by Felicien | Oct 12, 2017 | Education
The Internet has the potential to cause harm to your children and teens, but there aren’t rules and restrictions governing it like we have with other things in our society. The Internet is like the Wild West—There are very few controls, and it’s not private. So how do you keep your kids safe online?
The best way to keep kids out of trouble online is to educate them.
The following is some information for you to share with your kids.
Some staggering statistics
20% of social media accounts have been hacked or taken over by someone without the user’s permission.
11% of Internet users have had their personal information stolen (like their SSN, credit card number or banking information.
41% of children aged 8 – 17 who had a visible profile, had their profiles set so that anyone could see it.
1 in 5 people has had their social networks or email compromised by hackers.
What are the potential online threats to watch for?
Viruses, Malware & Ransomware
Malware is a broad term that covers all sorts of unwanted malicious code including viruses, spyware, Trojans, and ransomware. These viruses can duplicate themselves in your files and emails and can be sent to others.
16 million households have experienced a serious computer virus problem in the past two years.
8 million households have suffered from spyware in the past 6 months.
1 million households lost money or had their accounts compromised from phishing.
What are the biggest risks?
Viruses—57%
Trojans –21%
Trojan Downloaders—7%
Unwanted Software–$4
Adware—3%
Exploits—3%
Worms—2%
Password Stealers and Monitoring Tools—2%
Backdoors—1%
Spyware—0.01%
Online Scams
These try to take advantage of your children to obtain their personal information or even money. Many target younger kids and try to get their Social Security Numbers because they have clean records. Tell your kids to let you know if they see any of these:
Phishing email scams that try to get your child to click a dangerous link
The Nigerian scam where the scammer says a large amount of money is waiting for you if you contact them and send a small fee.
Greeting card scams where you get a notice saying you have a card waiting and instead, it’s a malicious link.
A guaranteed bank loan or credit card scam. Banks never send you this kind of information online. (Always make sure any bank or financial websites are secure with https in the address and a little lock icon.)
Lottery scam saying you’ve won money if you send a small fee to receive it.
Hitman scam that claims someone you love will be killed if you don’t send money.
Romance scams where people try to seduce you online. This takes weeks to develop a relationship where they then ask for money.
Fake antivirus software where a popup from a website appears saying your antivirus isn’t working, and to click here.
Facebook impersonation scam (where someone else’s profile has been high jacked)
Make-money-fast scams
Travel scams
Fake shopping-site scams
Hackers
These are criminals who try to get into your computer and steal information or money. Unfortunately, your information could be stolen and you won’t even know it. (Like with the Equifax hack.)
47% of American have had their personal information exposed by hackers.
How to protect your child from these threats.
Tell them not to open emails like the ones above. They should let you know if they receive them.
Don’t open emails in the spam or junk folder.
Be careful on gaming and social media sites. Don’t click on the banners.
Be cautious about logging into free WIFI or other websites. Sometimes criminals can get into them and view your information.
Keep a login passcode enabled on all your kids’ devices.
Add 2-step verification wherever you can. When you enable this, you add an extra layer of security to your accounts.
Use different passwords for different accounts.
Beware of suspicious and phishing emails.
Be careful about what information you share on social media sites. (selfies, photos of their home or room)
Privacy is important.
40% of Internet users between the ages of 18-35 have regretted posting personal information about themselves.
35% of 18-35-year-olds think people share too much about their personal thoughts and experiences.
Remember, whatever you post online has the possibility of existing forever. (Colleges and HR executives will scan your child’s social media account to see what kind of person you are.)
Tell your child to think carefully before they post anything.
Delete messages from your social network that may impact you later.
Cut back your social-media contact lists. Only share personal info and events with family and close friends.
Get educated on cyberbullying and don’t take their “bait.” Don’t respond to them.
Be clear about privacy boundaries. Don’t post where you are and that you’re not at home.
Ask friends and family not to post photos or info about you unless they clear it with you.
Cyberbullying
43% of teens aged 13 to 17 report they have experienced some sort of cyberbullying in the past year.
Tell kids to talk to you if this happens to them.
Use software to block Bullies’ IDs.
Save the evidence—Take screenshots. To protect your child, you may need to contact school officials or even the police.
How do you protect your device from these threats?
Use Complex Passwords.
Use passwords that are easy to remember but hard for others to guess. Have your child think of a phrase like: “Mydogiscuteand8yearsold” and use the first letter of each word—Mdica8yo.
Change your child’s passwords often. Do this at least every three months.
Don’t let browsers save passwords. While most websites don’t store actual passwords, they do store a password hash for each username.
Check online accounts regularly. If you don’t, someone else could be using them. Do this for all your accounts, even the ones that you don’t use anymore.
Use a password manager. Like LastPass or Dashlane. They will generate strong passwords and remember them for your child.
Use Firewalls. There are two types: a software firewall and a hardware firewall. They are like a security gate between your computer and any unauthorized attempts to access your computer.
Have an up-to-date Antivirus on all your devices. Make sure it stays current or you won’t be protected. There are free ones, but the ones you pay for will be better. Put antivirus software on your phones and tablets too.
Install Spyware software on your computer devices. This will keep criminals from loading spyware on your devices that can track everything you do. Make sure there’s no spyware on your computer devices to make sure your child is safe.
Set your Web browsers at a high-security setting. This might be a little aggravating as things could load more slowly, but it’s worth it. At least you’ll have a choice when you go to a website whether you want to share your information.
Protect Your Child from Online Predators
Don’t’ let them post personal or location-related information online.
They should think carefully before posting pictures or videos.
Don’t accept friend requests from people you don’t know.
Always tell parents about strange friend requests or emails.
Online Safety Software
NetNanny
Norton Family Parental Control
KidLogger
mobicip
Qustodio
Helpful Resources Connect Safely
Internet Safety 101
Get Cybersafe
com
Common Sense
In summary—A few more tips to remember:
Create addresses and usernames that are gender neutral
Don’t use photos of yourself as part of online profiles.
Look into the setting of any apps with messaging or file-sharing features to see if it can be disabled.
Don’t accept friend requests from people you don’t know.
Always tell your parents about strange friend requests or email.
Our children are at risk, even when at home and when you’re there. Teach your children about online risks and protect your devices from viruses and malware. For more information about helping your children stay safe online, contact {company} in [city} at {phone} or {email}.
by Felicien | Oct 11, 2017 | Education
Whether you believe that more screen space equals higher productivity or simply more room for distraction, the dual monitor discussion isn’t going away anytime soon.
Walking into an IT department in most offices may make you feel as though you’re in some futuristic movie: with multiple screens shifted at all angles, all with variations of code scrolling across them. While this isn’t unexpected from a technology team, how can you evaluate whether or not multiple monitors are helpful for your business users? When trying to determine whether they’re a productivity booster or simply offering your business users more virtual real estate to play on social media, you’ll want to consider a variety of factors such as available desk space, job requirements and yes — the cost.
Potential Distractions
Humans do many things well, but not necessarily many things at the same time. The potential distractions available when you have multiple monitors is exponential, as you’re offering workers that much more space to open additional windows into their tasks. Multitasking has been shown to reduce job satisfaction, impair cognitive function and distracts us, as well as dividing our attention and sabotaging our performance. Multitasking is actually a misnomer, as essentially what’s happening is that your brain is hopping back and forth from task to task very rapidly, which can damage our ability to think deeply and creatively in the long term. What has been considered a boon on a resume in the past (“excellent multi-tasker”) might well become a detriment as businesses look for individuals who can dig deep, focus and solve tough business challenges.
Space Requirements
When you’re considering adding a second monitor to any desktop setup, there are two space requirements you have to keep in mind. The physical space required on the desk and whether the user will still have enough room to balance a coffee cup, notepad and pen and the digital requirements of having enough system resources to keep things running efficiently and latency-free. The physical desk space may not seem like much of a challenge until you attempt to fit two large monitors on a desk and see how far away from your user will need to sit to view them effectively and without eye strain. Creating a physical setup that helps maximize efficiency is particularly important in call center environments or when there are significant requirements for contract review or other paperwork, for instance. Ensuring that you have covered any additional video card requirements and ensuring that you have a swift enough processor will keep programs opening, closing and moving swiftly as well.
Cost Implications
While monitors have come down a great deal in cost in recent years, adding a second or even a third monitor can cause some unexpected expenses. For instance, while many computers will support up to two monitors, adding a third monitor often requires a special video card in order to get everything properly connected. The cost of two monitors is generally higher than a single widescreen monitor, but this setup can be more effective than a single widescreen monitor simply because the separation between the monitors often allows the mind to separate work functions more effectively. If you’re using a laptop, having an additional monitor may be a bit confusing as you’re often looking at two differently-sized monitors, which can be incredibly distracting. When you purchase dual monitors, it’s best to get exactly the same brand and style so the screens line up effectively. A large organization can be facing a massive cost impact to add second monitors at every workstation, and even small businesses will feel the pinch of the additional cost — which may or may not be offset by the productivity gains.
Big Boost in Productivity
Anyone who has used a setup with multiple monitors can tell you that having the additional space available is highly beneficial, especially for jobs such as programmers, designers, social media gurus and anyone working with video. Using a single monitor setup would be difficult if not impossible, due to the requirement of switching back and forth between various tasks, software, and workspaces on a regular basis. Some experts believe that productivity is increased by more than 40% when using two monitors, while other studies have shown that errors are reduced as well as improvements found in the level of employee stress. This isn’t difficult to believe when you consider the challenges associated with flipping back and forth between programs in order to transfer information between software packages. Fewer clicks can equal a faster workflow, especially important in today’s world of rapid-fire communication. Many organizations have implemented a hybrid model, where some teams utilize two or more monitors based on business needs, while other employees work with a single monitor.
If you’re considering dual monitors to boost productivity or you are too concerned about distractions to take the plunge, our technology professionals can help you work through the various scenarios to determine what will work most effectively for your organization.
by Felicien | Oct 11, 2017 | Education
As if the threat of a data breach isn’t bad enough, Australian business owners now need to be aware of enhanced legislation around notifications in the event of a data breach.
Data breaches are a serious threat to businesses throughout the world, but Australia has lagged behind states in the U.S. and other parts of the world when it comes to data breach notification laws. However, that time is coming to an end, as the Australian Senate passed February’s Privacy Amendment Bill. This Notifiable Data Breaches Bill will go into effect 22 February 2018 and has the potential to dramatically change what a business is required to do in the event of a data breach. This bill has been quite a while in the making, as several false starts in 2013 and 2014 ultimately ended without bringing an updated legislation to fruition. See the impact on your organisation and how you can prepare for this new regulation before it takes full effect.
Damages from a Data Breach
The damages caused by a significant data breach can be far-ranging: both for the organization that suffered the breach as well as for the individuals whose personal data was impacted. Cybercriminals are always looking for new and creative ways to make money by leveraging the PII, or Personally Identifiable Information, of individuals. However, the largest damage done is often to the business from which the data was stolen, as the business can be impacted by negative press, massive drops in consumer confidence and additional remediation costs such as attorney fees and notification fees. These serious damages include public scrutiny, especially from vendor partners or investors, as well as the need to spend considerable time, effort and energy reviewing current security procedures and looking for changes that can be made that will add to the overall security of the business in the future. On top of all of the upheaval, it’s not unusual for a business who suffered a data breach to lose up to 20 percent of their overall client base in the near term as a byproduct of reduced consumer confidence.
Barriers to Security
Chief Security Officers are quick to note that there are significant challenges associated with maintaining adequate security postures. Increasingly complex systems with a great deal of interoperability can cause integration teams to take shortcuts with security, such as not applying patches quickly due to the concern about potential system outages. Another oft-cited difficulty is keeping the number of security protocols under control. More is not always better, especially when it comes to the number of security products in play. When there are a dozen or more unique platforms, you’re leaving significant room within the infrastructure for gaps and mistakes. The speed that business leaders require may allow systems to be launched without adequate hardening, or abandoned without being fully depreciated and disconnected from all other systems.
Malware and Ransomware
With the extensive complexities in systems that are all targeted towards preventing cyber attacks, hackers are going back to the classic attacks that have worked for years, such as malware and spammy email links. These simple yet highly-effective attacks are dependent upon convincing a well-meaning employee to click a link, open a file or take another action that provides either damage to the account or access to the network for hackers. There is not always a need for cybercriminals to craft a sophisticated attack when a basic click-ad that launches malware will do the job of getting them into the system just fine! Security protocols on the technology side can be supplemented by extensive training on the business side of the house, as knowledge and awareness are shown to be the most effective ways of combating these types of attacks.
What Constitutes a Data Breach
The updated legislation defines a data breach as a situation where:
Unauthorized access to the personal information of one or more individuals has been obtained by cybercriminals
There is a strong likelihood that the information obtained can be used in a detrimental way
Individuals who are affected by the breached information are likely to incur serious physical, psychological, financial or other harm as a result of the disclosure
Information that is considered personal includes such items as tax file numbers, personal health data, and credit information.
Actions to Take in the Event of a Breach
Should your organization be the target of a data breach, there are actions that you should be prepared to take immediately, such as the new compulsory regulatory notification. The Office of the Australian Information Commissioner (OAIC) requires that notification is made “as soon as practicable after the entity is aware that there are reasonable grounds to believe that there has been an eligible data breach” — an important change from previous notification requirements. Previously, organizations were encouraged, but not required, to take this step, but failed to notify the proper authorities now carries a stiff penalty. This is particularly onerous as the legislation requires that notification is completed if even a single record is compromised. With fines starting at $360,000 for individuals and $1.8 million for organizations, this isn’t a requirement that can be taken lightly.
The cost of data breaches and the high potential for loss, it’s more important than ever that businesses look for ways to enhance cybersecurity. Want to learn more about how your organisation can improve security measures?
Want to learn more about how your organisation can improve security measures?
Contact us and speak to a security professional today and determine if there are remediation measures that you can take immediately to support your current security posture.
by Felicien | Oct 11, 2017 | Education
If you’ve purchased a Mac expecting to never have to be concerned with malware or hacking, think again! A recent exploit is targeting Mac users. The good news? It’s preventable.
Mac users have long touted the fact that Apple computers are much less likely than computers running Microsoft Windows to be hacked, but that era may be coming to an end. With four times as many Windows 10 computers currently in the marketplace than Macs, it’s not surprising that hackers choose to attack the system that is much more prevalent in the marketplace overall. A recent ransomware attack may be cause for Mac users to stop their taunts of the platform being hacker-proof, however. The good news is that by taking a few simple precautionary steps, you may be able to stop cybercriminals from locking you out of your expensive Mac.
Are Apple Products ‘Hacker Proof’?
For more than a decade, there’s been a rumor that Apple products are hacker proof, but the reality is that no operating system or data structure is completely airtight. Historically speaking, there are fewer viruses and malware that are targeted to Macs than to PCs, but that doesn’t mean that any Apple OS is immune from threats. There have been more attacks in recent years as ransomware has leaked to the dark web. While Android and Windows will likely always receive a higher percentage of malware than Apple devices, the threats continue to multiply as Apple becomes ever more popular in the marketplace. It’s only a matter of time until specific devices are targeted with browser-specific hacks that bypass some of the security that is baked into OS X.
Mac Attacks
Phishing emails and third-party exploits of software such as Java or Adobe are also some of the current crops of attacks against Macs, but they’re not the only ones. Macs have been plagued by adware and bloatware — whether malicious or just annoying — that can float pop-up ads on your system to tempt users to download non-essential software tools. These problem spots can slow down the system overall or spawn additional pop-ups, and generally aren’t dangerous. Malicious iOS apps are another form of malware that is likely to be found on a Mac. It’s important to stick with only downloading apps from the official App Store, as others could potentially include subsets of code that can steal user information or infect the device in a much more widespread fashion. While buying from within the App Store helps combat nearly all malicious software, the ever-diligent app reviewers don’t catch everything. In the last 24 months, XcodeGhost was able to introduce a framework into legitimate apps that hijacked back-end servers and ultimately infecting the third-party advertising network.
Rise of Ransomware
Hackers are always looking for new ways to hold your device hostage, essentially locking you out of your device until you pay a ransom which is generally requested in nearly-untraceable Bitcoin currency. With ransomware up nearly 250 percent in 2017, cybercriminals have discovered that there is significant money to be made in locking down computers both for individuals and for businesses. Ransomware has often targeted PCs in the past, but mobile devices and Macs are a growing part of the threat landscape. The U.S. has been hit particularly hard, most likely due to the high number of available computers and relatively high per capita income — which translates into funds available to pay for ransom demands. Ransomware often completely disables the boot-up process for your computer, a crippling effect on any system.
Find My Mac
This recent risk is related to the Find My Mac application, or FMM, which is being targeted by hackers who then request Bitcoin payments in order to provide renewed access to the system. This particular app makes it simple to pinpoint the current location of your device and is helpful in the case of a lost phone or stolen Mac computer. Apparently, hackers have illegally obtained a large quantity of iCloud passwords and usernames, and are leveraging these assets to lock people out of their Macs and mobile devices. The good news is that there’s a relatively easy fix that doesn’t involve paying the ransom, but only if you’re willing to lose all of the data on your device by doing a hard reset. This can also be accomplished by bringing your Mac to an Apple store and verifying your identity.
Reducing the Risk of Loss
Fortunately, there are a few ways that you can reduce the risk of being hit by these cyber criminals. Creating a password that is highly secure is the first step, as is turning off the Find My Mac or Find My iPhone in your device’s Settings. Turn on two-factor authentication on your Apple account to ensure your password cannot be reset without your knowledge, and consider utilizing a password vault app that provides additional levels of security. There’s a further step that you should take before selling or loaning your computer that may help keep your Apple ID information safe, as iCloud information is stored on the nvram of your computer. Disabling FMM at the command line can be accomplished by entering:
$ nvram -d fmm-computer-name
$ nvram -d fmm-mobileme-token-FMM
If your IT admins are struggling to keep security under control, let the professionals at {company} support your {city} organization. We work to ensure that all risks are addressed in a timely manner throughout your fleet of devices and computers.
Contact us today at {phone} or via email to {email} for more information or to take advantage of your free initial consultation.
by Felicien | Oct 10, 2017 | Education
While some feel more isn’t always better, it actually is when it comes to monitors. Some feel that paying for multiple monitors for employees is just a waste of space and money. That’s a myth. According to the report in the NY Times by a Jon Peddie Research survey, multiple monitors can increase productivity by 20 to 30 percent.
A Closer Look at the How
So, how do multiple monitors actually increase productivity? The answer is quite simple. It takes less time to complete tasks with multiple monitors. Typically, computer tasks entail, drafting emails, data entry, leaving a chat box open while working, comparing products side-by-side, comparing images and spreading spreadsheets across monitors to view a report. This all takes time. Just with drafting weekly reports and data entry, you have to open the report template, open all related documents, switch back to the report template, double-check accurate information and repeat the process again until the report is finished.
It takes a lot of time to switch between documents. With multiple monitors, employees can leave the first source document open, pull up the report template and switch between documents in less time, even when there are only three documents to compare. It’s just less clicks.
What It Adds Up To
“According to the University of Utah, multiple monitors can save each employee 2.5 hours each day if they use it for all of their tasks. If you have 30 employees, a second monitor saves you 75 hours a day, 375 hours a week, 1650 hours a month, and 18,825 hours a year. Even if you’re paying these employees a minimum wage of $7.25 an hour, which you’re most likely not, you’re still saving at least $136,481.25 a year. Investing in multiple monitors can significantly increase your employees’ productivity, increase their value and decrease your costs. When you can cut costs, you increase your profit margin.” If you can save money, why wouldn’t you?
More Studies on Multiple Monitors
A Utah study discovered that employees had a 44 percent increase in productivity for text tasks and a whopping 29 percent rise for spreadsheet tasks when using multiple monitors. It also showed a $1.5 million in cost saving in one year with a business of 250 employees. And in a Georgia study, employees were able to complete tasks 2 ½ minutes faster using a multiple monitor setup.
“According to University of California Irvine professor Gloria Mark, switching attention between different tasks is where a huge amount of time is lost at work. The more people switch their attention, the higher the frequency or the less duration percent on any computer screen, the less productive they are at the end of the day, Mark told Mic. We know from many years of work there is a cost to re-orienting to a new task.”
Ideal Candidates for Multiple Monitors
Multiple monitors work best for employees who multitask. Workers who read financial reports, manage inventory levels, respond to email, review time sheets, check the Internet for the latest news and prepare summary information for executives are ideal candidates for multiple monitors. If you’re considering multiple monitors, it’s wise to ensure that your computer system has an adequate system to support it. Things like RAM, power supply, motherboards and other computer system resources also need to be in check. Simply put, you need to make sure that your system can handle it. Here’s a tip. Make sure that all of your monitors are the same size and positioned at the same height, or else your eyes will have to work harder to adjust from one monitor to the next as you go back and forth.
Just as a farmer needs a tractor, most businesses need technology tools, and the main tool is a computer. The computer has emerged as a needed tool for businesses. Adding multiple monitors to your computer is a bit complicated, and a managed service provider can assist with the addition. Today, multiple monitors are no longer just the norm with Silicon Valley companies and trading desks on Wall Street. It’s common for all businesses. Three or more screens have taken over due to its affordability and decreasing bulkiness of displays. It enhances the computer experience for employees and adds to efficiency. And instead of toggling between second screens in their laps and palms, employees prefer to toggle with just a glance using a third or fourth screen sitting side by side on their desks.
{company} in {city} can help your company realize the benefits of display technology with multiple monitor configuration. {company} provides complete solutions and world-class support. Set up quickly and efficiently. Give a call at {phone}or email them at {email}. The IT experts at {company} are always happy to answer any questions. Make {company} your technology partner today.