fbpx

Blog

Netcotech Blog

What to Do If Your Email Gets Hacked

What to Do If Your Email Gets Hacked

 Your email account is a wealth of personal information. Work emails, personal emails, account information, and sensitive data can all be targets of hackers with malicious intent. Whether you know, or just suspect, someone hacked your email account, you have to act quickly with these steps to secure your data and regain control. What Should You Do If Your Email Gets Hacked? There are several steps you should take to be extra safe in re-securing your accounts – you can never be too careful. 1.      Conduct a Deep Antivirus Scan Your email can act as a gateway for hackers to access your computer. Malware like Trojans, keyloggers, and spyware can track every move you make on your device that hackers can exploit. They can potentially get access to your banking information and make money transfers that you haven’t authorized. Running a thorough antivirus scan as soon as you suspect a hack can wipe away malware before it causes too much damage. 2.      Change Your Passwords and Security Questions Following your scan, you should change all your passwords to be safe – not only your email password, but you should change any account that's connected to payments. Secure your bank accounts, online...

Continue reading
  304 Hits

Does Covering Your Webcam Really Do Anything?

webcam

In conversations about cybersecurity, experts constantly stress the importance of covering webcams. From computers to tablets to phones, we have cameras on almost every device we use, and they're as vulnerable to cyberattacks as anything else. In the age of telecommuting and online lectures, programs like Zoom are gaining more users. You have to worry not just about your own business' security but also the safety of software that uses our webcams. Why Would You Cover Up Your Webcam? Cybercriminals are after information, but that doesn't mean they're only targeting your files – webcams are also a gateway into information mining. Whether you're in the privacy of your home or workspace, if software or a virus infiltrates your webcam, malicious hackers can see everything your webcam sees. If you have a wireless webcam, it will likely have its own IP address and password. If a cybercriminal finds the IP address and can crack the password, they will access all the webcam's functions. Built-in webcams are incredibly convenient, but if your whole device gets a virus, a hacker can quickly take control of your webcam. When using your camera, your computer will turn on a light to notify you that it's on,...

Continue reading
  689 Hits

What Are Phishing Scams to Recognize and Avoid

towfiqu-barbhuiya-em5w9_xj3uU-unsplash

Phishing emails and texts have evolved over time from the basic ploy to get your personal information to very sophisticated schemes that leave you questioning. Passwords, bank account information and other account information are vulnerable to these scams, so it's increasingly important to recognize the tactics and avoid them. How Do I Recognize Phishing? Scammers have the tools and cunning to make their messages seem legitimate. But there are some messages to look out for and question. They may look like a legitimate communication from companies you trust. Whether it's from your bank, Netflix, or even a government agency, scammers are doing their best to make their scams seem as authentic as possible. They may claim that there is a problem with your existing password.It could ask you to click on a link to make a payment.They could say that they’ve seen suspicious activity on your account.They may even include a fake invoice or coupon. The end goal of these scams is for you to click on the link that they’ve attached with their message, which can then give them access to your personal information. How Do I Protect Myself from Phishing Scams? Automatic Software Updates A simple way to ensure...

Continue reading
  844 Hits

3 Tips for Successful Cloud Migration

keytion-85Km1bnKUOE-unsplash

The cloud has been instrumental in driving the digital shift in the business world. Cloud computing is a critical enabler for innovation, customer experience, and cost reduction.  While the adoption of the cloud is accelerating, many businesses don’t understand the requirements and limitations of cloud consumption.  Cloud offers many advantages, such as: Mobile and remote access to informationBusiness resiliencyCost savings on hardwareTime savings for your IT departmentScalabilityBuilt-in security and compliance tools   Moving your data and applications onto the cloud is a multi-step process. This means you need to plan effectively and ahead of time for a successful migration. Three ways to ensure successful cloud migration: Hire an Efficient and Capable IT Team   Cloud services are in high demand, which has created a shortage of qualified people to do the work. Cloud projects succeed when you and your cloud provider bring their A team to the grid. If you’re not getting the right people, you risk an inferior outcome. Choose What Belongs on The Cloud   Not all apps are cloud friendly. Some apps may need minor tweaking while others need in-depth code changes. A full analysis of complexity and implementation is easier to do before the migration...

Continue reading
  730 Hits

Tip of the Week: Search Google Better

search_155178002_400

How many times a day do you search for something on Google? Your answer likely contributes to the fact that Google Search is the most visited website on the internet. In fact, it is so popular that the company’s name is now a verb. Google it!

Continue reading
  1356 Hits

Battery Innovation to Fuel a More Mobile World

battery_176751944_400

In today's technology dependent world, smartphones play a critical role. How much do you really know about these devices? Sure, the devices haven’t changed a whole lot in the past decade, but what has changed? Today, we take a look at how smartphone batteries have evolved, and what we will see in the future.

Continue reading
  1355 Hits

Tip of the Week: Cortana Makes Keeping Track of Your Team Easier

cortana_your_league_400

Cortana is a very useful assistant to have around the office, but did you know how useful Cortana can be in other aspects of your life? With football season underway, we felt it was appropriate to share how Cortana can help you follow your favorite teams. Of course, this will work for any sport, and it is a very easy process.

Continue reading
  1934 Hits

WhatsApp Will Now Charge Businesses For Customer Support Use

whats_app_logo_400

Purchased by Facebook in 2014 for $22 billion dollars, WhatsApp is a cross-platform application that uses an Internet connection to unify business communications. It allows users to write messages, share files, set groups, as well as make voice and video calls without using SMS mobile data.

Continue reading
  1754 Hits

Tip of the Week: Email Should Be A Tool--Here’s 3 Ways To Keep It Under Control

crazy_email_hand400

Email has been one of the primary correspondence methods for businesses for several years. In addition to communicating with your team, clients, and peers, emails also bring you the latest blog in a subscription, or sales and marketing messages from prospective vendors. With dozens of emails flowing in throughout your day, emails can become a distraction that results in a significant loss of productivity. These three tips can help you cut down on time that you waste when compulsively checking your emails.

Continue reading
  1872 Hits

Tip of the Week: How To Keep Twitter From Telling The World Where You Live

twitter_locations_400

You may have noticed how social media platforms like Facebook or Twitter often share the location of any pictures you post, if they are set up to do so. Well, you’ve probably asked yourself if your device will share this information automatically, or if you have to enable this setting yourself.

Continue reading
  1803 Hits

Is Email Phishing Unstoppable? Just don’t rely too much on your office antivirus software.

Is Email Phishing Unstoppable? Just don’t rely too much on your office antivirus software.

Photocredit: Stephen Coles; https://www.flickr.com/photos/stewf/ Is Email Phishing Unstoppable? Just don’t rely too much on your office antivirus software. Your antivirus software ~might~ be good at stopping viruses, but they’re becoming more irrelevant every day at protecting your data and devices. Some experts are pointing to a recent warning by the U.S. Department of Homeland Security’s Computer Emergency Readiness Team (CERT), where they issued a warning about global security product Symantec and Norton Security products containing dangerous vulnerabilities. This doesn’t mean they’re completely useless and they don’t perform an important function. There’s a more important reason to not blindly trust your antivirus software to keep your data safe.  People tend to rely too much on them, giving them a false sense of security.  Evolving Threat Tactics Just a few short years ago, antivirus software protected against 80 to 90 percent of online threats. Today, it’s more like 10 to 20 percent because of constantly evolving threat tactics. While some company executives feel smugly confident about their level of antivirus security, cyber criminals are getting in through the company’s weakest links—the users.  An alarming trend is the aggressive growth of phishing techniques used by attackers in 2016. Hackers are spending less effort...



Continue reading
  5800 Hits

The 18 Highest Paying IT Industry Certifications in 2016 – Canadian Edition

The 18 Highest Paying IT Industry Certifications in 2016 – Canadian Edition

The 18 Highest Paying IT Industry Certifications in 2016 – Canadian Edition   Introduction: Canadian IT Industry Facts Before we get to the IT certifications and salary ranges, we want to highlight the growing demand for more professionals in this this industry. There is a real pressing shortage of IT professionals in Canada, and the world (we reported on the world-wide shortage of IT professionals here earlier this year). Salaries in this industry are very generous, and rising faster than almost every other industry. According to Robert Half Technology, IT salaries in Canada are rising at an average of 5.1% annually. Accordingly, job qualifications are also increasing, creating more demand for certification programs and higher skilled professionals. If there was ever any doubt about the importance of the IT Industry in Canada today, the facts show just how important it really is. There were about 811,000 information communication and technology professionals employed in Canada at the end of 2015, according to the IT Labour Market Outlook 2015-2019 produced by the Information Communication Technology Council (ICTC).  While these numbers ~seem~ high, it also calculates that Canada will require an additional 182,000 qualified IT professionals by 2019—to fill positions for information systems analysts...



Continue reading
  8658 Hits

How to Find Out if an Account Has Been Hacked

How to Find Out if an Account Has Been Hacked

How to Find Out if an Account Has Been Hacked The recent disclosure that Mark Zuckerberg’s own Facebook account password was hacked this week should set alarm bells off for anyone who’s ever created an online account. You have to wonder, if the Facebook founder’s email and password accounts aren’t safe, then what is? In case you haven’t heard, last weekend Mark Zuckerberg’s Twitter and Pinterest accounts were briefly hacked by a group calling itself OurMine. They demonstrated by announcing his lame password on his Facebook timeline. No, Facebook wasn’t hacked. Zuckerberg’s email and passwords were part of a LinkedIn database that was actually hacked back in 2012, (along with up to 167 million others), and just posted online in May this year. Since then, hackers have been having a heyday with them. So if Zuckerberg’s LinkedIn account was hacked, why did it affect his Facebook and Pinterest account? It’s because he used the same lame password for all of those accounts. And he never changed it after LinkedIn announced they were hacked....Since 2012. Apparently Zuckerberg is guilty of password laziness - using the same lame passwords on multiple accounts. He’s not alone. Along with millions of others who are getting...



Continue reading
  2816 Hits

Is Your Business Network a Hardened Vault or a Cardboard Door?

Is Your Business Network a Hardened Vault or a Cardboard Door?

Is Your Business Network a Hardened Vault or a Cardboard Door?         Whether a desktop, laptop or mobile device, almost every computer we use is connected to some type of network. More than simply internet access and email, our corporate networks let us work more efficiently, be more productive and save money doing it. They are integral components for functions like purchasing, selling, collaboration and customer service. The advancement of modern networking technology means we have greater access to more data available than ever before. And we’re continuously adding more business applications and databases year after year. This increases the complexity of our operations and our access to them. “The nastiest growing threats for businesses today are hardware-centric cyberattacks, ransomware, zombie botnets and identity theft.” Unfortunately, this advancement and complexity is also adding to our security concerns due to the growing number of increasingly sophisticated cyberattacks on small and medium sized organizations. It’s no longer just data hijacking or DDS attacks that are growing, the nastiest growing threats for businesses today are hardware-centric cyberattacks, ransomware, zombie botnets and identity theft. Still, we seldom think of our physical networks unless they’re broken. We simply rely on them to work. In reality, the security...

Continue reading
  3162 Hits