Why Your Business Needs Unified Threat Management

Why Your Business Needs Unified Threat ManagementSounds scary doesn’t it? Almost like a swat team dressed in black is going to swing in and start yelling orders. While just as effective at disabling the bad guys, Unified Threat Management (UTM) is a special kind of IT solution focused on proactive protection. Consider it more like a team of virtual bodyguards that stand at the door between your business and the internet, keeping trouble out while your legitimate traffic can come and go normally.

With the increasing number of connected devices in your business network and the different ways your employees now connect, it’s more important than ever to set up dedicated security systems that give integrated protection. UTM is a series of solutions that work together, simultaneously layering your protection across the board. We’ll cover the four main inclusions here, and exactly what they can do for your business.

Robust Firewall

Put simply, a firewall keeps an eye on all the data coming in and out, looking for anything abnormal. While every home PC comes with a software firewall built in, those ones pale in comparison to what a UTM firewall can do. Remember the team of virtual bodyguards? Imagine the home firewall asking nicely if the data should be doing that, while the UTM slams the data to the ground and demands credentials. It exists to make sure the data entering your network is safe, that it’s not part of a cyber-attack, and that in the rare event your network becomes infected, your servers aren’t being used to attack another business.

Anti-virus Where it Matters

With so much new malware being released daily, it’s easy to fall behind in updates and discover you’ve been infected. Your employees are likely doing their best, but manually scanning each file can be exhausting and time-consuming. Your UTM anti-virus is built into the firewall, ensuring known or suspicious malware is stopped at the door. It doesn’t even make it through to your employees, so the risk is removed. Clearly that’s the best outcome possible and will allow your employees to work at maximum efficiency, while you can run your business with confidence.

Spam Blocking

Most cyber-attacks come via email these days, with either an attachment or a link. Once clicked, the malware is released into the network to wreak havoc. Obviously, your employees are smart enough not to open random attachments/links, so hackers use phishing emails. These are emails that look legitimate and may refer to vendors you use, financial services you have accounts with, or even seem to be from other employees. Your UTM isn’t falling for any of those disguises, it strips down each email and checks it against high-tech legitimacy markers. If it sees anything suspicious, the email is marked as spam and either held for review or bounced away.

Your employees never see the attack, so they can’t accidentally fall for it. While the UTM is monitoring for phishing/fake emails, it’s also culling out the general spam that clogs up inboxes. Employees will no longer have to spend precious minutes each day wading through the junk, and the likelihood of missing an important customer email has greatly dropped.

Content Filtering

In a perfect world, your employees would only access work-related sites and do work-related things online. Content filtering can help you limit the risk they’re bringing into your business via these websites. Your UTM can be set to restrict sites that infect computers, such as adult content, gambling or illegal downloads. It can also be used to restrict access to productivity vampires like Facebook or Pinterest, either during work hours or completely. It’s up to your policies how much you’d like to filter and whether to add any flexibility. Some businesses allow social media during lunch breaks or have special reward hours each week. Simple tweaks like this can increase productivity overnight and give you the security you’re looking for.

You can see how a layered security solution like UTM provides a space for your business to thrive, where systems are secure, employees are able to maintain efficiency, and cyber problems stay outside the doors. The way the layers work together is more effective than a patchwork of separate systems, and a UTM is much easier to configure and maintain.

We can find the right UTM solution for your business. Call us today at (416) 645-2469, (905) 667-0441 or email us!

Should You Let an Amateur Loose on Your Network?

Most of us know a fair amount about computers, even kids are joining circuits and coding programs in schools – but that does that make everyone an IT expert? It’s fair to say almost all workplaces have that employee who can finesse the printer or use shortcuts nobody else knows about. They have skills, absolutely, but they often know just enough to be dangerous to your business.

Hobby IT skills are learned on home computers which are very different to a professional business setup. When something goes wrong on a home computer, there’s no drastic impact if parts need to be replaced, data is lost or it stays down for a week or two. In a business setting, every problem costs time and money, usually creating a domino effect through the entire network. Would you gamble the success of your business with a non-professional who did a quick Google? It’s unlikely you’d let someone be your lawyer purely because they can deliver a stubborn argument, nor would you let someone perform surgery just because it looked easy on TV. Businesses have unique, specialist IT needs that go beyond amateur computer skills and there’s always going to be more at stake.

Designing and implementing a custom backup plan for your business is a particularly interesting area. While most home users skip this part entirely, an IT professional has seen (and recovered) all manner of situations and will use that knowledge to ensure that if the worst happens, your business is covered. This could mean anything from having a complete copy of your drive stored securely in the cloud or drilling down to backup only the most important data. An IT expert is equipped to help you identify the value in each piece of data and implement a plan so robust that if your business is ever hit by disaster or breach, downtime is minimal – along with losses.

If a disaster ever does occur, like fire, flood or theft, would an amateur know what to do? Who to call? These situations are so charged with tension and panic that making the wrong moves can lead to more damage. A professional helps design continuity/disaster plans, which map out exactly what should happen, who should do it and in what order. It takes out the guesswork and minimizes downtime. Perhaps more importantly, the expertly written disaster plan will include a complete risk analysis so that you know in advance where to strengthen your protection. It also includes a business analysis so you know which systems are dependent so you can stop the domino effect, plus know the legal/contractual impacts, financial impacts and so on.

Your IT professional will also help ensure your business is meeting any regulatory requirements. Many businesses are subject to strict data rules set by government bodies, such as FISMA and HIPAA. The regulations change often and demand increasingly more attention to data security, with hefty penalties for businesses that fall behind. Professionals are constantly in the loop around upcoming revisions and how best to comply with little to no disruption to your daily business. Part of ensuring your business is safe means staying on top of software updates and patching multiple computers at the same time.

The best option is to run the updates before employees arrive for the day, and since the process can take a few hours and be quite fiddly, it’s generally not something amateurs will prioritize. Unfortunately, as we’ve seen with recent cyber-attacks, delaying a security update by even a few days can lead to disaster. Engaging an IT professional is a cost-effective solution that keeps your business running, growing and earning.

Let the professionals manage your tech the right way by calling us at (416) 645-2469, (905) 667-0441 or email us.

Fake Invoice Attacks Are on the Rise – Here’s How to Spot (and Beat) Them

Businesses around the world are being struck with a cyber-attack that sends victims a fake invoice that looks real enough to fool to most employees. It’s an old scam that used to see bills faxed or mailed in, but it’s made its way into the digital world and instances are on the rise.

Chances are you’ve already seen some of the less effective attempts, like an email advising your domain is expiring, except it’s not from your host and your domain is nowhere near expiration. These new attacks are more advanced, in that they look completely legitimate and are often from contractors/suppliers you actually use. Logos are correct, spelling and grammar are spot on, and they might even refer to actual work or invoice numbers. The sender name may also be the normal contact you’d associate with that business, or even a co-worker, as cybercriminals are able to effectively ‘spoof’ real accounts and real people. While it’s worrying that they know enough about your business to wear that disguise so well, a successful attack relies on you not knowing what to look for, or even that fakes are a possibility. With that in mind, here are two types of invoice attacks you might receive:

The Payment Redirect

This style of fake invoice either explicitly states payment should be made to a certain account, perhaps with a friendly note about the new details, or includes a payment link direct to the new account. Your accounts payable person believes they’re doing the right thing by resolving the invoice and unwittingly sends company money offshore. The problem usually isn’t discovered until the real invoice from the real supplier comes in or the transaction is flagged in an audit. Due to the nature of international cybercrime, it’s unlikely you’ll be able to recover the funds even if you catch it quickly.

The Malware Click – Rather than go for the immediate cash grab, this style of attack asks your employee to click a link to download the invoice. The email may even look like the ones normally generated by popular accounting tools like Quickbooks or Xero, making the click seem safe. Once your employee has clicked the link, malware is downloaded that can trigger ransomware or data breaches. While an up-to-date anti-virus should block the attack at that stage, it’s not always guaranteed, especially with new and undiscovered malware. If it does get through, the malware quickly embeds itself deep into your systems, often silently lurking until detected or activated.

How to Stay Safe

Awareness is key to ensuring these types of attacks have no impact on your business. As always, keep your anti-virus and spam filters up to date to minimize the risk of the emails getting through in the first place. Then, consider implementing a simple set of procedures regarding payments. These could include verifying account changes with a phone call (to the number you have on record, not the one in the email), double checking invoices against work orders, appointing a single administrator to restrict access to accounts, or even two-factor authorization for payments. Simple pre-emptive checks like hovering the mouse over any links before clicking and quickly making sure it looks right can also help. Like your own business, your contractors and suppliers are extra careful with their invoicing, so if anything looks off – even in the slightest – hold back on payment/clicking until it’s been reviewed. Fake invoices attacks may be increasing, but that doesn’t mean your business will become a statistic, especially now that you know what’s going on and how you can stop them.

We can help increase your security, talk to us today. Call us at (416) 645-2469, (905) 667-0441 or email us.

Why Do Computers Break?

We know computers always break at the worst possible time, but what exactly prompts that failure? It’s easy to think it was something you did since you were using it at the time, but while your online gaming frenzy might cause a temporary crash, normal user actions are rarely the cause of a broken computer.

Physical Damage

Accidents happen, but they don’t always mean you need to buy a new computer. As an electrical item, liquid spills are a big problem. This could be anywhere from a spill on the keyboard, going overboard with the screen cleaning spray or even a flood that reaches the computer. Laptop users need to be especially careful when choosing their work surface, as cafes and kitchen tables often have small puddles left behind. If you’re lucky and the liquid didn’t fry the circuits, ongoing corrosion is still likely, as is stickiness to gum up the internal parts. Similarly, a dropped computer isn’t going to be happy, nor is one that’s been knocked around. Even a light thump of frustration can cause loose cables, disconnections and internal damage.

Age

Computer parts have an expected lifetime, especially moving parts like fans or mechanical hard drives. Some computers can run 24/7 for up to a decade, while others can be barely used but fail within warranty. When age is the issue there are usually early warning signs like extra noise or slowing down, but the actual ‘break’ generally happens when you go to turn the computer on, perhaps after a crash or overnight – either it makes a valiant effort before giving up, or nothing happens at all. Sometimes lasting age is the luck of the draw with how it was manufactured, and quality does play a big part in how long it can keep churning.

Power Surges

We like to think electricity is a constant stream that never varies, but computers are particularly sensitive to both surges (too much electricity) and brownouts (not enough electricity). You might notice the lights dimming or flickering during a brownout, or glowing just a tad too strong during a surge. These variations never last long, and they’re not something you can control unless it’s just your house (it’s worth checking with your neighbors), but they can easily break your computer. A surge protector can guard against mild increases in voltage, but brownouts and strong surges will still cause damage.

Heat

Overheating is a big contributor to premature computer death. Some computer parts run hot and need plenty of cooling to keep them working. You might not feel it from the outside, but internal components can rapidly build up heat that needs to go somewhere. When your airflow vents get blocked with dust or pet hair, the temperature continues to increase until components literally bake themselves to failure. At set temperatures, the computer will automatically switch off to try and cool down, however the more often this happens and the higher the temps, the more likely your computer is to die.

Hard Drive Failure

Your data is stored on a hard drive, and if you’ve got a mechanical hard drive (most people do), it works a bit like a record player with a spinning ‘platter’ and a needle that reads it. Small bumps, liquid, age, surges and overheating can all trigger hard drive failure. Along with making your computer unusable, hard drive failure means your data is also lost. While sudden breakage might leave you surprised, take note of any strange noises or repeated crashes and back up your data in advance.

Like a car, your computer needs to be serviced. We can check your computer both physically and its software to make sure its running right and will keep on working for you. Give us a call at 555-5555.(416) 645-2469, (905) 667-0441 or email us.

3 Internet Habits To Keep Kids Smart and Safe

How can you make the internet a safer place for your children? It’s a common concern as all parents want their kids to be protected and happy whenever they go online. It’s relatively easy to supervise and monitor the very young ones as they stare delightedly at the Disney Jnr site, but the risks increase greatly as kids get older and more independent.

You’ve probably heard the term ‘cyber safety’ before, but safe internet usage goes beyond reminding them not to talk to strangers. With the evolution of the internet and the way it’s now woven seamlessly into our lives, the focus needs to be on ingrained habits. That means ensuring your children have the tools and predefined responses to online events so that no matter what happens, they’re not placing themselves (or your family) at risk. Setting up these habits is easy, and begins with three basic understandings:

Downloads are a no-go

Most kids can’t tell the difference between a legitimate download and a scam/malicious link. It’s not their fault, the online world is full of things that will trick even the most savvy adult. The difference is that kids tend not to take that extra moment to check exactly where that link is pointing, question whether it’s too good to be true, or even read what they’re agreeing to. They want to get back to what they were doing, and if something pops up, their first instinct is to click ‘yes’ – purely so it goes away. Unfortunately, that single ‘yes’ may have just opened the doors to malware and viruses that will ruin their computer. Set a family rule that they need to ask permission for all downloads (and an adult will check it first), and to never click a popup. When you’re called over to give download permission or check a popup, talk through exactly what you’re checking and why. As your child matures, get them involved in this process so their safe habits extend outside the home.

Critical thinking is a must

Most youngsters think the internet is a magical place and can’t imagine their life without it. To them, the internet is on the same level as oxygen! With that acceptance though, comes unwavering trust that the internet would never lie to them, never trick them and never hurt them. While we adults know better, it’s only because we already view the internet with a certain level of distrust. The best way to keep kids safe is to teach them to approach every aspect of the internet with critical thinking. That includes teaching them to question the motives of other people online. Is that person really a kid? What do they really want? Unfortunately, all kids do need to be aware that predators use the internet to target and lure children. Ensure your children tell you immediately if a stranger makes contact. Along with this stranger danger, teach them to identify what marks something as suspicious, and what they should avoid. If they come across anything inappropriate, they should shut down the computer and come straight to you.

The internet is forever

Kids have an overwhelming drive to contribute to the internet, they don’t think twice about recording a video, jumping in a chat room or onto social media. The world really is their playground! But what they don’t understand until they’ve been burned, is that anything they upload, write or say is on the internet forever. Even if they delete it or use a platform where content self-erases, someone can still screenshot and send it right back out. Many cyber-bullying cases are based around this exact type of blow-back. Once your kids know that everything they post is permanent, they’ll be more likely to pause and think.

We can secure your computer and help keep your family safe – give us a call at (416) 645-2469, (905) 667-0441 or email us.

Is Your Home Wi-Fi Keeping Up?

Wi-Fi has forever changed the way we live, work and play. We can surf the internet on the couch or by the pool, look up a recipe in an instant, and even connect our lights to voice control. It’s no wonder it was accepted with open arms, but is your Wi-Fi as good as it needs to be?

10 years after Wi-Fi first made its way into homes with those mysterious rabbit-eared boxes, it’s evolved into a juggernaut of speed and accessibility that we can’t do without. Think about how many wireless devices your home has – the average home has at least 10 devices connected wirelessly to the internet, many have more.

While older devices are typically happy with a slice of slow internet, your newer devices like 4kTVs and media streaming simply can’t function without fast internet. Add in a game console, tablet, a few smartphones and a laptop or two, and your Wi-Fi is suddenly stretched beyond full capacity and struggling to keep up. Yet, most people don’t know how fast their Wi-Fi is, or if it’s working right– they only know how many bars they’ve got. Unfortunately, counting bars can add up to one big headache.

Here’s why relying on your Wi-Fi bar count might be ruining your internet experience:

Bars measure the wrong thing: While it’s great to know you’ve got a ‘strong’ signal, it would be even better if you could have a ‘fast and available’ signal. The internet could actually be down and you’d still have full bars because it’s really only measuring how close to the Wi-Fi router you are. That proximity measure doesn’t take into account how many devices are fighting for the same bandwidth or whether there’s any left for you. We can ensure your Wi-Fi isn’t just available, it’s up to the task.

Wi-Fi goes sideways: While next-door’s Wi-Fi can reach the back of their property, it can also go a similar distance sideways into your house. This extra ‘noise’ can disrupt and slow down your own Wi-Fi. In dense areas, your Wi-Fi is basically getting lost in a swirling field of signals, all using the same channel and frequency. It’s a digital crowd which can seriously slow your speeds. We can fix this by changing your Wi-Fi channel to one with less cross-talk.

Everyone uses the default settings: Most home Wi-Fi uses a 2.4ghz frequency by default. While it makes a plug & play router easy to set up, it does mean you’re not getting the speeds you could be. Switching to the 5ghz frequency means your Wi-Fi is separated from the neighborhood cross-talk. 5ghz is also considerably faster, which is a bonus. We can help you upgrade to a 5Ghz-capable router or switch your existing frequency.

Priority isn’t set: While not Wi-Fi specific, we can also set up “Quality of Service” if your router supports it or supply you with one that does. This allows things like Netflix and Skype calls to always take priority and remain uninterrupted over less important tasks like downloads. You’ll be able to watch movies without those awful buffering jumps and video chat without freezing.

Is your home network not keeping up? Give us a call at (416) 645-2469, (905) 667-0441 or email us and we can improve your internet experience.

Desktop vs Laptop: Which is Right for You?

Laptops have become the go-to choice for most people in the market for a new computer. They’re sleek, portable and heavily advertised. But are they the best choice for your needs? Before you buy your next computer, take a look at these considerations – you may discover you’ve been dreaming of a desktop all along!

How portable do you need it to be?

Hands down, laptops are easier to move around than a desktop. You can pick them up, pop them into a backpack and away you go. That doesn’t mean desktops are bolted to the floor, just that they’re not designed to take on holidays or go with you to the local cafe. With that portability though, comes a trade-off: thin and light means your computer performance takes a hit. The more powerful your laptop, the bigger and heavier it is, and you won’t enjoy lugging that weight around all day. If that’s got you leaning towards an ultra-portable, consider this: The smaller and lighter your laptop is, the weaker it is. In fact, some laptops struggle to run the most basic apps. Fortunately, when you do choose a desktop, cloud technology means your data is mobile, even if your main computer isn’t.

What balance of power and price do you need?

The bottom line here is that a desktop will always give you more power for less money. Their larger cases allow for bigger and better components, with more effective systems to avoid overheating. Even the most powerful laptop is going to be hotter than its desktop equivalent, and much noisier too. If you’re using power-hungry software like games or video editing, we recommend choosing a desktop. The heat control alone is worth it as frequently overheated laptops don’t survive long.

Desired screen size

As laptops are designed to be portable, screen sizes are usually small, around 11-15”. Larger, more powerful laptops often go up to 17”. Desktop monitors however, start at 17” and average at 22”. These larger sizes give you more space to work in, options to tile your applications and multi-task, and even sit back and watch an HD (or even 4K) movie. They also allow for nice big text and images, with a better ability to choose the visual experience that suits your needs. If you’re after a large screen size without the actual desktop computer, all-in-one PCs are a great option with many offering impressive screen quality.

Your working comfort

Many people buy a laptop only to get home and find it’s a pain in the neck – literally! The traditional laptop design means you’re always looking down at the screen which can put a strain on your neck. You can try to raise the screen by placing the laptop on a stand, but then the keyboard is out of easy reach. The smaller keyboards and touchpad designs may also leave you more prone to repetitive strain injuries. Many people end up connecting their laptops to external monitors, keyboards and mice, simply so they can work in comfort. Desktop computers on the other hand, allow you to create the perfect working environment for your needs and even cater for other family members. Monitors are usually height adjustable, keyboards and mice are wireless, and you’re able to place the desktop on the floor out of the way. If you’re on your computer for more than short bursts, your body will appreciate you choosing a desktop.

Are you looking for flexibility?

When you choose a laptop computer, it’s like ordering from a set menu. You get this brand, in this design, with these specifications. Changing out parts for repair or upgrade can be difficult and expensive as there’s not a spare inch of space. Some parts are extremely hard to get to, which can turn a simple swap into a dealbreaker. The extra space inside a desktop gives infinite flexibility for upgrades over time and fast repairs. This means you’re able to easily pop in more powerful components for a fraction of the price and extend the life of your computer by years.

Come talk to us about your next computer and we’ll find the right one for you. Call us now at (416) 645-2469, (905) 667-0441 or email us.

Why is my Computer Running so SLOW?

Woah, who slammed on the brakes? Your computer used to speed through startup and let you open almost everything at once, but now it’s struggling to crawl along! Everything takes so much longer or crashes without warning. Something isn’t right. If it’s gotten so bad that you’ve found yourself drooling over the idea of a new computer, even though your system isn’t that old, we’ve got some good news: you can get your whizzy speeds back with a little TLC.

Computers generally start slowing down within 12 months, but it’s not because their parts are broken. And it’s not because they’re faulty. It’s not even because you have so many browser tabs open that you lose count. Slow computers have a number of causes, but the most common ones are easily fixed.

Background programs

Whenever your computer is turned on, it’s running programs in the background. You didn’t start them and they may not be essential to operation, but off they go anyway. You can’t even see some of them, they don’t have windows or anything to look at. A good example is your antivirus program. You don’t need to see it all the time, but you know it’s running in the background, protecting you. Over time, more and more programs might slip into the background and casually suck up your resources, like iTunes helper, Acrobat updater, Cortana listening, Skype or Spotify. We can speed up your system by setting these background programs to run only when you need them, or remove them completely.

Application bloat

How do you improve last year’s version of a program? Add more features! The problem with this is the applications become bloated with features you may not need (or even know about), but that keep needing more and more resources. Each time the developers review their programs, they assume you’ve bought the latest and greatest computer and can run whatever they release. This means a slow computer can sneak up after an auto-update. You may not even know the update happened, just that your computer is suddenly making you very unhappy. Eventually, your system grinds to a halt. We can remove unused applications or increase your computer power as required.

Slow hard drives

Your data is stored on a part called the hard drive. It’s usually a mechanical type that works like a record player, with a spinning platter and a ‘needle’ reading it. If your data is spread out across lots of places on the platter, the hard drive head ‘needle’ has to go backwards and forwards thousands of times just to retrieve a single file. Unsurprisingly, that takes more time to bring up your file. We can optimize your data to give the hard drive head a break, but an even better solution is to upgrade to an SSD. That’s a Solid State Drive that stores data in memory chips, like your USB drive, and has no moving parts. Without the physical need to move a hard drive needle, your computer can access data much faster.

Unfortunately, once your computers starts slowing, for whatever reason, the problem only gets worse. The background programs will continue to multiply, the bloat keeps coming, and the hard drive begs for relief. Rather than buy a whole new system though, it’s completely possible for your current computer to go back to being lightning fast – and for a fraction of the cost.

Give us a call at (416) 645-2469, (905) 667-0441 or email us if your computer is running slow

What to Do if Your Hard Drive Fails

If your hard drive is going bad, chances are strange things are happening and you’re a little panicked. It’s where you put your digital memories, your household files and maybe that thesis you’ve been working on for months. As far as you’re concerned, that hard drive IS the computer and failure is not an option. Perhaps it was overheated, knocked around or came from the factory with a flaw.

Sorry to say, but eventually all hard drives will fail. So how do you know if it’s definitely the drive and what should you do?

Start by watching for these signs:

Computer slowing down: Because most hard drives contain moving parts, the slower it gets, the slower your computer gets. It’s a bit like a record player, with spinning plates and a needle whipping from side to side. Your hard drive may eventually take longer to spin up and longer to retrieve files, which will have an impact on everything from booting up to playing games.

Blue screen of death: A classic Windows error, this is when your computer locks up to only show a blue screen with an error code, which while it does mean something specific has gone wrong, can always be translated loosely to ‘nope, not today’. The more often your computer does this, the more severe the problem is.

Not booting up: During the initial bootup stage, your computer is loading a program stored on the hard drive – it’s your operating system. If some of the files have a problem or can’t be found, Windows won’t boot. Errors vary, but the outcome is the same.

Corrupted files: Sometimes a file won’t open because the computer says it is corrupted. Some essential pieces of the file are missing, and unlike a book where a missing page is only inconvenient, it’s a deal breaker for computer files.

Noises: You’re familiar with the normal noises your computer makes, but as the hard drive fails the noises can change. You might hear clicking, grinding or even a sci-fi phaser noise. Noises will get louder or speed up during heavy file access.

Whenever something is clearly wrong, the key is to stop and turn your computer off. Continued use can result in more data loss. Even if you don’t have a backup yet, turn it off now because the large task of backing up can cause extra strain on an already delicate hard drive. It’s tempting to hurry and try to get a quick copy of your files, but in these cases, it’s not about time – it’s about the extra spinning, scratching, warping and electrical charge, all dissolving your precious data with each access.

Bring it to us and we’ll do all we can to retrieve your data. Call us at (416) 645-2469, (905) 667-0441 or email us.

How to Stay Safe from Scams and Malware on Facebook

At last count, Facebook has clocked up over 2.7 billion users, which makes the platform more attractive than ever for scammers and hackers. While you may be logging in to share your latest family photos or catch up with friends, the chances of accidentally triggering a scam or malware are increasing daily. Here’s how to stay safe on Facebook and stop the spread.

Look out for freebies and surveys

Everybody loves a freebie and for the most part the competition posts on Facebook are legitimate. On the flip side though, when you see a giveaway for vouchers from a mega-store, alarm bells should ring. ‘Do this quick survey and we’ll send you a $50 Amazon Voucher!’ – it’s too good to be true. Even one click can take you on a messy journey through the underbelly of the web, picking up trackers and malware at every stop and at the end, you’re asked to share the post so your friends can get a voucher too…except nobody ever gets the reward.

Check your permissions with games and quizzes

Whenever you access a new game or quiz, you’ll need to give permissions for it to access your Facebook profile. Most people click the okay button without any thought, but if you review the permissions you’re giving, you’ll often find they’re asking for a massive amount of personal data; public profile, friend list, email address, birthday and newsfeed. Do they really need ALL this information? Sometimes the shakedown is from necessity, but sometimes the apps are preparing to launch attacks against you both on and off Facebook. For example, when you call your bank they ask certain questions like your full name, birthday and maybe which high school you went to. All that information is in your Facebook profile and now shared with your permission.

Don’t friend people you don’t know

Having lots of friends is always nice, but that friend accept could end up costing you. It might be someone pretending to know you, or a picture of a pretty girl to entice men (and vice versa). Once you friend them, they get access to everything your friends can see. In this case, it’s more than the risk of someone knowing your personal data, you’ve just given them intimate access to your life. It’s exactly how romance scams start, and there are even cases where the victim finds photos of their children circulating the internet.

If it’s weird, forget it

It doesn’t happen very often, but hackers find ways to take advantage of flaws in Facebook. A common hack that keeps popping up in various forms is to embed malware in a link. The virus then infects your machine and contacts all your friends with an enticing message, like asking whether a picture is of them. When they click to view the picture, the virus catches them and their friend list, and so on. Facebook is pretty good at staying on top of these flaws, but they need time to fix it. Just like if you got a weird email with an attachment from a friend, use that same level of scrutiny in your Facebook and don’t open messages or links that seem out of place.

Need help securing your privacy? Talk to us. Call us at (416) 645-2469, (905) 667-0441 or email us.