Information Technology News & Information

Windows Shortcomings Highlight the Need for Improved Cybersecurity

Most of us use computers that run the Windows operating system. The ubiquity of Windows has certainly improved efficiency yet it also makes the operating system a convenient target for wrongdoers. As recent history has shown, hackers are setting their sights on Windows. The unfortunate truth is that this operating system is far from flawless, especially in the context of digital security. The Fallibility of Windows’ “God Mode” Windows devices have what is referred to as a “God Mode” that empowers those who are aware of its existence to tap into additional capabilities. This hack is lauded for the fact it provides direct access to an array of control panel menus that it subdivides into appropriate categories. Yet this time-saving mode also opens the door to the attacks of malicious “e-thugs”. Savvy hackers know how to use God Mode to access a computer user’s private data. A variation of this malware called Dynamer has also reared its ugly head. Dynamer nestles into a master control panel directory while remaining unseen within the folder dedicated to God Mode. This occurs due to the fact that the God mode folder is not always recognized by each and every application. As a result, security programs often fail to identify Dynamer’s presence. This covert malware accesses the Desktop Connections and RemoteApp applications on the control panel to conceal its activity. This nasty malware actually assigns itself the Windows command name of “com4” to prevent the system from pinpointing it as a threat. The fact that com4 is identified as a seemingly innocent Windows command precludes its deletion. Thankfully, it is possible to eliminate this malware by deleting it within the Task Manger and executing a command prompt. Powershell’s Vulnerability Malware also abuses system management tools through a code that specifically targets PowerShell. This Windows scripting program is a common target for hackers who aim to take advantage of Microsoft systems. PowerShell operates in the background, making it extremely difficult to identify potential threats. PowerShell can even be manipulated to pilfer system data including usernames and passwords even if an executable file does not exist. Trend Micro digital security aficionados report that PowerShell is also being abused to infiltrate computers with a highly nuanced malware that steals and/or manipulates tax return documents. The latest PowerShell exploitation involves a delivery of a FAREIT software that attempts to steal software along with computer users’ personal information. The FAREIT malware programs are generally employed in an attempt to download harmful code to systems and install programs to steal valuable or sensitive information. Examples of common FAREIT targets range from usernames to passwords, directory lists, server names and port numbers. Upper echelon hackers have even used this FAREIT variant to steal bitcoin currency. The newest version specifically targets Windows’ PowerShell with an infectious e-mail that contains a tainted Word or PDF file as an attachment. The hackers behind this malware have taken the time to disguise it as a legitimate business document such as a financial statement. The average employee often falls prey to this trap as he assumes that the attached file contains important information pertaining to his assigned responsibilities and/or the company in general. How to Fight Back Windows certainly has its fair share of shortcomings yet users are not powerless. Anyone who operates a Windows device should install security software to filter out spam messages and correspondence that includes potentially malicious files. {company} is the trusted choice when it comes to staying ahead of the latest information technology tips, tricks, and news. Contact us at {phone} or send us an email at {email} for more information.

Information Technology News & Information

Why CEOs Should Care About IT

Most of today’s CEOs realize the importance of IT. They hire professionals to handle it. They may also ask questions now and then about security risks or improving functionality. However, most CEOs are focused on other parts of the business management process. Small and mid-sized businesses are even less likely to have a CEO that’s actually invested in the quality of the company’s IT. But, CEOs simply have to care about IT on a more in-depth level. Do You Own Your IT? Growing companies need to invest in IT, that much is easy to see. However, CEOs need to do more than just put IT in place. They need to own it. If you own it, you understand the workings of, and the complications of, information technology investments and systems within your company. While many of today’s CEOs delegate these tasks to their VP or even someone lower on the pole, it is still the responsibility of the company’s CEO and shareholders to ensure the company’s IT is at its highest possible level. You’re busy. You have a lot on your plate. Why should you put more effort in your day on IT? The Advantages of CEO Attention Your time is money and that’s exactly why you need to put time into managing your IT systems. There are numerous benefits that come from the CEO’s attention to this important component of the business. Those benefits include the following: High-level Risks Exist The stories of small and large companies facing incredible threats as the result of viruses and ransomware threats are growing. Cyber security risks can be very costly for today’s businesses, even those with significant liability policies. Lawsuits for customer data leaks are also expensive, even if they never lead to a financial implication for the business owner. CEOs need to continuously monitor their business operations to avoid these risks. IT is at the heart of this. Managed IT Holds Your Business Together Consider all of the ways managed IT services are holding your business together. It aids and impacts every sector including the performance of key operations, the amount of uptime and downtime your company has, and the revenue it generates. A computer problem can hamper your human resource department, your sales generation, your credit card processing, and much, much more. Because it is such an integral component of your business operations, having a watchful eye on IT is necessary. Otherwise, you could be positioning your business for high risks and costly losses. How to Care for Your IT The good news is that even CEOs do not have to invest a great deal of their time into their IT if they have the right professionals in place. To start, CEOs need to learn about IT and invest in it. They need to see the value it provides to the company. After this, it becomes necessary to focus on bringing in the right talent and professionals to manage IT effectively and efficiently. Once these pros are in place, CEOs shouldn’t step off the gas, though. They need to continue to keep the lines of communication open, listen to their IT teams about needs and areas of concern, and constantly monitor the industry for changes and threats. It may sound like a great deal of work, and it is, but it is at the heart of keeping your business structure safe and your profits in line with your goals. {company} is the trusted choice in IT solutions when it comes to staying ahead of the industry and the importance of implementing an IT policy from the top down. Contact us at {phone} or send us an email at {email} for more information.

Information Technology News & Information

Are You FB Friends With Your Hacker?

Social Media Spying By Cyber Criminals Is On The Rise   You know those random friend requests that you get from people you’ve never met? They may not be entirely accidental or random at all — in fact, many cybercriminals deploy fake profiles in hopes of a friend request slipping through the cracks … and it’s working. In addition to social media spying, hackers regularly employ social engineering, malware-based phishing, old hardware hacking, and voice phishing (aka “Vishing”) to compromise user’s privacy and steal his or her information. Some of these methods may be unscrupulous, but they aren’t technically illegal — which makes it even more important for users to stay vigilant in their online activity and security efforts. Top Five Hacker Favorites: Data Collection Methods That Can Make Your Information Vulnerable Keep your information secure and mitigate your risk of a stolen identity by being aware of these most common methods — and take action when necessary to protect yourself against them: Social Media Spying With the advent of social media and the somewhat viral dependency many people have on it, it’s no wonder that cybercriminals are turning to social as a way to triage potential victims. A public forum on which soon-to-be victims spend hours sharing their personal information, social media is low-hanging fruit — a true hacker’s dreamscape. You can never be 100 percent certain that your information is secure on any of the most popular social media platforms: Security settings reset themselves; platform updates cause private profiles to become public; and unsuspecting users make connections with total strangers either by accident or because of sheer laziness. All of these instances open up a vault of private information that’s free for the hacker’s taking. Some of the more obvious details users should avoid revealing on their social media pages include personal information such as maiden names, birth dates and phone numbers. Of course, vacation status should never be advertised either — it can give thieves a perfect opportunity to track down your residence and take advantage of your absence. Social Engineering Hackers often create traps to generate the exposure of personal information. Known as “social engineering,” this method depends on social interaction, trust, and human empathy to be effective. When it’s done successfully, social engineering can reap great rewards for the hacker in terms of useful personal data — and it requires a lot less guesswork than traditional methods. In social engineering hacks, cybercriminals portray themselves as a legitimate company or individual to gain a victim’s trust and exploit his or her need for a product or service. Industry experts recommend being especially cautious of urgent emails that request confirmation of payments, login details and social media updates. Old Hardware Restoration Experts recommend being extra-vigilant when throwing away or trading in old smartphones, tablets and computer hardware. Never get rid of these devices without being absolutely sure you have wiped them clean of personal data. If you are tossing an old hard drive, be sure to completely destroy the data before you part ways with it. If you neglect this all-important step, you could be handing over your identity to a savvy cybercriminal that makes his or her living by restoring old user data. Malware-Based Phishing These days, malware has become one of the hacker’s most prolific tools of corruption. By making victims feel they need to subscribe to a security fix or patch to avoid losing valuable computer files, hackers are able to take over your computer hardware. In some cases, these cybercriminals take things a step further by making expensive ransomware demands in exchange for the release of personal information and files — and they won’t return your data until you pay up. Even worse, in some cases, they take the money and demand more before turning over a victim’s files. Vishing (aka voice phishing) Beware of cybercriminals that pose as government agencies via phone and voicemail. These hackers will often appeal to your sense of trust by offering urgent, confidential information, but before you can access it, you must first confirm it with sensitive personal data. {company} is the trusted choice when it comes to staying ahead of the latest information technology security safeguards, innovations, and news. If you are concerned that you may be the victim of a cyberattack, contact us at {phone} or send us an email at {email} for more information.

Information Technology News & Information

Is Your Organization Prepared for a Ransomware Attack?

Imagine arriving at work, attempting to log onto your computer, and being unable to access your files. Instead, you’re greeted with a message instructing you to pay a fine or lose all of your data forever. Unfortunately, this exact scenario — in which cybercriminals use “ransomware,” a type of malware, to hold the contents of users’ computers hostage — is increasingly prevalent at workplaces all over the country. Just how widespread is the problem? Approximately 5,700 computers are infected every day, according to Norton by Symantec. But your company doesn’t have to become a statistic. As legislators work feverishly to counter this new threat to the American workplace, business owners can also do their part to prevent ransomware attacks. Let’s take a closer look at this troubling issue, along with steps you can take to safeguard your organization. The Ramping Up of Ransomware Ransomware is an equal opportunity attacker. From increased incidences among House of Representatives staff last month resulting in blocked access to YahooMail to a crippling assault earlier this year on Hollywood Presbyterian Medical Center’s during which the organization was forced to pay $17,000 for restored use of its computer systems, ransomware can and does impact organizations of all shapes and sizes. The potential fallout of ransomware is not lost on government officials. Nor is the fact that many organizations are woefully unprepared to fend off ransomware attacks. In an attempt to deter cybercriminals from preying on computer users, a bill outlawing ransomware only recently passed the Senate Committee yet still has far to go in the legislative process before becoming law. Preventing Ransomware Attacks According to FBI statistics, ransomware attacks cost victims more than $209 million in the first three months of 2016 alone. The worst part? Even if you could solve the problem by simply paying up, the truth is that most data is never returned or restored. Rather than take that risk, shore up your defenses through proactive planning aimed at keeping cybercriminals out, including the following five steps: 1. Back Up An effective backup policy can mean the difference between recovering infected systems and losing them forever. Serialized backups ensure that older files are available should new ones become inaccessible, while offline storage prevents ransomware from spreading. 2. Have a Layered Defense Installing an external firewall is important, but what happens if malware gets through this first line of defense? Additional monitoring and detection technologies, including internal firewalls and web, email and content filters, further strengthen your system from hackers. 3. Keep Current Cybercriminals are nothing if not persistent. In other words, they’re constantly on the lookout for both known and new system vulnerabilities. Remaining up to date with the latest patches and other security measures helps you stay ahead of their untrustworthy tactics. 4. Inform and Educate Ransomware works by targeting individual computers and users. Educating employees about best practices for preventing ransomware, such as alerting IT upon receipt of a suspicious email or attachment and refraining from using personal email on work computers, is an important part of the process. 5. Reduce User Privileges But why leave the welfare of your company and its invaluable data in the hands of employees? Restricting user access gives business owners critical control by limiting the extent to which a malware infection can spread if it does penetrate your initial protective measures. Dealing with ransomware is at best an unwelcome distraction and at worst a threat to survival for organizations in today’s fast-paced, ultra-competitive business landscape. But you don’t have to go it alone. {Company} is the trusted choice when it comes to staying ahead of the latest information technology tips, tricks, and news. Contact us at {phone} or send us an email at {email} for more information.

Information Technology News & Information

The Darknet is the Internet’s Hangout for Outlaws

You run a reputable business. Your online presence is a nicely designed website with a cache of great keywords and agile ad words. When the web crawler spider comes crawling, you get a high position on the results page inviting anyone to click and visit. However, what if your product was pirated films or pornography that mainstream porno sites wouldn’t touch with a…you know? There actually was a website that sold illegal drugs. Until the FBI shut it down and arrested its founder, it had raked in over $1.2 billion. The site name is Silk Road, but don’t bother trying to gain entry with your current browser. Silk Road traveled in the Darknet– and you can’t get there from here without a browsing tool known as ToR or through password-protected forums. What is the Darknet? The Internet your business uses every day is but a fraction of the entire worldwide web. The Darknet is where people go to interact—buy, sell, plot—in total anonymity. The Darknet, according to BatBlue, a cloud security company, has anywhere from 200,000 to 400,000 sites. Those sites are at hidden locations, further protected by encryption and virtual private networks. What is ToR? ToR is the abbreviation for The Onion Router. It is a technology that gives Darknet surfers the anonymity (and security from detection) they seek. The technology, like the Internet itself, is the brain child of the military—the U.S. Navy in the instant case—which, in the mid-1990s, developed its encryption to hide military communications. Using a ToR web-based browser, the user’s communications bounce off multiple ToR servers before they reach their destination. That makes it pretty much impossible for anyone to trace Darknet traffic. Also, ToR hides websites and applications using strings of random characters, followed by the “.onion” domain name. What is on the Darknet? As mentioned previously, the Darknet is the marketplace for a lot of illegal substances, services, and private communications by people with sinister or violent intentions. A virtual black market, with the tools available today, Darknet remains highly resistant to government regulation or law enforcement. The Bright Side of the Darknet While the Darknet is a haven for hanky-panky, it does offer a protection for free speech, especially in countries that don’t operate under their version of the First Amendment. The Darknet is also home to many services providing secure messaging and file sharing. Should You Go Slumming on the Darknet? The Darknet is the equivalent of the Wild West, and its preferred currency is Bitcoins—also anonymous and irretrievable in case of theft. Considering the types that skulk there—scammers, hackers, weapons dealers, etc.—it’s best to steer clear. The mainstream surface web has all the services any reputable person needs. On the other hand, if you’re looking for absolute security in communications and guaranteed anonymity, a trip to the Darknet with due consideration and care might be in order. Looking for the best advice in staying away from the dark side of security threats or optimizing your online presence so that the web crawler won’t pass you by? {company} is the trusted choice when it comes to staying ahead of the latest information technology tips, tricks, and news. Contact us at {phone} or send us an email at {email} for more information.

Information Technology News & Information

Why Apple’s Time Machine Is Perfect for Business Backup

The inability to access information, or the total loss due to malfunctioning hardware, can cause a total shutdown in activity. To a business owner, this can grind operations to a halt, and the lost time equates to lost dollars because of decreased productivity, or, worse, the inability to simply pick up where he or she left off. Web-based tools in the software-as-a-service model are highly sought-after for their reliability and ease of access, but what about the documents that don’t live in the cloud? To business owners, a reliable backup system is part of any business continuity plan and can be the difference between a critical shutdown and a speedy recovery, allowing the company to recover in minutes without skipping a beat. While countless off-the-shelf options are available, Apple’s Time Machine is perhaps the perfect tool for the job based on its effectiveness and ease of use, but here are the most common events that can lead to data loss in the first place: Damage to the hardware, ranging from natural disasters to spilled coffee Hard drive failure stemming from the “shelf life” of the internal disc Theft or loss of the computer itself Corrupted files from malware or viruses With any good backup regiment, the most important factor is not merely backing up data frequently, but automatically. Enabling your system to accomplish this task behind the scenes not only saves time, but also ensures that human error won’t come into play as a cause for blame. The setup couldn’t be simpler, as the only requirement is that Time Machine is enabled from the Systems menu, which will prompt the user to select an external hard drive via USB or Firewire. Upon completion, Time Machine not only runs on its own, but it can store different versions of the same file, allowing the user to return to a particular period in time to regain access to a document as it once existed. This futuristic feature not only works for individual files but for the entire system, even allowing users to restore settings as they once were. The initial backup can take some time, since it’s duplicating every single byte of storage on the hard drive, but the regular backups that occur thereafter are quick and seamless as the system needs to only reflect the changes that have occurred in the meantime. In instances in which users also use additional external drives or USB flash drives, one even has the option to choose that these too are on the radar of Time Machine, mirroring their content as well. Above all, it’s essential that data is not only backed up, but secure in its new destination. File encryption, available through Time Machine, helps ensure that the documents you’ve set aside for safekeeping are password protected and won’t fall into the wrong hands. While I prefer Time Machine, no matter the techniques you choose, it’s vital that business owners have a solution to back up data early and often. Having the right tools in place ensures that, should the worst occur, regaining access to a single file or the entire system can be resolved with a seamless restoration process. {company} is the trusted choice when it comes to staying ahead of the latest information technology tips, tricks, and news. Contact us at {phone} or send us an email at {email} for more information on data security or business continuity solutions.

Information Technology News & Information

The Growing Problem of Apple Malware and How To Protect Yourself Against It

For many years now, one of the primary reasons for using an Apple Mac computer was the dearth of viruses and malware that affect Apple’s OS X systems. While malware that targets Apple computers is still rarely encountered in the wild, there are a few notable examples that users should protect themselves against. Ransomware is one of the newest types to enter the fray and, for the first time, an Apple variant is propagating through the World Wide Web at an alarming pace. What is Ransomware? Malware comes in all shapes and forms, but perhaps the type users fear most is ransomware. These types of applications effectively encrypt the your hard drive and hold its contents ransom for a sum of money. Once you pay, your drive is decrypted—until the attacker decides to strike again. This type of malware is a well-known problem for PC owners, who have developed a wide array of defenses against it. In the world of OS X, however, it was virtually unknown until KeRanger showed up in 2016. This software hitches a ride into your system on a popular BitTorrent download application called Transmission. If you regularly use this application, immediately verify that you’re not using version 2.90, which is the update the software snuck into. How To Protect Yourself Against Malware One of the most problematic things about Apple malware is that some types masquerade as the very application you would want to use to get rid of malware. Avoid downloading pop-up malware protection applications like MacDefender, MacProtector or MacSecurity. The best way to protect yourself against malware is by keeping your Mac up to date. Use the latest versions of all your applications—especially those that accept and process incoming network connections (like Transmission does). Additionally, make sure you’re running the latest version of Mac OS X and keep your firewall on. Apple’s operating systems feature a built-in malware scanning tool named XProtect. The company regularly updates its database with newly encountered malware variants, which is why keeping your system updated is so important. Third-party malware protection applications are also useful, but should always come from trusted sources. Download free software from recognized brands such as Sophos and Norton. Other free malware protection applications include ClamXav and BitDefender. With highly reputable brand names such as these offering free malware protection, you should be suspicious of any malware protection application that costs money. The Future of Apple Malware Experts predict that Apple malware will become a more prevalent issue over time. The year 2016, in particular, is cited as a year in which Apple system security will be particularly tested. The introduction of Apple Pay into new OS X systems provides a clear incentive for attackers to pry open the security of Apple’s systems, according to FireEye, a specialty security firm. This is especially true of Apple computers used in corporate environments, where business espionage is an increasingly troubling trend. Whether you use a MacBook or the powerhouse Mac Pro, keep yourself safe by installing the latest updates and a reputable malware protection program. You’ll be glad you did. {company} is the trusted choice when it comes to staying ahead of the latest information technology tips, tricks, and news. Contact us at {phone} or send us an email at {email} for more information.

Information Technology News & Information

What Memorial Day is REALLY All About  

It’s easy to think of Memorial Day as a convenient day off in a busy calendar and the start of summer, but we suggest you take a step back and think a bit harder about it. Millions of men and women have put their lives on the line to defend our collective way of life. It’s hard for those who have not made that sacrifice to really understand what they have done. Take advantage of a few spare moments on Memorial Day to think about that. Most of us have friends, colleagues, or relatives who have served in the military. Perhaps you have an older relative who served in Vietnam, Korea, or even World War II. Imagine being away from home for months or even years, wondering how your family is doing. (For those older veterans who served before cell phones and internet, that often meant being totally out of communication, feeling lucky to get a letter at some point.) Imagine being called on to do things that you thought were impossible, either mentally or physically. Imagine seeing your friends not survive a day of battle, and why it was them instead of you. Supporting Veterans in a Tangible Way You can show your support of our service men and women who have faced things unimaginable to the rest of us by doing business with veteran-owned businesses. Think of all the skills that people learn while serving in the military – logistics, transportation, maintenance, security, communication, and management. If someone can solve those challenges on and around the battlefield, they can probably handle whatever issue you bring into their place of business. That even applies in our own field of information technology. The Department of Defense has some of the most sophisticated computer systems in the world, and there are plenty of veterans out there who are putting their experience to use as IT experts. We wouldn’t normally promote our competitors, but this is the one and only instance when we can make an exception. It’s the most worthy cause there is, and if it means that a veteran-owned business gets a customer and we don’t, well, then that’s one way that we can contribute to supporting veterans. Perhaps it makes that “thank you” sound like we really mean it. {company} is the trusted choice when it comes to staying ahead of the latest information technology tips, tricks, and news. Contact us at {phone} or send us an email at {email} for more information. Please join us in honoring our veterans on Memorial Day.

Information Technology News & Information

How Are Most Computer Viruses Spread?

Hackers constantly look for new ways to spread viruses, but their favorite distribution method is one of the oldest: unsolicited email. A recent report from Kaspersky Lab revealed that malware spam continues to grow as Web browser security improves and makes it harder to infect computers via websites. Spam Trends During the past year, the total quantity of unsolicited messages fell. However, the percentage containing virus attachments more than tripled. This greatly increases the likelihood that you or your employees will receive malicious communications in the near future. Many harmful messages draw attention by focusing on terrorism and other events in the news. Some malware spammers have become more skillful in recent years. They personalize the information or try hard to make email appear as if it comes from legitimate organizations. Kaspersky Labs reports that more and more email viruses install ransomware. When recipients open an attachment, this malware encrypts data on their PCs. It often proves difficult or impossible to recover the files without paying a “ransom” to hackers. For example, one common email virus looks as if Microsoft sent it. The text claims that users can upgrade to Windows 10 by downloading an attachment. This file actually infects the recipient’s computer with ransomware and blocks access to every file on its hard drive, according to Fox. Education Companies can protect their computers and data by educating office workers about safe Internet practices. Employees should learn to visit websites directly instead of using email links. They ought to carefully check messages for fake “from” addresses, unprofessional language and other suspicious attributes. Businesses mustn’t rely on one-time trainings to warn staff members about Internet dangers. People eventually forget some of the advice, and viruses spread in different ways each year. Memos, newsletters and bulletin board notices can help keep employees informed. A spam analysis expert at a major Internet security company recently said that “efforts to dupe victims are becoming more sophisticated year on year.” Consequently, it makes sense for office workers to contact the IT staff or a manager when they have any concerns about possible viruses. Precautions Business owners and employees can sometimes avoid malware by using anti-virus utilities to scan files before opening them. However, such tools don’t succeed in detecting every virus. If in doubt, contact a sender by phone to confirm that he or she actually sent an attachment. Never click on “unsubscribe” links in spam Hackers may disguise malicious programs as photos Don’t let Microsoft Word documents run macros When sending messages to a group of staff members or contractors, always put their email addresses in the “bcc” field. Everyone can see all of the addresses under “cc” or “to”; if any recipient has a computer virus, it may gain access to the entire list. Filters Many commercial email services and programs let businesses activate and customize spam filters. You can stop malware from reaching inboxes by automatically returning messages sent from known spammers’ accounts. Consider blocking certain countries, IP addresses or domain names as well. At the same time, be careful not to intercept normal correspondence. ReturnPath warns that filters block about one out of five legitimate messages people send to businesses. If you banish all email from an entire hosting or Internet service provider, this could discourage potential customers. To sum it up, email-based viruses pose a growing threat that employers must take seriously. Filters, anti-virus programs and training can decrease the risk. Many business owners look to {company} when they want to stay up to date on the latest IT strategies and news. Please call {phone} or contact {email} to learn more.  

Information Technology News & Information

An Apple a Day Needs Encryption, OK

Long-gone are the days when Apple users were spared the wrath of hackers and malicious users. Now that entire industries are based around Mac tech, the thieves have come looking for the money. Although Apple operating systems are considered much more stable than Windows, the truth is that Apple systems have not been tested by the tech underworld to the level that Windows has. Stay out ahead of the curve when it comes to protecting your Apple hardware. Here are the tips that you need to know. Pick the Security that Law Enforcement Hates Unlike Windows, the Apple platform leaves no backdoors, a major point of contention for law enforcement. It also makes security much easier for developers to design, resulting in some incredibly tight packages that even the police and the Feds have trouble hacking. This is the security that you want, known as full disk encryption (FDE). What are the advantages of FDE? Encryption that is defined as full disk starts from the startup drive. FDE makes your data completely impossible to recover without at least one level of security when your computer is off. When it is on, your drive is still encrypted and heavily fortified. You also have the ability to wipe your drive almost instantaneously if you ever feel as though you have been compromised. Encrypting Your Hard Drive Although encryption is a process that cannot be reversed, there are no downsides if you can get past the initial inconvenience. If your drive is not encrypted currently, you will have to wait a few hours for the process to complete. During this time, your computer will slow down tremendously, making it virtually unusable for any practical purpose while the encryption is initializing. A quick solution: Initiate the process before going to bed on a weekend, and you will wake up to a fully encrypted and protected drive without having to directly deal with any of the downsides of initialization. The Best Choice for Mac Drive Encryption The number one choice for Mac drive encryption is FileVault, now on its second iteration, FileVault 2. Apple has a great deal of support for this procedure and will give you step-by-step instructions for getting your hard drive encrypted. Here are the basic steps: After installing File Vault 2, you will need to sign off on many warnings and take down the Recovery Key that the OS will make for your drive. Do not forget this key, because it is the only access that you will have to your drive if you forget the account password. Start the conversion, and do it during a downtime, as stated. Your fan will likely start blowing like mad, and your computer will slow down tremendously. This is all par for the course. Keep your iCloud information close to the chest after encryption. If someone gets this information, it does entail a slight security risk. If you want to store your Recovery Key on Apple servers, you can, but this limits your security slightly as well. Because the government has access to the servers, you are compromised when it comes to the Feds and hackers who know how to get around enterprise level security systems (and plenty of them are around). {company} is the trusted choice when it comes to staying ahead of the latest information technology tips, tricks, and news. Contact us at {phone} or send us an email at {email} for more information.