Testing the Lenovo code
Ransomware could become a nonissue at a Folsom dental office. Daphne runs a dental office in Folsom. She gets scared every time she learns of ransomware, spyware and malware. "They're all challenging me and my ability to protect our client data. We're not the only dentist office in Folsom," she complains. ...
June 16, 2017Mark Anthony Germanos
What Traffic Ticket Phishing looks like. Although this happened in New York, this phishing attack could very easily happen in any state. Online reporter Doug Olenick at SC Media revealed a press release from the NY State Department of Motor Vehicles warning about a phishing scam. The phishing scam targets New ...
June 15, 2017Mark Anthony Germanos
Ransomware could become a nonissue. We survived last month's WannaCry Ransomware attack. WannaCry struck folks who avoided the most recent Microsoft security updates. They also previously clicked a phishing link. WannaCry encrypted files and demanded $300US in BitCoin to make them readable. Proactive users avoided this nonsense. Avoiding WannaCry....
June 13, 2017Mark Anthony Germanos
Microsoft certified technicians help keep your business in business. As you review candidates to be your outsourced IT support company, ask for those who are Microsoft Certified. Why? Because they make great consultants. They drive fast time-to-value, onboard quickly and responding to challenges confidently....
June 6, 2017Mark Anthony Germanos
Wannacry, the worst ransomware in history, is preventable. Last week, the Wannacry ransomware infected 200,000 computers. It started infecting Britain's hospitals. We soon learned it was international. A client asked me about it. How to get infected. Here's what I wrote:...
May 18, 2017Mark Anthony Germanos
Ransomware strikes British hospitals. Friday's ransomware attack infected computer networks of at least 40 British National Health System hospitals. Administrators suspended non-emergency operations. They also are diverting ambulances. Mikko Hypponen, chief research officer at the ...
May 16, 2017Mark Anthony Germanos
Malware Malware Everywhere. Malware attacks are on the rise. According to Wikipedia, "Malware, short for malicious software, is any software used to disrupt computer or mobile operations, gather sensitive information, gain access to private computer systems, or display ...
May 14, 2017Mark Anthony Germanos
Yesterday's phishing atack. Yesterday, someone included me in a phishing attack. According to Wikipedia, “phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons, by disguising ...
May 11, 2017Mark Anthony Germanos
Yesterday's phishing attempt. Yesterday morning, someone sent me a phishing attempt. According to Wikipedia, “phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons, by ...
May 9, 2017Mark Anthony Germanos
BitLocker = ? I am glad you asked. BitLocker is Microsoft's hard drive encrypting tool. You enable it on the hard drives residing in your computer or on external drives you attach with a USB cable. This is included in Microsoft Windows 7 and Windows 10 Professional. There is no cost. I am ...
May 7, 2017Mark Anthony Germanos
Test your backups. You're running a business. You have mission-critical data on your server and workstations. This includes trade secrets, client data and financial information. You backup your data to protect you in case an emergency struck. You know the backups work and your mission-critical data is safe, offsite. Or do you? This ...
May 5, 2017Mark Anthony Germanos
Do you need to find your WIFI password? If I had a dollar for every time someone asked me to find their WIFI password (encryption key) and type it into a new notebook, phone or tablet, I could afford to live in California. OK, OK, OK, I do live in California. Nuf said. This does, ...
April 27, 2017Mark Anthony Germanos
ZIP files when you need to keep them together. Windows lets you ZIP files. A ZIP file is a file that contains other files. The ZIPping process also compresses the files it contains. If you want to send four files at 3 MB each, you're looking at 12 MB in sum. Adding ...
April 25, 2017Mark Anthony Germanos
Solid State Drives work for you. Solid State Drives are computer hard drives that have no moving parts. Therefore, they make the computer run faster, generate less heat and last longer. How one can help your business....
April 23, 2017Mark Anthony Germanos
How can you save money? Maybe I should answer this "how do I save money" question with a story. My first client was a highly respected professor. He did not practice preventative maintenance and he did not save money in this episode. He bought a new Lexis ...
April 20, 2017Mark Anthony Germanos
Have you ever wanted to send a large file? Today, I will show how to send a large file over the Internet. Files that are less than 10 MB can usually travel as e-mail attachments. If you try sending a large file (larger than 10 MB), you will get...unpredictable results. That's ...
April 18, 2017Mark Anthony Germanos
Watch out for phishing attacks. Yes, you read that right. You have to be street smart and watch for phishing attempts. These are attempts to gain your website credentials at a fake site. They are more common than ever. Perhaps you've seen e-mail asking you to verify your Amazon, PayPal or ...
April 16, 2017Mark Anthony Germanos
You have secure data. How secure is it? Your workday may be done. However, thousands of people can access your secure data all night long. Outsiders and insiders both are a risk. Some of history's worst attacks were conducted by insiders. To maintain access control and secure your data, you have ...
April 13, 2017Mark Anthony Germanos
Revisit Your cybersecurity resolutions. Yes, yes, yes, I know. It's not January 1st anymore. I agree. Regardless, you should look at your cybersecurity policies and ask if a) they are up to date, and b) if you're meeting them. This includes interviewing your IT department. They may see your ...
April 11, 2017Mark Anthony Germanos
Network security is an investment. Network security is not cheap. You already knew that. Individual solutions are becoming more costly. Inexpensive open source alternatives struggle to keep up. Compliance and quality assurance costs are rising annually. The total cost of cyber crime is reaching unprecedented levels, averaging $15 Million per year ...
April 9, 2017Mark Anthony Germanos
Hackers are targeting you and your data. Hackers attack daily. Most hacker attacks are not news headlines anymore. Hackers continue to gain access to valuable data and personal information daily. They target both private companies and government agencies. The good news is, most companies have begun to take security seriously. Therefore, ...
April 6, 2017Mark Anthony Germanos
You need a disaster recovery plan. Who wants to incur a fire, flood or theft that knocks you out of business? Nobody. Good. Who has a disaster recovery plan? You would use one to resuscitate your business if a disaster struck. Disasters happen. Airplanes landed in New York City. A hurricane and levee ...
February 26, 2017Mark Anthony Germanos
Do not waste money on a replacement battery. Yes. You read that right. I am advocating that you do not replace a failed cell phone battery. A failing battery is the first and usually most visible sign that your phone is failing. You should replace the complete phone. A story for you....
February 19, 2017Mark Anthony Germanos
You need to hire professional contractors. You need something done right, on time, the first time. Go shopping. You can find a professional or find someone who says he can do the work and "can give you a discount" before you start talking price. Should you hire him? I would say, no. ...
January 9, 2017Mark Anthony Germanos
Manage your Internet Domains before they get hijacked. Last week, a business owner walked up to me and said, “I think I need your help. Someone called me and offered me my Internet domains for $5,000. I am not receiving any e-mail and the web site you visit while trying to ...
December 30, 2016Mark Anthony Germanos
November 2, 2016Mark Anthony Germanos
Avoid the low bidder. You should avoid the low bidder. They usually cut corners in order to maintain their low pricing. This aggressive corner cutting usually works against you. You get cheaper parts, lower quality workmanship, or both. That’s why I avoid hiring low bidders and so should you. I recently hired ...
October 13, 2016Mark Anthony Germanos
Phishing…yes or no? This morning, I received a rather suspicious e-mail allegedly from Amazon.com. This looked like an order confirmation for a TV someone purchased and shipped to Alabama. Upon inspection, I learned this was a phishing attempt. I deleted the fraudulent message. I want to show how to identify a phishing ...
September 2, 2016Mark Anthony Germanos
If you see your password here, you better change it. When we choose passwords, most prefer easy to remember words. We're all guilty of doing that at least once. A client used her husband’s name, a woman who used her favorite baseball team and a man chose“12345” as his standard password. I kid ...
August 11, 2016Mark Anthony Germanos
Reduce interest-based ads’ effectiveness. Anybody out there tired of online ads that pull you away from your work? Same here. Online marketers track your web surfing habits. They then use that information to create interest-based ads they feel will appeal to you. I am showing two ads that appeal to me, ...
June 13, 2016Mark Anthony Germanos
Understanding passwords. The stronger your passwords, the more work an identity thief has to do to break them. A strong password is a password that: Has lowercase letters. Has uppercase letters. Has numbers, and Has special characters. We ...
May 13, 2016Mark Anthony Germanos
Protect your RFID charge cards. I bought an RFID blocking wallet…and so should you. RFID is an acronym. It stands for radio-frequency identification (RFID), which “uses electromagnetic fields to automatically identify and track tags attached to objects. The tags contain electronically stored information,” according to https://en.wikipedia.org/wiki/Radio-frequency_identification. These tags are commonly found ...
May 2, 2016Mark Anthony Germanos
Say YES to dual monitors. I recently told a client that she should have dual monitors at her desk. She replied, “I’ve been using only one for decades. Why do I need two now?” Here are some reasons: 1. Dual monitors present a larger, crisper image that spans across two devices. 2. Dual ...
March 28, 2016Mark Anthony Germanos