WTAM 1100 – Add Security with 2-Step Verification

Play Audio – WTAM 1100 Newsradio – Tech Tuesday – September 16th, 2014

WTAM 1100 Newsradio Cleveland OhioAs we move more of our important information online, from cloud-based storage to web-based email and financial software, the need for additional security around those accounts becomes clear. Relying on a simple username and password won’t cut it in a world where spyware and phishing attacks try to gather as much information about us as possible.

Fortunately, many online services are adding another layer to their security in the form of “2-Step Verification”. Sometimes referred to as “Two Factor Authentication”, this process involves an additional step during the login process to help confirm your identity by requiring “something you know” and “something you have”.

The knowledge part is your existing password. To add something you have, many sites will ask you to sign up your mobile number or download a special app for your smartphone. This allows a security code to be sent to the phone, which is entered after the password.

It sounds complicated, but many of us have been using 2-step verification for decades in the form of ATM cards. The “something you know” is your PIN, and the “something you have” is your ATM card. Just like the ATM process has become second-nature, so too will 2-step verification once you set it up and begin to use it.

For a complete list of services that currently allow 2-step verification, such as Google, PayPal, Facebook and others, visit twofactorauth.org.

WTAM 1100 – Keeping Connected with Your Kids at School

Play Audio – WTAM 1100 Newsradio – Tech Tuesday – September 9th, 2014

WTAM 1100 Newsradio Cleveland OhioThe “Back to School” season has been in full swing for a few weeks now. Many parents may be looking for ways to stay in touch to their kids, and Geek Squad has tips to keep connected.

WTAM 1100 – IBM and Apple Partnership

Play Audio – WTAM 1100 Newsradio – Tech Tuesday – July 22nd, 2014

WTAM 1100 Newsradio Cleveland OhioIf you use your smartphone with your business, the recent news stories of IBM’s partnership with Apple may have piqued your interest.

IBM and Apple started out as rivals for the PC market in the very early 80s before it became Mac vs Windows. While IBM left the personal computer space over the next few decades, they continued to be a very important player in enterprise environments.

In the last 7 years, smartphones and tablets have become one of the fastest growing markets for what are really still personal computers. However, even though we’re more likely to turn to a smartphone to check our personal email, or use a tablet to surf the web, the support for these devices in a corporate environment is still a huge area of growth opportunity.

With Apple’s strength being consumer hardware and IBM still being a well-known enterprise systems developer, you’re likely to see a much more robust approach to helping companies supply, manage and support devices like iPhones and iPads.

When you’re dealing with hundreds or thousands or even tens of thousands of corporate employees, often across different locations and even time zones, the ability to manage user accounts and access from those highly-mobile devices can be a nightmare for your company’s IT department.

WTAM 1100 – Fake FBI Ransomware Comes to Android

Play Audio – WTAM 1100 Newsradio – Tech Tuesday – August 26th, 2014

Fake FBI Warning Ransomware on Android SmartphoneAccording to a recent New York Times article, Android devices are a new target for “ransomware”. These malicious software apps act similarly to the fake FBI virus scams that have been attacking Windows PCs for years.

Fortunately, there’s several actions you can take to help protect your Android smartphone or device from these scammers and their malware apps.

Stick With Trusted App Sources

Android devices generally come setup for downloading apps from a trusted app store, like the Google Play Store. For extra security, you’ll want to avoid changing the settings on your device that allow 3rd party apps to be downloaded from the official app stores.

Sometimes called “sideloading”, allowing apps to be installed from less trustworthy places on the Internet increases your chances of accidently loading malware onto your device.

Keep Updated

Just like your computer, your smartphone’s operating system and apps need to be updated periodically. It’s important to keep watch for system update notifications as they come up. You can also check for system updates by visiting Settings, then About (or About Phone), followed by System Updates.

For app updates, visit the Google Play Store app, then the Play Store icon. Select My Apps to view your downloaded apps and any available updates. You can also touch the Menu button to check the “Auto-update” option to keep that app automatically up to date.

Practice Safe Internet Habits

A common attack method, known as “phishing” on the Internet, isn’t technical, it’s psychological. Scammers will create fake websites, pretending to be your bank or shopping site. They’ll send you emails asking you to sign in and provide your account information, which they’ll then use to access your account on the real sites.

For more information on how to protect yourself, check out this article on how to avoid getting hooked by a phishing scam.

Some malware attacks come in the form of banner ads designed to look like a security warning telling you viruses have been detected. The error will ask you to download and run what it claims is an antivirus app, but is really the scammer’s software waiting to load onto your device.

The same safe Internet habits you follow on your computer work on your mobile devices as well. If you do find yourself falling victim to one of these attempts, here is what to do if you are scammed.

Security Software

The rapid growth in the number of Android devices being used worldwide has made the platfom a growing target for malicious software makers. Keeping your settings in check, your system updated and avoiding unsafe behavior will often be the most powerful ways to protect your device. To help take your protection further, security software makers have made a range of protection products for the Android platform.

The good news is that many of the major security software suites, like Webroot’s SecureAnywhere Internet Security include Android security apps that you can install on your device in addition to their Windows PC or Mac coverage.

If you still have questions on how to best protect your Android device, or need help with a potential malware issue like viruses or spyware, speak to a Geek Squad Agent online at geeksquad.com/chat or at the Geek Squad Precinct located at your nearby Best Buy.

3 Tips to Prep Your Smartphone Data for Trade-In

Play Audio – WTAM 1100 Newsradio – Tech Tuesday – August 12th, 2014

WTAM 1100 Newsradio Cleveland OhioLooking to upgrade your old smartphone using Best Buy Trade-In, or just handing it down to a friend or family member?

Here are 3 steps you’ll want to take before handing the phone over.

1. Back Up Your Data – You may already have your phone setup to automatically sync to an online service like iCloud or your Google account, but it’s a good idea to go ahead and make a manual backup of all your data from the phone. This can be done using the backup tool from the phone’s maker, such as Apple’s iTunes, Samsung Kies, or the Windows Phone Desktop App.

2. Perform a Factory Reset – This process will wipe the phone, helping to clear out your personal data and any apps you’ve installed, and reset the phone back to its default state.

  • Android – Before resetting your phone, it’s a good idea to encrypt your data if you haven’t already. To do this, go to Settings, then click Security and select Encrypt phone. Once that is complete, go back to Settings, then select Backup & Reset, then select Factory data reset.
  • iPhone – For iOS devices, go to Settings, select General, and then Reset. From there, tap Erase All Content and Settings.
  • Windows Phone – Go to the App list and tap Settings. Select About, then Reset your phone. You’ll then tap Yes to the warnings about data loss (you did back your data up, right?) to start the factory reset process.

3. Change Account Passwords – For extra protection, change important passwords that you may have saved to your smartphone, like your Apple ID or Google account. The factory reset on the phone should remove any saved passwords along with your data, but this extra precaution can help.

You may also want to ensure that your phone is removed from any services, like Find My iPhone via icloud.com or as part of the two-factor authorization in your Google Account if you set it up.