Skip to main content

9 Urgent Security Tips for Online Holiday Shopping

The holiday shopping season is taking off. This means that scammers have also revved up their engines. They’re primed and ready to take advantage of all those online transactions.

Don’t forget to stay safe online during the buying frenzy that occurs this time of year. An ounce of cybersecurity prevention is definitely worth a pound of cure. It can also save you from a financial or privacy nightmare.

Here are some of the most critical safety tips to improve your online holiday shopping.

Check for Device Updates Before You Shop

Computers, tablets, and smartphones that have old software are vulnerable. While you may not want to wait through a 10-minute iPhone update, it’s going to keep you more secure.

Hackers often use vulnerabilities found in device operating systems. Updates install patches for known vulnerabilities, reducing your risk. Make sure to install all updates before you use your device for online holiday shopping.

Don’t Go to Websites from Email Links

Yes, it’s annoying to have to type in “amazon.com” rather than just clicking a link in an email. But phishing scams are at an all-time high this time of year. If you click on an email link to a malicious site, it can start an auto download of malware.

It’s best to avoid clicking links, instead visit the website directly. If you want to make things easier, save sites as shopping bookmarks in your browser. This is safer than clicking a text or email link.

Use a Wallet App Where Possible

It’s always a risk when you give your debit or credit card to a website. The risk is even higher if you’re doing holiday shopping on a site you haven’t purchased from before.

Where possible, buy using a wallet app or PayPal. This eliminates the need to give your payment card details directly to the merchant. Instead, you share them with the wallet app service (Apple Pay, Google Pay, PayPal, etc.). But the retailer doesn’t get them.

Remove Any Saved Payment Cards After Checking Out

There are many websites (including Amazon) that automatically save your payment card details. This is bad. Yes, it may make the next buy more convenient, but it puts you at risk. A hacker with access to your device or account could make purchases.

There is also the risk of a data breach of the retailer. These are common and can leak sensitive customer payment information. The fewer databases you allow to store your payment details, the better for your security.

Immediately after you check out, remove your payment card from the site. You will usually need to go to your account settings to do this.

Make Sure the Site Uses HTTPS (Emphasis on “S”)

HTTPS has largely become the standard for websites now. This is instead of “HTTP” without the “S” on the end. HTTPS means that a website encrypts the data transmitted through the site. Such as your name, address, and payment information.

You should NEVER shop on a website that doesn’t use HTTPS in the address bar. An extra indicator is a small lock icon in front of the website address.

Double Check the Site URL

We all make typos from time to time. Especially when typing on a small smartphone screen. One typo can land you on a copycat site (such as Amazonn(dot)com).

Hackers buy domains that are close to the real ones for popular retailers. Then, they put up copycat sites designed to fool users that make a mistake when typing the URL.

Take those extra few seconds to double-check that you’ve landed on the correct website. Do this before you start shopping.

Never Shop Online When on Public Wi-Fi

When you connect your device to public Wi-Fi, you might as well expect a stranger to be stalking you. Hackers LOVE the holiday shopping season and will hang out in popular public Wi-Fi spots.

They spy on the activities of other devices connected to that same free hotspot. This can give them access to everything you type in. Such as passwords and credit card information.

Never shop online when you’re connected to a public Wi-Fi network. Instead, switch off Wi-Fi and move to your mobile carrier’s connection.

Be On High Alert for Brand Impersonation Emails & Texts

Phishing scammers were very active during the holiday shopping season of 2021. There was a 397% increase in typo-squatting domains connected to phishing attacks.

While you need to be careful all the time about phishing, it’s even worse during the holiday season. Attackers know that people are expecting retailer holiday sales emails. They also get a flurry of order confirmations and shipping notices this time of year.

Hackers use these emails as templates. They impersonate brands like Target, UPS, Amazon, and others. Their emails look nearly identical to the real thing. They trick you to get you to click and/or log in to a malicious website.

Be on high alert for brand impersonation emails. This is another reason why it’s always better to go to a site directly, rather than by using an email link.

Enable Banking Alerts & Check Your Account

Check your bank account regularly. Look for any suspicious charges that could signal a breach. One way to automate a monitoring process is to set up banking alerts through your online banking app.

For example, many banks allow you to set up alerts for events such as:

  • When a purchase occurs over a specified dollar amount
  • When a purchase occurs from outside the country

How Secure Is Your Mobile Device?

Mobile malware is often deployed in holiday shopping scams. How secure is your device from malicious apps and malware? Contact us today for a security checkup.


Featured Image Credit

This Article has been Republished with Permission from The Technology Press.

7 Pro Tips for Microsoft 365

Microsoft 365 is the most popular of all major office productivity software. It has 48.8% of the global market share, just edging out Google’s apps, by a couple of percentage points.

It’s used by individuals, small & mid-sized businesses, and larger enterprise organizations. It does everything a modern office needs. Including from word processing and spreadsheet work to cloud storage and video conferencing.

Because Microsoft 365 is such a vast platform, with over 20 apps in total, it can be easy to miss helpful features. People tend to stick with what’s familiar. But this often causes them to miss out on time and money-saving bonuses in M365, beyond the core apps.

Some of the many apps you get, depending on your subscription plan, include:

  • Excel
  • Word
  • Powerpoint
  • Outlook
  • To Do
  • OneDrive
  • Teams
  • Forms
  • Defender
  • SharePoint
  • Yammer
  • Lists
  • Access
  • Bookings
  • Intune
  • Planner
  • Visio
  • And more

Want to get more value from your subscription? We’ll go through some of the most helpful apps and features in Microsoft 365 that you may now know about.

Get More Out of M365 With These Tips

1. Skip the Menu Bar by Using Search to Find Functions

We’ve all been there at one time or another. You know there is a way to do something in an app, but you can’t find it in the menu. For example, trying to change your margins in Microsoft Word to give you more space on the page.

You can stop wasting time clicking through one tab after another, and instead, use the search box at the top. It’s not just for searching for help topics. You can use a search to quickly jump to settings like margins, page orientation, and many more.

Search

2. Leverage the Free Stock Images, Icons & Videos

Most businesses need to have nice-looking images from time to time. They’re used on websites, brochures, and presentations. But finding good business images can be expensive.

You can’t just do a Google search to find them because they may be copyrighted. You need to have images that you can use commercially without any problems.

Inside Word, Excel, and PowerPoint you have a treasure trove of images. These are free to use in your marketing. You also have videos, icons, and even 3D models, all there for the picking.

Find them by going to Insert > Pictures > Stock Images

Use the tab at the top to tab between the different media. Then, click to insert it directly into your document, spreadsheet, or presentation.

Stock Images

3. Save Time by Using Data Types in Excel

Researching things like the population of a city or the nutrition value of a new menu can take days. Did you know that inside Excel you have access to several databases?

You can leverage facts and figures stored inside Excel’s “data types.” They include topics on everything from chemistry to yoga poses. Use data types to populate tons of data in seconds for various topics.

  • Start by adding your list (e.g., a list of menu items)
  • Highlight your list.
  • Then, click the Data tab.
  • In the Data Types window, choose the type of data it is (e.g., Food, Plant, etc.).
Excel Data Type
  • Next, click the small database icon that appears at the top of the list.
  • Choose the type of data you want.
  • The details will populate into the next open column on the right for each list item.
Excel Data

4. Save Time on Customer Surveys with Microsoft Forms

Microsoft Forms is one of the best-kept secrets of M365. This cloud-based survey and form builder makes it simple to send out surveys to people. You get the results back as soon as they click “submit” on the cloud-based form.

You can even download the results directly to Excel. Using them for graphing or uploading them into a software template.

Microsoft Forms

5. Use PPT’s Presenter Coach to Improve Your Skills

Do you worry when it comes time to give a presentation to clients or your own team? Not everyone feels comfortable about public speaking, even if it’s virtual.

PowerPoint can help with a handy AI-powered feature called Presenter Coach. Turn this coach on when practicing your presentation. It will give you tips on your pacing, use of filler words (e.g., umm), repetitive language, and much more!

Look for the “Rehearse with Coach” option on the Slide Show menu.

6. Save Recurring Email Text in Outlook’s Quick Parts

Do you have certain emails you send to customers that have the same paragraphs of text in them? For example, it might be directions to your building or how to contact support.

Stop retyping the same info every time. Outlook has a feature called Quick Parts that saves and then inserts blocks of text into emails.

  • Create a Quick Part by highlighting the text to save in an email.
  • On the Insert Menu, click Quick Parts.
  • Save Quick Part.

When ready to insert that text into another email, just use the same menu. Then click to insert the Quick Part.

Outlook Quick Parts

7. Create a Keyboard Shortcut to Paste as Unformatted Text

Keyboard shortcuts are great for saving time. But there’s not always one there when you need it. One handy keyboard shortcut to add for MS Word is to paste as text only. This method removes any formatting that copied text might have had so your document isn’t messed up.

Here’s how to make a keyboard shortcut for this:

  • In Word, click File> Options.
  • Click Customize Ribbon.
  • At the bottom of the panel, next to Keyboard shortcuts, click Customize.
  • Scroll in the left pane to All Commands.
  • Look for “PasteTextOnly”
  • Type your keyboard command, then click Assign.
Keyboard Shortcut
PasteTextOnly

Need Help Optimizing Microsoft 365?

Microsoft 365 has many security-enhancing, time-saving, and dollar-saving features. Learn how else we can help by scheduling a consultation today.


Featured Image Credit

This Article has been Republished with Permission from The Technology Press.

What Is Microsoft Defender for Individuals & What Does It Do?

When you hear about Microsoft adding security apps to M365, it’s often the business versions. But the pandemic has changed the way that we see the workplace. It’s now a hybrid world. One made up of several connected “mini-offices” located in employee homes.

The outsourcing market has also contributed to the change in company networks. Freelancers are often contracted to work the same hours as employees. This means less overhead and taxes to pay. Approximately 68% of large consumer products companies outsource a part of their workforce.

What we’re getting at is that the need for home devices and network security has never been greater. Company data is now at the mercy of employee devices, situated in homes across the globe.

55% of employees use their own devices and software to work from home.

Microsoft has been at the forefront of this huge shift in the work environment. Its latest release is another example of how it has positioned its products to address new needs.

The latest security offering by Microsoft is not for business plans. It’s for Personal and Family users of Microsoft 365. The company announced Microsoft Defender for Individuals on June 16, 2022. This is a brand-new digital home security tool.

The Basics of Microsoft Defender for Individuals

Microsoft Defender is a new app that Microsoft 365 subscribers can download. Anyone with a Personal or Family plan can access it for no extra cost.

According to Microsoft, there was a main driver for offering Microsoft Defender. It was to protect the digital life of small businesses and families. Small companies will often use consumer Microsoft 365 plans. This is because they are less expensive than the business plans.

This app brings many digital protections together into one dashboard. These include the following.

Online Security Visibility

Most families have several devices connected to their network. This includes computers, tablets, and smartphones. It can be hard to know which are vulnerable before a hacked device infects the others.

Microsoft Defender gives you visibility into the security status of your devices. It does this in a single place. So, you could see if that new phone of Sally’s has antivirus enabled. You can also easily add or remove devices.

Device Safeguards

The app includes extra protections from online threats. These are in the form of help from antivirus and anti-phishing protection.

You can use it to continually scan devices for threats, both new and existing. You also gain control of scanning customization. For example, you can note certain apps as safe and tell Microsoft Defender what to scan.

Real-Time Alerts & Recommendations

Hackers use automation and AI to unleash their attacks and help them spread. This means that it’s often a race against the clock to stop a breach from getting worse.

To react fast, you need to know something is wrong. Microsoft Defender helps you by giving you real-time alerts. These also come with recommended actions. So, you not only know something is wrong, but you also know what to do about it.

What Else Should You Know?

Here are a few other important things you should know about using Microsoft Defender for Individuals.

Where Can You Download It?

You can download Microsoft Defender for Individuals from Microsoft here. You need to have a Microsoft 365 subscription to either the Personal or Family plan.

What Devices Can Use It?

You can use Defender to secure and monitor the following devices:

  • Windows: Windows 10 version 19041.0 and higher
  • Mac: Intel Macs from Catalina 10.15 and higher, and Apple silicon-based devices from 11.2.3 and up
  • iPhone: iOS 13.0 or later
  • Android: Android OS 6.0 or later

How Many Devices Can You Add?

Microsoft Defender allows you to watch the security of many of your home or work devices. The M365 plan you have will dictate how many.

  • If you have Microsoft 365 Personal plan, you can receive protection on up to 5 devices at the same time.
  • If you have Microsoft 365 Family plan, you can receive protection on up to 30 devices at the same time. (5 devices per person, 6 people total)

What Are the Key Differences Between the Personal & Family Plans?

Both plans can access the many different Office and other Microsoft applications. The main difference is how many people and devices can use the Microsoft 365 services.

  • Microsoft 365 Personal: $69.99 US/year, 1 person, 5 devices
  • Microsoft 365 Family: $99.99 US/year, 6 people, 5 devices per person

So, if you want to sign up even 2 people, you’re saving quite a bit with the Family plan. Even more, if you have six people total using the service.

What’s the Difference Between Microsoft Security on Windows & Microsoft Defender?

Most Windows users are already familiar with the Microsoft Security app. It comes pre-installed on Windows. Microsoft Defender differs from this app in several ways.

Microsoft Defender:

  • Is not pre-installed on Windows. You must download it.
  • It’s a cross-device application used on many different devices
  • It includes features for online security
  • It includes alerts and security tips

Learn More About Defender & Microsoft 365 Today

Are you looking to get more from your Microsoft 365 subscription? We can help! Reach out today to schedule a technology consultation with our M365 experts.


Featured Image Credit

This Article has been Republished with Permission from The Technology Press.

The Biggest Vulnerabilities that Hackers are Feasting on Right Now

Software vulnerabilities are an unfortunate part of working with technology. A developer puts out a software release with millions of lines of code. Then, hackers look for loopholes that allow them to breach a system through that code.

The developer issues a patch to fix the vulnerability. But it’s not long before a new feature update causes more. It’s like a game of “whack-a-mole” to keep your systems secure.

Keeping up with new vulnerabilities is one of the top priorities of IT management firms. It’s important to know which software and operating systems are being attacked.

Without ongoing patch and update management, company networks are vulnerable. And these attacks are completely avoidable. 82% of U.S. cyberattacks in Q1 of 2022 were due to exploiting patchable vulnerabilities. This is a global problem.

What new vulnerabilities are lurking in products from Microsoft, Google, Adobe, and others? We’ll go through several. These were recently noted in a warning by the Cybersecurity and Infrastructure Security Agency (CISA).

Make Sure to Patch Any of These Vulnerabilities in Your Systems

Microsoft Vulnerabilities

Microsoft vulnerabilities include those in three of its products. Internet Explorer (IE) is one of them. Microsoft discontinued IE in June of 2022. You should remove this from any computers that still have it installed.

You’ll see the acronym “CVE” used in the vulnerability names. This is an industry-standard naming structure. It stands for Common Vulnerabilities and Exposures.

Here is a rundown of these vulnerabilities and what a hacker can do:

  • CVE-2012-4969: This Internet Explorer vulnerability allows the remote execution of code. This is a “critical” vulnerability because of the damage it enables. Hackers can release this via a website. Thus, formerly safe sites can become phishing sites when hackers exploit this loophole.
  • CVE-2013-1331: This is a flaw in the code for Microsoft Office 2003 and Office 2011 for Mac. It enables hackers to launch remote attacks. It exploits a vulnerability in Microsoft’s buffer overflow function. This allows hackers to execute dangerous code remotely.
  • CVE-2012-0151: This issue impacts the Authenticode Signature Verification function of Windows. It allows user-assisted attackers to execute remote code on a system. “User-assisted” means that they need the user to assist in the attack. Such as by opening a malicious file attachment in a phishing email.

Google Vulnerabilities

Google Chrome and applications built using Google’s Chromium V8 Engine are also on the list. These applications are targets of the following vulnerabilities.

  • CVE-2016-1646 & CVE-2016-518: These both allow attackers to conduct denial of service attacks. They do this against websites through remote control. This means they can flood a site with so much traffic that it crashes.
  • Those aren’t the only two code flaws that allow hackers to crash sites this way. Two others, CVE-2018-17463 and CVE-2017-5070 both do the same thing. And like all these others, have patches already issued that users can install to fix these holes.

Adobe Vulnerabilities

People use Adobe Acrobat Reader widely to share documents. It makes it easy to share them across different platforms and operating systems. But it’s also a tool that’s on this list of popular vulnerabilities.

  • CVE-2009-4324: This is a flaw in Acrobat Reader that allows hackers to execute remote code via a PDF file. This is why you can’t trust that a PDF attachment is going to be safer than other file types. Remember this when receiving unfamiliar emails.
  • CVE-2010-1297: This memory corruption vulnerability. It allows remote execution and denial of service attacks through Adobe Flash Player. Like IE, the developer retired Flash Player. It no longer receives support or security updates. You should uninstall this from all PCs and websites.

Netgear Vulnerability

Netgear is a popular brand of wireless router. The company also sells other internet-connected devices. These are also vulnerable, due to the following flaws.

  • CVE-2017-6862: This flaw allows a hacker to execute code remotely. It also enables bypassing any needed password authentication. It’s present in many different Netgear products.

Cisco Vulnerability

  • CVE-2019-15271: This is a vulnerability in the buffer overflow process of Cisco RV series routers. It gives a hacker “root” privileges. This means they can basically do anything with your device and execute any code they like.

Patch & Update Regularly!

These are a few of the security vulnerabilities listed on the CISA list. You can see all 36 that were added here.

How do you keep your network safe from these and other vulnerabilities? You should patch and update regularly. Work with a trusted IT professional to manage your device and software updates. This ensures you don’t have a breach waiting to happen lurking in your network.

Automate Your Cybersecurity Today

Patch and update management is just one way that we can automate your cybersecurity. Learn how else we can help by scheduling a consultation today.


Featured Image Credit

This Article has been Republished with Permission from The Technology Press.

Blog