508-909-5961 [email protected]

Fortify your data, physically

Truly optimized security settings and software are beyond the capacity of most business owners. You just don't have time to tinker with your office IT. Instead, try these quick and easy tips before calling us.

Cover up your webcam

There must be some credibility to doing this if Facebook founder, Mark Zuckerberg, former FBI director, James Comey, and NSA whistleblower Edward Snowden all believe their webcams could be compromised.

The post Fortify your data, physically appeared first on Complete Technology Resources, Inc..

Fortify your data, physically

Truly optimized security settings and software are beyond the capacity of most business owners. You just don't have time to tinker with your office IT. Instead, try these quick and easy tips before calling us.

Cover up your webcam

There must be some credibility to doing this if Facebook founder, Mark Zuckerberg, former FBI director, James Comey, and NSA whistleblower Edward Snowden all believe their webcams could be compromised. This is not just another paranoid celebrity reaction to ruthless paparazzi, there’s a genuine reason behind it. Kindly take a moment to consider the following scenario: hackers using your webcam to spy on you.

Though it might sound unrealistic, this actually happened on several occasions. Sometimes for purely voyeuristic reasons and sometimes what appeared to be espionage. This is a very real threat with disturbing repercussions. Hackers aim to gain personal information based on your surroundings, deduce your location, as well as spy on the people you’re with, ultimately using this information to hold you ransom, threatening to broadcast your most intimate and vulnerable moments if you don’t pay up.

Fortunately, guarding yourself against such danger is really easy and some painter’s tape over your webcam should do the trick. If you’re not confident about regular tape, you can purchase a cheap webcam cover online or at any hardware store.

Purchase a privacy shield

Think of privacy guards as those iPhone scratch protectors, but with an anti-snooping feature. These are thin covers you put on your computer, laptop or smartphone screen to limit viewing angles. Once installed, anyone trying to look at your screen from anywhere -- except straight-on -- sees nothing. Privacy filters are commonly used to protect work devices, particularly which display or contain critical files with sensitive data or confidential information. However, less sensitive, personal devices are still vulnerable to ‘shoulder surfing’ -- the act of peeking at someone else’s screen, with or without ill intent, which is why we recommend using these protectors on all your devices.

Use a physical authentication key

Requiring more than one set of credentials to access sensitive resources is common sense, and has become standard practice for established online services. With something called two-factor authentication in place, you gain access to your account only after you’ve entered the authentication code, which the website sends to your smartphone once you’ve entered your account credentials. Until recently, two-factor authentication relied mostly on text messages that were sent to mobile phones. But professionals have now realised that phones can be hijacked to redirect text messages.

Moreover, authentication codes can be stolen, or users can be tricked into entering these codes via a convincing phishing website. If you’re looking for authentication services that cannot be hijacked, stolen or lost, your best bet is a USB or Bluetooth key you can carry on your keychain. This means nobody -- not even you -- will be able to access your account without the physical key. Ultimate security at your fingertips.

If you need help setting up two-factor authentication, or any IT security services, contact our experts and experience true peace of mind as we fortify your data to no end.

Published with permission from TechAdvisory.org. Source.

The post Fortify your data, physically appeared first on Complete Technology Resources, Inc..

Read More

Hardware flaws affect browser security

In the first week of 2018, security researchers announced that modern computer processors have a fundamental flaw called Spectre. If exploited, hackers could gain access to systems that store confidential information. And the most vulnerable to these attacks are outdated web browsers like Chrome, Safari, Microsoft Edge, and Firefox.

The post Hardware flaws affect browser security appeared first on Complete Technology Resources, Inc..

Hardware flaws affect browser security

In the first week of 2018, security researchers announced that modern computer processors have a fundamental flaw called Spectre. If exploited, hackers could gain access to systems that store confidential information. And the most vulnerable to these attacks are outdated web browsers like Chrome, Safari, Microsoft Edge, and Firefox.

What is Spectre?
To understand this unprecedented vulnerability, you need to know some computer chip basics. Modern chips try to speed up their work by storing information related to predictable and repetitive processes. Whenever CPUs perform calculations ahead of time that end up being unnecessary, the data is thrown away into a supposedly secure storage cache.

Hackers can gain access to the discarded data by using malware to create digital backdoors. From there, they can simply sneak in, sift through the private information, and even trick the processor into throwing away even more sensitive information. This is known as a Spectre attack.

Though the exploit is highly technical and difficult to execute, researchers said Spectre affects all modern processors, including those developed by Intel, AMD, and ARM.

How does it affect browsers?
As mentioned, hackers would need to install malware on a device to perform a Spectre attack. One tactic experts found effective is if hackers build a malicious program and embed it on a website. Should anyone visit the rogue website, their browser will automatically run the malicious program.

Once inside, the attacker can use Spectre to gain full access to keystrokes, encryption keys, and login credentials.

So far, there is no evidence of Spectre attacks actively being used to steal data from web browsers, but they are difficult to detect. Experts also predict hackers will likely develop specialized malware now that this information is available to the public.

Is there a way to protect myself?
Fortunately, major browser developers were quick to release updates as soon as the Spectre attack was discovered.

Mozilla also has security features to prevent some Spectre attacks, but announced a full-blown solution is in the works.

As for Chrome, users can expect an update as early as January 23. But for the time being Google recommends enabling the Site Isolation feature, which limits how much access browser plugins have to your computer. This feature can be enabled by going to your address bar and entering: chrome://flags/#enable-site-per-process.

Even though the updates may affect browser performance, it’s a small price to pay compared with having your credit card or social security number stolen.
Like it or not, Spectre is just one of the many threats targeting your web browsers. That’s why you should call us today. We offer expert advice and cutting-edge solutions to make sure your browsing experience is a pleasant and safe one.

Published with permission from TechAdvisory.org. Source.

The post Hardware flaws affect browser security appeared first on Complete Technology Resources, Inc..

Read More

Gear up your network equipment with UPS

During a power outage, responsible business owners use emergency power to keep desktop computers from unexpectedly shutting down. While that’s certainly a good strategy for keeping machines operational and preventing data loss, there’s something else you can do to ensure that your staff remains productive while weathering a storm: uninterruptible power supply (UPS) for networking equipment.

The post Gear up your network equipment with UPS appeared first on Complete Technology Resources, Inc..

Gear up your network equipment with UPS

During a power outage, responsible business owners use emergency power to keep desktop computers from unexpectedly shutting down. While that’s certainly a good strategy for keeping machines operational and preventing data loss, there’s something else you can do to ensure that your staff remains productive while weathering a storm: uninterruptible power supply (UPS) for networking equipment.

UPS for network equipment

UPS systems provide backup power in case of outages and protect against power surges, which don’t just damage computers but also make you lose unsaved work. Deploying them for Wi-Fi routers and modems allows you to stay connected to the internet in what is typically a chaotic time.

Moreover, it makes sense to not just keep your PCs powered up, but to also have internet access during a disaster. This strategy works relatively well if your staff are predominantly laptop users, as that means you only need to juice up your Wi-Fi gear.

Better than generators

Although generators are indispensable for certain businesses, they also require greater upkeep. Small- and mid-sized businesses may not have enough capacity to maintain them because they typically require a utility crew who can manage high-maintenance equipment.

What’s more, extreme mishaps when misused or mishandled could result in generator-related fatalities. On the other hand, misusing a UPS unit could result in the loss of a day’s work, but it’s unlikely to lead to anything as extreme.

Why internet access is important during a disaster

UPS-supported modems or routers help you stay online for as much as 90 minutes, which should be enough time to get your bearings before power finally runs out. Internet service providers are usually prepared for catastrophes and would normally have an emergency power source to stay operational. And if you can stay online via Wi-Fi during an emergency, you get the following benefits:

  • Internet speed that’s faster than cellular access
  • No extra telecom costs resulting from overreliance on cellular data
  • All devices stay online using a stable Wi-Fi connection
  • Devices don’t have to rely on cellular data-equipped phones for internet connection

Plug in your network gear now

Businesses that aren’t located in disaster-prone areas probably don’t give much thought to installing UPSs for their computers, let alone their modems. But accidents and emergencies are inevitable. And when they happen, you’ll find that having internet access is one of the most important things you need to ensure business continuity.

Think of an emergency power supply source like a UPS as an investment that not just protects your systems from data loss but also keeps your Wi-Fi equipment functioning in emergency scenarios. Call us today for productivity-saving tips and other hardware hacks for your business.

Published with permission from TechAdvisory.org. Source.

The post Gear up your network equipment with UPS appeared first on Complete Technology Resources, Inc..

Read More

Android File Transfer via USB Cable

There are many different ways to transfer files between Android phones and computers; however, most of these methods require an internet connection on both the phone and the computer during the process. So, if you are about to be off the grid for quite some time or would just rather transfer files without the internet, here’s how you can do just that with your trusty USB cable:

What you need:

Your Android phone
A computer with a USB port
A USB cable

What you need to do:
If you have a Windows computer…

Start by plugging your phone into the computer via USB port.

The post Android File Transfer via USB Cable appeared first on Complete Technology Resources, Inc..

Android File Transfer via USB Cable

There are many different ways to transfer files between Android phones and computers; however, most of these methods require an internet connection on both the phone and the computer during the process. So, if you are about to be off the grid for quite some time or would just rather transfer files without the internet, here’s how you can do just that with your trusty USB cable:

What you need:

  • Your Android phone
  • A computer with a USB port
  • A USB cable

What you need to do:
If you have a Windows computer…

  • Start by plugging your phone into the computer via USB port.
  • Turn on your phone's screen and unlock the device. At this point, your Android device should only be connected for charging. Swipe down from the top of your screen and tap on USB for charging to view more options.
  • Select Transfer files in the menu that appears.
  • On your computer, search for your Android device on the File Explorer. Click on the icon that represents your phone and you should be directed to your phone’s internal storage.
  • Drag and drop the files or folders into your preferred location, such as the desktop or documents. If you want to save videos and pictures, you can find them in the DCIM folder.
  • Once you are done, right-click your device’s name. Click Eject before unplugging the phone and USB cable.

If you have a Mac…
If you’re using a Mac desktop or laptop, the first thing you need to do is to download Android File Transfer, an official Google app that works on Macs running on OS X 10.5 or later. Afterwards, the process is pretty similar to how it's done on Android, and you can easily transfer files even without an internet connection.

  • Download and install Android File Transfer on your computer.
  • Plug your device into your Mac USB port with the USB cable.
  • Unlock your phone and swipe down on your screen. Tap on USB for charging to view more options.
  • Select Transfer Files.
  • The application should run automatically on your Mac. You can also open the Mac Finder or Spotlight Search and look for the Android File Transfer on the list of programs. Double click the Android drive icon.
  • Browse the files and folders on your Android device and transfer files to your computer.
  • Once you are done, open the Finder sidebar and find your device under Devices. Click on Eject and unplug the phone and USB cable. You can also go to the desktop and drag your device to the Trash.

And voilà! -- you’ve just learned an essential Android skill. Keeping a copy of personal or business data you care about is a task that should not be overlooked, since your valuable information can be wiped out in a matter of seconds due to human error, natural calamity, or unexpected downtime.

Securing a backup of files in your mobile device may be easy peasy, but how do you make all important data in your business devices and computers disaster-proof? Our team can offer regular backup solutions to ensure that your business will be able to weather the storm when it strikes. Call us today to discuss backup options available to your business.

 

Published with permission from TechAdvisory.org. Source.

The post Android File Transfer via USB Cable appeared first on Complete Technology Resources, Inc..

Read More