<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Computer Service Now Blog</title>
	<atom:link href="https://blog.computerservicenow.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://blog.computerservicenow.com/</link>
	<description>Computer Service Industry News</description>
	<lastBuildDate>Mon, 09 Jan 2023 20:36:11 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>Should consumers have the Right to Repair their own devices?</title>
		<link>https://blog.computerservicenow.com/2023/01/09/should-consumers-have-the-right-to-repair-their-own-devices/</link>
					<comments>https://blog.computerservicenow.com/2023/01/09/should-consumers-have-the-right-to-repair-their-own-devices/#respond</comments>
		
		<dc:creator><![CDATA[RBeagle]]></dc:creator>
		<pubDate>Mon, 09 Jan 2023 20:36:11 +0000</pubDate>
				<category><![CDATA[computer repair]]></category>
		<category><![CDATA[computer service]]></category>
		<category><![CDATA[Computer Repair]]></category>
		<category><![CDATA[Computer Service]]></category>
		<category><![CDATA[Right to Repair]]></category>
		<guid isPermaLink="false">https://blog.computerservicenow.com/?p=4740</guid>

					<description><![CDATA[Consumers commonly spend hundreds or even thousands of dollars on electronics like computers and laptops, phones, tablets, TVs, and projectors. Even though these products belong to the consumer that bought them, if any of this technology breaks or needs to be repaired, most of the time the end-user is hindered by restricted access to tools, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">Consumers commonly spend hundreds or even thousands of dollars on electronics like computers and laptops, phones, tablets, TVs, and projectors. Even though these products belong to the consumer that bought them, if any of this technology breaks or needs to be repaired, most of the time the end-user is hindered by restricted access to tools, components, and software barriers.</span></p>
<p><span style="font-weight: 400;">A newly enacted bill in New York City, the Digital Fair Repair Act, is a new spin on an old concept where consumers have been fighting for the right to repair household items from automobiles to medical equipment to electronics. With the implementation of this new bill, consumers in New York will now have the right to repair their own electronics – and New York became the first state to enact a Right to Repair law.</span></p>
<p><span style="font-size: 14pt;"><b>Right to Repair</b></span></p>
<p><span style="font-weight: 400;">The “right to repair” refers to the concept that if you own something, you should be able to repair it yourself or take it to a technician of your choice. However, this isn’t the case with most current consumer electronics.</span></p>
<p><span style="font-weight: 400;">Imagine you bought an iPhone a few years ago, but the battery is beginning to degrade or the charging port isn’t working properly anymore. Now your only options are to use Apple Care (if your subscription is still active) or to take your phone to a third-party repair service. The problem is, these services can cost a lot more than the parts and equipment necessary to fix your phone in the first place – and Apple Care doesn’t even cover batteries, broken ports, defects caused by normal wear and tear, and more.</span></p>
<p><span style="font-weight: 400;">Although technically American consumers are already allowed to repair whatever they buy (thanks to the Magnuson Moss Warranty Act), people often lack the capability to get the information or parts necessary to perform these repairs. The Repair Association, a right-to-repair advocacy group, has several policy objectives which can either be incorporated with laws or require a shift in buyer expectations. Some of these objectives are:</span></p>
<p><b>&#8211; Make information accessible: </b><span style="font-weight: 400;">This proposes that everyone should have reasonable access to manuals, schematics, and software updates. Furthermore, software licenses need to provide support options and make clear what is included in the sale.</span></p>
<p><b>&#8211; Make parts and tools available: </b><span style="font-weight: 400;">The parts and tools necessary to service devices should be available to third parties, including individuals.</span></p>
<p><b>&#8211; Allow unlocking: </b><span style="font-weight: 400;">Previously referred to as “jailbreaking”, the government should legalize unlocking, adapting, or modifying a device so the owner can install custom software.</span></p>
<p><b>&#8211; Accommodate the repair in the design: </b><span style="font-weight: 400;">Devices should be designed in a way that makes repairs possible for consumers.</span></p>
<div style="text-align: center;"><a href="https://www.computerservicenow.com/services/computer-services"><img decoding="async" src="https://blog.computerservicenow.com/wp-content/uploads/2023/01/computer-repair.jpg" alt="Computer repair" width="100%" /></a></div>
<p><span style="font-size: 14pt;"><b>Why do people need the right to repair?</b></span></p>
<p><span style="font-weight: 400;">With more and more products that aren’t easily repairable coming on the market, including some products that can’t even be opened up without destroying them, it’s important that consumers have the right to repair their electronics as we move forward.</span></p>
<p><span style="font-weight: 400;">Whether it is intentional or not, manufacturers use a lot of different tricks that make repairs difficult for consumers, like using proprietary screws, declining to publish repair documentation, or gluing parts together. </span></p>
<p><span style="font-weight: 400;">Although there are websites dedicated to selling repair tools, teardowns, and repair documents, a single company or handful of organizations can’t make enough documentation to cover the vast amount of new products coming onto the market.</span></p>
<p><span style="font-weight: 400;">Consumer-advocacy groups aren’t the only ones in favor of the right to repair for consumers, climate activists also agree that with increased repairability the world will see less e-waste. After all, you can’t make a device last if you can’t make it work.</span></p>
<p><span style="font-weight: 400;">Who are the top offenders when it comes to making repairs difficult? While Apple finally opened its iPhone parts and tools to third-party repair shops in 2019, many other companies have yet to follow suit. </span></p>
<p><span style="font-weight: 400;">For example, if you took a cracked Samsung S11 to your local repair shop, odds are they would be able to fix it, but they’d tell you that the fix will cost so much money that you shouldn’t bother. Why is this? Because independent repair shops don’t have access to all of the diagnostic tools and other information necessary to properly repair these devices in a timely manner, which means official Samsung repair shops would always have the competitive advantage in this case.</span></p>
<p><span style="font-weight: 400;">On top of that, there is plenty of evidence that if companies want to make something repairable, they will. Just take Microsoft with the Surface Laptop 3 – they improved the repairability of the device from the previous model (Surface 2) without changing the core design.</span></p>
<p><span style="font-weight: 400;">Buyers are increasingly taking for granted that what they buy can be repaired, and this is becoming less and less common as devices and household equipment become more complex. However, right-to-repair legislation would establish a set of rules that promote repairability practices throughout a wide variety of industries – including consumer technology, agriculture equipment, and medical equipment.</span></p>
<p><span style="font-weight: 400;">When manufacturers are required to sell replacement parts and make repair documentation available, consumers will have a much easier time extending the life of the products that they buy.</span></p>
<p><span style="font-size: 14pt;"><b>Is there a case against the right to repair?</b></span></p>
<p><span style="font-weight: 400;">While a lot of good can come from enacting right-to-repair laws, some companies like Facebook, Toyota, Verizon, Apple, and more have lobbied against right-to-repair legislation, citing security risks from giving criminals access to technical information, safety risks from unauthorized repairs, and risks to intellectual property as their main concerns.</span></p>
<p><span style="font-weight: 400;">However, since we haven’t seen examples of these security risks in practice, some cybersecurity experts disagree with the claims manufacturers are making about the risk of consumer repairs.</span></p>
<p><span style="font-size: 14pt;"><b>When will consumers have the right to repair their electronics?</b></span></p>
<p><span style="font-weight: 400;">Although we’re not sure when consumers will have full rights to repair any of their devices, there is legislation put in place that encourages independent repairs. </span></p>
<p><span style="font-weight: 400;">While the Digital Repair Act has already been approved in New York, giving consumers and independent repairers the right to repair their consumer electronics, there is also federal legislation on the table.</span></p>
<p><span style="font-weight: 400;">There is an executive order that covers consumer protections related to airlines and broadband, but also focuses on one part of the right-to-repair objective: independence and DIY repairs. A fact sheet accompanying the order says: “(it) [e]ncourages the FTC to limit powerful equipment manufacturers from restricting people’s ability to use independent repair shops or do DIY repairs—such as when tractor companies block farmers from repairing their own tractors.” However, how this will be interpreted by the FTC is yet to be seen, but on July 21 the FTC will vote on whether to issue a new policy statement and, if approved, will offer us a better idea of when the right to repair for all consumers could be possible.</span></p>
<p><span style="font-weight: 400;">Additionally, right-to-repair legislation has been making it through at least 25 states and one national bill has been filed in Congress – and most agree that state and federal laws are still necessary even with an executive order.</span></p>
<p><span style="font-weight: 400;">It seems those who advocate right-to-repair laws won’t stop pushing until consumers have the right to repair their own devices. But when will that be? Hopefully soon.</span></p>
<p><span style="font-size: 14pt;"><strong>Need a repair?</strong></span></p>
<p>Not everyone wants to repair their own devices, that&#8217;s one of the many reasons why companies like ours exist.</p>
<p><span style="font-weight: 400;">Computer Service Now is happy to provide on-site services to businesses in the Southwest Ohio region. You need to be able to spend more time growing your business and less time worrying about your office equipment – that’s where the experts at Computer Service Now can help. Our </span><a href="https://www.computerservicenow.com/services/computer-services"><span style="font-weight: 400;">computer services, including computer repair, upgrades, tune-ups, and much more</span></a><span style="font-weight: 400;"> offer you an easy and hassle-free option to keep your office computers running smoothly.</span></p>
<p><span style="font-weight: 400;">With our high level of customer service and satisfaction, </span><a href="https://www.computerservicenow.com/"><span style="font-weight: 400;">Computer Service Now</span></a><span style="font-weight: 400;"> works hard to be the premier IT firm in the Cincinnati and Dayton region. We offer a wide variety of IT solutions that stay within your budget. For IT-related projects big and small, our experience, expertise, and variety of services allow us to provide the support you need to meet your business needs. <strong><a href="https://www.computerservicenow.com/contact">Contact us today</a> at 513-422-1907</strong> or visit our website to learn more about our <a href="https://www.computerservicenow.com/services"><strong>variety of services</strong></a> that allow us to provide the support you need to keep your business running smoothly.</span></p>
<p><a href="http://feeds.feedburner.com/ComputerServiceNowBlog"><span style="font-weight: 400;">Subscribe to our blog</span></a><span style="font-weight: 400;"> today to stay up-to-date with Computer Service Now and follow us on social media. Join in the discussion by commenting below.</span></p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.computerservicenow.com/2023/01/09/should-consumers-have-the-right-to-repair-their-own-devices/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Passkeys are the new Passwords</title>
		<link>https://blog.computerservicenow.com/2022/10/18/passkeys-are-the-new-passwords/</link>
					<comments>https://blog.computerservicenow.com/2022/10/18/passkeys-are-the-new-passwords/#respond</comments>
		
		<dc:creator><![CDATA[RBeagle]]></dc:creator>
		<pubDate>Tue, 18 Oct 2022 21:05:41 +0000</pubDate>
				<category><![CDATA[Passwords]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[MFA]]></category>
		<category><![CDATA[multi factor authentication]]></category>
		<category><![CDATA[passkeys]]></category>
		<category><![CDATA[passwords]]></category>
		<category><![CDATA[Phishing]]></category>
		<guid isPermaLink="false">https://blog.computerservicenow.com/?p=4725</guid>

					<description><![CDATA[If you’re not currently using a password manager and/or some type of multifactor authentication, you’re asking for trouble with cybersecurity. However, companies like Google are working towards a passwordless future – replacing passwords with passkeys. Although it’s still in the beta stages, Google is finally ready to bring passkeys to our devices. According to a [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">If you’re not currently using a password manager and/or some type of multifactor authentication, you’re asking for trouble with cybersecurity. However, companies like Google are working towards a <em>passwordless</em> future – replacing passwords with passkeys.</span></p>
<p><span style="font-weight: 400;">Although it’s still in the beta stages, Google is finally ready to bring passkeys to our devices. According to a statement by Google, “Passkeys are a significantly safer replacement for passwords and other phishable authentication factors. They cannot be reused, don’t leak in server breaches, and protect users from phishing attacks.”</span></p>
<p><strong>Let’s discuss exactly what passkeys are and how they will work for you.</strong></p>
<div style="text-align: center;"><a href="https://www.computerservicenow.com/services/it-consulting"><img fetchpriority="high" decoding="async" src="https://blog.computerservicenow.com/wp-content/uploads/2022/10/passkeys.jpg" alt="Passkeys" width="800" height="533" /></a></div>
<p><span style="font-size: 14pt;"><b>What are passkeys?</b></span></p>
<p><span style="font-weight: 400;">A passkey is a digital credential that is tied to a user account and a website or an application. Passkeys allow users to authenticate their account without being forced to enter their username, or password, or even provide any additional authentication (see multifactor authentication).</span></p>
<p><span style="font-weight: 400;">Basically, passkeys are a safer, easier replacement for passwords. Users will use these passkeys to sign in to applications and websites using a biometric sensor like fingerprint or facial recognition, which is already available on many of our devices. You’ll also sometimes have the option to use a PIN or pattern, freeing you up from having to remember and manage a multitude of passwords and authentication features.</span></p>
<p><span style="font-weight: 400;">In a single step, a passkey can replace a password AND a second-factor authenticator. This will make the user experience as simple as autofilling a password form – just the click of a button.</span></p>
<p><span style="font-weight: 400;">On top of convenience, passkeys also provide robust protection against phishing attacks, unlike SMS or app-based one-time passwords. In fact, since passkeys are standardized, a single implementation of a passkey in place of a password can enable a password-free experience across multiple browsers and operating systems, contingent on the fact that you’re logging into the same accounts.</span></p>
<p><span style="font-size: 14pt;"><b>How will passkeys work?</b></span></p>
<p><span style="font-weight: 400;">Similar to how saved passwords work today, your browser or operating system will help you find and select the correct passkey depending on which website or application you’re trying to access. In order to ensure the rightful owner can sign in using their passkey, the authentication system (passkey) will ask you to unlock your device – which can be performed via biometric sensor, PIN, or pattern.</span></p>
<p><span style="font-weight: 400;">In order to create a passkey for a website or application, you’ll be directed to register with that website or app. Once you return to the website or app to sign in, you’ll be able to take the following steps:</span></p>
<ol>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Go to the application or website.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Select </span><b>Sign in</b><span style="font-weight: 400;">.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Select your passkey.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Use the device screen unlock to complete the login.</span></li>
</ol>
<p><span style="font-weight: 400;">Your device will generate a signature based on the passkey, which is used to verify the login credential between the origin and the passkey. That means regardless of where your passkey is stored, you’ll be able to sign in to services on any device. For example, a passkey created for a website on a smartphone can be used to sign in to the same website on a desktop computer, tablet, or any other device. </span></p>
<p><span style="font-weight: 400;">Most importantly, passkeys can be used without any type of synchronization from your smartphone to your laptop or any other device you’re logging on to.</span></p>
<p><span style="font-weight: 400;">Since passkeys are built into FIDO standards, all browsers will be able to adopt them.</span></p>
<p><span style="font-weight: 400;">To put it simply, here’s how it works:</span></p>
<p><span style="font-weight: 400;">A user visits </span><b>site.example</b><span style="font-weight: 400;"> on their work desktop computer. This user has previously signed into </span><b>site.example</b><span style="font-weight: 400;"> on their Android smartphone and generated a passkey. On the desktop computer, the user will choose to sign in with a passkey from another device. Then the two devices will connect and the user will be prompted to approve the use of their passkey on their Android smartphone via fingerprint scanner. Once the fingerprint scanner automatically pops up on their smartphone, the user scans their fingerprint and is automatically logged on to the website on their work desktop.</span></p>
<p><span style="font-weight: 400;">Are you excited about replacing passwords with passkeys? While developers were able to start using these features beginning on October 12, </span>passkeys <span style="font-weight: 400;">should be available to more users “later this year,” according to Google.</span></p>
<p><span style="font-size: 14pt;"><b>Cybersecurity Services</b></span></p>
<p><span style="font-weight: 400;">Are you worried about keeping your passwords and data safe? If this information seems too much to process, contact Computer Service Now for a free security audit today.</span></p>
<p><span style="font-weight: 400;">Our network security options offer you an easy and hassle-free option to keep your network safe from cybersecurity attacks. We can help alleviate any concerns you have regarding cybersecurity, help you sign up with password managers or multifactor authentication, data backups, secure your Wi-Fi networks, enable dark web monitoring, and even educate your employees on the best practices.</span></p>
<p><span style="font-weight: 400;">At Computer Service Now, we strive for exemplary customer satisfaction – which is why we will always work with our customers until they are completely satisfied with the work completed. If you’re looking to bolster your security, we offer a wide variety of IT solutions that stay within your budget.</span></p>
<p><span style="font-weight: 400;">With over 35 years of experience providing on-site IT services to businesses around the southwest Ohio region, we are sure we can find a solution that works for your organization. Our network security packages offer you an easy and hassle-free solution to keeping your network safe from data breaches, ransomware attacks, and other cybersecurity concerns.</span></p>
<p><span style="font-weight: 400;">With a free consultation available, we will work with any existing IT staff to help them come up with better solutions to existing problems, manage any security vulnerabilities, and provide assistance with any other computer or network issues your organization is struggling with. Due to our advanced level of technicians, we are confident we will find a solution that works for you and your budget.</span></p>
<p><span style="font-weight: 400;"><strong><a href="https://www.computerservicenow.com/contact">Contact us today</a> at 513-422-1907</strong> or visit our website to learn more about our <a href="https://www.computerservicenow.com/services"><strong>variety of services</strong></a> that allow us to provide the support you need to keep your business running smoothly.</span></p>
<p>&nbsp;</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.computerservicenow.com/2022/10/18/passkeys-are-the-new-passwords/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Data Breach in France Highlights the Need for Increased Cybersecurity</title>
		<link>https://blog.computerservicenow.com/2022/10/11/data-breach-in-france-highlights-the-need-for-increased-cybersecurity/</link>
					<comments>https://blog.computerservicenow.com/2022/10/11/data-breach-in-france-highlights-the-need-for-increased-cybersecurity/#respond</comments>
		
		<dc:creator><![CDATA[RBeagle]]></dc:creator>
		<pubDate>Tue, 11 Oct 2022 20:46:17 +0000</pubDate>
				<category><![CDATA[Cybersecurity Tips]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Centre Hospitalier Sud Francilien (CHSF)]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[fraud schemes]]></category>
		<category><![CDATA[leaked data]]></category>
		<category><![CDATA[LockBit ransomware]]></category>
		<category><![CDATA[phishing attacks]]></category>
		<guid isPermaLink="false">https://blog.computerservicenow.com/?p=4719</guid>

					<description><![CDATA[In August, a hospital in France called Centre Hospitalier Sud Francilien (CHSF) had its data breached by hackers using LockBit ransomware. These cybercriminals demanded a ransom in order to unlock their systems, threatening to release all of the information they managed to steal from the data leak if the hospital or French authorities didn&#8217;t pay [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">In August, a hospital in France called Centre Hospitalier Sud Francilien (CHSF) had its data breached by hackers using LockBit ransomware. These cybercriminals demanded a ransom in order to unlock their systems, threatening to release all of the information they managed to steal from the data leak if the hospital or French authorities didn&#8217;t pay the equivalent of $10 million dollars.</span></p>
<p><span style="font-weight: 400;">However, because French law bans public institutions from paying ransoms, the hospital was unable to even make an attempt to pay the hackers. On Thursday, it was announced that because the Corbeil-Essonnes hospital near Paris refused to pay, the hackers have now dumped medical scans and lab analyses along with the national security numbers of patients.</span></p>
<p><span style="font-weight: 400;">Due to the attack, the CHSF was forced to shut down emergency services, restrict access to its systems, and even sent many patients to other institutions in order to protect their privacy. At one point, officials said the only technology that was still working was the phone.</span></p>
<p><strong>So what will happen with all of the patient data that was leaked? How will they use the leaked data for phishing attacks and other fraud schemes? And, most importantly, how can you secure your data from these types of breaches? Let’s answer these questions and more.</strong></p>
<div style="text-align: center;"><a href="https://www.computerservicenow.com/services"><img decoding="async" src="https://blog.computerservicenow.com/wp-content/uploads/2022/10/data-breach.jpg" alt="Data breach steps" width="100%" /></a></div>
<p><span style="font-size: 14pt;"><b>What happens after a data breach?</b></span></p>
<p><span style="font-weight: 400;">Following the data breach, with all of the patient data that was stolen released into the wild, the hospital is now informing its staff and patients to watch closely in the coming months for phishing attacks. Other groups of cybercriminals may attempt to use the leaked private information in various fraud schemes in the future.</span></p>
<p><span style="font-weight: 400;">This CHSF data breach and ransomware infection have prompted a national effort to boost cybersecurity in France. In fact, Health Minister Francois Braun announced that he will be providing an additional €20 Million in order to increase security in French hospitals, according to RFI.</span></p>
<p><span style="font-weight: 400;">Among the breach was some administrative data which included the NIR (social security number equivalent) and health data such as examination reports of anatomical pathology, radiology, laboratories of analysis, doctors, and other external files.</span></p>
<p><span style="font-weight: 400;">In a press release, the hospital noted how the cybercriminals followed through on their disclosure threat, citing that exfiltrated data was published on their website on the dark web. In light of their investigations, experts confirmed that the data published will concern the hospital&#8217;s patients, staff, and partners.</span></p>
<p><span style="font-size: 14pt;"><b>What should the hospital do next? How can you secure your data from data breaches?</b></span></p>
<p><span style="font-weight: 400;">According to statistics from the Ponemon Institute, the average total cost of a data breach is around $4 million (up from $3.8 million in recent years). Companies can minimize any damage caused by a data breach if the right steps are taken. Here are a few steps to take in response to a data breach:</span></p>
<p><b>Identify the source and extent of the breach: </b><span style="font-weight: 400;">The first step is to identify the source and extent of the data breach, that way you can address it soon and in the best way possible. In an ideal situation, you’ll already have intrusion detection and prevention systems (IDS and IPS) in place that can automatically log security events for your business.</span></p>
<p><span style="font-weight: 400;">Using these logs, you’ll be able to track down the source of the breach. Intrusion protection software allows you to see which files were accessed and what actions were taken by the hacker, which will be crucial to your next plan of action.</span></p>
<p><span style="font-weight: 400;">Without IDS/IPS for your network, it will take considerably more time for your IT team or consultant to collect this kind of crucial information.</span></p>
<p><b>Address the security breach: </b><span style="font-weight: 400;">If you have intrusion prevention systems in place, you may be able to proactively address the breach by automatically preventing unauthorized outside access. However, even with an IPS solution in place, it’s important to have an IT team in place to deal with breaches.</span></p>
<p><span style="font-weight: 400;">Although there could be a variety of next steps depending on the nature of the breach, a good recommended measure to take would be to save a disk image or copy of the affected servers at the time of the breach for legal purposes.</span></p>
<p><span style="font-weight: 400;">Furthermore, if an employee’s account was used in the attack, make sure to revoke that account’s privileges immediately and have other employees change their passwords.</span></p>
<p><b>Test your security fix: </b><span style="font-weight: 400;">Once your short-term security fix has been implanted, it’s important to test your solution as thoroughly as possible in order to make sure the attacker can’t use the same method to attack your company a second time.</span></p>
<p><span style="font-weight: 400;">This type of penetration testing needs to be repeated across all of your company’s servers and virtual machines in order to make sure the vulnerability doesn’t exist in another location.</span></p>
<p><b>Inform authorities and any affected parties: </b><span style="font-weight: 400;">Once you have a fix in place, data backed up, and a copy of affected servers has been saved, it’s important to contact the authorities and reach out to any customers that were affected by the data breach. Federal authorities will be able to provide you with instructions that are crucial for complying with post-breach regulatory standards for your industry.</span></p>
<p><span style="font-weight: 400;">Furthermore, reaching out to affected customers will give them advanced notice in case they need to take measures to protect their identities, such as canceling credit cards or changing bank account numbers. Although this may be an inconvenience, it’s much better than letting them get blindsided by identity theft or phishing scams.</span></p>
<p><span style="font-weight: 400;">When informing customers of the data breach, get the information to them as quickly as possible, inform them of what information may have been stolen, and be as thorough as possible by using multiple communication channels to ensure they received your warning. If necessary, provide some necessary steps customers can take to protect themselves.</span></p>
<p><b>Post-breach damage control: </b><span style="font-weight: 400;">A data breach can have impacts well after the initial breach has been resolved. One of the worst consequences is loss of customer confidence after a breach, which can be difficult to restore. However, by neutralizing a breach quickly, minimizing the impact, and informing your customers in a timely manner, public confidence can be restored in your company.</span></p>
<p><span style="font-weight: 400;">Once the breach has been resolved, this is a good time to consult with an outside IT consultant to see if there is anything your company can do to avoid data breaches in the future.</span></p>
<p><span style="font-weight: 400;">To learn more, consider reading </span><a href="https://blog.computerservicenow.com/2019/11/04/are-you-prepared-for-a-ransomware-attack/"><span style="font-weight: 400;">Are you prepared for a ransomware attack?</span></a></p>
<p><span style="font-size: 14pt;"><b>Address Security Breaches and Prepare for Cyberattacks</b></span></p>
<p><span style="font-weight: 400;">Has your company’s data been breached? Or do you want to <a href="https://www.computerservicenow.com/services/managed-service-provider">take a proactive approach</a> in order to avoid future breaches and make sure all of your data is backed up in the event of a cyberattack?</span></p>
<p><span style="font-weight: 400;">Computer Service Now has been in business for <a href="https://www.computerservicenow.com/about">over 35 years</a> providing on-site IT services to businesses in the Southwest Ohio region. Our <a href="https://www.computerservicenow.com/services/network-services">network security packages</a> offer you an easy and hassle-free solution to keeping your network safe from data breaches, ransomware attacks, and other cybersecurity concerns.</span></p>
<p><span style="font-weight: 400;">With an advanced level of service and focus on customer satisfaction, Computer Service now makes an extraordinary effort to be the premier IT firm in the Cincinnati and Dayton region. With a wide variety of IT solutions to fit a range of budgets, CSN can help companies with IT-related projects of any size.</span></p>
<p><span style="font-weight: 400;"><a href="https://www.computerservicenow.com/contact">Contact us today</a> or <a href="https://www.computerservicenow.com/">visit our website</a> to learn more about our variety of services that allow us to provide the support you need to keep your business running smoothly.</span></p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.computerservicenow.com/2022/10/11/data-breach-in-france-highlights-the-need-for-increased-cybersecurity/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Windows 11 Update: Enhanced Phishing Protection</title>
		<link>https://blog.computerservicenow.com/2022/10/05/windows-11-update-enhanced-phishing-protection/</link>
					<comments>https://blog.computerservicenow.com/2022/10/05/windows-11-update-enhanced-phishing-protection/#respond</comments>
		
		<dc:creator><![CDATA[RBeagle]]></dc:creator>
		<pubDate>Wed, 05 Oct 2022 20:53:33 +0000</pubDate>
				<category><![CDATA[Phishing]]></category>
		<category><![CDATA[anti-phishing]]></category>
		<category><![CDATA[phishing protection]]></category>
		<category><![CDATA[phishing support]]></category>
		<category><![CDATA[Windows 11]]></category>
		<category><![CDATA[Windows Update]]></category>
		<guid isPermaLink="false">https://blog.computerservicenow.com/?p=4712</guid>

					<description><![CDATA[Phishing has been the most popular type of hacking attack over the past few weeks, with companies like LastPass, Uber, and Rockstar Games all falling victim to this type of hacking attack recently. Although avoiding phishing scams generally involves using a lot of common sense, there is software and technology available to keep you safe [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">Phishing has been the most popular type of hacking attack over the past few weeks, with companies like LastPass, Uber, and Rockstar Games all falling victim to this type of hacking attack recently. Although avoiding phishing scams generally involves using a lot of common sense, there is software and technology available to keep you safe from these types of attacks, such as Windows’ latest update.</span></p>
<p><span style="font-weight: 400;">The Windows 11 22H2 update has been released, bringing an interesting security feature called “Enhanced Phishing Protection,” which was created in order to help Windows users protect their passwords more efficiently.</span></p>
<div style="text-align: center;"><a href="https://www.computerservicenow.com/services/managed-service-provider"><img decoding="async" src="https://blog.computerservicenow.com/wp-content/uploads/2022/10/phishing.jpg" alt="Windows 11 update: phishing protection" width="100%" /></a></div>
<p><strong>Whenever Windows users enter their passwords in a place where it isn’t necessary or recommended, Enhanced Phishing Protection will give a warning. Here’s how it works:</strong></p>
<p><span style="font-size: 14pt;"><b>Enhanced Phishing Protection</b></span></p>
<p><span style="font-weight: 400;">The newest feature in the Windows 11 22H2 update works alongside Windows security protections and helps protect any work or school passwords typed to sign into Windows 11 in 3 ways:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">If you type your password on any Chromium browser into a site deemed malicious by Microsoft Defender SmartScreen, Enhanced Phishing Protection will alert you. It will also prompt you to change your password in order to secure your account from potential hackers.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Enhanced Phishing Protection will warn you if you reuse your work or school Microsoft password on sites and apps, prompting you to change your password. Reusing passwords can make it easier for attackers who compromise one user’s password to gain access to multiple accounts.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Enhanced Phishing Protection will also warn you if you store any passwords in Notepad, Word, or any Microsoft 365 Office app. Since it’s not safe to store plaintext passwords in text editors, Microsoft will recommend you delete your password from these types of files.</span></li>
</ul>
<p><span style="font-weight: 400;">This kind of protection is great not just for personal computers, but for work applications. Since Windows login credentials can be especially valuable to hackers if they belong to someone within an organization, infiltrating one computer could grant a hacker access to the whole network. That’s why it’s important to keep your version of Windows 11 up-to-date and to make sure Enhanced Phishing Protection is enabled.</span></p>
<p><span style="font-size: 14pt;"><b>More Benefits of Enhanced Phishing Protection</b></span></p>
<p><span style="font-weight: 400;">Windows is taking a proactive approach when it comes to protecting passwords. Here are some additional benefits of Enhanced Phishing Protection:</span><b></b></p>
<ul>
<li aria-level="1"><b>Anti-phishing support: </b><span style="font-weight: 400;">A lot of phishing attacks occur by tricking users into accessing imitations of safe content and entering their credentials. EPP is trying to combat that by helping to protect users from reported phishing sites by evaluating URLs a site or app is connecting to, along with other characteristics, in order to find out if they are known to distribute or host unsafe content or scams.</span></li>
</ul>
<ul>
<li aria-level="1"><b>Secure operating system integration: </b><span style="font-weight: 400;">Since EPP is integrated directly into Windows operating system, it can understand any user’s password entry context (like process connections, URLs, and certificate information) in any browser or app. Because it has advanced insight into what is happening at the operating system level, EPP can identify when users type their password in an unsafe location. On top of that, if users happen to use their password in an unsafe manner, this feature will prompt users to change their password in order to minimize any chances of their compromised passwords being leveraged against them.</span></li>
</ul>
<ul>
<li aria-level="1"><b>Track Password Security with Microsoft Security Suite: </b><span style="font-weight: 400;">Since EPP is constantly learning from phishing attacks seen throughout Microsoft’s security stack, it works alongside other Microsoft security products in order to provide a layered approach to password security. This is especially useful for companies early in their password-less authentication adoption. If your company uses Microsoft Defender for Endpoint, you’ll have access to valuable phishing sensor data in the Microsoft 365 Defender Portal, which lets you view alerts and reports for unsafe password usage in your environment.</span></li>
</ul>
<ul>
<li aria-level="1"><b>Managing Enhanced Phishing Protection: </b><span style="font-weight: 400;">EPP works with your organization’s Group Policy and mobile device management settings. You’ll be able to customize which phishing protection scenarios will show users a warning depending on how you set up your EPP. It’s important to make sure this step is set up properly by a knowledgeable IT service technician.</span></li>
</ul>
<p>&nbsp;</p>
<p><span style="font-size: 14pt;"><b>Setting up Enhanced Phishing Protection</b></span></p>
<p><span style="font-weight: 400;">Since Enhanced Phishing Protection is set to audit mode by default, you’ll have to make some changes to settings if you want to truly protect your company. Audit mode prevents notifications to users for any protection scenarios. This means users won’t be warned if they enter work or school credentials into a phishing site, if they reuse their password, or if they unsafely store passwords in an application.</span></p>
<p><span style="font-weight: 400;">Since these are all scenarios in which you’re trying to protect your company, it’s recommended that you <a href="https://www.computerservicenow.com/services/managed-service-provider">configure Enhanced Phishing Protection</a> to warn users during all protection scenarios.</span></p>
<p><span style="font-weight: 400;">Visit </span><a href="https://learn.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-smartscreen/phishing-protection-microsoft-defender-smartscreen"><span style="font-weight: 400;">Microsoft&#8217;s Enhanced Phishing Protection tutorial</span></a><span style="font-weight: 400;"> to find out which security settings are recommended for your company.</span></p>
<p><span style="font-size: 14pt;"><b>Tech Support for Enhanced Phishing Protection</b></span></p>
<p><span style="font-weight: 400;">Are you trying to <a href="https://www.computerservicenow.com/services/managed-service-provider">enable Enhanced Phishing Protection</a> for your organization? Whether you have questions about installing the latest Windows 11 version 22H2 update, enabling Enhanced Phishing Protection, selecting the right settings, or <a href="https://www.computerservicenow.com/services/it-consulting">performing a network security audit</a> – Computer Service Now can help you today.</span></p>
<p><span style="font-weight: 400;">With over 35 years of experience providing on-site IT services to businesses around the southwest Ohio region, we are sure we can find a solution that works for your organization. Our network security packages offer you an easy and hassle-free solution to keeping your network safe from data breaches, ransomware attacks, and other cybersecurity concerns.</span></p>
<p><span style="font-weight: 400;">With a free consultation available, we will work with any existing IT staff to help them come up with better solutions to existing problems, manage any security vulnerabilities, and provide assistance with any other computer or network issues your organization is struggling with. Due to our advanced level of technicians, we are confident we will find a solution that works for you and your budget.</span></p>
<p><span style="font-weight: 400;"><a href="https://www.computerservicenow.com/contact">Contact us today</a> at 513-422-1907 or visit our website to learn more about our <a href="https://www.computerservicenow.com/services">variety of services</a> that allow us to provide the support you need to keep your business running smoothly.</span></p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.computerservicenow.com/2022/10/05/windows-11-update-enhanced-phishing-protection/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cybersecurity Threats &#8211; 2 popular apps you should know about</title>
		<link>https://blog.computerservicenow.com/2022/08/29/cybersecurity-threats-2-popular-apps-you-should-know-about/</link>
					<comments>https://blog.computerservicenow.com/2022/08/29/cybersecurity-threats-2-popular-apps-you-should-know-about/#respond</comments>
		
		<dc:creator><![CDATA[RBeagle]]></dc:creator>
		<pubDate>Mon, 29 Aug 2022 21:14:49 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Google Chrome]]></category>
		<category><![CDATA[online privacy]]></category>
		<category><![CDATA[TikTok]]></category>
		<guid isPermaLink="false">https://blog.computerservicenow.com/?p=4692</guid>

					<description><![CDATA[Do you use Google Chrome or TikTok? If you do, you may want to know how hackers are exploiting one of them and the other is monitoring your every keystroke. Do you value your online privacy? Continue reading to find out what is going on with Google Chrome and TikTok. Google Chrome Bug &#8211; Update [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">Do you use Google Chrome or TikTok? If you do, you may want to know how hackers are exploiting one of them and the other is monitoring your every keystroke.</span></p>
<p><strong>Do you value your online privacy? Continue reading to find out what is going on with Google Chrome and TikTok.</strong></p>
<div style="text-align: center;"><a href="https://www.computerservicenow.com/services"><img decoding="async" src="https://blog.computerservicenow.com/wp-content/uploads/2022/08/cybersecurity-concerns.jpg" alt="cybersecurity concerns" width="100%" /></a></div>
<p><span style="font-size: 14pt;"><b>Google Chrome Bug &#8211; Update your browser</b></span></p>
<p><span style="font-weight: 400;">A Google Chrome bug has been discovered and not only is it dangerous, but it’s actively being exploited by nefarious hackers. Although the company didn’t release a lot of information on the most critical issue as it typically restricts bug details until most users have updated their software, we do know what it has to do with.</span><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;">According to Dark Reading, a cybersecurity community, the Chrome bug has to do with “insufficient validation of untrusted input in Intents,” which could lead to malicious websites executing arbitrary code on your machine, among other potential problems.</span></p>
<p><span style="font-weight: 400;">The worst part is, that Google says it’s “aware that an exploit for CVE-2022-2856 exists in the wild,” meaning that there are hackers out there that use this bug for nefarious purposes – potentially tracking your keystrokes or even stealing your information.</span></p>
<p><b>You should update your Chrome browser as soon as possible. </b><span style="font-weight: 400;">Google released a fix earlier this week – so an update is available. This will bring your Chrome to version 104.0.5112.102/101 on Windows or 104.0.5112.101 on Mac and Linux. This update should automatically install on your Google Chrome browser, but if it hasn’t automatically triggered, </span><b>you should initiate the update now by going to Chrome’s “About” menu.</p>
<p></b><strong>To update Google Chrome:</strong></p>
<ul>
<li>1. On your computer, open Chrome.</li>
<li>2. At the top right, click More. (Or the 3 verticle dots)</li>
<li>3. Click Help. About Google Chrome.</li>
<li>4. Click Update Google Chrome.<em> Important: If you can&#8217;t find this button, you&#8217;re on the latest version.</em></li>
<li>5. Click Relaunch.</li>
</ul>
<p>&nbsp;</p>
<p><span style="font-size: 14pt;"><b>TikTok’s in-app browser monitors your every click and keystroke</b></span></p>
<p><span style="font-weight: 400;">Most of us are aware that some of the applications we use to monitor what we do, but TikTok appears to be the worst offender.</span><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;">Popular apps like TikTok, Facebook, and Twitter force you to use their in-app browser whenever you click on a link – and as it turns out, this enables these apps to monitor what you do.</span></p>
<p><span style="font-weight: 400;">The results were found using InAppBrowser, a tool that lists all the JavaScript commands executed by an iOS app as its in-app browser renders a web page – and the findings were disturbing. The data shows that apps, including TikTok, Instagram, and Facebook, all modify web pages that are opened in the in-app browser. According to InAppBrowser’s creator Felix Krause, “this includes adding tracking code (like inputs, text selections, taps, etc.), injecting external JavaScript files, as well as creating new HTML elements,” which could potentially be used in less-than-innocent ways. The app found that these in-app browsers also fetch website metadata, which is harmless.</span></p>
<p><span style="font-weight: 400;">However, when diving deeper into what these apps’ in-app browsers actually do, it was clear that TikTok does some especially questionable things with their browser. This includes monitoring all of users’ keyboard inputs and taps. </span><b>So what’s bad about that?</b><b><br />
</b><b><br />
</b><span style="font-weight: 400;">For example, if you open a webpage from TikTok’s application, and decide to purchase something – entering your credit card details, TikTok can access all of that information. In fact, out of all of the apps that use in-app browsers, TikTok was the only app that doesn’t even give you the option to opt out of the browser or use your device&#8217;s default browser. So if you use TikTok, you’re being forced to use their browser – and have any information you’re inputting monitored and potentially logged or recorded.</span></p>
<p><span style="font-weight: 400;">According to a statement to Forbes by a TikTok spokesperson, they confirmed the practice but argued that “the Javascript code in question is used only for debugging, troubleshooting, and performance monitoring of that experience. And it’s all needed to provide an optimal user experience,” she said.</span></p>
<p><span style="font-weight: 400;">Out of all of the apps that Krause looked at via InAppBrowser, none of them go as far as TikTok with their monitoring tools — so you can decide for yourself if this information is necessary for “the optimal user experience” in the TikTok app.</span></p>
<p><span style="font-weight: 400;">Some good examples of apps that don’t modify webpages or fetch metadata from sites you open are Snapchat and Robinhood.</span></p>
<p><b>If you want to avoid any monitoring by apps like TikTok, make sure you always open websites in your device’s default browser – and if that browser is Google Chrome, make sure it’s up to date.</b></p>
<p><span style="font-size: 14pt;"><b>Need Help?</b><span style="font-weight: 400;"><br />
</span></span><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;">Do you have questions or concerns about any of these steps? If you aren’t confident in updating Google Chrome properly or you have more questions about TikTok monitoring your information, contact a trusted Managed IT Service Provider like Computer Service Now.</span></p>
<p><span style="font-weight: 400;">Computer Service Now has been serving southwestern Ohio for over 30 years with IT services, computer service and repair, network services, web services, security cameras, communications and phone installation, and more. Contact us today for a free consultation for your business.</span></p>
<p><span style="font-weight: 400;">Keeping up with the latest cybersecurity practices can be difficult, even for industry professionals. That’s why managed IT service providers exist, to make sure everything you use daily is running properly and securely. If you’re worried about being monitored, or that your computers have malware, contact us today for a free business consultation.</span></p>
<p><span style="font-weight: 400;">With our high level of customer service and satisfaction, Computer Service Now works hard to be the premier IT firm in the Cincinnati and Dayton region. We offer a wide variety of IT solutions that stay within your budget. For IT-related projects big and small, our experience, expertise, and variety of services allow us to provide the support you need to meet your business needs. Contact us today and let us solve all of your IT needs today!</span></p>
<p><span style="font-weight: 400;">Our </span><a href="https://www.computerservicenow.com/services"><span style="font-weight: 400;">computer services</span></a><span style="font-weight: 400;">, including </span><a href="https://www.computerservicenow.com/services/computer-services"><span style="font-weight: 400;">computer repair, upgrades, tune-ups</span></a><span style="font-weight: 400;">, and </span><a href="https://www.computerservicenow.com/services"><span style="font-weight: 400;">much more</span></a><span style="font-weight: 400;"> offer you an easy and hassle-free option to keep your office computers running smoothly.</span></p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.computerservicenow.com/2022/08/29/cybersecurity-threats-2-popular-apps-you-should-know-about/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>8 Warning Signs You Have Malware and How to Get Rid of it</title>
		<link>https://blog.computerservicenow.com/2022/08/01/8-warning-signs-you-have-malware-and-how-to-get-rid-of-it/</link>
					<comments>https://blog.computerservicenow.com/2022/08/01/8-warning-signs-you-have-malware-and-how-to-get-rid-of-it/#respond</comments>
		
		<dc:creator><![CDATA[RBeagle]]></dc:creator>
		<pubDate>Mon, 01 Aug 2022 21:25:55 +0000</pubDate>
				<category><![CDATA[Malware Help]]></category>
		<category><![CDATA[PC Maintenance]]></category>
		<category><![CDATA[Pop-up removal]]></category>
		<category><![CDATA[Social Media Account Help]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[browser redirected]]></category>
		<category><![CDATA[malware removal]]></category>
		<category><![CDATA[managed IT service provider]]></category>
		<category><![CDATA[pop-up ads removal]]></category>
		<category><![CDATA[ransomware help]]></category>
		<category><![CDATA[Ransomware Removal]]></category>
		<category><![CDATA[social media account hacked]]></category>
		<category><![CDATA[system tools disabled]]></category>
		<guid isPermaLink="false">https://blog.computerservicenow.com/?p=4680</guid>

					<description><![CDATA[Fake social media posts, pop-up ads, and ominous warnings are just a few tell-tale signs your PC has been infected with Malware. Is your computer acting up? Don’t panic. In this article, we discuss some tips for diagnosing malware and explain how to get rid of it. If you’re working on a project and suddenly [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Fake social media posts, pop-up ads, and ominous warnings are just a few tell-tale signs your PC has been infected with Malware.</strong></p>
<div style="text-align: center;"><a href="https://www.computerservicenow.com/services/managed-service-provider"><img decoding="async" src="https://blog.computerservicenow.com/wp-content/uploads/2022/08/social-media-account-hacked.jpg" alt="Social media account hacked" width="100%" /></a></div>
<p><span style="font-weight: 400;">Is your computer acting up? Don’t panic. In this article, we discuss some tips for diagnosing malware and explain how to get rid of it.</span></p>
<p><span style="font-weight: 400;">If you’re working on a project and suddenly you start seeing pop-up ads, your files begin taking longer to load, or you&#8217;re noticing other performance issues – your PC may be infected with malware.</span></p>
<p><span style="font-weight: 400;">Continue reading to learn some of the most common types of malware and <a href="https://www.computerservicenow.com/services/managed-service-provider">how to get your PC running normally again</a>.</span></p>
<p><span style="font-size: 14pt;"><b>Your computer is running slow</b></span></p>
<p><span style="font-weight: 400;">Has your computer slowed down recently? There could be malware running in the background, waiting to be triggered, or monitoring your keystrokes and the websites you visit. If you haven’t updated your antivirus recently, now is the time to run the update and make sure to trigger your trusted antivirus to scan your computer.</span></p>
<p><span style="font-weight: 400;">However, sometimes if your computer is running slowly, it isn’t malware causing the problem. We recommend you </span><a href="https://blog.computerservicenow.com/2022/06/06/16-ways-to-speed-up-your-computer/"><span style="font-weight: 400;">check out these tips for speeding up your computer</span></a><span style="font-weight: 400;"> if you don’t think your PC has been infected.</span></p>
<p><span style="font-size: 14pt;"><b>Your Social Media account is generating fake posts</b></span></p>
<p><span style="font-weight: 400;">While email scams are a pretty widely known threat, most people are completely unaware that malware can spread through social media – in fact, social media attacks accounted for over 10 percent of phishing attacks in 2020. So how does malware spread via social media?</span><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;">While the easiest way would be for a hacker to gain access to your account by finding out login information, there are a variety of other methods that nefarious individuals use to spread malware on social media sites like Facebook, Twitter, Linkedin, Instagram, Pinterest, and even TikTok.</span></p>
<p><span style="font-weight: 400;">Malware links on social media are generally hidden within something else. For example, someone might copy the profile picture and whatever else is publicly available from one of your Facebook friend’s accounts and send you a friend request. When you accept the request, they might share an image or link with you that acts as a trojan horse (not the virus) for the malware that will infect your computer.</span></p>
<p><span style="font-weight: 400;">To put it simply, the people that try to cyber attack you on social media are going to get creative. There is really any number of methods they can try and new ones will continue to develop.</span></p>
<p><span style="font-weight: 400;">The best way to protect yourself from social media malware would be to </span><a href="https://blog.computerservicenow.com/2021/11/16/data-breach-is-your-password-on-the-dark-web/"><span style="font-weight: 400;">check your passwords</span></a><span style="font-weight: 400;"> and consider installing a password manager. On top of that, be wary of anyone you&#8217;re communicating with on social media platforms, and don’t click any links without an explanation from a trusted contact.</span></p>
<p><span style="font-size: 14pt;"><b>Pop-up Ads</b></span></p>
<p><span style="font-weight: 400;">Although pop-ups aren’t as common as they once were, thanks in part to ad blockers and more secure internet browsers, adware programs can bombard their victims with advertisements. Sometimes they can be misleading enough to give you ads for legitimate products in order to net an affiliate fee for the adware perpetrator any time someone clicks on the ad. Other times these pop-ups can contain links to malicious websites that will attempt to drop even more malware on your PC.</span></p>
<p><span style="font-weight: 400;">If you’re browsing the same websites as usual and receiving new unwanted pop-up ads, chances are your computer is infected with malware. In the case of pop-up adware, the fix is usually as simple as installing an anti-malware solution that automatically performs scans and doesn’t let any viruses or threats reach your PC.</span><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;">Perhaps the anti-malware trial that was previously installed on your computer has expired or maybe you accidentally deleted it when clearing space on your computer. Don’t worry, there are plenty of free and paid options for anti-malware software solutions like Avast One Essential, AVG AntiVirus Free, Bitdefender Antivirus Free, Microsoft Defender Antivirus, or Adaware Antivirus Free.</span></p>
<p><span style="font-size: 14pt;"><b>Your browser keeps getting redirected</b></span></p>
<p><span style="font-weight: 400;">Although not every site redirect is malicious, if you are taken to an unfamiliar site when you click on a link, you could have a problem with malware. The redirect isn’t always noticeable, so pay close attention especially when you’re on banking sites and other websites with sensitive or identifying information.</span></p>
<p><span style="font-weight: 400;">For example, a banking Trojan may divert your browser to a fraudulent site that looks nearly identical to your bank’s real website. In these cases, the only clue is the URL in the address bar – which will be at least slightly different than when you’re on the correct website.</span></p>
<p><span style="font-weight: 400;">Redirection attacks typically rely on browser extensions. The best first step would be to look into your browser settings and delete any extensions that have been recently installed or updated as they have probably been infected by malware. It’s also a good practice to disable or delete any extensions you’re not currently using so this is less likely to reoccur in the future.</span></p>
<p><span style="font-size: 14pt;"><b>Unknown applications send you ominous warnings</b></span></p>
<p><span style="font-weight: 400;">Malware (sometimes called scareware) using hidden download links and other sneaky tactics to get fake antivirus programs onto your computer is a lucrative business for cybercriminals. Sometimes these downloads can be included with other programs you downloaded (usually for free) on the internet.</span></p>
<p><span style="font-weight: 400;">Once the scareware program is on your computer, it will send you fake warnings regarding fictitious security threats. They may even disguise their program to look like a real malware scanning program — it will seem really efficient since it’s not actually doing anything. And once the scan is complete, you’ll be directed to “fix” the problems it found – usually costing a fee.</span></p>
<p><span style="font-weight: 400;">If you think that your computer has been infected with a fake antivirus application or other malware, make sure you install a security suite or antivirus immediately – but this time make sure it’s from a trusted website and developer. There are plenty of free programs available as mentioned above in the pop-up ads section.</span></p>
<p><span style="font-size: 14pt;"><b>You receive Ransom demands</b></span></p>
<p><span style="font-weight: 400;">Some malware programs can literally hijack your data and hold your PC for ransom. Some ransomware threats encrypt your photos and documents and demand you pay them in order to regain access. Others will encrypt your entire computer, rendering it completely useless unless you pay to have it “unlocked.”</span></p>
<p><span style="font-weight: 400;">Although these ransomware threats seem intimidating, most ransomware attacks display false warnings in order to get you to take another step – whether it is clicking another link or paying a fine. For example, they may display a warning from an official-looking agency like the FBI warning you that your computer was used to do something illegal, then attempt to extort you for money in order to use your computer, files, or programs again.</span></p>
<p><b>Keep in mind, that even if you do pay into ransomware threats, you probably won’t get your programs back. </b><span style="font-weight: 400;">Download an antivirus application or security suite in order to stay protected against these kinds of threats. Although most trusted antivirus programs should keep you protected from these cyberattacks, you can also add dedicated ransomware protection software to your security arsenal.</span></p>
<p><span style="font-size: 14pt;"><b>Your system tools are disabled</b></span></p>
<p><span style="font-weight: 400;">An informed computer user might launch the task manager or check settings if they suspect the presence of malware. However, if you suddenly find that your system tools are unavailable – prompting you to contact your system administrator to gain access – this may have been an attempt at self-defense from malware already on your PC.</span></p>
<p><span style="font-weight: 400;">Assuming you have access to download new programs, now is the time to download a security suite or antivirus program. If you can’t access new programs, contact us today.</span></p>
<p><span style="font-size: 14pt;"><b>Everything seems perfectly normal</b></span></p>
<p><span style="font-weight: 400;">Even if everything is running smoothly like it should, your PC could still be infected with malware. It’s possible for your computer to be infected with malware that leaves a bot waiting on your system awaiting instruction from its command and control system. This type of attack could be used in a DDoS (Distributed Denial of Service) attack or a Remote Access Trojan could potentially be harvesting your personal information and keeping quiet so you don’t notice.</span></p>
<p><span style="font-weight: 400;">That means if you haven’t done a virus scan or checked your security suite lately, now is the time. These types of programs should detect any bad programs that were recently installed and help you remove them. If you still think your computer might be infected, contact a </span><a href="https://www.computerservicenow.com/services/managed-service-provider"><span style="font-weight: 400;">Managed IT Service Provider</span></a><span style="font-weight: 400;">.</span></p>
<p><span style="font-size: 14pt;"><b>I want to get rid of malware</b></span></p>
<p><span style="font-weight: 400;">If you’re ready to get rid of malware that you suspect is lurking on your computer, install a trusted antivirus application or security program immediately, as mentioned above. If you already have a security suite, it is possible that malware got past your protection – which does happen. If this is the case, make sure you manually run an update to ensure your antivirus has the latest malware definitions – then manually run a full scan.</span></p>
<p><span style="font-weight: 400;">Once you’ve dealt with the problem at hand, now is time to check your defenses. Make sure the antivirus you have installed received high marks from trusted sources like PCMag, and that everything is completely up-to-date. These steps should take care of protecting your local data, but if you’re looking for an additional layer of protection, consider installing a VPN (virtual private network). VPNs work by running your internet activity through an encrypted channel, protecting your data while it’s in transit. Here are our </span><a href="https://blog.computerservicenow.com/2022/06/28/the-best-vpns-for-staying-anonymous-and-secure/"><span style="font-weight: 400;">top picks for VPNs for staying anonymous and secure on the web.</span></a></p>
<p><span style="font-size: 14pt;"><b>I need help securing my work computers</b></span></p>
<p><span style="font-weight: 400;">Do you need help with any of these steps? If you aren’t confident you’ve taken the steps to secure your computer, passwords, and data, contact a trusted Managed IT Service Provider like Computer Service Now for assistance.</span></p>
<p><span style="font-weight: 400;">Computer Service Now has been serving southwestern Ohio for over 30 years with IT services, computer service and repair, network services, web services, security cameras, communications and phone installation, and more. Contact us today for a free consultation for your business.</span></p>
<p><span style="font-weight: 400;">Keeping your computers secure and staying up with the latest antivirus technology can be difficult even for industry professionals. That’s why you should contact a managed IT service provider to quickly solve all of your problems with malware – so you can spend more time growing your business and less time worrying about protecting your office equipment.</span></p>
<p><span style="font-weight: 400;">With our high level of customer service and satisfaction, Computer Service Now works hard to be the premier IT firm in the Cincinnati and Dayton region. We offer a wide variety of IT solutions that stay within your budget. For IT-related projects big and small, our experience, expertise, and variety of services allow us to provide the support you need to meet your business needs. Contact us today and let us solve all of your IT needs today!</span></p>
<p><span style="font-weight: 400;">Our </span><a href="https://www.computerservicenow.com/services"><span style="font-weight: 400;">computer services</span></a><span style="font-weight: 400;">, including </span><a href="https://www.computerservicenow.com/services/computer-services"><span style="font-weight: 400;">computer repair, upgrades, tune-ups</span></a><span style="font-weight: 400;">, and </span><a href="https://www.computerservicenow.com/services"><span style="font-weight: 400;">much more</span></a><span style="font-weight: 400;"> offer you an easy and hassle-free option to keep your office computers running smoothly.</span></p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.computerservicenow.com/2022/08/01/8-warning-signs-you-have-malware-and-how-to-get-rid-of-it/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Best VPNs for staying anonymous and secure</title>
		<link>https://blog.computerservicenow.com/2022/06/28/the-best-vpns-for-staying-anonymous-and-secure/</link>
					<comments>https://blog.computerservicenow.com/2022/06/28/the-best-vpns-for-staying-anonymous-and-secure/#respond</comments>
		
		<dc:creator><![CDATA[RBeagle]]></dc:creator>
		<pubDate>Tue, 28 Jun 2022 20:57:59 +0000</pubDate>
				<category><![CDATA[Service Technician]]></category>
		<category><![CDATA[VPN]]></category>
		<category><![CDATA[CyberGhost VPN]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[ExpressVPN]]></category>
		<category><![CDATA[NordVPN]]></category>
		<category><![CDATA[Proton VPN]]></category>
		<category><![CDATA[Remote Work]]></category>
		<category><![CDATA[setting up a VPN]]></category>
		<category><![CDATA[TunnelBear VPN]]></category>
		<category><![CDATA[virtual private network]]></category>
		<category><![CDATA[work from home]]></category>
		<guid isPermaLink="false">https://blog.computerservicenow.com/?p=4668</guid>

					<description><![CDATA[Did you know your internet service provider (ISP) tracks every click you make to compile anonymous browsing logs to sell to advertising companies or government agencies? Unfortunately, your browser’s Incognito/Private mode only clears your history, searches, cookies, and login details – but it won’t hide or secure your connection from your ISP and other prying [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">Did you know your internet service provider (ISP) tracks every click you make to compile anonymous browsing logs to sell to advertising companies or government agencies? Unfortunately, your browser’s Incognito/Private mode only clears your history, searches, cookies, and login details – but it won’t hide or secure your connection from your ISP and other prying eyes. And if you’re using an unsecured public WiFi connection – you’re basically inviting hackers to view, steal, or manipulate your data.</span></p>
<p><span style="font-weight: 400;">If you’re looking for actual internet anonymity, consider getting a virtual private network – more commonly known as a VPN. Continue reading to find out why you need a VPN, how to select a VPN service, and which services we recommend.</span></p>
<div style="text-align: center;"><a href="https://www.computerservicenow.com/services"><img decoding="async" src="https://blog.computerservicenow.com/wp-content/uploads/2022/06/vpn.jpg" alt="VPN" width="100%" /></a></div>
<p><span style="font-size: 14pt;"><b>What is a VPN?</b></span></p>
<p><span style="font-weight: 400;">A VPN is a service that creates an encrypted connection between your device and a private, remote service that hides and secures your web traffic. This service essentially extends your private network across a public network and enables users to send and receive data as if your device was directly connected to the private network.</span></p>
<p><span style="font-weight: 400;">The process of routing your traffic through a VPN masks your internet protocol (IP address &#8211; the specific number that is assigned to your device when it’s connected to a local network) which can otherwise contain a surprising amount of personal information – like approximate location and the name of your ISP.</span></p>
<p><span style="font-weight: 400;">With a VPN enabled if someone decides to look up your IP address, they’ll see your VPN server’s location instead of yours.</span></p>
<p><span style="font-size: 14pt;"><b>Why use a VPN?</b></span></p>
<p><span style="font-weight: 400;">Prior to the pandemic, the main selling point of VPNs was their ability to improve their users’ online privacy and security. However, virtual private networks can be used for more than just connecting to a server for privacy reasons. They can also be used by employees to connect to their own company’s private network. Businesses commonly use VPN firewalls to prevent unapproved people from accessing their private servers, but the same software can be used to allow employees entry to a company’s server with the proper login credentials to access the network from a home desktop or laptop. Essentially you can use a VPN to connect to your work desktop in order to access the same files, programs, and applications from home.</span></p>
<p><span style="font-weight: 400;">In addition to encrypting your location and IP information, VPNs can also grant you access to websites and services that are blocked in certain locations. For example, you can use a VPN to connect to Netflix in China or Youtube at school if it is blocked by your school administrators. Users can simply choose a server in a region where the desired content is available in order to skirt around geo-restrictions and firewalls.</span></p>
<p><span style="font-weight: 400;">When you’re connected to a public WiFi network, this is perhaps the most important time to use a VPN, even if it’s password-protected. If you don’t connect to a VPN while on a public network, it isn’t difficult for nefarious hackers to crack WiFi Protected Access 2 (WPA2) encryption – which is the most commonly used security protocol in coffee shops, airports, hotels, subway stations, fast food restaurants, and more. Once they crack the network, these nefarious parties use network vulnerabilities for WiFi eavesdropping or “man-in-the-middle attacks” – when a cybercriminal intercepts a transmission between the user and a website at a poorly secured WiFi hotspot. If your connection has been intercepted, these hackers will now have access to your information any time you log in to a financial account as long as you’re still connected to the same network.</span></p>
<p>Are you looking to connect to the internet on the go? If you need to stay connected, but don&#8217;t want to use public WiFi, <a href="https://www.rentacomputer.com/rentals/wireless">consider a wireless hotspot rental from Rentacomputer.com</a>.</p>
<p><span style="font-size: 14pt;"><b>Selecting a VPN</b></span></p>
<p><span style="font-weight: 400;">Since choosing a VPN isn’t straightforward, you should definitely do some research before signing up for a plan. Here is some of the criteria a good virtual private network should fulfill:</span></p>
<p><b>A good track record. </b><span style="font-weight: 400;">Look for an experienced provider with a clear track record. A quick Google search will be able to tell you whether or not the provider in question has made headlines for security breaches or customer data leaks.</span></p>
<p><b>Location. </b><span style="font-weight: 400;">The physical location of your VPN ensures that your data doesn’t fall under the jurisdiction of intelligence-sharing allies – for example, a VPN located in the U.S., the UK, Canada, Australia, New Zealand, Denmark, France, Norway, the Netherlands, Belgium, Germany, Italy, Sweden, and Spain can technically be forced by the authorities to collect and provide user data to their agencies. Look for VPNs located in the British Virgin Islands, Panama, Switzerland, Romania, or other privacy-friendly countries.</span></p>
<p><b>Network size and diversity. </b><span style="font-weight: 400;">Your provider should have enough servers (and server locations) to choose from so you don’t have to share the same IP address with a bunch of other users. This is useful because you’ll have more bandwidth to spare and are less likely to be detected by services that block VPNs. For example, IP addresses with heavy traffic are generally huge red flags to companies like Netflix, Hulu, Disney+, and other streaming giants.</span></p>
<p><b>Customer support. </b><span style="font-weight: 400;">No matter which VPN you choose, you’re probably going to run into connection issues at one point or another. It’s important to have a reachable, responsible support team in order to troubleshoot these kinds of issues quickly and effectively.</span></p>
<p><span style="font-weight: 400;">While it’s important to consider these factors, it’s also important not to choose a VPN based exclusively on its performance in speed tests. The fact of the matter is, your internet experience will almost certainly be faster without a VPN – but we aren’t using VPNs to get a faster connection. Factors like trust, server distribution, price, and ease of use are far more important than connection speed.</span></p>
<p><span style="font-weight: 400;">The best VPNs also have some of these additional features:</span></p>
<p><b>AES 256-bit encryption.</b><span style="font-weight: 400;"> Advanced Encryption Standard (AES) 256-bit encryption is a super-strong, military-grade encryption protocol that&#8217;s effectively uncrackable.</span></p>
<p><b>A kill switch. </b><span style="font-weight: 400;">If your VPN drops or gets disrupted, a kill switch will enable your device to immediately disconnect from the internet and block all traffic – keeping your real IP address secure.</span></p>
<p><b>Split tunneling.</b><span style="font-weight: 400;"> Split tunneling tools allow you to choose which traffic gets sent through your VPN, which can conserve bandwidth and prevent bottlenecks.</span></p>
<p><b>Multihop connections. </b><span style="font-weight: 400;">This type of connection encrypts your data twice by routing it through two servers instead of one for extra security.</span></p>
<p><b>Dedicated IP addresses. </b><span style="font-weight: 400;">Most providers will charge a premium for this feature, as it ensures that your IP address is only assigned to a single user – you. If you use a VPN often, this may be worth it for the faster download speeds.</span></p>
<p><span style="font-size: 14pt;"><b>The Best VPNs</b></span></p>
<p><span style="font-weight: 400;">Unfortunately, most free-to-use VPNs are free due to the vulnerabilities they may cause due to spyware, potentially selling your data or tricky terms and conditions that trick you into signing up for services you don’t want. The best VPNs will have a subscription fee, but typically only cost between $2 and $12 per month, depending on the length of the subscription and the number of features included.</span></p>
<p><span style="font-weight: 400;">Here are some of the best VPNs that we recommend:</span></p>
<p><b>ExpressVPN</b></p>
<p><span style="font-weight: 400;"><a href="https://www.expressvpn.com/" rel="nofollow">Express VPN</a> is based in the British Virgin Islands and is one of the best all-around VPNs when it comes to transparency, user-friendliness, server diversity, cross-platform support, and security tools. Although it is one of the most expensive plans on the list, it feels like a premium service without the complexity.</span></p>
<p><span style="font-weight: 400;">Some interesting features available with ExpressVPN are Parallel Connections – which speeds up your connection time, and Threat Manager – which blocks third-party trackers.</span></p>
<p><b>Supported Platforms: </b><span style="font-weight: 400;">Windows, Mac, Android, iOS, Linux, Chromebook, routers, Kindle, Chrome, Firefox, Edge, Apple TV, Amazon Fire TV, Samsung Smart TV, Roku, Chromecast, Nvidia Shield, Playstation, Xbox, and Nintendo Switch.</span></p>
<p><b>CyberGhost VPN</b></p>
<p><span style="font-weight: 400;">One of the best things about <a href="https://www.cyberghostvpn.com/en_US/" rel="nofollow">CyberGhost VPN</a> is the fact that there are no hidden or delayed fees. The rate that you sign up for on day 1 is the same rate you’ll pay throughout your subscription with this VPN, although additional features like a dedicated IP address, a password manager, and access to its maximum-security &#8220;NoSpy&#8221; servers come with additional subscription fees.</span></p>
<p><span style="font-weight: 400;">CyberGhost VPN has a huge network with dedicated streaming, gaming, and torrenting services. This VPN also backs up its “no-logs&#8221; policy with annual transparency reports.</span></p>
<p><b>Supported platforms:</b><span style="font-weight: 400;"> Windows, Mac, Android, iOS, Linux, Chrome, Firefox, Amazon Fire TV Stick, Android TV, Apple TV, Samsung Smart TV, LG Smart TV, Chromecast, Roku, routers, Playstation, and Xbox.</span></p>
<p><b>NordVPN</b></p>
<p><span style="font-weight: 400;"><a href="https://nordvpn.com/country/usa/" rel="nofollow">NordVPN</a> is a Panama-based provider that has an unrivaled suite of top-notch security features. Some of the best features include a Double VPN – a tool that encrypts your data twice, Obfuscated Servers – which hide the fact that you’re using a VPN, and Threat Protection – which guards you against web trackers, malware, dangerous websites, and annoying ads, and Onion Over VPN – which adds extra protection when you’re accessing the Onion network and removes the necessity for a Tor browser. Nord VPN also includes add-ons like dedicated IP addresses, cloud storage, a data breach scanner, and a password manager for additional fees.</span></p>
<p><b>Supported platforms:</b><span style="font-weight: 400;"> Windows, Mac, Android, iOS, Linux, Chromebook, Chrome, Firefox, Edge, Android TV, Amazon Fire TV Stick, Chromecast, Kindle, Xbox, PlayStation, Nintendo Switch, and Raspberry Pi.</span></p>
<p><span style="font-weight: 400;">Although a quick Google search would reveal NordVPN was hacked back in 2018, the attack was isolated to only one NordVPN server and affected only between 50 to 200 users without compromising any traffic laws because of the company’s strict no-logging policy.</span></p>
<p><b>TunnelBear VPN</b></p>
<p><span style="font-weight: 400;">If this is your first time using a VPN, <a href="https://www.tunnelbear.com/" rel="nofollow">TunnelBear</a> may be your best choice. The TunnelBear app consists of a world map with tiny icons representing servers in different countries. To connect to a server, just move the toggle switch to “on” and wait for the bear in your current location to navigate to that server.</span></p>
<p><span style="font-weight: 400;">Although TunnelBear is simple to use, it isn’t a perfect service. With limited app support, a no money-back guarantee, and a small server network – TunnelBear is best used as an introductory to VPNs. Not to mention the company is based in Canada, which is one of the countries that may be forced by the authorities to collect and provide user data to their agencies. Still, TunnelBear can be used as a short-term solution if you’re someone who wants to test out a VPN for the first time.</span></p>
<p><b>Supported platforms:</b><span style="font-weight: 400;"> Windows, Mac, iOS, Android, Chrome, and Firefox.</span></p>
<p><b>Proton VPN</b></p>
<p><span style="font-weight: 400;">Founded by scientists at MIT and CERN, <a href="https://protonvpn.com/" rel="nofollow">Proton VPN</a> made the list because of its commitment to consumer privacy. In fact, Proton VPN has stashed its critical infrastructure inside a high-security Swiss data center that requires biometric access. On top of that, it maintains open-source apps – meaning anyone can scrutinize the code leading to many audits by independent security experts.</span></p>
<p><span style="font-weight: 400;">Although it doesn’t offer 24/7 chat support or offer split-tunneling to non-Windows/Android users, Proton VPN is a decent pick if you aren’t concerned with using a VPN with a huge server network.</span></p>
<p><b>Supported platforms:</b><span style="font-weight: 400;"> Windows, Mac, Android, iOS, Linux, Chromebook, and Android TV.</span></p>
<p><span style="font-size: 14pt;"><b>Need help setting up a VPN?</b></span></p>
<p><span style="font-weight: 400;">If your IT team is out of its depth, we’re here to help. We can help you choose the best VPN for your business based on pricing and features, establish the connection, and make sure it’s running properly. </span></p>
<p><span style="font-weight: 400;">Our computer services, conference room technology assistance, IT consulting, and other services offer you an easy and hassle-free option to keep your computers, servers, and business services running smoothly.</span></p>
<p>At Computer Service Now, we strive for exemplary customer satisfaction – which is why we will always work with our customers until they are completely satisfied with the work completed. If you’re looking to bolster your security, we offer a wide variety of IT solutions that stay within your budget. For IT-related projects big and small, our experience, expertise, and <a href="https://www.computerservicenow.com/services">variety of services</a> allow us to provide the support you need to meet your business needs. <a href="https://www.computerservicenow.com/contact">Contact us today</a> and let us solve all of your IT needs!</p>
<p><span style="font-weight: 400;">Contact us and let us solve all of your IT needs today!</span></p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.computerservicenow.com/2022/06/28/the-best-vpns-for-staying-anonymous-and-secure/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>16+ Ways to Speed Up Your Computer</title>
		<link>https://blog.computerservicenow.com/2022/06/06/16-ways-to-speed-up-your-computer/</link>
					<comments>https://blog.computerservicenow.com/2022/06/06/16-ways-to-speed-up-your-computer/#respond</comments>
		
		<dc:creator><![CDATA[RBeagle]]></dc:creator>
		<pubDate>Mon, 06 Jun 2022 22:03:53 +0000</pubDate>
				<category><![CDATA[Computer Service Now]]></category>
		<category><![CDATA[computer tips]]></category>
		<category><![CDATA[defrag]]></category>
		<category><![CDATA[disk cleanup]]></category>
		<category><![CDATA[malware scan]]></category>
		<category><![CDATA[Slow Computer]]></category>
		<category><![CDATA[speed up computer]]></category>
		<category><![CDATA[upgrade hardware]]></category>
		<guid isPermaLink="false">https://blog.computerservicenow.com/?p=4656</guid>

					<description><![CDATA[Is your computer running slow? Whether it’s a desktop or a laptop, here are a few simple steps to speeding up your Windows-based PC. Whether your PC has been slowly degrading in speed or it happened all of the sudden, working with a slow computer can hamper productivity and cause frustration. Even if you run [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><b>Is your computer running slow? Whether it’s a desktop or a laptop, here are a few simple steps to speeding up your Windows-based PC.</b></p>
<div style="text-align: center;"><a href="https://www.computerservicenow.com/services/computer-services"><img decoding="async" src="https://blog.computerservicenow.com/wp-content/uploads/2022/06/slow-computer-1.jpg" alt="Speed up computer" width="100%" /></a></div>
<p><span style="font-weight: 400;">Whether your PC has been slowly degrading in speed or it happened all of the sudden, working with a slow computer can hamper productivity and cause frustration. Even if you run malware monitoring applications, other problems can arise that have nothing to do with cybersecurity.</span></p>
<p><span style="font-weight: 400;">If you think you’ve tried everything and are ready to throw out your old computer, you may want to consider following some of these tips before you spend the money. Some simple decluttering and other technical operations can have your slow computer running like the day you plugged it in for the first time.</span></p>
<p><span style="font-size: 14pt;"><b>Close System Tray Programs</b></span></p>
<p><span style="font-weight: 400;">When you boot up your PC a lot of programs are set to run by default, but oftentimes these programs aren’t necessary for normal operations. To close these programs, navigate to your system tray – otherwise, these programs will continue running and potentially hamper your computer’s speed and your productivity.</span></p>
<p><span style="font-weight: 400;">Accessing the system tray will be similar for Windows 7, 8, and 10 – but not identical. The system tray is located at the bottom right of your main screen. If there aren’t a bunch of programs displayed here, you may have to click the upward-facing arrow on the right side of your taskbar (to the left of your clock). Once you’ve figured out which programs you don’t need to complete your daily tasks,</span><b> right-click</b><span style="font-weight: 400;"> these programs individually and then select </span><b>Exit</b><span style="font-weight: 400;">, </span><b>Close</b><span style="font-weight: 400;">, </span><b>Shut Down</b><span style="font-weight: 400;">, or something similar depending on the program.</span></p>
<p><span style="font-size: 14pt;"><b>Stop programs running on startup</b></span></p>
<p><span style="font-weight: 400;">Now that you’ve figured out that you don’t want certain programs launching when you boot up your computer, let’s make sure that these programs (and any additional unnecessary programs) don’t load on startup. Programs like Antivirus software are probably necessary to keep running, but other programs can unnecessarily slow down your PC.</span></p>
<p><span style="font-weight: 400;">There are multiple ways to launch your task manager in order to select which programs launch on startup. You can either </span><b>Right-Click</b><span style="font-weight: 400;"> the taskbar and select </span><b>Task Manager </b><span style="font-weight: 400;">or simply hold </span><b>Ctrl-Shift-Esc </b><span style="font-weight: 400;">to automatically launch the taskbar. Alternatively, you can press </span><b>Ctrl-Alt-Delete </b><span style="font-weight: 400;">to launch a menu that includes the task manager.</span></p>
<p><span style="font-weight: 400;">Once you launch the Task Manager, you may have to select </span><b>More Details</b><span style="font-weight: 400;"> depending on which operating system your PC is running. Now that you can see various tabs, select the </span><b>Startup </b><span style="font-weight: 400;">tab.</span></p>
<p><span style="font-weight: 400;">While there is no one-size-fits-all guide for which programs need to be running, you can probably determine which apps are unnecessary to run all the time. Remember, removing these apps from launching on startup doesn’t mean you can’t launch this app later by going to your start menu and finding the application. </span></p>
<p><span style="font-weight: 400;">Your task manager should have a category called </span><b>Startup impact</b><span style="font-weight: 400;"> which tells you how much this program affects the performance of your computer. It is recommended to close </span><b>High </b><span style="font-weight: 400;">impact programs first, then medium, low, and not measured. Remember not to close any programs that are essential for your daily tasks or for normal operations of your PC. If you aren’t sure if you should close a program, it is highly recommended that you either leave it alone or try going to Google and searching for the program to find out what it does.</span></p>
<p><span style="font-weight: 400;">For </span><b>Windows 7</b><span style="font-weight: 400;"> users, instead of accessing the task manager, go to your start menu and search </span><b>System Configuration</b><span style="font-weight: 400;">.</span></p>
<p><span style="font-size: 14pt;"><b>Update Windows, drivers, and applications</b></span></p>
<p><span style="font-weight: 400;">While keeping your software up-to-date is great for cybersecurity reasons, it can also speed up the normal processes of your computer. Usually, Windows sends a notification automatically when an update is available.  Make sure you don’t put these updates off.</span></p>
<p><span style="font-weight: 400;">If you want to check for updates, or if you think you’ve missed an update, you can always check by going to the </span><b>Start Menu</b><span style="font-weight: 400;"> and selecting or typing </span><b>Settings</b><span style="font-weight: 400;">. Then go to </span><b>Updates &amp; Security &gt; Windows Updates. </b><span style="font-weight: 400;">Once you’re ready to update, select </span><b>Check for updates</b><span style="font-weight: 400;">.</span></p>
<p><span style="font-weight: 400;">Drivers and applications should also be updated when prompted – which is good for both cybersecurity and system performance. If you think one of your drivers or programs is due for an update, a simple Google search should help you figure out which version you should be using.</span></p>
<p><span style="font-size: 14pt;"><b>Delete Unnecessary Files</b></span></p>
<p><span style="font-weight: 400;">Just like an overcrowded photo album, computers can get cluttered too. If you deal with a lot of large files like high-resolution images, audio files, or video files on a daily basis, these programs can likely slow down your computer’s performance.</span></p>
<p><span style="font-weight: 400;">You can free up space by making a habit of deleting these files and folders each week and </span><b>emptying the recycling bin</b><span style="font-weight: 400;"> afterward. If you do this regularly, you’ll be so familiar with your files and folders that you’ll know you won’t be accidentally deleting an important file.</span></p>
<p><span style="font-weight: 400;">Alternatively, if you want to free up space while keeping all of your files, there are a few ways to accomplish this. After all, HDDs (hard disk drives) run at peak speeds only up to 90 percent capacity and SSDs (Solid State Drives) can run at peak speed until they reach about 75 percent capacity. To free up space and keep your files, consider using Google Drive, DropBox, OneDrive, Amazon Cloud Drive, IDrive, Box, or a similar personal cloud storage service. These programs keep your files on a cloud server and don’t affect your computer&#8217;s performance until you need to access these files on the web.</span></p>
<p><span style="font-size: 14pt;"><b>Find out which program is using too many resources</b></span></p>
<p><span style="font-weight: 400;">If your computer is only suddenly running significantly slower, chances are you downloaded (knowingly or unknowingly) a program that is eating up your resources. To find out which program is slowing down your computer, go back to your </span><b>Task Manager</b><span style="font-weight: 400;">. In the </span><b>Processes </b><span style="font-weight: 400;">tab, select </span><b>More details</b><span style="font-weight: 400;"> to find out information about the programs that are currently running on your computer.</span></p>
<p><span style="font-weight: 400;">Then you can sort your running programs by clicking on each header and locating the items at the top of the list. Programs can eat up resources like CPU, Memory, Disk, or Network processes. If you want to close something, try closing the application normally first (either directly on the program or in the system tray). If the program still won&#8217;t close, go back to the Task Manager, right-click the application, and select </span><b>End task</b><span style="font-weight: 400;">.</span></p>
<p><span style="font-size: 14pt;"><b>Adjust your power settings</b></span></p>
<p><span style="font-weight: 400;">Windows comes with several preset power plans to suit the needs of average users. The default is usually something like </span><b>Balanced</b><span style="font-weight: 400;">, which takes into account performance and energy consumption. Energy consumption is only important if you’re running off a battery, trying to keep the electricity bill down, or trying to extend the life of your laptop’s battery (not applicable for desktop computers).</span></p>
<p><span style="font-weight: 400;">If your PC is running slowly, try changing your plan to the </span><b>High-Performance</b><span style="font-weight: 400;"> option. Although this option uses more energy, it favors performance and should help speed up your computer.</span></p>
<p><span style="font-weight: 400;">If the standard options aren’t working for you, you can create your own plan. To change these settings go to </span><b>Control Panel &gt; Hardware and Sound</b> <b>&gt; Power Options &gt; Create a power plan</b><span style="font-weight: 400;">. Now you can choose which existing plan you want to start with and edit your new plan from there. Common options include how long the display stays on when you’re inactive or how long after use until your computer goes into sleep mode. While these options won’t really affect your computer’s speed, you can go into the </span><b>Advanced Power Settings</b><span style="font-weight: 400;"> to make further adjustments that will have an impact. Note: You should only adjust these options if you know what you’re doing.</span></p>
<p><span style="font-size: 14pt;"><b>Uninstall unused programs</b></span></p>
<p><span style="font-weight: 400;">Sometimes we install programs without realizing how much space they take up. Even if it’s a program you use once in a while, it may be worth uninstalling the program for now and installing it again temporarily when you need to use it. Depending on the size of the program, this could drastically improve your PC’s performance.</span></p>
<p><span style="font-weight: 400;">To uninstall programs, go to </span><b>Control Panel &gt; Programs &gt; Programs and Features</b><span style="font-weight: 400;">. If you’re unsure about which programs to uninstall, make sure you research them first via a search engine.</span></p>
<p><span style="font-size: 14pt;"><b>Turn Windows features on or off</b></span></p>
<p><span style="font-weight: 400;">While you’re on the </span><b>Programs and Features</b><span style="font-weight: 400;"> window, you might want to make sure there aren’t any Windows components running that you don’t need. To find out, select </span><b>Turn Windows Features on or off </b><span style="font-weight: 400;">and you’ll see a list of components. Again, if you aren’t sure about which programs you need, a simple Google search can help you figure it out.</span></p>
<p><span style="font-size: 14pt;"><b>Run a disk cleanup</b></span></p>
<p><span style="font-weight: 400;">This tip can get complicated – make sure you know what you’re doing before you run a disk cleanup. Once you know a little more about which programs aren’t necessary to run your computer, you can go to </span><b>Control Panel &gt; System Security &gt; Administrative Tools &gt; Disk Cleanup</b><span style="font-weight: 400;">. Now you can select the types of files you want to get rid of, click </span><b>OK</b><span style="font-weight: 400;">, and click </span><b>Clean up system files</b><span style="font-weight: 400;">, and choose any files you want to remove.</span></p>
<p><span style="font-size: 14pt;"><b>Defrag your hard drive</b></span></p>
<p><span style="font-weight: 400;">Files on your hard drive can become fragmented over time, meaning your computer has to check in multiple places for the pieces – making it run more slowly. The term ‘defragment’ basically just means putting your files back together so your system can run more efficiently.</span></p>
<p><span style="font-weight: 400;">Windows 10, 8, and 7 automatically defragments the hard drive once per week, but if you suspect there is an issue, you can manually run the defragment drive.</span></p>
<p><span style="font-weight: 400;">If your computer uses a Solid State Drive (SSD), there is no need for defragmentation. But if your PC uses an HDD (Hard Disk Drive) or a combination of HDD and SSD, only defragment the HDD.</span></p>
<p><span style="font-weight: 400;">To optimize, go to </span><b>My Computer, </b><span style="font-weight: 400;">then right-click the hard drive (which is named </span><b>WINDOWS (C:)</b><span style="font-weight: 400;"> by default). Then go to </span><b>Properties &gt; Tools </b><span style="font-weight: 400;">and Click </span><b>Optimize </b><span style="font-weight: 400;">located under </span><b>Optimize and defragment drive</b><span style="font-weight: 400;">. After that, an </span><b>Optimize Drives</b><span style="font-weight: 400;"> window will appear. If you’re using an SSD, </span><b>Analyze </b><span style="font-weight: 400;">will be “greyed-out” and you won’t be able to select it.</span></p>
<p><span style="font-weight: 400;">Now select your HDD drive and click </span><b>Analyze </b><span style="font-weight: 400;">to see how fragmented it is. A good rule of thumb would be to keep your HDD under 5 percent fragmented. If it’s over 5 percent, click </span><b>Optimize </b><span style="font-weight: 400;">to defragment the disk.</span></p>
<p><span style="font-weight: 400;">If you’re using an SSD, </span><b>Optimize </b><span style="font-weight: 400;">is an option. If you select optimize, your PC will run the TRIM command, which wipes any data that is considered no longer in use.</span></p>
<p><span style="font-size: 14pt;"><b>Adjust or disable graphics and animations</b></span></p>
<p><span style="font-weight: 400;">Recent versions of Windows like Windows 10 come with a bunch of graphics like fading effects and flyouts by default. While these may make applications appear sleeker, they can also slow down your computer.</span></p>
<p><span style="font-weight: 400;">To adjust these settings and save a bit of processing power, go to </span><b>Control Panel &gt; System and Security &gt; Advanced system settings</b><span style="font-weight: 400;">. Then, in the </span><b>Performance </b><span style="font-weight: 400;">section, select </span><b>Settings</b><span style="font-weight: 400;">. You can either select </span><b>Adjust for performance</b><span style="font-weight: 400;"> to remove all visual effects or remove each animation individually and keep the ones you like. Although it is a matter of preference, fade and show features are completely unnecessary when it comes to completing tasks or running your computer properly.</span></p>
<p><span style="font-size: 14pt;"><b>Check for malware</b></span></p>
<p><span style="font-weight: 400;">Malware, or malicious software, is a blanket term used to describe any programs that could cause harm to your computer. Malware can come from various sources like email links, software downloads, and even ads. Aside from malware that can exploit you or cause permanent damage to your system, some forms of malware can cause your computer to run more slowly.</span></p>
<p><span style="font-weight: 400;">Having good antivirus software installed is a great way to protect your PC against malware and other cyber threats. Some great free options are available like Avast One Essential, AVG AntiVirus Free, Bitdefender Antivirus Free, Microsoft Defender Antivirus, or Adaware Antivirus Free.</span></p>
<p><span style="font-size: 14pt;"><b>Disable Cortana</b></span></p>
<p><span style="font-weight: 400;">Although the Windows 10 digital assistant, Cortana, is a great feature, it uses up a lot of resources and poses a potential threat to privacy if your computer is hacked.</span></p>
<p><span style="font-weight: 400;">To </span><b>disable Cortana </b><span style="font-weight: 400;">hold </span><b>Ctrl-Shift-Esc </b><span style="font-weight: 400;">and click the </span><b>Startup </b><span style="font-weight: 400;">column. Select </span><b>Cortana </b><span style="font-weight: 400;">and click </span><b>Disable</b><span style="font-weight: 400;">. Then open the </span><b>Start menu</b><span style="font-weight: 400;">, find </span><b>Cortana </b><span style="font-weight: 400;">under All Apps, right-click </span><b>Cortana </b><span style="font-weight: 400;">and select </span><b>More</b><span style="font-weight: 400;">. Now click on </span><b>App settings </b><span style="font-weight: 400;">and turn off the switch next to </span><b>Runs at log-in</b><span style="font-weight: 400;">. Now Cortana has been successfully disabled.</span></p>
<p><span style="font-weight: 400;">To </span><b>Uninstall Cortana</b><span style="font-weight: 400;">, open the </span><b>Start menu</b><span style="font-weight: 400;"> and type in </span><b>PowerShell</b><span style="font-weight: 400;">. </span><b>Right-click </b><span style="font-weight: 400;">on </span><b>Windows PowerShell</b><span style="font-weight: 400;"> and select </span><b>Run as administrator</b><span style="font-weight: 400;">. Next, type (or copy/paste) the following bolded text: </span><b>Get-AppxPackage -allusers Microsoft.549981C3F5F10 | Remove-AppxPackage</b><span style="font-weight: 400;"> then press </span><b>Enter. </b><span style="font-weight: 400;">Keep in mind this step can be risky for everyday users and involves completely removing Cortana from your PC.</span></p>
<p><span style="font-weight: 400;">Most users will want to simply disable Cortana rather than completely removing the program from their hard drive.</span></p>
<p><span style="font-size: 14pt;"><b>Upgrade your hardware</b></span></p>
<p><span style="font-weight: 400;">If you’ve tried everything already, chances are it might be time to invest in some upgraded hardware. If you want to really speed up your PC, consider purchasing an </span><b>SSD</b><span style="font-weight: 400;">. Although HDDs offer more space for a lower price, adding an SSD can make your computer run a lot more quickly.</span></p>
<p><span style="font-weight: 400;">You can also </span><b>add more RAM</b><span style="font-weight: 400;">. If you have an older computer, it may have too little memory to efficiently run modern applications. On top of that, if you use a lot of programs simultaneously, you might not have enough RAM (Random Access Memory) to stay productive. Installing more RAM could be exactly the boost your computer needs.</span></p>
<p><span style="font-size: 14pt;"><b>Restart your browser</b></span></p>
<p><span style="font-weight: 400;">Have you been running your PC for days, weeks, or months on end? Restarting your browser (or computer altogether) can speed up your computer more than you may think.</span></p>
<p><span style="font-weight: 400;">To quickly restart your browser just close all of your Internet Explorer, Google Chrome, Firefox, or Safari windows, and then start the browser back up. This may be enough to refresh your browser and get your connection back up to full speed.</span></p>
<p><span style="font-weight: 400;">However, if pages are still loading sluggishly, you may want to consider installing an ad blocker like Adblock Plus, AdLock, Ghostery, Privacy Badger, uBlock Origin, or Chrome Browser Baseline.</span></p>
<p><span style="font-weight: 400;">Like other programs, it’s also important to keep your browser up to date so that it can run efficiently. Just Google the name of your browser with the term “Update” afterward to find what you’re looking for.</span></p>
<p><span style="font-weight: 400;">Lastly, you may want to remove cookies and clear the cache of your browser. This can generally be found under More Tools or Settings in the top right of your browser.</span></p>
<p><span style="font-size: 14pt;"><b>Close a few tabs</b></span></p>
<p><span style="font-weight: 400;">If restarting the browser didn’t help, try closing a few tabs that you don’t need right now. If you’ve become accustomed to running with dozens (or even just 10) tabs open, you’ve likely been experiencing performance issues without even realizing it.</span></p>
<p><span style="font-weight: 400;">After all, all of your tabs require RAM and the more RAM that is being used the slower your computer will run.</span></p>
<p><span style="font-weight: 400;">Remember, you can always find an old tab that you closed by navigating to </span><b>Browser History</b><span style="font-weight: 400;">.</span></p>
<p><span style="font-size: 14pt;"><b>Last-minute computer tips</b></span></p>
<p><span style="font-weight: 400;">It’s essential to keep an eye on which apps are running and which ones need to be updated. Follow these tips to make sure your computer stays free from speed issues:</span></p>
<ul>
<li><b>Clean your computer.</b><span style="font-weight: 400;"> That’s right, dust and grime can accumulate inside your PC causing it to slow down – or even overheat.</span></li>
<li><b>Remove unused browser extensions.</b> Like other programs, browser extensions eat up RAM and slow down your computer. If you aren’t using them, delete them for now.</li>
<li><b>Restart your computer regularly.</b> Sometimes restarting your computer can enable updates to take effect and shut down any stuck programs. Whenever you aren’t at your PC at the end of the day or at break time, restarting is always a good idea.</li>
<li><b>Run fewer programs simultaneously. </b>If you make a habit of minimizing or closing unused programs, you’ll likely see a boost in speed.</li>
<li><b>*Reinstall your operating system.</b> This should only be used as a last resort. If you’ve tried everything above to no avail, it may be time to reinstall your operating system.</li>
</ul>
<p>&nbsp;</p>
<p><span style="font-size: 14pt;"><b>Speed up your PC with the help of an IT consultant</b></span></p>
<p><span style="font-weight: 400;">We know how it is. Not everyone feels comfortable performing maintenance on their computer, especially a work computer. If any of these tips were too complicated, contacting an IT consultant is a great option.</span></p>
<p><span style="font-weight: 400;">Keeping up with the latest advancements in computer technology can be difficult even for industry professionals. You need to be able to spend more time growing your business and less time worrying about your office equipment–that’s where the experts at Computer Service Now can help. Our <a href="https://www.computerservicenow.com/services">computer services</a>, including <a href="https://www.computerservicenow.com/services/computer-services">computer repair, upgrades, tune-ups</a>, and <a href="https://www.computerservicenow.com/services">much more</a> offer you an easy and hassle-free option to keep your office computers running smoothly.</span></p>
<p><span style="font-weight: 400;">With our high level of customer service and satisfaction, Computer Service Now works hard to be the premier IT firm in the Cincinnati and Dayton region. We offer a wide variety of IT solutions that stay within your budget. For IT-related projects big and small, our experience, expertise, and variety of services allow us to provide the support you need to meet your business needs. Contact us today and let us solve all of your IT needs today!</span></p>
<p><span style="font-weight: 400;">Do you need tech support in Middletown or Southwest Ohio? We’ve been serving Middletown and the surrounding areas since 1987. Call us today for full-service IT support 513-422-1907 or <a href="https://www.computerservicenow.com/contact">fill out a contact form here.</a></span></p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.computerservicenow.com/2022/06/06/16-ways-to-speed-up-your-computer/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>13 Ways to Secure your Passwords and Data Online</title>
		<link>https://blog.computerservicenow.com/2022/04/25/13-ways-to-secure-your-passwords-and-data-online/</link>
					<comments>https://blog.computerservicenow.com/2022/04/25/13-ways-to-secure-your-passwords-and-data-online/#respond</comments>
		
		<dc:creator><![CDATA[RBeagle]]></dc:creator>
		<pubDate>Mon, 25 Apr 2022 19:51:15 +0000</pubDate>
				<category><![CDATA[Computer Service Now]]></category>
		<category><![CDATA[Technology tips]]></category>
		<category><![CDATA[antivirus]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[file backup]]></category>
		<category><![CDATA[LastPass]]></category>
		<category><![CDATA[MFA]]></category>
		<category><![CDATA[passwords]]></category>
		<category><![CDATA[SSO]]></category>
		<guid isPermaLink="false">https://blog.computerservicenow.com/?p=4645</guid>

					<description><![CDATA[After Russia’s invasion of Ukraine, cybersecurity concerns in the United States are at an all-time high – and small businesses aren’t exempt. In the wake of the global pandemic, which we’ve already mentioned sparked an uptick in cyber threats, even government officials are warning their citizens and organizations to be hypervigilant when it comes to [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">After Russia’s invasion of Ukraine, cybersecurity concerns in the United States are at an all-time high – and small businesses aren’t exempt. In the wake of the global pandemic, which we’ve already mentioned </span><a href="https://blog.computerservicenow.com/2020/04/30/how-hackers-are-using-the-covid-19-pandemic-to-attack-businesses-around-the-world/"><span style="font-weight: 400;">sparked an uptick in </span></a><span style="font-weight: 400;">cyber threats, </span><a href="https://www.whitehouse.gov/briefing-room/statements-releases/2022/03/21/statement-by-president-biden-on-our-nations-cybersecurity/"><span style="font-weight: 400;">even government officials are warning their citizens and organizations to be hypervigilant</span></a><span style="font-weight: 400;"> when it comes to digital security.</span></p>
<p><span style="font-weight: 400;">Although these threats may seem like they are unlikely to affect your systems, the fact of the matter is any unprotected access point is an easy target for unsuspecting cybercriminals. So as a small business owner or employee, what can you do to reinforce your network from cyberattacks? Our commitment to protecting your digital security goes beyond a single job or consultation, so let us assist you in protecting your data. Continue reading to find out what you can do now to secure your information.</span></p>
<div style="text-align: center;"></div>
<p><span style="font-size: 14pt;"><b>Protect your passwords.</b></span></p>
<p><span style="font-weight: 400;">While there’s no foolproof way to protect your data from online attacks, a good first step is to set up a free password manager and follow the recommended practices. We highly recommend </span><a href="https://lastpass.com/create-account.php"><span style="font-weight: 400;">signing up with LastPass</span></a><span style="font-weight: 400;"> and following these tips:</span><b></b></p>
<ul>
<li aria-level="1"><b>Check addresses. </b><span style="font-weight: 400;">Phishing (and similarly smishing and vishing) attacks are on the rise. These attacks can be found via email, text or SMS, and even voice calls. You can avoid these attacks by carefully reviewing any messages you receive for strange sender email addresses, poorly written or misspelled emails, and fraudulent multifactor authentication (MFA) requests.</span></li>
</ul>
<ul>
<li aria-level="1"><b>Set up your cybersecurity tools according to recommended guidelines. </b><span style="font-weight: 400;">By implementing tools like a password manager and multi-factor authenticator (MFA), you will take a huge step toward securing your data by making sure none of your accounts are breached. These tools help you reset your passwords periodically and authenticate your logins by sending a message to a device that is registered to you.</span></li>
</ul>
<ul>
<li aria-level="1"><b>Keep your software up-to-date. </b><span style="font-weight: 400;">Hackers often target vulnerabilities that can be found in older applications. When you receive an alert to install a security update from companies like Apple, Microsoft, or Google, install it right away. The same rule applies to smart home devices, security cameras, or other Internet of Things (IoT) gadgets.</span></li>
</ul>
<ul>
<li aria-level="1"><b>Audit your data. </b><span style="font-weight: 400;">Have you shared any of your credentials? Do you know where your data really is? According to LastPass, 83% of people wouldn’t know if their information was already on the dark web. Make an effort to map out where your data is, find out who has access to your information, and take a digital headcount.</span></li>
</ul>
<ul>
<li aria-level="1"><b>Protect your information. </b><span style="font-weight: 400;">If someone requests money or highly sensitive information like social security numbers, trust your gut. Even if the sender needs it quickly, take a moment to assess the situation. Don’t be afraid to ask the right questions and </span><a href="https://blog.lastpass.com/2021/11/how-to-protect-yourself-from-social-engineering-attacks/"><span style="font-weight: 400;">get all of the facts</span></a><span style="font-weight: 400;"> before sending your information through.</span></li>
</ul>
<ul>
<li aria-level="1"><b>Update your old passwords. </b><span style="font-weight: 400;">Changing your old passwords is a great start to becoming more cyber smart. Are you having trouble coming up with a passphrase that includes all of the required specifications like capitals, lowercase, and numbers? Try a </span><a href="https://www.lastpass.com/features/password-generator"><span style="font-weight: 400;">password generator</span></a><span style="font-weight: 400;">.</span></li>
<li aria-level="1"><b>Enable dark web monitoring. </b><span style="font-weight: 400;">Did you know you can receive alerts if your credentials have been found anywhere on the dark web? Then you’ll be able to update them quickly and mitigate the risk of being hacked. </span><a href="https://www.lastpass.com/features/dark-web-monitoring"><span style="font-weight: 400;">Dark web scans</span></a><span style="font-weight: 400;"> are also available from Lastpass.</span></li>
</ul>
<p>&nbsp;</p>
<p><a href="https://www.computerservicenow.com/services/managed-service-provider"><img decoding="async" src="https://blog.computerservicenow.com/wp-content/uploads/2022/04/MFA.jpg" alt="Password security" width="100%" /></a></p>
<p><span style="font-size: 14pt;"><b>How can I protect my business credentials?</b></span></p>
<p><span style="font-weight: 400;">According to a 2021 report from Verizon DBIR, 85% of breaches involve a human element. The best way to mitigate these risks is to start reinforcing your security practices at your potential weakest points – your employees.</span><b></b></p>
<ul>
<li aria-level="1"><b>Educate your employees. </b><span style="font-weight: 400;">Teach your employees to be vigilant for cybercriminals and inform them of the importance of data security. If you have the ability to grant them a personal account, this is a great way to encourage cybersecurity both at work and at home, especially if you allow your employees to bring their own devices to work or to work from home.</span></li>
</ul>
<ul>
<li aria-level="1"><b>Turn on Multi-Factor Authentication (MFA). </b><span style="font-weight: 400;">It’s vital to ensure only the correct employees have access to the corresponding applications at the right time, especially for high-risk accounts and applications that involve financial data, legal data, or non-cloud applications like VPNs and workstations. It’s critical to make sure you have MFA turned on everywhere that it is possible.</span></li>
</ul>
<ul>
<li aria-level="1"><b>Use single sign-on (SSO) when possible. </b><span style="font-weight: 400;">Single sign-on solutions allow employees to have seamless access to key applications through trust. Single sign-on uses a single domain to undertake the authentication process and oversee access control. These solutions use federation protocols that include SAML and can be integrated with  multi-factor authentication  (MFA) tools, other  identity providers, VPNs, firewalls, and more. When single sign-on is enabled, your organization will have visibility into which users have access to which application and can simply authorize or remove user access to an application when necessary.</span></li>
</ul>
<ul>
<li aria-level="1"><b>Secure your Wi-Fi networks. </b><span style="font-weight: 400;">According to the FCC, your business’ Wi-Fi should be secure, encrypted, and hidden. Your business router should also be protected – and hidden.</span></li>
</ul>
<ul>
<li aria-level="1"><b>Back up your files. </b><span style="font-weight: 400;">Cyberattacks not only compromise your information, but they often delete or steal your data. In order to help mitigate this risk, you can install backup programs that help you schedule or automate backups for methods like cloud storage, external hard drives, flash drives, or network-attached storage (NAS). Always keep a copy of your backups offline in the event of a cyberattack.</span></li>
<li aria-level="1"><b>Install antivirus software. </b><span style="font-weight: 400;">Finding antivirus software that works for your business is an important safeguard against cybercrime. Although there are plenty of paid options, there are free options that can get the job done like Microsoft Defender, Norton Antivirus, or AVG Antivirus. </span></li>
</ul>
<p>&nbsp;</p>
<p><span style="font-size: 14pt;"><b>How to get a free security audit.</b></span></p>
<p><span style="font-weight: 400;">Are you worried about keeping your passwords and data safe? If this information seems like too much to process, contact Computer Service Now for a free security audit today. Our network security options offer you an easy and hassle-free option to keep your network safe from ransomware attacks. On top of that, we’ll be able to assist you with setting up password managers, multi-factor authentication, single sign-on, data backups, securing your Wi-Fi networks, enabling dark web monitoring, and even educating your employees on the best practices.</span></p>
<p><span style="font-weight: 400;">At Computer Service Now, we strive for exemplary customer satisfaction – which is why we will always work with our customers until they are completely satisfied with the work completed. If you’re looking to bolster your security, we offer a wide variety of IT solutions that stay within your budget. For IT-related projects big and small, our experience, expertise, and <a href="https://www.computerservicenow.com/services">variety of services</a> allow us to provide the support you need to meet your business needs. <a href="https://www.computerservicenow.com/contact">Contact us today</a> and let us solve all of your IT needs!</span></p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.computerservicenow.com/2022/04/25/13-ways-to-secure-your-passwords-and-data-online/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Data Breach: Is your password on the dark web?</title>
		<link>https://blog.computerservicenow.com/2021/11/16/data-breach-is-your-password-on-the-dark-web/</link>
					<comments>https://blog.computerservicenow.com/2021/11/16/data-breach-is-your-password-on-the-dark-web/#respond</comments>
		
		<dc:creator><![CDATA[RBeagle]]></dc:creator>
		<pubDate>Tue, 16 Nov 2021 23:32:21 +0000</pubDate>
				<category><![CDATA[computer service]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[Password Management]]></category>
		<guid isPermaLink="false">https://blog.computerservicenow.com/?p=4622</guid>

					<description><![CDATA[Investors in the online brokerage app Robinhood may want to take steps to protect their credit after a data breach resulted in various information of about 7 million customers being exposed. Of the 7 million exposed, 5 million email addresses were accessed and another 2 million had their full names revealed to the hackers. On [&#8230;]]]></description>
										<content:encoded><![CDATA[<div style="text-align: center;"><a href="https://www.computerservicenow.com/services"><img decoding="async" src="https://blog.computerservicenow.com/wp-content/uploads/2021/11/cyber-security-g1c6a59d9f_1280.png" alt="Data breach" width="100%" /></a></div>
<p><span style="font-weight: 400;">Investors in the online brokerage app Robinhood may want to take steps to protect their credit after a data breach resulted in various information of about 7 million customers being exposed. Of the 7 million exposed, 5 million email addresses were accessed and another 2 million had their full names revealed to the hackers.</span></p>
<p><span style="font-weight: 400;">On top of that, additional personal information – including name, date of birth, and ZIP code – of about 310 people was exposed. Of those 310, around 10 more customers had even more extensive account details hacked.</span></p>
<p><span style="font-weight: 400;">Although Robinhood has stated publicly that it is alerting the affected individuals, it’s important to make sure your personal information hasn’t been compromised. With the wide assortment of companies that you entrust your personal information with – Facebook, Linkedin, Uber, Verizon, etc. – you don’t want to wait until it’s too late to find out if your data has been breached. After all, by the time one of these companies alerts you that your data has been exposed, you could already have your birthday, Social Security number, credit card information, health records, or other data stolen.</span></p>
<p><span style="font-weight: 400;">Any personal information that hackers can retrieve from a data breach could potentially be used to do anything from making purchases to opening up credit accounts, to filing tax refunds or medical claims posing as you. Unfortunately, due to the nature of these data breaches, billions of hacked login credentials are already available on the dark web for hackers to download.</span></p>
<p><span style="font-weight: 400;">While you can’t stop the sites you use from getting hacked, there are some steps you can take to check if your information has been compromised and limit that potential damage done from the data breach.</span></p>
<p><span style="font-size: 14pt;"><b>Password Managers</b></span></p>
<p><span style="font-weight: 400;">First of all, you can use a password manager that creates unique passwords. While this won’t stop data breaches, this will ensure that if a hacker gains access to one of your accounts, they don’t also have the login information and password for the rest of your accounts. A good password manager – like LastPass, Bitwarden, or 1Password – allows you to manage your login information, and make it easy to create and update unique passwords. Many of these password managers also prompt you to update your password every month or so – making it even easier to stay on top of data breaches.</span></p>
<p><span style="font-size: 14pt;"><b>Monitoring Tools</b></span></p>
<p><span style="font-weight: 400;">If you suspect your personal information has been stolen due to a cyberattack or just want to make sure data hasn’t been stolen in the past, there are a few monitoring tools that can help you find out – Google’s Password Checkup and Mozilla’s Firefox Monitor. These monitoring services let you check which of your email addresses and passwords are compromised so you can take the appropriate actions. We explain below how to use both of these tools.</span></p>
<p><b>How to use Google’s Password Checkup</b></p>
<p><span style="font-weight: 400;">Google offers a free Password Checkup tool that monitors the usernames and passwords you use to log in to sites outside of Google’s domain and notifies you if those credentials have been exposed.</span></p>
<ol>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">If you use Google’s password service to keep track of your login credentials in Chrome or Android, go to Google’s </span><a href="https://passwords.google.com/?pli=1"><span style="font-weight: 400;">password manager site</span></a><span style="font-weight: 400;"> and select </span><b>Go to Check passwords</b><span style="font-weight: 400;">.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Select </span><b>Check Passwords</b><span style="font-weight: 400;"> and verify it’s your account.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Enter the password for your Google account.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Google will display any compromised, reused, or weak passwords.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Next to each reused or weak password there will be a </span><b>Change password</b><span style="font-weight: 400;"> button so you can easily choose a more secure password.</span></li>
</ol>
<p><b>How to use Mozilla’s Firefox Monitor</b></p>
<p><span style="font-weight: 400;">Mozilla’s free Firefox Monitor service lets you track which of your email addresses have been a part of known data breaches.</span></p>
<ol>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">First head to the </span><a href="https://monitor.firefox.com/"><span style="font-weight: 400;">Firefox Monitor page</span></a><span style="font-weight: 400;">.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Enter an email address and select </span><b>Check for Breaches</b><span style="font-weight: 400;">. If the email you entered was involved in any known data breaches since 2007, Firefox Monitor will show you which hack it was a part of and what else may have been exposed.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">If your data has been exposed, tap </span><b>More about this breach</b><span style="font-weight: 400;"> below the breach to see what was stolen and which steps Mozilla recommends taking next – like changing your password.</span></li>
</ol>
<p><span style="font-weight: 400;">Mozilla also offers a service that notifies you of future data breaches. Firefox Monitor will scan your email addresses against those found in data breaches and let you know if your account was hacked.</span></p>
<ol>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">To sign up for future updates, tap </span><b>Sign up for Alerts</b><span style="font-weight: 400;"> at the bottom of </span><a href="https://monitor.firefox.com/about"><span style="font-weight: 400;">Firefox’s Monitor page</span></a><span style="font-weight: 400;">.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">If necessary, create a Firefox account.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Select </span><b>Sign in </b><span style="font-weight: 400;">to see a breach summary for your email address.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">At the bottom of the page, you can also add additional email addresses that you’d like Firefox to monitor for you.</span></li>
</ol>
<p>&nbsp;</p>
<p><span style="font-size: 12pt;"><b>Additional Help from Computer Service Now</b></span></p>
<p><span style="font-weight: 400;">Are you worried your data has been stolen in a data breach? Our network security options offer you an easy and hassle-free option to keep your network safe from ransomware attacks.  </span></p>
<p><span style="font-weight: 400;">With our high level of customer service and satisfaction, Computer Service Now works hard to be the premier IT firm in the Cincinnati and Dayton region. If you&#8217;re looking to bolster your security, we offer a wide variety of IT solutions that stay within your budget. For IT-related projects big and small, our experience, expertise, and variety of services allow us to provide the support you need to meet your business needs. Contact us today and let us solve all of your IT needs today!</span></p>
<p><span style="font-weight: 400;"><a href="https://blog.computerservicenow.com/">Subscribe to our blog today</a> to stay up-to-date with Computer Service Now and <a href="https://www.facebook.com/ComputerServiceNow/">follow us on social media</a>. Join the discussion by commenting below.</span></p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.computerservicenow.com/2021/11/16/data-breach-is-your-password-on-the-dark-web/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
