Following the Money Conversations

Money is the only reason somebody steals information. Some 70 percent of the emails that lead to information theft are related to either financial institutions, businesses or something that mentions money in the subject line. Another 20 percent are related to espionage, and 5 percent are related to employee grudges. In most cases, curiosity kills your security.

Phishing expeditions are still one of the most effective ways for hackers to get into a computer system, and that’s because people have insatiable curiosity, especially when it comes to money. We’ve told you time and time again to be very careful about the links you click on from within an email. It is so easy for a hacker to mimic the logo of any bank or financial institution and to create an email address that can be close enough to looking real that you won’t notice it’s a fake in your haste to check out a great offer or respond to a dire warning.

So, as we’ve mentioned ad nausea, your curiosity could open the door to a Trojan horse virus that will enable someone to get into your computer. And once they do that, they can insert themselves into your financial conversations. To whom are you talking about money? Is it your financial advisor? Is it an attorney or a CPA? Is it your bank, credit card company or several merchants? They can identify every single one of them just by looking at your email. After all, you keep thousands of them in your Outlook application or on a website – which they can easily find once they get into your computer.

How will they put your email conversations to work for them? Well, let’s see. There’s your financial advisor, who’s been talking to you about your 401(k). Hmm. That’s good. Bet you have the password for that account stored on your computer. That makes it easy.

But wait, what if you “forgot” your password. The hacker can go to the website with your 401(k) and use your email address to reset the password. If that security is lax – say, for example, there’s no two-factor authentication – the hacker can have your email address routed to his, and now he’s in your account and can clean it out.

Of course, that could be just part of his haul. He knows who your financial advisor is, and maybe their system isn’t 100 percent locked down. You can imagine the fallout.

What if you’re involved in a large business transaction, such as buying a business or even a house? Your attorney may be dealing with a financial institution or two – even through another attorney. Again, a hacker can insert himself in a conversation with any party connected to the money, spoofing your email address or that of anyone involved. And once the hacker is into that next system, it opens more doors.

Just to add to your “watch list” when checking your email, also be wary of somebody sending you updated files that you are not expecting. We have a client who clicked on a PDF and wound up with an infected computer. Fortunately, it caused a major inconvenience more than anything else. Because all of the client’s files were backed up offsite, we had to wipe the computer clean and then find the infected files to delete from the backup. We were able to fully restore everything after that, but it took 18 hours.

So, let’s recap the steps you need to take:

  • Look before you click. Do I get this kind of email message from this sender on a regular basis? Is this an offer that’s too good to be true? Is there anything that looks just the least bit out of the ordinary – even if it’s from a sender I know and trust? Remember, you can always access the sender’s website from your Internet browser instead of the email, or you can pick up the telephone and call a company or a person.
  • If something looks odd even before you open the email, just delete it. I am amazed at how many people just let something suspicious just sit there.
  • Don’t conduct financial business or visit passworded sites while on a public Wi-Fi network. Non-secured networks can be viewed by anyone from anywhere.
  • Be very careful with flash drives. Someone can use one to invade your computer. If you are running a good anti-virus or anti-malware program, it should intercept any external device and give you the option to scan it.
  • Keep your anti-virus and anti-malware software up to date. And make sure they’re both running.

Finally, if you suspect your computer has been infected with a virus, call us immediately at 973-433-6676. We can assess your system and begin the process of restoring its health. If you have any questions about online security, call us or email us. We all have too much at stake.


Two More Tips to Protect Your Money

  1. When you travel by air, don’t just throw your boarding pass in the first trash bin you find in the terminal. The barcode on the pass has a wealth of information, including your frequent flyer account information – and any other personal information in that database – and your itinerary, which can let somebody know how far away from home you are and how long you will be away. If you can’t shred it, tear it into pieces that also separate the barcode and throw them into different trash bins.
  2. Check all of your financial accounts frequently, especially with business bank accounts. When you have a lot of money coming in and going out electronically, that means a lot bank treasury departments are accessing your account. If you monitor the accounts regularly, you have a much better chance of catching fraudulent activity.

The Firewall is Mightier Than the Electrical Tape

Electronic Peeping Toms are always a concern, and putting a piece of electrical tape is one way of drawing the curtains on your laptop’s camera lens. A better way is to make sure you have a strong firewall activated, strong password protection for your network and the latest anti-virus and anti-malware software running. Here’s your checklist.

  1. Make sure your firewall is activated and that all the software for it is up to date.
  2. Make sure you change the default password on your Wi-Fi network. If we set up your network, we gave you a unique password – one that’s long.
  3. If you are not sure about the security of your network or firewall, you can power down your computer, but the downside to that is that you’ll miss the legitimate updates (which typically include security patches) that come in overnight.
  4. If you install a camera system in your house to monitor selected rooms, change the password for the system, too. This should be a no-brainer, but it’s something a lot of people forget to do. Even the most incompetent hacker can get the default password for any system, so just change it and make it a strong one.

In most cases, networks are infiltrated because people don’t have them secured, and to be honest, having a Peeping Tom see you in your underwear might be the least of your problems. If somebody can hack into your computer’s camera or into your room-monitoring cameras, they likely have gotten into your computer and all the sensitive information you have stored there.

On the flip side, having internal and external cameras – and a system such as Ring to monitor your doors when someone rings your bell – can be a strong deterrent to crime. With all of the secure ways to use the Internet and mobile devices, you can monitor everything about your home from wherever you can connect to the Internet.

We think using firewalls and other technology to secure your cameras works a lot better than a roll of electrical tape. We can help you configure all of the software on your in-home systems and mobile devices to make sure you keep out prying eyes. Contact us by phone – 973-433-6676 – or email to make sure your cameras are secure.

iPhone 7 and New Product Evolution

I have my new iPhone 7 – without the headphone jack. You know what? I have computers without built-in CD/ROM drives, and automotive entertainment systems don’t have CD players either. Get used to more with less because device makers are under constant pressure to provide more features and capabilities in the smallest possible package.

By removing the jack, Apple has freed up more room for other bells and whistles, such as the better camera system. If you’re one of those people who takes a lot of photos or video with your iPhone, that’s likely to be more important to you than the headphone jack.

Removing the jack, by the way, doesn’t mean Apple has eliminated headphones. You’ll just have to go wireless, which more and more of us are doing anyway. Just about everyone has a Bluetooth connection in their cars, for example, or a Bluetooth headset. For those who still plug in headphones or headsets, it’s just a change you’ll need to get used to.

We can look at a couple of developments to put technological evolution into context. Apple was the first computer maker to eliminate internal CD/ROM drives from its units. That allowed them to make their computers lighter and smaller. If you carry the development forward, across a number of platforms, you can easily see why tablets are replacing laptops for many people.

Tablets don’t have to hold built-in hard drives. By using either cellular or Wi-Fi networks, they connect to the Cloud, where users can access application programs and data. Continually evolving software development gives users a great deal of computing capability for mobile platforms, and you generally have the choice of using a lightweight, portable keyboard or using an onscreen keyboard and swipes to do your work or find the information you seek. In some cases, voice technology is making the keyboard obsolete.

In more technologically advanced cars, you don’t find CD players – which, by the way, replaced cassette tape players many years ago. Who needs either one of them? With Bluetooth technology, you can connect your playlist from your phone or tablet to the car’s sound system. And when you get out of the car, just switch to your Bluetooth headset and never a miss a beat.

Technology is changing the way we do business, too. For example, a kitchen designer can give a couple virtual reality goggles and let them view a potential kitchen as though they are standing in the room. From a computer, the designer can change configurations or colors of cabinets and countertops.

For some, change is intimidating and confusing. We can help you be more comfortable with selecting new technology and learning how to use the features you need or want. Just call us – 973-433-6676 – or email us to set up a time.

Payments and Rewards with Your Smart Phone

We love near-field communications (NFC), the technology that enables you to pay for purchases with your smart phone. We love the security factors built into it. Banks and merchants are loving it more, too, because now they launch more loyalty programs to reward themselves – and even you. It’s the logical extension of programs that started with books of trading stamps from grocery stores and gas stations and now extend electronically from purchases at coffee bars to international vacation packages.

There’s a lot at stake for banks and retailers because the citizens of nations with developed economies still spend a lot of money. And while some older consumers dislike waiting for charges to be approved using the more secure chips in their credit cards, millennials and their older siblings are embracing mobile payments. With smart phones almost always accessible, it’s easy to tap a payment station with your phone or hold it close to the station, enter your passcode and keep going with life.

That phone, of course, contains a wealth of information that merchants and banks can tap into with their big-data systems. They can use the data to optimize rewards programs for their customers based on what you and where you buy it. Financial industry research shows that the more affluent you are, the more likely you are to use digital payments whenever you can. And a good number of you are likely to use digital coupons on your smart phone.

You might say a perfect storm is forming. As the use of smart phones grows for all sorts of purchases, merchants and bankers will offer more incentives, and that will draw more people to the technology. That will ratchet up new programs to attract more users in a continuing spiral. The financial industry sees big changes in the next three to five years.

What can our transactional environment look like over the next few years? It’s not that hard to imagine. Your browsing history may show, for example, that you are looking for a new computer in the $1,000 range. With location services turned on for your phone – because you used it to find the fastest route to the shopping mall – the retailer and the bank that supports your credit card can easily deduce that you are entering a store to make a purchase.

Together, the retailer and bank can send a message to your phone to let you know that if you buy a specific computer-and-accessory package today, you are eligible for a discount from the price you saw during your online shopping – or you may be eligible for extra miles from the airline that sponsors your credit card – or you may get extra cash back for this purchase.

Or, your credit card company may have an arrangement with another retailer nearby, and they can offer you rewards to go to their retailer. They can let you know about their specials before you go into any store.

The driver in all of this is likely to be the bank that supports your credit card – or more realistically that has the credit account you access from your phone. They are the ones who “lend” the money when you charge a purchase or collect a handling fee on a debit purchase. The sheer volume of money changing hands creates incentives for them to incentivize you.

In turn, you will need to pay closer attention to the security of your smart phone. You will need to make sure you always have the latest operating system on your phone and that you have all appropriate anti-virus and anti-malware software running – on your computer or tablet as well as on your phone. And you will need to pay special attention to all offers you receive over your smart phone. If a retailer or bank can send a special offer to your smart phone, so can a scammer.

We can help you reap all the benefits of your rewards programs by making sure all of your technology has the latest security software properly set up to match the way you live. Call us – 973-433-6676 – or email us to help you make sure you are good to go.

 

Is Your Phone Prepared for a Weather Emergency?

September is National Preparedness Month, and storms along the East Coast can be extremely dangerous as air temperatures drop faster than water temperatures. We all remember Sandy, too, which wreaked havoc in our entire region in October 2012. Now might be a good time to think about apps for smart phones to give you adequate warnings.

Look first to your city, township or county. Morris County, for example, has a web page where you can register for alerts that you can receive as a text message or phone call on your cell phone. The service will also call you on a landline. It’s not a personal call. Rather it’s one generated as a mass robo call to phone numbers registered for specific locations, such as your home or office. Some communities also use social media channels to notify “friends and followers” about weather emergencies.

The federal government makes weather emergency information available to cell phones through Wireless Emergency Alerts (WEA).  The system allows customers who own certain wireless phones and other enabled mobile devices to receive geographically-targeted, text-like messages alerting them of imminent threats to safety in their area. The technology ensures that emergency alerts will not get stuck in highly congested areas, which can happen with standard mobile voice and texting services. Governments can target specific areas through cell towers in cooperation with wireless carriers.

Alerts are broadcast only from cell towers whose coverage areas best match the zone of an emergency. That means that if your phone is WEA-enabled, you can receive a warning from a tower in the alert zone if your carrier is participating in the program in that area.

With more of us traveling and reifying on our smart phones for driving directions, Google Public Alerts is a good option. It’s Google’s platform for disseminating emergency messages such as evacuation notices for hurricanes, and everyday alerts such as storm warnings. It’s worldwide through Google Search, Google Maps, and when you activate Google Now on your Android device. Google publishes information in the U.S., Australia, Canada, Colombia, Japan, Taiwan, Indonesia, Mexico, the Philippines, India, New Zealand, and Brazil. While Google can’t guarantee that you’ll see every alert, they’re using feedback mechanisms to increase its capabilities. You can learn more from their FAQ page.

If you’re a Twitter user, you can sign up for Twitter Alerts and then manage your alerts.

Your App Store or Google Play has way too many apps available. Some are free, including those from our metro area TV stations, and some require a purchase. We are more than happy to talk to you about the best app for your needs, and we can help you configure apps for your families and employees so that they can all be safe when severe weather strikes. Call us – 973-433-6676 – or email us with any questions you may have.

 

Cybersecurity Checklist

We doubt the Russians or WikiLeaks are looking into your computer, but there’s a good chance somebody is. Want to get ahead of any possible problems? Try this checklist.

  • Update your software – Security patches are almost always the feature of any software update for your operating system and application software, including Internet browsers. You can set your computers, servers and mobile devices to notify you when an update is available or have it installed automatically. Do it. It’s as simple as that.
  • Limit admin accounts – There are two things to shore up here. First, limit the number of people in your organization – or household – who have administrative rights to your system. The more people who have access to the inner workings of your system, the more possibilities there are for somebody to leave an electronic door open to an invader. As another precaution, always run your PC as a non-administrator unless strictly necessary.
  • Enable your firewall – This should be a no-brainer. It’s the first line of defense against hackers infiltrating your entire IT system or any computer in your system that goes out onto the Internet. Make sure you have it set to manage inbound and outbound traffic.
  • Use anti-virus and anti-spyware – This goes hand-in-hand with enabling your firewall. These programs are designed to stop viruses, worms and other forms of malware. They can also stop pop-ups and other threats. Make sure every computer and device (where appropriate) is regularly scanned by the anti-virus and anti-spyware software, and don’t let licenses lapse.
  • Beware of wireless – Enable encryption, turn off SSID broadcasting and use the MAC filtering feature. Be wary whenever out of the office using Wi-Fi.
  • Protect mobile devices – Always use passwords, screen locks and auto locks on mobile devices, and encrypt data transmissions when possible.
  • Use strong passwords – The latest research shows that longer passwords are stronger, and you should always have a mix of upper and lower case letters, numbers and special characters. Change your password often and don’t use anything that can be related to your email address.
  • Backup your files – We can’t emphasize this enough – and we strongly encourage you to back up files offsite, on a cloud-based server. Have an automated backup and recovery plan in place for key data residing on your network vital for every computer user and organization. We’ve talked about ransomware before, and have securely backed-up files is your best protection.
  • Trust your gut – This is worth repeating, too: If a website, email or window on your PC offers you something that’s too good be true, ignore it or delete it. If something looks odd or out place, ignore it or delete it. Most companies, especially banks and credit card companies, don’t ask for personal information in an email. Don’t click a link. Instead, log back on to your browser and go to the website address you’ve used before to see what that company has to say.
  • Train your staff or family – Most cybersecurity breaches happen because of human error. Train your staff or your family members on how to be more secure while using computers and mobile devices on the Internet. Remember how you’ve told your kids not to talk to strangers or get into a stranger’s car? It’s the same in the cyber world.

We can help you with any of cybersecurity concerns and needs. Call us – 973-433-6676 – or email us to get answers to your questions or to set up a training session.

Ransomware Doesn’t Stop with a Payment

If you think paying off a ransom demand to get back files is the end of your experience, you’re wrong. Getting to cough up a few bucks…well, Bitcoin…is just the start. Ransomware pirates are finding ways besides email to get access to your computer and all of your data – and they’re looking for long-term relationships, too. One tech columnist has sardonically suggested they need good customer service plans. You need a good protection plan.

Let’s start with some basics, which we’ve discussed many times before:

  • Be extremely careful about clicking on links in an email, even if it looks like it comes from someone or an organization you know and trust.
    • Personal email addresses get stolen and spoofed all the time.
    • It’s very easy for someone to recreate a corporate look – such as for your bank – that looks realistic at first glance. (Seriously, does your bank use a Hotmail account?)
  • Install and use anti-virus and anti-malware protection. Make sure update it, and make sure you update it from a legitimate site (see above).
  • Install all updates from application software provider (but make sure it’s legit). Most patches and updates cover security issues.
  • Back up your data files to an off-site server or, better yet, store them in the cloud. For an extra precaution, you can store files to portable hard drives, and keep them disconnected when you’re not backing up data.

One of the problems with storing data on a laptop computer, which many people do, is that when it’s stolen, your data can be accessed before any kind of Internet-based program kicks in to wipe your drive clean. All somebody needs to do it remove your hard drive and hook it up to a computer to see what’s on there.

If you have covered all the basics, you now face some new concerns, especially if you store confidential personal, financial or medical information as part of your business. You face additional risks because there is no way for you to control the security steps your customers or clients take. If they leave vulnerabilities, a hacker can use one person’s log-in credentials to see a lot more data than would ever care to expose.

You can protect your business and data in a number of ways – in addition to the steps listed above:

  • Insist visitors to your website use newer versions of all browsers. As browsers age, publishers stop supporting them. You don’t want to expose yourself to their vulnerabilities.
  • Encrypt your data and your emails. If you do a lot of email marketing or communicate confidential information, this is a no-brainer. Email services, such as Constant Contact, which we use, build in a number of security measures. Spend the money to take advantage of them; it’s cheaper than taking a financial hit (see below).
  • Check with your insurance agent or carrier to see if E&O covers you for cybersecurity breaches. It may be an extra cost, but remember that insurance companies like to collect premiums, not pay claims. They are motivated to minimize your risk and should work with you.

The back story on these tips starts with a client who has two offices. In the “main” office, nobody uses the Internet. But in the other office, people used a remote desktop to access the system in the main office, and the security was weak. The link was not secure, and the passwords were simple. I was able to hack in using an iPad that still had a SIM card from another country, and the client could not detect that I was in there.

That should be a wake-up call for every small business to install and maintain security systems throughout their information management system. Ransomware pirates are getting more sophisticated in ways they can get into your systems and stay there – which brings up the “customer service” observation from Glenn Fleishman in PC World. Our point is not to scare anyone away from technology. Every advance – from the bicycle to space travel – has a risk-reward component, and we all know the rewards are great when we follow the proper precautions.

We’d like to leave you with three steps to take right now:

  1. Encrypt all data
  2. Never send passwords in an open email
  3. Look before you click – disguises are getting better and more numerous

Sterling Rose can help you design, install and maintain a cybersecurity program. Contact us by phone – 973-433-6676 – or email us to make an appointment to discuss your needs.

Keep Your Pictures in Multi-Device World

With mobile-phone cameras getting better and better, it’s easy to click away and then download your pictures to a computer. And when you max out your phone’s storage, it’s easy to delete them from your phone and click away some more. Just one problem: if your phone and computer are synched, you could delete the files from your computer, too.

The problem came up when an employee of one of our clients told about her daughter losing pictures she thought she had saved on her Mac. The daughter had been in Europe for a study-abroad program, and she traveled after school ended. Lots of kids do it, and lots of kids have iPhones and computers.

Naturally, as her phone’s storage filled up with photos, our traveler decided to download them onto her Mac. Just about all of us who travel with a computer do the same thing so that we can keep on clicking away. You never know when you’ll get back to a travel destination, and you want to collect all the memories you can; you can sort them out later.

That’s what our young traveler was told to do. With the magic of wireless connections, she was able to sync her phone and computer so she could save her pictures to her hard drive. With pictures safely stored on the computer’s hard drive, it was a simple matter to delete the photos from the phone and free up space for new pictures.

However, there was a catch. The way her sync was set up, deleting from one device deleted from the other. So, when she came home and sat down to share her pictures, they weren’t there. But they were somewhere. Using Mac’s time machine, we were able to find previous back up files, and we were able to send the computer to Apple. Their technicians were able to recover the pictures, but it took a while for them to get all the pictures, and it was a very stressful time for our student.

Here are some steps you can take to avoid the problem:

  • If you have an iPhone, you can set your phone to store photos in an iCloud photo library and keep them there when you delete files from the phone. If your phone senses a Wi-Fi network, it will upload the photos automatically.
  • You can optimize your storage so that you can leave a thumbnail of your photo on your phone. Then, you can use the thumbnail to identify photos you want to retrieve.
  • If you are traveling with your computer, download the photos manually and turn off any synchronization that deletes files from your phone and computer at the same time.

I download photos all the time from my SLR camera, but it uses SD cards. I can get some redundancy by downloading the pictures to the computer and keeping all the images on the SD cards. I can also upload them to the cloud. When you add up all the costs of a vacation, this is a relatively small expense.

More and more point-and-shoot cameras have SD cards, too. But if you’re using your cell phone or an older camera with fewer features, you’ll have limited options. If you or any family members are getting ready to travel, we can help you make sure your gear is all set up to keep your photo and video memories safe and secure. Call us – 973-433-6676 – or email us to get set up.

Travel: To Disconnect or Not Disconnect?

A trip is a great time to disconnect from the connected world and all of its stressful situations. However, there may be times when being disconnected can be extremely stressful. Fortunately, you can customize technology to fit your level of need and comfort.

Although I consider myself a very connected person, there are times when I like to disconnect, such as when I’m on an airplane or traveling in a country with a huge time difference from New Jersey. And, let’s face it, we all need to really take time off from everyday life – and that’s the purpose of getting away.

However, there are times when being connected can keep your travels on schedule and give you peace of mind. Using a Wi-Fi connection on an airplane, for example, can help you make, change or cancel reservations for hotels, rental cars or ground transportation if you run into unexpected delays, especially if you have a flight that makes stops – and requires plane changes – before you reach your destination.

A phone or tablet with Wi-Fi capability makes it really easy to stay connected, and VOIP – voice over internet protocol – which we all use if we have internet telephone service. You can talk through a variety of applications, such as Skype and Viber, to name two, and Facetime on iPhones. Using voice and video through a Wi-Fi network requires a fast internet connection, so make sure you have one before you try. There are many remote locations (we were in one of them on our last trip) that just have slow internet, and their cellular networks may not be all that strong, either.

If you want to be reached by telephone and don’t want to maintain a cellular connection, a Google phone number can give you a variety of options. You can give the number to people who may need to reach you or with whom you want to maintain contact. You can link that number to your cell phone number, but if you are traveling abroad, you’ll need to have a Wi-Fi connection to pick up voicemail or answer a call. If you have a cellular connection abroad, you can be reached directly. Because a Google number is a US number, people calling you will not have to pay international calling rates.

You can keep a cellular connection in a number of ways while abroad:

  • Arrange with your carrier to provide cellular service without roaming charges in the countries you plan to visit. These plans can be costly, and they can have severely limited numbers of phone calls and text messages available as well as highly restricted data use. If you are going to be in several countries on your trip and don’t need to use data-intensive applications such as Waze or Google Maps for driving and walking directions, this may be good for you. The phone can be really good for making or confirming reservations.
  • Get a SIM card for your phone when you arrive in the country you are visiting. As long as your phone is “unlocked,” as most are today, you can turn your phone into a local phone that will give you either an unlimited or large number of phone calls and text messages – including international calls (such as to the US) – and enough data to get directions to a hotel, restaurant or tourist attraction and use Waze or Google Maps to get there. The major carriers in each country usually have kiosks at the airport, and their agents can install and test the SIM card before you go on your merry way. In most cases, the card is good for 30 days. If you are in a major city, you can find stores for most carriers, just as you do in the US, and the carrier store may be better if you need something other than a standard arrangement. When you get home, you can reinstall your US carrier’s SIM card.
  • Rent a local phone. This is really simple, and it doesn’t require any changes to your existing phone. The cost and your allowances for phone calls, texts and data may vary, but you should have all the capabilities you’ll need.

Having cellular service abroad gives you all the conveniences and peace of mind you take for granted at home. If you are not part of a tour, you can make reservations or ask questions on the fly for hotels, restaurants, attractions and other needs. If you are going to be delayed in getting to a destination, you can call ahead. Even with the best navigation applications, you sometimes need someone to “talk you in” to a hotel or restaurant. All you need to do is call – and you can access the internet to get the phone number.

Even if you are on a guided tour, the tour operators sometimes strongly recommend you have a cell phone with local capability. If you become separated from your group at an attraction, for example, you can call and agree on a meeting place, or they can call you to make sure you get to where you’re supposed to be.

And, of course, there’s the peace-of-mind that comes with knowing you can reach somebody. On our last trip, we were part of an English-speaking group on a bus headed to the airport to leave our location. Nobody spoke the local language, and the driver did not speak English. We were caught in horrendous traffic, and we feared not making our flight. In our case, we had to catch a flight that operates once a week, and we were not in a place where we wanted to spend a whole week.

Nobody had a cell phone for the country, so there was no way to call the airline and let them know of our problem. While it had been very relaxing to be disconnected from the rest of the world, we were a busload of stressed people while on our re-entry path. We made our flight, so now it’s just another travel story to tell.

Traveling always has its surprises, but you shouldn’t feel unduly stressed or unsafe. If you are planning to travel abroad, we can help you determine the technology you’ll need to maintain your desired or required level of connection. Call us – 973-433-6676 – or email us to talk about it.

Windows 10’s Summer Storm

Microsoft’s free upgrade to Windows 10 for eligible computers will end July 29. But rather than just let the offer expire, the company is actively pushing out upgrades. You can expect a storm of activity as part of the effort. If you don’t want to upgrade, here’s how you can batten down your electronic hatches.

Our best advice right now is to let it happen – sort of – and undo it with a rollback. Just make sure you roll back to your version of Windows 7 or 8 within 30 days of the download (and possible installation). Here’s why we believe this is the best course of action. Again, just to remind those of you who could be affected, Microsoft has a free upgrade offer for eligible computers running Windows 7 and 8. The free offer will end July 29. Starting July 30, the upgrade to Windows 10 will cost $119.

In a “big brother” way, Microsoft knows which computers are eligible and which ones have been upgraded. That’s because there’s a chip in your computer that has the information about the version of Windows that was installed when the computer was assembled. It’s not all that bad of a system because Microsoft can use it to push out the correct updates on an as-needed basis to make sure you have all the latest security patches and bug fixes. It takes the onus off you to download and install them. Microsoft also knows which version of the OS you have, such as the Home or the Pro, and that prevents you from, for example, downloading and installing the Pro when you’re entitled only to the Home.

On the other hand, it can be highly intrusive for the upgrades. We’ve had a number of instances in which clients have accessed their computers – at work and at home – in the morning and found a message from Microsoft to continue with the installation of Windows 10. Or, we’ve had clients tell us that all of a sudden, in the middle of the day, their machines started acting funny and then they received messages to continue the Windows 10 installation process.

Naturally, none of these clients had taken advantage of the offer, but Microsoft can’t distinguish if that was by oversight or intent. (Add your own comment here.) Essentially you have two options:

  1. Go through the entire installation and then roll your system back to Windows 7 or 8.
  2. Don’t accept or agree to the terms and conditions.

Each option has its own set of consequences.

If go through the installation and then roll it back, that’s a major time suck. However, we have not encountered any problems with getting old systems back and running again. If you don’t accept or agree to the upgrade, you will lose your entitlement to the free upgrade – at least so far as we can determine. We have not gone through the process of trying to reclaim it.

To make your best decision on whether to accept the upgrade to Windows 10, make sure you are clear on what you need.

We firmly recommend the Windows 10 upgrade because it has a lot of new security measures, and the support for security and bug fixes are crucial to keeping data safe. For home and SOHO systems and for offices that are not using highly customized application software, the upgrade should work well. However, if your application software will not work with Windows 10 or not work as well as it should, we recommend that you keep your present Windows OS. Application software developers and publishers are working to upgrade most packages, but we all know that it’s a complex endeavor.

If you need to reinstall Windows 7 for any reason, it’s still a pain, but Microsoft has released an update to cover all the updates as a one-time deal. That will ease the pain somewhat, but the longer you wait – assuming you have a choice about when to do it – the more updates you’ll need to install manually going forward.

If you have any questions at all about Windows 10 and any other version of the OS, please contact us as soon as possible by phone – 973-433-6676 – or email. We can answer your questions or schedule any work that needs to be done to keep your system running smoothly and safely.