Monday, September 30, 2013

Routine Maintenance

It's Monday and for some of us it means the beginning of the work week.  Which brings me back to my post Last week.  Computers at work...

Friday or Monday is a great day to do all your routine maintenance on your Windows based computer at work.  Before you leave the office today, take a few minutes and do the following:

1)Disk Cleanup:  Found in the accessories folder under system tools.  Helps clean-up any temporary files, recycle bins and other files that may be cluttering up your hard drive and even slowing it down.

2)Defrag:  Also Found in the accessories folder under system tools, helps to organize your files (in the background).  Every time you open and close a file, or delete something off of your hard drive it leaves "bits" and pieces behind.. yes pun intended!  This puts everything back where it should be.  When you run defrag the computer will ask you to analyze it first.  I wouldn't even bother doing that often times what it thinks is acceptable level is not acceptable to the user.  Just run defrag, do not analyze.

3)IE:  If you are using Internet Explorer (IE), it is a good idea to clean it out regularly also.  Here are a few suggestions to keep it running smoothly.  Go to tools, internet options and delete your browsing history - temporary internet files, cookies, form data, passwords and in private filtering data.  You may think it saves time to have the PC save this information, but it could pose a security risk.

4)Updates:  Windows should be set to download and install updates automatically.  This will help your computer stay up to date on security patches, bug fixes etc.  Also if you have an Anti-virus or Anti-Malware program installed like Microsoft Essentials or Malwarebytes it is very important these are also set to download  & install automatically.  You can also open these programs and choose update to be sure.  You should also run a "quick" scan about an hour before you are scheduled to leave for the day.  This will slow you down but ensure you are virus and/or malware free!

5)BACKUP:  Most of our work is done on internet based software programs.  However, if you save files to your hard-drive or if you have a server in the office you should be doing regular backups.  Keep one back up in the office and one off-site.  USB storage devices are very inexpensive and can easily be transported. There are also several companies now offering online virtual storage for you. Like icloud for example.  Do your homework before choosing one of these options. To be sure the site is legitimate, safe and secure.

6)Dust:  Dust is responsible for many hardware failures.  It can clog important pieces of equipment inside your computer and prevent them from operating or cooling properly.  You should never use a liquid on your computer inside or out!  Invest in a can of 'air' and spray your keyboard and the rear of your computer by the fan.  Just be sure you are not blowing the dust back inside, hold it at an angle so it blows dust out and away.

All the things I mentioned above should be done once a week to keep everything running smoothly. You should also do these things at home, depending on how much you use your computer you might get away with bi-weekly.

Friday, September 27, 2013

Your Employees Are Being Attacked!

Your business could be in jeopardy.  Employee PC’s are the most common form of a security breach.  It is really easy to trick someone into clicking on a link or opening an email and in return you open the door for cyber criminals potentially giving them access to your business data and even can shut down your entire operation.

Here are the most common threats and what you and your employees can do to avoid them:

1)      Phishing:  In a phishing scam, usually an email or link is sent via a social network trying to get you to download malware unknowingly or to type in sensitive information.  Often times it appears to come from a legitimate source or addressed specifically to you.  However, If you look closely something is just not right.  Often times there is a spelling error or the address it is from is not the company or individual it appears to be from, but some other odd name with with the actual name in it to sound legitimate. Take steps to recognize and delete suspicious emails.
2)      Malware or Scareware:  In these types of attacks we unknowingly go to a website, perhaps it came up in a search engine and you clicked on it.  Suddenly, a message pops up saying you are infected or your PC has been compromised or you have registry errors and even that your PC has been confiscated by the government!  In order to solve the problem you just need to “click here” and magically all the problems will be solved…that is after you give out sensitive information like your credit card because it will only cost $9.95!  Unfortunately after you enter your information, nothing happens… there is no fix and actually you just downloaded a virus.  A little education can go a long way in teaching your employees how to spot these type of attacks.
3)      File Sharing:  Everyone likes free stuff!  It is really tempting to sign up for a peer to peer network and share files that you would other wise have to pay for like music for example.  Unfortunately this too is a very common way for viruses to infect your computer.  It opens an door to your computer and therefore your network!  It is a good idea to prohibit Peer to Peer networks in the office.  Often times they are also illegal.
4)      Social Networking:  Social networks are becoming more and more popular and even more popular with cyber criminals.  The posts you see “Click if you like if you want her dad to quit smoking” or “click like if you want this kitty reunited with her owner” are ways of tricking you to click like.  The more likes the post gets the more money they can make.  The page might be called something you can relate too, and they post things that you like, then once they get enough followers they sell the page to someone else. There are several examples of links spreading on social networks that are infecting unsuspecting computers.  Again, training employees to spot scams and keeping your profile and information private (friends only) are steps in the right direction.
5)      Mobile Malware:  Now that smart phones and tablets are becoming more and more popular, it is important to note that cyber criminals realize this too.  iPhones and iPads are pretty secure because iTunes & the app store really monitors and regulates what is available for download on those types of devices.  However, android and no name brand tablets are at risk.  There are what appears to be legitimate applications free for download and in fact it is malware in disguise.  Do a little research if you are not familiar with an app before you agree to download.
6)      Cross-Site Scripting (XSS):  Often time we think of security breaches coming from going to illicit or illegal websites and they do, but XSS comes from the smartest cyber criminals hijacking a legitimate website and changing the HTML code to their own malicious code.  This lets them at the very least steal your info and it could be very detrimental.  Protect yourself by keeping your security programs up to date, disable Java and any other unnecessary features.
7)      Drive by Download:  This refers to a system vulnerability, usually in your browser that allows viruses and malware to be downloaded automatically and installed on your computer – often times without you even knowing.  Ways to protect your self and your PC, make sure your browser is up to date and any applicable security patches installed.

The bottom line?  Training and education and regular system maintenance it the best way to protect your employees and your business you worked so hard to build.



Thursday, September 26, 2013

Children and Identity Theft

Experts say kids are easy targets largely because they don’t do things like open bank accounts, apply for jobs or take out loans that would make them aware of any problems on their credit report. As results, thieves can often use a child’s identity for years, even decades without anyone knowing it. Many parents are not aware that their Children’s information is of considerable value to identity thieves.
What’s a parent to do?
Luckily, there are precautions that lower the risks of your child becoming a victim.

-Use extra caution at school. Ask how your child’s personal info is being uses before sharing it and verify that sensitive documents are stored in a safe/secure location. Also think twice about having your child listed in the school directory since thieves could obtain a copy of it.

-Keep SSN’s under wraps. Keep your child’s social in a locked safe or safety deposit box. Always ask anyone who requests it how it will be used and whether an alternate form of ID can work. Teach your child to be equally selective about revealing his or her SSN to anyone. Most thief's will use one child’s name, another's SSN and a fake DOB.

-Monitor the mail. A credit card offer, income tax return or letters from a collection agency in your child’s name are all signs that something is fishy.

-Request an annual credit report and manual search. It’s good practice to get a credit report for yourself and your child each year. You can visit Annualcreditreport.com to order a free report. While credit reports show whether anyone is illegally using your child’s name, only a manual search will reveal is your child’s SSN is being used under another name. The credit bureaus are required to conduct a no-cost manual search when it’s requested.

-Report any problems ASAP! Do not wait to file a police report if you or your child’s identity is at risk.

Most homeowners or renters policies in NYS offer Identity theft coverage automatically or by endorsement for a small fee.  Contact your current agent to confirm whether or not you currently have this coverage and whom the coverage applies in your home.

If you have questions or would like more information stop in to one of our three offices. (Bring your current policy even if it is with another agent if you have one).

-Tanner Insurance Agency, Inc.