XFER Blog

XFER has been serving the Livonia area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Know the Risks of the Internet before Logging On

b2ap3_thumbnail_virus400_20130617-162258_1.jpgDriving a powerful car can be an exhilarating experience, but if you have no idea what you're doing, it can be dangerous. This is why governments require drivers to pass a safety class before they can speed down the road encased in steel and glass. The Internet is also a powerful tool that can be exciting, beneficial, and dangerous.

0 Comments
Continue reading

Bury Your Treasured Files With TrueCrypt

b2ap3_thumbnail_tcsquare400.jpgHow vulnerable is your sensitive data on your PC to unwanted threats? Can anyone who gains access to your computer be able to easily find this data and do whatever they wish to it? If these files were encrypted and then hidden from view, you can neutralize the possibility of it happening.

0 Comments
Continue reading

Preparing Your Social Media Will

b2ap3_thumbnail_googledeath400.jpgYou can't log onto your online account if you're dead, and unless you have your password clearly marked on a sticky note, then nobody else will be able to either. While the Internet is a great distraction to keep us from pondering our mortality, the issue of post-mortem social media forces us to face death by preparing a digital will.

0 Comments
Continue reading

Network Firewalls Explained

b2ap3_thumbnail_Firewall400.jpgYou know that having a strong firewall is a key component to having strong network security, but do you how firewalls work? Firewalls take their name from the protective barriers that keep buildings and engines safe from fire. While it’s unlikely that your computer is in danger of incineration, a firewall does protect it from cyber-threats; here’s how!

1 Comment
Continue reading

Hackers are Taking Advantage of Technology Improvements

b2ap3_thumbnail_HackerSkull400.jpgUsing strong passwords is a critical part of keeping your network protected. For years we have been preaching the need to use complex passwords, along with the need to use different passwords for different accounts. As the technology of crackers (not the salted kind) improves, the need to be diligent about password security intensifies.

1 Comment
Continue reading

Who Can You Trust with Your Data?

b2ap3_thumbnail_Trust400.jpgYour company's information on your network is labeled as "sensitive" for a reason. The files on your servers contain the secrets to your success, along with financial records about you, your employees, and your customers. When trusting sensitive data to a third party, make sure that it is someone you trust.

1 Comment
Continue reading

In Windows, Hibernation Isn’t Sleep

b2ap3_thumbnail_Sleep400.jpgThe Windows family of operating systems (OS) have different power-saving modes for users to take advantage of if they find themselves away from their workstation or mobile computing device. Windows 8 features three: Sleep, Hibernate, and Hybrid Sleep.

0 Comments
Continue reading

Business Executives are Targeted with Whaling Scams

b2ap3_thumbnail_Whaling400_20130217-211618_1.jpgEven if you are using the best antivirus software available, sensitive company data can still be compromised by users falling victim to phishing scams. Phishing is a tactic where scammers trick users into giving out their personal information, usually through deceptive spam e-mails. Looking to fry bigger fish, scammers are trying their luck at whaling.

0 Comments
Continue reading

Don’t Underestimate the Hackers

b2ap3_thumbnail_Hacker400.jpgIn 2011, Ponemon Research surveyed 583 U.S. businesses and found that 90% of respondents reported that their company's computers had been breached at least once by hackers within the past year; 77% of these companies felt like they were attacked multiple times within the same year. If your SMB does not have any protection from hackers, then your sensitive data is at serious risk.

2 Comments
Continue reading

Take Back Your Facebook News Feed

b2ap3_thumbnail_FacebookLogo400.jpgFacebook has recently achieved one billion active users. Being on top of the social media world comes with a price. Facebook has become one of the top 10 most hated companies in America, this according to a January 2013 study from news site 24/7 Wall St. This survey takes into account customer and employee satisfaction and, most of all, stock prices.

0 Comments
Continue reading

Taking a Look at Google’s Data Centers

b2ap3_thumbnail_datacenter.jpgHave you ever stopped and wondered where the internet is housed? Maybe all the websites are on a skyscraper-sized router? Maybe the internet all fits inside your computer? Most of the information is actually stored in data center facilities all over the world, and the sheer size and complexity of these centers will boggle your mind.

0 Comments
Continue reading

Stolen Device Damage Control

b2ap3_thumbnail_laptopstealer.jpgThe smartphone ownership rate for American adults increased to 46% in 2012, this according to a study by Pew Research. This study does not include other mobile devices like tablets, laptops, and notebooks, but the use of these devices is also growing, with worldwide sales for just smartphones and tablets projected to hit 1.2 billion in 2013.

0 Comments
Continue reading

4 Tips to Shop Securely Online

addtocart10.jpgThe 2012 holiday online shopping season is shaping up to be the biggest yet. Harris Interactive conducted a survey regarding this holiday season, and found that 51% of Americans plan on shopping online this year. Everybody has different reasons to shop online, 71% of respondents thought they could find better deals, and 31% want to simply avoid the crowds.

1 Comment
Continue reading

Increase Security with Multi-Factor Identification

Using a strong password with complex combinations of letters and numbers will go a long way in protecting your account, but passwords provide only one level of protection against hackers. Additional levels of security can be added with multi-factor authentication. This is the best protection available for your internet accounts, and major technology companies have recently made this a reality for the public.

1 Comment
Continue reading

3 Handy Tools to Remember Your Passwords, Part 2

Last time, we spoke about password security, we went over the importance of using strong passwords to avoid identity theft. In part two, we will discuss three easy password solutions that can help you manage all of your different passwords.

0 Comments
Continue reading

Password Vulnerability and Security, Part 1

A weak password makes identity theft easy for hackers. You would never paint your social security number on the side of a truck and drive around town, but if your password is shared, left out in the open, and used on multiple sites, then you might as well ride shotgun with the Lifelock CEO (his SSN has been stolen 13 times).

1 Comment
Continue reading

Protect your Dropbox with Two-Step Authentication

Dropbox, a popular file-hosting service for both home-users and businesses, recently added a new security feature to prevent unauthorized access to your Dropbox files and folders. You can enable Dropbox to send a security code to your mobile phone whenever you log in.

0 Comments
Continue reading

Removing the Hidden Data in Microsoft Word

Most people might not realize this, but a Microsoft Word Doc can retain a lot of information pertaining to the history of the document, your personal information, annotations, and other invisible elements. This can be a huge security risk! Read on to learn how to remove that extra information.

0 Comments
Continue reading

Securing your Wi-Fi is More Important Than Ever

Does your Wi-Fi require a secure password to allow users to access your network with their mobile devices? And no, the word "password" is not a suitable password. If your wireless network is easy to gain access to, you are opening up your sensitive data to anyone within range.

0 Comments
Continue reading

2 Step Authentication for Gmail

Having strong passwords for your online accounts is very important, but sometimes you may want a little more protection in the event your password gets stolen or someone forces their way through it. If you use Google's Gmail service, you can set up your account, then you will need two forms of authentication to get into your email.

1 Comment
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Blog Archive

2011
January
February
March
April
May
June
July
October
December
2010
January
February
March
April
May
June
July
August
September
October
December

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *