• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

Antivirus

How To Ensure A Safe And Virus-free Internet Experience

April 29, 2011

Visiting websites like Facebook, Ebay, or Youtube at work may keep you busy while there’s “nothing to do.” However, if your computer system isn’t properly protected, you run the risk of a virus or malware infection.

We’ve put together some of our best tips in this “safe browsing habits” article. Following these general guidelines can help protect you against Internet based threats.

One of the dangers faced by users when they browse the Internet is a hacker or infected computer accessing the browser’s cookies. Cookies are small text files saved on the computer by the server of the page the user is visiting.

The information cookies contain is usually related to the page being visited, which can include user names and passwords, browsing preferences, etc.

Java Applets and JavaScripts can also put users at risk. Although the majority of these programs that are run on the user’s computer at the request of the server are harmless, they can be designed to steal system information and send it to a malicious user.

Another threat that is becoming one of the most dangerous threats on the Internet is phishing. This technique involves tricking users into thinking that are visiting a legitimate web page, when they are actually visiting a malicious page.

This technique is particularly dangerous when the malicious page simulates an online banking page. Web pages that perfectly imitate the appearance and functions of well-known banking entities are becoming increasingly common-place on the Internet and entice users into entering personal data that will fall directly in the hands of unscrupulous cyber criminals.

But that’s not all. There are also viruses that are capable of getting into computers when users browse the Internet. To do this, they usually exploit vulnerabilities that allow them to install themselves on computers without the user realizing.

The malicious code that have the capacity to do this include many Trojans designed to steal confidential information from affected computers.

Online banking
When making transactions on the Internet, check that the process is carried out through a secure server. Several characteristics identify these types of servers. One of these is the address that appears in the address bar in the browser, which starts with https://.

What’s more, a padlock or key icon will appear in the browser window. If the padlock is closed or the key is complete (not broken), the server is secure.

Disable cookies
Another recommendation is to disable the cookies from the toolbar in the browser you are using. Although they must be enabled in order to access some web pages, they can be enabled temporarily.

Even though it may be tiresome enabling and disabling the cookies, it can prevent a lot of serious problems.

Double check the URL
To avoid falling victim to phishing scams, make sure that the page you are visiting is legitimate. To do this, copy the URL of the website you want to visit and paste it in the address bar of the browser. It is also advisable to identify and monitor the Java Applets and JavaScripts on the system to avoid any nasty surprises.

Raise your security level
Raise the security zone in the browser to ‘medium’ or ‘high.’ This can be done from the toolbar in the browser you are using.

Anti-virus is key
Finally, make sure that you have a reliable antivirus installed, which is updated at least daily. This will prevent malicious code from slipping into your computer while you are browsing the Internet.

Simple Tips To Keep You Out Of Computer Trouble

April 29, 2011

As you can imagine, we see a lot of computer and network issues . Sometimes, they’re pretty difficult to diagnose and repair, but in some cases, a simple fix is all you need. Here are some tips you can refer to the next time your computer goes a little crazy, and some advice to keep you out of trouble.

Reboot!
Nine times out of ten, rebooting your computer and connected equipment will solve the problem you’re having.

Do a full restart, which means go to your Start menu, shut down the computer, and power down your peripherals and computer. Then, restart it fresh.

We know what you did
A good computer consultant can tell if you’ve been bad or good on your computer, and usually pretty quickly. Tell us what you really did right before the computer crashed – this will save time and aggravation.

Your consultant will figure it out eventually – why not make the repair quicker?

There is no free lunch
Downloading free music, movies and games from the Internet can open holes in the security system of your computer, making it easy for other people to access your files.

Be safe… Only use legitimate sites like iTunes and Netflix for your downloads.

Use strong passwords
We walk a fine line in recommending passwords. If they’re really easy to remember, that means they’re also really easy to guess. If we make the password very hard to guess, it’s also going to be very hard to remember.

Here’s a suggestion: Create a “main” password which you then modify for each site you use. A good main password would consist of numbers and letters (but not your birth date!).

Try using your first dog’s name combined with the address of the first house you lived in, and then add to the password for each site. For example, buffy1944 could be a good base password. Then, you’d add AMZ at the end for your login to Amazon.com – buffy1944AMZ, EBY at the end for your eBay account, etc.

Update your antivirus
Hackers don’t care that you’re too busy to renew your antivirus and anti-spyware software – in fact, they hope you don’t! Set your software to update at least once a day and run a full system scan at least once a week.This is also a good time to schedule system maintenance tasks, like your system defrag.

Public wi-fi is public
If you don’t have an urgent need to check your online banking or private e-mail at the coffee house, don’t do it. While you’re on a public network, even if it is encrypted, a nearby hacker can capture your passwords and other personal information

 

The Three Scariest Threats To Small Business Networks

October 15, 2010

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.
While spam, pop-ups, and hackers are a real threat to any small business network, there are three security measures that you should be focusing on first before you do anything else.

Worry About E-mail Attachments, Not Spam
Sure, spam is annoying and wastes your time, but the real danger with spam is in the attachments.

Viruses and worms spread primarily through cleverly disguised attachments to messages that trick you or your employees into opening them.

Another threat is phishing e-mails that trick you by appearing to be legitimate e-mails from your bank, eBay, or other financial accounts.

Here are three things you must have in place to avoid this nightmare. First, keep your anti-virus up to date and enabled. This sounds like a no-brainer, but it’s not uncommon for an employee to disable their antivirus software “because it bothers them.”

Second, educate your employees on what is and isn’t allowed on company computers, e-mail, Internet access, etc. One thing that should be on the list is that they should never open suspicious attachments or respond to phishing e-mails. We highly recommend creating an acceptable use policy (AUP) to teach your staff what NOT to do.

Third, put monitoring software in place to maintain the health of employees’ desktops and automatically “police” employees from accidentally visiting a phishing website, downloading a virus, or visiting questionable web sites.

Fear Downloads Before Pop-Ups
Did you know that most computers and networks get infected with viruses because the user actually invited the threat in by downloading a file (screen saver, music file, PDF document, pictures, etc.)?

Again, this comes down to training your staff on what they can and cannot do with your company’s network. Again, the best way to avoid trouble is to remove temptation by installing monitoring software that will prevent employees from downloading or opening dangerous items.

We also recommend installing and maintaining a good firewall, which will block Internet traffic to and from dangerous sites.

Lose Sleep Over Backups, Not Hackers
You are more likely to lose data from hardware failure, accidental deletion, human error, flood, fire, natural disaster or software corruption than a hacker.

Sure, you should do everything to keep hackers out of your network, but not backing up your data to a remote location is incredibly dangerous. At a minimum, you should have an onsite and offsite copy of your data, and you should be testing your data backups regularly to make sure your data can be restored in the event of an emergency.

So, here’s the scary Halloween question for you: If you came into your office tomorrow morning, and your computers and server were destroyed or missing, could you recover your data, and how long would it take?

What is a Trojan Virus and How Does It Affect You?

June 23, 2010

We have all experienced the unfortunate virus infection on our computer; it’s not fun and most times it causes down time on the computer, cost to have it  fixed, loss of data, and possible identity theft.

A trojan horse or trojan is a program that presents itself as one  thing (anti-virus or a game) butactually works in the background to gain unauthorized access to information in a computer.

A trojan virus can steal all sorts of information on your computer such as credit card information, passwords, bank information and then sends the information to the virus creators who can use this information for malicious gains and identity theft.

When you are infected with a trojan infection you will also notice a substantial difference in the speed of your computer and you may even experience several pop-ups related to adult content, casinos, etc.

Don’t click on any of those pop-ups as those will only make the infection harder to remove.

The trojan infection can spread from one PC to another very quickly from e-mails and attachments sent from the infected computer.

It can even corrupt data on a hard drive which will lead to system crashes and deletions of computer files.

Trojan Win32
One of the most dangerous of all trojans is the Trojan.Win32, which is also referred to as the Win32 Trojan. This dangerous infection masquerades on your computer asa legal program, hides from the user and allows remote third parties to take partial or full control of your computer and can record keystrokes.

It can also alter the security settings of your computer to allow more malware to be delivered and installed onto the computer.

How Does it Get Into My Computer?
We have clients ask all the time, “How did my computer get infected?” Most times these infections come from freeware applications that they downloaded, free online games that were downloaded, anti-virus not being updated, firewall settings, computer security settings set too lenient, or from not performing regular updates on the operating system.

The trojan infection wraps itself inside legitimate software such as games, videos, virus and spyware programs, or any commonly downloaded file. In the end, the user ends up with a malicious piece of software that does something entirely different than what it was supposed to do.

Now that you have a general idea of what a trojan is and the most common ways that they get into your computer, what do you do if you are infected?

The first thing that you should do once you notice the infection is to shut down the computer and do not use it for anything.

If you have never dealt with virus removals before then you’ll probably want to work with a professional IT company to do the virus removal, since if not done correctly, the removal process can cause more damage than the trojan.

If you do need to get on the computer to pull some files off, disconnect it from the Internet. That way, no personal information can be sent out from thecomputer such as your credit card or banking information.

Then, you’ll want to work with your IT provider to have a virus clean-up done on the computer. The goal is to get you back online and using your computer safely.

At Technology Experts, we work with clients on virus infections on a day to day basis. Our technicians have several tools and processes to remove virus infections without damaging your system or data.

Online Banking: Five Steps To Protect Yourself

May 21, 2010

I was reading the Wall Street Journal website recently, and came across an interesting article about online bank fraud. The article was about a small business owner in California had over $100,000 stolen from his bank account.

He only recovered about $50,000 of it back. The other $50,000 went to a bank in Europe, where mules (someone who receives the stolen money) started to withdraw the money from the bank account.

How did this happen? The business owner had spyware on his computer that transferred his banking username and password to the hackers. I always shake my head when I read an article like this, because I know it could have been easily avoided.

Anti-virus and anti-spyware
The first step in protecting yourself is to make sure your computer has anti-virus and anti-spyware installed.

If you’re doing online banking, make sure that you’re using commercial quality protection – not something you download from the Internet for free.

The stronger your first layer of protection, the safer you are online.

We see computers every day that don’t have this simplest of protection installed; or, worse, the business owner has installed protection software, but then fails to keep it updated or renewed.

Unified threat management
The next step is to invest in a unified threat management (UTM) firewall. A UTM firewall is miles ahead of the simple DSL or cable routers you’d pick up at the office supply store.

They offer solid protection against viruses, hackers, spyware, and the host of other Internet dangers.

The device scans all Internet traffic in real time, and can protect you even before the anti-virus and antispyware vendors have updated their software for new attacks.

UTM firewalls can also implement web filtering and prevent the computer from reaching the intended attacker.

Web filtering can block access to websites that contain malware and spyware; it can also protect employees from going places they shouldn’t be.

Fortinet is our preferred vendor that makes firewall appliances that do what I describe above. A dedicated firewall and UTM appliance is very effective in helping prevent an attack such as this.

Block SPAM at the source
One of the sneakiest ways hackers can compromise your computer is through email, so you’ll want to look for a rock-solid spam filtering solution. Numerous cloud based (hosted) solutions exist that are very inexpensive. A good spam filter will keep viruses, phishing and other attacks from hitting your email. Reflexion is our favorite cloud based email filtering solution. The product is easy to use, well supported and extremely effective.

With online banking, phishing attacks are very common. Someone creates an email that looks like your bank in an attempt to collect information, you click on the link, and next thing you know, the hackers have your login and password.

Personally, I never open emails from my bank. Most banks will not contact you for important account information with email.

Perform regular maintenance
The fourth step to keeping your computers safe is patch management. Microsoft releases security updates for Windows nearly very week. Having a trained IT professional ensure patches are applied correctly – and quickly – will protect you from any security holes in the software that you’re running.

Most small businesses should look at one of our managed service plans, which provides you with “whatever it takes” service at a low fixed monthly cost.

Pay attention
The final step is a matter of common sense. Most people will go to potentially hazardous websites or click on something they shouldn’t have. My suggestion is if you are doing Internet banking, it should be on a computer that is used the least.

If you are going to go to questionable websites, don’t do it on the computer where you do your banking.

FBI: Rogue Antivirus Scammers Have Made $150M

February 25, 2010

They’re the scourge of the Internet right now and the U.S. Federal Bureau of investigation says they’ve also raked in more than $150 million for scammers. Security experts call them rogue antivirus programs.

The FBI’s Internet Crime Complaint Center (ICC) issued a warning over fake antivirus software, saying that Web surfers should be wary of sudden pop-up windows that report security problems on their computers.

This software can appear almost anywhere on the Web. Typically, the scam starts with an aggressive pop-up ad that looks like some sort of virus scan. Of course, the scan turns up problems, and the pop-up says the only way to get rid of them is to pay with a credit card.

This is always a bad idea. At best, the software is subpar. At worst, it could result in viruses, Trojans and/or keyloggers being installed on the computer. Identity thieves often use keyloggers to gain access to credit
card numbers, bank account information, and computer users’ social security numbers.

The tactics of the scareware have caused significant losses to users. The FBI is aware of an estimated loss to victims in excess of $150 million.

The IC3 says that users who see these unexpected antivirus pop-up warnings should shut down their browsers or their computers immediately and then run an antivirus scan to see what’s going on.

Legit Or Bogus? How To Spot A Rogue Anti-Virus Program

December 8, 2009

Have you seen an advertisement or pop-up offering a free PC scan, or telling  you that your computer is infected and at risk? If so, you’ve seen first hand a harmful trojan disguised as an anti-virus program.

These types of rogue anti-virus scams are on the rise. They appear legitimate, and the number one way unsuspecting users get infected is from clicking a malicious link in the pop-up message. Most of these pop-ups have what sound like legitimate virus names, and some even ask you to pay for the  program.

They will almost always have a notice indicating you need to “click here” to install the program to disinfect your PC. Once you click on that link, you’re infected.

To take it a step further, if you actually do enter your credit card information, the hackers have your personal data and can use it at will.

I have anti-virus. Won’t that protect me?

Though the best anti-virus programs will protect you from many threats they can not protect you against all malware, especially the newer infections.

There are millions of different types of infections and hundreds created every day. Even top of the line security companies take days and even weeks to catch the infections.

What can a rogue anti-virus program do?

An infection can do almost anything to a computer, from stealing information  to destroying your valuable data. Some malware will log your password information and use it to try to infect other computers on your network.

Some infections will let your computer be used as a “bot,” which lets attackers use it to share illegal files, attack other systems on the Internet, or spread infections to your friends and family.

How do I protect myself?

Here are some basic tips to keep yourself from being a victim of a rogue anti-virus program.

1. Keep your computer updated with the latest security patches for your operating system and web browser.

2. Never click on a pop-ups that you come across on a website. Even if the  advertisement looks legitimate, chances are it isn’t.

3. Check to make sure your Internet firewall and antivirus are updated every time you use your computer.

4. Turn off any Active-X and scripting from foreign websites. Many of the infections come from these types of scripts. Almost always, your system will ask you if you want to run the script. Always pick “no.”

5. Keep a good backup. Some infections can be so severe that you will need to restore files for your PC to be disinfected and repaired properly.

6. Scan your computer on a regular basis. Most antivirus programs will do this automatically. AVG is a very good program that will scan every day, and can be set to run at night so it doesn’t slow down your work.

Choosing The Right Antivirus Software

September 15, 2009

Protecting your computer from spyware, viruses, pop ups and malware is one of the most important things you can do as a computer owner. Not being protected can lead to stolen information or just plain harm to the computer.

Some infections can sit in the background and wait until the right time to deploy. By having a good antivirus program you can protect your computer at all times. Here are some tips to help you choose the right antivirus software for your system.

Costs
When looking for the right antivirus software do not forget to compare pricing. Most antivirus software is fairly priced. Some well known antivirus software can be very pricy due to the well known name that the company has. One of the more affordable antivirus programs that I know is low priced, but has great quality. It’s called Etrust, and it’s made by Computer Associates (CA).

Automatic Updates
You can pay all the money in the world for a good antivirus program, but if the antivirus signatures do not update automatically then it is not worth it. Almost every computer user does not even pay attention if the antivirus is on or not – most just assume it is taking care of business. By having an antivirus that automatically updates it can help keep the antivirus software up to date and protect you from the newest threats.

Frequency of Signature Updates
An important part of the software is how often the software actually updates. They say that a new virus is created every four minutes. So good antivirus software sends out multiple updates every day to make sure the virus signatures are up to date on the most recent threats.

Active Scanning
Active scanning is another feature that is very good to have. Some antivirus programs only protect the computer fi les as they’re being used or access, and not all the fi les on the system. You want protection that is active all of the time, and scans files and programs as you access them.

By having it scan it will look through all fi les on the computer to make sure there are no sleeping threats on the system. Many infections will just keep coming back so having the computer scan every day helps protect from those types of infections.

Performance
When looking at antivirus software, you have to ask yourself: “Will it slow down my computer?”

If the software takes a lot of space and resources, you may fi nd it will slow down your system when it’s working. If you sit down and think of these topics before you rush into buying new antivirus software, I am sure you will get great software for your money.

Also there are many websites that will compare antivirus programs if you are worried about the safety of your computer.

If you have any questions or concerns about the best antivirus for you, please feel free to give us a call here at Tech Experts at (734) 457-5000.

Raise IT Security Measures And Lower Your Stress

August 23, 2008

Updating Your Network Security Protects Your Valuable Data

Simplify. Prevent problems. Do it right, not over. These are just a few of the phrases among the most popular published in “Stress Reducing Tips” articles. But, how do you achieve these goals?

Take a look at your IT security measures first. Protecting your information systems from unauthorized use, disruption or destruction can help you reduce the number of stressful incidents that may arise as a result of a vulnerability. How can you decide what level of security is right for your organization?

Dive into a threat and risk analysis.
We can work with you to review the current security mechanisms and determine what needs to be protected. The level of security necessary for your business is largely reliant on the possible threats. If you have many employees, you may have a greater interest in user account changes versus a small dental practice whose chief concern is confidentiality.

Take advantage of our Free Network Audit and learn about the current options available for firewalls, controlled accessibility, anti-virus, spam filtering and much more.

Take time to develop a plan. Listen to employee feedback, analyze your current operations and review key points for development within your company in order to simplify business processes and protect your company data.

Think of the future.
Is your organization in growth mode or are you looking to stabilize your current position? Many clients come to us with only a few changes and end up with many things they would like completed to help increase security, increase efficiency, decrease operating costs or prepare for the future.

Prevent problems.
Security is everyone’s responsibility. According to Datapro Research, the most common causes of damage are: Terrorism, 3%; water, 10%; technical sabotage, 10%; dishonest people, 10%; fire, 15%; and, finally, human error, 52%. Unfortunately, 81% of this damage is caused by current employees.

You could install the most elaborate security and computer protection systems available, but if passwords are written on sticky notes and stuck to computer monitors in the office, or saved in Word documents, we cannot guarantee security.

New threats and vulnerabilities emerge everyday that can endanger your company. Take a preventive approach to managing your information systems with reliable security measures and proper staff training.

Firewalls and virus protection must be current. If you don’t know if these measures are in place, we can help you identify current software installed and enable or update them if necessary. A good anti-virus or firewall solution will automatically update itself as new updates are available.

Spam filtering is essential and can solve many e-mail problems that plague your inbox. Everyday spammers find new ways to get into e-mail inboxes. A lot of spam is simply unwanted advertising that is just annoying and takes up space. Some, though, are used to transmit viruses, adware or spyware that can eventually infect your entire network.

Take Caution Before Opening your Next e-greeting Card

July 23, 2008

According to a new article in PC Magazine, cyber criminals are now starting to exploit e-greeting card sites in an attempt to steal confidential information.

In 2007, nearly 1/3 of infected e-mail messages contained a phishing scam, while 7 percent of such e-mail messages masqueraded as an electronic greeting card and directed the target to a malicious site.

Here’s how it works: Hackers place a malicious hyperlink in the e-mail greeting, which first sends the user’s web browser to an exploit server that checks to see if the user’s machine has the most up-to-date security patches.

If it’s unpatched, the server silently force-downloads a rootkit and a keylogger onto the user’s computer before redirecting the web browser to an authentic Yahoo greetings card.

On the user-facing end, the victim clicks the link to view the card. However, the card does not let them know who sent it. The victim closes the card and goes about his business without realizing arootkit was delivered to his PC before he even picked up the card.

How do you avoid this from happening to you? First, never open emails from unknown sources. Second, make sure your PC/Servers always have the most up-to-date security patches. And finally, always maintain an active, up-to-date anti-virus software.

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Five Reasons To Be Wary Of AI

May 19, 2025

Don’t Trust The Cloud Alone: Backup Your Cloud Data

May 19, 2025

Seven New And Tricky Types Of Malware To Watch Out For

May 19, 2025

Are You Leaving Your Office Door Open?

April 14, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Upgrading Viruses VOIP vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.