What do I need to back up? You will need to know what you would want/need backed up before you can know how you should best be backing up. You have the choice, there is no right or wrong choice here, but I would recommend protecting anything you may want or things you can’t re-create like; tax and business stuff, anything that you have scanned and destroyed the hard copies), things that your kids drew...
What is the ultimate rule??? There is three basis rules making sure you have everything backed up. To lower the risk of loss data, you should have three copies of the files and things you don’t want to loss: the original copy (that flies that you have on your computer already), a backup of that original, and a backup of the backup (so that you will have two). It’s ideal to not that the both...
The Simple Guide To Backing Up Your Computer: First thing to know and to remember: Always, always back up. Thankfully, it’s an easy task to backup your most important data. The hard part actually doing most people, myself included. You have many storage options to use, I will be walking to you through them. You will see just how simple it is to back up all your information, files and photos right now – before...
Lenovo rootkit binaries persisting via BIOS/Windows Platform Binary Table (WPBT) will make your systems vulnerable to any 3rd parties capable of intercepting your web traffic! Affected models with “patch” linked below – but I would investigate before using. I’ll be looking more into this soon. https://support.lenovo.com/us/en/product_security/lse_bios_notebook https://support.lenovo.com/us/en/product_security/lse_bios_desktop More Info: WPBT info (Microsoft, PDF download) Other Sources: http://firmwaresecurity.com/2015/08/11/lenovo-lse-wpbt-and-wpbbin-exe/
How to stay safe? You would restrict write permissions on the file servers as much as possible. Make sure to educate the users to contact IT if they encounter any suspicious pop-ups. Use advanced endpoint protection that can identify any and all new malware variants and detect any malicious traffic. Make time for regular offline backups; test backups to ensure that they can be restored from reliably. Use web and email protection to block access...
How it works? A ransomware attack will go through five stages from the time it is installed on your computer, until you see the warning on your computer screen. Step One: INSTALLATION – After a victim’s computer is infected, the ransomware will installs itself, and sets keys in the Windows Registry to start automatically every time your computer boots up or restarts. Step Two: CONTACTING HEADQUARTERS – Before ransomware can affect you, it contacts a...
Where is Ransomware? Ransomware can be found everywhere. We thought that the well known file-encrypting ransomware, as known as CryptoLocker, was over and done with after law enforcement knocked out its infrastructure last year, but CryptoLocker , as well as other variations of malware, are back. Ransomware is a form of malware that will prevent you from having access to your files and even your computer. Then, it attempts to extort money from you in...
Changes in this morning’s update to dUninstaller v3.8 Added remote updating of config and definitions files for scripting purposes (based on feedback from Tim @ Squatting Dog Development on our Happy Foolish Fun Hour podcast this Monday. Tim makes a Labtech RMM plugin for dUninstaller, more on this below!) Added encryption of registration settings and all non-numeric email settings. Previously the SMTP account password was encrypted, but with the new capability of remote update from a...
Reprint from the community: Note the Default Apps update (v40) just released fixes a download link for Rogue Killer. The symptom of the issue causing the update was the PC rebooting as soon as Rogue Killer was ran. This was due to a bad download link – for some reason instead of a 404 that website does some redirects or something weird but d7II downloads a webpage from the non-existent links, causing it to think...
Attention all PC Repair Business Owners, MSPs, and other IT Service Providers including any CryptoPrevent Resellers: We are happy to announce the Tech Directory, a new searchable IT Services/PC Repair business public database. We get a lot of web traffic from various home users and businesses with a lot of troubles, and we have always wanted a way to provide them with a the opportunity to find local and reputable IT/PC Repair services. Our new Tech Directory...