What should I know when choosing an IT firm?
Is Artificial Intelligence (AI) just for nerds?
To shut down or sleep?
*Always shut your computer down gracefully, don’t just push and hold the power button as this can easily damage the operating system.
It’s a new year. Do I need new technology?
- If your computer is more than three years old or your server is more than five years old, now is the time to upgrade.
- If you’re still using Windows 7 you need to upgrade to Windows 11 immediately, for security reasons if nothing else.
- Windows 10 will be end of life within a few months so it’s time to upgrade to Windows 11. Currently you can upgrade for free. Ask your local computer technician for details.
What are the top ways to secure your company’s data?
Here are six things we highly recommend:
1. Buy security software.There are plenty of good choices out there like Avast, MalwareBytes, and Bitdefender (which is what we use). But make sure this software is installed on all devices used by your employees, even their home devices. Better yet, hire an outside information technology firm to monitor and ensure the applications are updated.
2. Set up online backup.Make sure your databases – cloud or otherwise – are backed up multiple times per day. Use cloud services like Barracuda, Carboniteor IDrive. This way, if you are attacked, you have the option to wipe everything clean and restore from your last good backup.
3. Get training.We need to be able to better identify phishing emails and other threats. The only way to do this is through regular training. Hire an IT firm to do this for your employees or consider using training software like KnowBe4, Infosec IQ and Proofpoint.
4. Revisit passwords.Require your employees to use password management software like Passportal, Keeper, LastPass or Dashlaneand to create long, complicated passwords. Most importantly, make sure there’s multifactor authentication to access anything on your network. That way, your employees will have to use a combination of passwords and random codes generated by text messages. The best way to accomplish this is to talk to your IT firm or company hosting your data.
5. Update everyone’s operating systems.This could be the most important item on the list. Why? Because Microsoft, Apple and Google – the top three makers of operating systems – frequently issue updates to their systems that include the most recent security protections. Unfortunately, people sometimes ignore these updates because they’re annoying. But don’t let this happen. Updates need to be required, and again, you may need the services of an IT firm to make sure this is being done.
6. Get cyber liability insurance.The sad fact is that none of the above actions is foolproof, and cybercriminals are always going to be one step ahead. So, when all else fails, having protection for the liabilities – and potential business interruptions – caused by theft or fraud is your best bet.
Are you being scammed? Below are the six most common scams and one new one you might not be aware of:
1. Tech Support - Be cautious if someone randomly reaches out, requesting either payment or remote access to fix computer defects or malware (especially if they claim to be Microsoft!).
2. Social Media - Social media online ads with eye-catching sales are being created that impersonate a reputable store. The ad’s link will take you to a website that appears legitimate, but will potentially steal your information. Selling fake puppies is a big one. If the price is too good to be true, it probably is.
3. Impersonation - Make sure you’re speaking to someone legitimate, as scammers pose as companies (like Capital One) to request personal info or payment. Banks and financial institutions will rarely call you for your own information.
4. Business email compromise scams - We deal with this every day. You receive an email from your supplier/vendor requesting you send money to a different account. The supplier/vendor email appears to be familiar. But this could be a fraudster who obtained access to the network of your supplier/vendor.
5. Employment - Beware of deceptive job applications promising enticing perks like fully remote work that ask for your personal information.
6. Romance Scams - Beware if you are asked for financial support from a partner in a relationship that’s been exclusively online.
7. Voice cloning - Because of AI, it is now possible for scammers to duplicate your voice with just a couple of seconds of your recorded voice. Confirm their identity if they are asking for personal info, requesting money or payment in gift cards. Ask questions that only they would know the answers to.
Is investing in technology a wasted investment for my business?
Technology must be kept up to date, otherwise there is no point in having it at all. There are many requirements by insurance companies now that can’t be overlooked. There are also new technologies that as a business owner you may not even be aware of having to maintain compliance within your insurance. If you are not being protected by a reputable MSP your business is at a very high risk of being attacked by hackers. It’s a scary world out there because of technology. The question isn’t will you get hacked but when will you get hacked. If you do not have an MSP that takes care of your business’ technology, please get one.
Are consumers responsible for their own tech security?
Unfortunately, yes you are! It's easy to get caught up in the flash of futuristic tech rolled out every year. But that flash can mean security is put on the back burner. Some tech companies spend the money that should have been earmarked for security on marketing.
So don’t get caught up in all the flash. Make sure you worry about the security and ask questions. There have been many, many security issues with consumer products, such as security cameras and baby monitors and until there is some type of oversight and regulation put in place that tech companies must adhere to, there always will be.
Managed service companies like F1 Computing Solutions are readily available to protect your business from cyber harm but finding that for your home is next to impossible. Always buy your tech from a reputable company and don’t buy the newest or flashiest thing out there as it probably hasn’t been tested much in the real world.
Short answer, just be very hesitant about buying the newest thing in tech. Something that may seem to make your life easier may indeed make it miserable.
Chris is immensely proud of his many accomplishments throughout his life. He is and always will be a proud American and is even more proud to be from Springfield, Missouri. Chris is honored to be able to continue with a thriving business supported by the very community to which he has always belonged.
How can your business avoid costly downtime due to IT failure?
Hiring a managed services technology company for all your company's technology needs can virtually eliminate any downtime that could occur due to technology failure. A managed services IT company will monitor your systems 24/7, and seek out issues, often implementing a solution without you ever knowing there was a problem. Your IT managed services provider can also provide a disaster recovery backup system, which protects your data and systems in the event of a disaster.
Why are my internet speeds so slow?
There are a few things possibly affecting your speeds, but using a Wi-Fi connection is the most likely cause of tested speeds that are lower than the speeds your internet provider runs to the home.
Wi-Fi will almost always be slower than a cabled connection. Moving away from your router can further hinder your speeds. If there are walls or other obstructins between your router and the device you're using, this could cause your internet speed to fall.
In other instances, your internet speed can fluctuate depending on peak usage hours. Possibly worst of all, if your internet provider enforces data caps or throttles connections to help maintain overall network performance, you'll experience noticeable hits to your internet speed.
Keep this in mind when running a speed test and take measures to mitigate potential speed disruptions. Moving closer to the router, for example, can help get more accurate results, but for the best result, try testing over a cabled connection if possible. Also, consider running a few speed tests throughout the day for an idea of how your speeds fluctuate at different times. In our opinion the best and simplest speed test site is fast.com. This speed test site is owned by Netflix so it’s going to be reliable.
What’s one of the biggest changes businesses are going to experience when it comes to security in technology?
We all know that passwords aren’t the most secure thing in the world and that’s where biometrics come in. Soon you will access devices only using a fingerprint, an eye scan or facial recognition. Even with multi-factor authentication, there are lots of ways to get around a system’s security. Which is why biometrics are the future. Soon you will access devices only using a fingerprint, an eye scan or facial recognition. You’re already seeing this option in use on your smartphone, at airport security and even in some supermarkets.
More is on the way, and it’s going to start being the preferred method of security, which is why, according to industry reports, the global biometric technology market—valued at $34.27 billion in 2022—is expected to expand at a compound annual growth rate of 20.4% from 2023 to 2030.
And it’s not just for device security. Companies, including health care, are already using palm scans to allow consumers to pay for products and confirm their identity. Offices around the world are using biometrics to allow security clearances in their physical workspaces. So say goodbye to that password, and get ready to be scanned because it’s going to be the norm pretty soon.
Special warning for owners of some Samsung, Vivo and Pixel phones!
Google is warning these owners that a series of exploits enable bad actors to compromise devices simply by knowing phone numbers -- and the device owners wouldn't notice a thing.
Owners of affected devices should install upcoming security updates as soon as possible, though it's up to the phone makers to decide when a software patch will come out for each device. In the meantime, Google says device owners can avoid being targeted by these exploits by turning off Wi-Fi calling and Voice-over-LTE, or VoLTE, in their device settings.
And as always, regardless of what device you are using ALWAYS be very diligent when using any public Wi-Fi!