Blog

How to Delete a Gmail Account

Maybe you have one Gmail account too many, or tried it out and prefer the service you were using before, or maybe you’re ready to ditch email altogether. If so – Good luck with that one!

The process isn’t hard. You’ll just be asked to click numerous times, of course, and for your password, too. Still, closing your Gmail account and deleting the mail in it is a pretty straightforward a task.

Here’s what to do to cancel a Gmail account and delete the associated Gmail address:

2. Select Delete your account or services under Account preferences.

 

3. Click Delete Products.

 

TIP: You can also choose Delete Google Account and Data to remove your entire Google account (including your search history, Google Docs, AdWords and AdSense as well as other Google services.

4. Select the Gmail account you want to delete.

5. Type the password to the account over Enter your password.

6. Click Next.

7. Click the trashcan icon (🗑) next to Gmail.

NOTE: Follow the Download Data link for a chance to download a full copy of your Gmail messages via Google takeout.

TIP: You can also copy your email to another Gmail account, possibly a new Gmail address.

 

8. Enter an email address different from the address associated with the Gmail account you are closing under Enter an email address in the How you’ll sign in to Google dialog box.

NOTE: Gmail may already have entered the secondary address you used when creating the Gmail account. The alternative email address you enter here becomes your new Google account username.

IMPORTANT: Make sure you enter an email address to which you have access. You need the email address to complete deleting your Gmail account.

9. ClicSend Verification Email.

10. Open the email from Google (no-reply@accounts.google.com) with the subject “Security alert for your linked Google account” or “Gmail Deletion Confirmation”.

11. Follow the deletion link in the message.

12. If prompted, log in to the Gmail account you are deleting.

13. Under Confirm Gmail Deletion Select Yes, I want to delete example@gmail.com permanently from my Google Account.

14. Click Delete Gmail.

WARNING: YOU CANNOT UNDO THIS STEP! After you click this, your Gmail account and messages are gone.

15. Click Done.

What Happens to Emails in the Deleted Gmail Account?

The messages will be deleted permanently. You will no longer be able to access them in Gmail.

If you downloaded a copy, either using Google Takeout or using an email program, you can still use these messages, of course.

What Happens to Emails Sent to My Deleted Gmail Address?

People who mail your old Gmail address will receive back a delivery failure message. You might want to announce a new or alternate old address to the contacts you care most about.

Tschabitscher, Heinz. “How to Delete Your Gmail Account” Lifewire. November 2018

Posted in: Tech Tips for Business Owners

Leave a Comment (0) →

For Goodness’ Sake, Get a Web Filter

Recently in the news we heard about a government agency being infected with malware because one of its employees watched porn on his work computer.  This mishap could have been avoided if only the organization had a Web Filter in place.

Unfortunately, it was discovered that this employee had been visiting thousands of porn sites, as well as being guilty of  downloading images onto an unauthorized thumb drive.  This type of behavior is a potential nightmare for any organization.  But it’s important to learn from this and know that this could have been prevented if a web filter had been in place. Your employees’ shouldn’t be able to access unauthorized sites like this in the first place.

The Inspector General, who wrote a report on the incident, had some rather obvious recommendations. For starters, he recommended “a strong blacklist policy.” He also recommended regularly checking the web history of employees’ computers to make sure they aren’t visiting websites that could put the agency at risk again.

It’s advice that every company, regardless of size, should be heeding. While you would like to think that employees at small companies are more bought into the mission, it doesn’t mean they aren’t doing foolish things on your computers.

Seems like every week we hear a story blaming employees for being lax about security. They have bad passwords or they fall for phishing scams. They do all kinds of things that compromise your company’s security position, but here’s the thing. You shouldn’t be blaming only your employees, when they are using the systems and policies you’ve put in place.

It is easy for us to blame the user, but as a business owner it is also your responsibility to implement safeguards that will ensure that employees cannot access potentially harmful sites that could end up infecting your network.

This can be easily prevented by simply implementing a web filter!  By doing so you are protecting your valuable business assets.  Your company assets shouldn’t be at risk because one of your employees was poking around questionable websites that exposed your network to the dangers of malware.

You should also consider some basic training to lay the groundwork for what’s acceptable at work. While it might seem like common sense, and it often is, people don’t always behave sensibly. That said, you also have to be careful of being overly rigid when writing the rules of what’s acceptable. For example, some companies have blocked social media when the fact is a lot of business gets conducted on these sites.

In the end, it’s your business and you need to ensure that it’s safe. If you’re allowing employees to explore the internet without any kind of filtering tools, you’re leaving yourself vulnerable to a host of malware. While you can blame the employees for not being smart about the sites they visit, in the end it all comes down to you and putting the tools and training in place to make sure they don’t do that.

Miller, Ron. ” For Goodness’ Sake, Get a Web Filter”. TechCrunch October 2018


As a rule, we implement internet security filtering for all of our “managed clients.”   This service has the potential to stop most ransomware in its tracks, by blocking their ability to contact their command and control server.  We consider this to be as critical a part of your overall security as antivirus protection.

Whether you are in the market for a managed service provider or looking into adding a web filter to your existing network  – we can help.  We can have one of our professional network engineers evaluate your needs, and identify any areas that can be improved.

Email us at support@trinityww.com or give us a call at 732.780.8615 to get more information, or to schedule an appointment with one of our trained professionals.

 

Posted in: Security

Leave a Comment (0) →

How to Easily Clean up Your Mailbox in Outlook

Outlook’s integrated Clean Up tool removes messages from your email folders that you no longer need.

Remove redundant messages from your Inbox (or any other email folder), select Home>Clean Up

1. On the Home tab, in the Delete group, click Clean Up.
2. Click one of the following:

• Clean Up Conversation – The current Conversation is reviewed, and redundant messages are deleted.
• Clean Up Folder – All Conversations in the selected folder are reviewed, and redundant messages are deleted.
• Clean Up Folder & Subfolders – All Conversations in the selected folder and any folder that it contains are reviewed, and redundant messages are deleted.

Change Conversation Clean Up Options:
1. Click the File tab.
2. Click Options.
3. Click Mail.
4. Under Conversation Clean Up do any of the following:

• You can change the folder where items are moved, for Cleaned-up items will go to this folder, click Browse, and then select an Outlook folder. By default, messages are moved to the Deleted Items folder. If you have multiple email accounts in your Outlook profile, each account has its own Deleted Items folder. Messages are moved to the Deleted Items folder that corresponds to the email account.

• Note: This option is not available if the destination is Deleted Items folder: To replicate the folder structure of items Clean Up deletes (when you use the Clean Up Folders & Subfolders command), select When cleaning sub-folders, recreate the folder hierarchy in the destination folder.

Posted in: E-mail, MS Office Tips and Tricks

Leave a Comment (0) →

How Does a VPN Protect You on Public Wi-Fi?

Public WiFi is an especially convenient choice for staying online all the time and is a great alternative to using up your mobile data. We can all agree that it’s great, but are you sure that this free WiFi hotspot you’re connected to right now is safe?

Please note that we strongly recommend that your FIRST and BEST choice is using your personal mobile hotspot!  However, if that is not possible it’s a good idea to know your options which are mentioned here in this article.

 

The main weakness of many free WiFi hotspots provided in coffee shops, airports, hotels, and other public places often lies in poor router configurations and even more frequently – in the absence of strong passwords. The lack of basic protection is precisely what makes WiFi users an easy prey for cybercriminals and other malicious actors that are always on the lookout for gaps in security they can exploit.

Having your credit card details stolen or becoming a victim of identity theft doesn’t sound fascinating, does it? But this is what may happen if you keep connecting your smartphone or laptop to random WiFi networks without taking necessary precautions to keep your data safe.

How and why can hackers attack WiFi networks?

There couldn’t be an easier target for hackers than free unprotected WiFi hotspots: they are super easy to compromise and yet very few people think twice before connecting to them. Once a criminal gets on the same network that you’re on, they can use various techniques to invade your privacy. Here are the most popular ones that require minimum skills and effort:

  • In an Evil Twin attack, cybercriminals use fake access points created to look like the real ones. For example, if a coffee shop provides a wireless guest network named “Espresso_Guest,” hackers could design a similar network of their own and call it “Espresso_Guest_FREE.” The trick is simple, yet effective: once you connect to the evil twin, all your communications become visible to the hacker behind it.
  • Malware injection. Malware is especially nasty – once it infects your device, it can damage or shut down the system, steal your bandwidth, or give cybercriminals complete freedom to access your personal files. As certain types of malware are created to work imperceptibly, it can be extremely difficult to detect and get rid of them. On an unsecured network, malicious code can slip into your device at any time – when buying flight tickets, or having some work done while sipping your morning espresso.
  • In a Man-in-the-Middle (MITM) attack, the cybercriminal stands between your device and a website or service you are trying to access. This allows them to monitor your Internet traffic without you having a clue this is happening. From there, they can watch you typing your passwords, read confidential business emails, and even lure you into fake login pages to steal your banking credentials.
  • WiFi sniffing allows hackers to see all the data that is passing through the network. With the help of pretty basic software, which is easy enough to use and legal to get, they can spy on your browsing activities, see the login information that you type, and break into your online accounts to steal more sensitive data or money.

Securing public WiFi: Steps you need to take

Unfortunately, all of these tricks are easy for even an unseasoned hacker, so it’s extremely important to be aware of the possible threats and learn how to protect yourself. Do not forget basic precautions, because even the most advanced security tools won’t protect you 100%, especially if you tend to look for trouble yourself. Here’s what you should and shouldn’t do on public WiFi:

  • Accept the fact that anyone can fall a victim of cybercrime. Too many people somehow still believe that they are not interesting enough to be hacked. Remember, that in the majority of cases, criminals are not interested in their targets. This is especially true when it comes to being hacked due to weak WiFi security: anyone who joins an unprotected network has equal chances to get their data compromised.
  • Disable automatic connections. This will prevent your device from automatically joining the networks you have previously connected to if you happen to be nearby but are not planning to use them.
  • Don’t just connect to any WiFi. If you see two similarly looking WiFi names, remember that one of them may be fake. Therefore, it’s better to double-check with a staff member before joining a free public network.
  • Don’t log into sensitive accounts: If you’re on public WiFi, perhaps the safest advice is to simply avoid going into your bank accounts and other sensitive accounts that would be most appealing for hackers. This may also include your work email and social networking sites, as people tend to share private information over these channels.
  • Turn off file sharing and check your firewall. Just to be safe, it’s always best to turn off file sharing on your computer while you’re on a public network. If you have this turned on at home, it will allow you to share files across your devices easily. However, that means it’s also easy to have them shared—without your knowing—on public WiFi, so remember to turn it off before you connect. And while you’re turning off the sharing option, go ahead and check that your firewall is turned on. An easy step, but a crucial one.
  • Get a reliable VPN. If you don’t fancy the idea of someone snooping on your online activities and using your sensitive data for their own benefit, buying yourself a reliable VPN is what you should be doing at this very moment.

You can stop a WiFi hacker with a VPN. Here’s how

VPN is by far the most robust protection you can get to protect your privacy and stay secure on public WiFi at the same time.

Contrary to what many people think, VPN is not rocket science, nor is it a geeky tool. It is a virtual private network, which sends your Internet traffic through an encrypted tunnel, making it extremely difficult to intercept or decipher. Once you have a VPN app on your phone, laptop, or tablet, all you have to do is connect to a remote VPN server, and you can join any wireless network without putting yourself at risk of becoming a hacking victim.

What’s more, VPN allows you to hide your location by replacing your IP address with the IP of their remote VPN server. Not only does this help to protect your identity from hackers, ISPs, and other snoopers, it also allows you to securely access restricted websites. This is particularly handy if you are traveling abroad and want to keep access to your favorite content and social media services.

With a VPN on, you can securely connect to public WiFi provided at your hotel room and enjoy all the entertainment you want as if you were at home.

How to choose the best VPN for WiFi security  – also check out: The Best VPN Services of 2018 by PC Magazine

With the Internet full of VPNs claiming to be the best for your privacy, you may feel a little confused which one to choose. Although getting a free VPN service may seem like a right choice, you may want to know that free VPN providers often make money by collecting and selling their customers’ data. Another disadvantage of such services is that they usually put monthly caps on users’ speed and bandwidth. Therefore, subscription VPN services are always a better option, because you know you get what you pay for.

Here’s what you get when you choose to protect your privacy with NordVPN:

  • Strong encryption is the first thing you want from your VPN. NordVPN secures your traffic with robust encryption, protecting your data from snoopers and hackers.
  • Even stronger encryption for the most security-focused. Use DoubleVPN to encrypt your communications twice.
  • The ultimate freedom of choice. Pick any of the 4500+ servers in 62 countries to enjoy private and secure browsing.
  • Protection against malicious threats. NordVPN’s CyberSec feature prevents you from visiting malicious sites. A nice bonus – due to this setup, fewer ads will disturb your browsing.
  • Support for up to 6 devices. With one account, you can secure all of your devices or share it with your family members.
  • No logs. We strictly keep no records of your activity online, so you can be sure none of your data is being shared with third parties.
  • Easy setup. Using NordVPN is as easy as preparing your morning coffee. No joke – simply download the app, set it up, pick a server and let NordVPN take care of the rest. Go ahead, try it now, and let us know how you like it.

Remember to always be careful on public WiFi. Hackers are hard workers too, so it’s best to remain vigilant.

Lewis Lambert Fox. “How does a VPN protect you on public Wi-Fi” Original content can be found https://nordvpn.com/blog/securing-public-wi-fi/ 2018 July

Lewis is a content writer at NordVPN and a true explorer when it comes to cyber-security. He’s always on a mission to examine the tech world through the lens of privacy and share his findings and useful tips with blog readers.


 

Please let us know if you have any questions about using Public Wi-Fi, Virtual Private Networks (VPN), or other ways to securely access your network remotely. We would be happy to answer any questions that you may have, and  discuss the right solution for your individual needs.

We can have one of our professional network engineers evaluate your needs, and identify any areas that can be improved.  Email us at support@trinityww.com or give us a call at 732-780-8615 to get more information, or to schedule an appointment with one of our trained professionals.

Posted in: Tech Tips for Business Owners

Leave a Comment (1) →

12 Scams of Christmas: What to Look For and How to Avoid Them

At this busy time of year, you need to be especially vigilant to avoid bogus websites, fake emails, or phone calls that fraudsters set up to take advantage of you or otherwise steal your holiday cheer.

WASHINGTON – Consumers say they will spend an average of $1,007.24 during the holiday season this year, up 4.1 percent from the $967.13 they said they would spend last year, according to the annual survey released today by the National Retail Federation and Prosper Insights & Analytics.  As shoppers set records on spending Better Business Bureau® urges consumers to be prepared for scammers looking to take a bit of your holiday cheer.

BBB® shares the 12 Scams of Christmas and ways to avoid and identify them:

1.     Look-Alike Websites – Many consumers will see an increase in the number of email alerts announcing deals, gifts, and sales. While mailers can look legitimate, the links may lead to look-alike websites meant to trick you into entering private information or give scammers an opportunity to download malware onto your computer. To protect themselves, consumers should:

  • Review the sender’s address, as businesses will often send emails with a proprietary address, like @bbb.org;
  • Look for misspellings throughout the email;
  • Hover over links without clicking to see where they reroute;
  • Only enter sensitive information into a website that begins with “https” as the “s” informs you that it’s secure and information entered is encrypted.

2.     Social Media Gift Exchange – Purchasing one gift and receiving several in return may sound like a harmless way to give and receive presents, but this seasonal scam is a pyramid scheme, which is illegal.

3.     Grandparent Scams – Scammers target seniors posing as a grandchild or other family member and claim they have been in an accident, arrested, hospitalized or another urgent issue. The circumstance often requires money be sent immediately to resolve. Targets should:

  • Verify the situation by calling the family member in question directly;
  • Check with other family members to see if the claims are true;
  • Be wary if you’re asked to wire money or send gift cards in place of making a payment with a credit card.

4.     Temporary Holiday Jobs – Many businesses require a little extra help with the holiday rush and often seek temporary employees, but beware of fraudsters who attempt to glean personal information from applicants. Job seekers trying to avoid this scam should:

  • Apply for to the job in person or by going directly to the retailer’s website (not following links);
  • Be wary of anyone requiring you to hand over personal information over the phone or online before meeting for an interview;
  • Be suspicious of a job that requires you to pay for equipment or software upfront.

5.     Free Gift Cards – Who doesn’t love free stuff especially around the holidays? Scammers hope to take advantage of that fondness through phishing emails and pop-up ads offering gift cards. If you come across one of these offers you should not:

  • Open the email as it can be a phishing attempt but, if you do, don’t click the links. Instead, mark the email as SPAM or JUNK;
  • Share any personal information to receive the card as the scammers will use the information to steal your identity later;
  • Click the ad but close out of the app or program you are using, clear your history and turn on your ad blocker.

6.     E-Cards – Christmas cards are sent out this time of year and while some friends and family may be going high-tech by using e-cards so are scammers. Spot a friendly e-card from a scam by looking for:

  • Whether or not the sender’s name is easily visible;
  • Be wary if you are required to enter personal information to open the card;
  • Avoid opening any suspicious email but if you do and see an attachment that ends in “.exe” which indicates an execute command and could download a virus, do not open it.

7.     Fake Shipping Notifications – Deliveries notifications can often be expected throughout the holiday season as many consumers go online to purchase gifts, but some of these announcements may be phishing scams. These false notification emails often use a legitimate businesses name and logo to trick you into opening the email and allowing thieves to gain access to personal information and passwords. Targets should know:

  • Most online vendors provide tracking information that can be used to verify where your items are and identify the delivery company;
  • You are not required to pay money to receive your package, that payment was made when you make your purchase;
  • Delivery services do not need personal information to deliver your items.

8.     Phony Charities – Charities often get a boost this season as consumers are in the giving spirit but scammers seeking to take advantage can pose as charities or needy individuals soliciting donations. Here are a few tips for spotting scammers:

  • Look for sound-alike names
  • Verify Your Charity at Give.org
  • Review the charities website to make sure they specify their plans for donations and how they will be used to address the issues they claim to combat.

9.     Letters From Santa – Many legitimate businesses offer personalized letters from Santa, but some copycat scammers are only looking to glean personal information from unsuspecting parents.

  • Be suspicious of unsolicited emails offering special prices or packages for letters from Santa.
  • Check bbb.org to verify the legitimacy of any company that offers letters from Santa.

10.  Unusual Forms of Payments – When making your holiday purchases be wary of anyone asking for a strange form of payment as they often can’t be traced or undone. These may include:

  • Prepaid debit or gift cards
  • Wire Transfers
  • Third parties

11.  Travel Scams – Traveling for the holidays can get expensive, and bargains may be tempting, but some offers may be scams that end up costing you more instead of helping you save. To avoid travel scams consumers should:

  • Be cautious when it comes to email offers, especially if it is from an unknown sender or company;
  • Never wire money to someone you don’t know;
  • Ask for references.

12.  Puppy Scams – While a year-round issue, puppy scams hurt families seeking to add a family member to their household for the holidays. Puppy scams are often difficult to avoid as cute pictures, and good deals pull at the heartstrings and wallet. To prevent this fraud, consumers should: 

  • Do an image search online of the photo given of your pet. If multiple websites pop-up, it’s probably a scam;
  • Know what prices to expect because if the cost seems too good to be true, it probably is;
  • Search bbb.org for accredited breeders and rescue shelters;
  • Never pay using a money order or via the Western Union or Moneygram, instead use a credit card, which will give you the added protection of being able to dispute the charges.

 If you come across any of these scams this holiday season help protect yourself and others by:

Better Business Bureau www.bbb.org/article/news-releases/16505-the-12-scams-of-christmas-what-to-look-for-abnd-how-to-avoid-them 2018

Posted in: Tech Tips for Business Owners

Leave a Comment (0) →

How to Find All the Photos Stored on Your Windows 10 PC

Have you ever transferred some pictures to your PC and then forgot where you stored them? Or, maybe you’ve got a few storage hard drives and don’t want to search them manually? Here’s a simple way to get windows to search for all your photos on your computer.

Unfortunately, pictures get stored in different places on your PC depending on the where they come from. Windows itself stores images in your “Pictures” folder. Some syncing services try to respect that, but you’ll often find pictures transferred from things like DropBox, iCloud, and OneDrive in their own folders. If you transfer pictures from your camera or another device directly to your PC, those pictures also can end up in different places depending on the transfer method. And if you download pictures from the internet, they’ll usually end up in whatever download folder your browser is set to use.

If you’re feeling adventurous and want to search for your photos manually, the first two places you should look are your “Downloads” and “Pictures” folders, both of which you’ll find in the “Quick Access” section of the pane on the left of a File Explorer window.

A Better Way: Let Windows Search Find All Your Photos

File Explorer has a quick trick for searching for different types of documents. It’s not exactly hidden, but most people never bother with it.

Open up File Explorer and navigate to the location you want to search. You can search your entire PC by selecting the “This PC” entry in File Explorer’s navigation pane.

You can also search a particular hard drive or folder. For this example, we’re going to search our C: drive.

Next, click the search box at the top right of the window. Doing so will display the otherwise hidden “Search” tab at the top. Switch to that tap, click the “Kind” button, and then select “Pictures” from the drop-down menu.

That inserts the following operator into the search box. If you prefer, you can also type it there yourself to get the same results.

As you can see, the results return everything from pictures used by the system to personal pictures contained within the folder and all its subfolders. The search includes images saved in JPG, PNG, GIF, and BMP formats, which are the most common formats used. If you’ve got pictures stored in another format, like RAW, you’ll have to find them another way.

The search I ran on my C: drive came back with 27,494 pictures.

Once you’ve located the picture(s) you were looking for, you can right-click it, then select “Open File Location” to open the folder where it’s contained.

After you’ve located all the photos stored on your computer, you can move them to a more specific folder–like Pictures– or back them up on an external storage device where they hopefully won’t get lost and forgotten again.

Gavin, Brady. “How to Find All the Photos Stored on Your Windows 10 PC How to Geek, 2018 November

 

Posted in: Tech Tips for Business Owners

Leave a Comment (0) →

7 Signs You Have Malware and How to Get Rid of It

Is your PC acting strange? Look for these signs you have malware, but don’t freak out if it turns out that you do. Our tips can help you get rid of it.

When your PC slows down or acts weird, you don’t always know the cause. Most often, it’s probably just a glitch. But it could be an outward and visible sign of an inward and terrible malware infestation. Review the seven warning signs below. If any of them match your experience, malware may well have compromised your system’s security.

The fact that you’ve got malware protection installed doesn’t mean you can ignore these warning signs. Software isn’t perfect, and sometimes a brand-new malware attack can slip past your security.

1. Popup Ads Start Popping Up Everywhere

While not as common as they used to be, adware programs bombard their victims with advertisements. Sometimes they’re ads for legitimate products, netting an affiliate fee for the adware perpetrator. Other times they contain links to malicious websites that will attempt to drop more malware on your PC.

2. Your Browser Keeps Getting Redirected

Not every site redirect is malicious, but if you find that trying to reach Google takes you to an unfamiliar search site, you’ve got a problem. Sometimes the redirection is less noticeable. For example, a banking Trojan might divert your browser to a fraudulent site that looks just like your bank’s real site. In that case your only clue is the unfamiliar URL in the Address bar. Redirection attacks often rely on browser extensions, so if you suspect a problem, dig into your browser settings and disable or delete any extensions you didn’t install deliberately.

3. An Unknown App Sends Scary Warnings

Creating and distributing fake antivirus programs is a lucrative business. The perpetrators use drive-by downloads or other sneaky techniques to get the fake antivirus onto your system, then display scary warnings about made-up threats. Naturally you have to register a payment before the fraudulent tool will “fix” the problem. And of course, scanning for malware with the fake AV is super-fast, since it’s not actually doing anything.

4. Mysterious Posts Appear on Your Social Media

Malware focused on Facebook and other social media sites propagates by generating fake posts. Typically, these posts include an inflammatory statement of some kind, like “OMG were you really that drunk? Look at this picture!” Anyone who falls for the fake and clicks the link becomes the malware’s next victim.

5. You Get Ransom Demands

Some malware programs literally hold your PC or data for ransom. Overt ransomware threats may encrypt all your pictures and documents and demand that you pay to get them back. Others try to obscure what they’re doing. For example, they may display a warning, purportedly from the FBI or another agency, stating that your computer was used to send spam or view porn, and demanding that you pay a fine before you’re allowed to use it again. Of course, even if you do pay, you may not get your documents back. Antivirus apps and security suites should protect against most malware, but you can also double down on safety with dedicated ransomware protection software.

6. Your System Tools Are Disabled

A smart user, suspecting the presence of malware, might launch Task Manager to investigate, or check settings using Registry Editor. If you suddenly find that trying to use these or other system tools triggers a message saying your Administrator has disabled them, it may well be an attempt at self-defense by malware on your system.

7. Everything Seems Perfectly Normal

That’s right. Some types of malware do their best to hide all activity, leaving no visible traces. Even when you don’t notice anything unusual, it’s possible that a bot on your system may be quietly awaiting instruction from its command and control system. A Remote Access Trojan (or some other form of spyware) may be harvesting your personal information.

So, You’ve Got Malware. Now What?

If you think that malware has taken up residence your PC, install a powerful antivirus application or security suite immediately. Already got one? Then apparently the malware got past its protection. Make sure your antivirus is fully up to date, and run a full scan.If you still have an unwanted app your regular security software can’t get rid of (or you just want to be doubly sure your system is clean) you can scan your PC again with an on-demand cleanup tool, such as Malwarebytes. Do whatever it takes to get that nasty, malicious program out of your system as soon as possible, before it invites friends to make your security problems even worse.

Rubenking, Neil. “7 Signs You Have Malware and How to Get Rid of It” PC Magazine. 2018 August


Right now, we are offering a complementary Dark Web Scan for your business’s email domain. This report will immediately reveal if you or any of your employees have been compromised within the last 36 months.

If nothing turns up, you’ll have peace of mind and you can take preventative actions to make sure it stays that way. On the other hand, if the report reveals a compromise, you are in the best position to take the next logical step towards protecting your business!

You can always contact us at CyberSecurity@Trinityww.com or by calling (732) 780-8615 if you have any questions about what you can be doing to put your business in the best position to avoid a cyber security breach

Posted in: Tech Tips for Business Owners

Leave a Comment (0) →

Nine Good PC Habits You Should Have

Posted in: Tech Tips for Business Owners

Leave a Comment (0) →

Forget Passwords! It’s Time for Passphrases!

 Mr. Henry Williams is a deputy editor for The Wall Street Journal in New York, and he reported on something we just also recommended. Here is an excerpt with a link to the full article at the end. You should forward this to your C-suite:

Two researchers say they have come up with a system that makes passphrases more secure and practical.

We all know the drill: When signing up at a website, you’re told to choose a password. It has to be at least a certain number of characters. It must contain letters and at least one number and perhaps at least one special character. Oh, but some special characters aren’t acceptable.

The death of complicated passwords—which are both hard to remember and not that secure—has been forecast for years, but reality hasn’t quite caught up yet.

Now, however, two researchers have developed an idea for replacing passwords with more-secure passphrases that people will actually remember and use.

Kevin Juang, a former doctoral student at Clemson University, and his co-author and adviser, Joel Greenstein, have created a working prototype of an online system for websites and their registered users to replace passwords with randomly generated passphrases that in theory, in combination with other cues, will be much easier to remember and to enter accurately.

Passphrases have been discussed in online-security research for over 30 years, but most websites and apps still use passwords. Partly, that’s because long passphrases are harder to type, leading to more log-in failures, but it’s also because users tend to pick phrases from common sources, likes song lyrics, making them easy for hackers to figure out. People also sometimes use a passphrase on more than one website, or use a certain word repeatedly to make the passphrase even easier to remember.

Williams, Henry. “Forget Passwords. It’s time for Passphrases” The Wall Street Journal. 2018 September

Wall Street Journal Article: “Forget Passwords It’s time for Passwords”


This is only one aspect of our layered security strategy that our cybersecurity team has been recommending to our customers. To see how fast any of your complex passwords can be cracked, go to www.passfault.com.

A good place to start is to see if your employees credentials (email and password combinations) are on the Dark Web.

Right now, we are offering a complementary Dark Web Scan for your business’s email domain. This report will immediately reveal if you or any of your employees have been compromised within the last 36 months.

If nothing turns up, you’ll have peace of mind and you can take preventative actions to make sure it stays that way. On the other hand, if the report reveals a compromise, you are in the best position to take the next logical step towards protecting your business!

You can always contact us at CyberSecurity@Trinityww.com or by calling (732) 780-8615 if you have any questions about what you can be doing to put your business in the best position to avoid a cyber security breach

Posted in: E-mail, IT Support, Security, Tech Tips for Business Owners

Leave a Comment (0) →

Turn That Outlook Email Into a PDF

I think it’s fair to say that most of us like to organize our documents so that they are easy to retrieve when needed.  Well, did you know that you can save your email as a PDF using Windows 10 built-in PDF printer?

Saving an email as a PDF is a great way to create a clean copy of a mail message, or a receipt so that you can save it with all the proper formatting, file it as a document and easily retrieve it when you need it.  It’s as easy as 1, 2, 3!

Check out this quick & easy Outlook tip!

1. In Outlook click File or use CTRL+P

2. Next select Print.


3.  From the printer options choose Microsoft Print to PDF or a PDF printer that you use such as Adobe, Foxit, etc. and select Print.


4. Choose a folder and Save.

 

You must admit, that was too easy!  Go ahead and give it a try and let us know if you find this helpful.

 

Posted in: MS Office Tips and Tricks

Leave a Comment (0) →
Page 1 of 23 12345...»