TECH Talks
Easy ways to check your tech and stay safe online!
!
Hear our newest TECH Talks on 96.5 FM
Look through our popular topics below:
Security
The Cloud
MFA (Multi-factor Authentication)
The three “factors” of Multi-Factor Authentication are:
1. Something you know (like a PIN or question)
2. Something you have (like a Secure App or SMS)
3. Something you are (like a fingerprint or FaceID)
MFA is an extra detail that keeps your accounts secure even if someone acquires your username and password.
Never share MFA with someone else!
It needs to stay secret and specific to you in order to work.
Antivirus Software: Do I need it?
Still not sure if you need Antivirus software?
Computer viruses are like a cold: you can pick them up from nearly anywhere, and then pass them on to coworkers or family members before you realise it.
Antivirus software is an inexpensive security guard that protects your device from picking up viruses.
It also prevents you from unknowingly infecting your network through more secure channels.
What is a strong password?
Creating a ‘strong’ password is essential for your first line of defence against hackers.
Here are some basic guidelines to creating a strong password:
– Use more than one word (this is called a ‘passphrase’)
– Incorporate lower and upper-case letters, as well as numbers and symbols
– Choose a random word or phrase, unrelated to you or the account
– Create unique passwords for different accounts
What is a weak password?
Creating a ‘weak’ password can put you at risk from hackers.
This is what we look for to identify a password that is easy to guess:
– The password contains personal information like your name, birthday, a pet’s name, or your business name (for example, Charlie1 or Sam1999)
– It’s only one word or a short word
– Only lowercase or sentence case is used
– The same password is used for different accounts, or only changes slightly (for example, adding a 1 or ! to the end)
– It’s a predictable pattern (like 123456 or Password)
– The password is the same as the username
What is the Cloud?
What we call “The Cloud” is any service you access using the internet.
Accounting software, email, or logging in to work from home- these are all “in the Cloud”.
Myth: Storms and rain stop the Cloud from working.
Can storms and rain stop the cloud from working?
Accessing services like email and business software via the internet means that you can work anywhere, any time.
Although we call these internet-based services “The Cloud”, they aren’t related to the fluffy, white clouds in the sky.
Storms and rain can interfere with your internet connection, but that doesn’t affect your Cloud services.
If your data is in the Cloud, you still need backups.
Any online data is susceptible to hackers, security breaches, and deletion.
You can improve your odds by making sure to activate multi-factor authentication and choosing a secure password, but the risk can’t be removed entirely.
Backing up your data means that it will survive in the event of a disaster, cyber attack, or simple accident.
Scams + PHISHing
IT Support
Myth: My business is "too small" for cybercriminals!
No business is too small for cybercriminals.
Simply being a contactable business puts you at risk.
They’re after any information that can be used to deceive people, including:
phone numbers, email addresses, names, and job titles.
Any piece of information can be used to make a scam more convincing.
That’s why it’s so important to stay up to date on security training and identifying scams.
How to spot the dodgy email
94% of malicious software is delivered by email, so we always advise caution.
Look for these things:
– Spelling mistakes in the company name, web address, or other important info
– It’s sent from a different email than you expect
– It’s asking you to click a link in the body of the email
– It asks you to reply with personal information or bank details
– Attachments you don’t recognise or didn’t ask for
Unless you’ve independently verified that an email is legitimate, don’t click any links or reply with personal information.
Remember, if you didn’t ask for the email, it’s more likely to be dodgy.
Have you received payment details by email?
If you need to make a payment and received the necessary details via email, start with safety.
First, call the business/entity that you’re paying, using contact details that you already had on file.
Then, get secondary confirmation before changing any bank account details or sending any funds requested.
Virus Pop-ups
One minute, you’re on a completely normal webpage.
The next, something pops up in front of your face to tell you that your computer has a virus!
It’s alarming and confusing, and almost definitely a hoax.
Don’t panic, and don’t click on any links.
Simply hit Alt-F4 on your keyboard to close the hoax webpage.
If you’re still concerned, call your trusted local expert.
Computers slow? Internet dropping out? Try these.
Here a few tips that you can use before you need to call the experts:
– Check for Windows updates
– Close everything down and restart your PC
– Then, try restarting your modem
If you’re still having problems, call your trusted local expert.
What happens when my PC is serviced remotely?
When Rampant calls you to conduct a scheduled Remote Service, there are a couple of things you can expect to happen.
Firstly, we’ll call you before we start and let you know what’s happening. With your permission, we can begin the service.
You may see a different screen appear letting you know that we’re servicing it.
We’ll need to use your keyboard and mouse during the service, so you can take the opportunity to do any non-computer-related task you like (this often includes grabbing a coffee).
It’s that easy!