Technology by Design

Technology news, reviews, and how to keep your technology running fast and smooth!

  • Home
  • About TbyD
    • Who is TbyD
    • Why Choose TbyD?
    • 16 Things
    • Your Computer Guy
  • Products and Services
    • Business Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
      • Performance Analysis
      • Optimization
      • Core Security Solution
      • Managed Backups
      • Computer and Network Systems
      • Computer Setup
      • Domain Names
      • Email Services
      • Extended Warranties
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
      • Websites
    • Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
        • Computer Setup
      • Core Security Solution
      • Managed Backups
      • Extended Warranties
      • Performance Analysis
      • Optimization
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
    • Products
      • Computers
      • Servers
  • Testimonials
    • What Our Clients Say About Us
  • Blogs
    • ALERTS
    • FAQ
    • How To Videos
  • Newsletters
    • TechTips Newsletters
  • Reviews
  • Media
    • Email Red Flags
    • E-Books
    • Disaster Prevention Planning Kit
    • Free Reports
  • Contact Us
    • Contact Us
    • Quick Support

How-To: Ensure Firewall Is Enabled In Windows7

March 23, 2015 by The T By D Team Leave a Comment

How-To:

Ensure Firewall Is Enabled In Windows7

  1. Click “Start”.
  2. Go to “Control Panel”, then “Security”.
  3. Click “Windows Firewall”.
  4. Click “Turn Windows Firewall On Or Off”.
  5. Input Administrator password, if prompted, or confirm the operation.
  6. Click “On” (Recommended).
  7. Click “Ok”.

Filed Under: How-To

ALERT: Phishing For Apples

March 20, 2015 by The T By D Team Leave a Comment

Apple WatchALERT:  Phishing for Apples

 

BEWARE of FREE Apple Watch GiveAways!

Last week Apple had their big Apple Watch release event.  The Press took note, and has been full of news about the models, and pricing ever since.

CyberCriminals are also taking note, and are trying to ride the wave of enthusiasm for the newest smartwatch.

CyberCriminals are using social media (Twitter, Facebook, etc) to try to trick people into clicking on links, entering fake “contests”, or forward messages to their friends.

 

Apple - TwitterCyberCriminal gangs are setting up Twitter accounts named “Apple Giveaways”, targeting users that mentioned the smartwatch in their Twitter feed.  They tell people they have been “chosen”, and promise them a free Apple Watch.  All they ask them to do, is to click the link in the message.  The link leads them to a series of links and instructions, leading them to other dubious web pages.

Apple - Facebook

 

 CyberCriminals also have set up Facebook event pages asking victims for their 1st and last names, including Facebook handle.  They are asked join the event, and invite a minimum of 100 friends.  They are told that 100 invites earns them an Apple Watch, 250 invites = an Apple Watch Sport, and 500 invites = the Apple Watch edition (sold by Apple for $17,000).

 

 CyberCriminals often release phishing scams, to coincide with highly anticipated product launches and news events, preying on victims’ excitement and vulnerability.

 

Got Computer Bugs?

Call 1-204-800-3166

For Cyber-Extermination!

 

 

Filed Under: ALERTS, Featured

March Newsletter

March 17, 2015 by The T By D Team Leave a Comment

Psst…

Wanna Buy A (Used) Spy Website!

 

MARCH 2015

TECHTIPS NEWSLETTER

 

TechTips Newsletter is published monthly, full of technology news and information (and other stuff!).  If you’re not a Geek, not to worry, there’s tons of information for non-Geeks too!:

  • Obama speaks!
  • Video game will save your life…at a price!
  • The future of computing!
  • A Canadian health centre is very happy to see visitors!
  • For Sale:  Used Spy Websites!
  • Annual classic car auction!
  • Urgent computer security warning!
  • AND MORE!

This and much more!  You don’t want to miss this issue!

Get your newsletter HERE!

Comments?  Let me know what you think at marketing@tbyd.ca


Keep Up-To-Date on the Latest Threats To Your Computer Network!

Regular weekly ALERTS on the latest security threats to your computer network

Check out the ALERTS here.

Do you have a question for our Resident Geek?  Email it to:  geek@tbyd.ca!

Like us on Facebook!

Follow us on Twitter!


EXPIRATION NOTICE:

An urgent security warning for businesses running Windows XP, Office 2003, and Microsoft Windows Server 2003!

Windows XP and Office 2003 are no longer supported by the manufacturer.

Server 2003 will no longer be supported by the manufacturer after April 2015.

If your business or organization is currently running Windows XP, Office 2003, Microsoft Server 2003, or Exchange 2003 on any computers or servers in your office, you need to know about a dangerous security threat that must be addressed NOW!

PLEASE TAKE A MOMENT TO READ THIS IMPORTANT SECURITY ANNOUNCEMENT!

As your local Microsoft Partner, we are aggressively reaching out to all local businesses that use any of these programs to alert you to this serious security risk and inform you about what you need to do NOW to protect your company or organization!

WINDOWS XP AND OFFICE 2003 REPLACEMENTS MUST BE MADE NOW

WINDOWS SERVER 2003 AND EXCHANGE 2003 REPLACEMENTS MUST BE MADE BY JULY 14, 2015

Microsoft has officially announced that it retired all support for Windows XP and Office 2003 April 2014, and on the Server 2003 operating system on July 14, 2015.

This means any business or organization still running any of these programs will be completely exposed to serious hacker attacks, aimed at taking control of your network, stealing data, crashing your system, and inflicting a host of other business-crippling problems you do NOT want to deal with.

This is such a serious threat that the U.S. Department of Homeland Security has issued an official warning to all companies still running these programs, because firewalls and antivirus software will NOT be sufficient to completely protect your business from malicious attacks or data-exfiltration.  Running some of these programs will also put many organizations out of compliance.

CALL 1-204-800-3166

for a FREE QUOTE

Filed Under: Featured, TechTips Newsletter

ALERT: Email Attachment “Fax”

March 12, 2015 by The T By D Team 1 Comment

fax attachment

ALERT:  

Email Attachment “Fax”

CryptoWall 3.0

This email scam is the latest CryptoWall attack that has affected businesses world-wide.

An email is sent, which has an innocent-looking email attachment that claims to be a fax report from your own business or home.

If you receive an email that claims to be a fax report, that seems to come from your own domain/business/home, but the link ends in “.CHM”,

The email attachment link will look similar to the one below:

CryptoWall3.0

 DO NOT OPEN,
and
DO NOT FORWARD.
 
DELETE THE EMAIL IMMEDIATELY!

 

After you delete the email, warn I.T. that the email sits in your “Deleted” items.

If you click on the link to open it, it will download malware, which will lock up all your files,

and potentially all files of everyone else in your business or organization.

The CyberCriminals responsible for this scam, then demand a $500 Bitcoin ransom to get your files back.

This malware is being sent in waves, attacking computers all over the world.

We highly recommend to add “.CHM” files to the list of potentially malicious extensions in your spam filters.

 

Got Computer Bugs?

Call 1-204-800-3166

For Cyber-Extermination!

 

 

Filed Under: ALERTS, Featured

Power Surge vs. PC

March 9, 2015 by The T By D Team Leave a Comment

Power Surge vs. PC - Had a power surge?  Here are some things to check.

Power Surge vs. PC – Had a power surge? Here are some things to check.

Power Surge vs PC

 

A power surge is a damaging spike of voltage through the electrical network.

 

If your computer was plugged in and turned on during one, you’re more than likely to see some evidence of damage to your computer.

 

Check and Fix a PC After A Power Surge
  1. First step is to unplug your PC, and the power bar – in that order.
  2. Plug the monitor directly into a power outlet.  If that works you can set it aside, safe in the knowledge that the problem is in the PC itself.
  3. Open the computer tower.  This will likely involve unscrewing some screws at the back.  Consult your PC User Manual if you’re unsure.
  4. If your computer was a power surge victim, and your computer won’t turn on, you’ll need to replace your power supply unit (PSU).
  5. Make sure not to touch any of the equipment inside the case.  Take a look for anything that looks obviously scorched or damaged.  If there is, you’ll need to replace that part.
  6. Close up the case, using all the screws you took out.  If you have any extras, you missed some.

Now, if you got away unscathed, count yourself very lucky.

If you need some parts replaced, call a reliable, qualified computer tech to quote you on the parts & labour.  And consider your hand slapped.

NOW, before your computer receives any more battle scars,
make sure it’s adequately protected.

 

Use a power bar, a surge protector, or a Uninterruptible Power Supply (UPS).

 

To see which is right for you, check out an earlier blog:   Power-Less.

 

Computer Bugs?

Call 1-204-800-3166

For Cyber-Extermination!

 

Filed Under: FAQ, Featured

Definition: Uninterruptible Power Supply (UPS)

March 9, 2015 by The T By D Team Leave a Comment

Uninterruptible Power Supply

a.k.a. “UPS”

A device that allows your computer to keep running for at least a short time after the primary power source is lost.

UPSA UPS contains an internal battery which, in case of a temporary total power failure, can keep your equipment functioning for a short amount of time.  Usually, just long enough for you to shut everything down…safely.

A UPS is invaluable for computers, servers, etc.  Anything that could cause a loss of data, or damage to the equipment, if not shut down properly.  A bonus to the UPS, it will protect your equipment against damage from any power fluctuations.  Most UPSs will provide surge protection to equipment plugged into the battery backup outlet.  Most also have additional surge protection outlets (without battery backup), for other computer equipment (ie. printers, monitors, etc.).

Filed Under: Definitions

Definition: Surge Protector

March 9, 2015 by The T By D Team Leave a Comment

Surge Protector

A small device designed to protect electrical devices from voltage spikes.

Similar to power bars, but surge protectors can detect when power surges are larger than an “acceptable level” for your devices.

Surge ProtectorIn a surge protector, excess power is re-routed to a grounding wire and fuse, which will burn out when power exceeds what it can handle.  Surge protectors provide adequate protection for vital devices such as monitors, printers, tvs, entertainment systems, and smartphones.

*Something to note:  surge protectors can come with different “joule ratings”.  The higher the joule rating, the more excess power the surge protector can take .

Filed Under: Definitions

Definition: Power Bar

March 9, 2015 by The T By D Team Leave a Comment

Power Bar

A block of electrical sockets that attaches to the end of a flexible cable (typically with a plug on the other end), allowing multiple electrical devices to be powered from a single electrical socket.

Most power bars available, include a built-in circuit breaker.  This provides some protection against power surges.  It is a great, affordable option for devices that aren’t critical (ie. lights, fans, radios).

Power Bar

Filed Under: Definitions

Definition: Power Supply Unit (PSU)

March 9, 2015 by The T By D Team Leave a Comment

Power Supply Unit (PSU)

a.k.a. “Power-Sucking Unit”

The component that supplies power to a computer.  Most personal computers can be plugged into standard electrical outlets.  The PSU then pulls the required amount of electricity and converts the AC current to DC current.

You can locate the power supply on a system by simply finding the input where the power cord is plugged in.  Without opening your computer, this is typically the only part of the PSU you will see.

PSUIf you were to remove the PSU, it would look like a metal box with a fan inside, and some cables attached.

Modern computers use a switched-mode power supply.

Filed Under: Definitions

ALERT: Microsoft Volume Licensing

March 4, 2015 by The T By D Team Leave a Comment

MS VLSCALERT:  Microsoft Volume Licensing

CyberCriminals are going after the businesses with Microsoft Licensing this time.

 

Corporate users are sent a phishing email that appears to be from “Microsoft Volume Licensing Service Center (VLSC)”, according to researchers with Cisco Managed Threat Defense.

The email looks similar to this:

MS Volume Licensing

 

 

 

 

 

 

 The email has a very personalized welcome line, and asks recipients to click on a link to login to the VLSC.

The link in the email appears to be for a Microsoft website but Martin Nystrom, senior manager for Cisco, points out that hovering over it with the mouse reveals the true URL.

Clicking on the link will result in the authentic VLSC login page opening, but will also trigger a ZIP file to download that recipients may not notice is being delivered from a different website.

The ZIP file contains a Windows Executable with a SCR extension – a screensaver file – and opening it results in the system being infected with “Chanitor”, which is used to download other malware.

Everyone needs to be aware of the security risks (and responsibilities) that come with using a computer these days, and employees need to be educated about security risks, and what to look for.

For some examples of how to identify a fake email, click:  HERE.

 

Got Computer Problems?

Call 1-204-800-3166

For Cyber-Extermination!

 

Filed Under: ALERTS, Featured

  • « Previous Page
  • 1
  • …
  • 12
  • 13
  • 14
  • 15
  • 16
  • …
  • 52
  • Next Page »

Sign Up For The Monthly TechTips Newsletter!

* = required field
unsubscribe from list

powered by MailChimp!

Recent Posts

  • ALERT: Celebrity Death Scams
  • ALERT: Uber Hacked
  • ALERT: Netflix Email Scam
  • ALERT: Bad Rabbit
  • Scam – Reset Password Alert

Recent Comments

  • ALERT: New Ransomware Targets MS Office 365 Users - Technology by Design on Managed Backups
  • ALERT: FBI Warns Email Extortion Heating Up for Summer! - Technology by Design on ALERT: AshleyMadison Hack Blows Up
  • ALERT: Evil Android Trojan Empties Your Bank Account - Technology by Design on Definition: Phishing
  • ALERT: HTML Attachments - Technology by Design on Definition: Phishing
  • ALERT: New Ransomware Also Steals Your Bitcoins - Technology by Design on Managed Backups

Copyright © 2025 · Dynamik Website Builder on Genesis Framework · WordPress · Log in