Learn How to Easily Secure Your Apple ID

When it comes to protecting your Apple ID, it’s better to be safe than sorry. You use this same account across multiple platforms, including FaceTime, iTunes, iMessage, and the App Store. Plus, your Apple ID account holds a fair amount of personal information and payment methods you wouldn’t want ending up in the wrong hands. If you’re wondering if you’re taking the right security measures, keep reading as we cover three easy ways you can secure your Apple ID. Read more

7 Cybersecurity Tips for Remote Workers

Even before the coronavirus outbreak began, telecommuting has been on the rise. There’s been a 159% increase in remote work since 2005. While studies suggest that this trend is beneficial to both employees and employers, it does come with some challenges in terms of online security. Although it’s easier than ever to bring work into the comfort of home, there are more opportunities for breaches in both personal privacy and company security. In this article, we unpack cybersecurity tips for remote workers. Read more

The Importance of Employee Cybersecurity Training

Recent reports from Trustwave reveal that despite companies spending $96 billion on cybersecurity initiatives this year, 100 percent of all web applications continue to be vulnerable to attacks. To protect your company’s data from threats, it’s increasingly critical that employee cybersecurity training takes place in the workplace.

Tips for Employee Cybersecurity Training

Cybersecurity for your company starts with your employees. Utilize the following tips to secure your data and conduct employee cybersecurity training.

  1. Include All Staff Members

No one is immune to hackers and cybersecurity attacks, so ensure all team members complete training. Don’t forget to include upper management, as well as IT department staff.

  1. Review Signs of an Attack

One of the most important lessons in cybersecurity is recognizing signs of an attack. Review common signs that a device or network is under attack such as:

  • Systems running slowly
  • Abnormal activity on the corporate firewall
  • Access logs showing unusual login times and locations
  • Frequent pop-ups
  • Device freezing or crashing

These are just a few ways that attacks may be happening in your office. Encourage employees to alert you if they notice any of the above, or other unusual autonomous activity.

NOTE: Ensure employees that there’s no such thing as a silly question. It’s better to report a problem and it be a false alarm, than to go without reporting a problem and compromise your entire company network.

  1. Explain Password Policies

One simple way that employees can safeguard their information, as well as company data, is using secure passwords. An employee’s password should contain a combination of various letters, symbols, numbers and capitalisations. No two programs or websites should have the same login credentials.

As you can imagine, remembering all of these long, unique passwords can be difficult. Consider investing in password management software like Dashlane for your business to help employees keep track of their secure passwords.

  1. Go Over Preventative Measures

In addition to explaining the importance of password management, your employee cybersecurity training should include information on measures to prevent attacks and security breaches altogether. Provide your employees with the following tips to prevent attacks:

  • When accessing company data remotely, implement multifactor authentication.
  • Keep your operating systems, browsers, and antivirus and security software up-to-date.
  • Regularly update your passwords.
  • Never open attachments or click on links from an unknown sender.
  • Never share sensitive information via email.
  • Back up critical business files and data using cloud services.

For more tips on cyber security, utilise the National Cyber Security Centre’s advice for small and mid-size businesses.

By helping employees understand the threat landscape and how to prevent network vulnerabilities, you are able to make cybersecurity a part of your company culture. For more information on how to protect your business from cyber attacks and to conduct employee cybersecurity training, contact your nearest Computer Troubleshooters office.

Tricks and Treats to Boost Your Personal Cybersecurity

It’s no coincidence that Halloween and National Cybersecurity Awareness Month fall together! Phishing and fraud efforts peak over the holidays, starting in October and continuing through January. While data threats are undoubtedly spooky, these tips from Computer Troubleshooters can help you boost your personal cybersecurity! Read more

3 Tips to Secure Your Gmail

If you’re one of the 1.2 billion monthly active users of Gmail, your online life is probably heavily tied to Google. For many, the account is a primary email address or used with Google Drive for work, so it’s worth making sure that your account is as secure as it can be. Utilise these options to secure your Gmail account.

Easy Methods to Secure Your Gmail Account

man checking emails on laptop

New security threats emerge every day, and Google updates their defence options often to help you protect your data. Continue reading to learn how to defend your Gmail account.

  1. Add Ways to Verify it’s You

    One of the best ways to protect your Gmail account is to utilize 2-Step Verification, and yet, less than 10% of users enable it. 2-Step Verification means that for someone else to get into your account, they not only need to have your Gmail password, but also access to your unlocked phone, or similar. It only takes a minute or two to set up, and Google will walk you through the process.

    It works by adding an extra layer of security onto your account, so when you sign in from an unfamiliar device, you’ll be prompted to enter a one-time use code. Google can send the code via a text message, give you a phone call, or utilise other verification options. After signing in, you can choose whether or not to remember that particular device. Turning off 2-Step Verification allows Google to recognize the device so that you’re only asked for your password the next time you sign in.

  2. Run a Security Checkup

    There are also steps you can take to make sure that your account hasn’t already been compromised. First, navigate to the security sidebar of your Gmail account. You’ll see several different sections to check, each one devoted to a different aspect of your account.

    The top portion of the page will alert you to any potential weaknesses in your account security. Clicking’ secure account’ takes you to a menu that highlights common issues. Here, you can add or update account recovery options. Once you enter a phone number and recovery email, Google can alert you if there’s suspicious activity on your account, and allow you to recover your account if you’re ever locked out.

    Google also lists new sign-ins, password changes, and added recovery options, as well as devices that have been active in the last 28 days. If you see anything you don’t recognize, Google will prompt you to change your password and sign you out of all devices except the one you’re using.

  3. Monitor What Sites and Apps Have Access to Your Account

    Finally, you can view and manage what platforms and pages have access to your account at the bottom of the security page. When you log in on another site using your Google account, it can request basic information, such as your name, email address, and profile picture. Other websites and apps can see and change almost any information in your Google account. In this section, you can see what platforms have access to your account, and remove any that you no longer use or trust.

Securing your Gmail account is quick and easy, and can save you from future problems. Consider adding these security measures or visit your local Computer Troubleshooters office for more help securing your data.

How to Identify a Dangerous Email

With billions of emails sent every day, there’s a huge opportunity for malware and viruses to find their way into your inbox. While the percentage of emails containing dangerous attachments is relatively low at 2.3 percent, keep in mind that translates to millions of emails. The best defence against malicious content delivered to your inbox is knowing how to quickly spot a threat. To help keep you safe from harmful attachments, phishing scams, and more, keep these tips in mind to identify a dangerous email. Read more

Password Best Practices

Two out of five people experience a security incident that could have been avoided with stronger cybersecurity efforts. With today’s technology, you need a password for every online account or device including social media accounts, emails, smartphones, and more. Keeping personal and business data safe begins with a secure password. Utilise these password best practices to avoid becoming a hacking or identity theft victim.

4 Password Best Practices to Keep Your Information Secure

New security threats emerge every day, so it’s crucial to adapt and improve your cybersecurity measures in order to protect your data.

  1. Use Different Passwords for Each Account

person entering password on laptop

While this can seem like an insignificant step in securing your personal or business information, research shows that 73 percent of online accounts use duplicated passwords. Using the same password for multiple accounts is a security risk because once a hacker is able to identify one of your passwords, they can easily login to one or more of your other accounts that use the same password. Ensure your data is protected by assigning original passwords to each account.

  1. Utilise Secure Password Generators

If creating multiple passwords seems challenging, try using a password generator. Select how long the password should be, what symbols and numbers to include, and a strong password will populate. Apple users can take advantage of strong password suggestions when signing up for a new account or changing passwords on their device. Both password generators and Apple suggestions tend to create long passwords in an effort to best secure your data. Since passwords should be difficult to guess, the experts at Computer Troubleshooters recommend using password generators to help you create original login information.

  1. Use a Password Managing Software

Secure passwords include multiple characters and numbers and keeping track of several complex logins can be difficult. Using a password managing software eliminates the need to remember every high-strength password you create and which account it belongs to. Software programs such as Dashlane streamline both personal and business account passwords. You simply need to remember one master password, and LastPass will keep track of the others so you can rest assured knowing your information is secure.

  1. Enable Two-Factor Authentication

Along with using strong passwords, enabling two-factor authentication on all of your accounts ensures your data is safe from security threats. When you log in to an account using two-factor authentication, you are required to prove your identity in two steps. The most common way websites use this is by texting a code to your cell phone, which you then have to enter on the account you’re logging into along with your password. Using two-factor authentication provides an extra layer of security beyond a username and password.

When you’re targeted by a hacker, not only is your personal information at risk, but hackers can also install malware onto your device causing harm to your computer. Utilizing the above password best practices will improve your cybersecurity and your defense against hackers, but passwords are only one component of cybersecurity. Contact your nearest Computer Troubleshooters office to create a personalised plan to secure your data and keep your network safe.

How to Stay Safe Using Public WiFi

As more consumers and businesses alike embrace the on-the-go mentality, finding a public WiFi hotspot is easier now than ever before. While there are plenty of hotspots available – about 362 million to be exact – remember that not every hotspot is trustworthy. Be sure you’re staying safe while using public WiFi with the following tips from Computer Troubleshooters. Read more

Security Guide: How to Keep Your Personal Information Safe

The best defence for potential security threats is to have rock-solid security practices in place. Whether you’re a savvy tech user who works with gadgets daily or one who prefers a more minimalistic lifestyle, it’s important to stay prepared against possible threats. To help assess your current tech safety measures, follow this security guide to keep your personal information safe. Read more

Are you ready for GDPR?

With 2 weeks to go most businesses will have heard of GDPR and have an understanding of what that means for their business. Putting it into practice is where some businesses need help. Read more