• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

Viruses

Avoiding Common Email Security Threats

September 30, 2010

Most companies today rely heavily on the use of email. Emailing is a very fast and cost effective form of communication for many different types of businesses.

Most companies use it as their main source of communication between employees. In fact, most employers do not realize the risk of using email.

Some risks range from viruses, hackers, to someone else just trying to gain a little information.

Here’s an overview of the most common email security threats in today’s Internet world.

Viruses
Viruses cause billions of dollars in damage to businesses every year.

Many corporate email systems are still quite vulnerable to viruses. In fact, in last year alone, an estimated 63 distinct email virus attacks hit the United States. These attacks come quickly and can spread quickly.

They mainly cause slowdowns across the internet. However some have been known to take down major corporation’s entire email systems.

Today’s viruses are very complex and often appear to be harmless such as personal notes, jokes, or promotions. While most viruses require recipients to download attachments in order to initiate infection and spread, some are designed to launch automatically with absolutely no user action required.

Spam
Studies have shown that 20 percent of corporate email is spam. A company that has a thousand employees could receive over two billion spam emails in a full year.

Most do not realize it until a lack of productivity ends up costing the companies billions of dollars each year.

While most spam is just annoying, some of it can be very dangerous. Most trick employees into opening malicious emails to spread faster. Also, many hackers have begun disguising viruses as spam.

Phishing
Phishing is used to trick a person into thinking the email is legit and came from a real website, usually asking the person to verify their password or to change some sort of account information.

Then, taking them to a fake website and stealing what you have typed in. This is the number one way people get their identity and personal information stolen.

Spyware
The main purpose of spyware is to install itself on the victim’s computer. It monitors all key strokes and mouse clicks so that they can later go back and collect usernames, passwords, credit card numbers and bank account numbers.

These infections can stay installed on computers for many months without an antivirus picking them up.  Most are detected and removed instantly if the user keeps their antivirus up to date.

Having a great antivirus that scans files as well as emails can help prevent virus attacks, phishing and spyware.

Users should also have an up to date spam filter that prevents the infection from getting to your inbox to begin with. And most importantly never open an email attachment you didn’t specifically request.

Also, pay attention to links inside emails that appear legitimate. Many times, phishers will send you an email that looks like it came from an official source. After clicking the links, you’re redirected to a site on the hacker’s network. This is often used to collect personal information and passwords.

What is a Trojan Virus and How Does It Affect You?

June 23, 2010

We have all experienced the unfortunate virus infection on our computer; it’s not fun and most times it causes down time on the computer, cost to have it  fixed, loss of data, and possible identity theft.

A trojan horse or trojan is a program that presents itself as one  thing (anti-virus or a game) butactually works in the background to gain unauthorized access to information in a computer.

A trojan virus can steal all sorts of information on your computer such as credit card information, passwords, bank information and then sends the information to the virus creators who can use this information for malicious gains and identity theft.

When you are infected with a trojan infection you will also notice a substantial difference in the speed of your computer and you may even experience several pop-ups related to adult content, casinos, etc.

Don’t click on any of those pop-ups as those will only make the infection harder to remove.

The trojan infection can spread from one PC to another very quickly from e-mails and attachments sent from the infected computer.

It can even corrupt data on a hard drive which will lead to system crashes and deletions of computer files.

Trojan Win32
One of the most dangerous of all trojans is the Trojan.Win32, which is also referred to as the Win32 Trojan. This dangerous infection masquerades on your computer asa legal program, hides from the user and allows remote third parties to take partial or full control of your computer and can record keystrokes.

It can also alter the security settings of your computer to allow more malware to be delivered and installed onto the computer.

How Does it Get Into My Computer?
We have clients ask all the time, “How did my computer get infected?” Most times these infections come from freeware applications that they downloaded, free online games that were downloaded, anti-virus not being updated, firewall settings, computer security settings set too lenient, or from not performing regular updates on the operating system.

The trojan infection wraps itself inside legitimate software such as games, videos, virus and spyware programs, or any commonly downloaded file. In the end, the user ends up with a malicious piece of software that does something entirely different than what it was supposed to do.

Now that you have a general idea of what a trojan is and the most common ways that they get into your computer, what do you do if you are infected?

The first thing that you should do once you notice the infection is to shut down the computer and do not use it for anything.

If you have never dealt with virus removals before then you’ll probably want to work with a professional IT company to do the virus removal, since if not done correctly, the removal process can cause more damage than the trojan.

If you do need to get on the computer to pull some files off, disconnect it from the Internet. That way, no personal information can be sent out from thecomputer such as your credit card or banking information.

Then, you’ll want to work with your IT provider to have a virus clean-up done on the computer. The goal is to get you back online and using your computer safely.

At Technology Experts, we work with clients on virus infections on a day to day basis. Our technicians have several tools and processes to remove virus infections without damaging your system or data.

QuickTime Video Software Target Of Hacker Attack

June 28, 2009

We all remember that it was not too long ago when Microsoft had left a huge hole for attackers to exploit in Windows XP.  Microsoft corrected the error by releasing a new security update and including it as an important update in the Windows Update service.

Now for the third time, attackers have found a new vulnerability in Windows. This attack only affects Windows XP, Windows 2003 server and Windows 2000. Windows Vista, Server 2008 and surprisingly Windows 7 aren’t affected.

Microsoft has already discovered that the attackers are using the code on many different video websites. The attack starts with a QuickTime video and exploits a problem in the Direct X software that Windows uses in almost everything you do, from watching videos to playing video games.

The hackers are using the code in QuickTime files which is the default video for Apple, but not in Windows. You most likely have QuickTime installed on your PC if you have an iPhone or iPod.

The malicious code is hidden inside video files, and allows the attacker to execute any kind of program he would like on the victim’s personal computer. Then, depending on what the attacker planned to do, they could take over your computer or make all your data disappear.

In order to get infected, you’d have to open an infected QuickTime file. Opening the file allows the hacker to have control of your computer. This virus code could be sent by an attachment in email or posted on any website. You’d just have to click and download the file in order to infect your computer.

According to the developers of QuickTime, QuickTime is not the flawed code, but rather, the code inside Windows that displays the QuickTime movie using Direct X is to blame.

The reason the newer operating systems are not vulnerable to these attacks is that the code was removed when Microsoft began development of Windows Vista.

Microsoft has already released two fixes for this security vulnerability. One is pretty technical and requires the user to edit the system registry. The second is a tool that Microsoft has built to automatically disable this feature.

Microsoft hasn’t released a patch, but said that once they do, users that used the automated tool will automatically have the parser turned back on.

Top Four Threats Attacking Your Network And What You Can Do About Them

May 28, 2009

Do you ever feel like your computer network could be more secure? Chances are, keeping a few simple things in mind will improve security and reduce downtime. Here are some things to look out for.

Social Networking Sites
Social networking sites like Facebook are exploding in popularity. Threats range from malware (e.g. viruses, worms,spyware) to scammers trying to steal your identity, information and money. Many businesses and government agencies are
using these sites to communicate with clients and constituents, so simply blocking access is no longer reasonable. Defending your company while allowing employee access requires social network education for your employees and the enforcement of strong acceptable use policies. We can help you develop a policy, then monitor compliance using a Unified Threat Management device that controls and reports on network
access.

Attacks On Mobile Devices
Everyone is going mobile these days not just the “road warriors.” Once limited to laptop computers, mobile network devices now include PDAs, handheld computers and smart phones, with new appliances appearing in the stores every month. Mobile devices often contain sensitive data yet they are easily lost or stolen. Be sure to password protect and encrypt data on all mobile devices whenever possible. Include mobile devices in your acceptable use policy.

Cloud Computing
“The Cloud,” in its most simple form, involves using the Internet to access and store your data. When you access email using a web browser, you are working in “the cloud.” Using the cloud for automated off site backup is rapidly gaining popularity and is just the beginning. Companies like Microsoft, IBM and Google envision the day when we will use inexpensive terminals instead of computers to run programs and access data located somewhere on the Internet. You need to be sure that any data you store and access across the Internet is secure not just where it is stored, but during the trip to and from the Internet.

Overconfidence
User overconfidence in security products is the top threat to your network. Failure to “practice safe software” results in nuisance attacks like porn storms (unstoppable rapid fire pornographic pop-ups) and more subtle key loggers that steal passwords. Surveys promising free stuff, result in theft of information like your mother’s maiden name, high school, etc. used to answer common security questions leading to theft of otherwise secure data. Think before you click!

Conficker And Other IT Security Issues Got You Worried? Here Are Some Tips To Keep You Out of Trouble!

April 30, 2009

If you watch television or read the news on the web, you no doubt heard about the April fool’s virus, also known as the conficker worm. I have been asked by numerous people “What about Conficker?” This worm is designed to have all the compromised computers “phone home” at a certain time and launch a denial of service, or DoS, attack on an unsuspecting website.

A DoS attack is an attempt to make a computer resource unavailable to its intended users. It generally consists of the concerted efforts of a person or persons to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely.

One common method of attack involves saturating the target machine with external communications requests, so that it cannot respond to legitimate traffic, or responds so slowly as to be rendered effectively unavailable. That was the goal of the Conficker worm – to make sites unavailable on the Internet.

So, what should you do to prevent this from happening to you? Here are a few simple rules to follow to protect your system from these worms.

Disable the autorun feature
Although this is a nice feature to have cds auto start, this risk is not worth the few extra seconds it takes to launch a cd on your own.

Update your protection
Do not just rely on the automatic update features of your virus and malware protection software. It is smart to visit these update centers and make sure you have the latest software, particularly when you’re doing a lot of sensitive work on your computer.

Check your Windows updates
It should go without saying that in addition to your virus definitions, you should regularly check windows updates and do not rely on the automatic update feature. In the case of the Conficker C worm, Microsoft has had this patch available since October of last year. Still, as you heard on the news, thousands of computers still got infected.

Get a second opinion
Have a trained, certified technician review your computer to determine if you have the latest updates and security patches in place, along with removing any malware infections you might already have.

Back up your data
I can’t stress enough the importance of maintaining a backup schedule. All your important data needs to be protected. And, you should always take a copy of this critical data off site, so that if a natural disaster strikes, you have an undamaged copy of your data available.

You never know when tragedy will strike, or some brand new virus or worm will attack your system before anti-virus software can be updated.

Contact Tech Experts and we can help you select the perfect backup solution for your office.

We’ve seen our fair share of worms and viruses come and go, and have an arsenal of tools and years of experience to keep your systems in top condition.

If you currently have a server and you have not been taking advantage of the Tech Experts server monitoring and maintenance plans, I would urge you to contact us as soon as possible to discuss the various options for your firm.

Technicians are always available to review your current network configuration and give you expert advice on security.

If you perform these few simple things I’ve listed above, you will be protected from the vast majority of malware and worms that are currently circling the Internet. With diligence in the future, you will be protected from most of the variants of these worms as they are released.

How To Spot And Protect Yourself From An Infection

November 23, 2008

Are you finding it harder and harder to protect yourself from malicious attacks from the internet?

To help protect yourself you should first start with how to identify them. We will start with sorting them in basic categories.

Viruses – they attach themselves to any file so that when you start the program, you activate the virus. These viruses are usually sent through email or downloaded files from the internet.

Worms – worms are just like what they sound. They keep multiplying and using up all the resources from the computer till the computer comes to a complete stop. These usually are spread through P2P programs and email. They can also be spread over your local network.

Trojans (a.k.a Spyware) – Trojans are the worst. They are used to steal information from the user. They are installed and used without permission and usually have some type of key logger to record what you are typing and send it back to the source so that they can collect credit card numbers and username/password to accounts. These are generally the hardest to find because they usually consists of multiple files.

The best way to protect from and prevent infections is to run the best antivirus/spyware software around. The number one common reason people get infected is not that they accidently download it but, that they do not keep track if their antivirus is installed and updated properly.

Just because you see in the bottom corner that your antivirus is running, does not mean its doing its job. Every day you should check to make sure that your antivirus is updating so that you are protected against the most recent infections. By doing that even if you download a virus the antivirus will scan the file and catch it before it gets too late.

If you do not have an antivirus program installed, I recommend installing one as soon as possible.

One of the best currently out right now is Computer Associates E-Trust Integrated Threat Manager and Antivirus. The program isn’t free, but is a bargain compared to the cost of downtime and an infection.


How To Keep Hackers At Bay

November 23, 2008

No one wants to have their network “hacked,” but what exactly can a hacker do?

Plenty, and you are right to be afraid!

One common way for hackers to access your network is through spyware or viruses, which are malicious programs written to imbed themselves into your network to gather private information, steal financial data, access passwords, e-mail addresses, and spread themselves to other users. But one of the most common ways for hackers to access your system is through e-mail, or spam e-mail to be more specific.

Phishing is when a hacker sends you a legitimate looking e-mail from a trusted source — like PayPal, your bank, eBay, or any number of other legitimate business web sites. These e-mails will tell you that your account is expired or will be closed if you don’t go to a designated web site and update or verify your account information.

Although you may have seen these e-mails before, be very careful! Hackers are brilliant at making not only the e-mail seem legitimate, but also at making the web site you go to look like the real thing.

If you fall prey to their scam, the site will gather your private information and then use that to access your bank account or to charge your credit card. To protect yourself, install a spam filter and NEVER open or respond to any e-mail requesting account verification. Instead, call the company. If it is a legitimate request, you can verify that with them over the phone.

Is Your Computer Acting Scary? Try These Tips!

October 17, 2008

Has your computer been acting strange lately? Has it been popping up with funny messages, running slower than normal, missing buttons or cannot get on the Internet? All of these things can be caused by malware and can do so without the computer user even knowing that they are being targeted.

Most effects of malware are just annoying to the user but some can attack your PC and cause the computer to be unusable or even to lose data.

The use of the Internet has caused an increase in this type of infection. What exactly are viruses, spyware, Trojans, worms, and adware?

• Viruses are computer programs that can copy itself and infect files increasing memory usage and slowing down the system. Viruses can be opened by launching a file that has .exe on the end. Other people can be infected by contact to the file that was originally infected. The virus can do harm by attaching to an application, application file or by residing in the memory (RAM).

• Spyware collects information about the user’s Internet activity or changes the configuration of the computer. They can change the home page that opens up when you start Internet Explorer or add buttons to Explorer. Also called adware.

• Trojans are, many times, a form on a web site that misleads you in believing that a program is used for a helpful purpose but instead has a malicious intent. You can be downloading a paint program to make artwork but instead you are really being infected by a Trojan that may harm your computer .

• Worms are like a virus but spread through a network of computers without a user doing anything. These will corrupt files and cause the Internet to run slowly on your computer.

• Malware are any of the above types of infections.

Now that you know exactly what these pesky pieces of software are, it is time to modify your Internet habits. These are some tips to help avoid risky behavior on the Internet.

• Use a firewall. This will help block unwanted transmissions to your computer.

• Update your operating system when needed. Microsoft routinely releases updates for security fixes.

• Use an anti-virus software.

• Never open e-mail or attachments from anyone that you do not know.

If you have questions about computer viruses, or think you may have an infection, call the Tech Experts 24 Hour Computer Emergency Hotline at (734) 240-0200.

How to Declare Freedom from Slow Computers, Downtime, Viruses, Hackers, and Computer Problems Finally and Forever!

July 23, 2008

Are you sick and tired of worrying about the security of your network against the latest spyware, virus, or hacker threat?

Would you like to have peace of mind knowing that your backups are working properly and storing your data in a secure, easy to restore format?

Do you want your network to always be “up” and running fast?

Then we have a service you need to know about…

It’s called our Experts Total Support plan. This program gives you fast, 24-7 computer support, maintenance, and monitoring for one low, fixed monthly rate without any surprises, hidden costs, or the expense of a full time IT staff!

Why Do you Need This?
Having a secure, reliable computer system is no longer a luxury for businesses today. If you can’t access your e-mail, financial information, client database, or other critical data, you’re OUT of business.

Plus, you must keep your data secure from corruption, loss, and theft; if you don’t, it could not only cost you dearly in downtime, but it could also cause your reputation harm when customers find out your network (and their data) has been compromised, stolen, or lost forever.

How Does It Work?
The concept is simple. For a fixed monthly fee, we will monitor and maintain your computer network 24/7, 365 days a year. We will make sure your anti-virus, spyware, and security patches are up to date. We’ll monitor your network for looming problems that could turn into downtime or data loss such as hardware failures and disk space problems.

We’ll also watch your backups to make sure they truly are running and not giving you a false-positive reading, and we’ll constantly optimize the health and overall speed of your network. After all, nothing is more frustrating than a slow computer!

Last (but not least!) we’ll be able to provide remote support through a highly secure Internet connection to provide almost instant support whenever you need it. No more waiting around for a technician to show up!

FREE Network Check gets you Started…
If you want to find out how our Experts Total Support plan can help your business, call us for a FREE Network Health Check. At no charge or obligation, we’ll come onsite and…

  • Look for incorrect network configurations that show up as unexpected downtime, application errors, printers not working, e-mail problems, etc.
  • Assess your current security against data corruption, theft, hardware failures, power outages, computer viruses, worms, hacker attacks, spam, and even employee sabotage.
  • Scan for spyware that is secretly stealing your company’s bandwidth, jeopardizing the speed of your computer system, and embezzling confidential information about your company.
  • Check your data backup system to ensure it is working properly and accurately backing up all of the critical information you NEVER want to lose.
  • Diagnose slow, unstable PCs and perform a quick network “tune up” to make programs load faster.

When we’ve finished, we’ll give you a network ‘report card’ that will reveal any weaknesses in your security or trouble spots on your network that could lead to bigger (more expensive) problems.

Normally we charge $297 for this, but if you call during the month of July, we’ll give it to you for FREE as our gift for introducing our Experts Total Support plan. Again, you are not obligated to sign up for this program or pay us anything for this service—but you have to hurry!

To get signed up now, call 734-457-5000 or go online to www.ExpertsTotalSupport.com.

How To Keep Hackers Away From Your Data

December 29, 2007

No one wants to have their network “hacked,” but what exactly can a hacker do? Plenty, and you are right to be afraid!

One common way for hackers to access your network is through spyware or viruses, which are malicious programs written to imbed themselves into your network to gather private information, steal financial data, access passwords, e-mail addresses, and spread themselves to other users.

But one of the most common ways for hackers to access your system is through e-mail, or spam e-mail to be more specific. Even if you have the latest anti-virus software installed, hackers are very clever at getting you to circumvent your anti-virus software through phishing e-mails.

Phishing is when a hacker sends you a legitimate looking e-mail from a trusted source — like PayPal, your bank, eBay, or any number of other legitimate business websites. These e-mails will tell you that your account is expired or will be closed if you don’t go to a designated website and update or verify your account information.

Although you may have seen these e-mails before, be very careful! Hackers are brilliant at making not only the e-mail seem legitimate, but also at making the website you go to look like the real thing.

If you fall prey to their scam, the site will gather your private information (usernames, passwords, accounts, etc.) and then use that to access your bank account or to charge your credit card.

To protect yourself, install a spam filter and NEVER open or respond to any e-mail requesting account verification. Instead, call the company. If it is a legitimate request, you can verify that with them over the phone.

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Five Reasons To Be Wary Of AI

May 19, 2025

Don’t Trust The Cloud Alone: Backup Your Cloud Data

May 19, 2025

Seven New And Tricky Types Of Malware To Watch Out For

May 19, 2025

Are You Leaving Your Office Door Open?

April 14, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Upgrading Viruses VOIP vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.