Passwords and Passing Information

We’ve had numerous articles over the years about strong passwords, thinking before you click and responding to requests for sensitive information. A recent seminar and a personal experience brought it all together. You still need to be mindful of several principles that can keep your systems – and your sensitive data – more secure.

At the seminar, conducted by a cyber expert from the State of New Jersey, the presenter said he “cringes” at the “stuff” he sees on walls when he walks into many offices. People have Wi-Fi passwords on sticky notes on the walls near their computers. Passwords are taped to monitors, or people use very simple, easy-to-crack passwords.

Yes, those notes are a convenience for busy, overworked people, and state employees are not exceptions. We’ve seen a lot the same things when we service our business clients – and you have to ask the question: Who else is seeing this information?

The answer is that countless people who you can’t recall have probably seen the information. Anyone who visits your offices can see passwords hanging on the walls of cubicles or taped to monitors. If you have a lot of traffic in your office, the chances are greater that your networks and data have been compromised. If salespeople, contractors and others need Wi-Fi access to work in your office, have you given them the network password instead of a guest network password? Even if you don’t have a lot of visitors, do you have a cleaning service? Any member of the cleaning crew could see that information and access your network and files.

The solution is simple: Don’t allow anyone in your office to leave passwords out in the open. If they must be written down so you and everyone in the office can access the correct information when they need it, then keep that information in a locked desk drawer.

You can take additional steps, such as changing your network password frequently, requiring your employees to change passwords frequently and establishing rules about the number of characters and types of characters that must be in a password. If outsiders need access to your network, set up a guest password – and change that even more frequently.

Remember, your security is only as good as the worst security of anyone who has access to your network.

Outside the office, make sure that you and everyone in your company have secure passwords for computers and mobile devices – especially if you have sensitive data, including passwords, on them. We can help you install and teach you how to use security systems that can lock computers and devices if they are lost or stolen.

Because we go in so many public places and can tend to leave computers and devices on a table, for example, it makes more sense to make more use of the cloud for storing sensitive data. Yes, we can lock devices and encrypt data, but unless you have a backup program, the data can be lost. We recommend both having a backup program and using one of the major storage providers such as Google, Dropbox, iCloud or Office 365. They all have security protocols to protect access – unless, of course, you have left your passwords on your computer or device or have used a simple, easy-to-crack password. They also have redundant systems to make sure your data are accessible anytime from anywhere.

While we are on the subject of security, this is a good time to remind everyone to think before you click. We recently installed a new PC for a client, and within a month, the client saw a pop-up message about a problem with the computer and a “solution” to fix it for $499. And instead of a credit card, the “solution” provider wanted the money transferred directly from a bank account. Fortunately, the client realized the error and was able to call the bank and freeze the account before the money was taken out – and before more was sucked out by the scam artist.

We were guilty of not thinking right away, too. One of our business partners sends us a check once or twice a year, and they wanted to switch to an ACH system. They sent us an email asking us to respond with our bank’s routing number and our account number.

I started to reply – without thinking it through – and then realized before I sent anything that this was an unusual request for sensitive information. I stopped and phoned the company. Yes, it was a legitimate request from our partner, but we can all learn two important security lessons from this:

  1. Don’t just respond to an emailed request for information – no matter how legitimate it looks. There are too many ways to spoof an email address or a phone number. Find the phone number of that person and that company independently, such as opening your browser and entering the website address (url) that you know or find through an online search.
  2. Never send sensitive information, such as passwords and bank accounts, by email. A phone call to the person you have identified as a legitimate employee who is designated to take your info is safe. So is using a secured page on a legitimate website.

Security is critical. If you have any questions about security measures for your system, email us or call us – 973-433-6676, and we will respond in a timely manner.

Backdoor Blues Need Legal Lyrics

The FBI’s request for Apple to unlock the iPhone used by the San Bernardino shooters has led to a far-reaching controversy in the United States. Parties on both sides of the issue have valid concerns, and we believe resolutions will need to come in the forms of a Supreme Court ruling (probably first) and federal legislation to better align technology and the law.

In our opinion, this collision was bound to happen because the push and pull between national security and privacy have gotten stronger as technology has made us part of a global society. Looking just at the United States, technology has advanced at a far greater pace than our legal system’s ability to keep up with it. Further, no matter how tightly our laws are written, there are always differing interpretations, and in our legal system, differences are resolved (in theory) through the courts and the appeal process. Even if Congress were to pass a law now to resolve the issue, one side would contest it.

Thus, the likelihood is that any legal decision will be based on a law that is already on the books, and it could wind up before a deadlocked Supreme Court. That’s a possibility, given our political environment.

This is where opinion ends. Here are the issues to consider.

There is no end. Once this specific cell phone is unlocked, the genie is out of the bottle – and the genie has the key to Pandora’s box. As we understand the legal world in practical, lay terms, there will be other legal cases in this country to justify unlocking a phone or any other access point to data, and arguments will be based on rulings that involve this phone. If a party in a lawsuit can successfully make the case that another request justifies unlocking a phone – with an argument made on a very fine point of law – a local or state government, in addition to our federal government, could gain access to data.

Knowing that a backdoor or master key is available, a foreign government could force a US technology company doing business in its country to unlock data. US businesses and citizens could be put between the old rock and hard place without the same legal protections that we have in this country.

There are no secrets. As the saying goes, “a secret is only secret when one person knows it.” Any solution to unlock the password and data on this particular phone will be a team effort. The greater the size of the team, the greater the chance a hacker will find a way to uncover the secret.

The defenses will need to be massive. If Apple and Google have software to unlock encrypted phones, they will be subject to massive “attacks” by parties interested in getting the code. Cyberwar is fought all the time by governments, corporations and hackers of all stripes. Who is going to keep the code, and who is going to have access to it? Defending against attacks burdens the tech companies.

Nobody’s data will be secure. This is the heart of the technology companies’ argument. They tout the security of their customers’ information, whether it be personal identification, health records and financial records. Corporations depend on security and access to how products are manufactured and how products and services are priced. We have already seen how a weakness in a contractor’s IT system opened a door to Target’s records. If someone can get into your phone, how safe will your life’s savings be? Could somebody use your healthcare and identity information to obtain services fraudulently and stick you with the bill?

The tech companies believe they have a responsibility to protect their customers’ data. There are very few issues that bring Apple, Google, Microsoft and others together like this one. It goes beyond mobile phones and tablets. Businesses, institutions and governments collect and store huge amounts of sensitive or proprietary data in “the cloud,” a global system of secure servers, routers and hard drives. These same organizations make extensive use of mobile phones and tablets. The tech companies argue that they must not do anything to violate the trust their customers place in them to protect the data.

What’s the greater risk? Is it a terrorist attack or somebody wiping out the life’s savings of millions of people in a matter of seconds?

Society needs to decide the privacy vs. security issue. It’s not right to make businesses the arbiters of public policy. We need an open, honest discussion of all the ramifications of possible laws, including the unintended consequences that always arise, and we need laws that do the right thing. There will never be complete agreement, and the right thing may not be the popular thing.

You can read many of the arguments from Apple and other tech companies here – as well as support from various privacy groups. There are no easy answers to the questions surrounding the issue.

Our call to action here is to speak up. We invite you to leave a comment below, and we encourage you to contact your government representatives to let them know what you think. We can sing the blues about privacy vs. security, but at the end of the day, our lyrics need to lead to laws.

 

The BYOD Hangover

Some businesses got drunk on BYOD – Bring Your Own Device. They bought heavily into the idea that they could cut costs and get more work out of employees by letting them use their own mobile devices and computers. Now we’re starting to see more problems for businesses, individuals and everyone they touch electronically.

Ten years ago, the benefits were clearly present for businesses and their owners/partners and employees. As the first generation of smartphones, mostly Blackberry, took hold, busy people and small businesses found they could untether themselves from office systems. Tablets, starting with iPad, increased their freedom because their bigger screens and keyboards made it easier to read spreadsheets, written documents and email and update files or respond to email.

  • Salespeople could access pricing lists, customer records and just about any critical information they needed to provide better service.
  • Everyone with a smartphone – and soon after, a tablet – could respond with increasing capabilities.
  • Busy parents could stay in touch with the office, giving them more flexibility to manage their lives.

In our business, IT professionals could respond to client or corporate information management needs from anyplace that had cellular service.

As Wi-Fi and all forms of communications networks grew and more smartphones and tablets came to the market, along with various carriers, the ways to stay connected lost all technical limits. And because everyone wanted to have their own personal technology – smartphone, tablet, laptop or desktop computer – to use on their own time, businesses of all sizes met the demand. Employees no longer needed to have specific products. IT managers were able to incorporate everyone’s devices, and employers were happy to give everyone 24/7/365 work capability.

It was intoxicating for everybody. Now, it’s intoxicating for hackers and cybercriminals; everyone else is having a big, bad hangover. The problem is security.

Here are some sobering concerns:

  • While we can help our business and professional services clients secure their networks and access to the data on their corporate servers, we need to educate employees about programs to control security. A business really needs to depend on its employees to keep their individual devices and computers secure. One hole can be an entry point to sensitive data anywhere.
  • Mobile phones and tablets are becoming more vulnerable to security problems. Why? That’s where the money is. With people conveniently accessing critical data over cellular and Wi-Fi networks all the time, hackers are finding more ways to penetrate security measures. Everyone needs to make sure they know that anybody in the world can take a peek at their business on any unsecured public network – like one in a coffee shop, hotel lobby or airport.
  • Even if you take every available security step in your corporate and personal systems – strong passwords, strong firewalls, up-to-date and active anti-virus and malware software – anyone with access to your system who doesn’t follow the same precautions puts you at risk.
  • The convenience of publicly accessible storage sites, such as Dropbox, can lead to the loss of privacy of your data. When you give someone the ability to download files from a storage site onto their own computers or tablets, you effectively give them ownership of that data. That means an employee can “own” client lists, financial information, etc.

With the horses already out of the barn and out on the open range, you can’t corral them and bring them back. But there a number of steps you can take:

  • Educate everyone in your organization about the need for security and what they need to do:
    • Have strong passwords and change them often
    • Be aware of when they are on unsecured public networks
    • Keep their own personal technology protected with up-to-date, activated anti-virus and malware programs
    • Understand that any holes in their own security systems can open holes for hackers to get into your business’s system and the systems of anyone or any organization they’ve ever contacted over the Internet – and that it can go viral from there
  • Require strong passwords (combination of upper and lower case letters, numbers and special characters) to access your data files wherever they are
  • Require frequent password changes
  • Determine which files need to stay on a secure server that you control
  • Backup data securely and often
  • Monitor your backup

We can help you with all of these steps:

  • Lunch ‘n’ Learn programs about security
  • Audits of your system’s security
  • Monitored backup services

Contact us by phone – 973-433-6676 – or email to keep your data clean and your systems sober in the BYOD environment.

Preventing Viral Infections

Early shopping season reports showed online purchasing way up over in-store shopping this year. If you know what you want and what you want to pay for presents, online shopping is convenient and efficient. We’ve written a lot over the years about being safe online, but you’d be surprised who could be infectious.

One culprit, for example, could be an electrical contractor or video-surveillance-system contractor who does work at several locations for a national or regional retailer. That contractor may use some sort of billing app to invoice the retailer – let’s say it’s Target or Walmart, but it could be anybody; we’re talking about the size of the company. That invoice goes somewhere in the retailer’s massive data management program.

Now, let’s say that contractor hasn’t had the time to keep all of their security software update – or they’re using some free antivirus program that has more holes than a slice of Swiss cheese – or they’re using easily cracked passwords.

Do you see where this is going? A hacker gets into the contractor’s computer system, simply because it’s open. Once inside the system, the hacker sees that the contractor has done business with the large retailer and is able to find all the information the contractor uses to get into the system. Once hackers are in, they have the opportunity to explore other parts of the system, and that’s where it’s possible for them to get all sorts of personal data about the retailer’s customers.

It could only be email addresses, but that may be enough to help them launch a scam – which we’ll get into later in this article. They could also get into credit card information, which leads to financial consequences.

As a business or consumer, what can you do to keep from being infectious? First of all, make sure all of your antivirus and malware software and firewalls are up to date and activated. We always advise going beyond free versions of all of this software. The paid versions are stronger and better supported.

Second, make sure you have strong passwords and change them. Yes, it’s an inconvenience, but that’s the tradeoff you need to make to protect your security. We also recommend using additional security measures such as two-factor authentication or requiring a text notification being sent to your cell phone when you change a password. The text notification will tip you off if someone is impersonating you online.

Third, be VERY, VERY CAREFUL at this time of year. Holiday season is scam season. When you buy online, it’s common to receive an email from a retailer or shipper with a link to track your packages. With thefts of packages commonplace, it’s useful to know when a package will arrive to make sure you or a neighbor can take it in. With everyone rushing to complete shopping and get work done, it’s all too easy to click on a link, and that’s the opening for scammers to get into your system.

Another scam is in the travel industry, such as a special offer purportedly from a hotel or airline. Again, you invited to click a link to take advantage of a “great opportunity.”

You should do your best to verify the authenticity of any link before clicking it. One effective way to check is to hover your mouse over the link. You should see the link’s origin. If it looks funny, avoid it. Even better, open your browser and go to the company’s website to see if you can find the information contained in the email. If it’s legit and available, you should be able to access it. Your other option is to pick a phone and call the company – using a number provided on its website, not from the email.

The sad truth is that no person, business or government is safe from hacking. The question is not if you will be hacked, it’s when you will be hacked. And the consequences can be even more widespread than they used to be. Some of the viruses now get into your computer’s firmware. That means that even if you wipe your hard drive clean and reinstall your operating system and all your other software, the virus is still there.

If you think you’ve been hacked or have a virus in your computer, call us or your IT specialist immediately. We know where to look and have the tools to discover your breach and mitigate the virus if it’s all possible. Call us – 973-433-6676 – immediately if you have a security concern or contact us by email if you have any questions about your online security.

Rolling Out Windows 10…Rolling Up 7 & 8

If you haven’t chosen to install Windows 10, Microsoft will be making the decision for you – though you will still have the opportunity to roll back to Windows 7 or 8. If you still want to buy Windows 7 or 8 for your computer, Microsoft has set the final purchase dates. Here’s what you need to know.

When Microsoft began rolling out Windows 10, the company invited users to reserve the new operating system. As Microsoft got the new OS ready for computers based on each machine’s manufacturer, it sent each owner a notification that it was ready for download and installation. That’s changing, according to a post by Terry Myerson, executive vice president of windows and devices, Microsoft.

Before the year’s end – which is approaching fast – Microsoft will make Windows 10 an “optional update” for all Windows 7 and 8 users. The kicker comes in 2016.

“Early next year, we expect to be re-categorizing Windows 10 as a ‘Recommended Update,’” Microsoft says. “Depending upon your Windows Update settings, this may cause the upgrade process to automatically initiate on your device. Before the upgrade changes the OS of your device, you will be clearly prompted to choose whether or not to continue. And of course, if you choose to upgrade (our recommendation!), then you will have 31 days to roll back to your previous Windows version if you don’t love it.”

However, the move to Windows 10 is getting harder to avoid. You can read more thoughts by a couple of commentators, such as Gordon Kelly for Forbes and Mary Jo Foley for ZDNet. But here are a couple of things to keep in mind:

  1. Microsoft is proactively installing Windows 10 code on computers to make the process go faster. It won’t spring into action unless you complete the Windows 10 installation process, but it is there – and that could understandably bother some people.
  2. At some point, you will need to make the active decision NOT to install Windows 10.

In my opinion, Windows 10 is big upgrade over 7 and 8 with more speed, security and capability. I encourage all Windows users to install it on their computers. I am not happy about some of Microsoft’s tactics, but I understand the “big picture” strategy behind them. It becomes expensive for them to support outdated software.

With that in mind, Microsoft has set the final purchase dates for OEMs for Windows 7 and 8. For all intents and purposes, Windows 7 has not been available for computers purchased at retail stores, but as a reseller, we are able to get them. We are able to get computers with Windows 7 Professional, but Microsoft has set Oct. 31, 2016 as the cutoff date. For Windows 8, the cutoff date is sooner – June 30, 2016. The final sales day for Windows 8.1 is Oct. 31, 2016.

We have no problem with any client staying with Windows 7 and 8 or 8.1 operating systems – even though we intensely dislike the Windows 8 family. While we strongly urge home and SOHO users to go to Windows 10, we understand that larger business and professional users may have application software tied to 7 and 8. Migrating from those older systems will require planning to make the move efficiently and cost-effectively. We can help you map out a technology plan for the next 12 to 24 months. Call us – 973-433-6676 – or email us to set up a strategy session

Jailbreaking Devices Makes You Easy Prey

Everyone who has ever played Monopoly covets the “Get Out of Jail Free” card. It’s instant freedom. Some people like to “jailbreak” their cellphones for the instant freedom of doing something a manufacturer or carrier never intended. But if you jailbreak a phone or other device, you’ll likely never pass go and collect $200 – nor will you find free parking. You and others are more likely to pay a lot of rent.

Here’s why, and it’s very simple. Most updates for phones, tablets and computers – if not all – revolve around security. With so many more hackers using more sophisticated tools to get inside of any system, security is a preoccupation. Whenever you jailbreak a device, you open a hole for someone to breach.

It wouldn’t be that bad if a security issued affected the owner who jailbroke a device. Unfortunately, this can go viral very fast. Let’s look at one possibility – and you may never look at your babysitter the same way after this.

People jailbreak devices to get application feature sets, among other reasons. It could be that a high school or college student jailbreaks a phone to download music. Now, let’s say you and your babysitter use smartphone apps so you can transfer funds to pay up at the end of the night. There is no way for you to know if someone has used that security breach in the download app to get into your babysitter’s financial information. If they have, they could use that information to trace your bank account that’s associated with your phone.

But it’s not just your babysitter. Anybody who uses the convenience of paperless money transfer can be vulnerable to a security breach if one of you has jailbroken your device. We recently saw an article in a British newspaper about 250,000 iPhones being hacked as the result of Apple Pay transactions. The article had a sensationalistic tone, but once you got past that, it was easy to see that all hacked phones had been jailbroken.

If you use Google Wallet, the Android platform, you face the same hacking risk if you jailbroke your phone. In our “tap-and-go” world of speed and convenience, it won’t matter how secure the payment system is if your phone is the weak link.

So, your safety is very simple. Don’t jailbreak your phone, and be very careful about where and with whom you do on-demand business. I, for one, have a pretty high level of understanding about what goes in the electronic netherworld where hackers play, and I would never be foolhardy enough to think I could beat them at their game.

If you have a jailbroken phone and want to relock it, we can walk you through a procedure. However, be aware that once you start the process, it’s irreversible, and you will delete all information, files and settings on your phone. If you want to re-lock a SIM card, it must be done by your carrier. Only they have the software to restore factory settings for their network. If you are buying a used cell phone, we can help you with the process to make it safe and secure. We can answer any questions you may have about cell phone security. Call us – 973-433-6676 – or send us an email

Connected Cars Have Blind Spots

As computers and connectivity become prevalent in the automotive industry, we’re finding more ways in which your “electronic tires” can be slashed. It goes beyond leaving your personal information footprints in a rental car – or even having a hacker stop you cold on an interstate highway – as we discussed earlier this year.

Technology is lapping the car companies’ capability to keep up with the latest developments. With Internet connectivity just about anywhere in the US, it’s easy for any automotive service provider to “talk” to your car. In fact, Tesla has made a point about that. Because their system is so software-driven, they can make repairs directly through an Internet connection while the car sits in a garage.

The manufacturers of more mainstream cars, though, are still increasing their use of the Internet to avoid you having to return to the dealer just for a software update. While your first thought is probably getting updated maps or upgrades for your factory-installed navigation system, it can go much farther than that.

According to an article in Auto Connected Car News by Brian Jonston, over-the-air (OTA) software updates can reduce warranty costs, potentially increase overall completion rates for software-related recalls, improve customer satisfaction by eliminating trips to the dealership for software upgrades or fixes, and provide the ability to upgrade functionality and add features to automotive infotainment systems over a vehicle’s lifetime. He cites a report from IHS Automotive that estimates auto manufacturers worldwide could save $35 billion in recall and update costs by 2022, mostly for telematics and infotainment system updates.

“Japanese OEMs have been pioneers in navigation map updates in Japan via their telematics systems. BMW, VW and Tesla have all recently announced OTA procedures for updating navigation maps,” Jonston writes. “Hyundai and Ford both have proof of concept systems for OTA map updates, and will also likely deploy such systems in the near term. Total vehicles in operations that are enabled with map OTA updates are projected to grow from approximately 1.2 million units in 2015 to nearly 32 million units by 2022, according to IHS forecasts.”

Jonston adds that Infotainment software OTA updates are much larger and more complex than software app updates and need to use Wi-Fi rather than LTE 4G service because of mobile network limitations. This category is emerging and will be a growth segment in the next five years, with players like Ford, Chrysler and GM expected to adopt these systems. Infotainment software updates, such as updates to the infotainment OS and user interface, will grow quickly over the next six years to more than 96.4 million enabled vehicles by 2022.

The OEMs that use software platforms most effectively will be able to save costs and improve sales and customer retention. But they need to get into the fast lane on the information superhighway. My car lease, for example, is up in the very near future, and the level of technology is stopping me from getting a new model. I’ve experienced numerous problems, especially with Bluetooth compatibility with my cell phones and infotainment systems.

It all makes me wonder if the auto manufacturers can catch up to companies such as Apple and Google, who seem to be able to do a much better job of integrating their systems. With the new model year for cars generating excitement (and generating deals for clearing out last year’s models), you might be thinking about a new car. We can help you look at the infotainment features of the cars you are considering and help you integrate your devices with the car – avoiding multiple trips to the dealer or an aftermarket systems provider. Knowing how you use technology, we can help you buy and install the technology you need to get full benefits and enjoyment from your system. Call us – 973-433-6676 – or email us to answer your questions and get you on the road.

Two Essentials to Take Care of Business

Backing up your data files and keeping them from prying electronic eyes are essential. We have the tools and tips you need to take care of business at the office and at home. Here are some things to keep in mind.

The first tip is: Backup your data offsite. We never like to consider the “unthinkable,” but bad things do happen. A story from a recent sales call, a non-profit organization, drives home the point.

Non-profits can get a lot of software free or at a greatly discounted price. So, our client wondered why they needed to spend money to back up software on the cloud. As we were talking, the client mentioned that they had considered buying the house across the street from their office and converting it into their own space. They didn’t do it, and at some time after they made their decision, that house burned down.

We never talked about the cause of the fire. If the house was old, some failure of its electrical wiring, for example, could have played a role, and all of our client’s “free” stuff would have been gone. The cost of replacing and reinstalling all of their hardware and software – especially when you add the value of their time and the cost of lost service to their clients – would have been huge.

We’re happy this is a “could-have-happened” story, and we can’t emphasize backing up data offsite enough, but we have a tool to keep your data safe.

Our managed backup program includes automatic backup to the cloud through local data centers and daily monitoring. It is far less costly than post-disaster recovery and much more reliable than putting all of your data and pictures on an external drive that can fail or be lost in a fire or flood. It’s a proactive form of insurance.

Our second tip is: Never sacrifice protection for performance. In today’s hack-happy world, you can’t protect your data and yourself too much, but you must understand one thing: Any system can be hacked by any hacker willing to spend the time and effort to do it.

Just as you need doors and windows to enjoy the world outside of your home, you need pathways from your computer to the Internet. And, just as you have locks on your windows and doors to keep out most bad people and just as you take safe routes on trips, you need to use firewalls and passwords to lock your computer and data access, and you need antivirus software, malware protection and common sense to travel safely on the Internet.

At a recent security seminar, a presenter pointed out that people are agreeing to take on more bandwidth from providers for a free or a small fee. (You know our feelings about free stuff.) You can face problems if your firewall or Wi-Fi devices can’t handle the increased performance, and that can leave your security vulnerable.

We get questions from time to time, for example about the safety of storing data on Dropbox. Our question back to that is: Who hasn’t been hacked? Yes, Dropbox is as safe as you can make it as long as you and Dropbox take all the precautions and safeguards you can.

So, in this day and age of hyperactive hackers, how are you protecting yourself? Are you reading emails carefully before clicking on any links or attachments? Are you careful about signing up for online offers that are almost too good to be true? What kind of antivirus are you using?

We’ll address that last question. We have our partners, but no matter whose system you use, make sure they give you regular updates and act with blinding speed to fix a problem as soon as it’s discovered. Subscription services generally offer you better protection and faster fixes, and they are more likely to automatically update your virus and malware definitions.

If you accidentally click on a site or open an attachment, our recommendation is to push the power button on your computer or device IMMEDIATELY. This will stop any activity right away, and hopefully limit any damage. Then, call us without delay to find and fix any problems.

We can help you with all of your backup and antivirus needs, including installation of valid software and setting up automated functions. Call us – 973-433-6676 – or email us to discuss your needs and put a solution into action.

Windows 10…Rollin’, Rollin’, Rollin’

Windows 10 is continuing its rollout. If you have a qualified computer, you can upgrade to the new OS for Windows-based computers over the next 11 months or so. We’re seeing a lot of tips and tricks for Win 10 floating around the Internet, and that’s a good sign people are embracing it. Here are some remedies for some concerns.

For the most part, Windows 10 has been working fine for most installations. The biggest early problem we have seen is with application software that has been customized primarily for businesses. In all likelihood, the app software publisher should be the one to update their code to meet the needs of Windows 10. Check with them to see if they have updated their code. If enough customers let them know it’s a need, they’ll get it done to protect their business base, if nothing else. If they don’t do it, start planning for new app software because change is an ongoing process, and you’ll hit serious limitations with an outdated program.

Microsoft is pushing out updates and fixes as other issues are reported, so we don’t think it’s worth waiting for bugs to be corrected. It took less than two weeks for the company to start issuing the cumulative updates, and the new OS is designed to install them automatically.

However, if you want to turn off the automation and choose which updates to install and when to install them, you can select those options. You can also choose to update all Windows 10 computers on a network.

A number of users are concerned about Windows 10’s capability to share passwords for Wi-Fi networks. Again, you can turn off that function.

You can explore all of your options by going to the new Control Panel. Click on Settings and then click on Updates and Security. Then, click on Advanced Options. Choose “How Updates are Installed” and “How Updates are Delivered” customize them to your preferences.

Some problems with Windows 10 have involved drivers. Check with the manufacturers or Windows Updates to see if new drivers are available. They should be there, and everything works fine once you install the new drivers.

While we have seen a lot of complaints about having to pay for some features that used to be free, we’re seeing that many of them involve having to pay for games such as Solitaire. Our reaction: “Come on!”

The more important concern is whether to use Microsoft’s built-in (free) security software. We’ll just remind you that Microsoft is not in the security business. We strongly encourage you to get your security software from providers who specialize in that field.

Again, just to repeat the experience of loading Windows 10 on my son’s computer, all I did was start the process. While it was loading, I ran some errands. When I returned home, all I had to was accept the licensing agreement, and the computer was ready to go.

We know new technology has its quirks, and we know some people can be intimidated by it. We can talk you through some of the issues with a quick phone call – 973-433-6676 – or remote in to help you. We can also answer some of your questions by email. Just let us know how we can serve you.

Summer Safety for Your ID Data

Did you get a good rate on your car rental for this summer’s trip? The real bargain might go to whoever downloads your personal data from the electronic breadcrumbs you might leave behind. Taking the time to button down a few details can save you a lot of grief.

Let’s start with cleaning out that rental car. Rental companies always update their fleets, and they want you to feel as comfortable as you would feel in your own car. One of the features increasingly common at any price and size level is Bluetooth, which lets you use the car’s audio system for handling calls on your smartphone, streaming music and getting directions from any GPS system you want to use. Some cars include a USB connection so you can have all those features and charge your phone.

That’s a great convenience, but as we’ve noted many times before, convenience usually involves a tradeoff with security. Syndicated radio host and blogger Kim Komando of the Kim Komando Show, gets to the heart of the issue.

“When you connect your gadget to a car with Bluetooth, the car stores your phone number in order to make it easier to connect later,” she points out. “It also stores your call logs, which include any contacts you dialed. There’s just one problem: All of that information is saved inside the system and is just sitting around for the next renter to find.”

We’re sure there are some other tech-savvy people who could also see your data before the car goes back on the road. So, take some time to clean up your electronic breadcrumbs – and build that time into your schedule for returning your rental car.

Komando offers two suggestions.

“Simply go into the car’s settings (it will vary for every car make and model) and locate your smartphone from the list of previously paired Bluetooth gadgets,” she writes. “There should be an option to delete your phone. That should wipe the call logs and saved contacts. Better yet, look for an option to clear all user data or do a complete factory reset. Talk to the employees at the car rental place if you can’t find these options.”

To that, we would add that you should not leave your car until you take care of this – or be prepared to email the rental company’s customer service department right from the check-in line. You could also post to Facebook or tweet about the problem – right then and there. But you’re better off getting the data deleted.

If you used the car’s navigation system, go into its settings and clear your location history. You don’t want anybody knowing where you’ve been or where you live.

By the way, if you are selling or trading in your car and turning back a leased vehicle, you should follow all of the suggestions for rental cars.

Komando’s article also talks about how easy it is for someone to hack into a car’s computer system and some of the consequences. Again, for your own data security, she recommends using the cigarette lighter adapter to charge your phone instead of a USB connection in the car or bringing along your own third-party Bluetooth audio kit for hands-free use of your smartphone. She adds that systems are being developed to allow you to use your device without storing any information in the car.

We have some other tips to protect your data and your hardware:

  • Remember that your data is out there for anyone to see when you use a public, unsecured Wi-Fi network. It’s not a good network to use for accessing your bank, credit card company or institution that has sensitive data. A secured Wi-Fi network is better, and so is your cellular data network.
  • Whether traveling or in your office or home, we recommend using a surge protector while your computer is plugged into the socket. Summer is a notorious season for power surges when you have lightning and power interruptions, and they can damage your machine’s circuitry. If your computer is older, it’s more susceptible to possible damage.
  • When working from your computer’s regular location, we recommend using a battery back-up system that sits between your outlet and your equipment. In the event of a power outage – even a very brief outage can trigger a computer shutdown – you’ll be able to save your work and initiate proper shutdown procedures to protect your work and equipment. Most battery back-up systems have outlets for you to plug in your computer, your gateway/router, printer and other similar devices.

If you have any questions at all about automotive systems or protecting your equipment during the summer, we’re happy to answer them or help you with installing or configuring any products. Contact us at 973-433-6676 or email us.