Explanations

Explanations

We’ve got the rundown on Windows 10

Tags: , , Explanations, Opinion
Is Windows 10 right for you?

Microsoft is coming out with a hot new operating system (OS) called Windows 10. As with any new OS, you need to get the rundown so that you know what you’re getting yourself into before you invest. That’s why we’re here with the facts so that you can decide whether or not Windows 10 is right for you. Ready to learn more? Well, here we go! Read More

The Problem with Superfish and Komodia

Tags: , , , Cyber Security, Explanations

It was recently brought to light that the computer company Lenovo built and sold laptops with an adware program preinstalled between October and December 2014. The program, called Superfish, was designed to inject ads onto secure HTTPS web pages.  This sounds bad enough on its own, but it gets worse. To do this Superfish uses a code library, from an Israeli company called Komodia, that installs a self-signing root HTTPS certificate that falsely represents itself as the website’s official certificate.

Why this is Bad

The problem with Superfish, and its komodia code, is that it poorly circumvents HTTPS site certificates are how your browser judges whether the site is legitimate. For example, under normal conditions a fishing site set up to look like a Bank of America site would be flagged by your browser for having a false certificate and a warning would pop up in your browser that the site you were attempting to access had an invalid certificate. Read More

Basic IT Troubleshooting Tips for Maryland Businesses

Tags: , , , , Explanations, IT services, IT Tips Baltimore

In a world that’s increasingly dependent on technology and in a global economy that offers no “time-outs” for technical problems, a significant IT problem can cost thousands, even millions, of dollars. That’s why it’s important to entrust your business IT needs to a company with experience and training. But, it also pays to know how to fix small problems yourself. Working Nets, your Maryland business IT provider, is here with a few basic troubleshooting tips to help you easily manage small IT crisis.

Check Those Cables

The vast majority of simple IT or computer problems that Maryland businesses face are related to bad connections. Your average business computer system has a bevy of cables, wires, and plugs, each of which must be appropriately connected for the system to function correctly. An easy IT troubleshooting first step is to make sure everything’s plugged in where it’s supposed to.

Isolate and Identify

The most helpful information when solving an IT problem is knowing where exactly the trouble lies. Do your best to isolate a problem and find out exactly what isn’t working. For example, if your mouse cursor won’t respond, try to figure out if the problem is with your computer or the physical mouse by trying alternate mice, attempting to use the keyboard to navigate, or using the mouse on a different service. Make one change at a time to determine what’s causing the problem. Even if you can’t fix it, this information saves Maryland IT troubleshooting professionals valuable time.

Record, Record, Record

Make sure to write down all the steps you’ve taken trying to fix the problem, writing down as much information as possible. If your computer displays an error message make sure to copy all the information it displays. Knowing what steps you’ve taken and the various error codes displayed will help an IT troubleshooting professional fix the problem speedily.

Need Professional IT Troubleshooting?

Contact Working Nets. Doing all of your IT troubleshooting, management, repair, and maintenance in-house can be expensive and time-consuming. Outsourcing your IT can give you the peace of mind that your business’s IT needs are all taken care of, and allow you to focus on the things that are important for your company. Working Nets is a Maryland based IT Service and Security company that services small businesses nationwide. We’re always on top of emerging cyber security trends and threats so you don’t have to be.

To talk to someone about managed IT for your business, give us a call at (443) 992-7394. We’d be happy to assist you with your professional business networking needs.

You can also visit WorkingNets.com and follow us on FacebookTwitterLinkedIn and Google+

WireLurker: A New Kind of Security Threat for the iOS

Tags: , , , , , , , , Cyber Security, Explanations, IT services

Apple devices have long lorded their comparable lack of malware over their Windows competitors. However a new cyber security threat, dubbed WireLurker, may signal a coming change in the iOS’s fortunes. Working Nets, one of Maryland’s leading cyber security providers, is here with the details on why this malware is particularly dangerous for iOS devices.

What is WireLurker? What Makes it Dangerous?

WireLurker is a piece of malware, originating in China on some 500 infected apps on the unofficial Maiyadi app store, which has already infected close to 400,000 iOS devices. More importantly, WireLurker is the first known malware to target non-jailbroken iOS devices. Previously malware on the iOS was confined to users who jailbroke (disconnecting their operating system from Apple’s network and disabling limitations on installing unauthorized software) their phone, meaning that most consumers of Apple products had a very high degree of guaranteed security. The discovery of WireLurker could herald an onslaught of malware directed at iOS devices belonging to anyone.

How Does WireLurker Work?

WireLurker makes its way onto a device through infected malware downloaded from an app store or the internet, from there it infects the iOS of that machine, and makes its way to others by installing rogue apps whenever an infected device is connected via USB to an uninfected one. The original WireLurker malware made its way onto such a large number of devices because it was hidden inside seemingly legitimate applications, including illegitimate versions of highly successful games like The Sims 3 and Angry Birds.

What Does WireLurker Do?

WireLurker like most malware is used for data collection. What’s especially unusual is what data the malware seems to be interested in collecting. Most malware gathers up as much personal data as it can handle but WireLurker has only been observed identifying device owners, leading some to speculate that it was being used by the Chinese government to root out the identity of software pirates. However the amateurish nature of WireLurker’s distribution has made most cyber security experts skeptical of that assertion.

Keep All Your iOS Devices Secure With Working Nets

Keeping up with the latest cyber security threats can be exhausting, especially if you’re already running your own business. Outsourcing your IT can give you peace of mind and allow you to take care of the things that are important for your company. Working Nets is a Maryland based IT Service and Security company that services businesses nationwide. We’re always on top of emerging cybersecurity trends and threats so you don’t have to be.

To talk to someone about managed IT for your business, give us a call at (443) 992-7394. We’d be happy to assist you with your professional business networking needs.

You can also visit WorkingNets.com and follow us on FacebookTwitterLinkedIn and Google+

Experts Predict Major Cyber-Attack Within 11 Years

Tags: , , , Computer Security Baltimore, Cyber Security, Explanations

A survey released today, conducted by the Pew Research Center, found that the majority of major technology analysts believe that a major cyber-terrorist attack against US energy, banking, or health care systems will be carried out successfully within the next 11 years. The survey, which was given to 1,642 of the world’s most prominent technology experts asked if, in their professional opinion, they believed that a cyber-attack would cause “widespread harm to a nation’s security and capacity to defend itself” within the next 11 years.

Over 60% answered yes.

Working Nets is here with the inside scoop on the danger this impending threat could pose for your small business.

It’s Already Begun

Cyber-attacks have already risen dramatically in frequency and scope within the past year alone. Many experts cited this month’s major cyber-attack on Apple’s iCloud storage system, which many attribute as a covert action by the Chinese government, as an example of the increasing threat of digital terrorism.  Jason Pontin, the editor of the MIT Technology Review also cited the 2009 Stuxnet computer worm, which disabled the centrifuges in an Iranian nuclear power plant, as an example.

Why Are They So Dangerous?

Cyber-attacks are proportionally dangerous to the amount we depend upon the internet to conduct important tasks, which shows no signs of diminishing.

Stewart Baker, a partner at Steptoe & Johnson, a Washington D.C. law firm. Was quoted as saying that “cyberware just plain makes sense. Attacking the power grid or other industrial control systems is asymmetrical and deniable and devilishly effective.” Cyber-attacks involving the theft of personal data are equally threatening, allowing terrorist groups to seize foreign capital to fund their efforts.

The Dissenting Opinion

It’s worth noting however, that the 39% who answered “no” have some pretty compelling evidence on their side as well.

“The nation-states with the capability to deliver such an attack do not have the motivation to do so,” says David Clark, a research scientist at MIT’s Computer Science and Artificial Intelligence Laboratory, invoking the mantra of mutually assured destruction that saw this country through the cold war.

Many experts agreed with Clark’s opinion and added that while new cyber-security threats do appear every day, so do new defensive measures against them. For every major threat there is always a team of dedicated technology professionals ready to quickly combat it.

Protect Your Business From Cyber-Attacks

Working Nets, employer of the area’s most talented and qualified cyber-security experts, can create a data protection solution customized for any network. Preparation is the best defense against potentially disastrous cyber-attacks.  With Working Nets at your back you’ll avoid many of the other problems that could disrupt the functionality of your business on a day-to-day basis.

To talk to someone about cyber-attacks, network security and disaster preparedness  for your small business, give us a call at (443) 992-7394. We’d be happy to assist you with your professional business networking needs.

You can also visit WorkingNets.com and follow us on Facebook, Twitter, LinkedIn and Google

Foundations for Small Business Networking

Tags: , , , , Explanations

Looking to build a network for a small business? It can seem complicated, but don’t fret. Just know that before you begin setting anything up, you must first know the foundation you need for professional business networking. Keep reading for a few tips about developing a network for your small business.

All networks must have a system of switches and routers. What are those? Switches are what connect each device to one another. For example, your computer, printer, and server are all connected to the same network, and the switch is what enables each device to communicate with one another. A router is similar to a switch, but on a much larger scale. Routers connect the networks that these computers, printers and servers work on. It also connects your devices to the Internet, allowing each device to use the same Internet connection. The router can also protect from security threats and choose the route in which the information travels. These two devices are the most important part of your network foundation.

When creating a foundation, you’ll want to start small so that your network can grow over time. It is also important to invest in switches and routers that are simple to install and manage. However, you’ll want to make sure that you install business-grade switches and routers. These devices will be able to keep up with heavy traffic and business growth, while small-scale, home devices cannot.

Setting up your own network is hard. Let the experts do it for you! At Working Nets, we want to help your business succeed with a reliable network system. If you still have questions about routers and switches or setting up networking for your small business, give us a call at (443) 992-7394. We’d be happy to assist you with your professional business networking needs.

You can also visit WorkingNets.com and follow us on Facebook, Twitter, LinkedIn and Google+.

Source:

What you need to know about the Heartbleed Bug

Tags: , , Explanations

Technology plays a major role in every business. So when something new comes along that threatens that technology and thus threatens your business, you need answers. And fast!

This is the case with the Heartbleed bug. It is the name you hear every time you turn on the news. And you have a few questions. What is it, how does it affect me, and how can I protect myself? Well, that is why you have us! At Working Nets, we provide top-notch information technology services to companies who don’t require an IT department, but do need reliable assistance when challenges arise.

What is the Heartbleed Bug?

Disclosed just a few days ago, the Heartbleed bug affects the technology used to encrypt sensitive information: OpenSSL.

“This compromises the secret keys used to identify the service providers and to encrypt the traffic, the names and passwords of the users and the actual content,” according to the Heartbleed.com. “This allows attackers to eavesdrop on communications, steal data directly from the services and users and to impersonate services and users.”

How does the Heartbleed Bug affect me?

According to Heartbleed.com, roughly two-thirds of all active websites run OpenSSL. Whoa! It could affect sites you log into on a daily basis — email, social networks, and so much more.

Click Here for a full list of the sites believed to be affected.

Larger companies are already addressing the issue, patching security holes. The issue is with smaller sites, warns Heartbleed.com. These sites typically do not have the full-time, in-house IT staff needed to address an issue as large as the Heartbleed bug.

How can I protect myself from the Heartbleed Bug?

Now this is the tricky part. All you can really do is sit and wait for these websites to patch the security holes. And if you are thinking about changing your passwords, don’t. If the bug hasn’t been fixed, changing your old password to a new password won’t do any good. It would just make your new password susceptible to the bug.

“The fact is if you change your password now, and the service hasn’t been patched, then there is a risk that an attacker can steal your current credentials and use them to compromise your account,” said AlienVault Labs Director Jaime Blasco.

What you can do, in the future, is make sure you do not use the same password for multiple sites and services. This ensures that if one site is compromised, all of your information isn’t at risk.

If you have any questions about the Heartbleed Bug and how it could affect your business, please contact Working Nets by calling (443) 992-7394 or visit WorkingNets.com today!

Welcome to Working Nets – your virtual IT Department!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

Source:

Heartbleed bug: Check which sites have been patched

How to protect yourself against the Heartbleed bug

Three questions about the ‘Heartbleed’ Bug

Gmail Smart Labels for Social Updates and other Email Helpers

Tags: , , , , Explanations, IT industry, IT Tips Baltimore, Review / Opinion

Are you tired of weeding through a seemingly endless string of emails? Of course you are. We all are. But what other options do we have? Well, now thanks to Google’s new Smart Labels, you are able to filter your email more efficiently, allowing you to receive only the content you want to read!

Enabling Google Smart Labels

  1. Go to your Gmail settings menu
  2. Click “Labs”
  3. Enable Google Smartlabels

Smart Labels automatically categorizes bulk, notification, forum messages, and more, leaving your Inbox free from unwanted clutter.

Other Email Helpers

  • Boomerang: Boomerang gives you control of when you send and receive email messages.
  • Rapportive: Rapportive gives you immediate access to the biographical information of your contacts, including what people look like, where they’re based, where they work, and more.
  • Mailstrom: Mailstrom is one of the smartest and fastest ways to clean out your inbox, deleting or archiving hundreds or even thousands of messages at once. “I’ve cleared out 60% of my mailbox already,” said Working Nets own David Spigelman.

If you have any questions about Google Smart Labels and other Email Helpers, please contact Working Nets by calling (443) 992-7394 or visit WorkingNets.com today!

Troubleshooting Services: Productivity is crucial in any business. When trouble appears, we’ll figure it out and provide the right solution that gets your business up and working again.

Welcome to Working Nets – your virtual IT Department!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

 

Disaster Preparedness: Hurricane Sandy, Battery Backups, Redundancy & more

Tags: , , , , , Explanations, IT industry

As the weather finally begins to clear, the full aftermath of Hurricane Sandy is being realized. Countless businesses along the east coast were devastated by the storm. Was your business one of them? How did you fare during Hurricane Sandy?

If you had a disaster recovery plan and offsite data backup in place, you are probably okay. Yet, astonishingly, only 25% of computer users regularly backup their data! And major data loss can be devastating for a business. Of companies that experience a major loss of business data 51% close within 2 years, while 43% never recover.

That means that only 6% of businesses that experience major data loss survive!

So what can you do to ensure that your business does not become another statistic? You can plan ahead.

Whether you call it disaster preparedness, emergency preparedness, disaster recovery, or business continuity, the goal is the same: to get your business back up and running as quickly as possible in the event of a disruption.

  • Communication: You need to ensure that each of your employees knows what to do in the event of a disaster. Where will they do, how will they do their jobs, and how will they communicate?
  • Batter Backup: Battery backups are designed to provide power to your business when the grid is knocked out by natural disaster.
  • Off-Site Backup: If disaster strikes and you store your backups onsite, you could STILL lose all of your vital business information. Data loss can cripple any business. So make sure your vital business information is kept safe by utilizing off-site backup.
  • System Redundancy: The more redundant your systems, the less you will suffer, within reason. That’s the idea behind data backups, but there are other things you will need “backed up,” besides your data itself. These additional items include copies software, passwords, vendor information, and more!

Disaster recovery is not just for Fortune 500 companies. But what do you do if you cannot afford to hire an in-house IT technician? You outsource, of course!

If you have any questions about Disaster Preparedness, please contact Working Nets by calling (443) 992-7394 or visit WorkingNets.com today!

Security & Disaster Preparedness Services: Data protection and recovery is crucial. Working Nets assures that your vital business data is kept secure if disaster strikes.

Welcome to Working Nets – your virtual IT Department!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

 

Windows 8 vs. Windows RT: Microsoft’s new Operating Systems explained

Tags: , , , , Explanations, IT industry, Review / Opinion

As you probably know, Microsoft is expected to launch its newest operating system, Windows 8, later this week. And in our last blog post, we posted several opinions (mostly negative) about the upcoming launch of Microsoft Windows 8. But what you may not know is that Microsoft is also debuting a second operating system, Windows RT.

PCs and Tablets powered by x86 processors (both 32-bit and 64-bit platforms) will run Windows 8 or Windows 8 Pro. Devices on an ARM platform or WOA will run Windows RT.

  • Windows 8: Touted as Microsoft’s “full” version of Windows, 8 supports all of the same software as Windows 7, Vista, and XP, but also runs a batch of new, tablet-like apps available through the Windows Store.
  • Windows RT: Windows RT is a feature-limited tablet version of Windows 8 designed to run on ARM processors. Unlike Windows 8, RT will not support any older Windows software. Windows RT runs only Windows Store apps and built-in software. This means you won’t be able to download any software that is made to run in the desktop environment. This means no third-party browsers…no third-party games…no third-party anything for that matter.

Windows 8 and Windows RT look the same, but behave completely differently. And as you can imagine…or as you may be experiencing…this can be quite confusing for consumers.

If you have any questions about Windows 8 and Windows RT, please contact Working Nets by calling (443) 992-7394 or visit WorkingNets.com today!

At Working Nets, we work closely with each client to determine their IT needs, and how to meet them quickly and inexpensively. We’ll meet with you and perform an extensive system review before creating a detailed, comprehensive strategy to meet your unique needs.

Welcome to Working Nets – your virtual IT Department!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.