Security – Formerly Nerd4Rent https://www.nerd4rent.com Local, Trusted, Reliable Technology Support for Your Home, Small Business, Home Office. Computer Setup, Networking, Virus Removal, Backup, Windows and Macs. Sun, 29 Oct 2017 23:54:47 +0000 en-US hourly 1 Wi-Fi Vulnerability https://www.nerd4rent.com/wi-fi-vulnerability/ Wed, 18 Oct 2017 19:10:38 +0000 https://www.nerd4rent.com/?p=1338 A significant vulnerability in the security for wireless communication (WPA2), has been discovered. the vulnerability is called KRACK. A hacker using this vulnerability could access your usernames, passwords, and any other information sent over wireless communication. The hacker could also Continue reading Wi-Fi Vulnerability

The post Wi-Fi Vulnerability appeared first on Formerly Nerd4Rent.

]]>

A significant vulnerability in the security for wireless communication (WPA2), has been discovered. the vulnerability is called KRACK.

A hacker using this vulnerability could access your usernames, passwords, and any other information sent over wireless communication. The hacker could also take control of your computer, smartphone, or tablet.

Here are the limitations: The hacker would have to be within wi-fi range of your device. Also, most sensitive information is also encrypted by secure HTTP (HTTPS), meaning the hacker couldn’t access HTTPS-encrypted information.

The fix for this vulnerability will have to come from each equipment manufacturer. Our computers, smartphones, tablets, routers, security cameras, (any device that operates over wi-fi), will need to be updated.

If you have a router from your Internet Service Provider: Comcast, AT&T, Wave, etc., they will likely update it automatically. If you are using your own router, it will probably need to be manually updated once the update is available.

As of October 18, 2017, here’s the status of some common devices:

  1. Microsoft has already released a fix on October 10 th, so if you’re using an updated and supported Windows device, you’re ok.
  2. Google and Samsung devices are listed as vulnerable.
  3. There is no information listed for Apple, but we can assume their devices are vulnerable until we hear otherwise.

What to do

  1. Don’t use public wi-fi if at all possible.
  2. Be super-careful about sending sensitive information over wi-fi (usernames, passwords, social security numbers, credit card numbers). If you must perform sensitive transactions over wi-fi, make sure that the little padlock symbol shows in the top line of your browser, to ensure you’re using HTTPS.
  3. Keep all your devices updated.
  4. Use hard-wired connections whenever possible.

Here are some links for additional information:

This is the official government advisory: https://lamorindatechnology.us7.list-manage.com/track/click?u=59906339194d9866bd4c8e2fd&id=f33c9a338d&e=9f2fc020ee

This is an updated list of update status by vendor: https://lamorindatechnology.us7.list-manage.com/track/click?u=59906339194d9866bd4c8e2fd&id=8ce87d873a&e=9f2fc020ee

The following are two articles that provide useful information:

https://lamorindatechnology.us7.list-manage.com/track/click?u=59906339194d9866bd4c8e2fd&id=e98bc6777a&e=9f2fc020ee

https://lamorindatechnology.us7.list-manage.com/track/click?u=59906339194d9866bd4c8e2fd&id=21e94986f2&e=9f2fc020ee

Hopefully, the vendors will put out updates quickly.

Edward

The post Wi-Fi Vulnerability appeared first on Formerly Nerd4Rent.

]]>
Equifax Breach, Recommended Vendors https://www.nerd4rent.com/equifax-breach-recommended-vendors/ Tue, 19 Sep 2017 17:33:06 +0000 https://www.nerd4rent.com/?p=1342 Recently, Equifax-the giant credit scoring agency-revealed that they suffered a breach of their computer systems, and that about 182 million records may have been compromised. I’m guessing 182 million includes just about everyone with a credit file. The compromised information Continue reading Equifax Breach, Recommended Vendors

The post Equifax Breach, Recommended Vendors appeared first on Formerly Nerd4Rent.

]]>

Recently, Equifax-the giant credit scoring agency-revealed that they suffered a breach of their computer systems, and that about 182 million records may have been compromised. I’m guessing 182 million includes just about everyone with a credit file.

The compromised information includes:
“…primarily names, Social Security numbers, birth dates, addresses and, in some instances, driver’s license numbers. In addition, credit card numbers for approximately 209,000 U.S. consumers, and certain dispute documents with personal identifying information for approximately 182,000 U.S. consumers, were accessed…”

What you should do about this important event.
Go to www.equifaxsecurity2017.com

  1. Click the link titled “enroll”
  2. Enter your last name, last 6 digits of your social security number, and go through the test to prove you’re not a robot.

Most likely, you will see a notification that your information was compromised.

  1. Enroll in the free credit monitoring service. This will help notify you of fraudulent activity on your credit file.
  2. Optionally, you can put a credit freeze or fraud alert on your credit file.

Interestingly, this breach is said to have been caused by unpatched (not updated) software. The takeaway here for all of us is the importance of keeping your operating system, applications, cell phone, tablets, and all other electronic devices software updated. The update for this particular issue appears to have been released months prior to the breach.

———————————————————————————————————————————————————————————————————————————————————-

Featured Vendors
From time-to-time, I will let you know of vendors that I think are exceptional. I will also make a list of these vendors available on our website.

Massage
I’ve been getting massages from Selina for about 3 years. She is so good that I frequently fall asleep on her table. Her office is in Lafayette. If you’re looking for a great massage, please send Selina a email and setup an appointment, selinameng1314@gmail.com.

Real Estate Services
My good friend of over 30 years, Allen Hibbard, is an exceptional real estate broker, based in Berkeley. He has decades of experience, including real estate sales, both commercial & residential, real estate office manager, and real estate trainer. If you’re in need of a great agent, please give Allen a call at (510) 295-3015, or email him at allenhibbard@gmail.com.

Edward

The post Equifax Breach, Recommended Vendors appeared first on Formerly Nerd4Rent.

]]>
Petya Malware-What You Need To Know https://www.nerd4rent.com/petya-malware-need-know/ Thu, 06 Jul 2017 21:45:26 +0000 https://www.nerd4rent.com/?p=1340 Friends, I want to keep you informed and protected. Last week, a very malicious piece of malware was released, that affects Windows computers and servers. It’s called “Petya”. The good news is if you’re a member of our Monitoring/Update, or Continue reading Petya Malware-What You Need To Know

The post Petya Malware-What You Need To Know appeared first on Formerly Nerd4Rent.

]]>

Friends,

I want to keep you informed and protected.

Last week, a very malicious piece of malware was released, that affects Windows computers and servers. It’s called “Petya”.

The good news is if you’re a member of our Monitoring/Update, or Security service plans, we’ve made sure your computer is not vulnerable to this virus. (hint).

For the rest of you, here’s the lowdown.
This virus comes in an email (the most common attack point for all viruses/malware). If you click the attachment, and IF your Windows computer does not have a recent Microsoft update installed, the virus will encrypt not only your files, but your ENTIRE hard drive in a matter of minutes.

The fix? We have to erase your hard drive and reinstall Windows and every application, then restore your files from backup (if you don’t have backups, ALL your files will be lost).

The repair will cost a few hundred dollars. There is no way to recover the encrypted files, unless you pay the ransom demanded (and that may not work either).

Steps to protect yourself
1. Backup your files. Ideally, an online backup service (we like Carbonite), AND a portable hard drive that you connect to your computer only during backups (otherwise the virus could encrypt your local backups too!).

2. Keep your computers operating system AND other software (Adobe Reader, Microsoft Office, etc.) updated.

3. Be very leery of opening ANY attachments in email, even if it comes from a friend. Why? Your friend’s computer/email could have been hacked and the bad guys are sending out viruses in their name.

3. NEVER respond to a phone call, or pop-up claiming that your computer has an issue and you must call/click to get the issue fixed. EVERY ONE of these is from a criminal/liar just trying to get your money.

4. As a service to our treasured clients (that’s you!), you can call or email us if you get a phone call/email/pop-up you don’t understand, and we will let you know if it’s legitimate.

And now for the best part-this service is complimentary (that means we won’t charge you). Please call us BEFORE you talk to the criminal/click the pop-up, etc. If you call after, they may have infected your computer, or taken your money.

As always, please give us a call if you have any questions or need our advice/services. 925-283-5666

PS, when you go on vacation, please do not post your vacation pictures and location until you get back. Criminals are using Facebook and other social media to track who’s away from their home, and burglarize you.

I hope you’re having a great summer!

Edward

The post Petya Malware-What You Need To Know appeared first on Formerly Nerd4Rent.

]]>
WannaCry Malware-What You Need To Know https://www.nerd4rent.com/wannacry-malware-need-know/ Wed, 17 May 2017 23:11:16 +0000 https://www.nerd4rent.com/?p=1348 There’s been a lot of talk about the newest malware called WannaCry that encrypts files on Windows computers. This malware does not affect Macs. It’s a nasty virus that eludes most security software and holds your files hostage unless you Continue reading WannaCry Malware-What You Need To Know

The post WannaCry Malware-What You Need To Know appeared first on Formerly Nerd4Rent.

]]>

There’s been a lot of talk about the newest malware called WannaCry that encrypts files on Windows computers. This malware does not affect Macs. It’s a nasty virus that eludes most security software and holds your files hostage unless you pay a ransom. Even if you pay the ransom, there’s no guarantee you’ll get your files back.

There’s good news and bad news.

The good news: None of our clients have reported being hit with this virus. Congratulations to all of you!!

The bad news: Hundreds of thousands of computers around the world have been infected. There will surely be more of these viruses coming.

Here are some quick tips to help you understand and avoid this and other malware:

  1. Malware doesn’t install itself! In virtually every case, YOU have to allow the installation of any software on your computer. So be super-careful about pop-ups, that request your permission to allow installations of software.
  2. Almost all malware is currently coming through email attachments or links When you click an attachment or link, you’re telling your computer to perform an action. In many cases, it just takes a click or two to install the virus. Be especially wary of ALL attachments and links in email.

Even if the email comes from someone you know or do business with, it could contain a virus. Why? because that person’s computer could have been compromised and their entire address book would be sent the virus. Secondly, it’s easy to put anyone’s name as the “From” in an email.

  1. Make sure you Backup your files. We still see a lot of computers that aren’t being backed up. We recommend that you have an online backup, plus a local hard drive backup.
  2. Make sure to keep your computer operating system updated. This virus cannot work on a computer with updated operating system software. We offer a service for only $8.99 per month per computer that keeps your computer and software updated, tuned-up, and monitored (no brainer folks).
  3. Install PAID anti-virus/security software. It’s better than the free stuff, and it may stop at least some viruses.
  4. If you’re a business, home-based business or have sensitive data to protect, consider a business-class firewall. A business-class firewall can scan for viruses, block malicious websites, etc. If this is something of interest to you, please give us a call to discuss.
  5. There’s no need to buy a second computer for Internet-only use, Turn off your Internet modem when not in use, etc., for most of you. Just follow the above steps, and you’ll likely never have a virus infection. We’re happy to discuss any special needs/circumstances with you.

As always, please give us a call if you have any questions or need our advice/services. 925-283-5666

Best Regards,

Edward

The post WannaCry Malware-What You Need To Know appeared first on Formerly Nerd4Rent.

]]>
Holiday Security Tips; Introducing Lamorinda Technology https://www.nerd4rent.com/holiday-security-tips-introducing-lamorinda-technology/ Tue, 20 Dec 2016 19:46:40 +0000 https://www.nerd4rent.com/?p=1344 Introducing Lamorinda Technology, Inc. As of January 1, 2017, we will be changing our corporate name to Lamorinda Technology, Inc. Why Change the Name? We love the name Nerd4Rent-it’s playful and communicates what we do clearly. However, we have known Continue reading Holiday Security Tips; Introducing Lamorinda Technology

The post Holiday Security Tips; Introducing Lamorinda Technology appeared first on Formerly Nerd4Rent.

]]>

Introducing Lamorinda Technology, Inc.

As of January 1, 2017, we will be changing our corporate name to Lamorinda Technology, Inc.

Why Change the Name?
We love the name Nerd4Rent-it’s playful and communicates what we do clearly. However, we have known for some time that we lose business because some prospective clients think we’re not professional, or don’t take us seriously, simply because of our name. (hard to believe, right?)

We wanted to communicate effectively the true value of our offer: concierge-level technology service at a great price. We also wanted to create a name that reflects our commitment to serving the local community—the Lafayette, Moraga and Orinda neighborhoods where most of our business and residential clients live and work. As a proud business partner of the Lamorinda community for over 20 years, our professional commitment to community and service continues on as Lamorinda Technology, Inc.

Our promises to you remain unchanged:

  • A business philosophy to deliver what we promise.
  • Outstanding, old-fashioned service.
  • Friendly, honest and reliable employees who won’t “speak geek” to you.
  • Technical excellence and a commitment to 100% client satisfaction.
  • Continuous personal oversight by our owner, an expert in his field, and a dedicated local businessman who puts your technology needs first.
  • Helping to maintain your security in these turbulent times.
  • The same concierge-level service that large businesses pay top dollar for—at a reasonable price.

Everything But Our Name Remains the Same
Other than the name change, (and our email and web address), everything else remains the same. We have the same ownership-Renee and Edward; the same outstanding staff – Gica, Ryan & Tim; the same phone number; same great service.

Our new email addresses & website:
support@lamorindatechnology.com – for all support
cleintcare@lamorindatechnology.com – for scheduling appointments and any non-technical questions.
www.lamorindatechnology.com – our new website

For Those of You Who Love Nerd4Rent, We’ve Got You Covered
You are welcome to think of us as Nerd4Rent, and even make out your checks to Nerd4Rent, as we are keeping that as a secondary business name. We will keep the Nerd4Rent email addresses as well.

We thank you very much for your patronage, and wish you and yours a wonderful 2017.

Edward & Renee Zeidan, Owners

Holiday Security Tips

The holidays are a prime time for scammers and thieves. Here are a few quick tips to help you stay safe:

1. Don’t let ANYONE have remote access to your computer. We’re seeing a new scam lately, where you get a pop-up that says your computer has a problem and to call a number for certified technical support. When you call that number a CRIMINAL asks to access your computer. The criminal then adds a special password to your computers’ configuration database that locks your computer when you restart it. We can’t remove that password. They only thing we can do is try to recover your files, and do a clean reinstallation of your operating system and every software program you have.

2. Don’t click on links in email. A link can say one thing, but behind the scenes, take you somewhere else. Open your Internet browser and manually type in the address.

3. NEVER open any attachment with double extensions. For example, you may get a legitimate-looking email with an attachment that is named invoice.pdf.vbs or invoice.zip.js. Any attachment with a double extension is bad news-don’t click on it.

4. Don’t open emails with .zip, .exe, .dmg, .vbs, .js, and any other uncommon file extension. These files can contain programs that can ruin your computer, lock your files, etc. While some .zip files are legitimate, be sure that you check with the sender before opening them. As for the others, don’t open them no matter what.

5. Be especially leery of fake email attachments claiming to contain an invoice, package tracking information, etc. We’re seeing a lot of these emails, and if you click the attachment or link, your computer and files could be damaged or permanently encrypted.

6. Do call us if you are unsure of any pop-up, phone call or email. As a service to our valued clients, we will assist you in determining the legitimacy of these items at no charge.

Just a quick heads-up, ANY call you receive about your computer is going to be from a scammer, and virtually every pop-up you get telling you your computer has an issue and to call a number for support, is also a scam.

We are here to assist if you need help. (925) 283-5666

Edward

The post Holiday Security Tips; Introducing Lamorinda Technology appeared first on Formerly Nerd4Rent.

]]>
Protect Yourself From Ransomware Attacks https://www.nerd4rent.com/protect-ransomware-attacks/ Tue, 14 Jun 2016 17:42:14 +0000 https://www.nerd4rent.com/?p=1299 Ransomware is a growing threat! Don’t be a victim. Our client Bill received an email with an invoice attached. He clicked on the invoice to open it and quickly bypassed a couple of warning pop-ups. Immediately, some malicious code contained Continue reading Protect Yourself From Ransomware Attacks

The post Protect Yourself From Ransomware Attacks appeared first on Formerly Nerd4Rent.

]]>

Ransomware is a growing threat! Don’t be a victim.

Our client Bill received an email with an invoice attached. He clicked on the invoice to open it and quickly bypassed a couple of warning pop-ups. Immediately, some malicious code contained in the invoice file started encrypting all documents, PDF files, music and photos on his computer.

Worse, the code encrypted some files on his company’s server that he had access to, and looked for backup drives, and other computers on the network to attack.

Bill was a victim of ransomware. To see how Bill’s ransomware attack concluded, read on…

What is Ransomware?
Ransomware is malicious software that encrypts files on your computer, backup drives and network. After your files are encrypted with an UNBREAKABLE code, the criminals will ask for payment (ransom) to unlock your files.

The use of ransomware is increasing dramatically, because it’s profitable. There’s no way to know how much money the criminals are taking in, but even published accounts (a very small number of actual incidents), quote tens of millions of dollars of ransom paid in 2015.

According to FBI Cyber Division Assistant Director James Trainor, “There’s no one method or tool that will completely protect you or your organization from a ransomware attack. “But contingency and remediation planning is crucial to … recovery and continuity—and these plans should be tested regularly.”

How does ransomware infect computers?

1. Email attachment: This is the most common method. An email comes in with a legitimate-looking attachment, such as an invoice, fax, or photo. The user is tricked into clicking on the attachment and allowing a program to run.

2. Link to a malicious (or hacked legitimate) website. If your computer is using outdated software, the website will try to install the malicious software without your knowledge, by exploiting a known vulnerability in software like your browser, Java, Flash, etc.

FBI Cyber Division Assistant Director James Trainor, “These criminals have evolved over time and now bypass the need for an individual to click on a link. They do this by seeding legitimate websites with malicious code, taking advantage of unpatched software on end-user computers.”

How can I protect myself from ransomware?

1. The best defense is knowledge. Don’t click on any unverified email attachments.  This alone will stop most ransomware dead in its tracks. Don’t bypass macro security prompts.

2. Backup your files, both locally and online. If the ransomware encrypts your files AND your local backup, you can usually recover from online backup. One of the great features of most online backup services is that they save versions of your files. If the current version is encrypted, you can recover an older, unencrypted version.

3. Keep your operating system and other software updated. Many viruses and ransomware will exploit known vulnerabilities-most of which have been fixed with updated software.

4. Disconnect your backup drives when not is use. If the backup drive is connected when the ransomware hits, it will try to encrypt your backups.

5. Use several layers of malware protection. Anti-virus software alone (especially free versions) is not enough.

6. Use anti-malware software, like MalwareBytes, in conjunction with your anti-virus software.

7. Change your DNS servers. DNS servers like Open DNS will not allow your computer to connect to known malicious websites.

8.  Lock down your computer. Login with a standard user account, and create a password-protected Administrator account that you only use for installing software and administrative tasks. This will prevent most malicious software from installing.

9. Disable macros in documents that come through email or the Internet. Article about disabling macros.

How much money do the criminals demand?
The ransom varies, but we’ve mostly seen $300-$800 demanded.

If I pay the ransom, will I get my files back?
Sometimes. There are many cases where the ransom has been paid and no key is returned. Worse, the criminals require you to pay with untraceable currency, like Bitcoins, which are anonymous and charges can’t be disputed.

What should I do if my files get encrypted?
Try to restore your files from backup
Pay the ransom (not recommended).

According to FBI Cyber Division Assistant Director James Trainor, “The FBI doesn’t support paying a ransom in response to a ransomware attack. Said Trainor, “Paying a ransom doesn’t guarantee an organization that it will get its data back—we’ve seen cases where organizations never got a decryption key after having paid the ransom.

Paying a ransom not only emboldens current cyber criminals to target more organizations, it also offers an incentive for other criminals to get involved in this type of illegal activity. And finally, by paying a ransom, an organization might inadvertently be funding other illicit activity associated with criminals.

So what does the FBI recommend? As ransomware techniques and malware continue to evolve—and because it’s difficult to detect a ransomware compromise before it’s too late—organizations in particular should focus on two main areas:

  • Prevention efforts—both in both in terms of awareness training for employees and robust technical prevention controls; and
  • The creation of a solid business continuity plan in the event of a ransomware attack.

Home computers and Macs are vulnerable to ransomware
if you are a home computer user or a Mac user, all of the above applies to you.

According to FBI’s Trainor “…home computers are just as susceptible to ransomware, and the loss of access to personal and often irreplaceable items—including family photos, videos, and other data—can be devastating for individuals as well

Bill’s story-Continued from above
Bill called us, and we were able to eliminate the malicious code with some virus and anti-malware scans. Luckily for Bill, he had backed up SOME of his files, and we were able to restore them. The files that were not backed up were lost. Bill has since implemented online backup and does not click email attachments.

Resources
FBI Article about ransomware

CERT Article about disabling macros

Open DNS

MalwareBytes

The post Protect Yourself From Ransomware Attacks appeared first on Formerly Nerd4Rent.

]]>
How To Protect Yourself From Scam Phone Calls https://www.nerd4rent.com/protect-scam-phone-calls/ Sun, 06 Mar 2016 23:41:55 +0000 https://www.nerd4rent.com/?p=1267 Executive Summary You receive a call claiming to be from a trusted vendor, claiming they know of some serious issue with your computer that needs immediate attention. The caller asks for remote access to your computer to fix the issue, Continue reading How To Protect Yourself From Scam Phone Calls

The post How To Protect Yourself From Scam Phone Calls appeared first on Formerly Nerd4Rent.

]]>

Executive Summary
You receive a call claiming to be from a trusted vendor, claiming they know of some serious issue with your computer that needs immediate attention. The caller asks for remote access to your computer to fix the issue, and asks for payment.

These calls are scams-hang up. If you are too polite to hang up, ask the scammer to call your tech support department, (that’s us! (925) 283-5666), to setup a contract for service.

Should you allow the scammer/criminal access to your computer, or give them your personal information, at best you will have wasted several hundred dollars. At worst, your bank accounts will be drained, your identity will be stolen, your credit will be ruined for several months to several years, your files will be irretrievably encrypted requiring a ransom payment of several hundred dollars, your email and address book will be hacked, and your computer will require several hundred dollars of service to repair.


Full Article
The Scam-A Phone Call Claiming to be from a Trusted Vendor
A dangerous scam is gaining popularity. Here’s how it goes, and what you should do to protect yourself.

You receive a call claiming to be from a trusted vendor, claiming they know of some serious issue with your computer that needs immediate attention.

The caller will usually ask for remote access to your computer to show you the issue, and then offer to fix the issue for a fee.

The caller may even have information about you or your computer, such as serial number, purchase date, etc., This information, is designed to fool you into thinking that the caller is really from a trusted vendor.

If you give the caller remote access to your computer, they will “show you the problem”, often by running a test on some scam website, installing some scam software that reports hundreds, or thousands of errors, or by going into the normally-hidden areas of your computer and showing you alerts that look serious.

To demonstrate how benign unseen alerts can be used to manipulate you, here’s a screenshot from my own computer. Notice that there are over 6,000 “problems”. None of these “problems” require any attention, but most people would think their computer needs immediate attention if they saw this.
image003

How To Protect Yourself
Do not fall for this confidence game scam.
These people are lying!

Ask them to remove your number from their database, and then hang up. If you’re too polite to hang up, refer to the steps on the next page.

While they may have correct information about you or your computer, they are still criminals running a con. We believe that the client databases of some vendors have been hacked, and that is why they may have your purchase details, etc.

Microsoft has publicly stated that they do not make solicitation phone calls, https://www.microsoft.com/en-us/security/online-privacy/avoid-phone-scams.aspx, and no vendor that we know of does either. Of course this assumes that the legitimate vendor even knows your phone number, or knows what’s going on with your computer (highly unlikely).

Do not talk to them, and do not give them access to your computer or your personal information, such as credit card number, bank account number, etc.

Should you allow the scammer/criminal access to your computer, or give them personal information, you can expect some or all of the things below to occur. We can’t be more specific because it all depends upon what actions the criminal chooses to take once they have access to your information/computer. This list is not exhaustive.

  • You will have wasted several hundred dollars
  • Your bank & investment accounts may be drained
  • Your identity may be stolen:
    • The criminals may open credit accounts in your name
    • They may change your mailing address
    • They may file false tax returns in your name, and collect the refunds at the your new mailing address, leaving you to deal with the IRS
  • Your credit may be ruined for several months to several years, requiring police reports, lots of forms to filled out, hours of time lost, and worst-having to try to prove you’re innocent to creditors
  • Your files may be irretrievably encrypted requiring a ransom payment of several hundred dollars, and you MAY get your files back
  • Your email and address book may be hacked. Your contacts may receive spam emails from your email account. And may get scammed into sending money to the criminals
  • Your computer may be infected with a virus and cost several hundred dollars to repair

We have seen all of these things happen! Don’t be a victim.

To download this article, plus a handy tip sheet, please click the link below
How-To-Protect-Yourself-From-Scam-Phone-Calls.pdf (215 downloads)

The post How To Protect Yourself From Scam Phone Calls appeared first on Formerly Nerd4Rent.

]]>
How To Protect Your Computer And Data From Viruses, Crashes And Other Problems https://www.nerd4rent.com/how-to-protect-your-computer-from-viruses-crashes-and-other-problems/ Fri, 06 Nov 2015 16:37:45 +0000 https://www.nerd4rent.com/?p=1207 Meet Anne. (not her real name). Anne runs a busy accounting office from her home.  She called in a sheer panic one April, because her hard drive died. Unfortunately for Anne, this happened just as tax filing season was near an Continue reading How To Protect Your Computer And Data From Viruses, Crashes And Other Problems

The post How To Protect Your Computer And Data From Viruses, Crashes And Other Problems appeared first on Formerly Nerd4Rent.

]]>

Meet Anne. (not her real name). Anne runs a busy accounting office from her home.  She called in a sheer panic one April, because her hard drive died. Unfortunately for Anne, this happened just as tax filing season was near an end, and she was working literally around-the-clock to finish returns for her many clients. Luckily for Anne, she had taken our advice and had a USB hard drive with a recent image (clone), of her computer on it. We went to Anne’s home office with a replacement hard drive, and copied the image from her USB hard drive to the replacement hard drive. That took about 1.25 hours. When finished, Anne’s computer had all her files, all her applications, all settings, email, printers, wireless, bookmarks-everything just as before. She didn’t lose a thing!

Having that image saved Anne several hundred dollars in labor, along with many hours of downtime, and untold hours of re-work. To say Anne was happy and relieved would be a gross understatement. She was nearly in tears!

The Problem
Lots of things can happen to damage or break your computer. Whether it be a PC or a Mac, viruses, faulty updates, operating system upgrades (windows 10 upgrade issues anyone?…), electrical issues, even user error, to name just a few. When a serious issue occurs, the remedy is often a reinstallation of your Mac or PC operating system. This process requires several hours, on average, for a technical professional, and of course costs quite a bit of money. In the meantime, you don’t have access to your computer.

Another common issue is data corruption or loss. Your computer could be functional, but lose some or all of your files due to hard drive failure (even new hard drives fail sometimes!). If your computer was to die-right now-do you have a copy of all your important files, music, pictures? The vast majority of you would answer “no” to that question. While you can always replace or repair your computer, many files can’t be replaced-pictures, for example.

The Solution
There is an easy, inexpensive solution to this problem. Use imaging software to backup (clone) not only your files, but also your computer operating system, settings, and applications. Imaging software costs around $50, and a hard drive to backup your computer to costs anywhere from $99-$175 retail (often less).

So how does this solution work? Easy, just purchase Acronis True Image for PC or Mac, and a USB hard drive. Install Acronis and create a backup schedule, and Acronis boot disk. Acronis will copy your entire hard drive to the USB hard drive on schedule. If anything happens to your computer or data, you can simply restore the Acronis image in 30-90 minutes. The restored image will be an exact replica of your computer when you backed it up. You won’t need to setup or reinstall any software, or your files.

We use Acronis in our shop frequently. It has proven very valuable when a client has forgotten that they had some important file saved in an unusual location, and their hard drive had to be wiped clean.

Things to note
1. You can buy Acronis True Image from www.acronis.com, online retailers such as Amazon, or at your local electronics store. USB hard drives are available from online retailers and your local electronics store.
2. Buy a large USB hard drive. The more room you have on the drive, the more copies of your backup you can keep on it. This is helpful because you may not realize a problem has occurred for some time, and your recent backups might carry over the problem. Buy a 1-4 Terabyte hard drive for plenty of extra room.
3. Setting up Acronis is easy, but you must use care to select the correct backup options and schedule. You may want to hire an expert for this.
4. Your computer must be left on, or the backup will not work. Many computers are set to go to power-save (Sleep or Hibernate mode) after a period of inactivity. You may need to adjust or turn off the power-save settings during the backup schedule window.
5. I highly recommend that you create a bootable Acronis DVD. In the event that your computer won’t start, you can use this DVD to restore your computer to the last backup.
6. I always recommend that you have cloud backup in addition to a USB hard drive, to protect you from fire, water damage, theft, etc.

If you need help with your backup solution, please contact us at (925) 283-5666 or support@nerd4rent.com

The post How To Protect Your Computer And Data From Viruses, Crashes And Other Problems appeared first on Formerly Nerd4Rent.

]]>
Does Your Phone/Tablet Need Anti-Virus? https://www.nerd4rent.com/does-your-phonetablet-need-anti-virus/ Fri, 23 Oct 2015 21:41:10 +0000 https://www.nerd4rent.com/?p=1199 Everyone knows that your computer needs anti-virus protection. What about your phone or tablet? Phones and tablets are computers, and there are bad guys out there writing viruses and password-stealing programs, with the intention of stealing your money, holding your Continue reading Does Your Phone/Tablet Need Anti-Virus?

The post Does Your Phone/Tablet Need Anti-Virus? appeared first on Formerly Nerd4Rent.

]]>

Everyone knows that your computer needs anti-virus protection. What about your phone or tablet?

Phones and tablets are computers, and there are bad guys out there writing viruses and password-stealing programs, with the intention of stealing your money, holding your phone hostage for ransom, or stealing your list of contacts, pictures, etc. We have heard of viruses being installed that make your phone unusable unless you pay the criminals to have it unlocked.

Think of all the things we do with our phones: Log into our bank to pay bills, check balances, transfer money; purchase things from merchants; buy airline tickets; and much more. Our phones and tablets can be an easy target for the criminals, as most of us don’t protect them.

Here are a few popular apps that will help protect your phone or tablet. Most of them are free. Some vendors offer premium paid versions.

Android phones/tablets. Please remember to only download apps from the Google Play Store
Avira
Norton
Avast
Lookout Mobile Security

iPhones and iPads Please remember to only download apps from the Apple App Store
Avira Mobile Security
F-Secure SAFE

The post Does Your Phone/Tablet Need Anti-Virus? appeared first on Formerly Nerd4Rent.

]]>
Fake Phone Calls Claiming To Be From Microsoft-Hang Up https://www.nerd4rent.com/fake-phone-calls-claiming-to-be-from-microsoft-hang-up/ Tue, 08 Jul 2014 22:45:44 +0000 https://www.nerd4rent.com/?p=1085 If you receive an unsolicited phone call from “Microsoft”, claiming that your computer is having problems, is infected, etc. HANG UP. This is a scam! According to Microsoft, “…Neither Microsoft nor our partners make unsolicited phone calls (also known as cold calls) about Continue reading Fake Phone Calls Claiming To Be From Microsoft-Hang Up

The post Fake Phone Calls Claiming To Be From Microsoft-Hang Up appeared first on Formerly Nerd4Rent.

]]>

If you receive an unsolicited phone call from “Microsoft”, claiming that your computer is having problems, is infected, etc. HANG UP. This is a scam!

According to Microsoft, “…Neither Microsoft nor our partners make unsolicited phone calls (also known as cold calls) about your computer security or software fixes.”

These calls are from shady businesses using phone dialers to RANDOMLY call people and attempting to trick them into giving up control of their computer, so they can be sold services and software that are not legitimate.

Even worse, should you give the scammer remote access to your computer, or install their software, you could very well become the victim of identity theft, or have your money stolen. The “security software” they install could record all your keystrokes, looking for usernames and passwords, it could take screenshots, it could copy any files on your computer, it could encrypt your files irreversibly, and anything else the programmers designed the software to do.

We’ve seen many cases where the “fix” these scammers applied broke the computer, requiring costly repairs. We’ve even seen cases where the scammers have asked for social security numbers, credit card numbers, ATM PINs, drivers license numbers. With some or all of that information, a thief would have an easy time stealing your identity, and possibly gaining access to your financial accounts.

Remember, if you get such a call, the easiest thing to do is hang up. There’s no need to engage in conversation with a scammer.

To read the full article, please click the link: http://blogs.msdn.com/b/securitytipstalk/archive/2014/06/26/is-that-call-from-microsoft-a-scam.aspx  

The post Fake Phone Calls Claiming To Be From Microsoft-Hang Up appeared first on Formerly Nerd4Rent.

]]>