SOBX Tech

  • Home
  • About Us
  • Our Services
    • Remote Support
  • Our Blog
    • Free Resources
  • Contact Us
  • GTG Gaming

February 22, 2022 By Nate Forant

Understanding Internet Security

Featured Blog Post showing code on a computer screen

Understanding Internet Security can be easy for some and hard for others. Internet security is a branch of computer security that encompasses Internet browser security, website security, and network security as it applies to other applications or operating systems as a whole.

When it comes to understanding internet security, it doesn’t matter what it is, websites, personal computers, or online accounts can all be vulnerable if your internet security isn’t secure. Even some of the largest companies in the world fall to hackers. So what can we do?

What is Computer Hacking

It doesn’t matter if you have a small business, corporation, or home network. If they aren’t secured, there is a chance it could be compromised by hackers.

When people think of computer hacking, they normally think of illicit computer experts breaking into government networks. Hacking is such a broad term and can describe a number of different methods of unauthorized computer use.

For example:

  • Account hacking

– Most common and simplest form of hacking is gaining access to somebody else’s online accounts.

  • Network attacks– Attack the entire computer network normally done by protestors, organized hacking groups, and criminal gangs.
  • Personal computer hacking– Hackers gain access to personal computers to steal data or use them as part of a botnet.

 

Internet Security. This picture is showing computer code that represents the internet.

We will talk about different kinds of threats and how to combat the threats such as phishing, malware, spyware and the list can go on. So, stay tuned for more internet security posts.  We will also get more in-depth about hacking, email scams, what to do and what not to do.

Change your passwords for all of the online accounts such as banks, social media profiles, etc.

Internet Crime Complaint Center

The mission of the Internet Crime Complaint Center, also known as IC3, is to provide the public with a reliable and convenient reporting mechanism to submit information to the Federal Bureau of Investigation (FBI) concerning suspected Internet-facilitated criminal activity and to develop alliances with law enforcement and industry partners.

You can contact us directly through our website with the contact form or find us on social platforms @sobxtech.

Filed Under: Tech Tagged With: Internet Security

March 5, 2020 By Nate Forant

Top 10 Internet Safety Rules You Need to Know

online safety

Here are the Top 10 Internet safety rules you need to know to avoid getting into trouble online (and off).

  1. Keep Personal Information Professional and Limited

Potential employers or customers don’t need to know your personal relationship status or your home address. They do need to know about your expertise and professional background, and how to get in touch with you. You wouldn’t hand purely personal information out to strangers individually—don’t hand it out to millions of people online.

  1. Keep Your Privacy Settings On

Marketers love to know all about you, and so do hackers. Both can learn a lot from your browsing and social media usage. But you can take charge of your information. As noted by Lifehacker, both web browsers and mobile operating systems have settings available to protect your privacy online. Major websites like Facebook also have privacy-enhancing settings available. These settings are sometimes (deliberately) hard to find because companies want your personal information for its marketing value. Make sure you have enabled these privacy safeguards, and keep them enabled.

  1. Practice Safe Browsing

You wouldn’t choose to walk through a dangerous neighborhood—don’t visit dangerous neighborhoods online. Cybercriminals use lurid content as bait. They know people are sometimes tempted by dubious content and may let their guard down when searching for it. The Internet’s demimonde is filled with hard-to-see pitfalls, where one careless click could expose personal data or infect your device with malware. By resisting the urge, you don’t even give the hackers a chance.

  1. Make Sure Your Internet Connection is Secure. Use a Secure VPN Connection

When you go online in a public place, for example by using a public Wi-Fi connection, PCMag notes you have no direct control over its security. Corporate cybersecurity experts worry about “endpoints”—the places where a private network connects to the outside world. Your vulnerable endpoint is your local Internet connection. Make sure your device is secure, and when in doubt, wait for a better time (i.e., until you’re able to connect to a secure Wi-Fi network) before providing information such as your bank account number.

To further improve your Internet browsing safety, use a secure VPN connection (a virtual private network). VPN enables you to have a secure connection between your device and an Internet server that no one can monitor or access the data that you’re exchanging. Read more about What is VPN

  1. Be Careful What You Download

A top goal of cybercriminals is to trick you into downloading malware—programs or apps that carry malware or try to steal information. This malware can be disguised as an app: anything from a popular game to something that checks traffic or the weather. As PCWorld advises, don’t download apps that look suspicious or come from a site you don’t trust.

  1. Choose Strong Passwords

Passwords are one of the biggest weak spots in the whole Internet security structure, but there’s currently no way around them. And the problem with passwords is that people tend to choose easy ones to remember (such as “password” and “123456”), which are also easy for cyber thieves to guess. Select strong passwords that are harder for cybercriminals to demystify. Password manager software can help you to manage multiple passwords so that you don’t forget them. A strong password is one that is unique and complex—at least 15 characters long, mixing letters, numbers, and special characters.

  1. Make Online Purchases From Secure Sites

Any time you make a purchase online, you need to provide credit card or bank account information—just what cybercriminals are most eager to get their hands on. Only supply this information to sites that provide secure, encrypted connections. As Boston University notes, you can identify secure sites by looking for an address that starts with https: (the S stands for secure) rather than simply Http: They may also be marked by a padlock icon next to the address bar.

  1. Be Careful What You Post

The Internet does not have a delete key, as that young candidate in New Hampshire found out. Any comment or image you post online may stay online forever because removing the original (say, from Twitter) does not remove any copies that other people made. There is no way for you to “take back” a remark you wish you hadn’t made, or get rid of that embarrassing selfie you took at a party. Don’t put anything online that you wouldn’t want your mom or a prospective employer to see.

  1. Be Careful Who You Meet Online

People you meet online are not always who they claim to be. Indeed, they may not even be real. As InfoWorld reports, fake social media profiles are a popular way for hackers to cozy up to unwary Web users and pick their cyber pockets. Be as cautious and sensible in your online social life as you are in your in-person social life.

  1. Keep Your Antivirus Program Up To Date

Internet security software cannot protect against every threat, but it will detect and remove most malware—though you should make sure it’s to date. Be sure to stay current with your operating system’s updates and updates to the applications you use. They provide a vital layer of security.

Filed Under: Tech Tagged With: Security, Tech Tips

October 28, 2019 By Nate Forant

National Cybersecurity Awareness Month – Phishing

Phishing attacks use email or malicious websites to infect your machine with malware and viruses in order to collect personal and financial information. Cybercriminals attempt to lure users to click on a link or open an attachment that infects their computers, creating vulnerability to attacks. Phishing emails may appear to come from a real financial institution, e-commerce site, government agency, or any other service, business, or individual. The email may also request personal information such as account numbers, passwords, or Social Security numbers. When users respond with the information or click on a link, attackers use it to access users’ accounts.

You can read more here.

Filed Under: Tech Tagged With: Security, Tech Tips

October 22, 2019 By Nate Forant

National Cybersecurity Awareness Month – Social Media Cybersecurity

Now more than ever, consumers spend increasing amounts of time on the Internet. With every social media account you sign up for, every picture you post, and status you update, you are sharing information about yourself with the world. How can you be proactive to stay safe online and, “Own IT. Secure IT. Protect IT.”? #BeCyberSmart and take these simple steps to connect with confidence and safely navigate the social media world.

You can learn more at https://bit.ly/2LLRe7R

 

Filed Under: Tech Tagged With: Security, Tech Tips

October 17, 2019 By Nate Forant

Online Privacy: What You Need To Know

privacy online

Online Privacy: What You Need To Know

The Internet touches almost all aspects of our daily lives. We are able to shop, bank, connect with family and friends, and handle our medical records all online. With all of that, there are people out there that will try to steal your information. In our ongoing commitment to educating people about online safety, security, privacy, etc.  we’re sharing helpful blog posts all month in honor of National Cybersecurity Month

#BeCyberSmart when sharing personal information online to reduce the risk of becoming a cybercrime victim.

Did You Know?

  1. 64% of U.S. adults have noticed or been notified of a major data breach affecting their sensitive accounts or personal data.
  2. Roughly half of Americans (49%) feel that their personal information is less secure than it was five years ago.
  3. 58% of Americans age 50 and older are more likely to feel that their personal information has become less safe in recent years: 58% of Americans in this age group express this opinion.
  4. 69% of consumers believe companies are vulnerable to hacks and cyberattacks.

There is so much information online about this topic. To help you get right to the information you need. I highly recommend this Online Privacy information sheet that you can download or print out.

Do you need help protecting yourself online? Need to update the security on your computer? Contact us. We’d love to help!

Filed Under: Tech Tagged With: Security, Tech Tips

October 5, 2019 By Nate Forant

National Cybersecurity Month

Held every October, National Cybersecurity Awareness Month (NCSAM) is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity and to ensure that all Americans have the resources they need to be safer and more secure online.

We are big believers in keeping our data protected and secured.

There are lots of great tips and information out there that we will be sharing all month long.  Stay tuned and we will be back with more information this week.

Feel free to read and download this information about Cybersecurity while traveling.

Filed Under: Tech Tagged With: Security

March 18, 2016 By Nate Forant

Laptop Comparison For The Consumer

Are you looking for the perfect laptop? Have you been looking for a comparison chart?  The market has gone through some major changes in the past few years.  The models today encompass everything from featherweight, business-savvy ultra-portables that barely weigh 2 lbs, to the behemoth gaming option that could weigh 10 pounds or more.

When people ask us which laptop is best for their needs, the first thing we tell them is that there is no clear answer. There are too many different types of laptops, and different price categories to suit them. However, we do give people a checklist that they should consider before splurging on a new device.

1. Size: If portability is your main concern, then you need to consider a notebook that has a small-ish screen and a light weight. Any laptop marketed as a Ultrabook should fit your bill here, designed to be slim and light. More to the point, though, look for a laptop with a screen that’s 12.5-13.3 inches in size, and a weight that is from 1-1.5kg.

2. Screen quality: You’ll be staring at your laptop for many hours every day, so you want to make sure you get a screen that is comfortable to look at. Many laptops these days also have touchscreens, which means they are glossy. Glossy screens lead to reflections, so consider a laptop that doesn’t have a touchscreen.

Next, look at the resolution. A 1920×1080-pixel resolution (aka Full HD) if you want plenty of space to line up windows and keep things in view. Finally, the viewing angles are extremely important. A laptop screen that touts IPS (in-plane switching) technology offers the widest viewing angles and the best user comfort.

3. Keyboard quality: For long typing sessions, you must get a laptop that has a comfortable keyboard. You don’t want to get a keyboard that packs in every key under the sun (think keyboards that have squished in number pads) because that can translate to a poor overall user experience when hunting for keys like the arrows.

You want a keyboard that has a comfortable layout with full-sized keys and some space around the arrow keys. The keys should have adequate travel on the downstroke and snappy responsiveness when you let them go. Make sure the keyboard is also backlit, so that you can type with an easier view on the keys in dimly lit environments.

As with the screen, it helps to try before you buy, especially if your main task will be typing.

4. CPU: It’s hard to go past any of Intel’s Core-based CPUs when buying a new laptop. Think Core i3, Core i5, and Core i7. These CPUs offer the best performance when it comes to multitasking and multimedia tasks. Core i3-based notebooks are generally found in entry-level systems, while Core i5 makes up the majority of mainstream computers.

Core i7-based systems are for those of you who want the best performance from your laptop. However, note that with a Core i7-based system, heat coming through the base of the laptop can be cause for concern, especially if you plan to actually use the laptop on your lap a lot of the time.

5. RAM: You need 4GB of RAM or more to get the best out of your system. More RAM allows for more applications to run at the same time, and for more data to quickly accessible by the system at any one time, which comes in handy for tasks such as editing photos.

6. Storage: Hard drives used were all the rage, but these days they are mostly out of favour, especially for thin and light laptops. This is because they were slow, somewhat bulky, and produce noticeable heat and noise. A solid state drive (SSD), on the other hand, offers a lot more speed than a hard drive, runs silently, and is installed in a form factor that doesn’t add too much to the weight and bulk of a laptop.

The only problem is that SSDs don’t offer as much capacity. You’ll be stuck with a drive that’s either 128GB or 256GB in size, and even then, laptops with 256GB SSDs are pretty expensive. Stick to a 128GB SSD for your new laptop, and you’ll love the speed with which it can load programs, access your data, and how quickly it can boot up your system (it takes under 7 seconds for some Windows 8 systems).

7. Battery life: Manufacturer-quoted battery life is often not indicative of what a laptop can do, and is based on the many variables that affect battery life. These are the screen brightness, the screen resolution, and the tasks that you run. If you run programs that need lots of processing, or if you stream lots of online video, or if you transfer lots of files over your wireless network, then your battery will drain a lot sooner than what the vendor has quoted.

Look at the rating of the battery in Watt-hours (Wh) or milliamp-hours (mAh). The larger these figures are, the longer the battery can last. For a 13.3in Ultrabook, for example, a battery with a rating from 44Wh to 50Wh will give you the best results.

8. Wireless networking and Bluetooth: This is something that is often overlooked when buying a laptop, but considering that most laptops rely on an Internet connection for the majority of their tasks, it’s an extremely important feature. At the very least, you need a laptop that has a dual-band Wi-Fi adapter. This will allow you to use the laptop with a dual-band router’s 5GHz network, allowing it to work quicker and perhaps segregating it from other devices on your network that use the 2.4GHz network.

For those of you who want the fastest networking, get a laptop with an 802.11ac wireless adapter (some laptops come with an Intel Wireless-AC 7260), which can work with the latest range of 802.11ac routers that have hit the market recently. Using 802.11ac, your file transfer rates will be able to hit speeds over 30 megabytes per second (MBps), and in some cases even approach 40MBs. This is beneficial when you want to transfer video files to your laptop before going on a trip, for example.

Also look for Bluetooth 4.0. Bluetooth isn’t only handy for connecting to wireless mice and keyboards, it’s also awesome for connecting to a Hi-Fi system wirelessly. We use Bluetooth all the time to play music through a stereo system from our laptop. This is music that’s either stored locally or streamed from Google Play Music or online radio stations while we work.

9. Full-sized SD card: Why would you want a full-sized SD card? Well, if you’re a photographer and you quickly want to get photos off the camera and to your laptop, the SD card slot is the best way to do so. Many modern cameras come with Wi-Fi to facilitate transfers from the camera, but that’s still a fiddly process. Some SD card slots are better than others, too. Look for one in which the card can sit all the way in, rather than a slot that makes the card stick halfway out.

10. USB 3.0: You shouldn’t get a laptop without a USB 3.0 port, and you should look for a laptop that has at least a couple of these ports. This is for obvious reasons such as plugging in an external hard drive to back up your laptop’s data, or for when you want to connect a conventional mouse or a fancy keyboard.

Of course, always want to make sure that you meet your budget.

Laptop Comparison Chart

Best Laptops of 2016

Best Laptops of 2016 options

This is a great comparison to what is out there. Depending on what you need and want. There are a lot of factors that go into choosing the right laptop.

If you need help or just have a question, just give us a call at 252-285-9592.

Filed Under: Tech Tagged With: Apple, Microsoft

March 11, 2016 By Nate Forant

Tech News – KeRanger Ransomware Hits OS X

SOBX Tech News

The big news this week for techies and Mac users? KeRanger Ransomware hits OS X. If you own a Mac, we recommend that you back up your system to a flash drive or external hard drive. You can read all the details on these stories and more below.

Every day we scour the Internet for the best stories in tech. As a technology company, we try to keep up to date on everything that is going on.  Quite often we share this tech news on our Facebook page or via our Twitter account. We thought it might be a great idea, for those of you who may have missed those social shares, to read them on our site. So, without further ado, here are 10 stories we thought were tops for the week.

KeRanger Ransomware Hits OS X

1. ‘KeRanger’ Ransomware Hits OS X

2. Microsoft Teams With Rhode Island To Bring Computer Science To Every High School In The State

3. Dell: Cloud, Mobility and Malware Keep Execs Up at Night

4. Toyota Introduces Wearable Device For The Blind

5. Home Depot Sets Aside Millions to Pay for 2014 Breach

6. Facebook Fixes Major ‘Brute Force’ Bug

7. ISIS Data Breach Leaks Recruits’ Details

8. Apple Sets Next Product Unveiling For March 21 — A Day Before Big Court Hearing

9. Cyber Crooks Steal $80 Million from Bangladesh Bank

10. Online Users Are Not Protecting Their Own Security

If you have additional links, sources or ideas that might be helpful to our community, we encourage you to add them in the comments below. If you’ve enjoyed this article, please subscribe on our sidebar.

Filed Under: Tech Tagged With: Tech News

February 12, 2016 By Nate Forant

Tech News – Obama Debuts Cybersecurity Action Plan

SOBX Tech News

There is a lot of big news this week for techies. Obama debuts cybersecurity action plan.  This is not a cheap cybersecurity plan.

Part of the plan is a much-needed software patching and updating audit, and more training and recruiting for cybersecurity specialists.

None of this will be cheap, of course—the White House will look for Congress to approve a 35% increase in the cybersecurity budget to secure $19 billion in funding for implementation starting next year. $3 billion of that will be for the IT modernization effort.

You can read all the details on these stories and more below.

Every day we scour the Internet for the best stories in tech. As a technology company, we try to keep up to date on everything that is going on.  Quite often we share this tech news on our Facebook page or via our Twitter account. We thought it might be a great idea, for those of you who may have missed those social shares, to read them on our site. So, without further ado, here are 10 stories we thought were tops for the week.

Obama Debuts Cybersecurity Action Plan

1. TMZ Users Hit with Malvertising Blitz

2. Tech Would Be Better If More Women Designed It

3. Adwind Malware-as-a-Service Platform Hit 400,000 Victims Globally

4. DoJ and DHS Employee Details Exposed in Latest Hack

5. Teen’s Moving Video Makes You Really Think About Cyberbullying

6. Amazon Plans To Compete With Fedex, UPS and Alibaba

7. Obama Debuts $19Bn Cybersecurity National Action Plan

8. Twitter Is Losing Customers And Its Stock Is Plummeting

9. IRS Hack Affects 101,000 Tax Returns

10. Leaky Mobile Apps Expose Personal Info for Millions

If you have additional links, sources or ideas that might be helpful to our community, we encourage you to add them in the comments below. If you’ve enjoyed this article, please subscribe on our sidebar.

Filed Under: Tech Tagged With: Tech News

February 5, 2016 By Nate Forant

Tech News – Two Smart-Toy Flaws Give Attackers a Direct Line to Kids’ Personal Info

SOBX Tech News

The big news this week for parents and techies? Smart-toy flaws give attackers a direct line to kids’ personal information. If you’ve got kids, take extra precaution with what smart toys you buy for them. We want everyone to be safe. You can read all the details on these stories and more below.

Every day we scour the Internet for the best stories in tech. As a technology company, we try to keep up to date on everything that is going on.  Quite often we share this tech news on our Facebook page or via our Twitter account. We thought it might be a great idea, for those of you who may have missed those social shares, to read them on our site. So, without further ado, here are 10 stories we thought were tops for the week.

Two Smart-Toy Flaws Give Attackers a Direct Line to Kids’Personal Info

1. Two Smart-Toy Flaws Give Attackers a Direct Line to Kids’ Personal Info

2. 10 Women in Tech to Watch in 2016

3. The U.S. Just Struck A Crucial Deal With Europe On Data Privacy

4. Viruses, Worms, Android All See Huge Spikes Last Quarter

5. Huge Demand For $50 Fire Tablet Vaults Amazon to 3rd, Behind Apple and Samsung — But It Won’t Last

6. Google Parent Company Alphabet Now Valued Higher Than Apple After Beating Q4 Earnings Expectations

7. ‘SNAP’ Puts Millions of LG Smartphones at Risk of Hijacking

8. Malwarebytes Gets ‘Project Zeroed’ as Flaws Go Public

9. Google Switches on Alerts for Malicious Embedded Content

10. WordPress Targeted with Mass Ransomware Campaign

If you have additional links, sources or ideas that might be helpful to our community, we encourage you to add them in the comments below. If you’ve enjoyed this article, please subscribe on our sidebar.

Filed Under: Tech Tagged With: Tech News

  • 1
  • 2
  • 3
  • …
  • 5
  • Next Page »

Articles By Topic

  • Events
  • Gaming
  • How To
  • Lifestyle
  • News
  • Reviews
  • Tech

Articles By Sub-Topic

Apple Blogger Outreach Events COVID-19 Crystal Coast Geek Breakfast Data Internet Security Microsoft PC Resources Security Services Social Media Workshops Tech News Tech Tips

Read Past Articles

Get Tech Tips, Discounts & More

Subscribe to receive email updates with our latest news, deals, and information.

Copyright © 2023 SOBX Tech · Web Design & Maintenance by SOBXTech