Quality Computers

All Professionals No Geeks

CALL US
478-474-0861
2940 Riverside Drive
Macon, GA 31204
  • Home
  • Retail Store
  • Services
  • Blog
  • Contact
  • About
  • Testimonials

Archives for February 2020

The Dark Web and Its Impact on Your Business

February 24, 2020 by Quality Computer's Staff

Business owners today know the internet is not only a force for good. Some people exploit the Web for ill intent. They congregate on the Dark Web, and small businesses need to understand the risks.

What is the Dark Web?

You and your employees spend time daily on the Web. They’re researching clients, checking out competitors, and searching for information. They are not accessing the Dark Web. The Dark Web houses dangerous, often illegal activity. This includes black-market drug sales, illegal firearm sales, and illicit pornography.

The Dark Web’s collection of websites is inaccessible using standard search engines or browsers. Users employ a Tor or I2P encryption tool to hide their identity and activity, and they spoof IP addresses.

To go into the Dark Web, you also need to be using the Tor or I2P service. Plus, you’d need to know where to find the site you are looking for. There are Dark Web directories, but they are unreliable. The people on the Dark Web don’t want their victims to find them. Ultimately, it’s not somewhere you or your employees need to be.

So, why do you need to know about it? Because Dark Web users can buy:

  • usernames and passwords
  • counterfeit money
  • stolen credit card numbers or subscription credentials
  • software to break into people’s computers
  • operational, financial, or customer data
  • intellectual property or trade secrets

The Dark Web is also where someone can hire a hacker to attack your computers.

The Dark Web business risk

The Dark Web itself isn’t illegal, and not all its traffic is criminal. It is also visited by journalists and law enforcement agencies, and it’s used in countries prohibiting open communication.

Yet the number of Dark Web listings that could harm your business is growing. A 2019 research study found that 60% of all listings could harm enterprises, and the number of those Dark Web listings has risen by 20% since 2016.

Business risks from these Dark Web listings include:

  • undermining brand reputation
  • loss of competitive advantage
  • denial-of-service attack or malware disruption
  • IP theft
  • fraudulent activity

With media attention on data breaches impacting millions, it’s easy to think a small business is not at risk. However, bad actors don’t target a business for its size – they look for ease of access.

Dark Web information is up to twenty times more likely to come from an unreported breach. Privacy specialists told a Federal Trade Commission Conference victims included medical practices, retailers, school districts, restaurant chains, and other small businesses.

Reduce your risk

If your information ends up on the Dark Web, there’s little you can do about it. The bright side, at least, is that you would know that your business security has been compromised. Be proactive instead. Keep your security protections current, and install security patches regularly.

Consider a unified threat management (UTM) device, or UTM appliance. The UTM plugs into your network to serve as a gateway and protect your business from malware, illicit access, and other security risks.

Your UTM security appliance can provide:

  • application control
  • anti-malware scanning
  • URL and content filtering
  • data loss prevention
  • email security
  • wireless and remote access management

Or let a managed services provider (MSP) take care of all aspects of protecting your business. Pay a consistent monthly fee for an MSP to handle all your technology, patching, monitoring, and assessment needs.

Stay on top of the latest cybersecurity threats with an MSP, or learn more about installing a UTM. We can help protect you from the dangers of the Dark Web. Call us today at 478-474-0861!

Filed Under: Newsletter Tagged With: #bestservice, #nocontract, #qualitycomputers, Hacker, msp, online safety, QualityCareSuite, remote support, service, small business

Share:

Facebook is for Sharing, Not Storing

February 17, 2020 by Quality Computer's Staff

When was the last time you held an actual photo album or actual prints of photographs in your hands? Maybe you look back at older photographs only when Facebook’s TimeHop app reminds you of a pic from five years ago. If so, you may be risking your visual history.

Facebook is a great way to share photos with friends and family around the world. You get to enjoy their comments and the affirmation of their likes. But using Facebook as storage for your photos is not a good plan. Here’s why.

Some people treat Facebook as their photo album archive. They delete the originals from their devices or digital camera when they need more space. But Facebook compresses images for faster download. It satisfies impatient social media users, which means photo quality suffers. If you wanted to print those photos in the future, they wouldn’t look as good as the originals.

That’s not the only drawback. When you trust Facebook with all your photos, you’re letting a company control your visual archive. It’s hard to imagine, given Facebook’s reach today, but what happens to your photos if the company goes defunct? We don’t know. The people who were keeping their photos on Myspace in 2006 might have an idea.

The younger crowd is already moving onto other social platforms. Plus, Facebook’s growth rate in North America and Europe is slowing. Those daily active users are the primary source of revenue. So, you know Mark Zuckerberg is in some meetings about that.

Even if Facebook continues as the business behemoth it is today, we don’t know what policy changes it might make. It could change its terms of service whenever it wanted (if you even read those in the first place). Users have no guarantee for how long Facebook will store their images or any type of content.

Keep in mind also that many of the photos showing up in your timeline are actually taken by friends. Facebook provides an entire album of other people’s photos when they’ve tagged you, but if they decided to untag you or remove it, that photo would be gone.

Finally, there’s also the risk of your account getting shut down or hacked. You’ve probably had friends warn you not to accept any new friend requests from them because they’ve been compromised. You wouldn’t want a thief to steal all your photo albums. Similarly, you don’t want a cybercriminal to gain access to all your images.

Our Recommendation

Just as with data, we recommend you have a “3-2-1” backup system for your digital photographs. This means having three copies of the photos you care about. You don’t need to back up the blurry ones if you don’t want to.

You might keep one copy on the original device, but you’d have two other copies of the high-quality, uncompressed, original image as well. One might be kept on an external storage device such as a USB thumb drive, and the other you could upload to cloud storage.

The cloud backup gives you access to the photos from any device in any location. So, if a flood, hurricane, or fire devastates your home, and you lose your device and the USB thumb drive, you still have a backup. Your Facebook photos and videos are just there to be shared with friends and family.

Not sure where or how to safely store your photos and videos? We can help! Our experts may even become new Facebook friends. Then we can all like each other’s photos with the peace of mind that the original photos aren’t going anywhere.

Filed Under: Newsletter, Uncategorized Tagged With: #bestservice, #qualitycomputers, consumer, data loss, online safety, service

Share:

6 Target Areas to Reduce IT Costs

February 10, 2020 by Quality Computer's Staff

Your business is always looking to reduce costs. Looking at the information technology budget line items is headache inducing. So much money spent in one area, and there’s so little you can do about it! But is that really true? IT expenses may not be as fixed as you think. Take a look at these target areas where you might reduce costs.

#1 Software

Your business likely pays to license software such as Microsoft Office 365 or Adobe Photoshop. Reviewing these software agreements, you can often find cost savings:

  • You may be able to renegotiate a subscription if the provider wants to move you onto to a new offering.
  • You may find that you are paying for software that your employees are no longer using much. Maybe you can reduce or remove it.
  • Perhaps the pricing has changed, and there are now better plan options available.
  • There may be an open-source software alternative to save acquisition and maintenance costs.

#2 Hardware

Your current hardware may be underused, need refreshing, or have lost productivity. Look for opportunities to run applications on less expensive devices, or link together several computers to replace expensive server equipment. Standardizing platforms can also significantly reduce IT costs while providing consistency.

#3 Cloud Computing

One way to cut IT infrastructure costs is to move to the cloud. You may be able to run software on the cloud for a fraction of the cost. Moving data backup to the cloud to replace an on-premises server can also cut costs, not to mention the utility savings from not having to power the replaced components.

Even if you’re already in the cloud, you can explore whether you are on the best available plan for you and consider:

  • Are you paying for more storage or resources than you need?
  • Are you taking full advantage of mobility and scalability features?
  • Are you duplicating on-premise and cloud-based services?

#4 Internet Services

Your employees need to be online; you’re not going to cut out internet services. However, you may be able to control costs:

Should you buy modems or routers instead of renting them from your provider?

  • Consider the internet speed in your plan. Do you need that level of service?
  • Is slow internet speed costing your company money when, in fact, you’ll be more efficient with an upgrade?
  • Are you able to bundle services to find cost savings?
  • Are you in a position to renegotiate your plan?

#5 IT Staff and Services

Avoid infrastructure costs and the hiring expenses of onsite IT staff by outsourcing. Often your business can pay a set monthly fee or go on a pay-per-use model to gain services such as:

  • IT help desk support
  • security
  • disaster recovery
  • backup

#6 Utilities

Don’t overlook the costs involved in powering your IT components. Review your utility bills to identify trends. Can you save money by turning off equipment? Is there a better plan available with a competing service? Should you renegotiate the terms of your existing plan?

Time for a Technology Audit

Ultimately, the best way to identify specific areas to cut your IT budget is a technology audit.

Your IT needs are always changing, and the technology evolves, too. Many businesses add expensive components or systems with “room to grow.” New tools get added on as needs arise. Your use of certain technologies may expand or shrink.

An IT expert can provide an overview of all the software and services you use, and of bills related to your IT budget to find areas to streamline or cut altogether. It may seem counterintuitive to pay money in an attempt to save money. However, an outsider’s perspective can provide fresh insight into the “way things have always been done” and help you see new opportunities for consolidation.

We can help you meet your budget goals. Contact us today at 478-474-0861!

Filed Under: Newsletter, Uncategorized Tagged With: #bestservice, #computerrepair, #nocontract, #qualitycomputers, cloud, computer repair, consumer, new computer, new laptop, QualityCareSuite, remote support, service, small business

Share:

Why You Need Professional Virus Removal

February 3, 2020 by Quality Computer's Staff

“Your computer has a virus.” Such a dreaded five words! We don’t want to come down with a human virus; we’ll feel awful and miss work. But when a virus hits our computer, we could lose valuable information or be vulnerable to attack. Chicken soup won’t cut it.

Perhaps you have an antivirus product installed on your computer. This computer software is intended to prevent, detect, and remove viruses. Antivirus tools are designed to keep infections out. They can also delete any viruses that may already be on the computer when the software is installed.

The software provides protection by tracking malicious code and other computer threats via:

  • classifying the actions the file or code drives (as malicious or OK);
  • inspecting file signatures for matches to an existing signature in its virus dictionary;
  • scanning for rootkits that can change how your operating system functions.

However, antivirus software isn’t that good at cleaning up. When it detects a malicious file, it will delete it. But what if the virus spread before discovery? If the infection spreads before virus deletion, it can do all sorts of damage.

Think of it this way: you have a cyst on your knee. Doctors decide it is pre-cancerous and operate to remove the cyst before it spreads. But, that’s all they do. They have seen the cyst. They go for the cyst. However, they don’t notice the cancer that’s in your shin or femur, because they were only working on the cyst. The rest of your leg remains unhealthy, and you don’t even know it!

Getting a Second Opinion on Viruses

If the antivirus software is your primary physician, a computer professional is the specialist you go to for an expert second opinion. For one thing, antivirus products don’t always remove all the malicious files. Many viruses start as one thing but can mutate into several different strains. The antivirus software may not be programmed to identify all of the virus variants. A professional actively looks for undetected strains on your computer.

Viruses are always evolving. A recent strain of malware, SquirtDanger, let hackers take computer screenshots, capture passwords, download files, and empty out cryptocurrency wallets.

Some viruses can change the settings of your computer. For instance, a common virus changes your computer’s DNS, which is like a bit like the Yellow Pages for the internet. On a virus-free computer, when you type in “Google.com”, your browser goes to Google’s servers located at the IP address “216.58.203.100.” However, an infection can make Google.com on your computer go to a different address. Perhaps a server address cybercriminals use to capture your personal data. It still looks to you like Google, but it’s no longer safe. These settings can still remain after the infection is long gone.

Viruses can also leave behind browser toolbars, extensions, and other nasties designed to spy on your Web browsing habits. If you’re consistently redirected to unwanted sites, or seeing unwanted pop-up advertisements, it’s likely your computer’s infected with a browser hijacker.

Ultimately, if you detect a virus on your computer, check with a professional. Don’t trust that your antivirus software is going to do the same, thorough job an expert can offer. Sometimes your computer isn’t fully safe until the operating system is reinstalled, but you can’t know that until someone can go in and see what the virus did and what remnants are still there, lurking.

Cybercriminals are growing more sophisticated and better able to design viruses that disguise their tracks. Avoid being an unwitting victim. A computer security expert can diagnosis when your computer gets a virus, or determine if there are strains on your device you don’t know about. Let a security expert protect your computer from harm today! Call us at 478-474-0861.

Filed Under: Newsletter, Uncategorized Tagged With: #bestservice, #computerrepair, #nocontract, #qualitycomputers, computer repair, consumer, Hacker, msp, online safety, QualityCareSuite, remote support, small business

Share:

VISIT US

Recent Posts

  • How to Stay Focused Working from Home
  • “So Slow!” Is it your Computer or your Internet Connection?
  • Is Your Tech Partner a Team Player?
  • 5 Best Practices for Buying Technology for Employees
  • How to Get Your Devices to Play Nicely Together: Home Networking Help

Recent Comments

    Archives

    • April 2020
    • March 2020
    • February 2020
    • January 2020
    • December 2019
    • November 2019
    • October 2019
    • September 2019
    • August 2019
    • July 2019
    • June 2019
    • May 2019
    • April 2019
    • February 2019
    • August 2018

    FOLLOW US

    Recent Posts

    • How to Stay Focused Working from Home April 28, 2020
    • “So Slow!” Is it your Computer or your Internet Connection? April 13, 2020
    • Is Your Tech Partner a Team Player? April 6, 2020
    • 5 Best Practices for Buying Technology for Employees March 30, 2020
    • How to Get Your Devices to Play Nicely Together: Home Networking Help March 23, 2020

    Tags

    #bestservice #computerrepair #coronavirus #covid19 #IT #nocontract #qualitycomputers #remoteworkforce #remoteworking backup bad hard drive cloud computer repair consumer data loss data recovery email Hacker msp new computer new laptop online safety QualityCareSuite recover data remote support repair sale scam service small business Webcam

    Copyright © 2022 · Quality Computers · 2940 Riverside Drive, Macon, GA 31204