Technology by Design

Technology news, reviews, and how to keep your technology running fast and smooth!

  • Home
  • About TbyD
    • Who is TbyD
    • Why Choose TbyD?
    • 16 Things
    • Your Computer Guy
  • Products and Services
    • Business Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
      • Performance Analysis
      • Optimization
      • Core Security Solution
      • Managed Backups
      • Computer and Network Systems
      • Computer Setup
      • Domain Names
      • Email Services
      • Extended Warranties
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
      • Websites
    • Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
        • Computer Setup
      • Core Security Solution
      • Managed Backups
      • Extended Warranties
      • Performance Analysis
      • Optimization
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
    • Products
      • Computers
      • Servers
  • Testimonials
    • What Our Clients Say About Us
  • Blogs
    • ALERTS
    • FAQ
    • How To Videos
  • Newsletters
    • TechTips Newsletters
  • Reviews
  • Media
    • Email Red Flags
    • E-Books
    • Disaster Prevention Planning Kit
    • Free Reports
  • Contact Us
    • Contact Us
    • Quick Support

ALERT: IRS Refund Ransomware Scam

April 26, 2015 by The T By D Team Leave a Comment

irs

ALERT:  

IRS Refund Ransomware Scam

 

 

Wait until the last minute to file for Income Tax?

Waiting with bated breath, knowing deep inside that you’ll have to pay dearly, but secretly hoping for a surprise refund?

CyberCriminals are aware of this, and are taking advantage of people while they’re vulnerable.
(That’s what CyberCriminals do best!)

Knowing that people are waiting for official word from their federal tax agency (IRS, Canadian Tax Services, etc.) pending refunds,

CyberCriminals are working overtime, hoping to receive their own ‘bonus’!

CyberCriminals have a massive email campaign, sending emails that reportedly want to inform you of your tax refund.

IRS Refund Scam

 

It will look similar to the email to the left, tailored to your specific location, of course.

 

 

They ask you to click on a link to a Microsoft Word attachment to receive for information.

However, instead of a tax refund, you’ll be opening an infected Word file.

The infected file holds a ransomware payload, and encrypts the files of the PC that opened the attachment.

 

The bonus?

It’ll also encrypt the files on all the connected network drives.

 
IRS Ransom
 
 

And your screen will look similar to the one on the left.

 

 

Once that happens, you’ll be forced to pay the reported $500 ransom by a deadline.

If you miss the 1st deadline, the ransom will go up.

 

Pass this post on to friends, family, and coworkers.
The more people that are educated about this type of attack, 
the less effective the attack will be!

 

Got Cyber-Bugs?

Call 1-204-800-3166

For Cyber-Extermination!

 

 

Filed Under: ALERTS, Featured

What is PCI Compliance?

April 20, 2015 by The T By D Team Leave a Comment

What is PCI Compliance?

 

PCI compliance is a term that has been in the news a lot over the past couple years.  

 

But what is it?  

 

PCI Compliant

 

 

 

 

 

‘PCI Compliance’ or ‘PCI Security Compliance’ is Payment Card Industry Security Compliance.  It addresses any business that accepts credit card or debit card for payment, and is a standard that has emerged as the ‘bench test’ for whether or not your retail operations are a security risk for credit card information theft.

The rising incidence of stolen cardholder account data is a major concern for all businesses that accept payments by credit or debit card.  As a result of these thefts, merchants and financial institutions suffer fraud losses and unanticipated operational expenses, and consumers are inconvenienced significantly.  

 

What Does It Mean To Me?

If you collect or store credit card information, and if it is compromised, you may lose the ability to accept credit cards at your business, or you may face higher processing rates.  In the U.S., you may also be libel, not only for the credit card information compromised, but for non-compliance for new Security Awareness Training guidelines if your employees have had little or no security awareness training.  If you store credit or debit card information, no matter what country you are in, you are required to follow PA-DSS Compliant Applications (Payment Application – Data Security Standards)

To protect your business, your customers, and the integrity of the payment system, each of the card companies has in place a set of requirements governing the safekeeping of account information.  

  • Install and maintain firewall to protect cardholder data.
  • Do not use vendor-supplied default system passwords.
  • Protect stored cardholder data.
  • Encrypt transmission of cardholder data across network .
  • Use and regularly update anti-virus software.
  • Develop and maintain secure systems and applications.
  • Regularly test security systems and processes.
  • Maintain a policy that addresses information security.

PCI levels

 

There are 4 different levels of PCI Compliance, depending on the number of eCommerce and regular transactions your business does annually.

 

 

 

 

PCI Security Council

 

 

To check if you are following the compliance standards, visit the PCI Security Standards Council – the organization that manages these standards.  This is an excellent website that also allows you to perform a self-assessment.  

So that covers the legalities of the electronic safekeeping of your information.

 

But..
Being PCI Compliant Does Not Ensure Safety

PCI checklist - editedTo rely solely on the PCI DSS checklists to secure cardholder data is similar to a pilot relying only on the pre-flight checklist before takeoff, then colliding with another plane during takeoff.

In reality, the goal of effective security controls is to prevent security breaches from occurring, and when they do, allow quick detection and recovery.

This requires not only following a checklist, but understanding the organization’s compliance and security objectives, understanding what the top risks to achieving those objective are, having adequate situational awareness to identify where you need controls to mitigate those risks, and then implement and monitoring the correct production controls.  

 

The Human Factor Typing

The U.S. Department of Health and Services has stated that bad or no security awareness training is a main cause of compliance failures.  This is true not only for health care, but all industries such as banking, finance, manufacturing, and technology.

Your employees are your company’s biggest asset.  They can also be your company’s weakest link.

Trend Micro reports that 91% of successful data breaches started with a spear-phishing attack.
Make sure your employees are up-to-date in their security awareness training.

 

Don’t Know What to Look For In Suspicious Emails:  http://tbyd.ca/email-red-flags/

For all the latest virus/malware alerts go to:  http://tbyd.ca/category/alerts/

Got Bugs In Your System?

Call 1-204-800-3166

For Cyber-Extermination!

Filed Under: FAQ, Featured

ALERT: How to Help Prevent Cyber-Infection

April 9, 2015 by The T By D Team Leave a Comment

Trojen malware

ALERT:  

How to Help Prevent Cyber-Infection

 Think you’re immune?
So did thousands of banks and other organizations!

 

Last week, IBM Security report an active CyberHeist campaign using a variant of the Dyre Trojan that has successfully stolen more than $1 million each time, from targeted enterprise organizations.    

Since it emerged in June 2014, Dyre has grown even more sophisticated and easy-to-use, spreading the malware through a mall mailing of victims’ contact lists, and targeting organizations instead of individuals, enabling CyberCriminals to go for the bigger payday.

Dyre Trojan

 

The IBM Trusteer team reported in October 2014, an increase of the infection rate of the Dyre malware from 500 to a startling 3,500 in just 5 months.

 

The Dyre campaign targets organizations
that frequently conduct wire transfers with large sums of money. 

 

The campaign includes a successful spear-phishing campaign which results in an infection (via Upatra malware).  Once the infected PC tries to log into one of the hundreds of bank websites that they Dyre Trojan monitors, a new screen appears (instead of the corporate banking site).  The new page explains the website is experiencing issues, and requests the victim to call the number provided to get help logging in.  This all results in successfully duping their victims into providing their organizations’ banking credentials.  As soon as the victim hangs up the phone, the wire transfer is complete.  

The targeted organizations sometimes also experience a Distributed Denial-of-Service (DDos) attack.

Dyre Trojan work

 

 

Unfortunately for us, Social Engineering still works extremely well for CyberCriminals.

 
How to Help Prevent Cyber-Infection:
  1. Train Your Employees.  Your organization is only as strong as the weakest link.  And your employees have the most exposure, and are usually the most targeted, of your organization.  Train them on security best-practices and how to report suspicious activity.
  2. Have I.T. Conduct Periodic Mock-Phishing Exercises.  Have your I.T. department send employees mock-phishing emails, where employees receive emails or attachments that simulate malicious behaviour.  Metrics can be captured on how many potential incidents would have happened had the exercise been a real attack.  Use these findings as a way to discuss the growing security threats with employees.
  3. Offer Security Training.  Security Training is essential to help employees understand threats, and measures they can take to prevent infections and protect the organization.
  4. Provide Regular Reminders.  Regular reminders for employees about phishing and spam campaigns, and to remind them not to open suspicious attachments or links from both work and personal emails.
  5. Train Employees in Charge of Corporate Banking.  Train them to never provide banking credentials to anyone.  The banks will never ask for this information.

Got  Cyber-Bugs?

Call 1-204-800-3166

For Cyber-Extermination

 

Filed Under: ALERTS, Featured

April 2015 TechTips Newsletter

April 2, 2015 by The T By D Team Leave a Comment

3-D Printer Prints 7-Year-Old New Hand!

 

APRIL 2015

TECHTIPS NEWSLETTER

 

 

Technology news, information and interesting stories.  Published monthly for Geeks and non-Geeks!

  • 3-D printer prints 7-year-old girl a new hand!
  • Toy Story 2.  The good guy lost…almost.
  • Turn dead animals into art…and sell it on the internet!
  • Selfie Stick is banned.  Selfie Shoes are in!
  • Get motivated by some of the most motivated people!
  • Strategies to keep hackers away!
  • Affordable, reliable computers!
  • Urgent computer security warning!

You don’t want to miss this issue!

Get your newsletter HERE!

Comments?  Let me know what you think at marketing@tbyd.ca


Keep Up-To-Date on the Latest Threats To Your Computer Network!

Regular weekly ALERTS on the latest security threats to your computer network

Check out the ALERTS here.

Do you have a question for our Resident Geek?  Email it to:  geek@tbyd.ca!

Like us on Facebook!

Follow us on Twitter!


EXPIRATION NOTICE:

An urgent security warning for businesses running Windows XP, Office 2003, and Microsoft Windows Server 2003!

Windows XP and Office 2003 are no longer supported by the manufacturer.

Server 2003 will no longer be supported by the manufacturer after April 2015.

If your business or organization is currently running Windows XP, Office 2003, Microsoft Server 2003, or Exchange 2003 on any computers or servers in your office, you need to know about a dangerous security threat that must be addressed NOW!

PLEASE TAKE A MOMENT TO READ THIS IMPORTANT SECURITY ANNOUNCEMENT!

As your local Microsoft Partner, we are aggressively reaching out to all local businesses that use any of these programs to alert you to this serious security risk and inform you about what you need to do NOW to protect your company or organization!

WINDOWS XP AND OFFICE 2003 REPLACEMENTS MUST BE MADE NOW

WINDOWS SERVER 2003 AND EXCHANGE 2003 REPLACEMENTS MUST BE MADE BY JULY 14, 2015

Microsoft has officially announced that it retired all support for Windows XP and Office 2003 April 2014, and on the Server 2003 operating system on July 14, 2015.

This means any business or organization still running any of these programs will be completely exposed to serious hacker attacks, aimed at taking control of your network, stealing data, crashing your system, and inflicting a host of other business-crippling problems you do NOT want to deal with.

This is such a serious threat that the U.S. Department of Homeland Security has issued an official warning to all companies still running these programs, because firewalls and antivirus software will NOT be sufficient to completely protect your business from malicious attacks or data-exfiltration.  Running some of these programs will also put many organizations out of compliance.

CALL 1-204-800-3166

for a FREE QUOTE

 

 

Filed Under: Featured, TechTips Newsletter

ALERT: Scam 911 Threat

April 2, 2015 by The T By D Team Leave a Comment

911 Scam

ALERT:  Scam 911 Threat

 

Currently, residents of Ohio are being ‘beta tested‘ by CyberCriminals for an email scam.

Once they’re done with Ohio, you know it’s going to quickly spread throughout the U.S. and Canada, so here’s your heads-up.

Alert Your Friends, Family, Neighbors, and Colleagues About This Scam…

People are receiving phone calls and emails from a fake 911 emergency number.  The message states, that unless you call the Attorney General’s Office, at the supplied phone number (which is fake) and pay a fine, or be arrested shortly.

*  DO NOT phone the ‘Attorney General’s Office’ number that they supply.  
 
*  DO NOT click on any supplied links in the emails.
 
*  DO NOT comply with the demands for money through the phone or email messages,
even if it appears legitimate.

 

911 does not send phone or email messages like this.

Now, scams that trick people into paying money isn’t new.  However, the ‘sophistication’ of this scam would be impressive, if it wan’t so evil.

For the phone calls, ‘911’ actually appears in caller ID.  For the emails, ‘911 Emergency’ actually appears as the sending address.

Both are fake.

The Office of the Attorney General in Ohio has received complaints since the beginning of March, regarding these scam phone calls/emails.

How To Protect Yourself From Phone Scams:

This information applies to emails as well.

  1. Be skeptical of the phone number that appears on caller ID.  It could be spoofed, or fake.
  2. When in doubt, hang up or don’t answer a call.
  3. Don’t respond to suspicious calls.  Even if the call prompts you to dial a certain number to avoid arrest, or asks you to press a button to “opt out” – Don’t do it.  This could cause you to receive even more phone calls, because it signals to the sender that yours is a legitimate phone number.
  4. Never provide money or personal information to someone who calls you unexpectedly and demands payment, even if it appears to be an emergency call or a call from the government.
  5. Don’t trust someone who says you have to pay off a debt or fine by using a prepaid card or wire transfer.  These are preferred methods of payment for Criminals, because once the money is sent, it is difficult to trace or recover.

 

Got Cyber-Bugs?

Call:  1-204-800-3166

For Cyber-Extermination!

Filed Under: ALERTS, Featured

World Backup Day: 9 Questions You Must Ask When Planning A Backup Strategy

March 30, 2015 by The T By D Team Leave a Comment

March 31st is:

 World Backup Day

 

83% of us own a computer.    89% own a mobile phone.
But only 1 in 4 people make regular backups of their data.

 

 

 

Think You’re Safe?  THINK AGAIN!

 

World Backup Day2

 

  •  6% of all PCs will suffer data loss in any given year.  This equals 4.6 million PCs that suffer data loss every year.
  • 60% of companies that lost their data for any amount of time, SHUT DOWN within 6 months of the loss.
  • 93% of companies that lost their data for 10 days or more, filed for bankruptcy within 1 year of the loss.

What Is A Backup?

It’s a separate copy of your important photos and documents.

So if something happens to your computer or mobile phone, your photos and information are completely safe.

Losing Your Data Is More Common Than You Think:
  • More than 60,000,000 computers will fail this year.
  • More then 200,000 smartphones are lost or stolen every year.

That’s countless documents and treasured memories DESTROYED.

If something went wrong today, what would you lose forever?

World Backup Day

 

Go To worldbackupday.com to take

The World Backup Day Pledge:
“I solemnly swear to backup my important documents and precious memories on March 31st.”

 

“I will also tell my friends and family about World Backup Day – friends don’t let friends go without a backup.”

9 Questions You MUST Ask Yourself When Planning a Backup Strategy*

It takes time to create and implement a backup and recovery plan.  You need to figure out what data is important and needs to be backed up, how often the data should be backed up, and more.

To help you create a plan, consider the following questions:

 

1.  How important or sensitive is the data on your systems?

The importance of data can go a long way toward helping you determine if you need to back it up – as well as when and how it should be backed up.

For critical data, such as a database, you’ll want to have redundant backup sets that extend back for several backup periods.

For sensitive data, you’ll want to ensure that backup data is physically secure or encrypted.

For less important data, such as daily user files, you won’t need such an elaborate backup plan, but you’ll need to backup the data regularly and ensure that the data can be recovered easily.

 

2.  What Type Of Information Does The Data Contain?

Data that doesn’t seem important to you, might be very important to someone else.

Thus, the type of information the data contains can help you determine if you need to backup the data – as well as when and how the data should be backed up.

 

3.  How Often Does The Data Change?

The frequency of change can affect your decision on how often the data should be backed up.

For example, data that changes daily should be backed up daily.

 

4.  Can You Supplement Backups With Shadow Copies?

Shadow copies are point-in-time copies of documents in shared folders.

These point-in-time copies make recovering documents easy, because you can easily go back to an older version in case a document is deleted or overwritten accidentally.

You should use shadow copies in addition to standard backup – not to replace backup procedures.

 

5.  How Quickly Do You Need To Recover The Data?

Time is an important factor in creating a backup plan.

For critical systems, you might need to get back online swiftly.

To do this, you might need to alter your backup plan.

 

6.  Do You Have The Equipment To Perform Backups?

You must have the backup hardware to perform backups.

To perform timely backups, you will need the proper equipment, and the proper expertise.

We recommend a minimum of 3TB external hard drive per computer, plus a separate 3TB external hard drive for each server.  However, each business is different and has its individual needs.

Call Technology by Design at 1-204-800-3166

for a free estimate.

 

7.  Who will be responsible for the backup and recovery plan?

Often, businesses opt to save money and perform the backups themselves.

However, only 20% actually do the backups correctly and on time.

Call TbyD for a free estimate on your

personalized Managed Backup and Recovery Plan.

Choose 1 person at your organization to be a primary contact for the organization’s Backup and Recovery Plan.

 

8.  What’s The Best Time To Schedule Backups?

Scheduling backups when system use is as low as possible, will speed up the backup process.

However, you can always schedule backups for off-peak hours.  Some workstations require up to hourly backups.

You need to carefully plan when key system data is backed up.

 

9.  Do You Need To Store Backups Off-Site?

Storing copies of backups off-site is essential to recovering your systems in the case of a local disaster (e.g. flood, fire, theft, etc.).

In your off-site storage location, you should also include copies of the software you might need to install to reestablish operational systems.

*Adapted from the Microsoft Press book “Microsoft Windows Server 2008 Administrator’s Pocket Consultant by William R. Stanek


cyber
 
 

Got Cyber-Bugs?

Call 1-204-800-3166

For Cyber-Extermination!


Filed Under: FAQ, Featured

ALERT: Banking Email Scam

March 25, 2015 by The T By D Team 1 Comment

Scam AlertALERT:  

Banking Email Scam

 

The National Credit Union Administration (NCUA) is warning netizens about a recent phishing email scam.

The NCUA reports that emails are being received by consumers in the U.S. and Europe from what appears to be a legitimate website managed by an Australian financial services company called “National Credit Union”.  This company claims to offer financial products and services to consumers in the U.S. and Europe.

The emails are similar to the one below:

NCUA Email scam

 The emails ask consumers to verify their identity in a “routine check for security purposes”.  The emails request personal information, such as Social Security numbers, account numbers, log-in information, and a request to transfer large amounts of money.

The NCUA emphasizes that it has no affiliation with the “National Credit Union”, and that they would never ask consumers for such information.

 

What To Do If You Receive A Suspected Scam Email:
  1. Do not reply to the email.  Do not click on any links.  Do not open any attachments.  Do not give any information.  Do not act on financial requests.  Delete the email.
  2. Contact the NCUA’s Fraud Hotline, toll-free 1-800-827-9650.  All reports remain confidential.
  3. File a complaint with the Internet Crime Complaint Center.  The center is a partnership between the FBI and the non-profit National White Collar Crime Center established as a clearinghouse for Internet-related crimes.
  4. Visit the “Frauds and Scams” page on MyCreditUnion.gov.  This page, operated by the NCUA, gives an overview of CyberCrime scams.  
If you think your identity has been stolen, contact your financial institution as soon as possible.  

Dispute any fraudulent transactions and, if needed, close your accounts and open new ones.  Also, to protect your credit, notify the 3 big credit bureaus, Equifax, Experian, and TransUnion, to place a “Fraud Alert” on your credit reports.

If you find any “National Credit Union” phishing emails in your inbox, following these steps can prevent an incredible amount of lost time, hassle, and money.

 

Got Cyber-Bugs?

Call 1-204-800-3166

For Cyber-Extermination!

Filed Under: ALERTS, Featured

Stay Safe On Public HotSpots

March 23, 2015 by The T By D Team Leave a Comment

WiFi HotSpot2

Stay Safe On Public HotSpots

 

Public Wi-Fi hotspots are everywhere.  Coffee shops, waiting rooms, highway rest stops, arenas, etc.  If there’s people sitting around, chances are, there’s free WiFi.

 

And wherever there’s free WiFi, there’s security risks.

 

Connecting your device, whether it be a laptop, tablet, or smartphone, to a public WiFi hotspot is a little bit like stepping off the curb without looking; it’s dangerous.  You could avoid connecting altogether, but that’s not an option when you’re on the road:  You need to get work done, communicate, and access the Web, and public WiFi may be the only option available.

There are undoubtedly some doubters out there who are thinking right now “I’ve been on public WiFi lots of times, and nothing bad ever happened.”  That may be true, but these days, blindly joining public WiFi hotspots is a little like playing Russian roulette.  Every day that passes, the tools that CyberCriminals use to snoop, swipe, and infect your systems get better, easier to use, and more automated.  If it only takes a few seconds for a data thief to break into your system and start wreaking havoc, then you need to spend a few minutes to make sure your defense shields are up.  And it’s easy enough that even someone that doesn’t know the hard drive from the floppy drive (Hint:  floppy drives don’t exist any more) can minimize their exposure to WiFi hotspot threats you’re likely to encounter.

  1. Maintain Security Software.  This one should go without saying.  However, we run into people several times a day, that either do not have or do not have up-to-date security software.  Security software is typically pretty good at preventing unauthorized users from accessing your system, notifying you of the presence of infected files, and removing harmful link and malware.  Make sure you have antivirus, anti-malware, and firewall utilities.  Windows comes with firewall software enabled by default, but you may have to seek out third-party options for antivirus and anti-malware software.  For instructions on how to make sure your firewall is enabled in Windows7 click: HERE.  For instructions on how to make sure your firewall is enabled in Windows8 click:  HERE.  It’s also a good idea to make sure your device’s OS and other applications are up-to-date before you sign on to any public WiFi hotspot.
  2. Don’t Share.  Never mind what Sesame Street taught you.  The first time you connect to any network, Windows asks if you’re connecting to a Home Network, Work Network, or Public Network.  Do yourself a favor and always select “Public Network” when connecting to a WiFi hotspot.  This ensures that your device is not visible to others using the hotspot, blocks malicious software, prevents access to the HomeGroup, and turns off network discovery.
  3. Connect Manually.  Although doing so may seem tedious, make sure you’re manually connecting to hotspots every time.  Rogue hotspots hosted by CyberCriminals tend to use SSIDs (Service Set IDentifiers) that sound like they’re being hosted by a legitimate business.  You may be inside a Starbucks, but that doesn’t mean you should trust any available hotspot with the coffee shop’s name in the SSID.  Whenever possible, verify the hotspot’s SSID with an employee before signing on.
  4. Choose Password-Protected SSIDs.  We know that the human instinct for immediate gratification is overwhelming.  It’s easiest to try the open networks before inquiring about a password to one of the closed ones.  But fight that urge.  Although password-protected networks aren’t inherently any safer, they can help you determine whether the network is hosted by the business, or a nearby data thief with a portable router.  
  5. Practice Safe Surfing.  When you are connected to a public WiFi hotspot, avoid using e-commerce and banking sites, if possible.  If you must connect to these sites, make sure that no one else has a clear view of your device’s screen or keyboard while you enter usernames or passwords.  Also ensure that the sites on which you enter your information encrypt your data.  Remember that secured URLs begin with “https”.  When you are finished, log out of the site immediately.  
Following these easy steps for keeping your device (and information) secure, will go a long way to thwarting would-be WiFi hotspot hijackers.  Now you can connect with confidence.

 

Got Computer Bugs?

Call 1-204-800-3166

For Cyber-Extermination!

Filed Under: FAQ, Featured

ALERT: Phishing For Apples

March 20, 2015 by The T By D Team Leave a Comment

Apple WatchALERT:  Phishing for Apples

 

BEWARE of FREE Apple Watch GiveAways!

Last week Apple had their big Apple Watch release event.  The Press took note, and has been full of news about the models, and pricing ever since.

CyberCriminals are also taking note, and are trying to ride the wave of enthusiasm for the newest smartwatch.

CyberCriminals are using social media (Twitter, Facebook, etc) to try to trick people into clicking on links, entering fake “contests”, or forward messages to their friends.

 

Apple - TwitterCyberCriminal gangs are setting up Twitter accounts named “Apple Giveaways”, targeting users that mentioned the smartwatch in their Twitter feed.  They tell people they have been “chosen”, and promise them a free Apple Watch.  All they ask them to do, is to click the link in the message.  The link leads them to a series of links and instructions, leading them to other dubious web pages.

Apple - Facebook

 

 CyberCriminals also have set up Facebook event pages asking victims for their 1st and last names, including Facebook handle.  They are asked join the event, and invite a minimum of 100 friends.  They are told that 100 invites earns them an Apple Watch, 250 invites = an Apple Watch Sport, and 500 invites = the Apple Watch edition (sold by Apple for $17,000).

 

 CyberCriminals often release phishing scams, to coincide with highly anticipated product launches and news events, preying on victims’ excitement and vulnerability.

 

Got Computer Bugs?

Call 1-204-800-3166

For Cyber-Extermination!

 

 

Filed Under: ALERTS, Featured

March Newsletter

March 17, 2015 by The T By D Team Leave a Comment

Psst…

Wanna Buy A (Used) Spy Website!

 

MARCH 2015

TECHTIPS NEWSLETTER

 

TechTips Newsletter is published monthly, full of technology news and information (and other stuff!).  If you’re not a Geek, not to worry, there’s tons of information for non-Geeks too!:

  • Obama speaks!
  • Video game will save your life…at a price!
  • The future of computing!
  • A Canadian health centre is very happy to see visitors!
  • For Sale:  Used Spy Websites!
  • Annual classic car auction!
  • Urgent computer security warning!
  • AND MORE!

This and much more!  You don’t want to miss this issue!

Get your newsletter HERE!

Comments?  Let me know what you think at marketing@tbyd.ca


Keep Up-To-Date on the Latest Threats To Your Computer Network!

Regular weekly ALERTS on the latest security threats to your computer network

Check out the ALERTS here.

Do you have a question for our Resident Geek?  Email it to:  geek@tbyd.ca!

Like us on Facebook!

Follow us on Twitter!


EXPIRATION NOTICE:

An urgent security warning for businesses running Windows XP, Office 2003, and Microsoft Windows Server 2003!

Windows XP and Office 2003 are no longer supported by the manufacturer.

Server 2003 will no longer be supported by the manufacturer after April 2015.

If your business or organization is currently running Windows XP, Office 2003, Microsoft Server 2003, or Exchange 2003 on any computers or servers in your office, you need to know about a dangerous security threat that must be addressed NOW!

PLEASE TAKE A MOMENT TO READ THIS IMPORTANT SECURITY ANNOUNCEMENT!

As your local Microsoft Partner, we are aggressively reaching out to all local businesses that use any of these programs to alert you to this serious security risk and inform you about what you need to do NOW to protect your company or organization!

WINDOWS XP AND OFFICE 2003 REPLACEMENTS MUST BE MADE NOW

WINDOWS SERVER 2003 AND EXCHANGE 2003 REPLACEMENTS MUST BE MADE BY JULY 14, 2015

Microsoft has officially announced that it retired all support for Windows XP and Office 2003 April 2014, and on the Server 2003 operating system on July 14, 2015.

This means any business or organization still running any of these programs will be completely exposed to serious hacker attacks, aimed at taking control of your network, stealing data, crashing your system, and inflicting a host of other business-crippling problems you do NOT want to deal with.

This is such a serious threat that the U.S. Department of Homeland Security has issued an official warning to all companies still running these programs, because firewalls and antivirus software will NOT be sufficient to completely protect your business from malicious attacks or data-exfiltration.  Running some of these programs will also put many organizations out of compliance.

CALL 1-204-800-3166

for a FREE QUOTE

Filed Under: Featured, TechTips Newsletter

  • « Previous Page
  • 1
  • …
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • 24
  • Next Page »

Sign Up For The Monthly TechTips Newsletter!

* = required field
unsubscribe from list

powered by MailChimp!

Recent Posts

  • ALERT: Celebrity Death Scams
  • ALERT: Uber Hacked
  • ALERT: Netflix Email Scam
  • ALERT: Bad Rabbit
  • Scam – Reset Password Alert

Recent Comments

  • ALERT: New Ransomware Targets MS Office 365 Users - Technology by Design on Managed Backups
  • ALERT: FBI Warns Email Extortion Heating Up for Summer! - Technology by Design on ALERT: AshleyMadison Hack Blows Up
  • ALERT: Evil Android Trojan Empties Your Bank Account - Technology by Design on Definition: Phishing
  • ALERT: HTML Attachments - Technology by Design on Definition: Phishing
  • ALERT: New Ransomware Also Steals Your Bitcoins - Technology by Design on Managed Backups

Copyright © 2025 · Dynamik Website Builder on Genesis Framework · WordPress · Log in