LetMeIn101: How the Bad Guys Get Your Passwords – Passwords are essential to your cybersafety. You know it, but if you’re like the rest of the digital society, you probably have dozens of passwords to remember. It’s a lot. So, you might take shortcuts. Taking advantage of your laissez-faire attitude is one way bad guys access your passwords.
Incredibly, there are still people out there using “password” or “123456” in their access credentials. Some people don’t change the default passwords on their devices. So, anyone can pick up a router, look at the sticker identifying the password, and access that network.
Tip: Avoid the obvious passwords! When you have to create a password, make an effort. When it’s time to update a password, do so. Steer clear of simple, easily guessed patterns.
Cybercriminals can also guess your password. With a little bit of research about you online, they can make some informed guesses. Common passwords include pet names, birthdays, and anniversaries. These are all easy to find via your social media accounts.
Tip: Be careful what you share on social media! Don’t befriend strangers, as you are giving them access to a goldmine of info for personalizing an attack on you.
If that doesn’t work, criminals may try brute force. They might script an automation bot to run thousands of password permutations until they get a hit. The software will try a long list of common passwords and run through dictionary words to gain access.
Tip: Use a complex password with numbers, letters, and symbols or a passphrase. A passphrase is typically at least 19 characters long but is more memorable, as it unique to you.
The criminal may also be working with info from a data breach. In early 2019, a security researcher found more than 2.7 billion email/password pairs available on the Dark Web. Criminals accessing that database could use the data as a starting point, as many people duplicate their passwords across accounts.
Tip: Use a unique password for each site. Yes, that’s overwhelming to remember, and that’s also why you should use a password manager to keep track of it all for you.
Criminals can also access your account if you’ve used a hacked public computer. The bad guys may have installed a key logger on the computer. The logger records every key you press on the keyboard. Or they might have compromised a router or server to be able to see your information.
Tip: Be cautious about your online activity on computers or networks you don’t trust.
Of course, there’s one more method of getting your password that we haven’t addressed yet. It’s the familiar phishing attack. For instance, you get an email that looks like it was sent by your bank. Phishing typically has an urgent message and a link that directs you to what looks like a credible page.
Tip: Pay attention to who is sending the email and hover the mouse over the link to see where it goes. If you are concerned about your bank account, for example, open up a browser and type the URL manually rather than clicking the link.
These tips can help you to protect your valuable passwords. Still, setting up a password manager and amping up your internet security can help too. Need support getting ahead of the cybercriminals?
Check out these additional helpful articles: How Do Hackers Get Passwords? – Click Here
Avoiding and Reporting Scams – Click Here
10 Signs of a Phishing Email | How to Identify Phishing Attacks – Click Here
Contact our experts today! Call us at (651) 456-8655 or visit our Contact page.
Stay Safe Shopping Online This Holiday Season (11/29/21) – Retail research tells us that over 75% of people are shopping online each month, and, with the holiday season upon us, you’re likely to be one of them. But don’t let the appeal of convenience distract you from the need to stay safe when shopping online.
The number of digital buyers is steadily climbing. In 2020, according to Statista, more than two billion people purchased goods or services online. During the same year, e-retail sales surpassed $4.2 trillion U.S. dollars worldwide.
Retailers are embracing the change in consumer behavior. But, do you know who else is taking advantage? Cybercrooks. Before you buy, consider these strategies to stay safe.
#1 Question that great deal
If a deal looks “too good to be true,” it probably is. You’re not going to get a new Apple laptop for $29.99, or the latest Beats headphones or Xbox gaming console for under $20. Anyone offering you that price is trying to lure you to their site to enter your payment details, so don’t be surprised when your product never arrives!
#2 Review safe seller feedback
While scrolling social media you see adverts for perfect gifts for someone on your list. And it’s so easy to click the link and buy! Still, before purchasing, take the time to research the seller.
Read the feedback from other buyers on independent sources. It adds only a few moments to check sites such as Trustpilot and Google My Business.
#3 Research the business domain
Think about it: who are you more likely to trust with your sensitive data? Someone who has been in business 10 years or someone who set up shop 10 days ago? Quickly check how long a business website has been around. Enter the URL into the Internet Corporation for Assigned Names and Numbers’ lookup tool [https://lookup.icann.org].
#4 Watch out for email scams
Before clicking on any offer links in emails, check the URL. You can hover over the link before actually redirecting there and check the target. Double-check that the address is to the site you’re expecting.
Also, slow down and be sure that the address doesn’t have any typos or atypical endings. You don’t want to confuse www.nike.com with www.n1ke.co and end up a victim of identity theft instead of the proud owner of the latest Air Max.
#5 Check safe payment site security
There are several ways to verify the security of a payment site. These include:
verifying that the site uses an SSL certificate – it will start with “https” instead of “http”;
checking for a physical address and phone number – call the contact number to confirm it is not fake;
reviewing the Terms and Conditions and Return and Privacy policies – any reputable brand has these!
#6 Pay with Online Payments
When you do decide to buy, prefer to pay using PayPal or another online payment tool. You won’t be giving the seller your credit card details. If you can’t take this approach, use a credit card from a credit account rather than debit. You will have more protection this way. You can start a chargeback through your credit card company when the item isn’t as advertised and the seller’s customer service doesn’t help.
Before online shopping, at any time of the year, update your operating system, and keep your anti-virus software current, too.
The New PC Tune-Up – 11/29/21. How exciting! You got a new computer for Christmas. It’s sleek, shiny, and so much faster than what you had before. That’s great, but it doesn’t mean you should leave it untouched. This article shares several steps you might take to secure your data and keep that new device in tip-top shape.
First things first. Before even logging into personal email or other top sites, you’ll want to update the operating system (OS). Yes, most computers come out of the box with Windows, but you can’t know when that item was boxed. There could be important updates that you don’t want to miss.
You’ll also want to install the latest drivers during your tune-up. Different hardware on your computer can need specialized drivers from the manufacturer. Gamers, for instance, may want to ensure they download the latest to boost performance.
While you’re doing all this uploading and upgrading, also look to remove junk that may have come on the computer. It’s no longer as common, but manufacturers can reduce cost to the consumer by pre-installing software.
You might not have any need for the tools that come already installed. Meanwhile, they slow down your computer. Remove the clutter to improve your computer’s processing. Head to your PC’s Control Panel and look to uninstall programs and utilities that you don’t want. Be careful, though. Just because you don’t know what it is doesn’t mean it’s not serving a valuable purpose.
Starting out on a new computer is also a great time to set up the free software. For many of us this includes:
Google Chrome – the internet browser;
Skype – for instant messaging, voice and video calling;
VLC – a multimedia player;
FoxIt Reader – to create, edit, sign, and secure PDFs;
7Zip – used for archiving files.
Involving an IT expert for Your Tune-Up
If you had a great sales experience, you may not want to seek IT help with your new computer. Still, it can prove useful.
Your new computer may also need BIOS updates during your tune-up. Again, the hardware was current when your computer was boxed up but may be lacking the latest by the time it gets to you. A note of caution: this is not an update to do alone. BIOS updates don’t add new features, security patches, or performance improvements, but they may fix a bug with a piece of hardware or add support for your central processing unit (CPU). These updates can be risky if done incorrectly, so work with an IT tech.
Talk also with an IT tech about the best data backup plan for your needs. You’ll be creating important documents, downloading sensitive data, and uploading valued images. Don’t risk their security by failing to back up.
IT support will also suggest the best security tool for you to use to protect against malware. With so many free and fee-based third-party alternatives to Windows Defender, you may want help deciding on the best one.
We’re here to help you get the most out of your new computer. Or, if you’re not sure yet which one to buy, we can consult with you on that, too. Contact us today at (651) 456-8655 or visit our Contact page!
How to Choose Home Computer Repair (11/10/21). It’s upsetting when a home computer breaks down: “My whole life is on there!” Then, you have to trust someone to take care of your device. It’s a lot to ask, and that’s why we’re sharing these five tips to help you feel better about your choice of repair person.
#1 Avoid the Big Brands
The big-box stores have name recognition, which may make you feel more secure, but the reason they advertise on TV and have big storefronts is to sell stuff. Their people are salespeople first, and their staff are not going to be as experienced with computer and device repair.
For tricky jobs, the big-box stores send your device to a remote, centralized location. That’s where the experienced staff are, so it’s good in that way. Yet you’ll now have to wait for your computer to ship to and from that location, which can mean a couple of weeks when you don’t know where your computer is or who is working on it.
#2 Consult Customer Reviews
You’ll probably start out by asking family, friends, and co-workers to suggest someone they’ve worked within the past. When you’re looking around for computer repair, read online reviews. Customer reviews can help you gauge whether you can trust the service promises. Feel free to check out our Google reviews HERE.
You may also learn about any after-service support. It will help to have someone you can ask questions of in the future.
#3 Research Types of Support
It may help you to make your decision knowing that any work on your device is going to be done on-site. If they come to you, you’ll get to meet the person doing the work and keep an eye on them if you want.
Another option may be to have the IT tech remote into your computer to help solve your problem.
Then, there’s the option of drop-off and pickup from that repair shop’s own brick-and-mortar store. If you take this route, you might want to ask whether your device will remain on-site at all times.
You’ll also want to find out if that computer repair person has a particular area of expertise. Some companies specialize in working with certain brands, whereas others can handle all types of models or brands.
Who doesn’t love a bargain? But the cheapest computer repair may not actually be a better deal. Taking the budget approach, you could get an inexperienced tech with slightly more know-how than you. On the other hand, going for the most expensive repair company doesn’t guarantee the greatest service either. Ask the computer business what their experience is.
Our IT experts are here to help you repair any computer issues. We can work on-site, remote in, or you can bring your device to us for the professional attention it needs. Call us today at (651) 456-8655 of visit our Contact page HERE!
Finding the Best Place for your Desktop PC (11/10/21). There’s a lot of talk about the best places to use your laptop. We’ll recap that discussion briefly below, but the real focus of this article is where it’s best to put your desktop PC.
First, why does it even matter? Of course, you care how your workstation looks, but beyond the aesthetics, airflow is important too. Computers cool themselves with fans to suck in cool air and expel hot air out the back or top. If you’re not leaving room for the computer to “breath” it can overheat.
When a computer overheats it can become unstable or suddenly shut down. The hot air can also damage internal components. This is true of both laptops and desktops.
That’s why you’ll hear that it’s a good idea to put your laptop on a raised, slatted service where air can reach the vents. A table over a furnace duct or in direct sunlight should be avoided too.
OK, But Where Do I Put My PC?
You don’t want to put your computer somewhere it is going to get dusty, which is a good reason not to put it on the floor. It’s exposed to more dust, hair, and other junk that way. Since the computer’s fans are sucking in cool air, they can suck in the debris too.
Also, on the floor, you risk accidentally hitting or kicking the PC. Sudden jolts are bad for mechanical hard drives. Plus, USB drives or anything else plugged into the front could be knocked out, which damages the port.
Some desks have cabinets under the desk where you can put the computer. But, these may not have been designed with enough airflow.
It’s best to set up your computer on a stable surface to avoid any bumps or drops. You also want to position it so that the cord is not going to create a tripping hazard. If you fall, you could damage the power connection or, worse, knock the computer off your table or desk.
Since the big thing is airflow, you also don’t want to set the PC too close to the wall. This can damage cables in the back if they bend too much. Or, when the hot air exhausts out the back, it will be harder to expel the heated air.
Securing Your Desktop PC
Putting your PC parallel to the monitor, safely stable on your desk or table, with good airflow and room for the cords is your best option for the safety and longevity of your desktop computer.
Need help setting up your desktop PC or finding the best place to position it in your home? Our tech experts are available to help. Contact us today at 555-5555.
Two-Factor Authentication, How Hackers Get Around SMS – Every time you’re online and a site sends a separate code to check your identity, you’re using two-factor authentication. It’s become the norm. So, of course, hackers have figured out how to get around this, too. This article shows you how they do it and how to stay safe.
With billions of usernames and passwords leaked, access credentials everywhere are at risk, especially if you are reusing your log-in information on more than one site (don’t do it!).
Business websites want to offer a secure user experience, so two-factor authentication (2FA) has become the norm. It’s meant to help stop automated attacks in which bad actors use the leaked usernames and passwords.
Still, if the site you’re visiting uses short message service (SMS) to send a one-time code to your phone, you could still be at risk.
Hackers, using information they have from a data leak, can call your telephone company. They use your name, date of birth, and other identifiers available on the Dark Web, to impersonate you. Then, say you’ve lost your phone, they transfer your phone number to a device with a different SIM card.
That means when the one-time SMS code gets sent your phone number, the message will instead go to their device.
Android Users Also Beware
On Android devices, hackers have an easier time getting access to text messages. If they have access to your leaked Google credentials, they can log into your Google Play account. From there, it’s simply a matter of installing a message-mirroring app on your smartphone.
The app synchronizes notifications across your different devices. It’s for when you really need to be connected, and you’ll be able to see your phone’s SMS alerts on your tablet!
The app won’t work unless you give it permission when prompted to do so, but too many people don’t stop to read alerts from their own accounts: they assume it’s another necessary update and go on with their day. Otherwise, the hacker might call you in a social engineering ploy pretending to be a legit service provider. They’ll be familiar to you, so you’re more likely to listen when they ask you to give permission.
Again, when the one-time SMS code gets sent to your phone, because of the message-mirroring app, the hacker’s device will also receive the code.
What Can You Do to Protect Yourself?
It starts with using unique passwords for all sites you visit. Worried you’ll forget them? A password manager can keep all your access credentials in one secure place for you.
You should also confirm that your credentials haven’t been compromised. If you use Google’s password service, you can head to the password manager site and tap “check passwords” to see if there are any issues. On Firefox, head to the Firefox Monitor page and “Check for Breaches.” On Safari, click on Preferences, and then on Passwords to see what recommendations they have for your security.
Change any passwords that have been involved in a leak!
To avoid the SMS concern specifically, avoid using one-time SMS codes to verify your identity. Instead, you can use a non-SMS authentication tool such as Google authenticator, which provides two-step verification services within the app itself.
Here’s some additional information you may find helpful:
Need help learning if your credentials have been leaked? Or want assistance setting up more security for your online activity? We can help. Contact our IT experts today at (651) 456-8655 or visit our CONTACT page.
DIY Computer Repair: Don’t Do It! – Most people like to take a shot at fixing things something themselves. With some things that works out great, but when it comes to do-it-yourself computer repair, it’s probably not worth the effort. This article shares some of the things to consider before trying to do that repair solo.
#1 Computers are complicated
Computer developers put a lot of work into making it easy for you to use your computer. A good user experience is part of the appeal for one brand over another. But that doesn’t mean that what’s going on inside the actual device is simple to fix.
There are a lot of complicated connections “underneath the hood” of your laptop or desktop, and prying the device open to see if you can do a DIY repair could prove disastrous. It’s going to be safer to turn to a trained repair tech instead.
#2 You could make things worse
Maybe you’ve done this around the house when trying to be “handy.” That leaky faucet becomes a full-blown broken fixture thanks to your efforts.
You might think that you can watch a YouTube video and do an amateur fix, but know that just hitting the wrong key combination could create a different problem. Digging into the backend of your programs could change something for the worse.
Tip: If you do try to fix something solo, don’t erase your history. It could be important for the tech expert to retrace your steps to figure out where you went wrong.
#3 You risk being scammed
Bad guys are always finding ways to exploit people, and there are scams out there that appear to be repair assist programs. You may be looking for a fix but instead you click on a link that installs malware on your device. Now, you’ve got another problem to deal with!
#4 You could lose your valuable data
We store a lot of our lives on our computers or smartphones these days. If you attempt to fix your device without first backing up your files, media, and other data, you could lose it all.
#5 It may not be worth it
It’s not that difficult to find a reasonably priced computer today. You may end up paying for expensive repairs for an old computer when you could have bought new. Take your computer to a fix-it shop. You’ll get expert input into whether your device is worth the time, effort, and money to repair before you go too far down that road.
Choosing the right repair service
With age comes the wisdom to ask for help when we need it. Regrettably, not all repair services are as reliable. When looking for computer fix-it help, read reviews, and check credentials and service guarantees.
Don’t hesitate to contact our IT experts for your computer repair needs. You have your skills, we have ours. Let us do the hard work and keep your devices ship shape for you. Contact us now at (651) 456-8655 or visit our CONTACT page.
Stop Your Technology from Stalking You – Unless you’re a reality television star, you probably don’t like the idea of being watched at all times. So, why would you want your technology to know all about you? With digital technology today, it’s far too easy for our devices to turn creepy. Here are some suggestions to stop the stalker-like tendencies of the technology you rely upon.
Today’s marketing and online communications are all about customization and personalization. If you like a friend’s picture of an Art Deco door in Belgium, you see many more posts featuring similar designs. Or if you view an area rug on a website, you’re suddenly bombarded with ads for rug stores when you next go online.
This can add convenience, but it is also unsettling. What companies online know about you could be more detailed than what your friends know. Take the following steps to regain control of what your computer, phone, and apps know about you.
Review your privacy settings
Whether going online from a phone, laptop, desktop, or tablet, get to know the device’s privacy settings. Some important settings to review include:
email tracking – this can let people know if you opened their message or not;
location tracking – personalizes recommendations but also tells search engines where you are;
voice recordings – manufacturers use these to train virtual assistants, but pause this to keep your conversations to yourself;
purchase history – this helps feed the machine so that businesses know how to target you in the future.
Opt out or block ads
Opting out of ads limits the information collected from your browser or device. The site or business still receives basic information about you, but you will no longer receive targeted, interest-based ads any longer. Apple’s iOS 14 allows app blocking, and you can also express your choice on Android devices.
Otherwise, use browser ad blockers, such as AdBlock Plus, or JavaScript blockers, such Ghostery, to limit ad tracking. Also known as content blockers, these software programs prevent ads from showing on websites you visit. You can find ad blockers for Chrome, Firefox, Opera, Safari, and Internet Explorer.
Check your permissions
Watch the permissions you give apps. We have already talked about checking device settings, but you can also limit the permissions you give to apps. For example, social media accounts have privacy settings that allow you to control what’s logged about you.
Plus, check permissions for other apps. Clash of Clans doesn’t need location services, for instance. Or you might not want to give Slack access to your microphone and video recordings.
Use webcam covers
Covering your webcam stops someone from potentially seeing and recording you. If you think you’d see the light come on to show the webcam is in use, know that hackers can disable that. A simple sliding webcam cover closes the webcam when you are not using it to avoid a cybercriminal having access.
Covering your webcam can also come in handy in all those online meetings you’re having. A covered camera means you don’t run the risk of your colleagues catching you unprepared.
Limit information you provide
Social media has created a culture of oversharing. There are probably many things you’ve seen about friends online that you would rather not know. You’re also sharing more than you need to with the companies that you interact with online.
If you’re filling out a form for a download, you might fill out only the required fields. When you add an app, be stingy with your personal details. Think about it from a need-to-know perspective. For instance, that home design game you love to play doesn’t need to know where you went to high school or with whom you bank.
Need help keeping the privacy-busting algorithms at bay? We can help. Our IT experts can configure device settings to limit information gathered about you online.
Making Technology Easier for Seniors. The pandemic has changed the world. More people have been pushed online in new ways, and for senior citizens this can be particularly challenging. Even registering for a COVID-19 vaccination requires going online in many countries. Plus, social gatherings and other appointments have gone virtual. Don’t add to a seniors’ social distance. Here’s how we can help seniors with their technology needs.
Think of all that has moved online in 2021:
telehealth
scheduling services
service appointments
church, club, association, and neighborhood meetings
shopping
selecting and reserving library books
It’s not that these things weren’t using technology before, but there were other options. Now, seniors may need to get online to take part in weddings, funerals, or baby showers. Thus, it’s essential that they have the right tools and know-how to log in and connect virtually.
Another problem? The senior is stuck at home and can’t go out to get computer help the way they might have done before. Meanwhile, family members may not yet be able to visit to help out.
How We Help Seniors with Technology
Socially distancing can have an especially negative impact on senior citizens, and factoring in a technology barrier doesn’t help. A managed service provider can help seniors tackle tech challenges. With their coaching, the senior can connect confidently and securely.
To stay in touch with family today, the senior has many online channels available. They can get on Facebook, use FaceTime on a mobile phone, start a video call on their desktop, or send an email. They also might play online games with family members, or join a watch party on a streaming service such as Amazon, Hulu, or Netflix. The list goes on and on.
All this requires technology in the home. Deciding on what kind of computer to get or upgrade to can be daunting, not to mention the challenge of setting it all up and connecting it to other devices in the home or installing a router or making sure the software is up to date and patched to lower the risk of malware or hacker attack.
Then, once the technology is installed, the learning curve doesn’t flatten out entirely.
In our digital environment, there are so many more devices to connect to one another. Maybe the printer is wireless and connects to the phone, or the router provided by the cable service isn’t giving a good enough signal throughout the house. A residential IT expert can help with that, too.
Our IT team can also suggest software solutions to make life easier for seniors online. We can recommend ways to integrate all the technology to simplify the environment. We know about changing default passwords for cybersecurity, and we can also set up password wallets. This can help forgetful seniors who might otherwise repeat access credentials across accounts.
Connect with Our Residential Support Team
You can rest assured that you or the seniors in your life have the IT help needed to stay connected. We’re able to explain, coach, and troubleshoot at any time. As we’ll get to know the technology, we can often help faster, too, plus we can do a lot of our work remotely if that makes the senior feel safer.
Some seniors fear technology. We get it. We can address concerns about going online. We will reassure with the right precautions and by setting up a secure system. Our experienced techs are always happy to help. Contact us today at (651) 456-8655! You may also send us a message from our Contact page!
5 Tips to Protect Your Laptop from Physical Damage
A laptop can hold your life. If you’re working from home, it’s essential to your income. For students, it’s where you keep all your notes and essays. Plus, there are the personal photos and videos. And you sometimes use it to stream your TV shows, or to video chat with friends and family. You may even make music, create art, or be writing the next bestselling novel on your laptop. So, you want to keep it in great shape. Here are five tips to protect your laptop.
#1 Don’t drop it
Or throw it, or stand on it, or expect it to withstand any serious impact. OK, that’s pretty obvious. You also don’t want to use your laptop in the bathtub or at the pool. Even a simple water spill on a laptop can damage the circuitry. If you do get your laptop wet, immediately turn it off and unplug everything attached to it.
#2 Open carefully
Laptops are getting thinner in every iteration. Some now even have foldable screens. The thinner and more flexible screen may look sleek and cool, but it’s also less rigid, which makes it more prone to damage. Especially on lower-cost laptops, the screen can flex if you open the computer up from just one side.
Yet, many of us hold a laptop in one hand and open the lid with the other. This can cause the screen to twist. Use both hands to open the laptop. Or get into the habit of opening your laptop from the center to avoid flex.
#3 Don’t bedazzle your keyboard or screen
Alright, maybe you weren’t planning on putting faux rhinestones on the screen or keyboard. Still, reconsider any decorations you have thought of adding. Even a keyboard protector (to prevent dust or spills getting into the circuitry) or camera privacy sticker could damage some of the new super-thin laptops. It’s just that there is now so little clearance between the keyboard and the screen.
If you really must have your stickers, put them on the protective sleeve that you get for your laptop.
#4 Disconnect carefully
Your laptop needs a consistent power source. If you damage the power cord connection, you’re done. So, make sure you pull the power cord out straight. Yanking it out sideways could damage the port.
Also be aware of where your power cord is connecting to the wall outlet. If you leave the cord trailing along the floor, someone could trip over it, or it could get caught on a rolling chair. This could not only damage the charging port but even pull the entire laptop onto the floor. That brings us back to #1, don’t drop the laptop!
#5 Keep it cool
No, you don’t have to store it into a refrigerator (please don’t!), but heat isn’t good for your laptop. You’ll want to keep your computer away from external sources of heat.
Again, as the laptops get thinner, they are more vulnerable to internal overheating. Ensure that the laptop’s intake ports are unblocked so that air can flow through and cool the circuitry. You might also blow dust out of the vents using canned air.
Also, avoid placing your laptop on very soft surfaces. A soft, uneven surface is more likely to block the internal fans. This leaves your device unable to regulate its temperature. You could even buy a laptop cooling stand, which provides extra fans to improve air circulation.
Average laptop lifespan will vary between two to five years. Keep your laptop on the longer side of that by taking these tips to heart.
If something does happen to your laptop, give us a call at (651) 456-8655. Our IT experts are here to help you find the best laptop for you, upgrade and secure your laptop, or fix your laptop when you need it. You may also send us a message from our Contact page.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.AcceptNoPrivacy policy
Recent Comments