TECHLINQ Talk - TECH TIPS & YOUR QUESTIONS, ANSWERED…

Prolong Laptop Battery Life with These Tricks

Published by on September 30, 2019 in

It’s difficult to get any work done with your laptop notifying you that it’s running out of juice. And if you are not close to a power outlet, your laptop will soon be nothing more than a cold slab of metal and plastic. Here are some helpful tips to prolong your laptop battery’s life.

Some truths about your laptop battery

Batteries in many modern devices are lithium-based — either lithium-ion or lithium-polymer — and users must take note of the following guidelines for proper battery maintenance:

  • Leaving your battery completely drained will damage it.
  • Batteries have limited lifespans. So no matter what you do, yours will age from the very first time you charge it. This is because as time passes, the ions will no longer be able to flow efficiently from the anode to the cathode, thereby reducing the battery’s capacity.

What else can degrade your battery

Besides being naturally prone to deterioration, your battery can degrade due to higher-than-normal voltages, which happens when you keep your battery fully charged at all times. Even though a modern laptop battery cannot be overcharged, doing so will stress and harm your battery.

Both extremely high temperatures (above 70°F) and low temperatures (32–41°F) can also reduce battery capacity and damage its components. The same goes for storing a battery for long periods of time, which can lead to the state of extreme discharge. Another factor is physical damage. Remember that batteries are made up of sensitive materials, and sustaining a shock from a fall or similar can damage them.

How to prolong your battery life

Now that you know some facts about your laptop battery, it’s time to learn how to delay its demise:

  • Never leave your battery completely drained.
  • Don’t expose your battery to extremely high or low temperatures.
  • If possible, charge your battery at a lower voltage.
  • If you need to use your laptop for a long period of time while plugged into a power source, it’s better to remove the battery. This is because a plugged-in laptop generates more heat that will damage your battery.
  • When you need to store your battery for a few weeks, you should recharge your battery to 40% and remove it from your laptop for storage.

These are just a few tips on extending the life of your hardware. There are many more ways you can maximize your hardware efficiency and extend its longevity. Call our experts today to find out more!



9 Cybersecurity Terms You Need to Know

Published by on September 16, 2019 in

Cybersecurity is everyone’s responsibility. But you don’t need to be an IT expert to know how to protect yourself from a cyberattack. To help you get started, here are helpful terms you need to know so you’re not left in the dark, whether you’re teaching yourself how to update your anti-malware, updating your systems, or consulting your tech support.

Malware

For a long time, the phrase “computer virus” was misappropriated as a term to define every type of attack that intended to harm or hurt your computers and networks. A virus is actually a specific type of attack, or malware. Whereas a virus is designed to replicate itself, any software created for the purpose of destroying or unfairly accessing networks and data should be referred to as malware.

Ransomware

Don’t let all the other words ending in “ware” confuse you; they are all just subcategories of malware. Currently, one of the most popular of these is “ransomware,” which is malware that encrypts valuable data until a ransom is paid for its return.

Intrusion protection system(IPS)

There are several ways to safeguard your network from malware, but IPSs are quickly becoming one of the non-negotiables. IPSs sit inside of your company’s firewall and look for suspicious and malicious activity that can be halted before it can exploit or take advantage of a known vulnerability.

Social engineering

Not all types of malware rely solely on fancy computer programming. Experts agree that the majority of attacks require some form of what is called “social engineering” to be successful. Social engineering is the act of tricking people, rather than computers, into revealing sensitive or guarded information. Complicated software is totally unnecessary if you can just convince potential victims that you’re a security professional who needs their password to secure their account.

Phishing

Despite often relying on face-to-face interactions, social engineering does occasionally employ more technical methods. Phishing is the act of creating an application or website that impersonates a trustworthy and often well-known business in an attempt to elicit confidential information. Just because you received an email that says it’s from the IRS doesn’t mean it should be taken at face value — always verify the source of any service requesting your sensitive data.

Antivirus

Antivirus software is often misunderstood as a way to comprehensively secure your computers and workstations. These applications are just one piece of the cybersecurity puzzle and can only scan the drives on which they are installed for signs of well-known malware variants.

Zero-day attacks

Malware is most dangerous when it has been released but not yet discovered by cybersecurity experts. When a vulnerability is found within a piece of software, vendors will release an update to amend the gap in security. However, if cyberattackers release a piece of malware that has never been seen before, and if that malware exploits one of these holes before the vulnerability is addressed, it is called a zero-day attack.

Patch

When software developers discover a security vulnerability in their programming, they usually release a small file to update and “patch” this gap. Patches are essential to keeping your network secure from the vultures lurking on the internet. By checking for and installing patches as often as possible, you keep your software protected from the latest malware.

Redundant data

When antivirus software, patches, and intrusion detection fail to keep your information secure, there’s only one thing that will: quarantined off-site storage. Duplicating your data offline and storing it somewhere other than your business’s workspace ensures that if there is a malware infection, you’re equipped with backups.
We aren’t just creating a glossary of cybersecurity terms; every day, we’re writing a new chapter to the history of this ever-evolving industry. And no matter what you might think, we are available to impart that knowledge on anyone who comes knocking. Get in touch with us today and find out just how we can help you with your IT woes.



Social Engineering Exploits Facebook

Published by on September 2, 2019 in

You’ve received a message from one of your Facebook friends. You click on the link not knowing what you’ve gotten yourself into. This describes one of the latest social media adware schemes, which has wreaked havoc on Facebook users worldwide.

What is it?

Little is known about the adware itself or those behind it, but it was uncovered by David Jacoby, senior security researcher at Kaspersky Lab, when he received a Facebook message from one of his friends, only to find out that wasn’t the case.

Basically, the adware uses Facebook Messenger to track your browser activity and pushes you to click on malicious ads or give out personal information.

How does it work?

By clickjacking and hijacking credentials of Facebook users, the adware is able to send messages to people in the victim’s contact list. If you’re one of those people, you’ll receive a phony message from your friend’s compromised Facebook account.

The message includes your friend’s name followed by the word “Video,” a shocked face emoji, and a shortened URL. Once clicked, the URL will redirect you to a Google Doc with a blurred photo taken from your friend’s Facebook page, disguised as a video. If you click on the “video”, you’ll be redirected to one of a number of targeted websites based on your browser, operating system, and location.

For instance, if you use Google Chrome, you’ll be sent to a website that looks exactly like YouTube, complete with the official logo. The hoax website will show you a fake error message to trick you into downloading a malicious Chrome extension.

If you’re on Firefox, you’ll be sent to a site with a false Flash Player update notice and a Windows adware executable; the same goes with OS X except the adware is hidden in a .dmg file.

The goal here is to move your browser through a set of websites so tracking cookies can monitor your activity and display malicious ads or you can be “social engineered” to give up confidential information.

How do you avoid falling victim?

Facebook has rolled out a number of automated systems to stop harmful links and files. What’s more, they will provide you with a free antivirus scan if they suspect that your account has been compromised by adware.

Still, you should be very skeptical about any shortened URL links sent to you by your Facebook friends, no matter how long you’ve been friends.

Due to their low key nature as potential security endpoints, cyber criminals are turning to social media platforms as their new medium of choice. To keep your business safe, you need to stay up-to-date and educate your employees. If you have any other questions about social media and how it can impact your business, just give us a call.



Diagnosing VoIP Call-Quality Problems

Published by on August 19, 2019 in

VoIP_QualityTo VoIP, or not to VoIP, that is the question that many small- and medium-sized businesses have been asking. And with good reason, since placing calls over the internet with a “Voice over IP” system is an increasingly viable option for SMBs given the robust features, ease of use, and cost savings. But does VoIP guarantee crystal clear local, international, and intra-office calling?

Phones are an absolutely essential aspect of any company’s communications arsenal. And after Alexander Graham Bell made the first coast-to-coast long-distance call in 1915, it was clear that this was technology that had the power to transform business. But as with all emerging technologies, there were some kinks to work out.

The key word, though, is “minor,” and our aim today is to help you identify these relatively slight hangups and help you optimize an already superior telephony solution!

Voice Echo

It’s fun to hear your voice repeating throughout the high-walled canyon while you’re hiking, but not so great when you’re having a quick chat on the phone. And while VoIP echo won’t totally disrupt your conversation, there are a few things you can do to reduce it such as adjusting volume and gain settings, upgrading your USB headsets, or even implementing VoIP echo cancellation software.

Static

Many VoIP systems use an ATA, or Analog Telephone Adapter, to convert analog voice signals to digital signals. This sometimes produces static during calls, with the culprits usually being incompatible power supplies or feedback from the phones plugged into the ATA. Easy fixes include unplugging/replugging the ATA and/or the devices connected to it, or switching to IP Phones which require no analog/digital conversions.

Choppy Voice

The main factor in disjointed, start-stop sounding messages in a VoIP environment is packet loss, which occurs if individual data “packets” are lost in transmission. When this occurs, the gateway at the receiving end of the call tries to predict what’s been lost, but when it can’t, the gap in data remains empty. With a simple tweak to your VoIP system’s bandwidth settings, sending and receiving voice data will become smoother and significantly reduce these interruptions.

Post-Dial Delay

Commonly referred to as PDD in VoIP parlance, post-dial delay is fairly self-explanatory. It refers to a delay between the time the caller finishes dialing and when they hear ringing, a busy signal, or some other kind of “in-call” information. It can be a nuisance when, instead of the ringing being delayed, it never actually occurs and you suddenly realize that your call has been connected. This is actually an externality from a vital piece of VoIP technology known as SIP. At the moment the only solace we can offer is that its widespread nature means you’re not alone, and a solution should be coming along soon.

By now it’s clear to most SMBs that a VoIP phone system can benefit their business, even with the occasional delayed ring or scratchy call. Because what we’ve learned from previous telephony advances is that inconveniences like this are manageable; and we can help you manage. From VoIP planning to installation to optimization, contact us today for more information.



TECHLINQ Managed Security for Cyber-Protection

Published by on August 5, 2019 in

Managed_ServicesRansomware, Trojan horses, spyware and malware are things small businesses like yours don’t ever want to come across. While the term cyber security was once thrown around to scare businesses into purchasing security software, today’s sophisticated threats can leave immense impact, something that antivirus solution alone can’t handle. With that in mind, we’ve rounded up top cyber attack statistics that prove you need managed services in order to remain safe and operational.

The Numbers

Small businesses are not at risk of being attacked, but worse, they’ve already fallen victim to cyber threats. According to Small Business Trends, 55 percent of survey respondents say their companies have experienced cyber attack sometime between 2015 and 2016. Not only that, 50 percent reported they have experienced data breaches with customer and employee information during that time, too. The aftermath of these incidents? These companies spent an average of $879,582 to fix the damages done to their IT assets and recover their data. To make matters worse, disruption to their daily operations cost an average of $955,429.

The Attacks

So what types of attack did these businesses experience? The order from most to least common are as follows: Web-based attacks, phishing, general malware, SQL injection, stolen devices, denial of services, advanced malware, malicious insider, cross-site scripting, ransomware and others.

Why TECHLINQ Managed Security?

TECHLINQ Managed Security services is the most effective prevention and protection from these malicious threats. They include a full range of proactive IT support that focuses on advanced security such as around the clock monitoring, data encryption and backup, real-time threat prevention and elimination, network and firewall protection and more.

Not only that, but because managed services are designed to identify weak spots in your IT infrastructure and fix them, you’ll enjoy other benefits including faster network performance, business continuity and disaster recovery as well as minimal downtime. One of the best things about managed services is the fact that you get a dedicated team of IT professionals ready to assist with any technology problems you might have. This is much more effective and budget-friendly than having an in-house personnel handling all your IT issues.

Being proactive when it comes to cyber security is the only way to protect what you’ve worked hard to built. If you’d like to know more about how managed services can benefit your business, just give us a call, we’re sure we can help.



5 Tricks to Cut Cloud Costs

Published by on July 22, 2019 in

As a business owner, it’s important to be aware of the unexpected costs associated with the cloud and what measures you can take to keep those costs down. They might not add up to much at first, but could eventually cost you more than the service is worth. Pay the right price for the services you receive with these five tips:

No standalones

Cloud services come in various shapes and sizes, many of which are standalone platforms with rates that increase over time. Opt for a service provider that offers a suite of products that all work together. They are often less expensive than a group of standalone products. Another benefit of working with a cloud provider is that you receive a single point of contact to resolve your issues quickly and effectively.

Experience matters

If you plan on integrating a standalone cloud service into your system, make sure you hire an experienced integration consultant to facilitate a smooth transition. Integration mishaps can cause serious downtime and cost a lot of money.

Backups are important

Unnecessary or inefficient backups will waste cloud storage space. Examine your cloud storage data by asking the following questions:

  • How many versions of this data do I need to store long-term? The more versions you store, the more it costs.
  • What regulatory demands do I need to meet? Some data may need to be accessible for up to three years, whereas other data can be deleted after 30 days.
  • How quickly do I need to access my backups? If it can wait for a day or two, archive that data to a less expensive service or offline at the provider’s data center.

Remove users

Many cloud service providers charge by the number of users in your system. By neglecting to manage the list of users, you could end up paying for people who no longer work for you. Implement processes that remove users when they are terminated and consider scheduling a regular audit. Ideally, this should be once every six months to a year, to ensure your cloud user list is up-to-date.

Monitor proactively

Ask your cloud provider whether they can proactively monitor your account and notify you of potential issues before they cause problems. This is especially important if you have a pay-as-you-go license that charges based on resource or storage consumption.

Utilizing the right technology resources is vital to your business’s success, and so is knowing how to prevent them from racking up an overwhelming monthly bill. If you wish to enjoy all the benefits of cloud computing without breaking the bank, give us a call and we’ll be happy to help.



4 Types of Hackers that May Target SMBs

Published by on July 10, 2019 in
VoIP_Quality

When it comes to cyberattacks, most business owners get hung up on the technical and logistical details, forgetting another important aspect: motive. Why are hackers attacking people and organizations? And whom are they targeting? By answering these questions, you’ll have a better understanding of which of your business’s resources need the most protection.

Script Kiddies

Skill-wise, script kiddies (or skids, for short) are at the bottom of the hacker totem pole. Their name comes from the fact that they use scripts or other automated tools written by others. Most of the time, script kiddies are young people on a quest for internet notoriety. Or, more often than not, they’re simply bored and in search of a thrill. Many never become full-time hackers; in fact, many script kiddies end up using their skills for the greater good, working in the security industry.

Though lacking in hacking know-how, script kiddies shouldn’t be dismissed so easily, as they can cause businesses much damage. In May 2000, for instance, a couple of skids sent out an email with the subject line “ILOVEYOU” and ended up causing a reported $10 billion in lost productivity and digital damage.

Hacktivists

Hacktivists are primarily politically motivated, and they often hack into businesses and government systems to promote a particular political agenda or to effect social change. These so-called “hackers with a cause” steal confidential information to expose or simply disrupt their target’s operations.

If you’re a small- or medium-sized (SMB) owner, don’t think for a second that you’re immune to hacktivist attacks. This is especially true if your company is associated or partnered with organizations that are prime hacktivist targets. Or, if your business provides services that can be seen as unethical, you may targeted by hacktivists as well.

Cybercriminals

When a hacker breaks into digital systems or networks with malicious intent, they are considered a cybercriminal. Cybercriminals target everyone from individuals to SMBs to large enterprises and banks that either have a very valuable resource to steal or security that is easy to exploit, or a combination of both.

They can attack in a number of ways, including using social engineering to trick users into volunteering sensitive personal or company data, which they can then sell in underground markets in the dark web. They can also infect computers with ransomware and other malware, or use digital technology to carry out “conventional crimes” like fraud and illegal gambling.

Insiders

Perhaps the scariest type of hacker is the one that lurks within your own organization. An insider can be anyone from current and former employees to contractors to business associates. Oftentimes their mission is payback: to right a wrong they believe a company has done them, they’ll steal sensitive documents or try to disrupt the organization somehow. Edward Snowden is a prime example of an insider who hacked his own organization — the US government.

When it comes to cyber attacks, most business owners get hung up on the technical and logistical details, forgetting another important aspect: motive. Why are hackers attacking people and organizations? And whom are they targeting? By answering these questions, you’ll have a better understanding of which of your business’s resources need the most protection.

Now that you know what motivates your enemy, and you think you might be a target, it’s time to secure your business from the different types of hackers out there. Get in touch with our experts today to learn how.



The Countdown Begins for Windows 7 Users

Published by on February 19, 2019 in

Windows 7 Extended Support Ends 1-13-2020

As the saying goes: Out with the old, in with the new. That’s exactly what Microsoft is encouraging Windows 7 users to do as soon as possible. It’s been reported that Windows 7 is so outdated that patches are unable to secure it anymore. Maybe it’s the nostalgic qualities that make it hard for users to take the leap. But sentiments aside, Windows 10 is the way to go.

Windows 7 was given extended support in 2015. And with that, Microsoft warned its users that this outdated version would drive up operating costs due to remediating software attacks that Windows 10 systems could otherwise avoid. The one-year countdown to Windows 7’s twilight officially began with a warning to enterprises that they could face hefty fines for sticking with the platform’s outdated security.

According to Markus Nitschke, head of Windows at Microsoft Germany: Windows 7 does not meet the requirements of modern technology, nor the high security requirements of IT departments. How would this make current Windows 7 users feel? Why are users choosing to remain faithful to the platform’s outdated security? Users can delay upgrades until January 13, 2020, after which extended support for the 2009 OS will end and it will no longer receive patches — unless the customer is paying for a pricey Microsoft Custom Support Agreement.

Markus also added that “As early as in Windows XP, we saw that companies should take early steps to avoid future risks or costs.” The message came as Microsoft published studies that showed Windows 10 Anniversary Update’s built-in security managed to neutralize many zero-day exploits, even without patches needed to protect earlier versions of Windows.

Failing to upgrade to Windows 10 means that you and your networks will miss out on noteworthy security features such as the Windows Hello biometric login, the AppContainer sandboxing technology, and Windows Defender Advanced Threat Protection, which will gain new features after upcoming Creators Update.

With the help of newer tools, migrating from Windows 7 to Windows 10 is considerably easier when compared with migrations from XP. Microsoft is still urging corporate users to make the shift before Microsoft permanently terminates support for Windows 7, stating that their business could be looking at real trouble if they fail to comply.

Business owners always do their best to ensure the future of their organization. That includes knowing which tech resources to rely on and which ones to avoid. If you still have questions about Windows 7, feel free to give us a call.



The Ransomware That Makes You Sell Your Soul

Published by on April 17, 2017 in

RansomwareRansomware has become a fast-track for making money for hackers. But instead of just demanding a small payment for the decryption code that will unlock their computers, some hackers are demanding that victims sacrifice two other friends to ensure they receive the code they need. Read more to find out what makes “Popcorn Time” such a devious program and how you can avoid becoming one of its victims.

Ransomware is nothing new. Cybersecurity miscreants have been taking advantage of online users for years by requiring payment to “unlock” a victim’s computer. What Popcorn Time does differently is give users the option to spread the virus to two other victims in the hopes that they will pay the ransom — a tactic that promises to double their money at the expense of your sense of morality (and at the expense of your friendships as well).

The Cost of Popcorn

When you inadvertently download this ransomware, you will be met with a screen that explains that your files have been hijacked/encrypted, and that to get them back you will need to pay one Bitcoin for a decryption key that they keep stored remotely. The Bitcoin fee is usually more than $700, a hefty price to pay.

Spread the “Cheer” and Hope they Bite

What makes Popcorn Time unique is the option victims have to take their cost away by allowing the ransomware to affect two of their friends for a chance to get a free decryption code. Of course, it works only if both friends pay the ransom, which leaves you looking (and feeling) like the Grinch.

Avoiding Popcorn Time this Season

The easiest way to avoid downloading ransomware is to stay off of sites that might contain questionable files. However, this is nearly impossible for modern users, and many hackers are getting good at making their files look legitimate. Limit your exposure to potential ransomware by keeping your software up-to-date and your computer protected with a security program from a reputable company (for example Symantec). If you need to learn more about how to avoid running into ransomware while you’re online, give our professional cybersecurity consultants a call.



Five Helpful Hi-Tech Healthcare Integrations

Published by on April 3, 2017 in

5_Security_MeasuresCan you think of an industry that hasn’t improved because of advanced technology? It’s hard to come up with one; much easier to think about where technology has made our lives better. A good example would be the medical world, where everything from robotic surgeries to electronic health records (EHR) — plus these five integrated healthcare technologies — are leading to more patient-friendly futures.

Putting the words “healthcare technology integration” together opens things up pretty broadly, so what do we mean by it exactly? In this instance, we’re not talking so much about complex surgical procedures or hi-tech medical devices; the focus here is more on IT, or “information technology,” in the healthcare realm.

It may not sound as impressive as some of the sci-fi-seeming technological advances like anesthesiologists’ iPads that use “perioperative information management systems” to track the patient’s well-being during surgery; or the “Argus II” bionic eye, which takes a video signal from a pair of sunglasses and transmits it to retinal implants. But the improvements technology integrations are making to the patient experience are no less significant.

Timely Reminders

In the past, healthcare providers had but one “convenient” way of reminding patients of upcoming appointments. Phone calls are fine, but even with the advent of robo-calls, connections can be missed and messages can fall through the cracks. Today, your doctor’s office can reach you via more expeditious “e-methods” like email, chat, and text message. They also afford patients an interactive option where they can confirm dates and times with a click of their mouse or a tap of their screen.

Informed Decisions

Integrating technology into your healthcare routine will never replace the advantages of meeting your physician face-to-face, but it certainly makes it easier for you to manage your wellness. For example, there are apps that give you on-demand access to your medical records and patient history, with features like real-time chatting with your doctor, therapist, or nurses — allowing for better, faster decision making when it comes to your health, all without an actual appointment.

Painless Prescriptions

Here’s one area of patient care where new apps are truly simplifying things, making communications between you and your doctors and pharmacists completely hassle-free. In many cases, the process for getting the right medication at the right time can be totally automated; gone are the days of calling in scripts or dropping them off and waiting. Welcome to the new age of software programs that manage your meds, automatically refill them, and keep you on-track to better health.

Personalized Care

Everyone has a different approach to staying fit or recovering from illness, and in the world-wide-web era, search engines are a part of most people’s repertoire. But the data you find online won’t be tailored to your precise situation, and certainly won’t be 100% trustable. Thankfully, a slew of sophisticated health-tech apps are integrated with wearable devices to give you accurate, up-to-the-minute info on how you’re doing with your stress management, heart health, or temperature regulation.

Convenient Claims

The historically labor-intensive, often irritating undertaking of filing medical claims has been seriously improved upon by technology in recent years. Thanks to cloud computing, your doctors and insurance carrier can collaborate on your behalf using secure, encrypted apps that result in faster processing and far less paperwork. You’re even able to enter your insurance info ahead of time, and stay up-to-date throughout the process with automated status updates.

Technology integration in healthcare is improving the ways we prevent diseases, perform surgeries, and deliver treatments. But the innovations with the most significant day-to-day influence are the ones that provide patients with access to reliable, real-time information. That’s where patient outcomes have been advanced the most — right before our eyes.



Techlinq Talk


Recent Posts


Archives

  • March 2020
  • February 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • February 2019
  • April 2017
  • March 2017
  • February 2017