Protect Your Security

Along with avoiding shopping scams, you should take special precautions to protect the security of your financial information and access to your computer – as an individual and a business. This is no time to let your guard down. You know the drill for protection, but here’s a short refresher course.

Email

Be really careful about email. That’s good advice at any time, but it’s especially important at this time of the year. Because of all the ways unscrupulous people have to hijack email addresses, a message from a name you know and trust might be from a scammer.

A new type of malware known as Cryptolocker is being spread by email. It appears to be coming from shippers, such as UPS or FedEx, and it targets personal and professional computers. The virus quickly scrambles or encrypts your data and can lock up your computer. The sender does offer to unlock your computer and restore your data if you pay a ransom. But there are no guarantees that the virus will be removed and that you will get all files back.

If you have your data backed up, we can clean out the virus and restore your files.

Trust your instincts on emails. If the name and email address look right, you still may be getting a bogus email. Look at the subject line. Do you normally get messages like this from the sender? Are there grammatical errors or syntax issues you don’t normally see in messages from the sender? Is there an attachment along with other things that don’t seem right?

If you have a problem with your answers to any of the questions in the paragraph, your instinct likely will be delete the email. Instead of responding it or acting on it, you can send a new email to the sender and ask if they sent you the email in question.

You also may be part of an email “phishing” campaign. Just in case you haven’t come across the term, phishing is a way for scammers to troll using fake or malicious websites and email addresses to get you to sign up for something that isn’t real or that is very expensive. Phishers can also use your response to get access to your computer and either mess it up or steal valuable information – or both.

Phishers generally use an identity related to a financial institution or services organization, such as a bank or PayPal. Two tipoffs that it’s a phishing campaign are: 1.) a domain name that looks similar to a well-known domain but is not the same as an official name and 2.) bad syntax in the subject line, generally a string of words that most native English speakers would not use.

Phishing campaigns rely on busy people not reading the message and its identification info carefully and just clicking through or responding. If you’re not sure about the legitimacy of a link in an email address, you can hover your mouse over it, and it should give you the origin of the link.

If you think you may have a problem with a bank, merchant or other organization, find their customer service information independently of the email and make a telephone call.

Online Purchases

When you buy online, make sure the webpages on which you are giving your credit card information and shipping address are secure. The best indication of security is that the pages will have addresses that start with https://www.merchantcompany.com or https://merchantcompany.com. The “s” in “https” stands for secure. The address is usually accompanied by a small gold padlock icon.

If you don’t see a sign of security but absolutely must buy from that site, you might be best to make a phone call. There can be a number of legitimate reasons for security not displaying, but make sure the company knows this is a problem for you. They may need to fix something or make some other changes.

Above all, remember that it’s your money. Don’t let anybody make you feel uncomfortable about spending it.

Additional Protection

You should have up-to-date anti-virus and malware-protection software installed on your computer, and it should all be running in the background. Your network should be behind a firewall, and that software should be up to date and running.

You can set up most protection software to run scans and updates automatically, and you can set them for various levels of protection.  We can help you select the best systems for your needs and we can help you install them and manage them. Just send us an email request or call – 973-433-6676. No matter what you select and run, always remember that common sense and an occasional deep breath will always enhance your security.

This article was published in Technology Update, the monthly newsletter from Sterling Rose LLC.

Update for Security, Performance and ROI

Simply having the latest operating system or software for your apps and browsers doesn’t guarantee top performance and tight security. You have to keep all of your programs updated from the day you install them.

Everything starts with the Internet. Whether you’re setting up a new computer or installing a new application, you’re almost always prompted to connect and download all the updates required to bring your programs up to date. Begin your installation by calling up your browser of choice and updating it. (Firefox usually sends out updates automatically as its default configuration.) As we discuss in the article When They Pull the Plug on XP, your browser is the first door hackers try to get into your computer, so make sure you have all the security updates and bug fixes.

When you begin to install the program or application from a website or a disk, you likely will be prompted to check for software updates. If the installation process doesn’t take you there automatically, answer “yes” when prompted. It’s especially true when installing from a disk. Even a disk that comes with a new computer is likely to be several months old.

In general, your rule of thumb should be to check for updates as second nature – and it doesn’t take much effort. You can set Windows Update to check for and install updates on a regular basis, even specifying days and times. For example, you can designate every Monday at 3 a.m. as your update time. Just go to your Control Panel, click on Windows Update and select Change Settings from the menu on the left. Just remember to have all of your files saved and backed up because updates can require you to restart your computer.

Here are some things to keep in mind when putting programs on a computer.

Many businesses have a mix of old and new technologies; it’s an economic reality. That means they’ll be installing some older (but still mostly serviceable) applications on new machines, recognizing that they won’t get full performance out of the new technology.

Therefore, it’s important to note that installing an old program, such as Office 2007, on a new computer will require you to get a series of updates in a specific order. That’s because each update, such as Service Pack 2 or Service Pack 3, builds on previous updates.  So, make sure you give yourself enough time to download and install them. The time will vary, depending on your Internet connection and network speed and capacity.

If you’re migrating from an XP machine to a new Windows 7 machine (which we implore you to do if you still have XP), you’ll need to go back to Service Pack 1 and download all the critical updates that Office will require. You should also note that you may have been using a 32-bit computer and now have a 64-bit computer. In that case, make sure you install all the updates for your new technology.

It’s the same with your Internet browser – whichever one you use. With the Internet such a presence for handling commercial transactions as well as for conducting business operations, programming becomes like its own ecosystem. It constantly responds to new hardware, new software and the ideas that lead to new applications. The continuing growth of cloud-based applications and the integration of mobile device into business demands more adaptability.

Because of that, we highly recommend that you and your employees and family members update browsers on a regular basis. You’ll get more efficiency, which can translate into better business profitability at the office and more learning opportunities for students at home.

Updated browsers also will be more secure, preventing more hackers from getting into your systems and stealing information they can use to take business and personal assets.

Keep in mind, too, that at some point, hanging on to old software or an old computer will put you past the point of diminishing economic returns. The investment in new technology – and new infrastructure for your networks, too – can pay for itself faster when you take advantage of all that technology can offer.

Contact us – 973-433-6676 or info@sterlingrosellc.com – to set up an appointment to evaluate your current technology, your needs and available options to make your systems more cost-effective. The solutions may be less expensive than you think.

This article was published in Technology Update, the monthly newsletter from Sterling Rose LLC.

Doing the Right Thing

Taking a few extra minutes early in the process of preparing a quote for new and existing clients saves hours of time and lots of money down the road. We believe it’s the right thing to do to serve you better. You depend on us to make sure your IT system delivers the performance and reliability you need to run your business.

For new clients, we always like to visit the site whenever possible to see what physical factors we need to account for in our proposals. We recently won a project to install a firewall for a VPN that was used for remote access by employees. We were the only IT company that went out to the facility to get the full picture and better understand how the company works.

Whether it’s for a new or existing client, more detailed information helps us all agree on the best solution. In this case, we were able to provide tighter security and easier access by creating environments for specific people in the organization.

When employees log in, the system puts them into the programs they need to do their work. When they log off or close the program they’re using, they go off the company’s system. And with limits to where each user can go, it prevents anyone from just browsing information they have no business seeing.

Just to add a quick note about security and system performance, one of the things we can determine during our fact-finding sessions is the best level of security for your business. Setting security too high, for example, might slow your sales force’s access to critical information, and that could slow your cash flow or cost a sale.

So, make time to talk to us and share the information that helps us serve you better. In the long run, you should be more efficient and more profitable. Email or call (973-433-6676) us for an assessment of your IT system and its capability to meet your business needs.

This article was published in Technology Update, the monthly newsletter from Sterling Rose LLC.