• 0417 313 101
  • stressfree@needtechcs.com.au
  • Roseby Road, Caboolture

Author Archives: admin

Should I turn my computer off?

Why turn your computer off after using it?

The Pro’s to switching your PC off,

  • A reduced energy bill.
  • Whether you use an SSD (Electronic Drive) or HDD (Mechanical drive), turning your computer off will prevent the hours (wear and tear) from building up. SSD’s are rated for tens of thousands if not hundreds of thousands of hours, but it all counts right?
  • Most computers will respond well being shut down occasionally, it often fixes little bugs or software processes/resources that are not performing correctly.
  • Often, different programs/software updates will require a restart to install correctly.
  • Windows Updates will have a better chance of installing and being kept up to date. Even though Windows 10 has an “Active Hours” function which is designed to install and auto-restart your PC when you are not using it. We have found a lot of PC’s can go up to 6 to 10 months without installing any updates. This function does not always work as it should.
  • Although it falls under software, your Anti-Virus program will require restarts to install some of its new updates to keep you are your PC safe.

The Con’s to switching your PC off,

  • If you have an older computer or a worn hard drive, it will take longer to boot when you turn the computer on each time.
  • Some lesser developed parts will wear quicker when being turned on and off which is usually a result of the part’s temperature becoming cold, then hot, then cold etc.
  • Having to spend the time reopening programs and what you are working on.
  • Updates for Windows & Software can’t download when switched off, which means they will consume a portion of your internet bandwidth while your PC is turned on.
  • You can’t run disk defragmenter and any other tasks you require while you are asleep or away from your computer.

Misconceptions

  • Turning my computer off will prevent power surges. This is untrue. Power surges from faulty appliances in your house or even a lightning strike only require your power cord to be plugged into the wall for your computer to be damaged. A lightning strike can travel through your Ethernet (internet) cable that is plugged into your modem/router. We have seen this firsthand. Quality surge protectors are recommended to prevent surges.
  • When I turn my computer on, it uses more power. This is untrue. A standard consumer computer does not use more energy when booting.

In Summary,

If you are only using your computer a few times a week, we recommend turning your PC off after each use.

If you are using your computer a few times a day or for lengthy periods each day, we recommend you turn it off once a day, or if you are exceptionally busy, at least 3 times in a 7-day week.

These suggestions are what we find to work best and be reasonable & practical for most users.

5 Common Security & Privacy Misconceptions Busted

5 Common Security & Privacy Misconceptions Busted

Technology is a fickle mistress these days. TVs are watching us back, homes are smarter than humans, and Alexa is sending our conversations to the Russians. Okay, we’re not 100% sure about that last one, but that nicely illustrates how easily rumors can spread in the online world. So, we’re gonna take a minute and debunk some of the more common myths right here, right now.

Phones can’t get viruses

Umm. Yes, they can. But, before we delve in, we need to clarify something — from a technical point of view, if there is malware on your phone, it’s probably not a virus. The two terms are often used interchangeably but they’re not the same thing. A virus is a type of malware and while there is a lot of Android malware out there, there aren’t technically any viruses. It’s not as common for your smartphone to be infected by malware as it is for your computer, but it can happen. Android devices can be affected by a variety of vulnerabilities and hackers are always on the lookout for new ways to get into your data.

Things like not updating your software, clicking on dodgy email links, and using public Wi-Fi can often lead you straight down a one-way path to malware town. It’s pretty simple to avoid these issues though. Always be on the lookout for phishing emails — if something sounds too good to be true then chances are, it is. Keep up with software updates for your device and avoid using public Wi-Fi as much as you possibly can. Using a VPN will help keep you private on public Wi-Fi for sure, but bear in mind it won’t protect you from malware.

It’s a lot more unlikely for an iOS device to be infected with malware, but it’s also not entirely impossible. This is usually when a device has been jailbroken, leaving it vulnerable to attacks. FYI jailbreaking an iOS device involves changing the operating system, allowing the user more control, but also making the device more vulnerable to threats.

Another point to consider is apps. Are they trustworthy? iOS devices are, again, a lot less likely to be infected this way (but not impossible), whereas Android is a little riskier as it allows app downloads from outside of the Google Play store. But both Google and Apple have been tricked into hosting malicious apps in the past (from straight outta the app store), so before you download something, check its reviews and popularity to make sure it’s legit.

There are a number of ways to remove malware from your device such as clearing website data, restarting, restoring from a backup version or if you have an Android then protecting it with an antivirus.

Macs can’t get viruses

Hate to break it to ya but they can and will. The whole ‘Macs can’t get viruses’ rumor has been doing the rounds for years and years now. There’s a number of reasons for this. In the past PCs were, in general, used a lot more, so their viruses were reported a lot. This also meant a whole lot more Windows users out there —  making them a much bigger target.

However, this is becoming less and less the case. The popularity of Mac for both everyday users and businesses has meant that the spread of Mac-related viruses has grown dramatically over the years. Malwarebytes reported an increase of 16 million instances in Mac malware in April 2019, which was four times more than the previous record. The more common ways for a Mac to be infected is through browser plugins such as Flash and third party browsers, as well as the usual phishing scams and Trojan horses. 

So, a quick answer: yes, they absolutely can get a virus. It’s important you arm yourself with that knowledge and check your device as well as keep it safe.

Slow computer? Must be a virus

This is always the go-to excuse when a computer starts to slow down, but it’s quite often another reason. Installed and unnecessary software can hog your computer’s memory and CPU, causing it to run, boot up, and load painfully slowly. There’s also the issue of the pre-loaded programs that come with your device — left unattended, not updated, and not in use, they’re simply taking up valuable space. The same goes for old backups and temporary system files. They’ve fulfilled their purpose, but end up just becoming dead weights. So before you jump down the virus hole, we suggest giving your device a good refresh, clean up, and system update.

You don’t need an antivirus

You may have noticed, but online security is kind of our whole thing  — which means, of course, we’re always going to support getting an antivirus. But for good reason. Most PCs will come with their own built-in security, but it isn’t always enough. Following best practices — such as keeping your device and OS updated and avoiding links from emails you don’t trust —will go a long way in keeping you safe. But, put simply, it’s just not enough.

Malware is changing by the second, which is why it’s essential that you arm yourself with an antivirus that’s going to be constantly updating and searching for new threats and ways to protect you from virusesTrojansransomware, and a host of other malware. It’s a common misconception that you can get by without an antivirus if you’re super careful and don’t do anything deemed unsafe. Unfortunately, the second you connect your device to the internet you’re putting yourself at risk. Sounds dramatic, but it’s true. The good news is that you don’t have to spend a small fortune on good antivirus software. In fact, you don’t need to spend anything at all…

Incognito mode keeps you anonymous

Another hard “no” with this one. It’s commonly believed that turning on incognito mode for your browser keeps you anonymous. That would be easy right? A little too easy. Sure it does give you some privacy features by not storing your history, searches, or cookies for later.  It also means that, when you close a window, there are no saved history records of what you’ve been doing. But this is only good for protecting your browsing history from people you might be sharing your computer with. Internet service providers, data aggravate companies, social media services, and anyone else who might be harvesting your data online can still see, track, and store what you do — incognito mode or not.

The best way to regain some privacy online is to get AVG Secure VPN — which disguises your IP address (which also reveals your physical location — spooky!) and encrypts your connection — and anti-track software that can find and erase all the tracking cookies companies and websites are using to harvest your data.

So there you have it. Five of the most common computer misconceptions busted out for you in under ten minutes (five if you read fast).

5G Health Fears

5G Health Fears

Our friends over at the Financial Times have put together an interesting read about health concerns already voiced by millions across the globe.

We have begun to see this technology roll-out in Australia in densely populated areas such as airports and local sporting grounds in Brisbane.

FT wrote: Switzerland, one of the world’s leaders in the rollout of 5G mobile technology, has placed an indefinite moratorium on the use of its new network because of health concerns.

The move comes as countries elsewhere around Europe race to upgrade their networks to 5G standards amid a furious rearguard diplomatic campaign by the US to stop them using Chinese technology provided by Huawei. Washington says the company, which is fundamental to most European networks’ upgrade plans, presents a grave security risk.
 

However, a letter sent by the Swiss environment agency, Bafu, to the country’s cantonal governments at the end of January, has now in effect called time on the use of all-new 5G towers, officials who have seen the letter told the Financial Times. 

The agency is responsible for providing the cantons with safety criteria against which telecom operators’ radiation emissions can be judged. Under Switzerland’s highly federalized structure, telecoms infrastructure is monitored for compliance and licensed by cantonal authorities, but Bern is responsible for setting the framework.

Bafu has said it cannot yet provide universal criteria without further testing of the impact of 5G radiation.

The agency said it was “not aware of any standard worldwide” that could be used to benchmark recommendations. “Therefore Bafu will examine exposure through adaptive [5G] antennas in-depth, if possible in real-world operational conditions. This work will take some time,” it said.

Several cantons have already imposed their own voluntary moratoria because of uncertainty over health risks. 

Swisscom said that Bafu’s assessment process would not halt its ongoing work to build out 5G infrastructure, even if it meant that it would not be able to be used at full capacity. The operator said it could still achieve high speeds for customers of up to 2Gb/s without the full use of new masts.

Swisscom, the country’s largest mobile operator, said it understood “the fears that are often expressed about new technologies”.

“There is no evidence that antenna radiation within the limit values adversely affects human health,” the company added, pointing out that 5G is run on frequencies similar to the current 4G standard, which has been subject to “several thousand studies.”

The company said Switzerland’s regulatory limits were “10 times stricter than those recommended by the World Health Organization in places where people stay for longer periods of time”.

The Swiss Medical Association has advised caution on 5G, arguing that the most stringent legal principles should be applied because of unanswered questions about the technology’s potential to cause damage to the nervous system, or even cancers.

Five “popular initiatives” — proposals for legally binding referendums on 5G use — are already in motion in Switzerland. Two have already been formalized and are in the process of collecting the 100,000 signatures needed to trigger nationwide votes that if successful will amend Switzerland’s constitution.

One will make telecoms companies legally liable for claims of bodily damage caused by radiation from masts unless they can prove otherwise. The other proposes strict and stringent limits on radiation emissions from masts and will give local residents veto power over all new constructions in their area.

We’re excited to see technology improve here in Australia, but at what cost? We believe further testing of the “new” 5G rollout is a must.

What are your thoughts? Is it worth the risk?

What is smishing and how to avoid it?

Perhaps you’ve heard of phishing. This is the criminal practice of using fake emails to defraud users into giving away sensitive personal information such as passwords or bank details. Well there’s more than one way to phish – one of these being “smishing”. This entails using fake SMS (mobile phone text) messages to gain your personal info. But don’t swim into despair just yet, there are still ways to protect yourself.

The psychology of smishing

The more things go mobile, the more prevalent smishing will be, so it’s important to hone your hackles to rise upon receipt of a devious text message. While people have gotten used to email spam, they are probably less likely to doubt the legitimacy of an SMS message.

Smishers rely on your quick reaction to a message that may appear basically identical to an actual message from, for example, your bank. One tactic – or tip off – of a fake message is the imploring of an immediate response such as,“Urgent!” or “Reply now!” The less you think, of course, the better for the scammers. However, even if you give the message a good look-over, it could still fool you.

How do smishy numbers look?

While some smishes come from strange phone numbers, fake messages can simply use the name of a business instead of a visible number – the way many real businesses already do. One such tricky smishing scam happened in the Czech Republic with a text that really appeared to be from their postal service. Further complicating the matter is the fact that many real businesses will use a “shortcode” to send text messages. This is a small group of numbers that appears instead of a real phone number – and yes, scammers use similar brief numbers to their heart’s content. And yet even more dastardly is that sometimes the fraudulent messages can insert themselves into your existing legitimate message threads! Yes, things can get a bit bleak, but press on, heroic reader, and you’ll find ways to arm yourself with knowledge and train yourself to recognize certain tells of fake messages.

How a smish might occur

Here is how an especially slippery smishing scam might go. You get a message from what appears to be your bank telling you to download their new app. You click a link inside the message, and a web page opens up that looks exactly like your bank’s website – or at least how you imagine your bank’s website would look (who can remember anyway, since things look different on mobile, and banks aren’t known for having scintillatingly memorable webpages anyway).

So now you’re on this official-looking page that doesn’t have any raging signs of anything phishy. You are simply shown a button to download a banking app. Well, slick as this whole operation is, you might be able to spot one problem, which is that the link doesn’t show the label for the Google Play or Apple App Store. Now Apple won’t innately let you download apps that aren’t on their App Store, but Android phones are more susceptible to malware downloads. But in both cases, these stores have a careful verification process, so there’s less chance a piece of pure malware would be there (though it has happened).

If you’ve already clicked your way to this initial download screen, the smishers still don’t have you completely hooked – you can still slip away by not downloading the fake app. But if you do download the fake app, you can really get into some hot water. Once downloaded, that app will likely prompt you to enter your bank info – and those details are then delivered right into the hands of the hackers. Or, in the particularly nasty case of the aforementioned Czech Post smish, the newly downloaded fake app – full of juicy malware – disappeared and created an overlay to appear in the user’s other apps, prompting, yes, credit card info to be entered, and the rest is history.

Avoid smishing with these tips

  • If the message is clearly from a number you don’t know, or a company you know you don’t have business with, don’t click on any links within. Simple, but effective.
  • Whether you’re worried about smishing or not, an eternal rule of thumb for existing more securely on the internet is to have different passwords for different accounts. Yes, this can be annoying when you’re trying to quickly hammer in the right password, but password managers can help with that, and it pays off in the long run in the event that you do get compromised by a scam.
  • Get great antivirus software, which can recognize phishing websites and prevent you from clicking your way to doom.
  • Be cautious of strange-looking numbers, but remember, as mentioned above, strange-looking numbers can still be legitimate, so really think before you click onward – and never click if you’re in doubt. Doing a quick search online for the number in question may reveal it to be a scam number.
  • Messages containing: “Congratulations, you’re a winner!”; “Urgent!”; and “Reply now!” are not things you should ever pursue further.

There is a lot of strange phishing in today’s digital ocean. While you may get fooled, arming yourself with knowledge is a great defense

Hi, How Can We Help You?