Pennyrile Technologies

Windows 11

Windows 11 is Here. Is Your Business Ready?

Windows 11 became available starting on October 5, 2021. The free upgrade to Windows 11 has begun rolling out to eligible PCs and PCs that are pre-loaded with Windows 11 are slowly becoming available for purchase. What’s New in Windows 11? Windows 11 features major changes to the Windows GUI, including a redesigned Start menu, the replacement of its “live tiles” with a separate “Widgets” panel on the taskbar, the ability to create tiled sets of windows that can be minimized and restored from the taskbar as a group, and new gaming technologies inherited from Xbox Series X and Series S such as Auto HDR and DirectStorage on compatible hardware. Internet Explorer is also replaced by Microsoft Edge and Microsoft Teams is integrated into the Windows shell. Microsoft has also announced plans to offer support for Android apps to run on Windows 11, with support for Amazon Appstore and manually-installed packages but such support isn’t available at release. Microsoft is Rolling out Windows 11 in a Phased and Measured Approach Per Microsoft, Windows 11 will be phased in and measured with a focus on quality. Following the tremendous learnings from Windows 10, we want to make sure we’re providing you with the best possible experience. That means new eligible devices will be offered the upgrade first. The upgrade will then roll out over time to in-market devices based on intelligence models that consider hardware eligibility, reliability metrics, age of device and other factors that impact the upgrade experience. We expect all eligible devices to be offered the free upgrade to Windows 11 by mid-2022. If you have a Windows 10 PC that’s eligible for the upgrade, Windows Update will let you know when it’s available. You can also check to see if Windows 11 is ready for your device by going to Settings > Windows Update and select Check for updates*. If the upgrade isn’t available to you yet, but you want to upgrade now, there are a few options. The first and easiest upgrade path is to download the Windows 11 Update Assistant. Choose Run after the download finishes to start the upgrade and make sure your hardware is compatible. Then Accept and Install to agree to the licensing terms and begin the installation. When the program is finished installing, you’ll be prompted to restart your computer. Your PC might restart several times during the process of finishing the installation, so don’t be alarmed. Just keep your PC on until everything’s done. Alternatively, you can create a bootable USB or DVD of the Windows 11 installation media using the same link above. Use this option to reinstall or perform a clean install of Windows 11 on a new or used PC. If you go the bootable USB media route, you will need a blank USB flash drive with at least 8GB of space. Any content on the flash drive will be deleted. Should You Upgrade Now? We currently recommend holding off on Windows 11 until next year. Windows 11’s first big update is already causing some major issues for users with AMD CPUs. PCs with older CPUs or those without TPM chips are not available to be upgraded anyways and may require new hardware purchases. Waiting until next year will hopefully give Microsoft some time to work out any major bugs and issues with the new release. This will also give end users some time to start using the new operating system on their home computers and ease their transition into the new interface before using it on their work computers. How to Block Windows 11 If your business isn’t quite ready for Windows 11, the easiest way to block the upgrade is via the Group Policy Editor. Click on the Start Menu Type gpedit.msc and load the Group Policy Editor Go to Local Computer Policy > Computer Configuration > Administrative Templates > Windows Components > Windows Update > Windows Update for Business Double-click on “Select the target feature update version” Set the policy to Enabled Type 21H1 into the field Close the Group Policy Editor If your business isn’t ready for Windows 11, you can safely continue using Windows 10 through October 2025 when Microsoft will end its support for it.

Windows 11 is Here. Is Your Business Ready? Read More »

Keep Your Computers Updated

The Importance of Windows 10 Updates & Automatic Maintenance

When thinking about keeping your computer secure from threats like Viruses, Malware, or Ransomware, the first thing you might think of is a good anti-virus software. While anti-virus is important, one of the most important steps in protecting your Windows 10 PC is keeping Windows and and the software on your PC patched and up-to-date. These updates help protect your computer from falling victim to exploits hackers can use to access your system. Why It is Important to Update Windows 10 Patches, updates, and hot-fixes are essential for keeping your computer and network secure. The threat of hackers obtaining your personal information has been ever more apparent lately and you need to be vigilant. Most Microsoft updates or hot-fixes are centered around security and/or threat vulnerability. A hacker only has to penetrate your computer’s defenses once, and they can get any information they want. Malware can enter a system by an exploit, whether by a user or program. The exploit can then be used to gain access to your computer or information. Patches, updates, and hot-fixes are sent out to fix those exploits or make them more challenging to access. Not all of the patches are to fix exploits however. Patches can be released that add new features, increase stability, or make the software faster for example. Some computer manufacturers provide programs to help assist users with updates with minimal intervention. Some good examples of programs that assist with updating your system and checking overall computer health are Dell SupportAssist, HP Assistant, and Lenovo System Update. These are just a few examples of the many manufacturer’s programs that can assist you with updates. How to Update Windows 10 To manually update Windows 10, you can follow the instructions below: Go to search on the taskbar and type in check for updates, then click on the first result. On the next screen, click on Check for Updates. When it is done scanning, it will automatically start installing Windows updates. Below the check for updates button, you might see View Optional Updates. Optional updates is where you can get feature updates, monthly non-security updates (also called preview updates), and driver updates. Alternatively, you can click on Start  > Settings > Update & Security  > Windows Update > Check for updates. How to Uninstall a Windows 10 Update With Windows Update, you don’t always have control over which updates are installed. Sometimes bad updates are released that can cause your computer or a software to act unexpectedly. The updates could cause programs to crash, lose some functionality, or cause the dreaded Blue Screen of Death. In a business or production environment, we recommended testing the updates on a small number of computers before fully deploying them. If your computer is having issues after a recent update, you can try uninstalling it as well. Thankfully, it’s pretty easy to view and uninstall recent Windows 10 updates. If a patch for windows 10 has gone bad, it may be time to remove it. To view or uninstall a recent update, follow these steps: Go to search on the taskbar and type in check for updates, then click on the first result. On the next screen, click on View Update History. Next, click on Uninstall Updates. From here you can view the name of the update, the program and version, name of the publisher, and the date the update was installed. Click on the update you wish to remove and click on Uninstall. Windows will begin uninstalling the update and you may be prompted to restart your computer once it finishes.   How to Update Drivers in Windows 10 Updating drivers has become a lot easier with Windows 10, especially compared to previous operating systems from Microsoft. Drivers can now be installed automatically through Windows Update when you check for updates. If you would like to manually install a driver though, you can follow these steps. Manually Update Device Driver In the search box on the taskbar, enter device manager, then select Device Manager. Select a category to see names of devices, then right-click (or press and hold) the one you’d like to update. Select Search automatically for updated driver software. Select Update Driver. If Windows doesn’t find a new driver, you can try looking for one on the device manufacturer’s website and follow their instructions. If you are having an issue with a connected device and would like to try reinstalling the driver, you can also follow the steps below. Manually Reinstall a Device Driver In the search box on the taskbar, enter device manager, then select Device Manager. Right-click (or press and hold) the name of the device, and select Uninstall. Restart your PC. Windows will attempt to reinstall the driver. Keeping Your Business’s Computers Updated Manually updating your computers can take a lot of time and effort. Pennyrile Technologies can help automate this process and ensure your computers are always kept updated with the latest patches and fixes. We know updates can happen at inconvenient moments. You can’t always control when your computer decides to update itself and sometimes it happens when you’re in the middle of something. Right when you need your computer most, it can be busy installing an update and you won’t be able to use it. With our IT Support Services, we proactively manage and maintain your technology environment so all your devices are always health and updated consistently and reliably. Save yourself time and effort so you can run your business not having to  worry about keeping your computers up-to-date.

The Importance of Windows 10 Updates & Automatic Maintenance Read More »

Web Hosting

5 Easy Steps for Choosing a Good Web Host

Looking to start a new website or on the search for a new web hosting provider? You probably aren’t alone! It’s estimated there are 1.2 billion websites on the Internet as of January, 2021. Trying to search for the best web hosting provider will return hundreds of choices from the search engines and trying to determine what information is valuable or actually helpful can be daunting. With that in mind, we’ve put together a list of five steps for choosing the best web hosting provider for your business or upcoming project. We hope this will make your search just a little bit easier! Table of Contents Determine Your Needs Defining A Budget Support Needs Server Speeds Extra Features Determine Your Needs One of the first things we recommend doing is sitting down and writing a list of all your needs and a general plan for your website. Will your website only be a few pages and static (rarely updated) or will you be updating the site constantly and adding new content, or hosting lots of pictures and video? If the website is small with only a few pages then you can usually choose a web hosting plan with a small amount of storage. Typically 5GB of storage or less works for most small to medium-sized web sites. What about bandwidth? Unless you own an extremely high traffic site, then this probably won’t factor into your decision. The average website uses less than 20GB of bandwidth a month so unless you are getting 20,000 + visits a day and have lots of content on your site, a smaller plan should be fine. If you receiving that many visits a day, you should be able to log into your current host’s control panel for a breakdown of your monthly traffic. Using that information will be helpful if moving to another host. Defining A Budget For Web Hosting You probably know the old saying, “you get what you pay for”. Like many things, this is relevant to web hosting too. There are countless hosting companies out there with cheap hosting plans and minimal services. Shared hosting plans will typically start around $4.99/mo from the budget providers and go up to $24.99/mo or more if you are needing large amounts of storage and bandwidth or looking at a premium hosting. When signing up for services, also be careful to look at the fine print on renewals. Some providers may lure you in with a cheap price, but then increase your bill by 50% or more once the renewal comes! Lastly, you may be able to save money on your hosting by paying in advance for a year or more. You may want to try month-to-month at first to see if you are happy with the service they provide though. Support Needs for Web Hosting What happens when you need support from your web host? Make sure the web hosting provider you choose has good support. Many of the cheapest web hosting plans have to skimp on the services somewhere and support is usually where it’s happening. Can you call the provider and speak with a support technician in a timely manner or do you have to wait on the phone for 30 minutes to an hour or more? Some providers may only offer email-based support or chat-based support as well. What about resolution times to issues raised? If you have an issue, does it get resolved in 10-15 minutes or does it take days? Some providers may even charge extra for “premium” support where that would be considered regular support by others. Web Hosting Server Speeds Finding a web host with fast servers is important when having an online presence. It’s estimated the average user will only wait 3 seconds for a page to load before they leave a site, so choosing a host with good hardware can be very beneficial. When looking at Shared Hosting Packages, note that your website will be hosted on a server alongside other websites. Some providers may use cheaper hardware or overload their servers with too many websites to save money. Alternatively, you could look at VPS Hosting or Dedicated hosting which would grant you more dedicated resources, added security, and increased scalability. Pricing is much higher than Shared Hosting however, with VPS Hosting usually running anywhere from $20 to $100 a month. Dedicated hosting is even more expensive and typically ranges in price from $80 to as much as $500 a month. Extra Features to Look For Another thing to look for are extra features the web hosting provider offers. While some providers may include these as default in their hosting plans, others may charge extra for them which can add up rather quickly. Here are some of our favorite extra features to look for when searching for a web host provider. Free SSL Certificates – This varies a lot across providers. Some include them for free while others may charge anywhere from $5/year to more than $100/yr. If you have a website, we highly recommend installing an SSL certificate for your site. It helps secure the site for your visitors and is also a ranking factor for appearing in Google search results. Uptime Guarantee – What kind of uptime guarantee does the provider offer? An uptime guarantee of 99.9% allows for 8 hours, 45 minutes, and 56 seconds of downtime a year while a 99.99% uptime guarantee allows for only 52 minutes and 35 seconds of downtime a year. 30 Day Money-Back Guarantee – Does the provider backup their service with a 30 day money-back guarantee? If so, they are probably confident in their abilities and services they offer to their clients. Free Domain – This isn’t as common as some of the other features we look for, but it can add to additional savings. Domain renewal pricing varies wildly across registrars and hosts and usually depends on extension (.com, .net, etc.). The savings from a free domain can by anywhere from $5/yr to $20/yr or

5 Easy Steps for Choosing a Good Web Host Read More »

Cell Phone Booster Installation Guide

Cell Phone Booster Installation Guide

Cell phones have become a necessity in these trying times. They are our main form of communication for work, contacting family, or watching videos. Many people often do not have an excellent connection to the cell network. It is a common problem even if you have a well-known carrier as your cell provider. The issue usually involves: Not being close enough to a tower. Being in a building that blocks a lot of the cell signal. Having multiple towers around you that cause interference. Suppose you live or work in an area where it is hard to get a good signal for your phone. You might go about your daily activities just dealing with this connection issue, including dropped calls or reduced voice quality. A cell phone booster is an excellent way of fixing these connection issues. They take the existing signal and boost it while transmitting the signal out in key places so your phone can have a better connection. Before You Begin Before getting a cell phone booster, consider some of the following questions: Do I have no signal where I need my cell phone? Do I often need my cell phone to complete tasks? Do most of my cell phone interactions get interrupted because of signal loss? Do I have a better signal outside than I do inside? Is it possible that the building blocks the cell signal from reaching my phone? Is the distance to the closest cell tower possibly what causes my signal loss? Chances are, if you say yes to some or all of these questions, then you could benefit from a cell phone booster. Before you start, you must have at least 1 bar of usable signal outside or on the roof of the building you are installing the booster on. What do we mean by usable? You need to be able to place a call and use data reliably. When running a speed test, you should have decent upload and download speeds. Cell boosters bring signals inside from the outdoors. If the signal outside your building is not usable, the booster will not help. Choosing Your Indoor Cell Phone Booster Antenna When you purchase a cell booster, you will need to decide which types of antennas you will need for both inside and outside the premises. The most common types of indoor antenna are dome (omni-directional) and panel (directional) antennas. The dome antenna will broadcast the signal in all directions, while the panel antenna will broadcast in only one direction. Panel antennas will typically have a stronger signal because they broadcast in one direction. Because of their directionality they are better at penetrating internal walls and floors. They are typically mounted on walls and are good for spot locations. Dome antennas will broadcast the signal 360 degrees and may cover a larger area, but with a weaker signal due to their omni-directional broadcast. They are typically mounted on ceilings, but if you have very high ceilings (20 feet or higher) the signal may be reduced. Depending on the building and the area you are trying to increase your cell reception will determine which antenna you use. You may even wish to use a combination of the two. Choosing Your Outdoor Cell Phone Booster Antenna Much like the indoor antennas, you will need to choose an omni-directional antenna or directional antenna for your outdoor antenna. This antenna is responsible for receiving the signal outside the building and sending to your amplifier. An omni-directional antenna will receive cellular signals in a 360-degree window. They are great for accessing nearby cell towers and if you need to boost the signal of multiple different cell phone carriers. The directional antenna will only receive cellular signals from the general direction it is pointed. Their advantage is boosting signals from far off cellular towers or when you are dealing with weaker signals. Please note if you are using an omni-directional antenna, the antenna could become overburdened, especially within bustling urban areas. Because these antennas can pick up multiple cellular carriers, you may receive interference from multiple towers or have issues locking onto the signal of a specific tower causing dropped calls. A directional antenna is harder to set up, but they have an easier time locking onto a specific tower. On the down-side, they usually support 1 to 2 cellular providers and are limited by their angle of field due to their directional signal. Beginning Your Cell Phone Booster Installation After you have decided to purchase a cell phone booster, you will receive your booster, and then it is time for the install. The install will take some time and maybe a little more hands-on than you may like. You might decide to have someone install it for you. Then again, if you have the time and patience, you may want to install it yourself. Let us begin with the inventory of your equipment. When you receive your booster, you will typically be given: Cables Antenna Amplifier Grounding Cable Adapters Transmitters Installation Instructions The instructions included with the equipment should have a list of all the items that are in your installation package. This would also be an excellent time to read over the instructions and verify all parts are included. Pay close attention to the instructions on where to place the outdoor antenna. The outdoor antenna will receive the signal and send it to the amplifier. Before installing your booster, plan out where to place the inside antennas. Please pay close attention to how far apart they will be positioned and how much material is between them. If the antenna is too close, then there will be interference. There will not be as much coverage if they are too far apart either. If thick walls block the signal, the antenna range might not reach the surrounding rooms. This will also cause issues with coverage. Once you plan the layout for your inside antennas, we can begin finding the best position for your outside antenna. The process

Cell Phone Booster Installation Guide Read More »

Microsoft-Exchange-Vulnerability

Exchange Server Vulnerability

Microsoft Exchange Server Zero-Day Vulnerabilities Microsoft has recently notified users of multiple vulnerabilities for on-premises Exchange Servers that are being exploited by a nation-state affiliated group. These vulnerabilities exist in on-premises Exchange Servers 2010, 2013, 2016, and 2019.  Exchange Online is not affected. Microsoft highly recommends that you take immediate action to apply the patches for any on-premises Exchange deployments you have or are managing. The first priority being servers which are accessible from the Internet (e.g., servers publishing Outlook on the web/OWA and ECP). Microsoft attributes the attacks to a group it calls Hafnium, which it says is a state-sponsored threat actor that operates from China. The attackers used the bugs in on-premise Exchange servers to access email accounts of users. The four bugs are being tracked as CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065. Huntress has challenged Microsoft’s claim that Chinese hackers executed “limited and targeted attacks” against on-premises Exchange servers, arguing the scope of compromise is fairly widespread. The Ellicott City, Md.-based managed detection and response (MDR) vendor said roughly 400 of the 2,000 Exchange servers the company has checked are susceptible to the zero-day vulnerabilities being exploited by Chinese hacking group Hafnium, with an additionally 100 servers potentially vulnerable. In addition, Huntress said nearly 200 of its partners’ servers have received malicious web shell payloads. Patching Exchange Server Vulnerabilities To patch these vulnerabilities, you should move to the latest Exchange Cumulative Updates and then install the relevant security updates on each Exchange Server. You can use the Exchange Server Health Checker script, which can be downloaded from GitHub (use the latest release). Running this script will tell you if you are behind on your on-premises Exchange Server updates (note that the script does not support Exchange Server 2010). We also recommend that your security team assess whether or not the vulnerabilities were being exploited by using the Indicators of Compromise we shared here. What is Microsoft Exchange Server? Microsoft Exchange Server is a email and calendaring server operating system developed by Microsoft. It’s used primarily by businesses to run email, calendars, contacts, and scheduling. It’s an alternate option to Microsoft’s cloud platform, Microsoft 365. Many larger businesses find that it is cheaper to run their own Exchange Server than pay the monthly costs associated with Microsoft 365. Microsoft Exchange Server’s first iteration was was called Exchange Server 4.0 and was released in 1996. The latest version is Exchange Server 2019 and was released in 2018. Exchange Patching Assistance If you need assistance patching these vulnerabilities, please reach out to our network support team. Pennyrile Technologies can also assist keeping your computers and servers updated along with migrating from on-premises Exchange Servers to Exchange Online and Office 365.

Exchange Server Vulnerability Read More »

Adobe Flash Player End of Life

Adobe Flash End of Life

First announced back in July 2017, Adobe Flash has finally reached its’ end of life. As of December 31, 2020 downloads of the Flash player, as well as (presumably) any other Flash-related tools, will be removed from the Adobe websites. As of January 12, 2021, Adobe Flash Player will be disabled by default as well. Any versions that are older than KB4561600 (which was released in June 2020) will be blocked and no longer function on their own. With Flash support ending, it will begin disappearing from web browsers, websites, and applications. Even though many browsers will continue to disable Flash Player after the EOL Date and Adobe will block Flash content from running in Flash Player beginning January 12, 2021, Adobe began taking steps to help further secure users’ systems by prompting them to uninstall Flash Player starting in October 2020. To help secure users’ systems, Adobe strongly recommends removing unused components promptly.  However, enterprise administrators can suppress Flash Player uninstall prompts by setting preferences available in the Flash Player configuration files.  If you choose to suppress the uninstall prompt, this is entirely at the user’s own risk. Full details on the uninstall prompt settings and uninstalling Flash Player can be found in the Flash Player Administration guide (see ‘Suppressing EOL Uninstall Prompts’ section). For more information, you can view Adobe’s Flash Player EOL Enterprise Information Page.

Adobe Flash End of Life Read More »

Managed Business Antivirus

5 Reasons to Make the Switch to Managed Antivirus for Your Business

Antivirus for home and for business serve the same purposes: they prevent viruses, malware, and other forms of cyber threats from deleting your data and causing damage. However, when it comes to your business, there’s often much more at stake. Below are five reasons to consider making the switch to managed antivirus and even managed antispam for your business as soon as possible. #1 – There’s No Weak Link With traditional antivirus installed on every machine, individual employees are responsible for ensuring updates go through in a timely manner. All it takes is one missed update and your entire network is at risk – much like a weak link in a chain. When you choose managed antivirus instead, your employees are no longer individually responsible for the security of your network. Updates occur system-wide, routinely, and automatically. #2 – It Can’t Be Turned Off Another common issue with traditional antivirus installed on each machine is its tendency to slow things down. Because of the “hiccups,” employees will often turn off the antivirus while running multiple spreadsheets (or performing other RAM-heavy duties) and forget to turn it back on. This is another weak link, and it can wreak havoc on your network. Managed antivirus cannot be turned off at the user level. #3 – It Catches What Your Employees Don’t Today’s scammers and cyber criminals are getting better and better at what they do. There’s a good chance you’ve trained your employees in the best way to spot a phishing or spam email, but as the years go by, it’s getting more difficult to tell what’s real and what isn’t. Managed antivirus catches potentially harmful emails even when your employees cannot. #4 – Responses are Immediate If you accidentally opened an email that contained a virus, would you know it by looking? Many people wouldn’t, and by the time they figured it out, the damage could be extensive. When you choose managed antivirus, the response to any issues that slip through the cracks is immediate. In the event viruses or malware slip through your defenses, your provider will jump into action – 24 hours a day – to remove the threat. #5 – It’s More Cost Effective Licensing for individual machines and users can become quite expensive, even for small businesses with only a handful of machines. Managed antivirus tends to cost much less, and the value it provides is unbeatable. For a flat monthly fee, companies gain access to antivirus for all of their machines that is easily scalable, regularly (and automatically) updated, and free from flaws created in an unmanaged antivirus setting. Managed antivirus is a fantastic choice for businesses of all sizes. It solves many common problems, and in the event that something does go wrong, there’s a team of experts behind you to find an immediate solution. The best part is that in many cases, it’s far more cost-effective than individual licenses, but it comes with much more than just the software. A network security analysis can help you determine whether managed antivirus or other security measures are required.

5 Reasons to Make the Switch to Managed Antivirus for Your Business Read More »

Speed-Up-Windows-10-Part-Two

Speed Up Your PC With These 4 Tips

You probably don’t need us to tell you that there are a lot of things that can slow down your PC. If you’re looking to improve the overall speed of your machine, we’re here to continue some useful tips to help you along. Earlier, I began a series of quick tips to speeding up your computer.  In that article, we covered Computer Settings, Startup Programs, Disk Cleanup, and Adware & Bloatware removal. This time we are going to continue with a few more tips on increasing the performance of your computer. For those who did not read the first article but would like to, check out 4 Quick Tips To Speed Up Your PC. Defragment Your Hard Drive Lets talk about organization. Your hard drive must organize the data that is put on it.  With more data comes more responsibility.  So, to help your hard drive stay organized it is recommended that you defragment your hard drive regularly. Defragmentation involves moving all of the files on your hard disk so that the operating system can read them more quickly and efficiently. Usually this is done automatically by your operating system but sometimes it can be missed. (Note:  If you have a SSD then it is not recommended to Defragment your Drive because it could shorten its’ life.) To Defragment your hard drive 1:  Go to the Start menu. 2:  Scroll down to Windows Administrative Tools and click. 3:  Select and Click Defragment and Optimize Drives. 4:  Select the drive you would like to Defragment and Click Optimize. 5:  Wait for Defrag to complete its work. Adjust PC Power Settings After defragmenting, your computer might still be slow. This is a good opportunity to change your power settings. There are 3 types of default power settings:  Power Saver, Balanced, and High-Performance. Having your computer set to Power Saver saves on power usage but at the cost of performance, which can slow down your computer. The Balanced setting is the in between for the other two settings.  Lastly, the High-Performance setting uses more power to get the best performance. The later of the settings will eat up the power of your battery provided you are using a Laptop. To change your Power settings 1:  Go to the Start Menu 2:  Click on Windows System and Select Control Panel. 3:  In Control Panel Click on System and Security 4:  Click on Power Options. 5:  Select the High-Performance. (Note:  If you have Control Panel set to Large or Small Icons then click on Power Settings.) Turn Off File Indexing Now that you have set your power settings to your liking, lets move on to Indexing.  Indexing allows you to use the Windows 10 search function more efficiently.  It does this by indexing the files on your drives. The Indexing Service uses CPU and RAM to search for a file that you want to find.  This can slow down a computer that is already taxed on CPU and RAM usage. By turning file indexing off, it can help speed up your PC. To shut down the Windows Indexing Service 1:  Go to the Start Menu and scroll to Windows Administrative tools and click, then select and click Services. 2:  When the Services Window opens, scroll down to “Windows Search” and Right click on it and select Properties. 3:  In the Properties window click on “Stop”. The Windows Search service is the active Indexing service. Stopping this service will free up resources at the cost of being able to search quickly for your files or apps. (NOTE:  While performing actions within Services, you must have administrator privileges to make changes) Alternatively, you can turn off the file indexing for specific folders and locations by going to Start > Settings > Control Panel. Then select System and Maintenance. Click the Advanced tab, and under Performance Options, uncheck Index Now. Adjust Paging File The next item we will look at is the system paging file. This is often called Virtual Memory. This is space on your drive, usually on the C: Drive, where data can be stored that was not able to fit on the RAM of your machine. Usually, windows automatically manages this for you but sometimes you do have to take matters into your own hands. If you do not feel comfortable with changing the paging file, I recommend reading more about it and making your best judgement. To Adjust the Windows Paging File 1:  Click on File Explorer, which is the folder icon, on your task bar at the bottom of the screen.   2:  While in File Explorer, Right click on “This PC” and select “Properties”. 3:  In the System Window, Click on Advanced Settings. 4:  In System Properties, Click Settings under Visual Performance. 5:  At the top of the Performance Options window, click the Advanced Tab and click Change under Virtual Memory. 6:  In this window, you will need to know how much RAM you have in your computer.  Below is the recommended setting for a computer with 8GB of RAM.  To figure out how much Virtual Memory you will need, Multiply the amount of Ram you have by 1024.  Then Multiply that with 1.5 and 4.  They will both be the minimum and Maximum amount of Virtual Memory you will want. Here is how I figured the Initial Size and Maximum Size. I have 8GB of RAM 1GB of RAM is 1024 You would want at least 1.5 times the amount of Virtual Memory for your Initial Memory and 4 times that for your Maximum. 8GB Multiplied by 1024 would be 8194 8194 Multiplied by 1.5 would be 12280 8194 Multiplied by 4 would be 32768 I hope this Article helps to speed up your PC.  Please keep a look out for future articles where I will telling you how to set up Ready Boost and a couple of other ways you can potentially speed up your computer. Feeling intimidated by these steps? We also perform Computer Maintenance & PC Repair

Speed Up Your PC With These 4 Tips Read More »

Ransomware-Attack-Prevention

5 Tips for Avoiding Ransomware

What is Ransomware? Ransomware is a piece of malicious software that infects a computer or device and encrypts the data making it inaccessible to the user. A ransom is then demanded to regain access to the victim’s data. A time limit to pay the ransom is often imposed (usually 24-48 hours) or you risk losing access to the encrypted data forever. If a backup is unavailable or the backups were encrypted too, the victim is faced with paying the ransom to recover personal files. Payment must be paid in Bitcoin and the ransom cost can be anywhere from a few hundred dollars to thousands of dollars. Once the ransom is paid, the attacker will send a private key that will allow you to decrypt the data. Tips for Avoiding Ransomware Back up your data – This won’t prevent you from being infected with ransomware, but this is one of the most important things you can do in the fight against ransomware. Regularly backup your computer and data to an external hard drive and disconnect it from the computer. This would be considered an offline backup. Even better, backup your computer off-site with a cloud backup service so that even if you suffer a ransomware attack, you can easily restore all your data and not have to worry about paying a ransom. Keep your software updated – Make sure to regularly update your operating system and the software installed on it. Ransomware attacks can take advantage of known bugs and vulnerabilities to attack and infect devices. Watch for suspicious emails and links – Be careful clicking on any links or attachments that are emailed to you. The biggest vector for ransomware infections are emails. Even if you know the sender, be mindful the their email could be compromised and a hacker is using it to infect others. If you weren’t expecting a file or link or the wording in the email seems off, it doesn’t hurt to double check with the sender. Use a anti-spam or email security service that can help block emails before they reach your inbox. Use antivirus software – Use a reputable antivirus software and keep it updated. There are some great free antivirus softwares out there along with paid ones. If you go with a paid solution, don’t let the subscription lapse so that you stop getting security updates. DNS filtering – Using a DNS filter like OpenDNS or Cisco Umbrella can help block malicious websites, content, and ransomware. By using a large database of blacklisted sites, the filter will check against the database when resolving a DNS query and then prevent the content from loading if it is blacklisted. Dealing with a Ransomware Attack If you are dealing with a ransomware attack now, here are some tips to handle it going forward. Isolate the infected machines – Try to prevent the infection from spreading any further by isolating all infected machines. Turn off the machines and disconnect them from the network by unplugging the Ethernet cable and disabling Wi-Fi, Bluetooth, and any other networking capabilities. Speed is of the essence and the longer a machine is turned on and connected to the network, the longer it has do encrypt your files and spread to other machines. Identify the type of infection – Try to identify the type of ransomware that is being used in the attack. It can help you understand how it spreads, the types of files it encrypts and possibly how it can be removed without paying a ransom to the attacker. Change login credentials – Ransomware can spread rapidly by gathering IP addresses and credentials. If the attacker manages to compromise administrative credentials they can move laterally around networks, encrypt files and wipe out backups in the process. To ensure your system is secured and to prevent attackers from thwarting your recovery efforts, you should immediately change all admin and user credentials. Assess the damages – To determine which devices have been infected, check for recently encrypted files with strange file extension names and look for reports of odd file names or users having trouble opening files. You should try to create a comprehensive list of all affected systems and data, including network storage devices, cloud storage, external hard drive storage (including USB thumb drives), laptops, etc. Notify the authorities – Once the ransomware has been contained, you will want to report the attack to the authorities. The FBI urges ransomware victims to report ransomware incidents regardless of the outcome. Victim reporting provides law enforcement with a greater understanding of the threat, provides justification for ransomware investigations, and contributes relevant information to ongoing ransomware cases. Evaluate recovery options – Ideally, you will have backups you can restore from. The quickest and easiest way to recover from a ransomware attack is to restore your systems from a clean backup. Alternatively, you may be able to remove the malware otherwise you will need to wipe all infected systems and reinstall. Performing a complete wipe of all storage devices and reinstalling everything from scratch will ensure that no remnants of the malware linger. If you need assistance dealing with a ransomware attack, Pennyrile Technologies can help! Contact us for a free consult today!

5 Tips for Avoiding Ransomware Read More »

Cybersecurity Importance

How Much do SMBs Really Spend on Cybersecurity?

Cybersecurity. If your business is just getting started, or if you’re considering expanding, it’s important to think about what you can do to ensure that your data – and your client or customer data – remains secure. Below, you can learn more about how much SMBs really spend on cybersecurity. This can help you make better choices for your own business’s needs. SMBs and the Cybersecurity Risk Many small to medium business owners make the mistake of believing that because their companies are not as large as some of their competitors’, they are simply not at risk for cyber threats. This couldn’t be further from the truth. Numerous reports show that about half of all cyber attacks aimed at business are aimed at small business and 68% of all small businesses experienced a cyber attack in the last 12 months. Because of this, every business needs to budget for cyber security. Viruses, phishing scams, and ransomware are all very real threats regardless of your company’s size, age, or revenue. How Much Do SMBs Really Spend on Cybersecurity? For most companies, cyber security budgeting is part of IT budgeting; managed IT service providers often offer security in the form of antivirus programs and even email security as part of their packages. On average, SMBs spend 5% to 20% of their total IT spend on cybersecurity. This means that if your company spends $5000 a month on IT, you should expect to spend $250 to $1000 on cybersecurity alone. Whether you should spend 5% or 20% depends on a wide variety of factors, too. These include: Business Size – A company with two employees would need to spend less on cyber security than one with 2000 employees. Antivirus and anti-malware software, for example, is typically priced by the user, and more users command a higher price. Industry – Your industry can also play an important role in your budgeting. If you collect, manage, and share sensitive financial information, then you are a bigger cyber crime target than a company that collects very little information. Requests from Customers or Stakeholders – Finally, if your stakeholders or your customers have a desire for better protections, it is worth your time and money to explore these. How Much does a Data Breach Cost an SMB? Like many SMB owners, you may feel that $250 to $1000 per month is a lot of money to spend on cybersecurity. However, rather than viewing it as an additional expense, it’s better to see it as an insurance policy against a data breach, loss of productivity, or infrastructure. IBM’s 2019 Cost of a Data Breach Report shows that, on average, data breaches cost companies $3.92 million. Small business breaches can cost an average of $120,000 to $1.4 million – and many don’t survive unfortunately. A data breach can not only drain your bank account, but it can also close your business. If you still view cybersecurity measures as a luxury rather than a necessity, now is the time to reconsider. No matter how small your business might be, no matter what industry it’s in, and no matter how careful you and your employees might be, if you collect, manage, or share customers’ information, you can be a target. Need Help with Cybersecurity? If your business needs help with cybersecurity, call or contact Pennyrile Technologies today. We can secure your network infrastructure and devices, protect against spam and phishing attacks, train employees, monitor the dark web for leaked or stolen information and more. You can also learn more about our cybersecurity services here. Don’t wait until you’ve already had a breach before considering cybersecurity for your business!

How Much do SMBs Really Spend on Cybersecurity? Read More »