Technology by Design

Technology news, reviews, and how to keep your technology running fast and smooth!

  • Home
  • About TbyD
    • Who is TbyD
    • Why Choose TbyD?
    • 16 Things
    • Your Computer Guy
  • Products and Services
    • Business Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
      • Performance Analysis
      • Optimization
      • Core Security Solution
      • Managed Backups
      • Computer and Network Systems
      • Computer Setup
      • Domain Names
      • Email Services
      • Extended Warranties
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
      • Websites
    • Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
        • Computer Setup
      • Core Security Solution
      • Managed Backups
      • Extended Warranties
      • Performance Analysis
      • Optimization
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
    • Products
      • Computers
      • Servers
  • Testimonials
    • What Our Clients Say About Us
  • Blogs
    • ALERTS
    • FAQ
    • How To Videos
  • Newsletters
    • TechTips Newsletters
  • Reviews
  • Media
    • Email Red Flags
    • E-Books
    • Disaster Prevention Planning Kit
    • Free Reports
  • Contact Us
    • Contact Us
    • Quick Support

Budgeting for Technology Costs

July 21, 2016 by The T By D Team Leave a Comment

brand new computer with tft monitor in modern classroom at school

Budgeting for Technology Costs

Budgeting for technology costs is difficult.  We often run into clients that don’t budget for these costs at all.  They are then often caught with tough (and costly!) surprises when a workstation or server goes down.  

 

For smaller companies, this may work as the cost is lower (due to the lower volume), but for companies with a server and 5 or more workstations, a budget is a MUST.

Let’s say the average lifetime of a workstation and/or server is 3-5 years.  If a company has 10 workstations and 1 server, the total replacement cost would breakdown as follows:

(please realize I’m using these numbers for ease of example.  Actual costs may vary)

Workstation:  $1,000 + $200 cost of transferring to a new PC = $1,200 x 10 = $12,000

Server:  $5,000 + $1,000 cost of transferring to a new server = $6,000 x 1 = $6,000

Switches/Printers/Misc. Hardware = $2,000

So we have a total replacement cost for the company of $20,000

3-Year Replacement Plan

If you want to go with the 3-year replacement plan, you are looking at a total of $6,666.66/year.  You could spread out the costs by simply replacing workstations, and some networking equipment over the first 2 years.  You then replace the server in the 3rd year.  You then start the replacement plan (by replacing the workstations again) in year 4

5-Year Replacement Plan

By choosing the 5-year plan, you can plan on replacing the workstations and networking equipment spread over years 1-4.  In year 5, you then replace the server.  With this plan you can budget to spend approximately $3,500 in 4 of the years, and $6,000 in the 5th year.

By spacing out your technology purchases, you are potentially decreasing your downtime, and also working it into an affordable cost-space, making it easier on your company’s cash-flow.
Want help with your technology budget?  Call Technology by Design at 1-204-800-3166.
You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: Blogs, FAQ

ALERT: Ransomware Update

July 20, 2016 by The T By D Team Leave a Comment

Ransomware

ALERT:  Ransomware Update

 

Ransomware is the fastest growing, most lucrative form of malware out there right now, and CyberCriminals are cashing in.

 

 

Here is a list of some of the latest versions out there.  This list is ever-changing, and should not be taken as a complete list.  If you have any questions, please call us at 1-204-800-3166, and we can go over some of the solutions available to help to prevent infection.

Zepto

A form of the popular “Locky” virus, this encrypts your files to “.zipto”.  Usually spread through email containing a zip file.  When clicked, a javascript file will begin unpacking itself, and start encrypting your files.  Because this version is so new, some antivirus software may not detect it yet.  There is currently no way to decrypt the files.

CryptXXX

This has been around for a while, but has recently made a comeback in June collecting approximately $50,000 in ransoms for the month.  CryptXXX is spread through spam email.  There is currently no way to decrypt CryptXXX.

Bart Ransomware

Usually spread through an email with a “photos” zip attachment.  When the attachment is opened, it triggers a javascript filr called “Rocketloader” that zips up your files in a password-protected zip file.  Bart is a little different, in that it doesn’t have to communicate with the “mothership” computer to encrypt your files.  So it will continue to do so, even when disconnected from the network.  Currently there is no way to decrypt Bart-encrypted files.

Cerber Ransomware

This has been attakcing Office 365 users, and usually comes in the form of an emailed Office document.  Currently there is no way to decrypt Cerber-encrypted files.  

With no way to decrypt the files, and no choice but to pay the ransom, companies are seeking ways to avoid getting infected in the first place.  

Make sure your employees are familiar with how to identify a suspect email.  Check out our “Red Flag Emails” for tips! 
For increased protection, call Technology by Design at 1-204-800-3166 and ask us about our Spam Filter Solution!
You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Blogs

Windows 10 Free Upgrade Ends Soon!

July 20, 2016 by The T By D Team Leave a Comment

Windows 10

Windows 10 Free Upgrade Ends Soon!

 

 

The free offer to upgrade to Windows 10 expires on July 29th, and here are some things you should know:
  • The offer is not likely to be extended.
  • Any upgrades performed before the deadline are valid for as long as the device lasts.
  • There is a slim possibility of some new upgrade offers after the 29th, but don’t hold your breath.
  • Windows 10 will eventually become software as a service.  Price is unknown at this time, but for Enterprise customers it looks like the cost will be just under $100 USD annually.
  • Retail Windows 7 PCs and laptops will no longer officially be available after October 31st.  You may however, still be able to get old stock.

If you are planning on upgrading, the Window is closing (no pun intended).  

Extended support for Windows 7 ends in January 2020, so your PC will still receive security updates until that time if you choose to stick with Windows 7.

Need assistance upgrading your computer network?  
Call Technology by Design at 1-204-800-3166
You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Blogs

Should I or Shouldn’t I?: Replacing Old Servers

July 7, 2016 by The T By D Team Leave a Comment

network server room routers and cables

network server room routers and cables

Why Replace An Old Server?

This is one question we get a LOT.  If an old server is doing the job, clients often wonder why they should bother replacing it.

The 3-Year Rule
Servers generally don’t last longer than 3 years.  This is due to many factors within the server.

Operating System (OS):  The older the OS, the less likely it is still going to be ‘protected’ (receive security updates from the manufacturer).  Still running Server 2003?  It’s already expired.  OSs expire or get old, and are more vulnerable to exploitation by CyberCriminals, and are more at risk for loss of data and/or information, identity theft, etc.

Hard Drive:  Hard drives will fail, on average, after 3 years.  Sometimes sooner, sometimes a little later, but it will happen.  AND, when it does, your company will shut down completely until the server is rebuilt and restored from a backup (that assuming you have a good backup…).

Power Supply and Fan:  Power supplies fail, fans fail (which could lead to motherboard failure).

Replacement Parts:  After 3 years, manufacturers are busy pushing the newer models, so parts become harder to find, and the likelihood of a major catastrophe increases immensely.

Performance

Once a server is running at 70% capacity or more (in plain language:  it’s basically 70% full when all operations are running), it slows down immensely.  And a funny thing about performance that we’ve noticed:  Unlike vehicles, and appliances, people tend to accept poor performance and slowness from their computer.  After a while, they don’t even realize that are doing it.  

How many of you start up your computer, or open a file, and start doing something else because it takes so long?  If you do, you’re not alone.  Many people do just this, and think nothing of it.  Consider the loss of productivity this is costing you & your company.  

Lots of potential for fails after 3 years.  What would a server failure cost your business, and how quickly could you recover?

We often notice people replace their vehicles far more often than their servers and other technical equipment.  A new truck runs upwards of $50,000++.  A new server:  a few thousand.  Is the new truck making you money?  Your server is your business’ lifeblood, and without it you may not be able to afford the payments on that shiny new truck.  

Make it a priority to replace your server.  Your business depends on it.  
You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: Blogs, FAQ

ALERT: New Facebook Hoax

June 29, 2016 by The T By D Team Leave a Comment

Facebook Colour Change

ALERT:  New Facebook Hoax

A new version of an old hoax is spreading fast through Facebook pages everywhere.

 

 

CyberCriminals are cashing in on people’s fear that Facebook is going to start charging for its service.

The message specifics vary, but the gist of the message is that Facebook is going to start charging for Facebook accounts sometime in the near future (times vary between “tomorrow” to “this summer”).  The message goes on to state that if current users copy and paste the message into their own status, that their icon will turn blue, and their account will be “safe”.

This is a new version of an old hoax, which began circulating as early as 2006.

A Simple Rule of Thumb Regarding Social Media

Any message that claims that a particular online service provider will start charging you or will close your account unless you send on the information to others, is a hoax.  If you receive this Facebook version, or any of the other versions of this hoax, please DO NOT pass it on to others.  Reposting does nothing other than clutter social networks and inboxes with even more useless information.  Also, CyberCriminals have ways of collecting (read “make $$$$”) off of such scams.  

You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Blogs, Featured

ALERT: New Ransomware Targets MS Office 365 Users

June 28, 2016 by The T By D Team Leave a Comment

Cerberus with Credit

ALERT:  New Ransomware Targets MS Office 365 Users


A new strain of the Cerber Ransomware is targeting MS Office 365 email users with a massive attack that has the ability to bypass the Office 365’s built-in security tools.  

A report recently released by cloud security provider Avanan shows a massive zero-day attack targeting Office 365 users with phishing emails containing attachments with malicious files.

Microsoft reported in its 1st quarter of 2016 that there are almost 18.2 million Office 365 subscribers.  And while Avanan does not specify the number of users that have been hit by the ransomware, Avanan does state:

“While difficult to precisely measure how many users got infected, roughtly 57 pecent of organizations using Office 365 received at least one copy of the malware into one of their corporate mailboxes during the time of attack.”

The Cerber Ransomware uses the ever-popular social engineering to try to trick users to allow macros, very similar to the recent Locky and Dridex attacks.  The difference is that Cerber not only encrypts user files, and displays a ransom note, but it also takes over the user’s audio system to read out its ransom note informing them that their files were encrypted.

Cerber Ransom Note with Credit

How To Protect Yourself

I’d love to tell you that there was some magic potion to sprinkle, or some magic software to download, that would keep you safe from Cerber Ransomware.  However, the steps to avoid becoming a victim to this strain of ransomware, are much like the steps to avoid the rest:

  1. Backups.  Backups.  Backups.  Maintain current, and reliable backups of all pertinent files.  Nothing beats a good, reliable backup!  Backing up your data now can prevent a lot of expensive headaches in the future.
  2. AntiMalware Software.  Regularly run AntiMalware software to block known strains of ransomware.
  3. Update.  Update.  Update.  Keep all hardware, software, and Operating Systems up-to-date.  
  4. Educate.  Educate.  Educate. Make sure employees and coworkers know about current viruses/malware, and what to look for.  Print & post our “Red Flag Emails” for easy reference on what to look for in scam emails.
  5. Install Ad Blockers When Possible.  uBlock Origin is a great ad blocker for Chrome and other browsers.
  6. Block Extensions via Email.  A good spam blocker will usually handle this for you.
  7. Limit permissions.  Allow “Read/Write Access Only” when necessary.
  8. Avoid mapping network shares.  If you have to use them, hide them whenever possible.  This is sometimes as simple as appending a “$” to your share name.

 

You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Blogs, Featured

ALERT: FBI Warns Email Extortion Heating Up for Summer!

June 7, 2016 by The T By D Team Leave a Comment

Extortion letter

 ALERT:  FBI Warns Email Extortion Heating Up for Summer!

The FBI’s Internet Crime Complaint Center (IC3) has issued a warning that  email extortion campaigns have heated up recently.  The IC3 states that the recent increase in email extortion stems from recent data breaches in companies such as Ashley Madison, the IRS, Anthem, and others where millions of records with highly personal information was stolen.

Ashley Madison Extortion

With extortion email scams, victims are informed that the CyberCriminals have their highly personal information.  The victims are instructed to pay, usually within a short time period.  The ransom amount typically ranges between 2-5 Bitcoins (approximately $300-$1400 US, depending on exchange rates).

Victims are told that if they do not pay the ransom, their personal information (such as name, phone number, address credit card info. and other confidential information) will be sent to the victim’s social media contacts, family, and friends.

Do NOT answer these demands, and do NOT pay anything.

If you do, your data will be sold to other scammers who will continue to haunt & extort you for further fund.

Report this scam to the FBI’s Internet Crime Complaint Center (IC3), at:  http://www.ic3.gov/default.aspx

You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Blogs, Featured

ALERT: Evil Android Trojan Empties Your Bank Account

May 17, 2016 by The T By D Team Leave a Comment

Mobile Device Trojan

ALERT:  Evil Android Trojan Empties Your Bank Account

The FBI has identified 2 versions of malware for Android (SlemBunk and Marcher) actively phishing for financial institutions’ customer credentials.  According to cyber threat security reports, both types of malware have targeted foreign financial institutions since 2014, gradually broadening the list to include Western banks, and offered the malware for lease or purchase in underground forums.

SlemBunk apps often masquerade as common, popular applications, and stay incognito after running the 1st time.  They have the ability to phish for, and harvest, authentication credentials when specified banking and other similar apps are launched.  Slembunk currently spoofs the apps of 31 banks across the globe – some of which are among the biggest banks in the world – as well as users of 2 popular mobile payment service provider apps.

Online Banking Login

Users will only get infected if the malware is accidentally downloaded from a malicious website, the new version of the malware being distributed by porn websites.  Users who visit these sites are incessantly prompted to download Adobe Flash update to view the porn, and doing so, downloads the malware.  

When the app is launched for the 1st time, it activates the registered receiver, which subsequently starts the monitoring service in the background.  On the surface, it pops up a fake UI claiming to be Adobe Flash Player, or whatever it was advertised as being, and requests to be the device admin.  Upon being granted admin privileges, it removes the fake icon from the device, and the malware monitors the infected phone for the launch of a targeted mobile banking app.  When a mobile banking/payment app is launched, the malware injects a phishing overlay over the legitimate banking/payment app’s user interface (aka login screen).  The malware then uses the fake login screen to steal the victim’s banking credentials.

How to Avoid Mobile Device Malware:
  1. If you receive a pop-up telling you that you need to download Adobe Flash or any other software, whether you’re on your desktop or on your mobile device, go directly to the Adobe website or the app store (type it in the address bar), and download it from there.
  2. Keep Android devices updated.
You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Blogs, Featured

ALERT: HTML Attachments

May 10, 2016 by The T By D Team Leave a Comment

Credential Phishing

ALERT:  HTML Attachments

In the past, spam filters have been able to catch most of the malicious emails, based on the types of attachments they were sending (and trying to trick people into opening the attachments, which then downloads malicious files onto your device).  Most of the malicious attachments used in the past were “.DOC” or “.JS” files, used mainly for ransomware attacks.

Now, CyberCriminals are trying to trick spam filters into letting their malicious emails through, by sending .HTML attachments, also knows as “attackments”.

CyberCriminals are using these attackments for credentials “phishing” for a few reasons.  Namely:

  1. Reduced chance of anti-virus detection:  Carefully crafted .HTML files can reduce the chances that phishing emails with these attachments will be stopped by email security software or devices.  .HTML files are not commonly associated with email-borne attacks (at least, not until recently).  .HTML files can be used to embed redirects that can evade antivirus scanners that check only URLs that appear in the bodies of emails.  .HTML files can also be used to deliver obscure web pages that might slip past scanners that do check .HTML attachments.
  2. Users are familiar with these attachments, and usually don’t see them as harmful.  Users and employees may be familiar with .HTML attachments, as they are often used by banks and other financial institutions to send secure information and documents.  If your company routinely interacts with financial institutions, your employees may view .HTML attachments as simply routine and non-threatening.

html attachment

Unfortunately, CyberCriminals have recently taken to using .HTML attachments to spoof bank login pages, popular online services, and secure messages from financial institutions (financial institutions often use “.HTML” attachments to send secure messages).

Your spam filters may miss these based on the “.HTML” file.
If you receive an email with an .HTML attachment, be wary!  
Do not open it unless you know 100% that it is legitimate, have requested the link to be sent, or have verified with the sender that the attachment is legitimate.

 

You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Blogs, Featured

You’ve Been Scammed: Now What?

May 4, 2016 by The T By D Team Leave a Comment

Youve Been ScammedYou’ve Been Scammed:  Now What?

It’s a dreaded “aha” moment…when you realize that you’ve been scammed.  

A flurry of emotions rush up, all at once:  embarrassment, rage, embarrassment again, fear, etc, etc.  Then the thought comes…

“Now what?”

 

What to DoWhat to do if You’ve Been Scammed:
  1. If you used your credit card to pay, call the credit card company.  Tell them that you did not authorize the charges, and that you were scammed.  They will most likely reverse the charges, especially if you do this soon.
  2. Cancel your credit card if you used it to pay.  If the Criminals were shady enough to scam you out of money the first time, there will be no moral dilemma for them to keep the credit card information and charge it up.
  3. If you’re in Canada:  Report the fraud to the Canadian Anti-Fraud Centre.  Phone toll-free 1-888-495-8501 Monday to Friday 830am – 5pm (Eastern).  Or log into their online Canadian Fraud Reporting System (FRS).  However, to do this you will need a “GC Key” (User ID/Password) or “Sign-In Partners” (banking credentials).
  4. If you’re in the United States: a) Email/Internet Scams:  Go to the FBI Internet Crime Complaint Center and file a report.  b)  Phone Scams:  Contact the Federal Trade Commision (FTC) or use the Online Complaint Assistant to report most types of frauds.  For more details on how to report scams and fraud go to:  https://www.usa.gov/stop-scams-frauds.
  5. If you have been tricked into signing a contract or buying a product or service:  Contact your provincial/territorial/state consumer affairs office, and consider getting independent advice to examine your options – there may be a “cooling off” period, or you may be able to negotiate a refund.
  6. If you think someone has gained access to your online account, telephone banking account, or credit card details:  Call your financial institution immediately so they can suspend your account and limit the amount of money you lose.  Credit card companies may also be able to perform a “charge back” (reverse the transaction) if they believe that your credit card was billed fraudulently.
  7. If you sent a cheque, contact your financial institution immediately.  If the criminal hasn’t already cashed your cheque, you may be able to put a “Stop Payment” order on it.
  8. If you sent money through a wire service (eg. Western Union, Money Gram), contact the wire service immediately.  If you are very quick, the may be able to stop the transfer.
  9. If you were scammed using your computer, it is possible that a virus or other malicious software is still on your computer.  Run a full system check using reliable security software.  Or contact reliable computer professionals, such as Technology by Design 1-204-800-3166, to ensure your computer is clean of all malicious software.
  10. If you do not have security software (such as virus scanners and/or firewall) installed on your computer, a computer professional, such as Technology by Design 1-204-800-3166, can help you choose the correct products for you.
  11. CyberCriminals may now have access to your online passwords.  Change all of your passwords using a secure computer.
ScamCommon Scams:
  1. Advance Fee Scams:  Scams that claim you’ve won a lottery, prize, or can invest in a “great” opportunity…IF you pay a small fee in advance.
  2. Chain Letters:  These letters promise to help you get rich quickly if you participate and forward the letter/email on to you friends and family.
  3. Charity Scams:  Criminals exploit current disasters, and take advantage of your willingness to help people in need and charitable causes.  They may collect your donation and keep it for themselves.  If you want to donate, please go directly to the charity’s webpage, or call the charity directly (from a phone number that you look up – Do NOT call any phone numbers you received in emails).
  4. Coupon Scams:  Coupons can be a great way to save money.  But beware of illegitimate offers.  If it sounds too good to be true…it usually is!
  5. Dating Scams:  Criminals often create fake profiles on dating sites and express interest in you, just so he/she can convince you to send them money.
  6. Debt Relief Scams:  Criminals hope that you are as eager to get rid of your debt as they are to scam you out of your money.  Know the warning signs, so you won’t be their next victim.
  7. Free Security Scans:  Don’t be tricked by messages on your computer (usually a pop-up) that claim your machine is already infected with a virus.  The legitimate-looking (but FAKE) security alerts exploit your fear of online viruses and security threats.
  8. Government Grant Scams:  Despite ads that say you qualify for a government grant, these are often scams.  Be wary about responding to offers, emails, or claims that use government agency names.
  9. Health Product Scams:  Be wary of trusting all claims.  Take time to get the facts about a product first.
  10. International Financial Scams:  A variety of scams offer entries into foreign lotteries or international investment opportunities.
  11. IRS-Related/Canada Revenue Agency Scams:  Be careful of trusting emails that are supposedly from the IRS or the CRA.  Criminals try to gain access to your financial information in order to steal your identity and assets.
  12. Jury Duty Scams:  Be wary of phone calls from supposed “court officials” who threaten that a warrant has been issued for your arrest because you failed to show up for jury duty.
  13. Phantom Debt Scams:  Beware of letters and calls, supposedly from “debt collectors” or “court officials”.  These criminals make threatening claims requiring you to pay money that you don’t owe.
  14. Pyramid Schemes:  These investments offer big profits, but really aren’t based on revenue from selling products.  Instead, they depend on the recruitment of more investors.
  15. FBI/CIA Scams:  Avoid falling victim to schemes involving unsolicited emails supposedly sent by the FBI and/or the CIA.  The emails appear to be sent from email addresses such as mail@fbi.gov, post@fbi.gov, admin@fbi.gov, and admin@cia.gov.
  16. Service Member or Veteran Scams:  Criminals target bogus offers of government resources or financial services to trick active duty military personnel and veterans out of their hard-earned money.
  17. Smishing, Vishing, and Phishing:  All 3 of these scams rely on you replying to an email, phone call, or text with personal information, such as your bank account or credit card information.
  18. Subpoena Scams:  Criminals send bogus emails, supposedly from a court, stating that you have to come to court.  These emails are fake and may contain links that are harmful to your computer.
  19. Text Message Scams:  Not only can text message spam be annoying and cost you money on your mobile phone, but the messages are also usually part of scams.
Protect YourselfHow To Protect Yourself:
  1. Protect Your Identity:  Treat your personal details like money – don’t leave it lying around, and don’t give it out to just anyone.
  2. Destroy personal information, don’t just throw it out.  Cut up or shred old bills, statements, or cards (credit cards or ATM cards – anything with a black or grey magnetic stripe on the back contains personal information).
  3. Never send money or cheques to anyone that you don’t know and trust.  
  4. Never send money or pay any fee to claim a prize or lottery winnings.
  5. Never transfer or wire any refunds or overpayments to anyone you do not know.  
  6. If you receive a phone call from someone you do not know, always ask for the name of the person you are speaking to and who they represent.  Then verify this information by calling the company yourself (by looking up the phone number yourself.  NEVER trust a phone number that someone else provides).
  7. Never give our personal, credit card, online banking/account, usernames or password details over the phone or in a response to an email, unless you made the phone call or initiated contact, and the phone call and/or email came from a trusted source.
  8. Do not respond to text messages or missed calls that come from numbers you do not recognize.  Be especially wary of phone numbers beginning with “1-900”.  These may be charged at higher rates than other numbers and can be extremely expensive.  
  9. Never reply to a spam email (unsolicited email), even to unsubscribe.  Often, unsubscribing serves to “verify” your email address to scammers.  The best thing to do it to delete any suspicious emails without even opening them.
  10. Turn off the “viewing pane” as just viewing the email may send a verification notice to the sender that yours is a valid email address.
  11. Legitimate banks and financial institutions will never ask you for account updates or details in an email, or ask you to click on a link in an email to access your account.
  12. Never call a telephone number, or trust any other contact details that you see in a spam email.
  13. Install software that protects your computer from viruses and unwanted programs, and make sure it is kept current.  If you are unsure, seek the assistance of a computer professional, such as Technology by Design 1-204-800-3166.
  14. If you want to access a website, use a bookmarked link to the website or type the address of the website into the browser yourself.  Never follow a link in an email.
  15. Check website addresses carefully.  CyberCriminals often set up fake websites with addresses that are very similar to legitimate websites.
  16. Beware of websites offering “free” downloads (music, adult content, games, movies, etc.).  Downloading these products may install harmful programs onto your computer without your knowledge.
  17. Avoid clicking on pop-up ads – this could lead to harmful programs being installed on your computer.
  18. Never enter your personal, credit card, or online banking  or account information on a website that you are not 100% certain is genuine.
  19. Never send your personal, credit card, or online banking  or account information through an email.
  20. Avoid using public computers (at libraries or Internet cafes, etc.) to do your Internet banking or online shopping.
  21. When using public computers, clear the history and cache of the computer when you finish your session.
  22. Be careful when using software on your computer that auto-completes online forms.  This can give CyberCriminals easy access to your personal and credit card details.
  23. Choose passwords that would difficult for anyone else to guess.  For example, passwords that include letters and numbers.  Change your passwords regularly.
  24. When buying anything online, print out copies of all transactions, and only pay via a secure site.  If using an Internet auction site, note the ID numbers involved and read all the security advice on the site first.
You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: Blogs, FAQ

  • « Previous Page
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • …
  • 52
  • Next Page »

Sign Up For The Monthly TechTips Newsletter!

* = required field
unsubscribe from list

powered by MailChimp!

Recent Posts

  • ALERT: Celebrity Death Scams
  • ALERT: Uber Hacked
  • ALERT: Netflix Email Scam
  • ALERT: Bad Rabbit
  • Scam – Reset Password Alert

Recent Comments

  • ALERT: New Ransomware Targets MS Office 365 Users - Technology by Design on Managed Backups
  • ALERT: FBI Warns Email Extortion Heating Up for Summer! - Technology by Design on ALERT: AshleyMadison Hack Blows Up
  • ALERT: Evil Android Trojan Empties Your Bank Account - Technology by Design on Definition: Phishing
  • ALERT: HTML Attachments - Technology by Design on Definition: Phishing
  • ALERT: New Ransomware Also Steals Your Bitcoins - Technology by Design on Managed Backups

Copyright © 2025 · Dynamik Website Builder on Genesis Framework · WordPress · Log in