Blog Post

Why Your Windows Updates Are More Important Than Ever Windows updates keep devices secure with the latest security updates. Stories about hackers and virus attacks seem to be making the news almost every day, and many of these news stories include tips on how you can avoid becoming a victim. One common theme among these tips is making sure your Windows operating system up to date. Every day hackers are trying to figure out new ways to break into Microsoft Windows and once they do find a weakness, they try and find a way to spread it. This could be through a malicious email attachment or even something that spreads without your involvement. Windows Updates Explained Whenever Microsoft discovers a potential flaw, they push out a small piece of software to all Windows computers running a supported version. If set correctly, your computer will check if there’s any updates or patches and install them automatically. In new versions, this usually happens when you’re shutting down or starting up, and doesn’t impact your experience at all. Unfortunately, some users will manually disable or delay their updates, creating a risky situation. The update may include security patches, drivers or a simple tweak to address bugs or issues with Windows. Sometimes, they even include new features or applications to improve the stability of your operating system. They’re a good thing! Not All Versions Get Updates Some older Windows operating systems are no longer supported, which means unless there are extenuating circumstances, Microsoft won’t issue any new updates. Not a single one – generally, if cyber criminals discover a flaw after support ends, they’re free to exploit it. For example, Windows XP support ended in 2014, and Windows Vista just ended in April this year. The moment an operating system is retired it becomes a playground for cyber-criminals. It’s not just Microsoft walking away from these old versions either. Third party software like the Google Chrome browser will still work, but they’ve also stopped supporting old versions with crucial updates and patches. It might seem like everything is working fine because your anti-virus isn’t pinging in alarm, but it just becomes a case of risk, upon risk, upon risk. What to do with older Windows As much as you’re comfortable with your older version of Windows, each time you boot up you’re exposing your system, important files and entire network. It only takes one weak entry point in the chain to allow malware into all connected devices. That could mean your photo storage, media center or even smart appliances. It’s not worth it - if you’re running Windows XP or Vista (or older), you need to update to a more modern operating system ASAP. Give us a call to upgrade your computer. We can also monitor your system remotely and apply your Windows updates with our Managed Services packages, ensuring you are always up to date and protected. Give us a call at 570.235.1946 or visit our Contact Page...

Internet Lingo 101: Cheat Sheet for Beginners Having an internet lingo cheat sheet for beginners is important. The Internet is growing and evolving so fast even the dictionary has trouble keeping up. Here are 12 suddenly common terms that are helpful to know. Browser A browser is a free piece of software that lets you view web pages, videos and other online content. It’s a core requirement of going online, as it converts the computer languages HTML, Javascript and XML into human-readable form. The most popular browsers in 2017 are Google Chrome, Safari, Firefox and Microsoft Edge*. (*Internet Explorer has been superseded and is no longer recommended due to security concerns) Email Electronic Mail (formerly spelled with a hyphen: ‘e-mail’) is typed messages sent from one person/business to another via the Internet. It’s delivered almost instantly and then waits patiently for the recipient to open and read it. You’ll need a webmail service (e.g. Gmail) or installed software (e.g. Outlook) to read, write and send, but you can also set your smartphone up for this. Most emails are in the form of letters, newsletters or catalogs, often with a more casual tone. Email can include text, links to the internet and images, but not video/sound. Encryption Before important data is sent over the internet, it’s scrambled to turn it into gibberish that means nothing to anybody who might intercept it. Unless there’s been a massive security breach, only the sender and intended recipient will have the decryption key to turn it back into readable data. You don’t have to encrypt your own data as it happens automatically. Your email provider and important places like banks and online stores have digital security systems that take care of the encryption/decryption for you. Firewall A firewall is a security measure designed to act like a door bouncer to your network. When an unauthorized user attempts to gain entry, the firewall blocks their path until it’s checked them out thoroughly. If there’s anything suspicious, the firewall refuses to let them in. HTTP and HTTPS These are acronyms for the rules of how data is transmitted to your computer screen. The actual mechanics are incredibly complicated, but the terms have one very important distinction: HyperText Transfer Protocol (HTTP) means the images, text and links should appear in your browser. HyperText Transfer Protocol Secured (HTTPS) means the page has an added layer of security to hide your personal information from hackers. Data sent through pages with this prefix is securely encrypted before transmission. IP Address Every device that accesses the Internet is assigned a unique IP address to identify itself. It’s used to make sure when you request a page or document, it’s sent to you – and not someone in Alaska. Your IP will look something like ‘202.9.64.55’ and may be referred to as fixed or dynamic. ISP Your Internet Service Provider (ISP) is the company that allows you to connect to the Internet. They’ll also offer extra services like email or web hosting. It’s impossible to bypass the ISP level and connect directly to the Internet. Malware A broad term to describe viruses and malicious software from hackers. Malware can manipulate you into paying money, take control of your computer, steal your private details or break your computer in some way. Instead of listing each specific threat, you’ll commonly see them lumped together under ‘malware’. Router The traffic system for your network, connecting computers and devices within the home and acting as a defensive gateway to the Internet. These hardware devices can be wired or wireless, and allow you to share one Internet connection amongst all the computers/devices in your home. Social Media A broad term to describe all the websites and applications that let you share and interact with others online. To fit this umbrella, the site needs to allow user profiles, live updates and the ability to add friends/followers. The most common social media applications are Facebook and Twitter. Spam and Filtering Any unsolicited messages sent over the Internet, usually in bulk, are called spam. Usually, it’s electronic junk mail, but it’s also a technique hackers use to trick people into clicking links to their malware. Email applications are reasonably good at identifying spam and should shift it automatically to a spam folder before you see it. Occasionally, the filters get it wrong and you may find a relevant email needs to be dragged back to your inbox. URL Each website has a unique address on the web known as a URL (Uniform Resource Locator). URLs commonly end in .com but can also end in a country specific extension like .com.au or .fr, or more recently, in new and exciting extensions such as .xyz or .me Need more consultation on technology topics? Call us today at 570.235.1946 or visit our Contact Page...

Stay safe from cyber attacks while traveling for business. Managers, owners, and employees are all embracing the flexibility of working while traveling, making it the new global norm. While you were in the office, you were protected by professionally designed firewalls, security infrastructure, and robust software. As soon as you step away from the building, those protections disappear, leaving your device and the data inside at risk. Cyber attackers love to collect any data they can obtain, often preferring to hack first, assess value later. Almost all data can be sold, including your personal details, those of your clients and suppliers, as well as your proprietary business data. The information stored on your device is usually worth much more than the device itself. Here are 3 ways a hacker will attack: Flaunting Opportunity: Whether your employee left their laptop at a café or a thief stole the device, the outcome is the same – that device is gone. Hackers will take advantage of any opportunity to gain access to a device, including taking them from hotel rooms and even asking to ‘borrow’ them for a few minutes to install spyware. Spoofing a Wi-Fi Hotspot: We’ve all come to expect free Wi-Fi networks wherever we go. Hackers will take advantage of this trust to create their own free, unsecure network, just waiting for a traveler to check a quick email. Intercepting an Unsecure Network: Hackers don’t need to own the Wi-Fi network to steal content from it. Data traveling across an unsecure network is visible and available to anyone with the right software. It’s okay, you don’t need to lock all employees inside the building or cancel all travel plans. Taking these four precautions will increase cyber safety and help protect your business data while on the go. Create backup before travelling: In the event your device is lost or damaged,  you can replace the device with a new one. Don’t use public Wi-Fi: Wait until you have access to a secure network before going online. Use passwords and encryption: Secure your device with a password or full drive encryption. Act fast after loss: If your device is lost or stolen, immediately notify the appropriate people. This includes your IT provider, your bank, and any staff who need to be aware of the breach. Need help with mobile cyber security? Call us at 570.235.1946 or visit our Contact Page...

How much could a ransomware attack cost? Have you ever thought about how much your data is worth? Cyber attackers target valuable information like client databases, accounting software, inventory management, and intellectual property. The WannaCry ransomware outbreak made businesses rethink the value of their data and the consequences of such attacks. Ransomware attacks typically require payment ranging from $150 to $600 for file release. Meanwhile, new client calls are still coming in and you may find yourself unable to operate with your systems down. Paying the ransom or restoring from an unaffected backup seems like a quick fix, but it doesn’t end there. There’s still the downtime involved to restore all your data – possibly days – and that’s a lot of lost productivity. Plus, if word gets out that your data has been compromised, you may find confidence in your business plummets and your existing clients head elsewhere. That $150 ransom may end up costing well over $150,000! Prevent Ransomware Attacks on your Business Keep your systems up to date: WannaCry took advantage of a flaw in older versions of Windows, one that was since patched by Microsoft. But to be protected, businesses had to be up to date with their patches AND be running a supported version of Windows. Delaying patches and updates puts your business at risk - we can help you update automatically. Lock down employee computers: Very few staff will require full administrator access to your business network. The higher their level of permissions, the more damage a person can do – either accidentally with a whoopsie click, or by inadvertently installing malware. By locking down your employee computers, you have a better chance of containing a malware attack to non-vital systems. Our experts can design an access management plan that gives you best of both worlds: flexibility PLUS security. Educate your workplace: Most employees believe they’re being cyber-safe but the reality is quite different. Many malicious links and embedded malware have become hard to spot in an instant – which is all it takes to click and regret. We can work with your staff to establish procedures around checking links for authenticity before clicking, awareness around verifying the source of attachments, and the importance of anti-virus scanning. We’ll help get the message through! Have a solid backup plan: When ransomware hits, a connected backup = infected backup. Unfortunately, synced options such as Dropbox immediately clone the infected files, rendering them useless. The only safe backups will be the ones both physically and electronically disconnected, with systems designed to protect against attacks like this. Our experts can set you up with a backup system that makes recovery a breeze. Be proactive: The best way to avoid the financial cost of a ransomware attack is to prevent it from happening in the first place. Remember, many businesses were able to watch WannaCry from the sidelines, completely unaffected and seizing opportunities while their competitors were down. Our managed services can help protect your business against the next cyber-attack. Call us today at 570.235.1946 or visit our Contact Page...

Does Dropbox Make Sense For Your Business? It seems so easy! Drag your files into a Dropbox folder and you’ve got yourself a file sharing system that brings your business in line with modern expectations. But then again, maybe not. Dropbox has grown to become one of the main file sharing and cloud storage solutions of choice. In some cases, sticking with the familiar blue box can provide good value, and of course, it never hurts when your staff already know how to use your software. In other cases, you’ll need to consider alternatives designed to meet your needs more explicitly. When Dropbox is a Good Choice Micro-sized: If your business is small with no more than a handful of employees (or none); No sensitive information: This includes accounts, customer details, vendor, staff or proprietary data; plus Nobody ever accidentally deletes anything: Dropbox is a syncing service, which means when a file is deleted, it deletes it from all machines. By the time you realize the file is missing, it may be too late to recover it. If you’re thinking those attributes sound more like a fictional business, you’re not far off. Somehow, Dropbox’s popularity in the consumer sphere has snuck into business environments, despite the risks. Key amongst these is the fact that Dropbox is designed for syncing, NOT backup. This means while your data is sprawling across all connected devices, it’s a mirror of the source only – when you delete or change the original file, the Dropbox version immediately syncs with it. When Dropbox is a Bad Choice In some cases, this can spread malware between your connected devices and put all of them at risk. Your business also misses out on important security controls, such as user-level access control and password protected links. Rather like a free-for-all, the shared files are sitting there available to anyone with either a connected device or an unsecure weblink. You’ll also miss collaborative editing, losing out in productivity and data resilience as multiple employees overwrite each other simultaneously, with no record of who even opened the file, let alone changed it. If Dropbox makes sense for your business, there’s no reason to change. But if it’s clearly not a good choice for you, there are multiple corporate grade syncing solutions. These are designed for business with security, encryption and collaboration controls built in. Rather than the easiest solution which may pose a risk to your business and digital security, consider implementing a scalable solution that meets all your needs. Call us at 570.235.1946 to discuss syncing solutions for your business or visit our Contact Page...

Batteries are rarely talked about. The truth is, they’re a miracle of engineering that gets taken for granted when full and cursed when flat. If it feels like your battery is running out faster, you might be right. Modern lithium-ion batteries in phones and laptops wear out over time, unlike older battery types like NiMh. Fortunately, extending your battery life is easier than you think! Which of the following GOOD battery habits do you have? Good Battery Habits Charge whenever you can: Lithium-ion batteries don’t like being charged all the way then drained down to 0%. No wonder, it even sounds exhausting. Give them a little charge here and there, and they’ll be happy. Leave your laptop plugged in all the time: You can’t over-charge the battery. The laptop also helps out by cutting the flow of power when the battery registers as fully charged. Watch for overheating: If you can, remove your laptop battery while charging, because while it won’t overcharge, it may overheat. You might also consider removing the battery if you’re using your laptop plugged in all the time. You might lose data if there’s a power outage, but overheating is a far more common occurrence. It’s been proven to degrade battery life. Check your vents are clear with good airflow, and if necessary, help it out with a cooling laptop stand. Leave your phone plugged in all night: Just like your laptop, your charger knows to stop when the battery is full. Those chargers do generate heat though, so make sure you have enough airflow around both charger and phone, and never sleep with it under your pillow. Charge batteries before storing: Make sure to give them a half charge before storing. They’ll naturally discharge and age over time, so this gives them a fighting chance to still be viable when you need them. Keep your cool: We know to avoid water with our phones, but we’re less careful about exposing it to heat. This includes leaving it in your car all day, placing it on top of your PC, or even in a sunny spot by the window. Wireless and rapid chargers can also be an issue, as the amount of heat they generate will affect your battery. How did you do? Is keeping your lithium-ion battery happy easier than you thought? Your battery will wear out over time, but you can push that day a few years into the future if you remember to keep it charged and keep it cool. Having battery issues? We can help! Call us at 570.235.1946 or visit our Contact Page...

WannaCry Ransomware Explained: Is Your Business At Risk? You’d be hard-pressed to miss May’s biggest headline, the WannaCry cyber-attack sent shockwaves around the globe. Businesses of all sizes and even police departments found themselves under attack without warning. Among the most prominent victims were many NHS hospitals in the UK, affecting up to 70,000 individual devices such as essential MRI scanners and blood-storage refrigerators. But by the time it hit the news, either your system was protected, or it was infected. Here’s how it all went so wrong. What is WannaCry? The WannaCry cyber-attack was a type of malware called ‘ransomware’. Just like the name suggests, it’s actually a demand for money. Like all ransomware attacks, WannaCry encrypts your files and holds them hostage until you pay. In this case, the price was set at $300, payable with internet currency Bitcoin, and you had 3 days to pay before it doubled. If you didn’t pay, the ransomware threatened to delete your files permanently. It’s yet unknown how much money the WannaCry hackers have earned with their latest attack, but you can be sure plenty of people have paid the ransom. Even the FBI recommends paying the ransom, especially if the ransomed files are of a sensitive nature or weren’t backed up. How It Spread So Fast It seems WannaCry may be a ‘computer worm’ that self-replicates and spreads, rather than a phishing attack that needs to be activated with a click. So far, no common trigger has been identified, as is normally the case with phishing links. WannaCry moved rapidly from system to system, spreading out through the entire network, including all connected backups and storage devices. At the same time, it spread out to infect other networks, who then spread it further, and so on. Given the nature of the internet, it was everywhere within hours. Why Some Businesses Were Safe WannaCry could ONLY infect systems that have fallen 2 months behind in their Windows updates. It was created to take advantage of a specific vulnerability in Windows, one which Microsoft patched months ago. Without that patch, the ransomware could waltz right past the firewall, past the anti-virus and directly into the system (the NHS were reportedly running Windows XP – no longer supported). Those running Windows 10 or a fully patched, recent version of Windows were completely unaffected. It just goes to show the importance of staying up to date. We haven’t seen a second spike in WannaCry attacks yet, but that doesn’t mean there won’t be one. A quick update could protect your business from weeks of downtime and lost revenue, making attacks like this a non-issue. With our managed services, we can make sure you stay up to date – and protected. Give us a call today at 570.235.1946 or visit our Contact Page...

How To Keep Your Tech Squeaky Clean Our tech is something we use every day, but did you know it’s also the most disgusting? Your screen may look clean, but studies show that a mobile phone can be 18x dirtier than a public restroom – ew! It gets worse. That keyboard you tap at while eating your morning toast? It’s probably the biggest bacterial threat in your house, with about 20 000 times more germs than a toilet seat. It’s not just sickness we’re up against, because as dust builds up inside gadgets, they also slow down, malfunction or overheat. Your device essentially chokes on ick, as vents and filters are clogged by sucking in pet hair and floating debris. Here’s how to clean your essential tech items without damaging them: Skip the Household Cleaners Most cleaning products are too harsh for our technology and can end up causing permanent damage. You want something that can kill germs and remove everyday grime, without scratching or leaving behind a scented residue. Your best bet is Isopropyl Alcohol. You’ll find it in the first aid section of supermarkets and pharmacies, or at the hardware store. Power Down Completely Turn your tech off all the way, not just sleeping, and unplug from any power sources. Switch wireless keyboards, mice, etc off underneath or remove the batteries. Remove any Cases or Covers Undress your device as much as you can, but leave screen protectors on (unless there’s grime underneath). If your screen protector needs replacing, have a new one ready to apply. Grab a Microfiber Cloth Dampen the cloth with Isopropyl Alcohol and wipe screens and external surfaces gently. Older build-up may require extra effort. Go Deep You can use a toothbrush or cotton tip to clean between most crevices, but some areas will need a bit more ‘oomph’ to clear. You’ve probably seen people use vacuum cleaners on their keyboard, but these are often TOO powerful and may suck keys or internal parts loose. They also generate damaging static electricity. Another option is to use a tech-specific vacuum, but these are usually underpowered. Insider Tip Use a can of compressed air to blow the dust out. You can get these from many stores and they come with a long nozzle so you can really get in and direct the pressure. You’ll be surprised what flies out, so it’s best to do this outside! We don’t recommend using compressed air on your computer’s internal fans though, as this can make them spin too fast and damage them. How often you clean your tech is up to you and your lifestyle. But it’s a good idea to blow out computer internal dust at least twice a year and wiping your tech down 1-2 times per week will definitely reduce germs and grime. Is your computer making too much noise or getting too hot? Give us a call at 570.235.1946 or visit our Contact Page and we’ll clean the internals for you....

Why Your Business Needs A Strong Firewall You may not be storing military secrets or running a billion-dollar empire, but your business is still an attractive target for hackers. Enter the firewall - a guard standing at the door of your network to stop the bad guys from getting in. A surprising number of businesses are operating without a firewall. For most, it’s a risk they don’t know they’re taking because they assume all systems have built-in protections. A firewall is a type of hardware or software that acts as a protective shield between the computers on your network and cyber dangers. Data passes through at lightning fast speeds, invisible to the user experience. What Does Firewall Do? Filtering: A firewall looks for known viruses, phishing emails and spam, and then blocks them before they enter. Business firewalls also monitor data in both directions. When a computer goes online, data coming in and out is inspected. If it doesn’t pass the test, the firewall instantly blocks it and records the details in a log. Performance: You can use your firewall to set network traffic priorities. For example, it can make sure a Skype call gets all the resources it needs to allow for flawless video and voice quality, while someone watching YouTube videos at the same time will receive reduced resources. Rules can be set to allow certain applications to be treated as a higher priority than others. You can tailor your network performance to meet your unique business needs. Management: Business firewalls allow you to see who’s doing what and when over your network. You can create rules for specific users, devices and times. You might allow your employees to access Facebook during lunch breaks only, while keeping it unblocked for you or your marketing team throughout the whole day. Thorough logs are kept automatically and can be used to troubleshoot problems. For example, your firewall logs might show that a computer inside your network connects to a low-income country at 3am each night, which would certainly be worth investigating. Connection: A strong firewall allows your remote workforce to access your servers with ease and security. Remote work arrangements are growing in popularity and necessity, often requiring server access at a moment’s notice. You can set your firewall to authenticate the identity of users before allowing access, and create a virtual private network (VPN) that keeps any transferred data safe from interception. We install, configure and manage business firewalls - Call us at 570.235.1946 or visit our Contact Page ...

How to Make Computer Issues A Thing of the Past Computer issues can be a thing of the past. Computers have a habit of dying at the worst possible time. We’ve combined our repair services with preventative measures to ensure this doesn’t happen to you. Our managed IT services can remotely take care of all the computers in your house or business. Preventative Maintenance Anti-virus always up-to-date: While many homes have anti-virus software installed, they don’t often have the latest virus and threat definitions. These systems are at risk every minute they spend online, as the anti-virus simply will not pick up and stop an unknown threat. New viruses and hacking threats arise every day, and there are entire companies dedicated to creating anti-virus updates to catch them. We can make sure your anti-virus definitions are always up-to-date, keeping your computer secure against even the newest viruses. Software patches: Hackers like to spend their time figuring out new ways to break into computer systems. Software companies like Microsoft and Apple release regular patches to close these security holes. Patches should be applied automatically. However, we often find that isn’t the case – patches didn’t download, were canceled or produced an error. Our services involve remotely checking that each patch is applied successfully. Early failure detection: Some parts in your computer send out alarm bells when they’re about to die. We monitor these and advise repairs as required. Data protection: Hard drives which store your information do eventually wear out, but they’re one of the parts that send out early failure warnings. We can monitor this and give you ample warning so that you have time to back up your important files. When it’s time, we’ll work with you to arrange drive replacement, making sure to either clone or re-install your operating system, whichever suits your needs best. Tune-ups: Even the most cared for computer will slow down over time. Hard drives become cluttered, operating systems corrupt and ghosts of uninstalled programs still remain. We can remotely schedule and run a regular maintenance routine that will keep your system running in top condition and lightning speeds. Our managed IT service happens entirely behind the scenes, so there is no disruption to your experience. You simply enjoy the benefits of having your own IT specialist team at one flat, low cost. We fix problems before they occur. Try managed IT services today by calling 570-235-1946 or visiting our Contact Page...