5 Ways To Keep Your Data Safe From Ransomware

5 Ways To Keep Your Data Safe From Ransomware

Ransomware is ending up being significantly popular. The term refers to a type of virus which holds your data captive for cash. This is how it works: you will get a notice that your data is encrypted, and in order to get it back not encrypted, you have to pay a specific amount for a tool that will do the decryption. Ransomware wasn’t an issue until a couple of years back as cash paid as ransom would have been easily traceable and hence the offenders would have been caught. However, with the arrival of digital currency such as Bitcoin, the appeal of this type of highway robbery became popular. Bitcoins are untraceable, which makes them ideal for ransomware. The only other technique which is untraceable is money itself, and it is easy to see why that isn’t really practical. Ransomware initially appeared in 2013 and differs from other types of viruses. The first difference is that it asks you for money rather than just causing monetary damage. Another difference is that ransomware is generally run by computer hack experts. When you pay the ransom, you will get the decryption tool despite the fact that the hackers could have easily run away with your money. The file encryption used is typically 128-bit or higher, which means there’s practically no chance for people to get their data back unless they pay up. Ideally you will have a backup, in which case you can restore the backup. If you do not have a backup, or if the backup is itself encrypted, then your only available option is to pay the hackers or...
Hurricane Season – Importance Of Recovery Planning

Hurricane Season – Importance Of Recovery Planning

In the Myrtle Beach area it is officially hurricane season. Although we have been lucky the last few years, every business should have a plan to protect their data in the event of a hurricane. Even though disasters can occur at any time, recovery planning often doesn’t cross the mind of business owners or individuals. Most just carry out their normal day to day routines, never aware of what could result from a disaster. Then, when disaster does strike, most tend to freak out and wonder just what they can do to fix the situation at hand. If you are prepared for a disaster or hard drive failure, then your business will be able to deal with anything that happens. Here are some steps to take: Step one – is to analyze your business or operations. You should determine how often your systems go down, and how you can manage operations without the equipment. You should also find out how long it would take you to fix the equipment, and what your business can do to make ends meet when the equipment is unavailable. Step two – identify the risks of possible disaster. This can include computer failure, loss of power, hardware problems, etc. You should always include the causes as well as the solution in your plans. If your office suffers from disaster and cannot be used for a period of time, you should always have another location that you can go to continue your business. Step three – have a dedicated team that will work on fixing any problems should a disaster occur. This team should be responsible for your recovery plan...
The Right Prescription for Your Phone!

The Right Prescription for Your Phone!

Does your SmartPhone or iPhone suffer from: Water Damage? Broken Screen? Broken Flip? Broken Antenna? No Signal? Do you need your phone unlocked? We name it – we have a prescription for it! You can save money with our new cell phone service instead of spending money on a new phone or worse yet – waiting nearly a month for the manufacturer to fix it.  Wouldn’t it be better to spend an average of $50 and have your cell phone fixed?  We service all models through all carriers: Nokia, Motorola, Samsung, LG, Siemens, Sanyo, Blackberry, Treo, Nextel, Sprint, Cingular, T-Mobile, US Cellular and all others! Call 843-488-4100 or stop by PCRx today and you will be back in business in not time! PCRx Computers 408 Main Street Conway, SC 29526 (843) 488-4100...
Password Management Is Like Budgeting

Password Management Is Like Budgeting

Editor’s Note: From time to time we ask an expert/professional to write a guest article for VSN. Such is the case this week when we asked our friend Ken Klein of Healthy Passwords fame and author of a book with the same name to pen an article on the ins and outs of passwords. Ken has done a really nice job on the subject, exclusively for you our VSN reader. healthypasswords.com Everyone is talking about how to make strong passwords lately. A recent article told readers ” ‘x!, ZTuLV5m4]9|82cK’ is a pretty good password, whereas ‘my1cat2co3coa4’ is not “. The author was in favor of using password managers for all password needs. Calling two long scary passwords “pretty good” supported the author’s affinity for password managers. The truth is, not all passwords have to be strong. Good password management is like budgeting. Your budget will fail if you don’t determine your inflows and outflows. A good password strategy begins with taking inventory of your sites categorized by risk level. Financial, tax preparation, dating, and medical sites are the highest risk sites. Depending on your comfort level, credit cards may fall between high and moderate risk because personal liability is typically lower with a credit card. Low risk sites hold no more than an email and a few sites settings. Every other site is moderate. After taking inventory, a strategy may be determined. There is no perfect strategy for everyone. Some people track hundreds of passwords and others have dozens. There are four good password management tools: Your brain and a system (formula approach). Commercial password managers. Password Scramblers (hashers)....
Anti-Virus Software

Anti-Virus Software

Anti-Virus software consists of programs on your computer that make an attempt to identify and keep computer viruses off your computer. The anti-virus software will most likely use a couple of different techniques to make sure the viruses stay off your computer. The software will start to scan all your files you have saved so that it can search for known viruses that will match definitions in a dictionary made only to detect a virus. Having anti-virus software will protect your computer from any virus an unknown person could give you. The software will identify suspicious behavior from any computer program that might show signs of infection. These analysis may also include data captures, port monitoring and other methods that you may or may not be familiar with. Almost all commercial anti-virus software use both of the following approaches, with an emphasis on the virus dictionary approach. The approaches are: The dictionary approach suspicious behavior third other approaches In case you’re wondering if we are talking about your computer or your children, we are definitely describing your computer although you may get a little laugh while reading this and thinking this computer is as bad as my children can be sometimes. At least for our computer we can get an anti-virus which will help solve a lot of the problems that can occur when you have a computer. Myrtle Beach Computers has talked about the dictionary approach; now let me explain what this is. If there is a piece of code in your file that matches any virus identified in the dictionary, then the anti-virus software can use one...