tips | Biztek Solutions, Inc.

tips

You always hear stories every single year about a residential homes or small businesses being visited by what seems to be a utility worker. They knock on the door, with a smile on their face, and dressed at what seems to be “official”. As warm as the gesture may feel, a slight sense of worry tends to linger as they ask you questions and a request to step into the office and conduct their routines. “Workers” for your internet provider will ask you for permission to access your servers, or your utility providers looking to observe your circuit breakers and entering restricted rooms.

 

Do you remember when your parents told you to “never trust strangers”?

Continue reading

 

Mobile technology has come a long way in a relatively short space of time. In less than 30 years we’ve moved away from big, brick-like cellular phones and a nascent internet to a world of super-slim and powerful smartphones, tablets and convertible laptops that are able to transmit and store data, as well as hook up the internet, with a simple tap.

While these devices offer us increased internet connectivity and day-to-day convenience, they also carry considerable security risks. In this feature we take a look the reasons behind the growing threat of mobile-related cyber-crime.

Continue reading

  

Ready for the Holidays? 

When you’re traveling and your phone is about to die, most travelers will take a charge wherever they can find it. But, a new report from the Los Angeles County District Attorney’s Office warns against using public USB power charging stations because of “juice jacking

Juice jacking is a scam that can drain important information from your phone while you use a public USB port to charge.

Criminals can load malware onto the charging stations, rip out the real USB ports and replace them with their own infected ports or leave infected cables at the stations. When people use these ports, their phone will charge and their private information will be leaked to scammers. Through these scams, criminals can access information like personal passwords, bank accounts or entire backups of your phone.

Continue reading