IT PROTECTORATE
  • Home
  • Services
    • COVID-19 Remote Work
    • IT Support
    • HVAC IT Services
    • Industrial IT Services
  • About
    • Why Us?
    • Technology Platform
  • Contact
  • IT Pro Blog
    • Florida Hurricanes
    • IT Maturity Index
  • CyberSecurity Report Card
  • Support Center

What Computer Repair Can Be Done Remotely?

5/26/2020

 
Picture
There are many problems with isolation. We don’t want to get you started. We know it’s true, but one issue we can help with is computer repair. Yes, there are problems with your home devices that we can address remotely.

Perhaps before sheltering in place you were willing to make do, or you're only facing challenges now. You're working at home, kids are online learning, and you're sharing the same computer.

You need to remain connected to the world and continue working, but you don’t want someone to come into your house to check your computer, and you’re not keen on going out to wait in line at a computer repair shop. Fortunately, with technology today, it’s much easier for IT experts to resolve computer issues remotely.

Remote Repair of Home Computers
There are many common computer issues that we can help address remotely. We’ll start out by sending you a link to download a tool that gives us remote access and control of your computer. Please know that we value our customers’ privacy. Even with this tool, we’ll still be able to access the computer only when you allow us to.

Now, what can we do once we have eyes on your computer from our remote location? Many things.

If you’re troubled by a slow computer, we can run diagnostics. We’ll find ways to speed up and optimize your computer to get you back in business more efficiently.

Running into software errors? We can take a remote peek and troubleshoot the issues to get you back on track.

The problem might be due to a virus or malicious software. A remote computer expert can identify security risks and remove viruses or spyware.

Perhaps you have to install software for video conference calls or online learning. With remote access, IT experts can install and set up applications, and personalize them to your needs.

Working from home has many of us setting up separate email accounts, because we need to keep personal and professional communication separate. With authorized access, remote tech support can install email and handle problems.

Your home printer may have been up to the job when it was in use intermittently, but it’s struggling to manage the demands of everyone at home at once. Installing printer drivers and some maintenance tasks are doable through remote support.

Then there’s the big one: data recovery. This is the one that makes people panic. “I’ve lost everything!” Our comforting support team can help recover lost files and restore peace of mind.

Get the IT Support You Need
Another cool thing is that you can sit back and watch us do it if you want to! Our experts can provide this support via online chat or phone conversation. Hey, you’ve been dying to talk to another human lately, right?
​
If the problem with your computer can’t be fixed remotely, we can arrange to pick up and drop off your device. Our people will wear masks and gloves and limit contact if in-person IT help is necessary. Contact us at 606-8FIX for a remote consultation today!

Did You Lock the Door?

10/19/2019

 
LOCK YOUR DOOR.
LOCK YOUR COMPUTER.
LOCK YOUR ACCOUNTS WITH SECURE PASSWORDS.

Locking the door to our homes when we leave is something most do on autopilot. If you drive to work, you automatically lock your vehicle after arriving to your destination (I listen for the beep, and sometimes have to walk back to the car at my wife's disgust to hit that lock button one last time). Checking the physical locks in our life is easy, we don’t even think twice. But what about the digital locks, did you lock them too? Does it matter? Most definitely.

Trust me, you are not alone in the never ending frustration of trying to remember your latest passwords. Even those of us who spend our careers in the IT industry can get a bit tired of it. Which is why many people (even though they know better) often use weak passwords. We have all been guilty at one time or another. But, here is the thing: the small inconvenience of selecting secure passwords and updating them frequently is much easier to handle than a data breach. In a sobering reality check, the 2017 Verizon Data Breach Investigations Report found that 81 percent of data breaches were caused by a password hack.
Think of your passwords like a flood wall made up of sandbags. In one section the sandbags are eight feet tall and four feet deep. Yet, in another section, the wall is only five feet tall and two feet deep. Now, picture flood waters pushing with millions of pounds of pressure on the wall. Maybe the taller and thicker section holds, but then the waters find a weakness in the shorter and more narrow section. Within minutes, the sandbags are pushed aside by the raging waters and the whole neighborhood is buried in damaging flood waters. Like the weaker section of the flood wall, in your organization if even one member of your staff uses a weak password, it exposes the entire business to the risk of a data breach.
This month is National Cybersecurity Awareness Month (NCSAM), at IT Protectorate we encourage you to use this month as an opportunity to remind your team of the importance of selecting strong passwords and updating them frequently. #SecureIT and keep your company’s data safe.

TIPS FOR CREATING A STRONG PASSWORD
  • Avoid common passwords. Do not use "password," "qwerty," "111111," "12345678," "abc123," "password1," or any other easily guessed words/phrases for your password.
  • Use different character types. Most systems and applications these days require or encourage using upper and lowercase characters, numbers and symbols to create a strong password. Even if your systems don’t (we can help enhance your security settings), it is still a best practice to select a password that follows these guidelines.
  • Keep it unique. What happens if one app you use personally gets hacked and you used that same password on other systems, including your work accounts? I’ll give you a hint, it’s not good. Be sure to use a different password for each site and application that you use. You can record the passwords in a physical notepad if needed to remember them, but be sure to store the notepad securely and away from your computer. Seriously, if you write it down somewhere—lock it up in a safe and don’t make it obvious what the passwords are for. If someone were to find your notepad, at least send them on a fishing expedition!
  • Don’t make it personal. Include things like your name, birthday, child's name or other personal information in a password makes it that much easier to get hacked. These are all things hackers can find without much difficulty. Instead opt for unique words and characters that appear to be completely random.
Selecting a strong password is an important piece of your data security shield. In addition, utilizing other tools like multi-factor authentication, using secure networks and practicing privacy precautions on other connected systems (social media especially) are critical to keeping your data safe. The world of technology never stops changing, if you need some advice or want an evaluation on the security of your company, give us a call. #BeCyberSmart and protect your data.

cybersecurity_infographic.pdf
File Size: 193 kb
File Type: pdf
Download File

    Let's Talk Security!

Submit

Preparations for Hurricane Dorian

9/1/2019

0 Comments

 
Please be cautious of Dorian. With Hurricane Irma, we experienced winds that were primarily from one direction. While it looks like we've dodged a bullet, shifts in the direction of the winds as the eye crosses over can pack a punch due to the saturated ground. 

Please be safe and alert, especially as the hurricane gets closer. Being prepared is key as the storm approaches, ensuring that we don't wake up to find out Dorian didn't turn North. 

The Hurricane DR Checklist for Businesses
  • Check recent backups on all systems. Your backup solution or service provider should provide access to an easy to understand status page.
  • Ensure recent backups were sent successfully to the cloud (or other DR site) for each server.
  • Keep in mind, you should establish a method to test your backups through a recovery process quarterly (you may not have time to do this in an emergency).
  • Make sure that any site you/your end users go to have power generation, Internet, and cell phone connectivity.
  • Take corrective action as soon as possible, we're here to help via chat, email, or phone.
0 Comments

Basic Email Security & Training

5/16/2019

0 Comments

 
Picture
Does your business email system have minimum protections in place? There are some simple mail flow rules that can be added to prevent email spoofing, and more advanced techniques to reduce spam. For outgoing email, it’s important to have the correct records in place such as SPF, DMARC, and DKIM to ensure your email doesn’t end up in someone else’s junk box (or blocked entirely).
The Office 365 Security Road map can be found here. These tasks can be overwhelming and sometimes complicated so we recommend against beginners or non-technical users changing any Microsoft Exchange settings, however.
IT Protectorate can review your environment, find areas for improvement, and implement configuration changes to mitigate risk of users being tricked into clicking email. One of the classic cases is someone in accounting receiving an email from the CEO asking to transfer large sums of money into an account. The untrained user may be afraid to question it and just transfer the money as requested…to that prince in a foreign land posing as an executive.
While protecting against everything can reduce productivity, we recommend training end users by presenting them with scenarios such as these and tracking when they fall for the email. IT Protectorate can setup fake email campaigns that track who your problem users are, then we can schedule specific training to reduce the chances of them giving away passwords or transferring money in the real world.
Things like this tend not to be obvious but it is important to have proper checks and balances in place in the digital world. Our focus is on a balance of security and productivity, we’ll be glad to assist in protecting your business data!
0 Comments

Fraud Prevention Checklist

5/6/2019

0 Comments

 
Picture
We’re keeping it simple today. We’d like to offer a checklist that covers simple tasks or things to keep in mind that will prevent fraud at work and your home.
  1. Use strong, unique passwords; we recommend a minimum of 8 characters. If the account has any kind of administrative, remote access, or access to secure or critical data—we recommend a minimum of 12 characters.
  2. Use Two-factor authentication whenever possible. It’s one more step for you, but it is one of the better barriers against your account getting hacked.
  3. Make sure your account information and profiles are up to date. This is critical as you’ll be notified at your active email or phone number when someone is attempting to reset your password.
  4. Keep an eye on your credit reports, look for suspicious activities that weren’t initiated by you.
  5. Be wary of clicking links from unknown sources. This includes email, all messaging apps, or even someone trying to help you (always verify the sources identity).
0 Comments

Identifying & Preventing Scam Emails

9/11/2018

 
Picture
​Have you or a colleague become the victim of a scam email? This tactic commonly employs fishing (in IT-speak, phishing) where the end user is enticed by some reward such as the “you have an e-card from a friend,” or someone posing as your boss or CEO, even a user from another company. Often, we think that will never happen to us—but what if you are the source?

In the same manner that hackers pose as someone you know, they can also pretend to be you. Sometimes they’re able to hack into someone’s email account and wait for the right moment, such as when a transaction is about to take place. Next, they will “spoof” your email address and change the payment method. Before you know it, another user fell for a fake email from someone pretending to be you, and instead of you receiving payment—the user was directed to pay via some other method and the money ended up in the hacker’s pocket.

There are two scenarios which require multiple solutions:

You are a scam/phishing victim.
Someone is pretending to be you.

We first recommend awareness training, whereby IT Protectorate is able to simulate such emails and send them to your users. This identifies those who need training, and sometimes we are able to identify what types of tricks your users are falling for. It may be as simple as recognizing a change in the way someone speaks/types; instead of making that questionable payment, they call you or their superior first to confirm—thereby identifying the attempted attack and hopefully avoiding a loss to the business.

We are also able to check and add configuration to your email environment that reduce hacker’s ability to pretend to be you or one of your users. This prevents embarrassment and a ding to your reputation.

Finally, we want to make sure your email service provides good spam protection. Not only does this reduce the risk of your business from being a victim of phishing scams, most spam filters also prevent viruses and other malware from entering your system. Another benefit that is often are the reduced junk emails that users receive and open; with a quality spam filter, these emails never make it to the inbox, never get read, and keep you from wasting time opening or deleting it—increasing user productivity.
    GET YOUR
    CYBERSECURITY
    REPORT CARD

    Elroy

    Elroy is the man behind the scenes; writing posts, checking status of servers, managing networks and endpoints, and enjoying coffee in his favorite spots in Lakeland and Winter Haven, FL.

    Archives

    May 2020
    March 2020
    February 2020
    January 2020
    December 2019
    October 2019
    September 2019
    June 2019
    May 2019
    April 2019
    September 2018

    Categories

    All
    Awareness
    Backup
    Best Practices
    Business
    Business Ready
    Business-ready
    Challenges
    Checklist
    Cloud
    Coronavirus
    Cybersecurity
    Disaster Recovery
    Email
    Focus
    Fraud Prevention
    Goals
    Home
    Improvement
    Internet
    Isp
    It Support
    Maintenance Program
    Managed Services
    Microsoft
    Office
    Productivity
    Remote Workforce
    Remote Working
    Saas
    Security
    Speed
    Success
    Support
    Technology

    RSS Feed

LAKELAND

CLOUD | MOBILE
Lakeland, FL 33813
​[email protected]
WINTER HAVEN
MULBERRY
BARTOW
Proudly providing worry-free computer support and operational oversight of your technology infrastructure from Lakeland, FL.
Photo from watts_photos
  • Home
  • Services
    • COVID-19 Remote Work
    • IT Support
    • HVAC IT Services
    • Industrial IT Services
  • About
    • Why Us?
    • Technology Platform
  • Contact
  • IT Pro Blog
    • Florida Hurricanes
    • IT Maturity Index
  • CyberSecurity Report Card
  • Support Center