logotype
  • Home
  • About Us
  • Blog
  • Contact
  • Services
  • FAQ

Call or Text!

(203) 693-1912

logotype
  • Home
  • About Us
  • Blog
  • Contact
  • Services
  • FAQ
logotype
  • Home
  • About Us
  • Blog
  • Contact
  • Services
  • FAQ

Call or Text!

(203)693-1912

  • Home
  • About Us
  • Blog
  • Contact
  • Services
  • FAQ
logotype
logotype
  • Home
  • About Us
  • Blog
  • Contact
  • Services
  • FAQ
Internet Safety
Ryan DaileyJanuary 29, 2024 0 Comments
Share article:Facebook
298 Views
42 Likes

Keeping You and Your Accounts Safe

Keeping You and Your Accounts Safe

It’s now 2024 and no account is safe. Passwords are becoming less and less secure even though you meet the requirements of the site. Uppercase, lowercase, number, special character and a minimum of 8 characters being the standard still isn’t enough. This is due to all the data breaches from many companies. Compound this with many users using the same password across many services and sites. We will discuss how you can keep your accounts and services safe from most forms of breaches.

Passwords Are The Way of The Past

Passwords are becoming less and less secure. You may be increasing the character count from 8 to 12 or adding in a couple special characters but that still doesn’t make much of a difference. Hackers are aggregating all this data and using it in attacks. ‘RockYou’ is one of the most famous password lists put together comprising of over 14 million passwords aggregated from data breaches. Now with A.I., it’s become even easier for passwords to be cracked.

Brute Force Passwords 2023
This chart shows you just how quickly a password can be cracked based on length and complexity.

So, What Can I Do?

Utilizing 2FA (Two Factor Authentication) or MFA (Multi-Factor Authentication) is the most popular and effective way to help prevent a breached password from being used against you. Rotating passwords or updating them every so often will help thwart hackers. Make sure the wireless networks you connect to are secure. When on unsecured networks, use a VPN, and always have a good antivirus package or EDR (Endpoint Detection & Response) to protect your accounts and devices. Subscribe to services to know your current exposure out on the internet and the dark web. Also limit what information you post on social media.

2FA/MFA

Utilizing some form or 2FA or MFA is paramount to keeping modern accounts and services secure. Hackers are counting on you to not use these methods. Just by enabling 2FA/MFA, you can block 100% of the automated bots, 96% of phishing attacks, and 76% of targeted attacks for most services. While this is an additional step to your login process, taking the additional 3-5 seconds to secure your account at login will ensure your accounts and privacy are safe. MFA is referred to as (i) something you know (e.g., password/personal identification number [PIN]); (ii) something you have (e.g., cryptographic identification device, token); or (iii) something you are (e.g., biometric).

Something you know:

Remembering all your passwords is extremely difficult especially if you have different ones for each service as recommended. Luckily there are password managers that help combat having to remember all those passwords. Applications such as Bitwarden provide a free service for securely storing and inputting your credentials on websites, services and apps. Bitwarden allows you to add their plugin on all major browsers as well as apps for mobile devices and is a must for anyone needing to access just about anything. These passwords will then sync between all devices. Bitwarden will also allow you generate random passwords based on your password requirements. Now there are other options for this out there but this will provide you with a great free option with very affordable paid options to expand on their free offerings. They also support a self-hosted “vault” for those who don’t trust the cloud offerings. Bitwarden has paid options which greatly expand upon their free tier especially for families or businesses needing to share credentials. Should you want to use more memorable passwords instead of randomly generated strings, I highly recommend using phrases or string of words. Examples of this can be I-Like-My-Passwords-Secure or MyPasswordisSuperSecure!. Avoid using words such as pets names, birthdays, or kids names which can easily be looked up via social engineering.

Something You Have:

Securing your account additionally from a secure password includes using a 2FA/MFA software or hardware token and SMS tokens. Popular software tokens include Google Authenticator, Authy and Microsoft Authenticator. Most services will allow these applications to generate a time based six-digit token that typically changes every 30-60 seconds. Most importantly these services will generate backup/recovery codes that should be stored in a physically secure location and not electronically. Should you loose access to your 2FA/MFA token, these recovery codes will allow you temporary access to your account and setup your authenticator of choice again.

Hardware tokens can also be utilized while being less common in the wild for regular users. Hardware tokens can be a battery powered device that generates a six-digit token every 30-60 seconds that you have on your person. These can easily attach on your keys. Another form of Hardware Token is a device such as a Yubi Key. Yubi keys are a hardware token you plugin to your devices and can have an additional authentication method such as biometrics.

Something You Are:

Physical devices such as Yubi Keys or hardware tokens with biometric scanners and other USB biometric scanners are a way to identify yourself physically satisfying the third method of MFA.

Monitoring Breaches:

Monitoring breaches has never been easier. One method for identifying if your account or password has been a part of breach is by visiting https://haveibeenpwned.com/. This site is run by a Microsoft security researcher who aggregates as many breaches as he can with almost 13B accounts currently listed. You can enter in your email address(s), passwords and phone number to see if you have been breached. You can also have the site notify you if your account comes up in any breaches.

Other services like Google will monitor your presence on the dark web as well as publicly available information on websites. Depending on the site, you can have Google request your removal of data from these sites. Google will not request your data be removed from public records or government sites. Google will notify you if your data shows up on the dark web so you can make changes to your accounts should your information be out there.

Anti-Virus and EDR software:

Anti-Virus or EDR software won’t keep your accounts from being breached per se but will help keep malware or credential stealing software off your computer. While there are free options out there, I do not recommend them by any means as they usually are behind with definition updates leading to potential attacks slipping through. Popular services include ESET, Bitdefender, CrowdStrike and SentinalOne to name a few. These will help protect you from common threats, potentially compromised websites, phishing emails and more.

VPN’s and Unsecure Networks:

Going to your favorite coffee shop and using their free WiFi isn’t all it may be cracked up to be. There is potential for someone to be there “sniffing” the wireless traffic waiting for some data to be transmitted that can easily be read or decoded. To combat this, only connect to secure networks minimally containing a password. Turn off your WiFi, Bluetooth and NFC connections when not in use. Hackers can fairly easily exploit these connections with fairly simple and inexpensive devices. When using the WiFi on a public network, use a VPN service such as Private Internet Access or NordVPN. These services will allow you to encrypt your traffic over the public network. This will assist you in preventing your data being transmitted and received on the wireless from being decrypted and used against you. Phones have hot spot options as well for a laptop to connect wirelessly via your phone using it’s cellular connection.

Social Media and You:

Social Media is the most used applications to date. We willing post so much information out on the internet and most times not even realizing what information we are posting. Did one of your friends post one of those questionaries about what’s your favorite color, your best friends name, year your graduated high school? Do these questions sound familiar? They should because you probably used them for password reset questions. Hacker’s love collecting social media posts and generating a profile on you. With enough information, hackers can pretend to be you and change your account information via a support call to major carriers and services. Be careful what you post out there. Even seemingly innocent posts such as pictures of your favorite things is enough for hackers to build their own profile on you. Be sure to review the information you post and who has access to seeing that information. Check your friends lists and make sure you know everyone. Even then, your friends and family accounts can be compromised. Best rule of thumb is that if you have even the slightest inkling that the message or post is sketchy or off from normal posts, it more than likely is an should not be interacted with.

Bonus Tip:

If you need to send someone a password, credit card number or any other sensitive information, please do not send it via email. Should your account get breached, hackers can search through and look for that information. Free services such as Password Pusher allow you to securely send credentials or any other text for free securely. You can limit the number of views and number of days the link is active for. You can even add an additional custom password that needs to be entered when opening the link.

Conclusion:

Hopefully you were able to learn some new ways to secure your accounts and keep yourself safe out on the internet. Should you wish for a security audit, recommendations on what you can be doing different or implementing these methods don’t hesitate to contact us. Either email us at daileycomputing@gmail.com or reach out via call or text to 203-693-1912. Also be sure to review our previous and future blog posts to keep you and your devices secure.

READ MORE
Network Security
Ryan DaileyJanuary 26, 2024 0 Comments
Share article:Facebook
172 Views
29 Likes

Protecting Your Home Network

Protecting Your Home Network

Securing your home network doesn’t need to be complicated. One effective way to enhance security is by implementing a DNS (Domain Name System) filtering system. This not only guards against common threats but also reduces unwanted ads during your internet browsing. In this guide, we’ll delve into the significance of DNS, how it contributes to protection and network monitoring, and explore diverse options to fortify your home network and privacy. While we won’t provide step-by-step installation instructions in this article, we aim to inform you about some of the available choices to empower you in safeguarding your home network.

What is DNS?

DNS, or Domain Name System, acts as a translator for computers. It converts human-readable domain names (like Google.com) into IP addresses that computers comprehend. This translation is akin to providing the internet’s equivalent of a mailing address. DNS servers, which can be provided by your ISP or major players like Google, Cloudflare, or Quad9, handle this translation process.

How does DNS filtering protect me?

DNS filtering involves checking domain names against known blacklists. If a domain is found on one of these blacklists, the request is blocked—a process referred to as “sinkholing.” This provides protection against clicking on links leading to phishing websites in emails or mistyped domain names, while also blocking ads.

How can I protect my network and/or devices?

There are various methods to protect your devices and network. These include, but not limited to, locally hosted software, cloud based or browser based protection. 

Dedicated locally hosted network device:

Examples: PiHole and AdGuard Home on a Raspberry Pi or other computer devices.

Pros: Offers high protection, automatic and invisible to devices. Logs queries for review via web interface. Can manually import lists based on need.

Cons: Requires initial manual setup and tuning. Some websites may detect and request to disable the ad blocker temporarily or permanently. Doesn’t protect outside your home network natively.

Cloud Based DNS Solutions:

Examples: Cloudflare, OpenDNS, AdGuard Home for Mobile.

Pros: Easy setup, automatic protection, can be configured for specific content filtering.

Cons: Limited control over blocked sites, reliance on the DNS provider’s lists.

Browser Based Protection:

Examples: AdGuard, AdBlocker, uBlock Origin.

Pros: Limited to the browser and devices it’s installed on. Easy setup.

Cons: Limited visibility into logs, potential conflicts with certain websites.

Router Based Protections:

Examples: Some routers like Netgear with parental controls.

Pros: Filters ads, malware, and adult content network-wide. Logs device activity.

Cons: Limited log retention, specific to the router.

What's next?

Choosing the right solution depends on your preferences and needs. For further discussion or assistance, feel free to contact Ryan at Dailey Computing via email at daileycomputing@gmail.com or call 203.693.1912. We are here to help protect your family or small business at an affordable rate.

READ MORE
Updates
Ryan DaileyJanuary 12, 2024 0 Comments
Share article:Facebook
192 Views
26 Likes

January 2024 Windows Update

January 2024 Windows 10 Update Failure

Microsoft released it’s January Patch Tuesday updates on 1-9-2024. Many Windows 10 users found that the 2024-01 Security Update KB5034441 failed with error 0x80070643. This appears to affect all versions of Windows 10 and 11. Windows 11 seems to be able to automate the fix due to the recovery partition being sufficiently sized but there are still reports of manual patching being needed.

Windows Update 0x80070643 Error for KB5034441

The reason for this error is due to the recovery partition being at the beginning of the drive, contains a non valid image or the partition doesn’t exist.

This seems to be isolated to Windows 10 and Server 2022 and verified by System Administrators at various social media outlets.

Before we discuss the fix, let’s understand what actually happened here. CVE-2024-20666 resolves an exploit that bypasses BitLocker Encryption and allows users to access encrypted data. The update attempts to install a new version of the Windows Update Recovery Environment (WinRE). Many Windows 10 recovery partitions (if they had them) were 522 MB, which isn’t large enough to support the new Windows RE image (winre.wim) file causing the error listed above.

Example Recovery Partition on Windows 10

Microsoft has released a script to automate the fix. There are two different scripts depending on the feature update of Windows 10 and Windows 11 which will need to be run in PowerShell as Administrator. There is also a manual process for resizing the recovery partition. This is the only solution that Microsoft has provided. You will also need to download the specified Safe OS Dynamic Update (Compatibility Update) package from the Windows Update Catalog based on your feature version. When running the script on your system, it mounts the WinRE image, applies an architecture-specific Safe OS Dynamic Update you have to download from the Windows Update Catalog before running the script, unmounts the image, and then reconfigures WinRE for BitLocker service if the BitLocker TPM protector is present.

From what I have seen personally, the recovery partition needs to be a minimum of 772MB but the script can patch the recovery image without resizing the partition in most cases.

Please note that before attempting to perform any of the fixes listed above, you have current backups of your current system should something go wrong.

Script showing the output of the script running successfully

For assistance deploying or applying this update in your environment, please contact us to get your computers fully patched and protected from the latest vulnerabilities. 

READ MORE
Welcome
Ryan DaileyJanuary 12, 2024 0 Comments
Share article:Facebook
193 Views
27 Likes

Welcome to Dailey Computing

Welcome to Dailey Computing

We are thrilled to welcome you to Dailey Computing, where cutting-edge solutions meet personalized service. Whether you’re a homeowner dealing with computer glitches or a small business aiming to optimize your IT infrastructure, you’ve come to the right place.

About Us:

At Dailey Computing, we pride ourselves on being more than just a computer repair and IT consulting service. We’re your dedicated tech companions, committed to making your digital experiences seamless and stress-free.

What Sets Us Apart:

  1. Expertise: Our team comprises skilled professionals with a passion for technology. From hardware repairs to software installations, we’ve got the know-how to tackle it all.
  2. Customer-Centric Approach: Your satisfaction is at the heart of everything we do. We listen, understand, and tailor our services to meet your specific needs.
  3. Transparency: No hidden fees or jargon. We believe in transparent communication, ensuring you’re informed and empowered throughout the entire process.

Our Services:

  • Residential Computer Repair: Say goodbye to tech headaches at home. We fix everything from sluggish systems to stubborn viruses.
  • Small Business IT Consulting: Elevate your business with our strategic IT consulting services. We align technology with your goals for optimum efficiency.
  • Data Security: Trust us to keep your data safe. Whether it’s securing your network or recovering lost files, we’ve got you covered.

What to Expect:

  1. Prompt Service: We understand the urgency of tech issues. Expect quick responses and efficient resolutions.
  2. Clear Communication: You won’t be left in the dark. We communicate openly, ensuring you’re informed at every step.
  3. Reliability: Count on us for reliable solutions that stand the test of time. We’re not just here for quick fixes; we’re here for lasting results.
  4. Educational Insights: Stay informed and empowered through our blog’s educational content. From tech tips to industry trends, we’re committed to sharing knowledge that helps you navigate the digital landscape with confidence.

Get Started:

Ready to experience hassle-free tech solutions? Getting started is easy! Simply Contact Us to schedule a service or consultation. We look forward to becoming your trusted tech partner on this digital journey.

Stay Connected:

For the latest tech tips, industry updates, and behind-the-scenes glimpses, be sure to follow our Blog and connect with us on Facebook.

READ MORE

Recent Posts

  • Protecting From Malicious Emails
  • Upgrade Your Wireless
  • Keeping You and Your Accounts Safe
  • Protecting Your Home Network
  • January 2024 Windows Update

Recent Comments

No comments to show.

Archives

  • June 2024
  • February 2024
  • January 2024

Categories

  • Email
  • Internet Safety
  • Network Security
  • Updates
  • Welcome
  • Wireless
Recent Posts
  • Protecting From Malicious Emails
    Protecting From Malicious Emails
    June 15, 2024
  • Upgrade Your Wireless
    Upgrade Your Wireless
    February 24, 2024
  • Keeping You and Your Accounts Safe
    Keeping You and Your Accounts Safe
    January 29, 2024
Categories
  • Email1
  • Internet Safety2
  • Network Security1
  • Updates1
  • Welcome1
  • Wireless1
Tags
2FA Antivirus Email Filter Hack Malicious Malware Network Password Security Social Media Spear Phishing VPN Vulnerability Welcome WiFi Windows Update
logotype
  • (203) 693-1912
  • daileycomputing@gmail.com

Our Services

Services

Support

SupportFAQS

© Copyright 2023 Dailey Computing. All rights reserved.

Facebook Youtube