Category Archives: Cybersecurity

Migration to Windows 10

You’re prepared, at least mentally, to begin your migration to Windows 10 because you’ve read What Does Windows 7 End of Life Mean to My Business?  and Getting Ahead of Windows 7 End of Life. Is your hardware ready, though? How you handle your IT (on your own, as needed support, or with a fully managed agreement) will change how you will have to deal with your transition.  The following items should help you decide how to prepare your hardware for the Windows 10 migration. Do It Yourself If you own all of your own equipment and deal with IT issues in-house, then you will want to get started on migrating your devices now. The good news is that Windows 10 is highly compatible withRead Full Article


Getting Ahead of Windows 7 End of Life

With Windows 7 end of life quickly approaching, it’s time to start thinking about what needs to be done to prepare. Technically, regular Windows 7 support has been dead since 2015, however, the extended support period is over January 2020, which means no more updates or security patches. What should you be aware of for EOL? Get ready, you may have some work to do. Many are concerned that their PCs will stop working. That is not the case. Your Windows software will work, but its security will depreciate rather quickly, which could put your PC in danger of cyber-attacks and viruses. Back in 2014, Microsoft ended support for Windows XP. It affected 40% of computers worldwide. Now, years later, it is estimated that aboutRead Full Article


What does Windows 7 End of Life Mean for My Business?

You’ve all heard the panic. Windows is cutting off support for its widely popular version 7 software. January 14, 2020 will officially mark Windows 7 End of Life. Many companies have used Windows 7 since it launched in 2009 and are still actively using it today. So, what’s the big deal? Can you just stick with Windows 7 or will your computer self-destruct? The good news is that your computers will work just fine after the End of Life (EOL) date. However, just because your computer will function doesn’t mean it’s wise to hold onto outdated software. The largest concern for Windows 7 users is security. Since updates and support will no longer be available, your device will be extremely vulnerable to cyber threats. InRead Full Article


Cyber-Crime and Security for SMBs

Did you know the illicit trading of personal data was worth $3.88 billion last year? Cyber-crime is a growing industry known for its innovation. It goes far beyond the image many of us have of some hacker kid in his basement. Many who engage in this activity are professionals and work in large teams. Some may even be sponsored by governments. If you follow the news, you can find large corporations and even government agencies who have fallen prey to hackers and had massive amounts of data compromised. Unfortunately, this has led smaller firms to feel they fly below the radar. In fact, the opposite is true. Small businesses–especially those in regulated areas such as medical, financial, and legal services–need to be hyper vigilant aboutRead Full Article


Computer Hackers 101

Most people are aware of terms like phishing and malware, but do you know those are a part of a larger scheme called social engineering? This is not a new kind of fraud, in fact it’s been used for many years to manipulate a wide range of people into giving up important data about themselves or workplace. A prime example of social engineering goes back to Greek mythology with the Trojan horse. They infiltrated the city of Troy with a “peace offering” filled with soldiers, thus winning the war. With technology at the forefront of our lives, social engineering has entered a new era. Physical human interaction is not necessarily required anymore. Cyber-criminals, better known as computer hackers, can gain information through emails, pop-ups andRead Full Article


Mischievous Malware

Unfortunately, malware is not a foreign term, in fact it’s pretty well known to anyone who uses a computer. There are several types of malware, as well as mediums in which you may receive it. So, before you click on that link for the free cruise you won, think about all of the personal data you could be giving away. First, let’s take a quick tour of the types of malware you may run into. Viruses: These act very similar to the flu virus. Once it gets into a computer, it propagates by copying itself and becoming part of another program. Then just like the flu at an elementary school, it spreads from computer to computer. However, a virus must be activated, by opening orRead Full Article


Phishing 101

Phishing 101 While the number of people falling for sending personal information to the crown prince of Nigeria in hopes of receiving his promised wealth and riches seems to be dropping, phishing remains a major issue. In fact, the number of phishing campaigns pursued by hackers around the world increased 65% in the last year. What exactly is phishing? Hackers mimic the emails, forms, and websites of legitimate companies in an effort to lure people into providing their private, personal information, like credit cards numbers, social security information, account logins, and personal identifiers. The victim typically doesn’t realize they’ve been compromised until long after the event, and oftentimes only after their identify or finances are affected. In the past, an attack was carried out relatively quickly.Read Full Article


Cyber Crime Tips for Local Businesses

Did you know the illicit trading of personal data was worth $3.88 billion last year? Cyber Crime is a growing industry known for its innovation. It goes far beyond the image many of us have of some hacker kid in his basement. Many who engage in this activity are professionals and work in large teams. Some may even be sponsored by governments. If you follow the news, you can find large corporations and even government agencies that have fallen prey to hackers and had massive amounts of data compromised. Unfortunately, this has led smaller firms to feel they fly below the radar. In fact, the opposite is true. Small businesses–especially those in regulated areas such as medical, financial, and legal services–need to be hyper vigilantRead Full Article


Creating a Strong Password

How strong is your password? Did you know that having a weak password is one of the biggest security risks you face? This blog focuses on the best practices related that you can follow to ensure passwords are not your weakest link. A recent article states that 81% of data breaches are caused by poor passwords! Avoid sequences and repetitions: How many times have you used passwords like dollar12345 or $$$BobMckinley. Passwords containing sequences and repetitions are just easier to hack. Avoid using your personal data: Do not make your birth date, bank account number, or address a part of your password. It puts your data at stake if your personal information is stolen. Don’t repeat passwords: Make sure you pick unique passwords every time.Read Full Article


IT Disaster Recovery: Human Error

Human error accounts for the highest percentage of  IT disruptions and emergencies requiring disaster recovery. That’s right, “Hurricane Human,” should be your top concern when considering the proper disaster recovery plan for your business. Did you know that your employees often unwittingly ‘help’ cybercriminals gain access to your system? Often, employees play a part in compromising the security of your IT infrastructure, even without them realizing it. For example- When your employees use their own devices for work purposes such as to access emails, to connect to work servers, or to work on office files. In the event their device gets infected by a malware or hacked, the virus or the hacker gets access to your data as well. Your employees may put your networkRead Full Article


Tech Tips for Small Business Owners

As someone running a small business, you probably have a lot on your plate. You are the core decision maker, responsible for growing your business, keeping your clients happy, and frequently even getting a lot of the work done. Often, when you have so much going on, one area that gets overlooked is IT. When you are so busy looking into other things, the start of IT issues may slip your watchful eyes. In this blog, we discuss the IT red flags that you need to watch out for. Of course, if your business’s IT is managed by Rent-A-Nerd, Inc., we are able to prevent most issues and are alerted to any before they become a problem, so that we can quickly address them. ReadRead Full Article


Stay Cyber-Safe When Shopping Online

As the holiday season kicks off, shoppers everywhere are more and more frequently opting to use their credit cards from the comfort of their homes or offices, taking advantage of online deals. Since the shopping days known as “Black Friday” and “Cyber Monday” are upon us, we thought we’d take a moment to provide some safety tips: 1. Careful with the Clicks We all receive more email promotions than usual around this time of year, and we must all use a little extra caution before clicking those links to promotions! You’ll also be tracking all the incoming shipping notifications for your time-saving online orders, and though you may have dodged the crowds, try to stay vigilant as you sort through those shipment and delay notificationsRead Full Article


IT Managed Service for SMBs

 Understanding Managed IT Services and How They Benefit SMBs   No doubt you’ve heard, or you’ve at least read about, the benefits of managed services as it relates to maintaining your technology. Managed services refer to clearly defined outsourced IT services delivered to you at predictable costs. You know the exact IT services you’ll be getting and what you’ll pay for them. There is no surprise sky-high bill for services rendered.    How Managed Service Providers Work   Managed service providers (MSPs) use remote monitoring and management tools to keep an eye on the performance and overall health of the IT infrastructure that powers your business operations. Your MSP should provide 24/7 remote monitoring, which will alert them to any issue with your servers, devices, hardwareRead Full Article


Business Continuity: What Every Business Owner Should Know

Technology is full of difficult jargon. To further complicate things, certain terms are often used in a different context between one publication or service provider and the next. An example of this is the usage of backup, disaster recovery, and business continuity. These terms are commonly used interchangeably, often resulting in confusion. In an effort to alleviate some of this confusion, let’s describe each physical process. You will see an overlay among all three, although they are each different processes. Backup – In IT lingo, the most basic description of backup is the process by which your data, as in files or programs, is copied from its original location to another. The purpose of this is to ensure that the original files or programs are retrievableRead Full Article


Business Continuity for SMBs

 8 Cold Hard Truths for SMBs Not Worried About Disaster Recovery and Business Continuity   The foundation of any successful business continuity solution is the ability to retrieve data from any point in time from anywhere. When the topic of data recovery and business continuity comes up, many decision makers at smaller businesses and organizations think that they cannot afford to put enterprise-level protections into place.   Further, so many people think bad things only happen to other people. Just because we hear about a fatal car accident on the morning news, doesn’t mean we fixate on that news when we ourselves get into a car and drive to work. So no matter how many times the owner or executive of a small to midsize businessRead Full Article


Data Loss Tech Tips

Small business owners are often worried about data loss. Rightly so, because data loss has the potential to wipe out a business. We have identified the most common forms of data loss so you can see how they fit into your business and assess the risks related to each of these pitfalls.   1. Human Error – Human error – by way of unintentional data deletion, modification, and overwrites – has become much more prevalent in recent years. Much of this is the result of improperly managed virtualization technology. While virtualization and cloud computing have enabled improved business continuity planning for many businesses and organizations, humans must still instruct this technology how to perform. The complexity of these systems often presents a learning curve that canRead Full Article