1MC – July 06, 2024 – Links We Like

1MC: The general announcing system on a US Navy vessel

Cool Icon Collection
Phosper iconography

Python Version Lifecycle
Find out when your favorite version of Python goes end-of-life

Nvidia Expects To Book $12B In GPU Sales To China
Capitalism trumps politics every time

Hackers Have Access To Over 10 Billion Stolen Passwords
There’s 8 billion people in the world…do the math

Using R With a 1 Billion Row File
I don’t know; the word billion is on a roll this week

AI Open Source Tools
It wouldn’t be a blog post without mentioning AI

How Does Email Work
Great article, not too technical. If you think Outlook is email, read this

Healthcare And Data Privacy
Ads, trackers, cookies everywhere…

Admiral Rickover’s ‘Paper Reactor’ Memo
For the next time someone tells you, “Theoretically it should work.”

NSA Cybersecurity Website
Great info from America’s favorite spy gang

Managed Service Providers

Are your tech issues overwhelming your in-house IT staff? Do you not have IT staff but need periodic knowledgeable, reliable, professional IT support? Did the guy/gal who ‘knows computers’ at your company suddenly leave and you have no idea what’s happening with your computer systems? If you answer yes to any of the above, it might be time to consider a Managed Service Provider (MSP)!

Why Use an MSP?

Think of an MSP as your on-demand tech support team handling your IT needs, and allowing you to focus on what you do best—running your business! Here’s why you should consider partnering with an MSP:

  1. 24/7 Support: Because tech problems don’t stick to 9-5 schedules.
  2. Proactive Maintenance: MSPs prevent issues before they become catastrophic.
  3. Expertise on Tap: Access to a team of IT experts without the hefty salary costs.

What Does an MSP Do?

MSPs are like Swiss Army knives for your business. They offer a range of services including:

  • Network Management: Keeping your systems running smoothly.
  • Data Backup and Recovery: Because losing data is a nightmare we can all live without.
  • Cybersecurity: Protecting your business from the bad guys (hackers, not your competitors).

Financial Benefits

Who doesn’t love saving money? Here’s how MSPs help you do just that:

  • Cost Efficiency: Pay for what you need, when you need it. No more, no less.
  • Predictable Budgeting: Flat-rate pricing makes financial planning a breeze.
  • Reduced Downtime: Less downtime means more productivity and higher revenue.

What Qualities Should You Look For in an MSP?

Choosing the right MSP is like picking the right partner for a dance—one misstep, and it’s chaos! Here are some qualities to look for:

  1. Experience and Expertise: They should know their stuff inside out.
  2. Reliability: Look for a provider with a proven track record of keeping systems up and running.
  3. Scalability: Your MSP should grow with you, not slow you down.
  4. Great Communication: They should speak fluent ‘non-tech’ and keep you in the loop.
  5. Reputation: Let’s be real, Florida is a magnet for grifters and shady deals. Like any other reputable profession, an MSP should have a proven track record, be involved in the community it serves, be a ‘real’ company, and carry liability insurance.

Make tech headaches a thing of the past. For professional, affordable, reliable IT and computer services, contact CBC Technologies.

Security Best Practices

8 Essential Cybersecurity Tips to Stay Safe Online

In today’s increasingly digital world, safeguarding your online information is critical. From social media accounts to financial data, we expose sensitive, personal information on the internet. By adopting a few key cybersecurity habits, you can significantly increase the odds to keep your data safe.

  • Use Strong, Unique Passwords: Ditch predictable passwords. Use a combination of uppercase and lowercase letters, numbers, and symbols to create strong passwords. Avoid using the same password for multiple accounts.
  • Enable Two-Factor Authentication: Two-factor authentication (2FA) requires a second verification step beyond your password, (often your phone), significantly reducing the risk of unauthorized access.
  • Stay Vigilant Against Phishing Attacks: Be aware of suspicious emails, messages, or websites. Phishing attempts lure users into clicking malicious links or attachments that steal personal information. If something seems off, it probably is – avoid clicking and delete the email.
  • Keep Anti-Virus Software Up-to-Date: Anti-virus software is your digital shield, constantly evolving to combat emerging threats. Regularly updating your anti-virus ensures it has the latest defenses to protect you from the newest malware and cyberattacks.
  • Apply Operating System and Application Patches Regularly: Software updates (patches) often address critical security vulnerabilities that malicious actors exploit. Don’t postpone these updates! Set your system to update and restart automatically to streamline the process.
  • Encrypt Sensitive Data: Encryption scrambles your data, rendering it unreadable in the event of a security breach. Encrypting sensitive information like financial documents or personal records adds an extra layer of protection. Bitlocker, (Windows), and FileVault, (Mac), are free built-in tools that can encrypt your hard drive(s).
  • Secure Public Wi-Fi Connections with a VPN: Public Wi-Fi networks are breeding grounds for cyberattacks. Use a Virtual Private Network (VPN) to encrypt your internet traffic and safeguard your data.
  • Simplify Password Management with a Password Manager: Remembering complex, unique passwords can be a challenge. Password managers help you generate, store, and manage strong passwords for all your online accounts, simplifying security without sacrificing strength.

By incorporating these simple yet effective cybersecurity, you will significantly reduce the risk of falling victim to cyberattacks.

    We Were Hacked!

    Verizon’s Data Breach Investigations Report

    Verizon’s Security Report: Key Takeaways and Your Steps to Stay Safe

    Here’s a breakdown of Verizon’s Data Breach Investigation Report with actionable advice:

    • People are the Weakest link. Most breaches involve human error. Secure your systems based on your needs.
    • Top Attack Methods: Credential theft (use 2-factor authentication!) Phishing emails (don’t click, don’t reply, and don’t share information) Unpatched vulnerabilities (update software regularly)
    • Browsers as Backdoors: Use Privacy Badger and uBlock Origin browser extensions. Clear your cache often.
    • Phishing Emails are effective; Many people fall for them. Be suspicious, verify senders, and delete unknown emails.
    • Lost Devices are common. 80% of mobile devices are lost, not stolen. Secure your devices!
    • Small businesses are targeted: Don’t underestimate your data’s value. Don’t rely on weak security practices.

    For a deeper dive, download the free Verizon report!

    Just Delete It

    The FBI, Microsoft, and Google Will Never Call Or eMail You

    A one-page computer security refresher from the FBI.

    https://www.fbi.gov/how-we-can-help-you/safety-resources/scams-and-safety/on-the-internet

    Of particular interest is the note in the lower right:

    Note: The FBI does not send mass emails to private citizens about cyber scams. If you received an email that claims to be from the FBI Director or other top official, it is most likely a scam.

    Replace FBI in that note with ‘Apple’, ‘Dell’, ‘Microsoft’, ‘Google’, etc., and it still holds true. Those companies will never contact you directly via email, browser pop-up, phone, text, carrier pigeon, etc., regarding a security issue. If you think they are contacting you directly with a legitimate communication, they aren’t. Please delete the email, don’t take the phone call, and dismiss the browser popup.