By -- 2018-10-9 in Blog

Even if you work with a trusted IT provider, you need to be alert for remote tech support scams. Remote tech support scams involve cybercriminals pretending to be a help desk employee from an IT company and reaching out to fix a problem with your computer remotely. Once they are given the credentials needed to access your computer remotely, they will either steal your data, install malware or spyware, or both. They then often proceed to request a payment for “fixing” a problem that never existed. These scams are becoming increasingly prevalent and are causing millions of dollars in losses. A recent article provides some advice on how to prevent yourself from falling victim to a remote tech support scam.

The main thing to remember is to be suspicious of anyone who reaches out to you to and offers to fix something. Do not respond to unsolicited calls or emails even if they appear to be legitimate. It is not uncommon for cybercriminals to disguise themselves using the name of a trusted tech company that will even show up on a caller ID. Remote tech supports scams implement the same fear tactics that are used in phishing scams such as sending an email message or calling claiming you need to click on a link or call a phone number right away to protect your computer from being infected with a virus.

What you need to remember, however, is that legitimate tech companies will never call or send an email to offer remote support services or push you to make a quick decision. If you receive an unsolicited call or email from what appears to be a trusted IT services provider, always double check with a trusted tech company before giving out personal information, calling phone numbers or clicking on links.

Being a trusted IT service provider ourselves, we at OptfinITy want you to remain safe from all types of scams and cyberattacks. If you have any doubts about how to protect yourself or your organization from falling victim to these attacks and scams, or if someone contacts you pretending to be us, don’t hesitate to give us a call at 703-790-0400. You can also visit us on our website at www.optfinity.com.

By -- 2018-10-4 in Blog

In the current technological age, a website is now the face of an organization. When people hear about a new business or organization, the first thing they’ll do is check out their website. While having a secure, well-functioning website for your organization can help raise the reputation of your brand, having one that is not secure and puts visitor’s information at risk can have the opposite effect. A recent article provides some preventative measures you can take to keep your website and online reputation secure.

  1. Have a protocol in place for your organization outlining what to do in the case of a security breach. The better prepared you and your employees are, the quicker you will be able to stop or contain a cyberattack.
  2. Be sure you have access to a long history of logs and be sure you are checking in on your website daily for spam activity, security plugins and updates. If an update is available, be sure to go forward with it since outdated software is prime real estate for hackers.
  3. Do frequent backups, at least once a month, on everything! Creating backups takes away any opportunity for a ransomware attack.

As always, OptfinITy is here to answer any questions related to your IT needs. If you have any questions or concerns about the security of your organization’s website, please don’t hesitate to give us a call at 703-790-0400 or visit us on our website at www.optfinity.com.

By -- 2018-10-2 in Blog

While running a small organization, getting your name out there is critical for your success. While using social media and online advertising are available options, the best way to become recognized by the largest audience possible is to appear at the top or near the top of an online search engine. A recent article from entrepreneur.com provides some tips on how to make this happen.

The first step to take is to make sure your website runs efficiently. This includes eliminating lag time between pages, and allowing for easy navigation and smart phone optimization. If your website runs slow or is confusing to navigate, people will more than likely become frustrated and leave your website never to return.

A great way to ensure your website runs at a fast speed is to optimize your images, which essentially means not using images at a size that is larger than necessary. Since more than 50% of a website’s memory load on average consists of images, having an image on your website that is unnecessarily large can be the difference between a fast and slow loading website. For example, if you are placing an image into a box that is only a 500 pixel square, uploading an image that is 5,000 by 5,000 pixels is only going to slow your website down.

Optimizing your website for mobile is now more critical than ever since consumers now spend around 69% of their time on their smartphones. To improve your website’s mobile performance, you should research which web-hosting site will work best for your content, or if you are developing your own, implement accelerated mobile pages to speed up your website.

Once you have a flawless, fast-running website that is fully optimized for mobile devices, your next priority should be to establish authority and use keywords in your website that will direct as many people to your site as possible. While establishing authority can take some time, you can speed up the process by encouraging people to share your news and blog posts on social media.

The use of specific and direct keywords will raise the likelihood of your website showing up in searches. For example, if your website contains an article about how to make lemonade, you will want to go with clear, direct keywords in the title and throughout the article that will show up in people’s searches. A good example would be “How to Make Great Lemonade.”

What you will want to avoid is trying to get creative and titling your post something like “Lemonaide: How to Create a Perfect Blend of Sugar, Water, and Lemons.” None of those terms are going to be something someone searches for while looking up how to make lemonade, and as a result, people will likely be directed to another website and not yours.

To recap, having a well-functioning website that is optimized for all platforms combined with the strategic implementation of keywords will result in a successful, well-known organization. OptfinITy provides assistance with website development and would be happy to answer any questions you may have regarding website development or any other of your business’ IT needs. For more information give us a call at 703-790-0400 or visit us on our website at www.optfinity.com.

By -- 2018-09-27 in Blog

You probably receive hundreds of emails per day, and more than likely, one of those emails contains malware. According to a recent IT World article, one out of every 244 emails contains malware. This means you need to be on the lookout for suspicious looking emails at all times. Here are a few red flags to look out for so you don’t click on a malicious email and infect your computer with malware:

  1. Improper spelling or grammar. You may receive an email that attempts to disguise itself as coming from a legitimate source such as your bank or Amazon, but if the spelling or grammar is off then it would be in your best interest to not trust that email.
  2. Must act now warnings or other scare tactics. Anything that prompts you to act quickly or threatens you with unreasonably severe consequences for not taking some sort of action is likely a phishing scam. Also, don’t be fooled by emails that claim to be from the IRS or FBI since these agencies are never going to contact you via email.
  3. Suspicious attachments or links. If you are not expecting an attachment or receive an email with a link to click on, double check with the source to make sure the attachment is safe to open and always hover your mouse over a link before clicking on it. If the link is a mile long or has improper spelling, it is most likely malware and should not be opened.

OptfinITy is here to answer any questions you may have regarding phishing and safe email practices, which also happens to be the topic of this month’s webinar! To sign up for free click here. If you have any other questions related to technology don’t hesitate to give us a call at 703-790-0400 or visit us on our website at www.optfinity.com.

By -- 2018-09-25 in Blog

Many organizations today use file-sharing software to allow for more effective communication and collaboration on documents in the office. While the ability to share files is undoubtedly useful as it improves efficiency, files that aren’t properly protected and land in the wrong hands can lead to serious issues ranging from fraud to identity theft. The reason these shared files are vulnerable is because much of the data is stored by the organization’s internet service provider. A recent entrepreneur.com article provides some suggestions on how to prevent your organization’s shared files from falling into the wrong hands.

  1. The first step to take is to make your employees aware of the risks associated with file sharing and be sure they are educated about security practices in general. If your employees have a good understanding of the risks involved they will be more likely to take the necessary precautions to protect the files they are working with.
  2. If you are using the cloud as a location to save and edit your shared files, you need to be sure only authorized users have access to them. To achieve this, you will want to consider upgrading to a service that allows you to set permissions so that files can only be accessed by authorized users such as OptfinITy Sync. Some cloud-based file storage systems even offer tracking features which show who has sent, received, opened and shared a document. With these cloud service features, you can have peace of mind knowing your files are not being accessed by unauthorized users.
  3. Make sure all your content management systems are up to date and make sure your staff is constantly educated on the latest software. This will allow your content-management system to better protect sensitive files and ensure that your employees are doing their part to keep the information safe and secure.
  4. Implement an integrated security system that covers all bases when it comes to security threats. While it is an option to use stand-alone security systems that focus on specific areas, such as one for email security and another for file-sharing, it is most practical to use one that covers all your bases.

Being cloud users ourselves with a great product like OptfinITy Sync we would be happy to answer any questions you may have regarding the security of the file sharing software you are using. Please don’t hesitate to give us a call at 703-790-0400 or visit us on our website at www.optfinity.com.

By -- 2018-09-19 in Blog

When a natural disaster or great tragedy occurs such as a massive hurricane or the Boston bombing, your immediate reaction may be to want to help those who are suffering during these circumstances by sending monetary donations. Unfortunately, cybercriminals know this and take advantage of people’s good will through phishing scams and the creation of fraudulent websites that ask for monetary relief. According to a recent cyber intel advisory, there has been a spike in the number of registered domains containing words such as “claims,” “compensation,” “lawyers,” “relief,” and “funds” in the wake of the formation of Hurricane Florence, which suggests there are many new fraudulent websites being created targeting people who want to donate to disaster relief efforts. To best protect your technology from being exposed to malware, here are a few guidelines to follow in the wake of a disaster:

  1. Highly question any individual plea for financial assistance. This includes solicitations on social media, direct emails and crowd funding websites. Even if it appears to come from a trusted source, always double check with the Federal Trade Commission Consumer Information website or National Voluntary Organizations Active in Disaster website for guidance.
  2. Beware of emails containing links that claim to lead to a website with “more information” or photos. Although the photos and information may be relevant, it is extremely important to double check if it is a trusted website before clicking on the link.
  3. A good way to check to see if a website is legitimate is to scroll over the URL. If the URL says something different than where you are trying to go, you know it’s a fraudulent website. For example, you may receive an email that says donate here for hurricane disaster relief efforts at www.madeupdomain.org, but when you scroll over the hyperlink it would say www.madeupdomain.com.
  4. Never even open a spam email, let alone click on the attachments or links inside, and never reply to an email with or give any personal information to a website that you are not 100% positive is legitimate.

You should always be following safe email practices, but in the wake of disastrous events it is especially important to be on the lookout for phishing and malware schemes since they routinely spike under these circumstances. Once your technology is compromised, it is expensive to fix, so don’t put yourself in that position. If you have any questions about how to prevent yourself from becoming a victim of a malware or phishing attack, don’t hesitate to give us a call here at OptfinITy at 703-790-0400 or visit us on our website at www.optfinity.com.

By -- 2018-09-18 in Blog

If you are running a small business or organization, you can’t afford to be spending money on anything that isn’t directly boosting awareness or increasing revenue. While paying for ad space on websites with high amounts of traffic is a great way to get your name out there, it is important to be wary of fraudulent websites. These websites will appear to be good options but are in fact phony websites stuffed with keywords which make their site rank high on Google.

Ad fraud is a killer for small organizations and continues to put thousands out of business by draining them of their advertising budget and leaving them with no return on their investment. A recent article from entrepreneur.com provides a few suggestions on how to avoid becoming a victim of ad fraud.

  1. Always question the sources of traffic when purchasing ad space. A great way to do this is to run buying tests using third-party verification for both non-human and invalid traffic to make sure you are not being scammed and throwing away your money.
  2. Always work directly with advertisers and make sure it’s someone you can talk to, ensuring that it’s a real person. Many scams will hide their identities and it is therefore recommended to only deal with advertisers who can prove their identities.
  3. Use AI which can help you fight ad fraud by filtering fraudulent IP addresses, cleaning spam bots, monitoring site traffic, and detecting sophisticated click fraud. AI is the most effective defense mechanism you can use to fight ad fraud due to its capability to analyze complex data and its self-learning mode.

It seems the list goes on and on for the types of scams on the internet these days, and with the ever-increasing dependence on technology, it is extremely important to be aware of the threats your organization faces. If you have any questions about how to keep your organization secure, don’t hesitate to give us a call at 703-790-0400 or visit us on our website at www.optfinity.com.

By -- 2018-09-13 in Blog

It seems there is an app for almost everything today, and your business or organization should be no exception. Having a mobile app for your business establishes credibility and gives people another way to interact with your organization. Perhaps your organization already has in place a responsive website that allows for an optimal user experience on every device and you’re thinking why create an app? A recent article answers this question and illustrates the importance of creating a mobile app for your organization.

Due to the increasing number of smart phone users, mobile apps provide an easy-to-use alternative to your website since they are built specifically for mobile devices and touch navigation. Therefore, your app can be used as a fun, interactive platform to engage with those interested in your organization.

Since the number of mobile apps continues to grow, having one for your organization gives a boost to your organization’s credibility and will allow you to keep up with or even set yourself apart from the competition. People spend way more time on their phones than their other devices such as laptops or computers. Therefore, if you direct someone to your app to answer any questions they may have about your organization, you already have the upper hand on an organization with only a website because they will be able to access your information instantly from wherever they are.

You can also use your app to give clients a more personalized experience by giving them the option to enable receiving notifications that will keep them in the loop with what’s going on in your business or organization. For example, you could send them notifications about upcoming events or special promotions. Instead of sending a promotional announcement via email and risking it being sent to junk or deleted, the same brief notification would show up on their smart phone screen ensuring they would see it.

As always, OptfinITy is here to assist your business or organization with its IT needs and we do create Mobile apps. If you have any questions about our mobile app development services, feel free to give us a call at 703-790-0400 or visit us on our website at www.optfinity.com.

By -- 2018-09-11 in Blog

While entering a coffee shop, a restaurant, or even the mall, the first thing many people do is connect to the WiFi network. People connect to public WiFi networks constantly to allow for better functionality on their devices or to allow them to continue to access the internet and email from devices that don’t use data such as laptops. While this is undeniably convenient, if you are not taking the right precautions while connecting to public WiFi you are putting your information and data at risk. A smallbusiness.com article provides some suggested precautions to take before and while you are connected to public WiFi.

  1. Make sure you’re connected to the right network- Pretty much everywhere you go there are going to be a variety of network options to choose from. You need to make sure you are connecting to the one that’s secure. It’s very easy and common for cybercriminals to set up malicious networks that will give them immediate access to your information once you connect. Also make sure you are using that organizations network and not something that looks like it.  For example, PANERA might be a real one while Panerawifi is not.
  2. Refrain from making online purchases- Yes, it can be tempting to jump on that flash sale. However, when you purchase something on a public network, your credit card information, even if encrypted, will be sent through the airwaves where it has a chance to be intercepted.
  3. Don’t log into anything, but if necessary, make sure its encrypted- Cybercriminals are always lurking around on public WiFi networks, and it is not uncommon to have your password stolen after logging into any type of account.
  4. Use different passwords- Regarding number three above, if your password is stolen, you don’t want it to be your password for everything. Since this obviously gives a cybercriminal the key to all your accounts and information, you want to have different and complex passwords for each one.
  5. Use a Virtual Private Network (VPN)- Although setting one up can be complicated, it is well worth it since it will essentially turn your public internet session into a private one. VPNs are commonly used by businesses to allow their employees to connect to their office networks and work securely from a remote location.

While it can be easy to get caught up in the convenience of having access to WiFi almost everywhere we go, it is important to remember that these networks are public, and therefore, anything you wouldn’t want other people to see should not be done while using these networks. If you have any questions about VPNs or WiFi security give us a call here at OptfinITy at 703-790-0400 or visit us on our website at www.optfinity.com.

By -- 2018-09-6 in Blog

We use passwords for everything. Our email, social media, bank accounts, and many other online platforms require passwords for access. Since passwords are needed for so many things, many people choose to go with easy-to-remember passwords, or use one password for everything. While it may be convenient to not have to memorize a bunch of passwords or forget the composition of a complex one, you are essentially leaving all your personal information out in the open if you create weak passwords. A recent article from smallbusiness.com gives some basic do’s and don’ts for password creation as well as addresses the issue of forgetting your complex password.

Here are some of those items:

  1. Don’t use a simple pattern. Example: “qwertyuiop” or “asdfghjk”
  2. Don’t use a favorite sports team. If you must, substitute characters for letters.
  3. Use your birthyear at the end of a phrase but don’t use it alone.
  4. Never use your children’s names.
  5. Don’t use swear words and phrases, hobbies, famous athletes, car brands, or movie names.

What you should be doing is ensuring that:

  1. All passwords have at least eight characters or more and contain a mix of character types.
  2. Your password is changed often…at least once a month for bank and other financial related logins or that it is adequately complex using a password tool.

An easy trick to create unique, strong passwords, is to come up with a phrase that you will remember such as “I eat 4 tacos for lunch daily.” You can take the first letter from each word in the phrase, turn the “four” into a number, and you have your base password: ie4tfld. Then, to create unique passwords for your different accounts, use the first and last letters of the account you are signing into and insert them in the beginning and end of the base password. Capitalize the first or last letter and you have a strong, unique password for every site. For example, your password for your Netflix account would be nie4tfldX, and your password for your Hulu account would be Hie4tfldu.

As always, OptfinITy is here to answer any questions regarding technology for your business or organization. If you have any doubts about password strength or protection don’t hesitate to give us a call at 703-790-0400, or visit us on our website at www.optfinity.com.