What Is Phishing And How To Protect Your Computer

What Is Phishing And How To Protect Your Computer

The best holiday gift we can give is to always make sure that your computer is fully backed up.  No matter how cautious you are online, you are still open to a cyber security threat.  Call us today and ask about our backup plans. Phishing attacks are also rampant and one of the major cyber threats to any company today. So, you need to be highly aware and vigilant of these as well. Phishing usually involves hackers making use of fake emails to trick you into sharing important personal data such as your social security number or perhaps your credit card number and online accounts and passwords. What are the ways that these Phishers can attack you in the cyber space? Through the use of fake emails. Phishers can make use of the identity of established and reputable companies such as online banks, retailers or credit card companies to send out fake emails to individuals and organizations. Emails of this nature usually contain links that are fake but highly similar to the actual online website of that company they are representing. The moment you put in your account information and log ins to those websites, the information can already become available to the phishers who tricked you into sharing your important data. Through the so-called keystroke programs. Phishers will still employ fake emails that contain links that will then install programs on your computer without your knowledge and permission. These programs have the ability to record every keystroke typed by the computer owner. Information like usernames, passwords, account numbers, credit card numbers could then become available to phishers. Hijacking...
The What, Who, Where and Why of Spam

The What, Who, Where and Why of Spam

Spam – Can You Avoid It? If you have been watching our Facebook page, you know that we have been trying to keep you posted on spam emails that are harmful to your computer. At one time, spam was nothing more than clutter in your inbox, however, now it is commonly used as a way to commit electronic crime and even corporate espionage.  We have develop the 4 Ws of spam to answer the questions we get asked most often. What is Spam? Often referred to as junk email, it is defined by internet fraud detectors as unsolicited commercial email.  This is email that is sent out in bulk to a vast number of people who never requested email from the sender.  These emails can range from simple advertisements to a program that is designed to hijack your system and to cause damage to your computer. Some of the most common spam commercial advertisers are for: Pyramid schemes Pornographic websites Mortgage loans Chain letters Credit repair Fraudulent pharmaceuticals Software that has been stolen or pirated The more dangerous forms of spam include viruses that will infect your computer, what is called a Trojan horse than will take over your email program and then proceed to send spam to your friends and phishing scams whose intent is to obtain financial and personal information. Who Spams? People responsible for spam are referred to as “Spammers.”  There are actually two types of spammers. Honest spammers – these are people who have complied with all anti-spam laws and actually have the consent of the recipient to receive the email. These are businesses who...
Is Your Computer Slowing You Down?

Is Your Computer Slowing You Down?

Whether you use a computer for pleasure or for work, you still need for it to perform as fast as it can. If your computer is not living up to its potential and you are struggling with a slow computer, then you are wasting time and you need to take a look at how you can up the speed. We need to ask a few questions before we can discuss the underlying cause of a computer running slow. Questions To Ask Before Making Changes To A Slow Computer Has it been a slow computer from the day you plugged it in? Did your computer slow down suddenly or over time? Is your computer less efficient when you are on the web? Does this apply when you are on a wireless connection? How about when you play games? Do you notice that you have a slow computer when you are multi-tasking? Does your computer gain some speed after you re-start you computer? Things To Check On A Slow Computer If you can answer these questions regarding your slow computer then you can narrow down the problem and it becomes easier to fix the issue.  If you computer has been slow from the beginning, then there is a good possibility that you did not purchase enough processing speed.  This is why it is a good idea to access your needs before you purchase a new or used computer. If you find that your system is slowing down when playing games, you probably are in need of an upgraded graphics card and/or more memory.  However, if you find that being on the...
Tips On Computer Maintenance

Tips On Computer Maintenance

Think of the maintenance on your computer the same way you think about maintenance on your home.  There are things you do daily, weekly, monthly and quarterly.   When you house is in order and everything is in order and the clutter is put away, you have a more pleasant place to live.  The same is true for your computer if you want to prevent computer repair. If you have a business with multiple computer stations, you may want to consider hiring a professional to manage your computer maintenance on an on-going basis.  In the Myrtle Beach area, you will want to contact PCRx computer for a computer maintenance contract. Tips For General Computer Maintenance Keep all of your work files in one area.  This is the primary concept behind the My Documents folder on a windows operating system.  You will want to create sub-folders based on specific topics.  You will be amazed at how much time is saved when you don’t have to go searching for a file. This will also make backing up your data easier. Do not store your personal files at the root or top level of your computer.  We suggest that you use the File/Save As command when saving the file even on the first save.  This will force you to pay attention to where the file is being stored.  Many times just clicking on the “Save” button will put the file at the root level.  One of the problems with a large number of files at the root level is that you could corrupt the disk and you will receive a “NTLDR is missing”...
5 Ways To Keep Your Data Safe From Ransomware

5 Ways To Keep Your Data Safe From Ransomware

Ransomware is ending up being significantly popular. The term refers to a type of virus which holds your data captive for cash. This is how it works: you will get a notice that your data is encrypted, and in order to get it back not encrypted, you have to pay a specific amount for a tool that will do the decryption. Ransomware wasn’t an issue until a couple of years back as cash paid as ransom would have been easily traceable and hence the offenders would have been caught. However, with the arrival of digital currency such as Bitcoin, the appeal of this type of highway robbery became popular. Bitcoins are untraceable, which makes them ideal for ransomware. The only other technique which is untraceable is money itself, and it is easy to see why that isn’t really practical. Ransomware initially appeared in 2013 and differs from other types of viruses. The first difference is that it asks you for money rather than just causing monetary damage. Another difference is that ransomware is generally run by computer hack experts. When you pay the ransom, you will get the decryption tool despite the fact that the hackers could have easily run away with your money. The file encryption used is typically 128-bit or higher, which means there’s practically no chance for people to get their data back unless they pay up. Ideally you will have a backup, in which case you can restore the backup. If you do not have a backup, or if the backup is itself encrypted, then your only available option is to pay the hackers or...
Hurricane Season – Importance Of Recovery Planning

Hurricane Season – Importance Of Recovery Planning

In the Myrtle Beach area it is officially hurricane season. Although we have been lucky the last few years, every business should have a plan to protect their data in the event of a hurricane. Even though disasters can occur at any time, recovery planning often doesn’t cross the mind of business owners or individuals. Most just carry out their normal day to day routines, never aware of what could result from a disaster. Then, when disaster does strike, most tend to freak out and wonder just what they can do to fix the situation at hand. If you are prepared for a disaster or hard drive failure, then your business will be able to deal with anything that happens. Here are some steps to take: Step one – is to analyze your business or operations. You should determine how often your systems go down, and how you can manage operations without the equipment. You should also find out how long it would take you to fix the equipment, and what your business can do to make ends meet when the equipment is unavailable. Step two – identify the risks of possible disaster. This can include computer failure, loss of power, hardware problems, etc. You should always include the causes as well as the solution in your plans. If your office suffers from disaster and cannot be used for a period of time, you should always have another location that you can go to continue your business. Step three – have a dedicated team that will work on fixing any problems should a disaster occur. This team should be responsible for your recovery plan...