Upgrading to Windows 10? Be Aware: Your Wi-Fi Password Will Be Shared with Contacts! Microsoft has officially released Windows 10 for those interested in upgrading – and many of us are excited about the release; however, before you take the leap towards the latest OS, there’s a security threat you need to know about: Windows 10, by default, shares an encrypted version of your Wi-Fi network password with your contacts– leaving your network open for your contacts to use, including those listed in Skype, Outlook, and if you opt-in, Facebook. The feature, known as Wi-Fi Sense, enables your contacts to access your wireless network using the password (sent over an encrypted connection) when they’re within a specified range of your home. According to Microsoft, your contacts will be able to access your network – without accessing file shares and other devices. Would You Trust All of Your Social Media Contacts with Access to Your Wi-Fi Network? The biggest issue with the feature is simple: we live in an age where we’ve got tons of social media contacts – and we don’t personally know each and every one of them. If someone access your network, they key is likely to remain on their system, which means if they’re hacked, your network is essentially able to be hacked, as well. While the feature is convenient for those who are looking to share their password with good friends, it’s simply too risky. There’s a few ways you can mitigate the risks and protect your network: Disable Wi-Fi Sense Immediately: To disable the feature immediately, start by going to the Start Menu, clicking Settings, and going to Wi-Fi under Network & Security, then select Manage Wi-Fi Settings and disable all options of sharing. Opt Out of Letting Wi-Fi Sense Use Your Network: You can opt out, but it’s slightly more complicated than simply disabling the ability to share your network. Change your SSID (network name) to include “_optout” in the name. For example, “network” should be changed to “network_optout.” Use Additional Measures to Stay Secure: This is one of many security threats facing your wireless network. You need to implement additional security measures, such as anti-virus software, web-content filtering, and firewalls, in order to stay secure. {company} is here to help you safeguard your network against threats associated with Windows 10’s new feature: Wi-Fi Sense. Call {phone} or send us an email: {email} for more information.
As more and more of our daily lives — whether professional or personal — become at least partly digitized, hackers and malicious parties work harder and harder to access our sensitive information. The methods they employ vary in style and intent, and are constantly updated to factor in new security measures. In light of the constant danger that hacking represents, the top data security experts were polled in a recent Google research paper as to the top five best ways to keep your information safe. Implement these 5 practices into your online activity to ensure digital security at all times: Stay up to date. While some users remain skeptical of new updates to their software, the fact is that these patches help to protect your information from known vulnerabilities. By refusing an update, you risk maintaining a weakness in the system that is publicly recognized at that point as a method that hackers may use to compromise your info, so be sure to regularly check for updates. Use a wide variety of passwords. Even though you may have over a dozen different logins for the services you make use of on the web, the fact is that unique passwords are an important part of online security. If you were to use the same password for your email, online banking and social media, the vulnerability of your information is greatly increased because a successful hack of just one account opens up every other one with the same password. Be sure to vary your password from one account to the next. Enable two-factor verification. Many services these days, including Gmail, Facebook, and PayPal, offer a secondary step for verification to ensure that hackers would need more than just your password to gain access to your accounts. While the methods may vary, a popular form of two-factor verification today is to have a confirmation code sent to your mobile device that you then use with your password to login. While it may take more time, it only adds to the security of your information. Use password management services. To help you manage a long list of unique and strong passwords, services now exist that will log and save all your different login information for you. By remembering just the login info for that one service, you can have the service auto-fill any added account info when you need access, securing all your info in one place and reducing the number of passwords you need to keep memorized. Remain vigilant! Maintain a healthy skepticism while surfing the web. If something looks too good to be true, it almost certainly is, so ignore anything that is free or illogically enticing as it is likely a scam. Even clicking on the wrong link can be dangerous, so avoid click-bait and fake emails by enabling spam filters, ad blockers, and working only with websites that are large and trust- worthy. Online security is a crucial part of the digital age! To learn more about staying secure online, call {company} at {phone} or email us at {email} for more information.
As business apps and the use of mobile devices become more of a standard in the workplace today, companies need to be aware of the inherent risks involved. Hacker-made fake apps and compromised personal mobile devices can be detrimental to the security of corporate and private information, so to keep safe, the risks need to be understood. There are more apps made by businesses for their services than ever before, but the fact is that less than 50% of them are tested before reaching the market, and less than 33% are tested for security. More than half of the companies that require work to be done on mobile devices allow employees to bring their personal devices to the workplace, and of those that provide devices for employees, more than half allow the download of insecure apps. Given those startling figures, keep in mind the following information about malware apps and device security: Devices provided by the company need to be prepared for suspicious apps. To keep employees from accidentally downloading a disguised malware app intended to steal sensitive information, companies need to install security measures that scan source code and executables for any suspicious material. Companies that allow work to be done on personal devices need to prepare for “device risk”. The app is only as safe as the device it is downloaded on to. If your employees are doing professional work on their own devices, be aware that any compromise in their mobile device’s security can affect the safety of the information involved in that work. Users need to be wary of app permissions and jail-broken tech. Both in personal and professional capacities, be aware that apps which ask for excessive permission to different facets of the mobile device may be suspect, so always be wary of what you’re allowing when an app is downloaded to a device. In the ever-changing age of mobile technology, keep your business safe from new threats by preparing for every possible vulnerability. For more information on mobile device security, contact {company} at {phone} or email: {email}.
Last week, the newest operating system for Apple devices, iOS 9, was released to the general public for download. In June at the Worldwide Developer Conference, Apple had announced that for the first time they would make the beta version of their upcoming OS available not just to software developers, but to everyone with an Apple device. This is well ahead of the launch of the next iPhone coming this fall, when the OS will presumably have made it past the beta testing phase. With any new OS on any device, there’s always the chance of bugs and other small errors, so especially with an unfinished beta version, some users may be wary of downloading iOS 9 right away. Consider the following before updating your system to make sure your Apple device can still perform to your expectations: The benefits of updating. The newest OS is intended to improve Siri and Maps, as well as search functions within the device, a battery saving mode, and the ability to switch between apps more fluidly. Many reviewers have given the changes introduced in iOS 9 high marks. Obsolescence and device age. The older the version of your device is — for example, an iPhone 5s or iPad 2 — the more likely the new OS will have difficulty working perfectly once downloaded. As with the upcoming iPhone, the OS will be primarily designed to support the newest devices, with each generation out of date adding to the possibility that it may malfunction. The reality of beta testing. Beta tests are used to test unfinished software with as many participants as possible to discover any remaining bugs. In some ways, the point of this release is to figure out what could be wrong with the OS before launching officially with the new iPhone this fall. As with iOS 7’s launch, sometimes even finished operating systems can introduce major bugs into the system, so waiting for reviews and feedback on a new OS is always wise. To stay up to date on the new operating system and how it fares in beta testing, be sure to contact {company} at {phone} or email: {email} for more information.
Driving a Chrysler Vehicle? Install This Patch Immediately! Chrysler is striving to turn the traditional automobile into a smart, connected device – and although it’s an innovative, exciting concept, there’s a significant downfall. Chrysler’s UConnect system, which has been installed into cars since the end of 2013, is an Internet-connected feature that controls entertainment and navigation capabilities while offering a Wi-Fi hot spot. Sounds great, doesn’t it? Not so fast… UConnect actually has a major vulnerability – allowing anyone who’s aware of the car’s IP address to gain access, even if they’re in a far away location. This means an attacker could take complete control of your car – taking you right off the road in an instant. The Software Bug That Puts Lives at Risk… Charlie Miller, a researcher looking into the vulnerability, explained, “this might be the kind of software bug most likely to kill someone.” In fact, in a live demo, the vulnerability was exploited to cut off the transmission and brakes in a Jeep Cherokee. As you can imagine, this is extremely dangerous, especially considering the attacker doesn’t need physical access to the vehicle. The attacker doesn’t even need to be in a nearby region! At the moment, researchers are withholding various details on the bug, in order to prevent the bug from being exploited. If you’re currently driving an impacted vehicle, get to the dealership or install the patch manually using a USB immediately. Don’t wait. The patch can be downloaded here. Need more information? Looking to stay up-to-date on the latest security threats? Contact {company} at {phone} or send us an email: {email}.
Windows 10 is on the way, and you’re probably wondering just what it means for your business. Are you going to have to change operating systems AGAIN? Is it going to be as difficult to adapt to as Windows 8? How much is this going to cost? July 29, 2015. Windows 10 Is Available. Don’t worry about it! The team at {company} are on your side and will make the transition over to Windows 10 a breeze. Find out how easy it will be and how many benefits you’ll see by calling us at {phone}. First off: Upgrading to Windows 10 is FREE – so long as you’re already running a legitimate copy of Windows 7 or 8. So breathe a big sigh of relief over that. And even better, our team has looked ahead at the features of Windows 10, and we know you’ll love these main reasons to upgrade: No MS Account Needed: Unlike Windows 8, you won’t need a Microsoft account just to log in. Just make a username and password, and it’s all you need. The Start Menu is Back: Three cheers for the return of the classic start menu everyone missed! Easy access to programs again! Easy Customization: Even better, the Start Menu is easily customized, and you can combine features like tiles from Windows 8 that you might actually like. Simple Cross-Compatibility: Connecting your phone, tablet, laptop, and desktop over Windows 10 will be easy and intuitive. Cortana is Here to Help: The intelligent assistant Cortana (like Siri) that comes with Win10 is actually helpful and simple to use. Just talk to it and get quick answers and help for all sorts of tasks. Virtual Desktops: Quickly and easily create new desktops for different tasks – so it’s easy to stay focused on your work. Upgraded Web Browser: Say goodbye to Internet Explorer and hello to Edge. It’s got features like Chrome or Firefox, as well as some cool built-in unique features that make integration with other Win10 features simple. Our team couldn’t be more excited about this huge improvement for Microsoft users that’s coming our way. When Windows 10 is released, you can count on {company} to know all the ins and outs of the system and be ready to help you get a smooth and simple transition over – all your files and programs will keep working, and you won’t miss a day of work. Contact {company} at {phone} or {email} to find out more about how you can take advantage of Windows 10 with our help!
Security researchers from Google’s Project Zero and FireEye have discovered a critical flaw in various versions of Windows, and Microsoft has released an emergency out-of-band patch to deal with the situation. In a statement of advisory on Monday (July 20), Microsoft informed customers about the issue, warning that the vulnerability could “allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded OpenType fonts.” They continued, “An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.” Basically, if the vulnerability were exploited, you’d be inadvertently handing operational control of your computer over to a cybercriminal. The potential issues stemming from that are limitless, especially for businesses storing sensitive data on their machines. Users working with Windows Vista, Windows 7, 8, 8.1 or Windows RT are all affected – that includes users running Windows Server 2008 or later. It should be noted that Microsoft has deemed the software update “critical” for those users. As of now, Microsoft says they believe the flaw is public, but they have no evidence to suggest it’s being actively exploited. The patch is available now through any typical update methods, including Windows Update. For your protection, it’s crucial to make the update as soon as possible to prevent any issues with your system. For more breaking IT news or to get in touch with a team of technology experts who will help keep your business protected, contact {company} at {email} or {phone}.
Most IT support firms are top notch providers, and are always there to do their best. Unfortunately, there are some issues which we simply can’t or won’t help you with because as good as we are, we simply can’t perform miracles and some situations are just too dodgy to touch. IT support firms understand that everyone has IT needs that need to be fixed but you also have to be realistic and understand that there are limits. Let’s talk about some of this issues when we don’t want you to call us because you are wasting your time and obviously need to do some serious revaluation. No Back-Up C’mon folks! You desktop or some other device with critical client and company information crashes and you haven’t backed it up? This is PC 101 stuff folks – always back-up your data! I know many of you are under the impression that we can retrieve lost data, but you also need to know that the retrieval process is very expensive and there is NO guarantee we can recover it all. Often, when it’s gone, we aren’t necessarily going to get it all back. No Cash Some business people tell us they have no money available for their IT budget. Well, are you expecting us to work for free? An IT support company doesn’t work that way and we can’t really do anything for you to provide continuity for your business if you aren’t prepared to spend some money. If you have obsolete equipment or software, there’s only so much we can do. No IT Processes in Place IT support companies take pride in the services we provide. Most of us like to give the ongoing support you need to grow and prosper. But, if you don’t have any processes in place that provide some kind of current and long term plan to grow your business, we can’t really help you because that’s your job, not the job of the IT company. We provide the support for your business processes, but we don’t create them. Illegal Software We won’t touch that with a ten foot pole, and if that’ what you’re looking help with then we’re out the door. I understand software can be an expense, but this a line we don’t cross. We’ll get rid of it for you and install legitimate software, and teach you how to use it, but otherwise this is a total deal breaker. Want a Fix, but Not Ongoing Support Yeah, if you want a fix then we can do that, but keep in mind that a fix is just a very short term solution. IT firms like to partner with their clients for the long term because we learn about your business and look to your future growth. If you jump from IT company to IT company for a fix when you need it, you’re really not getting the best value for your money. We can help you grow more proactively and more productively when you form a partnership with us for the long term. Your IT company can do a lot great tech work, but there are some issues when we’d rather not hear from you because it simply isn’t worth it for you or for us. Want an IT partner to help you grow and build your business? Partner with {company} and let us help you prosper. Call us at {phone} or email us at {email} and we will build your business together!
We’ve noticed an uptick in Crypto-type virus infections over the past week. These infections are even getting past anti-virus software and network firewalls. If you’re infected, you WILL lose all of your data on your computer, as well as the data on any server(s) you are connect to, unless you have a good backup? How do Crypto-type virus infections work? They’re a type of ransomware, which means hackers get into your systems, encrypt your data, and demand a ransom fee in exchange for the decryption key. This is a very serious infection! Here’s a few vital tips you need to know to stay protected against ransomware: • Do not, under any circumstances, open email attachments, even if they’re from someone you know, unless you’re expecting the attachment. • Never click on any web page popups that ask you to install or download something – these popups are often malicious and shouldn’t be trusted. We’ve seen the virus spread to contacts in someone’s address book, so it’s entirely possible you may receive an email from someone you ‘know’ containing an infection. Even with proper backup, a serious defensive strategy must be put into motion to clean this type of virus infection up. There is no guarantee that paying the ransom fee will result in getting your files back after you’ve been infected. If you aren’t a Hammett Technologies SimpuCare managed client, cleanup from this infection can take several hours and cost several thousand dollars. If you aren’t 100% positive you have HOURLY backups of your data and those backups are tested, please call us today. Discover how our backup systems and our backup strategy work here. To repeat, a business must be making hourly backups in this day and age, in order to have the highest level of protection. We have never had a client using our recommended backup strategy lose data – EVER. If you have an email attachment or suspicious message you’re unsure about, call our office – we’ll screen it for you and let you know if it’s safe or malicious. We’d rather be safe and have you check with us than possibly get infected. Please make sure you’ve shared this with friends and co-workers to stay safe. Contact {company} at {phone} or send us an email: {email}. We’ll help you stay safe against threats, including ransomware.
It has become increasingly difficult to navigate the world of IT support. It seems like every company feeds you the same line about how much you need their service. So how do you separate the elite from the mediocre? And even more importantly, which one is the perfect fit for your specific needs? {company} who is based in {city}, has compiled a list of six questions you should always ask an IT company that you are interviewing. If they can’t provide a valuable answer to any one of them, they’re not the right fit for you. Do they have industry experience with your type of business? This question is vital to ask because it will instantly indicate whether or not they’re confident in their services. It’s not a requirement that they have previous work within your industry, but they should provide their answer confidently – either way. If the answer is yes, they should also be able to provide specific examples. If they can’t provide these examples, they may be lying just to get your business. Do they have technology specializations with the systems you have invested in? For this question the answer must be “yes.” There’s no point in paying someone to manage your IT services if they aren’t an expert in the systems you use. You may as well pick up a couple how-to books from the local library, and do it yourself. It’s your IT support team’s job to be an expert in your network systems. Do they have experience working with your business applications? This is just as important as the previous question. Do a little bit of research, and follow up with more specific questions in regards to the applications at hand. It’s very easy for an IT company to tell you they have experience with an application, when the reality is very different. Can they back up their claims of great service with client case studies? Check their website out. A reputable IT company will have written “social proof” of their work via case studies with previous clients. The case studies should describe the specific issues that their client was facing, followed by a detailed description of how the problems were addressed. It should also contain quotes from the client, which is a testimonial to the IT company’s work. Are they up to speed with the latest technologies? It’s important that your IT team is up to speed on the latest technological innovations. They will become the backbone of your company, supporting your efforts to surpass your competitors. Ask for specific examples of exactly how they stay up-to-date and informed in this ever changing media-scape. Can they take care of you? When interviewing your IT company, ask for specific examples of how they can assist in growing your company. Ask for suggestions, and pay attention to see if their answer is general run-of-the-mill, or specific to your company’s objectives. Ultimately it’s fundamental that you trust your gut feeling when hiring an IT company for your business. You should feel like you’re working with a human being, not a robot. They should have our best interest in mind, not their bank account. Always ask for proof of their qualifications, and always follow your intuition. If you’re currently looking for a reputable IT company with proven results, contact us today. {phone} or {email}