Think before you click

The following is from a Microsoft informational email – We thought you would find it interesting and useful

Security for Home Computer Users

Think before you click

updates-shield-cropped

Security updates for May 13, 2014

Learn how to get security updates automatically

Get updates from Microsoft Update

Q&A

How do I recycle my computer?

Earth Day was last month, but it’s not too late to recycle your old computer. If you use a Microsoft Certified Refurbisher, they’ll help you remove your personal information and donate your equipment to people in need around the world. 

 

Learn how to recycle old computers and devices.



Top Stories

Privacy in Windows Phone 8.1

Privacy in Windows Phone 8.1  

Learn more about the privacy and security settings for mobile web browsing, apps that can determine your location, and features like Cortana, the new personal assistant for Windows Phone.

 

Security improvements in Windows 8

Security improvements in Windows 8

Did you know that antivirus protection is built into the newest version of Microsoft’s operating system? Read about other features that can help keep you and your family safer online.

 

malware that keeps coming back

How to get rid of malware that keeps coming back

Some viruses, spyware, and other malicious software can be hard to get rid of, especially if they’re designed to make your security software stop working.

Available now: Security update for Internet Explorer

Available now: Security update for Internet Explorer

Review a recent update for the Microsoft web browser-available for Windows 8, Windows 8.1, Windows 7, Windows Vista, and Windows XP.

 



Follow Us

social-icon-sm-facebook

Facebook
Safer Online

social-icon-sm-twitter

Twitter
@Safer_Online

© 2014 Microsoft Corporation Terms of Use | Trademarks

vml]>Microsoftendif]>

Physician heal thyself -OffSite/Online Backup

Today I have given myself a major shock and have, fortunately, been able to recover.

A very important container of information (Microsoft OneNote – if you are interested) disappeared from my laptop! I do not know how that happened, but such is life. After a short period of running around screaming (metaphorically). I started to work out what to do about it.

The Backup files were not where they should be, or rather they were, but did not contain what I needed (it appears that Syncing had failed for a few days). Fortunately I suffer the paranoia of someone that has lost data before, and try to adhere to a 3-2-1 backup strategy, so I managed to find a recent backup in a different location (Thank you Carbonite).

An hours fiddling and I am back to where I should be. There is the outside chance that some of the data is a day older than it should be. And Steve, my business partner, may well have edited some of it in the last day. But we are in a far better position than we could have been.

I have reorganised my backups to take into account what when wrong this time.

The moral of this story?

YOU CANNOT HAVE TOO MANY BACKUPS!!! And make sure that your backups take all your data, it is not always where you think it is.

Contact Us to book an appointment or to discuss your needs further.

Failed Website? Or is it just me?

Have you ever tried viewing to a website and failed to connect?

Here are a couple of sites that will help you answer the question…

Is it down or is it just me?

http://www.downforeveryoneorjustme.com/

http://www.websitenotworking.com/

http://www.isitdownrightnow.com/

As always, click at your own risk.

Cosma

Contact Us to book an appointment or to discuss your needs further.

New Vulnerability Found in Internet Explorer

You may have already read about new vulnerability found in Internet Explorer (All versions). Microsoft does not yet have a fix for this issue. Here are two things you can do to stay safe in the meantime: – If you have an alternative browser such as Firefox or Google Chrome, use it. – This exploit works primarily by luring you to infected sites. So practice safe surfing when using IE: do not click on links in emails unless you are certain they are safe. Do not click on links in unexpected pop-ups

This may also be time to think about working as a Standard (Restricted) user as opposed to an Administrator.

Below are links to the Microsoft Security Advisory and some commentary by Gizmodo

Microsoft Security Advisory 2963983

New Vulnerability Found in Every Single Version of Internet Explorer

And last, but not least…

Steve Gibson, from GRC, has just posted the following mitigation. I cannot attest to how good it is, or what effect it will have, but Steve is usually very good about such things (why is why I am posting it here.

A quick mitigation for Internet Explorer’s new 0-Day vulnerability

As always…

Contact Us to book an appointment or to discuss your needs further.

Free Microsoft Anti-Virus Tools

  1. Introduction
  2. Microsoft Security Essentials
  3. Microsoft Safety Scanner
  4. Microsoft Windows Defender Offline
  5. Summary

Introduction

There are many tools about that promise to keep your pc clean from viruses and malware. Tools such as AVG, Avast!, Sophos and others make great promises, that are (probably) impossible to keep. They all have paid and free versions, the main difference being (in our opinion) that the free ones cause a performance hit on your PC.

It is beyond the scope of this report to make any real, meaningful comments about the effectiveness, or otherwise, of the tools. Suffice to say “you pays your money, you takes your choice”. Caveat emptor.

While it is true to say that the best cure is prevention, it is also true to say that it is no longer the case that YOU must have done something to get infected. These things come at us from all directions and the most innocent of things (websites usually) can be compromised. So what do you do once you are infected?

Below are 3 Free Microsoft Anti-Virus Tools, one a standard virus scanner and two offline tools, that you can use to start to clean up your computer. These tools may not clean your pc 100%, and you may still end up doing a system restore, but they will get you on the way and may clean things up enough for you to recover your data.

**********************************************************************************

Microsoft Security Essentials

This first tool is Microsoft’s attempt at an online virus scanner. While I am sure many people will argue that there may be better tools about it has a few things going for it. It is truly free (for home users and companies with up to 10 users). This is not a hobbled free version of a paid tool. It is not intrusive, it only makes it self known whan it thinks there is a problem. It is from Microsoft, so it does not seem to slow you PC down. We have been running it in UA since it’s initial availablility and have remained virus free.
The Tool can be downloaded here. Microsoft Security Essentials
Install it, update it, run a scan. Simple

**********************************************************************************

Microsoft Safety Scanner

Do you think your PC has a virus?

The Microsoft Safety Scanner is a free downloadable security tool that provides on-demand scanning and helps remove viruses, spyware, and other malicious software. It works with your existing antivirus software.

Note: The Microsoft Safety Scanner expires 10 days after being downloaded. To rerun a scan with the latest anti-malware definitions, download and run the Microsoft Safety Scanner again.

The Microsoft Safety Scanner is not a replacement for using an antivirus software program that provides ongoing protection.

The Tool can be downloaded here. Microsoft Safety Scanner

**********************************************************************************

Microsoft Windows Defender Offline

So you have a scanner, you have been careful what you download and where you download from, but you still get infected! What can you do.

There are many tools out there that will clean a PC, but many of them require that you have an idea what you are infected with, and a working pc to download them!

This is an offline tool that you can prepare beforehand and have ready in your arsenal in case it is ever required. You use this tool to create a “boot” disk that you can start your PC with. It then updates itself (this works best if you are on a wired connection) and scans your PC. The scan can take hours, depending on how much data you have, and though it does not always remove everything bad, it should get you to a position where you can get your data off. Full instructions are included on the download page.

The Tool can be downloaded here. Microsoft Windows Defender Offline

**********************************************************************************

Summary

No tool can keep you 100% safe, but these tools can help in the battle against the bad guys.

As stated above, it is best to not get infected in the first place. We have written on this subject in the past and I would suggest that a quick perusal of our Keeping Safe on the Internet page is a good idea to remind yourself of some precautions to take.

***********************************************************************************

I hope this helps.

Contact Us to book an appointment or to discuss your needs further.

Tips for creating a strong password

Passwords provide the first line of defense against unauthorized access to your computer. The stronger your password, the more protected your computer will be from hackers and malicious software. You should make sure you have strong passwords for all accounts on your computer. If you’re using a corporate network, your network administrator might require you to use a strong password.

What makes a password strong (or weak)?

A strong password:

  • Is at least eight characters long.
  • Does not contain your user name, real name, or company name.
  • Does not contain a complete word.
  • Is significantly different from previous passwords.
  • Contains characters from each of the following four categories:
Character category
Examples

Uppercase letters

A, B, C

Lowercase letters

a, b, c

Numbers

0, 1, 2, 3, 4, 5, 6, 7, 8, 9

Symbols found on the keyboard (all keyboard characters not defined as letters or numerals) and spaces

` ~ ! @ # $ % ^ & * ( ) _ – + = { } [ ] \ | : ; ” ‘ < > , . ? /

A password might meet all the criteria above and still be a weak password. For example, Hello2U! meets all the criteria for a strong password listed above, but is still weak because it contains a complete word. H3ll0 2 U! is a stronger alternative because it replaces some of the letters in the complete word with numbers and also includes spaces.

Help yourself remember your strong password by following these tips:

  • Create an acronym from an easy-to-remember piece of information. For example, pick a phrase that is meaningful to you, such as My son’s birthday is 12 December, 2004. Using that phrase as your guide, you might use Msbi12/Dec,4 for your password.
  • Substitute numbers, symbols, and misspellings for letters or words in an easy-to-remember phrase. For example, My son’s birthday is 12 December, 2004 could become Mi$un’s Brthd8iz 12124 (it’s OK to use spaces in your password).
  • Relate your password to a favorite hobby or sport. For example, I love to play badminton could become ILuv2PlayB@dm1nt()n.

If you feel you must write down your password in order to remember it, make sure you don’t label it as your password, and keep it in a safe place.

(Comment from UA: A better solution is to use a password manager tool such as Lastpass to keep your passwords for you.  You only need to remember one strong password (make sure it is a good one as it is the “keys to the kingdom”) and then use Lastpass to generate super strong ones for all your other needs and remember them for you.  2 Factor authentication is always a good idea when it is available.)

Creating stronger passwords using ASCII characters

You can also create passwords that use extended ASCII characters. Using extended ASCII characters helps make your password more secure by increasing the number of characters you can choose from to create a strong password. Before using extended ASCII characters in your password, make sure that passwords containing them are compatible with the programs that are used by you or your organization. Be especially cautious about using extended ASCII characters in passwords if your organization uses several different operating systems or versions of Windows.

You can find extended ASCII characters in Character Map. Some extended ASCII characters should not be used in passwords. Do not use a character if a keystroke is not defined for it in the lower-right corner of the Character Map dialog box. For more information, see Using special characters (Character Map): frequently asked questions.

Windows passwords can be much longer than the eight characters recommended above. In fact, you can make a password up to 127 characters long. However, if you are on a network that also has computers running Windows 95 or Windows 98, consider using a password that is no longer than 14 characters. If your password is longer than 14 characters, you might not be able to log on to your network from computers running those operating systems.

Links to the original Microsoft Posting

Contact Us to book an appointment or to discuss your needs further.