Trades Should Add Technology to Their Tool Belts

There are many hands-on trades that haven’t traditionally needed technology. Yet modern tech tools help the plumber, carpenter, welder, or other trade improve productivity and competitiveness.

There are certain common tasks tradespeople face daily:

  • scheduling appointments with clients, suppliers, or inspectors;
  • tracking project deadlines and budgets;
  • communicating with project managers, customers, trades, office administrators;
  • paying employee salaries;
  • invoicing and tracking payables, receivables.

These can all be done with pen and paper, sticky notes, and forms in triplicate, but technology cuts the time spent and lets you focus instead on increasing your bottom line.

The Difference Technology Tools Make

Most of us carry small, powerful computers around in our pockets every day, whether it’s a smartphone or a tablet. Internet-connected devices give tradespeople access to tools to enhance productivity.

Let’s start with scheduling apps, as tradespeople are often on the move throughout the day. Signing up for a scheduling tool (e.g. Doodle) makes it easier to set appointments, and you aren’t involved in the booking process. Customers simply go to your website or link to the app and choose an available time that works best for them. You can even set it up to ensure you have buffers between appointments or prevent someone from scheduling a new, big project to start at the end of your day.

Integrating the scheduling app with your website helps customers reach you. Also, connecting also to a shared cloud calendar can help your team work together better. Everyone invited into the calendar can see who is out on a call, and where.

You can make changes to a cloud-based calendar on any connected device. Others will see the alterations in real-time. This helps you avoid scheduling conflicts. You can set a follow-up meeting with an inspector while you’re out in the field. The office secretary sees your availability in real-time to set up a new customer visit.

Your Trade Office On the Move

With cloud-based office software also available online, you can get more done out of the office. You don’t have to make a trip back to the office to enter your invoice slips and make photocopies of receipts. Instead, take pictures on your phone or tablet, and attach them to the project file in the cloud, or invoice directly from a secure cloud-based processing site. You won’t have to worry about any paperwork getting lost in the back of a truck or bottom of a toolbox.

The Microsoft Office suite, Google Docs, and cloud storage are available from iOS and Android devices. This lets you monitor project timelines, view budgets, and track invoices and payments in the field. Cloud-based accounting packages let you see cashflow or outstanding balances, and pay contractors or suppliers on the spot.

Cloud-based software also gives every employee access to business tools in the office. With a virtual desktop, they can collaborate easily (out on a job or in the office) and make changes in real-time. For instance, a contractor could access software to edit a building plan, then actually see the new design in 3D modelling software.

The great news is that technology is ever more accessible and easy to use. Embracing modern digital tools can improve customer service and trade business efficiency.

Your skill set may not extend to technology, but that’s where we come in. We can help you find the right technology for your business needs. Contact us at  (416) 645-2469, (905) 667-0441 or email us.   

Want to be notified when our next blog is posted, sign up here.

Computer Cleaning for the New Year

The new year can mean resolutions and promises for a “new you.” One way to start this year feeling more in control is to clean up your computer. Follow these simple steps!

Tackle the inbox

We do a lot of shopping at the end of the year. Whether you shop online or in stores, you’re asked to provide your email address when you buy, which multiplies the number of mailing lists you’re on. Don’t start the new year deluged by unwanted newsletters and advertising emails.

The extra messages in your inbox distract you from the messages that matter. Instead of deleting every new unread message from “Let’s Make Cookies,” click on one and unsubscribe. Usually, there’s a link that lets you do this at the bottom of the email. If you’re a Gmail user, start your effort to cut down on unwanted mail in your Promotions tab. Google’s algorithm sends sales pitches here, so cut messages from this section first.

Clear bookmarks

The internet is built for browsing. We’ve all lost hours to clicking and linking in this vortex of information. “Wait. How did I end up here looking at kittens eating cupcakes?!” To make things easier, we’ll bookmark sites we visit often or put a page we want to return to on a reading list.

By the end of the year, we have marked many sites that we don’t even remember favoriting in the first place. “When was I interested in this?” Getting rid of any bookmarks for passing interests can help you navigate the Web better this year.

In Google Chrome, click on the three dots in the upper-right of your browser window (to the left of your profile icon). The drop-down menu will have a Bookmarks option. Click on this to see another drop-down menu with Bookmark Manager on it. On the next screen every one of your bookmarks will have three dots beside it. Click on this to select the delete option, and get rid of the ones you don’t need any longer.

Safari users can click on Bookmarks on the top menu or the sidebar icon on the tool bar (to the right of the arrows on the left). Then edit your bookmarks by clicking on sites you no longer want and hitting your delete button.

Sort through downloads

We also download a lot of stuff in a year. Sometimes, because we’re impatient or don’t realize we’ve already hit download, we get multiple copies of the same file! A full download folder takes up storage space on your computer and can slow your computer down.

On a Mac, go to the Finder and click on Downloads on the “Go” drop-down menu. You’ll find a folder filled with .pdfs, .docs, and .jpegs you long forgot about. Click on those you don’t need any more and drag them to your trash can.

On Windows, you can usually go to the “This PC” icon and then the “Downloads” Folder. Right-click on the files you don’t want, and choose “Delete.”

Empty trash/recycling bins

Items you put in the trash or recycling bins at home take up space until you take those bins to the curb or the dump, and the same is true of your computer trash or recycling. Empty these bins by selecting “empty trash” on your Mac Finder menu, or “empty recycle bin” after clicking on the bin icon in Windows 10.

Remove unused programs/apps – If you’re not using a program or app, don’t give it computer space. On a Mac, you can click on the icon for that program and drag it to the Trash. With Windows, you’ll open the Start menu, click on Settings, then System, then Apps and Features from the left pane to select what you want to uninstall. Click the uninstall button, and you’ve decluttered your computer that little bit more for the new year. If you need help with any of these streamlining measures, let us know. We can help! Call us at (416) 645-2469, (905) 667-0441 or email us.   

Want to be notified when our next blog is posted, sign up here.

equipment-failure

Your Equipment Fails – What’s Next?

equipment-failureYou invest heavily in information technology. You depend on your equipment to support your business. Then, the equipment fails. It’s inevitable. Only cockroaches survive forever. You’re left scrambling to find a replacement solution for essential tech. It’s a tough place to be, but it can also be an opportunity.

When you hear the news that a piece of equipment has failed, the headache starts soon after. It can mean costly downtime. You’re going to need to budget for a replacement. You have to spend time and effort determining the next, best solution. Users, and potentially customers, get frustrated, too.

If the equipment that’s conked out is a hard drive or server, don’t even reach for that headache remedy. Stop everything, and call for expert help. Anything you do can result in more data loss. This includes the age-old IT self-help remedy of turning it off and on again!

When anything carrying data fails, the next question is whether you have a recent backup. Can you restore data from that backup? We recommend you have as many as three data backups for safekeeping, with at least one of them kept off-site.

OK, it’s dead. Now what?

After the initial panic, once you’ve determined that technology is kaput, take some time to reassess.

Your decision-makers can start out by considering whether that equipment needs replacing. Don’t just do a knee-jerk rip and replace it. There may be better technology options or improved ways of doing what you were doing.

An on-site equipment failure is an opportunity to examine cloud technologies. The cloud is more than Software as a Service solutions giving users access to applications online. Infrastructure as a Service offerings quickly get up and running with new technology, and you gain access to enterprise-level infrastructure. Replacing hardware is no longer your problem. Plus, you’ll only pay for what you use and be able to scale up or down as needed.

There’s also less chance of data loss when working in the cloud. Cloud computing takes away the single-point-of-failure problem. Now, your data is available anywhere you have an internet connection. So, even if your desktop computer dies, you can still get into the same virtual desktop from another device. Cloud service providers build in redundancies, so data is not stored on a single server. This supports business continuity even after equipment failure or natural disasters.

Partnering with an MSP

Save yourself the stress of dealing with technology failures alone by partnering with a managed services provider (MSP). There are many advantages. First, we make sure you have a working data backup that’s tested for reliability and secure.

MSP experts also aim to detect potential failures before they happen. If a device needs replacing, we want to know before the last gasp of life. That helps ensure a smooth transition and helps level out the budget impact.

Further, MSPs know what’s involved in migrating technology to the cloud. We can help you weigh up the pros and cons, assessing what’s best for your individual business. Plus, we develop your migration strategy and provide ongoing support.

MSPs identify the best providers for your needs. We tailor our services to your business workload, regardless of company size. We make sure every business accesses the best technological tools. Unlike a software salesperson, we don’t enjoy selling you more than you need. We want you to have the best technology at all times and to help prevent issues before they happen.

Don’t wait for the death knell of your valuable IT equipment to sound. Partner with an MSP for peace of mind. Contact us at (416) 645-2469, (905) 667-0441 or email us.   

Want to be notified when our next blog is posted, sign up here.

back-up

A New Year’s Data Resolution To Stick To

back-upMany of us set goals, tasks, and challenges to tackle in the new year. Cleaning out the spare room, shopping around for the best energy deals, or exercising more than we did last year. We set these goals to improve our lives and build on productivity, health, and organization in the future.

Resolutions to improve for the coming year are great ideas to aspire towards; whether organizing your office, tidying your house, or taking control of your digital footprint. The problem for many is motivation can quickly fall away by the time February rolls around. If you manage to achieve only one of your new year goals for this year, make it to put a good backup in place for your digital files.

Storage failure, theft, accident, or natural disaster can impact at any time. Many of us put these possibilities to the back of our minds. We plan to organize our files ‘eventually’ and then never get around to it. It’s easy to think ‘it won’t happen to me’ or make creating a backup something that is always to be done tomorrow.

Replacing Old Valuables

Almost anything you own can be replaced one way or another. A broken laptop, tablet, or phone can easily be replaced with another model. Even credit card or financial details, if stolen or lost, can be cancelled and replaced by the bank in under a week.

Losing data, however, is far tougher to face. Without a safe backup, there’s no way to recover it once it is gone. Backups provide a service which could be described as the world’s best insurance policy.

While an insurer will often give you some, even most, of the value of the previous goods lost; data backup provides you with your exact data, precisely how you left it. It does this instantly, repeatedly, and without any additional charges or excess. In some instances, it is even automatic and done behind the scenes.

Recovering Irreplaceable Data

There are almost certainly old essays, browser bookmarks, and notes that you can comfortably live without. Equally, there are likely to be photographs, videos, and important documents that you couldn’t or should not part with.

For many, these files can be as valuable as the memories themselves: photographs of loved ones, long ago vacations, or milestone events in life. We commonly take critical data for granted; Assuming that because we can access it today, it will still be there tomorrow. This is unfortunately not always true.

These irreplaceable files are too important to keep in just a single place. Retaining only a single copy leaves your data vulnerable to luck and chance as to how long and if it survives.

Losing Data In An Instant

Data storage is liable to develop faults or failures at any time. Often a storage failure isn’t made apparent until the device fails to turn on or dies suddenly. These types of hardware failure become more and more likely as devices age.

Similarly, modern devices are more and more vulnerable to loss or theft as they get smaller and lighter. While criminals are not likely to be interested in your irreplaceable photographs and documents, they are vulnerable to being stolen along with the device they plan to sell. Whether lost through natural disaster such as flood or fire, misplaced by accident, or stolen by criminals; important files are truly painful to lose.

If you were to lose these files in an instant today, how much would you pay to end that stress and get them back again? Setting up a good backup is only a tiny fraction of the cost without any of the pain.

Backup For You

With the right backup solution, it doesn’t matter how many devices are lost or stolen. Even without a device or away from home, the data important to you can be kept safe and sound to be returned to you when you’re ready again.

Regular, consistent backups can even be made for you, automatic and in the background. Documents you create, photographs and video you take can be backed up and kept safe from the second they are captured or saved.

If you have travelled too long on borrowed luck, without putting a backup in place, give us a call at (416) 645-2469, (905) 667-0441 or email us to get set up with a robust and dependable backup solution for your data.

Want to be notified when our next blog is posted, sign up here.

bcc-nightmare-email

Do You Copy? What Can Go Wrong with BCC

bcc-nightmare-emailTry to find someone who has not “replied all” when meaning to send to only one individual. It’s embarrassing and can aggravate those people with more emails flooding their box. Another common email gaffe is misusing the CC and BCC fields in outgoing messages. This mistake can prove costly for business.

You’ll have noticed those extra fields below the “To” field in your email client. CC stands for carbon copy, and BCC for blind carbon copy.

When you use CC, it’s like you’ve imprinted your message on an old blue sheet of carbon paper. The email copy sends to your To recipients as well as anyone you have CC’d. All recipients can see who else you sent your message to. This is a great way to encourage collaboration and accountability.

When you use BCC, your To recipient and anyone else you BCC’d gets the email, but you’re not showing where you sent the message. This is for when you’re addressing a large group of contacts that may not know each other, or when you are sending a group message but you want to respect the privacy of all your recipients.

The Blind Carbon Copy Nightmare

A big problem is using To or CC when meaning to use BCC. You inadvertently expose all your contacts’ email addresses. Personal contact information needs protection, and people’s privacy demands respect. You don’t want to make this mistake with a single or a few emails, or worse still hundreds or thousands of emails.

There are many examples of BCC blunders. West Ham United Football Club faces the UK’s Information Commissioner’s Office fines for confirming all season ticket holders with email addresses in the CC field. In another example, the Independent Inquiry into Child Sexual Abuse was fined US$260,000 for exposing possible victims of child abuse in the same way.

Scotland’s National Health Service messaged transgender patients with their addresses in the To field. Instead of using BCC, the sender used an open distribution list. This shared 86 Glasgow patient email addresses and, perhaps, patient names and dates of birth when the addresses incorporated those details. You can bet there were some heated replies to that message, although the reports didn’t share whether they were “reply all” or not.

Also, the Sydney Morning Herald reported on a real estate company employee mistakenly CC’ing 300 customer emails. A customer complained. The error resulted in a six-figure aftermath. Lawyers, a consulting firm, and eight full-time employees worked on a data breach response plan for weeks.

What’s Better Than BCC

Any CC or BCC blunder could be a data breach. Take care. Don’t risk the loss of customer trust and possible compliance issues.

When you need to send out an email to a large group of people when you’re not necessarily expecting a response, use mailing software such as Mailchimp. Email marketing platforms send an individual copy of your message to every person on your mailing list, so there’s no risk of your contact list being exposed.

Need help setting up your email client or getting up to speed on an email marketing platform? We can help. Contact us today at (416) 645-2469, (905) 667-0441 or email us.   

Want to be notified when our next blog is posted, sign up here.

ransomware-email

7 Things You Need to Know About Ransomware

ransomware-emailRansomware is a well-named type of cyberattack. Cybercriminals taking this approach kidnap your data. After accessing your network, they encrypt files and demand payment for the passcode. Here are the top seven things you need to know about this business threat.

#1 It Can Happen to You

Cybercriminals rely on your false confidence. Don’t think “it won’t happen to me.” Attacks on government, education, healthcare, or financial institutions get publicity. Yet organizations of all types and sizes are targeted.

#2 Ransomware Spreads Fast

Ransomware is malware, malicious software that can reach throughout a network. So, if Jane from accounting opens a ransomware file, every single computer on your business network could be infected. The virus can spread between businesses, too. Consider the debilitating WannaCry ransomware attack of 2017. Within four days of its first detection in Europe, the strain had spread to 116 countries.

#3 Ransomware Targets People

A common method to send out phishing emails in the hope of having people enter their access credentials. Targeted business communication emails work, too. The attacker gets to know your business first. Then they send an email impersonating a colleague, supplier, or customer asking you to take action or update contact details by clicking on the link or downloading a file.

#4 Ransomware is Costly

Once the ransomware is installed on your system, it locks down your files. To regain access to the files, you need the password or decryption key the attacker supplies when you pay up; that’s if they keep their end of the bargain once you pay the ransom. These are crooks you’re dealing with after all!

In Coveware’s analysis of Q3 2019, the average ransom payment increased by 13% to $41,198 as compared to $36,295 in Q2 of 2019. And that’s just the cost of the ransom. Indirect costs include the cost of downtime, lost revenue, and long-term brand damage. There’s also the expense of removing the ransomware, forensic analysis, and rebuilding systems.

The average ransomware attack in Q3 2019 resulted in 12.1 days of downtime. – Coveware

#5 Ransom Requires Cryptocurrency

Ransom payment is usually made by bitcoin or another cryptocurrency. Your business needs to buy cryptocurrency with actual cash, then transmit the ransom. They choose cryptocurrency because it’s very difficult to trace. It doesn’t help you that bitcoin is not something you can charge back like a credit card.

#6 A Recovery Plan Helps

Planning in advance can help you respond more reasonably. Document plans to disconnect infected computers from the network as soon as possible. Also, power down any machines that could be vulnerable to avoid spreading contagion.

You should also discuss in advance whether or not your business will pay a ransom. Weighing the costs and benefits without a deadline on the decision can help you react more strategically.

#7 You Can Take Action

You don’t have to sit around worrying and waiting for a ransomware attack. There are many things you can do to help prevent this type of attack:

  • Filter traffic, preventing it from coming into your network in the first place.
  • Scan inbound emails for known threats, and block certain attachment types.
  • Use antivirus and anti-spam solutions and regularly upgrade and patch vulnerable software.
  • Educate all users about social engineering.
  • Allow remote access to your network only from secure virtual private networks.
  • Back up your data to more than one location so that you can restore any impacted files from a known source.

Ransomware is a lucrative, relatively easy mode of attack for cybercriminals. They could target your business. Contact us today for help implementing the best protection practices to keep your data safe. Call us at (416) 645-2469, (905) 667-0441 or email us.   

Want to be notified when our next blog is posted, sign up here.

abandoned-domainsemail

Don’t Let Crooks Hijack Your Domain

abandoned-domainsemailDoing business today you are as likely to give out your website address as your email or phone number. Your Web domain is your business identity on the internet. Don’t risk falling victim to the cyberthreat known as domain hijacking.

You build up a business site to represent your brand online. Every bit of content, and all the fonts and images you selected, reflect your business. You probably also have email addresses at the domain name (e.g. sales@yourbusinessname.com). So, imagine the pain of finding out that someone else has stolen your domain.

When your domain gets hijacked, you lose control of your website, its email addresses, and all associated accounts. And it’s not easy to recover them.

The Infosec Institute shares examples:

An advertising agency spent US$15,000 and 19 months recovering its stolen domain.

The owner of ShadeDaddy.com lost US$50,000 and had to lay off six of its eight employees. He said domain name theft is “like your house got stolen.”

How does a domain get stolen?

There are several ways this can happen to a business or individual.

The simplest is that your domain name expires, and you don’t know it. Domain registrars must send notice one month and one week before the domain expires. But the reminders might go to an email address that is no longer active or to the Web company that set your site up years ago and with whom you no longer communicate.

Once your domain rights lapse, the site gets disabled. After that, the domain name goes back into a pool of domain names for anyone to buy.

There are people who make money from purchasing domains. They hope to make money off your company’s desperation to get its domain back. Or they profit from redirecting traffic from your reputable Web address to their own.

Then there are the hijackers. These cybercriminals also want to profit from Web traffic redirects or to access your domain emails to send false invoices. They might intercept emails sent to your domain to learn proprietary information. They could change the content on your site or redirect traffic to a hub for online gambling, or worse.

The hijackers might steal your domain by gaining access to the email account you used to set up the domain. Cybercriminals might use phishing emails to obtain the access credentials. They use the password reset mechanism to take over your account and transfer the domain to a different registrar.

Your domain registration company could be compromised, too. It helps to pick an accredited registrar for your domain registration.

Any of these scenarios can have a serious, lasting impact on your business. Once someone else has access to your domain address they can do whatever they want with it.

Protect Against Domain Hijacking

The first step is to protect your access credentials. Leveraging two-factor authentication can also help prevent hijackers from stealing your domain. A registry lock can also help. It requires more communication if someone tries to change domain registration. This lets you know of suspicious activity and gives you some time to react.

It’s also important to know who is managing your domain name and how it is being managed. A Managed Service Provider can take care of this ongoing process for your business. Reach out to our Web experts today! Call us at (416) 645-2469, (905) 667-0441 or email us.   

Want to be notified when our next blog is posted, sign up here.

“So Slow!” Is it your Computer or your Internet Connection?

“Why is this computer running so slow?” It’s a common complaint. The question is whether it’s your computer or your internet connection.

You may feel your computer is moving at a snail’s pace, but it used to be cheetah-fast! You’re going to want to identify and address the issue to get back up to speed. Yet it’s hard to know whether to blame your computer or the internet, especially now that so many computer applications rely on internet connectivity.

So, how do you determine whether it’s your computer or connectivity that’s the problem? If you are having the problem only on one device in a network, you can guess it’s the computer not the connectivity. Otherwise, think about when you are having slow woes.

If you notice programs are taking longer to load up, your computer may not be up to the task. Running large applications such as Adobe Photoshop, Microsoft Office, or some accounting packages can cause slowdowns. The hardware may be overwhelmed. You may not have enough available storage space. Sometimes your computer’s parts are simply too old and not fast enough.

Even a new computer could be the problem if it’s an inexpensive one. Or perhaps you didn’t get enough random access memory (RAM). Your computer needs RAM to run applications or games; it’s the short-term memory of the computer. This is where the computer loads all the things it thinks it might need soon so that it can process them quickly. Without enough available RAM, the computer has to work harder (and slower) to get the results you want.

No wonder common advice for people dealing with slow computers is to invest in more RAM. If your device is less than five years old, you can often upgrade the RAM inexpensively, or switch to a solid-state drive (SSD). An SSD reads and writes differently than a traditional hard drive, which allows it to access information faster.

Meanwhile, buying a replacement computer may be the answer if your device is more than five years old.

Then Again, Maybe It’s the Internet Connection

On the other hand, you might notice computer slowness when online. Web pages might be slow to load, or you might be waiting ages to access YouTube videos.

If the lag is happening on only one website, it could be that site’s problem. Otherwise, internet slowness could be a provider problem. Or you might have a poor connection.

One way to confirm a connection issue is to check your internet speed. A site such as fast.com or speedtest.net can measure your speed, then you can compare it against the connection speed you’re paying for. Don’t know that? Check your service bill. You may have a slow internet speed plan. Maybe you haven’t changed it in years but have added many more devices. In that case, you’ll want to call your service provider about an upgrade… or confiscate the kid’s devices when you want to stream a favorite show.

When testing, you are looking for a speed of at least 10 Mbps. Anything below that, and you’ll start seeing slowdowns and start hearing the complaints from all corners of the house. To put that in perspective, Netflix needs at least 5 Mbps to stream in HD.

Other Tidbits to Tackle Slowness

You might also try rebooting your computer or your modem and router. If you leave these running all the time, never actually turning them off, they can get stuck in a slow rut.

If you’re on Wi-Fi, that could also be the root of your problem. Maybe you’re on a network with too many users making demands. For instance, if everyone in your family is streaming on their devices, expect a slowdown. You might be in a signal dead zone. In that case, you could look into a Wi-Fi mesh network.

Ultimately, there are many reasons for a slow computer or internet connection. Don’t get stuck with a tortoise of technology. A managed services provider can find the root cause and get you running faster. Contact us today at (416) 645-2469, (905) 667-0441 or email us.   

Want to be notified when our next blog is posted, sign up here.

The Trouble with Trusting Your Online Friends

Trust is the foundation of a good relationship – you trust friends to be loyal, sincere, and honest. But when you blindly trust online friends, you could be opening yourself up to cyberattack.

When you hear about a big data breach on the news, you may think you don’t need to worry. You may think, “I don’t do business with that company, so the crooks can’t steal my identity.” Or “my email address and password weren’t involved, so it’s not my problem.” Yet it could be.

One of your friends or family members’ personally identifying information may be hacked. Then, cybercriminals could use that as a stepping stone to get to you.

Think you’re safe when you interact with friends and family on Facebook or Instagram? Those aren’t the sites breached! Again, think twice.

Many people reuse their username and password on more than one site. Imagine the bad guys get hold of an individual’s credentials from a malware attack on a major retailer, or they buy that person’s credentials for a banking site on the Dark Web after a breach. The crooks might try the credentials on those sites to see if they can gain access, but they are also likely to try those same credentials on other sites, too.

What to Watch Out for Among Friends/Family

Hackers prey on our impulse to trust others. They have greater odds of success impersonating a Facebook friend asking for help. If a Nigerian prince emails out of the blue and asks for money, most of us know by now to delete the message immediately. But if Aunt Peggie does the same thing via Facebook, you’re more likely to fall for it.

The same thing happens with malicious content. We all know not to click on attachments from people we don’t know and trust. After hacking a social media account, cybercriminals email all that person’s friends. They might say something appealing such as, “you’ve got to check out this latest hilarious video of my son!” We want to see our friend’s son being funny, so we click, and the trouble starts.

One more note: be wary of whom you accept into your “friends” circle online. Adding your niece’s best friend or your work colleague’s husband may seem like a good idea, but, that’s one more possible vulnerability.

Impersonations of people you trust aren’t only happening on social media. You might get emails that appear to be from companies you trust, vendors you know, or work colleagues. For instance, you might get an invoice from your housekeeping service. It looks like usual, with the same services listed, but the banking details are different. If you don’t catch on, you’ll be paying the crooks instead of your cleaners.

Or you might get an email from a “co-worker” asking you to remind them of a password or account number. It seems like a simple request from someone who can afford to be casual about security with you. But don’t fall for a “hey, what was that password again?” request.

Another area of daily life that cybercriminals target is online selling sites such as eBay. They might hack an account with solid feedback to post items for sale. They’ll accept your payment but never deliver the goods.

Ultimately, don’t rely on that browser lock suggesting a site is secure or the fact that you already know so and so. You may not be actually dealing with that individual. Always confirm, using another method of communication, before sending sensitive info or money.

A managed services provider can help you secure online interactions and home computing networks. Want to learn more? Contact us today at (416) 645-2469, (905) 667-0441 or email us.   

Want to be notified when our next blog is posted, sign up here.

What is a Firewall, and Why Does It Matter?

Hearing “firewall” in the context of computing can be confusing. How does a tall, blazing fire separating rescue teams from people trapped apply to computers?

Well, imagine the rescue team using heavy blasts of water to save the day. A hacker is as motivated to get at your data. They will try everything to bypass your security. They want to get inside your network perimeter. In a business office, computers and printers are often networked together. This lets Jane in accounting and Kevin in graphic design access the same business tools.

In computing, a firewall sits between that internal network and the internet outside. It’s kind of like a nightclub bouncer. You definitely want it to be as burly and intimidating as possible to keep the riff-raff out. The firewall helps reduce or prevent unwanted traffic from getting through.

The Packet Filtering Firewall Approach

Your firewall can be hardware, software, or both. A packet-filter firewall monitors and controls network traffic. It filters data entering the network according to predetermined rules. IT experts set up a firewall to examine small amounts of data (called “packets”) to see if they contain threats. It checks packet data against criteria such as allowed IP addresses and packet type. If the data is suspect, the firewall stops those packets. If not, the data will continue on to its destination.

Firewalls stop certain software from sending and receiving data to and from the internet. This reduces the number of entry points for viruses or illegitimate traffic. After all, a club wouldn’t want to hire the bouncers to cover seven different doors.

A firewall also monitors outgoing traffic. Why’s that? Because an infected computer in your network could be sending out malicious information. If your company has fallen victim to a malware attack that turns a computer into a bot, it might be “phoning home.”

Unlike E.T. trying to get back to the safety of his home planet, the malware is checking in with its Zombie master. It’s helping to strengthen the bad guy’s ability to attack victims.

Firewalls can help prevent denial-of-service (DoS) attacks. In a DoS incident, thousands of computers are used to send an overwhelming amount of traffic to a network. It’s like putting 10,000 people in an elevator with an occupancy limit of 20 – expect a crash.

One famous 2016 attack seriously disrupted Amazon, Visa, PayPal, Netflix, AirBnB, and more.

Other Types of Firewall

Packet-filtering firewalls aren’t your only option. Stateful inspection is helping to make firewalls even smarter. These check where the packet came from, where it is going, and what application requested it. This end-to-end examination is more rigorous. All the parameters must match trusted information for the packet to pass through. This approach offers a smart, fast way to inspect for unauthorized traffic.

When setting up any firewall, it is important to avoid any unintentional openings. A hole in a chainlink fence renders perimeter security useless. A hole in a firewall leaves your network vulnerable.

Need help deciding on the right type of firewall for your business? Want to be sure your firewalls are going to withstand attack?

Our experts can help set up and test your firewalls. Contact us today at (416) 645-2469, (905) 667-0441 or email us.   

Want to be notified when our next blog is posted, sign up here.