The Power of Rebooting: Your Quick Fix for Tech Troubles

As the stereotype goes, when you report a problem to your IT team, their first question is often, “Have you tried turning it off and on again?” While it might seem annoying, the reality is that many issues can indeed be fixed with a reboot. The longer you keep your computer running without a restart or shutdown, the higher the chances of encountering problems.

Over time, it’s normal for a computer to exhibit decreased performance when left running without a restart for a long time.

This phenomenon occurs because a reboot effectively frees up memory space, restarts frozen applications and eliminates temporary files accumulated from various software applications.

A computer restart can also be a solution for network drive-related problems. If you encounter difficulties in connecting to one or all of your network drives, performing a computer reboot forces it to make another connection attempt.

Rebooting your computer also resolves problems related to freezing or unresponsive applications. In cases where your computer becomes unresponsive, and you can’t access the start menu to perform a restart, you can manually power it down.

This process is done by pressing the power button for eight seconds until it turns off and then pressing the power button again to restart it.

Whenever you install a Windows update, it is essential to restart your computer as the changes may not have taken effect, and you may only be protected once you do.

Frequently rebooting your computer, especially when encountering the described problems, can significantly reduce IT support inquiries.

It streamlines troubleshooting for your IT team, as they will know that a reboot has been attempted before seeking their assistance. And, perhaps most importantly, being able to confidently respond with “Yes, indeed!” when asked, “Have you tried restarting your computer?”.

Are issues still persistent in your computer after a reboot? We can help! Contact us today at (416) 645-2469, (905) 667-0441 or email us.

Want to be notified when our next blog is posted, sign up here.

6 Fresh Ways to Mark National Computer Security Day

Not worrying about bad actors infiltrating business technology would be a cause to celebrate, but that’s not a reality. So, instead, National Computer Security Day reminds us to promote computer security.

As technology advances, securing electronic devices and online systems grows more complicated. We now have October as Cybersecurity Awareness Month to encourage education and motivation. Also, since 1988, November 30 has been devoted to keeping online data safe and secure.

National Computer Security Day can remind staff about digital threats and best practices. For example, every business employee should:

  • use strong passwords;
  • protect their devices;
  • install updates and patches to secure against vulnerabilities.

Still, staff may not welcome more training on security procedures and protections. Counter their cybersecurity fatigue with these fresh ways to keep security awareness top of mind.

#1 Try trivia

Cybersecurity is not trivial, yet you can organize a cybersecurity-themed trivia quiz to gamify your information sharing. You might ask questions about online safety, best practices, or recent breaches, and offer prizes to the winning team.

Questions might include:

  • What’s a common two-factor authentication (2FA) method aside from SMS codes?
  • What type of malware encrypts your files and demands a ransom for their release?
  • What term describes the manipulation of individuals into revealing personal or confidential information?
  • What is the purpose of a virtual private network (VPN)?
  • Name one popular piece of antivirus software.
  • Name a recent high-profile data breach or cyberattack on a well-known company.

 

#2 Offer free lunch

 

Promote participation in cybersecurity by inviting employees to attend a lunch ‘n’ learn. Plan an interactive workshop and woo them with free food. Have hands-on activities addressing passwords and authentication, malware and viruses, or incident response.

 

#3 Set up a scavenger hunt

 

You might do this around your office or set one up online. Set up prompts to identify security threats, recognize phishing, or locate cybersecurity resources. Before awarding prizes, discuss correct answers to challenges and provide insights on cybersecurity.

 

#4 Put together an escape room

 

Like the scavenger hunt, you could set up an escape-room challenge. Have teams solve cybersecurity puzzles and complete tasks to protect their digital identity. Time the different teams and award prizes to the fastest escapees.

 

#5 Host a movie night

 

Show a cybersecurity-related movie or documentary after hours in the office. Provide popcorn while you show The Social Dilemma (2020), Cyber Crime (2019), or WarGames (1983), then have a brief discussion of the film afterward.

 

#6 Send out cybersecurity quizzes

 

Throughout the day, send out fun, informative quizzes. Every quiz completion can count as an entry in a raffle towards top prizes. Tailor your short, multiple-choice quizzes to your employees and industry.

 

Prioritize Ongoing Cybersecurity

 

Marking National Computer Security Day in one or more of these ways is great, but you should continue the cybersecurity conversation all year round. A managed services provider can help you stay ahead of cyber threats. We’ll review your cybersecurity posture regularly.  Call us at (416) 645-2469, (905) 667-0441 or email us.

Want to be notified when our next blog is posted, sign up here.

Neglected Software Vulnerabilities and Their Costs

Cyber insurance is essential for the internet-connected business. Yet, when was the last time you reviewed your policy? You may find new text outlining coverage for neglected software vulnerabilities. You may not even know what that involves. This article explains these vulnerabilities and how to avoid their associated costs.

Cyber insurance typically helps cover the costs associated with the following common risks:

  • network security failure;
  • class action litigation;
  • regulatory fines related to violating standards or privacy legislation;
  • business interruption.

Still, cyber threats always evolve. As a result, insurance companies continually rewrite their policies to cover risk areas. More insurers are adding neglected software vulnerabilities to their policies. Here’s what that means for your business.

 

What is a neglected software vulnerability?

 

Keeping your software current is an important best practice. It’s your responsibility to check for vulnerabilities and protect your systems. The National Vulnerability Database (NVD) informs businesses globally of known threats and patches available.

Patching the vulnerability helps prevent business losses, yet you may not be able to do so right away. You may need to test the update’s compatibility and capacity before installing it.

Still, once the NVD publishes a vulnerability and its patch, many insurers give you 45 days. If you fail to address a known threat, that’s considered neglect. The longer you neglect that vulnerability, the more responsibility you’ll bear.

The costs of a neglected software vulnerability

Software vulnerabilities can lead to network failure, business interruption, and liability. You could end up needing to cover:

  • IT forensics;
  • data restoration;
  • legal expenses;
  • lost profit;
  • credit monitoring and identity restoration;
  • expenses for implementing workarounds.

Yet insurers cover neglected software vulnerabilities on a sliding scale. Once you know about a vulnerability, you’re expected to patch it. So, the longer you wait, the more you’ll pay.

Chubb, for example, shifts more risk to their policyholders after 46, 91, 181, and 366 days. The limit of insurance covered might start at $1,000,000 with zero percent coinsurance costs. For neglected exploits 46-90 days old, the coverage falls to $500,000, and coinsurance increases to five percent.

 

Addressing software vulnerabilities

 

Cybercriminals continue to exploit publicly known vulnerabilities. Why? Because organizations continue to neglect patching and upgrading against known security risks.

Your attack surface grows when your business adds applications, merges with another organization, or allows employees to bring their own devices to work. Using legacy software that has reached it’s end of life can also leave you vulnerable.

Scanning your software for vulnerabilities could expose many risks. You may need to prioritize which to patch first. It can help to consider which ones pose the greatest risk to your mission-critical systems.

Lack the expertise to detect and mitigate vulnerabilities? CPI Networks can help keep your software up to date to prevent exploitation.  Call us at (416) 645-2469, (905) 667-0441 or email us.

Want to be notified when our next blog is posted, sign up here.

Free Yourself from Daily IT Distractions

Everyone who runs their own company knows the constant challenge of wearing many hats and trying to manage everything yourself. As much as you’d like to focus your time and energy solely on core business operations that drive revenue, other ancillary tasks often demand attention too, and keeping IT systems running smoothly is a frequent culprit.

Between the minor daily issues, users face implementing new infrastructure or software projects, security maintenance, backups, and disaster recovery planning, it’s easy for even basic IT administration to balloon into a full-time job. As a small outfit, you likely have yet to devote in-house experts or even just one employee who can handle everything. That’s where partnering with a managed service provider makes a lot of sense.

CPI Networks takes that entire IT weight off your plate by remotely monitoring, maintaining, and managing your networks, systems, security, and more, proactively addressing issues before they negatively impact your business. Here are some key ways they can alleviate the top IT pain points most small companies encounter:

Small Daily Tasks. When users constantly bother you with password resets, installing software updates, troubleshooting simple login problems, and so on, those minor interruptions throughout your day add up. An MSP handles all routine break/fix work, so trivial matters don’t waste your time.

Coverage During Time Off. Taking vacations, attending to family emergencies, or getting sick is inevitable. Still, when your only IT contact disappears even for a couple of days, problems will arise. An MSP is your always-available backup support to ensure nothing slips through the cracks.

Continuity Through Turnover. Retaining knowledgeable employees is tough, so high turnover for internal tech roles is expected. But with sensitive company data, you can’t afford disruptions from employees departing with institutional knowledge. An MSP keeps complete system documentation and access independent of individual staffers coming or going.

24/7 Monitoring. Most businesses don’t have devices and networks consistently watched around the clock. However, outages, downtime, and security breaches often happen outside office hours. 

Taking the Administrative Burden. Between ensuring backups are routinely performed, keeping security appliances and software patched, tracking software licenses, upgrading old hardware, and more, administrative IT functions multiply your plates. Having a group of certified experts take ownership of those chores allows you to rest easy.

In the end, any time you’re pulled from concentrating on direct revenue activities to stabilize unreliable infrastructure or solve technician-level issues, that’s money going out the window. CPI Networks exists to efficiently address those nagging IT problems holding small companies back.

Reach out to us today to see how we can help your business. Call us at (416) 645-2469, (905) 667-0441 or email us.

Want to be notified when our next blog is posted, sign up here.

Reasons to Rethink Your ISP-Provided Router

When you sign up with your internet service provider (ISP) you may also get a modem and router combination. It could be free, a rental, or something you buy outright. Before assuming that is the best device for your needs, weigh up these considerations.

Many ISPs provide you with a proprietary router and modem. Your internet service plan may include it for a rental fee, or you might have to pay over time to buy the device. If that’s the case, find out how much the modem and router would cost to buy outright. You might be able to buy a higher-quality device at a better price.

Other times, ISPs offer free modems and/or routers included with your plan. The price is reasonable, sure, but you could be getting a low-quality device. You might want to upgrade to a better option for not much more money.

What you need to know about modems/routers

Your small business network requires a modem, router, or combination device. The latter are growing more common.

The modem connects your small business to your ISP through a physical connection. This device translates ISP data into a format your home network devices can use.

The router creates a local area network (LAN) connecting your devices to your modem. This allows your computers, laptops, tablets, and smartphones to connect to the internet. You’ll have either a wired or wireless router.

In summary, the modem sends and receives internet signals, while the router distributes them to your devices.

What to look for in a router

Before relying on an ISP router, consider the benefits of a small business class devices.

Encourage a safer online environment for staff with features such as:

  • website filtering;
  • content filtering;
  • safe search;
  • device management;
  • reports and alerts;
  • remote management.

You can also improve network security with a router that allows you to set up a separate guest network. Provide guests with internet access without worrying they can access your private network.

You can also look for a router that supports Quality of Service (QoS). This feature allows you to allocate internet bandwidth to different devices or applications. For example, you can prioritize a work computer with more bandwidth than a gaming console.

Don’t settle for the ISP’s equipment

We’ve given you plenty of reasons to rethink your ISP’s router, yet choosing an alternative could overwhelm you. We can help you identify the right solution for your specific needs.  Call us at (416) 645-2469, (905) 667-0441 or email us.

 Want to be notified when our next blog is posted, sign up here.

Essentials to Know About Software Licenses

Bet this sounds familiar: A screen full of legalese opens up when you download some new software. You immediately scroll to the bottom and click “I agree.”

Most of us don’t actually read license agreements. This is not a good idea for individual use. Worse, it’s a real risk for businesses.

Even if you don’t read every one of those 60 pages in the End User License Agreements (EULA), it’s important to know the conditions for your license. You can often find this on a sales page or in a feature chart. This helps you understand the basics of your agreement.

After all, a software license legally establishes the conditions of your using that particular software program. For example, you may not be allowed to use the personal or educational license for commercial use in your business.

Why are software licenses important?

Software licenses protect the software developer or publisher and you, the user. The agreement establishes clear guidelines to help prevent misuse and copyright infringement.

You can run into legal and financial difficulties if you don’t understand the agreement; software licenses protect the developer’s intellectual property rights, after all. For example, you’ll often have to agree to a certain number of users for that copy of the software. If your license is for three users, you are risking legal ramifications if you’re using it for ten people in your business.

Keeping track of the number of people using a software license can also save your business money. You might have more licenses than users, for example, which is a waste of resources.

What else do I need to know about software licenses?

Along with rightsizing your software spending, also track renewal dates. You may have that license only for a year before you have to pay for it again. You don’t want to learn, on a deadline, that you’re locked out of essential software due to license expiration.

Different licenses will have various durations, so keep an eye out for renewal notices, and be proactive. See expiration dates as an opportunity to revisit the number of users licensed. You might also negotiate better pricing, or see this as a deadline to transition to a different program instead.

The software also reaches end-of-life or end-of-support after a set period of time. Typically, it’s ten years from its first release. You might continue using that software, but you put yourself at risk of vulnerabilities. The developer no longer patches and upgrades the software to protect it from cyber threats.

Software license best practices

Using software without a license risks fines, prosecution, and jail time. Companies such as Microsoft and Adobe will prosecute, or even pay rewards to people who report software piracy. The only exceptions are open-source software or freeware licensed for anyone’s use. Even in this case, though, it’s still important to review the sales page or features chart. It might state you can’t use that freeware for commercial use.

Try these best practices to avoid legal and financial concerns:

  • Read the agreements before you agree.
  • Don’t use software without a license.
  • Develop a process for monitoring your licenses.
  • Review your agreements, at least annually.
  • Consider partnering with a managed service provider to handle your software license management.

Our experts can help. Contact us today at (416) 645-2469, (905) 667-0441 or email us to learn more about our comprehensive services.

Want to be notified when our next blog is posted, sign up here.

What You Need to Know About Desk Ergonomics

Getting the job done is the focus. Many of us don’t spend much time thinking about how we’re setting up our workspace to do our tasks, yet desk ergonomics can increase productivity, lessen muscle fatigue, and cut work-related aches.

In a typical office setting someone has thought about ergonomics. Most people have a chair at a desk where they can sit with a posture that reduces the risk of pain. Good workspace positioning will see your:

  • feet flat on the floor, thighs parallel, and knees bent to 90 degrees;
  • elbows comfortably below shoulders, bent at 90 degrees, and close to the body (without being jammed against you);
  • shoulders relaxed and back;
  • back against the chair with your body aligned so that your shoulders are over your hips, and your head, over your shoulders;
  • Eyes looking at the top of the screen (rather than up or down at it).

Anything else risks putting your body out of alignment, which can stress your body and lead to painful issues. For example, carpal tunnel syndrome, muscle strain, and lower-back injury.

Rethinking your work-from-home posture

Sorry. Working from bed or lounging in a cushioned chair isn’t going to put you in the right ergonomic position.

It’s best to replicate a traditional workstation. Start with how you sit: Get a desk and office chair, or at least sit at a table. If your feet don’t touch the ground, get a footrest (or even use a stack of books). This helps get your thighs parallel and knees at 90 degrees.

Now, place your computer where you can keep your elbows bent and shoulders back. You want to hover your palms slightly over the keyboard as you type. If you have armrests, this can help you avoid slouching.

Your lower back is the next consideration. Having your back against the backrest can help your alignment. Office chairs are often designed with lower back support. If you don’t have that, you could get a lumbar pillow to help. Otherwise, you might roll up a towel to put against the small of your back while sitting.

Also, consider your screen placement. You might need to raise or lower your monitor so that your eyes are in line with the top of the screen. Laptop users could need to get a separate screen or keyboard so that they can achieve the right angles at once.

Next steps

If you’re a two-screen user, you can put the one you use most directly in front of you. If you work on both regularly, place them side by side, and angle them towards your seat. Tablet users may want to get a stand that puts it at eye level. Otherwise, switch up which hand you’re using to hold it. Plus, if you’re on the phone a lot, use hands-free or a headset to avoid a stiff neck.

You can also take advantage of a standing desk. In that case, you’ll want to make sure your feet are hip distance apart. Then, stack your hips above your feet, followed by your shoulders, neck, and head. Keep even weight distribution in mind too.

Every 20 minutes or so plan to check in on your posture. Also, take 20 seconds to look at something 20 feet away from you to give your eyes a rest. Moving and stretching can give both your body and mind a break.

Reconfiguring your desk ergonomics can help reduce muscle strain and improve productivity. It’s up to you to sit correctly to take away workplace pain, but we can help you with the pain of problematic IT. Contact us today at (416) 645-2469, (905) 667-0441 or email us to contact us.

Want to be notified when our next blog is posted, sign up here.

What Is Zero-Click Malware?

You know not to open an email attachment from someone you don’t know. You also avoid downloading unexpected files or questionable popups when you go online. But did you know there’s malware that requires zero action from you? Zero-click malware can infect your device without any interaction on your part.

Traditional malware required the user to click a link, download a file, or execute a program. It often relies on phishing and social engineering to fool you into taking action.

Zero-click malware exploits vulnerabilities in your operating system (OS) or applications. It uses carefully crafted, undetected code to access and execute a payload automatically, and there’s no trigger. If one is present on the system you’re using, you’ll navigate right into it.

This makes zero-click malware attacks all the more dangerous. After all, they happen without your knowledge or consent. Meanwhile, attackers can use zero-click malware to:

  • gain access to sensitive data, such as passwords or financial information;
  • take control of your device;
  • impersonate you and send out messages on your behalf;
  • carry out additional attacks.

Understanding zero-click attacks

Zero-click attacks exploit bugs, misconfigurations, or design flaws in an application or OS. They can come in many forms as attackers:

  • target email applications and messaging apps such as WhatsApp or iMessage;
  • build malicious websites;
  • hack and infect legitimate websites;
  • exploit vulnerabilities in network protocols or services.

In one well-publicized example, Amazon CEO Jeff Bezos suffered a zero-click attack. A WhatsApp message compromised his texts, instant messages, and potentially even voice recordings.

Another well-known attack targeted the WhatsApp accounts of journalists, activists, and human rights defenders in several countries. The attackers installed the Pegasus spyware on the targeted device simply by placing a phone call to the device, even if the user did not answer the call. The malware could extract messages, photos, contacts, and other sensitive data from the device, as well as activate the device’s camera and microphone to record the user’s surroundings.

How to protect against zero-click software

Protect against zero-click malware by keeping your device’s software up to date. These attacks are often designed to exploit unknown vulnerabilities in software, enabling automatic updates can help ensure you run the latest, most secure software.

Also, install and use security tools such as antivirus software and firewalls, which help detect and prevent the malware from infecting your device, and remain cautious about clicking on links or downloading files from unknown sources.

Further reduce your risk by using strong passwords and two-factor authentication. Plus, limit your device exposure to public Wi-Fi networks and unknown devices.

In case of a zero-click malware or other types of data breach, regularly back up your data, too. Store backups on a separate device that uses strong encryption and two-factor authentication, or use a secure cloud storage service.

Not sure about the strength of your online protections? We can help secure your devices. Contact us at (416) 645-2469, (905) 667-0441 or email us.

Want to be notified when our next blog is posted, sign up here.

Leave that USB Drive Where You Found It

You come across a thumb drive, or USB drive that you don’t recognize. Maybe you find it in the car park of your building or by the copier in the office. You’re curious or you want to plug it in to identify where to return it. Don’t do it. Risks abound.

Consider this jaw-dropping example. That’s how the Stuxnet malware virus that hit an Iranian nuclear facility got its start. It’s believed employees at the facility plugged in a USB drive they found in the car park.

From there the virus could reach the computers controlling the centrifuges, causing them to spin too fast and become damaged. The attackers couldn’t get in directly, as the computers were on a disconnected network.

 

Risk of thumb drive attack

 

Now, you might be thinking, “but I’m not an Iranian nuclear facility.” But that doesn’t prevent cybercriminals from wanting to access your network and systems. USB drives are one more way that bad actors can do so. In fact, one study found that 60 percent of people were likely to connect random thumb drives found near their building. If the business logo was on the drive, the number went up to 90 percent.

USB stands for Universal Serial Bus. Even with cloud computing, we still see these small, portable drives used universally. They are compact and convenient. That also makes them an attractive target for bad actors.

Hackers can pre-program USBs to act maliciously once connected to the network. They might:

  • steal a user’s data;
  • gain access to the user’s keyboard;
  • monitor the user’s screen;
  • encrypt user data in exchange for a ransom;
  • spread infection.

Most of these can happen without the user even knowing it, as the malware runs in the background.

Avoid USB drive attacks

How do you keep your business safe from infected USB drives? First, don’t insert unknown flash drives. Hackers will try to take advantage of human curiosity or their desire to help.

It’s also good to use different flash drives for personal and professional computers. This helps cut the chances that you’ll spread an infection from one to the other.

You might also enable security measures on USB drives, such as fingerprint authentication. This, and keeping computer software and hardware up to date, can cut vulnerabilities. Also, keep your malware and anti-virus protections current, and patch regularly.

Windows users can also disable the Autorun function. This prevents Windows from automatically opening removable media immediately upon insertion.

We’re here to help. Call us at (416) 645-2469, (905) 667-0441 or email us to contact our experts if you suspect a security threat or want to update your security posture.

Want to be notified when our next blog is posted, sign up here.

Stop Using Windows 8.1 and Windows 7 – Do It Now!

Few of us are big fans of change. It can be easier to keep on going down that same path or use that same computer software; it’s comfortable and familiar. As of January 10, 2023, however, Microsoft has stopped providing support for Windows 8.1, which means you need to make a change.

It’s time.

If you’re still on Windows 7, it’s really time. Microsoft stopped providing security updates and technical support for that in January 2020. Microsoft did launch an extended service update (ESU) period for Windows 7, but that’s over, and there’s no ESU program for Windows 8.1.

Microsoft recommends moving to a new device that can run Windows 11. They warn against “performance and reliability issues” with older, unsupported operating systems. Another option? Upgrade your current device and install a newer operating system on it.

Now, you might be suspicious, thinking, “they just want more of my money,” but the manufacturer has already been providing support for both of these tools for ten years. Plus, computing is changing enough that they need to keep up with new iterations of Windows. Then, they focus their attention on keeping the latest releases updated and secure.

Benefits of upgrading to Windows 11

According to Statcounter data in 2023, Windows 11 is only on 15.44 percent of Windows systems right now. Windows 10 has the majority (over 70 percent), but if you’re one of just under 10 percent of users still on Windows 7, make the change now.

Cybercriminals know that people will wait to make the change, and they find ways to exploit the weaknesses of unsupported software. You are particularly vulnerable when relying on Windows 7 or Windows 8.1.

Windows 11 is the latest Microsoft offering. They have worked to reduce risk from the latest cybersecurity threats. With Windows 11 you can better protect your files and cut the risk of today’s viruses and malware.

The new operating system is built to be more efficient. Microsoft has tweaked the Windows layout and navigation to help users find what they need and perform tasks more easily.

Not sure what version of Windows you’re using? In the bottom left of your screen, click on the Start Menu and press the Windows button on your keyboard. Then, type “system”. Click either the System or System Information icon. You’ll see your Windows version listed at the top of the window that opens up.

Upgrading to Windows 11 from 7 or 8 isn’t free. Only Windows 10 users can upgrade at no cost. Also, to upgrade to a Windows 11-compatible device, you’ll need to make sure you get a security chip called TPM 2.0. It’s unlikely you’ll find that chip on a computer more than four years old.

Need help with your Windows software? We can help. Contact us today at (416) 645-2469 or (905) 667-0441 or email us.

Want to be notified when our next blog is posted, sign up here.