Back to Top

Tech, Web, Cloud & Cabling Services

Category: Tips & Info

Tips & Info Category

Benefit Concert for Sandy Victims

If you’ve been watching the coverage of Hurricane Sandy and wondering how to help, you’ll have a chance to pitch in on Friday.

Hurricane Sandy: Coming Together,” a benefit concert to aid victims of the storm that devastated the Northeast, will air at 8 p.m. ET on the networks of NBC Universal.

Bruce Springsteen and the E Street Band, Jon Bon Jovi, Sting, Christina Aguilera and Billy Joel will perform in the show, which will be hosted by TODAY’s Matt Lauer. Brian Williams and Jimmy Fallon will make appearances, too.

Money collected will be donated to the American Red Cross relief efforts. The special will air Friday at 8 p.m. ET on NBC, USA Network, SyFy, MSNBC, CNBC, Bravo, E!, Style Network, G4 and more. It will also be live streamed on NBC.com.

The American Red Cross is providing shelter, food, emotional support and other assistance to those affected by disasters like Hurricane Sandy. To donate, visit RedCross.org, call 1-800-RED-CROSS or text the word REDCROSS to 90999 to make a $10 donation.

BBB Advises Caution for Web Surfers

Protecting your identity is important and with Wi-Fi networks popping up nearly everywhere, many consumers don’t realize the dangers that come with using a Wi-Fi connection that is not their own. According to a recent poll conducted by Wakefield Research and Wi-Fi Alliance, 32 percent of respondents said they have tried to get on a Wi-Fi network that was not their own, a startling 18 percent more than a December 2008 poll. The Better Business Bureau, along with the Federal Trade Commission (FTC), urges consumers to think ahead before surfing the Web on a Wi-Fi hotspot.

Wi-Fi hotpots like coffee shops, libraries, airports, hotels and universities are all breeding grounds for hackers. According to the FTC, new hacking tools—available for free online—make hacking easy, even for users with limited technical know-how.

Consumers should be cautious before using a non-secure wireless network and before sending personal information via unencrypted websites. When surfing on a non-secure Internet connection, an individual’s personal information, private documents, contacts, photos and even login information can be up for grabs as other users on the network have the capability of seeing what is being sent.

Steve Cox, President and CEO of the Council of Better Business Bureaus, warns consumers against two popular security scams that can be associated with using an unsecure Internet connection. “Many consumers don’t realize the repercussions that come from using a Wi-Fi hotspot. Phishing, a popular e-mailing scam, and smishing, a SMS texting scam, grow exponentially when hackers obtain access to personal information on the Web via an unsecure Wi-Fi network.” BBB urges consumers to protect themselves from such scams by securing their Internet surfing.

In order to confirm that an Internet connection is secure, BBB advises consumers to follow the FTC’s top Wi-Fi tips:

Make sure the connection is protected by a unique password. If a Wi-Fi hotspot doesn’t ask for a password, the Internet connection is not secure. If a hotspot asks for a password just to grant access, consumers should proceed as if the connection were unsecured. Only trust home and work internet connections that are protected by a customized user password. Wi-Fi hotspot connections with generic passwords are vulnerable to hackers.

Transmitted information should be encrypted. When sending personal information like addresses, credit card numbers and Social Security numbers over the Internet, make sure the website is fully encrypted and the network is secure. Look for https (the “s” stands for secure) at the beginning of the URL address to confirm its security.

Don’t stay permanently logged-in to wireless hotspots. Never leave your Internet connection running while your computer is unattended and make sure to log-off after every use.

Change your passwords frequently. When creating new accounts, make sure you use different passwords. Do not use the same password for different sites. If one password is hacked, the chances of other accounts being hacked becomes greater with repeated passwords.

For more advice on security scams, visit www.bbb.org or to learn more about protecting your privacy online and what to do if your information is compromised, visit www.OnGuardOnline.gov and http://www.ftc.gov/opa/2011/02/wireless.shtm

8 Ways iPhone 8 Beats Galaxy S8

The Galaxy S8 might be the best phone of 2017, but the year’s not over until the next iPhone makes its debut. Here’s how Apple can take the crown back from Samsung.

If there wasn’t already a mountain of pressure on Apple to deliver something spectacular with this year’s iPhone update, there surely is now. If you haven’t noticed, Samsung has released the Galaxy S8 and S8+, and they’re pretty remarkable. As a former iPhone 7 Plus user, the S8+ might very well be the best phone I’ve ever used, with a stunning screen, speedy processor, and, yes, a gorgeous design.

But what makes the S8 so amazing is how unique it is. For the first time in a while, Samsung is standing alone on the cutting edge with a phone that needs to be seen to be believed. From its barely there bezels to its brilliant wraparound screen, the Galaxy S8 truly gives Apple a run for its money. No joke, it actually makes the iPhone 7 look pretty stale.

But there’s still a lot of time between now and the release of the next iPhone. According to rumors, the lineup this year will consist of the usual S models along with a fantabulous iPhone 8, which looks to adopt a similar aesthetic to the Galaxy S8, with an edge-to-edge OLED display and the removal of the physical home button. But just because it might look similar doesn’t mean it can’t still be better. Here’s how Apple can still steal the crown from Samsung:

The Galaxy S8 has a killer camera but the iPhone 7 is no slouch.

Killer camera

The Galaxy S phones has always had a camera on par with the iPhone, so it was a little surprising that Samsung didn’t upgrade the S8’s all that much. The iPhone 7 Plus is already a step ahead here, with 2X optical zoom and the sublime Portrait Mode, but the iPhone 8 could really separate itself from the S8 by taking it even further. Along with a megapixel bump, Apple could add optical image stabilization to the second lens, which will go a long way toward increasing photo and zoom quality. But what would really set it apart would be a larger sensor and greater ISO range to make it a low-light leader.

The Gear VR is a big part of the S8, but AR could be the iPhone 8’s big play.

AR not VR

While Samsung is going all-in on virtual reality with the Galaxy Gear and the S8, rumors suggest that Apple is more interested in augmented reality. And that could be one of the features that sets the iPhone 8 apart. Smartphones have been slow to incorporate AR into the interface, but if Pokémon Go has taught us anything, it’s that people are way more interested in seeing the world through their screens than strapping a headset to their faces. An AR-fueled iPhone 8 could connect us to the world in fun new ways without separating us from reality.

The Galaxy S8’s fingerprint sensor is just in the worst place.

Well-placed fingerprint sensor

While the Galaxy S8 is one of the best smartphones ever made, one tragic flaw prevented it from being perfect: the placement of the fingerprint sensor. For some god-awful reason, Samsung put it right next to the camera, all but ensuring your finger will not only miss it, but also repeatedly smudge the lens. If the rumors are correct that Apple will also be removing the home button in the iPhone 8, it has two options: under the screen or on the back. A first-of-its-kind in-panel sensor would be revolutionary, but if it’s on the back, Apple needs to learn from Samsung’s mistake and put it lower, like on the Pixel.

Bixby hasn’t exactly exploded out of the gate, but it does a lot that Siri doesn’t do.

Expanded Siri

When Samsung unveiled the S8, a major part of the presentation was spent introducing its new AI assistant, Bixby. However, the new service wasn’t just a competitor to Siri, Alexa, and Google Assistant. Samsung integrated Bixby deep into the interface to let it access apps, fetch information, and cut down on how often we need to touch our phones. It’s a cool idea, except the only problem is it doesn’t really work. If Apple could do something similar with Siri and expand its reach to work inside apps while we’re using them, it could beat Bixby at its own game.

The Galaxy S8’s screen is pretty, but It also uses its software to accentuate it.

iOS 11

One of the biggest gripes people have had about Samsung’s phones has always been its TouchWiz interface. But that’s changed with the S8, as Samsung has crafted an intuitive, refined system that takes full advantage of its superb hardware. If Apple is going to release a radically redesigned iPhone with curved edges and a wraparound screen, the same old iOS isn’t going to do it justice. It might be time to rethink iOS for modern times and give it more than new features and a fresh coat of pixels.

Samsung’s wireless charging supports Qi and PMA standards, and the pad stands up or lies flat. But it’s not long range wireless.

True wireless charging

While Samsung has had wireless charging in the Galaxy S since the S6, Apple has been slow to adopt it for the iPhone. All signs indicate that’s going to change for the iPhone 8, but if Apple wants to top the Galaxy S8 and not just keep pace, it’s going to need something a little more exciting than a pretty charging pad. One of the rumors we’ve read suggests that Apple could adopt true long-range wireless charging for the next iPhone, which would power up the battery whenever you’re within range of the charger, even if it’s in your pocket. That alone would be an S8 killer.

The Galaxy S8 includes a pretty great pair of earbuds.

Bundled AirPods

Samsung didn’t just resist the trend to ditch the headphone jack on S8, it embraced the 3.5mm jack in a big way. Inside the S8 box is a pair of premium AKG-tuned earbuds that are a few steps above the usual build and sound quality you get for free—certainly better than what Apple gives us. But if Apple really wants to embrace the wireless future of the iPhone, it needs to stop including a wired set of EarPods, even if they are Lightning. A pair of AirPods in the box (or a cheaper Beats alternative) would really set it apart from the 3.5mm S8 and make a strong statement.

The battery life on the S8 is really good, but the iPhone 8’s could be even better.

Blow-away battery

Samsung has had its share of battery issues, but the S8 looks to put them in the past with a long-lasting battery that hopefully won’t blow up. But while it can get through the whole day for the most part, the S8 didn’t deliver the the real breakthrough we were hoping for. We’re still waiting for a phone that lets us completely forget about the battery until our day is over, and we’d love to see the iPhone 8 deliver something in the range of 12 hours and truly change the game.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

7 Google Chrome Tweaks for Efficiency

If you spend most of your workday with Google’s browser, you’ll want to put these Chrome tips to work so you can get more done in less time.

Live your best Chrome life

You probably live most of your computing day inside Google’s browser. Despite its tendency to be a resource hog, it’s still the most capable browser for its speed and optimization on the web’s most important sites.

But there’s always room to improve, especially given Chrome’s flexibility and strong feature set. This collection of tips will help you start the day off with just the sites you want, work quicker with keyboard commands, and ensure you can save the stuff you need for later use.

Stick a pin in it

Pinning tabs that you use throughout the day saves you screen real estate and keeps you from having to reopen tabs several times over. Right-click on a tab and select Pin tab to minimize it to the left side of the browser. It’ll be identifiable by the page’s favicon.

Keep in mind, when you close the browser, those tabs will reopen as pinned tabs when you relaunch Chrome. So if you don’t want to start your next session with 10 pinned tabs, you’ll need to unpin them by right-clicking and then selecting Unpin tab before closing the browser.

Reopen that tab you didn’t mean to close

There’s one, specific hotkey command that saves my bacon about 25 times a day: Control-Shift-T, which reopens the last tab closed. When you’ve got 70 or so different tabs open, you’re bound to close the wrong one from time to time.

That’s why it behooves you to memorize this command. Better yet, take a few moments to learn some of the other hotkeys shown here that will help you zip through your tabs, close them all, or quit Chrome altogether. Just as hotkeys help you work faster in Windows, the same level of convenience applies to Chrome.

Grab a Chrome extension

It’s very likely that your favorite desktop software has an accompanying Chrome extension that let’s you perform related tasks within the browser. If so, grab it. After all, the web touches a lot of aspects of the work you do. For example, Microsoft’s OneNote offers a useful Chrome extension for grabbing articles and other bits of the internet for later retrieval. Same goes for Evernote, another popular note-taking solution. And there’s a Chrome extension that notifies you of Skype alerts. Head to the Chrome Web Store to find the extensions you need.

Embrace Google Cloud Print

Google Cloud Print may still have that annoying beta tag, but it’s vastly improved since the service’s early days. It’s now reliable, and the fastest way to print a document without needing to futz with the Windows print menu.

Most printers can be added quite easily, so head to the Cloud Print site to enroll yours. Another great feature is that you can also save files right to Google Drive, helping you keep track of tax-payment confirmations or other key documents.

Know your history

Macs and iOS devices talk together very well through a feature called Handoff. Open a browser tab on the iPhone, and you can pull it up right away on your Mac.

Chrome has created something that’s not quite as seamless, but gets the job done for those of us who live outside of Fortress Apple. Control-H pulls up a list of your most recent tabs from all your devices. Next, touch Tabs from other devices to choose the site you want to check out. You can select what you were just looking at or something from a while back.

Go big (with text)

Save your eyes from strain. You can expand the text on a browser page in a couple of different ways. Hit Control+ to zoom in, and Control- to zoom out. Alternatively, pinching-and-zooming on a PC with a touchscreen will do the trick and gives you a more direct feel for what you want to see.

Control 0 will return you to the normal page size once you’re done with the close inspection.

Start off right

You can get right to work more quickly if you launch your browsing session with the sites you use most often. Go to Settings > On Startup and choose Open a specific page or set of pages.

Then, you can add your favorite pages by typing in the URLs or clicking the button for Use current pages. This’ll ensure that next time you launch Chrome, you can get right to work with the pages you need.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

5 Ways to Prep for Hurricane Season

Hurricane season is from June 1 through November 30.  On October 29, 2012 the East Coast was hit with Hurricane Sandy.  Many businesses are still recovering and rebuilding from the largest Atlantic Hurricane on record.  Power outages, high winds and flooding affected many areas in New Jersey and New York.

The Small Business Administration and Agility Recovery hosted “Protect Your Business This Season” webinar.  

oct29_sat

Below are five steps to protect your business before a disaster like Hurricane Sandy:

Evaluate Risks

All types of risks exist such as environmental disasters, organized disruption, loss of service, equipment failure and many more.  Assess your company building for risks (inside and outside).  Also, assess business losses during and after a disaster strikes.

Calculate the cost of interruption

Calculating for  “post-disaster”  consists of many different scenarios.  Creating a plan for up to six months of interruptions for your company.  Another major concern is to design a backup plan with secondary vendors in case all primary vendors cannot provide their specific services. 

Insurance Coverage

Consult with your agent and an insurance expert when buying insurance for your business.  Insurance policies vary, it is important to design a policy that best fits your needs.

Create a communication plan

Gather primary and secondary e-mail addresses for all employees, contractors, vendors and customers to put an e-mail alert system in place.  Businesses could also use Social Media to alert public before and after a disaster.

Telework Policy

If a disaster strikes, employees may not have the ability to travel to the office.  Setting up a Telework Policy will grant employees access to work from home.  This policy can be for all employees or specific employees.  

Need help preparing for Hurricane season?

Contact us at 856-745-9990 or click here.

 

5 Tips to Stay Cyber-Safe This Season

With more consumers spending money online, sales will rise, but so will the risk of exposure to some sort of scam or cyber-crime right alongside those fabulous deals.

Black Friday and Cyber Monday may mark the high points of the holiday shopping season, but they are by no means the end of it. In a still struggling economy, with everyone searching for value, consumers will encounter technology deals that might seem too good to be true.

As reported by the Dow Jones newswires, online shopping may well top $1 billion dollars on a single day this year. With more and more consumers willing to spend money online, sales will rise, but so will the risk of exposure to some sort of scam or cyber-crime right alongside those fabulous deals.

So, how can you avoid being taken advantage of?

There are many ways to keep yourself, your privacy, and your money safe this holiday season. But, as the countdown to Christmas grows shorter, many of us abandon our common sense in the desperate pursuit of that one great gift or that one fantastic deal.

Therein lies the problem. The number one way to guard against online scams is to employ some common sense.
For example, many of us will go to extreme lengths to save a few dollars. This often includes venturing off the ‘beaten path’ and looking outside the major retailers on online auction or classified sites such as E-Bay or Craigslist, which the Better Business Bureau has cautioned against. While many of the deals offered on such sites are perfectly legitimate, the likelihood of stumbling into a scam is far greater on these sorts of sites.

Tip #1 — If a deal seems too great, it probably is, especially if it’s from an individual user or a ‘minor’ retailer. Be suspicious of any deal or sale that you can’t believe is real. Maybe you’ve found the best buy of the season, but it’s more likely that you’ve stumbled into a scam set up to defraud you and steal your money or information.
It’s also important to remember that anyone you do business with online knows more about Internet commerce — and its dangers — than you do.

An excellent Tip #2 is to do some research about any online vendor you’re considering making a purchase from. Some vendors believe quality customer service goes hand in hand with turning a profit. Others, however, such as Vitaly Borker, seem to value their bottom line over the satisfaction of their customers.

As reported in the New York Times and on Cnet.com, Borker took advantage of loopholes in credit card policies to refuse refunds and threaten customers. Only when he was in danger of being cut off by Visa and MasterCard did Borker begin meeting his customer’s needs.

Some simple research might have tipped customers off that Borker’s website was one to be avoided.

As heinous as Borker’s actions may seem, they do bring to light Tip #3 for the online shopper: understand your credit cards. Borker and other merchants like him, were able to take advantage of customers because of the rules set up by the credit cards those customers use.

With credit card purchases being the dominant form of online shopping, it’s vital that consumers know the policies of the cards they use and what recourse they have should those policies be abused.

Tip #4 — Consumers would also be wise to investigate other forms of payment, such as PayPal or Bill Me Later, a PayPal service. While alternative methods may not offer the convenience of credit cards, they may provide more security against potential scams and those who know how to abuse the system.

Regardless of where and when you shop online, Tip #5 applies: be cautious. The Internet can be a dangerous place at the best of times. During the often stressful and expensive holiday season the dangers increase exponentially.

Be wary every time you shop online and help to make sure this time remains a time of giving, and not of taking.

To read the original article in it’s entirety please Click Here

5 Disaster Recovery Tools

11971488181629439895barretr_Lifesaver.svg.hiTakeaway:  Five useful tools that are satisfactory for Disaster Recovery.

Quick Disaster Recovery

Quick Disaster Recovery can restrict applications from opening at Startup and re-enabling Windows Administrator tools such as Task Manager and Registry Editor. (Free)

Clonezilla

Clonezilla is compatible with Windows, Mac OS and Linux.  Clonezilla has the capability to perform disk imaging/cloning.

There are two versions available:

  1. Clonezilla live – Backup and restore on a single computer.  (Free)
  2. Clonezilla SE – Backup and restore on 40+ computers simultaneously.  (Free)

Macrium Reflect

Macrium Reflect is compatible with Windows XP, Vista, 7 and 8.  Macrium Reflect has the capability to perform disk imaging/cloning, schedule backups, supports RAID and GPT and has a Linux Rescue CD.

There are three versions available:

  1. Home-use Desktop Version (Free)
  2. Pro Desktop Version ($58.99)
  3. Pro Server Version ($199.99)

DriveImageXML

DriveImageXML has the capability to perform disk imaging/cloning, browse and restore images.  Browsing images allows you to restore files, folders or the entire disk image.

There are three options available:

  1. Home-use license (Free)
  2. 5 user license ($100.00)
  3. 100 user licenses ($500.00)

System Rescue CD

System Rescue CD is a Linux rescue disk compatible with Linux and Windows.  This rescue disk can recover data, manage partitions and edit configuration files. 

The System Rescue CD can be modified to your specific needs by adding specific tools or scripts.  (Free)

For disaster tips for your office or home, click here.

Keep Your Emails Out of Spam: 10 Ways

Takeaway: Legitimate messages that get snagged by spam filters can lead to big problems — such as derailed job searches, hard feelings, and lost business. These tips will help ensure that your messages reach their intended targets.

Most spam filters use a scoring system. Each offense has a value. The higher the sum of a message’s offenses, the more likely a spam filter will reroute the message (or not delivered at all). A lone offense usually isn’t enough to flag a message as spam; it takes a combination of violations to score high enough to meet the level of true spam. But the system isn’t perfect, and sometimes overzealous filters flag legitimate messages as spam. Applying the following do’s and don’ts will help you ensure that your legitimate messages pass the spam filter test and reach their intended Inboxes.

1: Do curtail your excitement

Specific words and phrases are the number one hook for spammers, and that makes them the best tool for catching spam. Discussions of large sums of money and amazing breakthroughs top that list. Offering a money back guarantee or a way to save money — Why pay more? — may be part of a legitimate offer, but it will set off spam alarms. Your message might excite you, but multiple exclamations points will also excite spam filters. All uppercase characters might convey your enthusiasm, but they’ll also set off spam filters. Just using the word urgent is enough to put a spam filter on alert.

Avoid using words and phrases that trigger spam filters. You don’t have to memorize a long list, just visit a few of the Web sites that maintain lists of spam keywords. Use the phrase “spam keywords” in your favorite search engine and you’ll get plenty of hits. Look for current lists, as the keywords are updated regularly. It’s okay to share good news and special offers with associates and clients. Just bypass all the hype.

2: Do use plain text

An email that consists of all HTML or all images and links will trip a spam alarm. HTML is certainly okay, as long as it’s good code and it doesn’t comprise the entire message. Sloppy HTML code is also an easy giveaway for spam.

Go ahead and use good HTML code but also include as much plain text as possible. That’s a clue to the spam filter that the email is legitimate. Besides, you’ll want to accommodate recipients who choose to view the message in plain-text format.

3: Don’t include attachments

Avoid attachments when possible. Spam often contains destructive attachments, so filters tend to overreact to an attachment. Links are a better alternative, if feasible.

4: Do check your sender score

A sender score grades your reputation as a sender. Your average business or personal account probably isn’t going to learn much from this score. Businesses that rely on frequent email campaigns will. If that includes you, check your sender score often and be proactive about repairing damage. A bad reputation can result in email being filtered, regardless of content.

5: Don’t send spam!

If you maintain a large list, for marketing — for any purpose really — make sure the members of your list want your email. Sending spam will get your domain and your business blacklisted and it’s difficult to get off those lists. Once you’re on a blacklist, most spam filters will snag your mail, regardless of its content. Remember, your reputation is important as your message (#4).

Hint: Exchanging business cards is not an invitation to send spam unless that condition is made clear during the exchange.

6: Don’t use colored fonts

Black type seems boring, but in truth, it’s easy to read and looks professional and clean. Don’t be fooled into thinking that colored fonts will create eye-catching opportunities to promote your message. They might, but they’ll also excite spam filters.

7: Do test your recipient list

When you send an email or newsletter to a list, test the message in as many client applications on as many operating systems as possible. Simply send the message to yourself or to a test account and retrieve it on several machines using different operating systems and email clients.

8: Don’t use the word test in your test message

When testing an email or newsletter (#6), don’t use the word test in the subject line. Most server filters will snag the message, regardless of the message’s content. You’ll waste time trying to fix the content when that single word may be the culprit.

9: Do compose a succinct subject

Your subject line should be as specific as possible. Smart filters assume that spammers can write a reasonable subject line. What they’ll lack is detail. The more specific your subject is the better. For example, the subject Tomorrow’s Project Meeting is reasonable but generic. A better subject might mention the time, the meeting room, and so on. Don’t go overboard, but include details if possible.

10: Do rely on professional experts

For most of us, a legitimate message that’s snagged by a spam filter can mean lost business or at the very least, hard feelings. These tips aren’t meant for professional online marketing operations. If you’re considering an online marketing campaign for your business, don’t wing it! You could inadvertently damage your company’s reputation. Hire a professional who specializes in online marketing to keep you on the right side.

To view the original message in it’s entirety Click Here

49% of Businesses Hit by Ransomware

Ransom is the top motivation behind cyber attacks, according to a report from Radware, and IT professionals are most concerned about data loss. Here’s what you need to know.

Nearly half of businesses report that they were the subject of a cyber-ransom campaign in 2016, according to Radware’s, Global Application and Network Security Report 2016-2017.

Data loss topped the list of IT professionals’ cyber attack concerns, the report found, with 27% of tech leaders reporting this as their greatest worry. It was followed by service outage (19%), reputation loss (16%), and customer or partner loss (9%).

Malware or bot attacks hit half of all organizations surveyed in the last year. One reason for the pervasive attacks? The Internet of Things (IoT). Some 55% of respondents reported that IoT ecosystems had complicated their cybersecurity detection measures, as they create more vulnerabilities.

Ransomware attacks in particular continue to increase rapidly: 41% of respondents reported that ransom was the top motivator behind the cyber attacks they experienced in 2016. Meanwhile, 27% of respondents cited insider threats, 26% said political hacktivism, and 26% said competition.

While large-scale DDoS attacks dominated the headlines of 2016, this report found that only 4% of all attacks were more than 50 Gbps, while more than 83% of DDoS attacks reported were under 1 Gbps.

“One thing is clear: Money is the top motivator in the threat landscape today,” said Carl Herberger, vice president of security solutions at Radware, in a press release. “Attackers employ an ever-increasing number of tactics to steal valuable information, from ransom attacks that can lock up a company’s data, to DDoS attacks that act as a smoke screen for information theft, to direct brute force or injection attacks that grant direct access to internal data.”

Despite the growth in attacks, some 40% of organizations reported that they do not have an incident response plan in place, the survey found.

The report listed five cybersecurity predictions for 2017:

1. IoT will become an even larger risk. The Mirai IoT Botnet code is available to the public, making it more likely that cyber criminals of all experience levels are already strengthening their capabilities. “In 2017, exponentially more devices are expected to become targeted and enslaved into IoT botnets,” the press release stated. “IoT device manufacturers will have to face the issue of securing their devices before they are brought to market, as botnet attacks from these devices can generate large-scale attacks that easily exceed 1 Tbps.”

2. Ransomware attacks will continue to grow. These attacks will target phones, laptops, and company computers, and will likely take aim at healthcare devices such as defibrillators in the future, the press release stated.

3. Permanent Denial of Service (PDoS) attacks on data centers and IoT operations will rise. PDoS attacks, sometimes called “phlashing,” damage a system to the degree that it requires hardware replacement or reinstallation. These attacks are not new, but Radware predicts they are likely to become more pervasive in 2017 with the plethora of personal devices on the market.

4. Telephony DoS (TDoS) will become more sophisticated. These attacks, which cut off communications in a crisis, “could impede first responders’ situational awareness, exacerbate suffering and pain, and potentially increase loss of life,” the press release stated.

5. Public transportation system attacks will rise. As cars, trains, and planes become more automated, they also become more vulnerable to hackers, Radware stated.

You help your business avoid ransomware attacks and other cyber threats by keeping software up to date, backing up all information every day to a secure, offsite location, segmenting your network, performing penetration testing, and training staff on cyber security practices.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Is Your Yahoo Password in 450K Leak?

Takeaway: Hackers have posted 450K Yahoo email addresses and passwords online, and hint Gmail, Hotmail, other services are next. How can you check if your users’ accounts are among them?

Hackers posted more than 400,000 Yahoo Voice and email names and passwords and the posting might not be over yet.

Yahoo reps say they are working on the compromised system–not great timing for a beleaguered company enduring what Yahoo chair Alfred Amoroso called a “tumultuous” time for the company. The firm apologized in an online statement and did not comment further at this writing.

Not a Yahoo user? IT pros and security experts worry this most recent hack on Yahoo – allegedly perpetrated by a group calling itself d3dd3 – is likely “way bigger than Yahoo,” said Marcus Carey, in a Reuters report. Hotmail, MSN, Live, Gmail and other personal services are at risk, too, he said.

NOTE: If you want to check your own or other users’ Yahoo emails to see if they are part of the current leak, there’s an easy way to check here at Sucuri Malware Labs. Just type in the email address and search.

Plan for next time

Change passwords. Consider training customers on utilities like Lastpass. IT pros we interviewed across the board said users in enterprises who use open cloud-based email services, or other non-enterprise communication methods like Skype or Google Groups, should, at the very least, be using such utilities, which provide more control and protection in case of events like this one.

With so much data potentially compromised via users relying on such BYOD services as these, “the process (to avoid future attacks) is much easier if (users) have Lastpass,” said John Livingston, a tech pro for the American Red Cross in Savannah, Georgia. “Time to change your Yahoo, Google, Hotmail, and AOL passwords. And with LastPass, each site and service has a unique password, which limits damage if the password does get out. Changing passwords then is quick and easy. Plus if you’re a manager you don’t have to worry about remembering a new password.”

“Once this clears, I will be changing the passwords for Gmail, even though there’s no confirmation on that (hack) yet,” said Brian Geniesse, who works the IT tech desk at his firm in Monominee, Michigan. “Also be careful. Password managers can be hacked just the same.”

Yahoo is to blame ultimately, most IT pros we interviewed told us.

“Shame on Yahoo for not running normal security audits on (its) networks – and services that would have detected the SQL injection vulnerability (reportedly) used in the attack,” adds Dan Phillips, an IT pro in Cambridge, Ontario, Canada.

Geniesse expanded on that with a message that will resound with most IT pros and CTOs. Most people use weak passwords–see below.

“You can preach the use of LastPass and the like until you are blue in the face but users will never change their habits unless you force them,” Geniesse said. And “Yahoo needs to force some kind of password complexity to help protect their users.”

So many folks are checking the hack post, the hackers allegedly responsible are having trouble maintaining traffic load. Due to high traffic on this group’s site, the page with the Yahoo hacked emails and passwords is going up and down. We caught part of it in a cut and paste.

When it was up earlier today, it read in part:

We hope that the parties responsible for managing the security of this subdomain will take this as a wake-up call … not as a threat …

There have been many security holes exploited in webservers belonging to Yahoo … ?that have caused far greater damage than our disclosure (today). Please do not take (the posting) lightly. The subdomain and vulnerable parameters have not been posted to avoid further damage …

The author quotes author Jean Vanier from his book, Becoming Human: “Growth begins when we begin to accept our own weakness,” Vanier wrote.

If you’re a Star Wars, Star Trek or comic book fan, just change your passwords right away, other observers add. And talk your users into it to. Check this out: CNET’s Declan McCullagh wrote a program to analyze the most frequently used passwords using data from the post of 450K email addresses and passwords. He listed:

  • 2,295: The number of times a sequential list of numbers was used, with “123456? by far being the most popular password. There were several other instances where the numbers were reversed, or a few letters were added in a token effort to mix things up.
  • 160: The number of times “111111? is used as a password, which is only marginally better than a sequential list of numbers. The similarly creative “000000? is used 71 times.
  • 780: The number of times “password” was used as the password. Apparently, absolutely no thought went into security in these instances.
  • 233: The number of times “password” was used in conjunction with a few numbers behind it. Apparently, the barest minimum of thoughts went into security here.
  • 437: The number of times “welcome” is used. With a password like that, you’re just asking to be hacked.
  • 333: The number of times “ninja” is used. Pirates, unfortunately, didn’t make the list.
  • 137,559: The number of Yahoo credentials that were leaked.
  • 106,873: The number of Gmail credentials that were leaked. Hotmail, which was the next most frequently cited e-mail service, had fewer than half the number of users hit.
  • 161: The number of times “freedom” is used, suggesting a lot of patriotic users. “America” was used 68 times.
  • 161: The number of times the f-word is used in some combination. There are a lot of angry people out there.
  • 133: The number of times “baseball” appears as a password. It’s the most popular sport on the list, proving that it is indeed America’s national pastime. It just may not be the best password.
  • 106: The number of times “superman” is used as a password. That’s nearly double the amount of times “batman” is used and triple the frequency of “spiderman.”
  • 52: The number of times “starwars” is used. The force is not with this password.
  • 56: The number of times “winner” is used.32: The number of times “lakers” appears. It tied with “maverick,” although fortunately “the_heat” or “celtics” weren’t on this list.
  • 27: The number of times “ncc1701? is used as a password. For those of you who aren’t trekkies, that’s the designation code for the Starship Enterprise. “startrek” is used 17 times, while “ncc1701a,” the designation for the Enterprise used in later Star Trek movies, is used 15 times.
CALL US NOW!