Archive for the ‘Computer Company News’ category

Update Your Software When Prompted: The Key to Keeping Hackers at Bay

September 3rd, 2024

In our digitally driven world, keeping your software up to date is more than just a good habit—it’s a critical security measure. Every day, hackers are on the lookout for vulnerabilities in software that they can exploit to gain unauthorized access to networks. Once inside, they can steal sensitive information, cause disruptions, or even hold your data hostage.

The Importance of Software Updates

When software developers release an update, it’s not just about adding new features or improving performance; it’s often about fixing security vulnerabilities that have been discovered. These vulnerabilities, if left unpatched, can be exploited by hackers to gain access to your system. The longer you delay updating, the greater the risk that a cybercriminal will find and exploit these weaknesses.

Patching Vulnerabilities: Your First Line of Defense

Software updates, often referred to as “patches,” are designed to close these security gaps as soon as they are discovered. By applying patches promptly, you’re effectively locking the door on potential intruders. It’s a proactive approach to cybersecurity, ensuring that your information remains secure and out of the hands of those who would misuse it.

Why Prompt Updates Matter

When you’re prompted to update your software, it can be tempting to click “remind me later.” However, each time you delay, you’re leaving your system vulnerable. Hackers are constantly scanning for systems with known vulnerabilities, and unpatched software is like an open invitation. By updating your software as soon as you’re prompted, you minimize the time your system is exposed to potential threats.

Conclusion: Stay Safe, Stay Updated

In a world where cyber threats are constantly evolving, staying one step ahead is crucial. By keeping your software up to date, you’re not only protecting your data but also contributing to a safer digital environment for everyone. So, the next time you’re prompted to update, don’t delay—take action and secure your network against potential attacks. Your vigilance is your best defense.

Call:  800.418.2358

Stay Ahead of Cyber Threats with Penetration Testing!

February 23rd, 2024

Cybersecurity is a critical concern for businesses of all sizes in today’s digital age. With the increasing sophistication of cyber threats, it’s essential for organizations to stay ahead of attackers by identifying and addressing vulnerabilities before they can be exploited. Penetration testing, also known as pen testing, is a proactive approach to cybersecurity that can help organizations strengthen their systems and protect valuable data.

What is Penetration Testing?

Penetration testing is an attempted breach against a business’ systems to disclose application, web server, or network vulnerabilities. It involves employing techniques similar to those used by criminal hackers, but in an ethical manner. The process is carefully thought out and executed to make an organization’s systems stronger.

Find out more!

Contact the professionals at The Computer Company for a consultation.

Call:  800.418.2358

How Does Pen Testing Work?

The pen testing process typically involves several key steps:

1. Define the scope of the project: This includes identifying the systems and networks to be tested and the goals of the testing.

2. Reconnaissance: Gather all the necessary information needed: This involves gathering information about the target systems, such as IP addresses, domain names, and network configurations.

3. Scanning: Use all the information to assess vulnerabilities: This step involves using specialized tools to scan the target systems for known vulnerabilities.

4. Attempt: Utilize results from the scan to exploit the weaknesses and vulnerabilities: This step involves attempting to exploit the vulnerabilities identified in the scanning phase.

5. Exploitation: Controlled attacks are meant to act on the vulnerabilities: This step involves carrying out controlled attacks to exploit the vulnerabilities and gain access to the target systems.

6. Analysis: A compiled report detailing the vulnerabilities identified in the testing phase: This step involves compiling a report that details the vulnerabilities identified during the testing phase.

7. Remediation: The process of eliminating vulnerabilities by applying the right solutions and processes, and training staff members where necessary: This step involves addressing the vulnerabilities identified in the testing phase and implementing measures to prevent them from being exploited.

What are the benefits?

Penetration testing by the Computer Company is a critical component of a comprehensive cybersecurity strategy. By identifying and addressing vulnerabilities before they can be exploited, organizations can protect their valuable data and stay ahead of attackers. With the right approach and expertise, penetration testing can help organizations strengthen their systems and protect against cyber threats.

Find out more!

Contact the professionals at The Computer Company for a consultation.

Call:  800.418.2358

Top Ten Reasons Why businesses are moving to the Cloud.

November 1st, 2023

Why are businesses moving to the cloud?

Top ten reasons. 

1. Work from any where, any time, any device

With cloud computing, if you’ve got an internet connection, you can be at workImproves communications, work efficiency and effectiveness. Allows you to fill blank spots in your workday, become more responsive, builds more controlled “think time”  and/or “your time” when you want it!

2. Security

Because your files are stored in the cloud, you will have comfort in the knowledge that your business’s computing-server hardware, software and stored electronic data is protected in a 21st century “state of the art” fortified environment  with certified personnel oversight 24 hours a day, every day, year round!

3. Cut Hardware Cost

Cloud computing cuts out the high cost of hardware. Eliminates any or all “mainframe” computing costs, regardless of growth and fluctuations in business or data!  Provides for multi-year cost containment regarding computing and storage. You simply pay for what you need. All the management and setup is done by us.

4. Low Per User Core Pricing

Our controlled and focused growth ambitions together with private ownership allow for a favorable pricing environment which we are pleased to share with you.

5. Extraordinary Back Up Protection and Disaster Recovery

Our self imposed demand for unmatched backup is key to your protection and our success. (Ask us for details when you’re ready to buy.) The Computer Company’s Cloud Service provides an easy and definitive pathway for data recovery solutions.

6. Support Expediency

Our goal is to have you utilize our services when needed and when you cannot or wish not to provide them yourselves.

We are currently developing an ” IT ASSOCIATE Program for back up within your business. IT Associates will be trained by us to help you internally directly or indirectly for IT support.  

7. Customer Growth and Retention

SAFETY SELLS! Your customers and prospects hear and may experience loss caused by lax security anywhere. The safer their information is with you, the better they will feel about you.

Whether the security is tied to weather, storms, electrical power or to cyberspace intrusion, hacking or internet fraud, safety sells.

8. Automatic software updates

We do the server and security back ups for you. Leaving you free to focus on the things that matter more, like growing your business.

9. Vantage Position

The Computer Company’s Cloud Service has an OUTSTANDING LEGACY AS A  DATA CENTER AND IT PROVIDER.

The Computer Company Inc. has been an active IT provider since the mid 1990’s and a pioneer in the Cloud since the early 2000’s. We are in the unique position of not only hosting you in TCC Cloud but also in Amazon, Microsoft and other clouds. Conversely, we can provide full IT services and work with your choice of community IT provider. Transitions to and from your own private Cloud is a specialty along with transition planning based on your timing. We are positioned to meet your needs.

10. Rewards

We can help you reduce or even eliminate your TCC cloud costs!  How?
You help us by finding new customers, and we credit your account.

Not moved to the cloud yet?

It’s time.

Call now: 800-418-2358

Steps to Avoid Losing Business Data

October 12th, 2023

Data loss is a huge business problem that can be avoided by just following a few simple steps.

The data stored on your computer holds immense value, making it imperative to adopt a proactive approach in safeguarding against potential mishaps that may result in financial losses and downtime. We’ve discovered a valuable guideline from werecoverdata.com that we believe can greatly benefit you. Save yourself the trouble by implementing the following tips to fortify your data protection strategy!

Safety tips to avoid data loss

  • Always back up your data, especially when upgrading your system. Make sure that copies of your most important data are being kept off-site
  • Always turn your computer off using the operating system shut down process
  • Always use up-to-date hardware and software utilities for data security, such as virus protections and firewalls
  • Laptops should be operated on a hard and flat surface to allow proper ventilation and to avoid over heating
  • Servers should have fans, ventilation or portable air conditioning systems as close as possible to avoid operating in high temperatures.
  • Allow enough space around the external drive’s cooling fans and remove any items that may block air flow
  • Do not turn off peripheral devices while computer is on, or when disc is active
  • Drives should be stable and stationary when operating. If you have to move your computer – turn it off first
  • When touching or handling the media, make sure to avoid static electricity
  • If you hear unusual sounds coming from your computer, turn it off immediately to avoid further damage.

If Your System Fails, Could You Recover?

Call now to ask questions: 800-418-2358

Disasters do happen.

The question is, when something fails, will it be a temporary inconvenience or a business-shaking crisis?  When a hard drive crashes, can you be back in business in hours? If a natural disaster shuts your network down, can you recover every business-critical application that day?

The Computer Company prevents natural and man-made disasters from becoming computer and business disasters.

  • Replication
  • Off-site Back ups
  • Data Center
  • Business Continuity
  • Remote Office Space

We offer a full range of disaster recovery consulting services, practices, and solutions for your business to prevent many events, minimize any damage, and return your system to its full capabilities as soon as possible.  We do disaster recovery right.

Call now to ask questions: 800-418-2358

 

Logitech’s Video Room Solutions Are Perfect for Any Businesses, Why?

March 3rd, 2023

There has never been a time when video conferencing has been more widely used, so it makes sense that robust all-in-one video conferencing systems with video, audio, and a microphone are in a higher demand than ever. Investing in this is presently a top priority for businesses now.

But what distinguishes them for you and your business?

It’s a fact, having the right tools helps you be successful, so let’s investigate what may be accomplished by utilizing the Logitech Rally Plus Video Conferencing Camera System Solution.

Enhancing the user experience has been a top priority.

With improving technologies in the video conferencing field, it is becoming increasingly important for teams to be able to connect using high-quality equipment. Logitech Rally Plus Video Conferencing Camera System provides you with cinema-quality video and audio, a motorized pan and tilt, and an AI viewfinder. This means your team will always be shown in their best light.

  • Save time with one-touch joining from the calendar-integrated Logitech Tap. Simply walk into the meeting room and tap once to join or leave calls. Simple, hygienic, hassle-free, and pre-configured with your choice of room-optimized software.
  • The Logitech Rally Plus Video Conferencing Camera System is a one-stop event room that provides the perfect solution to starting and joining meetings. We have eliminated fears of new technology becoming an overload burden on IT with this all-in-one conferencing system.
  • 46% of organizations will need bigger or more meeting rooms as office life becomes increasingly prevalent.

It’s easy! Try it now! Call:  800.418.2358

The purpose of Logitech Room Solutions is to improve the video conferencing experience for businesses and their IT teams.

  • A key concern around investing in video conferencing solutions for 1 out of 3 of IT decision makers and business leaders is manageability challenges and complex integrations.
  • The three main requirements for deploying video throughout an organization were a trouble-free procurement process, speedy installation, and a comprehensive management experience.

Logitech Rally Plus Video Conferencing Camera System integrates seamlessly with the way you work, ensuring compatibility for every solution.

This is where we come in. Our experienced team of professionals as official partners and resellers for Logitech Rally Plus Video are prepared to help you and your business move into the future!

It’s easy! Try it now! Call:  800.418.2358

 

 

 

 

Email security breaches are common. Protect your business with our email encryption service.

September 19th, 2022

Often businesses gather customer information and exchange emails with private information with customers, including details such as names, address, phone numbers, bank account details and credit card numbers.

The problem is that many companies conduct business through unsecured email.

What does this mean to you?

It means if someone intercepts your email they can steal your personal and financial data. Big problem! Because the stolen data can be used by the criminals for online purchasing or total identity theft.

For example, a few years back…

Target customers were hit in major credit card security breach (imagine if that was YOUR business!?)

Payment card information was stolen from an unknown number of Target Corp. customers starting on the busy Black Friday weekend. The Secret Service is investigating, according to a spokesman for the agency, which safeguards the nation’s payment systems. Target officials did not respond to requests for comment.

  • The breach involved nearly all of Target’s 1,797 stores in the United States.
  • The report said that at least 1 million payment cards were thought to have been stolen before Target uncovered the operation, but that the number could be significantly higher.

When all is said, and done, this one will put its mark up there with some of the largest retail breaches to date. As noted this has already happened to larger companies such as Target, Citibank and Sony, and should cause small business owners to think seriously about email security.

So, what can you do?

One of the easiest options is email encryption, did we mention it is easy? Yes, real easy.

We offer 24/7 customer support to help you troubleshoot any issues. Our service will protect your business from data breaches and cyber attacks.

Why do it? Email encryption offers you an extra layer of security, as the data inside the email is secured and cannot be opened or read by anyone who is not authorized to do so.

The software is available today from The Computer Company and it is a good investment as it offers the necessary protection.

  1. Host-based encryption software is where you set up an email domain on the server of the data encryption company to provide your business the needed security.
  2. This method can also be used to guard your system against spam, viruses and phishing attacks which is also a welcome added option.
  3. This is a good way of keeping virus attachments away from your system and it also prevents hackers getting into your system and then sending out spam from your system.
  4. It can also help to stop the hackers sending phishing emails from your company for financial gain.
  5. Encryption software is definitely worth considering for your business as it can keep your emails secure and also save you money by preventing the theft of your data.

For a free evaluation of your circumstances or a demonstration of our email encryption solution please contact us today.

Call the Direct Help Line :: 800.418.2358

Beware: This fake Windows 11 upgrade infects you with malware instead

March 1st, 2022

Hackers created an impressive fake Microsoft site to steal personal info and cryptocurrency.

We saw this article on PC World and wanted to share it with you. It was written by:
By Michael Crider
Staff Writer, PCWorld

When it comes to computer security, one must remain ever vigilant. If you need a refresher on that lesson, HP’s Threat Research department is ready to give you one today. Researchers spotted an incredibly convincing fake website, purporting to offer Windows 11 upgrades straight from Microsoft. Instead it served up a heaping helping of malware.

The scam is actually pretty impressive. The operators of “windows-upgraded.com” (now decommissioned) copied Microsoft’s presentation and style perfectly, with a big friendly “download now” button for all those interested in an upgrade or clean install. What duped users actually got was a 1.5MB ZIP file containing “Windows11InstallationAssistant.exe”, which downloads a DLL disguised as a JPEG file.

You can read the full article here.

Please visit us at: https://computercompany.net/cybersecurity-hartford/ for support.

 

Please call us at: 800-418-2358

 

Moving Your Company to the Cloud

December 7th, 2021

The buzzword is out there and everyone is doing it.
Now it’s time for you to take the first step.

Today users can work without knowing the location and other details of the computing infrastructure. Cloud computing services and cloud storage deliver software applications, data access, data administration and storage for everyday businesses saving time and money. Because your server will be part of the cloud you will access your data from anywhere at any time.

Do you require a hosting company that is flexible enough to meet your unique environment? The Computer Company will work with you to architect a design that provides the necessary bandwidth, processing power and storage so your business can seamlessly operate in the cloud.

There are many benefits to moving your business to the cloud:
  • The flexibility of connection options. This means you get access to your data while you are off-site, employees can connect to their virtual office, quickly and easily.
  • Collaboration efficiency. Employees can communicate and share work more easily.
  • Automatic updates. You get the latest technology, up-to-date software, servers upgrades, and computer processing power.
  • Reduced costs (everyone’s favorite!). Moving to cloud computing usually will reduce the cost of managing and maintaining your IT systems.
  • Flexibility for sizing. Your business will have the flexibility required as your needs change for your software and storage.
  • Business continuity. You can relax knowing that you are protecting your data and systems.
The points below are from an article written by James A. Martin, PCWorld contributing editor

Cloud Computing.

For some, the term is wildly nebulous. For others, cloud computing instantly raises concerns about security and reliability. After all, Gmail, a popular cloud-based e-mail service has endured some high-profile outages.

Before you dismiss the cloud as a lot of vapor, though, listen to what small-business people told us about their experiences with it:

  • “We saved over $4000 in up-front costs by moving to an entirely cloud-based solution [for e-mail, Web hosting, virus protection, and more]. We were also able to substantially reduce our power bill and the costs needed to maintain and upgrade hardware.”
  • “As a non-IT person, I find cloud-based applications easier to set up and use than many computer applications, and I don’t need to rely on internal IT support as much for assistance.”
  • “A power surge nearly destroyed our in-house e-mail server. Had we not recovered it, a great deal of historical knowledge and valuable information would have been lost forever, not to mention the lost productivity for days or weeks. Now we have a secure, redundant, cloud e-mail system we can access anywhere, anytime, with a consistent interface, and it’s made our business stronger.”

Small businesses looking to cut computing costs and improve efficiency are finding the many benefits of Internet-based software and services increasingly attractive. Cloud computing evolved as a term to describe free or subscription-based services delivered in real time over the Internet.

Cloud Computing can refer to software as a service, to file storage, synchronization, backup, other utility computing, and to infrastructure as a service.

 

Must Read: 5 likely cyber attacks

November 3rd, 2021

The 5 cyber attacks you’re most likely to face.

We found this great story, and wanted to repost it for you.

Don’t be distracted by the exploit of the week. Invest your time and money defending against the threats you’re apt to confront.

The threats companies think they face are often vastly different than the threats that pose the greatest risk. The fact is most companies face the same threats — and should be doing their utmost to counteract those risks. Here are the five most common successful cyber attacks.

Cyber attack No. 1: Socially engineered Trojans

Socially engineered Trojans provide the No. 1 method of attack (not an exploit or a misconfiguration or a buffer overflow). An end-user browses to a website usually trusted — which prompts him or her to run a Trojan. Most of the time the website is a legitimate, innocent victim that has been temporarily compromised by hackers. Usually, the website tells users they are infected by viruses and need to run fake antivirus software. Also, they’re nearly out of free disk space and need a fake disk defragger. Finally, they must install an otherwise unnecessary program, often a fake Adobe Reader or an equally well-known program. The user executes the malware, clicking past browser warnings that the program could possibly be harmful. Voilà, exploit accomplished! Socially engineered Trojans are responsible for hundreds of millions of successful hacks each year. Against those numbers, all other hacking types are just noise.

Countermeasure: Social engineered Trojans are best handled through end-user education that’s informed by today’s threats (such as trusted websites prompting users to run Trojans). Enterprises can further protect themselves by not allowing elevated users to surf the Web or answer email. An up-to-date anti-malware program can’t hurt, but strong end-user education provides better bang for the buck.

Cyber attack No. 2: Unpatched software

Coming in a distant second is software with known, but unpatched exploits. The most common unpatched and exploited programs are Java, Adobe Reader, and Adobe Flash. It’s been this way for a few years now. But strangely, not a single company I’ve ever audited has ever had these three programs perfectly patched. I just don’t get it.

Countermeasure: Stop what you’re doing right now and make sure your patching is perfect. If you can’t, make sure it’s perfect around the top most exploited products, including Java, Adobe, browser admins, OS patches, and more. Everyone knows that better patching is a great way to decrease risk. Become one of the few organizations that actually does it.

Cyber attack No. 3: Phishing attacks

Approximately 70 percent of email is spam. Fortunately, anti-spam vendors have made great strides, so most of us have reasonably clean inboxes. Nonetheless, I get several spam emails each day, and a least a few of them each week are darned good phishing replicas of legitimate emails.

I think of an effective phishing email as a corrupted work of art: Everything looks great; it even warns the reader not to fall for fraudulent emails. The only thing that gives them away is the rogue link asking for confidential information.

Countermeasure: Decreasing risk from phishing attacks is mostly accomplished through better end-user education — and with better anti-phishing tools. Make sure your browser has anti-phishing capabilities. I also love browsers that highlight the domain name of a host in a URL string. That way windowsupdate.microsoft.com.malware.com, for example, is more obvious.

Cyber attack No. 4: Network-traveling worms

Computer viruses aren’t much of a threat anymore, but their network-traveling worm cousins are. Most organizations have had to fight worms like Conficker and Zeus. We don’t see the massive outbreaks of the past with email attachment worms, but the network-traveling variety is able to hide far better than its email relatives.

Countermeasure: Network-traveling worms can be defeated by blocking executables in email, better patching, disabling auto-run capabilities, and strong password policies. Many network worms, like Conficker, will try to exploit network shares by logging on using a list of built-in, bad passwords: 12345, password2, qwerty, and the like. If any of your passwords are listed in the password manifest inside of a worm, you do not have a strong password policy.

Cyber attack No. 5: Advanced persistent threats

Lastly, I only know of one major corporation that has not suffered a major compromise due to an APT (advanced persistent threat) stealing intellectual property. APTs usually gain a foothold using socially engineered Trojans or phishing attacks. A very popular method is for APT attackers to send a very specific phishing campaign — known as spear-phishing — to multiple employee email addresses. The phishing email contains a Trojan attachment, which at least one employee is tricked into running. After the initial execution and first computer takeover, APT attackers can compromise an entire enterprise in a matter of hours. It’s easy to accomplish, but a royal pain to clean up.

Countermeasure: Detecting and preventing an APT can be difficult, especially in the face of a determined adversary. All the previous advice applies, but you must also learn to understand the legitimate network traffic patterns in your network and alert on unexpected flows. An APT doesn’t understand which computers normally talk to which other computers, but you do. Take the time now to start tracking your network flows and get a good handle of what traffic should going from where to where. An APT will mess up and attempt to copy large amounts of data from a server to some other computer where that server does not normally communicate.When they do, you can catch them. There are other popular attack types, such as SQL injection, cross-site scripting, pass-the-hash, and password guessing, but they aren’t seen nearly at the same high levels as the five listed here. Protect yourself against the top five threats and you’ll go a long way to decreasing risk in your environment.

More than anything, I strongly encourage every enterprise to make sure its defenses and mitigations are aligned with the top threats.
Don’t be one of those companies that spends money on high-dollar, high-visibility projects while the bad guys continue to sneak in using routes that could have easily been blocked.

This story, “The 5 cyber attacks you’re most likely to face,” was originally published at InfoWorld.com By Roger A. Grimes


The Computer Company is now approved as a Microsoft Office 365 GCC Partner!

June 30th, 2021

What’s New?

The Computer Company is now approved as a Microsoft Office 365 GCC Partner!
What this means to you is we can now offer you GCC licensing options. What is Microsoft Office 365 GCC? It stands for Microsoft 365 Government Community Cloud High (GCC High).

To meet the unique and evolving requirements of the United States Department of Defense, as well as contractors holding or processing DoD-controlled unclassified information (CUI) or subject to International Traffic in Arms Regulations (ITAR), Microsoft offers GCC High and DoD environments. And now you can have Microsoft Office 365 GCC for your business.

The Office 365 US Government service description is designed to serve as an overlay to the general Office 365 service description. It defines the unique commitments and differences compared to Office 365 for enterprise offerings. Microsoft reminds you not to share any controlled, sensitive, or confidential information with customer support personnel as part of your support incident when using Office 365 GCC High/DOD, at least until you confirm the support agent’s authorization to view or access such data.


 

So, find out how you can save money AND get this high security for your business.

Call today – 800.418.2358