Quality Computers

All Professionals No Geeks

CALL US
478-474-0861
2940 Riverside Drive
Macon, GA 31204
  • Home
  • Retail Store
  • Services
  • Blog
  • Contact
  • About
  • Testimonials
  • Free Diagnostic

Archives for August 2019

Do Macs Get Viruses?

August 27, 2019 by Quality Computer's Staff

Many Apple owners believe their Macintosh computers are immune to viruses. Apple itself has run ad campaigns promising its computers “don’t get viruses”. And those who have owned a Mac for years, decades even, are particularly prone to believing. After all, nothing’s happened to them yet. Regrettably, Macs do get viruses, and the threat is growing.

For a long time the argument was that cybercriminals didn’t bother to develop Mac viruses. There weren’t enough users to justify the effort. Instead, they’d focus on the lower hanging fruit – PCs running Windows.

Yet Apple’s market share is on the rise, and it’s increasingly common to see Macs in the workplace, especially in creative industries. Plus, there’s a widespread assumption that Mac users are a smart target as they are likely to be better off. So, while Macs remain harder to infect (installing most software requires a password), there’s often a greater payoff.

The research reflects the reality. In 2017, for instance, the iPhone OS and Mac OS X placed #3 and #6 in CVE Details’ top 50 ranked by total number of distinct vulnerabilities. Apple TV and Safari also made the list at #17 and #18, respectively. In 2017, Malwarebytes also reported it “saw more Mac malware in 2017 than in any previous year”. By the end of 2017, the cybersecurity firm had counted 270% more unique threats on the Mac platform than in 2016.

Finding Apple’s Weak Spots

It’s obvious then that bad actors are no longer steering clear. They are actively looking for ways to exploit Macs.

A common approach is to use Trojans. Named after a gift wooden horse that hid an army, Trojans look like something you would want to install. So, Mac users happily enter their passwords to download that application and open the gates to the cybercriminal.

In 2011, for instance, a Trojan called “Mac Defender” took advantage of people’s desire to protect their computers. The fake program appeared to be anti-virus software. Once the users installed it, they’d get an onslaught of pop-up ads encouraging them to buy more fake software.

Trojans get through the gates because you let your guard down. You are taken in by that supposed note from a long-lost friend. You think you want to see that pic of that famous celebrity. All it takes to stop this type of attack is suspicion of everything you might install or download.

A business would want to educate its employees about the importance of:

  • clicking on emails with care;
  • validating the source of any files they plan to open;
  • checking a website’s URL (being especially wary of those with less common endings such as .cc or .co);
  • questioning any promises of Ray-Ban sunglasses for 90% off or the latest iPhone for $29.99.

A new threat comes from within the Mac App Store, according to Thomas Reed, a Mac security researcher. When a user tries to install an app on a Mac, a Mac OS program called Gatekeeper checks the file’s code signature. The signature helps certify the app is valid. However, Reed found that cybercriminals could buy a legitimate certificate from Apple, or steal one and trick users. Users would install masked malware that could infect legitimate programs and evade detection.

Key Takeaway

Apple is always working to protect its users from malware. It has measures in place, and user caution can make a big difference, too. Still, it’s not true that Macs are completely safe.

Find out what you can do to protect your Macs and guard against threats. Partner with a managed services provider to gauge your security levels.

Call us today at 478-474-0861!

Filed Under: Uncategorized Tagged With: #bestservice, #computerrepair, #nocontract, consumer, Hacker, msp, QualityCareSuite, remote support, scam, small business

Share:

Invest Well in Your IT Security

August 26, 2019 by Quality Computer's Staff

“If it ain’t broke, don’t fix it” is a common and useful rule for many business owners. It serves to protect your business against unnecessary costs and unneeded downtime. While protecting your business against many types of danger, it poses an outright threat when it comes to IT security.

Security threats to your firm move so fast that your IT should be working twice as hard as your company just to keep up. Every day, hundreds of thousands of new malware threats are released. Falling even hours behind means any one of these attacks can threaten your business.

The single most dangerous thing IT security can do is stand still. Keeping up with the latest advice, technology, and updates the security industry offers is vital to keep your business safe. This makes up much of the unseen job of IT professionals. Hackers never stop looking for new ways into your system, which means your security can’t stop looking for ways to keep them out.

Modern Systems for Modern Business

One of the most common security threats a business opens itself to is using an outdated operating system or software package. Many firms are scared to upgrade, update, or renew their IT over fears of breaking legacy systems. Many rely heavily on old software and are afraid to make a large change themselves. Some businesses today still run machines on Windows XP, an operating system first released back in 2001.

Old operating systems stop receiving security updates and patches that protect against newly released attacks. These systems become very vulnerable, presenting a large target for knowledgeable hackers. This happens many years after newer versions have been released, giving knowing IT firms a chance to migrate safely.

Hackers are always on the lookout for businesses that run IT equipment outside of its suggested service life. A server, desktop computer, or peripheral is a golden opportunity for criminals to enter and threaten a business.

Hackers purchase their attacks on the dark web, safe in the knowledge that old systems won’t be patched. These attacks can then be used to attack unguarded firms to steal or compromise vital company data.

An unpatched old machine is like a valuable security door left propped open overnight, a golden opportunity for thieves.

Smart Budgets

Budgeting for business is a difficult task. We aim to make the most of everything we spend and reduce spending as much as we can. IT security can easily fall very far down the list of priorities.

IT can seem like an easy way to cut costs. It’s a department that the customer doesn’t always benefit from directly, and when it’s working well, it might not be on the radar at all. Despite working largely behind the scenes, successful IT is one of the critical components of every highly successful firm. Good IT can be the binding glue that holds the company together.

Even businesses far removed from the IT world typically uses payment machines, ordering systems, and inventory. Even restaurants and retail stores rely on computers to operate. Downtime for any critical system can be a complete disaster. A business can be unable to trade, and costs can mount up fast.

When vital IT components are used by the customer, a sales website, or an automated booking system for example, the problem can multiply tenfold.

Keep On Top Of The Essentials

Good IT isn’t built on high peaks and deep troughs in the yearly budget. The kind of IT that makes your business and helps it to grow is built by smart financing and careful planning. Great technicians are what makes excellent IT.

Maintaining steady updates, keeping pace with the latest security, and building your IT as you build your business keeps you in the driving seat when it matters most.

When IT is planned and issues are solved before they appear, security becomes cheaper, easier, and many times more effective. System upgrades can be planned out months, if not years in advance so you are never caught unaware.

Don’t let your IT be broken before you take steps to fix it. Move ahead of the curve and give us a call at 478-474-0861 so you don’t have to find out what your business looks like without IT.

Filed Under: Newsletter Tagged With: #bestservice, #nocontract, online safety, QualityCareSuite, remote support, service, small business

Share:

Professional Businesses Deserve Professional Setup

August 19, 2019 by Quality Computer's Staff

Watching a business grow is as satisfying as it is rewarding. Whether opening a new office, starting a new department, or bringing in a new employee; it’s a positive step in the right direction. Upward growth often requires new office tech and IT changes to bring new staff fully online.

At a minimum, a new computer will be needed for employees to get started quickly and hit the ground running. New staff or an entire department may require a server, printer, or additional networking hardware to cope with extra demand.

A tech smart business should give careful consideration to how it sources and sets up its hardware and software. It can be tempting to pick a simple solution off the shelf from the nearest retailer.

Modern manufacturers often make it easy to get set up with a new device straight out the box. Using default settings and a simple setup means a laptop or tablet can be just plugged in and it’s ready to go, right?

Unfortunately, setting up technology to create safe, secure, and reliable business services requires a little more detail.

Setting Up Tech For Business

The hardware you have is at least as important as the hardware you buy. It’s important to ensure new tech on the network is compatible with your existing business systems. Adding the wrong solutions to accommodate new employees can slow down the system for everyone.

Many firms talk themselves into buying the most expensive, or heavily marketed system on the market. Buyers often feel confident that the high price tag and slick design means it’s guaranteed to work with anything you put to it. We wish that were always the case.

Without an eye for fine detail and good IT knowledge, combining certain solutions can cause a significant network slowdown or even fail to work together at all.

Consistency Is Key

It can seem easy, and tempting, to buy technology based on offers and deals around at the time you need it. Some companies do this to save money short term, building their systems using a mixture of hardware from various vendors and manufacturers. When thinking long term, this approach might not get you the great deal that you think.

Mixing suppliers alone can make it difficult to track where components came from in the coming months and years. Warranties, service agreements, and support can become hard to track down when parts fail and hardware dies. Money spent securing your business against failure is completely wasted if you can’t find the right paperwork at the right time.

Sourcing replacement parts and supported peripherals can be made more difficult when components are mixed too.

Planning ahead and purchasing identical hardware can make swapping components fast and straightforward. When systems are consistent, both parts and knowledge can be shared throughout the entire business. A smart decision today can eliminate costs, time, and headaches further down the road.

Unexpected issues appearing at the last minute can have large consequences on workload and deadlines. Sharing everything from chargers to memory can help to reduce and mitigate IT risks. Consistent hardware, swappable components, and even considering a supply of spares can take care of many potential headaches.

Smooth Onboarding

In business, first impressions are critically important. Whether setting up a new office or getting an employee ready to start, a professional attitude goes a long way. Good IT that’s ready to work sets a professional tone to carry your business forward.

IT that supports and enhances operations is infinitely better than IT that gets in the way. Using consistent and well-known solutions in the right way avoids wasting time, maintains performance, and reduces costs where it matters.

Our goal is to ensure your hardware meets your business needs. A professional setup ensures your IT is consistently improved while you watch your business flourish and grow.

Give us a call at 478-474-0861 for a professional setup to make sure nothing stands in the way of growing your business.

Filed Under: Newsletter Tagged With: #bestservice, #nocontract, backup, cloud, data recovery, QualityCareSuite, remote support, service, small business

Share:

Don’t Get Hooked by Spear Phishing Attacks

August 12, 2019 by Quality Computer's Staff

Phishing attacks have been around for a long time in IT. Designed to steal your credentials or trick you into installing malicious software, they have persisted in the IT world precisely because they have been so devastatingly simple and effective. Today, a more modern and more effective version of the same attack is commonly used.

A typical phishing attack involves an attacker sending out a malicious email to hundreds of thousands, if not millions of users. The attacker’s email is designed to look like it comes from a bank, financial service, or even the tax office. Often aiming to trick you into logging in to a fake online service, a phishing attack captures the login details you enter so an attacker may use them to enter the genuine service later.

By sending out tens of thousands of emails at a time, attackers can guarantee that even if only one half of one percent of people fall for it, there is a lot of profit to be made by draining accounts. Spear phishing is a more modern, more sophisticated, and far more dangerous form of the attack. It’s typically targeted at businesses and their staff.

A Convincing, Dangerous Attack

While a traditional phishing attack throws out a broad net in the hope of capturing as many credentials as possible, spear phishing is targeted and precise. The attack is aimed towards convincing a single business, department, or individual that a fraudulent email or website is genuine.

The attacker focuses on building a relationship and establishing trust with the target. By building trust and convincing the target that they are who they are pretending to be, the user is more likely to open attachments, follow links, or provide sensitive details.

Consider how many times you have followed a link or opened an attachment just because it has come from a contact you have trusted before.

A Trusted E-mail

The malicious email can appear to come from a vendor you deal with regularly. It may even look like an invoice you are expecting to receive. Often attackers can simply substitute the vendors’ banking details for their own, hoping the target will not notice the difference.

Such an attack is very difficult to detect. It takes a keen eye, strong working knowledge, and constant awareness to keep your company protected. Even a single small mistake by an unaware member of staff can compromise your business accounts.

Defending Your Business

The key to stopping a spear phishing attack is education. Learning attack techniques, and how to protect against them is the single biggest thing you can do to enhance business security.

Whenever you deal with a vendor in a business transaction, you should always consider important questions before proceeding. Are you expecting this email? Is the vendor attempting to rush you into a quick decision or transaction? Have you checked all the details are correct and as you expected? Sometimes a simple query to the vendor can protect you against worst-case scenarios.

In many cases, a phishing attack can be halted in its tracks with a strong IT security package. Web filtering prevents malicious emails and links from entering the network, shutting attacks down before any damage can be done.

Good Security Practice

As with many types of IT threat, good security practices help mitigate damage. Locking down security to ensure employees only access the systems they need helps to prevent damage spreading across the network.

Enforcing unique and strong passwords prevents leaked credentials from affecting systems related to the one that has been compromised. Getting employees set up with a password manager and good security policies can do the world of good to boost your security to the level it needs to be.

Give us a call at 478-474-0861 to audit your security practices. It could be the difference that secures your firm against sophisticated spear phishing attacks.

Filed Under: Newsletter Tagged With: #bestservice, #nocontract, consumer, Hacker, online safety, QualityCareSuite, service, small business

Share:

Keeping Tabs On Children’s App Purchases

August 5, 2019 by Quality Computer's Staff

Children today have grown up surrounded by technology their entire lives. Since before they are old enough to read they can pick up a tablet or smartphone and swipe at apps and games with ease. Modern kids have an intuitive understanding and ability with technology that older generations can barely imagine. The abundance of technology, however, comes with a price.

Easy access to any marketplace can be a double-edged sword. The convenience and ease of use is a boost to those of us needing a quick app, but accidental purchases can cause a lot of headaches. One-click online shopping was once one of the biggest dangers our bank account faced. Now, many of us carry multiple devices, each with their own marketplace and app stores.

With modern tech, mobile applications, whether on iOS or Android devices, are easier than ever to buy and download. So simple in fact, that a child could do it.

Designed to Appeal – Children love to download mobile applications that feature their favorite characters, cartoons and TV shows. Advertisements are aimed specifically for children in ways that will invite them to click a link and instantly download a game.

These games are typically free, meaning they don’t require authentication by default before downloading. A new game can be downloaded, installed, and ready to run seconds from clicking an ad.

Developers commonly use, what is known in the business as, a ‘freemium’ model. This means that the game is free to download and start, but inserts paid ‘upgrades’ designed to make the player part with cash.

Freemium Games – Upgrades to games may unlock more levels, purchase an in-game currency, or outfit a character with special attributes. Competitive online games commonly employ a strategy that gives paying players an unfair advantage over ones who don’t pay. This is often referred to as ‘pay-to-win’ and entices players to spend more to get on the same level.

Many mobile-based games are designed purely to encourage in-app purchasing. Some deliberately design a deceptive or tricky user-interface that makes it easy to miss-click or make purchases by accident.

There are regular stories in the news featuring kids spending thousands on in-app purchases for virtual characters. In some cases, children can use real-world money to buy items thinking they are spending in-game currency.

Apps to Help – Of course, it’s unfair to give all applications a lousy name. Many deserve it, but not all apps are guilty of behaving badly. There are fitness apps, productivity apps, and educational apps that can act as useful tools to help enhance your day. Children can get a lot from high-quality applications in the same way educational software for the computer can be a huge classroom boost.

Getting the most out of your phone or tablet is about keeping your device safe against applications designed merely to take your money.

Secure Your Device – The best step you can take to prevent running up enormous app bills is to disable in-app purchases on your devices. This prevents apps from being able to take funds for digital items. The process to do this is simple, takes less than 2 minutes, and can save you huge amounts.

  • On iOS: Enter the settings screen, tap on ‘General’. Then tap on ‘Restrictions’ and tap the ‘Enable restrictions’ option. Make sure to turn “In-App Purchases” off.
  • On Android: Inside the Google Play App: press the phone menu button and go to Settings. Scroll down to “User Controls”, tap on the “Set or Change Pin” option and set a pin that only you will know.
    In the “User Controls” menu check the option to “Use Pin for purchases”. Newer phones may label this pin as a password instead.

Safe Apps – With these options enabled, whether using an iOS or Android device, your phone or tablet is safe from app purchases in any hands.

Filed Under: Newsletter Tagged With: consumer, online safety, scam

Share:

VISIT US

Recent Posts

  • How to Stay Focused Working from Home
  • “So Slow!” Is it your Computer or your Internet Connection?
  • Is Your Tech Partner a Team Player?
  • 5 Best Practices for Buying Technology for Employees
  • How to Get Your Devices to Play Nicely Together: Home Networking Help

Recent Comments

    Archives

    • April 2020
    • March 2020
    • February 2020
    • January 2020
    • December 2019
    • November 2019
    • October 2019
    • September 2019
    • August 2019
    • July 2019
    • June 2019
    • May 2019
    • April 2019
    • February 2019
    • August 2018

    FOLLOW US

    Recent Posts

    • How to Stay Focused Working from Home April 28, 2020
    • “So Slow!” Is it your Computer or your Internet Connection? April 13, 2020
    • Is Your Tech Partner a Team Player? April 6, 2020
    • 5 Best Practices for Buying Technology for Employees March 30, 2020
    • How to Get Your Devices to Play Nicely Together: Home Networking Help March 23, 2020

    Tags

    #bestservice #computerrepair #coronavirus #covid19 #IT #nocontract #qualitycomputers #remoteworkforce #remoteworking backup bad hard drive cloud computer repair consumer data loss data recovery email Hacker msp new computer new laptop online safety QualityCareSuite recover data remote support repair sale scam service small business Webcam

    Copyright © 2021 · Quality Computers · 2940 Riverside Drive, Macon, GA 31204