By -- 2022-07-29 in Blog

Apple Announces New Lockdown Mode

Apple is introducing a new feature designed to protect its users from advanced hacking and targeted spyware. Unlike typical Apple features that focus on bug fixes or improving battery life, this feature provides enhanced security measures for devices.

Key Security Features

The new lockdown mode includes several protection features:

  • Blocking Attachments and Link Previews: Apple will block attachments and link previews in messages.
  • Limiting Hackable Web Technologies: It will restrict potentially vulnerable web browsing technologies.
  • Screening Incoming FaceTime Calls: The system will prevent FaceTime calls from unknown numbers.
  • Accessory Connection Restrictions: Apple devices will only accept accessory connections when the device is unlocked.

This lockdown mode will be available for iPhones, iPads, and Mac computers.

Free Release and Research Funding

Apple plans to release the new lockdown mode later this year, and it will be free for all Apple users. In addition, Apple announced a $10 million grant and a bug bounty of up to $2 million to encourage further research into improving device security.

Previous Efforts to Combat Hackers

In response to the Pegasus spyware, Apple issued a free software update last year to prevent the company from developing or selling any more hacker tools. Additionally, Apple began sending “threat notifications” to potential victims of these tools. Since November, Apple has notified people in approximately 150 countries, though most individuals will not be targeted by highly sophisticated cyberattacks.

Plans for Expansion

Apple plans to expand the lockdown mode over time. Currently, the feature disables various computer functions that could expose users to potential attacks.

Competition from Google

Apple is not the only company enhancing its security measures. Google has introduced “Advanced Account Protection,” designed to safeguard individuals at higher risk of targeted online attacks. This feature adds an extra layer of security to logins and downloads.

Apple’s Ongoing Commitment to Security

Apple remains dedicated to strengthening its security features and continues researching this growing threat to enhance protection for its users.

For more information about online safety, contact us at info@Optfinity.com.

By -- 2022-06-30 in Blog

Could you be providing people around you with your personal information and not really know it? You probably are.

A security researcher sat outside a coffee shop and was able to read individuals’ current location; and even past locations, including but not limited to the gym they go to, their job, and even their home.

Using an online database and a wireless auditing device, any educated computer user could possibly track someone’s location. In fact, when you aren’t connected to your Wi-Fi at work or at home, your phone is sending out signals to find networks to connect to. The signal from your phone can then be cross-referenced to see where you are based on the networks you are near.

So, what can you do? First, it is highly recommended to change the name of your home Wi-Fi network at least once a year. Make sure to use a common name such as a favorite band. By adding “_NOMAP” to the end of your home Wi-Fi name, this also lets mapping companies know you don’t want your Wi-Fi network published online, although that is not a guarantee.

For more information about what else you can do including network connection safety practices, reach out to us at info@OptfinITy.com

By -- 2022-05-4 in Blog

Have you received an email from a payment service that looks like this?

At a glance, it appears to be a legitimate email containing an invoice. However, a closer look reveals several discrepancies that show this email is a phishing attempt, received by someone here at OptfinITy.

A legitimate and trusted payment service like PayPal would never include these discrepancies in an email invoice. Here are some red flags within this email and things you should look out for before clicking on any email containing financial information:

Red Flags to Watch Out For

Check if it was sent to the right account
Though we anonymized the person who received this email, that person received the invoice on an email account different from the one linked to their PayPal account.

Check names
This invoice lists the recipient as Patric Smith, even though Mike Duncombe is initially listed as the invoice sender. Neither of these names belongs to the account holder who received this invoice.

Check for spelling and formatting errors
The phone number listed is incorrect.
A quick Google search will reveal that PayPal’s customer service number is +1 (888) 221-1161, not the one listed in the email.

What Are Next Steps?
Most reputable payment processors have channels through which you can report phishing emails. If you believe you’ve received a phishing email from an entity claiming to be PayPal, forward the entire email to spoof@paypal.com, and do not alter the subject line or forward the message as an attachment. Afterward, delete the suspicious email. PayPal will investigate the email and inform you of their findings.

Did you know we provide phishing test services? If you’d like to test yourself and your employees and gauge how susceptible your organization is to fraudulent messages, reach out to us at info@OptfinITy.com

By -- 2022-05-2 in OptfinITy News

Springfield, VA Release Date: May 2, 2022

 

OptfinITy is proud to announce its 20th anniversary as the DC Area’s leading managed service provider.

 

On May 2, 2002, OptfinITy was incorporated in Falls Church, VA.  “My vision was to deliver enterprise IT solutions to small to medium size organizations,” said Michael Drobnis, CEO of OptfinITy.  “Today, OptfinITy is much more than an IT provider; we are a company that delivers full range solutions to various industries throughout the world”.

 

OptfinITy has received numerous awards and recognition over the years, including the MSP501 ranking of the top Global IT providers and the CRN MSP500 List.

For more information OptfinITy and their services please visit https://optfinity.com/

 

Contact Info:

Michael Drobnis

OptfinITy
7405 Alban Station court, Suite B205

Springfield, VA 22150
(703) 750-0400

By -- 2022-04-26 in Blog

Do you have an old Android phone and don’t know what to do with it? Maybe you’re considering storing it in a drawer, selling it, or trading it in. Whether your phone is too old to have a high trade-in value or you’re simply exploring trade-in alternatives, read on to discover the top 5 ways to repurpose your old Android.

1. Store Your Photos

Pictures can consume a significant amount of storage, so use your old phone to save room on your new one! Transfer photos from your new device to the old one, or use the old device as a camera. You can take it to places where you’d hesitate to bring a new phone, such as the beach or lake.

2. Turn It Into a Google Home

This process requires no downloads and no $130 Google Home purchase. First, update the phone to the latest Android OS. Next, pair it with a Bluetooth speaker and keep both plugged in at all times. Now, you can give Google commands whenever you want!

3. Convert It Into a Game Boy

Transform your old Android into a Nintendo Game Boy with a compatible Android and a $50 Hyperkin Smartboy Mobile Device. To play, use Game Boy cartridges you already own or purchase new ones. Alternatively, download Game Boy Advance apps if you don’t have cartridges.

4. Use It as a Universal Remote

Turn your old Android into a remote by downloading a remote control app and syncing it with your devices. This setup enables you to control devices like Rokus, Apple TVs, Xboxes, and even smart light bulbs.

5. Turn It Into a Home Security Camera

Repurpose your phone to monitor your home while you’re away. Download a security camera app and place the phone in a main room with a good view. Additionally, set it up outside when you’re home to see who’s at the door.

If you’re interested in discussing phasing out old devices and purchasing new ones for your office space, feel free to contact us at info@OptfinITy.com or call (703) 790-0400.

By -- 2022-04-22 in Blog

Happy Earth Day!

Earth Day inspires everyone to reflect on their efforts to keep our planet clean and thriving. Whether you compost, recycle, take short showers, or drive an electric vehicle, take time today to assess your impact on the environment and explore new ways to make a difference. Below are three technology tips that benefit both the planet and your bottom line.

1. Reduce Paper Usage

Avoid printing emails, online forms, and business manuals unless absolutely necessary for legal purposes. Minimizing paper usage protects trees and saves money on paper and ink. Paper documents also hinder efficiency since they can’t be integrated, automated, or accessed remotely. Relying on paper slows operations and increases manual labor costs. Transitioning to digital documents streamlines workflows and supports sustainability.

2. Implement Electronic and Cloud Storage

Store documents digitally by leveraging the cloud. Physical storage consumes space, air conditioning, and other costly resources. For instance, maintaining a single file cabinet can cost as much as $1,500 and one employee annually, according to the Paperless Project. Organizing paper files can be cumbersome, and natural disasters can destroy important information. By using electronic business management systems, you protect vital documents while reducing your environmental footprint.

3. Leverage Remote Work

Encourage remote or hybrid work plans if your industry permits it. Remote work reduces air pollution by cutting down on commuting. It also aligns with employee preferences, as 68% of U.S. workers favor remote work. Happier employees are more productive, with 77% of remote workers reporting increased productivity when working from home. This approach benefits your workforce, business, and the environment.

If you want to transition to cloud storage or explore remote work logistics, contact us at (703) 790-0400 or email info@OptfinITy.com.

By -- 2022-04-18 in Blog

Maximize Your Gmail Experience with These 7 Tricks

Gmail is the email platform of choice for 1.8 billion active accounts. If you’re among this vast user base, you might not be aware of all the features Gmail offers to enhance your email experience. Check out these seven tips to customize and optimize Gmail to suit your needs.

1. Color-Code Important Messages

Starring messages is a great way to keep important emails easily accessible, but you can take organization a step further by color-coding them. To add color-coded stars:

  1. Go to Settings.
  2. Scroll down to the General tab.
  3. Drag More Color Options to the “In Use” section.

2. Save Time with Smart Compose

Smart Compose is a game-changer for anyone who frequently uses professional language in emails. This feature suggests the rest of your sentence as you type, helping you save time and effort.

  • To enable or disable Smart Compose, go to Settings.
  • Google even welcomes feedback on the quality of suggested phrases!

3. Unsend an Email

Accidentally hit send? Gmail allows you to undo the action:

  • After sending an email, look for the small box with “Undo” in the lower-right corner of your screen.
  • Click it to unsend your message instantly.

4. Find Emails Faster with Advanced Search

Advanced Search helps locate information buried in your inbox by filtering emails based on:

  • Date, sender, recipient, specific words, or even words the email doesn’t contain.
  • Click the icon with three slider bars in the search box at the top of your inbox to access this feature.

5. Mute Annoying Conversations

Stop notifications from overly active email threads without leaving them.

  • Check the box to the left of the email in the thread.
  • Click the three-dot icon in the top options bar.
  • Select Mute from the dropdown menu.

6. Customize Your Inbox Layout

Gmail lets you decide what type of emails to prioritize:

  1. Click the Quick Settings gear icon.
  2. Select a custom inbox view, such as unread, important, or starred messages.

7. Protect Sensitive Emails with Confidential Mode

Gmail’s Confidential Mode lets you set an expiration date for emails containing sensitive information.

  • Before sending an email, click the lock icon near the send button.
  • Set the expiration date to ensure the email vanishes after the allotted time.

Have Questions?

For any concerns about email deliverability or security, reach out to us at info@optfinITy.com. Let us help you make the most of your Gmail experience!

By -- 2022-04-11 in Blog

Spring: A Season for Digital Renewal

Spring marks a time of regrowth and change, and many people seize this season as an opportunity to tidy up their house or apartment. However, it is also the perfect time to clean up your technology and cyber footprint. Over the year, activities like paying bills, shopping, and using social media can expand your cyber footprint. Taking steps to declutter and protect yourself and your loved ones from potential cyber threats is essential. Here’s how you can refresh your digital life this Spring.

Strengthen Your Passwords

Start by reviewing your passwords. Update them with stronger, more unique combinations when necessary. Additionally, enable Multi-Factor Authentication (MFA) on accounts containing sensitive information, such as bank or retirement accounts. These actions enhance your security and make unauthorized access much more difficult.

Organize Your Email Accounts

Email accounts often accumulate a lot of clutter. Organize your emails by creating folders for items you want to keep and deleting those you no longer need. Unsubscribe from spam senders to reduce future clutter. Take this opportunity to review and update your email filters, ensuring that unwanted marketing or spam messages go directly to the trash.

Tidy Up Your Social Media Profiles

Social media platforms can reveal more about you than you realize. Search your name online to understand what others might find. Review your privacy settings, photos, and videos to decide if any adjustments or deletions are necessary. If you want to close a social media account, ensure you deactivate or delete the account rather than just removing the app from your device.

Update and Test Your Backup and Recovery Plans

Keeping your devices and operating systems updated is critical. This step ensures you’re protected against the latest vulnerabilities. Additionally, review and test your backup and data recovery plan. Confirm that you can restore files from your backup and evaluate what you’re backing up, where it’s stored, and the media used for storage.

Need Help? Let’s Talk

If you’re interested in discussing network best practices and ensuring the smooth operation of your organization’s IT systems, reach out to us at info@OptfinITy.com or call us at (703) 790-0400. We offer free, no-obligation consultations to help you navigate your IT concerns.

By -- 2022-04-3 in Blog

The Rise of QR Code Scams

QR codes are everywhere these days. From restaurant tables to Super Bowl ads, their uses have exploded since the pandemic began. Unfortunately, cybercriminals have also taken advantage of this boom. The FBI has warned that hackers now create malicious QR codes designed to trick unsuspecting scanners into revealing banking or login information. In early January, residents and tourists in Austin, TX encountered this firsthand when malicious QR code stickers were placed on parking meters. These codes promised an easy way to pay for parking online. Cyber experts have determined that scanning these suspicious codes won’t directly affect your phone by downloading malware. Instead, they lead to sites designed to steal your financial or personal information.

How to Spot QR Code Scams

  1. Think Before You Scan Be cautious with QR codes in public places. Does the sticker seem like part of an advertisement, sign, or display? If it looks out of place, it probably is. If the scanned website seems suspicious or asks for sensitive information that doesn’t seem relevant, avoid providing it.
  2. Avoid Scanning Codes in Unsolicited Mail There’s rarely a legitimate reason for a trusted sender to require a second device to access a site from an email. This also applies to paper mail—if you receive a piece of unsolicited junk mail with a QR code, assume it’s not safe.
  3. Preview the URL Many smartphone cameras now allow you to preview the URL when scanning a code. If the URL looks strange, trust your gut and don’t proceed. You can also use a secure scanner app to help spot malicious links before your phone opens them.
  4. Use a Password Manager If a QR code leads to a convincing but fake website where you have an account, a password manager will still detect the difference and prevent your passwords from being autofilled.

Stay Safe Online

If you’re interested in learning more about online safety and how to avoid and recover from phishing scams, feel free to reach out to us at info@OptfinITy.com.

By -- 2022-03-21 in Blog

If you frequent any social media platform, you’ve more than likely seen seemingly harmless, wacky quizzes pop up on your feed or timeline.  A lot of these tend to be associated with Facebook, but quizzes and surveys on Twitter and Instagram, as well as “Get to Know Me” videos on TikTok all serve a similar function: to harvest personal information from unsuspecting users.

Many times, these lighthearted posts are common security questions.  Headlines such as “Your Metal Band Name is the Street you Grew Up On + Favorite Pet’s Name” may appear benign, but the comments under such posts often contain a goldmine of potential passwords or answers to security questions. While there are plenty of question game posts that were created by cybercriminals with the intent of gaining access to sensitive information, not every quiz post is crafted by a hacker. However, these posts can be harmful regardless of the creator’s intent, as they are usually public and have no limits to who can view the post’s comments. Some examples of a quiz post a social media phisher may publish include:

  • Who even remembers their kindergarten teacher? Let’s celebrate our educators this week!
  • Nobody’s first car was a Ford- prove me wrong!
  • Name a TV show you could watch forever and never get tired of!

 

It’s nearly impossible to avoid coming across one of these phishing scams on social media, but there are steps you can take to protect yourself. First, don’t give out sensitive information on social media. Though some prompts may be tempting to complete, don’t answer or share quizzes asking for personal details. Additionally, keep an eye out for posts that create a sense of urgency and panic. Cybercriminals exploit emotions like curiosity, fear, greed, and helpfulness to create a sense of urgency to entice you to share information or click on a link. Lastly, when in doubt, flag or report a post if it seems suspicious.

For more information regarding online safety and best practices, you can always reach out to us at info@OptfinITy.com.