It is essential in today’s world driven by email and digital communication, to have reliable and secure email policies. Ransomware attacks start when a hacker spoofs a legitimate account, pretending to be someone in the company. Most companies are unaware of this problem that could be stopped with a simple DMARC record in the email registration system. DMARC provides the sending and receiving email servers a way of authenticating the email “from” line and if it is spoofed, then the DMARC record, if correctly instructed will Quarantine the record so it never reaches the destination. This record is the responsibility of the domain holder and not of the email service provider. The Email service provider will give you exactly what you ask for, and if you don’t request it, they will not give you a DMARC record unless you use someone like ProtonMail. Did you know that less than 10% of all email servers have this critical authentication record. Having a DMARC record will prevent spoofing of your email domain. This is the most critical infrastructure record as well as a behavioral antivirus similar to Emsisoft.
Well the answer is simple. Use EASEUS and find out now how they can insure you a smooth and safe transition to Windows 11. Dont wait until October 2021 to find out that your PC needs help and then discover that the 50% discount is gone. Buy it now and be prepared. Contact us if you need more assistance in this.
Which Search engine is right for you ?
Have you ever wondered if there is an alternative to Google ? Google does own 93% of the worlds searches but that does not mean that other engines are inferior. Some searches from the other search engines need to be used with caution, since many of the searches can be infected or lead you to malware. But armed with a good antivirus and web page protection software, you should forge ahead and see what is out there for you. Each one will give you a wide range of suggestions and may be what you are looking for.
StartPages default settings are the family filter is turned on to protect you from Adult web sites. StartPage also can be set to give you specific locations too. So, click on the three lines on the right hand corner and go to Settings. There you can customize the browser to 10 different languages, a regional filter for all major regions of the world, as well as the temperature from degrees F to C if you think in terms of degrees Celsius.
Next is our second choice www.wolframalpha.com . This engine provides the perpetual student in all of us, with a way to get our answers to: Mathematics, Science and Technology questions as well as Society and Culture. A search engine that is absolutely unexpected but full of surprises. There is no way to say what this search engine can do, so if you are a teacher or student, you may want to consider upgrading to its pro version.
Our third favorite is www.ecosia.com This browser uses the power of the internet to plant trees in many countries that are suffering from deforestation. And I have to say that this company is truly helping the planet. Please support their efforts and use them as much as you can. You can compare their search results from Google or Bing and see which one gives you what you are looking for.
To end with DuckDuck go seems fitting since this is where we began years ago and now it has opened up the world to all of us at Global Security Support.
Each one of these search engines deserves high praises and each one is different in what they provide.
How do I recover data from my harddrive that has been deleted ?
This has been a topic of discussion for the past 29 years with Global Security Support and its clients. And while there are no easy answers, lets dive into the problem of lost data, crashed harddrives, and drives that have malfunctioned for one reason or another.
Laptops and computers can become inoperable for many reasons, either by your negligence or by accident. Either way, these things happen and its wise to be prepared when it does.
There are always solutions to recovering your data without sending your storage device to a data recovery company. Ease US has been our software of choice and for the last 10 years, our only software that we go to when we need reliable data recovery.
We have tried many, if not all of the data recovery software suppliers in our 29 years of experience and find that only one is worth the money. If you have ever deleted a directory of data that has lots of work that you have done over the years, or removed pictures in your directory, there are no reasons for some of the things that could be due to a mouse malfunctioning, your finger hit the wrong key (delete) and then all of the data is gone – out of the recycle bin, or the children have accidentally deleted your data on your computer. All of these things have happened in our 29 year history of Computer Support.
And realistically, there are not many tries that you can have to recover the software. So, remember that when your data is really gone, and you have no backup of the data, then you will learn from your mistakes but at a costly price.
Lets talk about what it costs when you dont have a backup and need to send your drive out for Data Recovery. This is a costly and time consuming process that can take weeks and cost several thousands of dollars. They also state that there is no guarantee on what they will recover nor if the data will even be useful to you. So after these odds, its best to always have an offsite backup for your data. But in the event that is not an option, and you want to recover your files as quickly as possible, then this is the best alternative for the time and money that you could spend.
Data Recovery is big business and as harddrives get bigger and bigger, the odds that it will strike you gets better as time goes on. Even if you have the latest Solid State harddrive, there are no guarantees that your harddrive wont corrupt your data or your ability to start your PC. Many times, a Solid State harddrive had problems in the boot sector of the drive and even though the data was there, it was unavailable to the user due to the problem of getting to the files and directories.
If your computer still is able to start, and you are able to login, there is no better time than to backup your data to an external USB disk or thumb drive. If your data has been deleted and the recycle bin emptied, then the best thing to do is not use this PC until you have successfully recovered your files. If this is your only computer, then you need to get an external drive to do many of these functions. First when you download the software for recovery, write it to the External drive. That way it minimizes the potential loss of your data that you need to recover. You can still add the software for recovery and then begin the slow process of recovery. Depending on the amount of data that has been lost, it takes time for the software to recover the files and then to write them to your external drive. This process can take as long as several days if you have lost a significant amount of your data.
There is a solution to having to purchase recovery software and that is a good backup either local using a USB storage device or Online using a good backup tool that is under your control. S3 backups can be complicated since they require 2 passwords and what is called a bucket for your data, so if you have questions about this, email us at email@example.com.
How do you change email over to someone who is more private?
Depending on who you currently host your email with, we can guarantee that there are few ZERO ACCESS ENCRYPTION servers in the world. Proton Mail is one of them. We have used Proton Mail for all of our domains and have complete confidence that they will not have access to your emails. Proton Mail does NOT have the encryption key and will protect your privacy completely, unlike other email services.
This process is complicated to Change your Email Mail Exchange MX, records over to another provider. In this process we create new SPF, DKIM and DMARC records to continue your mail flow. We prepare this change in advance of the change of your legacy records and also create the users so the email flow continues uninterrupted. We also give you the login for the users and their new passwords as well. Once the mail flow is working, then you will upload your backup email, done before this process started to make sure that you have a continuous, unbroken store of your emails. We have other processes that can import directly from the email server, but ask us before we start this process.
This change will then protect your domain name from spoofing and will come with a spam filter that works 100% of the time. We rarely have false positives but after you work with the new email server for a few days, and check the accuracy of the email capture, then we can say that this process will actually ensure 100% of your legitimate email into your inbox.
We have performed this upgrade many times and know the pitfalls and precautions to make sure that this change goes smooth.
Different Browsers to choose from, which one is right for you.
First and foremost there is Google™ Chrome, the standard for people that utilize the free service of Google and Gmail.
Second there is Microsoft’s™ Edge Browser that is now based on the Chromium browser, and there are a few limitations as of todays date to the add ons or plugins due to the security concerns by Microsoft. This is understandable in todays world of hackers going bezerk. This browser is giving Google Chromes browser a run for their money.
Next we have Mozillas Firefox. This is our browser for several reasons that we will go in depth later.
CCleaner Browser – This browser is a great alternative and We use it as an additional research too. It has automatic cleaning as well as some good security features. It is available here.
Apple Products are safe from attack ? yes or no
As much as we would like to assume that our friends at Apple are feverishly working to prevent attacks on the OS, more and more cleverly crafted attacks are being designed for the business world which will result in the eventual addition to the MAC world as being able to be compromised. What can we do about it ?
Keep your MAC products updated and check it regularly.
Make sure the browser that you use is updated automatically and monitor it to ensure no threats penetrate the browser.
TURN ON your firewall and make sure that you check all allowed startup programs to make sure you havent been compromised.
Run as a normal user. Do not use your administrator account as your primary account. This can cause you to have security issues that can be compromised by the sophisticated hacker.
Use a good Browser Cache cleaner like CCleaner for the MAC. It will keep your temporay files to a minimun and even free up extra space that you thought you had lost.
Use another browser for the MAC. Read these reviews and decide which one you feel most comfortable with.
Retire old MAC laptops and desktops that lack the security updates. One compromised system can cause an entire network to collapse.
Begin to look for antivirus programs for your MAC. I know that most people think that everything is protected, and we believe generally that it is, but that is where the hackers are working to convince you that MAC is not safe.
Educate yourself. MAC users tend to be a trusting group of people and for that reason alone, MAC is vulnerable.
Begin to be more skeptical about browsing with your MAC. We dont want to be correct in our warning to MAC users and their security issues.
Who has the best online prices for backups?
This question has come up many times during our 29 years in the business. The answer is easy yet carries a little bit of technical prowess to achieve. The answer is, get storage with Wasabi.com. Their price is consistently low and their initial price is competitive. The reason that we answer this question is that many of the “low entry prices” become triple or quadruple as expensive once you pass the initial cost.
Wasabi needs a person expert with their S3 type backup, but they beat all the others, hands down. We did a study and found out that Wasabi was consistently competitive than ALL the others. This solution is based on our extensive experience and client feedback on who is the best and most affordable online storage.
Finally here is one called the Digital Attack Map from Arbor Networks. They have different information that can alert you to how these attacks occur and why internet security is such a daunting task to keep ahead of.
Operating Systems. Is it worth the change to Linux or MAC ?
When we get into the subject of Operating Systems, the author chooses to use Windows 10 since there are many programs that dont run on the other operating system solutions and there are difficult migrations that are required to be installed to run well.
Some of these adapter programs or shell environments do not allow all of the features to operate in a 64 bit environment, or function as well as with Windows 10, so this is why we stick with Windows 10 Pro.
However, if you want to look into Linux, it can be a great exercise, but be warned, it is not for the faint of heart. You will need to first download the version of linux that is compatible with your hardware, and this gets easier all the time as Linux is able to make improvements for compatibility for hardware.
What alternatives are there to Microsoft products? Are they as good ? or do they lack features !
We are very excited to see Windows 11 and unless you have issues running Windows 10/11 we highly recommend you using Windows 10 or 11 if your computer can run it.
We have been a user of Microsoft Office since the early days, and it has definitely increased in its value to us and many of our clients. The ability to have smart scripts, macros to calculate your data, and that is really second to none. You will be hard pressed to find another Office product, however, in our experience, Open Office or LibreOffice do serve the average user well.
There are many products that can do roughly the same as Microsoft Office.
Products such as OpenOffice, LibreOffice to name a few. These are the top competitors to Microsoft flagship Office 365 product now. Many people do find that it is difficult to change Office products. We have been using LibreOffice now for almost 2 years and find it a competitive tool. It does lack a few features that Microsoft has in Office 365, but if you dont use those features then try out LibreOffice and even OpenOffice are worth trying out.
Usually these products save in their own native format, and this is the issue that most people have. They have to add a step to convert the document to a doc or xls format. There is also an export as a PDF file, which we find very useful. Some people will enjoy these products, but be aware that there is a learning curve and you will need to look at all the features to see if they will suffice in your environment.
How to tell if your PC will run Windows 11… If you are one of the early adopters, like Global Security Support, you are waiting to upgrade to Windows 11. Lets see if your PC will qualify. First there are utilities like WhyNotWin11.exe which falls short of our expectations. Why NotWin11 appears to give inaccurate …
How do you control SPAM and keep the junk mail out of your inbox ?
How do you control SPAM and keep the junk mail out of your inbox ? This question has been presented to us at Global Security Support, endlessly, for over 29 years, Our previous advise was to suggest that people UN Subscribe to spammers, but that only works for the legitimate marketing companies, of which the …
Learn How to Tune your PC like a Professional Computer Technician
We are going to discuss how professional computer technicians manage computers so you can become a rockstar when it comes to PCs running Windows 10 Home or Pro. It is important to remember that the skill of Performance Tuning took us at least 5-10 years to develop and another 10 years to perfect. So, remember …
I have known David Arrants for almost 20 years. He is a genius computer expert and extremely ethical and knowledgeable. I trust him completely, and his personal service and dedication is unmatched. David has always been professional, proactive, available, timely, and responsive to resolve any computer issues as they arise, keep their computers safe, and make them run optimally. I highly recommend him and Global Security Support to any business or individual who needs a computer expert to solve their computer problems from anywhere in the world and keep them secure.
David B. Porter
Law Offices, San Francisco, CA
Roger Ritter – Retired Attorney
I have known David Arrants and GSS for 20 years, as a valued friend and colleague. GSS is loyal, trustworthy, and smart. They respond promptly to requests for help and always provide excellent service. GSS continues to upgrade my computer systems remotely and arranges for local tech support where necessary. I recommend GSS without reservation. I live in Alexandria Virginia and have used GSS for my entire career.
Retired Attorney, Alexandria, VA.
Gary Carr – PR Firm
My company has been using GSS’s services for more than ten years, and I couldn’t be more pleased with how he uses his depth of knowledge to fix everything correctly and the first time. He is always at the forefront of the latest changes in technology and security. I can depend on him to respond quickly to keep us up and running. We wouldn’t use anyone else.
PR Firm in Concord California
Trevor Thorpe – Attorney
The flexibility and ease of Synology servers allowed us to set up a system that matched our workflow rather than the other way around. We needed something that worked within our Mac environment in the office and remotely, and that also provided a reliable real-time backup solution. GSS was able to do that seamlessly syncing from home to office.
Attorney in Berkeley, California
Jerry Borton – Retired Venture
GSS provides me with the peace of mind that someone trustworthy is looking after my MAC computer. I have had many ways that hackers attempted to penetrate my laptop and with the services of GSS, they were able to keep my system clean and free from worry. Thank you GSS.
July 16th 2021
Retired Venture Capitalist, Reno NV.
John and Janice Anderson
I met David 19 years ago working for the company as our IT consultant. It was no easy task as we had seven offices spread across the US and between 60 to 65 employees, each with their own PC’s. Given his expertise, he was easily able to not only maintain all these computers, but also ensured they were constantly updated and free from malware as well as spyware. Because of this, he is now our consultant for my wife’s and mine home desktop and two laptop computers. He keeps current with the latest trends and developments in the computer industry and advises us accordingly when necessary. My wife and I would highly recommend him to anyone in need of his services.