Home
About
Contact Us

Home>blog
Tue, 15 May 2018/

Think before saving logins to your browser

There are a number of reasons you should be wary of saving your password to a digital platform. Just look at Yahoo’s data breach in 2013, which leaked passwords for three billion people. Even when your password isn’t compromised, saving it to a browser could have serious implications for your privacy. Why auto-fill passwords are so dangerous In 2015, the average internet user had 90 online accounts, a number that has undoubtedly grown since then. This has forced users to create dozens of passwords, sometimes because they want to practice healthy security habits and other times because the platforms they’re using have different password requirements. Web browsers and password manager applications addressed this account overload by allowing usernames and passwords to be automatically entered into a web form, eliminating the need for users to hunt down the right credentials before logging in. The process of tricking a browser or password manager into giving up this saved information is incredibly simple. All it takes is an invisible form placed on a compromised webpage to collect users’ login information without them knowing. Using auto-fill to track users Stealing passwords with this strategy has been a tug-of-war between hackers and security professionals for over a decade. However, it has recently come to light that digital marketers are also using this tactic to track users. Two groups, AdThink and OnAudience, have been placing these invisible login forms on websites as a way to track which sites users visit. These marketers made no attempts to steal passwords, but security professionals said it wouldn’t have been hard to accomplish. AdThink and OnAudience simply tracked people based on the usernames in hidden auto-fill forms and sold that information to advertisers. One simple security tip for today Turn off auto-fill in your web browser. It’s quick, easy, and will go to great lengths to improve your account security. If you use Chrome - Open the Settings window, click Advanced, and select the appropriate settings under Manage Passwords If you use Firefox - Open the Options window, click Privacy, and under the History heading select “Firefox will: Use custom settings for history.” In the new window, disable “Remember search and form history.” If you use Safari - Open the Preferences window, select the Auto-fill tab, and turn off all the features related to usernames and passwords. This is just one small thing you can do to keep your accounts and the information they contain safe. For managed, 24x7 cybersecurity assistance that goes far beyond protecting your privacy, call Multi IT on 011 435 0450 today.
VIEW MORE
Thu, 14 Jun 2018/

Google Drive improves comment feature

Google recently launched a new feature on Google Drive that will improve collaboration. Users can now use a combination of Microsoft Office and G Suite while working with their teammates and clients. This update allows them to conveniently comment on Office files, images, and PDFs in the ‘Preview’ pane of Drive. Learn how you can take advantage of this new feature. To reduce the hassles Google Drive allows your team to seamlessly share files in the cloud and work on the go. The tech giant knows that businesses require all types of tools and files to finish certain tasks and responsibilities efficiently. This is why they eliminated the stresses of converting a document into a G Suite equivalent file just to allow commenting. To ease your responsibilities Google decided to enable comments directly on Microsoft office documents, images, and PDFs without any need for conversion. This is particularly helpful when you’re working with another firm, negotiating a sales transaction with a supplier, or discussing a contract with a customer. In each case, you'd likely deal with different file formats. To improve collaboration The most recent update allows you to comment on various file formats in Google Drive, akin to how you do it in Google Docs. In Drive’s ‘Preview’ pane, you can assign tasks, mention colleagues, or add notes, and your team will be able to respond even if they don’t use G Suite. For instance, when one of your colleagues opens an MS Word document on a Windows computer, he or she will automatically see the comments you added and have the chance to respond to it. Commenting on the ‘Preview’ pane won’t require you to open other applications or browsers just to finish your task. Instead, you can just open documents in its preview form, provide feedback, and get back to work. Every now and then, Google releases new features on their host of tools and applications -- and it’s always for your benefit. Make sure you take advantage of these upgrades by regularly updating your G Suite. If this sounds too technical for you, or you really don’t have enough time to stay up to date, don’t hesitate to give Multi IT a call on 011 435 0450. It is always our pleasure to help you reach your bottom-line in any way that we can.
VIEW MORE
Wed, 13 Jun 2018/

The importance of HTTPS

Very few internet users understand the meaning of the padlock icon in their web browser’s address bar. It represents HTTPS, a security feature that authenticates websites and protects the information users submit to them. Let’s go over some user-friendly HTTPS best practices to help you surf the web safely. HTTPS Encryption Older web protocols lack data encryption. When you visit a website that doesn’t use HTTPS, everything you type or click on that website is sent across the network in plain text. So, if your bank’s website doesn’t use the latest protocols, your login information can be intercepted by anyone with the right tools. HTTPS Certificates The second thing outdated web browsing lacks is publisher certificates. When you enter a web address into your browser, your computer uses an online directory to translate that text into numerical addresses (e.g., www.google.com = 8.8.8.8) then saves that information on your computer so it doesn’t need to check the online directory every time you visit a known website. The problem is, if your computer is hacked it could be tricked into directing www.google.com to 8.8.8.255, even if that’s a malicious website. Oftentimes, this strategy is implemented to send users to sites that look exactly like what they expected, but are actually false-front sites designed to trick you into providing your credentials. HTTPS created a new ecosystem of certificates that are issued by the online directories mentioned earlier. These certificates make it impossible for you to be redirected to a false-front website. What this means for daily browsing Most people hop from site to site too quickly to check each one for padlocks and certificates. Unfortunately, HTTPS is way too important to ignore. Here are a few things to consider when browsing: If your browser marks a website as “unsafe” do not click “proceed anyway” unless you are absolutely certain nothing private will be transmitted. There are web browser extensions that create encrypted connections to unencrypted websites (HTTPS Everywhere is great for Chrome and Firefox). HTTPS certificates don’t mean anything if you don’t recognize the company’s name. For example, goog1e.com (with the 'l' replaced with a one) could have a certificate, but that doesn’t mean it’s a trustworthy site. Avoiding sites that don’t use the HTTPS protocol is just one of many things you need to do to stay safe when browsing the internet. When you’re ready for IT support that handles the finer points of cybersecurity like safe web browsing, give Multi IT a call on 011 435 0450.
VIEW MORE
Mon, 11 Jun 2018/

Tech support scam alarms Chrome users

With evolving technology comes evolving threats. Recently, a researcher revealed that a new type of scam freezes Google Chrome and tricks users into believing that their network security has been compromised. Little did they know that following instructions listed on the screen will lead to an actual security breach. The End Game The scam works by displaying an error message indicating a bogus security breach incident that renders a browser unusable. These scammers capitalize on the fact that a serious crash can't be solved by simply closing the site, thereby sending the users into a panic. This encourages them to dial the number listed on the warning message. On the other end of the line, the scammers would pose as Microsoft or Apple representatives to convince users into surrendering their credit card details to repair a non-existing security issue. The scams are generally carried out through legitimate sites or malicious ads that have been hacked. The Ingenious Process This new scam operates against Chrome by corrupting the window.navigator.msSaveOrOpenBlobprogramming interface, which basically uses it as a form of distraction. The hackers manipulate the browser and forces it to save a random document on a disk repeatedly at super fast intervals that are impossible to notice. After five to 10 seconds, Chrome will be completely unresponsive. The Easy Fix To recover, Windows users simply have to open Windows Task Manager (press ctrl + shift + esc keys) and stop the process there. On the other hand, macOS users just need to wait until a system message prompts them to close the unresponsive Chrome tab. Typically, the latter is a more appealing option since users would have the freedom to close only the corrupted page. Manually closing the whole browser means possibly losing unsaved files in any open Windows. When faced with IT-related issues, you need to determine how you can approach them calmly. The threats in the digital world may be terrifying and intimidating, but causing a panic in your workplace isn’t the answer. Call Multi IT on 011 435 0450 as soon as any problems arise, and we’ll help you as soon as we can. We can even hook you up with other security measures to beef up your network security.
VIEW MORE
Tue, 12 Jun 2018/

Tips for using Outlook more efficiently

Outlook is arguably the best tool that businesses use to manage their email, set up meetings, and coordinate projects. It's much more than a basic email program and includes features that help you organize your work, contacts, and business communications. Let's take a look at a few tips you may have missed. Clean Up your inbox No matter inbox how meticulously organized your Outlook inbox is, there's always room for improvement. For a little computer-assisted help, try the 'Clean Up' feature. From your Inbox, click the Home tab and choose from Outlook’s three Clean Up options: Clean Up Conversation - Reviews an email thread or a conversation and deletes redundant messages. Clean Up Folder - Reviews conversations in a selected folder and deletes redundant messages. Clean Up Folder & Subfolders - Reviews all messages in a selected folder and its subfolder, and deletes redundant messages in all of them. Ignore (unnecessary) conversations An overstuffed inbox is often caused by group conversations that aren't relevant to you. The Ignorebutton helps you organize your inbox and focus on relevant emails. Select a message, then click Home > Ignore > Ignore Conversation. You can also do this by opening a message in a new window and clicking Ignore under the Delete function. To recover an ignored message, go to the Deleted Items folder, and click Ignore > Stop Ignoring Conversation. Send links instead of a file copy Help your colleagues save storage by sending a link to a cloud version of a file instead of the file itself. This is particularly useful when sending massive files. You can also set permissions to allow recipients to edit and collaborate on linked files in real time. Upload the file you wish to send on OneDrive and send it to your recipients. From the message box, click Attach File > Browse web locations > OneDrive. Improve meetings with Skype and OneNote Outlook allows you to combine Skype's HD video and screen-sharing features with OneNote's organizational and project planning functions. It’s easy: Go to the Meeting tab in Outlook, then click Skype meeting and send the link to participants. After the meeting has started, select Meeting Notes (under the Meeting tab) and choose whether you want to Take notes on your own or Share notes with the meeting. Tag contacts To get the attention of a specific person in a group email message, use the @Mention function. This works particularly well for mails to multiple recipients or for if you simply want to convey the urgency of your message. In the email body or meeting request, type the ‘@’ symbol followed by the first and last name of the person you wish to tag (e.g., @firstnamelastname). To search for emails you're tagged in, select Filter Email from the Home tab and choose Mentioned, then choose Mentioned. These are just a few strategies for getting more out of Microsoft's email platform. To unlock Outlook's true potential, you need the support of certified IT professionals. Give Multi IT a call on 011 435 0450 today.
VIEW MORE
Fri, 08 Jun 2018/

Are hackers using your PC to mine Bitcoin?

Cryptocurrencies like Bitcoin and Monero are so popular because they’re secure and potentially worth thousands of dollars. But investors and consumers aren’t the only ones interested in them. Hackers are using malicious tactics to steal cryptocurrency, and they’re doing it with something called cryptojacking. Hijacked hardware Cryptojacking secretly uses your computer to calculate complex mathematical problems to generate cryptocurrency. They get inside by using phishing emails to lure victims into clicking on a link, which then runs malicious cryptomining programs on the computer. Any cryptocurrency produced then gets delivered to the hacker’s private server. But hackers have developed an even more insidious tactic. By infecting websites with ads and plugins that run cryptojacking code, any visitor who loads the web page instantly gets infected with the malware, sending their computer’s processor into overdrive trying to generate cryptocurrency. Unlike most malware, cryptojacking software won’t compromise your data. But it will hijack your hardware’s processing power, decreasing performance while increasing your power and cooling bills. So instead of paying for the computing power themselves, hackers can simply use thousands of compromised computers. Surge in cryptojacking It’s difficult to tell how much hackers are making with cryptojacking, but there’s a good chance that this type of attack will be as popular as ransomware was in 2017. In fact, for as little as $30, anyone can purchase a cryptojacking kit from the dark web to force other computers to generate Bitcoin or Monero for them. According to several reports, even sites like The Pirate Bay, Openload, and OnlineVideoConverter are allegedly using cryptojacking exploits to diversify their revenue streams. The biggest reason why this is becoming so popular is because it’s a low-risk, high-reward scheme. Instead of extorting money directly from the victim, hackers can secretly generate digital currencies without the victim knowing. If it is detected, it’s also very hard to track down who initiated the attack. And since nothing was actually “stolen” (other than a portion of computing power), victims have little incentive to apprehend the culprit. Prevention and response To avoid cryptojacking, you need to incorporate it into your monthly security training sessions. Teach your employees to practice extra caution with unsolicited emails and suspicious links. Using ad-blocker or anti-cryptomining extensions on web browsers is also a great way to stay protected. Beyond prevention, use network monitoring solutions to detect any unusual behavior with your computers. For example, if you notice a significant number of PCs running slower than usual, you should assume that cryptojacking is taking place. If you’ve confirmed that it is, advise your staff to close browser tabs and update browser extensions as soon as possible. Cryptojacking may seem less threatening than some malware we’ve discussed in the past, but it can incur real power, cooling, and performance costs to your business when several systems are compromised. To make sure you don’t end up enriching any hackers, call Multi IT today on 011 435 0450. We offer hardware solutions and cybersecurity tips to keep your business safe and sound.
VIEW MORE