infect endpoints. 

Firewalls: Firewalls help filter incoming and outgoing network traffic to prevent unauthorized access and protect against cyber threats.

Encryption: Encryption secures data on endpoints and during transmission, ensuring that even if a device is lost or stolen, the data remains inaccessible to unauthorized individuals.

Patch Management: Keeping software and operating systems up to date is critical to closing vulnerabilities that cybercriminals may exploit.

Endpoint Detection and Response (EDR): EDR solutions monitor endpoints for suspicious activities, providing real-time threat detection and response capabilities.

Why is Endpoint Security Important?

Endpoint security is vital for several reasons: 

Protection Against Evolving Treats: Cyber threats are constantly evolving. Malware and cyberattacks become more sophisticated with each passing day. Endpoint security helps detect and thwart these evolving threats, safeguarding your network and data. 

Data Security: Endpoints often store sensitive and confidential data. Without proper security measures, this data is at risk of being stolen or compromised. Endpoint security ensures that your data remains safe and protected. 

Remote Work Security: In the era of remote work, employees access company networks from various devices and locations. Endpoint security is essential to maintain a secure connection and protect corporate assets. 

Compliance and Regulatory Requirements: Many industries have strict compliance requirements regarding data protection. Endpoint security helps organizations meet these standards, avoiding costly penalties and reputation damage. 

Business Continuity: A successful cyberattack can disrupt your business operations, leading to financial losses and reputational damage. Endpoint security minimizes this risk and ensures business continuity.

Cost Savings: Investing in endpoint security is cost-effective in the long run. Preventing a security breach is often much more cost-effective than dealing with the aftermath of an attack, which can involve legal fees, fines, and reputation repair.

Endpoint security is a critical element of modern cybersecurity strategies. It safeguards individual devices, protecting against a wide range of threats and ensuring the security of your data and network. Given the ever-evolving threat landscape, the importance of robust endpoint security measures cannot be overstated. By implementing strong endpoint security practices, your organization can reduce the risk of data breaches, financial losses, and reputational damage, providing peace of mind and maintaining business continuity in an increasingly digital world. If you’re interested in learning how endpoint security can specifically benefit your business, contact us at 701-952-1000!

Let’s work together to make sure your business has the protection it needs from threats!

How to Reboot your Amazon Firestick

Rebooting your Amazon Firestick can be beneficial in several situations. Firstly, if your device starts to feel sluggish or unresponsive, a reboot can refresh its performance and resolve minor glitches, allowing it to run smoother and faster. Additionally, after installing or updating apps, a reboot ensures that all changes take effect properly. Furthermore, if you encounter connectivity issues with your Wi-Fi network or experience buffering problems during streaming, restarting your Firestick can help reestablish a stable connection. In general, performing a reboot every now and then, especially if you notice any performance issues or connectivity issues, can help maintain the optimal functionality of your Amazon Firestick and enhance your overall viewing experience.

Follow the directions below to reboot your Amazon Firestick.

Click Settings on the far right of the home screen.


Find and click on My Fire TV.


Scroll down and click Restart.


Click Restart again.


A ‘Powering off’ message will appear on the screen and your Amazon Firestick will reboot. If the troubles leading up to the reboot are still occurring, try clearing the cache on your Amazon Firestick, next!

How to Clear the Cache on your Amazon Firestick

If you seem to have continual issues with a certain app on your Amazon Fire TV Stick, it could be caused by a large build-up of cache.

First of all, what is cache? Alost all apps create a cache, which is saved on your device storage. The cache is created when the app is running and in theory is supposed to be temporary and delete itself when the app is closed, but is not always the case. If cache files continue to accumulate they can get to be very large, which can cause issues with your device. However, don’t worry, there is an easy remedy!

If a specific app seems sluggish, buffers frequently, crashes intermittently, it could use a good old clean-up. Follow the steps below to clear the cache on your Amazon Fire Stick:

  • From the Fire TV menu, select Settings.
  • Go to Applications.
  • In Manage Installed Applications, select the app causing issues.

  • Select Clear Cache.

Repeat steps for any other apps that may have issues. After clearing the cache on an app be warned that it may take a little longer to load the first time opening, but once it’s loaded up it should be smooth streaming!

Phishing 101 – Everything You Need to Know About Those Suspicious Emails

Phishing emails are fraudulent emails that are designed to trick recipients into sharing sensitive information, such as login credentials, financial data, or personal details. These emails often look like they come from a legitimate source, such as a bank or a social media platform, but they are sent by cybercriminals with the goal of stealing personal information or money.

Phishing emails often use social engineering tactics to persuade recipients to act, such as clicking on a link, downloading an attachment, or providing personal information. They may create a sense of urgency or use a threatening tone to convince the recipient to act quickly. They may include links to fake websites or attachments that contain malicious software. These emails can be very convincing and sophisticated, so it’s important to be vigilant and take steps to protect yourself from them.

To avoid falling victim to phishing emails, it’s important to be cautious when opening emails from unknown senders or emails that seem suspicious. Look for red flags such as poor grammar, spelling errors, and unusual requests. Don’t click on links or download attachments from unknown sources and be wary of emails that ask you to provide personal information. Always verify the authenticity of an email by checking the sender’s email address, hovering over any links to see the destination URL, and contacting the organization directly through a trusted channel, such as their official website or customer service phone number.

In the case that you do open a malicious email and click the links, it is important to change all passwords and monitor your accounts for strange activity. When changing your password, we recommend using at least 16 characters with upper/lower case letters and at least one symbol. An easier way to come up with a password that is long enough is by using a sentence instead of a single word. By using a passphrase instead of a password, not only will it be easier for you to remember, but it will also be more difficult for someone to hack into your account. If you notice that money has been taken from an account, it is also important to contact your bank immediately. When the bank is notified of fraudulent activity within 24 hours, you are more likely to get your money back. These emails can be worrisome, but remember, when in doubt about suspicious email, the delete button is your best friend!

To avoid falling victim to phishing emails, it’s important to:

– Be wary of emails that ask you to provide personal or sensitive information.

– Verify the authenticity of the email by checking the sender’s address, looking for spelling or grammatical errors, and examining any links or attachments carefully.

– Never click on links or download attachments from emails unless you are absolutely sure they are legitimate.

– Use a reputable antivirus program and keep it up to date.

– Use a unique, strong password for each of your accounts. We recommend using a passphrase instead of a password.

– Enable two-factor authentication wherever possible.

– Educate yourself and your family members about the risks of phishing scams and how to avoid them.

Below is the PowerPoint presentation from our Phishing 101 community class we held earlier this year. Keep an eye out for more classes coming up!

Phishing-101-final

Wi-Fi App How-To Videos

Did you know there’s an app for your Wi-Fi? There are many benefits to using the CommandIQ app, so let’s get your app set up!

Now that you’re all set up, here’s a quick overview of the app and the main dashboard!

TV App Virtual Demo

Let’s take a virtual tour of the Dakota Central TV app! This 2-minute video highlights the features and benefits of the Dakota Central TV app- available to stream on Amazon, Apple and Android devices!

Campground Wi-Fi

Wi-Fi is available at Spiritwood Lake, Pelican Point and Smokey’s Landing! Here’s how to connect:

· In your Wi-Fi settings, find the network “Campground_Wifi” at Pelican Point or Smokey’s Landing, or “Spiritwood_Lake_Campground” at Spiritwood Lake.

· Choose the network, and this page will pop-up in your web browser:

· If you choose “Free Access” you will have access to Wi-Fi for 15 minutes.

· Once the 15 minutes have expired you will need to subscribe to a plan in order to continue using Wi-Fi.

· To subscribe, click “Sign Up” under Subscribe Now! and choose your plan.

If you have issues connecting, call 952-1000 and we’ll be happy to help!