Monday, November 27, 2017

Disable Remote Access to Your Computers

What it is:

Remote access or remote assistance is a feature that allows entrance to your computer. Some of the dangers of a home or business computer being accessed are clear and others are less obvious.

Dangers of Remote Access to Your Computers - You Might Know These:
  •  Access Confidential Data Files
  • Use Your Computer to Send Spam Emails
  • Install Malware that Records Keystrokes to Access Passwords and Account Numbers

Dangers of Remote Access to Your Computers -Less Known:
  • Use Your Computer to Attack Another Computer or Web Server
  • Use Your Computer to Launch a Worm, Virus, or Malware
  • Use Your Computer to Tie Up a Network's Resources
  • Use Your Computer to Spy in a Large Network
  • Use Your Computer to Hide a Hacker's Identity

 

Why is it a Problem:


In this video by the BBB, a remote access scam is described. A phone call is received from someone claiming to be tech support at Apple. They claim your iCloud account has been hacked. They say the good news is they can fix the problem with remote access to your computer. Once they have access to your computer they can copy your private files, install malware, or perform any other breaches as described in the lists above.



How to Fix the Problem:

Remote access can be easily disabled. If it is ever needed for a legitimate reason, the process can be reversed. Since every version of Windows has a different path to reach remote settings, the easiest way to find your process is to run a google search.

As an Amazon Affiliate, advertising on this blog supports my writing. By clicking an ad, you are under no obligation to buy. If you see an advertisement of interest, please click.


 

Friday, November 10, 2017

3 Simple Steps To Help Keep Your Computers Healthy


Take 3 Simple Steps To Protect Your Computers

With the increase of cyber security threats like phishing, malware, and viruses, know there are some basic steps you can take to protect your computers.

1-Install anti-virus software

  • Install only one anti-virus program to avoid conflict.
  •  ESET is a good one.
  •  Avast is a good, free option.

2-Install Anti-malware software


3-Install additional anti-malware protection

  • Malwarebytes is good and has a free option.
  •  Update it and run scans weekly.

Protection of your own computer and network benefits everyone because unprotected computers can be used to launch denial of service attacks.

As an Amazon Affiliate, advertising on this blog supports my writing. By clicking an ad, you are under no obligation to buy. If you see an advertisement of interest, please click.



 

Tuesday, July 18, 2017

The Internet of Things Makes Your Home "Smart"

Back in June 2015, I wrote about the Internet of Things for ASQ (American Society of Quality). Two years have passed and devices that manage technology in our homes are becoming more commonplace. The term "smart home" describes the control and automation of lighting, heating, air conditioning, security, and appliances.

Honeywell Device for Detecting Leaks

Leak detection prevents water damage
The device shown above serves as a leak detector. The wire is a sensor for moisture. The box is a WiFi interface. This device can be placed near a water heater or washing machine. In the case of a leak, an email is sent to the owner.


Email Advising of Leak

Controlling temperature from a phone or other mobile device
More and more people are replacing their thermostats with models that connect to the internet via WiFi and can be controlled through an app on a mobile device. In this way, the home temperature can be checked and adjusted remotely.

WiFi Thermostat

One use is to raise the air conditioning setting while out of town. Once you are on your way home, you can remotely lower the setting so the home temperature will be comfortable when you arrive.

Mobile Phone App Screen Controlling Thermostat
Tablet App Screen Controlling Thermostat


Home security
Many internet of things in the home improve security. Lights and televisions can be turned on and off while on vacation so the home looks occupied. Cameras can be installed inside and out, and viewed on a device from another location (see screenshot below).
Tablet App Showing Camera Views of Business

An internet-enabled doorbell with camera allows the homeowner to respond by voice to someone at the front door even when they're in another location. This uses an app on a mobile device.

New home construction offers smart home technology. The addition of internet-enabled devices to older homes is being simplified to do-it-yourself home improvement projects.

This article first appeared in Quality: Improvements in Work and Life.

Advertising on this blog supports my writing. By clicking an ad, you are under no obligation to buy. If you see an advertisement of interest, please click.

 

Monday, June 26, 2017

Youtube Redirects to the Mobile Version on Desktop and How to Fix It

Mobile Version of YouTube on PC Screen



Two weeks ago I wanted to watch a favorite YouTube video . When I opened YouTube using Chrome browser on my Windows 8.1 Desktop personal computer, I saw a screen similar to the one above. It's recognizable as YouTube, but when clicked nothing happens. A quick workaround was to use another browser, but my favorite videos were bookmarked in Chrome.

A discussion with a family member about youtube.com redirecting to m.youtube.com revealed I was dealing with the mobile version of YouTube. It would not respond to mouse clicks.

A Google search suggested clearing out cookies.
Listed below is the click sequence:
Customize and Control Google Chrome>
Settings>
Show Advanced Settings>
Clear browsing data (Under Privacy section)>
Cookies and other site and plugin data>
Clear browsing data.
Afterwards the problem persisted.

YouTube.com Was Redirected to m.YouTube.com

I found a 2014 YouTube forum thread with the solution. Type chrome://settings/cookies in your Chrome browser window. A list of cookies will appear. Click Remove all. This got rid of the mobile version of YouTube on my desktop. Here's the 2014 thread.

All credit for this solution and the screenshot at the top of this page go to the thread contributors at that link.

How do you safely clean a laptop screen?

Looking back, I'm not sure what prompted the mobile YouTube to hijack my browser. I have a new laptop with the same Chrome identity. With that laptop being a touch screen perhaps there was some cyber-confusion. I try to limit my use of the touch feature on the new laptop because it makes a smeary mess of the screen. Can anyone relate? Any tips for safely cleaning a laptop screen? I would love to hear them. Also if you have experienced the YouTube mobile redirect or know why this happened, I would be interested to hear from you.

Thanks for reading my post. I've been busy with classes, but it's great to be writing about web technology again. Advertising on this blog supports my writing. By clicking an ad, you are under no obligation to buy. If you see an advertisement of interest, please click.

Friday, March 10, 2017

Small Business Cybersecurity: The People Connection


Data from 2015 shows that 20% of U.S. businesses hacked are small with less than 250 employees. 60% of those fail after the attack. For small and medium-sized businesses, the average cost of a data breach is $21,000.

In 2016 an accountant was hacked and financial information and social security numbers from accounts were stolen. By the time the breach was discovered, a false return had been filed with the IRS in my family's name.

Cyber criminals or hackers use stolen information to obtain money. Sometimes they use the data, but often it is sold to other criminals. With names and social security numbers, criminals can file fraudulent claims for tax refunds.

Hackers also steal bank account information, credit and debit card numbers and authentication details, personal information, medical records, trademark information, trade secrets and others. A list of names, phone numbers, and addresses can be used by IRS scammers. Those criminals make threats and convince people to wire money or mail debit cards.

Preventing business cybercrime requires several levels of defense. Employee internet habits are one layer of cybercrime security that should be addressed. Since downloads of software are one of the primary causes of virus attacks, employee internet policies need to be solid and well communicated.


Steps to prevent cybercrime caused by employee behavior:


Company policies

Robust and clear company policies need to be written, distributed, and updated regularly.
These policies would cover the following areas:
  • email and internet use
  • protecting confidential information
  • policy communication and updates

Security training

Periodic meetings should be held to discuss security issues and concerns. Use recent news reports and videos to highlight different security concerns. Be clear about new threats from cyber crime and security changes to address those threats. Employees should be educated to be alert to phishing emails and suspicious attachments or links. A cybersecurity manager should be named who can respond to employee questions in a timely manner. This person should also insure policies are written, updated, and communicated.

Control Access

Limit administrative and password access. Regularly change passwords and establish limiting access to levels of data where possible. When employees are terminated, immediate changes in network access should be made.


Protecting organizations from cybercrime is a complex issue. Employee internet behavior is one area that should be managed to keep business information secure.

A cybersecurity tip sheet for small businesses by the Department of Homeland Security can be found here.

Advertising on this blog supports my writing. By clicking an ad, you are under no obligation to buy. If you see an advertisement of interest, please click.