Red Light, Green Light, Warning Signs

How many of you ignore red or amber warning lights when they appear on your car’s dashboard? Based on what we see in IT, most of you probably ignore them. When you see a red warning on your computer screen, it could be a security alert or a malfunction.

I recently got a red warning when I tried to print a document. When I looked, the system was objecting to my print parameters. I was trying to eliminate the margins so that I could fit everything I wanted on the piece. In this case, I was able to add some instructions to override the printer’s setting; it’s something I’d bet a lot of you have done.

Other types of warnings can’t be circumvented. In our next example, a client got a new computer but didn’t pay close attention to a OneDrive warning about synching files between his old computer and OneDrive. Typical OneDrive accounts provide a terabyte (1 TB) of storage space. It sounds like a lot of room, and we keep throwing stuff there. However, there is a finite limit on how much you can store. And just as with your hard drive, you need to have space available to be able to manage files. That’s one reason OneDrive and your computer’s hard drive can’t sync.

Microsoft is pretty good about giving you a heads-up on problems, but you need to be proactive, too. In the lower right corner of your computer screen, OneDrive users can see an icon for their drive on their service tray; it should be a blue cloud, and you should monitor that corner of your screen – just like you check your dashboard and mirrors when driving your car. When there’s a problem with OneDrive, you’ll see a red indicator. You can right click on the icon to see what the problem is.

In this client’s case, they missed the warning as they were transitioning to a new computer. When they started to use it, they were missing six months’ worth of files because unbeknownst to them, the synching stopped. Fortunately, they were able to recreate the lost files, but it cost considerable time and money.

It goes without saying that the earlier you catch a problem, the faster and easier it is to fix. Sometimes, it’s an administrative issue, such as a problem with your account. Signing in to your account may point you to a few steps. Sometimes, it can be as simple as just signing in.

But other times, you may have run into a complicated technical issue, and that’s where you need an IT professional’s help. We have seen just about all OneDrive problems known to the world, and we have tools to get to the heart of your issue. Depending on the problem and your comfort/skill level with technology, we get you started on the solution, work with you at various stages of the solution, or fix it for you.

Taking a few steps back from the crisis stage, you can prevent a number of problems by properly setting up OneDrive on a new computer. We can verify all systems are working as they are supposed to. We can do this in one of two ways: 1.) access your new computer remotely once you take it out of the box and get it online; or 2.) take delivery of your new computer, start the setup with you on the phone, ship it to you, and finish the setup remotely.

No matter what we do for you or how we do it, we will remind you: red light, green light. If you can get into the habit of checking the status of apps on your service tray, you need our services a lot less often. Call us – 973-433-6676 – or email us if you have a problem or want to take a step to avoid one.

WiFi Jammers

A recent TV news report on criminals in Morris County using Wi-Fi jammers to disable security cameras and communications grabbed our attention. It should grab yours, too.

The news report focused on a crime ring that’s using Wi-Fi jammers to break into homes. In some cases, they’ll install their own surveillance cameras in a property’s landscaping to know when residents leave their homes. In this case, the homeowner was in his basement when he heard a loud noise coming from the ground floor of his residence. He used his home surveillance cameras to see someone attempting to enter his home. He soon lost his camera and phone service, indicating to police that a Wi-Fi jamming device was in use. The resident was still unable to utilize his cellular phone to call for assistance due to the jamming device.

Let’s look at that last sentence first. The reason the resident couldn’t use his cellphone is because it was likely set to make calls on the Wi-Fi network if the network is available. Our guess is that he could have made the call if he had turned off Wi-Fi on his phone. Heed that point when you face an emergency.

That can be especially true when it comes to security devices. Hard-wired devices perform better and more reliably. Yes, it sounds old-fashioned, but it works. If you have a security system installed by an alarm company, it’s likely hard-wired and connected to a monitoring station via a cellular network – and it has a battery backup in case the power goes out.

Wi-Fi networks are low-hanging fruit for criminals, and we make that fruit more accessible through our own ignorance or laziness. You can’t make your Wi-Fi totally jam-proof, but you can make your network more secure.

The following steps are nothing new to long-time clients and readers of this newsletter, but let’s run through them anyway:

  • Whenever you install a new device – especially a security device – that’s tied to your Wi-Fi network, IMMEDIATELY change the default username (it’s usually “admin”) and the password (it’s usually 1234).
  • Make sure your firewall software is up to date and running to keep out unwanted intruders. It’s one thing to be jammed. It’s another thing to be invaded.
  • Make sure you keep all software for operating systems, hardware and apps up to date and running. Updates contain security patches and bug fixes as well as performance enhancements. A single weak link anywhere in your technology chain can expose your entire system.

In our opinion, a security camera system that’s hardwired to a central location in your home but is accessible through the internet – independently of Wi-Fi – is best. We can help you with the internet connection and show you how to access your security system from anywhere in the world.

We can also help you prevent intrusions by outsiders by providing a thorough security audit of your technology system and making recommendations to improve security. That can include the installation of new systems and user training.

We all have a lot at stake in our homes and businesses. With the rise in hacking and the use of technology to break down our defenses, it makes sense to take every step you can to harden those defenses. Call us – 973433-6676 – or email us to talk about your needs. And make sure you turn off Wi-Fi on your cell phone in an emergency.

Passkeys Not There…Yet

Passkeys hold a lot of promise in eliminating passwords. They rely on an electronic handshake to allow your device to access a secure website, and many password managers claim to link to passkeys. They’re getting there, but they’re not there yet.

A major hurdle right now is that not all websites recognize the passkeys from password managers. Sometimes, recognition depends on the device. Since most of us have fairly new cell phones, our phones usually have the ability to work with facial recognition, which is a form of a passkey. Older devices may not have the ability to work with this type of technology.

We suspect the move to newer computers – especially as Microsoft ends support for Windows 11 – and the need for better security will speed the drive to make more devices capable of using passkeys.

Why are passkeys secure? They eliminate the need to enter usernames and passwords, both of which are stored on the website you’re trying to access. We know the problems with usernames and passwords: they can be stolen by hackers from the website or your device, they can be forgotten, and we can make them less effective by using simple passwords multiple times so we don’t forget them.

Passkey information is stored on the website and in your device. They are not the same info; they rely on the handshake – sort of like two spies who each know what they need to hear in a phrase. On your device, the most common passkey information is a biometric (facial recognition or fingerprint) or a PIN (personal identification number). Because they are device specific, the system relies on you having your device when you log into the website.

When you combine a passkey with some form of 2FA (two factor authentication), you’re using an access method that has proven reliably secure up to now. Many of the leading password manager programs, such as Dashlane, 1 Password and Bitwarden, can create and store passkeys for you, and both Apple and Android can store their passkeys locally and access them using the keychain app on mobile devices.

Even if you can’t use the passkey with your password manager, you’re still ahead. Remember, with a password manager, you only need to remember a single master password. You can let the password manager generate a long, complex password for each website. That password should be immune from guesses based on any of your personal information.

More websites, too, are using passkeys instead of the username/password duo. As the websites use them more, you will have easier access to more websites, but that comes with a caution. The websites will need to tighten their security, too, to prevent more sophisticated hijackers from getting info from their sites. One of their hacks is to hijack cookies. You can help prevent that by not clicking on “Accept” when the cookie dialog box pops up. Instead, navigate to the “Cookies” or “User Data” sections and choose the shortest available session duration. That way your cookies will expire automatically or whenever you close your browser window.

To expand the conversation about the internet and security, you can apply the same security measures to any device in your office or home that uses the internet or a Wi-Fi network. Printer manufacturers such as HP have created anti-hacking steps, such as entering a PIN, to gain access to the information stored in a printer.

We can help you install and configure password managers and set up effective passkeys and other security measures. Call us – 973-433-6676 – or email us to talk about it.

Time for a Hardware Refresh

Windows 7 is long gone, and Windows 10 is scheduled to leave our technology world in October 2025. If you haven’t installed Windows 11 yet on all your desktops and laptops, now is the time. If your computer cannot accommodate Windows 11, it’s because it lacks a security chip that’s designed to work in the AI (artificial intelligence) environment. The longer you wait, the longer you keep that 244-day window open for someone to hide in your system. Start planning your upgrade now.

One of my secret indulgences is watching shows on air disasters on the Smithsonian Channel. One thing I’ve learned is that many disasters don’t happen because of one thing. Many small things happen over a period of time, and then the disaster happens. It’s no different with your technology systems.

Windows 11 has built-in security systems based on its NPU or Neural Processing Unit. NPUs are optimized for data-driven parallel computing, making them highly efficient at processing massive multimedia data like videos and images and processing data for neural networks. They are particularly adept at handling AI-related tasks, such as speech recognition, background blurring in video calls, and photo or video editing processes like object detection.

Video and photos are a key part of new security measures. We’re familiar with them through facial recognition. But, they require massive amounts of data and encryption to be effective. For securing NPUs, a key performance challenge is in the encryption and integrity protection for external memory. NPUs will be able to handle AI applications, from voice recognition in virtual assistants to real-time language translation and facial recognition. Facial recognition is a rapidly growing security feature that you probably use a lot to replace entering passwords when using your cell phone. Newer, higher-end cell phones have NPUs.

The bottom line for security is that the better your computer can verify a face or a voice, the more confident you can be with security. Facial recognition is widely used in 2FA (two-factor authentication), which you, your employees, and your family members should be using for every website that offers it. All of this keeps that 244-day clock from starting by preventing an intrusion.

For business applications, the speed of NPUs is just as important as security. With Windows 11, your business will be able to process more data faster – and more securely – because the software will be able to send smaller packets of data through the internet and have them reassembled at cloud servers. That aids encryption, which helps security. You can’t have it without Windows 11.

Oh, and one more thing. When old, slow Windows 10 goes away, so will all those bug fixes and security patches from Microsoft. You will be easier prey for the bad actors who will use your system to tunnel into other, larger systems and just wait there – for 244 days or whenever – to make a huge cyberattack with a big haul.

If you haven’t made the switch to Windows 11, we urge you to do it now. If you need to buy new computers to run Windows 11, don’t wait until October 2025 or even 244 days from now. Start the hardware refresh process now. We can install and configure Windows 11 to maximize its benefits for you. If you need new computers, we can help you select the ones that best meet your needs and transfer all your data and reinstall your apps. Call us – 973-433-6676 – or email us to talk about it.

Phishing in Your Own Waters

If you own a small business or professional services firm, you depend on your employees to have enough tech savvy and common sense to avoid links in email messages or on websites that open your system to bad actors. No matter how much you trust them, you need to verify they’re doing the right thing. You can test your human security defenses by using your own phishing expedition to see how they’re doing.

We’ve become acquainted with independent cybersecurity firms by attending conferences over the years. We learn a lot from our peers and presenters – such as it takes an average of 244 days to detect a system breach and that using the cloud will be a necessity by 2028. We’ve also emphasized the need to have a thorough security audit, but as an IT firm, there’s only so much we can do. We also think that an IT firm is not the best organization to really get into the granular details of your security because we all have a vested interest in finding problems to fix.

An independent security expert can find the smallest breach openings in your system and tell you what needs to be done. One of the most fascinating tools they use is a phishing campaign aimed at everyone who works in your organization. They can plant fake links and QR codes and any other tool that a hacker can use to get someone to open a window into your system. They also have tools to mimic the follow-up methods that hackers use once somebody makes the initial click – or the first phone call to a bogus number.

The educational value of using your own phishing expedition is enormous. Not only will it help you patch up holes in your organization, but it also becomes a great teaching tool about why everyone needs to be vigilant. As we use more and more data to conduct business – and in our personal lives – it becomes more and more important to protect that data. You should remember that your organization is part of a data custody chain – a chain that can branch off in many directions. Intruders are highly sophisticated and well-funded – as well as very patient. They will do whatever it takes to get into your system and build tunnels to other systems. You put your reputation and integrity on the line every time you take in data and send it out.

AI will be able to generate untold amounts of data, but there is little it can do to eliminate misinformation automatically.

Eliminating misinformation requires real human intelligence and deliberate, active steps to prevent that first breach – the one that could take 244 days to find. At the risk of sounding like a broken record, in every location and on every device used to conduct your business:

  • Use a firewall and make sure it’s up to date.
  • Use anti-virus and malware software and make sure it’s up to date.
  • Install updates to operating systems and application software on every device you have. Those updates contain security patches and bug fixes to prevent intrusions.

We can help you arrange for a comprehensive security audit that includes a phishing expedition and a deep dive into your equipment and practices. Call us – 973-433-6676 – or email us to discuss your needs and develop a security action plan.

Computer or Tablet?

Our world is changing fast. Computing and business experts tell us that by 2028, the cloud will be a necessity. AI (artificial intelligence) will have us using so much data that only the cloud will handle the workload. We’ll need more computing power, but at the same time, we’re demanding the ability to access that data quickly and from anywhere – even while traveling. Tablets are looking more and more like replacements for laptops.

We’ve seen a steady switch to smaller devices with greater portability. From being tied to desktop computers that were impossible to move, we increased our mobility when we found ways to access our stationary laptops with an internet connection. Using a laptop, we could essentially access our apps and files and modify them – or even create new files – and find everything up to date when we returned to our desks. The penalty was speed, but it wasn’t a prohibitive penalty.

The next step in the progression was to hook our laptops into docking stations, a step that still works for many who work in the office and remotely. You could have your big monitor and a regular keyboard in the office, but you could use the same computer – with all the same apps and files – working at home or in a hotel room.

The power of tablets and cell phones combined with the expansion of the cloud has made it possible to work on the road without a computer. A vast number of business applications have versions for computers and mobile devices, and you actually can access and edit files with a lightweight device that’s easy to carry outside the office. The newest tablets and phones actually have more powerful processors than many laptops still in use because the mobile devices contain NPUs, Neural Processing Units, that give you faster processing and better photo/video capabilities.

So, as you decide what platform to use as your main computing device, you have a lot of options. Your choice will depend on how you work, and it’s a personal decision for every user.

Computers, on one hand, give you better multitasking capability. You can keep multiple files and web browsing windows open at one time on multiple screens and monitors. It’s a lot easier to move among all those apps and views on multiple screens than it is on a single mobile device screen.

Mobile devices, on the other hand, can process data, including photo and video files, faster, and if you need to work on an Excel, Word, or PowerPoint file, you can tie your device to a portable keyboard. But you can’t use multiple screens. That may be outweighed by the ability to carry a cell phone in your pocket or pocketbook or carry a tablet (and keyboard) in a small backpack. Road warriors, field workers and anyone who needs to access data away from a desk will appreciate this.

If you need to work in public places, you should use a tablet that can work on a cellular network just like your phone. I will never tell you unequivocally that a cellular connection is hack-proof, but it is far more secure than a Wi-Fi network. With the availability of unlimited-data cellular plans, it doesn’t make sense to rely on Wi-Fi in the US.

If your PC has an eSIM, you might be able to add your device to your current mobile account by using the Mobile Plans app in Windows 10 (not available in all computers) and 11. The app connects you to your mobile operator’s website so you can get a data plan for your device and connect to their cellular network.

Whatever devices you use, make sure your operating system (OS) software and apps are up to date. If your device can’t accommodate the latest OS and app software, we urge you to replace the device. Keep in mind the realities of today’s technology environment and how it will change in the near future:

  • We will be making more use of the cloud. By 2028, the vast amounts of data needed to work with AI will require cloud storage because it will be the way to meet your capacity needs.
  • Your device must be capable of processing more data faster to work with AI.
  • Your device must be capable of using the latest security technology. Cybercriminals are spending big money to find a hole in your system – in hopes it will lead them to holes in bigger systems.
  • Remember the number 244. That’s how many days it takes on average to detect a security breach. You can best protect your system by being well-prepared and vigilant.

We can help you choose and configure the devices that best fit the individual needs and corporate needs of everyone in your organization to maximize performance and security. Call us – 973-433-6676 – or email us to set up an appointment to discuss your needs and available options and costs.

Who’s Minding the Electronic Store?

I recently couldn’t fill a prescription online because the third party that processes pharmaceutical products for my drug plan was hacked. Little did I know at the time this would be an ongoing problem affecting a substantial part of our healthcare system. We’ll leave policy debates to others and focus on what we can do.

The hack was made at Change Healthcare, a subsidiary of UnitedHealth Group, that manages healthcare technology pipelines and processes 14 billion transactions a year. The company said ransomware criminals ALPHV, or Blackcat, had claimed responsibility for the attack but did not say whether it paid or negotiated a ransom. WIRED has reported a ransom payment of $22 million. The company said its investigation determined that Change Healthcare, Optum, UnitedHealthcare, and UnitedHealth Group systems have been affected.

The American Hospital Association has called it “the most significant cyberattack on the U.S. healthcare system in American history.” Providers can’t get paid for services provided, which affects their ability to pay their bills. They can’t preauthorize procedures or authorize payments for prescriptions. The tragedy is that a lot of people can’t afford to lay out the money for prescriptions, much less procedures. Pharmacies are scrambling for drugs. Treatment is not being provided.

But that’s not the end of the problem. Patient records – sensitive personal information – may have been compromised, and that’s another set of issues.

United Healthcare said it immediately disconnected Change Healthcare and started working with law enforcement agencies and cybersecurity experts. They instituted workarounds, including manual processes to submit information, check eligibility, look at claim status to make claims, clear prior authorizations, and fill prescriptions.

While most of us are nowhere near the size of United Healthcare, we can be ransomware targets and suffer just as significantly on our own level. And on our own level, we must be willing to make the necessary investments in our technology because we depend so much on its operating performance and reliability. A good plan to prevent problems looks something like this:

  1. Make sure all your hardware can run the most up to date software for your operating system, cybersecurity, and apps. For example, Microsoft will no longer support Windows 10 a year from now. You may need to upgrade to systems capable of running Windows 11. Newer versions of other software may not run on Windows 10.
  2. Have a documented process in place to make sure updates for operating system, security, and application software are automatically downloaded and installed on every piece of equipment in your office. You also need to verify the process is being followed.
  3. Have an emergency response plan with people trained to implement it as soon as a problem is detected. That plan may include disconnecting systems from the internet and processes to reconnect or work without full web-based capabilities.

We can help you by assessing your technology assets and liabilities; procuring and installing new technology; and developing an emergency response plan. Call us – 973-433-66776 – or email us for an appointment.