Save $25 First-time repair — call today
75 North Bridge St, Somerville NJ 08876 - (Behind Bank of America) Hours M-F 10am-5pm Sa 9-2 (908) 428-9558

Cyber security tips often scrape the surface of what it means to be a sitting duck online. However, for a Bridgewater, NJ business that uses technology, keeping up with the latest cyber security threats is something that you absolutely need to do, no matter what.

Remember that your cybersecurity absolutely needs to be your first priority, no matter what, because a security breach can impact your clients and your brand's reputation - which could harm you forever.

So what should you do? Start with these cyber security tips:

Understand Your Online Presence

You need to understand that if you are a business owner or even a person who does a lot on computers, you are going to be an attractive target for those who want to use the internet for nefarious purposes.

If you have any type of money, data (including usernames, passwords, emails or anything else), or just a place to work, you are going to be a target.

You cannot operate with the "it won't happen to me" mindset - it can, and it might.

Pay Attention To New Cyber Security Tips

There are new tools, patches, and options for cyber security coming out all the time, so it is important to keep your ear to the ground when it comes to them. Make sure you keep your applications updated and you talk to your employees, family, and friends about being safe when using your technology.

Think About What You Plug Into Your Computer

One thing many people don't do when they think about their cyber security is be careful about what you plug into your computer. This is one of the most important cyber security tips of all.

Never use a USB whose source you don’t know - or even if you do know them, you never know what can be spread from computer to computer! It can be infected with malware that can even resist formatting. Someone could infect your computer without even meaning to.

You Still Need Antivirus

One of the weirdest trends of the last few years is that people think that they don't need antivirus anymore, but that just isn't the case: Antivirus is still very necessary, so don’t skip it.

Even those people who follow cyber security tips to the letter might experience attacks, so you should put up the best defense.

Cyber Security Tip: Prioritize the Most Important Accounts

If you don't have time to focus on the security of all of your accounts, at least focus on the most important ones. Heimdal Security gives a great list of where to start:

Use your best passwords for these websites and do not, under any circumstances, give them out.

Clean Out Apps You Don't Use

If you haven't used an app in the last six months, it is time to get rid of it. There isn't much else to say when it comes that - keeping around old applications, especially those that you don't update, will never help you to stay safe.

Stick To Your Own Devices

How badly do you really need to get on the internet? If you don't have your phone with you and want to do something, make sure that it is absolutely necessary before you do it. The more devices you enter your information on, the more chances you have to make a mistake.

Make Your Passwords Difficult

Gone are the days when you want to make your passwords something easy to guess like your pet's name followed by your birthday. If even that seems complicated to you, then you are putting yourself in serious cyber trouble.

One of the best (and easiest to follow) cyber security tips that you can follow is to just make your password difficult. What does a good password look like? Something like this: h295p!$%rvi***

It might seem complicated, but it will keep you safe. Even better, you can get a password manager to help you keep track of them.

Check For The S

If you are going to a website you've never been to before (or even one that you have been to), check to see if it starts with httpss. The added “s” is the key cyber security tip here. A website that starts with an "httpss" encrypts the data you put into the website as well as the data that you get from it, so no one can break into it or tamper with it.

If a website does not start with httpss, you can still use it, just do not give them confidential info (credit card details, social security number, address, etc.).

Disconnect When You Can

A short but sweet cyber security tip? Disconnect from the internet when you can - it will help to keep you safe at all times.

Be Smart About What You Post

Cyber security is about more than just keeping your information safe, if can keep you safe as well. Don't check into airports, hotels, or other places that will advertise the fact that you won't be at home. This just opens up the chance that someone will see it and know that your home is unoccupied.

You don't just have to be careful about posting those though, make sure you don't post vacation pictures until you are home, you don't leave reviews in real time, and try not to do "live" videos.

Our team takes pride in being the most experienced team of IT professionals in Montgomery and all of New Jersey. You can count on us to have solutions to problems that you may not have had luck with before. When it comes to data recovery in New Jersey, you simply cannot go to anyone better. We have technical support available to the public every day of the week: you’ll have the option to talk to an experienced technician if a problem arises.

Looking for the Best Computer Services in New Jersey? Call: (908) 332-5051

Related Posts

We use passwords for everything. Our online accounts, social networks, web app logins, computer logins, phones, cloud storage, banking, shopping and a whole lot more. When the loss of a password can mean losing data, money, personal details or worse, it makes sense to make that password a good one. As part of a data loss prevention effort, Dave’s Computers is has some top tips for generating secure passwords.

First, before we begin generating secure passwords, a note about using them. Never repeat a password for more than one login. It leaves two or more accounts wide open to attack should one be compromised. If you have trouble creating or remembering your passwords, use a password manager. They are free, easy to use and will even generate secure passwords for you.

Generating secure passwords

On its own, there is no such thing as a completely secure password. All we can do is make it as difficult as possible to break so nobody but the most determined hacker will bother trying to crack it.

Hackers tend to use two main attacks. First, dictionary attacks, which use a program with a dictionary loaded into it to try all combinations of words. Second, phishing or social engineering to try to trick you into giving up your password. Secure passwords can help with that first attack but not the second so never give out your password for any reason. Ever.

Here are those tips for secure passwords:

  1. Always use a different password for every login.
  2. Use a password manager if you can.
  3. Use a mixture of lower case, upper case, special characters and numbers.
  4. Use a passphrase instead of a single word. The first line of a book, a line from a song, album title or random phrase. Just make sure you can remember it!
  5. Use random words from different languages. Try Latin, Aramaic, Hebrew and other historical languages to create a phrase.
  6. Use a color and object with a number or special character. Purp1eistheM0nkey! for example.
  7. Always use a minimum of 10 characters for any single password. More is better as long as you can remember them.
  8. It’s okay to write longer passwords down as long as you don’t lose the paper.
  9. Use a password reminder sheet if you don’t want to write the password in plain text.
  10. Never, ever give out your password if someone asks. Nobody should ever need them unless you know or trust them.

Passwords have been around forever and show no signs of going anywhere soon. Generating and managing them is hard work in the volume that we tend to need to create them. However, there is no option but to keep them unique and make them hard to guess!

Related Posts

If you own an Asus PC and have been reading recent headlines, you may be a little worried. So what’s the story and do you really need to be concerned? Dave’s Computers investigates.

The story broke in March that potentially millions of Asus computers had been unwittingly infected with malware. The ShadowHammer malware was sneaked into the supply chain and onto the Asus update server. This means every Asus computer that contacted the server for updates could potentially have been infected.

The malware was live on the server between June and November 2018 and could have been downloaded thousands of times. Discovered by Kaspersky, as their software runs on many Asus computers, the company traced it back to the source and said it alone had dealt with over 57,000 infected machines.

What to do if you may have been infected

If you think you may be one of those users infected by ShadowHammer, you need to run your antivirus software and a separate malware scanner. You can also download Asus’ new Live Update software (version 3.6.8) which will tackle any malware installed on your computer.

While you may find it difficult to trust Asus Live Update, the company assures us that version of 3.6.8 is perfectly safe and can remove the malware from your computer. Asus has also beefed up the security on their servers and implemented as much security as possible to stop it happening again.

Keep on top of antivirus and malware

If a reminder was ever needed, this is the ideal lesson to remind all of us to keep on top of our computer security. It’s easy to get caught up in daily goings on and lose track of when we last performed a malware scan or antivirus check. The sophistication of this attack shows what lengths people will go to in order to attack our technology.

Always use an antivirus product on every device. Have it set to automatically scan if it has the option and to automatically update. Run a malware scanner after your antivirus. Malwarebytes or something similar is free and very simple to use. Get into the habit of using both of these regularly.

If you’re still concerned or wonder if you have gotten rid of ShadowHammer, bring your computer to Dave’s Computers in New Jersey. We can perform our own checks just to make sure.

Related Posts

Today’s post is another one prompted by a Dave’s Computer customer. This time it was a woman who had decided to leave corporate life behind and go freelance. She wanted to know what she needed to be able to work from home securely and how to back up her data so she didn’t lose client briefs. As this subject is also relevant to move people who use computers, I thought it would be a good subject for a blog post.

Remote working

Millions of people across the world seem to be leaving traditional employment behind in favor of working for yourself. I did it years ago when I first started Dave’s Computers in New Jersey and haven’t looked back since. You will work harder than ever before for a lot less money but nothing comes close to the satisfaction you get from doing it.

As our customer was performing clerical work, her needs were modest. All she needed was a good internet connection, reliable computer or laptop, a VPN, external drive and cloud storage. Most of us have these things already so it wasn’t much of an expense.

A reliable computer or laptop – If you don’t want to buy new hardware for work, you don’t have to. As long as you are using a relatively recent computer with either Windows 10 or Mac OS and keep it up to date, use antivirus, malware scanners and a software firewall, you’re fine.

You will need enough disk space for your work. I would suggest using a separate SSD purely for your work but you don’t have to. If you have a webcam and microphone, virtual meetings will be much easier too.

Decent internet – Remote workers depend much more on a reliable internet connection than home users. Even if you don’t work on the internet, you will need to be contactable and be able to receive and answer emails, messages and Skype calls quickly. It isn’t all about speed but also about reliability. Don’t settle for less than 99.9% uptime.

A VPN – A virtual private network, VPN, is essential. Not only for maintaining privacy when you’re researching online or shopping but also when transmitting customer data. When you run a business, you have to protect customer data at rest, stored on your disk and in motion, which means being sent and received over the internet. A VPN is a cheap and easy way to do that.

External hard drive – This is for backups. You may have gotten away with not losing data when you were a home user but now the stakes are much higher. Use an external hard drive and set your computer to back up to it regularly.

Cloud storage – A backup is only regarded as robust when it is stored in more than once place. Backing up to external storage is one place, another backup to the cloud is another. You can get free storage from most providers so make sure you use it.

It might seem a lot, but most of us have Google Drive, a computer and/or laptop, external storage and broadband. You should all use a VPN too, I have suggested it enough!

If you need help with any of this, come on down to Dave’s Computers in New Jersey. We would be happy to help!

Related Posts

Do you know how to use dating apps without giving too much away? Know how to put yourself out there while maintaining a semblance of privacy? Not many people do which is why I put this guide together. Dave’s Computers in New Jersey are fierce supporters of online privacy and firmly believe we should be able to go about our online business without being tracked, followed or worse.

Dating apps have changed the world as we know it. Every single person I know of uses, or has used a dating app. It’s now regarded as the default way to meet someone new. Love dating apps or loathe them, it is how relationships are begun now.

To use a dating app, you need to provide enough information about yourself to attract someone but not enough to expose your identity online. It’s a fine line to tread but I have some quick tips for maintaining that balance.

Separate your dating app and social media

Most dating apps encourage you to link it to Facebook, Twitter or whatever and some will take data from there and use it on the app. If the app has the option to keep your dating profile and social media separate, use it.

We all share too much on social media and it is the work of minutes to find your name, school, place of work, friends and even your address from social media. If you link a dating app profile to that, it could lead to all sorts of trouble. The same for images, a quick reverse image lookup on your dating profile image could turn up all sorts of things if you use it for Facebook too.

Use a burner phone

Having a dating app on your phone can be a license to track you. It can also expose your phone number or you may end up giving your number to someone who turns out not to be who you thought they were. If this is your main phone and you’re partway through a contract, you have work to do to change your number.

By using a burner, you provide the app no data to use. You can turn off GPS, location and any tracking feature within any social network and the number you give out to potential dates is sanitized. In other words, the number has no links to your real life.

Monitor location tracking

Most dating apps use location as a criteria for showing you potential dates. This is a very useful system but make sure the area it shows you as being in isn’t too small. If you’re in New Jersey like us, showing a square mile will include anything up to 150,000 different people. If you live in rural Iowa or somewhere, that mile could include six people.

Use a setting that doesn’t give too much away wherever possible.

Know that you don’t know who you’re talking to

We can be anyone we like online. You have probably come across those profiles already. Those who say they are in their thirties when they are coming up to retirement or those who say they play sports when they really mean they played sports while in college. While those untruths are mostly harmless, there are those out there who prey on people looking for love.

Always have in the back of your mind that the person you’re talking to could literally be anyone. Don’t give away too much too soon. Dating is supposed to be an evolutionary process that unfolds over time. Take that time and use it to gain trust before exposing your soul.

Dating apps are useful and can be a gateway to love. As long as you can manage your privacy and remain safe, dating apps could be a power for good.

Related Posts

Monday’s post about a huge trove of accounts for sale on the dark web should have prompted many of you into checking over your account security and changing any account where you use the username and password in more than one place. If you’re anything like me, you have many dozens of logins and cannot possibly remember the logins for all of them. That’s where a password manager comes in.

I am passionate about privacy and personal security and often advise clients here at Dave’s Computers in New Jersey how to secure their computers and accounts. One of the things I recommend is using a password manager.

What is a password manager?

A password manager is a third-party app or browser extension that helps manage the many website logins and accounts we have. They don’t just save these logins, they can help generate secure passwords and log you into these sites securely.

The upside of password managers

Password managers usually come as a browser plugin and will work inside your browser. Every time you have to log into a website, you can trigger the password manager to do it for you. If you join a new site, you can also ask the password manager to generate a secure password and automatically save it for you. This ensures you use a truly random, difficult password every single time.

Many password managers include a right click dialog. Right click to have it enter your login into a website. Right click to generate a secure password and right click to automatically fill in a web form. Considering that they are either free or cheap, they are a powerful tool to have around.

The downside of password managers

There are only two downsides of password managers that I can see. One is that some of them are limited in their free capacity and only come alive when you pay. You can work around this by shopping around and choosing a less limited one.

The second downside is that a password manager is a single point of failure. If you’re trusting all of your logins to an app, you have to trust that app to keep you safe. Again, this can be mitigated by choosing a password manager with a good reputation and that uses tough encryption to keep your data safe.

What password manager should you choose?

The short answer is the one that you like the look and feel of. The better, more actionable answer is one of these. Try, LastPass, Dashlane, KeePass Password Safe, Sticky Password or TrueKey. There are other options but once you begin to see what’s on offer you can build up a picture of what is available free and what you need to pay for.

Hint, you don’t need to pay for anything. I use LastPass and have done for many years. Some of the others mentioned are equally good so you will find something you like.

Related Posts

Hacking is nothing new and the prospect of losing your account details is something we should all prepare for. However, a huge haul of accounts have just been found for sale on the dark web, 620 million of them. Taken from a bunch of websites over the past year, the account details are enough to log into the site and change the personal details of the original owner. They can also be used for phishing, scamming and more.

Dave’s Computers isn’t into scaremongering or clickbait headlines but this haul of account details covers some very popular websites. That warrants a blog post warning all our customers that their details may be among them. The price for all 620 million accounts is $20,000 in bitcoin. Not a lot of money considering the potential value.

If you are a member of any of the following websites, you need to log into them right away and change your details. You may be too late but you should definitely try:

As you can see, there are some very popular sites in that list, including fitness and dating. Both types of website will also likely contain a lot of personal data. If you want to know more about the hack, British site The Register has all the details.

If you use one of these websites, try to log in right away and change your password, initiate two-factor authentication if you can and monitor the account. Some of these hacks happened up to a year ago but the data is only recently on sale. You may still have time to get into your account and lock it down before someone else does.

Don’t panic if you’re one of those hacked

If your account has been hacked you can still claim it back. First, try to log in and change the password to a very strong one. Then utilize two-factor authentication wherever possible. Do the same for any other account you use the same login for and never, ever use the same username and password for multiple websites. This is why!

If you cannot get access to the account, contact the customer service desk of the site in question. Explain what happened and that you need your account reset. If any of the websites contain financial data such as credit card details, you need to alert the credit reference agencies and put a freeze on your account. This will prevent a hacker applying for credit in your name.

This all sounds serious but it doesn’t have to be. As long as you move quickly and lock down your account if you can and watch your finances, you should be okay.

Related Posts

You may have seen or heard about Cryptojacking over the past few months and it being identified as an emerging threat this year. What is Cryptojacking and should you be worried about it?

Here at Dave’s Computers in New Jersey, we like to keep up to date with threats like these. It helps us help you and allows us time to develop strategies for protecting against it and for recovering data afterwards should you lose it. That’s the case with Cryptojacking. It doesn’t delete data but it does take over your computer.

What is Cryptojacking?

Cryptojacking is the hijacking of a computer to mine cryptocurrency for criminals. Just like malware can turn your computer into a data miner, spam relay or other nefarious use, this malware makes your computer work for someone else’s gain.

Cryptocurrency is earned by allowing your computer to perform complex calculations to help currencies like Bitcoin maintain a ledger. In return for your help, you are rewarded with a portion of cryptocurrency. Performing these calculations is called mining and it takes many, many hours to earn even a single Bitcoin or other digital currency.

Enterprising criminals developed a way to sidestep all the effort. Instead of using their own computers and electricity, they designed malware that gets your computer to do it for them. This is cryptojacking. The malware includes everything required to mine cryptocurrency and sets your computer to work mining on behalf of the criminals.

How is cryptojacking malware delivered?

The most common cryptojacking malware is delivered via browser infection. This means it can infect Windows, Mac and in theory, Linux computers too. A website can be infected with this malware that will run when you have the window open. Some websites can have infected ads or code embedded to download the code to your computer too but these are less common.

Some popular, legit websites have been infected in the past including the LA Times website and the TV network Showtime. It isn’t just pirate websites or lower quality ones that are susceptible.

How can you tell if you have been cryptojacked?

There are some easy ways to identify if you have been subject to cryptojacking. Your processor runs constantly at high utilization, your computer fans run at full speed when they shouldn’t to keep the system cool, your computer does not seem as fast as usual or you see unusual browser activity or processor utilization with certain websites open.

Usually, if your computer seems to be working harder than it should be with no good reason, it is time to check it out. Open Task Manager or close your browser to see if things calm down. If they do, re-open your browser to see if it starts up again.

How to protect yourself from cryptojacking?

Use good internet hygiene and you should avoid the majority of cryptojacking attempts. That includes not going to the darker places on the internet, not clicking on random links on a page or through email and being aware of where you are and where you are going online.

Here are some practical things you can do to protect from cryptojacking:

  1. If you’re following a link, hover over it first to see if it matches. If it doesn’t use a URL shortener like Bit.ly, be careful about following it.
  2. Run a malware and antivirus scan regularly and perform periodic data backups to prevent data loss.
  3. Run your browser in a sandbox if you can.
  4. Use an ad blocker or use host file blocking.
  5. Be aware of exactly what you are downloading if you download anything. Run an antivirus scan before opening anything you do download.

Cryptojacking is increasing and is set to become the biggest online threat in 2019. Use these common sense tips to prevent your own computer earning money from criminals. Be safe out there!

If you need help with IT security or anything to do with computers, visit Dave’s Computers in New Jersey. We are here to help!

Related Posts

The latest in a long line of hacks, the popular Q&A site Quora is the latest company to lose data. Last week it came to light that over 100 million users have potentially had their login details hacked and are presumably now for sale on the dark net. As Dave’s Computers is dedicated to helping you protect your privacy, it’s a subject we are going to cover today. The hack happened on 30 November and is covered on the Quora blog. The company also said they sent emails to registered users telling them to change passwords right away. I suggest you do this and then change any other logins for other websites or accounts where you use the same password. Even though I suggest often to never use the same password twice, I acknowledge it is difficult to remember all of them. I’ll get to that in a minute though.

Quora hack

The Quora hack apparently affects over 100 million logins across the world. The data that has potentially been lost includes account names, passwords, data, email addresses, content, questions and answers, downvotes, direct messages and comments. If you’re a Quora user, you could have lost everything. It also includes any social data you allowed Quora access to from Facebook or anywhere. Lost is perhaps the wrong word. Your data is still there, it just isn’t private now. It could be made freely available or be sold somewhere. Either way, if you’re a registered user and haven’t done it yet, change your password right now. Then change those other logins you use the same password for.

Managing multiple passwords

I know how difficult it is to create and remember the dozens of logins we use every day for apps, websites or whatever. That’s why I use and recommend everyone use a password manager. Sure your browser can remember passwords but it doesn’t generate good ones and is unlikely to be as secure as a dedicated password manager. I use LastPass but there are others out there like 1Password, Dashlane, Password Boss, True Key, Keeper and Blur. There are dozens of options offering a range of features depending on your needs. Some are free while others are premium. The free products are just as secure as the paid-for ones, they just don’t offer as many features. Make a judgment call about what password manager to use. Read reviews, try them out and settle on one you like. Paid or not, it doesn’t matter as long as it uses strong encryption and offers to suggest complex password as well as store them. If you’re concerned or need help with computer security or anything to do with computers, the guys here at Dave’s Computers can help. Contact us to see what we can do for you!

Related Posts

If you read ‘How to harden your home router for maximum security’, you will already know that most home routers have some work to do to be truly secure. One thing I mentioned in that piece was about disabling port forwarding. Today I’m going to go a little more into why that is necessary. The team here at Dave’s Computers in New Jersey are often faced with picking up after hack attacks. That is either trying to recover data that has been maliciously deleted or trying to remove malware and viruses placed on a computer as a result of a hack. Both can have serious consequences for your identity and personal data.

What is port scanning?

Before we get to the scanning part, what is a port? A port is a virtual doorway a particular app uses to communicate with the network. HTTP, or browser traffic uses port 80, HTTP, secure browser traffic uses port 143. There are hundreds of ports used by different programs and they are created virtually by your operating system. When a computer talks to the internet, the program doing the talking will ask the server to respond on a particular port. That way, when the traffic arrives at your router, the operating system knows where to send that piece of traffic. If you have a dozen apps all using the internet at once, ports are one way of making sure the right traffic goes to the right program. Port scanning is where someone external to your network sends a request to every port on your computer in turn to see which are open and which are secure. Programs can query many thousands of ports per minute so it is an easy way for a hacker to find out how secure you are. There are a few types of port scan that will tell a hacker different things. If a port is open, a hacker can try to gain access to pretending to be the program that typically uses that port. Once inside, they can freely do their nefarious work.

Protecting against port scanning

The main defense against port scanning is to use a good firewall. Most quality routers will have a firewall built in but I also suggest running a software firewall on every device that connects to the internet. A firewall will block anonymous requests so will not reply to a random scan from the internet. Set up correctly, which more firewalls are by default now, a firewall will block any connection from the internet that was not set up from your computer. So if you don’t have a browser open and are using it to surf the net, the firewall will block a hacker pretending to be a firewall because your computer did not set up that connection. Aside from a firewall, not using port forwarding on your router is the best way to protect against it. You shouldn’t need to use port forwarding anymore as firewalls are intelligent enough to figure out what traffic is real and should be let through and what is not. It is well worth checking your router to make sure port forwarding is not enabled. It should be under security or firewall depending on the router. Make sure there are no ports being forwarded for any reason. If you need help with network security or anything to do with computers, the guys here at Dave’s Computers can help. Contact us to see what we can do for you!

Related Posts

📞 Call Dave's — 908-428-9558