COMPETITIVE ADVANTAGE & SECURITY BLOG

Access Emergency Medical Information Using iOS Health app

As we move closer to having all of our business and personal information available on our smartphones, it becomes ever more important to secure these data vaults from penetration. However, blocking your medical and contact information may present a life-or-death scenario in the event of an emergency medical situation requiring this information. Apple has solved this puzzle…
Read more

Mintz InfoTech Website Reboot

With my great thanks to our web genius, Andi, and our Amazon guru, Diane, our website https://mintzit.com  has gone through a complete reboot. This is to provide you with: Fully encrypted https/ssl for all pages. Your visits are held in complete privacy. Faster, more intuitive navigation. Interactive visits. You may now leave comments and feedback…
Read more

When is a Virus Dangerous?

I had an interesting conversation which turned heated with one of our sweetest clients yesterday. At issue was that her computer did indeed have 3 malware, and yet there was no concern (on my part) about them impacting her OS X computer. I had a difficult time conveying when a virus is a problem, and…
Read more

Massive Home and Business Router Attack

As reported in Threat Post <https://threatpost.com/exploit-kit-using-csrf-to-redirect-soho-router-dns-settings/112993>, there is currently a new threat to SOHO (home and small business) routers. This threat makes it child's play to infect and penetrate routers, and millions have already been impacted. This exploit alters the DNS (Domain Names Server) settings within the router. Once this is done, all email, web,…
Read more

How to Choose Your IT Consultant

BACKGROUND If you think education is expensive, try ignorance. – Derek Bok, President of Harvard University 1971-1990 The same can be said of IT Support. Starting a technology project, even as small as the purchase of new equipment, can be made less costly by including qualified computer support personnel from the very beginning. Finding and hiring…
Read more

Hamachi Mesh VPN Part 2- Add Users

Assignment: Add Users to Your Hamachi VPN Network In this assignment we will add users to the Hamachi VPN network created in the previous assignment. Completion of the previous assignment is a prerequisite. Open a browser and go to <https://secure.logmein.com>, and then login with your username and password. The LogMeIn Central page appears. Select the…
Read more

LogMeIn Hamachi Mesh VPN Part 1

LogMeIn Hamachi LogMeIn <https://logmein.com> is a US-based company with a line of top-grade cloud services. They are best known for their LogMeIn remote support software, allowing technical support staff both attended and unattended access to client and server computers. One of their lesser-known, but game-changing products is Hamachi <https://secure.logmein.com/products/hamachi/>. Hamachi is a cloud-based VPN, completely…
Read more

How to View the Keychain in iOS

In today’s world, the realm of keys has expanded into the digital world. You now have keys or passwords for logging on to your computer, your phone, your tablet, your email, many of the websites you visit, Wi-Fi access points, servers, your frequent flyer account, etc. In my case, I have 857 passwords in use.…
Read more

How to Fix Keyboard Problems in OS X

On rare occasions the keyboard will begin to behave badly in OS X. Well, in every OS, but I'll let my staff write about how to resolve Linux and Windows keyboard issues. These behaviors can include: Entering the wrong characters, not responding, keyboard modifiers (option, command, shift, and control) either not being recognized, or recognized…
Read more

How to Avoid Counterfeit Software and Phishing Scams

The US-CERT and the IRS have recently issued warnings of a steep rise in phishing scams. Phishing <https://en.wikipedia.org/wiki/Phishing> is the attempt to access private or sensitive information such as your username, password, credit card, bank account, etc by way of appearing as a trusted entity via email, website, etc. One phishing scam we have seen exploding is…
Read more

Test your current internet speed

A recent study found that Americans pay much more for their Internet than the majority of other countries, and to add insult to injury, Americans get much slower Internet speed than most other countries. To add grievous insult, your broadband provider may very well be restricting your bandwidth below what you are overly-paying for! If…
Read more

Create Encrypted zip Archives on OS X

Being able to create encrypted zip archives is your best friend if you are negotiating for a job, bidding on a contract, exchanging medical or financial information with family, or planning for world domination. With everyone from the kids in the high school computer club, to criminals, your Internet provider, and our own government snooping…
Read more

Measure Computer Performance

There are thousands of articles on how to improve the performance of your computer (the majority of which are dangerous to your computer.) But only a handful describe how to actually measure computer performance so that you can determine if changes made have any impact. We will change that in this blog! There are dozens of…
Read more

What to Do With Scareware Cyber Crime

As cyber crime becomes an increasing burden to a growing number of people, it is important to recognize the social engineering tactics used so you can improve your home and business security, with scareware being most popular. If you have been on the Internet, you’ve probably seen a common social engineering tactic known as Scareware. What…
Read more

How to Measure Your Internet Speed

Everyone wants to at least get what they pay for. Unfortunately, it is all too common for that to not be the case when it comes to your Internet bandwidth. Internet providers appear to universally provide less than what the customer is paying for. They wait for the squeaky wheel to complain about poor performance before ratcheting…
Read more

Configure Windows 10 Automatic Updates

Operating Systems and applications have a constant stream of updates. If you have enough applications on your computer, you may be prompted daily to update. Many of our clients tend to ignore these messages, but they are critical to maintain system security and stability. To simplify the process, let's configure Windows 10 Automatic Updates. Although developers…
Read more

Apple Messages Security Rating Is High

 The Electronic Frontier Foundation (EFF) has just released a study of the major texting applications for smartphones. According to the report, Apple Messages security rating is high (listed in the report as iMessage). As most of you know, I'm just a bit OCD over security. Even though my life is an open book, that doesn't necessarily mean I care to leave…
Read more

Your Bank is Spying on You

Yes, your bank is spying on you. My position is that this is outrageous behavior on the part of one of the largest, most powerful multinational corporations on earth. Should you have installed Trusteer, you may want to ponder that action and reverse it as soon as possible. Trusteer (Wikipedia) is a computer security group that was recently…
Read more

Creating a Strong Password

If you do not use a strong password, nothing else you do can secure your data, identity, or system. Over the past weeks I've seen for too many clients getting themselves in trouble with passwords. A few had their email account hacked. A couple created such complex passwords that what ended up being created was not…
Read more