If you’ve ever seen co-workers attend a meeting with tape, stickers, or sticky notes over their laptop cameras, you may have wondered to yourself, “Should I cover my laptop camera, too?” Well, it depends on who you ask. Continue reading as Computer Troubleshooters lays out the reasons for covering a laptop’s camera and whether or not it’s effective at keeping you secure. Read more
There has been a lot in the news lately about Microsoft Exchange Servers 2013, 2016 and 2019 having vulnerabilities. If your email is hosted by a third party such as Microsoft 365 then this does not affect you. Read more
When it comes to protecting your Apple ID, it’s better to be safe than sorry. You use this same account across multiple platforms, including FaceTime, iTunes, iMessage, and the App Store. Plus, your Apple ID account holds a fair amount of personal information and payment methods you wouldn’t want ending up in the wrong hands. If you’re wondering if you’re taking the right security measures, keep reading as we cover three easy ways you can secure your Apple ID. Read more
Even before the coronavirus outbreak began, telecommuting has been on the rise. There’s been a 159% increase in remote work since 2005. While studies suggest that this trend is beneficial to both employees and employers, it does come with some challenges in terms of online security. Although it’s easier than ever to bring work into the comfort of home, there are more opportunities for breaches in both personal privacy and company security. In this article, we unpack cybersecurity tips for remote workers. Read more
Recent reports from Trustwave reveal that despite companies spending $96 billion on cybersecurity initiatives this year, 100 percent of all web applications continue to be vulnerable to attacks. To protect your company’s data from threats, it’s increasingly critical that employee cybersecurity training takes place in the workplace.
It’s no coincidence that Halloween and National Cybersecurity Awareness Month fall together! Phishing and fraud efforts peak over the holidays, starting in October and continuing through January. While data threats are undoubtedly spooky, these tips from Computer Troubleshooters can help you boost your personal cybersecurity! Read more
If you’re one of the 1.2 billion monthly active users of Gmail, your online life is probably heavily tied to Google. For many, the account is a primary email address or used with Google Drive for work, so it’s worth making sure that your account is as secure as it can be. Utilise these options to secure your Gmail account.
Easy Methods to Secure Your Gmail Account
New security threats emerge every day, and Google updates their defence options often to help you protect your data. Continue reading to learn how to defend your Gmail account.
Add Ways to Verify it’s You
One of the best ways to protect your Gmail account is to utilize 2-Step Verification, and yet, less than 10% of users enable it. 2-Step Verification means that for someone else to get into your account, they not only need to have your Gmail password, but also access to your unlocked phone, or similar. It only takes a minute or two to set up, and Google will walk you through the process.
It works by adding an extra layer of security onto your account, so when you sign in from an unfamiliar device, you’ll be prompted to enter a one-time use code. Google can send the code via a text message, give you a phone call, or utilise other verification options. After signing in, you can choose whether or not to remember that particular device. Turning off 2-Step Verification allows Google to recognize the device so that you’re only asked for your password the next time you sign in.
Run a Security Checkup
There are also steps you can take to make sure that your account hasn’t already been compromised. First, navigate to the security sidebar of your Gmail account. You’ll see several different sections to check, each one devoted to a different aspect of your account.
The top portion of the page will alert you to any potential weaknesses in your account security. Clicking’ secure account’ takes you to a menu that highlights common issues. Here, you can add or update account recovery options. Once you enter a phone number and recovery email, Google can alert you if there’s suspicious activity on your account, and allow you to recover your account if you’re ever locked out.
Google also lists new sign-ins, password changes, and added recovery options, as well as devices that have been active in the last 28 days. If you see anything you don’t recognize, Google will prompt you to change your password and sign you out of all devices except the one you’re using.
Monitor What Sites and Apps Have Access to Your Account
Finally, you can view and manage what platforms and pages have access to your account at the bottom of the security page. When you log in on another site using your Google account, it can request basic information, such as your name, email address, and profile picture. Other websites and apps can see and change almost any information in your Google account. In this section, you can see what platforms have access to your account, and remove any that you no longer use or trust.
Securing your Gmail account is quick and easy, and can save you from future problems. Consider adding these security measures or visit your local Computer Troubleshooters office for more help securing your data.
With billions of emails sent every day, there’s a huge opportunity for malware and viruses to find their way into your inbox. While the percentage of emails containing dangerous attachments is relatively low at 2.3 percent, keep in mind that translates to millions of emails. The best defence against malicious content delivered to your inbox is knowing how to quickly spot a threat. To help keep you safe from harmful attachments, phishing scams, and more, keep these tips in mind to identify a dangerous email. Read more
Two out of five people experience a security incident that could have been avoided with stronger cybersecurity efforts. With today’s technology, you need a password for every online account or device including social media accounts, emails, smartphones, and more. Keeping personal and business data safe begins with a secure password. Utilise these password best practices to avoid becoming a hacking or identity theft victim.
4 Password Best Practices to Keep Your Information Secure
New security threats emerge every day, so it’s crucial to adapt and improve your cybersecurity measures in order to protect your data.
Use Different Passwords for Each Account
While this can seem like an insignificant step in securing your personal or business information, research shows that 73 percent of online accounts use duplicated passwords. Using the same password for multiple accounts is a security risk because once a hacker is able to identify one of your passwords, they can easily login to one or more of your other accounts that use the same password. Ensure your data is protected by assigning original passwords to each account.
Utilise Secure Password Generators
If creating multiple passwords seems challenging, try using a password generator. Select how long the password should be, what symbols and numbers to include, and a strong password will populate. Apple users can take advantage of strong password suggestions when signing up for a new account or changing passwords on their device. Both password generators and Apple suggestions tend to create long passwords in an effort to best secure your data. Since passwords should be difficult to guess, the experts at Computer Troubleshooters recommend using password generators to help you create original login information.
Use a Password Managing Software
Secure passwords include multiple characters and numbers and keeping track of several complex logins can be difficult. Using a password managing software eliminates the need to remember every high-strength password you create and which account it belongs to. Software programs such as Dashlane streamline both personal and business account passwords. You simply need to remember one master password, and LastPass will keep track of the others so you can rest assured knowing your information is secure.
Enable Two-Factor Authentication
Along with using strong passwords, enabling two-factor authentication on all of your accounts ensures your data is safe from security threats. When you log in to an account using two-factor authentication, you are required to prove your identity in two steps. The most common way websites use this is by texting a code to your cell phone, which you then have to enter on the account you’re logging into along with your password. Using two-factor authentication provides an extra layer of security beyond a username and password.
When you’re targeted by a hacker, not only is your personal information at risk, but hackers can also install malware onto your device causing harm to your computer. Utilizing the above password best practices will improve your cybersecurity and your defense against hackers, but passwords are only one component of cybersecurity. Contact your nearest Computer Troubleshooters office to create a personalised plan to secure your data and keep your network safe.
As more consumers and businesses alike embrace the on-the-go mentality, finding a public WiFi hotspot is easier now than ever before. While there are plenty of hotspots available – about 362 million to be exact – remember that not every hotspot is trustworthy. Be sure you’re staying safe while using public WiFi with the following tips from Computer Troubleshooters. Read more