Beware of Tech Support Scams!

There are scammers who will call and claim to be a computer tech associated with well-known companies like Microsoft or Apple.  Other scammers send pop-up messages that warn about computer problems.  They say they’ve detected viruses or other malware on your computer.  They claim to be ‘tech support’ and will ask you to give them remote access to your computer.  Eventually, they’ll diagnose a non-existent problem and ask you to pay for unnecessary – or even harmful – services.

If you get an unexpected pop-up, call, spam email or other urgent message about problems with your computer, STOP.  Don’t click on any links, don’t give control of your computer and don’t send any money.

How the Scam Works

Scammers may call, place alarming pop-up messages on your computer, offer free “security” scans, or set up fake websites – all to convince you that your computer is infected. The scammers try to get you on the phone, and then work to convince you there’s a problem. Finally, they ask you to pay them to fix that non-existent problem.

To convince you that both the scammers and the problems are real, the scammers may:

  • pretend to be from a well-known company – like Microsoft or Apple
  • use lots of technical terms
  • ask you to get on your computer and open some files – and then tell you those files show a problem (when they don’t)

Then, once they’ve convinced you that your computer has a problem, the scammers might:

  • ask you to give them remote access to your computer – which lets them change your computer settings so your computer is vulnerable to attack
  • trick you into installing malware that gives them access to your computer and sensitive data, like user names and passwords
  • try to sell you software that’s worthless, or that you could get elsewhere for free
  • try to enroll you in a worthless computer maintenance or warranty program
  • ask for credit card information so they can bill you for phony services, or services you could get elsewhere for free
  • direct you to websites and ask you to enter your credit card number and other personal information

These scammers want to get your money, access to your computer, or both. But there are things you can do to stop them.

If You Get a Call or Pop-Up

  • If you get an unexpected or urgent call from someone who claims to be tech support, hang up. It’s not a real call. And don’t rely on caller ID to prove who a caller is. Criminals can make caller ID seem like they’re calling from a legitimate company or a local number.
  • If you get a pop-up message that tells you to call tech support, ignore it. There are legitimate pop-ups from your security software to do things like update your operating system. But do not call a number that pops up on your screen in a warning about a computer problem.
  • If you’re concerned about your computer, call your security software company directly – but don’t use the phone number in the pop-up or on caller ID. Instead, look for the company’s contact information online, or on a software package or your receipt.
  • Never share passwords or give control of your computer to anyone who contacts you.

If You Were Scammed

  • Get rid of malware. Update or download legitimate security software and scan your computer. Delete anything the software says is a problem.
  • Change any passwords that you shared with someone. Change the passwords on every account that uses passwords you shared.
  • If you paid for bogus services with a credit card, call your credit card company and ask to reverse the charges. Check your statements for any charges you didn’t make, and ask to reverse those, too. Report it to ftc.gov/complaint.

Refund Scams

If you paid for tech support services, and you later get a call about a refund, that call is probably also a scam. Don’t give the person any personal or financial information.

The refund scam works like this: Several months after a purchase, someone calls to ask if you were happy with the service. If you say “No”, the scammer offers a refund. Or, the caller says the company is going out of business and giving refunds. The scammer eventually asks for your bank or credit card account number, or asks for access to your bank account to make a deposit. But instead of putting money in your account, the scammer takes money from your account.

If you get a call like this, hang up, and report it: ftc.gov/complaint.1

Reference:

1 Reprinted:  The Federal Trade Commission (FTC) is the nation’s consumer protection agency. The FTC works to prevent fraudulent, deceptive and unfair business practices in the marketplace.

Federal Trade Commission, Consumer Information

Bryley Systems Ranks #5 as a Top IT Service Provider!

Worcester Business Journal.

May 28, 2018, Volume 29, Number 10 – Book of Lists

Bryley Systems was recently featured in the Worcester Business Journal’s Book of Lists, being ranked #5 as a Top IT service provider.

Bryley Systems is a Managed IT/Cloud/Security Services Provider with clients throughout New England and across the continental United States.  We have fulfill the IT needs of organizations with a focused, client-friendly approach by combining brand-name equipment and software with flexible service options and low-risk, custom-fit, support agreements. Our certified, experienced staff – backed by seasoned management – approach each client’s needs individually.

See if Bryley is the IT company suited to your business needs, by emailing ITExperts@Bryley.com or calling 978.562.6077.

Best Practices to Keep Computers From Overheating

The cooling system of a computer (the fan, heat sinks, vents, etc.) forms one of the most essential components of your device. “Simply put, if your computer becomes too hot, it is possible to destroy and shorten the lifespan of the hardware inside your computer, leading to irreparable damage and potential data loss. Besides losing your data, heat pecks away at your computer’s internal organs—the motherboard, CPU, and more—significantly shortening its lifespan.  Besides the most obvious reason to keep your computer cool, a hot computer will also run slower than a cooler computer. So to prevent your computer from slowing down, make sure that it is running at a moderate or low temperature.”1

Air Flow.  Leave at least three inches of room for airflow around each computer, particularly along the back.  Keep things such as papers, files, or other heating elements away from your computer.  Computer stands are handy to allow for proper airflow.  If you work with a laptop, avoid soft surfaces.  The rubber feet on a laptop will provide room for air to flow under the computer.  Also remember never to leave your laptop turned on before placing it in your bag or briefcase. This would cause the heat to accumulate in one place and thus cause the laptop to overheat.

Dust and Debris.  If dust and debris clog up the air vents, it stops the proper air flow.  When dust and lint build up over the fan, it causes it to work harder.  A layer of dust covering other heat generating parts such as the RAM and Hard Disk can also cause overheating.  In a dusty environment, clean the inside of a computer periodically, particularly the internal fans.  Also, where possible, do not place the computer on a carpeted surface; the carpet fibers are ingested into the computer, building up on the interior surfaces. If you decide to personally clean your computer make sure the system is off and the power cable is unplugged.  To avoid damaging the sensitive electronics, do not touch internal components.

Fans.  The CPU, graphics cards and other computer components generate a great deal of heat. To combat that heat, computers come with internal fans to circulate air.  Keeping those fans in good working order is critical to a well-running system.  Clean the inside of office computers every 8-12 months, particularly the internal fans. All it takes is a can of compressed air and a small brush. Check to ensure that fans are operating. You can do this by turning on the computer with the case open. There should be two or three fans inside the box.  If increased cooling is necessary, consider adding a case fan, attached inside the computer to the front or back of the case. Several manufacturers also make specialized fans for individual components, such as high speed computer memory.  In many cases, computers come installed with very basic CPU fans. Upgrading to a more efficient fan can increase cooling power.

Temperature.  Computers prefer a room temperature of no more than 77 degrees Fahrenheit, with humidity between 35% and 80%.  Resist the temptation to turn off the office air conditioning over the weekend to try and save money. For added protection, install a smart thermostat that will alert you if the temperature moves higher than the desired range. Catching an air conditioning problem early can save costly electronics repairs.

Battery.  If you want to keep your computer safe from overheating, never overcharge the battery. Most people plug in the chargers of their laptops and keep them connected even when the battery is charged to a 100%.  Never do so. Not only does it cause overheating but according to some computer experts, it also reduces the battery life.

PC Settings.   “Tweaking the power settings of your computer is also an effective solution to overheating. Less power consumption leads to less heat generation.”2

  • Try to avoid setting the brightness to maximum.

Some additional best practices would include managing power and data:

  • Shut down workstations at the end of the day. This not only cools the system but also protects against power surges caused by storms. (Note: patching often occurs after-hours; leave your computer powered-on overnight when patching is scheduled)
  • You can also adjust your power settings and screensaver to switch the system to ‘Sleep’ or ‘Hibernate’ mode when not in use.
  • For critical workstations (including servers and other key devices) attach an uninterruptible power supply (UPS). This will protect them against surges and power outages.  For less critical devices, a surge protector should be sufficient.

By utilizing these tips you should have a longer lifespan of your computer.  The time spent taking proper care of your equipment should save time and money in the long run.

References:
1 + 2 fosbytes.com
Lifewire.com
makeuseof.com
howtogeek.com
techrepublic.com
“Overclocking For Newbies” – pcworld.com

Crucial Steps to Take if Your Email Has Been Hacked

Many years ago Yahoo users fell victim to one of the largest data breaches in internet history.  Names, passwords and email addresses for every single customer account on the company’s servers were exposed in a cybersecurity attack.  This attack was very sophisticated – three billion users across multiple services under Yahoo’s umbrella were left vulnerable as a result of the hack.   In late 2017 the complete details surfaced after Yahoo’s parent company was made aware of the nature of the attack.

Whether you use services such as Yahoo Mail, or providers such as Microsoft, Google and Apple, you should be aware about the security of your own email address. After all, your email may be the single most important digital asset you own.  All communication is typically related to your professional networks, personal relationships, and credentials for every other digital service for which you’ve signed up.   All of this data can be used for identity theft, financial fraud, a vehicle for spam, and blackmail.  While there are safeguards you can implement to deter cyber thieves from accessing your personal account, in a severe breach these best practices may not be enough to prevent your email account from being hacked.

If you suspect that you have been targeted, quick action on your behalf is always required to prevent further damage.  If you are in the office, communicate with your IT Administrator immediately.  If you are at home either contact an IT professional, or follow these steps to try and recover your compromised email account. (Remember, in a widespread and very severe breach, these best practices may not be enough to recover your account, and there may be future damages to recover from).

Try to change your password.  You will need to verify whether your email address is still accessible. Most hackers will immediately change your password to prevent you from using your account. If you are able to secure entry before this has been done, you can reduce the threat of further attacks.

  • Make sure your new password differs completely from your last one, and don’t reference any easily guessed personal details such as your birthday or your pet’s name. Ideally, your password should be at least 10 characters long, and it should include a special character and number.
  • In addition, you should look to change your answer to any secret questions used in the account recovery process. After doing so, confirm that the alternative email addresses and phone numbers associated with your email account are not changed.
  • If you are having trouble regaining control of the account, visit your mail provider’s site for instructions on recovering your account. Apple, Google, Microsoft and Yahoo all have guides on their sites, as should other email and internet service providers.

Email everyone on your contact list including business associates, family members and friends about the breach. Next, get in touch with your email provider and report the details. Not only will this alert them to future infiltration attempts, but they may also be able to provide you with further details about the incident and where the access attempts came from.

If you feel sensitive information like bank records have been compromised, you should reach out to a credit reporting agency and have them track your personal credit activity in the months following the incident.

Your account may have been hacked through malicious software, so scan your computer for malware and viruses with a security program. You should also update your computer and devices with the latest security updates.

Recover Your Account.  If you cannot access your account using your old password, then you will need to put in some extra effort before you can recapture sole control of your email address. Start with the “forgot your password” option and check out the recovery options available. It may be as simple as sending an email to an alternative account or a text message to your mobile phone to regain control.

If these options are not available, or you do not have access to your alternative accounts, then you will need to browse through the help center for your email provider for other means of securing access. In worst-case scenarios you might be forced to contact customer service from your provider.

Check Your Email Settings to make sure nothing has been changed.  Keep an eye out for any changes made to your email settings and reset them back to your preferences. Possible issues you should be aware of include:

  • An unfamiliar forwarding address added to your email
  • A new “reply to” email address that tricks your contacts into sending their replies to a different account
  • An enabled auto-response option, used to send out spam messages to your contacts
  • Malicious links added to your email signature

 

Once you have reset any changes to your settings, look at your sent folder to see if the hacker sent out any sensitive information found in your email history.

Change Passwords for Other Accounts.  If you are using the same email and password for multiple accounts, get to work changing your login credentials for these services as soon as possible. This would be a good time to choose unique passwords for each service.  Scan your email inbox and trash folders for any password reset messages. Most hackers can identify other websites that make use of your primary email address. Once they have figured that out it is simply a matter of sending a password reset link and you suddenly have a plethora of compromised accounts on your hands. Make sure to reset login credentials for any similarly breached logins.

See if Bryley is the IT company suited to your business needs, by emailing ITExperts@Bryley.com or calling 978.562.6077.

References:
PC Magazine
The New York Times
The Federal Trade Commission Consumer Protection Agency

Don’t Let the Summer Heat Destroy Your Mobile Devices

As much as we all enjoy outdoor activities that go along with those “lazy days of summer”, we are always reminded to stay hydrated, use sunscreen, avoid too much physical activity during peak hours, etc.   But, what about our precious mobile devices?  Are they being protected from the heat?

Here are a few things to remember as you’re out and about enjoying the warmth of the summer days.  If you get hot, your mobile devices probably will too.  Read on for a few helpful tips to keep your smartphones and tablets cool and running smoothly all summer long:

1 – If at all possible, charge the battery in your phone or tablet indoors where it’s cool.  Charging any battery will cause it to heat up, and if the temperature is 90 degrees or above it could possibly cause the entire device to over-heat and fail.

2 – Try not to use your device in direct sunlight for extended periods of time on hot summer days, especially if it has a black or dark colored case.  The sun’s hot rays can rapidly turn most any electronic device into a chunk of molten plastic and silicon, and typically, the damage is done before you even realize that it is happening.

3 – Install a quality anti-malware app on your devices to prevent viruses and malicious apps from over-working their CPUs and other components.

4 – Don’t leave your devices in a hot vehicle all day, even if the vehicle is in the shade when you park it.  If you have no choice and simply must leave your device(s) in a hot vehicle, wrap it in a cloth and leave it in the trunk.  Avoid leaving it in the passenger compartment.

5 – Use an app such as Clean Master or CCleaner for Android to keep your devices running as efficiently and cool as possible.These apps can help keep your device’s virtual working environment free of clutter, which in turn will allow the CPU and memory to work less while the device is running.

While we cannot control the outside temperature on a hot summer day, these steps can help protect your smart phones and tablets.  Stay Cool!

Scam Alert – Beware!

The Consumer Federal Trade Commission has recently released a scam alert.

“Have you received a robocall at work, telling you that you have to take action or your Google business listing will be removed? Or maybe even marked as permanently closed? That kind of thing could be tough for a business — if the threat was real. But those calls are not legit—and not from Google.

The FTC just filed a lawsuit against Point Break Media and others, saying they made just those kinds of calls. According to the complaint, people who believed the calls and then spoke to a live telemarketer were told that they could avoid the problem by paying a fee (up to $700). When people paid this fee, the scammers then allegedly targeted them with offers for even more expensive services that would supposedly improve Google search results.  Of course, nobody making those calls is affiliated with Google. And businesses can — for free — manage their own Google business listing.

In this case, the scammers targeted music instructors, house painting companies, car dealerships, and other small businesses. They knew that appearing in online searches is crucial for those businesses, and threatening that connection with customers might make people act before stopping to think.

If you get a call like this, don’t press any buttons. Don’t call the number back, and don’t engage. That just encourages the scammers. The best thing to do? Immediately hang up the phone, and then talk about it with your colleagues or employees. Let them know that:

  • Scammers pretend to be someone you trust. They pretend to be connected with a company you know or a government agency
  • Scammers create a sense of urgency. They want you to rush and make a quick decision without considering options.
  • Scammers use intimidation and fear. It’s okay to hang up the phone and confirm what’s really going on before taking any action.

Then, sign up for the FTC’s Business Blog which will keep you up to date on what’s happening at the FTC, and how it affects your business. Also, check out FTC.gov/SmallBusiness. Knowing about scams that target small businesses will help you protect yours.” 1

See if Bryley is the IT company suited to your business needs, by emailing ITExperts@Bryley.com or calling 978.562.6077.
Reference:

1 consumer.ftc.gov/blog/2018/05/google-not-calling-you

Division of Consumer and Business Education, FTC

New Malware Threat Targets Internet Routers

A new malware called VPNFilter has managed to infect over 500,000 routers around the world.

“The Federal Bureau of Investigation warned consumers to reboot their Internet routers and install new software patches, to fight a nasty new malware attack called VPNFilter that has so far infected about half a million devices in more than 50 countries, including the United States.  VPNFilter can be used to steal data, or to order routers to “self-destruct,” knocking thousands of Internet-connected devices offline.” 1

Routers are typically part of the technical devices in the home and at work, but how many of us know how to update software without the help of a technical person?  You would have to look up the brand of the router, its model and serial numbers, know the default password, log on to its internal control software and download a patch from the company’s website.  To some of us, that’s no problem, to most of us, it’s not only confusing, but anxiety provoking.

VPNFilter malware is a threat, and it can wreak havoc.  It can steal critical files from infected machines, or disable the router and knock out thousands of computers offline.  The FBI is working with researcher from Talos Intelligence Group, and they have traced the infection back to a group who appear to be linked to Russia’s military intelligence service.

The latest attack via VPNFilter is especially bad one, since it doesn’t only prevent devices from connecting to the internet, but it can be used for stealing passwords and monitoring internet activity. However, it seems that the attack has been planned for a while now, and both the UK and the US officials have been warning people that the Russian hackers might plan something like this.  The FBI used a court order to seize this Internet address and take it offline. Still, thousands of routers remain infected, including an unknown number in the United States.

So far, the only thing that the people can do to avoid becoming victims of the malware is to reset their routers. Returning them to the factory defaults and updating them is the only way to ensure that the malware is removed from the device.

“The FBI is urging Internet service providers Comcast Corp. and Verizon Communications Inc. and others to check whether their hardware is vulnerable, and work with customers on updating their routers.  Routers by Linksys, MikroTik, Netgear, and TP-Link are affected, as are big external hard drives made by a company called Qnap.  Merely rebooting the routers will wipe much of the toxic code from memory.  But a portion survives, and it will reinstall the malware when the device powers up.  The only sure cure is a software patch for each vulnerable device.” 2

“No other vendors, including Cisco, have been observed as infected by VPNFilter, but our research continues. The behavior of this malware on networking equipment is particularly concerning, as components of the VPNFilter malware allows for theft of website credentials and monitoring of Modbus SCADA protocols. Lastly, the malware has a destructive capability that can render an infected device unusable, which can be triggered on individual victim machines or en masse, and has the potential of cutting off internet access for hundreds of thousands of victims worldwide.”3  Some of the products will handle the update automatically – as a consumer you need to be aware and be able to patch your router.

Don’t leave your networks open to hackers.  As we are connecting other digital devices to our home networks — audio speakers, thermostats, security systems, etc., they all need regular software updates if you want to remain safe.  Spending the time on each device and being proactive is better than having to deal with it in a crisis.

See if Bryley is the IT company suited to your business needs, by emailing ITExperts@Bryley.com or calling 978.562.6077.

References:
1 + 2:  The Boston Globe, May 24, 2018
3:   Talos Intelligence blog.talosintelligence.com/2018/05/VPNFilter.html
US Department of Justice
Security Global 24

Tech Savvy Ideas for Grads, AND Dads!

It’s that time again! Whether you are in the market for a great and fun gift for a graduation or for Father’s Day, read on…

If your graduate is finishing high school or departing their college campus with a degree in hand, they deserve a little something for their hard work.  Below are a number of options for the tech-savvy grad.  Whether you are giving a gift to spruce up an apartment, dorm, or even help them master a new job, get in to shape, go on an adventure or just have fun, here are some ideas to help you give the perfect gift.

Is Dad tech savvy?  You may even find the perfect gift for him, too!

The 1MORE Triple Driver small, sleek headphones. Unlike most portable models, they deliver excellent sound, with an earplug-like design that limits extraneous noise. The 1MORE Triple Driver also comes with nine pairs of earpieces to help the user find just the right fit.

Edifier R2000DB.  These elegantly-designed Bluetooth speakers deliver very good sound quality and ease of use, masterfully converting any late-night gathering into an unforgettable party. They’re a good choice for the more critical listener in need of a wireless speaker for music and other audio content. This one ships as a pair, so your grad and her hipster friends can hear their favorite songs in stereo.

Nikon Coolpix S9900.  This camera packs a 30x zoom into a relatively thin body. It also has a swiveling liquid crystal display, great for composing selfies and other hard-to-reach shots. It even has a good image stabilizer.

Sony FDR-X1000V. This dependable action cam is one of the best, and it’s a bit pricey, but very lightweight, easy to use, and shoots a 4K resolution video.  It also has new-and-improved image stabilization, designed to counteract low-amplitude vibration, which Sony claims is a common problem when you shoot video from a drone. So, if your certain someone decides to capture an aerial view of himself, shaking with fear while zip-lining, it won’t be a problem – the footage itself won’t be jittery.

Apple Watch Series 3 38mm Smartwatch.  An Apple Watch not only shows that the student is tech savvy (which is great for today’s start-up culture), but it also keeps them organized. The Apple Watch Series 3 is the latest version in Apple’s watch collection and it boasts some amazing features. It’s faster than previous generations — by about 70% — which means that apps launch quickly and the…MORE graphics are smoother. Students can use apps like the heart rate monitor and custom high-intensity interval training to stay healthy or conduct business by tracking meetings, sending emails and managing budgets.

Mosiso Laptop Shoulder Bag.  It fits a 15-inch laptop and features spill-resistant gray denim that fits in with both casual and business looks. The inside has foam padding and a fluffy fabric lining to protect the computer from bumps and scratches. And there are side pockets to store a phone, notebook, and power adapter.

Display2Go Digital Photo Frame.  The electronic signage black wood frame has a built-in speaker that allows users to play audio while cycling through a photo slideshow. The frame also has the ability to play video files.  The digital photo frame also includes a white mat, tabletop or wall mount, and has 2GB of internal memory, allowing users to store files directly on the frame.

Logitech X300 Mobile Wireless Stereo Speaker.  The speaker comes in copper, black, blue, pink and silver, and features a built-in rechargeable battery that powers five hours of continuous music. In addition to stereo sound, this speaker is wireless, and has a built-in microphone to double as a mobile speaker for phone calls.

Skylock.  Perhaps your grad loves cycling. This is a smart bike lock with a built-in solar panel that recharges its battery. Skylock uses 256-bit eliptic-curve cryptography to keep bikes safe, and a touch interface to unlock. With a steel housing, Skylock is extremely durable and tough to break.

Happy shopping!

Facebook. To Share, or Not To Share.

Last month Facebook appeared in the news for weeks.  Due to a firm by the name of Cambridge Analytica which collected data from 50+ million Facebook users, it is believed that the company supposedly used this information to influence voter behavior during the US presidential election and UK’s Brexit campaign.

We all know that Facebook is a very popular platform for developing brand awareness, not to mention the millions of families who post photos and all sorts of information to be shared online.  Have you wondered if your data is still safe after the recent data breach scandal?

Let’s rewind back to 2014.  A Facebook personality quiz app which was called “This is Your Digital Life” was developed by a data scientist.  Tens of thousands of Facebook users signed up and released information about themselves in exchange for humorous results.  In 2015, this was removed from the Facebook platform.  The app collected not just the data of the people who took the quiz, but also — “thanks to Facebook’s loose restrictions — data from their friends, too, including details that they hadn’t intended to share publicly.” 1

What the quiz takers didn’t know was the firm that the data scientist worked for had stuck a deal with Cambridge Analytica to share the information that was gathered, including the mined data about the users’ friends.

The information collected was based on:

  • Activities on Facebook, and the information that was disclosed to Facebook
  • Facebook connections, networks, messages, photos and other content that other users sent
  • Payments handled by Facebook
  • Your location
  • Devices that were used for Facebook access
  • Apps and websites which use Facebook services
  • Data from other platforms that are also owned by Facebook, including Instagram and WhatsApp
  • Advertisers and other third-party partners.

What happened next was Cambridge Analytica analyzed the data and created psychological profiles to invent better political drives to influence how people would vote.  There is still a debate about how effective the plan was, but, there’s no doubt that thousands and thousands of users were manipulated in to signing away data without knowing it.

Here is what you can do to keep information safe from data-harvesting apps and programs.

  • Audit Your Facebook Apps. If you used Facebook to sign in to a third-party website, game or app, those services may continue to access your personal data.  “On Facebook, go to the settings page and click on the Apps tab to see which apps are connected to your account. From there, you can take a closer look at the permissions you granted to each app to see what information you are sharing. Remove any apps that you find suspicious or no longer use. (Facebook has also made some changes to prevent the gathering of detailed information of friends of users.)” 2

“On the App Settings page there is another setting called Apps Others Use. This is where you choose which details are shared about you when your friends use apps. Make sure to uncheck all the boxes if you don’t want any of your information, like your birthday or hometown, accessed by your friends’ apps.” 3

  • If you are concerned about what details apps can see about you and your Facebook friends, now is a good time to check your privacy settings and minimize the information you share publicly. For example, you can make sure that only your friends can see your Facebook posts, or that only you can see your friends list. 4

 

Read privacy policies. When you sign up for a new app or web tool, the company typically asks you to agree to its terms of service.  Be sure to carefully read the terms and the privacy policy.  If you see language that you do not understand, or, which suggests your data could be shared in a way that makes you uncomfortable, don’t use the program.

 

References:

  • Combined News Services (NY) pix11.com/2018/04/10/what-is-this-is-your-digital-life-the-facebook-app-you-may-be-alerted-about
  • New York Times – How to Protect Yourself (and your friends) on Facebook.
  • CNN Tech
  • NBC News
  • Fox News

Android Security

In the past several months, Android security issues have become part of techie news.  Hackers are developing a record number of cyberattacks that could compromise your mobile operating system and they’re having more success than ever before. There are some things you can do to tighten up your Android security, and most of the features you need are already built in.

If you lose your Android phone, anyone who picks it up could see what’s inside.  Perhaps it’s a harmless passerby, or worse, a hacker.  Fortunately, Android has a “Find my device” feature that allows you to track, lock, and wipe data from your lost or stolen device. Unless you’ve accidentally disabled ‘Find my device’, it should be running on your Android by default.  To use it in the event that you’ve misplaced your Android device, make sure it’s registered. Go to where you will be prompted to log into your Google account. From there, you can locate your phone and, if you think it has fallen into the wrong hands, wipe it remotely.

One feature that’s often overlooked, but which you should pay close attention to, is the app permission settings located in the App & Notifications menu. In this window, you’ll be able to see which apps have permission to access different phone functions.  Pay close attention to apps that have access to your microphone, camera, and biometric sensors, as these can be used to monitor your daily activities and private information.  And given the recent Facebook privacy fiasco, it’s a good idea to closely watch what permissions your social media apps have.

With “Safe Browsing” mode, Google Chrome users are given warnings before they enter a suspicious site. There are robust threat monitoring features that scan ahead to prevent you from falling for online scams, and much like “Find my device” this feature is enabled by default — just make sure you’ve updated your Android and Chrome to the most recent versions.

In the “Security” menu of your device, there are various settings for managing your lock screen. App notifications, for instance, still make their way onto your lock screen, which means people can still see important messages, even if your phone is locked. To fix this, you can simply limit how much is shown on your lock screen.  Another important setting is Smart Lock, a feature that allows you to automatically lock a device based on its location. For example, if you’re carrying your phone, it can let you automatically keep your phone unlocked; but as soon as it leaves your hand, it locks itself immediately.

Last but not least, you must enable multi-factor authentication.  Aside from accessing your device and apps with just a passcode, multi-factor authentication forces users to provide another set of identification like an SMS code, fingerprint, or facial recognition scan.  Although this adds another step to your sign-in process, it does make it much more difficult for anyone to hijack your accounts. This feature can be found in the “Sign-in & security” options of your system’s settings.  Once you’ve enabled these settings, you’re well on your way to keeping the wide variety of cyberattacks at bay.

*Published with permission from TechAdvisory.org.