We don’t want to belabor the point, but multinational tech companies like Apple, Facebook, and Google will never call or text you personally out of the blue. So if you get a call or text purporting to be from such a company, it’s 99.9% likely to be a scam, and you should ignore it regardless of whether the caller ID seems legitimate. If you’re still worried, look up the company’s tech support phone number separately—never respond directly to such a call or tap a link in a text—and discuss the situation with the support reps. Or contact us, and we’ll talk it through with you.
This Is Hands-Down the Easiest Way to Give Someone Your Wi-Fi Network Password
You know the drill—a friend comes to visit and wants to get on your Wi-Fi network. You’ve written the password down somewhere, but where? Even if you have it handy, it’s a pain for your friend to type in. Since macOS 10.13 High Sierra and iOS 11, Apple’s operating systems can make connecting a lot easier. Have your guest choose your network, and then put their device next to one of your devices that’s awake and connected to the Wi-Fi network. As long as you have a card in your Contacts app whose name matches your friend’s My Card in their Contacts, your device should ask if you want to share the Wi-Fi password with them. Just tap Share Password when prompted and you’re done!
Don’t Freak Out If You Get Blackmail Spam Containing an Old Password
Have you gotten an email message whose Subject line says something like “Change your password immediately! Your account has been hacked.”? If not, it may be only a matter of time before you do. It’s a scary message, especially because it contains one of your passwords, some threats, and a demand for money. Worse, the password is likely one you’ve used in the past—how could the hacker have discovered it? Has your Mac really been taken over?
Relax. There’s nothing to worry about.
This “blackmail spam” has been making the rounds on the Internet recently—we’ve heard from several clients who have received it, and we’ve gotten copies too. The message purports to be from a hacker who has taken over your Mac and installed spyware that has recorded you visiting Web sites that aren’t exactly G-rated. The hacker also claims to have used your Mac’s camera to photograph you while you’re browsing said non-G-rated sites and threatens to share those pictures with your contacts and erase your drive unless you pay a ransom using Bitcoin.
This blackmail spam has raised so many pulses because it backs up its claims by showing a password that you’ve used in the past. Hopefully, it’s not one that you’re still using, because it was extracted from one of the hundreds of password breaches that have occurred over the past decade. Impacted Web sites include big names such as Yahoo, LinkedIn, Adobe, Dropbox, Disqus, and Tumblr—thieves have collectively stolen over 5.5 billion accounts. It’s all too likely that some old password of yours was caught up in one of those thefts.
Concerning as the message sounds, all the details other than your email address and password are completely fabricated. Your Mac has not been hacked. There is no malware spying on your every move. No pictures of you have been uploaded to a remote server. Your hard drive will not be erased. In short, you have nothing to worry about, and you should just mark the message as spam.
However, if you’re still using the password that appeared in the message, that is cause for concern. It means that any automated hacking software could break into the associated account, and it must be a weak password if the bad guys were able to decrypt it from the stolen password files. Go to Have I Been Pwned and search for your email address. If it shows up for any breaches, make sure you’ve changed your password for those accounts.
As always, we recommend that you create a strong, unique password for each of your Web accounts. The easiest way to do this is to rely on a password manager like 1Password or LastPass to generate a random password. Then, when you want to go back to that site, the password manager can log you in automatically. It’s easier and more secure.
If you’re still concerned about your passwords, call us and we can help you get started with stronger security practices.
Did You Know iOS 12 Lets You Add a Second Person to Face ID?
Touch ID lets users register up to five fingers that can unlock an iPhone, which has long been a boon for those who share access to their iPhone with trusted family members. However, users of the iPhone X haven’t been able to give a second person Face ID-based access, forcing those people to wait for Face ID to fail and then tap in a passcode manually. iOS 12 lifts that limitation, allowing a second person to register their face with Face ID on the iPhone X and the new iPhone XR, XS, and XS Max. To set this up, go to Settings > Face ID & Passcode. Enter your passcode and tap Set Up an Alternate Appearance. Then give your iPhone to the person who should have access and have them follow the simple setup directions.
Back Up Before Upgrading to Mojave or iOS 12!
Poll a room of Apple experts about the one topic they can’t stop talking about and many will launch into frustrated rants about how too few people back up. Backups are always important, since you can never predict when your Mac or iPhone will be lost or stolen, melt in a fire, or just break. But one time when backups are especially important is before you upgrade to a major new operating system. If you’re thinking “What could go wrong?” the answer is, “Lots, and wouldn’t you like to be able to revert instantly if something does?”
Mac Backups
On the Mac side, there are plenty of ways to back up, and a bootable duplicate made with SuperDuper or Carbon Copy Cloner is the best insurance right before you upgrade to macOS 10.14 Mojave. More generally, backing up with Time Machine ensures that you can not only restore your entire drive if necessary, but also easily recover a previous version of a corrupted file. Finally, since a fire or flood would likely destroy your backup drive along with your Mac, we always recommend an offsite backup made via an Internet backup service like Backblaze.
What happens if you don’t back up and your Mac gets damaged such that you can’t access important data? That’s when things get expensive, and if you have a 2018 MacBook Pro, you have even fewer options.
Historically, it was relatively easy to remove a drive from a broken Mac and recover the data from it. Data recovery got harder with solid-state storage, and even more so with the introduction of the first MacBook Pro with Touch Bar, thanks to Apple’s new T2 encryption chip, which encrypts data on the drive. To simplify last-ditch data recovery, Apple put a special port on the MacBook Pro’s logic board and provided a custom recovery tool for Apple Authorized Service Providers. With the 2018 MacBook Pro, however, Apple removed that port, so only data recovery specialists like DriveSavers can recover data from such damaged machines, and only then if they have the user’s password.
So please, back up your Mac before something goes wrong. It’s fast, easy, and inexpensive to get started, and we’re happy to help.
iOS Backups
We’ve all seen, if not experienced, a broken iPhone or iPad. They’re durable little devices, but they won’t necessarily survive a drop onto a sidewalk or into a toilet (yeah, it happens). And it’s way too easy to forget your iPhone at the gym or in a restaurant. So a backup is necessary if you don’t want to risk losing precious photos or having to set up a new device from scratch. Plus, just as with a Mac, things can go wrong during major iOS upgrades.
With iOS, though, you don’t need extra software or hardware. Apple provides two ways of backing up your iPhone or iPad, iTunes and iCloud. Neither is necessarily better or worse, and you can—and should!—use both for added safety. We’ve seen situations where an iPhone would refuse to restore its files from iTunes but would from iCloud.
To back up to iCloud, go to Settings > Your Name > iCloud > iCloud Backup, turn the switch on, and tap Back Up Now. For backups to happen automatically in the future, you must have sufficient space in your iCloud account (you get 5 GB for free and can buy more), and your device must be on a Wi-Fi network, connected to power, and have its screen locked.
To back up to iTunes, connect your device to your Mac via a Lightning-to-USB cable, launch iTunes, and click the device icon to the right of the media menu.
Then, in the Backups section, click Back Up Now. If you’re prompted to encrypt your backups, we encourage you to agree since otherwise your backup won’t include passwords, Health information, or HomeKit data. For automatic backups via iTunes, select This Computer. After that, every time you plug into your Mac, it will back up.
If you have sufficient iCloud storage, we recommend backing up automatically to iCloud because its automatic backups work well at night when you’re charging your devices. Then, make extra backups to iTunes whenever you think you might need to restore, such as when you’re getting a new iPhone or iPad, or when you’re about to upgrade to a new version of iOS.
Social Media: Apple’s new T2 encryption chip makes data recovery from new MacBook Pros harder, and the release of macOS 10.14 Mojave and iOS 12 make backups all the more essential. Read on to learn how:
Here’s Why You Should Always Keep the Find My iPhone Feature Enabled
On the face of it, Apple’s Find My iPhone feature does what it says. If you lose your iPhone, you can identify its last known location by looking in the Find iPhone app or on the iCloud Web site, and you can make it play a sound. It’s great for tracking down a missing iPhone, whether you misplaced it in the house or left it behind at a restaurant.
But Find My iPhone does much more! For starters, it works with nearly any Apple device. You can use it to locate a missing Mac, iPad, iPod touch, Apple Watch, and even AirPods. Find My iPhone also helps protect your data if a device is stolen. It even works with Family Sharing to locate devices owned by anyone in your family—a boon to any parent with a forgetful teenager.
You must turn on Find My iPhone before your device goes missing!
- In iOS, tap Settings > Your Name > iCloud > Find My iPhone and enable Find My iPhone. (On the iPad, it’s called Find My iPad.) Also on that screen, turn on Send Last Location. Finally, go back to the main level of Settings, tap Privacy > Location Services, and make sure Location Services is turned on.
- On the Mac, open System Preferences > iCloud and select the Find My Mac checkbox—if you see a Details button beside Find My Mac, click it and follow its instructions for setting necessary preferences.
Be sure to practice viewing where your devices are located and playing tones on them so you’ll know what to do if a device goes missing.
Find My iPhone has a few tricks up its sleeve for when you want a device to show a message or if you think it was stolen:
- Lost Mode: When invoking this mode for an iOS device or Apple Watch, you’ll be asked to enter a phone number where you can be reached and a message. After that, Lost Mode will kick in as soon as the device is awake and has an Internet connection. Anyone who tries to use the device will see your message along with a place to enter the device’s passcode. If you get it back, you can enter the passcode to dismiss the message and use it normally.
- Lock: Available only for the Mac, the Lock feature enables you to protect an entire Mac with a 4-digit custom passcode. You can also enter a message that will appear on the Lock screen. This is a good choice if you think you’ll get your Mac back but would prefer that nobody mess with it in the meantime. Note that if you lock a Mac, you can’t erase it, as discussed next, so lock it only if you think it can be recovered.
- Erase: Even if your device has an excellent passcode or password, you might worry that a thief will access your data. Fortunately, you can erase your device. Erasing a device makes it impossible for you to see its location in Find My iPhone, so it’s a last-ditch effort.
- Activation Lock: If the stolen device is an iOS device or an Apple Watch, when you turn on Find My iPhone, you also enable Activation Lock. This feature prevents someone who has your passcode but doesn’t know your Apple ID and password from turning off Find My iPhone, erasing the device, or setting it up for a new user. In other words, Activation Lock makes it so there’s little reason to steal an iOS device or Apple Watch, since the stolen device can’t ever be used by anyone else. If you get the device back, you can restore your backup—you do have a backup, right?
Find My iPhone works only while the device has power, so if you think you’ve mislaid a device, try locating it right away, before the battery runs out. But even if you are unable to retrieve a lost device, you can prevent others from accessing your data or taking over the device.
Have Your Online Passwords Been Stolen? Here’s How to Find Out.
Data breaches have become commonplace, with online thieves constantly breaking into corporate and government servers and making off with millions—or even hundreds of millions!—of email addresses, often along with other personal information like names, physical address, and passwords.
It would be nice to think that all companies properly encrypt their password databases, but the sad reality is that many have poor data security practices. As a result, passwords gathered in a breach are often easily cracked, enabling the bad guys to log in to your accounts. That may not seem like a big deal—who cares if someone reads the local newspaper under your name? But since many people reuse passwords across multiple sites, once one password associated with an email address is known, attackers use automated software to test that combination against many other sites.
This is why we keep beating the drum for password managers like 1Password and LastPass. They make it easy to create and enter a different random password for every Web site, which protects you in two ways.
- Because password managers can create passwords of any length, you don’t have to rely on short passwords that you can remember and type easily. The longer the password, the harder it is to crack. A password of 16–20 characters is generally considered safe; never use anything shorter than 13 characters.
- Even if one of your passwords was compromised, having a different password for every site ensures that the attackers can’t break into any of your other accounts.
But password security hasn’t always been a big deal on the Internet, and many people reused passwords regularly in the past. Wouldn’t it be nice to know if any of your information was included in a data breach, so you’d know which passwords to change?
A free service called Have I Been Pwned does just this (“pwned” is hacker-speak for “owned” or “dominated by”—it rhymes with “owned”). Run by Troy Hunt, Have I Been Pwned gathers the email addresses associated with data breaches and lets you search to see if your address was stolen in any of the archived data breaches. Even better, you can subscribe to have the service notify you if your address shows up in any future breaches.
Needless to say, you’ll want to change your password on any site that has suffered a data breach, and if you reused that password on any other sites, give them new, unique passwords as well. That may seem like a daunting task, and we won’t pretend that it isn’t a fair amount of work, but both 1Password and LastPass offer features to help.
In 1Password, look in the sidebar for Watchtower, which provides several lists, including accounts where the password may have been compromised in a known breach, passwords that are known to have been compromised, passwords that you reused across sites, and weak passwords.
LastPass provide essentially the same information through its Security Challenge and rates your overall security in comparison with other LastPass users. It suggests a series of steps for improving your passwords; the only problem is that you need to restart the Security Challenge if you don’t have time to fix all the passwords at once.
Regardless of which password manager you use, take some time to check for and update compromised, vulnerable, and weak passwords. Start with more important sites, and, as time permits, move on to accounts that don’t contain confidential information.
4 Emails You Should Never Open
Cybercrime is an ever-present threat to modern businesses.
Without up-to-date and varied IT security measures, successful hacks can compromise your customers’ and employees’ sensitive data and harm your systems, resulting in costly downtime, and worse.
Email is the primary tool that companies like yours use for daily communications in the modern business world. It’s simple, it’s easy, and it’s effective, but it’s also the main source of malware and spam that could threaten your business. If you’re not careful, your email could be the key for cybercriminals that are trying to exploit you:
- Viruses and malware disguised as regular attachments from familiar sources.
- Phishing schemes from cybercriminals posing as familiar companies and contacts in an attempt to convince employees to give up sensitive information.
- Spam and junk email clogging up your inbox and blocking real, important emails from your clients and partners.
So what can you do? One of the surest ways to protect your business from a range of threats is to learn about them!
Need To Speak With An Email Security Expert Right Away?
Call In Your Local Email Security Experts at {company} For A No Cost Consultation Of Your Email Systems.
Call {phone}.
No matter how “bomb-proof” we make your network, you and your employees can still invite a hacker in if you click on a link or open an attachment in an email sent by a cybercriminal. Some spam is obvious, but others are very cleverly designed to sneak past all the filters and trick the recipient into opening the door.
Known as a “phishing” email, this still is the #1 way hackers circumvent firewalls, filters and antivirus, so it’s critical that you and your employees know how to spot a threatening email.
Here are four types of email ploys you should be on high alert for:
The Authority Email
The most common phishing emails are ones impersonating your bank, the IRS or some authority figure. The rule of thumb is this: any email that comes in where 1) you don’t personally know the sender, including emails from the IRS, Microsoft or your “bank,” and 2) asks you to “verify” your account should be deleted. Remember, ANY important notification will be sent via old-fashioned snail mail. If it’s important, they can call you.
The “Account Verification” Email
Any email that asks you to verify your password, bank information or login credentials, or to update your account information, should be ignored. No legitimate vendor sends emails asking for this; they will simply ask you upon logging in to update or verify your information if that’s necessary.
The Typo Email
Another big warning sign is typos. Emails coming from overseas (which is where most of these attacks come from) are written by people who do not speak or write English well. Therefore, if there are obvious typos or grammar mistakes, delete it.
The Zip File, PDF Or Invoice Attachment
Unless you specifically know the sender of an email, never, ever open an attachment. That includes PDFs, zip files, music and video files and anything referencing an unpaid invoice or accounting file (many hackers use this to get people in accounting departments to open emails). Of course, any file can carry a virus, so better to delete it than be sorry.
The good news is that there are many steps a small business owner like yourself can take to secure their business’ IT. Some of the most effective ways to combat security breaches are simple tasks that you can perform without having to hire a security expert.
Keep the following in mind:
- Keep Link Clicking to a Minimum: Clicking on links that appear in random emails just isn’t safe. Hyperlinks are commonly used to lead unsuspecting employees to phishing and malware websites. Be sure to only click links when they’re from a confirmed, expected source, and when they aren’t part of a sales pitch, or an attempt to get information from you.
- Manage A Safe Sender’s List: No matter how new, or costly, or flashy your current spam filter is, it won’t keep unwanted spam out of your inbox forever. Whenever you see that a spammer’s email has made it past your filter, take a moment to block it so that it won’t happen again.
- Do Not Open Unsolicited Email Attachments: This is a crucial email security practice. Suspicious email attachments from unknown or untrustworthy senders are the most common source of malware, ransomware, and other digital threats. Even if it’s from a friend or colleague, consider the message they send along with it; is it worded properly? Does it sound like it’s from them? It’s always a smart move to call the sender or speak in person if possible to confirm that they sent the email. Otherwise, simply delete it until you can be sure of its authenticity.
- Diligently Scan for Viruses and Malware: Another way to double check a suspicious email is to run a malware and virus scan on it. Even though you may have to do so more often than is convenient, it’s always better to be safe than sorry.
Reach out to our team to find out more about the most effective email security practices that can help you keep your business safe. Contact {company} and our IT security professionals at {phone} or {email} today.
From Telegraphs to USENET and How to Protect Yourself from Spam
When someone thinks of spam they typically think of unsolicited bulk commercial email they receive in their inbox. However, the concept of spam started a little earlier than you might think. How far back? How does 1864 sound? Spam in 1864 you say? Yes, in the form of a telegraph, advertising a local dentistry actually. The Telegraph was so much news that the local paper even reprinted the telegraph that was sent to many households, further propagating the message.
More recently, people consider the first spam email coming out of Digital Equipment in 1978 which went to a total of 393 people promoting their latest computer model. You can thank a Monty Python sketch based on a cafe that only served the canned spiced ham SPAM for the origin of the name. Another early spammer was the lawyers Canter and Siegel posting their “Green Card Lottery” message to USENET, a shared messaging system.
What does all this have to do with today? You don’t want to be known as a spammer. There are three ways to attack the spam problem. First off, you don’t want your marketing emails to be classified as spam. Secondly, you don’t want your mail server to be abused where someone sends spam through your hardware. While this wasn’t sent to you directly, your hardware could be blacklisted, thus affecting your own emails. Lastly, you don’t want your employees to respond to spam. There are ways to filter this at the mail server to prevent them from seeing the messages, or at least classify messages as fishy before their opened. Our company {company} can help you to protect your business from being labeled a bad apple in the email business.
Starting with the most important avenue, ensuring your marketing messages get through, there are some best practices to know about. For starters, don’t just send emails directly to your clients. Putting everyone’s email in the “To:” field of a message is bound to cause problems when someone does a reply-all. If you absolutely have to send a message to LOTS of people, it is better to use the BCC (for blind carbon copy) field of a message. Better yet, rely on a mailing list management package like that offered by Constant Contact. Typically, you don’t want to add people to the mailing list yourself. Instead, people should opt-in. More importantly, with each message you send, there should be unsubscribed instructions.
Protecting your mail server is not an easy task. There are some simple steps you can do like requiring that users are authenticated before sending a message, but someone can just spoof the email headers to make it appear messages came through your server. To best protect your server, in 2012 DMARC, or Domain-based Message Authentication, Reporting, and Conformance was introduced. Combined with the earlier introduced SPF, Sender Policy Framework, this makes sure that any messages appearing to come from your mail server actually came from your mail server. {company} can help you keep up with the latest ways to protect your email servers and thus getting your marketing messages through.
Lastly, it is important to look at the inbound side of spam. With all the talk of Russians hacking servers and the release of inappropriate celebrity photos, most of these attempts are triggered by phishing attacks of targets. You still need to worry about viruses being sent through email, but phishing involves fraudsters sending what look like real emails in the attempt to reveal personal information like passwords and bank account info. You don’t want your employees giving away the farm so that others can then get into your company network or your employees worried about identity theft. {company} can help protect your mail servers from letting these unsolicited emails through.
Contact us at {email} or {phone} to learn more about how we can help you.
What Companies Need to Know About Technology Management
Technology Management has become an important aspect of doing business today.
Here are a few details about what it entails, and why a business may need it.
Technology management is a term that is used to refer to a group of services offered to a business that may not have its own IT department. The process can include project management, technology planning, database services, disaster recovery, security, document services, document formatting, e-billing, mailing, mass printing, and much more. Here is some more information I have prepared on this topic. It should help you gain a better understanding of technology management.
Why Do You Need Technolgy Management Services?
The break and fix approach may seem like a good way to save money, but it is going to cost you. Such neglect will eventually lead to a major tech disaster in the future. Such disasters could take the form of tech failure or even a major security breach. Such breaches can lead to class action suits if critical information is lost.
However, having to hire an in-house team may not work either. The inflated costs on the payroll are not worth it for most business owners. When you outsource technology management, the IT infrastructure will receive the care of experts. Best of all, it does not cost an arm and a leg. Additionally, your business will get the full benefit of an experienced team of experts instead of just a few IT experts working in-house. Some of the benefits are:
- Proactive Management.
With technology management, you do not wait for technology to fail before fixing it. A technology management company will review your equipment often and make upgrades as they may be deemed necessary. Such a company will also ensure that you work with only the best antivirus and malware protection.
- Better Network Administration.
A good technology management company does not just hire fresh college graduates. People that work for such companies usually have years of experience under their belts. They know how to tweak each system to fit into a unique business environment. That way, a company is able to maximize its output. The result is that you will be getting more value for the salaries you pay your employees.
- Automated Monitoring.
A good company will have hundreds of system monitors that will allow them to take proactive measures to deal with any problem. That way, a company does not have to deal with an aftermath of a disaster.
- Technology Consultancy.
All companies have technology needs that continue to grow as the company grows. However, it is not always easy to know what you need unless you have an expert as part of your staff. A technology management company will give you the advice that you need to choose the right technology. That way, you will always have an edge over your competition in terms of technology utilization.
- Real Time User Support.
When you hire a technology management firm, it will not be much different to hiring in-house staff in regards to response time. Most of them can have an engineer at your office in minutes when you need a technical expert to solve an issue. Such an expert will give all the options you have and make a recommendation on which you should choose.
Some of the Cloud Service solutions you can expect.
Most business today use cloud services. A technology management can help you with these services if you use the cloud:
- Spam Protection.
A major downside of the cloud is spam. It takes up valuable space in the cloud. A good tech management company will provide you with solutions that prevent unwanted messages from ever reaching the inbox.
- Data Backups.
Data backup is another important service that you will get as part of the cloud-based solutions. By offering cloud-based backups, you will get the peace of mind that you need to run your business. You will no longer have to worry about losing backup tapes or the tapes were stolen.
What Types of Companies Need Technology Management?
All businesses, no matter how big or small, need some IT support to operate efficiently in the modern world. Such support can be useful in helping them to avert major disasters to their business operations.
However, different industries will have differing needs. Thus, not everyone wants the same kind of IT support. There is no one-size-fits-all that can work for all businesses. Some of the businesses that may need Technology management are:
- The Financial Sector.
A good tech management firm will provide you with a clear understanding of the current state of your systems. They will identify the vulnerabilities, risks, and prioritize the issues that are discovered. Additionally, they can also help you identify what has been changed since the last audit took place.
- Manufacturing.
Most people think of the manufacturing sector as the huge processing plants and large warehouses. However, these companies have office buildings that allow them to process the paperwork. If the back office operations are not efficient, an office could lose a lot of money. A technology management firm will help you keep an eye on the IT systems to ensure that they are always working well. That way, a company can focus on its core duty of manufacturing.
- Professional Service Industry.
Downtime is more than just annoying to customers. It can have a huge impact on the profitability of a company. Instead of waiting for equipment to break down, the company will often conduct assessments at regular intervals to prevent downtime. Less downtime will mean that employees have more time to work on their projects. Additionally, it will help to keep your customers happy.
- Non-Profits Operations.
Cyber security must be the priority of every business. There is a lot of malware being created all the time. A breach to a company’s network can have a crippling effect on its finances. The effects can be worse for non-profits since they rely on donors. If donors feel that you are not taking care of their money, they will simply move on. A good technology management company will help to ward off any criminals that may want to reap where they never sowed