Yellowstone Computing
(715)-669-6136
  • Home
  • Services
  • Support
  • Contact
  • Blog
  • About
  • Reviews
  • Repairs

Fresh Start, Part 3 – Securing Your Digital Privacy in 2021

3/28/2021

 
Picture
Part 3 of a guest post from our friends at Emsisoft.

Every day, we pay for the cost of digital convenience with our privacy. The currency, of course, is personal data. Sometimes, it’s a reciprocal transaction, like when we install a social media app on our phone. We install the app knowing that our information will be harvested, aggregated, and likely sold off to marketers and advertisers.  
In other scenarios, the erosion of privacy is less obvious, like when governments quietly conduct mass surveillance on the population; or, at the other end of the scale, like when someone plugs in your USB drive and starts snooping through your vacation pics.  
It’s easy to think that we’ve all but relinquished our right to privacy. But by making a few simple changes to your devices and rethinking how you interact online, it is still possible to maintain a good level of control over your privacy.
Here are five things you can do today to start taking control of your online privacy.

1. Secure Your Browser
Why: Your online activity is constantly being tracked and used by marketers to measure website performance and create targeted ads. Through the fuse of cookies and pixel trackers, websites can collect a wide range of information about you, including your location, what you click on, how long you spend on a page, the devices you use and more. Over time, as more of your browsing activity across different sites is aggregated, advertisers can get a startlingly accurate view of your interests, shopping habits and personal life.

How to Do It: Installing the following browser extensions can dramatically increase your privacy and reduce your online footprint.
  • HTTPS Everywhere: Created by the Tor Project and Electronic Frontier Foundation, HTTPS Everywhere is an open-source browser extension that automatically makes websites use the more secure (encrypted) HTTPS protocol instead of HTTP. HTTPS Everywhere is available on Firefox, Chrome, and Opera.
  • Emsisoft Browser Security: Emsisoft Browser Security protects your privacy by blocking access to phishing websites and websites that are known to distribute malware. Unlike many other security browser extensions, Emsisoft Browser Security does not send visited website addresses to the cloud for verification, which means it can’t see the websites you visit or track your online activity.
  • uBlock Origin: uBlock Origin (not to be confused with uBlock) is an open-source content filter that is capable, among other things, of blocking ads and preventing them from collecting your data. The adblocker can easily be disabled if you want to support specific sites that you know are secure. uBlock Origin is available on all the major browsers, including Chrome, Chromium, Edge, Firefox, Opera, Pale Moon and older versions of Safari. 
  • Privacy Badger: Instead of blocking content based on lists, Privacy Badger uses heuristics to identify and automatically block invisible third-party trackers. Privacy Badger complements uBlock Origin nicely (provided uBlock Origin is running on default settings) and is available on Chrome, Firefox, Edge and Opera.

2. Avoid Invasive Tools and Software
Why: Privacy and data management policies vary significantly between vendors. Many web-based tools will attempt to collect your data under the guise of providing a personalized experience, while some developers of free software will often try to recoup their costs by selling your data to third-party advertisers or bundling their applications with potentially unwanted programs (PUPs).
​
How: Before you use an online service or install software on your device, read the fine print to ensure you understand what you’re getting yourself into. Switching from your usual services to one of the more privacy-conscious solutions below can help you keep your data where it belongs.
  • Private search engine: All the mainstream search engines, including Google, Bing, Yahoo and others, collect extensive amounts of user data to create detailed user profiles, which marketers use to create targeted ads that follow you around the Internet. The good news is that there are a number of search engines that don’t collect or share your personal information. DuckDuckGo is the most well known, but there are other options, including Qwant and Startpage.
  • Private web browsers: You can take the use of private search engines one step further by using privacy-focused browsers. Mainstream browsers such as Chrome still collect information about your online activity. Privacy-focused browsers such as Brave block data-harvesting ads and trackers. If you access your social media accounts via your desktop browser, we recommend using a separate browser for those accounts, and another for your personal and business accounts.
  • Privacy-conscious antivirus: While antivirus software plays a critical role in keeping your devices safe, some solutions are a little overzealous in how they protect your system. Some security solutions will automatically upload your files to the cloud for analysis, while others might decrypt encrypted web traffic to check that it’s safe. Take the time to look for a privacy-conscious antivirus solution that will handle your files responsibly, ethically and securely.
 
We know that some of these suggestions appear daunting but don’t worry, Yellowstone Computing is here to help! Give our experts a call at 715-669-6136 or stop by our office located at 219 N Washington St, Thorp today! Don’t miss next week’s issue as we continue to outline basic steps to help you secure your digital privacy in 2021!

Fresh Start, Part 2 – Preventing Malware Infections in 2021

3/28/2021

 
Picture
Part 2 of a guest post from our friends at Emsisoft.
 
6. Remove Apps You Don’t Need
Over the years, you’ve probably amassed a bunch of applications on your PC and mobile devices that you never use. It’s time to get rid of them. Unpatched and misconfigured software are common entry points for malware, so removing unnecessary apps can reduce the risk of infection while freeing up storage space.
Once you’ve uninstalled the unnecessary apps, keep your storage devices uncluttered by only installing software that you actually need. Read dialog boxes carefully during installation to ensure you don’t inadvertently install potentially unwanted programs and be cautious when installing free software – remember, if you’re not paying for it, you’re probably the product.

7. Enable 2FA Everywhere You Can
Leave single-factor authentication in the past and start enabling two-factor authentication (2FA) everywhere you can.
2FA is a simple and effective way of adding an extra layer of security to your accounts. With 2FA, you’re required to provide both a password and a secondary form of identification (typically a verification code, PIN, hardware token or biometric pattern) to access your account. Even if attackers are able to install keylogging malware on your device and obtain your login credentials, they won’t be able to access your 2FA-protected account without the second form of authentication.

8. Lockdown Your Smart Devices
Internet connectivity is finding its way into more and more of our home devices. While smart devices might be ushering in a new era of convenience and efficiency, each Internet-connected device also provides a possible point of entry for malware attacks. Below are a few tips to keep your smart devices secure:
  • Apply network segmentation to isolate your smart devices on their own network and prevent an attack from spreading to your more important devices.
  • Change the default passwords on all of your Internet-connected devices.
  • Apply software and firmware updates when available.
  • Secure your router using the best practices described earlier.

9. Use Cloud-Based Antivirus Management
U.S. households are now home to an average of 11 Internet-connected devices, according to figures from Deloitte. Taking control of the security of each individual device is a logistical nightmare, so your best bet is to look for a cloud-based solution that allows you to manage all the endpoints in your home from a single portal. The Emsisoft Management Console, for example, comes free with all Emsisoft protection software and enables you to manage all of your devices remotely from a single pane of glass. Efficient, powerful and easy to use, it’s the best way to protect all of your family’s devices from malware in 2021.

With remote working and distance learning here to stay for the foreseeable future, it has never been more important to maintain a high level of cybersecurity. Applying the practices described in this article can go a long way toward securing your home network and keeping your devices free of malware in 2021.
​
We know that some of these suggestions appear daunting but don’t worry, Yellowstone Computing is here to help! Give our experts a call at 715-669-6136 or stop by our office located at 219 N Washington St, Thorp today! Don’t miss next week’s issue as we continue to outline basic steps to help you make 2021 malware-free!

Fresh Start, Part 1 – Preventing Malware Infections in 2021

3/7/2021

 
Picture
A guest post from our friends at Emsisoft.
1. Think Before You Click
Phishing preys on human tendencies and uses social engineering techniques to coax you into clicking things you shouldn’t. It’s responsible for 31 percent of cybersecurity incidents and is likely to be a prevalent threat in the months ahead as attackers seek to take advantage of the global shift to remote working. Make 2021 a phish-free year by thinking twice before clicking. Here a few key tips to avoid falling for a phishing scam:
  • Hover over URLs to check that the target address matches the linked text.
  • Type in web addresses instead of clicking on links.
  • Don’t open unsolicited email attachments.
  • Install an anti-phishing browser extension like Emsisoft Browser Security.
  • Call or text the sender of an email to confirm unusual requests.
  • Be wary of language that conveys a sense of urgency.
  • Be cautious of emails that don’t address you by name.
2. Apply Updates
Many types of malware work by taking advantage of security flaws in your applications or operating system. To fix these known security vulnerabilities and protect their users, software developers regularly release updates that should be applied as soon as they’re available.
While it may be tempting to ignore those nagging pop-up windows, keeping your software up to date is crucial for maintaining device security and reducing the risk of malware infection.
3. Install A Good Antivirus
There are a few good options on the market for antivirus and anti-malware software, so take the time to think about your requirements, read some reviews and install a few different trial versions (not at the same time!) to get a feel for each product.
If you’re looking for reliable, fast and easy-to-use protection, feel free to download a free trial of Emsisoft Anti-Malware and see if it’s a good fit. See this blog post for more advice on how to choose the right antivirus software.
4. Secure Your Router
Responsible for providing all of your devices with Internet connectivity, your router is perhaps the most important gadget in your home. Keep it secure with the following tips:
  • Update firmware: Router manufacturers release firmware (the low-level software your router runs on) updates to fix bugs, introduce new features and improve router security. While some modern routers can automatically update their firmware, we suggest periodically checking for updates via the router control panel and installing any available patches.
  • Change default login details: Most routers are shipped with the same default username (“admin”) and password (“password”). As you might have guessed, these credentials aren’t particularly hard to crack. Change the default login details to something more secure.
  • Change the Wi-Fi password: Make a fresh start in 2021 by changing your Wi-Fi password. You’ll need to reconnect all of your devices, but it also means that anyone who shouldn’t be lurking on the network will be kicked off. Always use WPA2 (or better) encryption for wireless security.
  • Disable WPS: Wi-Fi Protected Setup (WPS) allows devices to connect to the network by pushing a button (which enables anyone with physical access to the router to connect to the network) or entering a PIN (which is more prone to brute force than an alphanumeric password). Unless you need WPS for a particular reason, we recommend disabling it.
  • Disable remote access: Many modern routers come with remote access that allows you to manage your router while you’re away from home. To reduce the risk of compromise, remote access should be disabled unless you specifically require it.
5. Steer Clear of Pirated Software
Pirated software poses a significant security risk (not to mention the serious ethical implications, which we won’t get into here). While statistics are scarce, it’s not uncommon for pirated software to be infected with malware such as password-stealing trojans, ransomware and cryptojackers.
In 2021, it’s time to retire the Jolly Roger and embrace your new life as a regular old landlubber. Wipe the slate clean by reformatting your device and only installing legitimate applications. There are many free, open-source business applications and productivity tools that provide similar functionality to paid alternatives, while gamers can legally enjoy a plethora of top-notch games without paying a cent as developers increasingly embrace free-to-play models.
We know that some of these suggestions appear daunting but don’t worry, Yellowstone Computing is here to help! Give our experts a call at 715-669-6136 or stop by our office located at 219 N Washington St, Thorp today! Don’t miss next week’s issue as we continue to count down basic steps to help you make 2021 malware-free!

5 Solutions to Your Legacy Technology Transformation Woes

3/1/2021

 
Picture
By Serenity Gibbons | Forbes
Just because something works doesn't make it efficient or practical. Take an old gas-guzzler car. It may get you from point to point, but you're going to waste money and resources along the way.
Legacy technology systems fit this metaphor well. They may work, but at what cost? Often, they're clunky and much slower than more modern digital solutions. Plus, they may not have the capacity to allow your team to scale and compete.
The answer, of course, is a digital transformation (DX). Unfortunately, it's an answer that doesn't always pan out. Around seven out of 10 companies that embark on the road to DX never make it to their destination. They peter out. And their legacy systems keep chugging along.

Around Seven Out Of 10 Companies That Embark on The Road To DX Never Make It To Their Destination.
Why the high rate of DX failure? To be honest, several challenges lie in the way of a successful technological transformation. First of all, support doesn't always come from the top down. Bottom-up DX rarely gets enough traction to make a lasting splash. Plus, lots of companies make wrong replacement choices, merely replacing one legacy system for another. Finally, a true DX project can lead to transformation fatigue if everyone's expected to make major changes on a dime.
This isn't to suggest that DX is an impossible dream. It's hardly the stuff that Don Quixote warbled against in "Man of La Mancha." It just takes a tempered touch and some serious planning to make legacy technology transformations stick long-term.

1. Go for The Easy Wins.
Instead of replacing your tech stack portfolio at once, alter it slowly. For instance, replace one of your legacy systems that won't cause tons of ruffled feathers. Email is a good starting point. Most people can adapt to new email platforms, even if they're not the most tech-savvy workers on your team.
Getting a small, fast win tears down psychological hurdles to embracing new digital solutions. It also allows people to see the advantages that can come from upgrading, such as being able to sync calendars effortlessly or send unlimited files within an encrypted intranet system. Never underestimate how powerful it can be for your employees to have a good DX experience from the start.
2. Cultivate Champions in The Executive Ranks.

CIO not on board with legacy transformation? CEO keep putting it on the back burner? You're on the road to stunted tech growth. You need a high-level champion front and center who can help you succeed and improve buy-in across the board.
Speaking of the board, having board members involved in your DX campaign can be a huge asset. Board member support can put pressure on C-suite leaders to take modernization initiatives seriously. After all, the board has a huge stake in the economic viability of your company. When they're emphasizing and prioritizing DX at the board-level, your top-ranking executives will listen.

3. Break Down DX Into Bite-Sized Chunks.
Rome wasn't built in a day. Neither was Detroit. Or Cincinnati. Or a solid technology transformation. So think agile and move in short sprints rather than one long marathon. Along these lines, you may want to look for simple answers that allow you to keep parts of your legacy system for even longer, such as putting "wrapper" systems in place. Digital wrappers aren't new; MIT was talking about leveraging them years ago. Taking baby steps lets everyone catch their collective breath after one legacy system or solution has been replaced by a more contemporary version.
As you're chunking your DX steps, be sure to share goalposts with your crew. As an example, you may want to send out reminders about timelines and expectations. This keeps employees abreast of what's occurring. It also shows them how they can help you move closer to meeting your expectations.

4. Give People Training to Make The Most Of Replacement Systems.
Sure, you'll have some self-starters on your team who will dive straight into any system you install. But most of your folks will sit back and timidly toy around the edges of unfamiliar software and systems. That's why you have to teach them why it's okay to get rid of the legacy systems they love and embrace the myriad possibilities of a replacement.
It's not enough to offer a single training or two. Go overboard with anyone you want to actually make good use of your DX solutions. Offer in-person, socially distanced workshops. Set up virtual sharing sessions. Do whatever you can to educate your team members. Along the way, you'll probably see rising superstars who can be point people for the new system. Identify them and make them the go-to gurus of "their" DX platform.

5. Keep Communications Flowing.
If you've followed all the steps until now, you're probably humming along pretty well. To maximize the flow of information about your legacy technology transformation, send regular progress updates via text, email or maybe a video message. Be up front about other legacy systems you plan to retire.
Being communicative is essential to foster higher employee engagement, especially if your team is now working remotely like so many across the country. Mirrored Media's Justin Lefkovitch has gone on the record as a consummate over-communicator. In his words, "Nobody complains about being too informed, so clear and informative communication is a good way to begin. 
At the same time, be open-minded to getting "word on the street" feedback from employees. You'll want to hear about what's working and what's not. Send out surveys and request one-on-one sessions with people using the latest DX solutions. You'll get a 360-degree view of what's happening and how to proceed.
There's an old saying: "If it ain't broke, don't fix it." Sometimes, it's true. However, that's no way to run a disruptive company. Often, the kindest thing you can do for your business and coworkers is to say goodbye to legacy technology. That way, you can say hello to lightning-fast workplace capabilities fueled by your commitment to DX.

This article was written by Serenity Gibbons from Forbes and was legally licensed through the Industry Dive publisher network. Please direct all licensing questions to legal@industrydive.com.

What Devices Do You Need to Head Off the Unexpected In 2021?

3/1/2021

 
Picture
2021 has already had a rocky start – and compared to 2020 that’s saying a lot. Many hoped that this year would mark a return to normal. Instead it seems we’re in for a continuation of our new normal, complete with unexpected threats and digital acceleration. Anticipating what’s around the corner may continue to be impossible. Fortunately for small businesses, the market’s near-limitless device options give them an opportunity to respond more nimbly, so long as they select the right ones.
If choosing tech for the year ahead feels like a shot in the dark, follow these guidelines and future proof your business.

Choose Devices That Are Flexible
Numerous lockdowns amid growing health concerns have led to mass remote work over the last year. Thanks to the billions in collective cost savings and notable productivity increases that followed, many employers are considering agile working models like hot desking and hybrid office environments as long term solutions.
As the popularity of flex schedules and location agnostic work models increases, so does the demand for flexible devices. And though laptops may seem like the obvious choice, they’re certainly not the only one.
Convertibles and 2-in-1 tablets are affordable options that prioritize portability. Their built-in connectivity and docking options also make them a popular choice for traveling between work and home.
Even desktops have their place. They’re ideal for hot desks, offering more processing power and bigger screens for programs like CAD or performance analytics. Many newer models are more compact than ever, saving space without compromising on performance.

Buy Tech to Boost Your Resilience
Uncertainty was the hallmark of 2020. Moving forward, companies who want to insulate themselves from circumstance must make intentional moves to drive value and mitigate volatility. And they must do it digitally. As BCG explains, the path to business resilience is a digital one. “With almost every organization having to depend on data, analytics, digital tools and automation, digital technologies will constitute an increasingly critical element of business resilience tomorrow.”

Keep Collaboration In Mind
Collaboration and teamwork have always been essential components of great work. Even with in-person meetings and desk chats on pause, keeping these professional relationships strong is critical. We need each other to do our best work. While video meetings and cloud-enabled collaboration technology may have started as stand-ins, they’re quickly becoming the norm. 98% of meetings now have at least one employee attending remotely from home– a figure that is predicted to persist post-COVID.
As schedules become more staggered and the world opens at different rates, having devices that support top-tier collaboration tools will be key to producing top-tier work.

Prioritize Security
Many remote employees are working outside the company network for the first time. Cybercriminals have used this opportunity to make targets out of millions simply doing their job.
Spending a little more on your team’s tech now is the best way to prevent costly data and privacy breaches in the future. Search for devices with security features like:
  • Biometric access (like touch-ID or facial recognition)
  • Anti-spoofing technology
  • Data encryption
  • Secure operating systems
  • Data wipe features
  • Data resurrection capabilities
  • Mobile connectivity for secure data transfers
  • Multi-profile sign-on abilities

​Make Cost-Effective Decisions

Cost-reduction pressures are mounting as businesses brace for another year of unknowns. However, the real money is in cost optimization, not cost-cutting.
How do you spend proactively instead of cutting retroactively? Gartner recommends a three-phase approach:
  1. Improve efficiency. Lean into tactics like simplification and automation.
  2. Increase productivity. Encourage higher-value work, reprioritize projects and outsource where needed.
  3. Shift spend. Eliminate redundancy and waste, renegotiate with suppliers and reallocate funds (e.g. purchasing devices that help you work smarter).
Put simply, you don’t need to anticipate what’s ahead in order to prepare. It’s never too soon to start future proofing. Getting the right devices in place now can insulate your business, no matter what 2021 holds.

    Yellowstone Computing

    To read about us, click here!

    Archives

    April 2021
    March 2021
    February 2021
    January 2021
    December 2020
    November 2020
    October 2020
    September 2020
    August 2020
    July 2020
    June 2020
    May 2020
    April 2020
    March 2020
    February 2020
    January 2020
    December 2019
    November 2019
    October 2019
    September 2019
    August 2019
    July 2019
    June 2019
    May 2019
    April 2019
    March 2019
    February 2019
    January 2019
    December 2018
    November 2018
    October 2018
    September 2018
    August 2018
    July 2018
    June 2018
    May 2018
    April 2018
    March 2018
    February 2018
    January 2018
    December 2017
    November 2017
    October 2017
    September 2017
    August 2017
    July 2017
    June 2017
    May 2017
    April 2017
    March 2017
    February 2017
    January 2017
    November 2016
    October 2016
    December 2015
    September 2015
    July 2015
    May 2015
    April 2015
    March 2015
    February 2015
    January 2015
    December 2014
    November 2014
    October 2014
    September 2014
    August 2014
    July 2014
    June 2014
    May 2014
    April 2014

    Categories

    All

    RSS Feed

Visit Us!

What Our Clients Are Saying

Joe is really in tune with what our business needs are... what a great guy with amazing skills... - Grassland Veterinary Service

Yellowstone Computing goes above and beyond for their customers! Joe is very knowledgeable and will go the extra mile to make sure his customers not only get what they asked for but also makes sure they are taken care of for many years to come! Between the great business services they provide and their involvement in the Thorp Chamber I'd highly recommend doing business with Yellowstone Computing! Whether you are an individual looking for computer or other technology help or a large employer who needs to either supplement your current IT support or completely outsource it Yellowstone Computing should be one of your first calls! - Justin Z.