Information Technology News & Information Tech Tips
upgrading-from-windows-7-to-windows-10

Upgrading From Windows 7 to Windows 10

Microsoft is pulling the plug on its widely loved operating system (OS), Windows 7, in January 2020. Therefore, it is important that you know how to upgrade to their latest OS, Windows 10. Why should you upgrade? Well, when Windows 7 gets discontinued, Microsoft will no longer offer support or update the OS, leaving you vulnerable to exploits and other security risks.  Those of you that are worried that Windows 10 will have a steep learning curve, fret not! Windows 10 is very similar to its older brother Windows 7. I have to admit, there are a few differences between the two, such as Windows 10’s revamped settings panel, and the new start menu. However, if you are worried that Windows 7 and Windows 10 would be polar opposites like Windows 7 and Windows 8, rest easy, nothing could ever be that bad again. This guide aims to ease you through upgrading your OS. Once you finish with these steps, you’ll be well on your way to Windows 10! Check List Minimum Requirements for Windows 10 If you are worried you may be on this list, think about the following question. Did you purchase your computer after 2014? If you answered yes to this question, chances are your machine is more than capable of running Windows 10. For those of you running older machines, consider purchasing a new computer. Many of them come preloaded with Windows 10, and besides the upgraded OS, you will also be greeted with high speeds, better resolution, and overall better user experience. Processor 1GHz or Faster CPU or System on a Chip (SoC) RAM 1GB for 32-bit or 2GB for 64-bit Hard Drive Space Existing installations: 16GB for 32-bit or 20GB for 64-bit. Clean installation or new PC: 32GB or larger Graphics DirectX9 or later with WDDM 1.0 driver Display Resolution 800 x 600 Network Wi-Fi or Ethernet connection Before upgrading it is also important that you have the latest version of Windows 7 installed on your machine as well. Be sure to check for updates on your machine and to download the “Windows 7 Service Pack 1” if you do not have that already installed on your machine. Also, and it pains me to say this to you if you have waited this long to upgrade to Windows 10, it is no longer free. However, online retailer Newegg will make the upgrade expense less painful for you by offering both the Home edition and Pro edition of Windows 10 at a discounted price! The cost of a new Windows 10 license goes for $109.99 (Home) and $149.99 (Pro) on Newegg. Furthermore, make sure you have an up-to-date backup or system image of your computer before upgrading. Microsoft has certainly improved in its upgrade process, but it is better to be safe than sorry. Follow this guide on Bleeping Computer to learn how to create a backup of your Windows 7 computer! One last thing, I promise. Before you start, it is recommended that any anti-virus software you have installed be removed as this can sometimes cause interference with this upgrade. Make sure that all peripherals are also unplugged from the computer while it is updating, as these too can sometimes cause errors. Upgrading Download and Install the Media Creation Tool Make sure you have your Windows 10 license activation code ready Double-click on the MediaCreationTool.exe to begin the Windows 10 upgrade setup Accept the licensing agreement Select “Upgrade this PC now” option and the necessary files will begin downloading to begin the upgrade. Once finished, click Next Enter your valid Windows 10 product key (Home or Pro) Select Next Accept the licensing agreement Select “Keep personal files and apps” option Select Install Are you wondering what Hammett Technologies can do to continue to help your company grow? Our team of trained professionals works diligently to ensure that your network continues to run smoothly and securely! Click here to learn more about what we do!

Information Technology News & Information Tech Tips
creating-a-strong-password

Creating a Strong, Secure Password

If you are like many users, you visit many different sites and have a plethora of passwords between those sites. The idea of creating a strong password consisting of letters, numbers, special characters, symbols, etc., can be quite daunting. Not to mention it is recommended that you have a different password for each site your register an account on. With all of this considered, it is no wonder many become overwhelmed when trying to think of a secure password. I mean, who can remember “J%^dh@udS!@#$”? Because of this, you may have fallen victim to using the same password for most, if not all, of the websites you hold an account on. This is not only a safety hazard, it also spells disasters if one of these websites gets compromised. Or perhaps you use numerous passwords, but they consist of simple words and numbers that relate to your life. These kinds of passwords are easier to guess than you can imagine. Maybe you do have long, complicated passwords, but in an attempt to remember them you have written them down and placed them next to your computers. This is dangerous as well, especially if other use your computer as well! However, with this guide, we hope to guide you down the right path to making safe, secure, and easy to remember passwords! First, to understand what a strong password is, we must understand what makes a password strong. The key features of a strong password are its length, a variety of letters (using both upper and lower case), symbols, and numbers. Make sure you leave all personal information out of your password. However, what is the use of a complicated strong password, if you cannot remember it? Not to worry, we will arm you with advanced password creating techniques that will not only keep your online identity secure! Your first strategy in creating a strong password is to make it easy to remember but hard to guess. Avoid the pitfalls of making your password “password”.  This password is laughably weak. A password this simple is easily guessed by both humans and machines and will leave your online identity in shambles. Some of you may be asking, “Who on Earth is using “password” as a password?”. Well you would be surprised to know that it is one of the most commonly used passwords to date. There are also the passwords that use a persons last name and birth date. These kinds of passwords are also easy to crack by those who are close to you. I know your neighbor Bill seems like a nice guy, but maybe he’s too nice. However, perhaps you have been trying to make a strong password and have created “P0W3Rful”. First you must be aware of the length. Length of this password is far to short and the substitutions you have made are easily guessed by both human and machine as well. Now that we are aware of the numerous pitfalls, we can begin to discuss how to create a strong password! Here are a few examples of good passwords: G00D_2H4v3_$$: You could use this one for a bank account (Good to have money). 4sh00Ping_0NAMZ: This could be used for your Amazon account (4 shopping on amazon). Having now thought of a password that is perfect in length and randomness, you have begun your march down the correct path to internet safety.  However, you are not safe yet. You must remember to not reuse the password, write them down anywhere, or share them. After spending all that time thinking of a good password, last thing you want is for someone to crack it by seeing it written down next to your computer. Or if you are to get hacked, at least you can rest easy knowing your other accounts are still locked away because you used a different password for each site! The last rule is extremely important but can also be given some slack. If you are to share your password, make sure that you only do so with someone you trust 100%. If you have even a shred of doubt that they do not take internet security as seriously as you, do not share your password with them.  Another option for those who have too many accounts, or are too nervous to create their own passwords, is to use a password manager! Password managers like LastPass can generate completely random passwords up too 100 characters in length. All you must do is think of a super secure master password and you are ready to go! Now that you have been armed with the tools to create smarter, safer passwords, go forth and secure your defenses! If you have any questions about cyber security or want a partner that will take your businesses cyber security seriously, consider Hammett Technologies! At Hammett Technologies we put your online security as a top priority. Be with a team you can trust, become a Hammett Technologies Partner today!    

Information Technology News & Information Tech Tips
need-to-upgrade-windows-10

Why You Need to Upgrade to Windows 10

With Windows 7 service coming to an end in only a few days, we thought it was essential to give one last push to those of you who still have not made the jump to Windows 10. After January 15, Windows 7 will no longer be in service, meaning that all security updates will cease. Continuing to run an operating system without support from the developers (i.e. Microsoft), can be extremely risky and will ultimately and inevitably lead to a malware-infected computer. Furthermore, if your business is still using Windows 7 on its work computers, you must upgrade to Windows 10 immediately. Why Upgrading to Windows 10 is Important As you have already read, Windows 7 will be out of service by January 15. However, what you may not understand is what that exactly means for you. Virtually all “end of service” means is that Microsoft will no longer support Windows 7. However, the deeper meaning to that statement is that with Microsoft no longer supporting the operating system (OS), hackers will begin to reverse engineer patches and updates. Essentially, Windows 7 will soon become an open playground for hackers and malware developers. If you are insistent on staying with Windows 7, even though consumers are reporting that they are still able to upgrade for free, you can pay for security updates from Microsoft. This yearly subscription will enable you to stay on Windows 7 and continue to receive security updates from Microsoft, but costs will increase yearly. In our opinion, unless your business relies on Windows 7, there is no excuse not to upgrade to Windows 10. Why Upgrade to Windows 10 First and foremost, Windows 10 is far secure than Windows 7 at this point. With constant updates and patches that have improved performance and security, Windows 10 has come a far way from where it began.  Furthermore, upgrading to Windows 10, if you have a valid license of Windows 7, is still free! All you have to do is download the Windows 10 installer and then upgrade it. It is that simple. If you have any questions or concerns, consider contacting Hammett Technologies! We are professionals when it comes to technology and can assist you and your company regardless of the situation! Give us a call and find out why we are the #1 growing MSP in Maryland!

Information Technology News & Information Tech Tips
check-windows-10-for-update

How to Check Windows 10 for Updates

Windows 10 has become quite an impressive operating system of the years. This continued improvement has benefited all users across the board, but it important to perform maintenance on the system. By checking your system for updates regularly, you can ensure that all your peripherals and programs continue to operate properly and keep your system running smoothly! The added benefit of regularly checking for updates is that you also make sure your system remains patched for the lastest exploits and bugs, helping to keep you out of the reach of hackers and other cybercriminals. Checking for Updates The process of checking for an update is painless, even for a novice user! 1. Open the Start Menu 2. Locate the  in the Start Menu and click it. 3. Once in Windows Settings, locate Update & Security and select it. 4. You’ve made it! Select Check for Updates to make sure your system is up to date! If you are still confused about how to update your Windows 10 computer, consider reaching out to us! Our team of trained professionals can handle any issue you encounter on your computer, whether big or small! We are more than happy to assist you with updating your machine to ensure you always have the latest and greatest build of Windows 10! Wondering what we can do to help your company grow? Click here to find out more!

Information Technology News & Information Tech Tips
undecided-box

Microsoft 365 (Formerly Office 365) : Which Version is Best For Me?

Picking the best version of Office for your business can be overwhelming. Microsoft 365 (formerly known as Office 365) and Office 2019 offer pros and cons that can difficult to see when browsing on Microsoft’s website. The plans offered by Microsoft 365 can also be overwhelming to look at if you do not entirely understand all the features that come with it. Let’s dive deeper into what each package offers so that you can make the most accurate decision! Microsoft 365: Business Standard Hands down the best option if your business needs access to all the applications Microsoft has to offer. Microsoft 365 is a cloud-based subscription service, with yearly or monthly renewal times. Microsoft also pushes continual updates to all the applications on Office 365, ensuring you have the latest, fastest, and most secure builds of Office applications, at all times. If you encounter issues with any updates or applications, Office 365 comes equipped with Customer Support features to assist. For businesses, Microsoft365 comes equipped with features such as: Teams (cloud-based chat platform for your company) Exchange (email) One Drive (cloud-based storage) SharePoint (similar to one-drive but offers more in-depth customization) Many of these applications are must-haves for businesses, but these added features come with a price. While the Microsoft 365 subscription begins with a $5/month fee, this package only comes with access to Teams, Exchange, One Drive, and SharePoint. For full access to all application (Word, Powerpoint, Excel, Access, etc.) Microsoft 365 requires a monthly payment of $12.50. It is important to note that while Microsoft 365 does offer support for Windows and Mac OS, Access and Publisher are PC applications only. If you are a Mac user, you will have to resort to these applications’ web versions, if needed. However, with so many applications built into Microsoft 365, there is the likely-hood that you may wind up paying for features you never use. There is also the possibility that Microsoft’s services may be down at some point, possibly preventing specific applications from functioning correctly. Microsoft 365: Business Premium For businesses that need more security and management opportunities for their workflow, Business Premium may be the option for you. This plan comes with all the features of Business Standard, but also includes: Intune – A program that allows for mobile device management, giving you the ability to decide how your businesses’ mobile devices (tablets, laptops, phones) are used. Azure Information Protection – A program that assists in protecting sensitive information such as emails and files. This process can be defined using labels and handled automatically, manually, or a mixture of the two. Benefits and Drawbacks from Microsoft 365 Business vs. Microsoft 365 Home vs. Office 2019 When choosing the best version of Office for your company, it is essential to weigh all your options. Microsoft 365 Business has multiple great programs that any business can stand to benefit from having. Its multiple plans allow companies to make informed decisions on what they want and gives them the ability to upgrade or downgrade. Furthermore, the business applications (Teams, One Drive, Exchange, and SharePoint) offer businesses with more in-depth customization options and a chat platform. Microsoft365 Family may look promising to some companies that are looking for a cheaper option. Microsoft 365 Family may be best for smaller businesses that do not need access to Teams or have their storage solutions. Office 365 Family comes equipped with all the base application Microsoft 365 Business Standard has (Word, PowerPoint, Excel, Access, OneNote, Outlook, and Publisher). However, as stated, it leaves out Teams, OneDrive, Exchange, and SharePoint. Possibly the biggest, and only, advantage Office 365 Family has is the pricing, allowing for six (6) individual users under the same license. Microsoft 2019 is another great platform, but only for companies that are just starting. The primary reason is pricing differences. Microsoft 2019 costs one payment of $150, giving access to the most popular apps (Word, PowerPoint, Excel, Outlook). However, that is about where the benefits end. Office 2019 is not regularly updated with patches and bug fixes; instead, only security updates are pushed out. Confused? If you are feeling overwhelmed or confused, don’t fret. We know this is a lot of information to take in and try to grasp. If you are worried you are not making the right purchase, consider giving us a call or sending us an email! Hammett Technologies is here to help with any and all your technological needs, no matter how big or small they may be.

Information Technology News & Information Tech Tips

Using Google’s Reverse Image Search

Have you ever wanted a little more background information on an image you’ve seen online? Have you ever found an image and wished you could find others similar to it? Well, Google Images has a feature that allows just that, and it does its job quite well! Their engine allows users to reverse image search, letting users find the original image and ones similar! For instance, let’s say you stumble across this image of a mountain. You find the particular image quite stunning, but the website or post you found it on does not provide any information about its location or name! Here is where Google’s reverse image search engine comes in handy! To access Google’s reverse image search engine, first, you must navigate to Google Images. Once there, click on the little camera icon found within the search bar. From there, you get two options:  You could paste an image’s URL, or you could upload an image from your computer. I find that downloading the image to my computer and then uploading it is much more convenient. Once completed, Google scours the internet in search of images similar to the one you upload, as well as attempt to locate its name for you! As you can see from our search results, the picture in question was Mount Everest! Now I know the name of this mysterious mountain as well as have the ability to view images that are similar to the one I uploaded! It is important to note that Google’s reverse image search is not perfect. When someone posts a picture online, any slight changes made to the picture could throw off the engine’s ability to accurately detect what the image is conveying. However, I find it quite useful from time to time and recommend that the next time you want to find a little more information about a picture, you give it a try!

Information Technology News & Information Tech Tips

Thunderbolt Ports Can Leave Your Data Vulnerable

Thunderbolt ports are commonplace on many laptops today. They allow for high-speed connections for data transfer, video display, charging phones, and even the computer itself. However, as useful as Thunderbolt ports are, they also leave one’s computer vulnerable to hackers. Theft and laptops go hand in hand. They are expensive, can hold sensitive information, and are relatively easy to carry around and conceal. However, to counter this, laptops come equipped with encryption techniques for data and passwords. However, these safety measures will prove futile against Thunderspy. What is Thunderspy Thunderspy is a technique requiring physical access to a computer and utilizes the thunderbolt port on one’s machine. Using this technique, individuals can access a computer’s information regardless if the computer is sleeping, locked, or encrypted. Even if one’s system comes equipped with Kernel DMA protection for Thunderbolt 3, a countermeasure that protects one’s machine from Direct Memory Attacks (DMA), you are still not entirely protected from this attack. Kernel DMA protection will only protect your computer from a few vulnerabilities that Thunderspy exploits. Intel has made a statement regarding Thunderspy, stating that with Kernel DMA protection active, they were unable to hack into a machine’s data successfully. Staying Safe If you wish to find out if your system is vulnerable, the security researcher (Ruytenberg) who discovered the vulnerability has released a tool that allows Windows and Linux users to check their systems. Although, the only real way to make sure that your system is safe from this type of attack is to make sure that Thunderbolt is disabled or make sure that no unauthorized access to your machine takes place. Are you worried that your data is unprotected and vulnerable to attacks? Worried your sensitive information may leak onto the internet? Hammett Technologies will make sure that all your personal and business information is encrypted and secured. By monitoring all corners of the internet, including the Dark Web, we make sure that even if your data does leak, it becomes unavailable as quickly as it appeared. Call us today and find out how we can help your business’s online data stay out of the hands of criminals!

Information Technology News & Information Tech Tips

IRS Scam Alert!

When you get a bill in the mail, many of us think little of it and pay the amount due without reading too much into it. However, scammers do not only exist virtually, but they also claim victims in reality. Whenever you are asked to send money or pay something, you must read carefully, and if anything suspicious sticks out, you must use extreme caution. Consider calling the company that is listed on the letter or email to confirm the bill is legitimate and avoid being scammed.  For example, take this fake I.R.S bill: Scammers will attempt to steal your money any way they can, but there are usually ways to tell the real letters from the fakes. Pay close attention to the wording used and if something causes concerns, call the company who issues you the mail immediately. It has been said that the I.R.S will never call or email to obtain money, but it will send letters. Until recently, this method has worked to avoid scammers for the most part. Obviously this has now changed, and scammers have begun sending fake correspondence demanding money from people. It is easy for I.R.S employees to spot the differences in the letters being sent, but for the average individual, it is not. Therefore, consider reading the I.R.S’s post about how to avoid scams! They outline several helpful tips that will help prevent you from becoming a victim!

Information Technology News & Information Tech Tips

Wawa Suffers Data Breach

On December 10th, 2019, Wawa’s information security team discovered malware on its payment processing server. By December 12, the data breach was contained, but they fear the damage has already been done. In the statement released by Wawa, the “malware has affected customer payment card information, potentially used at all Wawa locations, starting from March 4, 2019, till [its] containment.” Furthermore, Wawa has promised that “…you will not be responsible for any fraudulent charges on your payment cards related to this incident…” As of containment, an investigation has been launched and it has been discovered that, while the data breach has affected credit and debit card numbers, expirations dates, and cardholder names, it has not compromised debit card PIN numbers, credit card CVV2 numbers (the three to four numbers found on the back of the cards), other PIN numbers, and driver’s license information used to verify age-restricted purchases…” To find out the steps you should take to make sure your information stays secure, visit the statement Wawa made. There you will be able to find exact details as to the steps needed to be taken to make sure you are financially compensated or make sure your information stays safe. To learn more about what we can do to assist your company, visit our What We Do page!

Information Technology News & Information Tech Tips

Dexphot Malware is Infecting Thousands of Computers

With the holidays fast approaching, everyone is looking for a way to make a few extra dollars. However, some of us are doing it in a less than legal way, making the holidays tougher for others. Dexphot has been on a crime spree as of late, infecting upwards of 80,000 computers with cryptocurrency miners. The good news is that its crime spree, since 2018, has begun to decline.  What is Dexphot? Considered to be unnecessarily complex for its task, Dexphot is a malware strain that uses your machine to mine for cryptocurrency. Its complexity lies within its ability to hide from security solutions. According to Microsoft, Dexphot uses “obfuscation, encryption and the use of randomized file names [to hide] the installation process.” As well as being designed to “fly under the radar”, through hijacking legitimate system processes, Dexphot was also designed to reinstall itself, should its location within the victim’s machine become compromised. How Dexphot Spreads Microsoft describes Dexphot as a second-stage payload – a type of malware that is dropped on systems already infected with other malware. The most common of these malware strains which assist Dexphot’s ability to spread was ICLoader, “a malware strain that’s usually side-installed as part of software bundles, without the user’s knowledge, or when users download and install cracked or pirated software,” says ZDnet.com. Once infected with ICLoader, Dexphot would then be remotely installed on the victim’s computer, further compromising the machine. Once inside, Dexphot would use legitimate Windows system processes to avoid detection from antivirus solutions. But that is not the only ace Dexphot has up its sleeve. Through a technique called polymorphism, Dexphot would be able to change used file names and URLs in regular intervals, making it extremely hard for traditional antivirus solutions to lock onto the virus. Another sneaky technique used by Dexphot was its ability to reinstall itself on the victim’s machine. Not only did this serve as a safeguard to avoid deletion, but it also means that the attackers could update the malware and have the updated version automatically installed on the victim’s machine, helping to further its ability to avoid detection. How to Stay Safe From Cryptocurrency Miners As unfortunate as it is, malware like Dexphot is more common then you may think. Cryptocurrency miners are a common malware cybercriminals install on machines so that they can generate revenue. These kinds of malware work in the background, generating revenue while you use your computer. Thankfully, there is hope when it comes to Dexphot. Microsoft, through their Microsoft Defender Advanced Threat Protection, is able to detect and stop viruses like Dexphot before they become an issue. As always, if you are worried about your company’s virus protection contact Hammett Technologies. We ensure all your technology needs are met. If you have any questions regarding anything above, please feel free to give us a call. We are happy to assist you, or your company, with all your cybersecurity needs! To learn more about what we can do to assist your company, visit our What We Do page!