Tips For Improving Your Computer Security

Tips For Improving Your Computer Security

Nowadays, increasing numbers of people are utilizing their computers for to do lots of things ranging from communication to internet banking as well as from trading to online shopping. While we carry out all these things more often, we open ourselves to probable online criminals like hackers and crackers. Even though a few might be wanting to phish your personal identity and pertinent details for selling, others would just like to use your computer as a channel where they can launch a cyber attack on their other targets. Provided here are some simple and affordable methods that you can use to secure your computer. 1. Always create backup copies of valuable information. You should also keep them in a secure place that is not on your computer. 2. Make sure that your operating system, software, and web browsers are updated. Upon startup, computer system must inform you in case updates are available. Because of this, it is highly recommended to regularly turn off your computer and reboot it. 3. Set up a firewall. Keep in mind that your computer will be more vulnerable to worms, viruses, malware, trojans, and adwares if it does not have a reliable firewall installed. You should take into account the advantages as well as the differences between software and hardware based firewall applications. 4. Make sure that your browser and email settings are secured. Why do you have to do this? JavaScript and Active-X are the favorite tool of hackers when placing noxious applications in your computers. Although relatively harmless, cookies still track your activities in the internet, which can aid in building your...
The Battle Against Spam

The Battle Against Spam

Let us take a quick look at the prevalence of spam as explained by Scott McAdams, OMA Public Affairs and Communications Department (www.oma.org): “Researches show unwanted or “junk” e-mail, called spam, represent approximately half of all e-mail messages received. Although it was previously perceived as nothing more than a nuisance, the prevalence of spam has reached a point where numerous users have started to express doubt about the efficiency of e-mail transmissions, and increased concerns regarding the circulation and spread of computer viruses through unwanted messages.” In 2003, President Bush authorized the bill known as “Can Spam,” in December of 2003, which is the very first nationwide standards that focus on bulk unsolicited business e-mail. The Senate, which voted 97 to 0, approved the bill that, bans senders of unsolicited commercial e-mail from making use of false return addresses to camouflage their identification (spoofing) and using dictionaries to produce such mailers. Additionally, it forbids the use of misguiding subject lines and mandates emails to have an opt-out option. The regulations likewise prohibit senders from harvesting addresses off websites. Those who violate these rules will be charged with misdemeanor and could be imprisoned for 1 year. One major factor that needs to be reviewed concerning this: spam is now originating from various other countries in ever-greater numbers. These e-mails are harder to combat, since they originate from outside our nation’s laws and policies. Due to the fact that the Internet opens boundaries and also thinks globally, these legislations are good but they fail to address the problem. So, what is your opinion? Here are the five key tips to protect...
Phishing For Your Identity

Phishing For Your Identity

We have all received those emails that look like they are coming from trusted websites. Emails that direct you to a website that looks familiar to update certain information, even personal data. Beware when these sites are asking you to update secure information such as social security numbers, passwords or even credit card numbers or bank information.   What makes these emails so trusted is that you know the business name as one where you have done business in the past. The logo, colors and look and feel of the site look so familiar. One of the most recent examples is your domain name registrar that says your domain is about to expire. Or your hosting company that says you have run out of hosting space and your website will be taken down if you don’t update your information.   There is a website called WhoIs.com that will give anyone who searches all the details about a domain – where it is registered, who owns it, the address, both email and physical, of the owner and where it is hosted. I was recently introduced to a “scraper” that will create a spreadsheet of all this information for as many websites as you put into the program. Right there at their fingertips is all the information a hacker needs. (More information later on how to protect this.)   You are tempted to click on the link provided because it is so convenient and then when you do it is natural to want to correct false information. Much to your regret you find out later this was a false website that...
Summer Guide to Cyber Safety Part 2

Summer Guide to Cyber Safety Part 2

Today we will discuss if you really have to stay connected while on vacation. In our previous article we recommended you stay away from public computers such as those in hotels and Internet Cafés. But sometimes that is easier said than done so here is a short guide to Going Online in Public. First and foremost of all if you have the least amount of concern regarding the computer you are using DO NOT use it to access sensitive sites like banking, brokerage, etc. This is obviously a judgment call and you best use your good judgment here. You just don’t want to use a compromised computer. If you log onto an information sensitive web site, be sure to logout when you have completed your cycle. Do the following Log out delete the web history close the browser when you are done. This is important –  you don’t want any sensitive data stuck in the cache or in any way accessible. If you would like to increase your cyber browsing security you can install a portable version of Firefox on a USB drive and load the browser directly from it instead of the computer. This would increase your cyber security. Backup and Encrypt your data so even the snoopers cannot find their way. Use only the strongest of passcodes or phrases. Of course keep your Anti-Virus up to date. When you return from traveling, it is a good idea to stop by your local computer experts at PCRx and have them do a complete scan of your laptop.  This only takes a few minutes and can save you hours...
Summer Guide to Cyber Safety

Summer Guide to Cyber Safety

The summertime is here in full force – tourists, vacations, travel for fun and business. Most of us will hit the road sometime this summer.  With all the devices that travel with us to stay connected from laptops to iPads to SmartPhones, we are more than ever at risk to a security breach. Some of this risk is harmless and others will cause you to need serious computer repair. Hackers love to take advantage of unaware travelers and we need to stay sharp.  Keep in mind that hotels, airports and other WIFI networks are hostile territory and we need to have our defenses up for cyber safety. Here are a few tips from Myrtle Beach Computer Repair Common Sense Check – you have all heard the saying “If it looks to be good to be true, it probably isn’t true.”  This philosophy holds true in the cyber world as well as in the real world.  If your summer vacation to Washington DC offers a personal meeting with the president, chances are it won’t happen.  Do your homework on any offer and make sure that the company that stands behind the offer has a good reputation.  Look for any hidden charges or requests for information that is not necessary for the transaction.  Check with the International Air Transportation Association or the Better Business Bureau to ensure cyber safety. Unbelievable Coupon Deals – there are reputable social media sites such as Groupon or Living Social that offer great deals.  However, many sites have taken on the “look and feel” of a legitimate site and are there to simply scam you, install...
What Is Phishing And How To Protect Your Computer

What Is Phishing And How To Protect Your Computer

The best holiday gift we can give is to always make sure that your computer is fully backed up.  No matter how cautious you are online, you are still open to a cyber security threat.  Call us today and ask about our backup plans. Phishing attacks are also rampant and one of the major cyber threats to any company today. So, you need to be highly aware and vigilant of these as well. Phishing usually involves hackers making use of fake emails to trick you into sharing important personal data such as your social security number or perhaps your credit card number and online accounts and passwords. What are the ways that these Phishers can attack you in the cyber space? Through the use of fake emails. Phishers can make use of the identity of established and reputable companies such as online banks, retailers or credit card companies to send out fake emails to individuals and organizations. Emails of this nature usually contain links that are fake but highly similar to the actual online website of that company they are representing. The moment you put in your account information and log ins to those websites, the information can already become available to the phishers who tricked you into sharing your important data. Through the so-called keystroke programs. Phishers will still employ fake emails that contain links that will then install programs on your computer without your knowledge and permission. These programs have the ability to record every keystroke typed by the computer owner. Information like usernames, passwords, account numbers, credit card numbers could then become available to phishers. Hijacking...