By -- 2023-06-2 in Blog

Atomic Malware has emerged as a formidable force, wreaking havoc on Mac users worldwide. This insidious malware has set its sights on stealing passwords, infiltrating crypto wallets, and causing a wave of concern among security-conscious individuals. This is why it is important to protect your computer passwords and crypto wallets. Here are some essential tips to safeguard your sensitive information and prevent unauthorized access:

  1. Exercise Caution with Downloads: Be vigilant when downloading files or software from untrusted sources. Verify the integrity and legitimacy of the downloads to avoid inadvertently installing Atomic Malware.
  2. Implement Strong Passwords and Two-Factor Authentication: Strengthen your defenses by using unique, complex passwords for each online account. Enable two-factor authentication whenever possible to add an extra layer of security.
  3. Invest in Robust Security Solutions: Consider using comprehensive security software that offers real-time malware protection, firewall capabilities, and proactive threat detection to safeguard your Mac from Atomic Malware and other cyber threats.

Conducting Regular Backups and System Monitoring are also helpful to ensure protection from losing important data. In case of a malware attack, you can restore your files and minimize the impact. Additionally, monitor your system for any unusual activities, such as unexpected network connections or system slowdowns, which could be indicators of malware presence.


Remember, it’s better to be prepared and protected than to suffer the consequences of a malicious attack. Stay safe, stay secure, and enjoy your digital journey without the fear of Atomic Malware lurking in the shadows. If you have any questions about the protection of your personal data, or any general IT inquiries, feel free to reach out to us at



By -- 2023-03-29 in Blog

There have been many allegations over the years regarding Facebook listening to user conversations. The idea is that after hearing you mention a certain product or service, Facebook will advertise it towards you. Sometimes it seems there must be some truth to the rumors, as an ad for the latest athletic wear pops up right after you tell your friend you’re planning on getting a gym membership.

The ultimate reality is – we really don’t know whether Facebook is listening in or not. While it may seem to be the case at times, the company has repeatedly denied it. Facebook’s privacy policies say as much on their website, and in 2018 they even denied it in front of congress. Essentially, Facebook listening to our conversations is all speculation. The good news is that there are steps you can take to protect yourself on Facebook if you’re skeptical.


Facebook Setting to Change

The best place to start is by disabling Facebook’s access to your microphone. Facebook claims to only use the microphone feature when using features like making a call through the app or Facebook Live. However, completely shutting down the access eliminates any concerns you may have. Just be warry that you will not have access to certain features while your microphone is turned off.

Turn off your microphone for Facebook: iPhone

  • Ensure your Facebook app is updated in the app store
  • Open your Settings app
  • Scroll down through your apps until you find Facebook
  • Toggle off the Microphone option

Turn off your microphone for Facebook: Android

  • Open your Settings app, search Permission
  • Select Permission Manager
  • Tap Microphone
  • Select Facebook
  • Set microphone access to Deny

Other general recommendations for Facebook include using two-factor authentication, ensuring your email address is up to date, and having a strong password. If you have any questions about your privacy on social media sites, the protection of your personal data, or any general IT inquiries, feel free to reach out to us at

By -- 2023-03-24 in Blog

Google has flagged multiple apps created by Pinduoduo, a Chinese e-commerce giant, as malware. In the past few weeks, several Chinese security researchers have accused Pinduoduo of making apps for Android that contain malware designed to monitor users. Google has set Google Play Protect, an Android security mechanism, to prevent users from installing these malicious apps. They are also prompting users that already have the apps downloaded to uninstall. Google has suspended their official app from the Play Store while they further investigate the situation.

In an response to TechCrunch’s outreach, Pinduoduo’s spokesperson Kong Ho stated the following:

“We strongly reject the speculation and accusation by some anonymous researcher and non-conclusive response from Google that Pinduoduo app is malicious. There are several apps that have been suspended from Google Play at the same time and we find it peculiar that TechCrunch chose to single out Pinduoduo.”

While further updates will be needed to clear the situation up, we recommend avoiding Pinduoduo apps in the time being. Once more information is available, it’ll be easier to assess if Pinduoduo is a trustworthy app manufacturer. As always, it’s best to stay alert in cautious in these types of scenarios. If you have any questions about avoiding this malware or general IT topics, feel free to reach out to us at

By -- 2023-03-16 in Blog

Dish, the US television provider, confirmed a ransomware attack in which intruders exfiltrated data from its systems. The multiday outage happened in late February 2023 and affected Dish’s main website, apps, customer support systems, and streaming services. Dish determined the outage was due to a “cyber security incident” and that they were looking to “contain, assess and remediate the ransomware attack.” Attackers were able to extract data from Dish’s IT systems, noting that personal information may have been involved. The scale of this ransomware attack is still unknown, although Dish does have roughly 10 million customers overall.


Dish released the following statement on their website:

The security of our customers’ data is important to us, and if we learn that information was compromised, we’ll take the appropriate steps and let any impacted customers know.

As a result of this incident, many of our customers are having trouble reaching our service desks, accessing their accounts, and making payments. We’re making progress on the customer service front every day, including ramping up our call capacity, but it will take a little time before things are fully restored. DISH TV continues to operate and is up and running.


If you are a Dish customer, you may want to change your account password in the meantime to help protect your information. If you feel that you may need a refresher, we recommend reviewing our recent article on best password practices. If you have any further questions about this ransomware attack, cybersecurity, or any general IT questions, feel free to reach out to us at

By -- 2023-03-13 in Blog

ChatGPT is an AI driven natural language processing tool and has been the talk of the town since its release in November. The web-based chatbot has already been utilized for everything from crafting college level essays to writing computer code. Concerns have arisen in the academic realm due to the possibility of cheating, while many in the copywriting industry are worried about losing their jobs. The cybersecurity industry has also taken notice of potential threats ChatGPT may create.

The Concern

Check Point, an Israeli cybersecurity company, demonstrated that ChatGPT can be used in tandem with OpenAI’s code-writing system Codex to create phishing emails carrying a malicious payload. One major weakness of phishing attempts is their lack of sophistication – it is often quite clear that these emails are spam or attempting to extract information. However, with ChatGPT it will become very easy to create well written and believable emails. This poses a major cybersecurity threat, as more workers may accidentally expose confidential information.

Reasons for Optimism

There are plenty of ways ChatGPT can be used for good as well though. Cybersecurity professionals can use ChatGPT to generate code in order to simulate threats, exposing weak points in their defenses that can be improved. If further developed, ChatGPT may also become useful for automating tasks, drafting articles, and writing code.

Ultimately, ChatGPT is a technology that will be used on both sides of the cybersecurity war. The most important thing anyone can do at this time is just to be aware of the potential risks and take preventative steps to mitigate them. If you have any questions about ChatGPT, the protection of your information, or any general IT questions, feel free to reach out to us at

By -- 2023-02-15 in Blog

46% of all cyber-attacks impact businesses with under 1,000 employees. Couple this with IBM’s report stating 60% of those businesses end up closing their doors within 6 months of a cyber-attack, and it becomes easy to see how important cyber insurance is becoming. Yet, many at risk businesses do little or nothing at all to protect themselves.

It’s easy to assume that large sized businesses are the primary target of cyber-attacks. However, most of these companies have high levels of cyber security. Meanwhile, many small and medium sized businesses have poor security measures. This means their data is on average easier to obtain and may contain access to larger partners and vendors as well. Most phishing and ransomware schemes are games of numbers and opportunity, meaning most hackers will have a wide net of targets. So while small business owners may feel that they’re “flying under the radar”, they may actually be at the greatest risk.

In this era of increasingly sophisticated phishing schemes, cyber insurance has become an essential starting point for businesses. Cyber liability insurance helps protect businesses from the high costs involved in recovering from a data breach or malware attack. Additionally, it can provide the technical resources needed to regain access to data, restore system access, and assist in managing reputational damage.

However, cyber insurance doesn’t offer preventative and protective measures. In order to qualify for cyber insurance, basic cyber hygiene needs to be in place within your business. This cyber hygiene includes keeping data organized and secure as well as having established best practices in place.

Three Steps to Best Cyber Practices

First, you need to assess your cybersecurity posture. Maintain a list of all software, hardware, and applications your business uses. Analyze your business for vulnerabilities such as how old equipment is disposed of, if staff are being properly trained on safe practices, and if employees are connecting to work remotely.

After that, create a hygiene policy for your company to follow. This includes procedures such as using complex passwords and multifactor authentication for sign-ins, consistent software and security updates, backing up data, and only giving permissions to the required personnel.

Lastly, do your research and find the right cyber insurance for your needs. Compare different plans and find the coverage and benefits that fit your business best. Following the first 2 steps listed can help you to get lower insurance rates and get the right policy for your needs.

Every business should have cybersecurity in place in 2023, and cyber insurance has become a needed part of that equation. If you are not currently setup with the above mentioned items or if you have any questions about cybersecurity, cyber insurance, or any general IT questions, feel free to reach out to us at

By -- 2023-02-13 in OptfinITy News

Springfield, Virginia, February 13th, 2023 It was announced today that CRN®, a brand of The Channel Company, has named OptfinITy to its Managed Service Provider (MSP) 500 list in the Pioneer 250 category for 2023. CRN’s annual MSP 500 list identifies the industry-leading service providers in North America who are driving a new wave of growth and innovation for the channel through forward-thinking approaches to managed services, helping end users increase efficiency and simplify IT solutions, while maximizing their return on investment.

The Pioneer 250 recognizes companies with business models weighted toward managed services and largely focused on the SMB market. OptfinITy is honored to have made the list and will continue to provide the highest level of information technology services possible to clients.

“Managed services offer a path for businesses of all sizes to remain efficient and flexible as they grow,” said Blaine Raddon, CEO of The Channel Company. “The solution providers on our 2023 MSP 500 list are bringing innovative managed services portfolios to market, helping their customers win by doing more with the IT budgets they have and freeing up resources to focus on mission-critical activities to drive future success.”


Michael Drobnis

7405 Alban Station Court, Suite B205

Springfield, VA 22150



About The Channel Company

The Channel Company enables breakthrough IT channel performance with our dominant media, engaging events, expert consulting and education, and innovative marketing services and platforms. As the channel catalyst, we connect and empower technology suppliers, solution providers and end users. Backed by more than 30 years of unequalled channel experience, we draw from our deep knowledge to envision innovative new solutions for ever-evolving challenges in the technology marketplace.

Follow The Channel Company: Twitter, LinkedIn, and Facebook.

© 2023 The Channel Company LLC. CRN is a registered trademark of The Channel Company, LLC. All rights reserved.

The Channel Company Contact:

Natalie Lewis

The Channel Company

By -- 2023-02-3 in Blog

The orange and green dots that you may now see on the top of your iPhone screen (for devices with iOS 14 or later) are part of an enhanced privacy and security update. When an orange dot appears right above your cellular bars, it means an app is using your iPhone’s microphone. It can be any third-party app, or a basic function of your iPhone such as making a call or utilizing Siri. When you see the orange dot appear, you can swipe down from the top right of your screen to view which apps are currently using your microphone.

When a green dot appears in the top right corner of your iPhone’s screen, this means an app is using your camera and/or your microphone. Just like with the orange dot, you can swipe down from the top right corner of your screen to see which apps are using your camera. If you have an Android 12 or later, a green dot in the top right corner of the screen will inform you when your phone’s camera or microphone is being used. You can swipe down on your screen to show the notification bar, and from there click the green dot to see which apps are using your camera/microphone.

If you see an indicator that your microphone/camera are in use even though you aren’t using any apps, it likely means an app has permission to access those features even when it isn’t in use. If this is not the case, it’s possible your phone may have been hacked. To avoid this, you may want to look into installing antivirus software on all your devices. If you have any questions about your phone’s security or IT in general, feel free to contact us at .

By -- 2023-02-1 in Blog

It’s National Change Your Password Day, so it’s a great time for a refresher on creating good passwords and why you should use a secure password manager. These steps are easy to follow and don’t take much time but are essential to keeping your personal information safe on the internet.

Best Password Practices

  • Passwords should be a minimum of 8 characters
  • You should use a mixture of upper and lowercase letters, numbers and symbols
  • Refrain from spelling any dictionary words
  • Enable multifactor authentication (MFA)
  • Never use the same password for more than one account
  • An example of an effective password would be: %PLxO23saX2#q

For a lot of people, this might seem very difficult to do when you have so many accounts.   That is why we recommend the use of a password manager. If you aren’t familiar, password managers record your log-in information when first signing into a website, and then auto-fill the information on subsequent visits. This allows for all your accounts to have different passwords without having to remember each specific one. Password managers can even auto-generate strong passwords for you.

Many password managers keep your master password locally and not on a remote server, protecting your account in the event of a data breach. Even the best password managers have vulnerabilities and can be hacked, but quality managers are based on zero-trust security. This means that all your passwords are encrypted at the device level, and not accessible to the password manager itself or any outside parties. However, if someone did get access to your master password, they could access your vault. This is why using multifactor authentication is still vital.

Creating strong passwords, enabling multifactor authentication, and using a password manager are all great and easy ways to keep your personal information secure in 2023. If you have any questions about password managers or IT in general, feel free to reach out to us at

By -- 2023-01-25 in Blog

Apple announced Safety Check in 2022, an iOS security feature designed to view the information you’re sharing with others, such as your location or credentials. The feature allows you to instantly revoke those permissions, with the intention to help protect against domestic abuse. However, Safety Check can be useful for anyone with an iPhone that’s interested in their privacy and security.

The Safety Check feature not only protects against domestic abuse, but also can be used to keep an eye on all your downloaded apps and revoke permissions as desired. For example, camera and speaker permissions for any app can be changed at will.

How to use Safety Check to monitor app permissions:

  • Launch Settings
  • Click Privacy & Security, and then click Safety Check
  • Select Manage Sharing & Access
  • Use Face/Touch ID to access the security feature

After these steps, you’ll get a detailed summary of what you can review, such as people, apps, and account security. Since we’re focusing on app permissions, we’ll skip through the Sharing with People section and go directly to App Access. Here, you will see a list of your third-party apps, as well as what information is being shared with them.

To revoke an app’s permissions, just check the circle next to the app and then tap Stop App Access at the bottom of the screen. You can revoke different permissions from apps, such as Bluetooth, camera, location and more. Just be mindful of what you disable, as some permissions are needed for apps to function properly.

If you have any questions about your phone’s security or IT in general, feel free to reach out to us at