Microsoft Admits Windows 10 Has A Serious Problem

There’s the thing about Windows 10; you give up control. Control over updates and control over privacy, but Microsoft has finally admitted the latter is a serious problem and is taking action…

In a blog post Terry Myerson, Microsoft’s Executive Vice President of the Windows and Devices Group, said the words millions have been waiting to hear:

“Many of you have asked for more control over your data, a greater understanding of how data is collected, and the benefits this brings for a more personalized experience. Based on your feedback, we are launching two new experiences to help ensure you are in control of your privacy.”

microsoft-10-privacy-settings

Arguably even more important, however, are two changes being made to the Windows 10 Creators Update when it is released in the next few months (and yes, it’s still a stupid name – ‘Windows 10.2’ would be fine!).

1. Overhauled Privacy Settings On Install/Update
Say goodbye to the rubbish ‘Express Settings’ screen on first install, with the Windows 10 Creators Update you’ll get clear but simply worded explanations and toggle switches. Users upgrading to the Creators Update will also be prompted to use after updating.

2. Simplified Diagnostic Data
More detail is needed here before judging the benefits but three collections levels are being cut down to just two: ‘Basic’ and ‘Full’. Basic will have only “data that is vital to the operation of Windows” which Microsoft defines are central to “keep Windows and apps secure, up-to-date, and running properly”.

Again you’ll be prompted to review your choice after installing the Creators Update.

microsoft-10-privacy-settings-2

New Windows 10 ‘Basic’ privacy settings deliver more user control
Image credit: Microsoft

Why So Long? And New Questions On The Horizon

It is said the first step towards admitting you have a problem is admitting you have a problem. But Microsoft has skipped this by both (finally) admitting its problem and coming up with some solutions in a single step. That’s commendable, though we’d prefer to have had an admission much earlier and a “We’re working on it!” message.

On top of this, the Creators Update looks set to raise as many questions as it answers due to something it will add called ‘Dynamic Lock’. This uses your PC’s web camera to monitor when you are sat in front of it so it can be automatically locked when you step away. Users will be able to disable Dynamic Lock, which solves my concerns, but it is likely to start a whole new wave of conspiracy theories.

Furthermore, Microsoft must still address the issue of control over Windows 10 updates. The Creators Update introduces the option to delay the installation of non-security updates for up to 35 days, but only Windows 10 Professional, Education and Enterprise versions qualify.

This means Microsoft recognizes users’ need for control but the company continues to treat mainstream Windows 10 Home users as guinea pigs for the stability of new updates before they are provided to big business. That needs to stop and users of all versions deserve the right to have control over their PCs, should they want it.

Despite all this, it is clear Microsoft is making significant steps in the right direction with Windows 10. It just shouldn’t have taken so many obviously wrong ones in the first place.

YOUR TURN

For the latest in IT News for your home or Union Office Like Union Built PC on Facebook and follow us on Twitter and LinkedIn.  And don’t forget to subscribe to our monthly email newsletter for articles like this delivered straight to your inbox.

 

What Does a Trump Presidency Mean for Tech?

The eight-year bromance between Barack Obama — who appointed the first chief technology officer for the US — and the tech industry is ending. Now what?

That’s the question the tech industry has been asking since a real-estate mogul turned reality star, with a spotty reputation with tech, was voted in as 45th president of the United States.

President Obama, a self-proclaimed geek and Trekkie, was the most tech-focused president in modern history, committing billions of dollars to support initiatives to spur tech innovation, improve education and encourage exploration and discovery. Unlike Democratic rival Hillary Clinton, Donald Trump said very little during the campaign about where he stands on most tech-related issues — though he did call for a boycott of Apple products over the company’s stance on privacy in its fight with the FBI

president-elect-donald-trump

One thing is clear. Silicon Valley in general isn’t excited about the next four years. In July, 150 tech leaders, including Apple co-founder Steve Wozniak, Reddit co-founder Alexis Ohanian, Wikipedia founder Jimmy Wales and Vint Cerf, considered the “father of the Internet,” wrote an open letter calling a Trump presidency “a disaster for innovation.” Some in the industry, notably broadband service providers, criticized him for policies they believe would stifle investment in infrastructure.

The outlook is “beyond grim,” weighted down by fear that the industry and world would suffer from this election, the New York Times reported Thursday.

Ouch.

Since Trump, 70, didn’t say all that much about tech during the campaign (he did call out “the cyber” when talking about cybersecurity concerns during one debate), industry watchers are left reading whatever tea leaves they can find until the president-elect reveals more-definitive policies.

Given that the tech industry accounts for 12 percent of all jobs, according to the US Bureau of Labor Statistics, and given Trump’s message about improving America’s economy and competitiveness, his technology policies will have a long-lasting impact.

“The onus is on him to convince us that what we have seen in the past, the erratic behavior that has been defining character of the campaign, is not what will lead policy and that we’ll see a more pragmatic approach,” said Evan Swarztrauber, communications director for the DC-based think tank TechFreedom.

Here’s what little we do know about Trump’s stand on some important tech issues.

Net Neutrality

Net neutrality became a relatively big deal in the 2008 election, but little was said during this election cycle about last year’s policy.

Net neutrality is the idea that all traffic on the internet should be treated equally. This means your broadband provider, which controls your access to the internet, can’t block or slow down the services or applications you use over the web.

That said, we do know Trump isn’t a fan of the FCC’s current regulations. In 2014, at the height of the debate to rewrite the rules around Net neutrality, he tweeted, “Obama’s attack on the internet is another top down power grab. Net neutrality is the Fairness Doctrine. Will target conservative media.”

It’s possible that an FCC led by Republicans could eliminate all or part of the rules and strip the FCC of some of its authority. If that happens, broadband providers could create so-called fast lanes and charge internet companies, like Netflix, different rates to deliver their services.

Loosening regulations around telecom will likely benefit broadband and wireless carriers. The NCTA, the Internet and Television Association, which lobbies for the cable industry, said it’s eager to work with President-elect Trump.

“We look forward to participating in a constructive and robust discussion about policies that will continue to make America a global technology and entertainment leader,” they said in a statement Wednesday.

Industry Consolidation and Broadband

Trump also seems to have taken a populist view against mergers and acquisitions. That could spell trouble for big pending mergers, including AT&T’s $85 billion takeover of entertainment giant Time Warner. When that deal was announced last month, Trump vowed to block the merger if he was elected.

“As an example of the power structure I’m fighting, AT&T is buying Time Warner and thus CNN, a deal we will not approve in my administration because it’s too much concentration of power in the hands of too few,” he said.

AT&T’s executives still like their chances of getting the deal approved by the US, pointing to statements Trump made in his victory speech about investing in “infrastructure.”

“His policies and his discussions about infrastructure investment, economic development and American innovation all fit right in with AT&T’s goals,” Chief Financial Officer John J. Stephens said Wednesday. “We’ve been the leading investor in this country for more than five years running, and our Time Warner transaction is all about innovation and economic development, consumer choice, and investment in infrastructure with regard to providing a great 5G mobile broadband experience.”

Encryption and Cybersecurity

The president-elect has made only vague statements about privacy and security, and downplayed Russia’s alleged hacking into the Democratic National Committee and Clinton’s campaign email servers. Still, when the Justice Department tussled with Apple over unlocking the iPhone of the terrorist suspect in the San Bernardino shooting, he called for a boycott of Apple products.

What he has said about cyber security is that there should be a review of US cyber defenses by a “Cyber Review Team.” He also told the The New York Times in July that “certainly cyber has to be in our thought process, very strongly in our thought process… Inconceivable the power of cyber… you can make countries nonfunctioning with a strong use of cyber.”

RELATED: The Union Built Cloud Secure Data Storage Solution

Tax Policy

The biggest boost to the tech industry could come from Trump’s plans to lower corporate tax rates to encourage companies to invest their money in the US.

There’s a good chance that money could be invested in the US, said Rob Atkinson, president of the Information Technology & Innovation Foundation (ITIF). But it’s not a given. In 2004, the US allowed American companies to bring in the profit they’d earned overseas in the hope they would hire more workers. Most of the money went to executives and shareholders, instead.

Trump has also called for high import taxes on products, which could drive up prices for consumers on tech goods. In January, Trump said in a stump speech, “We’re going to get Apple to build their damn computers and things in this country instead of in other countries.”

Apple, which declined to comment on Trump’s statements at the time, designs its products at its Silicon Valley headquarters, but uses a Chinese contractor to build them. If Apple products were manufactured in the US, the price of an iPhone could rise to as much as $900 to offset worker wages versus the $650 cost of an iPhone today.

YOUR TURN

How do you think Trump will affect YOUR industry? Sound off in Comments, on the Union Built PC Facebook Page, or on our Twitter or LinkedIn feeds. And don’t forget to subscribe to the monthly Union Strong email newsletter for articles like this delivered straight to your inbox.
.

Additional Reporting by CNET

Why Do You Need Cloud Storage?

Many people have heard about cloud storage but they don’t really know what it is and how they can use it. Not everybody has a background in IT that’s why it is completely understandable why the notion of sending your files to some cloud storage company is a bit daunting. However, using cloud storage has a lot advantages that you just cannot replicate with an external hard drive, for example.

cloud_storage

Let’s have a look at what you can do with cloud storage and why you might need it:

1. Cloud storage frees you from external hard drives

One of the best things about storing your data in the cloud is that it is accessible anywhere you go and where you have an internet connection (even in most developing countries that’s not a problem anymore). There is no need to carry and external hard drive around with you that a) could be stolen, b) could be lost or c) could break in any manner possible. With cloud storage getting your files is as easy as opening a web browser.

2. Sync your files across multiple devices

The best cloud storage solutions allow you to synchronize your files across your laptop, desktop and mobile device. What does syncing mean? Well, say you work on an important document at the office but you cannot finish it on time. If you save that presentation in your cloud storage folder it will be copied automatically to your mobile device and laptop so that you can finish it while commuting or at home.

3. Share & Collaborate

If you’re using a cloud storage solution for your files you can easily share files with your friends, family and colleagues. Just think about this: you’re on vacation with your children and spouse and you want to show your mother your beach house. Of course, you could upload your photos to Facebook but what if your parents don’t use Facebook? Just send them an email to a folder of your cloud storage solution and they can open it right away. Forget large email attachments that never arrive!

If you’re working remotely you can use those shared folders to collaborate with your team mates. Some solutions even allow to give special access rights to those folders.

4. Save cost

In many cases you can save quite a few bucks if you sign up for a cloud storage solution. Most of the time you will end up paying less than with external hard drives – also, your files are automatically backed up – not so on your external hard drive.

Automatic back-up of files recently became critical for one of our clients; JATC Union Local 351. They had experienced a ransomware attack that blocked their access to all files. With a cloud storage solution in place we were able to recover all files that were automatically backed up prior to the attack.

RELATED: How Union Built PC Resolved the Cyber Terrorism Strike Against JATC Union Local 351

5. Security

Many people are afraid about their files not being private. And rightfully so. Cyber Crime is on the rise and nobody is immune. In fact; 99% of computer users are vulnerable to cyber attacks simply as a result of everyday-software installed on your device(s).

RELATED: Protect Your Sensitive Data from Cyber Criminals with the Union Built Cloud

Now one could argue if you don’t have anything to hide it doesn’t matter – but again, we are not just talking about celebrities and the possible hacking of their private photos. We are talking about the vulnerability of your sensitive data, your social security number, banking and credit card information, passwords and more. Luckily, many cloud storage solutions have proper file encryption technology in place to protect your files from Cyber Criminals and third parties such as the NSA.

FREE eBOOK: The Growing Threat of Ransomware and How to Stay Safe

Like Union Built PC on Facebook, Follow Us on Twitter and LinkedIn and subscribe to our monthly eNewsletter for Union News and articles like this one delivered straight to your inbox.

Download the Union Built Cloud Brochure, Cloud Storage Solutions for Union Members and Offices.

How to Make Union Meetings Interesting and Useful

Membership meetings are not simply places for members to get information and cast votes. Meetings should give members a sense of power by bringing them together. They can see and feel that they are not alone, that others have similar problems, and that others have found solutions. Meetings should give members the opportunity to observe leaders and potential leaders in action. They can learn from each other, combine ideas, and build something bigger.

If this doesn’t sound like a union meeting you’ve ever been to, it’s because many locals are unknowingly stuck in traditions that almost guarantee that a first-time attendee will not come back, and only the most faithful will persevere.

Although many officers fret about low attendance levels, it is not necessary for democracy that all or most members attend membership meetings. Except at contract time and for other special events, most locals will see only a relatively small, dedicated minority at monthly meetings. Meetings, especially on a regular basis, are not for everyone.

But union meetings can be the chief organizing vehicle for that portion of the membership that takes union work most seriously – the activists. Coming to the monthly meeting is often one of the first things that a member tries when he’s seeking to be more involved. It’s important not to turn them off!

That means that the success of a meeting is not measured simply by the number attending, but by how that meeting contributes to the control, involvement, activism, and self-confidence of all the members, both those present and those not. What “comes out of” the meeting—the plans made, assignments taken, feedback received—are more important than the meeting itself.

union-meetingPerk Up The Agenda

To improve meetings and boost attendance, start by doing away with the standard meeting announcement that sets out the same uninformative agenda month after month:

  • President’s Report
  • Committee Reports
  • Old Business
  • New Business
  • Adjourn (wake up)

Tell members instead what will actually come up at the meeting. Make sure they know how to propose agenda points covering their concerns. Distribute proposed motions in advance.

Put important and controversial items on the agenda. Discuss issues that will directly affect work situations. Have votes on policy questions where the vote really makes a difference.

Get rid of the boring reports. Print them out and distribute them in advance. Do them in multiple languages if appropriate, so members can come to meetings prepared.

Once we get over thinking that every member should attend regularly, then we can specialize some meetings. Plan each meeting to focus on a different section of the membership. Invite a few of those members to make a presentation on specific problems they’re facing.

Advertise that the January meeting, for example, will take up the question of repetitive strain injuries in the wrapping department, and recruit shop floor leaders and RSI victims to give presentations. February will focus on the problem of a particular supervisor in inspection. Treated this way, soon members will be clamoring to get their points on the agenda.

Another possibility is to move the location of the meetings around to make them more convenient to different segments of the membership.

Get People Talking

Use some imagination. Bring in outside speakers for brief talks and discussion. Use video clips. Give people—especially volunteers—recognition for what they have accomplished for the union.

Break down into small groups on occasion to get more people participating. Have members do skits or role-playing to deal with challenges facing the union.

For example, management wants to bring in summer temporaries. Some members are pleased because their kids can get the jobs; others want to make management stick to the contractual hiring procedures. Most of the people at the meeting, because they think about the contract more than other members do, are in the latter camp.

Rather than just discussing how to make management toe the line, get two members to come up front, play the roles of union members with different viewpoints, and argue it out. Use the insights gained to plan a strategy.

Always have a point on the agenda called “members’ concerns,” where anyone can raise a problem or question without necessarily making a motion. In this portion the officers listen, make notes, and after the meeting see that some action or investigation begins. Not only do they report back to the person who has brought the concern, they also report back to the next union meeting.

Be Welcoming

Make sure several people are assigned to help any new members or first-timers understand the meeting procedures and help them accomplish what they came to the meeting for. Sit with them and explain what is going on. If a person uses procedure incorrectly, figure out his intent and help him through it.

The chairperson should go out of her way to make the newcomers comfortable, give them recognition when possible, and draw them further into participation.

Invite spouses to the meetings as full participants (except for voting). Have good quality childcare so that the kids look forward to the meeting as well as the adults.

One technique we do not recommend is door prizes or lottery tickets to boost meeting attendance. It cheapens the purpose of the meeting and stresses seeing things in terms of “what’s in it for me individually” rather than coming together to help all of us.

On the other hand, Teamsters Local 174 in Seattle used a financial incentive to break the ice with new part-time UPS workers. Those who came to an introductory meeting were refunded their initiation fee. Union leaders thought the one-time appeal to self-interest was worth it, to make sure some of these young, high-turnover workers learned firsthand about the local’s philosophy and how to get to the union hall.

Don’t Stop Here…

At the end of the meeting it is sometimes useful to have a brief point on evaluation—what could be improved? Keep the meetings short so they don’t dribble to a close as people drift out; leave time for informal discussion and socializing afterward.

Remember that the meeting is only one piece of the union’s life; most members relate to the union outside of meetings. If the union meeting in essence consists of the various levels of leaders—elected people and rank and file activists—then the next job is to figure out how to provide two-way information between the leaders who come to meetings and the bulk of the members in the workplace. A strong and democratic union exists primarily as a force in the workplace, not at the union hall.

That’s why every meeting should be an action meeting that leads to some other activity. Members and leaders should take assignments at the meeting, and these should be summed up at the end: “The president will check into x and report back to y body. John has volunteered to help the education committee put out a leaflet on xyz problem by x date. Everyone here in the abc department will take the group grievances and get them signed.”

Assignments should lead the work of the union back into the workplace where more members can be involved, not just to the next union meeting or committee meeting.

YOUR TURN

How do you accomplish a sense of togetherness at your Union meetings? As a member? As a leader?  Sound off in Comments, on the Union Built PC Facebook Page, or on our Twitter or LinkedIn feeds. And don’t forget to subscribe to our monthly eNewsletter for articles like this one delivered straight to your inbox.

FOR IMMEDIATE RELEASE: Union Built PC and Bargaining Power Announce Strategic Alliance to Empower Labor Unions

Press Contact:

Pete Marchese
Union Built PC Inc.
877-728-6466
pete.marchese@unionbuiltpc.com
www.unionbuiltpc.com

FOR IMMEDIATE RELEASE

Technology, Labor and Unions:

Union Built PC and Bargaining Power Announce Strategic Alliance to Empower Labor Unions

Agreement will empower Labor Unions with Digital Tools for Projecting Costs at Collective Bargaining & Real Time Grievance & Arbitration Tracking

NEW YORK, NY (PHANTOM POWER MARKETING) OCTOBER 18, 2016 – Union Built PC Inc. and Bargaining Power Inc. have entered into a Strategic Alliance Agreement with a goal of providing the Labor Industry the necessary tools to effectively represent their membership by Projecting Costs at Collective Bargaining and enabling Real-Time Grievance and Arbitration Tracking.

Union Built PC Inc. and Bargaining Power Inc. are the leading experts in Projecting Costs at collective bargaining and Grievance and Arbitration Tracking Labor Software. In combining the skill-sets of their respective teams and product offerings, we will enhance Labor’s ability at the bargaining table.

This partnership also provides an opportunity for Union Built PC Inc. and Bargaining Power Inc. to work collaboratively on product development, marketing and software sales.

“We at Union Built PC Inc. are constantly searching for software that will help Labor Excel. Bargaining Power Software is an extremely powerful Tool that will aid unions in analyzing costs and effectively representing their membership,” says Pete Marchese Director of Operations of Union Built PC Inc.

Bargaining Power Inc. has developed Bargaining Power® Software, which saves Labor Unions time and money as they conduct all of their cost analyses, whether for collective bargaining or arbitrations. First developed by a Labor Negotiator over 20 years ago, the software is continually enhanced by the experience and expertise of hundreds of customers, including the UFCW International and IBT, IAFF, IUOE and UFCW locals.

Bargaining Power is a unique product that gives labor a software solution that provides enhanced insight and is faster and easier to use than any spreadsheet model. It instantly allows unlimited proposals to change compensation, benefit, time off-allowances and work rules. Also, it automatically takes into account turnover rates and changing lengths of service.

“With Bargaining Power, unions can be confident they’re capturing the true costs of potential settlements. They can instantly compare all scenarios under consideration assuring they’re making the best possible decisions at the table,” says Betsy Cagan, President and founder of Bargaining Power Inc.

Union Built PC Inc. developed their Grievance Manager® Software in 2006, enabling the Labor Industry to track their Grievances, Arbitrations and related documents in Real Time.

As an immediate result of this alliance, Union Built PC will resell Bargaining Power and integrate it into our present suite of Software to automate Labor’s everyday tasks.

For more information about how Bargaining Power can help Labor Unions and International Organizations bargain and represent their membership more effectively, contact Pete Marchese at 877-728-6466 or pete.marchese@unionbuiltpc.com.

# # #
 

For more information:

About Bargaining Power Inc.
Betsy Cagan founded Bargaining Power Inc. in 1991 to develop the software she wished she had when she was a labor negotiator for the Metropolitan Transportation Authority (MTA) in New York and Stop & Shop in Boston. Responsible for all economic analysis in both positions, she built complex spreadsheet models, but knew only compiled software could answer all her questions. Betsy is particularly interested in working with unions. She holds a BA in English Literature from Connecticut College and an MBA from Columbia University

Bargaining Power Website
Download the Bargaining Power Brochure

 
About Union Built PC Inc.
Union Built PC Inc. has been serving the IT needs of Labor since 2001. Union Built PC’s mission is to “organize” Labor and help them “excel in everything they do.” Union Built PC believes their success is based on products and services that have been developed by Union Members and customized to meet the specific needs of their Labor Union Clients. That’s why every member of the Union Built PC team is a Union Member. Currently, UBPC is organized by CWA Local 1101

Union Built PC Website
Download the Grievance Manager Brochure
View the Grievance Manager Demo Video
Union Built PC on Facebook
Union Built PC on Twitter
Union Built PC on LinkedIn
Pete Marchese on LinkedIn

The Common Typo That Can Steal Your Computer

The latest ploy cyber criminals are using to spread ransomware and other types of computer malware to provide them with remote access to your computers or to steal log-in credentials: After buying domain names with a missing or misplaced letter in website addresses belonging to well-known companies, they simply wait for you to make a typo.

The biggest threat results in the most common typos — either a misplaced or missing “c” (such as typing amazonc.om or amazon.om) so a web address ends with “.om” instead of “.com”.

Those two Amazon domain names are among more than 300 .om-ending domain names that hackers have purchased for this new malware-spreading scheme. Here’s the complete list, which also spoofs Facebook, LinkedIn, AOL, banks including Bank of America and Wells Fargo, pharmacies CVS and Walgreens, retailers such as Walmart and JC Penney, and even online porn sites.

FREE DOWLOAD: Ransomware: A Growing Cyber Threat

True, cyber criminals have long used website addresses with a missing, extra or misplaced letter to spoof those belonging to well-known brands for typo trickery. But the usual MO has been to lead consumers to copycat websites that sell counterfeit goods, aim to steal credit card info that people provide for supposed purchases, or promise a prize to those who complete a survey that actually mines for sensitive personal information.

RELATED: The Union Built Cloud: Protection You from Cyber Criminals

This new malware-spreading angle — called typosquatting — was discovered when researchers mistyped Netflix.om instead of the correct Netflix.com, and was redirected through a series of dubious pop-up ads and, eventually, to a malware-infested site that prompted him to download a file that appeared to be an Adobe Flash Player update. That familiar fake “Flash Update” usually serves up risky (and possibly malware-laden) pop-ups and other annoyances on computers, so don’t download or install it.

Researchers says that most of the .om-ending sites it discovered operate the same way: They don’t directly install malware but, instead, lead to other infected pages. So that’s good news, at least.

typesquatting-cyber-terrorism

In addition to .om-ending risks, other typosquatting tricks that may result in malware that gives hackers control of your computer and everything on it include website addresses with doubling characters (“googgle.com”), missing letters (“gogle.com”), adjacent keys (“googlw.com”) and letter swapping (“googel.com”).

RELATED: Cyber Terrorism: Why You’re Vulnerable

So carefully read what you type before hitting Enter to access a website, especially if you’re a fast or fat-fingered typist. That’s also a good practice to follow before clicking on links that appear in search engine results or online advertisements; they, too, may have typos that spell trouble.

Backup is the Best Protection for your Data

We recently published a white paper to educate and guide you through the growing threat of Ransomware as well as information on Union Built Cloud services, a best-in-class secure data storage solution that automatically backs up your data keeping it out of the hands of cyber criminals. Use them and navigate the web with a lot more peace of mind.

Learn more about the Union Built Cloud, contact us with your cyber security questions and concerns and Like Union Built PC on Facebook, Follow us on Twitter and LinkedIn and subscribe to the Union Built PC monthly email newsletter for Union News delivered straight to your inbox.

99% of Computers Are Vulnerable to Cyber Terrorism… Yes, this means you!

Did you know 99% of computers are vulnerable to cyber terrorism?

99-percent-of-computers-are-vulnerable-heimdal-security

Cyber security fact…

Oracle Java, Adobe Reader or Adobe Flash is present on 99% of computers. That means that 99% of computer users are vulnerable to exploit kits (software vulnerabilities).

Why?  Because the vulnerabilities that these types of software often present are extremely critical: all it takes is one click on an infected advertising banner to give a hacker full access to your computer.

Adobe Flash has a huge number of vulnerabilities, so cyber criminals target it in the majority of their attacks. By using these security holes in Flash, attackers can infect your computer with ransomware, such as various CryptoLocker variants or Teslacrypt and CTB-Locker.

FREE DOWNLOAD: The Growing Threat of Ransomware and How to Stay Safe

Without adequately protecting your browsers and your entire system, you’ll leave yourself vulnerable to a huge range of cyber threats.

How it affects you and what can you do to get protected:

  • Keep your software updated at all times (the experts say so, not just us) or install a solution that does that automatically and silently.
  • Keep your operating system up to date.
  • Install an AV solution and a supplement that can do what AV fails to do: protect your system proactively from cyber threats by scanning incoming and outgoing Internet traffic.

In addition…

social-media-hacking-heimdal-security

Social Media is a hackers’ favorite target!

Currently, according to in depth statistics, there are more than 1.6 billion social network users worldwide with more than 64% of internet users accessing social media services online. Moreover, social networking is one of the most popular ways for online users to spend their time, and a preferred way to stay in contact with friends and families.

This is precisely why cyber attackers love social media as well! Users that spend a lot of time on social networks are very likely to click links posted by trusted friends, which hackers use to their advantage.

Here are some of the most popular types of cyber attacks directed at social media platforms:

  • Like-jacking: occurs when criminals post fake Facebook “like” buttons to webpages. Users who click the button don’t “like” the page, but instead download malware.
  • Link-jacking: this is a practice used to redirect one website’s links to another which hackers use to redirect users from trusted websites to malware infected websites that hide drive-by downloads or other types of infections.
  • Phishing: the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by disguising itself as a trustworthy entity in a Facebook message or Tweet.
  • Social spam: is unwanted spam content appearing on social networks and any website with user-generated content (comments, chat, etc.). It can appear in many forms, including bulk messages, profanity, insults, hate speech, malicious links, fraudulent reviews, fake friends, and personally identifiable information.

Why are cyber attacks on social media so frequent?

Because social media users usually trust their circles of online friends. The result: more than 600,000 Facebook accounts are compromised every single day! Also, 1 in 10 social media users said they’ve been a victim of a cyber attack and the numbers are on the rise. Now this is a cyber security statistic which we don’t want you to become part of.

How it affects you and what can you do to get protected:

  • Don’t click any strange links.
  • Educate yourself about how cyber attacks look and work on social media platforms and learn how to protect your Facebook, LinkedIn, Twitter and Instagram accounts.
  • Install a solution that can protect you against malware and dangerous web locations.

No threat is too small, no protection is too strong

However big or small, cyber security threats should be treated with caution. You may not be a millionaire (yet) or a C-level manager, but that doesn’t mean that you’re protected against a potential hacker attack. Don’t spare any precautions you can take and try to develop your own protection system with the tools and information you find online, such as this list of cyber security facts.

Backup is the Best Protection for your Data

We recently published a guide to educate and guide you through the growing threat of Ransomware as well as information on Union Built Cloud services, a best-in-class secure data storage solution that automatically backs up your data keeping it out of the hands of cyber criminals.  Use them and navigate the web with a lot more peace of mind.

Learn more about the Union Built Cloud, contact us with your cyber security questions and concerns and Like us on Facebook, Follow us on Twitter and LinkedIn and subscribe to the Union Built PC monthly email newsletter for Union News delivered straight to your inbox.

UNION BUILT PC TOOLS AND RESOURCES

FREE DOWNLOAD:
Ransomware: A Growing Cyber Threat

The Union Built Cloud: Protection You from Cyber Criminals

Download the Union Built Cloud Brochure

Cyber Terrorism: Why You’re Vulnerable

5 Common Computer Problems and How to Fix Them