508-909-5961 [email protected]

Better internet security: Easy as 1, 2, 3The internet is not such a bad place to be in — for as long as website owners do their share in keeping it safe for their visitors. Here are three tips to do exactly just that. Tip 1: Use HTTPS Short for Hypertext Transfer Protocol Secure, HTTPS indicates that a website has an extra […]

The post Better internet security: Easy as 1, 2, 3 appeared first on Complete Technology Resources, Inc..

Better internet security: Easy as 1, 2, 3

The internet is not such a bad place to be in — for as long as website owners do their share in keeping it safe for their visitors. Here are three tips to do exactly just that.

Tip 1: Use HTTPS

Short for Hypertext Transfer Protocol Secure, HTTPS indicates that a website has an extra layer of security for its users. This layer encrypts data exchanged between a user’s browser and the web server that delivers the data requested by the user. To use a simpler comparison, imagine someone tapping your landline, but instead of getting to listen in on your conversations, they’ll hear people speaking in tongues instead.

In August 2014, Google Chrome, the world’s most popular browser, announced that having HTTPS makes your website rank higher in its search algorithm. And since October 2017, the browser began flagging non-HTTPS websites as not secure whenever users try to fill out something as simple as a contact form on it. In July 2018, Chrome started showing a “not secure” warning on any website that does not implement HTTPS, whether or not users are filling out a form there.

Because of Google’s measures, the security protocol has been widely adopted. Even if your website does not contain or ask for sensitive information, implementing HTTPS engenders trust and a sense of security among internet users, while remaining on HTTP will make web visitors abandon or avoid you sooner or later.

Tip 2: Embrace multifactor authentication (MFA)

Since account credentials can be easily stolen via phishing attacks, username and password combos are no longer enough to keep bad actors at bay. To ensure that the one accessing an account is truly that account’s owner, additional identity authentication steps must be implemented.

These steps can involve the use of the account holder’s device — the one logging in must first verify their phone number, receive a one-time password on their smartphone, then enter that code in the access portal before the code’s validity lapses. Alternatively, MFA may ask for a face, retina, voice, or fingerprint scan for authentication.

MFA can be a bit of a hassle for your internal and external users, but a little inconvenience is a small price to pay for immensely effective cybersecurity.

Tip 3: Update browsers and devices

Did you know that dated versions of browsers, operating systems, and even other software packages can create an easy entry point for hackers? Often, new updates are created specifically to fix security holes. However, people tend to procrastinate and leave applying updates for another day. Hackers take advantage of this by searching for outdated devices to infiltrate while their victims watch YouTube on last year’s version of Firefox.

Yes, installing an update might take 15 minutes of your time, but this time investment can pay dividends in terms of preventing a security breach that could cost you or your business thousands.

Looking for more tips to boost your internet security? Get in touch to find out how we can help.

Published with permission from TechAdvisory.org. Source.

The post Better internet security: Easy as 1, 2, 3 appeared first on Complete Technology Resources, Inc..

Read More

Fix these business security flaws nowAs businesses have become more reliant on technology, they’ve also become a prime target of cybercriminals. If you want to protect your organization from cyberattacks, make sure your cybersecurity system doesn’t have the following flaws. Open wireless networks With just one main internet line and a couple of wireless routers, an entire office can get […]

The post Fix these business security flaws now appeared first on Complete Technology Resources, Inc..

Fix these business security flaws now

As businesses have become more reliant on technology, they’ve also become a prime target of cybercriminals. If you want to protect your organization from cyberattacks, make sure your cybersecurity system doesn’t have the following flaws.

Open wireless networks

With just one main internet line and a couple of wireless routers, an entire office can get online. A wireless internet connection saves money, but there’s a risk that it might be unsecure.

It’s not enough to plug in a wireless router and create a basic network to secure your wireless network. If you have an open network, anyone within range can connect. With simple tools and technical know-how, cybercriminals can capture incoming and outgoing data, and even attack the network and any device connected to it.

Ensure that all wireless networks in the office are secured with strong passwords. Many internet service providers that install hardware when setting up networks will often just use an easy-to-guess password for the router. Change this password immediately to minimize the risk of unauthorized users gaining access to your network.

Unsecure email

Most companies that have implemented a new email system in the past couple of years are most likely secure. This is especially true if they use cloud-based platforms or well-known email systems like Exchange, which offer enhanced security and scanning.

The businesses that are at risk are those using older systems like Post Office Protocol, or systems that don’t encrypt passwords (also known as “clear passwords”). If your system doesn’t support encryption, anyone with the right tools can compromise your systems and data.

Unsecure mobile devices

Mobile devices help you stay connected and productive while out of the office. However, if you use your tablet or smartphone to connect to office systems without proper security measures in place, you run the risk of compromising your networks.

Imagine you have linked your work email to your smartphone but don’t have a password enabled. If the device goes missing, anyone who picks it up can have access to your email and your sensitive information. The same applies if you install a malicious mobile app. If you use this same device to connect to your company's network, the malware will spread across your systems and disrupt your business operations.

Ensure that employee devices have adequate security, such as passcodes, and your company has sufficient security policies in place to regulate their use. Lastly, implement mobile device management solutions to prevent employee devices from being a security risk to your network.

Anti-malware software that isn’t properly maintained

Anti-malware software needs to be properly installed and maintained if they are going to stand a chance of keeping your systems secure.

If your anti-malware scans are scheduled during business hours, some employees may just turn the scanner off because it slows down their computers. This makes your systems vulnerable to malware.

The same goes for not updating your anti-malware software regularly. Updates are important for anti-malware applications because they implement new databases that contain recently discovered threats and fixes.

Lack of firewalls

A firewall is a network security tool that filters incoming and outgoing network traffic and protects data from being accessed from outside the network. While many modems or routers include firewalls, they are often not powerful enough for business use.

Get a firewall that covers the whole network at the point where data enters and exits (usually before the routers). These are business-centric tools that should be installed by an IT partner like a managed IT services provider for them to be most effective.

How do I ensure proper business security?

The best way to secure business systems and networks is to work with an IT partner like us. Our managed services can help you set up cybersecurity measures and ensure that they are managed properly. Tech peace of mind means you can focus on growing your business. Contact us today to learn more.

Published with permission from TechAdvisory.org. Source.

The post Fix these business security flaws now appeared first on Complete Technology Resources, Inc..

Read More

Why you shouldn’t use public charging kiosksSmartphones have become a vital part of modern life. And as we spend more time on these gadgets, the likelihood of needing to recharge them while on the go increases. When your phone’s juice runs out and you’re nowhere near your charger, a public charging kiosk can look pretty promising. But what you might not […]

The post Why you shouldn’t use public charging kiosks appeared first on Complete Technology Resources, Inc..

Why you shouldn’t use public charging kiosks

Smartphones have become a vital part of modern life. And as we spend more time on these gadgets, the likelihood of needing to recharge them while on the go increases. When your phone’s juice runs out and you’re nowhere near your charger, a public charging kiosk can look pretty promising. But what you might not know is that recharging phones at public charging stations can make you a victim of juice jacking.

What is juice jacking?

While newer phones can be charged wirelessly, older models still need power cords to power up their batteries. This charging method has one dangerous flaw: the cable used for charging can also be used for transferring data. Cybercriminals can exploit this flaw to commit juice jacking, or the act of using the USB data/power cable to illegitimately access phone data and/or inject malicious code into a device.

Juice jacking often happens at public charging kiosks. When you charge your phone, it is paired with a computer concealed within the charging stand. The computer can then access all of the information on your device, including personal data such as your address book, notes, photos, music, SMS database, and keyboard cache. It can even initiate a full backup of your phone, which can be accessed by the hacker wirelessly anytime.

Apart from stealing your data, cybercriminals can also inject malware into your phone through a public USB hub. All it takes is a minute of being plugged into a public charger for your phone to be infected by malware. Once infected, your phone can be prompted to display ads, download apps, or view web pages without your authorization.

How to avoid juice jacking

The most effective precaution against juice jacking is simply not charging your phone using a third-party system. Here are some tips to help you avoid using a public kiosk charger:

  • Keep your battery full. Make it a habit to charge your phone at home or at the office when you are not actively using it. When unexpected circumstances happen and you get stuck outside, your phone will have enough juice and you won’t need to charge it.
  • Carry a personal charger. External batteries like power banks have become very small and portable in recent years. Always have one in your bag so you can charge your phone securely on the go.
  • If your device has a removable battery, carry a backup battery with you anywhere. If the idea of carrying a spare battery doesn’t appeal to you, you can opt to carry a battery case instead: it’s a phone case that doubles as a battery.
  • Lock your phone. Without the proper PIN code or fingerprint and face ID scan, your phone cannot be paired with the hidden computer in the kiosk charger.
  • If you must use a third-party power source, use power-only USB cables. These cables are missing the two wires necessary for data transmission, ensuring that they can only be used for charging.

Technology threats are all around us. Even something as trivial as powering your phone in a public kiosk station can compromise your device’s security. If you want to learn more about how to protect your gadgets from today’s security threats, don’t hesitate to call us. Our technology experts are happy to help.

Published with permission from TechAdvisory.org. Source.

The post Why you shouldn’t use public charging kiosks appeared first on Complete Technology Resources, Inc..

Read More

How to check if an Android app is safe to installAndroid devices are among the most popular devices on the market today. With a wide variety of features and designs, users have an abundance of choices. Not only that, but there are also more than two million apps available on the Google Play Store. Unfortunately, some of these are rogue software developed by cybercriminals under […]

The post How to check if an Android app is safe to install appeared first on Complete Technology Resources, Inc..

How to check if an Android app is safe to install

Android devices are among the most popular devices on the market today. With a wide variety of features and designs, users have an abundance of choices. Not only that, but there are also more than two million apps available on the Google Play Store. Unfortunately, some of these are rogue software developed by cybercriminals under the guise of credible developers — and these apps can be hard to unmask.

How can you protect yourself and make sure that your Android device is running only safe applications?

Enable Google Play Protect

Google Play Protect proactively checks every app before you download them and rechecks your device regularly to ensure it’s free of dangerous software. The service helps keep your device safe and secure by:

  • Running a safety check on apps from the Google Play Store prior to installation
  • Checking your device for potentially harmful apps downloaded from other sources
  • Removing known harmful apps and warning you about any potentially harmful ones that are detected
  • Notifying you about detected apps that violate Google’s Unwanted Software Policy
  • Sending you privacy alerts about apps that can get access to your personal information, violating Google’s Developer Policy

If it finds a potentially harmful app, it will do one of these three things:

  • Send you a notification that will prompt you to remove the app
  • Disable the app until you uninstall it
  • Remove the app automatically

Google Play Protect is enabled by default, but you can turn it on or off by following these steps:

  1. Open the Google Play Store app.
  2. Go to Menu > Play Protect > Settings.
  3. Toggle on Scan apps with Play Protect.

Download from a trusted source

Make sure to download only from well-known and legitimate sources like the Google Play Store, Samsung Galaxy Store, or Amazon Appstore, as these are routinely monitored and scanned for fraudulent apps. However, bogus apps still make it into these stores from time to time, so it’s important to check the ratings and reviews of an app before downloading it. It’s also well worth checking its privacy policy so you know how the app will handle and protect your personal information.

Use third-party antivirus software

Because the market for tablets is growing, more and more companies are offering mobile antivirus solutions. Although there are free antivirus software that are legitimate and effective, the better option is to purchase security solutions from well-established companies to get maximum protection.

Third-party antivirus software may come with monthly or yearly subscriptions, as well as different premium rates for different types of security measures, but their benefits far outweigh the cost of purchase.

Be vigilant

There are many effective steps you can take to make sure your tablet or smartphone is safe against fake apps:

  • Before downloading from a trusted source, read the fine print as well as user reviews, and look out for evident security risks.
  • Uninstall unused apps. This will not only help you avoid any unnecessary risks with potentially vulnerable apps, but also make more room on your device.
  • Update your software. Patches from software updates can fix bugs of vulnerabilities, which, in turn, can thwart cyberattacks. To avoid software update inconveniences, enable automatic updates on your Android tablet or smartphone.

If you are looking to learn more about protecting your Android device, we can help. Contact us today.

Published with permission from TechAdvisory.org. Source.

The post How to check if an Android app is safe to install appeared first on Complete Technology Resources, Inc..

Read More