Tag Archive for: Internet

Microsoft Windows 10: We’re Here To Help

As of July 29, 2015, Microsoft launched Windows 10 for PCs and tablets, which is a free upgrade to Windows 7 and Windows 8.1 users.  According to Microsoft, Windows 10’s features include:

 

  • Cortana: A personal digital assistant tool that learns individual preferences to provide users with recommendations and access to information. In addition to voice commands, you can use Cortana to set reminders and add calendar events.

 

  • Microsoft Edge: A new, customized browser that offers content and results based on individual interests and preferences. It features a text-only reader mode, annotation tool, and Cortana integration.

 

  • Windows Hello, Microsoft Passport, and Windows Defender for anti-malware and spyware protection.

 

So how can we help with all of this?  Partnering with an MSP can maximize usage, and smooth out your transition to Windows 10.  The most important benefit is to make sure the network and operating system is ready for Windows 10.  The personal touch and customer service of a Managed Service Provider can facilitate that transition and give you peace of mind when it comes to not only transitioning your operating systems, but also your employees.

 

What We Can Do:

 

  • MSPs can help you stay organized and ahead of the game by letting us, the experts, control the computer and network aspects of your business.

 

  • System compatibility. Are the PCs in your office ready for Windows 10? Having an MSP proactively monitor and maintain the network will aid in making sure your system is ready to be upgraded.  Regular network assessments will also prepare you for not only Windows 10, but other technological transitions you may have.

 

  • Questions or Concerns. MSPs can showcase their Windows expertise, and customer service, by answering customers’ questions and concerns about Windows 10.

 

In conclusion, having an MSP on your side during this transition is beneficial for your business as it allows you to focus on your business critical functions that help you grow.  Let us, the experts, help you get organized and prepared to prevent downtime and confusion for you or your fellow employees.

Cloud Computing: The MSP Advantage

It’s no secret that cloud computing is the future of computer and network care for businesses worldwide.  “The cloud” eliminates the need to have physical servers and hardware in your office. Cloud computing focuses on maximizing the effectiveness of the company’s shared resources, as well as being effective in heightening companies’ day to day tasks with multiple users.  It is a highly efficient way to store your company’s data in one place at a flat monthly cost, as opposed to worrying about the large capital investment of new network equipment on a regular basis.

Cloud adoption and cloud-based file sharing are becoming increasingly popular among the general public, but can cause concern among CIOs. Unfortunately, IT organizations are having a hard time keeping up with large, public cloud providers.  According to an article from Business Cloud News, a recent survey conducted by Fruition Partners of 100 CIOs found that 84 percent believe cloud adoption reduces their organization’s control over IT.

About nine in ten believe unsanctioned use of public cloud services has created long-term security risks. This is troubling to CIOs because it can lead to possible information leaks or other data security breaches. In addition, 79 percent of CIOs believe that there are cloud services in use that their IT department is not aware of.  This reiterates the danger of losing grasp of the company’s technology while using a large cloud provider.

Partnering with a Managed Service Provider (MSP) can help prevent these worries from arising.  A proactive relationship with an MSP gives you the ability to aid in, or fully move, to a private cloud option.  It ensures that your company will be working with a partner that has experience with many cloud networks, therefore providing the highest level of support possible.  This is crucial when it comes to the transition of moving your company’s data and file sharing for all users within your company at an affordable cost, while at the same time, preventing downtime on the network.

In conclusion, the value of having an MSP on your side to aid in cloud based technologies for your business is second to none.  Small to midsize companies can focus on the core competencies of their business that make them money, while letting the experts control all business technology in the cloud.

Internet Surfing Best Practices

  • Use Google Search

Before you start to type the name of a website you have never been to before, try googling it first. Google actively scans just about every website and looks for malicious (harmful) code. If it finds something, it will warn you in the search. Google will also ensure that you end up at the page you are looking for. After googling, be sure to read the information provided below the link in order to learn about the website.

  • Don’t click ANY advertisements

First of all, there is no such thing as a coupon printer. Plain and simple; they do not exist. Secondly, there is no such thing as a good advertisement. Sure, some will take you to the place you want to go to see some golf club or purse, but it is safest to assume that all ads are bad. If you find that ads are starting to market directly to you that means you have been clicking on them and they are tracking what you are interested in.  It may seem easier to click a well-targeted add to see the new fall lineup or a new car, but the more you click ads the more likely you will run into malware. Just google the new fall lineup or car and view it directly on their site.

  • The “YOUR COMPUTER IS INFECTED” banners

No website can tell you what is on your computer. You have to allow a program access to scan your computer before it can tell you what is there. Completely ignore any banner or website that tries to tell you how many things are wrong with your computer. These banners are the birthplace of most adware and malware. More often than not they will infect and slow down your computer and never fix any real issues.

  • Check the address of the site you are on

Does it look like the site you should be on? “Phishing” or “Spoof” websites are designed to look exactly like another website. Here is an example:

phising

This site is setup to look as much like Citibank as possible in an attempt to get credit card information. A foolproof way to ensure you are on the correct website before entering secure information is to review the address bar where the webpage link is located. As you will see in the example, the address is https://web.da-us.citibank.com/… Does this look familiar?  Try to google Citibank and see what google reports as their webpage.  After googling, you will notice that Citibank’s website looks like this: https://online.citibank.com/US/JPS/portal/Index.do. Also, take a hard look at the website itself, does it look official? If you are in question at all, close the window and try Google searching to find the correct location for a website.

  • Check for a SSL Cert

Without getting too technical, SSL certs provide a secure (protected) connection from your computer to the website you are on. That is to say, any data or communication passed from your computer or the website cannot be read by anyone else along the line of communication. You will want to check for these certs on every site that you are entering any confidential information. Below you will see examples of where to check for SSL certs on the common browsers:

Chrome– Chrome

IEHTTPS – Internet Explorer 11

firefox– Firefox

opra – Opera

safari– Safari

Essentially what you are looking for is the ‘s’ at the end of http’s’://www.google.com. Some browsers represent the secure connection as a green lock. If you don’t see the ‘s’ or the green lock, do not enter in any confidential or even personal information.

  • Password use

This can be covered in a topic all by itself but I will touch on it slightly. If you are someone who does not like to keep different passwords for every site, I urge you not to use the same password for everything. Something you can try is to keep a few different passwords and use them for varying levels of security. For example, there will be some sites that ask you to create an account just to view their items for sale. Do not use the same password as your online bank account. Use a password you would not mind if it got stolen and continue to use that password for all sites you could care less about. Another note, if you save your passwords in your browser to ‘Auto-Fill’ realize that someone with access to your computer can now log into every place that has a stored password. If you sync your passwords using google so that all devices have the same saved passwords, realize that your google account password now needs to be the most secure. Someone just needs that one password to

FBI Warns Businesses of Email Scams

The FBI has issued alerts to all businesses about the spread of BEC scams.  One of the fastest growing hazards facing businesses today is the growth of business email compromise, or BEC scams.  According to the FBI these scams have grown by more than 270% since the beginning of last year.  At their last reporting more than 7,000 businesses have lost more than $1.2 billion in the last 2 years.  At Midwest IT Solutions we help you to manage your IT risk.  We are at the forefront of IT risk management; monitoring, assessing, and evaluating threats to your network no matter where they may come from.  You can be confident knowing that Midwest IT Solutions is in your corner.  While these scams may at first seem less impressive than thefts perpetrated by sophisticated malware targeting banks and other large institutions; a BEC attack is in reality more­­­­ vicious.  They are more versatile and can avoid the basic security steps taken by businesses and individuals.  Instead of simply targeting your machines, a BEC scam targets your people!  Criminals are convincing their victims to hand company money right over to them, and they have been very successful in doing so.  According to the FBI, “The scam has been reported in all 50 states and in 79 countries.  Fraudulent transfers have been reported going to 72 countries; however, the majority of the transfers are going to Asian banks located within China and Hong Kong.

BEC scams are being perpetrated in multiple stages.  In the first stage a traditional email phishing scam is carried out.  Once the criminal has access to an employee’s email account, they will monitor the account for an extended period of time, sometimes up to several months.  During this time the fraudster is learning the financial processes of the target business.  They are learning if wire transfers are used, who initiates them as well as who typical requests them.  Emails are searched for key terms such as, but not limited to: invoice, deposit, president, and wire transfer.  Fraudsters are taking the time to familiarize themselves with the target business’ activities, organizational relationships, interests, as well as travel, or purchasing plans.

Once the reconnaissance phase of the fraud is completed the second phase of the con is initiated.  This portion comes in two different forms.  The first is known as a CEO Phishing Scam.  Crooks create a domain name that is nearly identical to the company’s and send a spoof email that appears to be from the CEO or other high ranking executive.  This email will look totally real and only a very careful reading of the email will give the targeted employee a chance of detecting any sort of problem.  The fraudster impersonating the high level executive requests a wire transfer be made.  The target employee believes that their superior has directed them to transfer funds and, being a good employee, the instructions are carried out.  Because they have spent so much time and effort getting ready to perpetrate this fraud, the criminals are able to create an utterly convincing fund request.  Before anyone has realized what has happened company money has disappeared.

In the second version of this scam, the email of someone within the targeted company responsible for billing and invoicing is taken over and used to send out legitimate appearing invoices instructing that payment be made by wire to a newly designated bank account.  Again, it would take intense scrutiny to notice anything wrong with this phony invoice.  One of the most nefarious aspect of these scams is that they are unlikely to be caught in any spam traps as these are targeted attacks and not mass emails.  These scams continue to grow and evolve as time goes by so it is important to be vigilant.  To protect themselves the FBI has urged businesses to adopt the following processes:

  • Create intrusion detection system rules that flag e-mails with extensions that are similar to company e-mail. For example, legitimate e-mail of com would flag fraudulent e-mail of abc-company.com.
  • Register all company domains that are slightly different than the actual company domain.
  • Verify changes in vendor payment location by adding additional two-factor authentication such as having a secondary sign- off by company personnel.
  • Confirm requests for transfers of funds. When using phone verification as part of the two-factor authentication, use previously known numbers, not the numbers provided in the e-mail request.
  • Know the habits of your customers, including the details of, reasons behind, and amount of payments.
  • Carefully scrutinize all e-mail requests for transfer of funds to determine if the requests are out of the ordinary.

At Midwest IT Solutions it is our job to monitor threats to your business.  We are IT experts ready to help defend you against any attack cybercriminals can dish out.  Don’t go it alone, contact the Midwest IT Solutions today!

Midwest IT Referral Program!

An overview of the new referral program offered by Midwest IT. You and a friend can now win $100 Amazon gift cards!

We are looking for REFERRALS. And you can help us grow our family! Midwest IT was founded in 2005 and is known for it’s LEGENDARY CUSTOMER SERVICE! And we are looking to add a few customers TO GROW OUR FAMILY. Referral Requirements: Must have at least 15 users, already uses outsourced IT, and you must want a $100 Amazon card! And all you need to do is: WHAT YOU DO: You send an email to Midwest IT and the person you are referring! Midwest IT schedules an on site appointment with them. Once the meeting happens, you both get $100 AMAZON cards! AWESOMENESS!!! Help us to help YOUR FRIENDS, FAMILY & WORK ASSOCIATES. A simple email can: Help Grow Midwest IT! Help friends with better IT! Help you get some extra money. Send us your referrals TODAY. derek@midwest.cc Midwest IT Solutions www.midwest.cc