• Skip to primary navigation
  • Skip to main content

  • Home
  • Services
    • Network Security
    • Remote Support
    • Network Architecture
    • Patch Management
    • System Backups
    • Managed IT Services
  • Blog
  • Contact Us
  • Show Search
Hide Search

Brittany Howard

What Is Two-Factor Authentication And Does It Work?

March 2, 2020 By Brittany Howard Leave a Comment

Image by Anna Redden

We’ve all had this experience before. You want to login to your account on a website, so you enter your username and password. Then a message pops up asking you to enter a code that’s been texted to your phone. Or maybe you have to answer a security question: What is your mother’s maiden name? Who was your sixth-grade teacher? What is your pet’s name?

If you’re like many people, you find this a hassle. “Why can’t I just enter my password and do what I need to do?” you may wonder. “Is this really necessary?”

What you’ve encountered is a security process called two-factor authentication (or 2FA). Two-factor authentication works by requiring users to sign in to their account by proving their identity in two different ways. For example, you likely have to insert a debit card and enter a PIN to access your bank account from an ATM. The debit card is one factor—or one way of verifying your identity—and the PIN is the second factor. Typically with this kind of security, users prove their identity by having two of three types of credentials:

  • Something you know, such as a personal identification number (PIN), password or a pattern;
  • Something you have, such as an ATM card, phone, or fob;
  • Or something you are, such as a biometric like a fingerprint or voice print.

But why do some websites and apps require this additional layer of security? Is it necessary, and most importantly, does it work?

The Need For Better Security

On our network security page, we describe the growing number of sophisticated cyber-attacks being launched around the world. We’ve also written about scams and phishing schemes that target both individual users and big businesses. But you don’t really need us to tell you that security is a big deal. You see coverage on the news and social media about powerful malware and its ability to infiltrate your devices, and these stories crop up all the time. That’s because in the first six months of 2019 cyber-attacks were up 200%.

The purpose of two-factor authentication is to make it harder for hackers and bots to access your accounts. By incorporating a second factor of authentication, 2FA can stop or significantly slow down bad actors.

Besides providing an additional step for hackers to go through, two-factor authentication strengthens your security because passwords really aren’t that safe. Using computers, hackers can test billions of potential password combinations in seconds, searching until they find one that works. Plus, most users don’t create very strong passwords, opting for something that is easy to remember—and easy to guess. And since 65% of people use the same password for multiple accounts, one of your accounts being compromised can lead to multiple accounts being compromised. Two-factor authentication attempts to compensate for our poor security practices.

Does Two-Factor Authentication Work?

There is no perfect fix for cybercrime, and 2FA is not without its own weaknesses. Seth Rosenblatt and Jason Cipriani of CNET point out that in 2011, security company RSA admitted that its SecurID authentication tokens had been compromised. These tokens were either physical objects (like fobs or USB sticks) or software that would generate a new authentication code every 60 seconds. This authentication code was the second factor of authentication needed for each site the users logged into with SecurID. With access to those tokens, hackers had access to users’ accounts all over the web.

However, the RSA breach was not a failure of 2FA, but the result of a phishing attack where an employee opened a file through his email, unleashing malware that fed data to hackers. Phishing attacks are one of the most common ways to work around two-factor authentication. Usually, these attacks come in the form of emails that ask users to visit a website and login to their account. When users click the embedded link and enter their credentials, they are actually transferring their login information to bad actors.

Another problem is users or sites disabling this security feature. 2FA does create an extra step in the sign-in process, and for this reason, some people choose to disable it. Other times websites disable their own two-factor authentication. For example, many websites disable 2FA when you begin their password recovery process, leaving your account temporarily more vulnerable. Hackers have workarounds to exploit password recovery, which is why many websites now email you if someone attempts password recovery for your account.

Similarly, it’s common for users to save passwords in a browser like Chrome. While convenient, many of these tools are not secure and a malicious plugin can very quickly save and export all of your login information. And, of course, your passwords are also available to anyone who uses your computer.

The Argument For Enabling Two-Factor Authentication

2FA is imperfect, but adding that second authentication factor makes it much, much harder for someone to steal your information. And by practicing good security habits, you can greatly improve the effectiveness of 2FA. Here are some tips for better cybersecurity:

  • Create strong passwords. Longer passwords are better, and a mix of numbers, letters, and special characters complicate password breaking for hackers.
  • Use a password manager. These programs will generate and remember long, random passwords for you. Password managers make it easy for you to have a strong, unique password for each account you access without you having to memorize them (or write them on sticky notes).
  • Be suspicious of emails and texts from unfamiliar users. If a text or email asks you to enter personal information, definitely double-check that the message is coming from a source you know. And never send personal information through email or text; go to the actual website to share information.

Want more information about online security? Then don’t miss our blog posts Safe Online Shopping Tips For The Holidays and Does My Android Device Need Virus Protection? They’re full of tips and tricks on navigating the internet safely with all your devices.

TracSoft takes security seriously, which is why we offer our clients state-of-the-art network security services. Using both hardware and software, we create layers of protection for your business network and provide 24/7 monitoring to prevent and control data breaches. Contact TracSoft today to find out how we can protect the data that drives your business.

PC Cleanup: Tips To Improve PC Performance

February 24, 2020 By Brittany Howard Leave a Comment

PC Cleanup
Image by Anna Redden

PC cleanup is an often-overlooked way to increase your productivity. After all, when your computer runs at its peak, you can run at yours. Over time, simply using your computer in routine ways can cause it to build up clutter and slow down. If it’s been a while since you’ve given yours a tune-up, or if you’ve never done any kind of maintenance on your computer before, now is a great time to start.

But what is basic PC cleanup? Are there really things you can do to improve PC performance or make your PC run faster?

Yes! PC cleanup doesn’t require a lot of time or pricey software, and you don’t have to be a professional to do some of the most essential things for improving your computer’s performance. Here are five quick and easy steps TracSoft suggests for improving your PC’s performance.

Remove Bloatware

“Bloatware” (sometimes called “crapware”) is unnecessary, unwanted software that comes free on your computer. This can be games or software trials, or even full programs. Usually, they are advertisements for additional software rather than useful tools. The problem with bloatware is that it takes up resources from your PC.

To remove bloatware, click on the Start button and go to Programs and features. This will provide you with a list of programs, their size, and information on how often you’ve used them. You can also choose to delete them from here. If you’re not sure what a program is, it’s a good idea to do a quick internet search to make sure the software isn’t necessary for your computer to function. If it’s unnecessary, delete it.

Choose Which Programs Run At Startup

When your computer turns on, it can be slowed down if it opens too many software programs at once. Many computers are set up in the factory for certain unnecessary programs to open when the computer starts running, so by changing this setting, you can speed up your boot time. 

To change which programs open when your computer starts, press Ctrl-Shift-Esc. This will open a program called Task Manager. Choose “more details” at the bottom of this window and you will see a list of programs running on your computer and how much of your computer’s resources each program uses. Right-clicking on a program will allow you to change how that program runs on your PC, and you can set many of these programs to not open automatically.

Run Disk Cleanup

Your computer relies on temporary files in order to be able to do many of its functions. These temporary files include bits of internet code from web pages, old documents in the Recycle Bin, installation files for programs, setup logs, and more. Over time, these old files create a drain on your computer’s system, slowing everything down. One easy way to improve PC performance is to run Disk Cleanup, which will delete all of these built-up files in just a few clicks. 

  1. Disk Cleanup comes installed on Windows devices and using it is pretty simple. In the search bar, type Disk Cleanup and select the program from the options Windows presents. Or you can go to the Windows Start button, select Computer, right-click on your C drive, and select Properties. From there, select the General tab and choose “Disk Cleanup.” 
  2. Once Disk Cleanup is open, choose the types of files you want to delete. All of the files here are temporary files your computer uses for short-term functions, so you can’t hurt anything by deleting them. After choosing your files, click “Clean up system files.” Depending on how long it’s been since you last used this program, it may take a few minutes to gather and remove all of these files.
  3. When everything has been deleted, you can restart your PC and enjoy a smoother, slightly faster experience.
  • open disk cleanup
  • run disk cleanup

Defragment and Optimize Drives

Fragmentation in a PC is a problem where your computer does not store files efficiently. The files get broken into pieces and stored in separate places from one another. This makes retrieving those files slower, and you can actually lose storage space on your system over time.  Similar to Disk Cleanup, Optimize Drives is another tool included in Windows that can be useful for cleaning up your PC. This tool reviews your system and moves files into a more efficient order. 

You can access Optimize Drives from the search bar. When the tool opens, you can Analyze the drive to see if optimization is necessary, or you can simply choose Optimize and let the tool do its thing. You can also select Change Settings to schedule a time for this program to run automatically. 

Restart Your Computer

This one might sound silly, but simply restarting your computer at least once a week is one of the simplest and most effective methods of PC cleanup. Restarting helps to clear your PC’s short-term memory (known as RAM, or Random Access Memory), which will make your PC faster. 

Restarting also allows your computer to make small corrections to programs or processes that aren’t running correctly. Restarting closes all programs that are running, including programs in the background that you might not even be aware of. Some software you run requires other background software to operate. Occasionally these background programs don’t close when they should, draining processing power from your PC, but restarting your computer resolves this.

Restarting is one of the best ways to fix bugs and glitches, and it’s a good way to keep your PC running well for longer.

One way to keep your business’ computer network running well is through regular updates and patches. Installing these updates can take time and they bring the risk software incompatibilities, security vulnerabilities, and more. Trust TracSoft Tech’s secure and dependable patch management services to manage your updates for you. Contact us today to find out how we can remotely and securely install the latest patches for your network.

If your company’s computer network is running poorly, TracSoft Tech offers reliable remote support. We handle routine maintenance and resolve major issues with fast response times and flexible support options. Find out how TracSoft can keep your systems running optimally without disruption to your office environment.

How The Pocket App Will Turn You Into A Reader

February 17, 2020 By Brittany Howard 2 Comments

reading on pocket app

For the month of February, TracSoft has been talking about productivity and self-improvement. We’ve discussed using professional skills courses to advance at work and using social media management tools to make your social media marketing more effective. Today we’re going to explore Pocket, an app that can help you better keep track of fun or useful content you discover online.

Pocket was launched in 2007 by Mozilla Corporations, the company that developed the Firefox browser. Initially called Read It Later, the app was a way to keep track of articles you wanted to read but didn’t have time for right away. It had both a paid and a free version at that time, but was relaunched in 2012 as Pocket and made all of its features available for free (although additional premium features have since been added). 

The way that Pocket works is similar to the way bookmarks work. If you find something you want to view later, you simply save it using the Chrome browser extension, by going to the Pocket website and saving the URL there, or by emailing the article to add@getpocket.com. Once a URL is saved, it will sync across all of your devices, meaning you can access it via the Pocket website, desktop app, or mobile app. And beyond text-based articles, Pocket will let you save just about anything from a YouTube video to a Tweet.

What Are The Advantages Of Using Pocket?

Maybe you’re thinking you don’t need an app for saving URLs. After all, you could simply bookmark things. However, Pocket has some major advantages over traditional bookmarks. For instance, it offers the option to tag all content you save. This makes it much easier to sort the information in your account. For example, I personally have a “Fitness” tag where I save all the articles I want to read about working out safely, another “To Read” tag where I save information about books I want to read, and another “Professional Development” tab with articles about my job or industry.

If that’s not enough to lure you away from messy bookmarks, another benefit is that Pocket is optimized for reading. We’ve all experienced the struggle of trying to read good information on a bad website that’s overblown with flashing banners, video ads, and such. When you pull up the same article in Pocket, the app will strip away all those distractions, allowing you to fully focus on the content. You can change the font size in the app and choose from a light, dark, or sepia theme, making the app great for bedtime reading.  You can even save highlighting in the app. 

Is The Pocket App Right For You?

Pocket consistently rates high on lists of the best productivity apps. At first glance, a reading app might seem an odd choice for such a list, but the app really does make reading on the go much simpler. Pocket doesn’t just save a URL. It actually archives web pages, meaning you can continue reading if you lose signal or find yourself off the grid. You can even use Pocket’s text-to-speech reading feature to listen to articles during your commute, helping you maximize your time. This can be a great way to catch up on changes in your field or relevant news before you even arrive at the office.

Speaking of which, Pocket’s “Discover” tool is a nice way to find more content that is similar to what you’ve already read. If you use Pocket to stay updated on certain fields or industries, the app will curate the best of this type of content to share with you, creating your own personalized stream of professional development and news. 

For those who are easily distracted, Pocket is a nice way to stay focused. Say your friend shares a fun video on social media, but you don’t have time to watch it, yet you’re afraid you’ll forget to watch it if you put it off until later. For many people, knowing they can save that video (or status update, or Buzzfeed quiz, or whatever) gives them peace of mind to refocus on work and leave the entertaining stuff for later.

Pocket Encourages Reading, And Reading Increases Success

Whether for pleasure or education, reading is healthy. It can reduce stress levels by up to 68% and slow cognitive decline. Reading can even make you smarter by improving cognitive function and creating new pathways in the brain. Those who read often usually display better leadership qualities and tend to have better decision-making skills. Overall, reading regularly is an effective way to improve your wellbeing and performance.

Whether you constantly have your nose in a book or feel guilty that you should be reading more, Pocket is a great way to find the kinds of content that you can’t wait to start reading. After all, it’s a consistent favorite on the list of best apps for readers for a reason. 

Are you looking for other ways to improve your work performance? Then check out our blog post “5 Tips For Better Business Writing Skills” on our TracSoft blog.

What would your business do if disaster struck? Do you have a plan for if your network goes down? Contract TracSoft today and find out if your business has an adequate backup plan in place. TracSoft has over twenty years of experience creating secure, reliable backup sources. If the worst happens, TracSoft can restore your data and have your business up and running again in no time. Learn more about TracSoft’s backup services here.

Health Apps For 2020: Apple Health VS. Google Fit

January 27, 2020 By Brittany Howard Leave a Comment

health apps on fitness tracker

Health apps are growing in popularity as Americans are becoming more health-conscious. Thanks to the Common Sense Nutrition Disclosure Act, the internet, and the rise of calorie-tracking apps like My Fitness Pal and Lose It!, people are increasingly confronted with calorie and nutrition costs they seldom considered before. As a result, many people are making better food choices. Another factor is the gamification of workouts. Fitness tracking apps allow users to share their stats, challenge friends, or complete virtual runs from around the world, visualizing their progress in exciting and interesting ways. Further, popular fitness trackers and smartwatches have become fashionable statement pieces that also motivate users to get up, drink water, and think about their bodies.

This emphasis on wellness has led to the rise of innumerable health apps. These tools record all kinds of data — from calorie intake to steps walked and moods — and present it to users in fun, interactive graphs. This data can provide motivation to users, who can watch their progress over time and set up reminders to prioritize working out. They can even help users set up realistic goals, like reaching a healthy BMI or achieving a lower resting heart rate.

But finding the best health app for your needs can be overwhelming when there are so many options. So today we’ll consider two of the leaders in this market, Apple Health and Google Health. Both apps come from industry leaders known for great design and extensive data analysis capabilities, and best of all, both are completely free.

Features Overview

Apple Health — available from the iTunes App Store

The best way to describe Apple Health is that it’s a central hub for data from many sources. It pairs with most other health apps available in the iTunes store, allowing you to build out the health tracker you want by focusing on metrics that matter to you.

All information in Apple Health is sorted into one of four categories: activity, mindfulness, nutrition, and sleep. Within each category, the interface uses tabs, making it easy to quickly find the information you’re looking for. You can even select favorite data points that you want to prioritize, which is especially useful given the enormous amount of information the app stores, which could otherwise feel overwhelming.

Health offers all the standard information you’d find in most health apps, including heart rate, steps taken, and calories burned, but it adds more depth by allowing you to track metrics like cholesterol, blood glucose, and fertility as well. You can even integrate your health records into Apple Health, including lab results, immunizations, medications, and procedures. (This feature is currently restricted to participating institutions.)

One especially nice feature is the digital emergency medical ID card you can create, warning emergency responders of allergies or current medications, as well as other critical information.

Using this app with an Apple Watch will provide more detailed data, but you can use the app with your iPhone or pair it with a number of other popular fitness trackers like Garmin and Fitbit. However, it does not pair with Android devices.

Google Fit — available from the Google Play Store

Depending on what you’re looking for in a health app, Google Fit may be a huge relief or deeply disappointing. The interface is simple, with a home screen, profile screen, and journal screen. The home screen provides common daily metrics like steps taken, calories burned, heart rate, and weight. The journal screen logs workouts, and the profile screen contains basic personal information.

Working with the World Health Organization (WHO) and the American Heart Association (AHA), Google developed two main metrics, Move Minutes and Heart Points. Move Minutes track all activity; exercising earns Move Minutes, but so does choosing to take the stairs or park further from the grocery store. Heart Points focus only on exercise and reward users with double Heart Points for more intense exercises like Zumba or jogging. While you can use a wearable or phone to automatically track exercise, you also have the option to enter exercise manually, allowing you to record things like weight lifting or rock climbing.

Google takes advantage of its many native apps to provide a lot of convenience for Google Fit users, integrating Google Search, Maps, and Assistant. Additionally, it works well with many of the same apps that can be used with Apple Health, including Lose It!, My Fitness Pal, Runkeeper, and Strava. It also allows users to set specific goals and provides feedback on goal progress through its coaching feature, just as Apple Health does.

Google Fit works with any smartphone, including iPhones, or any fitness tracker, including big players like Polar and Garmin. Since Google’s Wear OS powers many of these fitness trackers anyway, integration is pretty fluid.

It’s well-known that Google has been slowly but steadily working itself into the wearables and fitness tracking market as well as the healthcare industry. We actually wrote about this recently in our post “Fitness Trackers In 2020: The Impact Of Google Buying Fitbit.”  It will be interesting to see if its recent acquisition of Fitbit will lead Google to overhaul its Fit app, or whether it will remain a simple but solid player in this field.

Health App Data: Who Can You Trust?

In our recent post about fitness trackers, we discussed growing privacy concerns over Google’s foray into health data collection. The Wall Street Journal’s 2019 discovery of Project Nightingale has only increased concerns many watchful critics already had, but of course, Google is not the only tech giant entering this market: Apple, Amazon, and Microsoft are also partnering with hospitals and insurance companies, hoping to hit it big by remaking the dysfunctional American health care industry.

However, Google—perhaps because it has infiltrated our lives so completely, or because it was one of the first companies to collect so much data on users—tends to face more scrutiny and suspicion. This is not without cause, considering they have been fined for serious issues such as tracking minors without consent. On the other hand, despite a few data breaches, Google has a pretty strong record of protecting users’ data from theft.

Apple has a much better reputation for data privacy. Encryption has been a foundational element of their products from early on, and on multiple occasions, Apple has refused to break their encryption on their devices even for government agencies, most recently in the case of the Pensacola shooter. Apple has also baked privacy into its marketing, promoting itself as a much more ethical and reliable company than its competitors.

However, Apple has begun following in the steps of its rivals, which may open the door to similar privacy issues at some point. One example is its 2019 launch of “sign in with Apple,” a feature similar to the “sign in with Facebook” function that enabled the Cambridge Analytica jailbreak of users’ accounts. (Google also has a similar feature.) Admittedly, Apple has created extra protections, such as creating a randomized email for its users that can be deleted if the user decides to delete their account with an app or website, so it is clearly learning from its competitors’ failures.

But as Apple’s own data breach shows, no company is ever perfect at protecting data. Further, Apple’s health app relies heavily on third-party apps that it is not responsible for beyond vetting them in the iTunes marketplace (which, like Google, is not always perfect in its vetting). While Google also utilizes third-party apps, Fit is built around the Google ecosystem, making it somewhat more contained in terms of privacy (assuming you’re ok with trusting Google).

So…Which Is The Better Health App?

Like so many points of comparison between Apple and Android, the answer comes down to what individual users value. Users who are looking for a single health management app or who want lots of detailed metrics will be happier with Apple Health. It records more overall data and eliminates the need to move between multiple apps that measure different health variables. However, Google Fit does a better job of linking data to specific health outcomes, and it focuses on the most essential measures of health, simplifying things for the user. It is also more widely available, which is important considering that Android held 86.6% of the 2019 smartphone market. In the end, if you’re looking to improve your health, the best app is likely the one that matches your preferred device.

Severe Security Flaw Discovered In Windows 10 Operating System

January 18, 2020 By Brittany Howard Leave a Comment

Learn about the Windows 10 security flaw that was disclosed January 14, and find out how to download the patch that will protect your PCs.

On Tuesday, the National Security Agency (NSA) announced it had found a “severe” security flaw affecting Microsoft’s Windows 10, Windows Server 2016, and Windows Server 2019. The flaw allows hackers to use fake security certificates to install malware that looks like real, trustworthy software. This malware then gives hackers access to confidential information stored on affected PCs, and the vulnerability could be used to infiltrate networks as well.

Microsoft was quick to respond, releasing a patch (titled “update KB4528760”) the same day the security flaw was made public. This patch is designed for users who have already installed the Windows 10 May 2019 and Windows 10 November 2019 updates.

However, some users have found themselves unable to install the patch, instead receiving error messages. The number of users unable to install the patch has been relatively low, but given the severity of the vulnerability coupled with how publicized the flaw has been, users are rightfully concerned about the failure of Microsoft’s patch.

It is highly unusual for the NSA to inform a company about any cybersecurity flaws they find, partly because doing so draws the attention of hackers to the flaws, making it more likely they will attempt to exploit them, and partly because agencies like the NSA have been known to use these vulnerabilities themselves.

For now, the best solution is to install the update manually by visiting the Microsoft Update Catalog. From there, search for “KB4528760” and click download.

TracSoft will keep you updated as more information is released.

Are you concerned about the security of your business network? Do you know what updates you should or shouldn’t install? Let the experts at TracSoft remove the guesswork with our secure, dependable OS and patch management services. We thoroughly test patches and updates before anything is ever installed on your network, preventing software conflicts and security vulnerabilities. Find out more today about how TracSoft can protect the technology that matters to you.

  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Go to Next Page »

Make your workday run smoothly. CONTACT US

Copyright © 2022 · A Division of Tracsoft