“Free” Security Scan? Beware of Scammers.

“Messages telling you to install and update security software for your computer seem to be everywhere. So you might be tempted by an offer of a “free security scan,” especially when faced with a pop-up, an email, or an ad that claims “malicious software” has already been found on your machine. Unfortunately, it’s likely that the scary message is a come-on for a rip-off.

The free scan claims to find a host of problems, and within seconds, you’re getting urgent pop-ups to buy security software. After you agree to spend $40 or more on the software, the program tells you that your problems are fixed. The reality: there was nothing to fix. And what’s worse, the program now installed on your computer could be harmful.

Scammers have found ways to create realistic but phony “security alerts.” Though the “alerts” look like they’re being generated by your computer, they actually are created by a con artist and sent through your Internet browser.

These programs are called “scareware” because they exploit a person’s fear of online viruses and security threats. The scam has many variations, but there are some telltale signs. For example:

  • you may get ads that promise to “delete viruses or spyware,” “protect privacy,” “improve computer function,” “remove harmful files,” or “clean your registry;”
  • you may get “alerts” about “malicious software” or “illegal pornography on your computer;”
  • you may be invited to download free software for a security scan or to improve your system;
  • you could get pop-ups that claim your security software is out-of-date and your computer is in immediate danger;
  • you may suddenly encounter an unfamiliar website that claims to have performed a security scan and prompts you to download new software.

 

Scareware purveyors also go to great lengths to make their product and service look legitimate. For example, if you buy the software, you may get an email receipt with a customer service phone number. If you call, you’re likely to be connected to someone, but that alone does not mean the company is legitimate. Regardless, remember that these are well-organized and profitable schemes designed to rip people off.

How Do the Scammers Do It?

Scareware schemes can be quite sophisticated. The scam artists buy ad space on trusted, popular websites. Even though the ads look legitimate and harmless to the website’s operator, they actually redirect unsuspecting visitors to a fraudulent website that performs a bogus security scan. The site then causes a barrage of urgent pop-up messages that pressure users into downloading worthless software.

What to Do

If you’re faced with any of the warning signs of a scareware scam or suspect a problem, shut down your browser. Don’t click “No” or “Cancel,” or even the “x” at the top right corner of the screen. Some scareware is designed so that any of those buttons can activate the program. If you use Windows, press Ctrl + Alt + Delete to open your Task Manager, and click “End Task.” If you use a Mac, press Command + Option + Q + Esc to “Force Quit.”

If you get an offer, check out the program by entering the name in a search engine. The results can help you determine if the program is on the up-and-up.

Good Security Practices

Check that your security software is active and current: at a minimum, your computer should have anti-virus and anti-spyware software, and a firewall. You can buy stand-alone programs for each element — or a security suite that includes these programs — from a variety of sources, including commercial vendors and your Internet Service Provider. The security software that was installed on your computer when you bought it generally works for just a short time — unless you pay a subscription fee to keep it in effect.

Make it a practice not to click on any links within pop-ups.  Report possible fraud online at ftc.gov/complaint or by phone at 1-877-FTC-HELP. Details about the purchase — including what website you were visiting when you were redirected — are helpful to investigators.”1

Reference:

1 Reprinted:  The Federal Trade Commission (FTC) is the nation’s consumer protection agency. The FTC works to prevent fraudulent, deceptive and unfair business practices in the marketplace.

Federal Trade Commission, Consumer Information

Note: This article was previously available as “Free Security Scan” Could Cost Time and Money.

See if Bryley is the IT company suited to your business needs, by emailing ITExperts@Bryley.com or calling 978.562.6077.

Best Practices to Keep Computers From Overheating

The cooling system of a computer (the fan, heat sinks, vents, etc.) forms one of the most essential components of your device. “Simply put, if your computer becomes too hot, it is possible to destroy and shorten the lifespan of the hardware inside your computer, leading to irreparable damage and potential data loss. Besides losing your data, heat pecks away at your computer’s internal organs—the motherboard, CPU, and more—significantly shortening its lifespan.  Besides the most obvious reason to keep your computer cool, a hot computer will also run slower than a cooler computer. So to prevent your computer from slowing down, make sure that it is running at a moderate or low temperature.”1

Air Flow.  Leave at least three inches of room for airflow around each computer, particularly along the back.  Keep things such as papers, files, or other heating elements away from your computer.  Computer stands are handy to allow for proper airflow.  If you work with a laptop, avoid soft surfaces.  The rubber feet on a laptop will provide room for air to flow under the computer.  Also remember never to leave your laptop turned on before placing it in your bag or briefcase. This would cause the heat to accumulate in one place and thus cause the laptop to overheat.

Dust and Debris.  If dust and debris clog up the air vents, it stops the proper air flow.  When dust and lint build up over the fan, it causes it to work harder.  A layer of dust covering other heat generating parts such as the RAM and Hard Disk can also cause overheating.  In a dusty environment, clean the inside of a computer periodically, particularly the internal fans.  Also, where possible, do not place the computer on a carpeted surface; the carpet fibers are ingested into the computer, building up on the interior surfaces. If you decide to personally clean your computer make sure the system is off and the power cable is unplugged.  To avoid damaging the sensitive electronics, do not touch internal components.

Fans.  The CPU, graphics cards and other computer components generate a great deal of heat. To combat that heat, computers come with internal fans to circulate air.  Keeping those fans in good working order is critical to a well-running system.  Clean the inside of office computers every 8-12 months, particularly the internal fans. All it takes is a can of compressed air and a small brush. Check to ensure that fans are operating. You can do this by turning on the computer with the case open. There should be two or three fans inside the box.  If increased cooling is necessary, consider adding a case fan, attached inside the computer to the front or back of the case. Several manufacturers also make specialized fans for individual components, such as high speed computer memory.  In many cases, computers come installed with very basic CPU fans. Upgrading to a more efficient fan can increase cooling power.

Temperature.  Computers prefer a room temperature of no more than 77 degrees Fahrenheit, with humidity between 35% and 80%.  Resist the temptation to turn off the office air conditioning over the weekend to try and save money. For added protection, install a smart thermostat that will alert you if the temperature moves higher than the desired range. Catching an air conditioning problem early can save costly electronics repairs.

Battery.  If you want to keep your computer safe from overheating, never overcharge the battery. Most people plug in the chargers of their laptops and keep them connected even when the battery is charged to a 100%.  Never do so. Not only does it cause overheating but according to some computer experts, it also reduces the battery life.

PC Settings.   “Tweaking the power settings of your computer is also an effective solution to overheating. Less power consumption leads to less heat generation.”2

  • Try to avoid setting the brightness to maximum.

Some additional best practices would include managing power and data:

  • Shut down workstations at the end of the day. This not only cools the system but also protects against power surges caused by storms. (Note: patching often occurs after-hours; leave your computer powered-on overnight when patching is scheduled)
  • You can also adjust your power settings and screensaver to switch the system to ‘Sleep’ or ‘Hibernate’ mode when not in use.
  • For critical workstations (including servers and other key devices) attach an uninterruptible power supply (UPS). This will protect them against surges and power outages.  For less critical devices, a surge protector should be sufficient.

By utilizing these tips you should have a longer lifespan of your computer.  The time spent taking proper care of your equipment should save time and money in the long run.

References:
1 + 2 fosbytes.com
Lifewire.com
makeuseof.com
howtogeek.com
techrepublic.com
“Overclocking For Newbies” – pcworld.com

Bryley Systems Wins Channel Partners 360⁰ Award for 2nd Consecutive Year

LAS VEGAS – April 18, 2018 – Channel Partners, a resource for indirect sales channels offering IT and telecom systems and services, is pleased to announce that Bryley Systems Inc. has been selected as a winner of the 2018 Channel Partners 360⁰ Business Value Awards.

Michelle Denio, Technical Support Supervisor at Bryley Systems, accepting the Channel Partners 360 Award in Las Vegas

Michelle Denio, Service Manager at Bryley Systems, accepting the Channel Partners 360 Award in Las Vegas

Twenty-five winners were honored during an awards reception on April 18th at the Spring 2018 Channel Partners Conference & Expo in Las Vegas.  Michelle Denio, Service Manager at Bryley Systems, accepted the award.

“Our 2018 Channel Partners 360° Business Value Awards winners illustrate the rapid emergence of the full-stack digital services provider,” said Lorna Garey, editor in chief of Channel Partners and Channel Futures. “Our editors were impressed by the range of services delivered, from desktops as a service to security to SD-WAN to an all-in automation strategy and more. We also saw the blurring of the lines between different types of channel entities become really apparent — for the first time, several winners were also named as providers. Seems the message ‘develop your own IP’ has resonated.”

Channel Partners 360° Business Value Awards winners are selected by a panel of editors based on real-world case studies that illustrate how the partner is using the convergence of IT and telecom services to create business value for its customers.

“It is a great honor to have won this award for two consecutive years in a row,” said Gavin Livingstone, President of Bryley Systems. “We are a growing Managed IT / Cloud / Security services provider and we take great pride from the recognition of our peers.”

About Bryley Systems

Bryley Systems Inc. – a Top 501 Managed IT Services Provider worldwide for five consecutive years – proactively manages, optimizes, and secures the IT infrastructure of organizations in manufacturing, business services, passenger transit, and local government. From cloud-based to on-premise solutions, they approach each client’s needs individually, with flexible service options and custom-fit agreements.  Since 1987, Bryley Systems has been providing Dependable IT at a Predictable Cost to clients throughout the continental United States.

About Channel Partners

For more than two decades, Channel Partners has been the leader in providing news and analysis to indirect sales channels serving the business technology industry. It is the unrivaled resource for resellers, aggregators, agents, brokers, VARs, systems integrators, interconnects and dealers that provide network-based communications and computing services, associated CPE and applications as well as managed and professional services. Channel Partners is the official media of the Channel Partners Conference & Expo and Cloud Partners.

Bryley’s Prestigious Channel Partners 360° Award Celebrates Fall

After being honored as one of 25 recipients worldwide, our prestigious award is traveling the U.S. in celebration – being one of the most sought-after in the industry of technology solutions.  This month it stayed local to celebrate Fall in New England

HAPPY HALLOWEEN!

Bryley is getting into the Fall spirit.  Stop by on Halloween
as we join several other businesses in Hudson to hand out
treats to the youth in our community.

 

Cathy Livingstone hands out candy to local residents.

All Aboard!

The cutest mouse trap we’ve ever seen!

 

 

“Bryley Systems works toward continuous improvement; we strive to manage, optimize, and secure our client’s information technology, which brings substantial business benefit and value to their organizations. Our team-focused, best-practices-oriented approach, coupled with high-value/low-risk service options, enables us to provide our clients with Dependable IT at a Predictable Cost™.  We thank Channel Partners for this prestigious Channel Partners 360° award!”                      

      – Gavin and Cathy Livingstone, Co-Owners, Bryley Systems, Hudson, MA

Bryley’s Channel Partners 360 Award Travels the U.S.

After being honored as one of 25 recipients worldwide, our prestigious award is traveling the U.S. in celebration – being one of the most sought-after in the industry of technology solutions.

5 Mile Bridge.  The Mackinac Bridge, more commonly known as the 5 Mile Bridge is the longest suspension bridge in the Western Hemisphere. It was built in 1957 to connect the Upper and Lower Peninsulas of Michigan. Prior to 1957, individuals had to take a ferry to get from one side to the other. The bridge was designed to withstand the incredible Michigan weather including high winds, drastic temperature fluctuations, and shifts in weight (due to traffic and ice).

“Bryley Systems works toward continuous improvement; we strive to manage, optimize, and secure our client’s information technology, which brings substantial business benefit and value to their organizations. Our team-focused, best-practices-oriented approach, coupled with high-value/low-risk service options, enables us to provide our clients with Dependable IT at a Predictable Cost™. We thank Channel Partners for this prestigious Channel Partners 360° award!”

– Gavin and Cathy Livingstone, Co-Owners, Bryley Systems, Hudson, MA

Bryley’s Prestigious Channel Partners 360 Award Travels the U.S.

After being honored as one of 25 recipients worldwide, our prestigious award is traveling the U.S. in celebration – being one of the most sought-after in the industry of technology solutions.

About Bryce Canyon. Bryce Canyon National Park in Southwestern Utah is famous for the largest collection of hoodoos—the distinctive rock formations at Bryce—in the world. Pillars of red, white, and orange cut through bluest skies, forming some of the world’s most famous breathtaking views. Bryce Canyon first became a tourist destination in 1916 with Union Pacific. It was then declared a National Monument in 1923, and officially established as a National Park in 1928.

 “Bryley Systems works toward continuous improvement; we strive to manage, optimize, and secure our client’s information technology, which brings substantial business benefit and value to their organizations. Our team-focused, best-practices-oriented approach, coupled with high-value/low-risk service options, enables us to provide our clients with Dependable IT at a Predictable Cost™. We thank Channel Partners for this prestigious Channel Partners 360° award!”                

    – Gavin and Cathy Livingstone, Co-Owners, Bryley Systems, Hudson, MA

Bryley Receives Prestigious Channel Partners 360° Award!

April 11, 2017 — Bryley Systems is pleased to announce that it has been honored by Channel Partners, with the 2017 Channel Partners 360° Business Value Award.  We are one of only 25 technology-oriented companies worldwide to receive this award, which is one of the most sought-after in the industry.

This award honors service providers that are taking a holistic approach to technology solutions and creating business value for their clients and have a well-rounded portfolio.  Channel Partners started “as a simple idea to reward partners of all sizes for creating business value for their customers through telecom, IT, and cloud solutions…” and “rewards channel partners – agents, VARs, dealers, system integrators, MSPs and consultants – of all sizes for innovation, solutions-orientation and customer focus.”

Bryley’s President, Gavin Livingstone and co-owner, Cathy Livingstone, were on hand to accept the award stating “Bryley Systems works toward continuous improvement; we strive to manage, optimize, and secure our client’s information technology, which brings substantial business benefit and value to their organizations. Our team-focused, best-practices-oriented approach, coupled with high-value/low-risk service options, enables us to provide our clients with Dependable IT at a Predictable Cost™.

We thank Channel Partners for this prestigious Channel Partners 360° award!”

Award recipients were honored at a ceremony on April 11 at the Channel Partners Conference & Expo in Las Vegas.

Tour of the new maintenance facility of the WRTA

Bryley’s President, Gavin Livingstone, who currently chairs the Worcester Regional Chamber of Commerce (WRCC) Ambassadors, arranged for a group of 20 WRCC Ambassadors and staff to tour the new Worcester Regional Transit Authority (WRTA) maintenance facility at 42 Quinsigamond Avenue, Worcester. The tour was conducted by Jim Parker, General Manager of Central Mass Transit Management Inc. (CMTM), which operates and maintains all of the WRTA buses and facilities.

Touring Maintenance Facility

Created in 1974, the WRTA is the second-largest regional transit authority in Massachusetts, servicing Worcester and its surrounding 37 communities. WRTA buses typically run continuously from early morning through midnight (with some holiday exceptions); seven days a week, 365 days a year.

The WRTA’s new, 156,000-square-foot facility is roughly double the size of the original, outdated garage, which was built in 1928 as a trolley barn. The new facility is large enough for 75 transit buses and 30 vans (the current fleet includes 52 buses), and has nine maintenance bays. Buses enter the facility and head to a refueling bay where they can get a wash, repairs, fluid checks and adjustments – even get repainted – before rolling back into service.

Window View from the Upstairs Office

 

The new facility is also home to significant, up-to-date technology, including a WRTA BusTracker app, Track by Text, Track by QR Code, and WRTA-schedule/ tracking Kiosks located throughout the city.

Control Center

All operations run through the sophisticated Control Center, which is continuously manned when buses are on the road.

In 2014, Bryley Systems – the Managed IT provider for CMTM and the WRTA – designed and deployed an IT-infrastructure platform to support the technologies listed above, but with managed redundancies to allow continuous operation. (For details, see “Transportation Company Relies on Bryley Systems to Stabilize Technology Platform and Create Blueprint for the Future” for details.)

Wi-Fi is not Wireless Fidelity

Garin Livingstone and Gavin Livingstone, Bryley Systems Inc.

Wi-Fi is not an abbreviation for wireless fidelity1; it is a trademarked phrase that refers to wireless communication between electronic devices and a Wireless Local Area Network (WLAN) based on the IEEE 802.11x standards.

Wi-Fi is brought to us by the Wi-Fi Alliance®, a worldwide network of companies with the mission to drive the adoption and evolution of Wi-Fi globally.  The Wi-Fi Alliance tests and certifies that WLAN equipment meets its stated standards.

Current standards include:

  • 11g
  • 11n
  • 11ag

Speeds have grown substantially, now rocketing up to a potential 1,300Mbps using the latest WiGig™, 802.11ac, standard (although actual performance is typically significantly less than its potential).

wifi-standard

At their core; wireless networks are less secure than wired networks (since a potential intruders does not need a physical connection), although encryption technologies (Wi-Fi Protected Access or WPA and WPA2) exist to secure WLANs.

Large-scale Wi-Fi implementations include:

  • City-wide Wi-Fi – Free Wi-Fi provided in St. Cloud, FL, Sunnyvale, CA, etc.
  • Campus-wide Wi-Fi – Wi-Fi throughout a campus environment

1See ‘Wireless Fidelity’ Debunked by Naomi Graychase of WiFi Planet.

2See Wikipedia IEEE 802.11.