Brain Trust Technologies LLC
TOLL FREE: (877) 288-5527
  • Home
  • Why Brain Trust
    • Partners & Certifications
    • Affiliations
  • Services & Solutions
    • Managed Services
    • Hosted Solutions
      • Business Solutions
    • Hardware & Software Sales
    • Professional Services
    • Business Continuity
  • Blog
  • Resources
    • White Papers
    • Brain Trust Reports
    • Case Studies
    • Newsletter Archive
  • About Us
    • Referral Program
    • Contact Us
  • Support
RSS

Chrome users panic as new scam spreads

February 26, 2018 admin Security 2018february26security_c, browser, chrome, cyberthreat, google, mac, malware, scam, security, web, windows

During the previous quarter, fake Chrome notifications urging users to dial a tech support number have grown dramatically. Research reveals that this tech support scam could possibly use an Application Programming Interface (API) to freeze the browser, convincing the user to get in touch with the support line and share their credit card details.

The End Game

The scam works by displaying an error message indicating a bogus security breach incident that renders a browser unusable. These scammers capitalize on the fact that a serious crash can’t be solved by simply closing the site, thereby sending the users into a panic. This encourages them to dial the number listed on the warning message.

On the other end of the line, the scammers would pose as Microsoft or Apple representatives to convince users into surrendering their credit card details to repair a non-existing security issue. The scams are generally carried out through legitimate sites or malicious ads that have been hacked.

The Ingenious Process

This new scam operates against Chrome by corrupting the window.navigator.msSaveOrOpenBlob programming interface, which basically uses it as a form of distraction. The hackers manipulate the browser and forces it to save a random document on a disk repeatedly at super fast intervals that are impossible to notice. After five to 10 seconds, Chrome will be completely unresponsive.

The Easy Fix

To recover, Windows users simply have to open Windows Task Manager (press ctrl + shift + esc keys) and stop the process there. On the other hand, macOS users just need to wait until a system message prompts them to close the unresponsive Chrome tab. Typically, the latter is a more appealing option since users would have the freedom to close only the corrupted page. Manually closing the whole browser means possibly losing unsaved files in any open Windows.

When faced with IT-related issues, you need to determine how you can approach them calmly. The threats in the digital world may be terrifying and intimidating, but causing a panic in your workplace isn’t the answer. Call us as soon as any problems arise, and we’ll help you as soon as we can. We can even hook you up with other security measures to beef up your network security.

Published with permission from TechAdvisory.org. Source.

Enhance your new laptop in 5 steps

February 6, 2018 admin Hardware 2018february6hardware_c, bloatware, hardware, laptop, mac, operating system, pc, vpn, windows

Laptops may not be the most powerful computers, but the benefits they provide are undisputable. For one thing, they deliver a similar user experience to your huge desktop PC, but much more conveniently and affordably. But before you reap their many benefits, learn five precautionary steps you should take before using them.

1. Update your laptop’s operating system

One of the first things you should do before using your laptop is upgrade its operating system. Assuming you did not purchase the laptop right when it was released, your laptop will still be running an older operating system. With important patches and fixes released in each new update, it is recommended that you install the latest one to ensure your laptop is free of any vulnerabilities.

2. Remove bloatware

Opening your laptop for the first time, you might notice that there are already several preloaded software in the system — some of which you will probably never use. These are known as bloatware.

These apps take up a lot of your valuable drive space, so consider getting rid of them. The easiest way to do this is by downloading a bulk uninstaller, which allows you to check all the bloatware apps you don’t want and remove them in one fell swoop.

3. Install protection software

It’s no secret that the world we live in is unsafe. And with so much confidential information nowadays becoming digitalized, it is necessary to protect yourself against losing important data from your computer. The solution to this is very simple. By installing antivirus software that can automatically — or manually — scan your computer at a scheduled time, potential attacks can be thwarted before they become more serious.

Not only is your laptop’s data vulnerable to cyberattacks, there is always a chance your laptop can get lost or stolen. While there are preventive steps you can take — such as being mindful while using your laptop in public places — another solution would be to install anti-theft software. Security features such as “Find My Device” for Windows 10 and “Prey” for other operating systems can help you locate your device if it’s ever stolen or misplaced.

4. Optimize your power settings

One of the most frequent problems that laptop users have is that their batteries run out of juice too fast. However, you can actually extend the battery life by making a few tweaks to your power settings.

Reduce your display brightness, but not so much that it causes eye and mental fatigue
Use the Sleep or Hibernate mode for your operating system

5. Set up a backup plan

Imagine spending months working on an important project and suddenly finding it nonexistent the next day just because your laptop crashed. Deadlines will be missed. Profit margins will decrease. Customers will leave unhappy. And if worse comes to worst, you’ll be out of business.

Why add more unnecessary stress if you can prevent it from happening in the first place? By setting up an automatic backup system, you can regularly save all your important files; that way, you’d still have access to the data anytime were anything to happen to the original file.

You can also store all your important documents in the cloud, which ensures access whenever you need, even if your laptop crashed or got stolen.

Getting a new laptop can be fun, but the joy might be short-lived if you don’t set up any preventive measures from the start. Call us for information on how we can help you secure your company’s laptop today.

Published with permission from TechAdvisory.org. Source.

Enlist IT help when installing CPU updates

January 24, 2018 admin Security 2018january24security_c, chrome, edge, firefox, flaw, ie, Intel, linux, macos, meltdown, safari, security, spectre, vulnerability, windows

When it comes to security updates, time is usually of the essence. The longer you wait to install a fix from a vendor, the higher the risk of being compromised. But in the cases of the Meltdown and Spectre flaws, you might be better off waiting until a more reliable patch is released. Let’s review what’s going on and what the best course of action currently is.

Unsecured data storage

Spectre and Meltdown are the names given to two hardware flaws that allow hackers to see any piece of information stored on your computer. Although slightly different in execution, both take advantage of a hardware feature that computer chips use to access and store private information. For the last 20 years, security experts believed this information could not be stolen or spied on by malicious software, but that assumption was proven false on January 3, 2018.

Now that the Spectre and Meltdown vulnerabilities are public information, hackers can use them to create programs that steal passwords, social security numbers, credit card numbers, and anything else you type into your computer.

Because these problems are hardware-based, none of the updates will be able to secure the vulnerable storage; they’ll simply prevent your computer from storing anything in it. Currently, there are patches for:

  • Operating systems (Windows, macOS, and Linux)
  • Web browsers (Chrome, Firefox, Safari, Edge, and IE)
  • Chip firmware (low-level programs installed on the processor itself)

If you’re using an Apple computer, these updates are relatively easy to install. If you’re using a Windows or Linux-based computer, these patches may cause your machine to freeze, reboot unexpectedly, or significantly slow down.

Why should I wait to install the updates?

Intel, one of the chipmakers responsible for the Spectre and Meltdown flaws, has provided contradictory recommendations on more than one occasion. As recently as January 18, Intel recommended waiting for an updated patch, but in the same announcement also recommended “consumers to keep systems up-to-date.”

Experts believe detecting an attack that is based on one of these flaws will be relatively easy and represent an alternative to installing updates that could render your computer unusable.

What should I do?

IT support experts will be able to quickly and easily assess what is the best option for your computers. For example, our team can determine whether or not your hardware will conflict with the current patches, and either install them or set up a detection strategy that will help you mitigate the risks without ruining your computer.

If you need expert IT support for quick responses and ironclad security — give us a call today.

Published with permission from TechAdvisory.org. Source.

Don’t let your old PC go to waste!

August 24, 2017 admin Hardware 2017august24hardware_c, android, ios, linux, macos, old computers, pc, windows

Do you still have old PCs and laptops lying around somewhere? If you’re thinking about finally trashing them, don’t! Despite being big, slow, and prone to crashes, you can still make good use out of your old computer.

You might have to do some light upgrades like install more RAM and a bigger hard drive, depending on how old your PC is, but it’ll be worth it. Once you’ve done that, explore these options:

Try a lighter OS

While you might be tempted to install a new Windows or macOS on your old computer, they won’t work optimally without a fast processor. However, Linux-based operating systems, which come in a variety of options called “distros”, will make your computer feel brand new without exhausting its hardware.

Popular distros options like Ubuntu, elementary OS, and PinguyOS, can be easily installed, have similar interfaces as Windows, and come with a ton of software packages. The best part is they only require a minimum of 4GB of RAM, which means you won’t have to invest much at all.

Make a NAS server

Network-attached storage (NAS) is a server for your home or small business network that allows you to store files that need to be shared with all the PCs on the network. If your old PC has at least 8GB of RAM, you can use it to make your own NAS instead of purchasing one.

Simply download FreeNAS, a software accessible from any OS (Windows, MacOS, Linux) that enables you to make a shared backup of your computers. FreeNAS features access permissions and also lets you stream media to mobile OSes, like iOS and Android.

However, if you prefer turning your PC into a private cloud for remote access and data backup, Tonido is a great alternative. Compatible with Mac, Windows, and Linux, it turns your PC into a storage website so you can access files from anywhere on any device.

Tonido offers up to 2GB of file syncing across computers. There’s even Tonido apps for iOS and Android for mobile access.

Secure your online privacy

Wouldn’t it be great if you could turn your old computer into a dedicated privacy PC so you won’t have to worry about compromising privacy while browsing the web? With The Amnesic Incognito Live System (TAILS), you can.

This Linux-based software routes all your internet traffic and requests through TOR Project, a software that makes it extremely difficult for someone to track you online. All of TAILS’ integrated applications like web browser, Office suite, IM client, and email software, are pre-configured for robust security and privacy protection.

Take your media up a notch

If you’re looking for a way to listen to your music, podcasts, or watch videos on other PCs, or mobile devices, a server software like Kodi can help.

What it does is bring all your digital media together into one user-friendly package so you can use your old PC as an audio and video hosting platform. From there, you can play files on other devices via the internet. There are remote control apps for iOS or Android users and even an app for Kodi playback on the Amazon Fire TV.

Kodi works on any device running Windows, Mac OS, Linux, and even rooted Android and jailbroken iOS devices.

We’re always on the lookout for ways to help our clients make the most out of their technology investments. If you’d like to know more about how to utilize other hardware to your business’s advantage, give us a call.

Published with permission from TechAdvisory.org. Source.

Precautions against WannaCry ransomware

May 23, 2017 admin Business 2017may23business_c, antivirus, business continuity, cloud backup, external hard drive, security, software update, wannacry, windows

The WannaCry ransomware, a type of malware that encrypts a victim’s files and extorts them for money, has already affected thousands of machines worldwide. Unfortunately, the success of this attack is just the beginning. According to security researchers, other hackers will probably develop stronger WannaCry variants in the coming months. And if you don’t want your business to become a victim of these attacks, you must take the following precautions.

Update your software
The first (and probably best) defense against WannaCry ransomware is to update your operating system. New research from Kaspersky shows that machines running Windows XP, 7 and outdated Windows 10 versions were affected by the ransomware. To check whether your systems are up to date, open your Windows search bar, look for Windows Update, click Check for Updates, and install any major updates.

Also, don’t forget to download the latest security patches for your business applications and security software.

Run security programs
Many antivirus programs now have mechanisms for detecting and blocking WannaCry malware; so when you’ve fully updated your security software, run a full system scan.

Keep in mind that antivirus isn’t a foolproof security solution. Instead, run it alongside other security applications like intrusion prevention systems and firewalls.

Use data backup and recovery tools
If WannaCry does infect your computers, only a solid data backup and recovery solution can save your business. Before ransomware strikes, periodically back up your files in both an external hard drive and a cloud-based backup service.

External hard drives will serve as your local backup solution for quick recovery times. However, we recommend keeping the external drive disconnected when it’s not being used and plugging it in only when you need to back up files at the end of the day. This is because when ransomware infects a computer, it will usually look to encrypt local backup drives as well.

Cloud-based backups, on the other hand, allow you to store files in remote data centers and access them from any internet-enabled device. When selecting a cloud services provider, make sure they provide the appropriate cloud protections to your files. For example, your backup vendor should provide reporting tools to keep track of any anomalies in your files. Document versioning features are also important. This allows you to recover older versions of a document in case the current version is encrypted.

After your local and cloud backups are set up, perform regular tests to ensure your disaster recovery plan works.

Stay informed
Finally, it’s important to stay on guard at all times. WannaCry is just one of many ransomware strains affecting businesses today, and in order to stay safe you need to be constantly up to date on the latest cybersecurity- and business continuity-related news.

For more ransomware prevention tips and services, call us today. We’ll make sure hackers don’t hold your business hostage.

Published with permission from TechAdvisory.org. Source.

Wikileaks’ charges of government spying

April 6, 2017 admin Security 2017april6security_c, apple, cybersecurity, Encryption, iphone, microsoft, samsung, wikileaks, windows

2017April6Security_CStaving off malicious cyber attackers is already a herculean task, so the last thing you need is to feel exposed from a totally new angle. That’s how many felt after Wikileaks’ accusations that the US government was spying on its citizens. However, the truth is a lot different from what the headlines would have you believe.

What devices and apps are supposedly vulnerable?

Wikileaks labeled its ongoing release of 8,761 classified CIA documents “Year Zero.” Nestled among those files are tools and correspondence that explain how operatives could snoop on communications, downloads, and browsing history. Here is a list of the “affected” applications and hardware:

  • Windows operating systems
  • iOS
  • Android
  • Samsung Smart TVs
  • WhatsApp
  • Signal
  • Telegram
  • Confide

Those are some very big names, right? Thankfully, it’s mostly hyperbole. The reality of the situation isn’t nearly as bad as it sounds.

Two considerations before freaking out

First, almost all these exploits require physical access to devices before anything can be compromised. For example, news organizations repeatedly reported that WhatsApp, Signal, Telegram and Confide all had encryption protocols that had been subverted by the CIA. That is 100% false.

What the documents actually revealed is that the CIA was aware of security gaps in Windows, iOS, Android and Samsung’s Tizen OS, which allowed the agency to snoop on messages before they were encrypted. Messages sent in these apps are still totally uncrackable as long as the devices they are installed on haven’t been physically compromised.

Takeaway #1: Physical security is still one of the most important aspects of cyber security. Most data security regulations require certain physical security protocols as a deterrent to breaches that take place via theft of social engineering — and for good reason.

The second reason not to worry is the hardware devices and operating systems that supposedly left encrypted messages vulnerable haven’t been sold for a long time. For example, only Samsung TVs from before 2013 were vulnerable to the always-on microphone bug — which was patched in an OS update years ago.

But what about iOS — surely that’s the scariest reveal of them all, right? Not quite. Only the iPhone 3G, discontinued in 2010, was susceptible to exploitation. Furthermore, Apple immediately responded that they were aware of this vulnerability and patched it in the version of iOS that was released in 2011.

Takeaway #2: Updating software is critical to keeping your data safe. As we saw in the Year Zero leaks, just one piece of outdated software can cause a domino effect of other vulnerabilities.

In reality, the most recent Wikileaks releases shouldn’t change your approach to cyber security at all. As long as you consider data security a never-ending battle, you’ll be safer than everyone too lazy or forgetful to lock up their server rooms or update their operating system.

But running a business doesn’t always leave you a lot of time for fighting a “never-ending battle,” does it? Fortunately, that’s exactly what we do for our clients every single day. To find out more about how we can keep you safe, call today.

Published with permission from TechAdvisory.org. Source.

What is the Blue Screen of Death?

April 6, 2016 admin Hardware 0 Comments 2016apr6_hardware_c, bsod, hardware malfunction, malware, overheating, reboot, system restore, windows

2016Apr6_Hardware_CSo your computer just crashed. Our condolences. When your PC displays a blue screen and spontaneously restarts your computer, this is called the Blue Screen of Death (BSoD). These errors are usually caused by internal failures in your hardware or, sometimes, your software. That’s all well and good, but how can you troubleshoot these problems? Before taking any actions to fix your computer however, you’re going to have to do some detective work and pinpoint what part of your system caused the crash.

Find out what caused your BSoD

The next time you get the blue screen, don’t panic. This is just an alert to prevent further system damage to your computer and to indicate the cause of crash. The most important part of the blue screen is the error name which displays messages like “Driver_IRQL_not_less_or_equal”. For Windows 8 to 10 users, this information is usually displayed at the bottom of the screen. For troubleshooting advice, a memory dump containing details of your latest crash can be found in Event Viewer > System > Windows Logs and click any messages indicating an error. Under the General tab you will see a full report of your latest crash — this should be given to an IT technician so they can help you further.

Fixing the problem:

Update your drivers

Crashes are generally caused by problems with hardware or the driver software that is allowing that specific hardware to run. If you’re getting frequent blue screens, try to recall any recent changes you have made to your computer. Have you recently installed a new driver for an external device? You can also check if any drivers are conflicting by going to Control Panel > Device Manager. If you see a warning icon on any of the devices, there is something wrong with the device. Chances are, specific drivers are either outdated or weren’t properly installed.

To update, simply search online for your specific computer manufacturer and install the drivers provided in their list. Remember to only install the drivers that apply to the specific model of your device and your operating system. For example, if your operating system is Windows 8, only download Windows 8 related items for your specific model.

Other hardware problems

BSoD can also indicate hardware problems. Running very intensive programs that your CPU can’t handle will cause your computer to overheat and eventually crash. If you use a laptop, try to keep it on flat surfaces and away from fabric material as this could block the fan vents and cause your laptop to overheat.

Your RAM could also be faulty. Check if it’s attached to your CPU properly or go to Windows memory diagnostics to find out if you’re straining your RAM.

System restore

Using system restore will allow you to undo any significant software changes that are crashing your PC. To restore your computer to a previous time, go to Control Panel > System and Security > Backup and Restore then click on Recover System Settings for your Computer. From here you can select a restore point to a date where you think your computer was not experiencing frequent crashes.

Check for viruses

Some types of malware can cause instabilities in your operating system causing your PC to crash. If you are aware that your computer is infected with a virus, try running antivirus software. However, make sure you’re not running two antivirus software at the same time while you’re doing this. Both programs can conflict with each other and, in some cases, cause system crashes.

Clean reboot

This option is your last resort if none of the solutions above work. For Windows 8 or 10 users simply go to Settings > Update and Security > Recovery then select Reset this PC. If your computer is still getting frequent blue screens then it would be best to go to an IT consultant and have them look over your hardware.

The Blue Screen of Death is one of the biggest problems your company’s hardware is going to face. Consider using any of the above solutions to fix your blue screen and hopefully everything will be back to normal. If you would like to know more about any general hardware advice, or if you have any concerns regarding your IT, contact us today.

Published with permission from TechAdvisory.org. Source.

Recent Posts

  • Can AI empower customer service agents?
  • Leave no room for hackers to operate
  • Keep your laptop from overheating

Recent Comments

    Archives

    • May 2018
    • April 2018
    • March 2018
    • February 2018
    • January 2018
    • December 2017
    • November 2017
    • October 2017
    • September 2017
    • August 2017
    • July 2017
    • June 2017
    • May 2017
    • April 2017
    • March 2017
    • February 2017
    • January 2017
    • December 2016
    • November 2016
    • October 2016
    • September 2016
    • August 2016
    • July 2016
    • June 2016
    • May 2016
    • April 2016
    • March 2016
    • February 2016
    • January 2016
    • December 2015
    • November 2015

    Contact Us

    • Email
      billing@braintrusttechnologies.com
    Brain Trust Technologies LLC

    6749 S. Westnedge Ave

    Suite K, #128

    Portage, MI 49002-3556

    Southwest Michigan: (269) 290-7137

    St. Louis: (314) 558-0623

    Toll Free: (877) 288-5527

    © 2022 Brain Trust Technologies, LLC. All Rights Reserved