508-909-5961 [email protected]

Why you shouldn’t use public charging kiosksSmartphones have become a vital part of modern life. And as we spend more time on these gadgets, the likelihood of needing to recharge them while on the go increases. When your phone’s juice runs out and you’re nowhere near your charger, a public charging kiosk can look pretty promising. But what you might not […]

The post Why you shouldn’t use public charging kiosks appeared first on Complete Technology Resources, Inc..

Why you shouldn’t use public charging kiosks

Smartphones have become a vital part of modern life. And as we spend more time on these gadgets, the likelihood of needing to recharge them while on the go increases. When your phone’s juice runs out and you’re nowhere near your charger, a public charging kiosk can look pretty promising. But what you might not know is that recharging phones at public charging stations can make you a victim of juice jacking.

What is juice jacking?

While newer phones can be charged wirelessly, older models still need power cords to power up their batteries. This charging method has one dangerous flaw: the cable used for charging can also be used for transferring data. Cybercriminals can exploit this flaw to commit juice jacking, or the act of using the USB data/power cable to illegitimately access phone data and/or inject malicious code into a device.

Juice jacking often happens at public charging kiosks. When you charge your phone, it is paired with a computer concealed within the charging stand. The computer can then access all of the information on your device, including personal data such as your address book, notes, photos, music, SMS database, and keyboard cache. It can even initiate a full backup of your phone, which can be accessed by the hacker wirelessly anytime.

Apart from stealing your data, cybercriminals can also inject malware into your phone through a public USB hub. All it takes is a minute of being plugged into a public charger for your phone to be infected by malware. Once infected, your phone can be prompted to display ads, download apps, or view web pages without your authorization.

How to avoid juice jacking

The most effective precaution against juice jacking is simply not charging your phone using a third-party system. Here are some tips to help you avoid using a public kiosk charger:

  • Keep your battery full. Make it a habit to charge your phone at home or at the office when you are not actively using it. When unexpected circumstances happen and you get stuck outside, your phone will have enough juice and you won’t need to charge it.
  • Carry a personal charger. External batteries like power banks have become very small and portable in recent years. Always have one in your bag so you can charge your phone securely on the go.
  • If your device has a removable battery, carry a backup battery with you anywhere. If the idea of carrying a spare battery doesn’t appeal to you, you can opt to carry a battery case instead: it’s a phone case that doubles as a battery.
  • Lock your phone. Without the proper PIN code or fingerprint and face ID scan, your phone cannot be paired with the hidden computer in the kiosk charger.
  • If you must use a third-party power source, use power-only USB cables. These cables are missing the two wires necessary for data transmission, ensuring that they can only be used for charging.

Technology threats are all around us. Even something as trivial as powering your phone in a public kiosk station can compromise your device’s security. If you want to learn more about how to protect your gadgets from today’s security threats, don’t hesitate to call us. Our technology experts are happy to help.

Published with permission from TechAdvisory.org. Source.

The post Why you shouldn’t use public charging kiosks appeared first on Complete Technology Resources, Inc..

Read More

AI is transforming healthcare — here’s howIn recent years, advances in technology have had a profound impact on the healthcare industry. For instance, artificial intelligence (AI) is helping medical professionals streamline service delivery to patients. Here are some of the ways that AI is transforming the healthcare sector. Virtual personal health assistants At the helm of the AI revolution are virtual […]

The post AI is transforming healthcare — here’s how appeared first on Complete Technology Resources, Inc..

AI is transforming healthcare — here’s how

In recent years, advances in technology have had a profound impact on the healthcare industry. For instance, artificial intelligence (AI) is helping medical professionals streamline service delivery to patients. Here are some of the ways that AI is transforming the healthcare sector.

Virtual personal health assistants

At the helm of the AI revolution are virtual personal health assistants. A lot of people are already using such apps through their smartphones, wearable devices, computers, and other gadgets to keep track of their heart rate, blood pressure, and diet.

Virtual health assistants can also set a doctor’s appointment for you and remind you about it. They can document your symptoms so you can relay them to your doctor easily and efficiently.

The proliferation of smartwatches and other wearables that utilize AI also helps doctors monitor patients with early-stage heart disease. This enables them to detect potentially life-threatening episodes and deliver the proper treatment earlier, increasing patients’ chances of survival.

Healthcare bots

Healthcare bots are another AI-powered tech making waves in the healthcare industry. These provide quick answers when a patient’s primary healthcare provider is not immediately available. Accessible via the internet or over the phone 24/7/365, bots can ask patients about their medical history, allergies, and medical concerns, and provide immediate, affordable, and legitimate medical advice.

AI research and development is also making patient-physician and physician-physician interactions more efficient. Now available on the market are AI-powered apps that let doctors better understand their patients’ conditions, allowing them to provide better feedback and overall care. There are also apps that let healthcare providers compare their prescribing behaviors with others who are treating or who have treated the same condition.

What’s more, bots help healthcare providers minimize administrative and billing tasks, so they can focus more on medical care.

Health coaching

People with chronic illnesses can gain a lot from using virtual health coaches. For example, patients with diabetes, chronic obstructive pulmonary disease, asthma, and other long-term conditions can find the assistance they need from an AI coach that regularly monitors and analyzes their vital statistics and behaviors. A virtual coach can also provide accurate dietary and medical advice based on a patient’s health data.

These are just some of the ways that AI is transforming the healthcare industry. For questions about how your healthcare organization can leverage AI and other technologies, drop us a line today.

Published with permission from TechAdvisory.org. Source.

The post AI is transforming healthcare — here’s how appeared first on Complete Technology Resources, Inc..

Read More

How to check if an Android app is safe to installAndroid devices are among the most popular devices on the market today. With a wide variety of features and designs, users have an abundance of choices. Not only that, but there are also more than two million apps available on the Google Play Store. Unfortunately, some of these are rogue software developed by cybercriminals under […]

The post How to check if an Android app is safe to install appeared first on Complete Technology Resources, Inc..

How to check if an Android app is safe to install

Android devices are among the most popular devices on the market today. With a wide variety of features and designs, users have an abundance of choices. Not only that, but there are also more than two million apps available on the Google Play Store. Unfortunately, some of these are rogue software developed by cybercriminals under the guise of credible developers — and these apps can be hard to unmask.

How can you protect yourself and make sure that your Android device is running only safe applications?

Enable Google Play Protect

Google Play Protect proactively checks every app before you download them and rechecks your device regularly to ensure it’s free of dangerous software. The service helps keep your device safe and secure by:

  • Running a safety check on apps from the Google Play Store prior to installation
  • Checking your device for potentially harmful apps downloaded from other sources
  • Removing known harmful apps and warning you about any potentially harmful ones that are detected
  • Notifying you about detected apps that violate Google’s Unwanted Software Policy
  • Sending you privacy alerts about apps that can get access to your personal information, violating Google’s Developer Policy

If it finds a potentially harmful app, it will do one of these three things:

  • Send you a notification that will prompt you to remove the app
  • Disable the app until you uninstall it
  • Remove the app automatically

Google Play Protect is enabled by default, but you can turn it on or off by following these steps:

  1. Open the Google Play Store app.
  2. Go to Menu > Play Protect > Settings.
  3. Toggle on Scan apps with Play Protect.

Download from a trusted source

Make sure to download only from well-known and legitimate sources like the Google Play Store, Samsung Galaxy Store, or Amazon Appstore, as these are routinely monitored and scanned for fraudulent apps. However, bogus apps still make it into these stores from time to time, so it’s important to check the ratings and reviews of an app before downloading it. It’s also well worth checking its privacy policy so you know how the app will handle and protect your personal information.

Use third-party antivirus software

Because the market for tablets is growing, more and more companies are offering mobile antivirus solutions. Although there are free antivirus software that are legitimate and effective, the better option is to purchase security solutions from well-established companies to get maximum protection.

Third-party antivirus software may come with monthly or yearly subscriptions, as well as different premium rates for different types of security measures, but their benefits far outweigh the cost of purchase.

Be vigilant

There are many effective steps you can take to make sure your tablet or smartphone is safe against fake apps:

  • Before downloading from a trusted source, read the fine print as well as user reviews, and look out for evident security risks.
  • Uninstall unused apps. This will not only help you avoid any unnecessary risks with potentially vulnerable apps, but also make more room on your device.
  • Update your software. Patches from software updates can fix bugs of vulnerabilities, which, in turn, can thwart cyberattacks. To avoid software update inconveniences, enable automatic updates on your Android tablet or smartphone.

If you are looking to learn more about protecting your Android device, we can help. Contact us today.

Published with permission from TechAdvisory.org. Source.

The post How to check if an Android app is safe to install appeared first on Complete Technology Resources, Inc..

Read More

How to protect your business from Mac ransomwareSome of the most high-profile ransomware cases in recent memory include the WannaCry and Petya outbreaks in 2017, which infected hundreds of thousands of Windows PCs around the world. However, ransomware such as EvilQuest target Mac computers specifically. If you have a Mac, follow the security best practices below to avoid getting infected. What is […]

The post How to protect your business from Mac ransomware appeared first on Complete Technology Resources, Inc..

How to protect your business from Mac ransomware

Some of the most high-profile ransomware cases in recent memory include the WannaCry and Petya outbreaks in 2017, which infected hundreds of thousands of Windows PCs around the world. However, ransomware such as EvilQuest target Mac computers specifically. If you have a Mac, follow the security best practices below to avoid getting infected.

What is Mac ransomware?

Ransomware is a type of malicious software that holds computer systems hostage until a ransom is paid in gift cards, or cryptocurrency like Bitcoin or Ethereum. It’s typically distributed using phishing emails, but it can also spread via unsecured networks.

When Macs are infected by ransomware, users won’t be able to access their data since it’s encrypted. Ransomware messages may also threaten to release the information to the public or destroy sensitive data if victims don’t pay within a certain deadline. Healthcare and finance organizations, in particular, are more likely to pay the ransom because these organizations tend to have a lot of valuable assets, including money, and can't afford to lose access to their critical data.

Types of Mac ransomware

In 2016, the KeRanger ransomware was distributed through the popular BitTorrent app Transmission. KeRanger was signed with an authorized security certificate, allowing it to evade macOS's built-in security measures and infect more than 7,000 Mac computers.

Patcher was another strain of Mac ransomware that was discovered in 2017. This type of ransomware disguised itself as a patching app for programs like Microsoft Office. When launched, Patcher would encrypt files in user directories and ask for a ransom paid in Bitcoin. But the ransomware was poorly built, so there was no way to retrieve the decryption key once the ransom was paid.

In 2019, the EvilQuest ransomware encrypted files and tried to trick users into paying a Bitcoin ransom. Much like Patcher, however, there was no feature to decrypt files after paying, leaving those who paid the ransom with nothing.

Ransomware attacks like these can make a resurgence at any time, which is why you need to be prepared in case of an attack.

An ounce of prevention goes a long way

Preventive measures are the best way to keep your Macs safe from ransomware. This involves updating your software regularly to defend against the latest threats and only installing programs from the official App Store.

Since ransomware initially infects computers using phishing emails, make sure to avoid suspicious links and email attachments. Always be on alert even if the email appears to come from a legitimate company or someone you know.

You must also maintain offline backups and have a disaster recovery plan to keep your business running in the off chance that ransomware successfully infiltrates your systems.

Responding to ransomware

If your Mac is infected with ransomware, do not pay the ransom fee, as there's no guarantee that hackers will provide a decryption key and release your data even if you give in to their demands.

Instead, use an up-to-date anti-malware program to remove ransomware from your computer. Cybersecurity experts may also release free ransomware decryptor tools to remove the infection, so keep an eye out for these on the internet. If these programs and tools don’t work, contain the spread of the ransomware by disconnecting from the network and run data recovery procedures, provided you’ve backed up your data in an external hard drive or the cloud.

Mac ransomware attacks may not be common, but they still pose a great threat to your business. If you need more guidance, contact our team of security experts today. We stay abreast of the latest Mac security threats and know just how to keep your business safe.

Published with permission from TechAdvisory.org. Source.

The post How to protect your business from Mac ransomware appeared first on Complete Technology Resources, Inc..

Read More