Need tech support? : helpdesk@fifstarict.com

Talk to an Expert: : 512.693.8743 x 1

 

Month: August 2019

Samsung Galaxy Note 10 and Note 10+ first WiFi 6 certified smartphones

The Samsung Galaxy Note 10 and Note 10+ are the first smartphones to receive WiFi 6 certification from the WiFi Alliance.

WiFi 6 will help mobile devices to save battery with Target-Wakeup, which schedules transmission time to increase efficiency.

New features also allow for faster upload and download speeds, more data to be transferred at a time, and will improve connectivity in high populated areas.

iOS 13 Spam Calls and Dark Mode

iOS 13 will all but eliminate robocalls, spam calls, and solicitors from ringing your phone.

This feature is called silence unknown callers, and is turned off by default. This feature will only ring your phone if the phone number is in your contacts, recent outgoing calls, or Siri suggestions. All other calls will go directly to voicemail.

This feature is enabled with iOS 13 in Settings find and select Phone, them scroll down until you see Silence Unknown Callers and slide the switch to on.

 

Dark Mode

Apple has also included a Dark Mode feature in this upgrade. This is disabled by default, but you can turn it on in Settings, then Display and Brightness. You can also schedule Dark Mode here, so it automatically turns on at night and off in the morning, or leave it on all the time.

iPhone 11: What to expect?

iPhone 11 and iPhone 11 Pro were announced Sept 10. New features to expect: more colors, dual lenses, 6.1″ liquid Retina display, night mode, Dolby Atoms, more durable glass, faster A13 Chip, improved water resistance (IP68), iPhone 11 Pro ($999) and iPhone 11 Pro Max ($1099).

Ransomware and 10 Cyber Security tips

The internet can be a dangerous place, and one of the latest threats out there is ransomware. Attackers gain access to your network through various disingenuous means, and lock you out of your systems. The attackers will then send you a message demanding bitcoin or other untraceable cryptocurrency in order to restore access to your data.

These attacks have been extremely effective, with even the most tech savvy victims giving in to demands in order to restore access to stolen data.

There are steps you can take to guard yourself, and your organization from these cyber threats.

10 Important Cyber Security Tips

  1. You Are A Target.
    Realize that you are an attractive target to hackers. Don’t ever say “It won’t happen to me.”
  2. Eight Characters Is Not Enough.
    Practice good password management. Use a strong mix of characters, and don’t use the same password for multiple sites. Don’t share your password with others, don’t write it down, and definitely don’t write it on a post-it note attached to your monitor.
  3. Lock It Up.
    Never leave your devices unattended. If you need to leave your computer, phone, or tablet for any length of time—no matter how short—lock it up so no one can use it while you’re gone. If you keep sensitive information on a flash drive or external hard drive, make sure to lock it up as well.
  4. Practice Safe Clicking.
    Always be careful when clicking on attachments or links in email. If it’s unexpected or suspicious for any reason, don’t click on it. Double check the URL of the website the link takes you to: bad actors will often take advantage of spelling mistakes to direct you to a harmful domain. Think you can spot a phony website?
  5. Beware Of Browsing.
    Sensitive browsing, such as banking or shopping, should only be done on a device that belongs to you, on a network that you trust. Whether it’s a friend’s phone, a public computer, or a cafe’s free WiFi—your data could be copied
  6. Back It Up.
    Back up your data regularly, and make sure your anti-virus software is always up to date.
  7. Physical Cyber Safety.
    Be conscientious of what you plug in to your computer. Malware can be spread through infected flash drives, external hard drives, and even smartphones.
  8. Share Less Sensitive Information.
    Watch what you’re sharing on social networks. Criminals can befriend you and easily gain access to a shocking amount of information—where you go to school, where you work, when you’re on vacation—that could help them gain access to more valuable data.
  9. Cut Out The “Middle Man”.
    Offline, be wary of social engineering, where someone attempts to gain information from you through manipulation. If someone calls or emails you asking for sensitive information, it’s okay to say no. You can always call the company directly to verify credentials before giving out any information.
  10. Stay On Top Of Your Accounts.
    Be sure to monitor your accounts for any suspicious activity. If you see something unfamiliar, it could be a sign that you’ve been compromised.
Scroll to top