Why Invest in a UPS?

UPS stands for uninterruptible power supply. This electrical device is meant to provide a power supply in the event of a power outage or when the power input fails.

Power outages can result from electrical poles being damaged by storms, traffic accidents, fire, flood and other disasters.  Faults in the grid or power plant can also cause blackouts.  We cope with these inconveniences but our computers, unfortunately, just are not hardwired to cope with them in the same way.  Sudden power loss during data transfers can be damaging making the hard drive inaccessible.

Computers can be fragile pieces of machinerySevere damage can occur with a sudden power outage or fluctuation.  Components in a computer such as a hard drive can be affected and data can even get lost when power goes off and you have not properly shut down your computer.  It is especially damaging to the computer’s hard drive when there is power interruption.  When power is suddenly cut off, your hard drive spins down without being shut down properly.  When power comes back and you restart, you may find that much of your work has been lost. When power is restored, it is often accompanied by fluctuations which may turn your computer off again.  Hard drives can only take so much, and in some cases, computers can be destroyed. To protect your computer’s hard drive from these unfortunate scenarios, you need to plug your computer into an electrical device called a UPS system.

Right at the moment of a power blackout, these handy devices will act as a battery backup power supply which will automatically provide power to your computer for enough time to allow you to save your data and properly shut down your computer.

Because the circuit in this power device continuously monitors the voltage, it can sense surges, spikes and outages. When the UPS senses an electrical problem, it switches to AC power which is generated by a battery which provides you with protection.

Ultimately, a UPS backup battery gives you peace of mind while working. You won’t have to cringe when a thunderstorm rolls through, wondering if it would be better to simply power down your machine and wait it out. In addition, you won’t have those fears in the back of your mind that a power blackout may instantly cut off your work, wasting your time and efforts, and even worse, destroy your computer.

Remember, having a plan and being prepared is your first line of defense.  If you would like more information about emergency power outage strategies please contact us at 978.562.6077or by email at ITExperts@Bryley.com.  We are here to help.

Is Your Technology Ready for Winter?

Whether or not you love or detest winter, the fact of the matter is that it’s quickly advancing.  Around this time those of us in New England put snow tires on our vehicles, stake our driveways, and put sand or kitty litter in our trunks.  But what about our technology?  How can you protect it from the harsh New England weather?

 

  • Check your surroundings. Prior to turning on any heating device, make sure it is a safe distance from your technology – you do not want to risk melting portions of your device.
  • Keep your technology out of your trunk! Although keeping your laptop in the trunk is a far better option than leaving it in the back seat of the car, it’s still not optimal. If left in a trunk for an extended period of time, severe temperatures can cause computer equipment to fail.
  • Let your devices warm up. How many times have you come in from the cold and had your glasses fog?  It only last a few moments until your glasses acclimate to the new temperature.  The same phenomena occurs inside your computer, but can have more severe consequences including short circuiting the device.  Drastic temperature shifts can also cause the metal components in the devices to expand and contract, potentially causing damage.  The best way to avoid this is to allow your computer to acclimate to the new temperature prior to powering the device.
  • Do not place any heating elements (heating pad, hair dryer, etc.) on or near the device in an effort to speed up the warming process. This can cause more harm than good.
  • Protect your screens. Most screens have an LCD, or liquid crystal display, and run the risk of freezing, making them more susceptible to cracking or shattering.  To reduce the risk of this occurring, reduce exposure to extreme temperatures.
  • Have your charger ready. Cold temperatures cause batteries to drain, so it’s important to keep a charger handy to ensure maximum uptime.
  • Change the Power Settings. “You can keep your laptop warm by changing the power settings to power save mode. This keeps the laptop warm as it continues to run, and instead of shutting down the hard drive, it keeps it spinning. The longer the laptop can be kept running, the warmer it will stay as it generates its own heat.”1
  • Be wary when online shopping. Online shopping is a great way to avoid the crows and get items you desire, but be wary of cyber criminals. We recently wrote an article to provide insight to protect yourself from hackers.

Keeping these tips in mind will enable you to enjoy the winter months and protect your valuable devices.

 

1 https://www.pcrichard.com/library/blogArticle/keeping-your-devices-safe-in-the-cold/800264.pcra

http://abc13.com/weather/winter-ize-your-technology-/467519/

http://tahoetopia.com/news/winterizing-your-computer

https://www.lifewire.com/top-cold-weather-tips-for-laptops-2377656

Shopping Online — Safely

Shopping online is very convenient.  You can click here and there and order whatever product you desire and have it delivered to your front door.  You can compare pricing, look for deals, compare products, and it all can be done quickly and in the convenience of your own home, any time, night or day.  The downfall?  Wherever there is money and users to be found, there are malicious hackers roaming around.

Use familiar web sites.  You need to be aware of the safer online shops, like Amazon.  One tactic favored by malicious hackers is to set up their own fake shopping websites. Fake websites can either infect you the moment you arrive on them by way of malicious links. However, the most dangerous aspect you should be concerned about is the checkout process. Completing a checkout process will give cybercriminals your most important information: credit card data (including security number), name, and address. This opens you up to credit card fraud or social engineering attacks.

What are some key things to be aware of as you’re shopping?  Sticking with popular brands is as good as any advice when shopping online. Not only do you know what you’re getting by way of quality and price, but you also feel more confident that these well-established names have in place robust security measures. Their efforts can be quite remarkable, as researchers at Google and the University of San Diego found last year.1

 A few things to be aware of: 

  • Leery URL’s such as “coach-at-awesome-price.com” or “the-bestonlineshoppingintheworld.com”
  • A strange selection of brands – as an example, the website claims to be specialized in clothes but also sells car parts or construction materials
  • Strange contact information. If the email for customer service is “amazonsupport@gmail.com” instead of “support@amazon.com” then you should be suspicious that online shop is fake
  • Are prices ridiculously low?  An online shop that has an iPhone 7 at $75 is most likely trying to scam you

The old adage “if it seems too good to be true, it probably is,” rings true in this case, and it’s best to steer clear of these sites.

Use Secure Connections.  Wi-Fi has some serious limitations in terms of security. Unsecured connections allow hackers to intercept your traffic and see everything you are doing on an online shop.  This includes checkout information, passwords, emails, addresses, etc.

Before You Buy Online…

  • If the connection is open and doesn’t have a password, don’t use it.
  • If the router is in an exposed location, allowing people to tamper with it, it can be hacked by a cybercriminal. Stay away.
  • If you are in a densely-crowded bar with dozens of devices connected to the same Wi-Fi hotspot, this can be a prime target for an enterprising cybercriminal who wants to blend in and go unnoticed. Continue to socialize, don’t shop.

Access secure shopping sites that protect your information. If you want to purchase from a website, make sure it has SSL (secure sockets layer) encryption installed. The site should start with https:// and you should notice the lock symbol is in the address bar at the top.

Update your browser, antivirus and operating system.  One of the more frequent causes of malware is unpatched software.  Online shoppers are most at risk due to the sensitive information involved. At a minimum, make sure you have an updated browser when you are purchasing online. This will help secure your cookies and cache, while preventing a data leakage.  You’ll probably fuss over having to constantly update your software because it can be a time consuming operation, but remember the benefits.

Always be aware of your bank statement.  Malicious hackers are typically looking for credit card data, and online shops are the best place for them to get their hands on such information.  Often times, companies get hacked and their information falls into the hands of cybercriminals.

For this reason, it’s a good habit to review your bank account and check up on any suspicious activity.

“Don’t wait for your bill to come at the end of the month. Go online regularly and look at electronic statements for your credit card, debit card, and checking accounts. Make sure you don’t see any fraudulent charges, even originating from sites like PayPal. If you do see something wrong, pick up the phone to address the matter quickly. In the case of credit cards, pay the bill only once you know all your charges are accurate. You have 30 days to notify the bank or card issuer of problems.”2

Using a credit card vs. a debit card is safer.  Credit cards have additional legal defenses built in that make them safer to purchase online compared to debit cards.  With credit cards, you aren’t liable if you are a victim of a fraudulent transaction, so long as you report the fraud in a timely manner. Secondly, credit cards give you leverage when it comes to disputing transactions with a seller. If you pay with a debit card, you can’t get your money back unless the seller agrees to it. With credit cards, the money you paid for a product isn’t counted against you until due process is complete, debit card holders however can only get their money back after this step.  Ultimately, banks are much more protective of credit cards since it’s their money on the line, not yours.

Additional tips for safety:

  • Never let someone see your credit card number – it may seem obvious, but never keep your PIN number in the same spot as your credit card
  • Destroy and delete any statements you have read
  • Notify your credit card issuer of any address change. Doing so will prevent them from sending sensitive files to the previous address
  • Keep confirmation numbers and emails for any online purchases you may have done
  • Immediately call your credit card company and close your account if you have lost or misplaced a credit card

Use antivirus protection.  The most frequent tip on how to be safe online is to use a good antivirus tool. It will keep you safe against known malware.  ”Before you begin shopping, outfit your phone or tablet with mobile security software. Look for a product that scans apps for viruses and spyware, blocks shady websites, provides lost-device protection and offers automatic updates.”3

Do not purchase from spam or phishing emails.  A phishing email with a fake offer for a desirable product is a hard thing to resist for many shoppers, so they make an impulsive decision and click on the “Order Product” or “Buy Now”, and that’s when the malware attack starts.  A phishing email is not like a standard email. The cybercriminal simply wants your click, and nothing else. The Unsubscribe button won’t stop the email spam.  The best solution in these cases is for you to simply mark the email as spam, this will remove the mail from your inbox and block the sender from sending more spam.

Keep a record of your transactions.  If you are a frequent online shopper, it may be difficult to remember from which site you bought a certain product.  So, write it down: what you bought, when and from what website.  Compare your spending details with the banking records from your online banking account, keep track of which websites you use for shopping and buying stuff online.

Hold on to your receipts and destroy them when you no longer need them.  Keep the receipt for your purchase, just in case you need to confirm it again, as well as for warranty and return issues.  If you want to get rid of receipt, make sure to destroy it completely, so that any possible identity thief won’t be able to find any information about you.

Don’t give out more private information than you need to.  ”In order to shop online you need to provide two types of information: payment information, such as credit card data, and shipping location, which is usually your home or work address. Be suspicious of online shops that ask for information such as: date of birth, social security number or any other similar information. They don’t need it in order to sell you things.”4

Don’t keep too much information on your smartphone.  These days, everybody stores a lot of important personal information on their phone, and most of us rarely take the time to secure them.  These devices are now much less about calling people, and more about photos, social media, etc.  Increasingly, people shop online using their smartphone, but this carries its own risks. Fake online shops can infect your smartphone with malware, and then have access to information such as phone numbers, notes, photos, and even app contents.  Be careful what information you store on your smartphone.

If you take a few safety precautions, you can enjoy the convenience of technology with peace of mind while you shop online.

1 https://www.welivesecurity.com – ESET Security Forum
2 https://www.pcmag.com
3 http://www.trendmicro.co.uk/home/internet-safety-for-kids/smart-mobile-tips-for-online-shopping/ – TrendMicro
4 https://bettermoneyhabits.bankofamerica.com/
https://staysafeonline.org – Powered by National Cyber Security Alliance
https://www.americanbar.org – American Bar Association
https://www.foxnews.com
https://www.usatoday.com

 

Bryley Basics: What happens when a home is smarter than its owner?

Today, if we forget to turn off the coffee pot, or shut the garage door, we can simply hit a button on our phones, or other devices. According to a study by Intel Corporation, 71% of the population is expected to have at least one smart-home device in every home by 2025.1

This is great news for those of us that are forgetful, but one has to be wary of how much access is granted through these devices. Just like you wouldn’t leave your house keys out for anyone to take, you must also be cognizant of the security of your smart devices.   Last year, hackers were able to bring down several sites by using home devices connected to the internet such as baby monitors, cameras, and home routers without the user’s knowledge.1

There are several steps users can put in place in order to take advantage of these smart devices while remaining protected:

Do your research. Not all smart devices were made equal. It is best to do some research prior to purchasing a device to see what security measures the manufacturers have implemented. Will the device automatically perform patch updates? Does it require a passcode? Will it prompt you to change your password? Knowing this ahead of time, will give added peace of mind.

Secure your devices. By default, many of these devices have a simple security plan in place, since historically they haven’t needed to worry about cyber threats. Prior to a few years ago, no one would have thought you could have your refrigerator tell you what items you would need to purchase on your next grocery trip! Make sure your device requires a passcode that you can regularly update.

Regularly update your Passwords. Make sure to change your password every 60-90 days with a complex password using a mixture of capital and lowercase letters, numbers, and symbols. A password does nothing if it remains at the default factory password.

Separate your Network. As an added layer of protection, put some separation between your devices and the rest of your data. Most of the time, these devices only need an internet connection, so putting them on a different network from the rest of your data protects both of them. “Newer WiFi routers have built-in guest network capabilities that can isolate untrusted devices from each other and from the rest of your network – a useful feature for most devices that only need internet access and don’t need to talk to other devices. Extra configuration may be required to properly secure devices that need to talk to each other (like automation controllers and security cameras), but it’s possible to limit that communication without laying bare the rest of your home’s network.”2

Perform Regular Updates. Some devices will automatically update while others you will have to check. Regardless, it is best to check every so often to ensure the updates are performed and you are protected.

Security of these smart devices is such a concern, Senators Mark Warner, Cory Gardner, Ron Wyden and Steve Daines introduced the “Internet of Things Cybersecurity Act” aimed at forcing tech companies “to ramp up security if they want to sell connected devices to the federal government.”3 This bill is the bare minimum and will block any “IoT devices with known security issues from government use and require device makers to patch any new flaws. Security researchers who hack IoT devices used by the federal government in order to find new flaws would be exempt from the Computer Fraud and Abuse Act, which has been used to charge hackers.”3 It is the hope that this bill will encourage companies to adopt these regulations as standard for commercial sectors as well.

At the end of the day, these devices will become more and more commonplace. As this occurs, security will also improve. There are sure to be growing pains, but like most evolutions, it will improve our lives.

 

  1. 1 Best Smart Home Devices and Hot IoT Is Changing The Way We Live. Forbes Technology Council. 6 Jun 2017
  2. How To Protect your Fancy New ‘Connected Home’ from Savvy Hackers. Best Buy
  3. 3 Congress to smart device makers: Your security sucks. Ng, Alfred. CNet. 2 August 2017.

Bryley Basics: How to get the most life out of your computer

Have you noticed that you have been able to squeeze more life out of your technology devices than ever before? According to Intel’s CEO, Brian Krzanich, the cycle has expanded 20% from four years to five or six1. In our experience, upgrading an operating system on a Windows PC can often cost more than replacing the PC with a PC that has a newer OS. This is often because OS upgrades are not always reliable, particularly with legacy applications, or drivers that are no longer available for older hardware. For business users, we typically wipe the drive clean and then reinstall a new OS rather than upgrade.

Another way to extend the life of your device is to take care of the battery. Having the battery constantly plugged in actually does more harm than good and decreases the overall lifespan of the device. For long term battery life, it is recommended that you regularly allow your battery to drain.

You can further extend the life of your machine by completing incremental upgrades such as adding more memory, upgrading graphics cards, and replacing older hard drives with SSDs.

These tips are aimed at helping you extend the life of your devices and are not meant to keep them on “life support.” There will come a time when you have diminishing returns and will need to replace the devices.

Remember, we are here to help; please reach out to us at 978.562.6077 or email ITExperts@Bryley.com.

 

  1. Computer World. 1 June 2016. “The PC upgrade cycle slows to every five or six years, Intel’s CEO says.”

Bryley Tips: Password Manager

The days of widespread, biometric-based security (voice recognition, fingerprint reading, eye scanning, etc.) are coming, but passwords are still required in many organizations and at most websites.  The problem:  How do I manage (let alone remember) all of the different usernames and passwords I have out there?

Personally, I use Tasks within Microsoft Outlook, which is secured by my network login:  Within a folder I titled “Usernames”, I create a task for each application and website and then copy-in the date and user information.  This limits my “need to remember” to only one complex password (my network login).  However, I must have access to my Outlook account to retrieve all other user information.

There are better tools called password managers.  These are software applications that “help a user organize passwords and PIN codes”1, which are held in a secure, encrypted file or database.  Many include the ability to automatically fill-in a form-based webpage with the username, password, and any other login credentials.

Most password managers can be categorized thus:

  • PC based – Application running on your PC
  • Mobile based – Application running on your tablet or smartphone
  • Token-based – Requires a separate smartcard, memory stick, or similar device to authenticate
  • Web-based – Credentials are located at a website and must be viewed and/or copied from this site
  • Cloud-based – Credentials are web-based, but are securely transferred for processing to an application running on your PC or mobile device

Most password managers are hybrids and many fit into two or more categories, but all share one trait:  You still need a master password to access your information (although some offer two-factor authentication).

Important characteristics include:

  • Access – Accessible from all devices and browsers
  • Detect – Automatically detect and save from any account
  • Secure – Advanced encryption, two-factor authentication, etc.

Pricing varies from free (for the slimmed-down, single-device versions) to annual subscriptions that range from $9.95 to $49.99 per year.

Several publications2 have reviewed password managers; the top performers:

  • LastPass 3.0 – Cloud-based and powerful yet flexible; free version available, but upgrade (at $12/year) to LastPass Premium for mobile-device support
  • DashLane 2.0 – Feature laden with an easy-to-use interface; free version, but $29.95/year to synchronize all devices and get priority support
  • RoboForm Everywhere 7.0 – Cloud-based at $9.95 for first year

Other password managers (in alphabetical order):

  • 1Password for Windows – $49.99 per user
  • F-secure Key – $15.95
  • Handy Password – Starts at $29.92
  • KeePass – Free
  • Keeper – Subscription at $9.99/year
  • My1login – Free for 1 to 3 users; $22 for 4 to 10 users
  • Password Box – Free version with subscription at $12.00/year
  • Password Genie 4.0 – Subscription at $15.00/year
  • PassPack – Free version with subscription at $12.00/year
  • PasswordWallet – $20.00

I like LastPass; the free version is easy to use and my login data is available from anywhere (with Internet access).  Plus, I like having the application locally on my PC (even though my data is stored at LastPass in encrypted format).

  1. Taken from Wikipedia at http://en.wikipedia.org/wiki/Password_manager.
  2. Recent password managers reviews:

Bryley Basics: How to Handle Phishing SPAM

With an uptick in cyberattacks and phishing scams, we thought it prudent to provide some tips to avoid becoming a victim:

  1. NEVER open or click on links in email unless it is a known source and you are expecting the message that contains the links (Nice work Bill).
  2. NEVER respond to an email emphasizing the need to “Act NOW!”  This urges you to not think about what you are doing and is certainly the road to perdition.
  3. The bad guys are out there trying to lure you in.  They are up to no good 24/7 and constantly seeking out new and improved ways to dislodge your sensibilities and compel you to CLICK before you think.
  4. Remember that the bad guys are very clever, intelligent, and determined.  What they do represents potential cash flow to them.  They are motivated and have resources available to them.  Tired, rushed, frustrated, angry users are a potential bumper crop for them.
  5. Putting SPAM email on Block Lists is futile.  Today they change constantly and move around geographically.  Just delete them.  Your SPAM protection will eventually catch *most* variants and block them.
  6. You WILL get SPAM.  As the good guys thwart the efforts of the bad guys (SPAMMERS) they figure out ways to get around the walls of protection.  It is a running gun fight.  Thankfully there are good guys out there fighting on the front lines of this war.  They too are clever, intelligent, and determined.  We can help by being cautious and aware of the danger.  The moment we let our guard down, is the moment they gain an advantage.
  7. Being ever vigilant and careful about what is put in front of you as you use your computer is the best defense against becoming a victim.
  8. Emphasize these basic practices to your users.  The best way to avoid most mail delivered scams and many internet-based scams is to pause and examine the links contained in the email or on the web page.  Willy-nilly clicking links at any time will ultimately make you either appreciate your backup strategy or wish you had one.
  9. See #7 above.

A periodic review of Business Security practices with users is recommended.  Keep your business best practices along with computer security best practices in the forefront of your employees’ minds.  Emphasis on how to handle emails that “look” like they could be legitimate will pay big dividends in terms of time and money.

Sending people email about what to do to keep your company secure will not be nearly as effective as taking the time to gather in a room for ½ an hour face-to-face to demonstrate the seriousness of the situation.

Bryley Systems specializes in protecting you from malware. Contact us at 978.562.6077 or by email at ITExperts@Bryley.com. We’re here for you.

As they always said in the TV series “Hill Street Blues” at the end of the morning briefing, “Let’s be careful out there…”

Bryley Basics: Protecting your Online Reputation

It seems nearly everyone we know today has some sort of Social Media account. It keeps us connected with loved ones near and far, enables the sharing of personal and professional milestones, and provides information about current events. This is great as long as certain precautions are taken. Safety and security must be considered when doing anything online.

One must also remember that anything done online can be seen by anyone no matter how “private” the group may be. The rule to remember is “once it’s on the Internet, it’s there for all to see forever.” A group of incoming Harvard freshmen learned that lesson the hard way. Roughly 10 incoming freshmen saw their offers rescinded after it was discovered that they posted explicit memes and messages targeting minorities in a private Facebook group chat.1 These students learned a valuable, albeit costly, lesson, there is no such thing as private groups or messages when it comes to the Internet.

There are several steps that can be taken to protect your online reputation:

  • Google yourself. Your reputation is largely decided by what people can see not just what you put forth. You can’t track what you don’t know about! The best way to manage this may be to setup a Google alert for your name so you can track new content.
  • Don’t post anything you’d be ashamed of later on. Many individuals will ask themselves a few questions prior to posting. A common question to ask yourself is Would I be comfortable sharing this with someone I highly admire? If the answer is No, don’t post! There are some individuals that will take a more conservative approach and if they even have to ask the question, will not submit the post for all to see.
  • Adjust your settings. Sometimes friends may add you to inappropriate posts without your knowledge and you may not find out until it’s too late and the damage is done. To prevent this, adjust your settings in your social media platforms so that you have to approve anything where you are tagged. Also, speak with your friends and let them know what you are and are not comfortable with them posting.2
  • Buy a Domain Name. For roughly $12 a year using sites such as GoDaddy, buying a domain name is added insurance to protect against others maliciously using your name. By creating a short bio, a CV, articles and other information, you can improve upon your image while boosting your ranking in search results.3

As much time as you take to curate your reputation in person, a similar amount of time, if not more, should be taken to manage your online reputation. In this day and age, perception is reality. Make sure you are the individual molding your digital persona.

 

1 Natanson, Hannah. The Harvard Crimson. “Harvard Rescinds Acceptances for At Least Ten Students for Obscene Memes.” 5 June 2017.
2 Facebook privacy Settings. https://www.facebook.com/about/basics/usr1
3 Erskine, Ryan. Entrepreneur. “How to Protect Your Online Reputation in 2017.” 23 Jan 2017.
4 O’Loughlin, Erin. Security Intelligence by IBM. “Identity theft and Social Media: How Are They Related?” 5 August 2016.

Defining “Virus” – In the World of Computers

There are viruses that can be implanted on a computer today, and lie dormant waiting until a network becomes completely vulnerable before attacking. Unfortunately, viruses have come a long way from 20 years ago. Today we refer to viruses as a specific kind of malware, one that can self-replicate and continue its destructive path indefinitely.

Viruses have gotten faster and more efficient. They can delete photos, files, and entire storage libraries. They’re developed to target Word, Outlook, Windows OS, Mac OS — nothing is safe. They can be designed to affect Facebook or Twitter users, or programmed to steal credit card information. Hackers are often out for destruction, chaos, or potentially for ransom. The more the average person understands them, the faster hackers create new tricks to get in. Viruses can come in the form of a pop up, an email from a coworker, or a completely undetectable program that waits until the time is right.

How does a computer virus find me?

Even if you’re careful you can pick up computer viruses through normal Web activities like:

  • Sharing music, files or photos with other users
  • Visiting an infected Web site
  • Opening spam email or an email attachment
  • Downloading free games, toolbars, media players and other system utilities
  • Installing mainstream software applications without fully reading license agreements

What does a computer virus do?

Some computer viruses are programmed to harm your computer by damaging programs, deleting files, or reformatting the hard drive. Others simply replicate themselves or flood a network with traffic, making it impossible to perform any internet activity. Even less harmful computer viruses can significantly disrupt your system’s performance, sapping computer memory and causing frequent computer crashes.1

What are the symptoms of a computer virus? If you recognize any of these malware symptoms in your machine, it may be infected:

  • Slow computer performance
  • Computer pop-ups
  • Suspicious hard drive activity
  • Running out of hard drive space
  • Frequent computer crashes
  • New browser home page, toolbars and/or unwanted websites
  • Unusual messages or programs that start up automatically
  • Your security solution is disabled 

How Antivirus Works. Most antivirus software works on a signature database, monitoring the internet 24 hours a day, 7 days a week. Every time a new virus is reported – it’s indexed, catalogued and added to the software’s database. Once your antivirus software is up-to-date it is equipped to tackle the new virus should it ever reach your device.

Who needs antivirus software? 2

These days, everybody needs antivirus software. Computer viruses don’t just come from streaming or downloading movies. Many people think that they can avoid potential threats by making sure they don’t visit certain websites or download certain files. The truth is computer viruses can make their way on to your computer or any other device in a number of ways. You can pick up viruses and malware simply by checking your email, browsing the web, or from putting a USB memory stick into your laptop. Virus protection is a requisite of having your own personal computer.

To inquire about Bryley’s full array of Managed IT Services, please contact us by phone at 844.449.8770 or by email at ITExperts@Bryley.com. We’re here for you.

Resources:
1 https://webroot.com
2 http://www.top10antivirussoftware.com

 

 

What Can we Learn from the Netflix Leak?

Netflix was in the news recently for a mishap with its production company. A cybercriminal that goes by the name “thedarkoverlord” was able to breach postproduction company Larson Studios, and has claimed to have “stolen unreleased content from ABC, Fox, National Geographic and IFC.”1 After Netflix refused to pay the ransom, the cybercriminals released the first 10 episodes of Season 5 of “Orange Is The New Black” on Friday, April 28th via Twitter. When they did not receive the desired response (payment), the released the remaining nine episodes of the season the following day.1

This is the latest high-profile breach in the past year (LinkedIn, Twitter, IRS just to name a few). According to a report published by Verizon, ransomware attacks have “increased in the past five years and were up 50 percent in 2016 compared with 2015…”1

This breach is a reminder to stay vigilant and maintain your safeguards. Here are some tips on how to avoid finding yourself in this type of predicament:

  1. Create a Firewall. While most operating systems come with their own firewalls, they are typically only designed to protect one machine. To protect yourself from attacks and malware, it is best to invest in a network firewall.
  2. Encrypt Your Data. A firewall is considered the first line of defense, encrypting your data provides that extra layer of security. You do not want them to be able to through the firewall and have easy access to your proprietary information.
  3. Have Policies in Place. You can have all the devices and systems in place, but if your employees are not well-versed in their roles of protecting the data, all your effort will be for not. Instead, make sure employees know how to treat the data and the steps they need to take to avoid any potential issues. One of the core policies that should be implemented is a password policy. Employees should be prompted to change their password a minimum of every 90 days (less depending upon your industry). Passwords should be complex and include numbers, letters, and symbols.
  4. Have a regular review of your infrastructure. You go to the doctor for regular checkups, you should do the same for your company’s infrastructure. It can often be difficult to do on your own as you may not have all the knowledge and expertise or the bandwidth to conduct a proper evaluation. Do not be afraid to ask an MSP, such as Bryley, to conduct a network assessment and evaluate your infrastructure. They have expertise and breadth of knowledge that will prove valuable and can highlight what you are doing well and areas where you can improve.

If you would like to improve your cybersecurity plan, or to inquire about Bryley’s full array of our Managed Cloud Services and Managed IT Services, please contact us at 844.449.8770 or by email at ITExperts@Bryley.com. We’re here for you.

 

1 Perlroth, Nicole and Matthew Haag. Hacker Leaks Episodes From Netflix Show and Threatens Other Networks. 29 April 2017.
http://www.cbsnews.com/news/irs-identity-theft-online-hackers-social-security-number-get-transcript/
http://www.cnbc.com/2017/03/15/turkey-twitter-accounts-hacked-germany-netherlands-nazis-forbes.html
http://www.verizonenterprise.com/verizon-insights-lab/dbir/2017/