How to Protect Yourself Against Identity Theft

We regularly seek to inform you about the dangers of phishing and malware attacks, and how failure to protect against or respond quickly to them could be lethal to your companY.

Our friends over at Terravista Tech wrote an informative article sharing the story of the identity theft of a local business here in Chilliwack. The attackers stole the email addresses of the company, used them to send phishing emails to clients and other companies until Microsoft locked down all of their email for the entire company. Recovering from this attack was a hailstorm.

All the hackers needed to cause this damage was a password, and unfortunately many companies still have very basic password systems such as (company name)(year). Other hackers might only need one small piece of information, such as your birthday, your SIN (social security number), or your dog’s name to gain access to highly sensitive information. Sometimes, a person’s identity might be compromised for years before they notice, if the thief works slowly in order to be undetected. 

Here’s how to make sure this does not happen to you, or your company.

Boost your Security

Hire a professional IT company for your company. They will make sure your software is always up to date with security patches, and that your information security system is best as possible. They will make sure you have managed antivirus software. 

You can make sure to be on top of these things for your personal computer as well. Always install computer updates, use MFA (Multi Factor Authentication) on your accounts, and use legitimate antivirus software. On top of that, you can make sure to never turn off your firewall, and protect your wireless router with a strong password.

Don’t Overshare or Underestimate

It’s tempting to send important information over email or text, but it’s not worth the risks. We have all likely been guilty of sending personal information over apps such as Instagram, Snapchat, or Whatsapp as well! It's easy to think that just once will probably be safe enough, and so we overshare on these platforms, and underestimate the abilities of hackers.

Even on social media, many of us share regular updates of our families (revealing your mother’s maiden name, maid of honour's first name, or dog’s name), celebrations (birthdate, father’s birth year, our high school reunion), and more. This gives hackers the information they need to pass security checks even on the most important accounts such as your CRA login or your bank account, or your company Microsoft account. Oversharing reveals that you underestimate what hackers are capable of. We have seen local businesses shut down, or be forced to navigate hundreds of thousands to even millions of dollars in losses over hacks like this.

If you want to ensure your business is protected from identity theft, call a local IT support company for an assessment of your company’s security, and a consultation on how to potentially improve it.

We offer initial consultations free of charge, so feel free to contact us if you are a local company looking for support in this way!

The Dangers of a Power Outage

As many of you may have noticed and been affected by, there was a large power outage in East Abbotsford last Friday May 06 2022.

Our office was in the outage zone, as well as a few of our houses and favourite local businesses. This event was a good reminder to us to teach you about what to do with your tech in an unexpected outage like this in order to ensure no damage is done to your equipment, no data is lost, and your important equipment stays running long enough to complete important tasks.

To prepare for events such as outages, all critical equipment should be on uninterruptible power supplies, also known as a "UPS". A UPS should have enough battery life to allow you enough time to safely power down this equipment without damage or data loss.

How To Protect Your Equipment in an outage

Dangerous times for your equipment, even more-so that the original shutdown, are the moment the power comes back, and the small amounts of power during the outage.

When the power cuts out unexpectedly, whatever is open and unsaved on your machine can be corrupted and lost. A UPS is designed to give you buffer time to close everything correctly. What you may not know is that frequent power outages without a UPS increase the likelihood of data corruption and shorten the life of your electronics. Power flickering as well as the large surge when the power comes back on can do even more damage than the original outage.

Another good reason for a UPS is to protect against the damage caused by brownouts. Brownouts are those partial outages where the lights dim but don't go off. These may damage your equipment even more than a surge as they supply incorrect voltages and currents to your equipment which it may not be able to handle.

Finally, when the power comes back on, it is an unusual state for the power grid - all devices, buildings, lights, in a very large area all draw power at exactly the same time and the impact on your equipment can be severe. This can reduce your computer equipment’s life significantly, or damage it, or completely ruin it, signalled by a nasty burning smell. Many users have a surge bar that offers some protection, but this is rarely as good as the protection provided by a UPS, and most people don't know that surge protectors should be replaced after a few years or after a major surge event, as a malfunction is a common cause of fire.

Recommendations from wildfrog systems

In order to prevent damage and prolong the life of your computer investments, we highly recommend battery backups, and shutting down your equipment safely before those power supplies run out. Once the power is back on, wait a little longer to make sure it is stable before you turn your equipment on, and do it one device at a time. This will prevent damage and downtime, extend your tech’s life, and save you stress as well as money.

The Importance of Regular Rebooting: Optimizing Your Computer for Better Performance and Security

For most people, if they do not have a managed IT company performing all their regular checkups and maintenance activities, restarting their computer is something to do only when an application freezes. Restarting your computer often is a good idea for a variety of reasons; you shouldn’t wait for glitches to occur.

The Neglected Restart

For many computer users, especially those without managed IT support, restarting their computer is an action often reserved for addressing frozen applications. However, waiting for glitches to occur is not the best strategy when it comes to computer maintenance.

Why Is Rebooting Important?

Regularly restarting your computer is vital for several reasons:

  • Improved Speed: If your computer is performing slower than usual, frequent restarts can help refresh its memory and clear accumulated cache, leading to improved speed.

  • Error Resolution: Frequent restarts can address application errors and prevent issues from escalating.

  • Connection Troubleshooting: If your computer struggles to connect to Wi-Fi, a simple restart may resolve the problem.

  • Overheating Prevention: A computer that feels warm to the touch may benefit from a restart, which helps manage temperature and prevent overheating.

  • Software Updates: Many software updates require a full system reboot to take effect. Delaying restarts could mean your computer isn't benefiting from the latest security and functionality enhancements.

How to Prevent Glitches

If you're in Abbotsford, BC, and rely on IT services and tech support for your computer needs, here's a simple practice you can adopt. WildFrog’s owner, Jeff, suggests restarting your computer every day after work (for business computers) or before going to bed (for personal computers). By doing so, you ensure that your computer begins each day in a secure, refreshed state.

If you prefer a more automated approach, consider managed IT services. They offer subscription-based support that includes regular maintenance tasks like daily reboots. Managed IT services also ensure your data is secure and up to date, even when you're not actively monitoring it.

Testimony from the Field

Our tech expert, Alan, shares a story about a client who neglected regular computer updates: "A user couldn't find any Wi-Fi networks in their available list. I connected, rebooted the computer, and voila! Wi-Fi appeared. Sometimes, hardware and software don't cooperate, and a reboot sets them both back to a 'default' starting point. In this case, it was a Wi-Fi driver that needed updating and got stuck."

The Role of Managed IT

Regular reboots can solve common glitches, but prolonged periods without a restart can lead to more severe issues. That's where managed IT services come into play. For businesses with multiple computers or individuals who can't perform daily checks themselves, managed IT services are highly recommended.

Leaving your computer running until issues arise can result in far more significant problems than just a Wi-Fi connection hiccup. The cost of regular maintenance from a local managed IT company is relatively low, and it can prevent serious issues. If you have a business with multiple computers and need to ensure consistent maintenance, managed IT is your solution.

Are you interested in managed IT for your business in Abbotsford, BC? Contact us for a free consultation and learn how we can optimize your computer's performance and security. Don't wait for glitches; invest in proactive IT services to keep your systems running smoothly.

Enhancing Security with Yubikey: For Businesses in Abbotsford, BC

What is Yubikey?

The Yubikey founded in Sweden with a mission to fortify the digital lives of internet users, is a game-changing security solution. Think of it as a digital "key" that, once plugged into your device, grants access to your emails, apps, other devices, and even physical spaces if you've integrated compatible apps.

The key features of Yubikey include:

  • Enhanced Security: Yubikey is a powerful guardian of your data. It comes equipped with a fingerprint scanner, ensuring that even if your Yubikey falls into the wrong hands, your data remains safeguarded. Only you, with your Yubikey and your fingerprint, can access your information.

  • Convenience: Yubikey is remarkably compact and doesn't require a battery, making it incredibly convenient for daily use.

  • Reduced IT Costs: Yubikey has been proven to reduce support incidents by a staggering 92%, as stated on their website. This reduction in support requirements can lead to significant savings for your IT budget.

Does Your Business Need It?

As a small IT company based in Abbotsford, we offer this friendly advice: the best time to secure your data is now, not later. In the digital age, a security breach during the early stages of a business can have devastating consequences, potentially tarnishing your reputation and threatening your business's future. Even well-established companies in the Fraser Valley, with vast amounts of data to protect, can benefit from the security Yubikey offers.

Yubikey caters to a variety of client needs with six different models, ensuring there's a suitable option for your business. These keys are designed to withstand tampering and crushing, making them exceptionally durable, even for those working in challenging conditions. For individual users, Yubikey prices typically range from $55 to $90 USD, while for server-level security, prices may be higher, ranging from $650 to $950 USD (visit our online store for more details).

Setting up Yubikey is straightforward, and there are numerous tutorials available on platforms like YouTube. However, if you encounter any difficulties, our IT services and tech support are just a call away, ready to assist you in implementing this robust security solution.

Don't leave your business's security to chance.

Call us at 604-210-9811 to explore which Yubikey model is the right fit for your business. For more tech-related articles and insights, visit our blog to discover how you can fortify your business's digital defence.

Celebrating Pioneering Women in Tech

In the dynamic world of technology, it's essential to recognize the trailblazers who have shaped the tech landscape throughout history. While today's tech industry may seem male-dominated, the early years of computer development reveal a different story. During this time, women played a pivotal role in computations and programming, a fact often overlooked in many tech history accounts.

In honor of International Women's Day, let's take a moment to celebrate some remarkable women who left an indelible mark on the history of tech. These influential figures have paved the way for future generations in Abbotsford, BC, and beyond.

1. Ada Lovelace (1815-1852) - The First Computer Programmer

Ada Lovelace, a mathematician and writer, is often hailed as the world's first computer programmer. Collaborating with mathematician Charles Babbage, she recognized the potential of Babbage's Analytical Engine, going beyond mere calculations. Ada Lovelace's notes and published algorithm laid the foundation for future inventors and inspired generations, including the renowned Alan Turing.

2. Rear Admiral Grace Hopper (1906-1992) - Pioneer of Programming

Grace Hopper, a computer scientist, recommended and developed a new programming language that used English words instead of numbers. Her innovative work led to the creation of COBOL (COmmon Business-Oriented Language), a computer language still in use today. Grace Hopper's legacy also includes coining the term "computer bug" after discovering a moth in one of her machines.

3. Hedy Lamarr (1914-2000) - The Mother of Modern WiFi

Hedy Lamarr, a famous movie star of the 1940s, had a lesser-known but equally groundbreaking role as the inventor of frequency-hopping technology. She designed a "secret communication system" during the war to minimize radio signal jamming, a technology that is now integral to satellite and cellphone communications.

4. The ENIAC Programmers - Pioneers of Electric Computing

The ENIAC (Electronic Numerical Integrator and Computer) was the world's first fully electric programmable computer. Six women, Kay McNulty, Betty Jennings, Betty Snyder, Marlyn Wescoff, Fran Bilas, and Ruth Lichterman, programmed the ENIAC from scratch. Their work was essential, as they wrote the book on programming for a machine that took just 30 seconds to calculate a trajectory compared to the 20 hours it would take a human.

5. Katherine Johnson (1918-2020) - NASA's Mathematical Genius

Katherine Johnson, known for her role in the movie "Hidden Figures," was instrumental in NASA's early spaceflight missions. She calculated John Glenn's flight path, helping ensure the success of the first American spaceflight. Katherine's expertise extended to the moon landing, making her a pivotal figure in NASA's history.

6. Radia Perlman - The "Mother of the Internet"

Radia Perlman is recognized as the "mother of the internet." In the 1980s, she created the Spanning Tree Protocol (STP), a crucial algorithm that played a significant role in the development of the internet. Her work has influenced how networks organize and transfer data, and she continues to make contributions to the tech world through her work as a programmer, engineer, and author.

These are just a few of the exceptional women who have left an indelible mark on the tech industry. While there is still a gender gap in the tech world, the presence of women like Susan Wojcicki, Reshma Saujani, Ellen K. Pao, and Dr. Fei-Fei Li demonstrates that the future for women in tech is promising. These inspiring figures are making waves and inspiring future generations to pursue careers in technology.

At our small IT company in Abbotsford, BC, we're proud to celebrate the achievements of these pioneering women and support the ongoing efforts to bridge the gender gap in the tech industry. We might be too busy providing local businesses with IT services and tech support to write a comprehensive history book, but we're committed to fostering a diverse and inclusive tech community.

Join us in recognizing and celebrating the influential women in tech history and the promising future they continue to shape!

Your Data is More At Risk During The Holiday Season in The Fraser Valley

Holidays are a time of joy and celebration for most, but for hackers and cybercriminals, they present a unique opportunity. As a small IT company in Abbotsford, BC, dedicated to providing IT services and tech support, we want to shed light on why your data is at greater risk during the holiday season.

Unmasking the Cyber Grinch

Hackers and cybercriminals view holidays with a different lens, and it's not because they enjoy festivities. Instead, they see holidays as a potentially easier payday. US authorities, including the FBI and CISA (Cybersecurity & Infrastructure Agency), have issued warnings regarding a concerning trend. They've observed a connection between the holiday season and a surge in serious cyberattack attempts.

In 2021, serious attacks coincided with holidays such as Mother's Day, Memorial Day, and Independence Day. While the timing seemed to revolve around US holidays, these attacks occurred in multiple countries. The reason is quite straightforward: people are often distracted during holidays. Their thoughts are elsewhere, and many offices are either empty or operating with skeleton crews. Companies may let down their guard, inadvertently becoming more vulnerable to cyberattacks.

'Tis the Season for Cyber Threats

As we enter the holiday season, cyber threats become even more prominent. The Cyber Grinch is expected to make an appearance, targeting businesses worldwide. Beyond the digital realm, there is also a surge in "traditional" theft, including burglaries, theft, and vehicle break-ins during this festive period.

So, what proactive steps can you take to protect your business data during this holiday season? Here are some key suggestions:

  1. Disaster Response Plan: Ensure your organization has a robust disaster response plan in place, and make sure everyone within the company is familiar with it.

  2. Staff Training: Train your staff to be extra vigilant when it comes to opening potentially dangerous links or attachments.

  3. Software Updates: Regularly update and patch all software and operating systems to address vulnerabilities.

  4. Anti-Virus Software: Implement reliable anti-virus software and perform regular scans to detect and remove potential threats.

  5. Password Security: Enforce the use of strong passwords and multi-factor authentication to enhance login security.

  6. Device Security: Avoid leaving devices unattended in vehicles, as smartphones and electronics are highly sought-after targets for theft. If necessary, never leave valuables in plain view within your vehicle.

  7. Offline Data Backups: Creating offline backups of your data is a smart practice that every company should adopt. It's not only the most cost-effective way to recover from a ransomware attack but also offers peace of mind.

If you're a business in the BC Fraser Valley seeking comprehensive cybersecurity solutions, we're here to help. Contact us to fortify your defenses and ensure your data remains secure during the holiday season and beyond.

Protecting Your Business in Abbotsford from Password Spraying Attacks

Hackers thrive on exploiting bad user habits. It simplifies their job and opens the door to a rising threat known as Password Spraying. As a small IT company in Abbotsford, BC, specializing in IT services and tech support, we aim to shed light on this cybersecurity issue and how you can safeguard your business.

Unmasking Password Spraying

Password Spraying is a form of brute-force attack employed by cybercriminals. In traditional brute-force attacks, hackers attempt to gain access to a specific account by trying numerous passwords. Some even go a step further by conducting research, scouring users' social media profiles for personal information like family names or pet names—common choices for passwords. It's astonishing how much can be gleaned from a brief online search.

To counter these attacks, many organizations now implement security measures such as locking an account after a certain number of failed login attempts (typically 3 to 5).

However, hackers have adapted. Password spray attacks involve two primary tactics.

Type 1: "Low and Slow"

In this approach, cybercriminals start by compiling a list of usernames to target, which is often straightforward due to the structured email formats used by organizations (e.g., firstinitial.lastname@companyname.com). With a list of employee names, they have a pool of potential login usernames.

Next, they "spray" these usernames with a single common password, like "password" or "123456." Occasionally, they get more cunning by incorporating local references, such as "canucks," for a Vancouver-based company. They continue this process until they find a match.

Hackers particularly favor companies or systems with central administrators or apps that set default passwords for new users. Some users may forget to change their passwords during their first login, creating opportunities for cybercriminals.

Type 2: "Availability and Reuse"

The second type of spray attack relies on compromised login credentials obtained from the dark web. Attackers exploit the widespread habit of using the same passwords across multiple sites.

Protecting Your Business

To avoid falling victim to Password Spraying attacks, consider these protective measures:

  1. Two or Multi-Factor Authentication (2FA or MFA): Implement 2FA or MFA to ensure that passwords are just one part of the login process, adding an extra layer of security.

  2. Strong Password Training: Train and enforce the use of robust, unique passwords among your employees to deter password spraying attempts.

  3. Avoid Default Passwords: Do not use default passwords for first-time users or force password changes during the initial login. Encourage users to create their own unique passwords.

  4. Password Reset Procedures: Ensure that your system administrators have clear procedures in place for users who have been locked out and need password resets.

If you are a business owner in Chilliwack, Abbotsford, Langley, or the surrounding area and require assistance in fortifying your systems against cyber threats, please don't hesitate to get in touch. We are here to help you enhance your cybersecurity defenses.