How to protect your iPhone from phishers

While iOS is relatively more difficult to penetrate than other operating systems, clever criminals have found a way to breach its security. Through voice phishing, scammers are tricking iPhone users by pretending to be from Apple Support and asking for their login credentials. Here’s what you can do so you don’t fall prey to these schemes.

If you receive a call from a person who claims that he or she is from Apple Support and asks you to contact a certain number because Apple has supposedly suffered a security breach, do not panic, and do not call the number. Remember that customer support isn’t proactive: the company waits for your call before it addresses your issues. That Apple would reach out first is already suspicious. To verify your suspicion, you can reach out to Apple Support and ask whether the call you received was indeed from their headquarters.

Unless confirmed by official sources, never follow instructions from an unverified caller or email sender. And if the sender asks you for sensitive information like your User ID or password, that should be a big red flag. Do not reveal confidential or financial information via SMS, phone call, or email. If you don’t know the person on the other line, block the number. The same goes for email: block the sender and report the message as spam.

To further protect your iPhone and other devices, never click on the URLs in emails or messages from unknown senders. Doing so can open compromised web pages, or force download infected files. Only trust URLs that bear https in their addresses. The s stands for secure, and any webpage that only reads as http may be susceptible to data interception because information exchanged over these sites aren’t encrypted.

It’s also a good practice to always update your email and other messaging apps because developers regularly include anti-phishing security patches when they roll out new features or versions of their software.

Secure your iOS devices and your personal data. Learn more about data phishing and how to avoid them. Call us today!

Posted in Apple, General Articles C | Tagged , , , , , , , | Comments closed

Apple users beware: Voice phishing is here

If you think your iPhone is safe from phishers, think again. Criminals are getting smarter by the day, and recently, they’ve been using voice phishing scams, pretending to call on behalf of Apple Support to make iPhone owners divulge sensitive information.. Do not be a victim of voice phishing by following these tips.

If you receive a call from a person who claims that he or she is from Apple Support and asks you to contact a certain number because Apple has supposedly suffered a security breach, do not panic, and do not call the number. Remember that customer support isn’t proactive: the company waits for your call before it addresses your issues. That Apple would reach out first is already suspicious. To verify your suspicion, you can reach out to Apple Support and ask whether the call you received was indeed from their headquarters.

Unless confirmed by official sources, never follow instructions from an unverified caller or email sender. And if the sender asks you for sensitive information like your User ID or password, that should be a big red flag. Do not reveal confidential or financial information via SMS, phone call, or email. If you don’t know the person on the other line, block the number. The same goes for email: block the sender and report the message as spam.

To further protect your iPhone and other devices, never click on the URLs in emails or messages from unknown senders. Doing so can open compromised web pages, or force download infected files. Only trust URLs that bear https in their addresses. The s stands for secure, and any webpage that only reads as http may be susceptible to data interception because information exchanged over these sites aren’t encrypted.

It’s also a good practice to always update your email and other messaging apps because developers regularly include anti-phishing security patches when they roll out new features or versions of their software.

Secure your iOS devices and your personal data. Learn more about data phishing and how to avoid them. Call us today!

Posted in Apple, General Articles B | Tagged , , , , , , , | Comments closed

Safeguard your iPhone from phishing

Phishing scams have been around for years, and they’ve gotten smarter with time. Recently, criminals have been targeting iPhone users through a voice phishing scam that makes the call appear like it’s coming from Apple Support. Fortunately, there are simple but effective tips so you don’t fall prey to this notorious scheme.

If you receive a call from a person who claims that he or she is from Apple Support and asks you to contact a certain number because Apple has supposedly suffered a security breach, do not panic, and do not call the number. Remember that customer support isn’t proactive: the company waits for your call before it addresses your issues. That Apple would reach out first is already suspicious. To verify your suspicion, you can reach out to Apple Support and ask whether the call you received was indeed from their headquarters.

Unless confirmed by official sources, never follow instructions from an unverified caller or email sender. And if the sender asks you for sensitive information like your User ID or password, that should be a big red flag. Do not reveal confidential or financial information via SMS, phone call, or email. If you don’t know the person on the other line, block the number. The same goes for email: block the sender and report the message as spam.

To further protect your iPhone and other devices, never click on the URLs in emails or messages from unknown senders. Doing so can open compromised web pages, or force download infected files. Only trust URLs that bear https in their addresses. The s stands for secure, and any webpage that only reads as http may be susceptible to data interception because information exchanged over these sites aren’t encrypted.

It’s also a good practice to always update your email and other messaging apps because developers regularly include anti-phishing security patches when they roll out new features or versions of their software.

Secure your iOS devices and your personal data. Learn more about data phishing and how to avoid them. Call us today!

Posted in Apple, General Articles A | Tagged , , , , , , , | Comments closed

Use Single Sign-On for login efficiency

No matter how valuable your cloud subscriptions are, each new set of login credentials users are forced to create and memorize adds another level of inefficiency. With Single Sign-On (SSO), you can create one user profile that logs you into all your online accounts. If you’re overwhelmed by the number of passwords linked to your name, SSO is the solution for you.

What is SSO?

Single Sign-On solutions allow you to create one username and one password that thousands of websites will recognize. If you’ve ever clicked “Login with Google” on a non-Google website, you’ve already enjoyed the benefits of SSO. It’s faster, simpler, and more secure. Now, small businesses can accomplish the same level of efficiency between their employees and cloud platforms.

Instead of asking everyone in the office to track separate accounts for Office 365, Slack, Quickbooks, and whatever other cloud apps your company relies on, you can give them one set of credentials and manage what they have access to remotely. Employees come to work, enter their designated username and password, and they’re all set for the day.

Why is SSO more secure?

There are a number of ways to set up a small business SSO solution, but most of them focus on removing login information from your servers. Usually, you’ll provide your employees’ logins to an SSO provider (sometimes referred to as an Identity-as-a-Service provider) and each employee will receive a single login paired with a secondary authentication — like a fingerprint or an SMS to a personal device.

Every time one of your employees visits a cloud platform, such as Office 365 or Google Apps, the SSO provider will verify the user’s identity and the security of the connection. If anything goes out of place, your IT provider will be notified.

Should your network or any of its devices be compromised, hackers would find nothing but logins to your SSO accounts, which are meaningless without fingerprints or mobile devices.

How to get started with SSO

The first step when setting up a Single Sign-On solution is making sure you have a healthy and responsive IT support system in place. You need a team that is constantly available to review suspicious alerts and troubleshoot employee issues. If you don’t currently have that capacity, contact us today and we’ll help you out!

Posted in General Articles C, Web & Cloud | Tagged , , , , , , , , | Comments closed

What is Single Sign-On and who is it for?

An average enterprise uses over a thousand cloud services. Even if small businesses use just a few dozen apps, securely managing account logins is still a huge problem for both users and administrators. Single Sign-On (SSO) is an excellent solution to this issue, so let’s dive into how it works.

What is SSO?

Single Sign-On solutions allow you to create one username and one password that thousands of websites will recognize. If you’ve ever clicked “Login with Google” on a non-Google website, you’ve already enjoyed the benefits of SSO. It’s faster, simpler, and more secure. Now, small businesses can accomplish the same level of efficiency between their employees and cloud platforms.

Instead of asking everyone in the office to track separate accounts for Office 365, Slack, Quickbooks, and whatever other cloud apps your company relies on, you can give them one set of credentials and manage what they have access to remotely. Employees come to work, enter their designated username and password, and they’re all set for the day.

Why is SSO more secure?

There are a number of ways to set up a small business SSO solution, but most of them focus on removing login information from your servers. Usually, you’ll provide your employees’ logins to an SSO provider (sometimes referred to as an Identity-as-a-Service provider) and each employee will receive a single login paired with a secondary authentication — like a fingerprint or an SMS to a personal device.

Every time one of your employees visits a cloud platform, such as Office 365 or Google Apps, the SSO provider will verify the user’s identity and the security of the connection. If anything goes out of place, your IT provider will be notified.

Should your network or any of its devices be compromised, hackers would find nothing but logins to your SSO accounts, which are meaningless without fingerprints or mobile devices.

How to get started with SSO

The first step when setting up a Single Sign-On solution is making sure you have a healthy and responsive IT support system in place. You need a team that is constantly available to review suspicious alerts and troubleshoot employee issues. If you don’t currently have that capacity, contact us today and we’ll help you out!

Posted in General Articles B, Web & Cloud | Tagged , , , , , , , , | Comments closed

Single Sign-On: The key to user management

Making passwords can be tedious. From complexity requirements to minimum lengths, creating a password for each new account brings its own set of headaches. If this problem is reaching a boiling point, Single Sign-On (SSO) solutions can help. These techniques are secure, easy-to-manage, and do away with the need to manage a long list of usernames and passwords.

What is SSO?

Single Sign-On solutions allow you to create one username and one password that thousands of websites will recognize. If you’ve ever clicked “Login with Google” on a non-Google website, you’ve already enjoyed the benefits of SSO. It’s faster, simpler, and more secure. Now, small businesses can accomplish the same level of efficiency between their employees and cloud platforms.

Instead of asking everyone in the office to track separate accounts for Office 365, Slack, Quickbooks, and whatever other cloud apps your company relies on, you can give them one set of credentials and manage what they have access to remotely. Employees come to work, enter their designated username and password, and they’re all set for the day.

Why is SSO more secure?

There are a number of ways to set up a small business SSO solution, but most of them focus on removing login information from your servers. Usually, you’ll provide your employees’ logins to an SSO provider (sometimes referred to as an Identity-as-a-Service provider) and each employee will receive a single login paired with a secondary authentication — like a fingerprint or an SMS to a personal device.

Every time one of your employees visits a cloud platform, such as Office 365 or Google Apps, the SSO provider will verify the user’s identity and the security of the connection. If anything goes out of place, your IT provider will be notified.

Should your network or any of its devices be compromised, hackers would find nothing but logins to your SSO accounts, which are meaningless without fingerprints or mobile devices.

How to get started with SSO

The first step when setting up a Single Sign-On solution is making sure you have a healthy and responsive IT support system in place. You need a team that is constantly available to review suspicious alerts and troubleshoot employee issues. If you don’t currently have that capacity, contact us today and we’ll help you out!

Posted in General Articles A, Web & Cloud | Tagged , , , , , , , , | Comments closed

Make the most out of old PCs

If your PC has been struggling to perform all the tasks you have at hand, we completely understand why you would be itching for a new one, or even if you’ve already replaced it with the latest model. But even if it’s old, sluggish, and always crashing, your old desktop or laptop may still prove to be useful. Here’s how you can upgrade and repurpose your old computer.

As mentioned, you have to make a few upgrades on your old PC. You may want to try a lighter OS, for example. Keep in mind that the latest version of Windows or MacOS won’t work optimally without a fast processor, so a Linux-based OS, which comes in a variety of options called “distros,” would be a better option. It will make your computer feel brand new without exhausting its hardware.

Popular distros options such as Ubuntu, elementary OS, and PinguyOS can be easily installed. Plus, they have similar interfaces to Windows and come with a boatload of software packages. The best part is they require a minimum of 4GB of RAM, so you won’t have to invest much at all.

Once you’ve upgraded your old PC, you can start using it as a NAS server, a dedicated privacy computer, or a digital media hosting platform.

Make a NAS server

Network-attached storage (NAS) is a server for your home or small business network that lets you store files that need to be shared with all the computers on the network. If your old PC has at least 8GB of RAM, you can use it as your own NAS.

Simply download FreeNAS, a software accessible on Windows, MacOS, or Linux, that enables you to create a shared backup of your computers. FreeNAS has access permissions and allows you to stream media to a mobile OS, like iOS and Android.

But if you’d rather convert your PC into a private cloud for remote access and data backup, Tonido is a great alternative. Compatible with Mac, Windows, and Linux, this free private cloud server turns your computer into a storage website, letting you access files from anywhere on any device.

Tonido offers up to 2GB of file syncing across computers, and there are even Tonido apps for iOS and Android.

Secure your online privacy

Install The Amnesic Incognito Live System (TAILS) on your old computer and enjoy your very own dedicated privacy PC.

TAILS routes all your internet traffic and requests through TOR Project, a software that makes it difficult for anyone to track you online. All of this Linux-based software’s integrated applications like web browser, Office suite, and email software are pre-configured for robust security and privacy protection.

Kick your media up a notch

Looking for a way to listen to music and podcasts or watch videos on other PCs or mobile devices? Server software like Kodi can help.

Kodi brings all your digital media together into one user-friendly package so you can use your old PC as an audio and video hosting platform. From there, you can play files on other devices via the internet. There are remote control apps for both iOS and Android, and even an app for Kodi playback on Amazon Fire TV.

Kodi works on any Windows, MacOS, and Linux computer, and even on even rooted Android and jailbroken iOS devices.

We’re always on the lookout for ways to help our clients make the most out of their technology investments. Want to know more about how to utilize hardware to your business’s advantage? Give us a call.

Posted in General Articles C, Hardware | Tagged , , , , , , , , , , , , | Comments closed

Breathe new life into your old PC

Don’t be so quick to dump that old computer! Despite being slow, clunky, and prone to crashes, your old desktop or laptop might just be perfectly usable — after a few light upgrades that will breathe new life into it and enable you to use it for other computing needs.

As mentioned, you have to make a few upgrades on your old PC. You may want to try a lighter OS, for example. Keep in mind that the latest version of Windows or MacOS won’t work optimally without a fast processor, so a Linux-based OS, which comes in a variety of options called “distros,” would be a better option. It will make your computer feel brand new without exhausting its hardware.

Popular distros options such as Ubuntu, elementary OS, and PinguyOS can be easily installed. Plus, they have similar interfaces to Windows and come with a boatload of software packages. The best part is they require a minimum of 4GB of RAM, so you won’t have to invest much at all.

Once you’ve upgraded your old PC, you can start using it as a NAS server, a dedicated privacy computer, or a digital media hosting platform.

Make a NAS server

Network-attached storage (NAS) is a server for your home or small business network that lets you store files that need to be shared with all the computers on the network. If your old PC has at least 8GB of RAM, you can use it as your own NAS.

Simply download FreeNAS, a software accessible on Windows, MacOS, or Linux, that enables you to create a shared backup of your computers. FreeNAS has access permissions and allows you to stream media to a mobile OS, like iOS and Android.

But if you’d rather convert your PC into a private cloud for remote access and data backup, Tonido is a great alternative. Compatible with Mac, Windows, and Linux, this free private cloud server turns your computer into a storage website, letting you access files from anywhere on any device.

Tonido offers up to 2GB of file syncing across computers, and there are even Tonido apps for iOS and Android.

Secure your online privacy

Install The Amnesic Incognito Live System (TAILS) on your old computer and enjoy your very own dedicated privacy PC.

TAILS routes all your internet traffic and requests through TOR Project, a software that makes it difficult for anyone to track you online. All of this Linux-based software’s integrated applications like web browser, Office suite, and email software are pre-configured for robust security and privacy protection.

Kick your media up a notch

Looking for a way to listen to music and podcasts or watch videos on other PCs or mobile devices? Server software like Kodi can help.

Kodi brings all your digital media together into one user-friendly package so you can use your old PC as an audio and video hosting platform. From there, you can play files on other devices via the internet. There are remote control apps for both iOS and Android, and even an app for Kodi playback on Amazon Fire TV.

Kodi works on any Windows, MacOS, and Linux computer, and even on even rooted Android and jailbroken iOS devices.

We’re always on the lookout for ways to help our clients make the most out of their technology investments. Want to know more about how to utilize hardware to your business’s advantage? Give us a call.

Posted in General Articles B, Hardware | Tagged , , , , , , , , , , , , | Comments closed

Great uses for an old computer

It’s inevitable. Sooner or later, you’re going to have to replace your computer. But while it may not be as fast as when you first got it or as sleek as your new computer, your old desktop or laptop might still have a lot to offer— after upgrading it a little, that is. Here are some great uses for your old computer.

As mentioned, you have to make a few upgrades on your old PC. You may want to try a lighter OS, for example. Keep in mind that the latest version of Windows or MacOS won’t work optimally without a fast processor, so a Linux-based OS, which comes in a variety of options called “distros,” would be a better option. It will make your computer feel brand new without exhausting its hardware.

Popular distros options such as Ubuntu, elementary OS, and PinguyOS can be easily installed. Plus, they have similar interfaces to Windows and come with a boatload of software packages. The best part is they require a minimum of 4GB of RAM, so you won’t have to invest much at all.

Once you’ve upgraded your old PC, you can start using it as a NAS server, a dedicated privacy computer, or a digital media hosting platform.

Make a NAS server

Network-attached storage (NAS) is a server for your home or small business network that lets you store files that need to be shared with all the computers on the network. If your old PC has at least 8GB of RAM, you can use it as your own NAS.

Simply download FreeNAS, a software accessible on Windows, MacOS, or Linux, that enables you to create a shared backup of your computers. FreeNAS has access permissions and allows you to stream media to a mobile OS, like iOS and Android.

But if you’d rather convert your PC into a private cloud for remote access and data backup, Tonido is a great alternative. Compatible with Mac, Windows, and Linux, this free private cloud server turns your computer into a storage website, letting you access files from anywhere on any device.

Tonido offers up to 2GB of file syncing across computers, and there are even Tonido apps for iOS and Android.

Secure your online privacy

Install The Amnesic Incognito Live System (TAILS) on your old computer and enjoy your very own dedicated privacy PC.

TAILS routes all your internet traffic and requests through TOR Project, a software that makes it difficult for anyone to track you online. All of this Linux-based software’s integrated applications like web browser, Office suite, and email software are pre-configured for robust security and privacy protection.

Kick your media up a notch

Looking for a way to listen to music and podcasts or watch videos on other PCs or mobile devices? Server software like Kodi can help.

Kodi brings all your digital media together into one user-friendly package so you can use your old PC as an audio and video hosting platform. From there, you can play files on other devices via the internet. There are remote control apps for both iOS and Android, and even an app for Kodi playback on Amazon Fire TV.

Kodi works on any Windows, MacOS, and Linux computer, and even on even rooted Android and jailbroken iOS devices.

We’re always on the lookout for ways to help our clients make the most out of their technology investments. Want to know more about how to utilize hardware to your business’s advantage? Give us a call.

Posted in General Articles A, Hardware | Tagged , , , , , , , , , , , , | Comments closed

Know all about Windows 10 build 18305 for PC

Microsoft is releasing Windows 10 build 18305 with a number of major features and improvements for the Start menu, Windows Security, Task Manager, File Explorer, and the Settings app.

Start menu

This now has a new single-column layout with reduced top-level tiles. This layout appears when you’re creating a new account, setting up a new device, or after performing an installation.

Windows Sandbox

Using hardware virtualization and Microsoft Hypervisor tech, this feature lets you build a lightweight environment to safely install and run untrusted applications without adversely affecting your installation.

There’s no need to create a virtual machine, and when you’re done testing the app, the environment and app will automatically be deleted.

Clipboard

Build 18305 updates the Clipboard interface (Windows key + V). Every item on the clipboard is now smaller, which allows more entries to be displayed.

Accounts

You can now use an SMS code to sign in and continue setting up your Windows 10 account if your account is connected to your phone number.

Windows Hello

Instead of creating a password that is complex and easy to forget, Windows Hello lets you use a look or a touch to sign in to your Windows 10 devices.

Build 18305 improves the PIN reset experience by giving the interface design for web and mobile the same look and feel. You’ll also come across the same interface design when performing actions that requires authentication, such as creating a new user account or verifying your account.

Settings

The Settings app has a new homepage that shows user information and provides quick access to frequently used settings.

Troubleshoot

Windows 10 will be able to automatically restore default settings for some services. Depending on your hardware configuration, it will adjust feature settings and apply changes to keep your device running smoothly.

It will also recommend troubleshooting suggestions for non-critical issues. For example, it may recommend that you disable a setting that causes an application to crash mysteriously, until the next update becomes available.

Windows Security

Starting with build 18305, the Protection history page (found in Windows Security > Virus & threat protection > Threat history) will continue to list antivirus detections, but now you’ll see more details that are easier to grasp.

In addition, any pending recommendation will have a red or yellow state throughout the experience in the history list.

Tamper protection

In Windows Security > Virus & threat protection > Virus & threat protection, you’ll find new Tamper protection settings that prevent unauthorized changes to your security settings.

Final thoughts

Enjoy the latest enhancements that Windows 10 build 18305 has to offer, but do be wary of installation problems, sign-in difficulties, and app crashes. To maximize the benefits while minimizing the risks, consult with us. Our experts know how to pick and implement the latest tech advancements that will further your business goals.

Posted in General Articles C | Tagged , , , , | Comments closed
  • Internet Presence Management for Small Business Owners

    pronto logoFull-service, pay-as-you-go all inclusive websites, from design and content to SEO and social media management for one low monthly price.

    Learn more about our small business online marketing services.