3
privacy-policy,paged,page-template-default,page,page-id-3,paged-6,page-paged-6,qode-social-login-1.1.3,qode-restaurant-1.1.1,stockholm-core-1.1,select-child-theme-ver-1.1,select-theme-ver-5.1.8,ajax_fade,page_not_loaded,wpb-js-composer js-comp-ver-6.0.5,vc_responsive
Title Image

Privacy Policy

  • Sort Blog:
  • All
  • Cloud Computing
  • Disaster Recovery Management
  • IT Security Services
  • Managed IT Services
  • Office 365
  • Our Blogs
  • Press Releases
  • Uncategorized
  • VOIP Services

More Scammers Are Using Social Media To Target Victims

An increasing number of scammers are using social media to target victims and relying on social engineering tricks to convince people to part with their personal information or money.  The problem has grown serious enough that the FTC (Federal Trade Commission) has issued a formal warning to consumers.

According to a recently released FTC report:

“More than 95,000 people reported about $770 million in losses to fraud initiated on social media platforms in 2021. 

Those losses account for about 25 percent of all reported losses to fraud in 2021 and represent a stunning eighteen-fold increase over 2017 reported losses. Reports are up for every age group, but people 18 to 39 were more than twice as likely as older adults to report losing money to these scams in 2021.

More than half of people who reported losses to investment scams in 2021 said the scam started on social media. Reports to the FTC show scammers use social media platforms to promote bogus investment opportunities and even to connect with people directly as supposed friends to encourage them to invest. 

People send money, often cryptocurrency, on promises of huge returns, but end up empty-handed.”

Overall cryptocurrency scams are regarded as the number one threat for investors in 2022, according to a new report from the North American Securities Administrators Association (NASAA). However, the FTC is cautioning all users to exercise caution and develop better habits when scrolling through their favorite social media platform.

They recommend setting limits on who can see your posts, taking advantage of increasingly robust privacy controls, opting out of targeted advertising, and doing more due diligence on any company you plan on doing business with before buying anything from them.

It’s good advice in general but it is especially important now given how prevalent social media-based attacks are becoming.

Building a Secure Environment for Collaboration

More workplaces than ever before are utilizing the power of remote technology, but this also creates problems with security that must be addressed. How can you ensure that your organization isn’t putting itself at risk as a result of this general displacement of your workforce? Let’s discuss some action items you might choose to implement for your business.

What Changes When People Work Remotely?

One big change your employees might not grasp is that working remotely effectively distributes your entire operational infrastructure across many networks, most of which your organization has no control over. This means that employees have to do a lot of legwork to keep your business secure, too. When more devices are added to the network, more opportunities arise for hackers to make their way to your infrastructure.

When onboarding new employees, be sure to include the expected protocols for working remotely. This includes who supplies the devices, where important data is hosted, how employees are accessing said data (including devices/networks), whether or not a VPN is involved, etc. All of it must be included, and if you don’t keep your employees apprised of the expectations—especially new ones—they will not comply.

The Threat of Personal Devices

Many employers might find themselves gawking at the concept of purchasing new endpoints for each remote employee. While one might argue that, from a security standpoint, it is an effective use of funds, it isn’t the most functional. Personal devices might save you money, but they are not going to be as secure, as you have no control over their operating systems, installed software, password practices, and so on.

Data breaches happen even to secured systems, so imagine the pain of dodging these bullets with even more open vulnerabilities. To this end, be sure that all company-owned data is saved to company-controlled infrastructures, like an on-site server or cloud platform. If you can limit the amount of company data on employee devices, you can better secure it.

Collaboration Challenges

Employees now depend on collaboration apps to get projects done and to keep communication lines open, but these tools are not necessarily designed to prioritize security. One way you can ensure that security is not put at risk is by isolating conversations to specific users or groups. This will keep you from overexposing certain data to unsecured parties. This can happen fairly easily, especially for larger or medium-sized organizations.

The need to train your employees cannot be overstated. You must invest resources into ensuring that your employees are receiving the training needed to prioritize security. While they don’t need to become security experts, even the basics can be enough to improve cybersecurity standards for your organization. Consider teaching them how to identify spam attacks, how to create complex passwords, etc.

If you need some help with preparing your business for remote communications that prioritize security, Net Activity can help. To learn more, reach out to us at 215-503-5150.

Laptops Or Desktops: What’s The Right Choice For Your Business?

If you’re buying computers for your startup or upgrading your small business’s existing machines, you need to decide whether laptops or desktops are right for your needs. To help you choose, consider these five factors.

 

Portability

The COVID-19 pandemic has driven most businesses to adopt remote work and hybrid work setups. If you’re thinking of implementing a remote or hybrid work arrangement, investing in laptops is the smart move, as your employees can easily take their laptops with them and work anywhere, anytime.

 

That said, you must not discount desktops altogether. While laptops are light and portable, modern desktop computers aren’t nearly as immobile as they used to be. In many cases, today’s desktop monitors are thin and light, and all-in-one desktops are easy to move around.

 

Memory and speed

In the past, desktop computers had more memory than laptops, and they were faster because they had bigger processors. This has now changed, thanks to improvements in laptop technology. But until high-powered business-grade laptops become more affordable, desktop computers are going to provide your business with more memory, speed, and power for your money.

 

How much speed and memory you need depends on the work you do. If your employees’ work mostly entails word processing and emailing, laptops should be enough. But if they need to run gaming software or edit heavy media files, it would be better to invest in desktops.

 

Security

A desktop computer is more physically secure because it’s often kept in one location, making it easier to guard. And because a desktop’s internet access is often a single source (whether through Wi-Fi or cable), it’s easier to defend it against malware and cyberattacks.

 

If you choose to invest in laptops, make sure to put in place strict security policies for devices used by remote workers. Don’t let your staff connect to unsecured networks, and deploy encryption tools to protect data from unauthorized access. You must also employ mobile device management software to enable your IT administrator to wipe laptops of data should they get lost or stolen.

 

Price

Laptops, especially the smaller notebook-style ones, are a lot cheaper than desktops. However, desktop computers are also becoming more affordable through local channels and flexible payment terms. A capable IT services provider can offer cheaper desktop options so you can get powerful machines without going over budget.

 

Quality

Although laptop computers provide the convenience of portability, they’re prone to battery and charging cord problems. They are also easily damaged, especially if they are dropped or mishandled. By contrast, desktops are generally sturdier. But when they do experience a problem, repairing them can be expensive.

 

The desktop versus laptop debate is an old one, with supporters on both sides touting the advantages of their choice. A growing company usually needs a combination of both types of computers, especially as their needs evolve. If you need help choosing the best computers for your business, or if you have any business IT-related questions, give Net Activity a call today.

Report Says PC Sales Went Up Ten Percent In 2021

According to the latest Gartner’s statistics, a total of 339.8 million personal computers were shipped in 2021. That was up from 309.1 million in 2020 which amounts to about 10 percent growth in the market.

The company noted that the fourth quarter of 2021 saw a 5 percent drop compared to last year, which may be signaling the end of the pandemic-fueled growth in sales.

Lenovo is the PC maker that has been top of the charts in recent years, and they were once again in the top spot, accounting for nearly a quarter (24.7 million) of PCs shipped in the year that just ended. HP was not far behind them with a 21.8 percent share, or 74.2 million units shipped. Then we have Dell bringing up the top three, scoring 17.6 percent of the market with 59.7 million PCs shipped.

Apple was at the top of the second tier with a 7.6 percent share of the market and shipping 24.3 million units. Acer and Asus rounded out the top six.

The interesting thing about the Gartner analysis is that it stands in stark contrast to rival Canalys’ projection that 2022 will be another year of record PC sales.

As Gartner sees it, the pandemic fueled a one-off, not-to-be-repeated surge in demand and points specifically to the 4th quarter data point as a sign that demand is slowing.

Canalys sees it differently and cites supply chain issues as the main driver behind the 4th quarter slowdown. Canalys insists that demand will remain strong throughout this new year.

Both companies have a very good record when it comes to predicting market moves, but only one of them can be right. All we can say is that we currently don’t have enough data to say for sure. Whatever way it shakes out, though, 2022 is bound to be another interesting year.

Leverage Business Intelligence To Achieve Your SMB Goals

Business intelligence (BI) tools used to be prohibitively expensive because they required hiring specialists to analyze business data. This is why only large companies could afford them in the past and why small- and medium-sized businesses (SMBs) were hesitant to implement them. But times have changed. SMBs now have access to a vast range of affordable BI tools that can improve data management processes. To stay ahead, your SMB should harness the capabilities of BI and develop effective business strategies using large volumes of data just sitting in your systems.

Whether you have always wanted to try BI or are on the fence about it, you can’t deny that it brings a suite of benefits that can help your SMB grow. Here are some of the top reasons why BI is changing the way SMBs do business.

Self-service BI tools are plentiful — and inexpensive

The emergence of self-service BI puts useful business analytics within reach of SMB owners who lack the big budgets of larger corporations. In fact, there are numerous self-service BI tools that you can use to get started without even spending a dime. Microsoft Power BI is a powerful and user-friendly application, and most businesses will find the functions they need in the free version. Zoho Analytics has a low entry-level cost, too, and the slightly pricier yet still affordable Tableau is another option worth exploring.

You already have the data you need

It’s easy to underestimate the amount of data your SMB already has at its disposal. In every area of your business, from finance and sales to customer relations and website management, the software packages you use to run your everyday operations reap tons of information that just sit in storage devices or the cloud.

By talking to the key people in your organization, you can get an idea of the kind of data you already have, how it’s generated, and where it’s stored. You can then utilize BI tools to transform that information into meaningful business insights that will inform your decision-making. There’s no need to invest in time-consuming data generation from scratch!

It’s easy to get started

BI is an intimidating term, especially for business owners who are not technologically inclined. But by taking small steps, it’s easy for anyone to get started. Before you know it, you’ll be enjoying the benefits of having data-driven, intelligence-based insights that will enable you to make better business decisions.

Most self-service BI tools come with built-in suggestions for reports that businesses commonly run and find useful. Some worthwhile statistics to explore include the percentage of your clients who cancel within a given period, website landing pages that generate the longest visits, and your most profitable individual products or services. You can also use BI to know the days or months in which you generate your highest revenues, as well as which of your clients bring in the most revenue and profit.

Harnessing data is the future of the business world — it’s how companies like yours can make smarter decisions that increase efficiency and profitability. And with a trove of self-service tools available in the market, SMBs no longer need a humongous budget to reap the benefits of BI. To find out more about implementing tools that can help you do smarter business, give Net Activity a call at 216-503-5150.

5 Things To Consider Before Upgrading To Windows 11

1. Your computer doesn’t meet Windows 11 minimum system requirements

One of the main reasons that can keep you from upgrading to Windows 11 is that your computer might not be able to run it. Windows 11’s system requirements are quite high: your computer needs 1 gigahertz (GHz) or faster with two or more cores on a compatible 64-bit processor or system on a chip (SoC). It also needs at least 4 gigabytes (GB) of RAM and 64 GB of available storage.

Although these standards aren’t extraordinary, a considerable number of users have outdated hardware that doesn’t meet Microsoft’s requirements for Windows 11. If you are one of them, you may need to purchase a new PC to get the latest OS.

2. Windows 11 has a lot of bugs

Windows 11 is still fresh out of the oven, and it’s far from being bug-free. Users have reported compatibility issues, missing notifications, and some built-in applications not opening or working as expected. The OS is still missing some features available in Windows 10, and issues are constantly being discovered and fixed, but these are to be expected of any newly released OS. So if you want to stick with a stable and reliable OS, it’s better to wait until Windows 11 is more mature.

3. You can’t access Android apps directly from Windows 11 (yet)

The Your Phone app currently lets Android phone users access mobile apps directly from their Windows 10 PC. This is an especially useful feature for remote and hybrid employees, as the ability to access phone apps on a larger desktop or laptop display and use a mouse, pen, or touchscreen helps with multitasking. If you are one of the people who rely on this feature, you’ll have to wait for the next Windows 11 update to get this functionality.

4. Windows 11 is very similar to Windows 10

Windows 11 wasn’t intended to be a new version of the OS. It was meant to be a substantial update to Windows 10, initially called the Sun Valley Update. That’s why save for a few features, many apps and functions look and work the same in Windows 11 as they do in Windows 10. So unless you’re looking for something radically different from what you have now, it may not be worth upgrading.

5. Microsoft will continue to support Windows 10 until 2025

If you are comfortable with your current setup and don’t have any urgent need to upgrade, you might as well stick with Windows 10. Microsoft has stated that it will continue to support the OS until October 14, 2025. This means that Windows 10 won’t become obsolete in the near future, so you can still enjoy bug fixes, security updates, and new features for this OS version for a few more years.

These are just some of the reasons why you may want to stick with Windows 10. If you decide that upgrading to Windows 11 is right for you, go ahead! But if not, there’s no need to worry — Windows 10 will still be here for a while. Either way, our experts can help you make the most out of your Windows setup. Give us a call today to learn more.

THE DANGERS OF PASSWORD AUTOFILL

Modern web browsers and password managers come with a feature called password autofill. This helps users store and automatically use their account credentials to access websites and other applications. While password autofill is convenient, it comes with security risks.

Why password autofill is so dangerous
Modern web browsers and password managers have a feature that enables usernames and passwords to be automatically entered into a web form. This feature isn’t completely safe, however. If you enable this feature and hackers gain access to your computer or web browser, it will be easier for them to infiltrate your accounts because the autocomplete feature will fill in all saved credentials.

Tricking a browser or password manager into providing saved information is incredibly simple. All a threat actor needs to do is place an invisible form on a compromised webpage to collect users’ login information. Once the browser or password manager enters the user’s information, the hacker will gain access to that data.

Using autofill to track users
Shrewd digital marketers can also use password autofill to track user activity. For instance, they can track people based on the usernames in hidden autofill forms they place on websites and sell the information they gather to advertisers. While they don’t intend to steal passwords, there’s always the likelihood of exposure.

One simple security tip
A quick and effective way to improve your account security is to turn off autofill. Here’s how to do it:

  • On Microsoft Edge – Open the Settings window, click Profiles, and then select Passwords. Disable “Offer to save passwords.”
  • On Google Chrome – Open the Settings window, click Autofill, and disable “Offer to save passwords.”
  • On Firefox – Open the Settings window, then click Privacy & Security. Under the Logins and Passwords heading, untick the box next to “Autofill logins and passwords.”
  • On Safari – Open the Preferences window, select the Auto-fill tab, and turn off all the features related to usernames and passwords.

Having good password security habits can significantly protect your sensitive data. For 24/7 cybersecurity support that goes far beyond protecting your privacy, call us today.

Are Smart Devices Getting Smarter?

Smart devices are everywhere, with the Internet of Things (the blanket term for any device that connects to the Internet for added functionality) growing larger each day. While this is great for convenience (and in many cases, the “cool factor”) it can have some chilling ramifications for cybersecurity.

 

Here’s a look at how this may be changing in the near future.

The Projections for the IoT

With 127 new IoT devices connected to the Internet each second, it should come as no surprise that estimates place their numbers at around 75 billion in total by 2025. This means that there are plenty of new opportunities for a cybercriminal to find and exploit a vulnerability… both in commercial IoT devices and in the devices classified as the Industrial Internet of Things.

 

There are already too many examples of how Internet-connected devices have been used to a hacker’s advantage. In 2017, the UK’s National Health Service was hobbled by a ransomware attack that affected, amongst other things, Internet-connected medical equipment. Video doorbells often stream data without any protections, and other smart home devices have been found to store Wi-Fi passwords in a similar fashion. 

 

As the IoT continues to grow, it only stands to reason that efforts to take advantage of such weaknesses will increase along with it.

What Can Be Done to Secure the IoT?

Fortunately, things are already in motion to help ensure the IoT is made to be more secure. For example, the signing of the Internet of Things Cybersecurity Improvement Act of 2020 in the US and the Australian government’s introduction of an IoT industry-specific voluntary code of practice shows that governments are starting to pay attention to the issues that the IoT has the potential to open up. However, this doesn’t mean that businesses can sit back and relax.

 

On the contrary, there are a few things that a business can and should do to help mitigate IoT-based attacks:

Encrypt Data

There are relatively few IoT devices out there today that feature encryption as one of their standard security protocols. Implementing encryption on a network level makes it so that your data is effectively indecipherable while in transit, rendering it more or less worthless to the cybercriminal targeting it.

Change Default Passwords on IoT Devices

Of course, ALL default passwords should always be changed, but the IoT makes this an even more important practice for a business. Take the few moments required to come up with a more secure password than the device is equipped with initially.

Use Devices from Security-Conscious Manufacturers

One other way your business and your users can help make a change while protecting your own assets is to try to deal exclusively with devices manufactured by companies that take a security-first approach. Voting with your dollars can quickly make a change if enough people do it. Otherwise, it may be wiser to stick with the “dumb” option if it serves your needs just as well.

 

There is little doubt that the IoT will have an increased presence in modern life in the years to come. Time will only tell if that presence is a secure one. In the meantime, you can trust us to help you ensure that your business is as secure as possible. Give us a call at 216-503-5150 to find out what we can do for you and your operations.

Protect Your Online Privacy With Private Browsers

If you see ads on your social media newsfeed that are suspiciously attuned to your preferences, it’s likely because your online activities are being tracked and analyzed by market researchers. These researchers likely get their data from the websites you visit as you surf the internet. If you want to stop third parties from collecting and using your data, private browsing can help you.

What is private browsing?

Your web browser — whether it’s Chrome, Edge, Firefox, Safari, or Opera — stores the URLs of the sites you visit, cookies that track your activity, passwords you’ve used, and temporary files you’ve downloaded.

This can be convenient if you can’t remember your login details or if you’re trying to recall a website you visited a few days ago. The feature also helps speed up the loading time of websites you frequently visit. But if someone else uses or gains access to your computer, your most private internet activities are exposed for that user to see and exploit.

Private browsing is a feature known by various names across different browsers. For instance, it’s called Incognito Mode in Chrome and InPrivate Browsing in Edge. When you use this feature, the browser does not record your browsing history, passwords, and temporary files. Instead, all this information is discarded as soon as you close the browser. You’re also instantly logged out of all accounts you accessed using the private window, which comes in handy when you’re using a public or shared computer.

Furthermore, tracking cookies are not stored when you surf the internet with a private browser. Such cookies are small bits of data used to identify your computer. Sites like Facebook use cookies to know your preferences based on your online behavior, such as which sites you visit. By doing this, they can personalize the ads on their platform, ensuring that the ads you see are for products and services you’re likely to take interest in.

What are the limitations of private browsing?

Although private browsing prevents your web browser from storing your data, it doesn’t stop anyone from snooping on your online activities in real-time. If your computer is connected to the company network, system administrators can still track what you’re browsing, even if you’re in Incognito Mode.

Also, if spyware or keylogger malware is installed on your computer, hackers will still be able to see what you’re doing online. Even though private browsing has quite a few benefits, you shouldn’t solely depend on it for online privacy. Instead, you should use a virtual private network (VPN) when you go online. This tool encrypts your internet connection and prevents anyone from intercepting your data. And don’t forget to use a strong anti-malware program to scan your computer and keep spyware and other malicious web monitoring software at bay.

If you want to know where you can get these solutions or learn more about web browser security, call us today. We have the tools and expert advice you need to prevent anyone from snooping on your internet browsing.

This New Malware Steals Passwords From Popular Browsers

A new threat has appeared on the horizon. Even if the name is not familiar to you, this malware strain is definitely bad news.

Called RedLine, it is an information-stealing malware that specifically targets popular web browsers including Opera, Microsoft’s Edge browser, and Chrome.

Unfortunately, many people have come to rely on their trusty web browser to store and remember their passwords for them. RedLine takes advantage of this and the group behind the code has found a way to crack the browser open and grab the passwords stored within.

Even worse is that RedLine isn’t just isolated to a single gang or group of cybercriminals.  Instead, it is being offered as a commodity on the Dark Web. That means anybody with about $200 USD can buy a copy and start harvesting the credentials of anyone they infect.

While it is true that passwords stored inside web browsers are encrypted, RedLine can programmatically decrypt those passwords if they are logged in as the same user which is very much the case here.  RedLine runs as the user who was infected, which means that all of their passwords are open to the person controlling the malware.

Even though it’s really convenient, the bottom line is that it’s dangerous to have all of your passwords stored inside your web browser.  If you insist on going that route, then your best bet by far is to enable two-factor authentication on every website you visit frequently that offers it. That’s so that at least if your passwords are compromised, the hackers who gain access to the information still can’t easily access your accounts.

Given how RedLine is being marketed on the Dark Web we can expect to see a surge in attacks using the malware in the months ahead.  It’s going to get a lot worse before it starts getting any better.

Special Year End Pricing !!

Microsoft Teams Rooms Systems For Small/Medium Meeting Room