Archive for March 2019

Helping to Repair Your Computer Quicker for Less

Helping to Repair Your Computer Quicker for Less

Have you started to notice your computer’s niggles, flaws, and problems growing more severe and more frequent over recent months? These issues can irritate you daily, stop you from doing critical tasks and even put your data in danger. It may be time to book in your computer for a brief service check or repair to get back on track.

When booking your PC in for a service, you can help your technician get straight to the root of the problem. Technicians have a wide range of tools and years of experience to bring an ageing machine back to health, but even with tools and experience, without a clear description of the problem, troubleshooting is far more time consuming and expensive.

With just a few simple steps, you can save yourself time and money while ensuring you get your computer back as soon as possible.

Take Note of the Problem Every Time It Happens

Some computer problems only crop up every now and again. A machine might freeze suddenly, or shut down unexpectedly. Intermittent issues can be frustrating and seemingly impossible to solve, but these occurrences may not be entirely random.

When these events happen, you can help to resolve your issues by jotting down what you were doing and the programs running at the time they happen. Information about what you clicked on last, or settings you recently changed can reveal unexpected links to the computer’s behaviour.

Detailed notes help technicians to reproduce the problem and see the crash or error for themselves. This can lead to faster fixes, more lasting solutions, and less time spend diagnosing problems. Simple notes scribbled down on a piece of paper or smartphone app can save you a surprising amount of money.

Keep an Eye on the Environment as Well as the Computer

It’s not just things within the computer we need to note down. External factors can play a significant role in how machines operate. Hot and humid days have been known to limit cooling on devices already suffering from heat issues.

Even changing the time of day can raise different computer related issues. There have been occasions where users have reported problems connecting to the internet around lunchtime every day. A seemingly strange coincidence with no apparent cause, until technicians dig a little deeper. For example, Wi-Fi, which relies on radio waves to send and receive data, uses a frequency of 2.4Ghz to communicate with devices. By coincidence, the same frequency is used in concentrated form inside of a microwave to heat food and beverages.

Microwave ovens, particularly when poorly positioned or faulty, can cause Wi-Fi issues that disrupt communications every time they are used. Problems that come and go, seemingly randomly, can have such a strange link to the computer’s environment that they can be very difficult to diagnose.

Take the Right Hardware at the Right Time

Having your computer repaired, whatever the issue, is as simple as picking up the box itself. We don’t need the peripherals such as the mouse, PC screen, or keyboard unless those are the things causing the issue.

When deciding when to do something about your ailing computer, sooner is always better than later. Computer issues often get worse over time. Vents gather more and more dust, fans run slower and slower and heat issues in particular drastically lower the lifespan of a machine as time goes on.

A machine that gets less and less stable over time also puts your programs and your critical data at risk. Updates applied over a shaky foundation can cause any number of software issues. With data, there’s often zero warning before it’s gone.

Give is a call on 01455 209505 to book an appointment and help give your computer a clean bill of health.

Has Your Email Been Hijacked?

Has Your Email been Hijacked?

A common problem found by some customers in recent months has been spam emails appearing to come from their own accounts.  Despite not knowing why, there are reports of friends, family, and contacts receiving spam email that appears to come from them and this has understandably worried many people.

Some have had their accounts suspended or shut down by their service providers as a result.  For many, this experience can be highly disruptive as well as worrying. It’s a problem that can cause many issues in both your professional and personal life.

The key to defence is learning how these attacks happen, and figuring out what you can do to protect yourself and your contacts against them.

Hackers Using Your Email Against You

Scammers that send out spam messages are continually looking for ways to make the process faster, cheaper, and more efficient. It’s the best way in which they can make more money every day by scamming unsuspecting victims for even more cash.

One of the most efficient ways they do this is by hijacking ready-made, trusted email accounts like your own. Hackers have several tools at their disposal to attempt to hijack your accounts.

Unfortunately some of the things which make emailing fast and easy to use, means that details such as those in the ‘From’ field, are easy to fake. A hacker might change the ‘From’ information to make it appear as if the email comes from anyone, simply by creating an account in that name in an email program – the details of the real sender are usually hidden away in something called an email header.

Defending yourself against this kind of misuse is difficult but you can help yourself by being cautious and if you believe something to be out of place, such as a strange ‘Subject’ title or attachment, you can try to verify that an email, even one you expect to receive, does come from the person that you believe it to be from. If you have any doubt, give them a quick call to verify – if their emails have been hacked, then they will appreciate the warning.

If your email provider flags up an incoming email as ‘suspicious’, or ‘untrustworthy’, it may well be.

Stolen Credentials

Hackers often buy large bundles of email addresses and passwords from the dark web. Leaked emails are often put up for sale following hacks of major companies and service providers (for example see previous Blog post here).

The value of these details comes from the fact that most passwords are unlikely to have been changed, the details attached to them are trusted, and often get hackers access to additional services too.

It is unlikely that you will know about every single hack incident that happens to a company that you use, so change passwords regularly.

How To Detect an Email Intrusion

It can take a long time before you’re aware that malicious hackers are using your details. You might even be the last person in your contacts to know.

The first sign to look out for is a large number of unexpected emails in your Inbox. These are likely to be replies to emails you never sent in the first place. Out of office, automatic responses, people complaining about spam, and people responding to the email as if it were genuine may all come to you first.

Keep a close eye on unexpected emails appearing suddenly in your Outbox. A hacker may be ‘spear-phishing’ (pretending to be from a trusted source) to someone that you do business with or trust. By acting as you, using your address and details, they may be able to divert payments or confidential information to their accounts instead.

A typical example is a business that receives an email from another business, stating that their bank details have changed and to make payments using the new bank details. Whenever you get an email like this, then always verify with the sender.

Do bear in mind that extra emails in your Inbox or Outbox do not happen every time, so the absence of these emails does not mean that you can relax your cautious approach.

Protecting Yourself Against Hackers, Attackers, And Hijackers

Sometimes your computer might have been compromised to give hackers access to your services, or malicious software may have infected your machine to steal data and infect your contacts. So in the first instance, use a good (and preferably not just a free version) of an Internet Security program.

Take extra care to change your passwords if you believe your email has or may have been accessed by hacker. Use a different, more secure password for your email than you do for every other service, such as using a mixture of capitals, numbers and special characters. Your email account is often the key to accessing many of the services you use most, so you need to protect it as much as you can.

Run a virus scan and maintain security updates. If you think your computer could have been infected, have your machine and services looked at by a professional if you believe there is a risk that your data is being used.

Business Email Users can Authenticate their own Email

If you have your own email service, you can enable various email authentication methods such as SPF, DKIM and DMARC which are ways that your genuine emails can verify that they are genuine – helping to make it more difficult for someone to pretend that they are you. It also has the added benefit that it helps you pass through spam filtering.

Unfortunately, some email services (especially at the cheaper end of the market) don’t check for these authentications, so you do need to be a little bit choosy about which email service you use.

If you think your email could have been hijacked, or your details used elsewhere, give us a call on 01455 209505.

Don’t Fall Victim to Webcam Blackmail

Don't fall Victim to Webcam Blackmail

Many customers have reported recent scam messages from individuals claiming to have intercepted their username and password. These messages often state they have been watching your screen activity and webcam while you have been unaware.

Typically, attackers threaten to broadcast footage and your web browsing details to your contacts, colleagues, or social media channels. Demanding payment in Bitcoin payments, malicious hackers blackmail their victims to keep confidential information private.

Where Have the Attacks Come From?

In many cases where hackers have claimed to have a victims’ password, this has turned out to be true, but usually its not because you have been hacked – but rather that a company you have had dealings with has.

In the last few years alone, many large websites have suffered enormous hacks which have released confidential details on many of their users. LinkedIn, Yahoo, Myspace and TalkTalk all suffered massive and devastating hacks. Some users of these services are still feeling the consequences today.

The details leaked from these sites, and others facing the same issues, are sold online for years after the initial breach. Hackers buy username and password combinations in the hopes of reusing them to access services, steal money, or blackmail their owners.

How to Respond if You get One of these Emails

If you have been contacted by one of these hackers, it is a scary reality that they could have access to your credentials, data, and online services. That said, accounts that share the same password should be changed immediately. Security on additional services you use should be updated too.

The only thing you can do in response to this type of email is to ignore it. This “we recorded you” email is a scam made much more believable because they probably do have one of your real passwords gained from a site hack, but that does not mean that they have access to your computer or Webcam.

Self Defence On the Web

When using online services, a unique password for every site is your number one defence. A good password manager program makes this practical and straightforward too.

Using a different password for each site you use means that hackers can only gain access to one site at a time. A hack in one place should never compromise your other accounts by revealing the single password you use everywhere – unfortunately we still do come across customers that only use one password for everything.

Often, people think that maintaining many passwords is hard work or even impossible to do. In truth, it’s almost always easier to keep tabs with a password manager than it is to use the system you have in place today.

A high quality and secure password manager such as LastPass, or 1Password, can keep track of all your logins efficiently and securely. They often offer the chance to improve your security by generating random and strong passwords that hackers will have a tougher time cracking.

Password management services offer a host of features that help you log in, remind you to refresh your security, and make your safety a number one priority. After using a manager for just a short time, you can be forgiven for wondering how you managed without it.

If you think you might have been hacked already, or want to prevent it from ever happening, give us a call on 01455 209505 to help update your security.

CSH Computer Services is a local business providing PC and Laptop repair and I.T. support services to Homes and Businesses. We are based near Lutterworth, Hinckley and Broughton Astley in Leicestershire and provide a full range of services, from PC and Laptop repairs, PC and Laptop upgrades, sales of new computers and workstations plus business network support. We also provide Virus and Malware disinfection, Broadband installation and troubleshooting, data recovery, Wireless networking and troubleshooting, plus much more. We work in and around the whole Leicestershire area and can be seen daily in Lutterworth, Hinckley, Broughton Astley, Market Harborough, Nuneaton, Rugby, Leicester and surrounding areas too.