Fraser Valley Tech Consultants

Two Factor Authentication – What Is It and Do You Need It? | Fraser Valley Technology Consultants

beverage-blog-blogger-1799342.jpg

The world of digital security is a minefield, these days. It is now almost a daily occurrence to see companies either fall victim to (or be fined for) major data breaches. (The list of companies hit makes for some impressive reading!) In fact, there have been over 14 billion data breaches since 2013, and that number is fast increasing, with 75 data records are being stolen every second!

Not all breaches are caused by nefarious hackers. Believe it or not, they only amount for just over 40% of breaches. Other causes making up the remainder include technical glitches or employee error.

We’ve said it before. Passwords should be complicated and changed often. But can you do more? Yes, you can!

What is 2FA?

One snazzy concept that was introduced to thwart login hackers is two factor authentication (2FA). This is where, after you have entered your password, you add a 2nd way to tell the site that you are definitely you! (Like the way, in the movies, that the scientists entering the super-secret spy lab have to use a swipe card and then a retinal scanner to gain entry.) Since you need both to access the account, this extra layer of security seriously increases the protection of sensitive data from these cases of a password database being stolen or hacked.

Blank Diagram (3).png

This second layer can be biometric, like with face detection or fingerprint scanning software, or it can involve sending a one-time-use number code to another device you own, via a text or special app. The latter is probably the most commonly seen and used, at the moment .

Should I use it?

Yes! So many companies are now offering it as an option – Apple, Square, Intuit, Amazon, Google, Facebook, Microsoft, Dropbox, PayPal, GoDaddy…and so on. If a site gives you the option, take it! (Especially anywhere that will have any valuable ID info, financial records or payment details.) You can see who has it and who doesn’t at twofactorauth.org. If you are not sure how to turn on 2FA at those sites, Telesign have set up a website, with tutorials, to show you how!

Our Top Tips to Avoid Device Theft When Travelling | Fraser Valley Tech Consultants

Many of the people we work with spend a fair amount of time out of the traditional office setting and on the road. Since summer is now fully with us and, probably, the most popular season for travelling, we thought it was a good time to give a few reminders and tips on how to avoid your tech (or data) being stolen while you are on the road!

Image by Austin Distel on Unsplash

Image by Austin Distel on Unsplash

The temporary coffee shop office

This should be a no-brainer, but you would be shocked how many times we have been at a coffee shop and watched someone leave an untethered laptop or bag, while they disappear to the bathroom. You can be complacent and say “oh, it’s a quiet, local spot… we’re in a safe part of town”, but it takes seconds for an opportunist thief to swoop by. Not only are you vulnerable to theft, though, you are also vulnerable to prying eyes!

If you are working remotely at somewhere at a coffee shop, you should be taking the following precautions:

1.      Use a laptop tether to secure your device to the table.

2.      If you need the bathroom, and you are alone, take your bag with you!!!

3.      Be aware of who/what is behind you, especially if you have sensitive info on the screen. (Ideally locate yourself so only a solid wall is behind you.)

4.      Try to avoid using the “free WiFi”, but if you really must, only use websites that use HTTPS, make sure you are definitely on the coffee shop owner’s WiFi and use a VPN before logging into any accounts or view sensitive data. (A recent survey found 70% of hacks actually took place through unsecured public Wifi!)

Photo by   Oleg Magni   from   Pexels

Photo by Oleg Magni from Pexels

Security at your destination

No matter where you go in the world, there will always be plenty of light-fingered friends to relieve you of your prized tech. Beaches are a goldmine for pickpockets and petty thieves. Once again, it can only take a few seconds for someone to scoop your bag (and valuable tech devices) while you quickly cool off in the waves.

1.      The best defense is to simply not take your mobile devices to the beach!

2.      Make use of the hotel safes.

3.      If you must take your device, and want to swim, (and it’s not waterproof) look at purchasing a waterproof case so you can keep it with you.

4.      If you must take your device and want to take a nap on the beach, keep the device discretely tucked away and preferably anchored/hidden under your body!

5.      Be vigilant of unexpected distractions. Thieves can use these as a diversion, and when your gaze wanders, your stuff becomes theirs!

6.      Keep close to lifeguard towers. Of course, these guys are there for safety and not to watch your stuff… but thieves will avoid those areas because of the higher risk of getting caught.

The airport security scam

If a flight is on your travelling agenda, watch out for the dreaded X-ray scanner scam! Here is how it works…

At the airport security check, the first scammer will go through the line quickly & efficiently. A second scammer will wait until the people just behind them have loaded up their tech devices (cellphones, laptops etc) to the x-ray machine conveyor belt, and then proceed to hold these people up (something innocently-looking like struggling to get keys or change out of a pocket).  The first scammer then scoops up those devices as they emerge from the x-ray at the other end and walks away!

Be vigilant and only put your devices on the belt when it is your turn to go through, keeping an eye on them as they pass by! If you see someone taking an unhealthy interest in your devices, alert security personnel immediately.

Safe travels!

Top 6 Tips to Protect Your Business Technology & Data From Theft | Chilliwack & Abbotsford IT Consultants

thief-1562699_1920.jpg

We have talked a fair bit, before, about protecting your business against online threats – with all sorts of scammers constantly trying to steal passwords, identities, data or money. But what about the good old-fashioned real-world threats of theft? No matter how safe you think your location is, break-ins and property theft are also still a concern that you should take into consideration for your business.

Here are our top 6 tips to help you protect your data, and keep the impact to a minimum, if your business is broken into…

1. Anchor or tether equipment to immovable objects

25856676-9F12-44B6-BC4D-6D6B8A2A7ADD.JPEG

A laptop is stolen every 53 seconds (according to tech research firm, Gartner). Stats suggest that the vast majority of these are actually stolen from public places, but they are still a quick payday from an office-interloper too. Did you know there is a way that you can lock up your laptop to protect it from light-fingered visitors? Almost all laptops, for quite a while now, have a small opening on them where you can attach a locking cable. (Like this one , available at Staples) So, you can use this to lock your laptop to an immovable object! You can also do something similar with desktop units in the office.

2. Lock computer cases to prevent removal of hard disks.

For the smart thief, yanking out hard drives makes a quicker & lighter getaway. To thwart them, locking a computer case completely shuts them out – and adding that to a machine already tethered, your data is far safer!

3. Back-up data to online storage

Our favourite phrase does seem to be back-up, back-up, back-up… but we just can’t stress this one enough! Back-ups can save so much time and money in cases of data loss, whether it is from a theft or natural disaster. Using online server storage will also protect precious data in the event of a hardware theft, since that precious data was never on the machine to begin with!

4. Encrypt your hard disk

If you do have to keep important data or files on your PC/laptop, then encrypting your hard disk is a great way of keeping non-authorized eyes away from the goods! (Particularly if you are on the road a lot and not always able to tether your machine). If you are using Windows 7, 8 or 10, then this is actually a really easy thing to do yourself. You can see how, by checking out our quick tip video…

5. Keep servers & network storage devices locked away.

If you do use physical storage devices in your business, make sure they are kept in a locked room or cabinet. Key/combination holders should be kept to a minimum, with access given to only those people who really need it.

6. Install tracking software

If you are the kind of business that is on the move a lot, you may want to consider installing tracking software or services to your mobile devices. Sadly, the chances of retrieving a stolen device are slim, but this could give you a fighting chance… and many will, at least, give you the opportunity to wipe the data from the wandering device! Prey and LockItTight are 2 such services who can help you to track your devices and secure or delete data, or even see what the thief is up to.

If you are an Apple consumer, you have the Find My Mac or iPhone options in the iCloud settings, which also allow you to lock or wipe the devices. Make sure the setting is on.

If you are in Chilliwack, Abbotsford, Langley or the surrounding areas of the BC Fraser Valley, and would like more advice on how you can protect your business technology both online and in the real world, our team will be happy to help! Call us to book a consultation at 778-771-0184 or email help@wildfrogsystems.com.