|
|
A single click can be the difference between maintaining data security and suffering massive financial losses. From the moment just one employee takes the bait in a phishing email, your business is vulnerable to data breaches and extensive downtime.
Quickly spot the red flags and put phishing emails where they belong: 1. Poor spelling and grammar While occasional typos happen to even the best of us, an email filled with errors is a clear warning sign. Most companies push their campaigns through multiple review stages where errors are blitzed and language is refined. Unlikely errors throughout the entire message indicate that the same level of care was not taken, and therefore the message is likely fraudulent. 2. An offer too good to be true Free items or a lottery win sure sound great, but when the offer comes out of nowhere and with no catch? There’s definitely cause for concern. Take care not to get carried away and click without investigating deeper. 3. Random sender who knows too much Phishing has advanced in recent years to include ‘spear phishing’, which is an email or offer designed especially for your business. Culprits take details from your public channels, such as a recent function or award, and then use it against you. The only clues? The sender is unknown – they weren’t at the event or involved in any way. Take a moment to see if their story checks out. 4. The URL or email address is not quite right One of the most effective techniques used in phishing emails is to use domains which sound almost right. For example, [microsoft.info.com] or [pay-pal.com] Hover over the link with your mouse and review where it will take you. If it doesn’t look right, or is completely different from the link text, send that email to the bin. 5. It asks for personal, financial or business details Alarm bells should ring when a message contains a request for personal, business or financial information. If you believe there may be a genuine issue, you can initiate a check using established, trusted channels. While education is the best way to ensure phishing emails are unsuccessful, a robust spam filter and solid anti-virus system provide peace of mind that your business has the best protection available. 5 Tech Travel Tips You Can Use
Travelling soon? For most people, this also means making sure your tech is packed and ready for the adventure. Smartphones, ebook readers, tablets, laptops and smart watches are now so light and portable that you’d never think of leaving them behind, plus they can add a ton of value your experience. Here are a few tips to consider before you hit the road. 1. Backup to the cloud While you’re jet setting around, relaxing on a beach or hiking your way to freedom, your tech is always going to be exposed to a level of risk. This might range from accidentally leaving your laptop at a cafe to having it stolen from your bag, but either way the problem is the same - your data is now gone. If you’ve backed up your devices to the cloud (eg Evernote, Microsoft OneNote or Google Drive) you’ll be able to access your files easily and securely from anywhere. Hot tip: Scan or save important documents like itineraries and passports to the cloud. 2. Pack the right cables Begging random strangers for a loan of their cable isn’t much fun, so remember to bring the exact cables and chargers you’ll need. Most smartphones and tablets use universal plugs like Micro USB, USB C or Apple Lightning, so you can get away with only packing one cable. Many locations now offer powered USB ports but be sure to also pack the right charger as well, it’s a convenience you’ll appreciate. If you’re travelling overseas and the socket is different, remember to pack a plug converter, and depending on your destination, you might even find the voltage is different. It’s a good idea to check whether you also need a voltage converter before you try and charge. 3. Download offline data It’s no secret that global roaming can give nasty bill shocks. The easy access data you normally use over Wi-Fi or get included in your cell plan has us all accustomed to being connected. While travelling, you might find yourself in a location where data costs a fortune or it’s not available at all. Download any files you might need, including important documents like itineraries and bookings, so that you can access them even without a connection. 4. Update and scan Just like you’d make sure you’ve got the right vaccinations and travel gear, make sure your tech is ready to travel too. Set aside a few minutes to run updates for your operating systems and apps, as well as your anti-virus. Go one step further and run a manual anti-virus scan too. The last thing you want to deal with one your trip is a cyber attack! While you’re doing your pro-active thing, turn on password protection for all devices so that only you can unlock them. Hot tip: Use a complex password that is hard for thieves to guess. 5. Mark your territory Almost exactly the way it sounds, let everyone know this tech belongs to you. Write your cell number on portable devices in case you get separated so whoever finds it can give you a quick call and save the day. Don’t want to use permanent marker on your shiny tech? Grab some sticky labels you can peel off when you get home. You can also get little Bluetooth tracking tags to stick to your gear, so that if you ever lose something you can chase it down. Similarly, you might like to consider enabling the ‘find my feature on Apple devices. Having this feature switched on also means you can disable your device remotely, an excellent security option if it’s been stolen. Have a good and safe travel! How to Maintain Your Computer (Without Lifting a Finger!)
For a device that’s supposed to make life easier, computers sure do involve a lot of work! There’s so much to keep track of that it’s no wonder most people push ahead and forget the routine maintenance until something breaks. Of course, the problem with being reactive is the damage is already done. Photos and files get lost forever in a crash, and information gets stolen in a hack...by then it’s far too late. It’s a bit like closing the gate after the horses have already fled. This is where proactive people come out on top. Thousands upon thousands of homes around the world are using managed services to put computer problems firmly behind them. It’s a done-for-you maintenance program we offer, and here’s why it’s the best choice. You’re always up to date. It seems like every second day there’s some new and urgent update waiting to be installed. Whether they’re patching security flaws or adding new features, they seem endless. Sometimes, it goes beyond inconvenient, it gets overwhelming! Even if they do install automatically, they tend to do it at the worst possible moment, leaving you to wait up to 30 minutes when all you wanted to do was quickly check your email. Using our special managed services software, we can make sure your computer’s updates are all finished and done - before you sit down to use it. As part of our service, we also make sure all updates are compatible not just with your hardware, but also with your other software. After all, updates are supposed to make your experience more secure and more enjoyable! You’ve got super anti-virus. The best anti-virus is the one that’s up-to-date and running, yet you’d be surprised how many people switch it off or never let it update. While you might be in the habit of scanning files and browsing safely, others in your home might not have the same priorities. Having managed services ensures your anti-virus is always running and dealing with any viruses it finds. As soon as a new virus becomes known, we make sure your system is actively protected against it. We also monitor for cyber-attacks and can alert you before they become a problem. Your hardware stays healthy. While a reactive person is always suddenly stuck without a computer when hardware fails, proactive people with managed services have already had the problem fixed. Our special software monitors the health of your hardware, eg, your hard drive, looking for early warning signs of failure. If detected, we can let you know in advance. This means you’re able to get it repaired at your convenience, making sure no files are lost and no other hardware is damaged in a domino failure. You never miss a backup. The worst part of a crash or hack isn’t the financial cost, it’s losing your files forever. Many people have their entire collection of photos stored on their computer, plus important family files, most of which can never be replaced or recreated. Whether it’s a report just created, a recipe handed down for generations or a novel you’ve been working on for longer than you’d care to admit, managed services ensures your backup is working correctly. Backed up files are ready to go when you are, and losing files to corruption, failure or theft is a thing of the past. Support is a phone call away. Just got a new printer and it won’t play nice? Got a weird error popping up? Your laptop won’t talk to the wifi? Our remote support team can help with whatever technology issue has been bugging you and wasting your time. No nonsense advice is just a phone call away, and our team can remotely connect to diagnose and fix many problems. This means you can likely skip the cord shuffle and carting your computer into the shop, and still get your most pressing computer issues fixed. You’re always optimized. Whether your computer is actively playing up or not, our monitoring service can keep in touch with your event logs, services and processes and look out for anything that needs correction. This means we’re effectively stopping problems before they get to you, making sure that when you sit down to use your computer, it’s doing exactly what you want. Put computer problems behind you - get managed services today! Why 2-Factor Authentication is Important
You hear about hacks all the time. The news covers major websites who have had data leaks containing your email and password. Computers get infected and capture your login details for bank accounts and credit cards. In the worst cases, identity theft occurs because it is an easy crime to commit with a high reward. In 2018, the passwords you used to trust to keep the bad guys out of your accounts are not enough anymore. Cyber attackers now use methods such as phishing, pharming, and keylogging to steal your password. Some have the power to test billions of password combinations. If you’re like the majority of people, you use the same password for several websites. That means anybody who has figured out that password has access to everything you’ve logged into with it. In a time when it is extremely easy to look up what a person named their first pet or high school mascot, security questions aren’t much help. Consider how a jewelry store operates. They don’t simply keep their valuables locked away with one key. There are alarms ready to be triggered, motion detectors, and sometimes even bars on the windows. Your data is valuable, just like jewelry. You need more than one line of defense to protect it. In the computer world, your second line of defense (after your username and password combination) is called “2-factor authentication.” Sometimes referred to as multiple-step or multi-factor verification, 2-factor authentication is a way to double check a person’s identity. This can be enabled every time a person logs in or just under certain circumstances. For example, signing in from a new device or different country might trigger 2-factor authentication. Many of the services you may already use, such as Facebook, Gmail, Xero Accounting, and more, have 2-factor authentication options. If your bank has ever sent you a special code through text or email to enter before logging in, you’ve already used a type of 2-factor authentication. They can also be in the form of a smartphone app or a physical electronic dongle. 2-factor authentication is absolutely crucial for online banking, email, and online shopping such as Amazon or PayPal. It’s also a must-have for cloud storage accounts (like Dropbox or Sync), password managers, communications apps, and productivity apps. This is especially true if you frequently use the same passwords for different websites and apps. Some may consider 2-factor authentication unnecessary for social networks, but these are actually very important to keep safe. For ease, a lot of websites and apps allow you to sign up through your Facebook or Twitter account. You need to keep these networks safe so that somebody with your password can’t suddenly get into every account you have linked. The point of using 2-factor authentication is to make hackers’ lives harder and prevent them from getting into your accounts. If they have captured your login username and password, they still need a second device to get in, especially when the computer or phone they are using has never logged into your account before. This makes it significantly more difficult for anybody to breach your account. Plus, if you receive a notification with a special code to enter for logging in, and you weren’t trying to log into that account, you have a good signal that somebody else was trying to get in. That means it’s time to change that password and be grateful you had 2-factor authentication. It’s unfortunate that there is currently an abundance of skilled hackers ready to take advantage of those unprepared. Luckily, you can still stop them -even if they have your login information at hand. 2-factor authentication is one of the easiest methods to keep your accounts safe. How to Tell if You've Gotten Hacked Being hacked is the single biggest fear of most computer users. Many believe the first sign of strange behavior or errors on their PC is a sign hackers have taken control. But are hackers really inside your machine, stealing your information? Or should we be on the lookout for more subtle signs? What does being hacked really look like? There is an important distinction to make between being hacked by a person and being infected with a virus or malware. Virus software and malware are automated processes designed to damage your system, steal your data, or both. There are of course ways that we can defeat these processes, but what if we are instead hacked by an individual? Logins not working One of the first steps a hacker might take would be to change the computers passwords. By doing so, not only do they ensure future access to the account, they prevent you from accessing the system to stop them. For the hacker, this is a crucial step that keeps them in control. With this in mind, we always want to make sure to keep on top of our own login details and how often we change them. Security Emails or SMS’s from online services Many services track which device and location you logged into your account from last. If your account is accessed from a new device or a different country it might trigger an automated email or SMS to ask if this new login is your own. If you have logged in using a new computer, tablet, or phone; an email that asks "hey, is this you?" need not be cause for alarm. If you haven't, it may be time to investigate further. This service is an important part of information security. It may be a key first step to identify someone else gaining access to your account. Bank accounts missing money or strange transactions Most commonly today, hackers commit crimes to steal money. The end goal for hackers is typically to profit from their crimes by taking money from people online. It always pays to keep a regular eye on your financial transactions to make sure you know what money is coming and going from your account. You may see a large sum missing where hackers have attempted to take as much as they can in a single transaction. Alternatively small, hard to notice transactions may appear. These often account for small purchases where attackers have tested the details they have to make sure they work. Sudden loss of cellular connectivity Network interruption is a symptom that few people expect but occurs commonly when hackers attack. Many banks and online services use a security feature known as Two-factor authentication. To do this they send a short code to your phone or app when you log in. Two-factor authentication is ideal in most cases and a great boost to security. Hackers can try to work around this by calling your mobile service provider to report your phone as lost or stolen. During this call, they will request your phone number be transferred to a new sim card that they control. When your bank sends its regular two-factor authentication code to the number registered, it goes instead to the hacker who may be able to log in. From your perspective phone service will simply stop working. Keeping vigilant and maintaining security These are only some of the modern techniques that hackers can try to use to gain access to your accounts. It pays to be extra vigilant and pay close attention to the signs and signals that indicate you may have been hacked. If you suspect that you might have been hacked give us a call 218-240-8802. Is Your Laptop Running Hot and Loud?
Laptop computers commonly heat up a little in normal operation. Electronic components, including large capacity batteries, become warm in use. Your laptop should never become too hot to handle though. When a laptop turns hot to the touch or starts to sound like a jet engine, it's likely beginning to overheat. Modern laptops use nearly silent fans to cool components and keep the system is comfortable and safe to use. In some cases, the sound the computer makes is the best tool you have to diagnose its running condition. Excessive heat causes the fans to work harder and faster to compensate. This jet engine sound is one of the first clues you have to indicate all may not be well. Why So Hot Because of their compact size and portability, laptop computers are particularly prone to overheating problems. Their tiny footprint puts electronic parts closer together, creates less room for cooling vents and adds a heat generating battery which introduces more hot air into the system. Most laptops have small fans that suck in cool air, passing it over metal fins to exchange heat from the case. The resulting hot air exhaust is expelled through vents back into the room. This process prevents heat building up inside the machine. The constant air cycle keeps the laptop running cool no matter the workload placed on it. This process can be interrupted by any number of factors during operation. Alongside cool air, computer fans can also suck in dust, stray hairs, even cigarette smoke too. Smoke in particular contains thick tar which coats the fins, fan blades, and internal components. Foreign debris inside the machine prevents components from working at their best. Tar, dust, and hair slows down the internal fan and coats the heat generating components and cooling fins. This coating prevents air exchange and keeping components warm as if they were under a blanket. Causes of overheating Sometimes the way a laptop is used can cause it to overheat too. Resting a laptop on thick carpets, blankets, or soft furnishings can block vents, preventing the fans from sucking cold air in or blowing hot air out. Leaving the machine running on carpet or furnishings, particularly for extended periods of time, can cause overheating issues and introduce extra dust into the components too. The best place to rest a laptop while in use is on a hard surface such as a desk, table, or a cooling pad. This allows air free access to the vents and helps prevent dust and hairs getting inside the machine. Overheating Results As the computer starts running hotter for longer, its fan will attempt to compensate by running faster and more often. This results in the "jet engine" noise many users report when their computer is struggling to keep up. Unfortunately, once dust, hair, or tar has already found its way into the machine it is notoriously difficult to clean out. The only way to reset the machine to run cool and quiet is to disassemble the base and clean out its components. Much like a car engine, computer components have a designed temperature range in which they can safely and reliably operate without any issues. Extended periods of running above the temperature they are designed for can cause damage, sudden failures, and drastically shorten the designed lifespan of the computer. Unlikely Causes Often times seemingly random blue screen computer crashes can be traced back to components that have been overheating inside the computer. As heat builds up, vulnerable components start to fail, sometimes temporarily, in the hotter temperatures. By the time the computer is rebooted and cooled down the issue is seemingly resolved. Back in operation, the computer heats up once more and eventually crashes again. These irregular crashes are highly inconvenient and can sometimes cause data loss too. However, these symptoms are minor compared to a complete write-off of the machine. For some users, the first sign that their machine is too hot to run safely is when the motherboard is burnt out or their data storage has been irreparably lost. If you think a cooling pad will be a good solution for you, consider getting one from our online store. Keeping Tabs on Children's App Purchases
Children today have grown up surrounded by technology their entire lives. Since before they are old enough to read they can pick up a tablet or smartphone and swipe at apps and games with ease. Modern kids have an intuitive understanding and ability with technology that older generations can barely imagine. The abundance of technology, however, comes with a price. Easy access to any marketplace can be a double-edged sword. The convenience and ease of use is a boost to those of us needing a quick app, but accidental purchases can cause a lot of headaches. One-click online shopping was once one of the biggest dangers our bank account faced. Now, many of us carry multiple devices, each with their own marketplace and app stores. With modern tech, mobile applications, whether on iOS or Android devices, are easier than ever to buy and download. So simple in fact, that a child could do it. Designed to Appeal - Children love to download mobile applications that feature their favorite characters, cartoons and TV shows. Advertisements are aimed specifically for children in ways that will invite them to click a link and instantly download a game. These games are typically free, meaning they don't require authentication by default before downloading. A new game can be downloaded, installed, and ready to run seconds from clicking an ad. Developers commonly use, what is known in the business as, a 'freemium' model. This means that the game is free to download and start, but inserts paid 'upgrades' designed to make the player part with cash. Freemium Games - Upgrades to games may unlock more levels, purchase an in-game currency, or outfit a character with special attributes. Competitive online games commonly employ a strategy that gives paying players an unfair advantage over ones who don't pay. This is often referred to as 'pay-to-win' and entices players to spend more to get on the same level. Many mobile-based games are designed purely to encourage in-app purchasing. Some deliberately design a deceptive or tricky user-interface that makes it easy to miss-click or make purchases by accident. There are regular stories in the news featuring kids spending thousands on in-app purchases for virtual characters. In some cases, children can use real-world money to buy items thinking they are spending in-game currency. Apps to Help - Of course, it's unfair to give all applications a lousy name. Many deserve it, but not all apps are guilty of behaving badly. There are fitness apps, productivity apps, and educational apps that can act as useful tools to help enhance your day. Children can get a lot from high-quality applications in the same way educational software for the computer can be a huge classroom boost. Getting the most out of your phone or tablet is about keeping your device safe against applications designed merely to take your money. Secure Your Device - The best step you can take to prevent running up enormous app bills is to disable in-app purchases on your devices. This prevents apps from being able to take funds for digital items. The process to do this is simple, takes less than 2 minutes, and can save you huge amounts.
Safe Apps - With these options enabled, whether using an iOS or Android device, your phone or tablet is safe from app purchases in any hands. |
Articles
Pro+TipsWe aim to provide helpful and easy to understand tech articles. |