Our Top Tips to Avoid Device Theft When Travelling | Fraser Valley Tech Consultants

Many of the people we work with spend a fair amount of time out of the traditional office setting and on the road. Since summer is now fully with us and, probably, the most popular season for travelling, we thought it was a good time to give a few reminders and tips on how to avoid your tech (or data) being stolen while you are on the road!

Image by Austin Distel on Unsplash

Image by Austin Distel on Unsplash

The temporary coffee shop office

This should be a no-brainer, but you would be shocked how many times we have been at a coffee shop and watched someone leave an untethered laptop or bag, while they disappear to the bathroom. You can be complacent and say “oh, it’s a quiet, local spot… we’re in a safe part of town”, but it takes seconds for an opportunist thief to swoop by. Not only are you vulnerable to theft, though, you are also vulnerable to prying eyes!

If you are working remotely at somewhere at a coffee shop, you should be taking the following precautions:

1.      Use a laptop tether to secure your device to the table.

2.      If you need the bathroom, and you are alone, take your bag with you!!!

3.      Be aware of who/what is behind you, especially if you have sensitive info on the screen. (Ideally locate yourself so only a solid wall is behind you.)

4.      Try to avoid using the “free WiFi”, but if you really must, only use websites that use HTTPS, make sure you are definitely on the coffee shop owner’s WiFi and use a VPN before logging into any accounts or view sensitive data. (A recent survey found 70% of hacks actually took place through unsecured public Wifi!)

Photo by   Oleg Magni   from   Pexels

Photo by Oleg Magni from Pexels

Security at your destination

No matter where you go in the world, there will always be plenty of light-fingered friends to relieve you of your prized tech. Beaches are a goldmine for pickpockets and petty thieves. Once again, it can only take a few seconds for someone to scoop your bag (and valuable tech devices) while you quickly cool off in the waves.

1.      The best defense is to simply not take your mobile devices to the beach!

2.      Make use of the hotel safes.

3.      If you must take your device, and want to swim, (and it’s not waterproof) look at purchasing a waterproof case so you can keep it with you.

4.      If you must take your device and want to take a nap on the beach, keep the device discretely tucked away and preferably anchored/hidden under your body!

5.      Be vigilant of unexpected distractions. Thieves can use these as a diversion, and when your gaze wanders, your stuff becomes theirs!

6.      Keep close to lifeguard towers. Of course, these guys are there for safety and not to watch your stuff… but thieves will avoid those areas because of the higher risk of getting caught.

The airport security scam

If a flight is on your travelling agenda, watch out for the dreaded X-ray scanner scam! Here is how it works…

At the airport security check, the first scammer will go through the line quickly & efficiently. A second scammer will wait until the people just behind them have loaded up their tech devices (cellphones, laptops etc) to the x-ray machine conveyor belt, and then proceed to hold these people up (something innocently-looking like struggling to get keys or change out of a pocket).  The first scammer then scoops up those devices as they emerge from the x-ray at the other end and walks away!

Be vigilant and only put your devices on the belt when it is your turn to go through, keeping an eye on them as they pass by! If you see someone taking an unhealthy interest in your devices, alert security personnel immediately.

Safe travels!

Top 6 Tips to Protect Your Business Technology & Data From Theft | Chilliwack & Abbotsford IT Consultants

thief-1562699_1920.jpg

We have talked a fair bit, before, about protecting your business against online threats – with all sorts of scammers constantly trying to steal passwords, identities, data or money. But what about the good old-fashioned real-world threats of theft? No matter how safe you think your location is, break-ins and property theft are also still a concern that you should take into consideration for your business.

Here are our top 6 tips to help you protect your data, and keep the impact to a minimum, if your business is broken into…

1. Anchor or tether equipment to immovable objects

25856676-9F12-44B6-BC4D-6D6B8A2A7ADD.JPEG

A laptop is stolen every 53 seconds (according to tech research firm, Gartner). Stats suggest that the vast majority of these are actually stolen from public places, but they are still a quick payday from an office-interloper too. Did you know there is a way that you can lock up your laptop to protect it from light-fingered visitors? Almost all laptops, for quite a while now, have a small opening on them where you can attach a locking cable. (Like this one , available at Staples) So, you can use this to lock your laptop to an immovable object! You can also do something similar with desktop units in the office.

2. Lock computer cases to prevent removal of hard disks.

For the smart thief, yanking out hard drives makes a quicker & lighter getaway. To thwart them, locking a computer case completely shuts them out – and adding that to a machine already tethered, your data is far safer!

3. Back-up data to online storage

Our favourite phrase does seem to be back-up, back-up, back-up… but we just can’t stress this one enough! Back-ups can save so much time and money in cases of data loss, whether it is from a theft or natural disaster. Using online server storage will also protect precious data in the event of a hardware theft, since that precious data was never on the machine to begin with!

4. Encrypt your hard disk

If you do have to keep important data or files on your PC/laptop, then encrypting your hard disk is a great way of keeping non-authorized eyes away from the goods! (Particularly if you are on the road a lot and not always able to tether your machine). If you are using Windows 7, 8 or 10, then this is actually a really easy thing to do yourself. You can see how, by checking out our quick tip video…

5. Keep servers & network storage devices locked away.

If you do use physical storage devices in your business, make sure they are kept in a locked room or cabinet. Key/combination holders should be kept to a minimum, with access given to only those people who really need it.

6. Install tracking software

If you are the kind of business that is on the move a lot, you may want to consider installing tracking software or services to your mobile devices. Sadly, the chances of retrieving a stolen device are slim, but this could give you a fighting chance… and many will, at least, give you the opportunity to wipe the data from the wandering device! Prey and LockItTight are 2 such services who can help you to track your devices and secure or delete data, or even see what the thief is up to.

If you are an Apple consumer, you have the Find My Mac or iPhone options in the iCloud settings, which also allow you to lock or wipe the devices. Make sure the setting is on.

If you are in Chilliwack, Abbotsford, Langley or the surrounding areas of the BC Fraser Valley, and would like more advice on how you can protect your business technology both online and in the real world, our team will be happy to help! Call us to book a consultation at 778-771-0184 or email help@wildfrogsystems.com.

Switching Phone Systems to VoIP | Fraser Valley Technology Consultants

cloud hosted cell phone

Is VoIP for you and your business?

cloud hosted cell phone

The traditional business telephone solution is showing its age. With the Internet and online technologies powering more and more business functions, organizations are finding it difficult to justify keeping the good ‘ole traditional phone line for their communications solutions. When you add to that the consideration of the initial cost of implementation and how difficult it is to scale a traditional PBX phone system to accommodate for growth, more and more businesses are looking for a more dynamic, and more flexible, solution that’s in line with their needs.

This is where cloud VoIP solutions are coming to the rescue. VoIP stands for Voice Over Internet Protocol, and is a type of phone that uses the internet to make a call! It can either connect to someone else who is also on an internet-capable system or switches to the conventional phone line at one end if needed.

A More Flexible Option

VoIP systems are, cheaper to implement and to manage, often allowing rapid changes to your phone system configuration on-the-fly. With all your staff on the same system, they can work from anywhere and still take advantage of the VoIP phone System.

Plenty of Features… if you need them!

Telephone service providers may often bundle services together in an attempt to offer consumers the opportunity to get more for their money, but these “cost savings” may not actually be worth it if you do not fully use all the services the package provides. With cloud VoIP, you get exactly what you pay for - no more, no less. This helps you build a solution to best align with the specific needs of your business. Plus VoIP systems still have an abundance of fancy features for you to choose from, if you need them!

Adjustable for Growth

The traditional PBX phone system is often difficult to work with, especially if your organization is constantly growing. For each new user, new phone lines and extensions have to be added to your telephony infrastructure. With a cloud VoIP solution, the phone infrastructure is much more dynamic and new users can be added easily. You don’t have to lay new phone lines or remodel your office every time you add users!

To add to that, it is very portable - meaning you can still answer your phones from wherever you have a good Internet connection. (And many VoIP providers also allow you access through mobile apps!)

Some Cons

There is no such thing as a one-size-fits-all solution and not everything in life is perfect. There is almost always the odd con with most systems, and VoIP is no different. VoIP systems are completely reliant on your internet bandwidth (even though they are smart enough to work out when you are not speaking and not use bandwidth in those moments) - so a good internet connection is vital. Our team have become experts in properly assessing your connectivity and working with your ISP to get the best connection.

Along with an Internet connection, the system is also completely reliant on a power source, so power outages can cause a problem. We implement batter backups to reduce this issue.

Also, if you dial 911, emergency services may not automatically be able to locate where your call is coming from, so they can divert you to the nearest dispatcher, like they can with traditional phone calls. You can, however, register an address with your number to aid this.

Fully-hosted and Maintained

Managing and maintaining a telephone system can be complex, especially if you already have other priorities, like managing your day-to-day business operations. Implementing a new system can also be daunting… however, that is why we are here! Wild Frog Systems can advise you on the best system for you and provide the care needed to ensure that you get the most out of your telephone system.

To learn more about how cloud-hosted VoIP can benefit your business, give us a call at 778-771-0184 or email info@wildfrogsystems.com.

What is Spear Phishing and How To Avoid It | Fraser Valley IT Consultants

anonymous-4165613_1920.jpg

You have probably already heard of phishing – after all, it is everywhere, these days - from the good old-fashioned Nigerian prince email all the way through to the CRA phone scam (also known as voice-phishing or vishing). The scammers cast a huge, wide, net as far as they can, and wait to see if anyone bites. However, there is another, more-complex level of phishing, that you may not have heard of, called Spear Phishing.

media-998990_1920.jpg

Spear phishing is different in that they target a specific person – usually someone in a large company with access to valuable data or finances. Before they are contacted, the scammer will take the time to do some research on their intended victim, mostly online through social media accounts etc.

Using the personal information that they have gathered, they will then contact this intended victim, making their email as personal and legit looking as they can. It may be as an application to a job that they know they are recruiting for, or a faked email from a friend claiming to have a link to a new menu from a favourite restaurant. Of course, this link or document will contain a malware-infected link or document.  Once clicked, the hacker either gains access to company data, or can plant a crypto-locker virus for ransoming.

silhouettes-81830_1920.jpg

Most spear phishing is aimed at mid-tier employees. However, there are a few brave spear-phishers who will sometimes target someone at the top of the company tree, like a CEO, CFO or senior manager. When this happens, it is called whaling.

So, how can you prevent this kind of phishing?

  • Education is a key one here. Making employees aware that this can happen will go a long way! Advise them to keep their social media content as private as possible (after all, that is as much for their own personal benefit as yours!).

  • Make sure all employees know what to look for in fake emails (such as poor spelling and grammar, or checking link addresses before clicking them by hovering the mouse pointer to see a pop-up box of the address. If you get a link claiming to be from a certain bank or company, open a browser window and go to the bank/company website directly and compare their actual address to the one you see on the email.

  • Limit data to the people who need it. If you keep data on shared drives, make sure sensitive data is housed on separate drives (eg a drive for Accounting only, a drive for customer lists only etc) and only give people access to the areas/drives they need to work.

  • Keep all software, anti-virus programs and firewalls up-to-date.

  • Back-up, back-up, back-up!! Back-up your data well and back-up often!!

If you are worried about your company’s potential vulnerabilities, give our team a call at 778-771-0184 or email info@wildfrogsystems.com, and talk to us about scheduling a Tech Health Check-Up.

Office 365 Tips - Translator Tool | Chilliwack Tech Support Specialists

language-2345801_1920.jpg

Thanks to the wonders of modern technology and the internet, the whole world is only a click away. No matter what language you speak, though, most of the planet speaks a different one! So, Microsoft added a translator tool to their main Office 365 Apps – Word, Excel & PowerPoint. (And it’s crazily easy to use!)

When in your document,

translate 1.png

1.  Go to the Review tab at the top.

2.  Select “Translate” from the top menu

3. Then select the option you need, depending on how much of the document you want to translate! It will automatically detect the language and do the translation.

translate 2.png

If you want more control over which languages you are translating from/to, select the bottom option on the Translate drop-down menu (Set Document Translation Language). Then, to the right, you will see an settings box appear, in which you can change the languages you are translating between. Once you have picked, click translate!

That’s it!

Of course, this is AI-powered, so it may not be perfect grammatically, or may struggle with colloquialisms. (We may never have a complete replacement for human interpreters, when you consider how language is affected by cultural differences and occasional breaks in grammar rules etc) However, it goes a long way to bringing the global market a little bit closer.

How to Switch Off Unwanted Background Apps in Windows | Fraser Valley Tech Support

If you’ve ever had to open your Task Manager to close a program, you’ll notice that there a lot more programs & processes running than the ones you may be using on the screen. There is nothing unusual or bad about background apps running in Windows 10. After all, many of them are making Windows work for you the way it does. However, to get the best performance out of your machine, there may be a few that you can actually turn off. (Please note… be very carefully when picking which to close!)

Here is how you do it…

1.      Click on the Start button (Windows icon in bottom left-hand corner)

2.      Click the Settings icon (the cog)

3.      Click Privacy to open up the settings window

background apps 1.png

4.      In left-hand list, find and click the Background apps option.

background apps 2.png

5.      Now you should see a list of applications running in the background of Windows 10!

background apps 3.png

Now, many of these you will want to keep on, depending on how you use your computer. E.G. If you use Skype, leave that on so people can call you! If not, turn it off.

On my PC, I was surprised to see some games running that I had no idea I even had on my computer – they had just been installed at the factory level and left there, or came as part of an update.

When you are done, you can just close the window. You may want to re-check it though, after any updates… just in case!

Improve Your Work-Flow by Using Virtual Desktops in Windows 10 | Chilliwack & Abbotsford Tech Support

Photo by   energepic.com   from   Pexels

Photo by energepic.com from Pexels

Have you ever had a time when you are working on a project, that required multiple apps/windows to be open on your desktop at once, when you needed to do something else completely different… but this is going to make your desktop even more cluttered and confusing? You really don’t want to shut down all the windows you have open, but you need a clean work-space.

This is where the virtual desktop function, on Windows 10, comes to the rescue. For Mac users, this is not something new, but now PC users can take advantage of having multiple desktops to work on as well… and it’s not hard to use either.

ctrl windows d keys.png

To start a new desktop, simply press the Windows, Ctrl + D keys, on your computer keyboard. (Control + Up on Macs) Voila! You now have a fresh, clean desktop to start your new project on!

To navigate back and forth between your desktops, simply press the Windows + Tab keys on your keyboard to open up your navigation options. (An alternative is Windows + Ctrl and then the left or right arrows to switch between screens).

You can also see a demo of how it works on our YouTube channel…