New year, new you.

You may be asking, “What’s the secret to protecting my business against cybercrime?”

The answer: a layered approach incorporating security software, a security driven IT support staff, and employee training.

PremierePC can check each of those boxes.

First, let’s take a deeper look into cybercrime.

Cybercrime uses impersonation, fear, threats, lies, and other manipulation tactics to gain a victim’s trust or trick them to sharing sensitive data.

Impersonation in cybercrime is especially dangerous due to cybercriminals’ expert ability to hide in plain site and create legitimate-looking websites and emails.

Cybercriminals are also able to host malicious content on legitimate sites.

Phishing attempts are also able to, at times, slip through DNS and endpoint protection. This is where employee training is your last defense. Humans are consistently the weakest link in the cybersecurity chain of defense. Therefore, social engineering risks are far greater without a security driven IT support staff willing and able to train your employees.

Everyone, from receptionists to executives, are potential victims of an impersonator. In fact, help desk and call center employees are especially vulnerable because they are trained to be forthcoming with information.

Action items:

  1. Instruct employees to delete any requests for financial information or passwords. When in doubt, call the person who “sent” the request and conduct these transactions in person or over the phone.
  2. Use cybersecurity software with real-time anti-phishing services. If you’re suspicious of any links or emails, don’t click! Contact your IT provider first.
  3. Follow IT security best practices by patching software and securing email servers.
  4. Regularly participate in up-to-date Security Awareness Training and phishing simulations for employees.

Sound like too much? Contact PremierePC and we will be happy to walk with you through every step.

To celebrate the New Year, our office will be closed Thursday, December 31st and Friday, January 1st.

We look forward to assisting you on Monday, January 4th.

From all us of here at PremierePC, we wish you and yours a Happy New Year!

In observance of this holiday season, our office will be closed Thursday, December 24th and Friday, December 25th.

We look forward to assisting you on Monday, December, 28th.

From all us of here at PremierePC, we wish you and yours a very safe and happy holiday.

Eager to clean out your inbox but don’t want an influx of replies right before your week ends?

Microsoft Outlook offers delayed and scheduled email sending!

Delays can be applied to single messages or you can create rules to delay the delivery of all messages.

Delay the delivery of a single message in the Outlook desktop app

  1. While composing a message, select the More options arrow from the Tags group in the Ribbon.
    Select More Options to set a delivery delay.

  2. Under Delivery options, select the Do not deliver before check box, and then click the delivery date and time you want.
    Set a date and time to deliver your message.
  3. Click Close.
  4. When you’re done composing your email message, select Send.

After you click Send, the message remains in the Outbox folder until the delivery time.

If you decide later that you want to send the message immediately, do the following:

  1. Switch to the Outbox folder.
  2. Open the delayed message.
  3. Select the More options arrow from the Tags group in the Ribbon.

    Select More Options to set a delivery delay.

  4. Under Delivery options, clear the Do not deliver before check box.

  5. Click Close and send.

Note: Outlook must be online and connected for this feature to work.

Delay the delivery of a single message in the Outlook web app

  1. While composing a message, select the arrow next to the Send button.
  2. Select Send Later
  3. Set the desired date and time for the email to be sent.
  4. Select Send. Your message will now be held in drafts until the selected time and date.

Contact PremierePC today to maximize your potential through technology.

We love this time of year. It’s filled with fun, family, fellowship, food, and unfortunately phishing…

Scammers love this time of year too. The holiday shopping frenzy makes for easy phishing attack and hacking victims. PremierePC is here to help you learn how to protect yourself so you can have a great holiday season.

Do not click on links in emails.

If you’re not sure of the sender, or you didn’t request the email, do not click on any links or open any attachments. Instead, contact the company via their website or phone and ask for more information.

Beware of urgency.

Scammers will play on the fear of missing out on something, like a big holiday sale or a deadline for a bill. Resist any pressure to “act now.”

Watch for emails asking for private information.

Legitimate organizations will never request personal information via email. Do not email information such as passwords, credit card numbers, social security numbers, etc.

Research the website.

Scammers are getting better at creating fake websites that look real. Do your research before submitting payment to any sites.

Know your Wi-Fi.

Using public Wi-Fi creates many potential areas for hackers to breach and grab your data or sensitive information. Do not make purchases using public Wi-Fi networks like coffee shops, libraries, hotels, etc.

Keep track of orders.

Scammers will send fake delivery failure notices or package tracking emails to sway you into clicking a link or submitting personal information. Always keep track of what you’ve ordered and who will be delivering it. If you receive one of these emails, call the delivery service or as your post office.

Some of the best ways to avoid scams is continued education and a comprehensive security plan for your business. Contact PremierePC today to see how your security stacks up.

PremierePC - Managed IT

1. Over 6,000 new computer viruses are created and released every month. 90% of emails contain some form of malware!

2. The Firefox logo isn’t a fox… it’s a red panda!

3. Samsung is 38 years and 1 month older than Apple.

4. One Petabyte (PB) = 1024 (TB). To put this in perspective, a 50PB hard drive could hold the entire written works of mankind from the beginning of recorded history in all languages.

5. Alexa is always listening to your conversations. Alexa stores all of your dialogue history in the cloud to improve the Alexa experience.

6. On average, people read 10% slower from a screen than from paper.

7. The first computer mouse was made in 1964 by Doug Engelbart. It was rectangular and made from wood!

8. On average, there is only one reply per 12 million spam emails sent.

9. Surgeons that grew up playing video games more than three hours per week make 37% fewer errors and have a 42% faster completion rate when performing laparoscopic surgery and suturing.

10. NASA’s internet speed is 91 GB per second.

11. Until 2010, carrier pigeons were faster than the internet.

12. In 1971, the first ever computer virus was developed. Named Creeper, it was made as an experiment just to see how it spread between computers. The virus simply displayed the message: “I’m the creeper, catch me if you can!”

In observance of the Thanksgiving holiday, our office will be closed Thursday, November 26th and Friday, November 27th.

We look forward to assisting you on Monday, November 30th.

From all us of here at PremierePC, we wish you and yours a very safe and happy holiday.

how can i reopen my business safely?

2020 brought many surprises and changes. One of which shifted many in-office employees to start unexpectedly working from home.

In 2020, 88% of the organizations, worldwide, made it mandatory or encouraged their employees to work from home after COVID-19 was declared a pandemic.

This flexibility is great to continue business operations. However, it brings about serious holes in security unless you are fully prepared.

So what can an MSP like PremierePC do to help boost security and mitigate threats for work from home employees?

  1. Secure VPNs – this can ensure employees are utilizing the same security tools that are available in the office, mitigating cybersecurity threats and data breaches.
  2. Network segmentation for home networks –  this allows for multiple individual networks under a single network, simplifying security policies if done correctly.
  3. Remote endpoint incident management – this allows technicians to access remote laptops and deploy patches remotely.
  4. Maintain the latest software updates – software vulnerabilities, security loopholes found in programs and operating systems, are typically revealed as they are solved in the latest version. If not updated, programs and operating systems are easy targets for the bad guys.
  5. Educate on phishing attempts – hackers are always looking for vulnerabilities and weak points to take advantage of. An MSP like PremierePC can provide continuing education and phishing training to employees to mitigate these threats.

We know this can be very overwhelming for someone who is trying to focus on actually running their business. PremierePC is here to help! Contact us today.

MFA, Multi-Factor Authentication, is a security enhancement that requires two or more different forms of authentication to gain access to an account. These forms can be something you know (your password or pin), something you have (a smart card or key), or something you are (your fingerprint or eye scan).

MFA is a hot topic these days in the IT world. With hacking attempts consistently on the rise, it is becoming increasingly more important to secure online accounts and data as much as possible.

Last year, internal Microsoft users who enabled MFA blocked around 99.9% of automated attacks against their Microsoft account.

So we know MFA is important and effective, but what do the experts say about how to use MFA?

Microsoft is urging users to stop using SMS text and voice calls for MFA.

Experts know that telephone networks are prone to security issues:

  • SMS and voice calls are transmitted in cleartext and can easily be intercepted by the bad guys.
  • There are also readily available phishing tools that can quickly grab SMS-based one-time codes.
  • Phone network employees can also be tricked into transferring phone numbers to a bad guy’s SIM card, called SIM swapping, allowing attackers to receive the MFA codes on behalf of their victims.

A more secure option includes app-based MFA, like Microsoft’s Authenticator app.

The most secure option includes hardware security keys.

But always keep in mind, some type of MFA is better than no MFA.

Do you have multiple accounts in Microsoft Teams? Tired of logging in and out constantly?

Microsoft Teams on the desktop is getting a new feature that will allow users to add multiple accounts and manage them without logging in and out.

This new feature will allow users to link accounts together, enabling them to switch directly by altering their settings. This is set to roll out by end of this year or early next year.

However, there are more feature updates coming to Teams.

Users will be able to create custom pages, enabling businesses or educators to create a more cohesive team identity.

Invite links will be improved so that invited users will gain access to notes, files, or anything else shared during a call, even after the call has ended.

Contact us today to learn more about how to increase and streamline communication within your organization.