Two Essentials to Take Care of Business

Backing up your data files and keeping them from prying electronic eyes are essential. We have the tools and tips you need to take care of business at the office and at home. Here are some things to keep in mind.

The first tip is: Backup your data offsite. We never like to consider the “unthinkable,” but bad things do happen. A story from a recent sales call, a non-profit organization, drives home the point.

Non-profits can get a lot of software free or at a greatly discounted price. So, our client wondered why they needed to spend money to back up software on the cloud. As we were talking, the client mentioned that they had considered buying the house across the street from their office and converting it into their own space. They didn’t do it, and at some time after they made their decision, that house burned down.

We never talked about the cause of the fire. If the house was old, some failure of its electrical wiring, for example, could have played a role, and all of our client’s “free” stuff would have been gone. The cost of replacing and reinstalling all of their hardware and software – especially when you add the value of their time and the cost of lost service to their clients – would have been huge.

We’re happy this is a “could-have-happened” story, and we can’t emphasize backing up data offsite enough, but we have a tool to keep your data safe.

Our managed backup program includes automatic backup to the cloud through local data centers and daily monitoring. It is far less costly than post-disaster recovery and much more reliable than putting all of your data and pictures on an external drive that can fail or be lost in a fire or flood. It’s a proactive form of insurance.

Our second tip is: Never sacrifice protection for performance. In today’s hack-happy world, you can’t protect your data and yourself too much, but you must understand one thing: Any system can be hacked by any hacker willing to spend the time and effort to do it.

Just as you need doors and windows to enjoy the world outside of your home, you need pathways from your computer to the Internet. And, just as you have locks on your windows and doors to keep out most bad people and just as you take safe routes on trips, you need to use firewalls and passwords to lock your computer and data access, and you need antivirus software, malware protection and common sense to travel safely on the Internet.

At a recent security seminar, a presenter pointed out that people are agreeing to take on more bandwidth from providers for a free or a small fee. (You know our feelings about free stuff.) You can face problems if your firewall or Wi-Fi devices can’t handle the increased performance, and that can leave your security vulnerable.

We get questions from time to time, for example about the safety of storing data on Dropbox. Our question back to that is: Who hasn’t been hacked? Yes, Dropbox is as safe as you can make it as long as you and Dropbox take all the precautions and safeguards you can.

So, in this day and age of hyperactive hackers, how are you protecting yourself? Are you reading emails carefully before clicking on any links or attachments? Are you careful about signing up for online offers that are almost too good to be true? What kind of antivirus are you using?

We’ll address that last question. We have our partners, but no matter whose system you use, make sure they give you regular updates and act with blinding speed to fix a problem as soon as it’s discovered. Subscription services generally offer you better protection and faster fixes, and they are more likely to automatically update your virus and malware definitions.

If you accidentally click on a site or open an attachment, our recommendation is to push the power button on your computer or device IMMEDIATELY. This will stop any activity right away, and hopefully limit any damage. Then, call us without delay to find and fix any problems.

We can help you with all of your backup and antivirus needs, including installation of valid software and setting up automated functions. Call us – 973-433-6676 – or email us to discuss your needs and put a solution into action.

Summer Safety for Your ID Data

Did you get a good rate on your car rental for this summer’s trip? The real bargain might go to whoever downloads your personal data from the electronic breadcrumbs you might leave behind. Taking the time to button down a few details can save you a lot of grief.

Let’s start with cleaning out that rental car. Rental companies always update their fleets, and they want you to feel as comfortable as you would feel in your own car. One of the features increasingly common at any price and size level is Bluetooth, which lets you use the car’s audio system for handling calls on your smartphone, streaming music and getting directions from any GPS system you want to use. Some cars include a USB connection so you can have all those features and charge your phone.

That’s a great convenience, but as we’ve noted many times before, convenience usually involves a tradeoff with security. Syndicated radio host and blogger Kim Komando of the Kim Komando Show, gets to the heart of the issue.

“When you connect your gadget to a car with Bluetooth, the car stores your phone number in order to make it easier to connect later,” she points out. “It also stores your call logs, which include any contacts you dialed. There’s just one problem: All of that information is saved inside the system and is just sitting around for the next renter to find.”

We’re sure there are some other tech-savvy people who could also see your data before the car goes back on the road. So, take some time to clean up your electronic breadcrumbs – and build that time into your schedule for returning your rental car.

Komando offers two suggestions.

“Simply go into the car’s settings (it will vary for every car make and model) and locate your smartphone from the list of previously paired Bluetooth gadgets,” she writes. “There should be an option to delete your phone. That should wipe the call logs and saved contacts. Better yet, look for an option to clear all user data or do a complete factory reset. Talk to the employees at the car rental place if you can’t find these options.”

To that, we would add that you should not leave your car until you take care of this – or be prepared to email the rental company’s customer service department right from the check-in line. You could also post to Facebook or tweet about the problem – right then and there. But you’re better off getting the data deleted.

If you used the car’s navigation system, go into its settings and clear your location history. You don’t want anybody knowing where you’ve been or where you live.

By the way, if you are selling or trading in your car and turning back a leased vehicle, you should follow all of the suggestions for rental cars.

Komando’s article also talks about how easy it is for someone to hack into a car’s computer system and some of the consequences. Again, for your own data security, she recommends using the cigarette lighter adapter to charge your phone instead of a USB connection in the car or bringing along your own third-party Bluetooth audio kit for hands-free use of your smartphone. She adds that systems are being developed to allow you to use your device without storing any information in the car.

We have some other tips to protect your data and your hardware:

  • Remember that your data is out there for anyone to see when you use a public, unsecured Wi-Fi network. It’s not a good network to use for accessing your bank, credit card company or institution that has sensitive data. A secured Wi-Fi network is better, and so is your cellular data network.
  • Whether traveling or in your office or home, we recommend using a surge protector while your computer is plugged into the socket. Summer is a notorious season for power surges when you have lightning and power interruptions, and they can damage your machine’s circuitry. If your computer is older, it’s more susceptible to possible damage.
  • When working from your computer’s regular location, we recommend using a battery back-up system that sits between your outlet and your equipment. In the event of a power outage – even a very brief outage can trigger a computer shutdown – you’ll be able to save your work and initiate proper shutdown procedures to protect your work and equipment. Most battery back-up systems have outlets for you to plug in your computer, your gateway/router, printer and other similar devices.

If you have any questions at all about automotive systems or protecting your equipment during the summer, we’re happy to answer them or help you with installing or configuring any products. Contact us at 973-433-6676 or email us.

Shortcuts Can Take You the Long Way

Just like there’s no free lunch, there’s no easy solution when you use a shortcut that cuts corners. Whatever time and money you think you are saving can easily be wiped out – at the cost of more time and money – when a failure occurs without warning. You can protect valuable data by taking the time to set up your system properly.

That advice was brought home to a client who received some bad advice from a bargain-basement IT support provider. The provider had moved away but still provided support. When our client – before we took over the account – contacted the provider to help with a database problem, things went from bad to worse very quickly.

In a nutshell, our client’s system had some built-in redundancies, all designed to prevent data-loss problems, but their failure had never been detected. As result, our client was walking a tightrope without a safety net. When called in, the former IT provider instructed our client to reboot the server, but the server never came back online. That was one problem.

Another problem was the failure of the hard drive, and we found a problem there that we consider totally avoidable. It began when the client started running out of space on the server’s hard drive. Instead of taking the time – and money – to back up the data and install a new hard drive, the IT provider repartitioned the drive using a compression program.

That step is something we never even suggest to our clients. In all the literature we’ve come across and in our many years of IT experience, it’s not a stable program. It’s just a bad shortcut to try to pick up extra space.

So, when the hard drive failed, it lost some data that the client had thought was saved. We tried several restore points, but we never could get the data that had been lost. That’s because the database had been corrupted at some point, and the client was backing up corrupted data.

Going forward, the client now understands that imaging a hard drive or partitioning the drive or using any other questionable technique to create more space on a hard drive will only expose them to more risk. It’s a lesson everyone should learn and heed. You can only stuff so much data onto a hard drive before you get distortions (corrupted data) and an outright failure.

If you need more data storage capacity, we can explore a number of options and find the one that best fits your office’s needs and protects the safety of your data. Contact us at 973-433-6676 or email us to set up an appointment.

Passwords and Underwear: An Analogy Worth Mentioning

When Thycotic, a security software company, compared passwords to underwear, it certainly got a chuckle or two. But they share three characteristics that are worth more than a mention:

  1. Change them regularly.
  2. Don’t leave them on your desk.
  3. Never lend them.

Without getting into TMI, changing every password every day is a lot more involved than changing your underwear, and it’s really impractical. But you can help make your data more secure by changing passwords monthly or quarterly – or any time you see something that looks funny, odd or out of place.

We’ve seen numbers indicating that 75% of all Internet users employ the same password for all the sites they visit. I would strengthen it by using upper and lower case letters, numerals and special characters. I feel my information is safe because it could take years for a hacker to figure it out.

However, hackers have various tools to crack passwords, and they’ll get one eventually. The longer and more complex your password is, the longer it will take. And, hackers make a business decision in how far to go. If they can get a whole bunch of easily decoded passwords quickly, that’s where they’ll concentrate their efforts. So, if you want to keep your password simple, change it more often. But, do change it regularly.

Don’t leave them out on your desk. I can’t tell you how many times I visit clients and see passwords taped to monitors or walls for the whole world to see. In busy offices, where people walk in and out all day, it would be very easy for a practiced password thief to see a password or two and remember them. If you recoiled with horror at the thought of someone seeing your underwear on your desk, how do you feel about someone getting into your personal or corporate bank or credit-card information?

Never lend your passwords to anyone. Yes, the thought of someone using your password should be just as disgusting as someone wearing… Well, you get the idea.

You can further protect your password by being very careful about which websites you provide information. Remember that 75% figure? If a hacker uses a website for a bogus offer – such as something for free – to get you to sign on with a password, he’ll make the assumption that you lack good judgment or common sense. He’ll also assume you use the same password for dozens of other places, including those where he can either take money from you or find information to sell to others.

If you use cloud-based services, such as Microsoft Office 365, the provider will monitor patterns and notice something out of the ordinary. You, too, should be on the lookout for out-of-the-ordinary things, such as emails with attachments or links from people who normally don’t send you those things or emails with odd subject lines.

If you have any questions about password security, contact us by phone – 973-433-6676 – or email. In the meantime, treat your password like your underwear.

Virus and Malware Protection Requires Vigilance

The numbers are grim when it comes to the ability of antivirus and malware software to protect your computer from an invasion. Keeping a close eye on your computer is a huge help.

Let’s start with the bad news. I was astonished to learn that the four major antivirus engines used to combat viruses combine can only detect 40% of the viruses floating around. If you want to take some consolation, it’s a higher success rate than this past year’s flu vaccine, but it’s not comforting. It’s the same with antimalware protection. Quite simply, the antivirus and antimalware software developers can’t keep up with the volume of viruses and malware that’s produced every day.

If you know or believe your computer is infected by a virus or malware, disconnect it from your network or the Internet or shut down the computer and call us – 973-433-6676. IT professionals know which tools to use and where to use them to find and remove them. The tools are Microsoft tools, and they are free, but, again, it’s a matter knowing how to use them and being able to verify that a computer is totally disinfected.

If you have an infected server and no back-up in place, we’ll try to clean the server. With a computer, it’s easier to isolate the infection and – if needed – rebuild it, which means wipe it clean and reinstall the operating system, application software and data files. If you are using cloud-based applications and data files, the chances of an infection are greatly reduced because the hosting companies constantly update the software.

While the numbers may seem to be stacked against you, you can take steps to protect yourself. First, install, update and use your antivirus and antimalware software. Those programs will pick off the more numerous “easy-to-detect” viruses and malware.

Second, be very careful about the websites you visit and the networks you allow to connect to your computer. Only go to trusted sites and only connect with trusted networks. Of course, there’s a caveat here. Sometimes, your antivirus software may flag a network or computer trying to connect, and it may be a false positive. If it looks like something that’s OK, it’s most likely a network driver update.

Contact us – 973-433-6676 or email – if you have any questions about anything having to do with viruses or malware on your computer or server. It’s a dangerous world out there, but it’s more than survivable with good judgment and common sense.

Protect Your Networks as IoT Grows

What can’t we do over the Internet? Pretty soon, the answer will be: Practically nothing. We may not live like the Jetsons, but in the expanding age of IoT (the Internet of Things), we can do all sorts of things, from turning lights on and off to connecting with life-saving healthcare information and equipment systems. While the future is bright, you need your “shades” in form of network protection.

Here’s why it’s critical: Every device and every app that you use over the Internet exposes you to hackers who can get into your network and computer system and those of other people and businesses. Your network router or gateway is your first line of defense. There’s nothing magic about what you need to do to protect it.

The first thing is to turn on your router’s or gateway’s firewall. It sounds so basic, but we’re always amazed at the number of people who simply neglect it. You’ll need a password for it, and our advice is to make it long and to include at least of the four following characteristics: a lower case letter, an upper case letter, a numeral and a special character. If your computer has a firewall, turn it on, too, and make sure you have anti-virus and malware protection installed, updated and activated.

But network security is more vital than ever because the devices you use for a smart home, for example, may not have built-in security or a strong security system. Every time you turn lights on and off, lock and unlock a door or change your thermostat over the Internet, you can be vulnerable to a hack. If you are on a secure network, and if your network in your smart home is secure, you’ll be much better able to protect your system (and all of the data).

Network security can be even more critical for businesses. Some types of businesses depend on remote access to sensitive files than others, and those files could contain information on your business or your customers’ businesses that a hacker can use to monetize in any number of ways.

If you are buying and activating more smart systems as you expand your Internet of Things, we urge you to talk to us. We can help you understand the security risks you need to manage and help you select the security systems that can best manage those risks. No system is foolproof or perfect, but making yours as strong as possible will minimize your risk of getting hacked. Call us – 973-433-6676 – or email us to strengthen your existing security system or find a new one.

 

Caution is Key to Online Safety

Take a deep breath and Look Before You Click during the holiday season. More scammers, hackers and schemes abound at this time of the year, looking for holes to breach and get critical personal data. Here’s a review of our tried-and-true safety measures.

Watch your email. It’s one of the easiest pathways into your computer and all of your valuable personal data. At this time of the year, scammers and hackers take advantage of harried shoppers, who are likely balancing work and shopping and not paying full attention to all of their email.

Here are some identities a cyber-invader may assume to get inside your computer:

  • Bank or Credit Card Company
    • Do you have an account with that bank or credit card company?
    • Is it really one of their actual email addresses or domains?
    • Does your bank or credit card company normally contact you about this?

Your Best Course of Action: Close the email and go the bank’s or credit card company’s website to see if there are any alerts that match the email. If you’re still not sure it’s a fake message, get the phone number from the website and call. You can also look at a bank statement or credit card to get a customer-service phone number. Don’t click on any link in a questionable email.

  • Retailer or Shipper
    • Did you actually do business with that retailer?
    • Did you agree to use that shipper when you bought something online?
    • Are you being asked to click on a link?

Your Best Course of Action: Close the email. If you printed a hard copy of your order confirmation, you should be able to see the name of the carrier and a projected shipping date and delivery date and verify the information in the email. For protection, go to the retailer’s website and log in if you have an account. That should provide you with updated information on your order’s status. If the retailer has provided you with a shipper and a tracking number, go to the shipper’s website and enter the tracking number there. If you’re still not sure, call customer service.

  • Charitable Solicitations

Your Best Course of Action: Close the email. If it’s a charity you want to support, find its official website and give a donation there.

  • Email from a Friend in Need

Your Best Course of Action: Close the email. If you really think it’s legit, call your friend or send a new email with a different subject line. If that person is a close enough friend to send money, you should have full contact info – or know a way to get it.

When conducting business online, make sure you give your information over a secure website page. There are a couple of ways to check:

  • The website address begins with https
  • You’ll see a padlock icon in the address bar

Some other precautions to take include:

  • Buy from a large, reputable online or brick-and-mortar merchant. Generally speaking, retailers who work through Amazon or EBay have been vetted and have contact info posted online. If you’re not sure, buy from someone else.
  • Don’t send sensitive personal information by email. It’s too easy for someone to intercept it.
  • If somebody calls you about an account or purchase or charitable donation, you can ask to call that person back – and then go to a website to get a phone number you believe is trustworthy.
  • Make sure your antivirus, spyware, malware and firewall programs are up to date and running.

Above all, Look Before You Click. Make sure you understand exactly where a click will take you and what will be put on your computer. As Michael Conrad’s Sgt. Phil Esterhaus warned TV’s Hill Street Precinct police officers: “Let’s be careful out there.” And if you run into trouble, make your emergency call to us – 973-433-6676 – or send us an email.

Armor for Your Mobile Wallet

The battle between Apple Pay and Current C is about to intensify as more shoppers start to use the mobile wallet functions in their smartphones and devices. We believe Apple Pay has better security, giving you more armor for your iPhone’s commercial capabilities.

The heavy-duty armor, as far as we are concerned, is the two-factor authentication that’s part of the Apple Pay system. The system keeps your credit card information separate from the transaction, and you need a fingerprint to complete the transaction. So, if somebody steals your iPhone, they’ll also need to cut off the finger with the print you’ve registered as your “signature.”

The banks and financial companies who back various credit cards have bought into Apple Pay, too, and it would likely behoove many merchants to go along with the idea. Banks and credit card companies are moving to the EMV (EuroPay, MasterCard, Visa) system that replaces the magnetic stripe with a chip, and they are shedding their responsibility for covering fraudulent charges. That responsibility will shift to the merchants.

The security benefits are enhanced by Apple Pay’s ease of use with Near Field Communication (NFC). A post on Tech Radar gives you a simple explanation, but we’ll simplify it a little more for those who don’t want to click through.

It’s a short-range, low power wireless link that essentially uses radio-frequency identification (RFID) technology (think EZ Pass) to transfer small amounts of data between two devices just a few inches apart. It doesn’t need any pairing code as with Bluetooth, and it’s so low-power, it doesn’t need a battery in the device being read. Tapping your phone on a contactless payment terminal in a shop, train station or coffee shop identifies your account and takes payment through the app on your phone.

Your phone’s SIM card is a smart card that identified your phone to a network, and phones besides iPhones have NFC capability.

We have some issues with one of Apple Pay’s major competitors, Current C. I don’t think it’s as easy to use, but more important, the system collects a lot of personal information, and it has been hacked. Current C, as we understand it, is linked to a consumer’s checking account, and we don’t use debit cards because of the risk associated with debit card security issues.

We also don’t like the customer-data collection aspects of Current C. It functions like a loyalty program, and we should all have the choice of deciding if we want to be part of any merchant’s loyalty program.

Finally, Current C is more cumbersome to use. You need to log in and pull up a QR code that the store reads. With Apple Pay, you just hold your phone close enough to the reader for it to read your fingerprint.

We think the finger is just scratching the surface. Because fingerprints are unique – even with identical twins – mobile wallets using the Apple Pay principles can spread to boarding passes, door locks or anything else requiring accurate identification.

What are your thoughts? Leave a comment and start a conversation. And if you have any questions about setting up an Apple Pay account on your iPhone, we’d be happy to help. A phone call – 973-433-6676 – or an email will get it started.

 

Shedding Light on the Flashlight App

A cable-based news network reported that flashlight apps on Android-based phones can steal data. It created a stir in the general and technical news media. Yes, somebody could write an app that can track some of your activity (and sell it to marketers) or could launch a virus. But there’s a bigger-picture lesson to be learned: Use common sense.

Let’s start with a few of “givens.”

First, there’s always someone out there trying to get your data and resell it – whether it’s your sensitive personal information or just some data to help a marketer target you. Ultimately, you have the responsibility to protect your data – though we can help you put systems in place.

Second, you have control over what gets installed on your device. You need to take time and care when you download and install apps to make sure they are safe and secure.

Third, if you have an iPhone or an iPad with a camera, you have no reason to download a third-party app for your flashlight. It’s been there since the release of iOS 7.

With that being said, what’s going on with the flashlight apps? You can dig into some of this yourself, starting with a report from Fast Company about the app Brightest Flash sharing location and device ID information. (Please note, most of you allow this information to be used with many other apps, such as those that provide directions while you drive somewhere.) The app’s developer was automatically sharing location and device information with advertisers and other third parties–even when users opted out. In fact, before they could accept or refuse the app’s terms, it was already collecting and sending information.

That got scaled up in a special report on a cable news channel, in which viewers were told this could be bigger than Ebola. What further rankles me is that the report on the How-To Geek website made specific references to the iPhone flashlight app, which is built into your device. It made a mountain out of a molehill.

However, the report noted: “The fact is that Android app permissions are a mess and you have very little control over what apps can do once you’ve agreed to install the application other than just trusting Google. Your best bet is to avoid installing apps that have permissions that look suspect, or only install apps from really reputable companies.”

All of this brings us back to why I like the iPhone and Apple apps. Apple may come across as control freaks, but the company vets all of its apps and app developers to give you better protection. Some device users find that restrictive; I find it comforting.

To be sure, hackers and virus writers are looking to invade Apple computers and devices, and it’s only a matter of time until they succeed often enough to create problems. For now, our advice is – as always – to look before you click and decline if you’re not sure. Also, as always, never hesitate to call us – 973-433-6676 – or email us if you have any questions about any apps you’d like to download.

Diversify Your Data Backup

Two new clients came to us after experiencing data backup failures. While no single backup solution is guaranteed to work all the time, the odds are highly against every backup system failing at the same time. The best solution, in a word, is “diversification.” If you choose carefully, you can get the right backup systems for what you need to store and save yourself some money, too.

You have many options to backup and restore pictures, videos and other types of data files, but let’s look at three broad categories: the cloud, external drives and media such as DVDs and thumb drives. If you are highly concerned about the safety and recovery of your data, you can pick a system in each category and feel confident you can always get your data. If all systems fail, chances are your data will be a minor worry.

The cloud, otherwise known as a system of large, remote and redundant servers and storage facilities, is the foundation of most data backup and recovery systems. We now work with multiple cloud-based storage and recovery providers, giving you the ability to implement a system that meets your volume, data-sensitivity and pricing parameters. Despite the iCloud invasions, cloud-based systems remain safe places for your data, and for a relatively low cost, you can rest assured you can protect your data and get files whenever and wherever you need them.

External hard drives come in a variety of sizes and speeds. Home and SOHO users can buy them in sizes from 500 GB to 3 TB and connect them through USB 2.0 and 3.0 ports for up to a few hundred dollars. You can cross the $1,000 mark and get 12-to-20 TB units, but for most of you, that’s probably overkill. If you really want to protect your data, you should consider having multiple external hard drives to cover a unit failure, and you could keep external drives at another location and swap them on a regular basis. It all depends on what’s right for you.

External hard drives are essential add-ons for data-intensive applications. A client with a video editing business found this out soon after buying a new computer and running out of space shortly thereafter. In this case, the external drive provides easily accessible storage for files of work in progress, and it gives the computer’s hard drive room to do all the manipulation required for video editng.

Mac users have access to Time Machine, the built-in backup feature of OS X that works with your Mac and an external drive (sold separately) or AirPort Time Capsule. Time Machine automatically backs up your entire Mac and remembers how your system looked on any given day. It keeps hourly backups for the past 24 hours, daily backups for the past month, and weekly backups until your backup drive is full.

Saving files to DVDs and thumb drives is inexpensive and relatively quick and easy to do. You can easily make multiple copies, and you can easily store them in multiple locations. We generally advise relying on them as a supplemental backup for important files.

Selecting your backup system or combination of systems is like buying insurance. The more you value your data, the more you’ll want to increase and diversify your backup capacity. And just as there is an insurance program that meets your economics and tolerance for risk, there’s a backup system that will work for you. Talk to us about your needs, and we’ll find the solution that best matches them. Call – 973-433-6676 – or email to start the process.