Hackers

How do I protect myself from hackers?

By : Array Systems, Inc. |February 02, 2015 |Security, Small Business IT |Comments Off on How do I protect myself from hackers?

Top 10 Small Business IT Questions

#4 How do I protect myself from hackers?

Hackers are people that want to get access to your computer network and access your data from your servers and computers.Hacker

A few year ago, hackers would most often gain access through your wireless network. Hopefully, we’ve all secured our wireless networks and have these access points protected with hard-to-break passwords.

Today, hackers may get access by stealing equipment. Laptops, desktop computers, servers, USB drives, and phones can be a “jackpot” for hackers. Most small businesses don’t secure their equipment with cables and physical locks. Additionally, when equipment is stolen if your data is not encrypted, your storage device is easily accessible and can be moved right onto the hacker’s computer.

Believe it or not, the most common way hackers access your information is by invitation. An employee invites a hacker into the system without their knowledge. This may happen when opening an email attachment that looks like an electronic birthday card from a friend. Once the file is opened (by clicking on it) a program is installed onto your computer and notification is sent to the hacker that it has successfully infiltrated your system. Another common way a hacker gains access is by an employee accessing a website on the internet that contains a hackers program. If you don’t have updated anti-virus or anti-malware software installed software on your computer you will not even know it has happened.

One of the most frustrating attacks, sadly, is also becoming more common. Crypto Locking programs encrypt your files so you can’t use your computer. The only way to eliminate this program is to completely wipe out your hard drive and restore from a backup. If you don’t have a backup then you are held ransom. Typically the hackers demand “ransom money”, usually about $500, to “release” your data. The payment is made in bitcoin – the new online currency that is hard to trace.

As we’ve seen recently it’s getting more and more difficult to keep hackers out. Like most criminals, they look for the easiest prey. So please, don’t make it easier by inviting them in.

Array can help ensure your company’s computer systems are protected.

 

Read More
Top 10 Small Business IT Questions

The Top 10 Most Common IT Questions Asked by Small Business Owners

By : Array Systems, Inc. |December 02, 2014 |Small Business IT |Comments Off on The Top 10 Most Common IT Questions Asked by Small Business Owners

Below are the top ten most common information technology questions we hear from small business owners.  Over the next couple weeks our President Sid Kato will be answering these questions here on Tech Talk with Array.  If you are a small business owner and you don’t see your question listed here, please let us know by submitting an article suggestion to the right –>

We’re here to help!

  1. What is the Cloud?

  2. How can Social Media help me find potential customers?

  3. I’m concerned about identity theft, how do I protect myself?

  4. How do I protect myself from hackers?

  5. What is the best way to protect against viruses?

  6. Do I need a website?

  7. What is the best method for backup of my data?

  8. What email system should I be using?

  9. I have some old equipment still in use, what is the typical lifecycle for this equipment?

  10. My Internet connection is slow should I change providers?

Read More