Centrend

Author name: admin

This ONE Person Can Sink Your Company

It’s not just cybercriminals who hack into networks and steal data. Most business owners erroneously think cybercrime is limited to hackers based in China or Russia, but the evidence is overwhelming that disgruntled employees, both of your company and your vendors, can cause significant losses due to their knowledge of your organization and access to your data and systems. What damage can they do?  They leave with YOUR company’s files, client data, and confidential information stored on personal devices, as well as retaining access to cloud applications, such as social media sites and file-sharing sites (Dropbox or OneDrive, for example), that your IT department doesn’t know about or forgets to change the password to. In fact, according to an in-depth study conducted by Osterman Research, 69% of businesses experience data loss due to employee turnover, and 87% of employees who leave take data with them. What do they do with that information? Sell it to competitors, BECOME a competitor, or retain it to use at their next job. Funds, inventory, trade secrets, client lists, and HOURS stolen. There are dozens of sneaky ways employees steal, and it’s happening a LOT more than businesses care to admit. According to the website StatisticBrain, 75% of all employees have stolen from their employers at some point. From stealing inventory to check and credit card fraud, your hard-earned money can easily be stolen over time in small amounts that you never catch.Here’s the most COMMON way they steal: They waste HOURS of time on your dime to do personal errands, shop, play games, check social media feeds, gamble, read the news and a LONG list of non-work-related activities. Of course, YOU are paying them for a 40-hour week, but you might only be getting half of that. Then they complain about being “overwhelmed” and “overworked.” They tell you, “You need to hire more people!” so you do. All of this is a giant suck on profits if you allow it. Further, if your IT company is not monitoring what employees do and limiting what sites they can visit, they could do things that put you in legal jeopardy, like downloading illegal music and video files, visiting adult content websites, gaming, and gambling – all of these sites fall under HIGH RISK for viruses and phishing scams. They DELETE everything. A common scenario: An employee is fired or quits because they are unhappy with how they are being treated – but before they leave, they permanently delete ALL of their e-mails and any critical files they can get their hands on. If you don’t have that data backed up, you lose it ALL. Even if you sue them and win, the legal costs, time wasted on the lawsuit and on recovering the data, not to mention the aggravation and distraction of dealing with it all, are all greater costs than what you might get awarded if you win the lawsuit, might collect in damages. Do you really think this can’t happen to you? Think again.  You have to be proactive in protecting your organization. To find out if your IT company is doing everything in its power to protect you book a 10-minute discovery call using this link https://calendar.app.google/jSA1tteBxFJKnJkX6 and you’ll also get access to a FREE and confidential cybersecurity risk assessment.

This ONE Person Can Sink Your Company Read More »

Technology Problems Shouldn’t Be Scary

If you depend on your computer network to run your business (and who doesn’t?), you’ll want someone treating your data as securely as they would their own.    Not knowing what’s going on behind the scenes should scare the crap out of you. It is NOT unreasonable that your IT company is monitoring your network 24/7/365. Stop paying for substandard support. It’s important for you to interview your current company to ensure they are up to your standards. This will help you determine if it’s time for a change (so you can sleep at night). The top 3 questions to ask include: “Do you provide detailed invoices clearly outlining what we are paying for?”       If your auto draft is just sending a traditional monthly payment without explanation, something isn’t right. Each invoice needs to show what services each dollar covers, just to ensure you aren’t being nickel-and-dimed outside of what’s covered in your contract. “Do you provide status reports on new projects?”       Or if they’re working on an in-process project? It’s on them to provide updates and give you ETAs on when work will be completed.   “Do you offer guarantees on services?”       Any IT company should back its services 100%. Any updates, additions, subtractions, etc., should not be an additional charge and should be guaranteed to work the first time, without having to submit an additional ticket.  We are offering a free report with 13 additional questions to ask any IT company to make sure you have hired the best choice for services. It also includes cost-saving strategies. To know more about it, you may call us at 774-504-5558 or book a 10-minute discovery call using this link https://calendar.app.google/jSA1tteBxFJKnJkX6

Technology Problems Shouldn’t Be Scary Read More »

What is your stripper name?

Anyone active on social media has seen those seemingly harmless quizzes that someone in your newsfeed takes and then shares…the ones that ask you to enter your first name, your middle name, and the street you grew up on to create your “new name.” Joe + Schmo + Blow Avenue = your stripper name. Turns out they aren’t so harmless. A hacker could use any of this info to get past firewalls into your accounts (financial or otherwise) by filling in answers to gain passwords. They can also use this information to hack into your profile. Then, by controlling your account, they are able to reach out to friends and colleagues, sending messages to you, which can quickly damage your reputation. According to the FTC, customers in 2021 reported losing about $770 million to fraud that started on social media. That’s an 18-fold increase since 2017 and affected more than twice the 2020 number of customers. In 2021, it affected more than 95,000 people. Socialcatfish.com ranked Facebook as the most popular platform for online scams. Other common social media scams include: Giveaways, where you’re told you have won but you need to submit payment info to receive your prize Profile hacking, where someone poses as an online “friend” and asks for money to get out of a bad situation Job offers, where what you think is a legitimate work-from-home opportunity might require you to pay a fee to “start” or guarantee a high paycheck for a menial task The best way to avoid these scams is to just be wary. Be careful of oversharing online. Does something seem too good to be true? Is your “friend” speaking in an unusual way? Reach out offline. Know that only scammers ask for money via a wire transfer or gift card. And if you really can’t resist a fun online quiz (because everyone else is taking it), just make up the answers.   If you do notice a scam, you can report it to the BBB Spam Tracker and ReportFraud.ftc.gov to help others. To check if your private data has been exposed to any hackers online, schedule a 10-minute discovery call with our team now. Call us at 774-504-5558 or book a time here: https://calendar.app.google/jSA1tteBxFJKnJkX6

What is your stripper name? Read More »

Are You On A Bad Date And Don’t Even Know It?

They don’t call you back, they don’t text back, and when you get time with them, they are disheveled, rude, and uninterested, doing barely enough to keep things going. This sounds like a bad date…and it’s one that many businesses are on with their current IT guy. You have a problem, need a password, the Internet is down, you have site problems, need a new computer [insert any part here] and you “submit a ticket” only to wait hours, days, or even weeks to hear back, much less get the problem resolved. The #1 complaint businesses have that causes them to “break up” with their current IT guy is that he simply wasn’t responsive. Just like you wouldn’t stand for this in your personal life, you shouldn’t stand for it in your professional life…especially when you’re paying them!!! If your current company doesn’t have a response-time guarantee, you’re probably on a bad date. Most IT firms offer a 60-minute or 30-minute response time to your call during normal business hours. Be very wary of someone who doesn’t have a guaranteed response time IN WRITING – that’s a sign they are too disorganized, understaffed, or overwhelmed to handle your request.  A good IT firm should be able to show you statistics from their PSA (professional services automation) software, where all client problems (tickets) get responded to and tracked. Ask to see a report on average ticket response and resolution times. Also, any good IT company will answer their phones LIVE (not voice mail or phone trees) and respond from 8:00 a.m. to 5:00 p.m. every weekday. But many CEOs and executives work outside normal “9 to 5” hours and need IT support both nights and weekends, so ask about their guarantees for after-hours issues as well.

Are You On A Bad Date And Don’t Even Know It? Read More »

How To Find Your Passwords (And Never Need To Reset Them Again)

There are two types of people…which one are you? The frustrated, constant updater: You find yourself having to constantly click on “Forgot My Password” and verify your account, check your texts, scan a finger (give a pint of blood…maybe not that one) so you can reset your password. And it’s probably a brand-new one because you can’t use one you’ve used before, so this situation will happen again and again and again. The weary optimist: You use the same password for every site, even though you know you shouldn’t because you’re tired of dealing with the above situation. This makes it SUPER-easy for hackers because chances are your password is available for sale on the dark web right now. But…you HOPE this doesn’t happen to you or you think you’re too small to worry about this because they only care about the “big fish.” If you’re Person Type 1, it’s annoying, time-consuming, and frustrating. If you’re Person Type 2, it’s only a matter of time before you’re hacked, and it doesn’t end with you but can affect any business computers you use that lead to access of client, customer, or patient records, and the results can be a total disaster. But there’s a simple solution. A password manager. A password manager is like a digital vault. Your passwords, addresses, payment info, and logins are encrypted in the software. You will have one master password you use to “unlock the vault.” If the password manager gets breached, your data is not at stake because your master password is either stored on a server and encrypted or it’s stored locally on your computer. What’s the difference between using a password manager and one that’s included on your web browser, such as storing that information in Chrome or Safari? The biggest difference is that browser storage cannot be shared with others. For those who work in an office and need to collaborate with teammates, most password managers let you encrypt the data to pass along if someone else needs to access a site. If you have data stored on your browser and then, for instance, decide to make a purchase through the Instagram app, that credit card data will not pass through since it’s outside the browser. There are free and paid versions, and they each have some pros and cons. Here’s a quick breakdown of the four we get asked about most. Bitwarden – Free forever. That free version contains unlimited passwords on unlimited devices, with the ability to share with one other user. For $10/year, you can add two-factor authentication and security reports. And if you’re looking to join a team, you can do so for as little as $3/month per user. If you’re moving from a different password manager, you can import logins without having to copy and paste each individually. LastPass – LastPass does not store your master password on their servers. The free version only includes one device, and for $3/month for premium, you also get 1 GB of storage to back up sensitive documents such as passports, home and car titles, wills, etc. Their team version is $4/month per user. 1Password – Just like LastPass, this software offers a free Chrome extension so it can autofill on sites without you having to do anything. It works on Edge and Brave as well. While there is no free version, for $2.99/month you can try free first for 14 days. One neat feature is to go into travel mode, so you can pull sensitive data from your device before you travel and then restore it once you’re back home, with just one click. Keeper – Winner of PC Mag’s Best Of The Year for 2021. For $2.92/month, you get unlimited password storage on unlimited devices, with sync features. This software also allows for fingerprint and face ID logins, so there is one fewer password to remember. Families can use it for $6.25/month and share streaming and WiFi passwords too. If you would like to set up a password manager for your business, schedule a call with our team by calling 774-241-8600.

How To Find Your Passwords (And Never Need To Reset Them Again) Read More »

Scarier Than The Boogeyman

One of the common issues on the Dark Web – whether you use it or not – is the sale of passwords, bank account information, Social Security numbers, and other private data. Hackers can breach firewalls and software to obtain this information and then go to the Dark Web to sell it to other criminals. Antivirus protection at a minimum is a practice to use for your business.  This will be sure protections are put in place on your network to be on the lookout for computer viruses and other malicious software. There are 3 other key practices to implement to protect your data: Keep your eye out for strange emails – What this means is even if you receive an email from someone or a company you know, check the email address, look for signs of poor grammar or spelling, and tread carefully before clicking any links.  If you get something saying your account is suspended and to click to verify details, go straight to the site and check it that way. Pay attention to data breaches – An easy way to do this is to subscribe to online newsletters, such as Data Breach Today.  This way you’ll be regularly alerted if a large company gets hacked.  You’ll also want to keep a close eye on bank statements and credit card usage to make sure your information is accurate and you don’t notice anything fraudulent. Choose unique and hard to learn passwords- As easy as it is for you to remember the same password for every account and device, imagine what happens to your data the second a hacker figures that one out.  Choose the strong passwords assigned by your phone or computer, and use a free password tool, such as LastPass to keep track so you don’t have to.  Don’t share them with others and don’t use identifying information when selecting them. While you might do everything in your power to prevent your data being stolen, you’ll want to have monitoring software in place.  We have multiple plans available, depending on your budget.  Schedule a 10-minute discovery call to see the cybersecurity protections we offer and determine if your information is already available on the Dark Web with a free scan.  Call us at 774-241-8600 or visit Centrend | Managed IT Services & IT Support in MA.

Scarier Than The Boogeyman Read More »

Controlling Startup Programs in Windows 10

https://www.youtube.com/watch?v=aSQiydksJuE So many things we use on our computers will automatically add themselves to the startup. While some of these are important, most of the time they are unwelcome party crashers that slow your computer down. In this podcast episode, I’ll show you how to evaluate the programs that startup with Windows 10 and how to safely stop them from intruding on your machine. The most important thing to remember here is that you are not going to break anything permanently by stopping them from starting when your system loads. That said, you may get unexpected warnings or errors if you run the programs they are associated with. These errors are not permanent though and usually, the program you are running will start the required background process they need either automatically or with just a mouse click of “Yes or OK” on your part. Once you’ve followed along with this blog entry, you will be able to have complete command and control over what is allowed to run at startup and you’ll have the confidence to be your own gatekeeper going forward. We’ll start by opening Task Manager. Open it by right-clicking in the taskbar area at the bottom of Windows. Left-click on Task Manager. The task manager will open the Process Tab. Click the Startup button to have a look at the programs that are set to start automatically when Windows fires up. Now review each program and look at the Status column to tell you if it is currently enabled. Next to that is a column called Startup Impact. This is Windows’s assessment of how much of a chore it is to run that program at startup. Pay particular attention to items with a High or even Medium startup impact. You can right-click the item and left-click on Disable to stop that item from starting automatically with Windows. There is also a toggle in the lower right corner but I like to use right-click because that is also how you can quickly access the Search online feature.  The Search online feature will “google” that program so you can quickly research the ones you aren’t sure you should disable. Remember you can’t break anything by disabling these things as most programs will launch the things they need or give an error message that is resolved by reenabling it. A notable exception would be programs like Dropbox of MS One-drive. If you use these cloud services take caution disabling them because if you do, your data will not be syncing automatically with the cloud. So what are you waiting for? Take back control of your startup programs starting right now.  As always, give us a shout or drop us a message with our contact form if we can help.

Controlling Startup Programs in Windows 10 Read More »

Learning to Use Windows in Windows

In today’s video blog, I show you how you can snap windows to the corners of your display essentially creating a multi-monitor effect on a single screen. It’s really handy when you need to look at two different windows at the same time. We’ll start with positioning two windows on the screen. Switch to the application you’d like to have on the right panel. If the application is full screen, click the window toggle to the left of the X you could use to close the window. Then drag the application to the right-hand edge of the screen: When you let it go, the window resizes and snaps to the right half of the screen. The left side transforms to a selection of all the other windows you have open. You can then choose the application window you’d like to have a snap to the left side by clicking on it. When you make your selection, you’ll have both application windows sharing the screen. As I show below, I have Word snapped to the right side and Excel on the left side. If instead of using the side of the screen, you can snap applications to the corners which will let you have up to four items snapped on the same display! See my example below of a four-way split between a file folder, a Word document, my Passport PBS ERP system, and MS Excel. Using the techniques I’ve just shown you, you can take better care of your screen real estate!

Learning to Use Windows in Windows Read More »

How to Set Up and Use a Password Manager

https://www.youtube.com/watch?v=z9Kx9rND6x4 Passwords are a hassle, no doubt about it! In this blog post and video, I show you how to set up a password manager to help control password chaos. There are two tools that we recommend for managing passwords. One is LastPass, which is a cloud-based solution.  The other password manager I’ll show is Keepass for which the data files are stored locally on your computer. LastPass To get started with LastPass, go to www.lastpass.com. Before we download it, let’s review Plans and Pricing. LastPass is free to use for keeping track of an unlimited number of passwords on your desktop OR your mobile device. You need to pay for the premium version if you want to use it on both your mobile device and your computer. The premium version is also very handy for storing sensitive documents because it comes with a gigabyte of encrypted storage space. Scans of your driver’s license, bank account details, passport info, etc. are the types of things uploaded to their document vault. I recommend starting with the free version to get started. Follow the prompts to create an account. KEEP CAREFUL TRACK of this password as it is your master password. They call it the “LAST PASSword you will ever need.”  There are strong complexity requirements so keep an eye on the real-time feedback the systems give you as you create the Master Password. Click “Sign Up It’s Free” and your account is then created. Follow the link to install the LastPass extension to your browser. You are then in your vault and you can click the Plus option to add items to your vault. With the extension installed, it will automatically prompt you to store passwords for you as you use your browser to log into various sites. When you click a web-based item in your vault or from the extension in the web browser (see below), LastPass will launch the site in a new web browser window and log you in! KeePass Some people are not comfortable storing sensitive data such as passwords and credit card information in the cloud. For anyone with that concern, I recommend KeePass. KeePass stores the files locally. Be sure to make it part of your backup plan so you don’t lose the file if your computer crashes! To download, go to keepass.info/download.html and click the download link for KeePass 2.x (KeePass 2.47 at the time of this post) Click at the bottom to run the application once it’s downloaded:  Choose your language preference and accept the defaults on the next screen. It’s a good idea to create a Desktop shortcut and Quick Launch shortcut and leave all other defaults. Once it’s installed, you’ll create a database. Click the New icon just below the File menu option in the top left of the application. The database is the repository where all your passwords can go. You might save it in your documents folder. Again, be very careful as to where you store this as you’ll need to make sure you back it up regularly. Create the master password. Enter a strong password and use the Estimated Quality bar for feedback as to how strong the master password is getting to be. You are looking to be in the green: After you have finished creating the master password, you will be prompted to print an emergency sheet. The emergency sheet is used to recover your database, should you lose your master key. In the application, click the picture of the key to add a new entry. Put in the details for the new entry. Be sure to put in the URL so you can use features in Keypass to open the site and then put in the name and password for you. To visit the site and have it log you in, there are three steps. First, click the entry in the list of keys that have been added.   Next, click the little globe icon. A browser will open to the URL you entered for that Keypass entry. Finally, switch back to the Keypass application, press and hold CTRL and press the V key. This performs Keypass’s autotype function which types the login name and password in for you. I hope you found this post on password management helpful and that you use one of these tools to control your own password chaos.  If you need additional help installing or using these applications, please email or give us a call!

How to Set Up and Use a Password Manager Read More »

Sanitize your Electronics with UV Sanitizer Gadgets

https://www.youtube.com/watch?v=yqXYClyi-gc Using a UV Sanitizer is an easy and safe way to protect yourself from germs lingering on your electronics. In this blog post, I show you how to use two different devices designed to keep you safe. First, the phone soap.  This is a very slick device designed to sanitize your phone specifically, though you can put other things in there, too, such as your wallet, credit card, or keys. Just so long as the lid closes, the sanitization cycle will begin to clean whatever is in there. The Phone soap appliance I’m using here has Qi wireless charging, so you can actually charge your phone while it sanitizes. Though the cycle is only 10 minutes long, it’s easy to get caught up doing other things, and comforting to know the phone is charging while it sanitizes. If your phone doesn’t support Qi wireless charging, there is a small cut-out on the end where you can route your charging cable to plug it in while the sanitization cycle commences. You can find this appliance and many other options by this same great company at https://www.phonesoap.com/. If you are looking for something larger, take a look at the Hy-Genie Collapsible UV Sanitizer.  This unit collapses down to fit in your luggage, so it’s ideal for travel. It sanitizes everything you load up in there in just three minutes. As with the Phone soap, the gear does not have to be turned off to be sanitized. I put my Kindle, eyeglasses, phone, and Earbuds in there all at the same time with plenty of room. You can find this device at https://morningsave.com/deals/hy-genie-large-uv-c-sanitizing-collapsible-travel-bag-3 If you enjoyed this review, please drop me an email, submit the contact form, or otherwise let me know and I’ll post some more for you.   

Sanitize your Electronics with UV Sanitizer Gadgets Read More »

Scroll to Top