Technology by Design

Technology news, reviews, and how to keep your technology running fast and smooth!

  • Home
  • About TbyD
    • Who is TbyD
    • Why Choose TbyD?
    • 16 Things
    • Your Computer Guy
  • Products and Services
    • Business Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
      • Performance Analysis
      • Optimization
      • Core Security Solution
      • Managed Backups
      • Computer and Network Systems
      • Computer Setup
      • Domain Names
      • Email Services
      • Extended Warranties
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
      • Websites
    • Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
        • Computer Setup
      • Core Security Solution
      • Managed Backups
      • Extended Warranties
      • Performance Analysis
      • Optimization
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
    • Products
      • Computers
      • Servers
  • Testimonials
    • What Our Clients Say About Us
  • Blogs
    • ALERTS
    • FAQ
    • How To Videos
  • Newsletters
    • TechTips Newsletters
  • Reviews
  • Media
    • Email Red Flags
    • E-Books
    • Disaster Prevention Planning Kit
    • Free Reports
  • Contact Us
    • Contact Us
    • Quick Support

Trivia Q&A: May 2013

April 29, 2013 by The T By D Team Leave a Comment

QUESTION:

It took the radio 38 years.  It took the television 13 years.  It only took the internet 4 years to reach this milestone.  What is it?

 

ANSWER:

50 million users

 

Email your answer to:  answer@tbyd.ca for your chance to win coffee & donuts delivered to your workplace! 

 PLUS, Your company will be featured in next month’s issue of TechTips, on our blog, and our Facebook page! 

Your feature will reach over 2000 other people!

Filed Under: Featured, Trivia, Trivia Questions and Answers

Windows XP: Execution Date Looms

April 23, 2013 by The T By D Team Leave a Comment

Windows XP has been around since less than 2 months after 9/11.  Shortly after it’s launch, a big security vulnerability was found in the ‘universal plug and play’ code.  This lead to their “Trustworthy Computing’ initiative, and eventually they released XP Service Pack 2 as a mulligan for their initial release.

Windows XP continues to be the 2nd largest PC OS (Operating System), behind Windows 7.  It continues to be used on over 300 million business desktop computers.  Now for the kicker…

April 8, 2014 Redmond will discontinue support for Windows XP.  No more support means no more security updates, tech support, or patches.

Moral of the story:  Ditch Windows XP NOW, and upgrade to Windows 7.  You have a year to get used to the new OS, before Windows XP becomes a major security liability.

Filed Under: ALERTS, Featured

Mobile Spear Phishing

April 23, 2013 by The T By D Team 1 Comment

A new spear-phishing attack has been identified by Kaspersky Lab.  This attack involves a Trojan designed to target Android devices.  This newest attack is part of an emerging trend that targets not only mobile devices, but the computers to which the devices connect.

Researcher Kurt Baumgartner, who monitors malware, states mobile device users should add additional security packages to their mobile devices to protect them.

Listen to the full interview at BankInfoSecurity:  here.

Filed Under: ALERTS, Featured

ALERT: Phone System Hackers

April 16, 2013 by The T By D Team Leave a Comment

PasswordALERT:  Phone System Hackers

Everyone knows (or should know by now) that if someone calls, and asks for personal information, credit card numbers, etc you shouldn’t provide this over the phone.  However, the newest hackers hack your phone lines…when no one is there.

Toll fraud is the theft of long distance charges services by an unknown third party.  It is not limited to the unauthorized entry into a business’ phone system or equipment.  Toll fraud occurs worldwide, and has devastating effects on businesses, often causing tens of thousand of dollars worth of long distance charges to a single business.

Unfair as it is, if a call has originated with, or passed through your phone system or equipment, you are responsible for the charges associated with the call, whether the call is authorized or not.  This means, even though you are a victim of fraud, you are liable for the costs.

Hackers can enter your phone system through the voicemail boxes.  The hackers call the business, and when no one answers the phone, all calls are put through to a voicemail box.  The hackers then bombard the system with a series of numbers to attempt to get the right code for the administration side of the voicemail.  Once they find the right code, they are able to make outbound calls to foreign places.  Some foreign countries have extremely high long distance rates (13-29 cents per minute), and are good targets for toll fraud.  This means the security of your phone system is up to you.

How do you ensure your phone system’s security?  Call your Private Branch Exchange provider for specifics, but the following steps are a good start:

  • Never publish a Direct Inward System Access (DISA) telephone number.
  • Change the DISA access number regularly
  • Use longer DISA authorization codes.  9 digits are ideal.  Never use less than 7.
  • Issue a different DISA authorization code for all users.
  • Warn DISA users not to write down authorization codes.
  • Restrict DISA access at night, weekends, and holidays.  This is a low usage time, but prime time for fraud.
  • Block or restrict overseas access.  If your company requires employees to call overseas, restrict calls to only the countries that you need to make calls to.
  • Program your system to answer with silence after 5 or 6 rings.  Most systems are programmed to answer with a steady tone after two rings, and this is what hackers look for.
  • Route invalid access attempts to your operator, if possible.
  • Program your Private Branch Exchange (PBX) to generate an alarm if an unusual number of invalid attempts are made.
  • Program your PBX so that the port will disable itself after a set number of invalid attempts.
  • Disconnect all telephone extensions that are not in use.
  • Block access to remote maintenance/administration ports, or use maximum length passwords.  Change the passwords frequently, use maximum password length, and don’t use easy or sequential numbers.  Ensure you change the passwords from factory settings.
  • Disconnect modems that are not in use.
  • Prohibit the sharing or posting of passwords, or entering them into programmable keys or speed dial buttons.
  • Block collect call options
  • Restrict access to directories that give directions on how to get into the voicemail system.
  • If your system allows callers to transfer to other extensions, block any digits that hackers could use to get outside lines.
  • Delete all inactive voicemail boxes.
Not sure if your company is safe?  Ask us for a FREE Network Security Assessment!

Check out our “Email Red Flags”  for what to watch for, in suspicious emails. 

Ask us about our “Core Security Solutions” package!
You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Featured

ALERT: Bogus CNN Article

April 9, 2013 by The T By D Team Leave a Comment

The new Pope Francis is making news lately, and bad computer geeks out there are trying to cash in the best they can.

The newest scam to make the rounds is a drive-by malware campaign that uses a fake CNN article to get people to log into an infected website.  Once people open the website, it infects their workstation with the “Blackhole Exploit Kit”.  This is the #1 cybercrime tool to deliver all kinds of malware.

Beware of email from “CNN Breaking News” with the following subject lines:

– Opinion:  Family sued new Pope.  Exclusive!

– Opinion:  New pope tries to shake off the past

– Opinion:  Can New-Pope Benedict be Sued for the Sex Abuse Cases?

Drive-by attacks use a link to an infected Website instead of including the malware in the email attachment, and have become a popular delivery system.  This latest campaign is part of the current bad geek effort to use current news events to try to entice people to log into infected websites, and thus distributing spam and malware.

Filed Under: ALERTS, Featured

Secured?: Laptop Security

April 8, 2013 by The T By D Team 1 Comment

Dear Geek;

I frequently attend meetings which require that I bring my laptop.  I occasionally leave it unattended (bathroom breaks, etc.).  I have it password protected, but what else can I do to keep it safe?

Signed,

Secured?

Dear Secured;

Laptop security is a huge issue.  Having the laptop password protected is a start, but that doesn’t keep it from being removed off-site, then hacked.  Unfortunately, most people have a password that is not very difficult to figure out.

You can now get biometric fingerprint scanners that require a valid fingerprint to be swiped prior to starting the computer or accessing files and folders on the computer.  Some higher-end laptops have an fingerprint scanner integrated into the case.  You can also purchase a fingerprint scanner add-on that attaches to your USB port.

Some more recent laptops also have a port or ‘security slot’ that is designed for a ‘laptop lock’.  This cable connects to your laptop via the security slot, then wraps around an immovable object such as a table or chair.  Some higher-end laptop locks feature an alarm that goes off if the cable is cut.  This may deter some thieves, and slow down others, but you better be ready to run fast after the thief once that alarm goes off!

Unfortunately, the only 100% sure-fire way to ensure your laptop isn’t stolen, is to keep it with you at all times.  If you’re not comfortable taking your laptop to the bathroom with you, ask your study-buddy (the person in the seat next to you) if they can watch your laptop for a minute while you’re ‘indisposed’.

If you have a question for our Resident Geek, send it to:  geek@tbyd.ca.  We’ll translate it from Geek-lish to English, so it actually helps!

Filed Under: FAQ, Featured

April 2013 TechTips Newsletter

April 5, 2013 by The T By D Team Leave a Comment

April Newsletter
The best parallel parker in the world, a Limbo-rific bus driver, a deathly way to a tan, and April Fools day geek-style!  We also visit the age-old question:  Jocks vs Nerds.
We also feature March’s trivia winner – ABC Power Tools!

Get the newsletter by clicking here.
**************************************************************************

Skill testing question for coffee & donuts…
Answer the following trivia question by emailing answer@tbyd.ca.

Correct answers will be entered into our draw for FREE coffee and donuts!  Draw will be made on Wednesday April 17th.
Winner will be notified via email.

Question:  

Which is the only Disney animated movie in which the title character doesn’t speak?

In addition to the coffee & donuts (as if that wasn’t enough incentive!),the winning company will be featured in TechTips, on our blog, Twitter, and our Facebook page! 
If you know someone that would like, or would benefit from, the newsletter, feel free to forward it to them!

Your feature will reach over 2000 other people!
Remember Google is your friend – send your answers in to answer@tbyd.ca

***************************************************************************

The Single Most Dangerous Assumption Businesses Make About Bank Security That Can Cause Them To Lose ALL Their Money!

Find out the 5 essential steps you can take right now to protect your business!

Download our FREE Executive Guide 
“What Every Business Owner Must Know About Protecting and Preserving Their Company’s Critical Data and Computer Systems”

This FREE report reveals what EVERY business owner should know about:
– Keeping your network safe from viruses, hackers, spam, spyware and other cyberthreats.
– Critical security measures to protect against natural disasters, major system failures, theft and corruption of sensitive data, and even employee sabotage.
– How to dramatically lower or eliminate expensive computer repair bills.
– How to get (and keep) your network running lightening fast.

To download this FREE Report, call us now!
Call us at: 204-800-3167.  Or go online to: http://tbyd.ca/techtips/ebooks/whateverysmallbusinessownermustknowabout.pdf

Filed Under: Featured, TechTips Newsletter

Router Troubles

March 26, 2013 by The T By D Team Leave a Comment

Dear Geek,

I am wondering about the best router to have, both in the office, and at home.  I find our router frequently has to be re-started or re-set to get things that have been connected previously to connect again when in range, especially cell phones.  I have the router password protected, but the items have the password stored in them and it says that they cannot connect to the network.  Once the router is unplugged and plugged back in, they connect immediately.  Is this something with the router, or perhaps just a setting?  Thanks!

Signed,

Judy in RouterLand

Dear Judy,

The symptoms you’re describing sounds like something with the Router and it could be time for it to be replaced.

If kept in an optimum computing environment, a hardware router can continue to function well physically for several years.  Trouble is most of us don’t work in that kind of bubble.  To prolong your router’s lifespan, place your router in an area that is out of direct sunlight, free of moisture and not prone to temperature extremes. If your router includes wired ports, avoid taking cables in and out of the the ports too often as this can cause premature wear on the ports.

The more heavily a router is used, the more prone it will to overheating, and thus wearing out.  To avoid overheating, ensure that your router’s environment allows for adequate air circulation.

It’s time to replace your router, if it is aging or if it’s become obsolete.  It’s also time to upgrade if your router is showing any signs of physical damage, including any wearing or weakness (loose parts, frayed power cords).  Connectivity issues, such as dropped network connections (on the wireless network or on a wired port that looks physically fine) can also be a sign that your router is biting it.

When looking for a replacement router, as a standard, we have been using the Asus N12 with all our small business clients that need a fast reliable solution.  The N12 can be easily put in 1 of 3 modes – Router, AP or Bridge, is quick and easy to setup (Asus provides great software for this) and has been rock solid reliable for us.

When upgrading your router, ensure you contact your local waste management service to confirm your local e-waste disposal options.  Most computer businesses will offer to recycle your dead router appropriately.

If you have a question for our Resident Geek, send it to:  geek@tbyd.ca.  We’ll translate it from Geek-lish to English, so it actually helps!

Filed Under: FAQ, Featured

March 2013 Trivia Winner – ABC Power Tools!

March 25, 2013 by The T By D Team 2 Comments

Congratulations to ABC Power Tools for Winning Coffee & Donuts delivered to their workplace!

photo (53)

ABC Power Tools is family-owned, and has been in business since 1979.  Initially a one-person operation, ABC Power Tools expanded into a larger location in order to better serve its rapidly growing power equipment sales and service facility.  ABC had to move when it outgrew it’s location yet again.  ABC Power Tools is now located in the historical Transcona Post Office building at 201 Regent Avenue West.

ABC Power Tools is a major service centre , and performs warranty work for various manufacturers.  In addition, ABC has a long business association as a dealer for Stihl, Exmark, and others.   All products are serviceable by ABC Power Tools.  With a fully equipped service facility staffed with expertly trained technicians, you’ll never be delayed due to third party repairs.

The only place you’ll find inferior products is in their repair shop!  ABC has learned that quality is key, and makes jobs more profitable for the business owner, or more pleasurable for the homeowner or weekend warrior..  All items sold by ABC are fully assembles and test run.  They also take the time to advise the customer on the most efficient and safest method to operate their new equipment.

ABC Power Tools is proud of their reputation for providing timely, quality, affordable service.

To see more about ABC Power Tools, check out their website at www.abcpowertoools.ca.  For more information, please contact Judy at 204-224-1760 or 204-222-313

Don’t forget your entry for this month’s trivia for a chance to win coffee & donuts…delivered to your workplace!  PLUS, Your company will be featured In next month’s issue of TechTips, on our blog, and our Facebook page!9.

Your feature will reach over 2000 potential customers!!

Filed Under: FAQ, Featured

Updates: Critical?

March 19, 2013 by The T By D Team Leave a Comment

Dear Geek;

Almost every time I turn on my computer there’s a notice for a Windows update.  My buddy tells me that I don’t need to install them.  What’s the truth?

Signed,

Updated?

Dear Updated?;

Prior to release, operating systems (OSs) are tested for vulnerabilities intensively.  However many vulnerabilities aren’t found until the OS is used in the real world.  Hackers use known vulnerabilities in OSs to get into your system.  Most of the updates that Microsoft designates “critical” have to do with security, because the update patches a known vulnerability that has been found.

I suggest installing the updates in the “Recommended” section, unless you’re ok with hackers having free access to your computer.  In which case you should set out the virtual ‘Welcome” mat.  The minimum you should do is to ensure to keep Windows Update active, so you’ll at least know about available updates to patch holes in the OS.  Updates sometimes also provide added or improved features.

If you don’t want to be hassled with the request to install updates, then restart your computer, you can allow Windows to automatically install updates.  That way you don’t have to do any work, and you’ll just have a pop-up window alerting you that Windows has installed the updates.

If you have a question for our Resident Geek, send it to:  geek@tbyd.ca.  We’ll translate it from Geek-lish to English, so it actually helps!

Filed Under: FAQ, Featured

  • « Previous Page
  • 1
  • …
  • 21
  • 22
  • 23
  • 24
  • Next Page »

Sign Up For The Monthly TechTips Newsletter!

* = required field
unsubscribe from list

powered by MailChimp!

Recent Posts

  • ALERT: Celebrity Death Scams
  • ALERT: Uber Hacked
  • ALERT: Netflix Email Scam
  • ALERT: Bad Rabbit
  • Scam – Reset Password Alert

Recent Comments

  • ALERT: New Ransomware Targets MS Office 365 Users - Technology by Design on Managed Backups
  • ALERT: FBI Warns Email Extortion Heating Up for Summer! - Technology by Design on ALERT: AshleyMadison Hack Blows Up
  • ALERT: Evil Android Trojan Empties Your Bank Account - Technology by Design on Definition: Phishing
  • ALERT: HTML Attachments - Technology by Design on Definition: Phishing
  • ALERT: New Ransomware Also Steals Your Bitcoins - Technology by Design on Managed Backups

Copyright © 2025 · Dynamik Website Builder on Genesis Framework · WordPress · Log in