Category Archives: Informational tips

The type of tips that enable you to better understand your computer and the internet

Windows 10 Creators Update

The latest “Creators Update” is now available.  You thought that Windows 10 was the last version of Windows, didn’t you?  Well, technically that is correct.  Practically, though,this latest update, Version 1709, is the 5th in a series of Windows 10 updates.  Each update stands on its own as an operating system.

The latest two versions will let you put off the update until it’s convenient to update.  But–you cannot choose to not update.  This makes it a little easier to manage your updates, as it will take some time to do the update.

11/18/2017

Various terms and explanations

Cyberattack

Simply put, a cyberattack is any attempt by an outside source to target, steal from, spy on, damage or destroy a computer network. Cyberattacks come in all shapes and sizes (as you’re about to see), and the criminals behind them don’t set their sights on a single target. No home network is too small, or company too large, to fall victim.

Cybersecurity

Cybersecurity, on the other hand, is the act of protecting networks from cyberattacks. Whether it’s locking down your personal network at home, or hiring a staff of IT professionals to secure the network for your business, cybersecurity is increasingly becoming a challenging task. To beat cybercriminals, you have to always be one step ahead of the game.

Glossary of cybersecurity terms

  1. Adware

    What it means: Adware is an annoying form of malware that bombards you with ads when you go online, or use certain programs on your device.

    Why it matters: Mostly, adware is just a nuisance. However, certain forms of adware go beyond annoying pop-ups. Some forms are able to collect marketing data based on your online behavior, and can even redirect you to websites you weren’t looking for. The good news is, in most cases, you’ll know if your device has been infected because it begins to display these ads, or exhibit odd behavior.

  2. Botnet

    What it means: A botnet is a group of private computers or web-connected devices that have been infected with malware that allows them to be controlled remotely as a group by a hacker. Everything from your laptop to your smart TV, baby monitor, security camera, etc. can be infected and used as part of a botnet if you’re not careful.

    Why it matters: Botnets are used by cybercriminals in several types of cyberattacks including DDoS attacks, clickfraud and more. Although these types of cyberattacks don’t typically impact you directly, if your devices are infected, it means there are gaps in the security of the router, or your entire network.

  3. Card skimmer

    What it means: A card skimmer is a device that can be installed on ATM machines or other types of card readers, which collects the data from the magnetic strips of payment cards (both credit and debit).

    Why it matters: These devices are bad news. They’re relatively easy to install and allow thieves to make copies of your payment cards and use them to make unauthorized purchases. In some cases, thieves also install tiny cameras with the skimmers so they can record you as you enter your pin number. Certain types of card skimmers are easy to spot, but new “insert” card skimmers are practically invisible. In any case, thieves will often use skimmers to collect your financial information and purchase goods before you realize there’s a problem.

    Protect yourself by using cards with EMV chips whenever possible, and always covering your pin when you enter it.

  4. Clickfraud

    What it means: Clickfraud is when artificial clicks are created to manipulate pay-per-click advertising campaigns to either increase revenue or charges for an advertiser.

    Why it matters: Although clickfraud may not impact you personally in a negative way, the cybercrooks behind these types of scams often need a “botnet” (See glossary term 2) to make them work. To create these botnets, hackers target the web-connected gadgets of hundreds or even thousands of individuals.

  5. Cyber-espionage

    What it means: Espionage, as we all know, is the practice of spying on someone else to collect confidential information. Cyber-espionage means the same thing, except it involves the use of computers.

    Why it matters: The targets of this cybercrime are typically large corporations or government organizations, but that doesn’t mean individuals are deemed too small for the effort. If you have information that can be used by the crook, your devices can be compromised in order to get it. It’s also important to point out that this form of spying also leads to bigger problems, since it provides the criminals with data they need to conduct other cyberattacks, such as data breaches.

  6. Dark Web

    What it means: The Dark Web is an encrypted network of “Darknets” that makes up a portion of the Deep Web. Accessing this hidden section of the web requires a special encryption software called Tor.

    Why it matters: The Dark Web itself isn’t illegal. Many people do use it for what it was originally intended. That is, to browse the web without being tracked by their internet service provider, web services or even the government. However, we can’t pretend that the Dark Web isn’t home to some pretty horrific things. Evidence of kidnappings, hitmen for hire, prostitution, child pornography, drugs, guns… you name it.

  7. Data breach

    What it means: This year, the largest data breach in history was recorded as Yahoo confessed that 1 billion user accounts had been compromised. A data breach is when hackers steal confidential information that’s sitting in a database.

    Why it matters: While large companies are the prime targets for this type of attack, individuals are always the victims. Target, Wendy’s, LinkedIn, Home Depot, Rambler, DailyMotion, Weebly and other big-name companies have all fallen victim. And, once the hackers have their hands on their customers’ information, they sell it on the Dark Web. Everything including your email address, phone number, date of birth, and even your Social Security number can then be used by other criminals for future scams.

  8. DDoS attack

    What it means: DDoS stands for “distributed denial of service,” which is a techy way of saying “crashing a system or the whole internet.” It works when a targeted website or server is flooded by an overwhelming amount of requests from millions of connected machines in order to bring it down.

    Why it matters: DDoS attacks sound like something straight from a Sci-Fi movie, but they’re actually happening. Back in October, a massive DDoS attack resulted in a loss of internet access for people living on the East Coast, and even some sites nationwide.

    Unsecured routers, printers, IP web cameras, DVRs, cable boxes, connected “smart” appliances such as Wi-Fi light bulbs and smart locks can all be hijacked and involved in cyberattacks without the owner knowing about it. The first step to preventing your devices from being hacked is securing your router.

  9. Drive-by download

    What it means: Drive-by downloads are the way most malware is installed – that is, accidentally. It happens when cybercrooks hide malicious software in ads or links that takes advantage of weaknesses in your device, or web browser.

    Why it matters: Most drive-by downloads result in a virus that the user may not even realize is there. Plus, this malicious software can be hidden anywhere – websites, emails, pop-up windows, you name it. This is what has made the internet such a risky place if you aren’t constantly running your software updates, and protecting yourself with anti-virus software.

  10. Exploit

    What it means: An exploit is an identified gap or weakness that has been found in a particular software or operating system.

    Why it matters: Hackers find these gaps and design malware and Trojan horses that can exploit them. Because of this, software developers also hire their own “hackers,” or create incentive programs for anyone who can identify a bug before real hackers find it. They do this so they can patch their software and eliminate the vulnerability. However, sometimes the real hackers discover these gaps first. These are called “zero-day exploits.” Keep reading to the end of this article to see what makes zero-day exploits so dangerous.

  11. Exploit kits

    What it means: An “exploit kit” or “exploit pack” is a toolkit that can be purchased to target the exploits we talked about earlier. Typically, these packs are designed for vulnerabilities in Java, Adobe Reader and Adobe Flash.

    Why it matters: If you’re thinking that all cyberattacks are orchestrated by a cynical group of hackers, that’s just not the case. These kits make it possible for individuals with basic skills to cause a lot of damage.

  12. Identity theft

    What it means: For this crime, a thief uses your personal information, such as your Social Security number or driver’s license, to impersonate you for their own benefit.

    Why it matters: If your identity is stolen, you could be in store for years of problems. Your credit score could be ruined, and you could lose temporary or permanent access to funds in your bank account. You might not notice there’s a problem until it’s too late, and getting everything straightened out can be a complete nightmare. This is why it’s so important that you regularly monitor your credit report.

  13. Keylogger

    What it means: A keylogger is a type of malware that’s designed to log all of the keystrokes the user makes on their device.

    Why it matters: If your device is infected with keylogging software, everything you type can be accessed by the scammer. This includes private messages, as well as your usernames and passwords. That information can then be used for other scams, such as data breaches or identity theft..

  14. Malvertising

    What it means: Malvertising is a form of internet advertising where malicious code is hidden within online ads that otherwise appear to be safe.

    Why it matters: Clicking on these ads may lead the user into deeper trouble. Not only can the click unleash the malicious code that infects your computer, it can also direct you to fake sites that launch pre-installed programs that are malicious in themselves. In July 2016, a malvertising scheme was discovered that infected millions of computers.

  15. Malware

    What it means: Malware is easiest described as software that is designed for the purpose of damaging or gaining access to devices or systems without the users’ knowledge.

    Why it matters: As you can see by this list, there are many types of malware. Spyware, adware, ransomware, etc., are all unique types that are designed for specific purposes. But, no matter which type of malware you come in contact with, it’s never good for you or your system. And, cybercrooks are creative in the ways they fool you into downloading this malicious code onto your computer. One of the most troublesome ways we’ve witnessed so far was a form called “Hicurdismos,” which tricked people by posing as a Windows 10 security update.

  16. Patch

    What it means: A patch is a software update designed to fix bugs and repair vulnerabilities that have been discovered by the software developer.

    Why it matters: Have you ever heard of “Patch Tuesday”? Many tech companies like Microsoft, Adobe, Apple and Android issue regular patches for their software. Many of these repairs are built into operating system updates; however, if an issue is deemed critical enough, a security patch will be issued. These security patches are typically in response to zero-day exploits that have already been utilized by hackers.

  17. Pharming

    What it means: Pharming is when cybercrooks design fake websites or pages to look exactly like their legitimate counterparts, all with the intention of tricking people into entering private login information.

    Why it matters: Imagine logging into your bank account only to realize that the site you’ve just logged into doesn’t belong to your bank at all. Think of all the information you’ve just handed over: your username, password, email address, and even your bank account number. Yikes! There’s also a different form of this scam called “Like Farming” on Facebook.

  18. Phishing

    What it means: Phishing is an attempt, typically made through an email, to obtain your private information by imitating someone else.

    Why it matters: The scam artists behind phishing schemes go through great lengths to create an email that appears to be from someone you trust. Sometimes they pose as people you know, such as the CEO of the company you work for, and sometimes they pose as legitimate companies like Amazon. Either way, there are usually signs that the email is fake. Can you spot them?

  19. Point-of-sale intrusions

    What it means: Point-of-sale intrusions happen when the payment system of a retailer or other company is compromised, leaving the financial information of its customers at risk.

    Why it matters: When you swipe your card at a store, use it to book your flight, or make a hotel reservation, that information is stored somewhere. Typically, it’s stored in the point-of-sale system that particular company uses for its own financial records. But vulnerabilities in these systems make them prime targets for hackers, who crack them and make off with hundreds of thousands of customers’ credit card numbers.

  20. RAM-scraping malware

    What it means: This type of malware is designed to “scrape” your hard drive for sensitive data.

    Why it matters: Just think of all the data you store on your device. From personal photos to contracts, to leasing agreements, to tax documents – there are many things that you’d never want to fall into the hands of a hacker.

  21. Ransomware

    What it means: Ransomware is malicious software that encrypts data found on your computer or gadget until a sum of money is paid.

    Why it matters: The biggest digital threat of the year was ransomware. Researchers say the total amount paid by victims could hit $1 billion in 2016 alone. These attacks have become a favorite of scammers, partially because of the ease of anonymity. Not only is it a faceless attack but the ransom is usually paid with bitcoin, which makes this a nearly untraceable crime. There’s also a debate in the law enforcement community on whether victims should pay the ransom. These scammers promise to decrypt your files once the ransom has been paid, but there’s no guarantee that they will actually do this. Some ransomware attacks discovered this year actually deleted the victims’ data the moment their gadget was infected, never intending to decrypt it when payment was made.

  22. Social engineering

    What it means: Social engineering is when a scammer manipulates someone into giving up their confidential information.

    Why it matters: A social engineer is basically a con artist who interacts with people trying to get their sensitive data so they can eventually rip them off. The criminal is typically looking to trick you into giving them your banking information or credentials into websites. If the scammer is targeting a business, they will sometimes pretend to be a co-worker with an urgent problem, asking for help accessing corporate resources. There are many types of social engineering attacks in the fraudsters arsenal. They will use such tricks as baiting, phishing, spear phishing and scareware, just to name a few.

  23. Spam

    What it means: Spam is unsolicited messages sent via email. More broadly, it refers to any unwanted messages sent electronically.

    Why it matters: In the same way that circulars are placed in every mailbox in the neighborhood, most spam is a form of advertising that targets large groups of people. It is annoying but harmless. However, it can clutter your inbox and occupy your bandwidth. It’s best not to open emails from people you don’t know or you risk getting a virus. One trick to decrease the amount of spam in your inbox is to set your spam filters.

  24. Spim

    What it means: Spim, sometimes stylized as spIM, is spam sent through Instant Messaging (IM)

    Why it matters: Spim tends to be another annoying form of unsolicited advertising. It’s best not to click links in messages sent by people you don’t know because it could lead you to a pharming site. If you’ve ever contacted a company via Facebook Messenger, you may have opened yourself up to receiving promotional messages from that company.

  25. Spyware

    What it means: Spyware is a form of malware that allows unauthorized access to your device and permits someone to spy on you remotely.

    Why it matters: Do you ever get that feeling like you’re being watched? Spyware is one of the main reasons people have started to cover their webcams with tape or stickers because it allows someone to watch through your webcam or listen in through your microphone.

  26. Trojan (or Trojan horse)

    What it means: A trojan horse is a malicious program that pretends to be something else, usually as legitimate software, to trick people into installing it.

    Why it matters: Trojans are designed to be stealthy and deceptive so they are hard to detect in plain sight. They can masquerade as anything – office software, documents, games, videos, music files – usually spread through peer-to-peer file sharing sites, unauthorized software app stores, malicious websites/links and attachments spread through email and social media. Once installed, trojans can execute a myriad of nasty stuff like spying, data theft and total control of a computer.

  27. Virus

    What it means: A computer virus is malware that is designed to spread itself via replication and by infecting other computers.

    Why it matters: Although the term “computer virus” is mistakenly used as a catch-all term for all malicious software, it actually refers to a specific type of malware that attempts to copy and spread itself to other computers when executed. Due to this automated replication, computer viruses can slow your machine down to a crawl, send emails on your behalf without your consent and even bring down entire networks. Viruses can spread via email and text attachments, social media links and trojan software. Although mostly only disruptive in intent, some viruses are financially motivated as well.

  28. Vulnerability

    What it means: Vulnerabilities are the weaknesses in software programs or operating systems we mentioned when we talked about “exploits.”

    Why it matters: If vulnerabilities aren’t found and patched in time, they can be used by hackers as backdoors that provide access to web-connected devices or entire networks. Every web-connected device you own is subject to these vulnerabilities – including your router.

  29. Website spoofing

    What it means: Website spoofing is the act of deliberately creating a website designed to mislead users, making them believe they’re on a site, but they’re actually not.

    Why it matters: These sites are often used for pharming scams and can be identified by differences in the site’s URL. If you’re headed to Amazon.com, for example, but accidentally type an extra O in the URL, you could find yourself on Amazoon.com instead. Spoofed sites will look incredibly similar to the sites you’re really trying to reach, so you should always confirm the URL is correct before entering in any credit card details or login credentials.

  30. Zero-day exploit

    What it means: Zero-day exploits signify vulnerabilities that have already been found by hackers and are being used to initiate various cyberattacks or schemes.

    Why it matters: If you hear this term, in one of our security alerts, you should pay close attention. Patching these bugs is absolutely critical. Each time a zero-day exploit is found, it means the software developers have been outsmarted by hackers. And, as you can imagine, those hackers are trying to cause as much damage or gather as many pieces of data as possible before they’re shut down.

 

Data Loss–what can happen

I’m sure you all have heard that people lose data. This could occur for a number of reasons:

  1. You are typing a document and accidentally hit the wrong key.  Oops–you’ve erased the thing you have been working on.
  2. You go to start up your computer in the morning and you get a message such as “no boot device”. Oops–your hard drive is no longer being seen by the computer.
  3. You sit down at your computer one day and try to open a document.  What you get instead is a notice that your document has been encrypted and you need to pay $500 to get the decryption key.
  4. You open your word processing program (or graphics editing program) and try to find your documents or pictures.  You find that the directories are empty.
  5. You come home after being out to dinner and find that someone has broken into your house and your computer is missing.
  6. You have kids or grandkids visiting and they ask to use the computer.  When you again sit down to do some work, you have absolutely no idea it’s your computer.  Everything is changed and your stuff is nowhere to be found.
  7. You have kids, grandkids, siblings, etc. visit you and offer to “help” you with your computer because it’s “too slow”.  So they work on it and “fix” it for you.  Now nothing works.
  8. There is a storm, fire, flood, or other disaster that destroys your office.

Sound familiar?  Yep–it can happen to you.

 

 

Data Loss–prevention

In the last post, I described what can happen to you when you least expect it.  We will now examine some things you can do to prevent the loss of your data (whether it be important legal documents, recipes for your favorite wine, or pictures of your family).

Back up your data–your first line of defense

  1. A simple backup can consist of you copying your data to some form of external media.  This can be a CD, DVD, flash drive, or USB hard drive.  In the case of a USB hard drives, most come with a backup program already installed. The backup should be done on a regular basis.  Oh, yes–remember that your backup needs to be stored somewhere other than next to your computer!  An offsite storage is preferable.
  2. Once you have your data covered, you need to think about your system as a whole.  Unless you have a system disk, in the case of a hard drive failure, you will not be able to reinstall Windows.  Many computers nowadays have a provision to make system recovery DVD’s.  You need to do that.  But that will only guarantee you can put the system back to the way it was when it was new.  Your programs and data are not covered here.
  3. Using a recovery DVD, reinstalling all your programs (apps in Win 10!), and restoring your backed up data will allow you to continue with life.  But at a cost–time!  This whole process takes a bit of time to do it right. Measured in hours.
  4. A system image is a really good tool.  It is a “picture” of your hard drive as it is now.  The operating system, the programs, and the data.  If you have a recent system image and you experience a hard drive failure, all you need to do is replace the drive, run the recovery program which restores the system image and you’re good to go.  Simple.

 

Data Loss prevention–the mechanics

Now you know what can happen.  You also have an idea of what to do.  But what do you need to do the job?

  1. A backup device.  Use a flash drive (careful–these are easy to lose) large enough to hold your data.
  2. A backup program.  As previously stated, if you buy an external USB hard drive (at least 1T in size), it should have a backup program on it.  You will need to install that program on your computer.  If you don’t want to use the program they provide, there are any number of programs out there–both free and paid versions–that will do the job.
  3. An imaging program.  This is the program that is capable of making a system image and then restoring it to a hard drive.  We use Acronis True Image in our business.
  4. A cloud backup solution.  This is also a good idea if you have data you need to access even in the event of some type of disaster.  Online data is usually available from any device using your logon credentials.  We use Carbonite here.  We are also Carbonite resellers for those of you wishing to buy it through us.
  5. Lacking a cloud backup, you need a place to store your data once it’s backed up.  If you have a business office, store the data at home.  If you have a home office, you could possibly store the data in a safe deposit box.  Possibly a fireproof safe.  Or maybe in a relative’s home.  Anywhere but next to your computer!

Need help with all of this?  Give us a call.

Data Loss prevention — some caveats

Now that you have read my recommendations for keeping your data save, you need to be aware of what can go wrong.  Otherwise you will be calling me and asking why you weren’t warned!

  1. When backing up your stuff, it is best to disconnect the backup device when you are not actually using it.  Should you become infected by a ransomware program, it will affect all connected devices.  It will, therefore, corrupt your backup if it can get to it.
  2. If burning a CD or DVD,  be sure to verify the process.  Also, with any backup system, occasionally look at the backup and see if the computer is actually backing up your data.  It does you absolutely no good to tell me you have your data backed up and when I go to look for it I find that your backups have not actually been working!
  3. Remember to store CD’s, DVD’s, and flash drives in a save place.  Don’t lay them in the sun or put them somewhere where they will be subject to extremes in temperature.
  4. If using a cloud backup system, ask the company how many backups they store.  For instance, in the case of ransomware, the corrupt files will be backed up to the cloud and will be useless.  If the company has several offline backups (Carbonite assures me that this is how they operate) then they can put one of good copies online for you to restore your data.

Free Email Accounts

Many folks have been using hotmail.com, msn.com,  and live.com accounts for a while now.  Microsoft has been directing all these users to outlook.com and they log on there. There are several problems with this service.

When you set up these accounts, it’s with the understanding the account is free and you will have very limited access to tech support.  Every so often I am called by a client who has tried to log onto a Microsoft mail account only to get the message that there might be someone else using the account and you need to confirm that you are the owner.  If you have not provided for this eventuality, you are going to be in trouble.

Everyone who sets up one of these accounts needs to have an alternate email address.  There is a place to list that alternate address when you set up your Microsoft account.  If there is any requirement to confirm that you are the account holder, the confirmation link or code will be sent to your alternate email.  If you don’t have an alternate email, you will have to answer a lot of security questions and most people have a problem doing this.

So–what do you use for your alternate email?  If you are a Centurylink customer, you have a Centurylink email account.  Same goes for Comast.  You may just have to go to their site and set it up.  You also have the option of setting up a Gmail account to use for that purpose.

Junk Mail

We all get it:  Unwanted mail.  Sometimes it comes from friends who seem to be cleaning out their inboxes, but mostly it comes from someone we’ve never heard of.

What everyone wants to know is—how do you stop it?  Well, it’s probably a futile effort to try.  Spam will be there forever.  You just need to manage it.  There are several ways of doing this, which I’ll explain below:

  • Ignore it. Just delete the unwanted messages.  You need a high tolerance for junk.
  • If you have an internet security program that allows you to flag messages as spam, do so. Let the program automatically detect it.  Depending on your program, the spam/junk will automatically be directed to a junk folder or simply deleted.
  • Create message filters. Each email program will allow you to filter messages (we can’t tell you how each program does it in this limited space).  Basically, you tell the program to look at each message to see if it contains a certain address, subject, word, etc.  You can then have the program automatically throw those messages in the trash.
  • Install a message filtering program (we link to one on our “Products” page). These programs are referred to as challenge/response programs.  They send a challenge to unknown senders requiring a response.  You get the response and can either allow the messages or senders or blacklist them. If the mail was sent by a machine (a robot), then it can’t answer the challenge and the mail is trashed after several days.  This drops your spam messages down to a very small number.  It does require a little configuration to work properly, though.
  • And how about those mails you get from your brother who insists that you read everything he thinks is funny? I suggest a message filter.  Tell your email program that if it sees his address in the “from” field,  move the mail to a folder you set up with his name on it.  This way you won’t be totally ignoring him.  You can go to his folder when you get time to see if there is anything important.

The Cloud-Explained

You have heard of “the cloud” or maybe “cloud computing.”  Perhaps you’ve wondered what this is and how it affects you.

To begin with, when the Internet was evolving along with networking, diagrams were drawn to show how networks were connected.  Whenever the connection went “off site” (out of the building, basically), this was shown as a cloud on the diagram.  This way the creators of the diagram didn’t have to list all the stuff our there.  Maybe it is a little like the ancient maps that showed the known world and at the edge were the words “here there be dragons.”

The cloud depicts computer resources (hardware and software) that are located somewhere else and available over a network (usually the internet).  To the typical user, the actual location of these services is not important.  The resources could consist of word processing  or financial programs  available only online-meaning the program you are using is located somewhere else and not on your home machine.  Off-site storage is also one of those services.  Many people are now paying a company to remotely store their data.  These services offer convenience and portability.  You can use the services anywhere.  You don’t need the software loaded on your computer.  This means your might be able to use a less-expensive computer to do your work.  But, of course, it’s not free.  So you’ll have to decide if you can benefit from subscribing to these services.

Something to remember–if you are using cloud-based services, you will not be able to do much without an active internet connection.

Security Questions

You have all seen this:  You create an account online and you are asked to enter a password and answer some security questions to be used later if you forget your login credentials.  They offer many standard questions, like “What is your mother’s maiden name” and “What is the name of your favorite pet.”

So what should you do?

First, create a password that is unique and hard to guess.   We’ve addressed this in a previous article.  Stay away from kids’ names and pet names.  As for the security questions, here are several suggestions:

A good security question should:

be easy to remember
have thousands of possible answers
not be something you  would use on social media
be simple one or two word answers
not change over time

If a site lets you make up your own questions, so much the better.

Don’t use things like birthdays, school names, etc.  These are easy for the bad guys to find.

I’ve talked with clients that just make up answers that aren’t true.  This is helpful, as someone who really knows you won’t be able to guess the answer.  Hey–anything to keep your data and identity secure works.  Be careful, though.  If you make up questions, you better remember the answers!

Another tip–if the site allows you to request a password change, they will usually email you. So be sure you give them a current email address.