Computerbilities, Inc.

Category: Blog

  • What is Juice Jacking? Why You Should Not Use Pubic USB Ports and Chargers

    What is Juice Jacking? Why You Should Not Use Pubic USB Ports and Chargers

    Juice jacking is very dangerous when it comes to data theft. Juice jacking is what happens when attackers compromise an unpatched public charging station or internet port with malicious software.

    Once inside, thieves can copy personal data like credit card numbers, names, addresses, Social Security numbers, and phone numbers.

    It is extremely easy to juice jack a public facility because it involves plugging a charger into an unguarded charging station or port, and then waiting for someone else to turn off the power supply. When the power supply is turned back on, the attacker’s malware will begin working on gathering and exfiltrating data.

    Public Charger Safety Tips

    You might have noticed that your wireless router was powered down recently (or that it stopped being accessible), even though it hasn’t been touched. Many companies have added an additional safety feature called “JuiceJack Defense” because of the increase in public charging stations that people use today.

    Unfortunately, these protections only work with certain models of wireless routers and won’t be available on all devices that come from those manufactures. You can also purchase your own Data Blocker such as this USB Data blocker.

    So the next step is to check to see whether your device is a victim of juice hacking, and take steps to stop juice jacks before it gets too far.

    Check to see if your modem has public access controls

    Modems are considered vulnerable to juice jacking for two reasons: First, modems are often designed to automatically reboot or shut down themselves after 30 seconds or 1 minute of non-action, depending on brand. If they don’t automatically shut down, attackers know where to poke around. Second, they often have a web interface that allows them direct access, making them especially susceptible to juice jacks.

    Don’t Leave Equipment Outdoors During Winter Months

    Many manufacturers claim that they have addressed juice jack dangers by limiting power to the ports to avoid damage during extreme weather conditions. Unfortunately, even when they say that the ports cannot be exposed in subfreezing temperatures, people still have left equipment outdoors anyway. Even if a manufacturer isn’t saying that they can’t be exposed to freezing temperatures, it makes sense that people would simply leave the equipment outside for longer periods when bad weather is forecasted.

    Use An Antivirus Appliance On All Computers

    An antivirus appliance can identify juice jacks quickly before they cause physical harm. The best antivirus appliances are updated frequently, use up-to-date software libraries, and regularly scan files that move through the internal network. A good antivirus appliance will also notify you right away if its virus signature database contains a match.

    To summarize this topic, make sure that all computers in your company have appropriate defenses against juice jacks so that people don’t get hurt by their own equipment. Don’t trust public charging stations – keep portable phones, tablets, and laptops locked in your car while plugged into them. Don’t ever plug electronics into a network port that isn’t secured. And finally, don’t ever leave equipment connected to a network port, even if you believe that the manufacturer says it is safe.

    If you have questions or concerns about the security of your devices, please contact us at (919) 469-5060

    Public USB Port and Chargers

  • 4 Reasons Why North Korea’s IT Program Is Dangerous 

    4 Reasons Why North Korea’s IT Program Is Dangerous 

    North Korea has a long history of building nuclear weapons and ballistic missiles. However, the government is now looking to increase revenue for its nuclear weapons and ballistic missile programs by outsourcing IT technicians to other countries.

    North Korea is sending IT workers overseas to raise money for its nuclear weapons and ballistic missile programs, the United States said on Monday.

    Discover why your business needs to avoid hiring these IT technicians at all costs.

    Avoid North Korea IT Technicians

    1. Funding an enemy state

    North Korea is one of the most closed-off countries globally, and it’s tough to get any information out of the country.

    But one of their top priorities is developing cyberattacks to disrupt foreign communications and government programs. And one of the countries that the government spends the most time targeting is the US because of America’s role in the Korean War and the country’s economic and political policies.

    The country’s cyber attacks can be both military and criminal. This includes attacks on foreign governments, businesses, and financial institutions.

    One of North Korea’s significant ways to make cyber attacks happen is sending out malicious software pieces to people on the internet. We do not want any United State dollars funding these types of projects.

    2. Hurting relationships with US Allie’s: 

    North Korea has been a thorn in the side of the world for years. Their nuclear program has made them an international pariah, and the country has spent many of those years building rockets and weapons that threaten to blow up.

    However, that doesn’t mean we should support the country or its leader, Kim Jong-un, for fear of losing access to information. If we do, we are making the mistake of hurting our relationship with our allies. 

    3. Endangering the US and private companies to new, undetected viruses from North Korea

    If North Korea’s cyber security is a concern, the country needs to get its house in order. Of course, that’s not a popular opinion in the United States, but some experts have some insight into the country’s IT infrastructure.

    It’s unclear what type of technology North Korea is running and how much control they have over it. But, these unknown viruses could potentially pose a great risk to the the United States and our businesses.

    4. The possibility of hiring a third party using North Korean services

    North Korea is a dangerous place, but the danger is in the IT realm. If a nation as small as North Korea can hack the U.S., it’s not far-fetched to think about what the likes of China could accomplish.

    If we’re not careful, North Korea could damage the U.S. through cyber-terrorism or the spread of propaganda.

    If you want to protect your business, your government, or your family from a cyber-attack, you need to be vigilant about protecting your data. Hiring a third party can be risky if North Korea is a country that cannot be trusted.

    North Korea's Flag

    In conclusion, Kim Jong-Un has proven that he is a dangerous leader; therefore, other countries should take note of the North Korean nuclear development program. If other countries aren’t careful, North Korea will use its weapons to benefit only the ruling class of North Korea and not the rest of the world. Therefore, other countries will start to see how their governments react to a nuclear attack and think about whether atomic weapons are a viable option. Are you concerned about your business’s security? Please contact us to schedule a Free Network Assessment! 919-469-5060

  • 10 Benefits of IT Support & Solutions for North Carolina Businesses

    10 Benefits of IT Support & Solutions for North Carolina Businesses

    Regardless of if your small or medium-sized business is starting or you’re an established corporation, a proactive IT service & solutions provider will support your company and allow you the freedom of focusing more on growing your business.

    If you are not sure what an IT managed service provider can offer, read on to explore the many benefits of our IT support and solutions consulting to clients across North Carolina.

    What is IT Support & Solutions?

    IT solutions are necessary for the world we’re living in.

    In a technologically advanced world, it’s no surprise that we’ve developed information technology to keep up with our increasingly complex needs.

    From computers and cell phones to cyber security and office phones, IT solutions for your North Carolina business are essential to ensure that these tools can be used effectively and provide their full benefits.

    In the simplest terms, IT solutions are the process of offering assistance with these technological devices when they aren’t working correctly or at all. For example, this could involve repairing a computer or cell phone, fixing up a printer, managing your Microsoft Office 365 email accounts,  troubleshooting software issues, etc.

    Managed IT services consist of outsourcing the responsibility for maintaining and anticipating the need for a range of processes and functions,  for improved operations, and reduced budgetary expenditures by reducing directly-employed staff.

    When you’ve invested in technology like this, it makes sense to have a place you can go for help when you need it. Don’t let your computers and phones become obsolete just because they won’t work right—get them fixed!

    Managed services

    are an alternative to the break/fix or on-demand outsourcing model. The service provider or break-fix model performs on-demand services and bills the customer only for the work done.

    The managed services provider (MSP) is an experienced IT professional who delivers a full range of managed services and solutions to clients requiring this level of support.

    The managed services provider performs on-demand maintenance or other organized service activity the client requires. A negotiated contract is signed between both parties, outlining the work scope and associated performance and quality metrics.

    Business growth using IT support & Solutions

    H2- Benefits of IT Support & Solutions

    If you want to stay up-to-date on technology and have the latest IT solutions, you need to adopt managed services. This is an efficient way to address issues related to cost, quality of service, and risk, and it’s how many SMBs and large corporations are migrating their IT infrastructure components to the cloud.

    Managing day-to-day IT services processes and reducing related costs are enormous burdens for many businesses, so they need experts who can help them out.

    FOCUS ON YOUR BUSINESS. WE MANAGE YOUR TECHNOLOGY.

    IT costs can be a significant drain on your business’s profitability. Below are a few benefits of hiring an expert IT support company in NC to manage your company’s technology.

    1. Predictable & Scalable Spending: Managed IT services allow you to create a predictable and scalable spending plan for your business. For example, instead of investing in expensive hardware, the cost is consolidated into a single, fixed set of costs.

    This means that items like hardware breakdowns, maintenance, and repairs are calculated into your operational budget, so they won’t break the bank when they unexpectedly occur.

    2. Avoid Sunk & Operational Costs: While having an in-house IT team can be convenient and a good fit for some businesses, it brings high sunk costs that don’t add value to the company. Looking at all the operational costs of running an in-house team might surprise you how much money you could save by outsourcing your IT needs.

    You want to focus on the core functions of your business. While hiring an in-house IT staff can help streamline these processes, and it often comes with high costs that are difficult to justify.

    A managed services provider (MSP), on the other hand, is a one-stop solution to everything that falls under IT. It’s a scalable option that allows you to pay only for what you use—a great way to keep your IT costs under control.

    3. Faster Response Time: Your employees are the lifeblood of your company, so they can’t be slowed down by downtime or technical difficulties. Especially during busy times, having 24/7/365 support is necessary to ensure that your team stays productive.

    4. Expertise and Experience: Reduce labor costs: The right technology can be a real-time saver, allowing you to work fewer hours and still get the job done. IT solutions providers will implement your technology and troubleshoot. Taking your employees away from those tasks and allowing them to focus on your core business

    5. Data Compliance Support: Many businesses are expected to meet strict rules and requirements for integration with their IT systems. A few of these are the Family Educational Rights and Privacy Act, the Sarbanes-Oxley Act (SOX), and the Health Insurance Portability and Accountability Act (HIPAA).

    These standards spell out specific guidelines regarding privacy, financial services, retail establishments, and reporting and security in healthcare. While your business may be able to create a team to support these needs, managed IT providers are well-versed with the necessary regulations.

    6. Cyber Security Support When it comes to your business’s security, you can’t afford to be unprepared. Having an up-to-date and comprehensive cybersecurity strategy is essential in the modern world. But managing your security can be a massive headache, and if you don’t stay on top of it, your efforts could be wasted.

    That’s why you need managed security services. With managed security services, you know that you’re getting the latest information about threats and are protected from them 24/7. In addition, you’ll have access to experts who will keep your business safe without having to hire those experts yourself—allowing you to save time and money while increasing your peace of mind.

    7. One Point of Contact to Vendors: Your managed solutions provider will negotiate directly with your IT vendors and act as your single point of contact. A good provider has the leverage to get their clients the best rates on equipment, so you never overpay. In addition, if a situation ever comes up in which an IT vendor experiences an outage or other problem that impacts your business, they know whom to call.

    8. Cut Time to Market: There’s no need to reinvent the wheel—IT management that includes cloud computing can be a huge help. This strategy brings high-speed resources to the table, eliminating IT inefficiencies.

    9. Reduce risk: It’s a fact: every business investment carries a degree of risk.

    You’re dealing with financial conditions and changing technologies, government regulation, and evolving market conditions. All those are entirely out of your control, so it’s hard to be sure about the outcome.

    Most people would agree that risk is inherent in any business venture—that’s how it goes! But you don’t have to settle for uncertainty or hope for the best.

    Outsourcing your IT helps mitigate typical business risks. In addition, you will have experts on hand who know the ins and outs of the entire industry and security and compliance concerns.

    Conclusion!

    Managed IT services have many benefits for businesses in North Carolina. Overall, managed services make it easier for you to expand, update and employ the latest technologies. If you want to know more about the benefits of managed IT services, book an appointment with our team today. Call us today! (919) 469-5060

  • 3 Critical Factors When Choosing an IT Support Company in NC.

    3 Critical Factors When Choosing an IT Support Company in NC.

    Every company needs to have a plan for when things go wrong with their computer systems. IT support companies can be an invaluable asset to any business and help ensure that your system is working correctly and efficiently. When it comes to finding the right IT support company in NC, you need to consider what each company has to offer and how it will benefit your business.

    Now, How Do You Find The Right Fit For Your Company?

    IT support companies can help you save money on computer repair costs and reduce the amount of time you are down due to computer problems. You must hire a reputable IT support company to get the best service. There are many different types of IT support companies in North Carolina. Still, the most common styles include managed service providers MSPs, network administration and network engineering firms, and computer repair shops.

    How do you choose a good IT support company with so many options? It’s not an easy question and often stumps many business owners. If you have an in-house tech staff, we get it—you could keep doing what you’re already doing. But if you don’t have the internal IT department, this is where it gets tricky….you need to find a solution. But how? Most of the information out there tells the wrong story or leaves out key details that could steer you in a different direction. And when you contact local agencies, they’ll ask you what services and packages you are looking for. This can be overwhelming and paralyze rather than empower a business owner to make the right decision.

    Chances are if you are a small to medium-sized business with little to no IT support system you are looking for a Managed Service Provider or MSP. Looking for a way to reduce information technology (IT) costs and increase operational efficiency? You’re in luck: managed services are here to help.

    Managed service providers (MSPs) are organizations that offer a range of business processes and functions, from IT to technology consulting and even website management. For a fixed monthly fee, you have access to these services. It’s a contract-based model that allows you to outsource your services so that you can focus on the more important parts of running you business—like making money.

    With an MSP, you don’t have to worry about hiring or training staff in all areas of your business’ technology needs. Instead, you have access to the experts at your managed service provider’s organization, which will save you time and money while reducing risk and increasing operational efficiency.

    1. Questions You Need To Ask When Making This Decision:

    If you want objective advice on how to improve your technology setup, you need an expert opinion. But how do you find the right company? Here are some things to keep in mind when searching for an IT partner in North Carolina:

    1. Ask questions – How long have they been in business? Are they experienced in your industry? Will they take the time to get to know your business? Do they offer remote monitoring and management services? These are just a few questions you should ask as part of your due diligence process. The more information you gather about potential candidates, the better your organization’s chance of finding a good fit.
    2. Get recommendations – If someone recommends a company, ask them why they like that firm and if there are any doubts

    2. What qualities do you look for in a reliable IT solutions company?

    We’re saying that all the information out there is a bit messy. And in the end, it cannot be easy to find a clear path forward. You aren’t alone if you’re struggling with your current IT provider and don’t know which way to turn. We understand your frustration and are here to help!

    You want a company you trust and can be a partner and an extension of your own business. Here are key indicators of a reasonable IT solutions business when meeting with potential contenders.

    • Proven track record: You interviewed 2-3 of their existing clients, and they are happy with their services and support.
    • They answer the phone when you call! Responsiveness is critical even in the introduction phase of the relationship.
    • They are clear about pricing and don’t have many small hidden fees with their IT support plans.
    • They cover all their bases. This means they care about all of your technology workings and focus not only on specific aspects.
    • They stay up with current tech trends and new products.

    reasonable IT solutions

    3. How Is The Budget Going To Look?

    Feel free to ‘Let your guard down on the price

    Don’t choose a company based on price; choose one that will do the best job. The main thing you must keep in mind when working with an IT support company is that they are there to help. Don’t bend or break their rules or policies just because you want something done a specific way. Instead, work with them and understand whom and how you should contact them for help. By clearly defining all of your needs, support, and solutions, deliver what they promise. Finding an IT support company in NC will be an extensive process because of the many choices.

    North Carolina

    Technology is essential for your business, but it’s not always easy to keep up with the ever-changing world of IT and networking. An Managed IT Service provider company in NC can help you implement a better, more secure network and give you all the technology you need to stay on top of your competition. For business owners choosing the right IT support provider can be intimidating and stressful. Computerbilities is here to guide you along the way. Computerbilities has have been helping businesses throughout the North Carolina Triangle area navigate technology for over 25 years! Call us today for a Free Discovery Call 919-46-5060

  • Empower Your People with Innovative IT Support & solutions.

    Empower Your People with Innovative IT Support & solutions.

    Technology is essential for employee productivity and success in this digital working age. Empowering your employees with the right technology solution is one of the best things you can do for your business. There are quite a few parts to this empowerment: consolidating and simplifying your technology approach, improving business productivity, and preaching digital accountability to your team are just a few ways to give your employees the right resources to work optimally.

    Provide IT Solutions that supports Employees

    Beginning your managed IT support services journey can be overwhelming at first. But it is so important to get organized with your technology and find the right solutions for your business. Teaming up with an IT support company can benefit your technology journey. Traditional or in-house IT support may have enough capacity to cover your systems. Working alongside a technology firm and implementing these changes will significantly improve your technology stack.

    Consolidate And Simplify Your Approach: it’s clear that employees waste a lot of time and money on different software programs. For instance, if employees use email to communicate internally, they could be using Microsoft Dynamics CRM for lead management, Microsoft Exchange for scheduling meetings, Microsoft Remote Desktop for accessing shared files over the internet, and Lync for collaboration. The list can go on and on. If you consolidate and simplify your IT solutions, you will be in a better position.

    Implement one system that serves as a one-stop-shop for multiple functions. To identify the right approach, take a bottom-up approach: Survey your employees to determine which tools they enjoy using the most. Ask them what they like about each device. Then, select a system that mimics the tools they prefer to use. This strategy ensures they too will buy into your vision and use the new technology.

    Business Productivity/Online Training: Business productivity has become a huge buzzword. However, it’s surprising how many people are not produced in their roles. This is because it’s easy to fall into a routine and not be aware of what you’re doing. It’s also challenging to take the time to do things that will help you improve your business productivity.

    The good news is that some simple tips and tricks can help you boost your business productivity. The first step is to list everything you need to do every day to run your business effectively. Then, write down what steps you must take each day to accomplish those tasks. This way, you’ll be able to see exactly where your day goes and what areas could use more attention.

    You’ll also want to make sure that you take advantage of online tools for business owners. These include scheduling software and other tools such as Google Calendar, which can help keep track of appointments and meetings, so they don’t get missed. Using these platforms often requires focused sessions of training and organization to work optimally for your team.

    Finally, it’s essential to stay on top of your finances by using accounting software or an online service like QuickBooks Online or Quicken to know how much money you’re spending on various aspects of your business operation.

    Preach Digital Accountability To Your Team. Why Digital Accountability Matters: Digital accountability is about building trust by taking responsibility for your digital products, services, and practices. By committing to transparency and ethical practices, you create a foundation for the people who interact with your digital presence to trust you. Trust is the most significant currency online, so if you want to succeed in our increasingly digital world, you must understand why digital accountability matters.

    People prefer to work for, buy from, and invest in companies that act responsibly in today’s world. This means that companies must focus on integrating responsible practices into their operations. While this may have traditionally been focused on environmental or social responsibility factors, these days, it also encompasses being accountable for your digital products and services.

    By integrating responsible practices into the way you conduct business digitally, those who interact with your brand will be more likely to feel confident, leading to increased sales, higher employee retention rates, and better investor relations outcomes.

    Digital-Accountability

    What’s Next? Get the Right IT Support for Your Business!

    You might already know how important it is to have adequate IT support for your business—but are you getting the proper support? How do you compare with industry standards, and how can you improve?

    • Connect to an IT Support & solution Expert You might already know how important it is to have adequate IT support for your business—but are you getting the proper support? How do you compare with industry standards, and how can you improve?
    • Consult with an IT Solutions Company: Find an IT Solutions Company, to help you navigate the tech side of your business. Many companies provide complete technology solutions. This means they cover everything from Web Design to cyber security services.

    Still Your Business Need Innovative IT Support?

    If your business is anything like ours, it demands a flexible solution with the latest technology, expert staff, and proactive monitoring. We know that every business has specific needs, so we offer complete IT support tailored to your business goals. Our IT services extend from network administration to wireless connectivity and local productivity solutions to cloud-based backup. Our focus on customer needs means that you only pay for your business’s IT services genuinely required. We’re here to help you do more with less, and we believe that starts with empowering you with the information you need to take on your tech problems yourself. We can do that if you want us to tackle a project for you too! Call us to schedule a 1 hour Discovery Call at 919-469-5060

  • Sick And Tired Of The Robo Scam Calls – Heres The Solution

    Sick And Tired Of The Robo Scam Calls – Heres The Solution

    Who else gets 5-10 spam calls a day? Many phone carriers have been able to start detecting these incoming calls and label their caller Id as “Scam Likely,” but often they cannot detect who is calling. These spoof callers have been able to call from area codes familiar to your area or match your area code to get through.

    These calls get to be downright frustrating, and if you accidentally pick up once, it’s all over. You get about as twice as many that day. I looked up what to do about this, and thankfully the government has gotten involved.

    The FCC has started confronting these attackers by allowing you to file a complaint against the caller, enable call blocking tools, and giving you the following tips to prevent yourself from being spoofed.

    Here are a few other ways the FCC suggests taking action against them(2020):

    • Put your mobile and landline numbers on the national Do Not Call Registry. Visit donotcall.gov
    • or 1-888-382-1222 from the number you want to register.
    • Research apps, services or devices that help block unwanted calls.
    • Don’t answer calls from unknown callers. That could verify you have an active line.

    Following these guidelines can significantly reduce the calls and prevent fewer in the future.

    To learn more tips and tricks, visit the FCC’s website!

    https://www.fcc.gov/consumers/guides/stop-unwanted-robocalls-and-texts

    Continuing to respond to these calls and solicitations can put you at risk for giving up your information. Reframe from all contact with the spammers because you never know what they can steal from you. If you feel that your data has already been stolen. Computerbilities provides cyber security services to businesses in the Raleigh, NC area and can do a no-obligation Dark Web Scan to see if any of your information has been posted on the Dark Web. Contact us today to schedule yours!

    Stop Unwanted Robocalls and Texts. (2020, October 13). Retrieved February 01, 2021, from https://www.fcc.gov/consumers/guides/stop-unwanted-robocalls-and-texts

  • Why Touchless Tech Is-Going To Be Hot In 2022

    Why Touchless Tech Is-Going To Be Hot In 2022

    In the world of COVID-19 and the need to continually sanitize everything, there is a growing demand for technology to be even more accessible. Even without the touch of a button.

    Looking back before 2020, we wouldn’t think twice about the sanitation of public water fountains, tasting each other’s food, or even simply shaking someone’s hand.

    However, this COVID-19 pandemic has made the entire population aware of these unsanitary flaws in the system; eliminating many of these unsanitary practices will be something we see in the future.

    iPhone face scanners and touchless toilets were once considered highly advanced technology. They may be a feature included in even more products we see more of in 2022 and beyond as the world adapts to a contact-free lifestyle.

    These types of devices’ growing popularity will catapult a need for more advanced sensors and product development. Voice devices are also considered a category of touchless devices; the most popular devices are Apple’s Siri, Google’s Home Assist, and Amazon’s Alexa (2021).

    These devices’ popularity has resulted in many more manufacturers implementing touchless tech everywhere they can. However, there are some risks and concerns with this new tech.

    1. Security is a growing concern with voice devices. There have been numerous accounts of privacy violations relating to Amazon’s Alexa back in 2019. We still must be careful with the other hidden settings and disclosures in other voice-activated devices(2019). You never know who’s listening.
    2. Product failure is another risk that can be hazardous and inconvenient if your devices don’t work as planned. For example, a self-driving Tesla has a mechanical issue, then boom, a life-threatening accident, your Alexa records a nasty conversation you are having about someone and then sends it to them; yikes! The possibilities are endless for these errors. Big or small, they can cause quite a disruption!
    3. Bankruptcy for specific markets that do not adapt to the modern tech world is a reason for concern. What about shopping malls? People love to shop, but with Amazon Prime’s ease, shopping is touchless and extremely simple for the consumer. According to an estimate made by Green Street Advisors, more than half of stores in malls will be closed by the end the 2021 (Rey, 2020).

    We are entering a new age of technology; while this isn’t all bad, we must figure out how to adapt.

    What is a touchless device that you would like to see in 2022?

    Or want Computerbilities advice? We have worked with technology for small-medium-sized businesses in Raleigh, NC, with their IT support for more than 25 years. Contact us today to get a free network assessment and get our input on the best technology that fits your company’s needs!

    (2021, January 21). Retrieved from https://www.irishtimes.com/business/technology/hands-off-covid-19-is-fuelling-a-boom-in-touchless-technology-1.4462387.

    ‘Alexa, are you invading my privacy?’ – the dark side of our voice assistants. (2019, October 09). Retrieved January 22, 2021, from https://www.theguardian.com/technology/2019/oct/09/alexa-are-you-invading-my-privacy-the-dark-side-of-our-voice-assistants

    Rey, J. (2020, November 30). The death of the department store and the American middle class. Retrieved January 22, 2021, from https://www.vox.com/recode/21717536/department-store-middle-class-amazon-online-shopping-covid-19

  • Shocking Paypal Facebook Marketplace Scam Dont-Purchase Online Until You Know These 3 Things

    Shocking Paypal Facebook Marketplace Scam Dont-Purchase Online Until You Know These 3 Things

    Online shopping is blowing up the internet, now more than ever before, and we all know why! This pandemic has crippled the traditional shopping trends, and now Cyber Monday may be the biggest sale of the year.

    Not only do major retailers put their items on sale, but individual retailers and secondhand shops will also most likely have their deals as well.

    The Facebook marketplace has grown in considerable popularity in the last couple of years as a substantially accessible pathway for individuals to sell their used or specialty goods.

    Buying items through Facebook is often very affordable and accessible when the seller is local. But sadly, like every other enjoyable experience in life, there have been those who take others’ vulnerability to their advantage to make a profit.

    Don’t Purchase or Sell Through Any Online Platform Until You Know These 3 Things:

    1. Make sure the seller or buyer is credible, and they are correctly using the platform (Facebook Marketplace has their messaging system to keep track of transactions and conversations. If they message you outside of this system, it is an instant RED FLAG)
    2. The payment method they would like to use is not popular or is not lining up with PayPal or Venmo’s policy (see below to read more about how Paypal is getting compromised).
    3. They overpay you, or the seller wants too little for the product; this is often one of the biggest mistakes the scammers make!

    What is Paypal Scam on Facebook?

    A PayPal scam on Facebook is a type of online scam that uses the popular payment platform PayPal to trick unsuspecting users into sending money or personal information to the scammer. The scam typically begins with a message from the scammer, who may pose as a friend or family member, asking for money for an emergency or other reason. The scammer may also send a link to a fraudulent website that looks like the real PayPal website. If the user clicks on the link, they will be asked to enter their personal information, such as their credit card number or bank account information. The scammer will then use this information to steal the user’s money or identity.

    There are a few things you can do to protect yourself from PayPal scams on Facebook:

    Only accept friend requests from people you know in real life.

    Be wary of any message or request from a stranger who claims to need money for an emergency.

    Never click on links in messages from people you don’t know.

    If you’re unsure whether a website is legitimate, look for the “https://” in the URL and make sure the website is secure.

    Never enter your personal information on a website that you don’t trust.

    If you think you may have been scammed, you should report it to PayPal and your bank immediately. You should also change your passwords and monitor your accounts for any suspicious activity.

    Here are some examples of PayPal scams on Facebook:

    The scammer sends a message to a user claiming to be from PayPal. The message says that the user’s account has been suspended and that they need to provide their personal information, such as their credit card number or bank account information, to verify their identity.

    The scammer sends a link to a fraudulent website that looks like the real PayPal website. If the user clicks on the link, they will be asked to enter their personal information. The scammer will then use this information to steal the user’s money or identity.

    The scammer creates a fake PayPal account that looks like the real PayPal account. The scammer then sends a message to a user asking them to send money to the fake account.

    If you receive a message or link from someone you don’t know, be very careful before clicking on it or providing any personal information. If you’re unsure whether something is legitimate, it’s always best to err on the side of caution and not click on anything or provide any information.

    How Does facebook Marketplace Scam Works?

    Facebook Marketplace is a popular online marketplace where people can buy and sell items. However, it is also a popular platform for scammers to operate. There are a number of different scams that can occur on Facebook Marketplace, but some of the most common include:

    Fake listings: Scammers will create fake listings for items that are in high demand, such as electronics or furniture. The listings will often be priced below market value to attract buyers. Once a buyer expresses interest, the scammer will ask them to pay for the item through a wire transfer or other untraceable payment method. The scammer will then disappear with the money and never deliver the item.

    Overpayment scams: Scammers will offer to pay more than the asking price for an item. Once the buyer agrees to sell the item, the scammer will send a fake check or money order. The check or money order will initially appear to clear, but it will eventually bounce. When this happens, the buyer will be out the item and the money they sent to the scammer.

    Shipping scams: Scammers will ask buyers to ship items to them before they have paid for them. Once the buyer ships the item, the scammer will disappear with the item and never pay for it.

    Fake profiles: Scammers will create fake profiles that look like real people. They will then use these profiles to contact buyers and sellers and try to scam them out of money.

    There are a few things you can do to protect yourself from scams on Facebook Marketplace:

    Only buy from people you know and trust: If you don’t know the person you’re buying from, do some research on them before you make a purchase. You can look at their profile to see if they have any reviews or if they’ve been involved in any scams in the past.

    Never pay for an item before you see it in person: This is especially important for high-value items. If you can’t see the item in person, there’s a good chance you’re being scammed

    Meet in a public place: When you meet to buy or sell an item, do it in a public place where there are other people around. This will help to deter scammers and make it easier for you to get help if something goes wrong.

    Use a secure payment method: When you pay for an item, use a secure payment method like PayPal or a credit card. This will give you some protection if you’re scammed.

    If you think you may have been scammed on Facebook Marketplace, you should report it to Facebook. You should also contact your bank or credit card company and file a fraud report.

    How can you spot a Paypal scammer on Facebook?

    Here are some tips on how to spot a PayPal scammer on Facebook:

    Be wary of any message or request from a stranger who claims to need money for an emergency. Scammers often pose as friends or family members in need of help. If you receive a message from someone you don’t know asking for money, be very careful before sending anything.

    Never click on links in messages from people you don’t know. Scammers often use links to fraudulent websites that look like the real PayPal website. If you click on a link and enter your personal information, the scammer can steal your money or identity.

    If you’re unsure whether a website is legitimate, look for the “https://” in the URL and make sure the website is secure. The “https://” indicates that the website is secure and that your information is protected.

    Never enter your personal information on a website that you don’t trust. This includes your credit card number, bank account number, or Social Security number.

    If you think you may have been scammed, report it to PayPal and your bank immediately. You should also change your passwords and monitor your accounts for any suspicious activity.

    Here are some examples of PayPal scams on Facebook:

    The scammer sends a message to a user claiming to be from PayPal. The message says that the user’s account has been suspended and that they need to provide their personal information, such as their credit card number or bank account information, to verify their identity.

    The scammer sends a link to a fraudulent website that looks like the real PayPal website. If the user clicks on the link, they will be asked to enter their personal information. The scammer will then use this information to steal the user’s money or identity.

    The scammer creates a fake PayPal account that looks like the real PayPal account. The scammer then sends a message to a user asking them to send money to the fake account.

    If you receive a message or link from someone you don’t know, be very careful before clicking on it or providing any personal information. If you’re unsure whether something is legitimate, it’s always best to err on the side of caution and not click on anything or provide any information.

    How can you protect yourself from Paypal Scams on Facebook?

    Here are some tips on how to protect yourself from PayPal scams on Facebook:

    Only accept friend requests from people you know in real life.

    Be wary of any message or request from a stranger who claims to need money for an emergency. Scammers often pose as friends or family members in need of help. If you receive a message from someone you don’t know asking for money, be very careful before sending anything.

    Never click on links in messages from people you don’t know. Scammers often use links to fraudulent websites that look like the real PayPal website. If you click on a link and enter your personal information, the scammer can steal your money or identity.

    If you’re unsure whether a website is legitimate, look for the “https://” in the URL and make sure the website is secure. The “https://” indicates that the website is secure and that your information is protected.

    Never enter your personal information on a website that you don’t trust. This includes your credit card number, bank account number, or Social Security number.

    If you think you may have been scammed, report it to PayPal and your bank immediately. You should also change your passwords and monitor your accounts for any suspicious activity.

    Here are some additional tips to help you protect yourself from PayPal scams on Facebook:

    Keep your software up to date. Software updates often include security patches that can help protect you from scams.

    Use a strong password for your PayPal account. Your password should be at least 8 characters long and include a mix of letters, numbers, and symbols.

    Enable two-factor authentication for your PayPal account. Two-factor authentication adds an extra layer of security by requiring you to enter a code from your phone in addition to your password when logging in.

    Be aware of the latest scams. Scammers are constantly coming up with new ways to steal money from people. It’s important to stay informed about the latest scams so you can avoid them.

    By following these tips, you can help protect yourself from PayPal scams on Facebook.

    More About The Paypal Scam:

    Paying through Paypal is one of the most reliable forms of online payment there is. They are incredibly secure, but the hackers use a very well-formatted email that looks like it’s coming from PayPal.  The Hacker’s goal in this example is to get your product without paying for it.

    When you pay with PayPal, you can easily find the recipient by looking up the shipper’s email. The hackers use this to their advantage, asking for your email and name on the account. They then compose an email that appears to be sent by PayPal.  However, it doesn’t appear in your app until the product has shipped, and there is proof of shipment.

    Look carefully at the sender information in this email. It says it’s from Paypal.com, but look again; it is actually from Shipmenttrackingproof@post.com, which is not affiliated with PayPal at all.  A legitimate payment will always send emails from service@paypal.com.

    Paypal-Scam-email

    Now let us look at the full body of the email:

    Paypal-Scam-email-body

    Paypal-Scam-email-footer

    This seller would have paid the shipping cost for the scammer to steal the item! Now that is adding an insult to injury!

    While the scammers may have pulled this email template from a legitimate email that  PayPal uses, always check the three warning signs listed above before purchasing anything online.

    Have you been compromised? Contact Computerbilities for a Free no Obligation Dark Web Scan!

    https://www.computerbilities.com/dark-web-scan/

  • Scammers Are Getting Smarter And Even Targeting It Professionals

    Scammers Are Getting Smarter And Even Targeting It Professionals

    Scams are becoming a worldwide issue nowadays! Individuals go years or even their whole lives without realizing that they were a victim of a scam.

    Sadly, many discover too late that their information was previously compromised, after realizing that their bank account’s now drained or personal identity’s been stolen.
    But It’s not every day that one of our very own technicians can become a scammer’s target. Of course, the scammer didn’t know who he was calling!

    The other day our technician Chase brought up that he had gotten a sketchy phone call from a local number claiming his Apple ID was corrupted. The caller had asked to gain access to his computer to do a “network scan” to make sure there weren’t any unwanted devices.

    The caller then gave Chase an ID number and said that he would show their Apple Certificate to verify their identity once he gained access to his computer. Then he asked him for the payment of one $500 Google Play card and Five $100 iTunes Cards and said that it would be refunded in a given time.

    The caller realized that Chase was onto him and hung up. But OHH.. he really thought he was about to earn some big $$.

    Warning Sign #1: Apple will not call you if you are having an issue with an Apple ID.

    Warning Sign #2: The caller didn’t call from an 800 number (or known Apple number); instead, they used a spoofed number local to the area.

    Warning Sign #3: Payment in the form of a gift card is always a huge red flag that you are about to get scammed.

    These scams are commonly conducted through sites such as FastSupport.com or other legitimate remote access software, leading the victim to believe they are being helped.

    Usually, the scammer’s purpose is to gain access to your computer, promising to scan or fix a problem that you may have on your computer.

    In most cases, they will call you from a local number (like in Chase’s case), or you will see a type of popup/lock screen on the computer asking to call a “support technician” to fix your alleged issue. They will often claim that they are calling from Microsoft and attempt to portray themselves as legitimate as possible.

    Believe me, Microsoft will not be calling you to fix a problem unless you have contacted them first!

    Reading this article, you may now think, “well, now I know” or “I am too smart for this to happen to me,” but be careful thinking such things; these scammers are constantly changing their tactics and methods to get through to the most people they can.

    If you would like more detailed information on these types of scams, please read this article by Sensor Tech Forum (https://sensorstechforum.com/fastsupport-com-scam/).

    If you believe that you have been the victim of a Fastsupport.com scam or any other scam type, please contact a local IT Company in your area to get help.

    Computerbilities is offering FREE Dark Web Scans! See if your information or the information of a loved one has been compromised in a matter of seconds.

    https://www.computerbilities.com/dark-web-scan/

    Mihailov, T. (2020, May 20). FastSupport.com Scam – What Is It? (Update May 2020). Retrieved November 05, 2020, from https://sensorstechforum.com/fastsupport-com-scam/

  • Why Your Password Is Hackable Why Passwords Are The Foundation Of Computer Security

    Why Your Password Is Hackable Why Passwords Are The Foundation Of Computer Security

    The passwords we use secure our identity, and treasured belongings can be potentially harmed if these credentials become compromised.

    As technology advances, so does the need for strong, complex passwords. Multi-factor authentication is another security step commonly used to advance security.

    How do you create secure passwords and keep them safe?

    There are multiple answers to this question.

    Until recently, passwords were “good passwords” if they had six to eight characters.

    Use Entropy, Don’t Make Your Password Predictable

    Now we gauge password strength by the measure of predictability, also known as entropy (Weaver, C. 2016, January 19).

    Using this strategy allows the user to break down their password by the likelihood it will be guessed. The more complex the password is, the harder it is to guess. An example of a good password includes a mix of upper and lowercase letters, symbols, and numbers.

    Adam Pittman of Computerbilities recommends passwords should be at least 12 to 16 characters and changed at least every 90 days.

    Passphrases Are Easier To Remember

    When you have multiple passwords logging into critical accounts daily, remembering such long/ complex sequences of letters can be challenging and time-consuming. To create easy to remember and complex secure passwords. Start with a sentence you will remember and add numbers and symbols that correlate to the sentence. A great example would be:

    Lucylovesbagels,4dinnner$

    Using this formula to create a password is also known as a passphrase. Create secure and complex passwords can take time to master, so don’t stress if you don’t create the perfect one the first time.

    Password Managers Simplify Many Complex Passwords

    Now that you’ve created that password, I am sure you will need to make more for the many accounts that you have. Even with password creation strategies such as passphrases, there are still many passwords you will have to remember. This is where password managers come into play.

    Password managers such as Passportal make it easy to keep passwords in a secure vault and accessible to each user in the company. It’s almost impossible to remember all your passwords without a password manager.

    Want to learn more about good password creation and get some advice from the experts? Watch this live stream conducted by nine technology experts across the United States:

    Don’t have time to watch the video? Schedule a call with Cybersecurity Expert and Computerbilities President Adam Pittman to discuss any of your password questions or concerns. Email apittman@computerbilities.com to request your call.

    Weaver, C. (2016, January 19). A Somewhat Brief Explanation of Password Entropy. IT Dojo.

  • Nigerian Billionaire Influencer Arrested With 431 Million Scammer Fraud

    Nigerian Billionaire Influencer Arrested With 431 Million Scammer Fraud

    38-year-old Raymond Abbas, also known as Hushpuppi, by his Instagram handle, has been arrested for funding his extravagant lifestyle through hacking scams, mainly targeted all through Europe, Nigeria, and the United States. The most common scamming tactics that he used were:

    • Business email phishing scams
    • Money Laundering
    • Computer hacking (CNN,2020)

    Abbas would in no way shy away from flaunting his enormous wealth.  He would often post photos showing his 2.5 million Instagram followers his many designer clothes, luxury jets, and fancy cars. For all of this, he accredited to as being a successful real estate investor (Salo 2020). His Instagram latest post reading:

    “May success and prosperity not be a “once upon a time” story in your life… ?. Thank you lord for the many blessings in my life ?? continue to shame those waiting for me to be shamed”

    Scammer-Fraud

    Investigators ironically connected Abbas’ crimes to his social media accounts. On his Instagram, Abbas had a phone number, and email saved that connected authorities to the trace of large cash amounts being transferred (CNN 2020).

    Snapchat, Apple ID, and birthday celebration posts also gave him away, further confirming his identity and connections to other suspects.

    According to a source, Abbas had been sending a partner in crime his Romanian bank account information, which was explicitly for his vast sums of cash, while he used his Dubai bank account for deposits he would receive from his hacking scams in the United States (CNN 2020).

    In June, Abbas was arrested in his apartment in Dubai by the United Arab Emirates, later to be given over to the FBI flying to Chicago on July 2. He is to be transferred and then tried in Lost Angeles to face his alleged cyber-crimes (CNN, 2020).

    Unfortunately, Raymond Abbas is only one of the many hackers that make a living by preying after the public through their scams.

    The first step to take so you won’t be the victim is to educate yourselves and others around you on proper internet etiquette!

    IT companies exist to create proper security and precautions for their businesses to follow to prevent these scams. Contact a local IT company in your area to make sure that your cybersecurity solutions are up to date, and you have the right procedures in place in case there was an attack on your business!

    It is much better to be safer than sorry! Especially when there are thousands, maybe even millions of dollars at stake! Contact Computerbilities for a FREE Dark Web Scan! (919)276-0282

    Sources:

    CNN, J. (2020, July 12). He Flaunted private jets and luxury cars on Instagram. Fed used his post to link him to alleged cyber crimes. Retrieved July 14, 2020, from, https://abc17news.com/news/national-world/2020/07/12/he-flaunted-private-jets-and-luxury-cars-on-instagram-feds-used-his-posts-to-link-him-to-alleged-cyber-crimes/

    Salo, J. (2020, June 29). Nigerian Instagram star known as Hushpuppi busted in $431M cyber scam. Retrieved July 14, 2020, from , https://nypost.com/2020/06/29/nigerian-scammer-known-as-hushpuppi-busted-in-431m-scam/

  • The Black Box A Windows 10 Problem

    The Black Box A Windows 10 Problem

    We are not only a company that provides assistance with business’s IT systems and functionality, we also can help you understand isolated issues!

    THE WINDOWS 10 DILEMA

    This past week we got a lot of questions regarding an issue with Windows 10. Many people contacted us saying that the search menu on their Windows 10 computer would stop working out of the blue and would show a grey blank screen if you tried to get back to any home screen, a blank search screen would show.

    Below is an example of a screen shot somebody took with this problem:

    We heard your complaints! And we have information!

    The Explanation

    Don’t fret! You haven’t done anything wrong! If you haven’t yet, reboot your system and try the search again. If that doesn’t work, hang in there! Microsoft is undergoing some system changes that is causing problems with a lot of their products.

    They didn’t hack into your system and change it all, but their systems are all interconnected and their switching of systems has caused issues for many Windows owners. The simple answer: Windows broke their search function, and you’ve sadly been affected.

    The long answer is more complicated. Search software takes a lot of memory on a computer’s hard drive. One click on the search function will automatically take up over 120 MB of capacity.

    It takes up so much memory because many different apps and software are included. In the mix of these is mostly JavaScript and React, and the combination of the two is just proving to be too much for some Windows systems to handle at once.

    If you find you or your business having problems like this often, tell us! We are IT experts at Computerbilities and we are willing and able to help!