508-909-5961 [email protected]

5 Most common security breachesThese days, the security of various IT systems is constantly being called into question. From attacks on mobile devices to ever-increasing types of malware, many businesses are struggling to stay on top of their security. One of the best ways to stay protected is to be aware of common cybersecurity issues. To that end, here […]

The post 5 Most common security breaches appeared first on Complete Technology Resources, Inc..

5 Most common security breaches

These days, the security of various IT systems is constantly being called into question. From attacks on mobile devices to ever-increasing types of malware, many businesses are struggling to stay on top of their security. One of the best ways to stay protected is to be aware of common cybersecurity issues. To that end, here are five common ways your security can be breached.

#1. You are tricked into installing malicious software

One of the most common ways a system’s security is breached is through downloaded malware. In almost every case where malware is installed, the user was tricked into downloading it.

A common trick used by hackers is planting malware in software hosted on warez and torrent websites. When users visit the site, they are informed that they need to download the software in order for the site to load properly. Once downloaded, the malware infects the system. In other cases, hackers send emails with a malware-infected attachment.

There is a nearly limitless number of ways you can be tricked into downloading and installing malware. Luckily, there are steps you can take to avoid this:

  • Never download files from an untrusted location. If you are looking at a website that is asking you to download something, make sure it’s from a company you know and trust. If you are unsure, it’s best to avoid downloading and installing the software.
  • Always look at the name of the file before downloading. A lot of malware is often disguised with names that are similar to legitimate files, with only a slight spelling mistake or some weird wording. If you are unsure about the file, then don’t download it. Instead, contact us so we can verify its authenticity.
  • Stay away from torrents, sites with adult content, and video streaming sites. These sites often contain malware, so avoid them altogether.
  • Always scan a file before installing it. Use your antivirus scanner to check downloaded apps before opening them. Most scanners are equipped to do this by right-clicking the file and selecting Scan.

#2. Hackers are able to modify the operating system (OS) settings

Many users are logged into their computers as admins. Being an administrator allows you to change all settings, install programs, and manage other accounts.

If a hacker manages to access your computer with you as the admin, they will have full access to your computer. This means they could install other malicious software, change settings, or even completely hijack the machine. The biggest worry about this, however, is if a hacker gets access to a computer used to manage the overall network. Should this happen, they could gain control of the entire network and do as they please.

To avoid this, limit the administrator role only to users who need to install applications or change settings on the computer. Beyond this, installing security software like antivirus scanners and keeping them up to date, as well as conducting regular scans, will help reduce the chances of being infected, or seeing infections spread.

#3. Someone physically accesses your computer

These days, it seems like almost every security threat is trying to infect your IT infrastructure from the outside. However, there are many times when malware is introduced into systems, or data is stolen, because someone has physically accessed your systems.

Let’s say you leave your computer unlocked when you go for lunch and someone walks up to it, plugs in a malware-infected USB drive, and physically infects your system. They could also access your system and manually reset the password, thereby locking you out and giving them access.

Secure yourself by setting up a password to control access to your computer. You should also lock, turn off, or log off from your computer whenever you step away from it.

Beyond that, disable drives like CD/DVD and connections like USB if you don’t use them. This will limit the chances of anyone using these removable media to infect your computer.

#4. Someone from within the company infects the system

We’ve seen a number of infections and security breaches that were carried out by a disgruntled employee. They could delete essential data, or remove it from the system completely. Some have even gone so far as to introduce highly destructive malware. The most effective way to prevent this, aside from ensuring your employees are happy, is to limit access to systems.

Your employees don’t need access to everything, so reexamine what your employees have access to and make the necessary adjustments. For example, you may find that people in marketing have access to finance files or even admin panels. Revoke unnecessary access rights and ensure that employees only have access to the files they need.

#5. Your password is compromised

Your password is the main way you can verify and access your accounts and systems. The issue is, many people have weak passwords. And with the steady increase in the number of stolen user account data, it could only be a matter of time before they can crack your password and compromise your account.

To add insult to injury, many people use the same password for multiple accounts, which could lead to a massive breach. Therefore, you should use strong and different passwords for your accounts.

To further enhance your password security, utilize multifactor authentication (MFA), which uses more than one method of verifying a user’s identity, such as a fingerprint or a one-time code.

If you are looking to learn more about securing your systems, contact us today to learn how our services can help.

Published with permission from TechAdvisory.org. Source.

The post 5 Most common security breaches appeared first on Complete Technology Resources, Inc..

Read More

All about macOS CatalinamacOS Catalina’s October 2019 rollout is only a few days away, and many can’t wait to see what the new and improved operating system has in store. Here are some of the features to look out for in Catalina. Before you download macOS Catalina, make sure your device meets the system requirements. Apple has said […]

The post All about macOS Catalina appeared first on Complete Technology Resources, Inc..

All about macOS Catalina

macOS Catalina’s October 2019 rollout is only a few days away, and many can’t wait to see what the new and improved operating system has in store. Here are some of the features to look out for in Catalina.

Before you download macOS Catalina, make sure your device meets the system requirements. Apple has said that Macs and MacBooks that could upgrade to macOS Mojave can be updated to Catalina, including:

  • 12-inch MacBook (2015 and later)
  • MacBook Air (2012 and later)
  • MacBook Pro (2012 and later)
  • Mac mini (2012 and later)
  • iMac (2012 and later)
  • iMac Pro (2017)
  • Mac Pro (2013 and later)

New apps for music, audio, and video

One of the most conspicuous changes to Catalina is the absence of iTunes — in its place is Apple Music. It has the same interface as its predecessor and gives you access to more than 50 million songs that can be streamed or downloaded.

For your podcasts and videos, there’s Apple Podcasts and Apple TV, respectively. Podcasts enables you to listen to over 750,000 free podcasts, browse episodes easily by guest or topic, and download for offline listening.

Meanwhile, Apple TV offers thousands of movies to buy or rent, ranging from the latest films and TV shows to those you previously bought from iTunes. And starting November 1, you can stream or download all-original movies and series from video subscription service Apple TV+, which you can access through the Apple TV app.

All-new Reminders, Notes, and Search

The Reminders app has been overhauled not just for macOS but for all Apple platforms too. You can now add attachments to reminders and draft smart lists that integrate information from other lists, and tag people in reminders — and be reminded that you tagged them the next time you speak to them using the Messages app.

Meanwhile, Notes lets you collaborate on a single note or several folders with your team or family members. To do this, launch Notes from your dock and open the note you’d like to share with others. In the toolbar, click Add People > Note name or Folder name. Next, choose how you’d like to share the note or folder with them (Mail, Message, etc.).

Finally, the Search function now has the ability to recognize objects and text within images. Additionally, suggested searches that you can click to view make looking for items on your Mac quicker.

A second monitor with Sidecar

Sidecar allows you to mirror your Mac’s desktop on your iPad, effectively turning it into a second screen. This is useful when you’re working on one app but need to reference another — no more switching from tab to tab! And if you’re working on a presentation, you can preview it on your iPad while you edit on your Mac.

Manage your email better

Block specific senders and move their emails straight to the trash with the improved Mail app on macOS Catalina. You can also unsubscribe from email lists and mute thread notifications, allowing you to keep distractions at bay. Also, Mail’s new layout and interface gives you the option to preview a message below or to the right of the message list.

Get usage reports

First introduced in iOS 12, Screen Time’s real-time usage reports give you insight into how you use your Mac. iCloud keeps track of data on how long you use your Mac, what apps you use, what websites you visit most, and even what notifications you receive most often. With these data, you can monitor and block apps and websites that distract you from work and other tasks.

Enhanced security

Keep your Mac and its contents protected from cyber risks with the improved Gatekeeper. macOS’s security feature verifies downloaded apps before you run them, reducing the likelihood of executing malware. Another valuable security feature is Activation Lock, which ensures that only you can reactivate or wipe your device if it’s ever lost or stolen.

Easy login and app installation

Lastly, with macOS Catalina, you can log into accounts that need your Mac password by just double-clicking on the side button of your Apple Watch. You can also use your Apple watch to approve app installation, unlock settings, and more.

These features barely scratch the surface of all that macOS Catalina has to offer. Want to learn more about how the latest OS can help improve your productivity in and out of the office? Reach out to our Mac experts today.

Published with permission from TechAdvisory.org. Source.

The post All about macOS Catalina appeared first on Complete Technology Resources, Inc..

Read More

What you need to know about juice jackingWe’ve come to rely on our smartphones to help complete daily tasks, and this has resulted in the need to recharge our phones multiple times a day. But when you’re far from your charger, public charging kiosks can seem like a good substitute. However, this can lead to an incident of “juice jacking.” If this […]

The post What you need to know about juice jacking appeared first on Complete Technology Resources, Inc..

What you need to know about juice jacking

We’ve come to rely on our smartphones to help complete daily tasks, and this has resulted in the need to recharge our phones multiple times a day. But when you’re far from your charger, public charging kiosks can seem like a good substitute. However, this can lead to an incident of “juice jacking.” If this is news to you, find out what juice jacking is and how you can avoid it.

What’s juice jacking?

While newer phones have ditched the cable charger and moved on to wireless charging, older models still rely on power cords to transmit power to the mobile device. The problem with this setup is that the cable used for charging can also be used for transferring data. This setup is easily exploitable, and trust opportunists to do just that. When you use a public cable, they gain user access by leveraging the USB data/power cable to illegitimately access your phone’s data and/or inject malicious code into your device.

Attacks can be an invasion of privacy: your phone pairs with a computer concealed within the charging kiosk, and information such as private photos and contact information are transferred to a malicious computer. The computer can then access a host of personal information on the device, including your address book, notes, photos, music, SMS database, and keyboard cache. It can even initiate a full backup of your phone, all of which can be accessed wirelessly anytime.

But attacks can also be in the form of malicious code directly injected into your phone. A public USB hub can be used to transmit malware-ridden programs or tracking applications to the user’s mobile phone. All it takes is one minute of being plugged into a harmful charger.

How to avoid juice jacking

The most effective precaution is simply not charging your phone using a third-party system. Here are some tips to help you avoid using a public kiosk charger:

  • Keep your battery full. Make it a habit to charge your phone at your home and office when you are not actively using it or are just sitting at your desk working. When unexpected circumstances happen and you get stuck outside, your phone has juice.
  • Carry a personal charger. Chargers have become very small and portable, from USB cables to power banks. Always have one in your bag so you can charge your phone securely from a power outlet or on the go using a power bank.
  • If possible, carry a backup battery. If you’re not keen on bringing a spare charger or power bank, you can opt to carry a spare battery if your device has a removable battery, or a battery case (a phone case that doubles as a battery).
  • Lock your phone. Without the proper PIN code, fingerprint scan, or face ID, your phone cannot be paired with the device it’s connected to.
  • Use power-only USB cables. These cables are missing the two wires necessary for data transmission and have only the two wires for power transmission. They will charge your device, but data transfer is impossible.

Technology threats are all around us. Even the tiniest detail like charging your phone at a kiosk charger could affect the security of your device.

Looking to learn more about today’s security and threats? Contact us today and see how we can help.

Published with permission from TechAdvisory.org. Source.

The post What you need to know about juice jacking appeared first on Complete Technology Resources, Inc..

Read More

Optimizing your Android tablet experienceMore businesses are relying on Android tablets, especially those with staff who are mobile or away from the office. However, there are many business owners and managers who have trouble managing these Android devices. So, to help, we have created a brief guide on the do’s and don'ts of using your Android tablet at the […]

The post Optimizing your Android tablet experience appeared first on Complete Technology Resources, Inc..

Optimizing your Android tablet experience

More businesses are relying on Android tablets, especially those with staff who are mobile or away from the office. However, there are many business owners and managers who have trouble managing these Android devices. So, to help, we have created a brief guide on the do’s and don'ts of using your Android tablet at the office.

Do:

  • Use separate profiles – Recent versions of Android allow you to set up multiple accounts on one device. This means you can have a personal account and a work account on the same device without the two crossing over. Each account can be protected with a unique password and has its own apps and layout, an ideal setup for staff who use their personal devices for work.
  • Pick responsibly – Android tablets come in all shapes and sizes, and with different versions of the operating system. That’s why it’s a good idea to do some research before you buy one for your business. Take the time to try and identify what you will be using the device for, what features you would like, and most importantly, if the device is compatible with your existing systems. We strongly recommend going with one of the big-name brands like Google, Samsung, or Asus.
  • Develop a usage and management plan – Before you integrate the device into your system, plan ahead for how the device will be used and managed. Will each employee be in charge of managing their own device, or will your IT partner manage the devices for you? Develop a list of approved apps for work, including important ones like email and messaging. Then, make sure employees are trained to use these business apps properly and securely.
  • Look into accessories – One common factor many businesses forget to look into when implementing Android devices is the numerous accessories available for tablets. In order to extend the life of the devices, it is a good idea to get protective cases and screen covers. Also, look and see whether or not the device you have chosen has a removable battery or SD card. If it does, you may want to invest in extra batteries and cards.

Don't:

  • Skimp on security – As Android tablets become more popular, they become more attractive targets for cybercriminals. You must mandate security measures on all devices. This includes an antivirus scanner and daily check for app updates. Also, educate staff on how to spot fake apps, how to enable secure browsing on the web, and why they should avoid unsecured public Wi-Fi networks.
  • Allow third-party app stores – Android is an open-source operating system, meaning you can install apps from almost any location. This has resulted in many third-party app stores (stores not run by Google) popping up. Some of these stores host a wide array of apps, including ones that may contain malware. To keep your business safe, prevent employees from installing apps from third-party stores, and only allow apps that have been thoroughly vetted on Google Play.
  • Worry about fragmentation – Yes, Android is very fragmented — devices are running different versions of Android. While this may seem like a big deal, it doesn't have to be. We recommend limiting your tablet purchase to those with the most recent version of Android. Once you get used to the tablet, the issue of fragmentation will usually disappear, especially if everyone in the office is on the same version.

If you are looking for help in selecting and managing an Android device for your office, contact us today. We have a team of Android experts who can support you at any time.

Published with permission from TechAdvisory.org. Source.

The post Optimizing your Android tablet experience appeared first on Complete Technology Resources, Inc..

Read More