Ken's PC Repair, LLC Logo
FOLLOW US

Omaha: 402-933-7890

Council Bluffs: 712-318-1933

  • Home
  • Computer Services
  • Game Console Repair
  • Awards
  • Blog
  • Contact
  • Locations
    • Council Bluffs
    • Omaha

Steer Clear of Coronavirus Scams

March 29, 2020 by Ken Pennington

With the world grappling with a health pandemic, scams are shocking. Regrettably, bad actors are everywhere, always looking for opportunities, and they’re seeing one in the coronavirus. This article outlines what you need to watch out for and how to stay cyber safe.

The last thing you want to read right now is that there’s another threat out there – sorry, but it’s true. Cybercriminals take advantage of fear. They take timely concerns and use them to target victims. Using the anxiety and upheaval around coronavirus is their mission.

So far, several coronavirus-related attempts to cyberscam people have been reported. There are examples of:

  • emails that appear to come from government health departments;
  • offering a tax refund to get people to click on malicious links;
  • memos to staff that appear to come from large employers;
  • COVID-19 test offerings from private companies;
  • fake websites promising to sell face masks or hand sanitizer;
  • soliciting donations to help fund a vaccine.

What to Watch Out For

Another concern is the number of bogus websites registered with names relating to COVID-19. The site can look legit but is set up to steal information or infect the victim’s computer with malware.

You may get an email promising the attached information offers coronavirus safety measures, or information shared by the World Health Organization (WHO) if you click on the link, or a similar email pretending to be from a reputable news source, such as the Wall Street Journal (WSJ).

In another example, an email impersonating a healthcare company’s IT team asked people to register for a seminar “about this deadly virus.” Anyone who didn’t question why IT was organizing the meeting clicked to register. By filling out the form, they gave their details to hackers.

What to Do

Be cautious. It’s understandable that you’re anxious, but don’t let that stop you from taking cyber precautions. You should still:

  • be wary of anything that tries to play on your emotions and urges immediate action;
  • question where emails are coming from – remain vigilant even if the communication appears to come from a reliable source;
  • hover over links before clicking them to see where they will take you – for example, in the WSJ example, the Web address was for the “worldstreetjournal”;
  • avoid downloading anything you didn’t ask for;
  • doubt any deals that sound too good to be true (“a mask that stops the virus 99.7% of the time!”);
  • ignore any communications requesting your personal information;
  • don’t be suckered by fraudulent pleas for charity.

Global health organizations generally do not send out emails with advice. Instead, navigate directly to that reputable health institution for real news.

If you’re still not sure about the validity of the communication, check it out. Do so by calling or using another medium to get in touch with the “source” of the received message.

While there is not yet a vaccine for COVID-19, you can put anti-virus protection on your computer. Also, make sure that you’ve applied all available security updates to keep your software safe.

We hope you’ll take care and stay healthy both physically and online in these tough times.

Need help installing security software and keeping your technology safe? Our cybersecurity experts can give your home a tech immunization. Contact us today at 402-933-7890!

Filed Under: Computer Security, Online Security, Remote Workers Tagged With: Computer Security, Online Safety

Share:

Need a Second Opinion? IT Support for Your Home

March 1, 2020 by Ken Pennington

The majority of homes today have at least one computer, and that’s unlikely to be the full extent of the technology. Everyone has a smartphone, and there may be streaming devices, modems, routers, or printers, and – we’re guessing here – “ lots and lots of power cords! When something goes awry with any of this tech, homeowners can feel stuck. In an office setting, there’s the IT support desk, but at home, you could be relying on Google search, YouTube videos, and the efforts of a digital-native teen. Talking with IT experts well versed in residential technology issues can help.

As with doctors, it can be worthwhile to get a second opinion. Having an IT expert for your home can save you money and prevent disasters. With an IT guru on speed dial, you can make smart decisions for buying, repairing, and upgrading tech.

Unfortunately, there are a lot of unscrupulous computer businesses out there. They will take advantage of a buyer’s lack of knowledge about all things tech. Doing your own research is great, but it can get overwhelming. A search for a Wi-Fi-enabled, Mac-compatible printer nets hundreds of options, rankings, and reviews.

You try to evaluate a laptop or printer on function, quality, and price, but all these other elements get mentioned. You don’t even know what they mean! How can you ask the right questions? An IT expert can narrow the field and make recommendations based on your needs. You don’t have to wonder what that salesperson is not telling you.

Maybe you usually go to a big-box store to buy your technology. Yes, they can have good deals, but often there’s a reason that laptop is so cheap or that printer is such a great deal. These temptingly priced technologies can be just too slow to do the job, or they’ll break down sooner. Or that astounding deal on a color printer is going to backfire on you down the road because the cost of the ink is crazy!

With an IT partner providing a second opinion, you can avoid being bamboozled. Your IT support team will take the time to get to know the issues you’re facing and how you plan to use the product. They can steer you towards tech that is good value and makes sense for the problem you’re trying to fix. They’re not trying to sell you the actual technology, only acting as a consultant. They don’t benefit from your buying a particular brand. You don’t go home with something that duplicates or doesn’t work well with your other tech.

The best technology is going to be a combination of the right product at the right quality at the right price.

Beyond Buying – IT Support for You

When it comes to replacing or repairing technology, it helps also to get a second opinion. You wouldn’t want to get surgery when a week with a splint would do the trick, right? Well, you don’t want to buy a new computer to solve a problem that could be fixed by taking off under-performing but processing-power sucking applications. Or pay to repair a device when you could pay the same amount for a new one that works even better in the way you need.

IT support isn’t only for enterprise-sized businesses. Tech experts can help a homeowner:

  • evaluate tech options;
  • identify good deals;
  • make smart upgrades;
  • diagnose computer problems;
  • install security measures;
  • backup data;
  • connect devices.

Get the help you need to keep your computers and technology in top shape at home. Contact us today at 402-933-7890.

Filed Under: Computer Maintenance, Computer Security, Online Security Tagged With: Computer Maintenance, Computer Security, Online Safety

Share:

7 Things You Need to Know About Ransomware

December 15, 2019 by Ken Pennington

Ransomware is a well-named type of cyberattack. Cybercriminals taking this approach kidnap your data. After accessing your network, they encrypt files and demand payment for the passcode. Here are the top seven things you need to know about this business threat.

#1 It Can Happen to You

Cybercriminals rely on your false confidence. Don’t think “it won’t happen to me.” Attacks on government, education, healthcare, or financial institutions get publicity. Yet organizations of all types and sizes are targeted.

#2 Ransomware Spreads Fast

Ransomware is malware, malicious software that can reach throughout a network. So, if Jane from accounting opens a ransomware file, every single computer on your business network could be infected. The virus can spread between businesses, too. Consider the debilitating WannaCry ransomware attack of 2017. Within four days of its first detection in Europe, the strain had spread to 116 countries.

#3 Ransomware Targets People

A common method to send out phishing emails in the hope of having people enter their access credentials. Targeted business communication emails work, too. The attacker gets to know your business first. Then they send an email impersonating a colleague, supplier, or customer asking you to take action or update contact details by clicking on the link or downloading a file.

#4 Ransomware is Costly

Once the ransomware is installed on your system, it locks down your files. To regain access to the files, you need the password or decryption key the attacker supplies when you pay up; that’s if they keep their end of the bargain once you pay the ransom. These are crooks you’re dealing with after all!

In Coveware’s analysis of Q3 2019, the average ransom payment increased by 13% to $41,198 as compared to $36,295 in Q2 of 2019. And that’s just the cost of the ransom. Indirect costs include the cost of downtime, lost revenue, and long-term brand damage. There’s also the expense of removing the ransomware, forensic analysis, and rebuilding systems.

The average ransomware attack in Q3 2019 resulted in 12.1 days of downtime. — Coveware

#5 Ransom Requires Cryptocurrency

Ransom payment is usually made by bitcoin or another cryptocurrency. Your business needs to buy cryptocurrency with actual cash, then transmit the ransom. They choose cryptocurrency because it’s very difficult to trace. It doesn’t help you that bitcoin is not something you can charge back like a credit card.

#6 A Recovery Plan Helps

Planning in advance can help you respond more reasonably. Document plans to disconnect infected computers from the network as soon as possible. Also, power down any machines that could be vulnerable to avoid spreading contagion. You should also discuss in advance whether or not your business will pay a ransom. Weighing the costs and benefits without a deadline on the decision can help you react more strategically.

#7 You Can Take Action

You don’t have to sit around worrying and waiting for a ransomware attack. There are many things you can do to help prevent this type of attack:

  • Filter traffic, preventing it from coming into your network in the first place.
  • Scan inbound emails for known threats, and block certain attachment types.
  • Use antivirus and anti-spam solutions and regularly upgrade and patch vulnerable software.
  • Educate all users about social engineering.
  • Allow remote access to your network only from secure virtual private networks.
  • Back up your data to more than one location so that you can restore any impacted files from a known source.

Ransomware is a lucrative, relatively easy mode of attack for cybercriminals. They could target your business. Contact us today for help implementing the best protection practices to keep your data safe. Call us at 402-933-7890.

Filed Under: Computer Security, Online Security Tagged With: Computer Security, Online Safety

Share:

The Trouble with Trusting Your Online Friends

November 7, 2019 by Ken Pennington

Trust is the foundation of a good relationship – you trust friends to be loyal, sincere, and honest. But when you blindly trust online friends, you could be opening yourself up to cyberattack.

When you hear about a big data breach on the news, you may think you don’t need to worry. You may think, “I don’t do business with that company, so the crooks can’t steal my identity.” Or “my email address and password weren’t involved, so it’s not my problem.” Yet it could be.

One of your friends or family members’ personally identifying information may be hacked. Then, cybercriminals could use that as a stepping stone to get to you.

Think you’re safe when you interact with friends and family on Facebook or Instagram? Those aren’t the sites breached! Again, think twice.

Many people reuse their username and password on more than one site. Imagine the bad guys get hold of an individual’s credentials from a malware attack on a major retailer, or they buy that person’s credentials for a banking site on the Dark Web after a breach. The crooks might try the credentials on those sites to see if they can gain access, but they are also likely to try those same credentials on other sites, too.

What to Watch Out for Among Friends/Family

Hackers prey on our impulse to trust others. They have greater odds of success impersonating a Facebook friend asking for help. If a Nigerian prince emails out of the blue and asks for money, most of us know by now to delete the message immediately. But if Aunt Peggie does the same thing via Facebook, you’re more likely to fall for it.

The same thing happens with malicious content. We all know not to click on attachments from people we don’t know and trust. After hacking a social media account, cybercriminals email all that person’s friends. They might say something appealing such as, “you’ve got to check out this latest hilarious video of my son!” We want to see our friend’s son being funny, so we click, and the trouble starts.

One more note: be wary of whom you accept into your “friends” circle online. Adding your niece’s best friend or your work colleague’s husband may seem like a good idea, but, that’s one more possible vulnerability.

Impersonations of people you trust aren’t only happening on social media. You might get emails that appear to be from companies you trust, vendors you know, or work colleagues. For instance, you might get an invoice from your housekeeping service. It looks like usual, with the same services listed, but the banking details are different. If you don’t catch on, you’ll be paying the crooks instead of your cleaners.

Or you might get an email from a “co-worker” asking you to remind them of a password or account number. It seems like a simple request from someone who can afford to be casual about security with you. But don’t fall for a “hey, what was that password again?” request.

Another area of daily life that cybercriminals target is online selling sites such as eBay. They might hack an account with solid feedback to post items for sale. They’ll accept your payment but never deliver the goods.

Ultimately, don’t rely on that browser lock suggesting a site is secure or the fact that you already know so and so. You may not be actually dealing with that individual. Always confirm, using another method of communication, before sending sensitive info or money.

A managed services provider can help you secure online interactions and home computing networks. Want to learn more? Contact us today at (402) 933-7890!

Filed Under: Online Security Tagged With: Online Safety

Share:

FOLLOW US

Copyright © 2021 · Ken's PC Repair, LLC · 12865 Deauville Dr, Suite 2, Omaha, NE 68137