(713) 682-4000 sales@westecservices.net

Location

Creative

speed

reliability

How to Recover Deleted Files - WesTec Services

How to Recover Deleted Files

Have you ever accidentally deleted a file and then realized you need it back? Unfortunately, it’s happened to most of us at least once–and we’ve all experienced the headache that follows.

Here are a few tips that can help you try to recover a deleted file from your device:

  1. How to Recover Deleted Files - WesTec ServicesMake sure the file is really deleted – If you’re not sure whether you permanently deleted a file, be sure to look for it before making an assumption. When attempting to recover deleted files, check the Recycle Bin or Trash on your computer. Typically, you can choose the filter “Date Deleted” to make your search easier. If your file was stored in a cloud storage like Dropbox or Google Drive, check your deleted files there–it may still be recoverable.
  2. Check your backups – Making regular backups of your most important files on your device can prevent you from losing critical data when you need it. If you do have a backup, you may be able to recover your deleted files. if you don’t have a backup, now may be the time to implement one.
  3. Try to recover the file – If you deleted a file on a magnetic hard drive, shut down the computer immediately. With the computer shut down, you should remove the hard drive from the computer entirely and place it in another computer as a secondary drive. Use file-recovery software to scan the drive. If you deleted the file recently and haven’t written to the drive much, you have a fairly good chance of recovering it.
  4. Professionally recover the file – If all other methods were not successful in recovering the deleted files, you may want to consider a professional data recovery service. Professional data recovery services deal with everything from deleted and overwritten files to dying hard drives that need to be disassembled and repaired.
To continually ensure the security of business data and important files, it is recommended to perform regular data backups to your computer. If you feel that you don’t have the time or expertise, WesTec Services performs data backup and recovery services provided by our expert IT consultants.

For more information on our data backup or recovery services, contact the experts at WesTec today.
How to Avoid a Spear-Phishing Attack - WesTec Services

How to Avoid a Spear-Phishing Attack

As we discussed in a previous article, phishing is an attack that uses disguised emails as weapons aimed at masses of people. However, spear-phishing is a targeted attempt to steal sensitive information from a specific victim, such as account credentials or financial information.

During a spear-phishing attack, the perpetrator attempts to acquire personal details on the victim’s friends, hometown, employer, hang-outs, and their recent online purchases. This is typically done by disguising themselves as a trustworthy friend or entity through email, social media, phone calls, or text messages.

Because spear-phishing is the most successful form of acquiring confidential information online, it is important to practice how to avoid an attack.

How to Avoid a Spear-Phishing Attack - WesTec Services1. Beware what you post: Review your online profiles. How much personal information is available for potential attackers to view? If there is something you do not want the public to see, delete it, or ensure your privacy settings are properly configured.

2. Use smart passwords: It is not wise to use the password for every account you own. In this case, if an attacker has access to one account, they effectively have access to all of your accounts. Passwords with random phrases, letters, and numbers are secure.

3. Use logic with emails: If an organization sends you a link in an email requesting a specific action or sort of personal information, go directly to the organization’s site rather than clicking on the link. Calling the organization can also help clarify the issue. Real businesses will not email you asking for your username and password.

4. Update your software: Software systems include security updates that should help protect you from spear-phishing attacks, as well as others. If you receive notice of a new update, be sure to take advantage, or enable automatic updates.

  To learn more about how you can protect your data or sensitive information, contact the experts at WesTec.
How to Protect Customer Data

How to Protect Customer Data

We place our information online every day. We’re more than happy to hand over our email, phone number, address and credit card information to purchase a product on the internet. In a world where ecommerce is becoming the standard, businesses must do what they can to protect customer data.

Follow Current Encryption Practices

Encryption practices change regularly to evolve and combat cybercriminals. Often, organizations who failed to stay up-to-date with the latest data protection trends fall victim to cyberattacks. To help protect customer data, create a recurring reminder to analyze your company’s security practices and make updates as necessary.

Limit Access to Customer Information

For additional protection, limit who within your business can view customer data. Not every employee needs access to customers’ personal information. When only necessary employees have access to customer information, hackers have a harder time finding a weak point to break into company databases.

Don’t Ask for Unnecessary Information

As a company, it is important to only collect the information you need to complete a transaction or service to your customer. Customers get weary when a business asks for unnecessary information. By only collecting necessary information, there is less for a hacker to steal. This protects customers and their livelihoods.

customer dataEducate All Employees on Security Policy

While you may limit who can view customer data, make sure every employee knows and understands the company security policy. Even though an employee may not have access to the customer database, their actions could affect the privacy of customers. For example, if someone were to take a company laptop to a coffee shop and used the open wifi, a nearby hacker could potentially break into the company’s database through the network and steal personal information.

Let Consumers Know Their Information is Protected

The best way to build consumer trust is transparency. Let customers know you value their privacy. Take it one step further by detailing how you work to keep customer information stored safely in a privacy policy. If you’re unsure of how your business should protect customer data, or if your company wants information on the latest encryption practices, contact the experts at WesTec Services. We can help you create strong security protocols and install encryption software for data security.

Hack the Hackers with Password Security

hacker attempting to steal passwordsHave you ever been the victim of a cyber attack? Do you use the same password for all of your accounts? Follow our guide to outsmart the hackers with increased password security.

How Hackers Get Your Passwords

Before you can better protect your accounts, you must understand how cybercriminals access steal your information. Typically, a hacker will compromise your account in one of three ways. 
  • Personal attack: Hackers target your account specifically. They will typically guess your email password and use password recovery options to access other accounts.
  • Brute-Force attack: Hackers systematically check all possible passwords until the correct one is found.
  • Data Breach: Hackers attack large companies, resulting in millions of compromised accounts.  

What Makes a Good Password?

Ideally, your password should be at least 16 letters and contain a combination of numbers, symbols, uppercase and lowercase letters. Passwords should not include any repetition, dictionary words, usernames, pronouns or IDs. Make a strong password by thinking of a phrase and then use the initials of each word, as well as the numbers and symbols, to combat potential attacks. For example, if your phrase is “Do you think a hacker will guess my 16 character password for Facebook?!”, your password might be: Dytahwgm16cp4F?!

Enable Two-Step Authentication When Possible

If any sites or accounts offer two-factor authentication, take advantage of it. This system works to limit hacking attempts by making a user authenticate their identity with a second method of verification. Check out our recent blog post about two-factor authentication for more information.

Use a Password Manager

The best thing you can do for your accounts is have a different password for each one. However, if you follow this one cardinal rule of password security, keeping up with all passwords can be difficult. Using a password manager allows you to save all of your passwords in a secure spot with a strong master password.  WesTec offers consulting for any individuals or businesses wanting more information about password security, network installation, or managed IT services. Contact us for more information.

How to Backup Your Data

Threats to a company’s data come in many forms. Cyber-attacks like malware, spyware and viruses attack valuable data from companies each day. While anti-malware and anti-virus can help prevent breaches, these softwares can’t protect data from physical disasters. Data backup is imperative for a company’s continued success.

Local and Network Backups

Storing information on-site is one of the easiest ways to backup data. It can be stored on hard drives, tape drives, or other storage systems connected to a company’s network. Copying files to USB drives or external drives also provide an easily accessible copy of files. However, this should not be the sole method of data backup. Physical disaster, theft and ransomware all pose threats to local backups.

Cloud Backups

Cloud backups are quickly being integrated into businesses looking for added protection. This method of data backup allows copies of data to be stored on remote servers and accessed by internet connection. Unlike other methods, the cloud allows for automated backup of data to provide up-to-date copies of files.

Online File Storage

Similar to cloud backup, online file storage stores files on the internet. Sites like Dropbox and Google Drive allow businesses to store and share files off-site. While online file storage works well as an additional backup method, it also comes with limitations. Depending on the files, backup can cost time and bandwidth. The experts at WesTec Services recommend a business keep at least three copies of data in different places and on two different formats for proper data backup. Our team can help protect your data from threats. Contact us to get started.

Mission: WesTec will be a “turn-key” solution for all of its clients’ business connectivity needs. It will offer efficient and effective solutions, directly and with strategic partners, that create tangible value for its clients at every point of contact. Westec will serve all people and entities with a servant’s heart.

Get in touch

2916 West TC Jester Blvd., Suite 104

Houston, TX 77018


(713) 682-4000

sales@westecservices.net

Quick Feedback