Understanding WiFi: 2.4GHz & 5GHz

In today’s society, WiFi is a common networking technology that we use on multiple devices. Whether it is for leisure or for work, it is important to understand the key differences between 2.4 GHz and 5 GHz frequencies. Numbers can be hard to understand but don’t worry, I will break it down for you. Whether you use a router provided from your ISP (Internet Service Provider) like your Cable Company, or you purchase  one from a store like Best Buy, Target, Microcenter, these routers will have both frequencies built-in. A lot of times, people will create a network WiFi name and then have a secondary iteration of their WiFi named “WiFi-5GHz” or “WiFi_5Ghz”. Although you can have both running at the same time, let’s get down to what the pros and cons are for both. 

The pro of having 2.4GHz enabled, which is the standard frequency for WiFi is that it can cover and reach longer distances around or over 150 Feet before signal drops. The con to 2.4GHz is that the further you go from the router, the lower your signal and speed will be. Let’s say that you were watching a video livestream on YouTube, or another streaming service and you are further away from your router, you may experience intermittent pauses on the video due to the distance. This is where 5GHz comes in. The pro to this frequency is that it provides greater speeds however, the con for this is, the distance is much shorter. If you were to go 50 feet away from the router, your signal will drop slightly but could still have a higher speed than the 2.4GHz. 

To summarize, if you want to keep both frequencies on, you can do so. The 5GHz can be used for faster data speeds while being closer to your router. The 2.4 GHz frequency will allow you to have a more stable connection but will degrade signal the further away you are.


Is 2-Step Verification Important?

What is 2-Step verification? Is it important? How does it play a role in today’s technological society? You may have heard of this term before or even used it for yourself. If you have ever received a text message to verify yourself after logging into a website such as: Social Media, Banking, Shopping etc, then you have setup 2-Step verification on your phone. Now why is this important? It is important because even if your password is complex and a website guarantees the authenticity of the security level, that password could get comprised in a website breach. The point of having another device to verify yourself is important because, if someone was trying to get in with your credentials, they would physically need access to your device to approve the login.

The chances of someone having your device is not impossible but very low. Most websites today will offer a 2-Step Verification or even a Multi-Factor Authentication which allows you to setup a secret answer to a question, a one-time code sent to your phone or email, send a push notification to your phone such as a Yes / No or even Allow / Deny. The good thing about the codes are that, they generate and will expire usually after a certain time for security purposes. You would not want a code to linger around in your email’s inbox for a week for the sake of someone gaining access to your email and using that code for another website.

Here are a few things you can do to protect your credentials and yourself when entering your credentials onto websites. Avoid using the same password across different websites and make them unique in a sense where only you know the meaning of that password. I know that it can be hard to remember multiple passwords especially if you don’t login as often but, changing your password often is a good practice as you can try to avoid your password from being caught in a data breach. Create a password that is at least 8-12 characters long with:

  • An uppercase letter

  • A lowercase letter

  • A symbol

  • A number

With that said, you now know what the meaning of 2-Step Verification is and can begin to use it if you have not done so already. Remember to always stay vigilant and this will help you overall.

Are You Protected?

antivirus-1349649_960_720.png

What is an Antivirus? Do you need one? Whether you use your computer every day or once a month, it is still important to have an Antivirus software. This is a very important tool to have on a computer as it can protect your computer and warn you of malicious files that can be lingering inside your computer. Of course some Antivirus programs are free and others need to be paid. In case you are wondering why the paid ones make a difference, it is simply for automation. No one wants to run an Antivirus manually especially since they may forget to run it. 

As new viruses are being released on a daily basis, your Antivirus will need to run periodic updates to learn about these new types of threats. Many people may also say that Macs cannot get a virus, which is not entirely true. Given that Mac is a different type of operating system from Windows, it is more locked down in a sense where program files are much different than Windows. In other
words Mac limits you to what you can download from the Internet and a lot of their applications need to go through their APP store to make life easier for Apple users.

So the next time you hear the word Antivirus, just think to yourself, do I want to manually protect my computer or do I want my computer to protect me!  

Emails and Malicious Attachments

attachment-148849_960_720.png

Almost everyone in the world has an email account. Emailing has been so efficient and time-saving when contacting individuals. Since emailing has been so widespread, it is also easy for attackers to compromise an account and send out fake emails with malicious attachments. What does this mean exactly?

Well, lets say Joe has a friend named Matt, and from time to time they email eachother. Joe always opens up Matt's emails because he knows who he is and trusts him. Let's say that Matt's email account gets compromised and breached. All of the contacts in his address book will get a fake email that is sent from Matt. Given that Matt's contacts know who he is, will highly likely click on the email and if there is an attachment, you can bet that the attachment will be open or even downloaded. This attachment could pose as a PDF, Word Document, or even an Excel Spreadsheet, with a common name that makes you want to open it, and is most likely carrying a virus behind it. This virus could either spread through your computer making most or all programs unusable, or even lock down all document,s photos, music, videos, etc where you have to pay a Ransom to unlock. This malicious virus is called, "Ransomware."

So how can typical users protect themselves? The key to protecting yourself is to be keen and cautious when opening attachments in an email, even if it is from a trustworthy person. The chances are very slim that your Anti-virus will pick up the virus and quarantine it. In a home enviroment, the virus may not spread through your network unlike a corporate environment. In this case, since data is shared among several computers, the virus can spread throgu hall the computers making its way to the main computer, which is the Server.

WiFi

wifi-1371030_960_720.jpg

WiFi has come such a long way and almost every device in the world uses this type of technology. It is very important for home owners who have WiFi broadcasting from their router, to make sure to have a password so that it is harder for someone to connect to it. By default some routers will use numbers, random letters, or sometimes both combinations. It is very important to change that password to a more complex one so that only you and your household will know by heart. 

Although WiFi networks can be more secure when a password is needed, you may also hide the name so that it does not show up on a list of available networks. This is called "Disable SSID Broadcast." This will make it harder for someone to try to break into your home network as you will remain undetected. Although there might be a way for hackers to try to bypass this technique, it is still a better way to protect yourselves than what most people would take account for.

CLOUD STORAGE

Untitled.jpg

What is this famous "Cloud" that everyone speaks of? Is it really up in the air? The Cloud has been around for many years and a lot of us have not realized that. Although the term may have been used several times a few years back, it has been around for as long as the Internet has existed. When people tend to refer to the Cloud, they refer to something that is not local but in another location. For example, by accessing websites such as: Google, Facebook, Yahoo, Twitter, etc, these are websites hosted on another computer somewhere in the world. Almost everything is hosted on a physical computer, its just a matter of where it is located. 

The Cloud also offers several types of data storage for end users to use. Common ones which you may have heard are: Google Drive, DropBox, OneDrive, iCloud. These services allow for end users to store their data offsite so that if their computer or device crashes, they know its safe in another backup location. Technology has helped us so much by making people feel safe by knowing their data can be retrieved if it becomes deleted locally. 

There is also that curious question that many people ask, "Is the Cloud safe to use?" As long as you don't store sensitive information such as social security numbers or tax information, then yes, you shouldn't worry about any information being compromised. It is also a good idea to keep your passwords strong for these types of accounts. 

PHISHING

password-2271736_960_720.jpg

December 5, 2017

Have you ever been to a website trying to purchase an item that you can't find anywhere else and it somewhat looks suspicious? Does the writing look off or does it seem like they are asking for too much attention? If you have ever felt that way, chances are you stumbled onto a fake website. Websites like these will often try to replicate a legitimate website by having a log-in screen and eventually a spot to enter your credit card info if it poses as an e-commerce website. This term is called "phishing." The way this works is, an end user will go to a website and try to enter in all the information that it is asking for, and the person hosting the site will have a keylogger on the other end to record and reveal all the entered information, including the password right before their eyes. 

If you are unsure of a legitimate website, it is always good to research it prior to proceeding further. All webpages are supposed to have a valid certificate which proves that any private information entered by the end user such as a password, social security number, or a credit card number, will be encrypted and safe from any third party attacks. If you ever go to a website where it requires you to sign-in or enter any personal information, always look at the start of the website where it should say "HTTPS" as opposed to "HTTP". HTTPS means that the webpage is secure, however, if there is no certificate, then you may see "Not Secure". Most web browsers will alert you when going to a website without a certificate. Always keep an eye at that icon on the top of the address bar before stumbling upon a suspicious website. 

COOKIES

3203171586_719d393d78_b.jpg

Although Cookies can be very delicious, in the computer world, they leave traces behind for easier access for the end user. By referring to "easy," it can also be intercepted by a hacker with a third party program called a "keylogger". Not to scare you away, but when you go to a website and it asks you to save the password, your web browser is actually saving it in a password vault in the settings. It is very convenient for most people to store a saved password and to never have to type it in again, until it becomes a compromised issue. Storing it can mean, that anyone who has access to your computer can now login as you. 

Here are BEST PRACTICES to take when it comes down passwords in general.

It is always recommended to change your password every 30-60 days and to include the following requirements:    

  •    6-10 characters
  •    1 Uppercase Letter
  •    1 Number
  •    1 Special Symbol (i.e: !@#$%^&*)

It might be a challenge to remember the new password when you change it often however, by signing it at least once a day, you will have it memorized. It is never a good idea to keep passwords in written context such as post-its or emails. Your brain is the best place to keep that safe and handy because no one else will remember but you. 

If you are feel that a website may look legitimate but something is off with it, there is a good chance it is a "phishing" site and I do not mean fishing on a boat! Keyloggers are used very often on these "phishing" sites, and I will cover that in next Tuesday's tip.

WEB BROWSERS

  

  

Does your web browser take long to load web pages? What can you do to speed it up?

Often times, clearing the cache and browsing history on a web browser can optimize its performance. The quickest way to do this is to click and hold the following keys on your keyboard: "CTRL + SHIFT + DELETE." This popup window will ask you what you would like clear up and then the rest is up to you! If you choose to not delete your "cookies" for websites that have your saved passwords, you can do that, however the BEST practice is always to type in your password to as only YOU will have access to the account and it won't be in reach for someone else to access.

Although cookies can be very delicious, in the computer world, they are great for websites to remember you, but dangerous to the outside world! I will leave that here and pickup on the risks of cookies in next Tuesday's article, so standby!