Password Protection

Password Protection

Password management is one of the most basic ways of securing your network and data. However, a surprising number of people do not practice password protection, leaving their computer systems vulnerable to hackers.

Hackers are constantly searching for passwords with which to penetrate your computer network. Phishing attacks, for example, will urge your people to log into a fake site using their passwords, recording them if they comply. Some use a brute force method using common words and phrases. Unsecured devices such as a personal computer or mobile device or a hotel kiosk can be infected with malware that captures passwords.

With that in mind, here follow some suggestions for sound password management.

  • Use long strings of characters, a good mix of alphanumeric and special characters. Avoid common words and phrases. Do not use familiar phrases such as birthdays, anniversaries, favorite TV shows, etc.
  • Never write down your passwords and leave the document in an unsecured location. A surprising number of people will write down a password on a post it note and leave it attached to their work station.
  • Never share your password, especially with someone outside your organization.
  • Be wary about logging into the system with a personal device from offsite. Always use a device that has been secured against malware by your data security people.
  • Never respond to phishing attempts. Do not open suspicious emails, and do not comply when they ask you to log into a website using your password. If you think you have fallen for such a scheme, change your password immediately, and contact your data security department,
  • Change your password periodically, at least every quarter.
  • Never use the same password for different devices.
  • Make sure that no one is looking over your shoulder when you key in your password,
  • Run antivirus software periodically to clean your computer of malware, such as a keylog virus that can pick up your password.

For more information contact us.

Economic Security for Businesses

Economic Security for Businesses

As with all other branches of computer technology, the branch of “security” is broad and can be sophisticated depending on how and what security methods are implemented — it doesn’t have to be costly or even sophisticated. A couple of common scenarios are discussed herein.

If a business owner or manager needs security software installed on a network of computers which aims to mitigate the threat of common types of malicious software, that doesn’t necessarily mean monetary resources must be tapped to buy the software.

There are many different types of software that can be downloaded for free from the internet which include free security software suites. The only potential drawback to using free software is the loss of time which it takes to obtain support for using the software — free software is generally harder to obtain support for.

Paid software generally comes with better support from the manufacturer. In summary, the tradeoff between convenience and loss of time must be weighed when deciding whether to use free or paid software.

Another common facet of computer security that should be considered is physical security — how to prevent criminals from getting physical access to a business’ computing devices.

While this side of security can be complex, it doesn’t have to be expensive and can even be managed simply by a business owner or manager.

Installing locks on the right doors allowing employees access to devices and resources only to the extent that allows them to get their jobs done, installing basic security cameras, and locking desks are some fundamental components of physical security that can be accomplished without much use of financial resources.

While for the most part, installing these types of systems are relatively simple, some businesses can require more sophisticated security systems to be installed in which trained professionals may be better-suited for installing and configuring.

For security needs, please contact us for help in making economic choices.

Windows Set to Launch Huge Update in October

Windows Set to Launch Huge Update in October

Windows 10 might be one of the best Microsoft operating systems to come out in a while, but their latest policy regarding major Windows 10 updates is causing quite a stir in the technology industry. Specifically, the large update coming up this October could potentially cause major problems for your organization.

In fact, the latest update could fail, causing your computer to crash in the process. This ultimately leads to frustration and wasted time on your end. The reason this happens is because the system doesn’t have enough storage space on it to install the update.

Microsoft hasn’t informed users of the size of the update, but judging from the update last spring, it could be anywhere from 16GB for the 32-bit operating system to 20GB for the 64-bit operating system.

This wouldn’t be so bad if the update checked your current file storage to make sure the update happens without incident, but that’s not how it works. We’ll walk you through the process to make sure that the Windows 10 update doesn’t break your computer.

Check Your Current Free Storage Space

The easiest and best way to make sure the update doesn’t harm your computer is just to check how much space you have on your computer prior to the update. This makes sure that there’s enough room for the update to go off without a hitch. You can use the aforementioned download sizes as a decent enough guideline.

To check your current storage space, you can follow this path: Settings > System > Storage.

If you don’t have enough room, you have some options. You can empty your Recycling Bin, delete temporary files, and empty your Downloads folder, although you’ll want to be a little careful with what you delete. You want to make sure you don’t throw out something you will need eventually.

Try Out Windows Storage Sense

To access Windows Storage Sense, follow this path: Settings > System Storage > Storage sense. There’s a toggle on this page that lets Windows automatically delete files that you don’t need. Select Change how we free up space automatically and you’ll see a new page that lets you customize these features, including how often Storage Sense deletes files.

You can also use the Clean Now button to immediately begin the process. This gives you an approximation of how much space you need to clean up before you can install the Windows 10 update.

Delete Large Files or Unused Applications

Depending on the kind of computer you’re using (or rather, whether it’s a personal computer or a company computer), you can uninstall apps that are taking up lots of space. Other files to be on the lookout for include video files, large pictures, games, and music files.

Not sure if you have enough room for the Windows 10 update? Be sure to give WheelHouse IT a call at (877) 771-2384.

Precautions While Using the Internet

Precautions While Using the Internet

Every day people are bombarded with advertisements regarding general computer security. Many times it comes in the form of identity protection. Other times it may come in the form of antivirus software. Whatever the case, securing a computer while using the internet is not as daunting as some commercials would have computer users think. There are four very simple ideas one could keep in mind to ensure a very low likelihood of getting “hacked” while using the internet. 

  • Common sense
  • Beware of malicious software
  • Storing passwords on a computer
  • Browser security extensions 

Computers are designed to be an extension of the many ways that people think and are programmed as such. This implies that using common sense while browsing the internet can go a long way in keeping a computer user safe from data theft, identity theft, and other computer crimes. When browsing the internet, if something seems conniving, it may very well be so! Therefore, think twice before clicking that link or accepting that request from an unknown party, to say the least.

Many times that people have their private data stolen or their computer hacked is because “malicious software” is installed onto a computer being used by the victim. Malicious software is any type of software that does something illegal or is intended to generally defy the consent of those who use the computer it’s installed on. Malicious software is usually installed unknowingly by a computer user who thinks that legal and genuine software is being installed — the malicious software is hidden by what appears to be legal and genuine software. The point is that great care should be taken to be sure that the websites in which software is downloaded from are generally safe — malicious software usually comes from websites run by criminals. 

One of the conveniences of using the internet is the option to save usernames and passwords so that subsequent uses of certain websites are easier and quicker to access. The downside of this convenience is that if a computer catches a virus, that virus could be smart enough to record those usernames and passwords that are saved and forward that information to a criminal across the internet. Therefore, the pros and cons of saving usernames and passwords on a computer should be carefully weighed.

Lastly, as an extra measure of protection against internet crime, a computer user can install browser security extensions. A browser is what one uses to access websites on the internet. Internet Explorer, Chrome, and FireFox are browsers. An example of a couple of good browser security extensions is NoScript. A search of “browser security extensions” using an internet search engine will reveal many options to use for browsers. 

Please contact us for assistance in determining a balanced and secure approach to using the internet. 

Managed Security Services Work to Stomp Out Security Problems

Managed Security Services Work to Stomp Out Security Problems

In the course of doing business, many of today’s businesses have encountered some type of major security threat. As these threats get more and more sophisticated, you are beginning to see more businesses and other organizations enlisting the services of companies that are in business to keep their clients safe.

We’ll take a look at some of the services that managed security service provides, and how it fits into a business’ IT strategy. Ransomware had really become a major problem as the calendar changed to 2017. No one could imagine what would have happened over the first few months of the year.

It seemed as if there was a new ransomware attack in the news every day; and, coupled with all the other hacking attacks such as distributed denial of service, phishing, viruses, trojan horses, spoofing, and more, it made it increasingly difficult for the modern business to avoid these threats.

IT service providers, who not only understand the workings of networking and infrastructure, but have proficiency in squelching targeted attacks began to roll out security services.

Sure there have been managed security services for quite awhile, but with businesses and other organizations inundated with such profit-killing IT problems coming from outside their own network, more IT businesses began to focus exclusively on higher-end security services.

Why Use a MSSP?

There are a myriad of reasons to utilize outsourced IT services. Whether you want to get comprehensive support for your information technology, you want to cut your support costs, you want help implementing a specific technology, or you simply want a professional technology consultant on retainer, outsourcing your IT management to WheelHouse IT has substantial value.

The managed security service provider does the same, except instead of focusing on your business’ well being, the service is focused solely on keeping threats from interrupting your business’ progress.

To do so, they meet the complexity of today’s threats with equally sophisticated tools designed to block and eliminate any threat thrown your way. Some of the services your average MSSP will provide include:

  • Managed Identity and Access Management
  • Managed Encryption (Virtual Private Networks)
  • Managed Firewall
  • Managed Data Loss Prevention
  • Managed Intrusion Detection
  • Managed Intrusion Prevention
  • Managed Security Information and Event Management
  • Managed Unified Threat Management

These services take your typical network security and turn up the volume. The MSSP makes certain that your information systems are completely controlled and not useful to anyone outside your organization.

Additionally, the MSSP’s security-focused effort makes compliance to regulatory laws and mandates a priority. By ensuring controls are secure,and reports that show a dedication to keep sensitive data secure, an MSSP is a good investment for any business that relies on regulatory compliance to operate effectively.

With network and cyber security becoming essential considerations for every IT department, companies of all sizes are looking to outsourced IT professionals to handle their network security.

Does your business need a security firm to overlook your business’ network?

Leave your thoughts in the comments section below.