Tech Tip: Wifi Printers – Leave ‘Em at Home

Many people have printers at home that work with their Wifi. These are usually consumer-grade devices, and really aren’t meant for the workplace. Sure, it seems easy enough to set up, just punch in your Wifi info, and you’re off to the races.

However, these devices are not created with businesses in mind, they are usually not up to the task. Here are some issues that can arise:

  • The printer goes to sleep after 30 minutes—someone will have to “wake up” the printer every time it goes to sleep, and sometimes it doesn’t reconnect to the Wifi.
  • The printer changes it’s number (IP Address) and now no one can print to it. In which case you either have to reprogram the printer, the workstations, or most likely both.
  • The printer disconnects from the Wifi for whatever reason. Again, no printing.
  • Slow printing—Wifi will never be as fast as the fastest hardwire.
  • Some printers can only do Wifi or Wired, not both. So if you plan on connecting your printer to Wifi, you may not be able to plug a network or USB cord into it to use it direct.

Remember, wired anything is always better. What’s more reliable, a home phone line or your cell phone? So please, leave the Wifi printers at home.

Tech Solutions offers comprehensive IT Service and support for businesses, including onsite support, technology consulting, remote monitoring, maintenance, unlimited Help Desk support, and 24/7 emergency support. Take advantage of our FREE Network Health Assessment for new clients. Call (888) 225-2672 or email info@tsboston.com. www.tsboston.com

Beware of Internet Scams During Tax Season

Beware of Internet Scams During Tax Season

We thought it would be appropriate to remind our readers of the possibility of dangerous frauds and scams that occur over the Internet during tax season. You can never be too careful with regard to your home and business at this time of year.

According to the IRS, “phishing” is the top computer scam for tax year 2015. Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication (Wikipedia).

Tax scam victims can find themselves in trouble with the IRS for not filing a proper return after scammers have filed fraudulent returns with stolen personal information. The IRS warns taxpayers to watch out for fake emails or websites that can steal taxpayers’ personal information. “The IRS won’t send you an email about a bill or refund out of the blue,” said IRS Commissioner John Koskinen.

According to CNN Money, if you get an unexpected email claiming to be from the IRS or a related agency, such as the federal tax payment system, do not reply to the email. Also, don’t open any attachments or click on any links. Doing so can allow tax scammers access to your personal information or download viruses or malicious code to your computer.

The IRS warns of a phony e-mail claiming to come from the IRS that has been circulating in large numbers. The subject line of the e-mail often states that the e-mail is a notice of underreported income. The e-mail may contain an attachment or a link to a bogus Web page directing taxpayers to their “tax statement.” In either case, when the recipient opens the attachment or clicks on the link, they download a Trojan horse-type of virus to their computers.

Malicious code (also known as malware), of which the Trojan horse is but one example, can take over the victim’s computer hard drive, giving someone remote access to the computer, or it could look for passwords and other information and send them to the scammer. The scammer will then use whatever information they gather to commit identity theft, gain access to bank accounts and more.

Lastly, the IRS warns about Return Preparer Fraud. Believe it or not, the IRS says “there are some dishonest preparers who set up shop each filing season to perpetrate refund fraud, identity theft and other scams that hurt taxpayers.” They recommend shopping for a tax professional who has a history in the community.

If you receive a suspicious email from someone claiming to be from the IRS, report it immediately to Phishing@irs.gov.

Tech Solutions offers comprehensive IT Service and support for businesses, including onsite support, technology consulting, remote monitoring, maintenance, unlimited Help Desk support, and 24/7 emergency support. Take advantage of our FREE 2-hour service for new clients. Call (888) 225-2672 or email info@tsboston.com. www.tsboston.com

Protect Your Computer from Viruses and Other Security Hazards

Every business owner knows that viruses and spyware can destroy data and software, which can be expensive if not impossible to replace. Not to mention company downtime. Believe it or not such a catastrophe can be easily—and usually inexpensively—prevented by installing and maintaining security software.

Viruses, spyware, or other potentially unwanted software can try to install themselves on your computer any time you connect to the Internet. The worst culprits are music, video, game, and art files. But any software can infect your computer when you use a CD, DVD, flash drive, or other removable media.

Some Common Computer Security Terms You Should Know

Antispam: The prevention of unsolicited electronic mail or text messages that are simultaneously sent to a large number of e-mail addresses or mobile phones.

Firewall: A computer system that isolates another computer from the Internet in order to prevent unauthorized access.

Malware: Software intended to damage a computer, mobile device, computer system, or computer network, or to take partial control over its operation.

Phishing: To try to obtain financial or other confidential information from Internet users, typically by sending an email that looks as if it is from a legitimate organization, usually a financial institution, but contains a link to a fake website that replicates the real one.

Spyware: Software that is installed surreptitiously and gathers information about an Internet user’s browsing habits, intercepts the user’s personal data, etc., transmitting this information to a third party.

Windows Security Patching: Windows Update is a service offered by Microsoft, which provides updates for Windows components. The service provides different kinds of updates. Security updates or critical updates protect against vulnerabilities to malware and security exploits. Microsoft routinely releases security updates on the second Tuesday of each month (Patch Tuesday), but can provide them whenever a new update is urgently required to prevent a newly discovered or prevalent exploit targeting Windows users.

System administrators can configure Windows Update to install critical updates automatically so long as the computer has an Internet connection, without the user needing to install them manually, or even be aware that an update is required.

So What Is the Best Security Software Out There?

At this time we recommend two programs, each with their own merit:

  • AVG—Antivirus and antivirus only, no firewall, parental controls, etc.
  • Malwarebytes—The paid version will prevent spyware from being installed. The free version can only clean after the damage is already done.

These recommendations may change in the future, as there are many other solutions that may become better over time.

You should also have patch management software so you can control what patches get installed, in order to increase the stability of your PC and not install every single patch out there.

When (not if) you install approved Internet security software, accompanied by professional software monitoring and management, you’ll be protecting your company and your employees from a multitude of sins. You’ll be ensuring against loss of data, company downtime, and huge expenditures to repair a preventable crisis. And the peace of mind you’ll gain is priceless!

Tech Solutions offers comprehensive IT Service and support for businesses, including onsite support, technology consulting, remote monitoring, maintenance, unlimited Help Desk support, and 24/7 emergency support. Take advantage of our FREE 2-hour service for new clients. Call (888)225-2672 or email info@tsboston.com. www.tsboston.com

 

Best Practices: Protect Your Company’s Computer Network

Happy New Year! Tech Solutions would like to wish you a happy, healthy, and PROSPEROUS 2016.

We’d like to help you start the New Year right, and what better way than a review of “Best Practices” with regard to your company’s computer network? Following are some of our most important recommendations for “proactive” rather than “crisis” computer network management.

Install and maintain security software.

You need to make sure that your computer is running software that protects against malicious software. Viruses, spyware, or other potentially unwanted software can try to install itself on your computer any time you connect to the Internet or infect your computer when you use a CD, DVD, or other removable media.

This can result in ruined files, lost company info, company downtime, and costs to repair or replace.

Therefore, the first best practice is to install approved antivirus and antispyware software, Windows security patching, and other recommended safeguards, accompanied by professional software monitoring and management.

Backup your data.

We can’t stress enough the importance of backing up your data—frequently. Situations beyond your control can occur and wreak havoc on your computer network: system crashes, hardware failures, or virus attacks, all of which result in downtime, increased costs, and possibly lost and irretrievable valuable company data.

We recommend backing up your files in multiple places using two different forms of media. There are fast and easy ways to backup these days, e.g., cloud storage, flash drives, and others; you hardly have to think about it at all once the backup of choice is implemented.

Practice the principle of least privilege (PoLP).

This computer security term means, quite simply, don’t log into a computer with “administrator rights” unless you must perform specific tasks. Many CEOs do not realize that running your computer as an administrator makes your network vulnerable to security risks, damage, lost data, and hacking. When you must log in as administrator there are secure procedures that you should follow.

Deploy encryption whenever it is necessary and available.

For highly sensitive data, such as financial, legal, or medical files, encryption is a process of encoding messages or information in such a way that only authorized parties can read it.

Maintain current software and updates.

Install software that alerts you when your current software applications are out of date or require security updates.

Additional best practices to safeguard security and privacy for your company data and your employees include:

• Never share passwords or passphrases.
• Do not click random links.
• Beware of email/attachments from unknowns or with strange subject lines.
• Do not download unfamiliar software off the Internet.
• Log out of or lock your computer when not in use.
• Restrict remote access.

Some of the above suggestions can affect how your computers interact with the network. You should consult with a provider like Tech Solutions before making any changes to avoid disrupting your network connection.

You may have already implemented some of these best practices. If so, good for you. If not, contact us and we’ll be happy to provide you with maximum protection and maintenance of your computer network.

Take advantage of our FREE 2-hour service for new clients. Now that’s starting the New Year on the right foot!

Tech Solutions offers comprehensive IT Service and support for businesses, including onsite support, technology consulting, remote monitoring, maintenance, unlimited Help Desk support, and 24/7 emergency support. Call (888)225-2672 or email info@tsboston.com. www.tsboston.com