Information Technology News & Information Services Tech Tips

If you have an Nvidia Graphics Card Update Your Drivers!

If you have an Nvidia graphics card, it is within your best interest to make sure your drivers are up to date. On May 9, Nvidia released a statement stating that they have patched security holes within their display drivers that could have led to a denial of service attacks, or could leave your personal information exposed for hackers.  Drive update 430.64 was released on May 9 and remedies the security holes outlined below. Vulnerability CVE-2019-5675 is an issue within the kernel of the GPU, which is used to handle only trusted windows files. This issue can be exploited and used to launch denial of service attacks (DoS) and allow hackers administrative privileges over your system. Lastly, vulnerability CVE-2019-5677, another issue within the kernel, can lead to denial of service attacks (DoS).   It is important that you update your cards immediately to avoid falling victim to any of these vulnerabilities. The newest driver update, released May 9, 2019, corrects each of the vulnerabilities listed above.    

Information Technology News & Information Tech Tips

Tax Season Is Here and So Are The Thieves

Tax season is no doubt a happy time for many Americans. The extra boost in cash from paying taxes makes everyone’s wallet feel great! However, where there is money, there are unwelcome guests. While many are preparing their taxes and W-2 forms, hackers are busy developing malware to infect and steal information from unsuspecting victims. It is important that we understand how these hackers aim to get access to banking information. What to Look For? The majority of these attacks come from email spam. By making the emails appears to be from large firms such as Paychex and ADP, these hackers aim to deceive people into opening and downloading malicious Microsoft Excel files. One downloaded, the Excel file will execute one of the most effective banking Trojans, Trickbot. While these attacks usually target businesses, that does not mean an individual will not come across this attack. The cybercriminals do their best to disguise the email as friendly, going as far as to replicate the names and emails of HR services and accounting companies. By making the email appear to be from someone the recipient knows, or is aware of, the guard of that person is lowered, making them more likely to open attachments. Just one unaware person can allow Trickbot to enter the company and spread to every computer on the network. What is Trickbot? Trickbot is malware specifically designed to silently infect a computer and steal sensitive data such as, banking credentials. Once the credentials are acquired, the Trojan proceeds to setup wire fraud directly from your own computer. Once infected, hackers have complete control over your machine, and can spread the attack to any other machines that are on the network. Trickbot is a top ranking Trojan and is still in development, adding new “skills” to the virus, making it even more destructive. What Can I Do to Stay Safe? In order to keep yourself protected during tax season, follow these safety tips: The IRS only uses snail mail as a means of communication. Therefore, if you receive an email, phone call, text message, social media message, do not respond. If you receive an email and it seems suspicious, do not click, open, or download any attachments or links. If the email is from someone you know, it is best to verify with the sender before opening any attachments, ZIP files, or RAR files. Disable macros by default in all Office applications. If a downloaded office attachment asks you to enable macros immediately close the excel and delete the file. Many malicious files need macros enabled in order to execute, and this includes Trickbot, which uses excel to inject its malicious code. Use updated antivirus protection and ensure you are protected against Trickbot. Make sure your computer is up to date and has no pending updates. By taking these extra steps you can ensure that you do not become the victim of Trickbot.

Information Technology News & Information Tech Tips

Malware and How It Affects Healthcare Providers

At Hammett Technologies, we cannot stress enough how important it is that you have proper security in place to protect your company and personal information from potential attacks. Most malware today is designed to steal sensitive information from a victim’s computer, making healthcare providers high-priority targets. Cyber security expects in Israel recently hacked into a local hospital, changing CT and MRI images of patients, either adding or taking away cancerous growths. While this attack was simulated, though the use of algorithms, cyber security researchers were able to accurately remove and add cancerous growths. This edited images caused doctors, as well as the hospitals own AI-assisted tools, to misdiagnose over 90% of their patients. This attack was meant to spread awareness to the vulnerability of not just hospital, but all healthcare providers. If hackers were to replicate this attack, the consequence would be massive. This type of attack can lead some to believe they have cancer, or worse can lead someone to die by thinking they do not. Furthermore, this kind of attack could go hand in hand with ransomware. If attempting to steal money from the hospital, a hacker could infect the machine with ransomware, “…holding the medical imagery hostage,” stated the cyber security team. It is important to understand that this issue does not relate to just hospital, but all healthcare providers. If your company handles sensitive information, your company is being watch by hackers. Therefore, it is vital that you take steps to ensure that customer information is safe. Ensure that all HIPAA Compliances are met, for both your company’s safety and the customers. Ensure firewalls are in place and are regularly updated and maintained. Lock down the network and all devices with strong  passwords (8+ characters, symbols, numbers). If you are worried about your company’s compliance or safety, give Hammett Technologies a call! We can give you a free assessment and let you know where you stand against potential threats. When you partner with Hammett Technologies you don’t become a client, you become family. Sources: https://arxiv.org/pdf/1901.03597.pdf

Information Technology News & Information Tech Tips

Your Email Is on Hold

Another example of how someone will attempt to trick you into giving out your personal information! Please, make sure you are always paying attention when going through your email. If an email appears sketchy, it most likely is! Most of the time, the biggest give away is the senders email address! The email address “accounts@office365.micros0ft.tech” should stand out as a red flag. Upon closer inspection you will notice that the “O” in Microsoft is in fact a “0”(zero). Once you notice something like this, make the email as spam and move along! Remember to always be on the lookout! If possible, get in contact with the company that email appears to be from! This will help you gain peace of mind, as well as notify the company of a possible issue!

Information Technology News & Information Tech Tips

Marriot Data Breach and How It Could Affect You

Unfortunately, this attack may affect those of you who travel the most. If you have stayed at any of the following Starwood brand hotels, including the Marriot, your information could have been compromised. Westin Sheraton The Lucury Collection Four Points by Sheraton W Hotels St. Regis Le Méridien Aloft Element Tribute Portfolio Design Hotels If you have stay at one of the hotels, it is in your best interest that you assume your information has been compromised! Take precautions and prepare yourself for a variety of social engineering attacks. What to Look For Spear Phishing Alert: Starwood Preferred Guests accounts have been breached, therefore it is likely that attackers have access to both your work and personal email addresses. Now, having your email address, attacks will send you emails that appear to be from real corporations, in an attempt to gain further access to your personal information! Be on patrol for these kinds of email, and if you do spot one, mark it as spam and report it immediately Copycat Phishing and SMS Phishing: With your information now floating around in the wild, attackers will try numerous methods in order to gain further access into your personal information! Marriot has made a statement saying it would email any Starwood Preferred Guests as well as those who may be impacted. Therefore, it is safe to assume that the attackers will now always be sending you and email that will look almost identical. Therefore, to air on the side of caution, do not open any emails, click on any links, or download any attachments that have come from the Marriott or Starwood Hotels. Furthermore, do not respond to any voicemails, or texts that claim they are representatives from the hotels listed above. Instead, look up the hotel and call them directly yourself! Have a Chat with Accounting: Odds are you have a business credit card, and if you have stayed at one of the following hotels in the past 4 years, odds are the bad guys have that same exact card now. Therefore, ask accounting to watch the card for any suspicious activity! If you use your own credit card and get reimbursed, call your bank and inform them of the situation, change your password, and monitor your account closely! Do Not Search for “WebWatcher”: Marriott is offering those who were targeted in the US, Canada, and the UK, a free, one year subscription to a Kroll Identity Service called “WebWatcher”. This service monitors “internet sites where personal information is shared”. Decoded that means they watch hacking sites on the deep web for compromised data records. DO NOT search the web for this program. This search will lead you to programs that, while they carry the same name,  are hosts to spyware and other dangerous viruses.  If you want to sign up for the free monitoring service, follow the links at info.starwoodhotels.com to country specific versions. Traveling Safe When leaving for an office trip or vacation make sure you: before leaving the office while packing in the taxi at the airport in flight at meetings and conferences at the hotel Following these steps will make sure that you are secure when traveling!

Information Technology News & Information Tech Tips

Be On The Lookout!

The internet can be a dangerous place. Therefore, as we traverse the digital landscape we must always stay on high alert! Recently, a new type of phishing email has hit our digital world. Be one the lookout for emails that are from my-sharepointdrive@notification.messages365.org. At first glance, this email appears to come from Share Point, giving oneself a false sense of security, but do not be fooled! This email, if opened, will contaminate your computer. This false sense of security is only further by the header of the message reading “This mail is from a trusted sender.”. If you receive a message that looks like this, do not open the attachment! When you receive a suspicious email, always make sure to carefully go over the sender information. Ask yourself these questions: “Do I know this sender?” and “Does this email pertain to something I am familiar with?”. Even if you can answer “yes” to both questions, you should remain vigilant. Always be on the look out for anything that is out of place or suspicious. By playing it safe and paying attention you will save yourself both time and money! At Hammett Technologies we put your online security as a top priority. Be with a team you can trust, become a Hammett Technologies Partner today!

Information Technology News & Information

Do You Have Good Computer Habits?

We know it’s important to have good habits in many parts of our lives, from our work to our daily hygiene. However, quite a few of us forget that we need to have good computer habits, too. Developing wise practices in connection with our computers and smartphones can make our lives much easier and help us to stay much safer on the internet. Back Up Your Files One thing that many people fail to do is back up their files. All it takes is one catastrophic computer crash and days or even months of work can be lost. Priceless family photos, fun videos with friends, key work files, and important school assignments that were a work in progress can be lost. Backing up your files isn’t that hard nor is it expensive. And, to make things even better and easier, you have many different options from cloud-based backups (such as GoogleDrive, OneDrive, or DropBox), convenient USB thumb drives, portable hard drives, and even specialized backup drives. A good practice is to make sure your files are backed up daily, or at least weekly. Keep Your Software Updated Software updates can be a pain, but they are vital to ensuring that your computer and software runs smoothly. In fact, one of the major reasons that updates are released is to fix bugs and issues that could make your computer vulnerable to cyber threats. Hackers know about these bugs and vulnerabilities. If you don’t allow your system to install the patches and fixes, then you are making yourself a prime target for a cyber attack. Keep in mind that you don’t have to perform updates in the middle of your work anymore. Most software (and smartphones) will give you options for when the update should take place, so you can choose times when you aren’t busy on your computer. Be Smart When Using Public Wi-Fi Public Wi-Fi in places like fast food restaurants and coffee shops can be tempting to use when you need an internet connection, but they can also be dangerous. These public Wi-Fi networks are a common target of hackers, and even hackers with minimal skill can quickly figure out things like your social media credentials and more. If you do have to use public Wi-Fi, take safety precautions such as turning off network discovery, file sharing, and printer sharing and make sure your firewall is turned on. Don’t be an easy target for hackers. Make Use of Antivirus Software and Passwords Would you leave your front door unlocked if you lived in a high-crime neighborhood? Well, the internet is a high-crime neighborhood. Failure to use updated anti-virus software and good passwords is the same as leaving your door unlocked. You can’t afford to make it easy for the wrong people to access your personal and financial information. Your first line of defense lies in the passwords you choose. Don’t use easy to guess passwords, and don’t use the same passwords for everything. Include letters and symbols with your passwords to make them harder to crack, and add some numbers for good measure. Your second line of defense, much like a deadbolt for your front door, is anti-virus and firewall software. They don’t have to be expensive in order to do a good job of protecting your computer. It is also vital that you keep your anti-virus and firewall software updated and don’t ignore alerts they provide. Be Careful with Email Going back to our analogy of living in a high crime area: if your doorbell rang in the middle of the night, would you fling the door open and invite whoever it was inside? You would probably want to make sure who it was, and even check their ID if they claimed to be some kind of official demanding access to your home. Strangely enough, far too often we inadvertently provide access to individuals with malicious intentions when we click on links in emails without making sure where those emails are really from. In short, don’t open an email unless you have a good idea of who it is from, and beware of clicking links in emails even if they seem to be from friends. Be cautious about opening attachments, too. In short, be as careful with your email as you are with your front door. Conclusion You work hard to keep yourself safe from physical dangers such as criminals and disease. It makes sense that you should work just as hard to keep your electronic devices safe, too. Backing up files (including documents, photos, and videos), keeping your software updated, and being smart when on public Wi-Fi is a good start. Add to that antivirus and firewall software, robust passwords, and the careful use of email and you are on the road to developing excellent computer habits that will keep your files, data, and personal information safe.

Information Technology News & Information

Google My Business Reviews: The 3 Critical Things You Need to Know

Google My Business is an excellent tool for establishing and tracking your company’s online presence. Included in Google My Business are tools to help you manage customer reviews. However, in order to get the most out of the review tools, you need to know (1) how to find your reviews, (2) how to encourage customers to share reviews, and (3) how to be alerted when you do receive reviews. 1. How to Find Your Reviews In order to both see and manage your Google My Business reviews, you need to pay a visit to this site: business.google.com. Login, and once you are in, you can see your own My Business page. This allows you to, among other things, see and respond to the feedback your clients have provided through Google reviews. You’ll find a link to Reviews on the left-hand side of the dashboard (it has a star icon beside it). This will open up a dedicated review page that allows you to write and edit constructive responses. Note that this also allows you to select one of three basic views: All, Replied (that would be, of course, reviews you have already replied to), and Haven’t Replied (which would be the reviews that you haven’t posted a reply to yet). If you are still new to Google My Business or just don’t have very many reviews yet, you will want to start requesting reviews from your customers. With more and more people depending on the internet for reviews of everything from cell phone plans to home repair services, it is important that your company have reviews from real customers posted on Google. 2. How to Encourage Customers to Share Reviews Trying to get great reviews can be tricky. Google My Business web pages do not offer a way to directly request a review from a customer. There is a workaround, however. To get a URL to promote to your clients, start by searching for your company from within Google maps (maps.google.com). This reason you need to go to Google maps is simple: at the bottom of your company listing in Google maps, there is a link to post a review of your company. Once you are on your company’s map page, copy that URL. Then open up a URL shortening service such as bitly so that you can shorten that URL. With bitly, just paste in your URL and click on Shorten. You will receive a very short URL that you can copy and paste to your company’s website, emails, invoices, email signatures, business cards, and other materials. This makes it much easier for your customers to respond with feedback without having to search for your business on Google. The easier you make it for people to provide reviews, the more reviews that will begin to come in. 3. How to Be Alerted When You Do Receive Reviews Once you are actively promoting reviews, you need to know when reviews are posted so that you can respond to them. It is important to quickly acknowledge reviews, both the good ones and the bad ones. Poor reviews especially need attention, and your company should try to make contact with the disgruntled customer and, if possible, take the discussion offline. However, you want others looking through your reviews to see that when a customer is dissatisfied, your business will reach out to fix the situation – even when the review is unfair. It is very important that a negative review does not sit out on the internet with no response. Fortunately, there is a way to receive an alert as soon as a review is posted. To receive alerts about reviews, start by returning to the Google My Business homepage where you should still be logged in. Look toward the bottom of the right-hand side where it says Settings (there will be a gear icon next to it). Click on Settings, which will open the Email Notifications page. About halfway down, you will see an option that says Customer reviews. If you click the checkbox on the right-hand side of this option, you will receive email alerts when a customer posts a review. That is all you need to do to be alerted when a customer posts a review. Conclusion Your company’s reputation online is very important, and it is critical that you receive feedback in the way of reviews. Google My Business has the tools you need to manage those reviews, including tracking them, responding to them, and being alerted when they are posted online. There isn’t a direct way to request reviews from your customers, but smart use of a link in the Google Maps listing of your business, combined with a URL shortening service, can help you gather those reviews you need.

Information Technology News & Information

Happy Spreadsheet Day!!!

What Are You Doing for Spreadsheet Day? Spreadsheets: some people love them, some people hate them, and some people are a little afraid of them. No matter which category you may currently fall into, you probably know that spreadsheets are vital to the inner workings of organizations ranging in size from massive Fortune 500 companies to small, locally owned businesses. At this very moment, millions of spreadsheets are probably open all across the world – and it seems fitting that there is a day to celebrate the birth of the modern digital spreadsheet. VisiCalc, the First Spreadsheet Program October was chosen for the month in which Spreadsheet Day would occur for a very simple reason that not many people are aware of: it was October 17 of 1979 when the first spreadsheet program was released. It was called VisiCalc, for those of you who may not have been alive then, and it ran on the Apple II computer. With the release of this software, the often overwhelming task of organizing massive amounts of numerical data not only became streamlined but, for some of us, actually became enjoyable. VisiCalc (whose name means Visible Calculator) was the brainchild of Dan Bricklin of Software Arts. It functioned much like a paper spreadsheet, hence its classification as a spreadsheet program. But unlike a paper spreadsheet, you didn’t need a pencil or an eraser. And the calculations could be performed automatically and with incredible accuracy. By running on the Apple II computer, the power of spreadsheets became accessible not just to corporations and large organizations but too small businesses and homeowners, too. There are other things that set VisiCalc apart from previous attempts to develop electronic spreadsheets, such as the instant recalculation of values when the value in a dependent cell was changed, or it’s interactive WYSIWYG interface that still resembles what we use today. In short, VisiCalc was the starting point for the modern spreadsheet that we know today. The Ubiquity of the Spreadsheet You might be surprised at the multitude of applications there are for spreadsheets. We know spreadsheets are used for tasks such as accounting, sales, business intelligence, and finance. Professors, instructors, and teachers use spreadsheets to track class performance and assign grades. Engineers and scientist alike use them to perform simulations, create complex models, and analyze massive sets of data. Homeowners use them to track expenses and set up budgets. Small business owners use them to keep track of inventory and sales. Large companies use hundreds of different spreadsheets for just about everything imaginable — from simple tasks that require a small portion of a worksheet to massive workbooks with thousands of calculations and complex visualizations. When it comes to data, spreadsheets can model, manipulate, sort, organize, visualize, and process large sets of both numerical and non-numerical data. Spreadsheets can be used to perform what-if analysis, make predictions based on existing data, inform decisions, and perform extremely complex calculations. They can be used for optimization, curve fitting, and solving simultaneous equations. And one of the benefits of spreadsheets, to quote an old professor of the author’s, is that if you can do it once, and do it right, you may never have to do it again. Modern Spreadsheet Packages We aren’t limited to VisiCalc in modern times, however. We’ve got a wide variety of options when it comes to spreadsheet packages, including: Microsoft Office Excel (which is available both as desktop software and online) Google Sheets Corel Quattro Pro LibreOffice Calc OpenOffice.org Calc iWork Numbers There other less well-known options available, too, but Excel is what most people think of when someone says “spreadsheet.” Modern packages offer numerous types of formulas and functions, including those for finance, accounting, mathematics, statistics, probability, and string manipulation, just to name a few. And the visualization capabilities of spreadsheets are constantly evolving to enable users to give even more context and meaning to data. How spreadsheets process massive sets of calculations is also growing, with some packages supporting multi-threaded processing. The types of data that can be processed within a spreadsheet are rapidly expanding beyond floating point numbers and characters, and some packages such as Excel are including aspects of artificial intelligence among new capabilities. How Can You Celebrate Spreadsheet Day? There are quite a few ways to celebrate Spreadsheet Day. One of the best ways is to expand your knowledge of spreadsheets. It’s always a good idea to increase your skill set when it comes to computer applications, but especially so when it comes to spreadsheets. Spreadsheets can make your work much easier if you learn how to make the best use of them. Take our word for it – spreadsheets can do so much more than you realize. That’s why we think the very best way to celebrate the birthday of the modern spreadsheet is to register for free online Excel training at SpreadsheetsTraining.com. Sharpen your existing skills, learn something new, and find out new ways to put spreadsheets to work for you!

Information Technology News & Information

October 16th Is Steve Jobs Day

Steve Jobs Day Sheds Light On Apple Founder’s Legacy In today’s modern world, the name “Apple” has become synonymous with technology. It’s no wonder then that Steve Jobs, the company’s late co-founder, has become such an influential figure in American history. His contributions are well documented in motion pictures, books and an authorized biography. October 16 is known as Steve Jobs Day, which was declared in 2011 by the Governor of California. The day brings forth the opportunity to reflect on the life of the famed innovator and how his contributions have helped advance the human race. From iPhones to iPads and every single app in between, one could argue that humanity would not be as technologically savvy without the work of Steve Jobs. In August of this year, Apple achieved what no other company in history has done. It became the first publicly traded U.S. company to reach $1 trillion. Not only is this historic in terms of branding, but it brings to light the incredible ingenuity the company has displayed throughout the years. Along with his partner Steve Wozniak, Jobs’ innovations have helped solidify an incredible legacy likely to stand the test of time. The Early Years Jobs grew up in the San Francisco bay area in the 1960s. By the age of 10, he had developed a fascination with electronics, likely due largely in part to time spent with his father building crafts. This hobby paved the way for Jobs’ establishment of Apple in 1976, along with his co-founder Steve Wozniak. Jobs sat at the helm of Apple’s operations until 1985, when he broke ties with the company and established NeXT computers. Apple later purchased NeXT and paved the way for Jobs’ return to the company in 1997. Apple Computers While Jobs can’t be credited for inventing the first computer, his founding of Apple paved the way for its widespread use. The computers that came before Apple was expensive and typically used only for business purposes. The introduction of the Apple II, the brainchild of Jobs and Steve Wozniak, changed this concept forever. Marketed as the world’s first mass-market personal computer, the Apple II meant users could now access the technology from the privacy of their own homes. More than two decades later, in 1998, Apple released the iMac, an all-in-one computer. One of Apple’s lesser-known inventions is the iBook, which was introduced in 1999. The laptop came equipped with Wi-Fi technology and a few upgrades to its design. People today may remember it for its tangerine and blueberry color options and clamshell design. The Apple iPad, introduced in 2010, has made the Internet even further accessible. This tablet computer was built more for entertainment than previous devices, making it a staple in many households, utilized by children and adults alike. The product was deemed so successful that Apple sold more than 15 million of these devices in its first year. The iPhone Of all Apple’s products, none is as influential in the tech world as the iPhone. Apple’s introduction of the iPhone marked a paradigm shift for the traditional mobile phone. Apple’s version, like the majority of its most revolutionary products, boasted a sleek, simple design that helped further uncomplicate technology for the masses. Introduced in 2007, the phone has undergone a radical series of redesigns over the years, each year presenting more opportunities for productivity than the last. Prior to the invention of the iPhone, mobile phones’ primary purpose was to access chatting and emailing. Today’s version is utilized for web-surfing, Facetiming, social media and the utilization of an endless stream of apps available for download at users’ fingertips. Frequent updates and new designs ensure Apple users are getting the best product possible, which has helped the brand amass its own population of loyal followers. The iPod One of Apple’s most significant inventions to date remains the iPod. While mp3 players had been on the market for several years, Apple’s version was seen by many as far superior, and so it began to dominate the market. Able to store thousands of songs, the iPod grew in success with the help of other products, such as Apple iTunes, which was released in 2001. The new technology allowed users to organize their digital library on both their personal computer and through their devices. The iTunes Music Store went live in 2003. Not all of Jobs’ best inventions were technological. The innovator is also credited with inventing the world’s first glass staircase. The design, which was awarded a patent in 2002, has been used across some of Apple’s flagship stores and has since been adopted, in some sense, by both commercial and residential properties the world over. Steve Jobs Day is a day designated for honoring the Jobs legacy, but his impact is seen daily, in the hands of millions. While Apple, as a company, has certainly carried on without him, Jobs is one innovator unlikely to ever be forgotten.