Your local IT consultant and managed service provider.

Blog

Learn with us

Don't Take the Bait: A Guide to Spotting and Avoiding Phishing Emails with Social Engineering

Phishing emails are fraudulent messages that appear to come from legitimate sources such as financial institutions, government agencies, or popular online services. The goal of phishing emails is to trick the recipient into revealing personal or sensitive information, such as login credentials, credit card numbers, or social security numbers.

Phishing emails often use social engineering techniques to create a sense of urgency or importance. Social engineering is a tactic used by cyber-criminals to manipulate people into divulging sensitive information or performing an action that is not in their best interest.

Here are some common signs of phishing emails:

  • The sender's email address doesn't match the organization they claim to represent.

  • The email contains spelling or grammar errors.

  • The email asks you to provide personal information, such as your social security number, credit card number, or login credentials.

  • The email contains a suspicious link or attachment.

  • The email creates a sense of urgency or pressure to act quickly.

  • Phishing emails often use fake email addresses that look like legitimate ones. Here are some examples of fake email addresses:

    • “Paypal-Support@secure.net” (Note the "-Support" added to the real domain name "paypal.com")

    • “Amaz0n.deals@hotmail.com” (Note the use of a zero instead of the letter "o" in "Amazon" and the email address is a free email provider instead of an Amazon domain)

    • “support@apple-security.com” (Note the use of "apple-security.com" instead of "apple.com")

  • To check the legitimacy of an email address, hover your mouse over the sender's name to reveal the email address. If the email address looks suspicious, don't open the email.

    1. Fake Websites/Domains

  • Phishing emails often contain links to fake websites that look like legitimate ones. Here are some examples of fake websites/domains:

    • paypa1.com (Note the use of the number "1" instead of the letter "l" in "paypal.com")

    • apple-supports.com (Note the use of "apple-supports.com" instead of "apple.com")

    • amaz0n-savings.com (Note the use of a zero instead of the letter "o" in "Amazon")

  • To check the legitimacy of a website/domain, hover your mouse over the link to see the destination URL. If the URL looks suspicious or different from the legitimate website, don't click on it.

  • It's important to note that cyber-criminals can also use legitimate-looking email addresses and websites to trick victims. Always double-check the email address and website/domain before providing any personal information or clicking on any links. If you're unsure, contact the company directly through their official website or customer service phone number.

Here are some tips to help you protect yourself from phishing emails:

  1. Be cautious of unexpected emails: Be suspicious of unexpected emails from unknown senders or companies you don’t recognize. Always verify the sender’s identity before opening any attachments or clicking on any links.

  2. It's important to note that sometimes personal email accounts can be hacked, and the hacker will use the compromised account to send phishing emails. If you receive a suspicious email from someone you know, it's best to reach out to that person through a different communication method (e.g., phone call, text message) to confirm whether they actually sent the email. It's also important to use strong, unique passwords for your email accounts and enable two-factor authentication (2FA) to protect your accounts from being hacked.

  3. Check the email address: Phishing emails often use fake email addresses that look like legitimate ones. Double-check the sender’s email address to make sure it matches the company they claim to be from.

    • Gmail: Hover over the sender's name to see their email address. If the email address looks suspicious, don't open the email.

    • Outlook: Right-click on the sender's name and select "Outlook Properties." Check the email address in the "Internet Headers" section to verify that it's legitimate.

    • Yahoo Mail: Hover over the sender's name to see their email address. If the email address looks suspicious, don't open the email.

    • Apple Mail: Click on the sender's name to reveal their email address. If the email address looks suspicious, don't open the email.

    • Mobile Apps: Tap and hold the sender's name to see their email address. If the email address looks suspicious, don't open the email.

    • Web Apps: Hover over the sender's name to see their email address. If the email address looks suspicious, don't open the email.

  4. Be wary of urgent requests: Phishing emails often create a sense of urgency or pressure to act quickly. Be cautious of emails that ask you to act immediately or threaten negative consequences.

  5. Don’t provide personal information: Legitimate companies never ask for personal information like passwords or social security numbers via email. Don’t provide personal information unless you are sure that the request is legitimate.

  6. Check the website address: If an email asks you to click on a link, hover your mouse over the link to see the destination URL. If the URL looks suspicious or different from the legitimate website, don’t click on it.

  7. Keep your software updated: Keeping your software updated helps protect your computer and email from security vulnerabilities that phishing emails can exploit.

  8. Use security software: Anti-virus and anti-spam software can help protect your computer from phishing emails and other online threats.

In conclusion, phishing emails can be a serious threat to your personal information and online security. By following these tips and being vigilant, you can protect yourself from phishing emails and stay safe online.

Joshua BatorskiComment
Internet Safety for Kids: Measures Parents Can Take (Free and Paid)

The internet is a huge place where you can find lots of things to do, but it can also be dangerous for kids. As a parent, it's important to take steps to protect your children from bad things like online bullies, people who want to hurt them, and things they shouldn't see. Here are some ways you can do that, both for free and by paying for them.

Free Measures:

  1. Talk to Your Kids - Make sure you talk to your children about the dangers of the internet and what they can do to protect themselves.

  2. Set Up Parental Controls - Many devices and internet browsers have settings that let you stop your children from seeing things they shouldn't.

  3. Teach Good Online Habits - Encourage your children to use strong passwords, not share their information, and be careful when clicking on things.

  4. Monitor Online Activity - Keep an eye on what your children are doing online and what websites and apps they're using.

  5. DNS Filtering - DNS filtering is a tool that lets you block bad websites from being seen. There are some free ones like OpenDNS, CleanBrowsing, and 1.1.1.1 for Families (from Cloudflare), which we will show you how to set up later in this blog post.

Paid Measures:

  1. Install Parental Control Software - You can pay for special software that lets you control what your children can see and do online.

  2. Hire a Someone to Help - If you're worried about your children's safety, you can hire someone who knows about internet safety to help you.

  3. Enroll in Online Safety Programs - There are many programs that teach children and parents how to be safe online.

If you want a free and easy way to keep your children safe online, we recommend setting up a parental filter using DNS filtering on your router.

DNS filtering is like a phone book for the internet. It helps your computer find the website you want to visit. By using DNS filtering, you can block bad websites and content from being seen. There are two types of DNS filtering:

  1. Free DNS filtering - Some internet service providers and companies like Cloudflare offer free DNS filtering. Cloudflare has a free service called "1.1.1.1 for Families" that is made for families who want a safe online experience. This service can block adult content and other things that children shouldn't see. You can find out how to set up "1.1.1.1 for Families" in Cloudflare's guide here: https://blog.cloudflare.com/introducing-1-1-1-1-for-families/

  2. Paid DNS filtering - You can pay for more advanced DNS filtering that can block more things, like malware and viruses. They also have more tools for parents to monitor their children's online activity.

At Infomatrix Technology, we know how important it is for kids to be safe online. That's why we offer cybersecurity solutions that are made just for families and children. We have DNS filtering, parental control software, and cybersecurity consultations that can be personalized just for you.

We believe that every child should feel safe and secure online, and we want to help parents make that happen.

Joshua BatorskiComment
Migrating Data from an Old Mac to a New One

Migrating data from an old Mac to a new one is a straightforward process, thanks to Apple's built-in migration tool. In this blog post, we'll guide you through the steps necessary to transfer your data from your old Mac to your new one.

Step 1: Backup your old Mac

Before you begin the transfer process, it's essential to backup your old Mac. This will help ensure that your data is safe and secure in case something goes wrong during the transfer process. You can use Time Machine or another backup method of your choice.

Step 2: Connect your old and new Mac

Next, connect your old and new Mac together using a Thunderbolt, FireWire, or Ethernet cable. If your old Mac has USB-C ports, you'll need to use a USB-C to USB adapter.

Step 3: Open Migration Assistant

On your new Mac, open Migration Assistant. You can find it in the Utilities folder within the Applications folder. If you're setting up your new Mac for the first time, you'll be prompted to use Migration Assistant during the initial setup process.

Step 4: Choose your transfer method

There are several ways to transfer data from your old Mac to your new one using Migration Assistant, including:

  • From a Time Machine backup: If you've backed up your old Mac using Time Machine, you can use Migration Assistant to transfer your data from the backup.

  • From a connected Mac: If your old and new Mac are connected, you can use Migration Assistant to transfer your data directly between them.

  • From a startup disk: If you've created a startup disk on your old Mac, you can use Migration Assistant to transfer your data from the disk.

Step 5: Choose what to transfer

Once you've selected your transfer method, choose which data you want to transfer to your new Mac. This can include your user account, applications, documents, settings, and more.

Step 6: Start the transfer

Finally, click the "Continue" button to begin the transfer process. Migration Assistant will transfer your data from your old Mac to your new one. Depending on the amount of data you're transferring, this process can take anywhere from a few minutes to several hours.

Transferring data from an old Mac to a new one is a simple process with Apple's built-in Migration Assistant tool. Remember to backup your old Mac before you begin, connect your old and new Mac together, open Migration Assistant on your new Mac, choose your transfer method and what data to transfer, and start the transfer process. With a little bit of patience, you'll be up and running on your new Mac in no time!

If you're feeling overwhelmed by the process of migrating from an old Mac computer to a new one, Infomatrix Technology is here to help. Our expert team can guide you through the entire process, from backing up your files to transferring your data and installing necessary software. With our help, you can rest assured that your transition to a new computer will be smooth and stress-free. Contact us today to learn more about how we can assist you with your computer migration needs.

Migrating Your Data on a New Windows Computer.

Getting a new computer can be an exciting experience, as it often means upgrading to a faster and more powerful machine. However, the process of transferring all your data, files, and applications can seem overwhelming at first. In this blog post, we'll guide you through the steps necessary to migrate your old computer to your new one.

Step 1: Decide what to transfer

Before you begin the transfer process, it's important to determine which files and applications you want to move over to your new computer. This can include personal files such as photos, documents, music, and videos, as well as programs such as Microsoft Office or Adobe Creative Suite.

Step 2: Backup your files

Before you begin the transfer process, it's essential to backup your files. This will help ensure that your data is safe and secure, in case something goes wrong during the transfer process. You can use an external hard drive, cloud-based storage service, or another backup method of your choice.

Step 3: Choose a transfer method

There are several ways to transfer data from your old computer to your new one, including:

  • USB transfer cable: This is a cable that connects both computers together and allows you to transfer files directly between them.

  • External hard drive: This involves copying your files onto an external hard drive and then transferring them to your new computer.

  • Cloud-based storage service: This involves uploading your files to a cloud-based storage service, such as Google Drive or Dropbox, and then downloading them onto your new computer.

  • Transfer software: There are several software programs available that can help you transfer files and applications from your old computer to your new one.

Step 4: Transfer your files and applications

Once you've chosen a transfer method, it's time to begin transferring your files and applications. Follow the instructions provided with your chosen method to transfer your files and applications.

Step 5: Install and update software

Once you've transferred your files and applications, it's essential to install and update any necessary software on your new computer. This includes operating system updates, security software, and any other programs you regularly use.

Step 6: Dispose of your old computer

After you've completed the transfer process, it's essential to dispose of your old computer properly. This can include wiping the hard drive, recycling the computer, or donating it to a charitable organization.

In conclusion, migrating from an old computer to a new one can seem like a daunting task, but it's relatively simple if you follow the steps outlined above. Remember to backup your files before you begin, choose a transfer method that works for you, and be sure to install and update any necessary software on your new computer. With a little bit of planning and patience, you'll be up and running on your new computer in no time!

If you're feeling overwhelmed by the process of migrating from an old computer to a new one, Infomatrix Technology is here to help. Our expert team can guide you through the entire process, from backing up your files to transferring your data and installing necessary software. With our help, you can rest assured that your transition to a new computer will be smooth and stress-free. Contact us today to learn more about how we can assist you with your computer migration needs.

Joshua BatorskiComment
Keeping New Tech Safe and Secure

'Tis the season of giving and receiving, and with all the new tech gifts being unwrapped, it's important to remember to keep those devices up to date with the latest patches and updates.

As exciting as it is to tear off the wrapping paper and dive into that shiny new phone or computer, taking a few extra minutes to make sure it's properly updated can save you a lot of headaches in the long run.

Patching your devices ensures that they are secure and protected against any vulnerabilities or security threats. Hackers cyber-criminals, and scammers are always finding new ways to exploit weaknesses in technology, and manufacturers release updates to fix these issues and keep your personal information safe.

Not only does patching protect you and your data, it can also improve the overall performance of your device. These updates often include bug fixes and new features that can enhance your experience and make your device run more smoothly.

So as you enjoy your new tech gifts, be sure to set aside some time to make sure they are fully patched and updated. It may not be the most exciting part of the holiday season, but taking a few extra minutes to patch your devices can go a long way in keeping you and your information safe.

Don't let the hustle and bustle of the holidays distract you from keeping your new tech devices secure and up to date. At Infomatrix Technology, we can help you ensure that all of your devices are fully patched and protected against any vulnerabilities. Contact us today to learn more about our patch management services and how we can help keep your technology running smoothly.