Steve Thomas - IT Consultant

Is your Android phone or tablet acting strange? Is it running slower than usual? Is it consuming a lot of mobile data fast? If any of these instances sound familiar, your device may be infected with a virus. This guide will show you how to get rid of malware in your Android device.

The lowdown on Android viruses

A virus infection on Android devices is actually incredibly rare. Seeing pop-up ads prompting you to buy a virus removal app doesn’t automatically mean your device is infected. In fact, buying one of these apps could get your device infected by a virus! That’s because all Android viruses are contracted via apps you install on the device. To avoid getting infected, install only apps from the Google Play app store. If you must buy one from third-party stores, do some research first.

If you suspect that your device has been infected, here’s what you can do:

  • Use antivirus apps from Google Play or Google Play Protect – A lot of these are free and will detect and remove malicious apps, but some have a tendency to report apps as infected when they’re actually completely fine.
  • Perform a factory reset – If a virus has infected your phone, this is a surefire way to remove it. However, in doing so you return your phone to its original factory settings. That means you’ll lose all data that you haven’t backed up.

If your device has been infected, here are ways to remove the virus.

  1. Turn safe mode on. To do this, access the power-off options by pressing the power button, then press and hold Power Off. This gives you the option to restart in safe mode. However, this doesn’t work with all Android phones or tablets. If it doesn’t work with your device, a quick Google search will pull up model-specific instructions. Turning on safe mode prevents any malware from running.
  2. Search for the infected app. Do this by opening Settings and then Apps. Check the Download tab (since the virus can only be something you’ve downloaded), and then start searching for the suspected app. If you don’t know the virus’s name, it’s likely something that looks suspicious.
  3. Uninstall the app. Yes, it’s really that simple. Just click on the suspected app and uninstall it. Then you’re done. But if the name of the app is grayed out and can’t be tapped, it means the virus has given itself Device Administration Status. In this case, follow the next three steps below.
  4. Remove Administrator status: Do this by tapping on Settings and Security, then Device Administrators. Simply uncheck the infected app and hit Deactivate on the next screen.
  5. Uninstall the app. When you return to the Apps menu, the infected app will no longer be grayed out. Simply uninstall it.
  6. Restart your device. This takes it out of safe mode. Now your phone will be protected from viruses.

Want more ideas for Android and IT security? Don’t hesitate to give us a call today.

Your smartphone and/or tablet are essential to your day-to-day tasks. Should they get infected by viruses, would you know what steps to take? If you’re using an Android device, you’re in luck. This guide can help you remove viruses on your Android phone or tablet.

The lowdown on Android viruses

A virus infection on Android devices is actually incredibly rare. Seeing pop-up ads prompting you to buy a virus removal app doesn’t automatically mean your device is infected. In fact, buying one of these apps could get your device infected by a virus! That’s because all Android viruses are contracted via apps you install on the device. To avoid getting infected, install only apps from the Google Play app store. If you must buy one from third-party stores, do some research first.

If you suspect that your device has been infected, here’s what you can do:

  • Use antivirus apps from Google Play or Google Play Protect – A lot of these are free and will detect and remove malicious apps, but some have a tendency to report apps as infected when they’re actually completely fine.
  • Perform a factory reset – If a virus has infected your phone, this is a surefire way to remove it. However, in doing so you return your phone to its original factory settings. That means you’ll lose all data that you haven’t backed up.

If your device has been infected, here are ways to remove the virus.

  1. Turn safe mode on. To do this, access the power-off options by pressing the power button, then press and hold Power Off. This gives you the option to restart in safe mode. However, this doesn’t work with all Android phones or tablets. If it doesn’t work with your device, a quick Google search will pull up model-specific instructions. Turning on safe mode prevents any malware from running.
  2. Search for the infected app. Do this by opening Settings and then Apps. Check the Download tab (since the virus can only be something you’ve downloaded), and then start searching for the suspected app. If you don’t know the virus’s name, it’s likely something that looks suspicious.
  3. Uninstall the app. Yes, it’s really that simple. Just click on the suspected app and uninstall it. Then you’re done. But if the name of the app is grayed out and can’t be tapped, it means the virus has given itself Device Administration Status. In this case, follow the next three steps below.
  4. Remove Administrator status: Do this by tapping on Settings and Security, then Device Administrators. Simply uncheck the infected app and hit Deactivate on the next screen.
  5. Uninstall the app. When you return to the Apps menu, the infected app will no longer be grayed out. Simply uninstall it.
  6. Restart your device. This takes it out of safe mode. Now your phone will be protected from viruses.

Want more ideas for Android and IT security? Don’t hesitate to give us a call today.

It’s common for computers to get infected by viruses, but did you know that your tablet or smartphone is prone to viruses and other malware infections, too? If your device is acting funny, and you think that a virus is causing the problem, these information and tips might help.

The lowdown on Android viruses

A virus infection on Android devices is actually incredibly rare. Seeing pop-up ads prompting you to buy a virus removal app doesn’t automatically mean your device is infected. In fact, buying one of these apps could get your device infected by a virus! That’s because all Android viruses are contracted via apps you install on the device. To avoid getting infected, install only apps from the Google Play app store. If you must buy one from third-party stores, do some research first.

If you suspect that your device has been infected, here’s what you can do:

  • Use antivirus apps from Google Play or Google Play Protect – A lot of these are free and will detect and remove malicious apps, but some have a tendency to report apps as infected when they’re actually completely fine.
  • Perform a factory reset – If a virus has infected your phone, this is a surefire way to remove it. However, in doing so you return your phone to its original factory settings. That means you’ll lose all data that you haven’t backed up.

If your device has been infected, here are ways to remove the virus.

  1. Turn safe mode on. To do this, access the power-off options by pressing the power button, then press and hold Power Off. This gives you the option to restart in safe mode. However, this doesn’t work with all Android phones or tablets. If it doesn’t work with your device, a quick Google search will pull up model-specific instructions. Turning on safe mode prevents any malware from running.
  2. Search for the infected app. Do this by opening Settings and then Apps. Check the Download tab (since the virus can only be something you’ve downloaded), and then start searching for the suspected app. If you don’t know the virus’s name, it’s likely something that looks suspicious.
  3. Uninstall the app. Yes, it’s really that simple. Just click on the suspected app and uninstall it. Then you’re done. But if the name of the app is grayed out and can’t be tapped, it means the virus has given itself Device Administration Status. In this case, follow the next three steps below.
  4. Remove Administrator status: Do this by tapping on Settings and Security, then Device Administrators. Simply uncheck the infected app and hit Deactivate on the next screen.
  5. Uninstall the app. When you return to the Apps menu, the infected app will no longer be grayed out. Simply uninstall it.
  6. Restart your device. This takes it out of safe mode. Now your phone will be protected from viruses.

Want more ideas for Android and IT security? Don’t hesitate to give us a call today.

A data breach can happen to anyone, even to the most secure businesses or financial institutions — and cybercriminals could even attack your company’s network. How can you be sure your network is completely hacker-safe? As a business owner, you can’t afford a data breach, as it could cost you your clients and reputation. Employing strict security measures can make any cybercriminal think twice about trying to break into your network. Here are some tips to protect your corporate data.

Use Two-Factor Authentication

Using a complicated password to secure your system is no longer an effective way to solve the issue of cybersecurity. We tend to use that same complex password in our email accounts or bank accounts, and if one of your logins is compromised, this can result in grave consequences.

Two-factor authentication (2FA) adds an extra layer of security for your systems and accounts. It can be biometric verification for devices that you own, or a time-sensitive auto-generated code that is sent to your mobile phone. This security feature works in the same way websites would require you to confirm your email address. They want to make sure that you’re not a bot or anything else.

Encrypt all data

Encryption is a great obstruction to hackers, since it scrambles and descrambles data every time someone tries to read it. Encryption also causes compatibility issues if the data is not being accessed via the company’s own network systems. While applying encryption can be costly, it is certainly well worth the money if it can protect your business data from falling into the wrong hands.

Keep systems up to date

Technology is moving at a fast pace. Hackers are always upgrading their tools to take advantage of outdated security systems, so companies should do likewise to protect their valuable resources. Yet many companies don’t install software updates immediately. If the update closes existing security loopholes, delaying an update exposes you to external attacks. So install software updates as soon as they are released.

Back up frequently

Although you’ve implemented several layers to your security, sometimes hackers can still find their way in. This is why you need to back up data frequently, whether it’s on-site, off-site, or by way of cloud backups. In the worst-case scenario where your systems do get infiltrated, you can restore lost data from those backups.

Monitor connectivity

Many businesses have no idea how many computers they have, so it’s very hard to keep track of which computers are online. Sometimes a company’s computers and servers are online when they don’t need to be, making them tempting targets for attackers. It’s advisable to configure business servers properly, ensuring that only necessary machines are online and that they’re well-protected.

It’s much more expensive to recover from a data breach than to prevent one. If you’re looking to protect your business IT systems for potential threats, contact us today so we can help.

You can’t afford to lose business data. It takes away the trust of your clients, leading to loss of revenue. Cybercriminals are here to stay, so it’s more important than ever to utilize tight security measures to keep your business data safe. Still, some hackers may have advanced cracking skills, or are really determined to break into your network, so it’s a good idea to use the following methods for safeguarding your corporate data.

Use Two-Factor Authentication

Using a complicated password to secure your system is no longer an effective way to solve the issue of cybersecurity. We tend to use that same complex password in our email accounts or bank accounts, and if one of your logins is compromised, this can result in grave consequences.

Two-factor authentication (2FA) adds an extra layer of security for your systems and accounts. It can be biometric verification for devices that you own, or a time-sensitive auto-generated code that is sent to your mobile phone. This security feature works in the same way websites would require you to confirm your email address. They want to make sure that you’re not a bot or anything else.

Encrypt all data

Encryption is a great obstruction to hackers, since it scrambles and descrambles data every time someone tries to read it. Encryption also causes compatibility issues if the data is not being accessed via the company’s own network systems. While applying encryption can be costly, it is certainly well worth the money if it can protect your business data from falling into the wrong hands.

Keep systems up to date

Technology is moving at a fast pace. Hackers are always upgrading their tools to take advantage of outdated security systems, so companies should do likewise to protect their valuable resources. Yet many companies don’t install software updates immediately. If the update closes existing security loopholes, delaying an update exposes you to external attacks. So install software updates as soon as they are released.

Back up frequently

Although you’ve implemented several layers to your security, sometimes hackers can still find their way in. This is why you need to back up data frequently, whether it’s on-site, off-site, or by way of cloud backups. In the worst-case scenario where your systems do get infiltrated, you can restore lost data from those backups.

Monitor connectivity

Many businesses have no idea how many computers they have, so it’s very hard to keep track of which computers are online. Sometimes a company’s computers and servers are online when they don’t need to be, making them tempting targets for attackers. It’s advisable to configure business servers properly, ensuring that only necessary machines are online and that they’re well-protected.

It’s much more expensive to recover from a data breach than to prevent one. If you’re looking to protect your business IT systems for potential threats, contact us today so we can help.

Some of the most well-known companies in the world have been victims of cyberattacks, including Sony Pictures, Home Depot, Adobe, and eBay. While major corporations are high-profile targets for hackers, small- and medium-sized businesses are not exempt, so they need to secure their networks and data. It may be difficult or impossible to undo any damage caused by cybercriminals, so it’s imperative for you to take certain steps to prevent it. Applying the following security tips can help guard your company’s data.

Use Two-Factor Authentication

Using a complicated password to secure your system is no longer an effective way to solve the issue of cybersecurity. We tend to use that same complex password in our email accounts or bank accounts, and if one of your logins is compromised, this can result in grave consequences.

Two-factor authentication (2FA) adds an extra layer of security for your systems and accounts. It can be biometric verification for devices that you own, or a time-sensitive auto-generated code that is sent to your mobile phone. This security feature works in the same way websites would require you to confirm your email address. They want to make sure that you’re not a bot or anything else.

Encrypt all data

Encryption is a great obstruction to hackers, since it scrambles and descrambles data every time someone tries to read it. Encryption also causes compatibility issues if the data is not being accessed via the company’s own network systems. While applying encryption can be costly, it is certainly well worth the money if it can protect your business data from falling into the wrong hands.

Keep systems up to date

Technology is moving at a fast pace. Hackers are always upgrading their tools to take advantage of outdated security systems, so companies should do likewise to protect their valuable resources. Yet many companies don’t install software updates immediately. If the update closes existing security loopholes, delaying an update exposes you to external attacks. So install software updates as soon as they are released.

Back up frequently

Although you’ve implemented several layers to your security, sometimes hackers can still find their way in. This is why you need to back up data frequently, whether it’s on-site, off-site, or by way of cloud backups. In the worst-case scenario where your systems do get infiltrated, you can restore lost data from those backups.

Monitor connectivity

Many businesses have no idea how many computers they have, so it’s very hard to keep track of which computers are online. Sometimes a company’s computers and servers are online when they don’t need to be, making them tempting targets for attackers. It’s advisable to configure business servers properly, ensuring that only necessary machines are online and that they’re well-protected.

It’s much more expensive to recover from a data breach than to prevent one. If you’re looking to protect your business IT systems for potential threats, contact us today so we can help.

Many business owners tend to ignore the server room or pretend that it doesn’t exist. But this won’t change the fact that it can wreak havoc on your electric bills. Before you suffer, read this article to lower your energy bills. 

Perform an energy audit

There’s a good chance your IT staff has never thought about how much energy your server room and data center are consuming. The first thing to do to rectify the problem is to identify how much power is being used. 

To get you started, here are a few questions to ask: 

  • How much of the data center’s power budget goes to support systems?
  • How much goes to IT systems?
  • How much IT output do you get for every kilowatt/hour of power used by your data center IT systems? 

Answering these questions will help you determine just how efficient, or inefficient, your data center is. 

Decrease IT workload

When you save a single watt of energy at the server level, you save nearly 3 watts in data center costs. 

How do you decrease the IT workload? Virtualization is a common and effective tactic. Instead of wasting money on cooling the servers in your data center, have them hosted by your IT provider and have their technology delivered to you via the internet. This allows you to eliminate some servers from your office and reduce cooling costs. 

For alternate ways to decrease server workload, you can also: 

  • Eliminate unused servers
  • Consolidate servers
  • Purchase more energy-efficient technology 

Mind humidity and temperature levels

Because many non-IT personnel don’t understand the data center, they assume incorrectly that the room must be kept as cold as the North Pole to protect sensitive data. This is not true. 

While excessively high temperatures, humidity, or dry conditions can harm your data, most modern-day data center equipment can withstand a wide range of humidity levels and temperatures. Because of this, you need less cooling and dehumidification. Consult an IT professional for the right temperature. 

You can also cool down your data center with an economizer system. This technology uses cool air from the outside to provide “free” cooling cycles for your data center. 

Want more tips on reducing your overall IT bill? Curious to learn more about virtualization? Call us today to talk to our experts.

Data centers can be costly, more so if they quickly drain your resources. How much do you spend on them every month? Don’t be afraid to calculate your expenses since there’s a lot you can do to keep costs under control. Here are a few suggestions to keep in mind. 

Perform an energy audit

There’s a good chance your IT staff has never thought about how much energy your server room and data center are consuming. The first thing to do to rectify the problem is to identify how much power is being used. 

To get you started, here are a few questions to ask: 

  • How much of the data center’s power budget goes to support systems?
  • How much goes to IT systems?
  • How much IT output do you get for every kilowatt/hour of power used by your data center IT systems? 

Answering these questions will help you determine just how efficient, or inefficient, your data center is. 

Decrease IT workload

When you save a single watt of energy at the server level, you save nearly 3 watts in data center costs. 

How do you decrease the IT workload? Virtualization is a common and effective tactic. Instead of wasting money on cooling the servers in your data center, have them hosted by your IT provider and have their technology delivered to you via the internet. This allows you to eliminate some servers from your office and reduce cooling costs. 

For alternate ways to decrease server workload, you can also: 

  • Eliminate unused servers
  • Consolidate servers
  • Purchase more energy-efficient technology 

Mind humidity and temperature levels

Because many non-IT personnel don’t understand the data center, they assume incorrectly that the room must be kept as cold as the North Pole to protect sensitive data. This is not true. 

While excessively high temperatures, humidity, or dry conditions can harm your data, most modern-day data center equipment can withstand a wide range of humidity levels and temperatures. Because of this, you need less cooling and dehumidification. Consult an IT professional for the right temperature. 

You can also cool down your data center with an economizer system. This technology uses cool air from the outside to provide “free” cooling cycles for your data center. 

Want more tips on reducing your overall IT bill? Curious to learn more about virtualization? Call us today to talk to our experts.

Is your data center sucking you dry like a vampire? Many business owners would like to believe that the server room and data center don’t exist. But whether you acknowledge them or not, they could be eating up your resources every month. Here’s what to do to cut costs. 

Perform an energy audit

There’s a good chance your IT staff has never thought about how much energy your server room and data center are consuming. The first thing to do to rectify the problem is to identify how much power is being used. 

To get you started, here are a few questions to ask: 

  • How much of the data center’s power budget goes to support systems?
  • How much goes to IT systems?
  • How much IT output do you get for every kilowatt/hour of power used by your data center IT systems? 

Answering these questions will help you determine just how efficient, or inefficient, your data center is. 

Decrease IT workload

When you save a single watt of energy at the server level, you save nearly 3 watts in data center costs. 

How do you decrease the IT workload? Virtualization is a common and effective tactic. Instead of wasting money on cooling the servers in your data center, have them hosted by your IT provider and have their technology delivered to you via the internet. This allows you to eliminate some servers from your office and reduce cooling costs. 

For alternate ways to decrease server workload, you can also: 

  • Eliminate unused servers
  • Consolidate servers
  • Purchase more energy-efficient technology 

Mind humidity and temperature levels

Because many non-IT personnel don’t understand the data center, they assume incorrectly that the room must be kept as cold as the North Pole to protect sensitive data. This is not true. 

While excessively high temperatures, humidity, or dry conditions can harm your data, most modern-day data center equipment can withstand a wide range of humidity levels and temperatures. Because of this, you need less cooling and dehumidification. Consult an IT professional for the right temperature. 

You can also cool down your data center with an economizer system. This technology uses cool air from the outside to provide “free” cooling cycles for your data center. 

Want more tips on reducing your overall IT bill? Curious to learn more about virtualization? Call us today to talk to our experts.

In these times of internet fraud, phishing scams, and high-profile hacks, you can never be too careful. Even if you think you have enough precautions in place, it always helps to take another look at your online safety. Here are some browser extensions you can add to improve your online security.

Prevent browser tracking

If you don’t like the idea of a third party being able to track your browsing habits, try installing a tool that offers private browsing. These programs offer protection against tracking by blocking third-party cookies as well as malware. Some extensions also boast secure Wi-Fi and bandwidth optimization and can guard against tracking and data collection from social networking sites such as Twitter or Facebook. Some examples include Disconnect, uBlock Origin, and Ghostery.

Blocking ads

While online ads may seem harmless, the truth is that they can contain processes that might send your data back to a third party. A decent ad blocking program, like AdBlock Plus and uBlock Origin, will block banner, rollover, and pop-up ads, and also prevent you from inadvertently visiting a malicious site. Many blockers contain additional features such as the ability to disable cookies and scripts used by third parties on websites, the option to block specific items, and even “clean up” Facebook, and hide YouTube comments. The major blockers work with Google Chrome, Safari, and Firefox, and you’ll be able to find everything from user-friendly solutions to more advanced tools that are customizable down to the tiniest degree.

Consider installing a VPN

A VPN (virtual private network) browser extension is a simple way to connect your web browser to a VPN server. VPNs encrypt your internet traffic, effectively shutting out anyone who may be trying to see what you’re doing, and then routes it through the server to hide your location and IP address. Commonly used in countries such as China where the internet is heavily censored by the government, a VPN enables users to access blocked sites — in China’s case, that’s anything from blogs criticizing the government to Facebook and Instagram. There are a huge number of VPN browser extensions in the market, like NordVPN and ExpressVPN, so do a little research and find one that suits you best.

If you’d like to know more about staying safe on the internet or would like to schedule a security assessment for your company, get in touch with us today.

Think you’ve got enough online security measures in place within your company? It’s hard to tell since you’ll never really know what the next malware or online scam will bring. Plus, it only takes one employee’s mistake to put the company in danger. It’s time to add another layer of online security using browser extensions.

Prevent browser tracking

If you don’t like the idea of a third party being able to track your browsing habits, try installing a tool that offers private browsing. These programs offer protection against tracking by blocking third-party cookies as well as malware. Some extensions also boast secure Wi-Fi and bandwidth optimization and can guard against tracking and data collection from social networking sites such as Twitter or Facebook. Some examples include Disconnect, uBlock Origin, and Ghostery.

Blocking ads

While online ads may seem harmless, the truth is that they can contain processes that might send your data back to a third party. A decent ad blocking program, like AdBlock Plus and uBlock Origin, will block banner, rollover, and pop-up ads, and also prevent you from inadvertently visiting a malicious site. Many blockers contain additional features such as the ability to disable cookies and scripts used by third parties on websites, the option to block specific items, and even “clean up” Facebook, and hide YouTube comments. The major blockers work with Google Chrome, Safari, and Firefox, and you’ll be able to find everything from user-friendly solutions to more advanced tools that are customizable down to the tiniest degree.

Consider installing a VPN

A VPN (virtual private network) browser extension is a simple way to connect your web browser to a VPN server. VPNs encrypt your internet traffic, effectively shutting out anyone who may be trying to see what you’re doing, and then routes it through the server to hide your location and IP address. Commonly used in countries such as China where the internet is heavily censored by the government, a VPN enables users to access blocked sites — in China’s case, that’s anything from blogs criticizing the government to Facebook and Instagram. There are a huge number of VPN browser extensions in the market, like NordVPN and ExpressVPN, so do a little research and find one that suits you best.

If you’d like to know more about staying safe on the internet or would like to schedule a security assessment for your company, get in touch with us today.

Protecting yourself, your employees, and your business when you’re using the internet is necessary if you want to remain safe, productive, and profitable. Given the proliferation of phishing attacks, hacks, and online fraud, we all need to ramp up our online security measures. Here are some ways to bolster security using browser extensions.

Prevent browser tracking

If you don’t like the idea of a third party being able to track your browsing habits, try installing a tool that offers private browsing. These programs offer protection against tracking by blocking third-party cookies as well as malware. Some extensions also boast secure Wi-Fi and bandwidth optimization and can guard against tracking and data collection from social networking sites such as Twitter or Facebook. Some examples include Disconnect, uBlock Origin, and Ghostery.

Blocking ads

While online ads may seem harmless, the truth is that they can contain processes that might send your data back to a third party. A decent ad blocking program, like AdBlock Plus and uBlock Origin, will block banner, rollover, and pop-up ads, and also prevent you from inadvertently visiting a malicious site. Many blockers contain additional features such as the ability to disable cookies and scripts used by third parties on websites, the option to block specific items, and even “clean up” Facebook, and hide YouTube comments. The major blockers work with Google Chrome, Safari, and Firefox, and you’ll be able to find everything from user-friendly solutions to more advanced tools that are customizable down to the tiniest degree.

Consider installing a VPN

A VPN (virtual private network) browser extension is a simple way to connect your web browser to a VPN server. VPNs encrypt your internet traffic, effectively shutting out anyone who may be trying to see what you’re doing, and then routes it through the server to hide your location and IP address. Commonly used in countries such as China where the internet is heavily censored by the government, a VPN enables users to access blocked sites — in China’s case, that’s anything from blogs criticizing the government to Facebook and Instagram. There are a huge number of VPN browser extensions in the market, like NordVPN and ExpressVPN, so do a little research and find one that suits you best.

If you’d like to know more about staying safe on the internet or would like to schedule a security assessment for your company, get in touch with us today.