Centrend

Author name: admin

Six Ways Scammers are taking advantage of COVID-19

Cyber Criminals are taking advantage of the COVID-19 pandemic in some of the worse ways. Read on to learn how to avoid their evil scams… 1. Phishing: Phishing (pronounced fishing) occurs when criminals send fake mail, email, or phone calls pretending they are legit. They try to convince you to share your sensitive information like passwords or credit card details. They pretend they are from an organization you know, such as FedEx, UPS, or even a government agency. 2. Fake Products: Keep your eye on e-commerce websites, social media accounts, and emails from people and stores claiming to sell medical supplies currently in high demand. Supplies might include things like hand sanitizer, toilet paper, and surgical masks. When you make purchases from these fake stores, criminals will keep your money, but you will never see the products you purchased. 3. Fake Charity: Individuals and companies, sometimes with real-sounding names, call or email to ask for donations for people and groups affected by the coronavirus. Some of their elaborate backstories sound extremely legitimate and emotional but completely fake. 4. Medical scams: People are getting calls and emails from people pretending to be hospital workers or medical professionals claiming they treated someone they know for the coronavirus and demand payment. 5. Malware. Think of these malicious applications as Trojan Horses. You download them to your computer or phone for some purpose, and behind the scenes, the program is stealing your personal information. Sometimes these record your logins to banking sites, email, Facebook, etc., and send the data back to the hackers. 6. Zoom Bombing. Lots of businesses, schools, and individuals are using Zoom to hold online meetings. To make it easier, meeting hosts often don’t require a password. Unfortunately, not having a password makes it all too easy for hackers to jump on your meeting and flood your virtual room with swear and porn. They can embed virus code in the image files or stealthily share a file with all the participants that have virus or malware code in it. Check our blog next week for details on how to keep hackers out of your Zoom meetings. The number one way to protect yourself from cybercrime is to use strong passwords on your computer, phone, and meetings and make sure your computer is tuned up and secure. If you ever feel concerned that your computer system is hacked or you just want a security checkup, please contact us at 774-241-8600 or submit the quick contact form on this page. We’re always here to help!

Six Ways Scammers are taking advantage of COVID-19 Read More »

How do you know if you have Spyware in your computer?

Sometimes, it’s obvious, right?  There is a big obnoxious warning that pops up and tells you that you are infected and you need to call for support! Don’t call the number presented because that’s a scam. Call us instead!  Other times, the infection is much more subtle. Here are some things to watch out for… Signs that your computer is infected with a virus or malware Random pop-ups – if you are using your computer, especially the web browser and you are getting a lot of pop-up messages without clicking If you click a link in a web search but get an unexpected, less relevant result If in the bottom right, you are bombarded with notifications and solicitations If your browser has extra “toolbars” across the top or bottom that weren’t always there, or that you don’t see on other computers If you suddenly can’t open documents on your computer that you have always been able to open You are prompted for a password at a strange time. Such as when you are just working on a Word document or browsing a website that doesn’t require login Your virus scanning software is no longer running – malware or a virus may have shut it down If you have any of these problems, please call us for help! If you aren’t sure if you are infected, we are glad to offer a free consultation. Just fill out the Quick Contact form or call us at 774-241-8600.

How do you know if you have Spyware in your computer? Read More »

How to Clean and Disinfect Computer Equipment Without Destroying it

With the threat of coronavirus (COVID-19) all around us, we are all being more diligent about wiping down our work areas. One of the highest touch areas in your environment is your keyboard, mouse, and touch screens. If you’re a customer of Centrend, I already have the inside of your computer covered with strong antivirus software. So here’s how to keep your stuff clear of the other types of viruses. Important note: Off-the-shelf brands of “electronic wipes” are NOT disinfectants unless they specifically say so. At the left is an image of a common one that is NOT a disinfectant. It may wipe away the virus but if there is any left on the surface, it will stay alive. I recommend using Isopropyl alcohol. The CDC recommends the solution have at least 70% alcohol content. The one I use is pictured at right. Mine is 91% but as long as you are 70% it should be effective. So how to disinfect your equipment with these products? It will depend on the specific equipment so I’ll go through each category one by one. Screens & Phones Make sure the device is off. Always apply the solution to a cloth and don’t spray the equipment directly Use a MicroFiber to make sure dust and lint don’t collect on the screen. If the screen appears physically dirty, you may want to clean it with a paper towel or other soft cloth and save the microfiber for after. If your Microfiber cloth gets dirty, you can wash it with mild detergent and a soft-bristled brush like an old toothbrush. Dry the screen or wait till it is dry to turn it on again. Keyboard Unplug your keyboard from the computer or shut it off if it is wireless. Hold it upside down over a trash can and give it a few shakes. This will knock food crumbs and other particles out of the keyboard. You can use compressed air to help blow out crumbs. Just don’t hit it too hard with the air stream or you will blow keys off the keyboard! Apply the cleaning solution to the cloth. Never spray solutions directly onto the keyboard. To get in between the keys, you can use a cotton swab (Q-Tip) that you dip in the solution. Be sure there isn’t so much solution on the swab that it drips into the keyboard. Mouse or Touchpad Unplug your mouse from the computer or shut it off if it’s wireless. If your mouse has a scroll wheel, hold it upside down and spin it a few times to get any loose particles out of the inside. Apply the cleaning / disinfecting solution to a cloth and be sure it’s not too saturated. Your mouse has openings that you can’t let the liquid run into. Let the mouse dry before plugging it back in or turning it on again. I hope you’ve enjoyed my article and it helps you stay safe and healthy!

How to Clean and Disinfect Computer Equipment Without Destroying it Read More »

Working Remotely? Are you secure?

Since the Coronavirus pandemic outbreak, there has been a massive surge of remote workers. Your information is at risk when remote access is not done correctly! Read on to learn what to avoid when it comes to remote workers. Remote access requires careful thought and planning to keep business data private and safe. As a result of COVID-19, many organizations are rushing to piece together remote access solutions to mobilize their workforce and remain productive while serving customers.  The haste to mobilize has created a dangerous situation for business data.  Since the Coronavirus pandemic outbreak, there has been a massive surge of remote workers. Your information is at risk when remote access is not done correctly! Read on to learn what to avoid when it comes to remote workers. Remote access requires careful thought and planning to keep business data private and safe. As a result of COVID-19, many organizations are rushing to piece together remote access solutions to mobilize their workforce and remain productive while serving customers.  The haste to mobilize has created a dangerous situation for business data.   Here are some of the things I see happening that create the riskiest scenarios: VPN Connections are being set up quickly by inexperienced personnel, and their encryption policies are weak.  Companies lack the knowledge to accurately monitor remote activity to identify and mitigate a data breach that originates from these new remote channels. When a VPN is not available, very insecure connections are being created to remote desktop servers, or directly to desktops. Remote desktop connections that are open to the outside world are vulnerable to all types of hacking. If systems have not been regularly patched and maintained, they are at risk of known vulnerabilities that hackers will exploit. Employees may be using their own computers to log in from home, and the individual’s computers lack adequate security protection.  The lack of sufficient security on the home computers allows an attack from the inside – through the VPN. An attack launched from within the trusted, secure tunnel is tough to identify and close the door on. Entry-level or free versions of software like Team Viewer, Logmein, or GoToMyPC are being used to provide remote control over office desktops. The limited versions of these software packages generally work well but offer limited or NO AUDITING capability. If your system is compromised, you will not know what the thieves stole or how long they had access to your business data. Centrend wants to help.  We are now offering free consultation AND free implementation of remote access solutions to businesses affected by COVID-19. Reach us at 508-347-9550 or submit the Quick Contact form below to get help.

Working Remotely? Are you secure? Read More »

Centrend COVID-19 Response

Centrend cares about our employees’ and our customer’s safety, and we’re doing our part to reduce the spread and flatten the curve. Read on to learn what we are doing to keep safe and keep our customers’ information systems running well. We are practicing social distancing and utilizing our extensive remote support and remote management tools to maximize efficiency and safety for our staff and our customers. We’ve limited our travel and on-site visits to only the essential times when we must be physically on-site. For the safety of our staff and our customers, projects requiring us to be hands-on at the customer’s location have been deferred until after the crisis is over, and the restrictions are lifted. Since Governor Baker’s announcement that only critical businesses would be allowed to operate, Centrend expanded our support hours and has been working tirelessly to implement secure remote access solutions for our customers.  We can help with secure, remote access, training on video conferencing tools, or support for your remote workers. You need your staff to work remotely and keep your business operating as best it can. We can help. Starting in Mid-April, Centrend will offer free consultation and free set up of remote access solutions tailored to your unique business environment. Stay tuned to our blog for more information. You can also give us a call at 774-241-8600 or submit the short form below. 

Centrend COVID-19 Response Read More »

Don’t Frankenstein your IT!

Are you trying to cobble together pieces of disparate systems that weren’t meant to talk to each other? Are you hopeful that connecting mismatched data sets will breathe life into your IT Systems? Don’t Frankenstein your IT! Read on to find out what I mean. You know the story of Dr. Victor von Frankenstein, right? He was a promising young doctor who was so devastated by the death of a loved one that he became obsessed with bringing the dead back to life. He worked feverishly to create a creature out of body parts and spends the rest of his time trying to decide if his creature can be trusted.  Is a maddeningly similar experiment taking place month after month, year after year in your own workplace?  Do you spend countless hours piecing together systems that have never talked to one another? Have you seen or even fallen victim to your company’s “separate islands” of information? If this sounds like your business I can help you break out of the scary, torturous pitfalls of information segmentation!  Contact me using the phone, email, or form below for a free consultation. Meanwhile, Happy Halloween!!

Don’t Frankenstein your IT! Read More »

Is Your Router Slowing Down Your Wi-Fi?

Your router is the box that connects your computers, phones, and tablets to the outside world. If your router is old or undersized for the number of devices you have, it can create a bottleneck. Here are a few essential things to keep in mind when assessing your router. These rules apply to home users or businesses alike, so read on! It’s not uncommon for me to hear a complaint from a client about slow internet connection speeds. When I plug my testing equipment directly into the Internet Service Provider’s device, I often see the full speed they are paying for. So what’s the reason for slow speeds beyond the provider’s gear? It’s often a fault of the Internet Router. The internet router is responsible for blocking unwanted/unrequested traffic from getting into your devices. A router provides basic firewalling services at a minimum. Simply stated: nothing gets in unless it was requested from the inside. This means that the router is VERY BUSY processing all the packets of information and deciding which ones should be let in and which ones should be dropped.  You can visit http://www.speedtest.net and see if you are getting the speed you are paying for. If not, here are the possible reasons: Your “off-the-shelf” router and not built for the number of devices you have connecting at once Your router is too old and can’t communicate at the speeds of your internet connection If Wi-Fi is slow, you may have a 54g network which is about 1/2 the speed of a 100MB speed modem Need help to figure out network performance problems? Reach out to me at the contact info below, and we’ll be glad to help!

Is Your Router Slowing Down Your Wi-Fi? Read More »

Internet Seem Slow? Consider this!

If you are using a laptop on a slow wireless connection such as hotel Wi-Fi or a cellular hotspot, your connection can slow to a crawl if you have installed cloud services such as Dropbox, Google Drive, and Microsoft’s One-Drive. Here’s how to limit how much resource the service uses, so you have room to do other things on the internet. Why does this happen? Cloud storage applications synchronize data in the background. There is plenty of room for them to do their thing on a typical high-speed connection while you use your computer. When you don’t have a fast connection, pausing or shutting off the service is not the best idea because you need to update the cloud with your changes. There is also a danger that you won’t remember to turn it back on, and the data you count on being accessible in the cloud won’t be there at all or won’t be the latest version you were working on. My advice is to tweak your application to limit how much of the internet connection the cloud application is allowed to use. If I’m using my Verizon hotspot, I generally set a download rate limit of 50 KB/s and an upload rate of 10 KB/s. This might be a good starting point for you. If you find it’s taking too long to finish syncing up, tweak the rate limits to your liking. Below are some screenshots of where to make this change in some of the most popular cloud services. If yours isn’t listed, you’ll probably be able to find it in the same general area of settings. Dropbox: Start by clicking the Dropbox icon in the bottom right of the screen in the taskbar.  Next, click the dropdown in the top right, then choose preferences. In Dropbox preferences, choose bandwidth.  Set a limit for both download and upload. Google Drive File Stream: Click the Google Drive icon in the taskbar. Click the Gear in the top right of the window, then choose Preferences. Click Network Settings in the bottom right of the settings window. Set a limit for both download and upload. Microsoft One Drive: Click the One Drive icon in your taskbar. Click the Help and Settings gear, then click Settings in the window that comes up. Set a limit for both download and upload. Is your computer slow all the time? You could have malware or a virus using up your bandwidth. It’s also possible that you need a tune-up. Reach out to us, and we’ll help you get your computer running as it should.

Internet Seem Slow? Consider this! Read More »

Why do my Spreadsheet Formulas Show Instead of the Result?

Have you ever been working on a spreadsheet and after entering a formula in a cell, you see the formula instead of the result? This article explains what happened and how you can get it back. This can happen in both Excel and Google Sheets, and I’ll explain how to troubleshoot and correct the problem in both applications. Google Sheets and Microsoft Excel contain spreadsheet auditing functions to “show formulas.” If ALL your formulas are showing up instead of the result of the formula, I recommend this as the first thing you would check: In Microsoft Excel: Click the Formula option on the toolbar Ribbon Click Show Formulas. This Toggles the display of all formulas on or off. Use it to troubleshoot/verify formulas when you are auditing a spreadsheet. In Google Sheets: Click the View option on the menu bar. Click Show Formulas to toggle the display of all formulas. Again, great for double-checking that your formulas are correct and consistent. But what if your problem is that only one particular formula is showing up while all the other formulas on the sheet are showing the result?  When this happens, you need to look closely at the cell by clicking it, then viewing the formula details in the editing section. Check out my image at the right, and you will see that it has the “force text” symbol, which is a single quote, in front of the formula. In both Microsoft Excel and Google Sheets: Once I remove that extra single quote, the formula displays the result instead. I hope you find this blog entry helpful! Check back soon for more great computing hints and tips. If you have any you’d like to share, please comment below.

Why do my Spreadsheet Formulas Show Instead of the Result? Read More »

How to Automatically Lock Your PC When You Walk Away

You should always secure your computer by locking the screen when you walk away. But sometimes in a rush, we forget to lock it down. This article shows how to set up an automatic lock so that when you walk away from your computer, your screen will lock itself! Keeping your PC wide open when you walk away leaves it available for anyone to mess with. So whether you are concerned about office pranksters or someone prying eyes seeing your information, it’s best to keep the workstation locked when you leave it unattended. Microsoft has included a feature in Windows 10 called Dynamic Lock that will automatically lock the workstation for you, should you forget to lock it yourself. The Dynamic Lock feature works by monitoring the computer’s connection to your cell phone. When it detects that the phone has moved away and is out of range, it locks your desktop for you. For this to work, both your phone and your computer must have Bluetooth connectivity. Almost all laptops have Bluetooth, and many desktops are also including it. If your system doesn’t already have Bluetooth, you can add a USB-connected Bluetooth adapter for about $12. Sound good? Let’s get you set up! Once you know your phone and PC have Bluetooth, the first thing you need to do is pair your phone to Windows 10. Confirm that Bluetooth on your phone is turned on. Then on your computer go to Settings > Devices > Bluetooth & other devices. From this screen, click Add Bluetooth or Other Device.  Then Click Bluetooth as the device type. After a moment or two of scanning, you should see your phone appear on the list. Below is an example of pairing my laptop to the Pixel 3XL. After I clicked Connect on the computer, I checked the PIN that was shown to be sure it was the correct one, and then I clicked Pair on the phone. Now the laptop is paired with the phone, and whenever I have my phone in proximity (about 33 feet), the two will connect.  Click Done to exit the connection screen. Now that your phone is connected via Bluetooth, we need to tell Windows to use its proximity to lock your system down. On your computer go to Settings > Accounts > Sign-in options. Scroll down to the Dynamic Lock section and check the “Allow Windows to automatically lock your device when you’re away” box. Now, assuming you have your phone on you and not on the desk when you walk away from your PC, your computer will automatically lock.  NOTE: There is a 30-second safety buffer that it must wait before locking your screen. If you or anyone else starts to use the computer, the screen will not lock. It’s best always to try to remember to keep your computer locked when you are away from it, but this is a great failsafe if you do forget to lock down your workstation!

How to Automatically Lock Your PC When You Walk Away Read More »

Scroll to Top