SOBX Tech

  • Home
  • About Us
  • Our Services
    • Remote Support
  • Our Blog
    • Free Resources
  • Contact Us
  • GTG Gaming

April 3, 2020 By Nate Forant

Beware of Zoom-Bombing

zoomraiding, zoombombing, zoom call security

Zoom-bombing. It’s real. Here’s what you need to know to prevent Zoom-bombing and keep yourself and your fellow Zoom attendees safe.

What is Zoom–bombing

If you’re not familiar with Zoom, they’re one of the leaders in modern video communications, with an easy, reliable cloud platform for video and audio conferencing, chat, and webinars.

Zoom-bombing is the term for when individuals “gate-crash” Zoom meetings. These uninvited guests share their screens to bombard real attendees with disturbing or distracting content.

With just about everyone using Zoom since COVID-19 changed our day-to-day routines, you need to know how to protect yourself from uninvited guests showing up in the middle of your Zoom calls.

Cybersecurity expert and author, @Scott Schober, was interviewed by @ShirleyChan from PIX11 News. Below is the video from the interview. This is an excellent interview and in these times that we are going through, it is very much needed.

Do you have questions and need assistance with your Zoom settings? Comment below, contact us, or reach out to us on social media. We are on Facebook, Twitter, Instagram.

 

Filed Under: News Tagged With: Security

March 5, 2020 By Nate Forant

Top 10 Internet Safety Rules You Need to Know

online safety

Here are the Top 10 Internet safety rules you need to know to avoid getting into trouble online (and off).

  1. Keep Personal Information Professional and Limited

Potential employers or customers don’t need to know your personal relationship status or your home address. They do need to know about your expertise and professional background, and how to get in touch with you. You wouldn’t hand purely personal information out to strangers individually—don’t hand it out to millions of people online.

  1. Keep Your Privacy Settings On

Marketers love to know all about you, and so do hackers. Both can learn a lot from your browsing and social media usage. But you can take charge of your information. As noted by Lifehacker, both web browsers and mobile operating systems have settings available to protect your privacy online. Major websites like Facebook also have privacy-enhancing settings available. These settings are sometimes (deliberately) hard to find because companies want your personal information for its marketing value. Make sure you have enabled these privacy safeguards, and keep them enabled.

  1. Practice Safe Browsing

You wouldn’t choose to walk through a dangerous neighborhood—don’t visit dangerous neighborhoods online. Cybercriminals use lurid content as bait. They know people are sometimes tempted by dubious content and may let their guard down when searching for it. The Internet’s demimonde is filled with hard-to-see pitfalls, where one careless click could expose personal data or infect your device with malware. By resisting the urge, you don’t even give the hackers a chance.

  1. Make Sure Your Internet Connection is Secure. Use a Secure VPN Connection

When you go online in a public place, for example by using a public Wi-Fi connection, PCMag notes you have no direct control over its security. Corporate cybersecurity experts worry about “endpoints”—the places where a private network connects to the outside world. Your vulnerable endpoint is your local Internet connection. Make sure your device is secure, and when in doubt, wait for a better time (i.e., until you’re able to connect to a secure Wi-Fi network) before providing information such as your bank account number.

To further improve your Internet browsing safety, use a secure VPN connection (a virtual private network). VPN enables you to have a secure connection between your device and an Internet server that no one can monitor or access the data that you’re exchanging. Read more about What is VPN

  1. Be Careful What You Download

A top goal of cybercriminals is to trick you into downloading malware—programs or apps that carry malware or try to steal information. This malware can be disguised as an app: anything from a popular game to something that checks traffic or the weather. As PCWorld advises, don’t download apps that look suspicious or come from a site you don’t trust.

  1. Choose Strong Passwords

Passwords are one of the biggest weak spots in the whole Internet security structure, but there’s currently no way around them. And the problem with passwords is that people tend to choose easy ones to remember (such as “password” and “123456”), which are also easy for cyber thieves to guess. Select strong passwords that are harder for cybercriminals to demystify. Password manager software can help you to manage multiple passwords so that you don’t forget them. A strong password is one that is unique and complex—at least 15 characters long, mixing letters, numbers, and special characters.

  1. Make Online Purchases From Secure Sites

Any time you make a purchase online, you need to provide credit card or bank account information—just what cybercriminals are most eager to get their hands on. Only supply this information to sites that provide secure, encrypted connections. As Boston University notes, you can identify secure sites by looking for an address that starts with https: (the S stands for secure) rather than simply Http: They may also be marked by a padlock icon next to the address bar.

  1. Be Careful What You Post

The Internet does not have a delete key, as that young candidate in New Hampshire found out. Any comment or image you post online may stay online forever because removing the original (say, from Twitter) does not remove any copies that other people made. There is no way for you to “take back” a remark you wish you hadn’t made, or get rid of that embarrassing selfie you took at a party. Don’t put anything online that you wouldn’t want your mom or a prospective employer to see.

  1. Be Careful Who You Meet Online

People you meet online are not always who they claim to be. Indeed, they may not even be real. As InfoWorld reports, fake social media profiles are a popular way for hackers to cozy up to unwary Web users and pick their cyber pockets. Be as cautious and sensible in your online social life as you are in your in-person social life.

  1. Keep Your Antivirus Program Up To Date

Internet security software cannot protect against every threat, but it will detect and remove most malware—though you should make sure it’s to date. Be sure to stay current with your operating system’s updates and updates to the applications you use. They provide a vital layer of security.

Filed Under: Tech Tagged With: Security, Tech Tips

October 28, 2019 By Nate Forant

National Cybersecurity Awareness Month – Phishing

Phishing attacks use email or malicious websites to infect your machine with malware and viruses in order to collect personal and financial information. Cybercriminals attempt to lure users to click on a link or open an attachment that infects their computers, creating vulnerability to attacks. Phishing emails may appear to come from a real financial institution, e-commerce site, government agency, or any other service, business, or individual. The email may also request personal information such as account numbers, passwords, or Social Security numbers. When users respond with the information or click on a link, attackers use it to access users’ accounts.

You can read more here.

Filed Under: Tech Tagged With: Security, Tech Tips

October 22, 2019 By Nate Forant

National Cybersecurity Awareness Month – Social Media Cybersecurity

Now more than ever, consumers spend increasing amounts of time on the Internet. With every social media account you sign up for, every picture you post, and status you update, you are sharing information about yourself with the world. How can you be proactive to stay safe online and, “Own IT. Secure IT. Protect IT.”? #BeCyberSmart and take these simple steps to connect with confidence and safely navigate the social media world.

You can learn more at https://bit.ly/2LLRe7R

 

Filed Under: Tech Tagged With: Security, Tech Tips

October 17, 2019 By Nate Forant

Online Privacy: What You Need To Know

privacy online

Online Privacy: What You Need To Know

The Internet touches almost all aspects of our daily lives. We are able to shop, bank, connect with family and friends, and handle our medical records all online. With all of that, there are people out there that will try to steal your information. In our ongoing commitment to educating people about online safety, security, privacy, etc.  we’re sharing helpful blog posts all month in honor of National Cybersecurity Month

#BeCyberSmart when sharing personal information online to reduce the risk of becoming a cybercrime victim.

Did You Know?

  1. 64% of U.S. adults have noticed or been notified of a major data breach affecting their sensitive accounts or personal data.
  2. Roughly half of Americans (49%) feel that their personal information is less secure than it was five years ago.
  3. 58% of Americans age 50 and older are more likely to feel that their personal information has become less safe in recent years: 58% of Americans in this age group express this opinion.
  4. 69% of consumers believe companies are vulnerable to hacks and cyberattacks.

There is so much information online about this topic. To help you get right to the information you need. I highly recommend this Online Privacy information sheet that you can download or print out.

Do you need help protecting yourself online? Need to update the security on your computer? Contact us. We’d love to help!

Filed Under: Tech Tagged With: Security, Tech Tips

October 5, 2019 By Nate Forant

National Cybersecurity Month

Held every October, National Cybersecurity Awareness Month (NCSAM) is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity and to ensure that all Americans have the resources they need to be safer and more secure online.

We are big believers in keeping our data protected and secured.

There are lots of great tips and information out there that we will be sharing all month long.  Stay tuned and we will be back with more information this week.

Feel free to read and download this information about Cybersecurity while traveling.

Filed Under: Tech Tagged With: Security

July 8, 2019 By Nate Forant

Keeping Your Computer Virus and Malware Free

Keeping Your Computer Virus and Malware FreeMost people don’t even know that their computer is infected with a virus or malware. The Internet is a powerful and useful too. In the same way that you shouldn’t drive without buckling your seat belt or ride a bike without a helmet, you shouldn’t venture online without taking some basic precautions.

Viruses

Viruses are harmful computer programs that are transmitted in a number of ways and are designed to spread from one computer to another through the internet and cause havoc.  Most commonly, viruses designed to give the criminals who create them some sort of access to those computers that they infect.

Spyware

The terms “spyware” and “adware” apply to several different technologies. There are two important things that you need to know about them and they are:

  • They can download themselves onto your computer without your permission.
  • They can make your computer do things you don’t want it to do.

Botnets

Botnets are networks of computers infected by malware (computer virus, key loggers and other malicious software) and controlled remotely by criminals. They usually are looking for financial gain or to launch attacks on websites or networks.

If your computer becomes infected, give us a call at 252-285-9592. We will be happy to take care of your issues and get you back online within 24 hours.


About SOBX Tech

SOBX Tech is Eastern North Carolina’s leader for computer services, computer repair, software installations, and software upgrades.  SOBX Tech serves the Southern Outer Banks community and surrounding areas. Located in Eastern North Carolina, along North Carolina’s beautiful Crystal Coast, we’re happy to provide on-site service in your home or business, at no extra charge!

 

Filed Under: How To Tagged With: Security

August 27, 2015 By Nate Forant

How To Recover from a Virus or Trojan Horse

Considering the number of viruses traversing the internet at any given moment, it’s amazing that it doesn’t happen to everyone.

If you know what specific malicious program has infected your computer, then you can visit one of the several anti-virus websites and download a removal tool. However, using that tool you won’t be able to identify the specific program. If you can’t identify the program, the following steps might help save your computer and files.

1. Call IT support

If you have an IT support department at your disposal, notify them immediately and follow their instructions.

2. Disconnect your computer from the Internet

Depending on what kind of virus or trojan horse you have, intruders might have access to your personal information and may even be using your computer to attack other computers. You can stop this activity by turning off your internet connection. The best way to accomplish this is to physically disconnect your cable or phone line, but you can simply disable your network connection.

3. Back up your important files

At this point, it is a good idea to take the time to back up your files. If possible, compile all of your photos, documents, internet favorites, etc., and burn them onto a CD/DVD or save them to an external device such as a flash drive or external hard drive. It is vital to note that these files can’t be trusted since they are still potentially infected.

4. Scan your machine

Your computer (including its operating system) may be infected with a malicious program, it is safest to scan the machine from a live CD (or “rescue” CD) rather than a previously installed anti-virus program. Many anti-virus products provide this functionally. Another alternative is to use a web-based virus removal service, which some anti-virus software vendors offer (try searching for online virus scan).

The next best action is to install an anti-virus program from an uncontaminated source such as a CD-ROM. If you don’t have one, there are many to choose from, but all of them should provide the tools you need. After you install the software, complete a scan of your machine. The initial scan will hopefully identify the malicious programs. Ideally, the program will even offer to remove the malicious files from your computer; follow the advice or instructions you are given. If the anti-virus successfully locates and removes the malicious files, be sure to follow the precautionary steps in step 7 to prevent another infection. In the event that the anti-virus software can’t locate or remove the malicious program, you will have to follow steps 5 and 6.

5. Reinstall your operating system

If the previous step failed to clean your computer, the most effective option is to wipe or format the hard drive and reinstall the operating system. This corrective action will result in the loss of all your programs and files, it is the only way to ensure your computer is free from backdoors and intruder modifications.

Many computer vendors also offer a rescue partition that will do a factory restore of the system. Check your computer’s user manual to find out whether one of these is provided and how to run it. Before conducting a reinstall, make a note of all your programs and settings so that you can return your computer to its original condition.

6. Restore your files

If you made a backup in Step 3, you can now restore your files. Before placing the files back in directories on your computer, you should scan them to check for known viruses.

7. Protect your computer

To prevent future infections, you should take the following precautions:

  • Do not open unsolicited attachments in email messages
  • Do not follow unsolicited links
  • Maintain updated anti-virus and anti-malware software
  • Use an internet firewall
  • Securing your web browser
  • Keep your system patched

To ensure that you are doing everything possible to protect your computer and your important information, we are available to assist you in every way possible. 

Filed Under: How To Tagged With: Security, Tech Tips

March 17, 2015 By Nate Forant

How To Create a CyberSecurity Planning Guide

Small businesses are becoming a larger target for criminals seeking to access sensitive data. Attackers are well aware that small businesses have limited resources or personnel to information system security.

How To Create a CyberSecurity Planning Guide

The link below is a CyberSecurity Planning Guide I made from the FCC’s CyberPlanner tool.

CyberSecurity Planning Guide

It’s very informative and all small businesses should have one done. I have added the link below.  The link will walk you through each step to complete your small business CyberSecurity Planning Guide.

FCC CyberSecurity Planner

Keep your businesses safe and secure. If you need help, give us a call.

Filed Under: How To Tagged With: Security, Tech Tips

November 23, 2014 By Nate Forant

Securing Your Home Network

A protected home network means your family can use the Internet safely and securely.

Most households now run networks of devices linked to the Internet, including computers, laptops, gaming devices, TVs, tablets, and smartphones that access wireless networks. To protect your home network and your family, you need to have the right tools in place and confidence that family members can use the Internet safely and securely.

The first step is to Keep a Clean Machine and make sure all of your Internet-enabled devices have the latest operating system, web browsers, and security software. This includes mobile devices that access your wireless network.

Secure Your Wireless Router

A wireless network means connecting an Internet access point – such as a cable or DSL modem – to a wireless router. Going wireless is a convenient way to allow multiple devices to connect to the Internet from different areas of your home. However, unless you secure your router, you’re vulnerable to people accessing the information on your computer, using your Internet service for free, and potentially using your network to commit cybercrimes.

Here are ways to secure your wireless router:

  • Change the name of your router: The default ID – called a service set identifier” (SSID) or “extended service set identifier” (ESSID ) – is assigned by the manufacturer. Change your router to a name that is unique to you and won’t be easily guessed by others.
  • Change the pre-set password on your router: When creating a new password, make sure it is long and strong, using a mix of numbers, letters, and symbols.
  • Review security options: When choosing your router’s level of security, opt for WPA2, if available, or WPA. They are more secure than the WEP option.
  • Create a guest password: Some routers allow for guests to use the network via a separate password.  If you have many visitors to your home, it’s a good idea to set up a guest network.
  • Use a firewall: Firewalls help keep hackers from using your computer to send out your personal information without your permission. While anti-virus software scans incoming email and files, a firewall is like a guard, watching for attempts to access your system and blocking communications with sources you don’t permit. Your operating system and or security software likely comes with a pre-installed firewall, but make sure you turn on these features.

Fingerprint Scanning
Protect Yourself with these Tips:

  • Keep a clean machine: Having the latest security software, web browser, and operating system are the best defenses against viruses, malware, and other online.
  • Automate software updates: Many software programs will automatically connect and update to defend against known risks. Turn on automatic updates if that’s an available option.
  • Protect all devices that connect to the Internet: Along with computers, smartphones, gaming systems, and other web-enabled devices also need protection from viruses and malware.
  • Plug & scan: “USBs” and other external devices can be infected by viruses and malware. Use your security software to scan them.
  • Protect your $$: When banking and shopping, check to be sure the site is security enabled. Look for web addresses with “https://” or “shttp://”, which means the site takes extra measures to help secure your information. “http://” is not secure.
  • Back it up: Protect your valuable work, music, photos, and other digital information by making an electronic copy and storing it safely.

Filed Under: How To Tagged With: Security

  • 1
  • 2
  • Next Page »

Articles By Topic

  • Events
  • Gaming
  • How To
  • Lifestyle
  • News
  • Reviews
  • Tech

Articles By Sub-Topic

Apple Blogger Outreach Events COVID-19 Crystal Coast Geek Breakfast Data Internet Security Microsoft PC Resources Security Services Social Media Workshops Tech News Tech Tips

Read Past Articles

Get Tech Tips, Discounts & More

Subscribe to receive email updates with our latest news, deals, and information.

Copyright © 2023 SOBX Tech · Web Design & Maintenance by SOBXTech