<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xml:base="https://www.ultimateitguys.com"  xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel>
 <title>Ultimate IT Guys - Security</title>
 <link>https://www.ultimateitguys.com/tags/security</link>
 <description></description>
 <language>en</language>
<item>
 <title>Meltdown &amp; Spectre Vulnerabilities Explained</title>
 <link>https://www.ultimateitguys.com/content/meltdown-spectre-vulnerabilities-explained</link>
 <description>&lt;div class=&quot;section field field-name-field-image field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item odd&quot; rel=&quot;og:image rdfs:seeAlso&quot; resource=&quot;https://www.ultimateitguys.com/sites/default/files/styles/large/public/field/image/MeltedComputer.jpg?itok=tAL-Pfj9&quot;&gt;&lt;img typeof=&quot;foaf:Image&quot; src=&quot;https://www.ultimateitguys.com/sites/default/files/styles/large/public/field/image/MeltedComputer.jpg?itok=tAL-Pfj9&quot; width=&quot;480&quot; height=&quot;320&quot; alt=&quot;Melted Computer&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;section field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item odd&quot; property=&quot;content:encoded&quot;&gt;&lt;p&gt;Last week two significant computer bugs were announced. They have been dubbed &lt;strong&gt;Meltdown and Spectre&lt;/strong&gt;. These bugs take advantage of a flaw in many modern computers that exists at the processor or CPU level. This flaw has to do with the way that companies like Intel and AMD have used to make their processors run faster. Even very technical people can find it difficult to wrap their heads around how these bugs work, because the flaws have to do with the very lowest level processes in the computer. Rather than bore you with the specific details of the flaw, I want to give you some information about what to do about it.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Meltdown and Spectre &lt;/strong&gt;exploit critical vulnerabilities in modern processors. These hardware vulnerabilities allow programs to steal data which is currently processed on the computer. While programs are typically not permitted to read data from other programs, a malicious program can exploit Meltdown and Spectre to get hold of secrets stored in the memory of other running programs. This might include your passwords stored in a password manager or browser, your personal photos, emails, instant messages and even business-critical documents.&quot; Meltdown and Spectre (or &quot;SpecDown&quot;) are both flaws that permit an application to read privileged memory&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-size: 16px;&quot;&gt;&lt;strong&gt;Who is affected by these exploits?&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;Both bugs are found at the hardware-level within the processor. Intel&#039;s chips are the most widely vulnerable; however, devices carrying AMD and ARM chips are susceptible too, along with Apple&#039;s A-series of chips. While a list of every affected chip is not immediately available, reports are available indicating that Intel&#039;s design flaw dates back to 1995.&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-size: 18px;&quot;&gt;&lt;strong&gt;Every Operating System is affected.&lt;/strong&gt;&lt;/span&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Windows has had a series of patches earmarked as &quot;2018-01&quot; released.&lt;/li&gt;
&lt;li&gt;Linux has been updated to mitigate the attacks;&lt;/li&gt;
&lt;li&gt;macOS has been hardened as part of its 10.13.2.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This is only half of the solution, however; please read below.&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-size: 18px;&quot;&gt;&lt;strong&gt;How can I deal with this?&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;As Meltdown and Spectre are two different vulnerabilities affecting both Hardware and Software between them, there is no single mitigation step that can be taken to guarantee complete protection against these issues.&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-size: 18px;&quot;&gt;&lt;strong&gt;Update OS &lt;/strong&gt;&lt;/span&gt;– Windows: Microsoft has published patches as part of their January cumulative update (legacy term: &quot;rollup&quot;). These patches are only being supplied for supported operating systems.&lt;/p&gt;
&lt;p&gt;As such, please only expect Microsoft patches for:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Windows 7 SP1 (not SP0)&lt;/li&gt;
&lt;li&gt;Windows 8.1 (not 8.0)&lt;/li&gt;
&lt;li&gt;Windows 10&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Please note that there are certain circumstances where Microsoft Windows will not show the 2018-01 update despite appearing to meet all the requirements; the SpecDown fix alters the manner in which Windows works, and this can potentially cause issues with Antivirus suites. So you may have to update your anti-virus before you can run the Microsoft update.&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-size: 18px;&quot;&gt;&lt;strong&gt;Update BIOS/uEFI:&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;You will probably need to update your BIOS or Firmware. However, there may not be an update available. This update will need to come from the manufacturer. This could be Dell or HP if you have a name brand computer. If not, you may have to get the update from the processor OEM, such as Intel or AMD. If you have an older computer, chances are that there will not be an update created for it at all.&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-size: 18px;&quot;&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;The point is that this is a complicated fix. To make matters worse, there will be lots of bad or erroneous advice on many websites, so be careful about the source of information that you use and especially any files that you download. Only download files from websites that are trust worthy and always scan any downloaded files to make sure that they do not contain viruses.&amp;nbsp; If you need help, give us a call.&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;div class=&quot;field field-name-field-tags field-type-taxonomy-term-reference field-label-above clearfix&quot;&gt;
      &lt;p class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/p&gt;
    &lt;ul class=&quot;field-items&quot;&gt;
          &lt;li class=&quot;field-item even&quot; rel=&quot;dc:subject&quot;&gt;
        &lt;a href=&quot;/tags/security&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;Security&lt;/a&gt;      &lt;/li&gt;
      &lt;/ul&gt;
&lt;/div&gt;
</description>
 <pubDate>Tue, 09 Jan 2018 22:27:37 +0000</pubDate>
 <dc:creator>uitg</dc:creator>
 <guid isPermaLink="false">152 at https://www.ultimateitguys.com</guid>
 <comments>https://www.ultimateitguys.com/content/meltdown-spectre-vulnerabilities-explained#comments</comments>
</item>
<item>
 <title>Uber Has Been Hacked</title>
 <link>https://www.ultimateitguys.com/content/uber-has-been-hacked</link>
 <description>&lt;div class=&quot;section field field-name-field-image field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item odd&quot; rel=&quot;og:image rdfs:seeAlso&quot; resource=&quot;https://www.ultimateitguys.com/sites/default/files/styles/large/public/field/image/cellphone.jpg?itok=YaMkQx7w&quot;&gt;&lt;img typeof=&quot;foaf:Image&quot; src=&quot;https://www.ultimateitguys.com/sites/default/files/styles/large/public/field/image/cellphone.jpg?itok=YaMkQx7w&quot; width=&quot;480&quot; height=&quot;270&quot; alt=&quot;Calling Uber on a cell phone&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;section field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item odd&quot; property=&quot;content:encoded&quot;&gt;&lt;p&gt;Uber Technologies, Inc. disclosed that hackers stole the personal information of some 57 million customers and drivers from the ride-sharing company, according to a report by Bloomberg News. The news outlet also reported that, for more than a year, Uber concealed news of the data breach, which was discovered in late 2016.  Bloomberg News reports that company executives originally paid the hackers $100,000 to delete the data and keep news of the data breach quiet. In its statement, Uber said that two individuals who led the original response to the incident are no longer with the company, effective Nov. 21, 2017, the date the company went public with news of the breach.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;What Happened?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Uber said two people who didn’t work for the company accessed the data on a third-party cloud-based service that Uber uses. &lt;/p&gt;
&lt;p&gt;In a statement on its website and attributed to CEO Dara Khosrowshahi, the company said the information included: &lt;/p&gt;
&lt;p&gt;	* The names and driver’s license numbers of around 600,000 drivers in the United States.&lt;br /&gt;
	* Some personal information of 57 million Uber riders and drivers around the world. This information included names, email addresses and mobile phone numbers.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;What does this mean for me?&lt;/strong&gt;&lt;br /&gt;
If you are a customer of Uber, you should change your password.&lt;br /&gt;
It is possible for identity thieves to launch phishing attacks, that appear to come from Uber, hoping to trick you into providing personal information, such as account credentials or payment card information.&lt;br /&gt;
It’s always important to check the actual email address to ensure a message is from the company or person it appears to be from. Also, don’t click on an emailed link or attachment without verifying the email’s authenticity.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Ultimate IT Guys has some new tools to help you.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Identity Theft Monitoring&lt;/strong&gt; - Dark web scanning for your email address or other business information to see if your information is being traded by hackers.&lt;br /&gt;
&lt;strong&gt;Business Email&lt;/strong&gt; - Business quality email that has additional layers of security and spam filtering, without the advertisements that often contain malware.&lt;br /&gt;
&lt;strong&gt;Password Management Tool&lt;/strong&gt; -  Safe and Secure Password Tool to help you keep up with all your passwords without having to write them down or save them in a spreadsheet.&lt;br /&gt;
Join our &lt;strong&gt;Security Alerts &lt;/strong&gt;and newsletter mailing list to get updates about data breaches and security alerts.&lt;/p&gt;
&lt;!-- Begin MailChimp Signup Form --&gt;&lt;link href=&quot;//cdn-images.mailchimp.com/embedcode/slim-10_7.css&quot; rel=&quot;stylesheet&quot; type=&quot;text/css&quot;&gt;
&lt;style type=&quot;text/css&quot;&gt;
	#mc_embed_signup{background:#fff; clear:left; font:14px Helvetica,Arial,sans-serif; }
	/* Add your own MailChimp form style overrides in your site stylesheet or in this style block.
	   We recommend moving this block and the preceding CSS link to the HEAD of your HTML file. */
&lt;/style&gt;&lt;div id=&quot;mc_embed_signup&quot;&gt;
&lt;form action=&quot;https://ultimateitguy.us5.list-manage.com/subscribe/post?u=3bd5bf15ee609d1ba6117340f&amp;amp;id=65635e43a9&quot; method=&quot;post&quot; id=&quot;mc-embedded-subscribe-form&quot; name=&quot;mc-embedded-subscribe-form&quot; class=&quot;validate&quot; target=&quot;_blank&quot; novalidate&gt;
&lt;div id=&quot;mc_embed_signup_scroll&quot;&gt;
	&lt;label for=&quot;mce-EMAIL&quot;&gt;Subscribe to our Security Alert mailing list&lt;/label&gt;&lt;br /&gt;
	&lt;input type=&quot;email&quot; value=&quot;&quot; name=&quot;EMAIL&quot; class=&quot;email&quot; id=&quot;mce-EMAIL&quot; placeholder=&quot;email address&quot; required&gt;&lt;/p&gt;
&lt;!-- real people should not fill this in and expect good things - do not remove this or risk form bot signups--&gt;&lt;div style=&quot;position: absolute; left: -5000px;&quot; aria-hidden=&quot;true&quot;&gt;&lt;input type=&quot;text&quot; name=&quot;b_3bd5bf15ee609d1ba6117340f_65635e43a9&quot; tabindex=&quot;-1&quot; value=&quot;&quot;&gt;&lt;/div&gt;
&lt;div class=&quot;clear&quot;&gt;&lt;input type=&quot;submit&quot; value=&quot;Subscribe&quot; name=&quot;subscribe&quot; id=&quot;mc-embedded-subscribe&quot; class=&quot;button&quot;&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/form&gt;
&lt;/div&gt;
&lt;!--End mc_embed_signup--&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;div class=&quot;field field-name-field-tags field-type-taxonomy-term-reference field-label-above clearfix&quot;&gt;
      &lt;p class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/p&gt;
    &lt;ul class=&quot;field-items&quot;&gt;
          &lt;li class=&quot;field-item even&quot; rel=&quot;dc:subject&quot;&gt;
        &lt;a href=&quot;/tags/security&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;Security&lt;/a&gt;      &lt;/li&gt;
          &lt;li class=&quot;field-item odd&quot; rel=&quot;dc:subject&quot;&gt;
        &lt;a href=&quot;/tags/data-breach&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;Data Breach&lt;/a&gt;      &lt;/li&gt;
      &lt;/ul&gt;
&lt;/div&gt;
</description>
 <pubDate>Fri, 01 Dec 2017 15:41:49 +0000</pubDate>
 <dc:creator>uitg</dc:creator>
 <guid isPermaLink="false">126 at https://www.ultimateitguys.com</guid>
 <comments>https://www.ultimateitguys.com/content/uber-has-been-hacked#comments</comments>
</item>
<item>
 <title>You&#039;ve Been Hacked - SW NAHRO Presentation</title>
 <link>https://www.ultimateitguys.com/content/youve-been-hacked-sw-nahro-presentation</link>
 <description>&lt;div class=&quot;section field field-name-field-image field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item odd&quot; rel=&quot;og:image rdfs:seeAlso&quot; resource=&quot;https://www.ultimateitguys.com/sites/default/files/styles/large/public/field/image/Identity%20Theft_0.jpg?itok=X9acVdB-&quot;&gt;&lt;img typeof=&quot;foaf:Image&quot; src=&quot;https://www.ultimateitguys.com/sites/default/files/styles/large/public/field/image/Identity%20Theft_0.jpg?itok=X9acVdB-&quot; width=&quot;480&quot; height=&quot;328&quot; alt=&quot;Indentity Theft Picture&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;section field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item odd&quot; property=&quot;content:encoded&quot;&gt;&lt;p&gt;You&#039;ve Been Hacked - You are at a bigger risk than you think.&lt;br /&gt;
According to research by the CyberEdge Group, 79% of businesses were hacked in 2016.  Most internet users can only answer less than 50% of the questions correctly on a basic knowledge quiz about cybersecurity issues and concepts.  Chances are that your agency falls into these 2 statistics unless you are using good business quality technology practices and training your users on how to stay safe online.   Find out how to not become a statistic.&lt;/p&gt;
&lt;p&gt;Download the presentation below.&lt;br /&gt;
&lt;a href=&quot;http://www.ultimateitguys.com/sites/default/files/article_files/You%27ve%20Been%20Hacked%20v2B%26W.pdf&quot;&gt;http://www.ultimateitguys.com/sites/default/files/article_files/You%27ve...&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;div class=&quot;field field-name-field-tags field-type-taxonomy-term-reference field-label-above clearfix&quot;&gt;
      &lt;p class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/p&gt;
    &lt;ul class=&quot;field-items&quot;&gt;
          &lt;li class=&quot;field-item even&quot; rel=&quot;dc:subject&quot;&gt;
        &lt;a href=&quot;/tags/security&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;Security&lt;/a&gt;      &lt;/li&gt;
      &lt;/ul&gt;
&lt;/div&gt;
&lt;div class=&quot;section field field-name-field-file field-type-file field-label-above&quot;&gt;&lt;h3 class=&quot;field-label&quot;&gt;File:&amp;nbsp;&lt;/h3&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;span class=&quot;file&quot;&gt;&lt;img class=&quot;file-icon&quot; alt=&quot;PDF icon&quot; title=&quot;application/pdf&quot; src=&quot;/modules/file/icons/application-pdf.png&quot; /&gt; &lt;a href=&quot;https://www.ultimateitguys.com/sites/default/files/article_files/You%27ve%20Been%20Hacked%20v2B%26W.pdf&quot; type=&quot;application/pdf; length=3716220&quot; title=&quot;You&amp;amp;#039;ve Been Hacked v2B&amp;amp;amp;W.pdf&quot;&gt;You&amp;#039;ve Been Hacked - Presentation File&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
 <pubDate>Sat, 10 Jun 2017 04:53:04 +0000</pubDate>
 <dc:creator>uitg</dc:creator>
 <guid isPermaLink="false">124 at https://www.ultimateitguys.com</guid>
 <comments>https://www.ultimateitguys.com/content/youve-been-hacked-sw-nahro-presentation#comments</comments>
</item>
<item>
 <title>You&#039;ve Been Hacked</title>
 <link>https://www.ultimateitguys.com/content/youve-been-hacked</link>
 <description>&lt;div class=&quot;section field field-name-field-image field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item odd&quot; rel=&quot;og:image rdfs:seeAlso&quot; resource=&quot;https://www.ultimateitguys.com/sites/default/files/styles/large/public/field/image/hacked.jpg?itok=fr13rsjl&quot;&gt;&lt;img typeof=&quot;foaf:Image&quot; src=&quot;https://www.ultimateitguys.com/sites/default/files/styles/large/public/field/image/hacked.jpg?itok=fr13rsjl&quot; width=&quot;480&quot; height=&quot;320&quot; alt=&quot;Hacked&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;section field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item odd&quot; property=&quot;content:encoded&quot;&gt;&lt;p&gt;Chances are high that you or your housing authority have been hacked.  You probably don’t realize it and you are potentially continuing to leak private information about you, your tenants, and your employees.&lt;/p&gt;
&lt;p&gt;•	According to US government statistics, in 2016, the number of ransomware attacks increased 300 percent from 2015, with over 4,000 attacks detected per day.&lt;br /&gt;
•	Most internet users can answer fewer than half the questions correctly on a knowledge quiz about cybersecurity issues and concepts. – Pew Research Center&lt;br /&gt;
•	86 Percent Increase in Data Breaches in 2016 Led to 1.4 Billion Data Record Compromised…The leading type of breach is related to identity theft.&lt;/p&gt;
&lt;p&gt;Download the full document below.&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;div class=&quot;field field-name-field-tags field-type-taxonomy-term-reference field-label-above clearfix&quot;&gt;
      &lt;p class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/p&gt;
    &lt;ul class=&quot;field-items&quot;&gt;
          &lt;li class=&quot;field-item even&quot; rel=&quot;dc:subject&quot;&gt;
        &lt;a href=&quot;/tags/security&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;Security&lt;/a&gt;      &lt;/li&gt;
      &lt;/ul&gt;
&lt;/div&gt;
&lt;div class=&quot;section field field-name-field-file field-type-file field-label-above&quot;&gt;&lt;h3 class=&quot;field-label&quot;&gt;File:&amp;nbsp;&lt;/h3&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;span class=&quot;file&quot;&gt;&lt;img class=&quot;file-icon&quot; alt=&quot;PDF icon&quot; title=&quot;application/pdf&quot; src=&quot;/modules/file/icons/application-pdf.png&quot; /&gt; &lt;a href=&quot;https://www.ultimateitguys.com/sites/default/files/article_files/You%27ve%20Been%20Hacked.pdf&quot; type=&quot;application/pdf; length=617831&quot; title=&quot;You&amp;amp;#039;ve Been Hacked.pdf&quot;&gt;You&amp;#039;ve Been Hacked Document&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
 <pubDate>Wed, 12 Apr 2017 01:57:15 +0000</pubDate>
 <dc:creator>uitg</dc:creator>
 <guid isPermaLink="false">115 at https://www.ultimateitguys.com</guid>
 <comments>https://www.ultimateitguys.com/content/youve-been-hacked#comments</comments>
</item>
<item>
 <title>Free Email Could Cost You Everything</title>
 <link>https://www.ultimateitguys.com/content/free-email-could-cost-you-everything</link>
 <description>&lt;div class=&quot;section field field-name-field-image field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item odd&quot; rel=&quot;og:image rdfs:seeAlso&quot; resource=&quot;https://www.ultimateitguys.com/sites/default/files/styles/large/public/field/image/hacked-email.jpg?itok=K2T7oXxX&quot;&gt;&lt;img typeof=&quot;foaf:Image&quot; src=&quot;https://www.ultimateitguys.com/sites/default/files/styles/large/public/field/image/hacked-email.jpg?itok=K2T7oXxX&quot; width=&quot;480&quot; height=&quot;480&quot; alt=&quot;hacked email&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;section field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item odd&quot; property=&quot;content:encoded&quot;&gt;&lt;p&gt;How many of you have a “free” email address provided by your internet provider?  Usually this means that you have an email address that ends in yahoo.com, sbcglobal.net, cox.net, comcast.net, pldi.net, etc…&lt;/p&gt;
&lt;p&gt;That &quot;Free&quot; email account you are using could cost you everything you have.&lt;/p&gt;
&lt;p&gt;Download the full document below.&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;div class=&quot;field field-name-field-tags field-type-taxonomy-term-reference field-label-above clearfix&quot;&gt;
      &lt;p class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/p&gt;
    &lt;ul class=&quot;field-items&quot;&gt;
          &lt;li class=&quot;field-item even&quot; rel=&quot;dc:subject&quot;&gt;
        &lt;a href=&quot;/tags/security&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;Security&lt;/a&gt;      &lt;/li&gt;
      &lt;/ul&gt;
&lt;/div&gt;
&lt;div class=&quot;section field field-name-field-file field-type-file field-label-above&quot;&gt;&lt;h3 class=&quot;field-label&quot;&gt;File:&amp;nbsp;&lt;/h3&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;span class=&quot;file&quot;&gt;&lt;img class=&quot;file-icon&quot; alt=&quot;PDF icon&quot; title=&quot;application/pdf&quot; src=&quot;/modules/file/icons/application-pdf.png&quot; /&gt; &lt;a href=&quot;https://www.ultimateitguys.com/sites/default/files/article_files/Free%20Email%20Could%20Cost%20You%20Everything.pdf&quot; type=&quot;application/pdf; length=583577&quot; title=&quot;Free Email Could Cost You Everything.pdf&quot;&gt;Free Email Could Cost You Everything&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
 <pubDate>Tue, 11 Apr 2017 02:45:56 +0000</pubDate>
 <dc:creator>uitg</dc:creator>
 <guid isPermaLink="false">118 at https://www.ultimateitguys.com</guid>
 <comments>https://www.ultimateitguys.com/content/free-email-could-cost-you-everything#comments</comments>
</item>
<item>
 <title>Don&#039;t Let Facebook Hold You Hostage</title>
 <link>https://www.ultimateitguys.com/content/dont-let-facebook-hold-you-hostage</link>
 <description>&lt;div class=&quot;section field field-name-field-image field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item odd&quot; rel=&quot;og:image rdfs:seeAlso&quot; resource=&quot;https://www.ultimateitguys.com/sites/default/files/styles/large/public/field/image/stealers.jpg?itok=jw8BrxeW&quot;&gt;&lt;img typeof=&quot;foaf:Image&quot; src=&quot;https://www.ultimateitguys.com/sites/default/files/styles/large/public/field/image/stealers.jpg?itok=jw8BrxeW&quot; width=&quot;480&quot; height=&quot;320&quot; alt=&quot;Ransomware&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;section field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item odd&quot; property=&quot;content:encoded&quot;&gt;&lt;p&gt;There is a new threat that is literally holding Facebook and LinkedIn users hostage.&amp;nbsp; This threat is a new type of &lt;span data-scaytid=&quot;1&quot; data-scayt_word=&quot;Ransomware&quot;&gt;Ransomware&lt;/span&gt; called &lt;span data-scaytid=&quot;3&quot; data-scayt_word=&quot;ImageGate&quot;&gt;ImageGate&lt;/span&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;What is &lt;span data-scaytid=&quot;2&quot; data-scayt_word=&quot;Ransomware&quot;&gt;R&lt;span data-scaytid=&quot;1&quot; data-scayt_word=&quot;ransomware&quot;&gt;ansomware&lt;/span&gt;&lt;/span&gt;? &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span data-scaytid=&quot;4&quot; data-scayt_word=&quot;Ransomware&quot;&gt;Ransomware&lt;/span&gt; is a kind of malware that encrypts the files on your computer, and demands a ransom to unlock the data. Users are faced with the choice of losing their data, or paying the attackers. &lt;span data-scaytid=&quot;5&quot; data-scayt_word=&quot;Ransomware&quot;&gt;Ransomware&lt;/span&gt; has been the biggest computer threat of 2016. Many security experts believe it is set to increase exponentially during 2017, due to using new methods of distributing the &lt;span data-scaytid=&quot;6&quot; data-scayt_word=&quot;Ransomware&quot;&gt;R&lt;span data-scaytid=&quot;2&quot; data-scayt_word=&quot;ransomware&quot;&gt;ansomware&lt;/span&gt;&lt;/span&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How does Ransomware work? &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Have you ever zipped up a file to make it smaller so you could send it to someone? That is similar to what Ransomware does when it encrypts your files. Your files are put inside of a special type of password protected file and it makes the unreadable, unless you have the password. Here is the hard part.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;What does this have to do with Facebook? &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This &lt;span data-scaytid=&quot;14&quot; data-scayt_word=&quot;ImageGate&quot;&gt;ImageGate&lt;/span&gt; exploit allows the hacker to add a piece of code to the information contained in an image file. This image is then loaded to Social Networks like Facebook and LinkedIn. When you click on the image in Facebook it asks you to download the picture to view it. When you download the picture it runs the script contained in the image, which starts going through your files encrypting your Pictures, Word Documents, Excel Spreadsheets and other types of files that they are targeting. Now your picture of your kids first Christmas has been replaced with a file that you can&#039;t open, but there is a message attached that tells you to pay the ransom if you want your files back.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How do I protect myself? &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Be very careful while using Facebook or LinkedIn if any thing seems to be behaving differently Don&#039;t download files from Facebook....Ever Always think before downloading a file from anywhere Always have good Anti-Virus Always have a backup Use Facebook from your phone or tablet - there is usually fewer files to lose on your phone or tablet&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Can I Get &lt;span data-scaytid=&quot;16&quot; data-scayt_word=&quot;Ransomware&quot;&gt;Ransomware&lt;/span&gt; other ways? &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span data-scaytid=&quot;18&quot; data-scayt_word=&quot;Ransomware&quot;&gt;Ransomware&lt;/span&gt; has historically been spread via email, but we are starting to see occurrences using Social Media, Infected Ads, and Infected Websites. This is what has the security experts concerned that it will soon turn into an epidemic.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;I have Anti-Virus, so why do I need to worry about &lt;span data-scaytid=&quot;19&quot; data-scayt_word=&quot;Ransomware&quot;&gt;Ransomware&lt;/span&gt;? &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Don&#039;t get caught in the trap having a false sense of security because you have anti-virus. Most anti-virus products don&#039;t detect or stop &lt;span data-scaytid=&quot;22&quot; data-scayt_word=&quot;Ransomware&quot;&gt;Ransomware&lt;/span&gt;. These 2 reasons are why &lt;span data-scaytid=&quot;23&quot; data-scayt_word=&quot;Ransomware&quot;&gt;Ransomware&lt;/span&gt; is so dangerous. Technically, &lt;span data-scaytid=&quot;24&quot; data-scayt_word=&quot;Ransomware&quot;&gt;Ransomware&lt;/span&gt; is not a virus. It &lt;span data-scaytid=&quot;30&quot; data-scayt_word=&quot;does&#039;t&quot;&gt;does&#039;t&lt;/span&gt; install anything or change any settings. It just runs a script that encrypts your files. There are some anti-virus vendors such as &lt;span data-scaytid=&quot;31&quot; data-scayt_word=&quot;BitDefender&quot;&gt;BitDefender&lt;/span&gt; which have developed what they call &lt;span data-scaytid=&quot;25&quot; data-scayt_word=&quot;Ransomware&quot;&gt;Ransomware&lt;/span&gt; Vaccine. This vaccine disables some of the common methods of running the scripts.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;In Summary &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span data-scaytid=&quot;32&quot; data-scayt_word=&quot;Ransomware&quot;&gt;Ransomware&lt;/span&gt; is a real and very scary threat to your information. You should:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Be cautious&lt;/li&gt;
&lt;li&gt;Don&#039;t download anything unless you are 100% sure that you need it&lt;/li&gt;
&lt;li&gt;Use your phone or tablet for accessing Facebook or LinkedIn&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;I am sure that most of us will at some point be on Facebook in the coming days and weeks. Please be careful while you are online during this holiday season. You don&#039;t want to have all of your files held hostage just so you can see a video of the dancing elves.&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;div class=&quot;field field-name-field-tags field-type-taxonomy-term-reference field-label-above clearfix&quot;&gt;
      &lt;p class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/p&gt;
    &lt;ul class=&quot;field-items&quot;&gt;
          &lt;li class=&quot;field-item even&quot; rel=&quot;dc:subject&quot;&gt;
        &lt;a href=&quot;/tags/security&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;Security&lt;/a&gt;      &lt;/li&gt;
      &lt;/ul&gt;
&lt;/div&gt;
</description>
 <pubDate>Thu, 01 Dec 2016 15:58:09 +0000</pubDate>
 <dc:creator>uitg</dc:creator>
 <guid isPermaLink="false">114 at https://www.ultimateitguys.com</guid>
 <comments>https://www.ultimateitguys.com/content/dont-let-facebook-hold-you-hostage#comments</comments>
</item>
<item>
 <title>8 Tips For Safer Internet Downloads</title>
 <link>https://www.ultimateitguys.com/content/8-tips-safer-internet-downloads</link>
 <description>&lt;div class=&quot;section field field-name-field-image field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item odd&quot; rel=&quot;og:image rdfs:seeAlso&quot; resource=&quot;https://www.ultimateitguys.com/sites/default/files/styles/large/public/field/image/paypal.png?itok=aArgIZht&quot;&gt;&lt;img typeof=&quot;foaf:Image&quot; src=&quot;https://www.ultimateitguys.com/sites/default/files/styles/large/public/field/image/paypal.png?itok=aArgIZht&quot; width=&quot;480&quot; height=&quot;347&quot; alt=&quot;&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;section field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item odd&quot; property=&quot;content:encoded&quot;&gt;&lt;p&gt;&lt;strong&gt;The best defense against spyware and other unwanted software is to not download it in the first place. &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Here are a few tips that can help you avoid downloading software that you don&#039;t want:&lt;/p&gt;
&lt;p&gt;1.	Download programs only from websites you trust.   If you&#039;re not sure whether to trust a program, enter the name of the program into your favorite search engine to see if anyone else has reported that it contains spyware. Files that end in the extensions .exe or .scr commonly hide malware. However, even files with familiar extensions such as .docx, .xlsx, and .pdf can be dangerous.&lt;br /&gt;
2.	Pay Attention &amp;amp; Read all security warnings, license agreements, and privacy statements associated with any software you download. Before you install something, consider the risks and benefits of installing it.  Even many reputable programs tell you that they are about to install additional software to “help” you, but it is usually software that you don’t really need and often are programs that either spy on your behavior or lead to virus programs later.&lt;br /&gt;
3.	Never click &quot;Agree&quot; or &quot;OK&quot; to close a window.   Instead, click the red &quot;x&quot; in the corner of the window or press Alt + F4 on your keyboard to close a window.&lt;br /&gt;
4.	Be Afraid of &quot;free&quot; things.  Such as “free” music and movie file-sharing programs, and be sure you understand all of the software that is packaged with those programs.&lt;br /&gt;
5.	Use a standard user account instead of an administrator account.  This will stop many unwanted programs from installing.&lt;br /&gt;
6.	Don&#039;t click links on suspicious websites or in email messages.   Instead, type the website address directly into your browser, or use bookmarks.&lt;br /&gt;
7.	Don&#039;t automatically trust that instant messages, email messages, or messages on social networking websites are from the person they appear to be from. Even if they are from someone you know, contact the person before you click the link to ensure that they intended to send it.&lt;br /&gt;
8.	Ask someone who knows.  If you aren’t sure about a strange message or a program, then ask someone that you trust.&lt;/p&gt;
&lt;p&gt;If you need help or have questions about internet security, contact us using the information below.&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;div class=&quot;field field-name-field-tags field-type-taxonomy-term-reference field-label-above clearfix&quot;&gt;
      &lt;p class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/p&gt;
    &lt;ul class=&quot;field-items&quot;&gt;
          &lt;li class=&quot;field-item even&quot; rel=&quot;dc:subject&quot;&gt;
        &lt;a href=&quot;/tags/security&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;Security&lt;/a&gt;      &lt;/li&gt;
      &lt;/ul&gt;
&lt;/div&gt;
&lt;div class=&quot;section field field-name-field-file field-type-file field-label-above&quot;&gt;&lt;h3 class=&quot;field-label&quot;&gt;File:&amp;nbsp;&lt;/h3&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;span class=&quot;file&quot;&gt;&lt;img class=&quot;file-icon&quot; alt=&quot;PDF icon&quot; title=&quot;application/pdf&quot; src=&quot;/modules/file/icons/application-pdf.png&quot; /&gt; &lt;a href=&quot;https://www.ultimateitguys.com/sites/default/files/article_files/8%20Tips%20for%20Safer%20Internet%20Downloads.pdf&quot; type=&quot;application/pdf; length=205802&quot; title=&quot;8 Tips for Safer Internet Downloads.pdf&quot;&gt;8 Tips for safer internet downloads&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
 <pubDate>Thu, 02 Apr 2015 15:36:57 +0000</pubDate>
 <dc:creator>uitg</dc:creator>
 <guid isPermaLink="false">59 at https://www.ultimateitguys.com</guid>
 <comments>https://www.ultimateitguys.com/content/8-tips-safer-internet-downloads#comments</comments>
</item>
<item>
 <title>10 Email Safety Tips</title>
 <link>https://www.ultimateitguys.com/content/10-email-safety-tips</link>
 <description>&lt;div class=&quot;section field field-name-field-image field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item odd&quot; rel=&quot;og:image rdfs:seeAlso&quot; resource=&quot;https://www.ultimateitguys.com/sites/default/files/styles/large/public/field/image/Screenshot%202014-10-10%2008.37.42.png?itok=lnahORF2&quot;&gt;&lt;img typeof=&quot;foaf:Image&quot; src=&quot;https://www.ultimateitguys.com/sites/default/files/styles/large/public/field/image/Screenshot%202014-10-10%2008.37.42.png?itok=lnahORF2&quot; width=&quot;480&quot; height=&quot;285&quot; alt=&quot;&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;section field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item odd&quot; property=&quot;content:encoded&quot;&gt;&lt;p&gt;1.	Don’t open emails from people that you don’t know.&lt;br /&gt;
2.	Don’t open attachments unless you know you are expecting a file from the person who sent the email.&lt;br /&gt;
3.	Use a spam filter.&lt;br /&gt;
4.	Use an email scanner.&lt;br /&gt;
5.	Use a good Anti-Virus program.&lt;br /&gt;
6.	Don’t accept resumes or other files from people you don’t know via email.&lt;br /&gt;
7.	Use a paid email account instead of an ad supported email account like most Internet Service Providers give you for free.&lt;br /&gt;
8.	Use a good password for your email account.&lt;br /&gt;
9.	Don’t click on links contained in emails.  Go directly to the site using your browser.&lt;br /&gt;
10.	Pay close attention to the email address of the sender.&lt;br /&gt;
If you need help or have questions about Email Safety, contact us using the information at the bottom of this page.&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;div class=&quot;field field-name-field-tags field-type-taxonomy-term-reference field-label-above clearfix&quot;&gt;
      &lt;p class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/p&gt;
    &lt;ul class=&quot;field-items&quot;&gt;
          &lt;li class=&quot;field-item even&quot; rel=&quot;dc:subject&quot;&gt;
        &lt;a href=&quot;/tags/security&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;Security&lt;/a&gt;      &lt;/li&gt;
      &lt;/ul&gt;
&lt;/div&gt;
&lt;div class=&quot;section field field-name-field-file field-type-file field-label-above&quot;&gt;&lt;h3 class=&quot;field-label&quot;&gt;File:&amp;nbsp;&lt;/h3&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;span class=&quot;file&quot;&gt;&lt;img class=&quot;file-icon&quot; alt=&quot;PDF icon&quot; title=&quot;application/pdf&quot; src=&quot;/modules/file/icons/application-pdf.png&quot; /&gt; &lt;a href=&quot;https://www.ultimateitguys.com/sites/default/files/article_files/10%20Email%20Safety%20Tips.pdf&quot; type=&quot;application/pdf; length=267377&quot; title=&quot;10 Email Safety Tips.pdf&quot;&gt;10 Email Safety Tips&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
 <pubDate>Thu, 02 Apr 2015 15:35:04 +0000</pubDate>
 <dc:creator>uitg</dc:creator>
 <guid isPermaLink="false">58 at https://www.ultimateitguys.com</guid>
 <comments>https://www.ultimateitguys.com/content/10-email-safety-tips#comments</comments>
</item>
</channel>
</rss>
