Fake ‘Pokemon NFT’ game infects PCs with malware

January 11th, 2023 by TCC No comments »

Some interesting news from PC World Online.

In a scheme worthy of Team Rocket, two sites hosting fake Pokemon PC games have been spotted spreading remote access programs

Distributing fake versions of popular games in order to seed malicious programs is nothing new, but suckering in players with the promise of profits from Pokemon-branded NFTs is particularly naughty. Not only has there been no indication that Nintendo or Pokemon developer Game Freak are interested in jumping on the non-fungible bandwagon, NFTs themselves are rife with pump-and-dump investment shenanigans and good old-fashioned theft.

Read the full article here: https://www.pcworld.com/article/1449634/fake-pokemon-nft-game-infects-pcs-with-malware.html

 

 

Email security breaches are common. Protect your business with our email encryption service.

September 19th, 2022 by TCC No comments »

Often businesses gather customer information and exchange emails with private information with customers, including details such as names, address, phone numbers, bank account details and credit card numbers.

The problem is that many companies conduct business through unsecured email.

What does this mean to you?

It means if someone intercepts your email they can steal your personal and financial data. Big problem! Because the stolen data can be used by the criminals for online purchasing or total identity theft.

For example, a few years back…

Target customers were hit in major credit card security breach (imagine if that was YOUR business!?)

Payment card information was stolen from an unknown number of Target Corp. customers starting on the busy Black Friday weekend. The Secret Service is investigating, according to a spokesman for the agency, which safeguards the nation’s payment systems. Target officials did not respond to requests for comment.

  • The breach involved nearly all of Target’s 1,797 stores in the United States.
  • The report said that at least 1 million payment cards were thought to have been stolen before Target uncovered the operation, but that the number could be significantly higher.

When all is said, and done, this one will put its mark up there with some of the largest retail breaches to date. As noted this has already happened to larger companies such as Target, Citibank and Sony, and should cause small business owners to think seriously about email security.

So, what can you do?

One of the easiest options is email encryption, did we mention it is easy? Yes, real easy.

We offer 24/7 customer support to help you troubleshoot any issues. Our service will protect your business from data breaches and cyber attacks.

Why do it? Email encryption offers you an extra layer of security, as the data inside the email is secured and cannot be opened or read by anyone who is not authorized to do so.

The software is available today from The Computer Company and it is a good investment as it offers the necessary protection.

  1. Host-based encryption software is where you set up an email domain on the server of the data encryption company to provide your business the needed security.
  2. This method can also be used to guard your system against spam, viruses and phishing attacks which is also a welcome added option.
  3. This is a good way of keeping virus attachments away from your system and it also prevents hackers getting into your system and then sending out spam from your system.
  4. It can also help to stop the hackers sending phishing emails from your company for financial gain.
  5. Encryption software is definitely worth considering for your business as it can keep your emails secure and also save you money by preventing the theft of your data.

For a free evaluation of your circumstances or a demonstration of our email encryption solution please contact us today.

Call the Direct Help Line :: 800.418.2358

Tips for Effective Emailing

August 2nd, 2022 by TCC No comments »

Introduction: Email is an essential form of communication in both our personal and professional lives. Good manners are fundamentally about showing respect for others. When emailing, the same principle is applicable. Be considerate and considerate of your customers’ time. You’ll succeed if your business presents itself in the nicest possible light. 

Here are some tips for effective emailing.emial encryption

Use the subject line. Your subject line is the first line of communication between you and your customers. It says a lot about you, so think carefully about it. Make it clear and concise; don’t over-use any keywords.

Answer questions before they ask. The key to effective emailing is to anticipate your customers’ questions. It’s so easy for people to forget to answer common questions that people will want answers to! Tell people what they’re getting and why they need it.

Easy to read. Keep your email clear and concise by segmenting your message into short, easy-to-read paragraphs. Use action words (instead of words like “ask,” “request,” or “suggest”) to make your message more direct and compelling. Use graphics, photos, and videos to help people understand what you’re talking about.

Use a professional tone. Remember that the person you are emailing is a potential customer or client. Use a professional tone and be respectful of their time. Be concise, brief, and clear. Keep it to just a few paragraphs. Use links to your product or service so if they are interested, it will be easy to get more information. Tell them why you are emailing and what they can expect to get from your message.

Use email to build relationships with your customers. Email is a great way to build relationships with your customers. It’s also an excellent way to keep them informed about what you’re doing and how that fits into their experience with you.

Proofread your message. Before hitting send, take a few minutes to proofread your email for spelling and grammar mistakes. You will get a better response if you don’t send an email that looks professional.

Don’t forget a call to action. If you want the person you are emailing to do something, be sure to include a call to action! For example, if you want them to sign up for your mailing list, use the word “sign” instead of “subscribe.” If you want them to contact you, use the word “contact” instead of “inquire”. Don’t overdo the freebies. The best emails are the ones that don’t try to sell you anything. You will get a better response if you simply ask for something, rather than try to make them feel obligated to give you anything.

If you have a great product or service, tell them what they can expect to get from you.

Your customers will appreciate the effort and think that you value their time. Include links to your website, blog, or social media profiles in the email.

Call Now – The Computer Company offers full managed IT services and break-fix outsourcing to organizations of all sizes.
800-418-2358

 

Email Encryption – Protect your Business from Hackers!

June 29th, 2022 by TCC No comments »

Often, businesses gather customer information and exchange emails with private information with customers, including details such as names, addresses, phone numbers, bank account details, and credit card numbers.

The problem is that many companies conduct business through unsecured email.

What does this mean to you?

It means that when you email a company, you’re putting your data at risk.

If you use an unsecured email account, those emails can be accessed by other people. Whether they are hackers or foreign government agents, they could intercept the messages and gain access to sensitive information.

  • They can steal your personal and financial data. Big problem!
  • Also, the stolen data can be used by criminals for online purchasing or total identity theft.

For example, a few years back…

Target customers were hit by a major credit card security breach (imagine if that was YOUR business?)

Payment card information was stolen from an unknown number of Target Corp. customers starting on the busiest Black Friday weekend. The Secret Service is investigating, according to a spokesman for the agency, which safeguards the nation’s payment systems. Target officials did not respond to requests for comment.

  • The breach involved nearly all of Target’s 1,797 stores in the United States!
  • The report said that at least 1 million payment cards were thought to have been stolen before Target uncovered the operation, but that the number could be significantly higher.

When all is said and done, this one will put its mark up there with some of the largest retail breaches to date. As noted, this has already happened to larger companies such as Target, Citibank, and Sony, and should cause small business owners to think seriously about email security.

  • The Hacking Team was just one of many security vendors that sold or gave away hacking tools to criminals. In 2014, the FBI uncovered evidence that the Chinese government had been selling hacking tools to criminal groups for years. It wasn’t just the Chinese government either, security vendors were also selling their hacking tools to criminals. The problem with this is that it could be anyone out there buying or selling these tools. It’s not as if there’s a shortage of hackers wanting to attack others, there’s always someone out there that wants to ruin your day.

So, what can you do?

One of the easiest options is email encryption. Did we mention it is easy? Yes, it’s really easy.

Why do it?

Email encryption offers you an extra layer of security, as the data inside the email is secured and cannot be opened or read by anyone who is not authorized to do so.

The email software is available today from The Computer Company, and it is a good investment as it offers the necessary protection. The software is easy to install and use, and not only does it offer you encryption, but also the ability to easily access your email from any computer in the world.

For a free evaluation or a demonstration of our email encryption solution, please contact us today.

Call the Direct Help Line :: 800.418.2358

Why it’s Time to move Your business to the Cloud.

May 12th, 2022 by TCC No comments »

The cloud has become an increasingly popular destination for businesses of all sizes in recent years. Cloud computing can save businesses money in a number of ways. For example, by using the cloud, businesses can reduce or eliminate the need to purchase and maintain their own hardware and software.

In addition, businesses can take advantage of economies of scale by sharing resources with other organizations in the cloud. This can result in lower costs for everyone involved.

Reasons Why it’s Time to move Your business to the Cloud.

There are many other good reasons to move your business to the cloud. Here are some of the most important:

  1. Increased Efficiency: Moving your business to the cloud can increase your efficiency by allowing you to work from anywhere in the world with internet access.
  2. Reduced Costs: Cloud-based services typically have lower costs than traditional IT solutions, making them a good choice for small businesses.
  3.  Greater Flexibility: With cloud-based solutions, you can easily add or remove resources as needed, giving you greater flexibility in how you use technology. As your business grows, so do your needs for more storage, bandwidth and processing power. With the cloud, you can easily add more resources as needed without having to invest in costly infrastructure upfront.
  4. Extraordinary Back Up Protection and Disaster Recovery. Our self imposed demand for unmatched backup is key to your protection and our success. (Ask us for details when you’re ready to buy.) The Computer Company’s Cloud Service provides an easy and definitive pathway for data recovery solutions.
  5. Work from any where, any time, any device

With cloud computing, if you’ve got an internet connection, you can be at work. Improves communications, work efficiency and effectiveness. Allows you to fill blank spots in your workday, become more responsive, builds more controlled “think time” and/or “your time” when you want it!

Not moved to the cloud yet?

It’s no secret that businesses are rushing to move their operations to the cloud. The cloud offers a number of benefits, including cost savings, flexibility and agility. But it’s not just businesses that are benefiting from the cloud; consumers are too.

Call The Computer Company at 800.418.2358 

We are happy to answer any question you may have.

Beware: This fake Windows 11 upgrade infects you with malware instead

March 1st, 2022 by TCC No comments »

Hackers created an impressive fake Microsoft site to steal personal info and cryptocurrency.

We saw this article on PC World and wanted to share it with you. It was written by:
By Michael Crider
Staff Writer, PCWorld

When it comes to computer security, one must remain ever vigilant. If you need a refresher on that lesson, HP’s Threat Research department is ready to give you one today. Researchers spotted an incredibly convincing fake website, purporting to offer Windows 11 upgrades straight from Microsoft. Instead it served up a heaping helping of malware.

The scam is actually pretty impressive. The operators of “windows-upgraded.com” (now decommissioned) copied Microsoft’s presentation and style perfectly, with a big friendly “download now” button for all those interested in an upgrade or clean install. What duped users actually got was a 1.5MB ZIP file containing “Windows11InstallationAssistant.exe”, which downloads a DLL disguised as a JPEG file.

You can read the full article here.

Please visit us at: https://computercompany.net/cybersecurity-hartford/ for support.

 

Please call us at: 800-418-2358

 

Moving Your Company to the Cloud

December 7th, 2021 by TCC No comments »

The buzzword is out there and everyone is doing it.
Now it’s time for you to take the first step.

Today users can work without knowing the location and other details of the computing infrastructure. Cloud computing services and cloud storage deliver software applications, data access, data administration and storage for everyday businesses saving time and money. Because your server will be part of the cloud you will access your data from anywhere at any time.

Do you require a hosting company that is flexible enough to meet your unique environment? The Computer Company will work with you to architect a design that provides the necessary bandwidth, processing power and storage so your business can seamlessly operate in the cloud.

There are many benefits to moving your business to the cloud:
  • The flexibility of connection options. This means you get access to your data while you are off-site, employees can connect to their virtual office, quickly and easily.
  • Collaboration efficiency. Employees can communicate and share work more easily.
  • Automatic updates. You get the latest technology, up-to-date software, servers upgrades, and computer processing power.
  • Reduced costs (everyone’s favorite!). Moving to cloud computing usually will reduce the cost of managing and maintaining your IT systems.
  • Flexibility for sizing. Your business will have the flexibility required as your needs change for your software and storage.
  • Business continuity. You can relax knowing that you are protecting your data and systems.
The points below are from an article written by James A. Martin, PCWorld contributing editor

Cloud Computing.

For some, the term is wildly nebulous. For others, cloud computing instantly raises concerns about security and reliability. After all, Gmail, a popular cloud-based e-mail service has endured some high-profile outages.

Before you dismiss the cloud as a lot of vapor, though, listen to what small-business people told us about their experiences with it:

  • “We saved over $4000 in up-front costs by moving to an entirely cloud-based solution [for e-mail, Web hosting, virus protection, and more]. We were also able to substantially reduce our power bill and the costs needed to maintain and upgrade hardware.”
  • “As a non-IT person, I find cloud-based applications easier to set up and use than many computer applications, and I don’t need to rely on internal IT support as much for assistance.”
  • “A power surge nearly destroyed our in-house e-mail server. Had we not recovered it, a great deal of historical knowledge and valuable information would have been lost forever, not to mention the lost productivity for days or weeks. Now we have a secure, redundant, cloud e-mail system we can access anywhere, anytime, with a consistent interface, and it’s made our business stronger.”

Small businesses looking to cut computing costs and improve efficiency are finding the many benefits of Internet-based software and services increasingly attractive. Cloud computing evolved as a term to describe free or subscription-based services delivered in real time over the Internet.

Cloud Computing can refer to software as a service, to file storage, synchronization, backup, other utility computing, and to infrastructure as a service.

 

Must Read: 5 likely cyber attacks

November 3rd, 2021 by TCC No comments »

The 5 cyber attacks you’re most likely to face.

We found this great story, and wanted to repost it for you.

Don’t be distracted by the exploit of the week. Invest your time and money defending against the threats you’re apt to confront.

The threats companies think they face are often vastly different than the threats that pose the greatest risk. The fact is most companies face the same threats — and should be doing their utmost to counteract those risks. Here are the five most common successful cyber attacks.

Cyber attack No. 1: Socially engineered Trojans

Socially engineered Trojans provide the No. 1 method of attack (not an exploit or a misconfiguration or a buffer overflow). An end-user browses to a website usually trusted — which prompts him or her to run a Trojan. Most of the time the website is a legitimate, innocent victim that has been temporarily compromised by hackers. Usually, the website tells users they are infected by viruses and need to run fake antivirus software. Also, they’re nearly out of free disk space and need a fake disk defragger. Finally, they must install an otherwise unnecessary program, often a fake Adobe Reader or an equally well-known program. The user executes the malware, clicking past browser warnings that the program could possibly be harmful. Voilà, exploit accomplished! Socially engineered Trojans are responsible for hundreds of millions of successful hacks each year. Against those numbers, all other hacking types are just noise.

Countermeasure: Social engineered Trojans are best handled through end-user education that’s informed by today’s threats (such as trusted websites prompting users to run Trojans). Enterprises can further protect themselves by not allowing elevated users to surf the Web or answer email. An up-to-date anti-malware program can’t hurt, but strong end-user education provides better bang for the buck.

Cyber attack No. 2: Unpatched software

Coming in a distant second is software with known, but unpatched exploits. The most common unpatched and exploited programs are Java, Adobe Reader, and Adobe Flash. It’s been this way for a few years now. But strangely, not a single company I’ve ever audited has ever had these three programs perfectly patched. I just don’t get it.

Countermeasure: Stop what you’re doing right now and make sure your patching is perfect. If you can’t, make sure it’s perfect around the top most exploited products, including Java, Adobe, browser admins, OS patches, and more. Everyone knows that better patching is a great way to decrease risk. Become one of the few organizations that actually does it.

Cyber attack No. 3: Phishing attacks

Approximately 70 percent of email is spam. Fortunately, anti-spam vendors have made great strides, so most of us have reasonably clean inboxes. Nonetheless, I get several spam emails each day, and a least a few of them each week are darned good phishing replicas of legitimate emails.

I think of an effective phishing email as a corrupted work of art: Everything looks great; it even warns the reader not to fall for fraudulent emails. The only thing that gives them away is the rogue link asking for confidential information.

Countermeasure: Decreasing risk from phishing attacks is mostly accomplished through better end-user education — and with better anti-phishing tools. Make sure your browser has anti-phishing capabilities. I also love browsers that highlight the domain name of a host in a URL string. That way windowsupdate.microsoft.com.malware.com, for example, is more obvious.

Cyber attack No. 4: Network-traveling worms

Computer viruses aren’t much of a threat anymore, but their network-traveling worm cousins are. Most organizations have had to fight worms like Conficker and Zeus. We don’t see the massive outbreaks of the past with email attachment worms, but the network-traveling variety is able to hide far better than its email relatives.

Countermeasure: Network-traveling worms can be defeated by blocking executables in email, better patching, disabling auto-run capabilities, and strong password policies. Many network worms, like Conficker, will try to exploit network shares by logging on using a list of built-in, bad passwords: 12345, password2, qwerty, and the like. If any of your passwords are listed in the password manifest inside of a worm, you do not have a strong password policy.

Cyber attack No. 5: Advanced persistent threats

Lastly, I only know of one major corporation that has not suffered a major compromise due to an APT (advanced persistent threat) stealing intellectual property. APTs usually gain a foothold using socially engineered Trojans or phishing attacks. A very popular method is for APT attackers to send a very specific phishing campaign — known as spear-phishing — to multiple employee email addresses. The phishing email contains a Trojan attachment, which at least one employee is tricked into running. After the initial execution and first computer takeover, APT attackers can compromise an entire enterprise in a matter of hours. It’s easy to accomplish, but a royal pain to clean up.

Countermeasure: Detecting and preventing an APT can be difficult, especially in the face of a determined adversary. All the previous advice applies, but you must also learn to understand the legitimate network traffic patterns in your network and alert on unexpected flows. An APT doesn’t understand which computers normally talk to which other computers, but you do. Take the time now to start tracking your network flows and get a good handle of what traffic should going from where to where. An APT will mess up and attempt to copy large amounts of data from a server to some other computer where that server does not normally communicate.When they do, you can catch them. There are other popular attack types, such as SQL injection, cross-site scripting, pass-the-hash, and password guessing, but they aren’t seen nearly at the same high levels as the five listed here. Protect yourself against the top five threats and you’ll go a long way to decreasing risk in your environment.

More than anything, I strongly encourage every enterprise to make sure its defenses and mitigations are aligned with the top threats.
Don’t be one of those companies that spends money on high-dollar, high-visibility projects while the bad guys continue to sneak in using routes that could have easily been blocked.

This story, “The 5 cyber attacks you’re most likely to face,” was originally published at InfoWorld.com By Roger A. Grimes


The Computer Company is now approved as a Microsoft Office 365 GCC Partner!

June 30th, 2021 by TCC No comments »

What’s New?

The Computer Company is now approved as a Microsoft Office 365 GCC Partner!
What this means to you is we can now offer you GCC licensing options. What is Microsoft Office 365 GCC? It stands for Microsoft 365 Government Community Cloud High (GCC High).

To meet the unique and evolving requirements of the United States Department of Defense, as well as contractors holding or processing DoD-controlled unclassified information (CUI) or subject to International Traffic in Arms Regulations (ITAR), Microsoft offers GCC High and DoD environments. And now you can have Microsoft Office 365 GCC for your business.

The Office 365 US Government service description is designed to serve as an overlay to the general Office 365 service description. It defines the unique commitments and differences compared to Office 365 for enterprise offerings. Microsoft reminds you not to share any controlled, sensitive, or confidential information with customer support personnel as part of your support incident when using Office 365 GCC High/DOD, at least until you confirm the support agent’s authorization to view or access such data.


 

So, find out how you can save money AND get this high security for your business.

Call today – 800.418.2358

How do Cloud Computing Services Save You Time and Money?

June 14th, 2021 by TCC No comments »

The buzz word is out there and everyone is doing it.
Now it’s time for you to take the first step.

Today users can work without knowing the location and other details of the computing infrastructure. Cloud computing services and cloud storage deliver software applications, data access, data administration and storage for everyday businesses saving time and money.

Because your server will be part of the cloud you will access your data from anywhere at any time.

Please watch video.

There are many benefits to moving your business to the cloud.
So How do Cloud Computing Services save time and money?

  • Flexibility of connection options. Access to your data while you are off-site, employees can connect to their virtual office, quickly and easily.
  • Automatic updates. Latest technology, up-to-date software, servers upgrades and computer processing power.
  • Reduced costs (everyone’s favorite!). Moving to cloud computing usually will reduce your cost of managing and maintaining your IT systems.
  • Flexibility for sizing. Your business will have the flexibility required as your needs change for your software and storage.
  • Business continuity. You can relax knowing that you are protecting your data and systems.
  • Collaboration efficiency. Employees can communicate and share work more easily.

Please watch video.

We look forward to hearing from you!