Tag Archives: Security

“9 Warning Signs Your Computer Is Infected With Spyware”

9 Warning Signs Your Computer Is Infected With Spyware

Spyware is Internet jargon for hidden programs that advertisers install on your PC without your permission to spy on you, gather information, and report this information about you and your online activities to a third party.

Spyware is NOT harmless; it can be responsible for delivering a boatload of spam, altering your web browser, slowing down your PC, and serving up a bounty of pop-up ads. In some of the more extreme cases, spyware can also steal your identity, passwords, e-mail address book, and even use your PC for illegal activities.

Most spyware finds its way onto your computer via file downloads including free programs, music files, and screen savers found everywhere on the Internet. These nasty programs piggyback the download and run undetected on your computer collecting information about you and sending it out to a third party until they are removed. Although spyware has malicious components, it is not illegal, and it is not considered a virus because it doesn’t replicate itself or destroy data.

If you are experiencing one or more of these warning signs, chances are your computer is infected and you will need to seek professional help in getting the spyware removed.

#1. Your browser has been hijacked. If you open your Internet browser and a strange-looking homepage pops up and won’t go away, chances are you have a spyware program installed on your computer. You may also discover that you cannot modify your browser settings and that your favorites folder has been modified.

#2. You conduct a search but another (unauthorized) browser completes it for you. For example, you type a search term into Microsoft IE but another browser pops up and lists various websites tied to your search term. This is a surefire sign of a spyware infection. You’ll also notice that if you try and remove this program, it comes right back.

#3. Your computer is unstable, sluggish, locks up, or crashes frequently. Spyware programs run in the background taking up disk space and processor speed which will cause serious performance problems.

#4. You constantly get pop-up ads displayed on your screen, even if you aren’t browsing the Internet. Some of the ads may even be personalized with your name.

#5. You receive expensive phone bills for calls to 900 numbers that you didn’t make. Some spyware programs can use your computer to make calls on both a broadband and dial-up line.

#6. The send and receive lights on your modem blink actively as though you are surfing the Internet or downloading files online, even though you aren’t. More than likely this is due to spyware programs sending and receiving information via your computer without your permission or acknowledgement.

#7. Mysterious files suddenly start appearing on your computer, your files are moved or deleted, or the icons on your desktop and toolbars are blank or missing.

#8. Your CD drawer starts opening and closing by itself.

#9. You find e-mails in your “Sent Items” folder that you didn’t send.

I hope you will find this post informative and useful. I am looking forward to hearing your comments. That’s all I have for today, until next time make it a great day!
Continue reading

Posted in Uncategorized | Tagged , , , , , , , , | Comments Off on “9 Warning Signs Your Computer Is Infected With Spyware”

“10 Easy Ways To Eliminate E-mail Overload”

10 Easy Ways To Eliminate E-mail Overload

E-mail driving you crazy? Every time you delete one, do five more show up? Are you finding it impossible to answer every e-mail you receive? If this is you, then here are 10 tips to reduce e-mail overload.
1- Get a good spam filter. Even if it saves you just 10 minutes a day, that adds up to over 59 hours a year.
2- Cancel subscriptions to unwanted mailing lists. Also, make sure you are careful to check the “unsubscribe” or “opt-out” box when purchasing items online.
3- Ask your friends to remove you from joke groups or chain messages.
4- Don’t post or publish your e-mail on websites.
5- Don’t respond to every e-mail you receive. Yes, it’s okay NOT to respond to some e-mails.
6- Be succinct. Restrict your messages to a few sentences. If you can’t, pick up the phone or talk in person.
7- Take advantage of subject lines. If possible, put your question in the subject line of your message. Here’s another tip: create a set of codes with your co-workers and place them in the subject line to help them process and prioritize messages. For example, use “FYI” for informational messages. Use “AR” for action required and “URG” for urgent messages.
8- Block time to answer your e-mail and fight the temptation to check your e-mail every few minutes.
9- Respond to messages when you open them so you only read them once.
10- Set time aside in the morning and the evening to process your inbox. Shoot for a completely empty inbox. File messages you need to keep and set reminders for messages that require you to follow up.

I hope you will find this post informative and useful. I am looking forward to hearing your comments. That’s all I have for today, until next time make it a great day!
Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , , , | Comments Off on “10 Easy Ways To Eliminate E-mail Overload”

“What every business owner needs to know about tying shoes”

What every business owner needs to know about tying shoes

Please watch the video to get the most out of your day. Steve Miller from The Adventure introduced me to TED a couple of weeks ago. Steve is a great guy with a huge sense of humor. I thought I would share some of the humor with you.

So now that you have watched the video…..Which way do you tie your shoes?

I hope you will find this post informative and useful. I am looking forward to hearing your comments. That’s all I have for today, until next time make it a great day!

Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , | Leave a comment

“4 Questions About Backups That You Should Know The Answers To”

4 Questions About Backups That You Should Know The Answers To

The old saying, “Pack your own parachute,” comes to mind when I think of data backups or, more specifically, data RECOVERY. However, how many people actually know how to pack their data backup “parachute.

Since the absolute WORST time to check your backups is AFTER a data disaster, all business owners ought to know the answers to the following questions NOW so they aren’t unpleasantly surprised later when data gets erased and they’re scrambling to get back up and running:

1. Where EXACTLY is your data being backed up, and how do you get access to it?
Ideally, it should be in your network documentation that is kept in your operations manual or somewhere you can easily access it if necessary.

2. Who’s responsible for monitoring the backups to make sure they are working?
When data is lost, the finger pointing starts

3. How often do you run a test restore?
The only way to know if your backups are working properly is to conduct a test restore or “fire drill” of your data. We recommend running this once a month at a minimum to verify that you can actually restore from your backups in an emergency.

4. If your data is lost, what’s the process required to restore it?
Business owners should know what is required and how long it will take to recover data before an emergency strikes. Not all backup and recovery options are created equal. Setting up the proper process before you need it, will make your life a lot easier after an emergency.
Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , , , | Comments Off on “4 Questions About Backups That You Should Know The Answers To”

“Should You Leave Your Computer On at Night or Turn it Off?”

Should You Leave Your Computer On At Night Or Turn It Off?

I’ve been asked by clients whether or not they should leave their computer on all the time or turn it off when they are not using it.

Several years ago I would have told my clients to turn their machines off to save power. But with the proliferation of viruses and threats over the last few years, I have changed my mind.

Today, anti-virus programs and anti-spyware applications need regular updating. These updates are often scheduled to run in the wee hours of the morning when you are not using your computer.

Windows also needs to be updated whenever a new security patch is released. This is usually not daily, but it may happen several times a month. It’s important to update your operating system as soon as a patch becomes available because hackers move very quickly to reverse engineer Windows updates. As soon as an update is released, they create a virus specific to that vulnerability and start looking for unprotected machines to infect and invade.

In addition to the above, you should be backing up your data every day, and the best time to do this is at night when you are not using it.

So bottom line, leave your computer on all night and restart it two or three times a week to clear the memory.

I hope you will find this post informative and useful. I am looking forward to hearing your comments. That’s all I have for today, until next time make it a great day!
Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , , , , , , | Comments Off on “Should You Leave Your Computer On at Night or Turn it Off?”

“How to Pick a Good Password!”

How to Pick a Good Password!

What’s the most common password? You guessed it…”password.” Obviously this is not the best way to protect yourself against hackers and online thieves. But even if you don’t use the word “password,” you might be using an equally easy password to decipher.

We suggest you DON’T use the following passwords for really important web sites, such as your online banking web site or other financially related sites.

• Your name or your spouse’s name.
• Your children’s names.
• Your pet’s name.
• Your birth date.
• The last four digits of your Social Security number.
• Your phone number.
• Your address.
• A series of consecutive numbers, such as “1, 2, 3, 4.”
• A single word that would appear in a dictionary.

Your best bet for creating a strong password: Use combinations of letters, numbers and special characters.

I hope you will find this post informative and useful. I am looking forward to hearing your comments. That’s all I have for today, until next time make it a great day!
Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , , , , | Leave a comment

Security Alert!

Security Alert! Ads for fake antivirus and antispyware programs are multiplying! How to avoid getting tricked? Many “reputable” sites are compromised and the owners don’t know it. So it’s not always where you surf. Here are four tips that may … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , , , , | Comments Off on Security Alert!