24 Jan Microsoft wants you to pay for updates
Microsoft plans to charge for updates to Windows 10 starting next year (2025). We tell you your three options… and which we recommend....
Microsoft plans to charge for updates to Windows 10 starting next year (2025). We tell you your three options… and which we recommend....
Sick of spam emails? We have details of a cool new tool to help keep us better protected....
Quantum computing has been an idea for a while, and has recently been making steady advancements in the past 10 years. The first people who proposed the idea were Richard Feynman and Yuri Manin in 1980 (Microsoft, 2023). Since then, companies like IBM have taken interest in it. There is a point now in the world where there are physical quantum computers that are functional. With the advancement and realization of the quantum computer, IBM is taking a special interest in cybersecurity. Cybersecurity will need to evolve alongside the quantum computer. As we usher in the age of quantum computing, there needs to be a system in place to combat quantum cyber attacks. Enter IBM’s Quantum Safe Technology. “Governments and enterprises are rushing to form a quantum-safe strategy to protect critical data from quantum attack. Today, our IBM Quantum Safe roadmap helps organizations navigate this complex landscape by equipping them to track their quantum-safe milestones and achieve them using IBM technology, services, and infrastructure” (IBM, 2023). IBM has a roadmap specifically for cybersecurity. Here is what it looks like: (IBM, 2023). IBM is not the only one in the quantum market race. Many other companies are starting to dedicate research and development into quantum computers. Companies like D Wave, Intel, Microsoft, Alibaba, Bidu, and Google are investing into a quantum future as well. Having cybersecurity issues? Contact us for consultation and options for staying safe on the internet. References: IBM. (2023). IBM quantum computing | quantum safe. Retrieved October 20, 2023, from https://www.ibm.com/quantum/quantum-safe Microsoft. (2023). Quantum computing history - azure quantum. Microsoft Learn. Retrieved October 20, 2023, from https://learn.microsoft.com/en-us/azure/quantum/concepts-overview...
Apple's iOS 17 brings many new accessibility features aimed to lighten cognitive load. Among these features is Assistive Access. "Assistive Access uses innovations in design to distill apps and experiences to their essential features in order to lighten cognitive load" (Apple, 2023). This brings many cognitive accessibility features to the table. Tim Cook aims for Apple to be usable by any one with disabilities. Key Features of Assistive Access "Assistive access includes a customized experience for Phone and FaceTime, which have been combined into a single Calls app, as well as Messages, Camera, Photos, and Music. The feature offers a distinct interface with high contrast buttons and large text labels, as well as tools to help trusted supporters tailor the experience for the individual they support" (Miller, 2023). This makes it much easier to see apps and text on the screen, as well as streamlining the most essential apps. "For example, for users who prefer communicating visually, Messages includes an emoji-only keyboard and the option to record a voice message to share with loved ones" (Miller, 2023). How to Setup Assistive Access on iPhone Make sure you have iOS 17 installed. Step 1: Go to Settings > Accessibility > Assistive Access, tap Set Up Assistive Access, then tap Continue. Step 2: Verify Apple ID. Step 3: Choose layouts for apps. Step 4: Choose and customize apps. Step 5: Verify device passcode. Step 6: Set Assistive Access passcode. Step 7: Learn how to exit assistive access. Step 8: To enter Assistive Access later, go to Settings > Accessibility > Assistive Access, tap Start Assistive Access, then enter the Assistive Access passcode (Apple Support, 2023). These steps can be found in more detail here Need help setting up Assistive Access? Contact Us References Apple. “Apple Introduces New Features for Cognitive Accessibility, Along With Live Speech, Personal Voice, and Point and Speak in Magnifier.” Apple Newsroom, 28 Aug. 2023, apple.com/newsroom/2023/05/apple-previews-live-speech-personal-voice-and-more-new-accessibility-features Miller, Chance. “Apple Previews iOS 17 Accessibility Features: Assistive Access, Personal Voice and Live Speech, More - 9to5Mac.” 9to5Mac, 16 May 2023, 9to5mac.com/2023/05/16/apple-ios-17-accessibility-features “Set up Assistive Access on iPhone.” Apple Support, support.apple.com/guide/assistive-access-iphone/set-up-assistive-access-devcd5016d31/17.0/ios/17.0 ...
You’ve likely seen news coverage of ransomware targeting large companies or hospitals. Maybe you’ve seen Homeland when Claire Danes’ character falls victim to laptop ransomware during a surveillance mission. But did you know that ransomware attackers can also target your smartphone? A smartphone, after all, is a portable computer in your palm. Take a moment to imagine being locked out of your own phone. The hackers could gain access to your saved passwords and emails. You could lose access to your contacts, notes, and images, and even your three years’ worth of effort on Candy Crush. What You Need to Know About Smartphone Ransomware Also known as mobile ransomware, these attacks infect your smartphone. Instead of stealing the actual device, the bad actors take it hostage. They typically encrypt your data and make it so you can’t do anything. It may not be as widely publicized, but there’s already a long list of smartphone ransomware programs. The list continues to grow with examples such as ScarePackage, LeakerLocker, and LockerPin. ScarePackage can infect more than 900,000 phones in a single month. And before you think, “That won’t happen on my iPhone,” know that no smartphone manufacturer is secure. The type of ransomware may vary due to the different operating systems, but you can be at risk on both Android and an iPhone. Unlike other malware, the hackers usually want you to know they’ve gained control. Typically, they will notify you on your lock screen or home screen. You’ll often see a list of demands and a deadline to comply. That said, some mobile ransomware stealthily steals your data. What To Do About Mobile Ransomware The first thing to do? Be cautious. Keep these best practices in mind always: Regularly update your device's operating system and applications to patch any security vulnerabilities. Exercise caution when downloading or installing apps from untrusted sources. Avoid clicking on suspicious links or opening email attachments from unknown senders. Enable app and system updates to ensure you have the latest security patches. If you become a ransomware victim, try to disconnect your device from the internet. Turning off Wi-Fi and mobile data limits communication with the attacker’s server. Avoid paying the ransom. It’s tempting but not recommended. You are counting on hackers to keep their word and provide the encryption key. You can find decryption tools online for less complex ransomware. If the ransomware came from a malicious app, immediately delete that app if you can. What you can do will depend on the specific ransomware variety. In general, it's best to seek professional help. Work with an IT expert who can remove ransomware without further compromising your device. We can also help you restore clean, unaffected backups. Contact us today at 570-235-1946 or by filling out a contact form....
Is Your Laptop Overheating? Does your laptop have overheating issues?? Electronic components, including large capacity batteries, become warm in use.? Your laptop should never become too hot to handle though.? When a laptop turns hot to the touch or starts to sound like a jet engine, it's likely overheating. Modern laptops use nearly silent fans to cool components and keep the system is comfortable and safe to use.? In some cases, the sound the computer makes is the best tool you have to diagnose its running condition.? Excessive heat causes the fans to work harder and faster to compensate.? This jet engine sound is one of the first clues you have to indicate all may not be well. Why So Hot Because of their compact size and portability, laptop computers are particularly prone to overheating problems.? Their tiny footprint puts electronic parts closer together, creates less room for cooling vents and adds a heat generating battery which introduces more hot air into the system. Most laptops have small fans that suck in cool air,?passing it over metal fins to exchange heat from the case. The resulting hot air exhaust is expelled through vents back into the room.? This process prevents heat building up inside the machine.? The constant air cycle keeps the laptop running cool no matter the workload placed on it. This process can be interrupted by any number of factors during operation.? Alongside cool air, computer fans can also suck in dust, stray hairs, even cigarette smoke too.? Smoke in particular contains thick tar which coats the fins, fan blades, and internal components. Foreign debris inside the machine prevents components from working at their best.? Tar, dust, and hair slows down the internal fan and coats the heat generating components and cooling fins.? This coating prevents air exchange and keeping components warm as if they were under a blanket. Causes of Overheating Sometimes the way a laptop is used can cause it to overheat too.? Resting a laptop on thick carpets, blankets, or soft furnishings can block vents, preventing the fans from sucking cold air in or blowing hot air out. Leaving the machine running on carpet or furnishings can cause overheating issues and introduce extra dust into the components too. The best place to rest a laptop while in use is on a hard surface such as a desk, table, or lap tray.? This allows air free access to the vents and helps prevent dust and hairs getting inside the machine. You may also consider using a laptop cooling fan stand Overheating Results As the computer starts running hotter for longer, its fan will attempt to compensate by running faster and more often.? This results in the "jet engine" noise many users report when their computer is struggling to keep up. Unfortunately, once dust, hair, or tar has already found its way into the machine it is notoriously difficult to clean out.? The only way to reset the machine to run cool and quiet is to disassemble the base and clean out its components. Much like a car engine, computer components have a designed temperature range in which they can safely and reliably operate without any issues.? Extended periods of running above the temperature they are designed for can cause damage, sudden failures, and drastically shorten the designed lifespan of the computer. Unlikely Causes Often times seemingly random blue screen computer crashes can be traced back to components that have been overheating inside the computer.? As heat builds up, vulnerable components start to fail, sometimes temporarily, in the hotter temperatures. By the time the computer is rebooted and cooled down the issue is seemingly resolved.? Back in operation, the computer heats up once more and eventually crashes again.? These irregular crashes are highly inconvenient and can sometimes cause data loss too. However, these symptoms are minor compared to a complete write-off of the machine.? For some users, the first sign that their machine is too hot to run safely is when the motherboard is burnt out or their data storage has been irreparably lost. Check out this YouTube video made by HP Support that goes over How to Prevent Overheating an HP Laptop: If your laptop is running hot to the touch or has started to sound loud or irregular, bring it to us for a thorough clean. Visit our Contact Page or give us a call at 570-235-1946. ...
Information technology (IT) has more than its fair share of acronyms. Often, it’s a matter of one letter differentiating the options. So, when it comes to MSPs and MSSPs, what’s the distinction? With MSP and MSSP you compare managed service providers with managed security service providers. But since MSPs also work to secure your IT infrastructure, the names alone don’t tell you enough. ? Key Differences Between an MSP and MSSP Distinguishing between these two can help determine which one better suits your business. The following helps you compare the options. Scope of Services MSPs and MSSPs focus on different aspects of IT management. MSPs typically manage, update, and maintain IT infrastructure and applications. They ensure business technology runs smoothly. They perform network and system health monitoring, as well as proactive maintenance. MSSPs specialize in security to protect networks, systems, and data from cyber threats. They protect your business from potential security breaches and support regulatory compliance. Practical example: An MSP might manage email, backup and recovery, or software updates, whereas the MSSP would offer services such as threat monitoring, vulnerability scanning, or incident response. Skill Set/Experience MSPs offer a more generalized understanding of IT and security best practices. They can oversee your IT operations either as a partner or your outsourced IT department. The MSSP’s experts typically specialize more in cybersecurity. They identify and mitigate complex security risks. Practical example: An MSP might have general IT technicians on staff. An MSSP's team specializes in areas such as penetration testing, threat intelligence, or compliance. Service Level Agreements (SLAs) MSPs and MSSPs meet different needs, so their SLAs are distinct. Expect an MSP to focus on response times, system uptime, or ticket resolution. The MSSP's SLA might relate more to incident metrics, such as detection and response times. Practical example: An MSP may guarantee a response time of four hours to resolve a system issue. The MSSP may guarantee to detect and respond to a security incident within 30 minutes. Cost Structure Expect different pricing structures depending on the service scope and expertise required. MSPs typically charge a fixed monthly fee based on the number of devices or services managed. This often costs significantly less than working with an MSSP. MSSPs may charge a combination of fixed and variable fees based on the number of security events, incident response, or forensic investigations. Practical example: An MSP might charge $50 per device per month. The MSSP might charge a flat fee of $5000 per month. You might also pay extra fees for remediating security incidents. Deciding on the Best Provider If your business primarily needs help with routine IT tasks, an MSP might be the best fit. Businesses with limited budgets or smaller-scale needs may also find MSPs more cost-effective. When you have sensitive data or compliance requirements, you could need an MSSP. MSSPs often have a deeper understanding of standards such as HIPAA, PCI-DSS, or GDPR. Choosing the wrong provider can waste resources and leave you potentially vulnerable. Contact our experts at 570-235-1946 or visit our Contact Page. We can help you make informed decisions about your IT management and security needs....
“What’s that password again? Wait, I changed it … Harrumph. I don’t remember!” We’ve all been there, sometimes many times a day. Password autofill on our Web browsers felt like the sun was shining on our online activity again. Sorry to tell you, but this convenience may not be entirely safe. Most browsers will ask after you’ve entered a new password into a site or changed a password if you want it stored for you. That way, when you revisit that site, the browser can autofill the access credentials for you. It saves you the struggle of trying to keep all your passwords straight. The problem is that some sites, including legitimate sites, can be compromised with a hidden form. You’ll never see it, but your browser will. So, it will autofill that form, and in clear, unencrypted text. This allows bad actors to capture your username and password without your knowledge. Another risk? Irresponsible digital marketers may use hidden autofill forms to track your online activity. That’s done without your consent. Using browser autofill with a password manager can also cause confusion, especially if your browser autofills, whereas the manager asks before filling in forms. Using both at the same time you also run the risk of duplicating passwords, which could make it difficult to track your passwords and increase the risk of security breach. ? How to disable autofill You can protect your passwords by disabling autofill on any browser you use: On Microsoft Edge, go to Settings, then Profiles, then Passwords, and disable “Offer to save passwords.” On Google Chrome, go to Settings, then Passwords, and disable “Offer to save passwords.” On Firefox, open Settings, then Privacy & Security, then Logins and Passwords, and “Autofill logins and passwords.” On Safari, from the Preferences window, select and turn off Auto-fill. Can I keep using password managers? A password manager, such as LastPass or 1Password, typically provides more security than browser autofill. Password managers have strong encryption algorithms to protect your login credentials, which means that even if your device is compromised, your passwords are safe. Still, if the manager autofills your credentials, you face the same risks. Most password managers have autofill disabled by default. That’s good. Leave preemptive autofill off. You might see it called “Autofill on page load.” Keep that turned off, too. Our advice? Use a password manager that requires you to click a box before it fills in your credentials. This action avoids your information from automatically populating a hidden form. Securing your online activity is an ongoing challenge. Our geeks can help identify ways you can protect your privacy and data online. Contact us today at 570-235-1946 or visit our Contact Page....
What is Zero-Click Malware? You know not to open an email attachment from someone you don’t know. You also avoid downloading unexpected files or questionable popups when you go online. But did you know there’s malware that requires zero action from you? Zero-click malware can infect your device without any interaction on your part. Traditional malware required the user to click a link, download a file, or execute a program. It often relies on phishing and social engineering to fool you into taking action. Zero-click malware exploits vulnerabilities in your operating system (OS) or applications. It uses carefully crafted, undetected code to access and execute a payload automatically, and there’s no trigger. If one is present on the system you’re using, you’ll navigate right into it. This makes zero-click malware attacks all the more dangerous. After all, they happen without your knowledge or consent. Meanwhile, attackers can use zero-click malware to: gain access to sensitive data, such as passwords or financial information; take control of your device; impersonate you and send out messages on your behalf; carry out additional attacks. Understanding Zero-Click Zero-click attacks exploit bugs, misconfigurations, or design flaws in an application or OS. They can come in many forms as attackers: target email applications and messaging apps such as WhatsApp or iMessage; build malicious websites; hack and infect legitimate websites; exploit vulnerabilities in network protocols or services. In one well-publicized example, Amazon CEO Jeff Bezos suffered a zero-click attack. A WhatsApp message compromised his texts, instant messages, and potentially even voice recordings. Another well-known attack targeted the WhatsApp accounts of journalists, activists, and human rights defenders in several countries. The attackers installed the Pegasus spyware on the targeted device simply by placing a phone call to the device, even if the user did not answer the call. The malware could extract messages, photos, contacts, and other sensitive data from the device, as well as activate the device's camera and microphone to record the user's surroundings. How to Protect Against zero-click malware Protect against zero-click malware by keeping your device's software up to date. These attacks are often designed to exploit unknown vulnerabilities in software, enabling automatic updates can help ensure you run the latest, most secure software. Also, install and use security tools such as antivirus software and firewalls, which help detect and prevent the malware from infecting your device, and remain cautious about clicking on links or downloading files from unknown sources. Further reduce your risk by using strong passwords and two-factor authentication. Plus, limit your device exposure to public Wi-Fi networks and unknown devices. In case of a zero-click malware or other types of data breach, regularly back up your data, too. Store backups on a separate device that uses strong encryption and two-factor authentication, or use a secure cloud storage service. Not sure about the strength of your online protections? We can help secure your devices. Contact us today at 570-235-1946 or visit our Contact Page....
Windows 7 is Dying Windows 7 reaches its "end of life". This means that Microsoft will no longer be working on it, causing it to become extremely unsafe and more inefficient, similar to how versions such as Windows XP and Windows Vista already are. Starting in 2020, Windows 7 will be a target for hackers like no other, putting your data and personal security at risk. The solution? Upgrade to Windows 10! It's faster, safer, more powerful, and overall a great decision to make for anyone using an older operating system. Windows 10 is the latest and greatest from Microsoft, receiving new features and performance improvements all the time. Windows 10 is set to reach its end of life state in 2025, so all of its users will continue to receive constant support for another six years! See if your computer meets the minimum specifications to run windows 10 Security: Windows 10 is by far the most secure version ever released. This is in part due to the fact that it's newer, smarter, and more aware of modern security threats. However, a large portion of the security of Windows 10 comes from continuous security updates from Microsoft. These updates come so frequently that your computer will install them automatically. Constant security updates are crucial to the safety of an operating system. It's time to upgrade. Speed: You may think that because Windows 10 is newer and has more features than Windows 7, it may run slower. This is not true! Windows 10 not only brought new and helpful features to the table, but it also increased the speed of several things like startup time, time taken to wake from sleep, and general computer performance speed. Even on older machines, Windows 10 speeds up computers by being a more efficient operating system than Windows 7. Features: It goes without saying that a new version of anything comes with new features. Windows 10 is no exception, as it's chock-full of new things relating to user assistance, visual design, ease of access, and computer maintenance. An operating system has never been so easy to navigate with the addition of Microsoft's new AI assistant, Cortana. A Siri-like program that can answer various questions about the operating system, general knowledge, or your data that you've input into it such as contacts and calendar events. The new design of Windows 10 is also sleeker than ever, taking the top spot on many people's lists of most attractive operating systems. This is all accomplished while still retaining that old and reliable Windows 7 layout of things. You won't have to wonder where most things are in Windows 10, because Microsoft didn't waste time by reorganizing every utility just so users would have to re-learn where to find things. The content and design of the latest Windows operating system is more solid, consistent, and robust than ever. Worried about the transfer? If you’re concerned about having to learn to use a new operating system, don’t be. Windows 10 is largely similar to Windows 7 in its layout, and Windows 10 is equipped with a much greater range of helpful tools to assist all users in navigating their computers. Additionally, the upgrade from Windows 7 can be completely seamless, maintaining all of your programs and personal files in exactly the same place as they were. At NEPA Geeks, we guarantee that the process will be as simple and as stress-free as possible. Need help making the switch? Call us at 570-235-1946, and we'll handle it all from backing up your data, to protecting your computer by upgrading it to the latest version of Windows. You won't look back. Contact ...