A large of amount of sand, to metaphorically represent the "sand" part of sandboxing security.

Sandbox Security: Why Do I Need It and How Is It Protecting My Computer?

A large of amount of sand, to metaphorically represent the "sand" part of sandboxing security.

Sandbox security is an important computer safety technique that helps keep malicious executables at bay.

A sandbox is an isolated environment that mimics an entire computer system.  This protected space can be used to test suspicious programs and analyze potential threats.  Sandboxing is a vital security feature that prevents malware and other viruses from entering and damaging your computer.

Much of the software you already use, like web browsers, have sandboxes that filter most of the code your system uses to perform daily tasks.  You can create your own sandboxes to test whether a piece of software is safe, in a controlled environment that won’t damage the rest of your computer’s system.

What Is Sandboxing? Why Is It an Essential Security Feature?

Sandboxes give specific permissions to a piece of code, allowing it to perform its functions, while restricting it to a tightly controlled environment.   Programs are then run within this environment, where no additional code permissions can be abused.

In everyday computer use, you come across many sandboxing security techniques.  Your web browser, if you use Chrome or Internet Explorer, runs the webpages you visit in a sandbox.  These webpages are limited to the access granted by this browser’s sandbox, meaning that this site can’t do things like open your webcam without your permission or snoop on your personal files.

Web Browsers With Sandboxing Capabilities

Browsers with sandboxing capabilities are especially useful for recognizing advanced persistent threats (APTs).  These APTs are designed to escape detection, breaking through conventional security barriers, and gaining access to Personally Identifiable Information (PII) on your computer.  Sandboxes help isolate these viruses and prevent them from spreading.

Sandboxing browsers don’t have access to your entire computer, because they run in a low-permission mode.  If a malicious webpage manages to take over your browser, it would still have to get past the browser’s sandbox to do any damage to rest of your system.

If a webpage happens to contain malicious code, a browser without a sandbox wouldn’t be able to protect the rest of your computer system.  This creates a security vulnerability through which malware or viruses can be introduced.  Most browsers, with the exception of Mozilla Firefox, have sandboxing capabilities.

For the most part, the fewer permissions granted to the browser or any other program, the more secure your system will be.

woman with smartphone and laptop, with security icons floating around her.  Sandbox security is important for keeping your computer's system safe from malware.

Most of your computer programs are already using sandbox security techniques, but it’s important to know which programs are already sandboxed to better understand how to protect your computer from the ones that aren’t.

Sandboxes Are Already Protecting You

Browsers are among the many sandboxed programs on your computer. There are plenty of other programs that are already being sandboxed for your protection.

Browser Plug-ins

Content from plug-ins like Adobe Flash or Microsoft Silverlight are run in sandboxes.  An online game made with Flash is much safer when played on a web page than when it’s downloaded and opened as a standard program.  As a sandboxed plug-in, Flash contains the game within the browser, and severely restricts what it can do to the rest of your system.

PDFs and Other Documents

PDFs have become a common source of malicious executables.  PDFs and other documents can contain malicious embedded links, and without sandboxes, these viruses could compromise your system’s security. Adobe Reader now runs in a sandbox, and Microsoft Office also has sandboxing capabilities that keep unsafe macros from infecting your computer.

Mobile Apps

Smartphone apps run their code in a sandbox.  iOS, Android, and Windows mobile apps have far fewer permissions than their standard desktop counterparts.  In order to access functions like your location or camera roll, they must ask for the user’s permission.

By keeping mobile apps in low-permission mode, you’re able to keep the information on your smartphone safe. Sandboxes also isolate apps from each other, so one app can’t affect each another’s functionalities.

Windows Programs

If your computer runs on Windows, User Account Control is a form of basic sandbox security that you come across frequently.  Essentially, User Account Control restricts desktop applications from modifying files within your system without asking the user for permission.

This form of sandbox security offers very minimal protection, since desktop programs can still run in the background and log your keystrokes. User Account Control merely stops unwanted programs from accessing system files and system-wide settings.

How You Can Apply Sandbox Security to Your Programs

Sandboxing your own programs isn’t really something you need to worry about, since so many of the apps and programs you use on a regular basis are already sandboxed.  However, it’s useful to know that most desktop programs aren’t generally sandboxed by default.

If you want to run a program without letting it harm the rest of your system, you can sandbox any program. As mentioned before, User Account Control (UAC) doesn’t do much to protect your system.

Virtual Machines

Virtual machines like VirtualBox™ or VMware create entire operating systems within your existing OS to test programs. This simulated operating system is completely sandboxed, so it doesn’t have access to the rest of your system, and the programs you are testing within the virtual machine can’t access anything outside of its designated boundaries.

Virtual machines allow you to install programs on the virtual operating system and run them as if they were open on your actual OS.  You can then analyze the installed program to determine if it contains malware.

They also have snapshot features, which allow you to reset your virtual machine to state it was before malicious executables were installed. You can then continue to test programs in your virtual machine without worrying about crowding or damaging the virtualized operating system.


Sandboxie, unlike virtual machines, is a program that creates a protective bubble around your existing computer system, effectively sandboxing the parts of your system you specify.  With Sandboxie, browsing the web is more secure.  Any cookies, cached files, and search history, can all be cleared from your browser when you close the sandbox program. You can even send apps directly to Sandboxie to be examined.

All Things Cyber Security With Geek Aid

If you’re still confused or just want to find out more about how to keep your computer absolutely secure, Geek Aid is here to help.  Our professional geeks know your computer system by heart, and can protect you against viruses and malicious content to keep all of your devices in working order. Call us at (877) Geek-Aid to speak with our geeks today.

A ridesharing customer holds their phone inside a car, worried about how ridesharing apps' privacy policies impact her.

Ridesharing Apps and Protecting Your Privacy

A ridesharing customer holds their phone inside a car, worried about how ridesharing apps' privacy policies impact her.

Ridesharing apps are a popular way for commuters to get to their destinations, but recent events have put ridesharing companies’ privacy policies into question.


Increasingly, people are choosing ridesharing apps like Uber and Lyft over traditional cab services.  This is partly because the rates are cheaper, but also because passengers can lower their fare further by carpooling with people traveling in the same area.

Anyone who has used an app like Uber knows that it uses GPS technology to show where drivers and passengers are, in real-time.  This in itself raises some questions about privacy.  But recently, ridesharing apps have given travelers even more to worry about.

Privacy Policy Precedents

Uber has granted its employees access to data on thousands of customers, including when and where each client travels.  This data even includes how long a customer stayed at a particular location. The implications of this are far-reaching.  Data breaches of this kind could leak the personal travel details of thousands of customers.  Additionally, this information could be used to spy on politicians and other high-profile figures.

Uber currently has 40 million users, claiming that these info distribution practices are in compliance with their legal responsibilities and offer sufficient protection for their users.  However, in 2014, Uber revealed a “God View” tool that displayed an aerial view for tracking customers in real time.  These examples raise suspicions about how much ridesharing apps care about customer privacy.

What Kind of Data Is at Stake?

The privacy policies of ridesharing apps bring to light how these companies store, employ and keep our personal data safe.  Most of these apps require that users connect their social media profiles to their account.  Sites like Facebook are giant databases of personally identifiable information (PII). If these details are leaked, customers’ personal, professional, and social lives may be at stake.


Using-link Facebook accounts can be an easy method for new users to sign up and log in, but linking to social media accounts means that apps are also collecting information unrelated to getting a ride.  Birthdays, friend lists, which college or university you attend, and interests are also gathered.

Credit Card Account Information

In addition to these concerns, how ridesharing apps handle our payment credentials has also come into question. These apps are usually cashless and require their users to link credit card accounts to pay for rides.  While this seems like a more convenient payment method, our account numbers are only as safe as these companies’ privacy policies.

How Your Personal Information Can Be Leaked

What does this mean for ridesharing passengers at large? Generally, a bulk of the information is collected for marketing, general usage statistics, and app functionality purposes (service improvements).  This information can also be sold to advertisers or third parties.

There are three ways in which a data breach could occur: the information could be leaked during the transmission of it to third parties, the ridesharing company itself may mishandle the information, or the data might be mismanaged by advertisers or third parties.

Two woman stand on the side of the road, having used a ridesharing app to order a ride.

It’s undeniable that ridesharing apps are convenient and combatible with busy lifestyles, so it’s important to protect your privacy while taking advantage of ridesharing apps’ features.

What Can You Do to Protect Your Privacy?

Ridesharing apps are obviously an innovative idea; in an increasingly interconnected world, the concept of using technology to facilitate carpooling is incredibly useful.  Ridesharing is both a green way to go about your daily commute and an inexpensive way to reach destinations inaccessible via public transit.

But because extremely sensitive personal data is at stake here, choosing a ridesharing app is not a trivial matter.  These companies’ privacy policies are available on their websites and should specify what individual user data is being collected.  All apps collect usage statistics and other general facts, but privacy policies tell you which companies send out user specific details (credit card numbers, birthdays, emails, etc.) to third parties.

You can also read other users’ reviews to see what they have to say about their experience.  Reviews are very telling of how a company handles their business, how much they value their customers, and how their policies affect the end-users.

The Future of Ridesharing Apps

Conventional car services like taxicabs and black cars/limos are regulated by law.  With the emergence of apps like Uber taking over the car service scene, questions have been raised concerning legality and classification. Institutions of political power, like the U.S. Senate, have come to ask companies like Uber about their privacy policies.  This industry is still fairly new, and comprehensive security standards have yet to be put in place.

Until then, it’s always a good idea to keep yourself updated on the privacy policies of the services you are using.  Today, data breaches carry the weight of bank robberies in decades past.  Because all of our information can be accessed in one place, it must be properly safeguarded.

While app developers should be obligated to make sure their software protects the data being collected, it is still the responsibility of the user to educate themselves on how their data is being handled.




Moving your business' data to the cloud can be daunting, so understanding the benefits and security measures of cloud computing services is important.

The Cloud: Understanding More About Its Benefits and Security

Moving your business' data to the cloud can be daunting, so understanding the benefits and security measures of cloud computing services is important.

The cloud is a convenient and cost-effective means of elevating your business’ resource allocation processes.

What Is the Cloud?

“The cloud” is one of those popular tech topics people talk about but can’t always define.  The cloud is essentially a network of servers that does two types of things.  One kind of cloud server stores data and while the other uses its computing power to help applications run.

We all come across the cloud frequently in everyday life, especially for storage.  Every time you use an app like Instagram, a cloud server is what holds the pictures uploaded to your account.  These photos are not saved in your phone’s internal memory, but rather in Instagram’s network of servers.  Dropbox is also an example of a cloud server. Every time you save something on your computer that doesn’t take up your computer’s memory, you are using the cloud.

Other companies like Adobe use the cloud to deliver services.  Previously you could buy the Adobe Creative Suite™ in a physical box.  Now, all of these tools exist in the cloud and users pay a subscription fee to access them in the Adobe Creative Cloud™.

How the Cloud Benefits You

When businesses decide to move their resources to the cloud, overhead costs can be reduced.  Before cloud technology became widespread, businesses would have to purchase hardware and computer applications that lost their value over time.  With the cloud, applications previously downloaded on physical computers are now run and updated through the Internet.

Businesses can also be more flexible with their resources.  The cloud allows them to pay for only what they use since cloud computing is a subscription-based service.  It can also accommodate for businesses that have growing bandwidth demands since cloud capacity can be scaled up and down easily.  This kind of agility makes these services cost-effective and adaptive.

The cloud can make your business more secure in a variety of ways.  Lost laptops are a security breach for companies every year because many of them contain highly sensitive information. Not only that, valuable documents may be lost forever when devices are misplaced.

With cloud computing, you can access files at any time via your Internet connection.  This allows you to remotely wipe the memory of lost devices and not have to worry about information falling into the wrong hands.

The cloud benefits the environment by decreasing your carbon footprint, by reducing unnecessary hardware and only using the required amount of cloud storage.  Even in the digital age where more and more companies are going paperless, sustainability is important.

This image shows three different types of cloud securities, "private," "hybrid," and "public." How secure the cloud is depends on the measures you take to protect your data.

How secure the cloud is depends on the security measures you take to protect your data.

Is the Cloud Secure?

Contrary to popular belief, the cloud is quite secure.  However, it requires you to take measures to personally secure your company’s data.  When businesses “move to the cloud,” it requires that you have knowledgeable security staff that understands what that entails.  Your team must know that the data you are moving is sensitive, and apply end-to-end encryption to the data during both storage and transfer process.

A recent study found that 82% of public databases are not encrypted.  Make sure the cloud provider you are using suits your data needs and has what it takes to keep your files secure. Whatever service you choose, it is still the job of the user to define who can access the data, move it, add data, etc., and how those permissions change with each cloud provider.  Defining these terms is known as Identity Access Management (IAM).

In addition to these steps, it is wise to back up your data in separate fault domains.  Fault domains are basically stacks of servers.  They include features that, in the case of a network failure, make sure only the server with the failure would stop working.  This means you have multiple copies of your data, achieving maximum file resiliency.

Cloud Computing Creates a Level Playing Field

Anyone can utilize cloud computing services since they are inexpensive and require only an Internet connection to access.  It also allows small and growing companies to use enterprise-level technology, and even make faster business decisions than larger, more established companies.

Cloud networks facilitate collaboration from your team members, meaning that they can work and share files with everyone, from anywhere.  Cloud-based workflow applications allow real-time remote collaboration and streamline communication.  Gone are the days of attaching files to emails and ending up with incompatible file formats, and ineffective version-control.

Moving data to the cloud means that even the smallest companies are becoming more globally involved. Since growing businesses can be financially nimble using cloud computing services, they can now disrupt a market dominated by Fortune 500 corporations.

If you need assistance in moving data to the cloud, don’t hesitate to contact Geek-Aid. We’re here for all of your technology needs and computer repair questions.

Network security on home computers is just as important as keeping networks on work computers secure.

Network Security: Tips on Keeping Your Home Computer Safe

Network security on home computers is just as important as keeping networks on work computers secure.

Good network security practice can keep the files on your home computer safe.


Network Security on Your Home Computer

No matter how much time you spend on your work computer, your home computer contains some of your most important files.  Our personal machines help manage our finances, social relationships, and professional lives, but we often don’t put in as much effort into keeping them secure.  Our computers contain a variety of personally identifiable information (PII), and it’s important to maintain sound computer and network security to protect your files.

Connecting Your Computer to a Secure Network

A network router is your first point of contact with the Internet.  Don’t just rely on your ISP (Internet Service Provider) or cable modem to perform comprehensive security monitoring.  An Internet connection starts with your modem, connects to your router, and feeds this information into your computer. Your router should be secure before connecting to the Internet.

Here are a few tips to maintaining network defense, once you are connected to a secure network.  First off, use a web browser with sandboxing capabilities. A sandbox is an isolated environment that mimics an entire computer system, which targets suspicious programs and analyzes potential threats.

Browsers with sandboxing capabilities are especially useful for recognizing advanced persistent threats (APTs).  These APTs are designed to escape detection, breaking through conventional security barriers, and gaining access to PII on your computer.  Sandboxes help capture these viruses and clear them out.

When you own a business, you want to keep your home computers well-defended because any crossover information between work and personal machines, through email or messaging apps, can cause a data breach.  A recent study found that 60% of small companies fail due to poor network security measures.

Sandboxing can be applied to a number of different programs, such as PDF readers.  A common means for viruses to attack your computer is through embedded URLs, where malicious executables can gain entry via PDF files.

Keep Everything Up-To-Date

While this may seem self-explanatory, many malware attacks occur because personal computers are not as diligently updated as company devices.  Make sure your computer has current versions of all software you run.

Updating programs like Microsoft Office to the 2007 version or a more current iteration is a good idea, since word-processing is a common function on home computers.  Microsoft Office 2010 offers a “Protected View” that opens documents in read-only mode, which blocks any viruses embedded in unfamiliar files.

Many applications have a feature that enables automatic updates.  Updating frequently is a good network security practice, since attackers typically exploit hosts that don’t have their software applications fully patched. Additionally, evaluate which programs you use most frequently and those you never seem to use.  Do some research on the software you wish to delete, and determine if removing them is possible.   Fewer applications on your computer workstation mean fewer channels for hackers.

Man holding credit card, sitting in front of his computer. Practicing good network security techniques is important for safeguarding personal information, like credit card account credentials.

By practicing good network security techniques, you can avoid phishing attacks and social engineering traps that can steal personal information like your credit card account credentials.

Social Engineering and Phishing Attacks

Some of the most common attacks are executed through email.  A social engineering attack uses human interaction to obtain sensitive information on computers with vulnerable network security.  In these infected emails, a person can claim to be an employee, cleaning service, or someone else offering qualifications that would allow them to gather your confidential information.

Phishing tactics also use emails from attackers masquerading as reliable organizations to obtain personal details.  Often, these phishers will take advantage of events in the news (i.e. fake natural disaster fundraisers) and holidays (i.e. Christmas shopping deal scams) to steal account information.  They even go so far as to pose as reputable banks to issue fraudulent warnings, hoping that alarmed card holders will hand over their account credentials.


Keeping Your Home Computer Safe From Attacks

To avoid these attacks, install anti-virus and anti-spyware software, firewalls, or email applications that filter your inbox.  Whenever you are asked for sensitive information such as your credit card number or even your birthday, verify that your information isn’t falling into the wrong hands.

If you suspect that you’ve received a phishing email, call the organization the message claims to be from.  Use the contact info on the legitimate website, and ask about the email.

In general, don’t open unfamiliar links or messages with attachments, especially from email addresses not in your contacts.  Also, find out how to build a strong password and employ those methods for all of your accounts.  Secure and complex passwords should not only be used for WLANs but also for any devices in your home and work that use web interfaces (i.e. printers, self-automated light switch systems, etc.)

When it comes to protecting your personal information, there’s no such thing as taking too many precautions.  At Geek-Aid, we specialize in every kind of cyber security.  We all rely heavily on personal computers to manage many aspects of our lives, and keeping these devices secure is a top priority.



An billboard against a blue sky with clouds that says, "Internet Neutrality: Straight Ahead," the opposite of what will happen if practices like zero-rating become a widespread standard.

Zero-Rating: Net Neutrality and What You Can Do to Protect It

An billboard against a blue sky with clouds that says, "Internet Neutrality: Straight Ahead," the opposite of what will happen if practices like zero-rating become a widespread standard.

Zero-rating is a sneaky way that ISPs try to control the way we consume data on the web.


At the end of the day, the Internet is just a network of tubes.  So who’s to say which tubes cost money to use and which don’t? Without net neutrality, Internet service providers and other companies can use strategies like zero-rating to forever change the way we browse the web. In a world where most television networks are controlled by a few major companies, the Internet is really one of last level playing fields out there.

What Is Net Neutrality?

Net neutrality is the concept that all Internet traffic should be treated equally. That means that ISPs (Internet Service Providers) do not have the right to block, slow down, or use paid prioritization to favor one website over another.

Essentially, a world without net neutrality is a world of censored knowledge. An open internet benefits everyone. Medical professionals in developing areas can search for critical information to treat patients.  Small family-owned businesses have the opportunity to expand into multi-national companies, servicing millions. People around the globe deserve an equal chance at success.

The Internet is and should always be an open forum for the free exchange of ideas.  In fact, the UN recently deemed Internet access a human right. In the digital age, it is important to discuss and determine the ethicality of Internet usage control.


One sneaky way that ISPs are controlling the way we use the internet is through zero-rating.  When you use data to browse websites on your smartphone, your service provider keeps track of your data usage.  To prevent users from maxing out their data caps on the first day, say by watching two hours of YouTube on their daily commute, they zero-rate some sites.

With zero-rating, certain sites or apps don’t count towards the total amount of data you’ve used.  For example, a video streaming company can pay your service provider in advance to join this “zero-rating club.” This makes their services more appealing than another streaming site that fills your data cap more quickly.

If you think about it, there is no need for data caps or zero-rating.  If networks already have enough bandwidth to unlimited data to zero-rating sites, then there is enough for everyone.  On top of being highly illogical, this practice is violating net neutrality.  The Netherlands, Slovenia, and Chile have already banned this practice, but the FCC remains silent on zero-rating regulation.

A World Without Net Neutrality

If ISPs continue to offer preferential treatment, strong service companies will become even more powerful.  Not only that, ISPs will dictate how you surf the Internet in your free time.  Right now, the web is composed of mostly streaming sites, blogs, games, social media, and email services.

Service providers will want to control which sites cost more to visit, and will also want additional fees from every website to show their content to customers. They can also choose to block certain sites and make visiting certain sites more expensive than others.

For those who argue that abolishing net neutrality can increase service provider competition, a free and open internet also stimulates ISP competition.  It also is the backbone of entrepreneurship in the digital age.  It promotes freedom of speech innovation.  Lack of net neutrality can lead to monopolies, which are already a big issue in free market economics.

What Can You Do About It?

To speak to your local legislators about this issue, or to contact members of the FCC like Chairman Ajit Pai, Mignon Clyburn, and Michael O’Reilly, here are some tips:

The first and easiest way to contact them is via email. Their email addresses are located on their website. You can also call them.  Legislators take their call appointments seriously.  If you are interested in tech and have educated opinions to provide on the issue, they are eager to listen.  Since they themselves are not tech experts, they want to be as informed as possible when creating tech policies.

If you are a DC local, you can choose to speak with them in person. If you are not, you can even make appointments to video chat with FCC commissioners or local legislators.

The Internet is a utility, not a commodity. Under the Obama administration, it was deemed a telecommunications service, meaning that it receives the same treatment as water, gas, and electricity services.  However, under the Trump administration, these rules are projected to reverse.  If you are a net neutrality supporter, it is your job to voice your opinion.

If you would like to receive more news on the latest in cyber security, Internet happenings, and general technology buzz, stayed tuned on our Geek-Aid blog.

Internet of Things banner with icons.

Protecting the Internet of Things

Internet of Things banner with icons.

Can the government protect Internet of Things devices?

Forbes describes the Internet of Things (IoT) as “the concept of basically connecting any device with an on and off switch to the Internet (and/or to each other). This includes everything from cell phones, coffee makers, washing machines, headphones, lamps, wearable devices and almost anything else you can think of. This also applies to components of machines, for example, a jet engine of an airplane or the drill of an oil rig.”

This concept plays a big part in the future of technology and the devices we use. The biggest concern surrounding the topic of the IoT is security. How do we protect these internet-connected devices from threats and hackers? As the components of important machines are left vulnerable, this issue becomes more and more prevalent.

Now, the government is getting involved. A new Senate bill seeks to improve the security of government devices. Many IoT devices, like cameras, computers, and more are vulnerable to attack. Recent attacks have even allowed hackers access to popular services. As more IoT devices are attacked, the government wants to make sure that they meet basic standards of security.

Internet of Things Cybersecurity Improvement Act

Several senators, including Mark Warner, Cory Gardner, Ron Wyden, and Steve Daines, introduced the Internet of Things Cybersecurity Improvement Act. The new IoT Cybersecurity Improvement Act wants to add better security to devices purchased by the U.S. government. It mandates that devices support patches and password changes, which would help decrease their vulnerability. The senators also want government devices free of known exploits. These standards allow government officials to keep their devices updated and prevent future attacks.

“While I’m tremendously excited about the innovation and productivity that Internet-of-Things devices will unleash, I have long been concerned that too many Internet-connected devices are being sold without appropriate safeguards and protections in place,” said Sen. Warner. “This legislation would establish thorough, yet flexible, guidelines for Federal Government procurements of connected devices. My hope is that this legislation will remedy the obvious market failure that has occurred and encourage device manufacturers to compete on the security of their products.”

What This Bill Could Mean for IoT Devices

Updating the security of these devices could mean a lot for the safety of government information and services. Sen. Gardner notes that “The Internet of Things (IoT) landscape continues to expand, with most experts expecting tens of billions of devices operating on our networks within the next several years.” The more IoT devices that we have available, the more opportunities hackers have to access or interfere with valuable information and services.

Hopefully, the bill will affect all IoT devices, not just the ones used by the government. Manufacturers could raise the standards of their security overall to gain government contracts. If it is passed, only researchers, who are meant to test security exploits, will be exempt from purchasing devices that don’t meet the new standards of security. If you wish to learn more about the Internet of Things Cybersecurity Improvement Act, you can find out here.

Business man and woman using a computer.

Checking Your Computer Security

Business man and  woman using a computer.

Checking your computer security settings can keep your information safe.

Last week, we discussed a couple of habits that will help you protect your computer’s security. Hopefully, you now know how to navigate the internet better and protect your data. In order stay vigilant and protect your computer, there is more that you need to know. After all, there is only so much you can do to keep hackers from trying to access personal information. Let’s discuss how you can check if your computer’s own security methods are in working order.

Keep Your Computer Updated

Computer companies know how troubling hackers can be, for both them and their consumers. They do not want hackers infiltrating the private information of the people who buy their machines. That’s why they constantly update their computer security system to fight off all sorts of viruses, malware, and trojans. The first thing you should do is check if your computer is running the latest update. This will ensure that it is up-to-date and ready to fight off anything trying to penetrate your system.

Scanning Your Settings for Better Protection

There are plenty of useful tools that computer manufacturers release as well. These tools are able to scan your computer for potential problems like weak user passwords or if you are using all of your security features. They can also educate users on the proper security setting for protection against threats. Just remember to download this kind of software straight from your computer’s manufacturer and not untrustworthy sites.

Secure Your Internet Browser

The number one way that hackers gain access to your computer is through the internet. Accidentally opening suspicious emails, clicking random links, or browsing unfamiliar websites can leave you at risk. In order to avoid downloading something malicious, you have to secure your browser’s own security settings. You’ll find that your browser does more than just block pop-up ads. Like your computer, your browser needs to stay updated to protect your system. Your plugins need to stay updated as well. If they remain out of date, then your system is vulnerable.

Make Sure You Have a Strong Firewall

The biggest defense against hackers is your system’s own firewall. Most computers come with a built-in firewall. They block others from penetrating your computer’s files and prevent them from seeing your system online. You have to make sure this computer function is working at optimal efficiency. Try running a port test service. These services are meant to test your firewall and make sure the world cannot see your computer. If it can detect your computer, then it’s very likely that your firewall settings are not correct or that you have a virus.

Make Sure Your System Is Secure With Geek Aid

Confused? Want to make sure that your system is absolutely secure? Well, Geek Aid is your best bet. Our geeks are trained to know the ins and outs of your system. That way they can not only protect you against viruses or threats but keep your system in working order. We make house calls and service offices as well. So, call us at (877) Geek-Aid to speak with one of our geeks today.

Close up on businesswoman backing up her computer, which is a good computer security habit.

Computer Security Habits You Should Adopt

Close up on businesswoman backing up her computer, which is a good computer security habit.

Protect your computer security at all times.

Computers are an essential part of our everyday lives. Whether it’s the cell phone you carry in your pocket or the desktop sitting in your room. They help us work and do our day-to-day task. Without them, our world becomes far less convenient. What is more important than the machine itself is your computer security habits. Protecting your computer from any type of malfunction or malicious attack is important to protect your private data. Let Geek Aid walk you through a couple of ways to ensure you aren’t left vulnerable.

Always Update Your Computer Security

Anytime you boot up your computer, the first thing you should do is check for updates. A new update to your operating system isn’t just an annoying notification that pops up. An update is a vital part of keeping your computer safe. New viruses are born every day, and some hackers even create ones to attack specific operating system. A new update is your computer company’s way to fighting off these infections. The longer you wait to update your system, the more vulnerable you are to an attack.

Change Your Password Game

Over and over we need to remind people to change their passwords. Many use the same password they have been using for several years for every account. This is a bad computer security habit. If your password becomes predictable, you are giving hackers the opportunity to access your devices, personal accounts, and more. Generate random passwords or strong ones that use a combination of letter, numbers, and symbols.

Create Computer Backups

When in doubt, regard Murphy’s law. Anything that can go wrong, will go wrong. As your computer grows older, it’s is more likely to experience random glitches and crashes. You shouldn’t worry too much though as you can prepare for these kinds of unexpected events. Make sure that you regularly create backups. Do it every 2 weeks or every month to make sure the latest information and files are safe and secure. If you need help, there are some useful tips online on how to back up your system.

Email Carefully and Navigate the Web Safely

Going on the internet helps us gather information, stay on top of the news, and do so many other tasks at lightning speed. However, the internet isn’t always safe. Browsing on the web or opening up an unknown email is how a lot of people contract viruses. You have to be more careful. Do not open or download attachments or files from people or sources you don’t trust. Also, shareware and free downloads are often packed with malevolent software.

Investing in Antivirus Software

An extra antivirus software on your machine won’t hurt. In fact, these types of software are your number one barrier against hackers trying to steal or mess with your private data. They can set up firewalls and detect viruses attempting to penetrate your computer’s defense. Do some research and spend some money on a good antivirus software.

Have a broken, glitchy, or vulnerable computer? Then call Geek Aid at 877-GEEK-AID. We specialize in home and office IT, as well as computer setup and virus removal. Find out what we can do for you.

Businessman hands typing on computer keyboard similar to the Modern Keyboard.

What You Need to Know About Microsoft’s Modern Keyboard

Businessman hands typing on computer keyboard similar to the Modern Keyboard.

Microsoft’s Modern Keyboard makes a new addition to the Windows collection.

Technology never stops moving and it’ll be amazing to see what new advancements we will have in the world of tomorrow. As one the leading computer companies in America, Microsoft is constantly pushing the envelope of what it can do with its technology. Even the smallest advancements hold value. Take the “Modern Keyboard” for example. Microsoft’s latest accessory wants to reinvent how we use the age-old device. Find out everything you need to know about the Modern Keyboard. Their inventive twist to these classic computer accessories might make it your next purchase.

Fingerprint Sensor Integration

Biometrics are the latest security measure being implemented in various devices. You see them often in smartphones and tablets. Even using your fingerprints for online purchases and as sign-in credentials are becoming more and more commonplace. Microsoft’s Modern Keyboard brings that natural evolution to their home computer.

Built for the next generation of Windows 10 devices, the Modern Keyboard features a fingerprint sensor. Seamlessly integrated into the keyboard as another button, users simply have to press and hold their finger on it to activate the sensor.

Built for Durability

When you buy any device or accessory, you want to know that it will last. Microsoft made sure to craft this new device with an aluminum frame for durability. While heavy, the company also describes the keyboard as “thin & strong,” as well as “virtually indestructible.” This premium keyboard is sure to last users a long time. It’s also the perfect option for those who need it on the move.

Bluetooth Pairing

Another great feature that is built into the Modern Keyboards is it’s wired and wireless interface. The keyboard has Bluetooth pairing capabilities, allowing it to connect to devices that support Bluetooth 4.0 or higher. This applies to non-Windows devices as well.

According to Microsoft, they “optimized the Bluetooth pairing experience, enabling automatic pairing when you connect the cable at first OOBE.” This makes pairing simple and intuitive. It also has a 2.4 GHz frequency range, which allows it to work up to 33 feet away from a device or 17 feet if you are in an office setting.

When Will the Modern Keyboard Release?

Microsoft has yet to give a release date for the Modern Keyboard. We know that the accessory will cost $129.99 at retail, with a 1-year warranty. It also includes a rechargeable battery that lasts up to 4 hours on a full charge.

Along with the Modern Keyboard, Microsoft unveiled the Modern Mouse. This device sports a sleek look and a metal scroll wheel. It also has wireless Bluetooth, working with Bluetooth 4.0 supported devices. No release date has been announced for this device as well but it will retail for $49.99.

Design wise, both devices are silver and gray. The Modern Keyboard has flat, square shaped keys that match the look and feel of their latest Surface models. These two devices should make a wonderful addition to the Microsoft’s collection of electronics. We look forward to seeing more technological advancement from Microsoft in the future.

A malicious malware symbol surrounded by the different types.

Malicious Malware Makes It Easier to Infect Your Computer

A malicious malware symbol surrounded by the different types.

Hackers have developed a new malicious malware.

It seems harder and harder to protect your computer from security threats and virus. Hackers are constantly trying to gain access to your computer system using the latest tricks and cons. We’ve discussed before how to protect yourself from malicious malware. For example, if you click on a suspicious link in an email, there a good chance you’re inviting a virus to infect your computer. However, a new report suggests it might not be enough. A new virus is now able to infect your computer the moment your mouse hovers over the link.

Malicious Malware Installs Banking Trojan

What’s a Banking Trojan? It’s a type of malware that is designed to break into an online bank account and move a person’s money into a hacker’s bank account. In the U.S., these trojans steal millions of dollars from business and personal accounts. Companies and organization are usually the targets of these nefarious campaigns.

Research by cyber security company Trend Micro and information security blog Dodge This Security revealed a new malware downloader is installing banking Trojans. What makes this particular malware stand out is that users don’t even have to click on anything for it to activate. All users have to do hover their mouse cursor over a hyperlink in a PowerPoint file.

These attacks were largely made against companies and organizations in Europe, the Middle East, and Africa. Hackers sent PowerPoints containing the Trojan via spam email. These emails were disguised as finance-related, making the user believe they were related to a recent order or invoice.

Older computer systems are more at risk than new ones. While the malicious malware does try to automatically download onto your computer, the latest Microsoft Office will ask you beforehand. This provides the user a security measure to prevent the virus from affecting you. However, older versions of Office will execute the PowerPoint file.

Keeping Your Computer Safe

Many companies do not update their computer’s operating system or applications. Working off of older technology leaves them vulnerable to attack and without that added layer of security that they need. Unfortunately, just like we saw with the WannaCry situation, it isn’t so easy for large scale companies to update their computer systems.

A good antivirus software will help to protect your computer from an attack like this. Trend Micro was able to detect 1,444 spam emails last month. Another way to avoid becoming a victim of online theft is by looking out for suspicious emails from unknown senders. These are often the most dangerous types of emails with hackers hoping that you will download its contents.

If you are a small or big business, your computer system is a target. It is best to invest in protecting your company’s private and important information. At Geek Aid, we can assist you with business IT solutions, including:

  • Performance Enhancements on Computers
  • Crash Repairs
  • Data Recovery
  • Data Backup
  • Security From Thieves and Competitors
  • Email Setup
  • Technology Consultation

Don’t leave your company’s security system at risk. Call Geek Aid at 877-GEEK-AID for computer and technical support.

Go to Top