5 Ways to Help You Stay Protected Online

Posted by admin on Mar 1, 2013

What is Phishing?
Phishing is when someone tries to trick you into revealing your personal information like user names, passwords, or PIN by pretending to be someone they’re not. It usually happens through email, but can also happen through instant messaging or by telephone when someone asks you to provide or confirm your personal information.

Avoiding Phishers
It’s a good idea to open up a browser window and type the URL directly into the address bar of the browser instead of copying and pasting (or clicking on) links from emails. A link in an email may take you to a site that looks legitimate, but isn’t. Banks and credit card companies, usually do not ask you to click on links in their email communications for your protection. Another option is to bookmark the site in your Favorites list so you are always taken to the proper website.

Don’t forget about DoubleSafe
When you’re logging in, many sites will ask you additional questions to confirm your identity. If you don’t see those questions, or something looks a bit fishy, then immediately close your browser and call the company instead.

Change your PIN or Password sometimes
You should change your PIN or Password at least once a year – more often if you think your account may have been compromised.  In fact, if your computer has been infected with a virus or malware, change your passwords again (after the computer is cleaned of course).  It is possible that the malware has captured the password, and will use it to wipe out your account.

It’s okay to blow the whistle
If you ever receive a suspicious email or call, simply don’t provide any personal or sensitive information and get in touch with the company directly to follow up on the inquiry.  In fact, when my credit card was compromised, the credit card company called me to tell me what had happened.  They also told me to hang up, and call the number on the back of the card, to verify that I was speaking with the correct people, and that it was not a scam.  I thought that was a great idea, and it did put my mind at ease.


Posted in FAQ || No Comments »

Prepare for Digital Disaster

Posted by admin on Feb 8, 2013

Taken from PCWorld Magazine, December 2012

Whether thieves or tornadoes threaten your company, protecting your business’s assets from utter catastrophe is easier than you might think. You don’t have to look hard to find tales of technological catastrophe. Disaster planning is essential for individuals and businesses of all shapes and sizes. The only real variable is the complexity of the necessary planning.  Here’s how to start.

Backups – There are plenty of backup solutions, but finding the one that is right for you can be tricky.  If you have just one or two systems, and only a few files to backup, then simply plugging in a USB drive and copying the files to it can work.  If you have many systems or lots of files to backup, then maybe a NAS (Network Attached Storage) device would be easier. Then there are numerous online cloud-based backup providers that will automatically backup an unlimited number of systems, with an unlimited number of files, no matter where in the world they are.  If you don’t have a reliable backup plan in place… make one… and stick to it.

Antimalware and Data Security – This is simple… make sure you have an antivirus program installed, that you keep it updated, and you run regular scans.  This is the cheapest way to keep your system safe.  If you have many systems, or a server to manage, there are enterprise versions that allow you to manage all the systems from one place.  For business, I would recommend staying away from the “free” programs, as they do not offer support when the need arises.

Physical Security – Every business owner knows to lock the doors and install an alarm system to guard valuable assets on the premises, but you should also take action to protect your computer equipment in particular.  Cable locks are great for securing laptops, PCs and monitors to the desk or table they are sitting on.  LoJack for Laptops lets you track a laptop if it has been stolen, and can help the police in locating your system… or wipe its hard drive if it cannot be retrieved.  You can install video surveillance systems in and around your business as well.  Then there are the environmental disasters such as fire, flooding, tornadoes, lightning, etc.  Keep computer equipment off of the floor, make sure all systems have a battery backup unit installed, and don’t forget about your backups!


Posted in FAQ || No Comments »

Returning a Start Button to Windows 8

Posted by admin on Feb 5, 2013

Do you own a system with Windows 8?  Do you wish you could get back that traditional Start Button from Windows XP/Vista/7?

Stardock’s Start8 tool restores a Start Button to the Windows 8 desktop, for just $5.

Longtime Windows users have criticized Microsoft for yanking the Start Button and forcing them to book to the new title-based Start screen rather than letting them opt for the traditional desktop interface.  Start8 drops users directly onto the traditional desktop.  It also adds configuration and personalization options, the ability to search in Control Panel apps, and support for pinning in Jump Lists.  Microsoft has blocked other Start button workarounds, but Stardock believes that it would be very difficult for Microsoft to do the same with Start8.  “The reason Microsoft can’t easily break us… is that those programs relied on a Registry switch to do it, which Microsoft removed,” says Stardock CEO Brad Wardell.  To get the app, click here.


Practice Good Password Habits

Posted by admin on Feb 1, 2013

Taken from PCWorld Magazine, November 2012

If you are like me, you probably haven’t changed the passwords you use in a while.  Your digital privacy is a critical part of your personal privacy, so making a few easy changes to the way you create passwords will pay off in peace of mind.

First, make sure that the password for your primary email account is strong and unique, yet easy to remember.  This means that names and birthdates are poor choices, because someone could guess the password using publicly available information. To create a unique password, think of it not as a single word but as a passphrase that you generate using the same method each time.  First, pick a phrase that is easy to remember, such as your hometown and the name of a pet.  Let’s use “Oakland Jack” as an example.  Multiple words are ideal, because the spaces serve as special characters but are easy to remember.  Next, add a site-specific tweak that ensures your passphrase is unique to that service.  So, for my Outlook password, we could use “ouOakland Jack7”.  Then, I could append the current year to the end of the passphrase.  So my password for Facebook could be “faOakland Jack82012”, which looks like gibberish but is easy to remember because I know the process that generated it.

No password is perfect, of course, which is why you should update yours as often as possible.


Posted in FAQ || No Comments »

Canadian anti-spam legislation (CASL)

Posted by admin on Jan 30, 2013

From the Canadian Chamber of Commerce

Canadian anti-spam legislation and the corresponding regulations have taken a “ban-all” approach to regulating commercial electronic messages (CEMs). All emails, SMS texts, social media sent in a commercial context are captured. The legislation will obligate the sender to obtain consent from the receiver prior to sending a CEM. That consent may not be obtained by sending a CEM. The definitions for consent are quite specific and are more demanding than existing privacy legislation. The legislation also requires an opt-out mechanism in all CEMs which must be backstopped with a database with the details of all business/personal relationships and removals of consent.

The administrative penalties for non-compliance are excessive. The rules would also provide powers for private parties to sue under the legislation.

The broad scope of CASL means that it will impact every single business, association, club, charitable organization and foundation that conducts activities in Canada. Without significant modifications and exceptions, this legislation will impede commercial speech, an essential ingredient of market competitiveness and lead to reduced competition and higher prices.

This legislation will also impose massive compliance costs on businesses that may be ill-equipped to undertake them and will result in economic hardship for both business and not-for-profit organizations. The result will be a corresponding negative impact on local economies.

In its current form, these regulations will impede innovation and competitiveness by needlessly channelling resources away from new ventures and opportunities and by slowing the regular updating of computer software and systems. Ultimately, this legislation and the regulations in their current form will not solve the problem of nuisance/fraudulent messages or of nuisance/malicious software, which are generally initiated outside the jurisdictional reach of the CRTC, the agency tasked with enforcement of the CASL.

Read the rest of this entry »


Posted in FAQ || No Comments »

How Hackable Are You?

Posted by admin on Jan 29, 2013

Taken from PCWorld Magazine, November 2012

If you use email, upload photos, frequent social networks, and shop on the Web, your online profile is likely already out there.  Even if you don’t go online much, bits of your personal data may be available for viewing via digitized public records: Someone could readily find out if you have a mortgage, for example, of if you’ve recently gotten married or divorced.  Here are a few things you can do to protect yourself.

1) Search for yourself and discover what information is out there.  Just type your name into a search engine and see what comes up. Look at the results the way a hacker would… is there enough data to piece together your life?

2) Use passphrases instead of passwords.  The best passwords are randomly generated, but these can be hard to remember.  However, as most passwords are hacked using brute force – in which hackers use a computer to run through all possible combinations, all passwords can be cracked.  The longer the password, the harder it is to crck.

3) Keep your software and antivirus programs up to date.

4) Create unique passwords only for accounts that contain sensitive information – say, email, banking, and social network sites.

5) Be careful about what information you give away to noncritical websites.  If you can’t get past a screen because the website wants you to give up too much information, just make it up!

6) Protect yourself offine by locking your mailbox, shred important documents, and never carry your social insurance card.


Posted in FAQ || No Comments »

Ten Ways to Get the Most From your Wi-Fi-Only Tablet

Posted by admin on Jan 25, 2013

Taken from PCWorld Magazine, November 2012

Chances are, if you have a tablet, it is Wi-Fi only.  That means, it does not have its own cellular based 3G for 4G internet connection.  Check out these ten tips for Wi-Fi-only tablets.

1) Tether your tablet to your cell phone and share one data plan.

2) Get a mobile hotspot, which is a dedicated cellular-based modem and router, built into a small little package.  Hotspots are often faster than a tethered connection, but requires an additional data plan.

3) Pre-load magazines and books using your wireless internet connection before you head out.

4) Use offline mapping apps such as Google Maps’ offline-viewing option.  You just need to look up the route when you are connected to a wi-fi connection first, and then choose “offline viewing”, and you will still get the turn-by-turn directions.

5) Make sure you download any emails, documents and web pages using your wi-fi connection before you head out the door.

6) Load up on games and activities the same way so that you will have lots to do when you are away from an internet connection.

7) You can also use your wi-fi connection to make phone calles using Skype, Google Voice or MagicJack.

 


Posted in FAQ || No Comments »

5 Reasons to Upgrade Your Wireless Router

Posted by admin on Jan 15, 2013

Chances are, years ago, you set up a wireless network in your home for a single task, such as enabling a laptop to access the Internet without having to use a cable. But over the years, numerous other devices have entered the scene that can use your home’s Wi-Fi network — HDTVs for streaming movies and accessing the Internet, printers, smart phones, tablets, video game systems, eBook readers, media players and more.

Can your network handle this increased demand?

If it’s been a few years since you installed a wireless router, the answer is probably no. The latest routers feature 802.11n technology (compared to the older 802.11g/b), which offers faster speeds — especially ideal for streaming video and playing multiplayer games. Some models also have multiple antennae, sometimes referred to as dual-band (2.4GHz and 5GHz speeds), to better handle a number of wireless devices at the same time. These new 802.11n routers also offer a broader range, easier setup and better security. Speaking of security, remember to password-protect your wireless network so your neighbours can’t piggyback on your Wi-Fi for free.

The good news is you don’t need to break the bank to pick up a new wireless router, as prices start at $30 for a basic802.11n model capable of streaming up to 150 megabits per second. Routers that can handle up to 300 Mbps speeds start at $50 and routers with speeds up to 450 Mbps typically start at $100.

There are five reasons to consider the upgrade:
1. Faster speeds: Newer routers can handle streaming high-def video, multiplayer games.
2. Broader distance: Access the Internet anywhere in your home or on a porch or backyard deck.
3. Support for more wireless devices: Connect a couple dozen devices without noticing any slowdown.
4. Better security: Newer routers offer more secure ways to safeguard your network and information.
5. Simpler setup: The latest routers are easier to setup, offering interview-like questions for users to click through to get going.


Networking your Home Theatre System

Posted by admin on Oct 7, 2012

Pretty much all the AV manufacturers agree that networking has become a baseline feature with their products.  Even entry level TVs and Surround Receivers are coming equipped with networking capability.  So why, you may ask?

There are several reasons, but on the most basic level, it allows you to easily download updated firmware (software) for your device, fixing problems and adding features. In addition, however, there is the plethora of sources that you can stream media to and from.  Your new Surround Receiver or TV might be able to stream content from YouTube, Netflix, and internet radio stations without the need for a computer.  You could have a media server (basically a big hard drive full of movies and music) connected to your home network and be able to pull content directly to your TV in the bedroom or the stereo in the kitchen.

Connecting everything with a Cat5e or Cat6 network wire is the best method, but there are a few options for using wireless technology as well.  For HD video, you will want to make sure you use Dual Band wireless devices.  For lower-resolution video and audio, you can get away with the standard wireless technology. Setting up all the devices on your home network can be a bit tricky, but if you plan it out properly, you can save yourself a lot of headaches.  We at ICS are experts at networking, and can help you with this process.

You should stay away from using the routers that are supplied by many Internet Service Providers (ISPs).  Even low-cost entry level routers have better features than the ones provided by your ISP.  We suggest investing in a good quality router and switch that can handle the amount of data traffic you will be running through it.

If you are planning on investing in some new AV equipment, or are interested in networking your home, come in and chat with us.  We can help you with every stage from planning to installation.


In What Ways Does USB 3.0 Differ From USB 2.0?

Posted by admin on Sep 15, 2012

USB 3.0 data transfers have a theoretical maximum speed of 5 gigabits per second, in contrast to the theoretical maximum speed of 460 megabits per second of USB 2.0.  Though you probably won’t obtain the maximum transfer rate during daily use, you should find that you can most files significantly faster via USB 3.0.  In addition, the 3.0 version allows bi-directional communication, so you can move data in both directions at the same time.  Of course, to take advantage of these upgrades you will have to invest in new USB 3.0 devices and cables… and add a USB 3.0 port to your computer if you don’t already have one.


Posted in FAQ || No Comments »