How to Avoid Computer Viruses – Part 1

Note: This is the first in a 2 part series on how to avoid computer viruses and malware.  Read the second part here.



The Best Way to Avoid Computer Viruses

Forget antivirus software – use this simple technique below to avoid computer viruses before they ever infect your computer. The best way to avoid viruses is to know which website and email links are dangerous, and not to click on them.  Below are the steps to make virus protection simple.


Step 1: Hover Over the Link in Question

Hold the mouse over the link and don’t click on it.  You will see the website link you are about to click on, either at the bottom of the screen or in a popup next to the mouse.

Step 2: Look at the Domain

Here is the big secret of looking at website links: ignore the http:// part, and look at the two words before the first slash.

For example, look at the link The two words before the first slash are  This tells you you’re going to Google.  Now look at the image to the right (click on it to enlarge).  The mouse is hovered over the link that claims to be, but the popup shows the actual site to be:  If you look at the two words before the first slash, you will see is is actually going to  You don’t trust, so you don’t click the link.

The simple steps highlighted above are crucial for virus protection. Follow these two steps whenever you are clicking on a link from an unexpected email or mistrusted website, and you will take a huge step toward never getting a virus again.

International Note: This trick works if you are in the US, where most domains in .com.  If you are in, for instance, the UK where domains end in, then look for the 3 words before the first slash.

5 Steps to Avoid Credit Card Breaches

The Problem With Credit Card Breaches

As it turns out, credit card security is not something the tech industry has completely figured out. We have all heard about the stolen data and credit card numbers at Target, Neiman Marcus, and most recently Home Depot.  Credit card breaches affected over 70 million customers.

What is less well known is how this breach actually happened.  The answer: spyware caused the data breaches. In fact, the same malware caused both the Target and Home Depot breaches.

Most people think of viruses and malware these days as just causing popups and slowing down computers.  But they can do anything.  In this case, malware programs such as Backoff, BlackPOS, and Kaptoxa are designed to steal credit card data.  Computers infected with this malware read the credit cards as they’re being swiped and send the customer’s info to the malware owners. These people then sell it on the black market. This leads directly to huge amounts of credit card fraud.

[box] Malware is responsible for data and credit card breaches. Small businesses are just as susceptible to this problem as large businesses. If your business swipes credit cards, take steps to protect your customers and your reputation.[/box]

Small businesses are also susceptible to credit card fraud

Don’t think that hackers are specifically targeting the Targets of the world because they get a bigger payoff.  It costs them nothing to infect small businesses, so they do.  In fact, the Secret Service is reporting that more than 1,000 American businesses were infected by the same malware that got Target, and that report was released a month ago.  Given the typical growth patterns for viruses, I’m sure you can imagine what that number is today.

So if you accept credit cards from your customers, consider yourself a target and take steps to protect yourself.

5 steps you can take to help secure your company from similar data breaches

  1. Protect Against Malware

    These days, there are so many ways to infect a computer. You need a multi-layered approach to malware protection.  First, start with endpoint protection.  This should include antivirus and anti-spyware software on all computers.  Second, protect your entire network by using a content filter that scans all traffic in and out of the network for malware.

  2. Isolate Financial Computers –

    Ideally, Point of Sale computers will never need to get onto the general internet.  They will need to contact your credit card company, your PoS software company, and that’s it.  If this is the case, you can create special firewall rules that block all traffic from PoS computers that isn’t going to one of those two destinations.  That way, even if your PoS computers do get infected, they can’t phone home with the stolen credit card data.

  3. Network Security Best Practices

    No matter what business you are in, your company should be following general network security best practices.  Your IT support provider should be doing regular checks to ensure all of your computers, remote computers, networking equipment, and public-facing services are configured optimally for security.  (And they should be doing this as part of their service, even if you aren’t asking for it.)

  4. Upgrade PoS devices

    Magnetic strips on credit cards have inherent security flaws.  Anyone can read a magnetic strip, save that data, and sell it on the black market.  And anyone who buys that data can create fake credit cards.  Credit card fraud is widespread, but the credit card industry is moving quickly to put smart chips in all credit cards.  These chips have their own security flaws, but one of the big advantages is that they are very difficult to duplicate.  So even if thieves steal the data from the cards, it won’t do the thieves any good because they can’t use it. As of October 2015, the credit card industry has mandated that all businesses must upgrade their PoS machines and card swipes.  Do this sooner than later to protect your customers.  As an added incentive, if you haven’t upgraded and someone’s card data is stolen from you, they will place all of the liability on you for not upgrading.

  5. Get a PCI-DSS Audit

    Hire a company to come in and perform an audit to make sure you are PCI compliant.  (PCI-DSS stands for Payment Card Industry Data Security Standard.)  They will go through your setup and make sure you are compliant with a minimum set of security standards and that you are handling customer’s data securely.  But this is a minimum standard; both Target and Home Depot were PCI compliant.  Think of this audit as table stakes to play the credit card game, not as a panacea to fix all security problems.

Credit card security is an issue your company must address. For help securing your network to minimize any risk of you being the next Target, please give us a call. We would be happy to discuss how Strive Technology Consulting can help you avoid credit card breaches within your company.

Bad Microsoft Updates Causing Blue Screen Crashes

Microsoft releases updates to fix bugs once a month.  Last week, they released a lot of updates, 3 of which are causing computers to crash and blue screen after a reboot.  Microsoft references three of these updates with their support article ID numbers. The numbers are are KB2982791, KB2976897, and KB2970228.

If your computers are set to use automatic updates, it may have already installed them.  It is an intermittent problem, therefore you may not have seen it cause problems yet.  See articles here and here for more information and a description of the problem.

If you are one of our Managed Services customers and you’ve installed our management software on your computers, you don’t have to worry about this. You will not be receiving these updates.  If not, please follow the instructions below to uninstall these updates.

Finally, if you are already experiencing this problem and your computer won’t turn on, have your IT provider boot the computer with an external “boot CD.” Then delete the C:\Windows\System32\FNTCACHE.DAT file.  That should allow the computer to boot, after which you can remove these updates.

Please contact us if you:

  • Do not have an IT provider
  • Need help removing these updates
  • Would like to hear about our Managed Services program, which will keep you from having problems like this.

Step by step instructions on how to uninstall an update

1.  Go into your Control Panel and open Programs and Features

2. Click “View installed updates”

Your computer will show you which updates installed, rather than which software programs.


 3. Type one of the three article numbers into the search box

The article numbers are KB2982791, KB2976897, and KB2970228.  You will see that the article ID in the example image below does not match one of the these.  I have not installed these updates on my computer, so I cannot give you true example screenshots of what it will look like.  In place of these articles ID’s, I used “KB2826003,” which is a benign Office update.  Ignore the number in the image and replace it with each of the three above.


4. Make sure the article ID you searched for is in the title of the update.

Highlight that update, and click the Uninstall button.  Follow the wizard and accept all prompts.




21 Ways to Avoid Identity Theft

We have all heard the news about a billion passwords being stolen by Russian hackers, and Target exposing millions of customer credit cards.  I invited Peggy Altschuler of LegalShield as a guest author for this month’s article to help clear up what identity theft is, what we can do about it, and how we can protect ourselves.

Think you’re not at risk?  Think again!

Identity theft is the world’s largest white collar crime

It has even surpassed drug trafficking by trade.  All day, every day, identities are being bought and sold on the black market non-stop.  According to the FTC, one in two will be affected with one of the six types of identity theft in the next twelve months.

What are the six types of identity theft, you ask?


  • Financial
  • Medical
  • Criminal
  • Social Security
  • Driver’s License
  • Synthetic

Unfortunately, most people have a misconception that identity theft is all financial.  Countless times individuals have told me, “Let them steal my identity, my credit stinks,” or “An identity thief wouldn’t want mine. I don’t have any money.”  When that occurs, I ask them for a few minutes of their time to explain the six different types of identity theft and how it could affect their life.  The nightmare can go on for years.

Are you aware that social security numbers can be purchased for as low as $15.00?  Did you know that identity “packages” are available that include driver’s licenses, marriage certificates, fake diplomas, etc.?  Unfortunately, technology has so far surpassed the security of it that identity theft is out of control.

People often ask me how they can prevent identity theft from happening to them.  Unfortunately, we can not prevent it.  All we can do is take pro-active steps to make us less susceptible to being the next victim.  The real key is what identity theft protection measures you have in place when it happens to you.

What to look for in identity protection

When looking for protection, make sure that your plan includes full restoration.  This simply means that a professional is working on your behalf to restore it back to the way it was originally, no matter how long it takes.  With the most expensive part of identity theft being the time spent to recover, this is the number one thing to look for in an identity theft protection program.

Everyone is vulnerable, young and old alike.  Even the deceased have their information being used.   Education is key.  Know what can happen to you and put a plan in place to help you manage it not if, but when it happens to you and your family.

As far as things you can do to help protect yourself and your family, follow this list of suggestions below.

Top 21 Ways to Avoid Identity Theft

  1. Subscribe to a reputable credit monitoring company that not only monitors your credit on an ongoing, 24 hour, 7 day/week basis, but also provides RESTORATION (not resolution or reimbursement) and attorney access when you are a victim.
  2. Cross-cut shred all junk mail/documents with personal information on them before throwing them away.
  3. Mail all outgoing mail from a secure location such as an official United States Post Office box.
  4. Never give your personal information out to anyone unless you initiate the contact.  Be aware of phishing, smishing, and pharming.
  5. When making online purchases, make sure that you are on a secure website.  It will have an “s” after the http (ie:  https://)  Use a separate credit card with a low limit for online purchases.  Using your debit card gives easier access to your bank account where your daily living expense money is more readily available.
  6. Copy the contents of your purse/wallet and keep in a safe place.
  7. Don’t just sign the back of your credit cards.  Specify “Photo ID Required” or “Please see ID” with your signature.
  8. Never carry your social security card in your wallet/purse and have your social security number removed from your driver’s license.
  9. Check your bank and credit card statements regularly.
  10. Keep your blank checks in a secure location.  When ordering new checks, have them mailed to your bank (not your home).  Use your first and middle initials with your last name and your cell phone number vs. your home phone.  Don’t carry your checkbook unless you know you will need it that day.
  11. When writing checks, use a felt tip marker or gel pen.  Do not use a ballpoint pen.  Ballpoint pen ink can easily be “washed”.
  12. Ladies, hold onto your purse while shopping.  Never leave it in the cart unattended.
  13. Take your trash to the curb the morning of, not the night before.  At the curb, it becomes public property.
  14. When doing anything financial online be sure to use a secure online connection in lieu of wireless (in public places).
  15. Opt out of credit card offers at 1-888-5-OPTOUT or online at  This won’t stop all offers completely, but will definitely slow them down.
  16. Keep your computer firewall and virus protection updated.
  17. Use at least 8 digit passwords with a combination of letters and numbers on your accounts
  18. Make it a household rule that the first family member home gets the mail.
  19. If you opt to freeze your credit, then understand that it makes it very difficult for you to make large purchases, open accounts, etc.  You have some choices as to the length of time you choose (90 days – long term).
  20. If your credit card has an RFID chip in it, then be sure to carry it in a security sleeve (you can find these at travel stores) or wrap in foil.
  21. Make your credit/debit card company and financial institution aware if you plan to travel.

If you would like to speak with Peggy about identity theft protection and insurance, contact her at 720-280-1068 and visit her website at

5 Ways to Keep Your Computer Running Fast

“Why is my computer so slow?”  How many times have we asked ourselves that?  It is widely considered an unfortunate fact of life that computers will slow down and eventually die, like an old person, or a battery running out of juice at the end of it’s life.  But I am here with happy news: it doesn’t have to be that way! Keep your computer running fast with the following tips.

Happy News: Computers don’t have to slow down!


5 ways to keep your computer running fast

  1. Reboot your computer

    It’s such a common answer that it has become comical.  Users wonder why helpdesk people always tell them reboot.  Helpdesk people wonder why users never reboot, even though they’re always telling them to.  Here’s the secret: Rebooting is the miracle cure for Windows woes.  As you may have realized by now, Microsoft software is not always the most stable, best written software imaginable.  You turn on programs and turn them off, open and close files, make changes, undo, redo, etc.  All of the normal things that people do leads to A LOT of processing on the back end.  Sometimes, the people who write the software don’t always clean up after themselves like they should.  Sometimes bugs creep in and get worse as time goes on.  But 90% of all speed problems can be fixed by rebooting.*  It’s like giving your computer a fresh start.  Have you ever performed a task that had so many working pieces you lost track of where you were and had to start from scratch just do to anything at all?  Computers feel that way, too, sometimes.  Reboot once a week or more to keep your computer running fast.

  2. Delete Temporary Files

    As programs go about their business, they generate a lot of data that they only need for a few minutes.  They store this data in temporary files they are supposed to delete later… but often don’t.  People can have hundreds or thousands of these files that are taking up space and slowing down the computer.  So, do yourself a favor to keep a clean computer: every few months, delete all of these temp files immediately after you turn your computer on.  These temp folders are typically stored in 3 locations: C:\temp and C:\Windows\Temp are the easy ones.  The third one is different depending on what version of Windows you’re using and username.  The easy to get to it is to click Start (or Start > Run if you prefer) and type in %temp%.  That’s a percent sign, the word “temp” and another percent sign.  This will take you right to the third folder.  Unless you are specifically saving things here (and don’t do that), deleting everything is generally safe.

  3. Delete Internet Cache

    Your web browser knows 3 things about speed: 1) Most webpages don’t change very often; 2) You go to the same pages over and over; 3) Retrieving data from your own computer is far faster than downloading it over the internet.  Combine all of these things, and you get “caching.”  The webpages you browse the most probably don’t change much and you can see them quicker if they are saved on your computer.  So your browser downloads the websites you go to and stores them on your computer.  This is called “cache,” or “browsing history,” or “temporary internet files.”  But your computer is a glutton, and doesn’t know when to stop.  So it downloads EVERYTHING you see, not just the important stuff.  And then it has to scan everything it has downloaded before getting it from the internet.  If you don’t clear your internet cache occasionally, web browsing will be slower and slower.  All browsers have a way of clearing this cache in their settings.  Do this once a week for a clean computer.

  4. Disable Startup Items

    Most computers that come from manufacturers like Dell and HP have dozens of programs that run behind your back when you turn the computer on.  Most people never use any of these programs, so they are needlessly taking up your computer’s resources.  And the more software you install, the more things get scheduled to run when you turn your computer on.  Remember, you want to keep your computer running fast! Disabling unnecessary startup items can boost your computer’s speed a great deal.  There are many tools out there that can help you do this.  But be careful with this tip, because sometimes you do want things running on startup.  I have generally found it safe to download Autoruns from Microsoft’s website and uncheck everything in the “Logon” tab.  But this is best done with a professional, or someone who knows what all of the startup items really do.

  5. Get a Good Antivirus Program

    The surest way to make your computer slow down is to get a virus or malware.  Everyone knows to have an antivirus program on their computer, but there’s a rub.  All AV programs can look through your computer and find viruses that are already on there.  The tricky part is catching the viruses before they infect you.  Most programs do this by hooking deeply into the operating system, watching everything that happens on the computer, and then approving/disapproving it.  This can really slow down a computer, and some antivirus programs slow your computer down much more than others.  In my experience Norton’s products cause far more problems than they solve, slowing down computers in particular.  So absolutely get a good antivirus product, as well as a good anti-malware product, but look at reviews or ask your IT company which ones they recommend for minimizing user interference.

That’s it.  if you do these 5 things regularly, you’ll keep your computer running fast forever and you will be more productive. No more asking yourself, “why is my computer so slow?”

One last thing: notice I didn’t say, “Defrag your hard drive and delete your cookies.”  I don’t know where this myth came from, but it’s thoroughly unhelpful.  Your computer will have 1000 times as much data saved in internet cache than in cookies.*  And defragmenting your hard drive could be helpful, but it’s more of a last resort for speeding up your PC.  And it’s done automatically these days.  Stick to these 5 and your computing life will be far happier.



* I completely made up these statistics, so don’t quote me on them.  But they paint the right picture, so believe them.  🙂


4 Ways to Increase Your Wireless Internet Speed

What Happened To My Fast Internet?

We’ve all had that problem: you sit down, motivated for the day and ready to get everything done…. and you can’t connect to the internet.  The wifi is broken again. Everyone has problems with wireless internet speed, both at home and at work. Typical fixes include: “wait for it to get better,” or “reboot the stupid thing again.”  Here, we present 4 things you can do to make your wireless network better so this won’t be a problem in your life.

1.  Don’t Use Wifi

That’s right, we said it.  Don’t use wifi!  True, this is a bit of a strange suggestion, given the focus of this article, but hear us out (and then move on to more poignant tips).  What we will be discussing below are all the problems with wireless internet speed and how to get around them.  But the fact remains: wifi has a lot of problems. Interference, technology limitations, encryption keys, the list goes on and on.

Wired connections have none of these problems.  In terms of a fast internet connection, plugging your computer in to a network with a cable is better in every way, except portability.  Wired connections are faster, more secure, more stable, and less likely to give you problems than a wifi connection by an order of magnitude.  The only downside is you are limited to where you can move and you have a cable sticking out of your laptop.  But you probably have a power cable and mouse cable sticking out of your laptop already, so one more isn’t a big deal.  Plus, how often do you really browse the web while walking your laptop around the office?

2. Place Your Equipment Properly

Where you put your wireless router or access point can greatly affect how well you can connect to it.  Have you ever noticed your cell phone always cuts out in the same spot in your house?  That’s probably because the signal can’t get from the tower to your phone any longer because of what’s in the way.  The same thing happens to wifi.  If your wireless router or access point is next sitting in a cement room with 3 foot thick walls, it is pretty obvious that the signal won’t get out very well.  Keep the following guidelines, provided by  Cisco, in mind when anticipating how far your signal will go through different building materials:

  • Paper and vinyl walls have very little affect on signal penetration.
  • Solid and pre-cast concrete walls limit signal penetration to one or two walls without degrading coverage.
  • Concrete and wood block walls limit signal penetration to three or four walls.
  • A signal can penetrate five or six walls constructed of drywall or wood.
  • A thick metal wall causes signals to reflect off, causing poor penetration.
  • A chain link fence or wire mesh spaced between 1 and 1 1/2 in. (2.5 and 3.8 cm) acts as a harmonic reflector that blocks a 2.4-Ghz radio signal.

Also, avoid placing your wireless equipment next to windows, filing cabinets, HVAC ducts, and other metal surfaces, as they can bounce the signal in unexpected ways.  And keep them away from devices that cause interference (see below), regardless of the material.  The higher you can place your wireless router, the better the internet speed.  Definitely above furniture level, on the ceiling is great.  Finally, position the antenna vertically for best signal strength.

3. Avoid Interference

The biggest problem with internet speed is when other wireless signals get in the way.  If you are in an office building with 15 other companies within wireless range of you, then your wireless device is competing with at least 15 other devices, all trying to send data over the same spectrum.  But wireless manufacturers know this is how life is, so they do a good job at designing their products to work in crowded environments like that.  The more difficult problem is other non-wifi devices that are using the same spectrum.  Most wifi uses the 2.4 GHz spectrum range.  So do baby monitors.  So do cordless phones.  Here is a list of some common non-wifi devices that can all interfere with your wireless internet speed and access:

  • Microwave ovens
  • Cordless phones
  • Bluetooth devices
  • Wireless video cameras
  • Outdoor microwave links
  • Wireless game controllers
  • Zigbee devices
  • Fluorescent lights
  • WiMAX
  • Baby monitors

So, what can you do to avoid all of these problems with wifi speed?  First, have a wireless policy for your office.  Tell your employees they can have video game consoles in their office, but they cannot have wireless controllers.  Encourage people to avoid using Bluetooth when alternatives exist.

Next, carefully consider proper device placement for your networking equipment.  In addition to the tips given above, don’t put your wireless equipment next to the microwave in the kitchen, or on top of a fluorescent light in the ceiling.

When setting up your wireless network, choose your channels carefully.  Look to see what your neighbors are using for wifi channels, and choose one that is used less.  Channels 1, 6, and 11 are best.

Finally, use the 5 GHz spectrum for wireless communication.  Most wireless these days, as well as much of the interference, is on the 2.4 GHz band.  Newer wireless devices can offer the same wireless service on a different spectrum, 5 GHz, which has much less traffic, interference, and noise.  As more people realize this trick, they will move there as well so it will only work for so long.  But even if everyone moves there, it will still have less interference from other non-wifi devices.

4. Buy the Right Equipment

You can go down to your local Radio Shack or Best Buy and pick up a wireless router for $60.  If it works for your home, it should work for your business, right?  Wrong.  Anyone who has read our article on buying a new PC will recognize the flaw in this logic.  Manufacturers tend to build products with two different markets in mind: home and business.  The equipment they produce for the business market tends to be very stable, high end, is expected to work all the time in varied conditions, and is more expensive.

The equipment they produce for the home market is less expensive, but is typically built with lower quality components, has fewer features, and they know that it doesn’t need to work 100% of the time because it’s just some dude at home using it and he can reboot it regularly or go replace it for another $60 in a year if it breaks.

One of the biggest problems businesses have with wifi speed is that they are using home class devices.  In order to have wireless available, stable, and running optimally all the time, businesses need to invest in a business class wireless network.  Business devices will communicate with each other better than home devices, allowing fast internet from one end of the office to the other without losing connection.

Many people try to solve their wireless problems by putting a wifi device in every room; this is a bad idea.  This can lead to more interference, even if they are all part of the same network.  Business class wifi devices will coordinate with each other how strong of a signal they need to broadcast to cover all areas, thus creating less interference.

Next, get a device that can handle 2.4 GHz and 5 GHz.   As we saw above, 5 GHz is a more open spectrum with fewer devices on it and less interference.  But not all computers, tablets, phones, etc. can access 5 GHz, so you will still need to provide 2.4 GHz access.  Find a device that can do both of these simultaneously, as some claim can do both but cannot actually do both at the same time.

Finally, know the difference between a wireless router and a wireless access point.  An access point provides wireless access to an existing network.  This is what most businesses will want in most situations.  A router creates a new network, segregating people on it from all other network traffic.  These are more common at retail stores and will cause communication problems between computers if you put this on your network.


Having questions about your wireless internet speed now and aren’t sure what to do?  Does fast internet seem like an unachievable dream to you at this point? Please ask any questions in the comments section below, we would be happy to answer.