Tech Tip: Wifi Printers – Leave ‘Em at Home

Many people have printers at home that work with their Wifi. These are usually consumer-grade devices, and really aren’t meant for the workplace. Sure, it seems easy enough to set up, just punch in your Wifi info, and you’re off to the races.

However, these devices are not created with businesses in mind, they are usually not up to the task. Here are some issues that can arise:

  • The printer goes to sleep after 30 minutes—someone will have to “wake up” the printer every time it goes to sleep, and sometimes it doesn’t reconnect to the Wifi.
  • The printer changes it’s number (IP Address) and now no one can print to it. In which case you either have to reprogram the printer, the workstations, or most likely both.
  • The printer disconnects from the Wifi for whatever reason. Again, no printing.
  • Slow printing—Wifi will never be as fast as the fastest hardwire.
  • Some printers can only do Wifi or Wired, not both. So if you plan on connecting your printer to Wifi, you may not be able to plug a network or USB cord into it to use it direct.

Remember, wired anything is always better. What’s more reliable, a home phone line or your cell phone? So please, leave the Wifi printers at home.

Tech Solutions offers comprehensive IT Service and support for businesses, including onsite support, technology consulting, remote monitoring, maintenance, unlimited Help Desk support, and 24/7 emergency support. Take advantage of our FREE Network Health Assessment for new clients. Call (888) 225-2672 or email info@tsboston.com. www.tsboston.com

Beware of Internet Scams During Tax Season

Beware of Internet Scams During Tax Season

We thought it would be appropriate to remind our readers of the possibility of dangerous frauds and scams that occur over the Internet during tax season. You can never be too careful with regard to your home and business at this time of year.

According to the IRS, “phishing” is the top computer scam for tax year 2015. Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication (Wikipedia).

Tax scam victims can find themselves in trouble with the IRS for not filing a proper return after scammers have filed fraudulent returns with stolen personal information. The IRS warns taxpayers to watch out for fake emails or websites that can steal taxpayers’ personal information. “The IRS won’t send you an email about a bill or refund out of the blue,” said IRS Commissioner John Koskinen.

According to CNN Money, if you get an unexpected email claiming to be from the IRS or a related agency, such as the federal tax payment system, do not reply to the email. Also, don’t open any attachments or click on any links. Doing so can allow tax scammers access to your personal information or download viruses or malicious code to your computer.

The IRS warns of a phony e-mail claiming to come from the IRS that has been circulating in large numbers. The subject line of the e-mail often states that the e-mail is a notice of underreported income. The e-mail may contain an attachment or a link to a bogus Web page directing taxpayers to their “tax statement.” In either case, when the recipient opens the attachment or clicks on the link, they download a Trojan horse-type of virus to their computers.

Malicious code (also known as malware), of which the Trojan horse is but one example, can take over the victim’s computer hard drive, giving someone remote access to the computer, or it could look for passwords and other information and send them to the scammer. The scammer will then use whatever information they gather to commit identity theft, gain access to bank accounts and more.

Lastly, the IRS warns about Return Preparer Fraud. Believe it or not, the IRS says “there are some dishonest preparers who set up shop each filing season to perpetrate refund fraud, identity theft and other scams that hurt taxpayers.” They recommend shopping for a tax professional who has a history in the community.

If you receive a suspicious email from someone claiming to be from the IRS, report it immediately to Phishing@irs.gov.

Tech Solutions offers comprehensive IT Service and support for businesses, including onsite support, technology consulting, remote monitoring, maintenance, unlimited Help Desk support, and 24/7 emergency support. Take advantage of our FREE 2-hour service for new clients. Call (888) 225-2672 or email info@tsboston.com. www.tsboston.com

Best Practices: Protect Your Company’s Computer Network

Happy New Year! Tech Solutions would like to wish you a happy, healthy, and PROSPEROUS 2016.

We’d like to help you start the New Year right, and what better way than a review of “Best Practices” with regard to your company’s computer network? Following are some of our most important recommendations for “proactive” rather than “crisis” computer network management.

Install and maintain security software.

You need to make sure that your computer is running software that protects against malicious software. Viruses, spyware, or other potentially unwanted software can try to install itself on your computer any time you connect to the Internet or infect your computer when you use a CD, DVD, or other removable media.

This can result in ruined files, lost company info, company downtime, and costs to repair or replace.

Therefore, the first best practice is to install approved antivirus and antispyware software, Windows security patching, and other recommended safeguards, accompanied by professional software monitoring and management.

Backup your data.

We can’t stress enough the importance of backing up your data—frequently. Situations beyond your control can occur and wreak havoc on your computer network: system crashes, hardware failures, or virus attacks, all of which result in downtime, increased costs, and possibly lost and irretrievable valuable company data.

We recommend backing up your files in multiple places using two different forms of media. There are fast and easy ways to backup these days, e.g., cloud storage, flash drives, and others; you hardly have to think about it at all once the backup of choice is implemented.

Practice the principle of least privilege (PoLP).

This computer security term means, quite simply, don’t log into a computer with “administrator rights” unless you must perform specific tasks. Many CEOs do not realize that running your computer as an administrator makes your network vulnerable to security risks, damage, lost data, and hacking. When you must log in as administrator there are secure procedures that you should follow.

Deploy encryption whenever it is necessary and available.

For highly sensitive data, such as financial, legal, or medical files, encryption is a process of encoding messages or information in such a way that only authorized parties can read it.

Maintain current software and updates.

Install software that alerts you when your current software applications are out of date or require security updates.

Additional best practices to safeguard security and privacy for your company data and your employees include:

• Never share passwords or passphrases.
• Do not click random links.
• Beware of email/attachments from unknowns or with strange subject lines.
• Do not download unfamiliar software off the Internet.
• Log out of or lock your computer when not in use.
• Restrict remote access.

Some of the above suggestions can affect how your computers interact with the network. You should consult with a provider like Tech Solutions before making any changes to avoid disrupting your network connection.

You may have already implemented some of these best practices. If so, good for you. If not, contact us and we’ll be happy to provide you with maximum protection and maintenance of your computer network.

Take advantage of our FREE 2-hour service for new clients. Now that’s starting the New Year on the right foot!

Tech Solutions offers comprehensive IT Service and support for businesses, including onsite support, technology consulting, remote monitoring, maintenance, unlimited Help Desk support, and 24/7 emergency support. Call (888)225-2672 or email info@tsboston.com. www.tsboston.com

Bank Wire Fraud

We have been apprised about a very aggressive form of fraud going around now, and we just wanted to give you a heads up.

What will usually happen is an email from a Top Executive (John Smith) will go to the CFO/Accountant, etc and say something to the effect of:

“Dear Bill, We have been looking into acquiring another company in City/State/Country, and will be moving forward in acquiring this company in XXX. Please keep this strictly confidential. In the next few days, a Mr. William Tate (or whatever name they choose) will be contacting you regarding this. Please coordinate with him anything he will need for this acquisition, etc etc”

In a couple of days, you will probably get an email or even a phone call from “William”. He will probably tell you that he is reaching out to you, and that John Smith wanted him to reach out to you. He will then start to discuss a wire transfer. And in short, after this wire transfer is completed, you will never see the money again.

They are getting pretty sneaking and bold. Not to get too technical, however, the email may “look” like it’s from the President/Exec, however, hidden in every email is a ReplyTo that will basically route your reply to the scammer and not the Exec. Very sneaky, but effective.

Our recommendation is to have ANY and ALL bank transfer requests, or even unusual check requests or invoices, to have a verbal confirmation from the Executive themselves, no matter how desperate the email sounds. If we remain alert and vigilant, we can stop these frauds before they start.