tech tips

Picking a Backup Solution For You | Chilliwack & Abbotsford Tech Support

Backup, backup, backup! We say it all the time. We mention it frequently in our articles. Backing your files up can be, probably, the most important thing you can do to protect your business against a whole range of natural or security disasters.

Online Backup vs Online Storage

cloud-computing-2153286_1280.png

When looking at your online backup options, you may be wondering what the difference is between online backups over online storage. (And it is an important difference to understand, as it can affect which service you choose to fit your business needs.)

Put simply Online Storage is just like it says on the tin – storage for your files online! It acts like an additional hard drive, where you can store your files separately to your physical computer, and also share them with others. Some services sync files as your store or alter them. So, if you delete the file from the computer, the file is also deleted from the online storage. Other storage services will only have the version you uploaded in the first place.

Examples of storage services are DropBox, Google Drive, OneDrive (included with Office365 Business Plans), Sync.com and iDrive.

In contrast, an Online Backup takes a copy of your files and stores them online in a secure repository. This allows the service to keep copies of files for days… weeks… even years after they have been deleted from the computer.

Some more premium backup systems take things to the next level and take a snapshot of your hard-drive and replicate everything on it – allowing you to recover your entire computer or server. These services are concentrating more on securely protecting your data and giving you the chance to restore everything in the case of a theft or computer failure.

Examples are BackBlaze, Carbonite, CrashPlan and SOS Online Backup For Business.

So, which is right for you?

Well, there are lot of factors to consider on this one. Every business is unique, so you need to look at how your business operates to decide. Questions to take into consideration are:

  • What kind of files are you dealing with?

  • How many machines do you need to backup?

  • How much data do you need to backup?

  • How often is your data updated?

  • What is your budget?

  • Do you have an industry compliance to consider? (Financial, medical, country-specific etc)

If you are having difficulty deciding on which option is better for you and your business, our team can certainly help! Just give us a call on 778-771-0184 or email help@wildfrogsystems.com

Our Top Tips to Avoid Device Theft When Travelling | Fraser Valley Tech Consultants

Many of the people we work with spend a fair amount of time out of the traditional office setting and on the road. Since summer is now fully with us and, probably, the most popular season for travelling, we thought it was a good time to give a few reminders and tips on how to avoid your tech (or data) being stolen while you are on the road!

Image by Austin Distel on Unsplash

Image by Austin Distel on Unsplash

The temporary coffee shop office

This should be a no-brainer, but you would be shocked how many times we have been at a coffee shop and watched someone leave an untethered laptop or bag, while they disappear to the bathroom. You can be complacent and say “oh, it’s a quiet, local spot… we’re in a safe part of town”, but it takes seconds for an opportunist thief to swoop by. Not only are you vulnerable to theft, though, you are also vulnerable to prying eyes!

If you are working remotely at somewhere at a coffee shop, you should be taking the following precautions:

1.      Use a laptop tether to secure your device to the table.

2.      If you need the bathroom, and you are alone, take your bag with you!!!

3.      Be aware of who/what is behind you, especially if you have sensitive info on the screen. (Ideally locate yourself so only a solid wall is behind you.)

4.      Try to avoid using the “free WiFi”, but if you really must, only use websites that use HTTPS, make sure you are definitely on the coffee shop owner’s WiFi and use a VPN before logging into any accounts or view sensitive data. (A recent survey found 70% of hacks actually took place through unsecured public Wifi!)

Photo by   Oleg Magni   from   Pexels

Photo by Oleg Magni from Pexels

Security at your destination

No matter where you go in the world, there will always be plenty of light-fingered friends to relieve you of your prized tech. Beaches are a goldmine for pickpockets and petty thieves. Once again, it can only take a few seconds for someone to scoop your bag (and valuable tech devices) while you quickly cool off in the waves.

1.      The best defense is to simply not take your mobile devices to the beach!

2.      Make use of the hotel safes.

3.      If you must take your device, and want to swim, (and it’s not waterproof) look at purchasing a waterproof case so you can keep it with you.

4.      If you must take your device and want to take a nap on the beach, keep the device discretely tucked away and preferably anchored/hidden under your body!

5.      Be vigilant of unexpected distractions. Thieves can use these as a diversion, and when your gaze wanders, your stuff becomes theirs!

6.      Keep close to lifeguard towers. Of course, these guys are there for safety and not to watch your stuff… but thieves will avoid those areas because of the higher risk of getting caught.

The airport security scam

If a flight is on your travelling agenda, watch out for the dreaded X-ray scanner scam! Here is how it works…

At the airport security check, the first scammer will go through the line quickly & efficiently. A second scammer will wait until the people just behind them have loaded up their tech devices (cellphones, laptops etc) to the x-ray machine conveyor belt, and then proceed to hold these people up (something innocently-looking like struggling to get keys or change out of a pocket).  The first scammer then scoops up those devices as they emerge from the x-ray at the other end and walks away!

Be vigilant and only put your devices on the belt when it is your turn to go through, keeping an eye on them as they pass by! If you see someone taking an unhealthy interest in your devices, alert security personnel immediately.

Safe travels!

Top 6 Tips to Protect Your Business Technology & Data From Theft | Chilliwack & Abbotsford IT Consultants

thief-1562699_1920.jpg

We have talked a fair bit, before, about protecting your business against online threats – with all sorts of scammers constantly trying to steal passwords, identities, data or money. But what about the good old-fashioned real-world threats of theft? No matter how safe you think your location is, break-ins and property theft are also still a concern that you should take into consideration for your business.

Here are our top 6 tips to help you protect your data, and keep the impact to a minimum, if your business is broken into…

1. Anchor or tether equipment to immovable objects

25856676-9F12-44B6-BC4D-6D6B8A2A7ADD.JPEG

A laptop is stolen every 53 seconds (according to tech research firm, Gartner). Stats suggest that the vast majority of these are actually stolen from public places, but they are still a quick payday from an office-interloper too. Did you know there is a way that you can lock up your laptop to protect it from light-fingered visitors? Almost all laptops, for quite a while now, have a small opening on them where you can attach a locking cable. (Like this one , available at Staples) So, you can use this to lock your laptop to an immovable object! You can also do something similar with desktop units in the office.

2. Lock computer cases to prevent removal of hard disks.

For the smart thief, yanking out hard drives makes a quicker & lighter getaway. To thwart them, locking a computer case completely shuts them out – and adding that to a machine already tethered, your data is far safer!

3. Back-up data to online storage

Our favourite phrase does seem to be back-up, back-up, back-up… but we just can’t stress this one enough! Back-ups can save so much time and money in cases of data loss, whether it is from a theft or natural disaster. Using online server storage will also protect precious data in the event of a hardware theft, since that precious data was never on the machine to begin with!

4. Encrypt your hard disk

If you do have to keep important data or files on your PC/laptop, then encrypting your hard disk is a great way of keeping non-authorized eyes away from the goods! (Particularly if you are on the road a lot and not always able to tether your machine). If you are using Windows 7, 8 or 10, then this is actually a really easy thing to do yourself. You can see how, by checking out our quick tip video…

5. Keep servers & network storage devices locked away.

If you do use physical storage devices in your business, make sure they are kept in a locked room or cabinet. Key/combination holders should be kept to a minimum, with access given to only those people who really need it.

6. Install tracking software

If you are the kind of business that is on the move a lot, you may want to consider installing tracking software or services to your mobile devices. Sadly, the chances of retrieving a stolen device are slim, but this could give you a fighting chance… and many will, at least, give you the opportunity to wipe the data from the wandering device! Prey and LockItTight are 2 such services who can help you to track your devices and secure or delete data, or even see what the thief is up to.

If you are an Apple consumer, you have the Find My Mac or iPhone options in the iCloud settings, which also allow you to lock or wipe the devices. Make sure the setting is on.

If you are in Chilliwack, Abbotsford, Langley or the surrounding areas of the BC Fraser Valley, and would like more advice on how you can protect your business technology both online and in the real world, our team will be happy to help! Call us to book a consultation at 778-771-0184 or email help@wildfrogsystems.com.

What is Spear Phishing and How To Avoid It | Fraser Valley IT Consultants

anonymous-4165613_1920.jpg

You have probably already heard of phishing – after all, it is everywhere, these days - from the good old-fashioned Nigerian prince email all the way through to the CRA phone scam (also known as voice-phishing or vishing). The scammers cast a huge, wide, net as far as they can, and wait to see if anyone bites. However, there is another, more-complex level of phishing, that you may not have heard of, called Spear Phishing.

media-998990_1920.jpg

Spear phishing is different in that they target a specific person – usually someone in a large company with access to valuable data or finances. Before they are contacted, the scammer will take the time to do some research on their intended victim, mostly online through social media accounts etc.

Using the personal information that they have gathered, they will then contact this intended victim, making their email as personal and legit looking as they can. It may be as an application to a job that they know they are recruiting for, or a faked email from a friend claiming to have a link to a new menu from a favourite restaurant. Of course, this link or document will contain a malware-infected link or document.  Once clicked, the hacker either gains access to company data, or can plant a crypto-locker virus for ransoming.

silhouettes-81830_1920.jpg

Most spear phishing is aimed at mid-tier employees. However, there are a few brave spear-phishers who will sometimes target someone at the top of the company tree, like a CEO, CFO or senior manager. When this happens, it is called whaling.

So, how can you prevent this kind of phishing?

  • Education is a key one here. Making employees aware that this can happen will go a long way! Advise them to keep their social media content as private as possible (after all, that is as much for their own personal benefit as yours!).

  • Make sure all employees know what to look for in fake emails (such as poor spelling and grammar, or checking link addresses before clicking them by hovering the mouse pointer to see a pop-up box of the address. If you get a link claiming to be from a certain bank or company, open a browser window and go to the bank/company website directly and compare their actual address to the one you see on the email.

  • Limit data to the people who need it. If you keep data on shared drives, make sure sensitive data is housed on separate drives (eg a drive for Accounting only, a drive for customer lists only etc) and only give people access to the areas/drives they need to work.

  • Keep all software, anti-virus programs and firewalls up-to-date.

  • Back-up, back-up, back-up!! Back-up your data well and back-up often!!

If you are worried about your company’s potential vulnerabilities, give our team a call at 778-771-0184 or email info@wildfrogsystems.com, and talk to us about scheduling a Tech Health Check-Up.

Office 365 Tips - Translator Tool | Chilliwack Tech Support Specialists

language-2345801_1920.jpg

Thanks to the wonders of modern technology and the internet, the whole world is only a click away. No matter what language you speak, though, most of the planet speaks a different one! So, Microsoft added a translator tool to their main Office 365 Apps – Word, Excel & PowerPoint. (And it’s crazily easy to use!)

When in your document,

translate 1.png

1.  Go to the Review tab at the top.

2.  Select “Translate” from the top menu

3. Then select the option you need, depending on how much of the document you want to translate! It will automatically detect the language and do the translation.

translate 2.png

If you want more control over which languages you are translating from/to, select the bottom option on the Translate drop-down menu (Set Document Translation Language). Then, to the right, you will see an settings box appear, in which you can change the languages you are translating between. Once you have picked, click translate!

That’s it!

Of course, this is AI-powered, so it may not be perfect grammatically, or may struggle with colloquialisms. (We may never have a complete replacement for human interpreters, when you consider how language is affected by cultural differences and occasional breaks in grammar rules etc) However, it goes a long way to bringing the global market a little bit closer.

How to Switch Off Unwanted Background Apps in Windows | Fraser Valley Tech Support

If you’ve ever had to open your Task Manager to close a program, you’ll notice that there a lot more programs & processes running than the ones you may be using on the screen. There is nothing unusual or bad about background apps running in Windows 10. After all, many of them are making Windows work for you the way it does. However, to get the best performance out of your machine, there may be a few that you can actually turn off. (Please note… be very carefully when picking which to close!)

Here is how you do it…

1.      Click on the Start button (Windows icon in bottom left-hand corner)

2.      Click the Settings icon (the cog)

3.      Click Privacy to open up the settings window

background apps 1.png

4.      In left-hand list, find and click the Background apps option.

background apps 2.png

5.      Now you should see a list of applications running in the background of Windows 10!

background apps 3.png

Now, many of these you will want to keep on, depending on how you use your computer. E.G. If you use Skype, leave that on so people can call you! If not, turn it off.

On my PC, I was surprised to see some games running that I had no idea I even had on my computer – they had just been installed at the factory level and left there, or came as part of an update.

When you are done, you can just close the window. You may want to re-check it though, after any updates… just in case!

Improve Your Work-Flow by Using Virtual Desktops in Windows 10 | Chilliwack & Abbotsford Tech Support

Photo by   energepic.com   from   Pexels

Photo by energepic.com from Pexels

Have you ever had a time when you are working on a project, that required multiple apps/windows to be open on your desktop at once, when you needed to do something else completely different… but this is going to make your desktop even more cluttered and confusing? You really don’t want to shut down all the windows you have open, but you need a clean work-space.

This is where the virtual desktop function, on Windows 10, comes to the rescue. For Mac users, this is not something new, but now PC users can take advantage of having multiple desktops to work on as well… and it’s not hard to use either.

ctrl windows d keys.png

To start a new desktop, simply press the Windows, Ctrl + D keys, on your computer keyboard. (Control + Up on Macs) Voila! You now have a fresh, clean desktop to start your new project on!

To navigate back and forth between your desktops, simply press the Windows + Tab keys on your keyboard to open up your navigation options. (An alternative is Windows + Ctrl and then the left or right arrows to switch between screens).

You can also see a demo of how it works on our YouTube channel…