(713) 682-4000 sales@westecservices.net

6 Things Every Computer User Should Know How to Do

5 Facts About Data Loss and Recovery

What is Cloud Jacking?

How to Spot Phishing Attempts

When Should I Update My Passwords?

How to Avoid a Spear-Phishing Attack

Hack the Hackers with Password Security

4 BYOD security risks you should prepare for

Fortify your data, physically

It’s Time To Disaster-Proof Your Business

Posts Tagged ‘data protection’

6 Things Every Computer User Should Know How to Do - WesTec Services

6 Things Every Computer User Should Know How to Do

With emerging technology, comes a major learning curve. For many, it’s difficult to even keep up! No worries — WesTec has got you covered and our IT support professionals are keeping it simple. Here are 6 things every computer user should know how to do in 2021:

IT support

Setup Your Wireless Network

If computer users must know one thing, it should be how to setup a wireless network and resolve wifi issues. A wireless connection is supported by a router; this router must be plugged in for users to access the internet. Most routers have several lights on the front that indicate the strength of the connection. If these lights are not on, the user should unplug and reset the router. Your computer will also indicate whether you are connected to the wireless network. On PC, the status of your connection can be found in the bottom right corner. On Mac, it can be found in the upper right corner.

 

Perform a Data Backup

System failure and natural disaster often strike with little to no warning. Therefore, it is crucial you know how to perform regular data backups. You can backup important data and files on flash drives and external hard drives. PC and Mac also offer software and servers that you can use to backup your data.

 

Install Antivirus Software

According to InfoWorld, 30% of computers in the United States are infected by some type of virus. Therefore, antivirus software is a must! Any IT professional would be happy to install your anti-virus software, but this process is actually pretty beginner-friendly. Antivirus software, like McAfee and Norton, can be downloaded directly from the internet and installed with ease. Dialogue boxes will walk you through the installation process.

IT support

Basic Troubleshooting

IT support professionals troubleshoot computer issues all the time, but it doesn’t hurt for a computer user to know basic troubleshooting skills. If your programs are failing or you are encountering an issue you cannot resolve, you must troubleshoot. Troubleshooting will identify what the problem is. To troubleshoot on PC, open your Start menu, then select “Settings” > “Update & Security” > “Troubleshoot.” On Mac, open your Apple menu and select “Restart.” Then, press and hold the “D” key while your Mac restarts. A screen with a list of languages will appear. Select your language of choice and your computer will begin running diagnostics.

 

Change Basic Settings

If you own a computer, you must know how to change your settings. Whether it’s adjusting sound levels or connecting a printer, knowing how to change basic settings comes in handy. On PC, open your Start menu and select “Settings” or “Control Panel” to make these necessary adjustments. On Mac, simply select the Preferences application, which can be found on your Dock.

 

Access Task Manager

If your computer is slow or unresponsive, you may have too many active programs open or a specific program has failed. Before calling your IT support team, try accessing your computer’s Task Manager. The Task Manager allows you to view active programs and force quit specific programs if necessary. On PC, you can access the Task Manager by holding Ctrl + Alt + Delete. On Mac, hold Command + Option + Esc. 

 

It’s helpful to know how to perform a few basic computer tasks, but if you’re just not tech-savvy, WesTec Services can help! We offer a variety of IT support services that can be tailored to your needs. Interested in learning more? Contact us today!

Don’t forget to follow us on FacebookTwitter, and LinkedIn!

5 Facts About Data Loss and Recovery - WesTec Services

5 Facts About Data Loss and Recovery

5 Facts About Data Loss and Recovery - WesTec ServicesEven the “smartest” devices fail sometimes, and when this occurs, your business is at risk for data loss. This can be catastrophic for productivity and revenue. Therefore, it is crucial that businesses implement a data recovery strategy. Here are five facts you need to know about data loss and recovery:

 

78% of data loss is a result of system failure or malfunction

You heard that right — well over half of data loss is a result of system failure! System failure is unpredictable, meaning that it is beyond human control. The only safe way to prevent data loss of this kind is be proactive and prepared for the unexpected.

 

60% of companies that experience data loss will go out of business within six months

In 2021, we rely on technology for almost everything. Businesses often store important or confidential information in their computer systems with no physical copies for backup. When disaster strikes, companies have a lot more to lose than just their data. In fact, 60% of companies that experience this loss will go out of business within six months. 

 

50% of backup restores fail

5 Facts About Data Loss and Recovery - WesTec ServicesBacking up your files is one of the best ways to ensure your data is safe if system failure were to occur. However, data backup is not as simple as backing up your files one time! Half of all backup restores fail. Therefore, you must regularly backup your files on several devices and servers.

 

1 in 5 businesses do not have a recovery plan

In an effort to cut costs, many businesses have no data recovery plan in place — as many as 1 in 5! However, not having a plan can actually be more costly, as data loss often results in downtime and even closures. Preparation and taking preventative measures is the only way to safeguard your systems and business.

 

96% of businesses with a recovery plan fully recover

It’s no surprise that businesses that develop and implement a data loss recovery plan are far more likely to recover after disaster. Are you prepared?

WesTec Services wants to help you safeguard your data! The professionals at WesTec Services specialize in data backup and recovery, and serve firms all across Houston. Don’t put your business at risk by being ill-prepared — schedule a call with one of our professionals today! 

Don’t forget to follow us on FacebookTwitter, and LinkedIn!

 

What is Cloud Jacking? - WesTec Services

What is Cloud Jacking?

With the rise of COVID-19, cloud-based remote work has become increasingly popular and necessary. With new and emerging cloud-based technology comes new cybersecurity threats, like “cloud jacking.” 

What is Cloud Jacking? - WesTec Services

What is cloud jacking?

Cloud jacking occurs when a hacker steals the information of a cloud account holder and gains access to the server. Hackers often use this act as a means to conduct criminal activities, such as identity theft.

Because businesses often store confidential, sensitive information on cloud servers, they are major targets for cloud jacking. When it relates to sensitive information, these kinds of security breaches can be devastating for a business’ clients, partners, and reputation. Cloud jacking is not simply a one-time offense, as it creates a web of victims.  

What is Cloud Jacking? - WesTec Services

How do I protect myself against cloud jacking?

There are several things you can do to protect your business, clients, and partners from falling victim:

  • Require strict, multi-factor user authentication
  • Limit internal access to your cloud server
  • Perform background checks before granting anyone access to your cloud server
  • Backup all data stored on the server, in the event that there is data loss
  • Use encryption to secure all data before storing on your server
  • Require all users to create strong, secure passwords
    • Here are the properties of a strong password:
      • The longer, the better
      • A combination of lowercase and uppercase letters
      • Numbers and symbols
      • Avoid words or terms that could be easily linked to your identity

 

The professionals at WesTec Services want to help you protect your network and business. We provide vital business technology and consulting services that can be tailored to your needs and budget. Interested in learning more? Contact us today!

Don’t forget to follow us on Facebook, Twitter, and LinkedIn!

 

How to Spot Phishing Attempts - WesTec Services

How to Spot Phishing Attempts

Are you sure that email came from a real company? Individuals are commonly targeted by cybercriminals claiming to be a large organization, copying the format legitimate companies and phishing for personal information. This poses a real security threat to recipients but thankfully, there are steps you can take to spot phishing attempts:  

Recognize

When it comes to identifying phishing attempts, there are a few important things to learn. Scammers are constantly switching tactics and creating new ways to trick email recipients. Upon receiving a possible phishing email, check the sender for a domain email. If you have received an email from the person before, check to make sure alterations have not been made to the spelling of the name or email domain. Many scammers adjust a number or letter in the email to trick the recipient. Real companies will not ask you for sensitive information over email. Most legitimate companies will call you by your name in the email, redirect you to a secure webpage, and ask you to log in before asking for or updating sensitive information.   How To Spot a Phishing Attempt - WesTec Services

Protect

Install proper security measures on your personal computer. While spam filters attempt to sort legitimate emails in your inbox, cybercriminals try new methods to slip through the cracks and outsmart this system. If your email account or other websites offer a multi-step authentication option to prove your identity before accessing your information, always take advantage of this. Take any extra opportunities to better secure your data and ensure it cannot fall into the wrong hands. In cases where you are unsure about the legitimacy of a message and files or hyperlinks are included, do not click on or open them. These often contain malicious software that attack your computer and gain access to information.  

Report

If you find yourself in a situation with what you believe to be a phishing scam, contact the company using an email or number you know to be real. The company could confirm if that email was truly sent by them or not. If you have received a phishing email, forward it to the Anti-Phishing Working Group at reportphishing@apwg.org. You may also report the phishing attack to the FTC at ftc.gov/complaint. For your business technology needs, WesTec Services is here to provide the security and support you need. Contact us by phone at (713) 682-4000 or by email at sales@westecservices.net to discuss what we can do for you.
When Should I Update My Passwords? - WesTec Services

When Should I Update My Passwords?

Sometimes, accounts will ask you to update your passwords for security reasons. This often feels like an unnecessary task meant to make your life more complicated. However, in a world full of hackers and online predators, one must regularly update their password to protect valuable information.

Change Your Passwords Regularly…

When Should I Update My Passwords? - WesTec ServicesBy regularly changing your login information and passwords, you make it harder for someone to steal information. This is increasingly important for accounts without two-factor authentication. Communication accounts, like email and chatting apps, should also be updated every so often for increased protection.

…But Don’t Change Them Too Often

Traditionally, experts recommended you change passwords every 30 to 60 days–this is no longer the case. Mandatory password updates lead to money loss and lack of productivity with minimal security payoff. Now, changing your password doesn’t hold near the protection it used to. Because cybercriminals continue to learn more advanced hardware and software, they can typically discover your password if they look hard enough.

As humans, we tend to create patterns. This is no different in password creation. Typically, we use similar letters, numbers and themes when updating a password. Updating your password too often leads to confusion with little added benefit.

Keep Your Data Secure

As a rule of thumb, update your passwords when there is proof of some sort of security breach or online attack. This includes unauthorized use of an account or evidence of malware. By doing so, you’re preventing a hacker from gaining access into your personal accounts and obtaining sensitive, private information or data.

There are other ways to protect your data. Contact the experts at WesTec Services for more information about our cybersecurity services.

If you’re not sure how to create a secure password that will outsmart the online hackers, read our recent article for tips.
How to Avoid a Spear-Phishing Attack - WesTec Services

How to Avoid a Spear-Phishing Attack

As we discussed in a previous article, phishing is an attack that uses disguised emails as weapons aimed at masses of people. However, spear-phishing is a targeted attempt to steal sensitive information from a specific victim, such as account credentials or financial information.

During a spear-phishing attack, the perpetrator attempts to acquire personal details on the victim’s friends, hometown, employer, hang-outs, and their recent online purchases. This is typically done by disguising themselves as a trustworthy friend or entity through email, social media, phone calls, or text messages.

Because spear-phishing is the most successful form of acquiring confidential information online, it is important to practice how to avoid an attack.

How to Avoid a Spear-Phishing Attack - WesTec Services1. Beware what you post: Review your online profiles. How much personal information is available for potential attackers to view? If there is something you do not want the public to see, delete it, or ensure your privacy settings are properly configured.

2. Use smart passwords: It is not wise to use the password for every account you own. In this case, if an attacker has access to one account, they effectively have access to all of your accounts. Passwords with random phrases, letters, and numbers are secure.

3. Use logic with emails: If an organization sends you a link in an email requesting a specific action or sort of personal information, go directly to the organization’s site rather than clicking on the link. Calling the organization can also help clarify the issue. Real businesses will not email you asking for your username and password.

4. Update your software: Software systems include security updates that should help protect you from spear-phishing attacks, as well as others. If you receive notice of a new update, be sure to take advantage, or enable automatic updates.

  To learn more about how you can protect your data or sensitive information, contact the experts at WesTec.

Hack the Hackers with Password Security

hacker attempting to steal passwordsHave you ever been the victim of a cyber attack? Do you use the same password for all of your accounts? Follow our guide to outsmart the hackers with increased password security.

How Hackers Get Your Passwords

Before you can better protect your accounts, you must understand how cybercriminals access steal your information. Typically, a hacker will compromise your account in one of three ways. 
  • Personal attack: Hackers target your account specifically. They will typically guess your email password and use password recovery options to access other accounts.
  • Brute-Force attack: Hackers systematically check all possible passwords until the correct one is found.
  • Data Breach: Hackers attack large companies, resulting in millions of compromised accounts.  

What Makes a Good Password?

Ideally, your password should be at least 16 letters and contain a combination of numbers, symbols, uppercase and lowercase letters. Passwords should not include any repetition, dictionary words, usernames, pronouns or IDs. Make a strong password by thinking of a phrase and then use the initials of each word, as well as the numbers and symbols, to combat potential attacks. For example, if your phrase is “Do you think a hacker will guess my 16 character password for Facebook?!”, your password might be: Dytahwgm16cp4F?!

Enable Two-Step Authentication When Possible

If any sites or accounts offer two-factor authentication, take advantage of it. This system works to limit hacking attempts by making a user authenticate their identity with a second method of verification. Check out our recent blog post about two-factor authentication for more information.

Use a Password Manager

The best thing you can do for your accounts is have a different password for each one. However, if you follow this one cardinal rule of password security, keeping up with all passwords can be difficult. Using a password manager allows you to save all of your passwords in a secure spot with a strong master password.  WesTec offers consulting for any individuals or businesses wanting more information about password security, network installation, or managed IT services. Contact us for more information.

4 BYOD security risks you should prepare for

4 BYOD security risks you should prepare for

 August 23rd, 2018
4 BYOD security risks you should prepare for

Personal computing is with us wherever we go. Thanks to the rise of the mobile industry, smartphones and tablets allow us to take work home with us. And with the bring your own device (BYOD) strategy, businesses have never been so productive. However, BYOD can pose a number of security risks if you’re not careful. Here are some BYOD security issues you should know before implementing it.

Data leakage

The biggest reason businesses are wary of implementing a BYOD strategy is because it can leave the company’s system vulnerable to data breaches. Personal devices are not part of your business’s IT infrastructure, which means that these devices are not protected by company firewalls and security systems.

Employees might also take work with them to places outside of your company premises that don’t have adequate security settings, thus leaving your system vulnerable to inherent security risks.

Lost devices

Another risk your company has to deal with is the possibility that employees will lose their personal devices. If devices with sensitive business information get lost and fall into the wrong hands, anyone can gain unauthorized access to valuable company data stored in that particular device. Therefore, you should consider countermeasures and protocols for lost devices, like remotely wiping a device of information as soon as an employee reports it missing or stolen.

Possible hacking

Personal devices tend to lack adequate data encryption to keep other people from snooping on private information. On top of this, your employees might not regularly update their devices’ software, rendering their devices and your IT infrastructure susceptible to infiltration.

Connecting to open WiFi spots in public places also makes your company vulnerable and open to hackers, because hackers may have created those hotspots to trick people into connecting. Once the device owner has connected to a malicious hotspot, attackers can see your web activity, usernames, and passwords in plain text

Vulnerability to malware

Viruses are also a big problem when implementing BYOD strategies. If your employees use their personal devices, they can access sites or download mobile apps that your business would normally restrict to protect your system.

As your employees have the freedom to choose whatever device they want to work with, the process of keeping track of vulnerabilities and updates is considerably harder. So if you’re thinking about implementing BYOD strategies, make sure your IT department is prepared for an array of potential malware attacks on different devices.

BYOD will help your business grow, but it comes with IT security risks that you should be prepared to handle.
Need help mitigating these BYOD risks? Call us today, and let’s find the best IT security solutions for your company.

Published with permission from TechAdvisory.org. Source.

Mission: WesTec will be a “turn-key” solution for all of its clients’ business connectivity needs. It will offer efficient and effective solutions, directly and with strategic partners, that create tangible value for its clients at every point of contact. Westec will serve all people and entities with a servant’s heart.

Get in touch

2916 West TC Jester Blvd., Suite 104

Houston, TX 77018


(713) 682-4000

sales@westecservices.net

Quick Feedback