October 2024
No posts found for this month. Check the archive below for past articles.
All posts
Phishing Awareness Training
MCubed will simulate phishing attacks on your end users and provide comprehensive reporting and training for those who take the bait.
How often should you reboot your router?
In general, it’s advisable to restart your router about once a month, especially for home and small Business networks. This practice helps maintain peak performance by clearing stored memory and fixing minor connectivity issues. Many routers offer options to schedule automatic reboots through their app or web interface. This feature allows you to set a convenient time each month, like overnight when internet usage is minimal, ensuring uninterrupted service.
Windows 10 End Of Life
Microsoft has announced that Windows 10 will reach its end of life in October 2025. As a result, MCubed account managers will be contacting clients to discuss upgrading their machines. They will focus on replacing or upgrading eligible machines from Windows 10 to Windows 11, ensuring a smooth transition to a more secure and up-to-date operating system. This effort aims to maintain the efficiency of clients’ IT infrastructure.
City of Fresno Loses $600,000.00 To Phishing Scam
Hackers pretending to be a construction company hired by the City of Fresno to build a new police department convinced two city accountants to transfer $600,000.00 to them. To prevent this from happening to you, contact M Cubed for more information.
If you would like to continue reading on how this happened to the City of Fresno, visit The Fresno Bee article here.
How to Avoid Phishing Scams
Pete James
Phishing scams are a persistent threat because they are profitable for cybercriminals. To protect yourself, follow these guidelines:
- Stay Informed: Keep up with new phishing techniques and conduct regular security awareness training.
- Think Before You Click: Avoid clicking on links in random emails; hover to verify links first.
- Use Anti-Phishing Toolbars: Install these in your browser for an extra layer of protection.
- Verify Site Security: Look for “https” and a lock icon before submitting sensitive information.
- Check Accounts Regularly: Monitor your online accounts and bank statements for suspicious activity.
- Update Your Browser: Install security patches promptly to close vulnerabilities.
- Use Firewalls: Employ both desktop and network firewalls to block intrusions.
- Beware of Pop-Ups: Block or close pop-ups, avoiding any action buttons within them.
- Protect Personal Information: Never share sensitive information through links in emails.
- Install Antivirus Software: Keep it updated to guard against the latest threats.
By following these steps, you can make sure you aren’t the one getting the company breached!
Windows 10 End of Life October 14th, 2025
Windows 10 is nearing the end of support by Microsoft. The official date for this is October 14th, 2025. At that time Microsoft will no longer be releasing crucial updates and security patches for that operating system. This will in turn become a massive security risk for organizations and individuals.
Windows 11 will become the new standard, and M Cubed Account Managers will be contacting you to start this transition. Some computers will have the option to be upgraded at no cost to users, though some computers will not have the processing power to be upgraded and will need to be replaced. Feel free to contact your Account Manager if you would like to get a jump start on this process.
Are you having trouble with a website?
Martin Arrechavaleta
Have you ever ran across a website that is not displaying items properly, saying you are logged in even though you logged out 30 minutes ago or any other general issue? Most issues with websites can be solved by clearing the cookies and cache of the website. Clearing these are a bit different in every browser but the steps for the most popular browsers are below.
- Chrome: Press Ctrl + H on your keyboard, Click on the “Clear browsing data” tab on the left, Make sure “all time” is selected in the time range drop down menu and make sure that the cookies and other site data and the cached images and files checkbox are selected then press on the clear data button.
- Edge: Press Ctrl + H on your keyboard, Click on the three dots in the menu that opened followed by “Open History Page”. You will then click on the “Clear browsing data” button. Make sure “all time” is set in the time range drop down box, the cookies and other site data and cached images and files checkbox are selected then press on the clear now button.
- Firefox: Click on the menu button on the top right of the browser page and click on history. You will then click on “clear recent history”. Ensure the Time range drop down menu is set to “Everything”. Ensure the cookies and cache check box are set then press on the “Clear now” button.
After this is done it is recommended to restart the browser, including all tabs that might be open, not just the website that is giving you trouble. If the website is still giving you trouble feel free to give us a call and we can dig in deeper.
5 Essential Computer Habits Every User Should Know
James Tabor
In today’s digital age, where technology is an integral part of our daily lives, understanding good computer habits is crucial for a smooth and secure user experience. Whether you’re a casual user or rely on your computer for work, adopting these habits will not only enhance your
productivity but also protect your valuable data. Here are five essential computer habits every user should know:
- Regular Software Updates: Keeping your operating system, applications, and antivirus software up to date is paramount. Updates often include patches for security vulnerabilities and performance enhancements. Set your system to automatically update software whenever possible, or manually check for updates regularly.
- Strong Password Management: Your passwords are the keys to your digital kingdom. Create strong, unique passwords for each account, incorporating a mix of uppercase and lowercase letters, numbers, and symbols. Consider using a reputable password manager to securely store and manage your passwords.
- Backup Your Data: Data loss can occur due to hardware failure, malware, or human error. Regularly back up your important files and documents to an external hard drive, cloud storage service, or both. This ensures that even if something goes wrong with your computer, your data remains safe and accessible.
- Practice Safe Browsing: Exercise caution when browsing the internet. Avoid clicking on suspicious links or downloading files from unknown sources, as they may contain malware or phishing attempts. Use reputable antivirus software and enable browser security features like popup blockers and safe browsing modes.
- Be Mindful of Email Security: Email is a common vector for cyber threats such as phishing scams and malware distribution. Be cautious when opening email attachments or clicking on links, especially if they’re from unfamiliar senders or seem suspicious. Verify the legitimacy of emails before taking any action and avoid sharing sensitive information via email whenever possible.
By incorporating these five computer habits into your routine, you can significantly reduce the risk of security breaches, data loss, and other common computer-related issues. Remember, proactive measures such as regular updates, strong passwords, backups, safe browsing, and email security are essential pillars of a secure and productive computing experience. By staying informed and practicing these habits diligently, you’ll be better equipped to navigate the digital landscape safely and effectively.
Protecting Yourself From Scams
Megan Downum
Every day you get flooded with emails, but how do you tell if one is really from your boss or the bank? Scam emails are becoming an everyday occurrence, and no matter how much spam filtering you have, scammers are always going to be one step ahead and things are always going to get through. Below are two steps to help you navigate being able to differentiate scam emails versus legitimate emails:
- Senders Email: Anyone can open a new email address and say their name is your boss, a colleague, or even use your name. What they often cannot do though is to mimic the actual email address. When you see an email, after the sender’s name, the email address is listed in <>.
Example: From: Mr. Big Bossman
When looking at emails, especially ones that may seem a little off, make sure you check the actual email address they are sending from, not just the name. - Always double check requests: Scam emails almost always contain a request, whether that be something like buying Amazon gift cards and sending the scammer the codes, to changing banking information, to logging into fake sites to gain your credentials. If the request is not something you were suspecting, reach out directly to whoever you believe sent the request. Do not reply to the email, but start a fresh new email, or call the person in question. If an email is asking you to log in somewhere because your account was compromised, reach out to the account or sign in without following the link in the email.
Not sure? That’s why we are here! Scammers get smarter and better every day. But do you know what they don’t have? M Cubed! We are here for you 24-7 if you ever need us to check an email. We are trained in spotting spam and can even test links to check and see if they are valid or not. Feel free to forward our team any emails you are not sure about, and we can let you know if they are safe or not.
Your Greatest Cyber Security Risk May Surprise You
Jesse Gibson
When it comes to cyber security, employees are a company’s greatest asset while simultaneously being their greatest risk. This is why at M Cubed we are strong proponents of doing continued education on cyber security. We want to provide your staff with the knowledge to spot a phishing email or a risky website. While these training courses are incredibly valuable, we believe they are the bare minimum. How do you know the knowledge is being retained? Maybe a user is in the middle of a busy day and has a lapse in judgment or is simply moving too fast. How do you help correct or even identify these behaviors and drive home the importance of being safe online?
The simple answer to these questions is to try and hack them! Running a phishing campaign against your staff is a great and easy way to identify where your security flaws exist at the user level. It is also a great way to empower your employees with useful knowledge that not only applies to their work life, but also their home life. Essentially, we try and entice end users to click on links and input sensitive information. If a user does this then they are directed to watch a short video on cyber security and take a quick test. By running these campaigns across a yearlong period, it makes your staff stay much more alert and they are much less likely to have cyber security incidents. This type of training is becoming more and more prevalent and is even being required by some cyber liability insurance carriers. If you are interested in learning more, please feel free to reach out to us and we can set up a custom campaign just for your business.
Passwords 101
Logan Cerutti
In today’s online world, keeping your accounts safe with strong passwords is super important. We’re here to give you some easy tips to help you create and manage your passwords better. First off, make sure your passwords are long and complicated, using a mix of letters, numbers, and symbols. Avoid using things that are easy to guess, like your birthday or your pet’s name. And it’s a good idea to use different passwords for each of your accounts just in case one of them becomes compromised.
If remembering lots of different passwords sounds tricky, don’t worry! There are tools called password managers that can help. They keep your passwords safe and can even make strong passwords for you. At M Cubed Technologies, we’re all about keeping you safe online. If you ever need a hand with your passwords or anything else tech-related, just give us a shout. Let’s work together to keep your accounts safe and your information secure.
Why You Need to Reboot
Written by Chad Sinclair
Imagine your computer as a busy workspace. Throughout the day, programs pile up like papers, temporary files linger like coffee mugs, and background processes hum like forgotten printers. No wonder things get sluggish by morning! That’s why a daily restart is like a magic reset button. It sweeps away those digital leftovers, freeing up memory and resources.
M Cubed schedules a restart to your computer once a week, like a weekly housekeeper, making sure your computer gets any updates, but if you notice your computer is running a little sluggish, give it a restart! It’s just a few minutes for a smoother, faster, and more secure morning – like starting your day with a tidy desk and a fresh cup of coffee!
Copilot: Microsoft’s new 365 AI Assistant
Get ready to ditch the tedious tasks and embrace lightning speed with Microsoft’s game-changing AI Assistant, Copilot, now available to ALL 365 users! Imagine:
- Effortless Document Creation: Brainstorm killer content, breeze through edits, and craft emails that resonate – all with Copilot’s intelligent guidance at your side.
- Streamlined Workflows: Eliminate repetitive tasks and automate complex processes across Word, Excel, PowerPoint, Outlook, and more. Focus on what matters most, while Copilot handles the heavy lifting.
- Time-Saving Efficiency: Cut your workload in half! Copilot anticipates your needs, suggests intelligent solutions, and helps you achieve more in less time.
- Unmatched Personalization: Copilot learns your unique style and preferences, adapting its assistance to deliver a truly seamless experience.
Ready to unlock the power of Copilot? Contact your Account Manager today to discuss implementation today!
Is your device at risk?
Written by Bill Brown
A second layer of security can protect against common hacker attacks.
MFA works by providing a 2nd layer of security in the form of sending you a code via an authentication application such as Google Authenticator or Microsoft Authenticator and even by text message. Now you might be asking yourself how hackers bypass this if they aren’t being sent the code or don’t have access to the authenticator app. This is where we come across a term used in the security industry called MFA Fatigue. MFA Fatigue is caused by sending a request for an MFA code being sent to a user so many times that they eventually accept it. You probably have noticed that when we turn on MFA, we have it send you a code that requires you to put the code in or verify it with the application. MFA has another method where it just sends you a link stating something like “Hey did you recently try to sign into this site?” Those are the types that generally fall into the category of being able to be cracked by MFA Fatigue.
Difficulty Reading Text in Your Web Browser?
Written by Anthony Choza
You can quickly change the text size of any web page by taking these easy steps.
Finding it hard to read text in your web browser? You can quickly change text size of any web page by holding down Ctrl and the mouse wheel up or down OR Ctrl and +/-. This will also work on your desktop to change the size of your desktop icons and the icons in your folders.