Category: Tips

Audio Spectrum with REC (Record) Symbol on Screen Monitor

Mac Screenshot & Screen Recording: Your Complete Guide

Mac Screenshot & Screen Recording: Your Complete Guide

Sometimes, a picture (or a recording) is worth a thousand words. Whether you’re explaining a complex process to a colleague, capturing a funny moment online, or creating a video tutorial, your Mac has built-in tools to help you quickly capture what’s on your screen.

In this post, we’ll delve into the world of Mac screenshots and screen recordings, making you a pro in no time!

Capturing Stills: Screenshot Techniques

There are two main ways to take screenshots on your Mac:

  • Using keyboard shortcuts: This is the fastest method. Here’s a breakdown of the popular shortcuts:

    • Capture the entire screen: Press Shift + Command + 3.
    • Capture a portion of the screen: Press Shift + Command + 4. Drag your cursor to select the area you want to capture, then release your mouse button.
    • Capture a window: Press Shift + Command + 4, then press Space. Click on the window you want to capture.
  • Using the Screenshot tool: For more control and options, use the Screenshot tool:

    • Press Shift + Command + 5. This opens the Screenshot toolbar with various capture options.
    • Choose the capture method (entire screen, portion, window, etc.) and customize options like including the mouse pointer or setting a delay before capture.

Going Beyond Stills: Screen Recording Magic

Want to capture a sequence of actions or demonstrate a software program? Here’s how to record your Mac screen:

  • Using the Screenshot tool: That’s right, the Screenshot tool offers recording functionality as well!

    • Press Shift + Command + 5.
    • Click the record button (it looks like a dot within a circle) and choose between recording your entire screen or a specific portion.
    • Click “Record” to start capturing and “Stop” to finish.
  • Using QuickTime Player: This method offers more advanced options for recording with audio.

    • Open QuickTime Player.
    • Go to “File” > “New Screen Recording.”
    • Click the arrow next to the record button to set preferences like microphone selection (for audio recording).
    • Click “Record” to begin and “Stop” to finish.

Exploring Further:

For a visual guide, check out this helpful video tutorial by Apple Support: Apple take a screenshot and record screen on Mac YouTube

Mastering the Mac Screen Capture Arena

With these techniques under your belt, you’re now equipped to capture anything on your Mac screen! Remember, practice makes perfect, so don’t hesitate to experiment and explore the different options available.

Now go forth and snag those screenshots and screen recordings!

Go Green, Earth Day, Man using a laptop with GO GREEN environment on screen. Green business transformation for modish corporate business for Green energy clean natural energy. World environment day.

Power Down and Power Up the Planet: Eco-Friendly IT Practices for Earth Day

Power Down and Power Up the Planet: Eco-Friendly IT Practices for Earth Day

 

Every year, Earth Day serves as a vital reminder of our responsibility to protect our planet. This year, let’s focus on an area that often gets overlooked: Information Technology (IT). Believe it or not, our tech habits can have a significant environmental impact. But the good news is, there are simple steps we can all take to make our IT practices more eco-friendly!

The Cloud Can Be Green

Migrating to cloud-based solutions can be a major win for sustainability. Traditional on-premise servers require a lot of energy to keep them cool and running. Cloud providers, on the other hand, are increasingly investing in renewable energy sources and energy-efficient data centers. By shifting your data and applications to the cloud, you’re essentially tapping into a more sustainable infrastructure.

Power Down and Conserve

Small changes in daily habits can add up to big results. Enable automatic sleep modes on computers and monitors to minimize energy consumption when not in use. Encourage a culture of “printing as a last resort” within your organization. Many documents can be easily shared and reviewed electronically, saving paper and the energy required to produce it.

Invest in Efficiency

Look for energy-efficient hardware when purchasing new equipment. Many manufacturers offer Energy Star certified devices that are designed to use less power. Extending the lifespan of your existing hardware is another great way to reduce your environmental footprint. Proper maintenance and repairs can keep your devices running smoothly for longer, reducing the need for frequent upgrades.

Think Before You Dispose

E-waste is a growing concern, and disposing of electronics improperly can release harmful toxins into the environment. Many manufacturers offer take-back programs for old equipment, ensuring it’s recycled responsibly. Data security is also important, so be sure to securely erase all sensitive information before handing off any old devices.

Spreading the Green Message

By making eco-friendly IT a priority, you’re not just helping the planet, you’re also setting a positive example for others. Promote green IT practices within your organization and encourage colleagues to adopt these sustainable habits. This Earth Day, let’s all strive to make our digital footprint a little lighter!

This is just a starting point! By implementing these eco-friendly IT practices, we can all make a positive difference for our planet. Remember, every little bit counts! Happy Earth Day!

Nomad digital woman hand  as she is a freelance working  a vacation with laptop in  Airplane

Travel Wi-Fi 101: Mastering Airplane Wi-Fi for Smooth Soaring

Travel Wi-Fi 101: Mastering Airplane Wi-Fi for Smooth Soaring

 

Imagine you’re hurtling through the sky, nestled in your cozy airplane seat. The anticipation of your destination thrums through you, but the hours stretch out before you like a vast, Wi-Fi-less desert. Fear not, intrepid traveler! A glimmer of hope shines on the horizon: airplane Wi-Fi.

But hold on to your boarding pass, because airplane Wi-Fi can be a fickle beast. One minute you’re scrolling through social media with glee, the next you’re trapped in “buffer purgatory” – a land of agonizingly slow loading times. Don’t let this be your fate! With a few savvy moves, you can transform airplane Wi-Fi from a frustrating foe to a trusty travel companion.

Pre-Flight Preparation: Pack for Patience (and Entertainment)

Let’s be honest, airplane Wi-Fi isn’t known for its lightning speed. Downloads can feel like molasses in January, and video calls might resemble a game of charades played over a potato. Embrace the zen of slow internet. Pack some downloaded movies, ebooks, or podcasts to keep you entertained when the Wi-Fi decides to take a siesta.

Security Check: Think Before You Share

Remember, airplane Wi-Fi is like a friendly neighborhood barbecue – everyone’s invited (including potential snoops). Avoid logging into super sensitive accounts like your bank or using credit cards for online shopping. Stick to browsing lighthearted content, catching up on emails, or sharing envy-inducing vacation pics (once you land, of course!).

Upgrade Your Connection: Consider a VPN

For an extra layer of security, consider using a Virtual Private Network (VPN) This nifty tool encrypts your data, making it as indecipherable as a secret agent’s message. Think of it as a digital bodyguard for your online activities. Services like Nord VPN are a great consumer option for your protection.

Wi-Fi Wisdom: Research and Prioritize

Not all airlines offer Wi-Fi, and some charge a fee. Do your research beforehand to avoid any in-flight surprises. If you plan to purchase Wi-Fi, decide which device (phone, tablet, laptop) will be your main internet portal. This will help you choose the most suitable data plan.

Bonus Tip: Stay Connected, Not Constantly Connected

Airplane Wi-Fi can be a great way to stay connected with loved ones back home. But remember, sometimes the best way to connect is to disconnect. Use Wi-Fi for quick updates, but also savor the opportunity to unplug and unwind. After all, the airplane window offers some pretty spectacular entertainment too!

So, with a little planning and these handy tips, you can navigate the sometimes-turbulent waters of airplane Wi-Fi. Now, buckle up, turn on airplane mode (except for Wi-Fi, of course!), and get ready for a smooth sailing (or soaring) adventure!

real estate with laptop and hands, property value

A Tenant’s Guide to Finding the Best IT Environment from Property Managers

A Tenant’s Guide to Finding the Best IT Environment from Property Managers

In today’s digital age, a reliable and secure IT environment isn’t just a perk for tenants – it’s a business necessity. Companies of all sizes rely on seamless internet connectivity, robust security, and sometimes even smart building features to operate efficiently. But with so many office spaces available, navigating the tech landscape during the leasing process can be overwhelming. This guide equips you with the knowledge to find an office space that fosters optimal IT functionality:

Know Your Needs: Before embarking on your search, take stock of your company’s specific IT requirements. Here are some key factors to consider:

  • Bandwidth & Speed: Do you need lightning-fast internet for video conferencing and cloud storage, or is a standard business package sufficient?
  • Security & Compliance: How sensitive is your company’s data? Does your industry have specific IT security regulations to follow?
  • Scalability: Will your company’s technology needs likely grow in the near future? Ensure the infrastructure can adapt.
  • Smart Building Integration: Do you require features like smart access control, climate control, or conference room booking systems?

Ask the Right Questions: Once you have a firm grasp of your needs, prepare a list of questions for potential landlords:

  • Internet Service Providers (ISPs): Which ISPs are available in the building, and what are their pricing and service level agreements (SLAs)?
  • Bandwidth Capacity: What is the building’s internet bandwidth capacity, and how is it allocated among tenants?
  • Security Measures: What physical and network security measures does the building have in place?
  • IT Infrastructure: Can the building’s existing infrastructure support your company’s hardware and software needs?
  • Smart Building Features: Does the building offer any smart features, and are there additional costs associated with using them?
  • IT Support: Does the landlord offer any on-site IT support or have preferred vendors

Look for Red Flags: Unclear information could mean disorganized IT conditions that could impact your lease experience

  • Limited ISP Options: Having few ISP choices can limit your control over service quality and cost.
  • Unclear Security Policies: A lack of transparency about security measures can put your company’s data at risk.
  • Outdated Infrastructure: Outdated wiring or limited bandwidth can hinder future growth and efficiency.
  • Unwillingness to Negotiate: A rigid landlord unwilling to accommodate your IT needs might not be the best fit.
  • Negotiate for Your Needs: The leasing process is a negotiation. Don’t be afraid to advocate for your company’s critical IT requirements. Here are some strategies:
  • Highlight the Importance of IT: Explain how a reliable IT environment is essential for your business operations.
  • Offer Incentives: Be willing to consider a longer lease term or higher rent in exchange for upgrades to the IT infrastructure.
  • Suggest Improvements: If the building lacks your ideal features, propose solutions like co-sharing the cost of an internet service upgrade.
  • Bring a Managed IT Service Consultant with you: This third-party expert can quickly identify the best IT environment and can assist with those tough questions before you sign a lease.

Finding the Tech Oasis:

By being proactive, asking the right questions, and understanding your company’s specific needs, you can find an office space that fosters a seamless and secure IT environment. This translates to a more productive and efficient workplace for your team. Remember, a well-equipped and tech-friendly office space can be a significant competitive advantage in today’s data-driven business world. So, prioritize your IT needs during the leasing process and find your perfect tech oasis!

desktop computer with cleaning application

Declutter Your Digital Detox: Cleaning for Your Files in 2024

Declutter Your Digital Detox: Cleaning for Your Files in 2024

As the fresh year beckons, we all crave a clean slate. But let’s face it, our digital lives often resemble an overflowing attic crammed with dusty files and forgotten folders. Fear not, tech hoarders! This New Year, it’s time to embrace a digital detox and spring clean your virtual world. Ditch the digital debris and reclaim your sanity (and storage space) with these tidying tips:

1. Tame the Desktop Jungle:

  • Embrace ruthless deletion: Scan your desktop for unused files, outdated documents, and downloaded clutter. Drag them to the digital bonfire of oblivion!
  • Organize like a pro: Create systemized folders for projects, documents, photos, and downloads. Labels are your friends, use them wisely!
  • Wallpaper wisdom: Pick a calming image that inspires productivity, not digital despair. Remember, a tidy desktop equals a tidy mind.

2. Conquer the Email Avalanche:

  • Unsubscribe with zeal: Unsubscribe from those nagging newsletters and promotional emails you never read. Free your inbox from the constant digital drip-drip-drip.
  • Filter like a ninja: Employ smart filters to automatically categorize emails based on sender, keywords, or priority. Tame the inbox beast with the power of organization!
  • Archive smartly: Don’t delete everything. Create dedicated folders for important emails, old projects, and personal correspondence. Remember, archiving is not deleting, it’s organized hibernation.

3. Photos: From Chaos to Chronological Joy:

  • Face the duplicates: Scan your photo library for the dreaded doppelgangers. Keep the best version, banish the rest. Storage space is precious, use it wisely!
  • Organize by time and theme: Create folders for years, occasions, or even specific trips. Label them clearly so you can relive those memories with ease.
  • Cloud it up: Consider cloud storage for long-term photo archiving. Free up local space and access your cherished pics from anywhere.

4. Social Media: Detox and Digitization:

  • Unfollow the noise: Take control of your newsfeed. Unfollow accounts that drain your energy and add little value. Curate your online space for inspiration and positivity.
  • Organize memories: Download favorite photos and videos from social media platforms. Don’t rely solely on their servers for your precious memories.
  • Privacy protection: Review your privacy settings on all social media platforms. Decide what you share and who sees it. Your digital life, your rules!

5. Software Savvy: Unwind the App Mess:

  • Uninstall the unused: Go through your installed programs and ruthlessly uninstall anything you haven’t touched in months. Unused software is just digital cobwebs gathering dust.
  • Update the essentials: Ensure your essential software is up-to-date to stay secure and efficient. Outdated software is like a leaky roof – vulnerabilities waiting to happen.
  • Organize your launchers: Group similar apps together, create folders for specific tasks, and make your workflow smooth and accessible. A little organization goes a long way!

Bonus Tip: Reward yourself! As you conquer each digital clutter mountain, celebrate your progress. A tidy digital life is a happier, more productive one. So grab your virtual broom, roll up your sleeves, and embrace the liberating joy of a digital detox. Happy cleaning in 2024!

Remember, even small steps can make a big difference. Start with one digital space, tackle another tomorrow, and soon, your virtual world will be sparkling clean and organized. Happy New Year and happy (digital) spring cleaning!

Resources:

Book: Digital Minimalism: Discover How to Clear the Clutter So You Can Regain Your Focus, Passions and Live Life Again

Microsoft Outlook Clutter Button: Move email to Clutter

G-Suite File Organization Organize in G-Suite

Innovative cloud technology background, blue and white hues

Cloud Cost Control: A Comprehensive Guide to Managing Your Cloud Budget

Cloud Cost Control: A Comprehensive Guide to Managing Your Cloud Budget

 

The cloud: it’s the tech titan on everyone’s mind, promising scalability, agility, and the flexibility to launch groundbreaking apps at the snap of a finger. But amidst the exhilarating rush, a lurking truth whispers: even magic comes with a price tag. Uncontrolled cloud spending can quickly transform your bill into a monstrous storm cloud, casting a shadow over your budget. Fear not, cost-conscious adventurers! We’re here to equip you with the tools and tactics to ride the cloud rollercoaster without plummeting into financial freefall.

Right-Sizing: Finding the Goldilocks Zone of Performance and Price

Imagine cloud resources like Goldilocks’ bowls of porridge – too big, and you’re overpaying for unused power; too small, and your workloads splutter and stall. Finding the perfect fit demands mindful monitoring. Analyze real-world usage patterns and don’t be afraid to downsize underperformers, or upgrade when workloads demand it. Remember, every penny saved is a victory against the budget beast.

Automation: Your Cloud-Taming Champion

Think auto-scaling: it’s like magic, but with algorithms. This superhero automatically adjusts your cloud infrastructure to match your actual usage, ensuring you’re never paying for dormant resources at 3 AM. Automation extends beyond resizing, it can optimize resource allocation, schedule power-downs during low periods, and even negotiate better rates with your cloud provider. Let the robots do the heavy lifting, you reap the cost-saving rewards.

Storage Tiers: Not All Data Deserves Front Row Seats

Not all data is created equal. Some crave the red carpet treatment – fast SSDs for your frequently accessed workhorses. Others are content with the cheap seats – glacial storage for archived files hibernating in the digital attic. Tiering your storage based on access frequency is like organizing your closet: efficient, cost-effective, and liberating for your budget.

Commitment: A Powerful (But Pricey) Weapon

For predictable workloads, committed use plans can be your cost-busting allies. Cloud providers offer significant discounts for guaranteed resource usage, but remember, flexibility comes at a premium. Analyze your needs carefully before taking the plunge – sometimes, the freedom to scale up or down on demand may outweigh the savings.

Monitor, Analyze, Conquer: Your Data-Powered Roadmap to Savings

Knowledge is power, and when it comes to cloud costs, your billing reports are the Rosetta Stone. Regularly monitor usage patterns, analyze spending trends, and identify unused resources. This data-driven approach shines a light on hidden waste, letting you optimize configurations, eliminate idle resources, and even negotiate better deals with your provider. Remember, staying vigilant is key to keeping your cloud castle financially secure.

Bonus Level: Embrace the Managed Services Cavalry

Managed services are like trusty sidekicks on your cloud journey. Providers offer expertise, management tools, and ongoing optimization, often for a fixed fee. While there’s an upfront cost, the potential for significant savings through efficient resource allocation and proactive cost management can make them a game changer. Weigh the pros and cons before deciding, but know that this option can be a potent weapon in your cost-control arsenal.

Conquering the cloud is not a one-time victory, but an ongoing quest. By wielding these tactics like enchanted weapons, you can master the magic of cloud technology without succumbing to budget dragons. Remember, awareness is your shield, analysis your sword, and automation is your trusty steed. Go forth, brave adventurer, and claim the riches of the cloud without letting them drain your coffers!

Need help controlling your cloud costs? Check this AWS Cost Calculator and take a look at this article, or Contact us today!

iPhone Security Alert- Protect Your iPhone from Spyware

Eaton & Associates, as a Managed Service Provider (MSP), safeguarding our clients’ digital environments is vital. In recent developments, a concerning security breach has come to our attention, impacting iPhone users. One of the reasons individuals choose iPhones is for their robust security which is now being exploited by a clever cyber-attack.

According to a recent report from Russell Kent-Payne at Certo Software, hackers have devised a cunning method to circumvent Apple’s security measures by employing third-party custom keyboards. These malicious keyboards are being used as tools to spy on unsuspecting iPhone users, compromising their private messages, browsing history, and even passwords.

Certo Software initiated an investigation following multiple reports of cyberstalking incidents where the perpetrators seemed to possess intimate knowledge of the victims’ iPhone activities. Subsequently, the discovery was made that malicious third-party keyboards were present on all affected devices.

This attack distinguishes itself from more conventional techniques as it doesn’t require jailbreaking the target’s iPhone or gaining access to their iCloud account. Instead, it leverages third-party keyboards as a keylogger on exploited devices. Hackers discreetly capture and transmit all keystrokes made by an iPhone user through these manipulated keyboards.

This exploitation uses Apple’s TestFlight platform, normally used for testing iOS apps before being released on the App Store. By deploying malicious keyboards through TestFlight, hackers can evade Apple’s security scrutiny, as the platform lacks the stringent security checks applied to App Store apps.

To identify whether your iPhone has fallen victim to this security threat, take the following steps:

  1. Open the Settings app on your iPhone.
  2. Navigate to General, then Keyboard, and finally Keyboards.
  3. Observe the list of standard keyboards, typically one in your language and another named “Emoji.”
  4. If you notice an additional keyboard that you did not install, especially one with “Allow Full Access” enabled, exercise caution.

Should you discover an unrecognized custom keyboard, promptly remove it by:

  1. Tapping on “Edit.”
  2. Selecting the red minus button next to any unfamiliar keyboard.
  3. Tapping “Delete” to eliminate the potential threat.

As your trusted MSP, we remain committed to keeping you informed about emerging threats and assisting you in fortifying your digital defenses against evolving cyber risks. Stay vigilant, and if you have concerns or require further assistance, do not hesitate to reach out to our dedicated support team.

Top view of office desk in Autumn

Taking Advantage of the Thanksgiving Break to Update Your Critical IT Systems

Taking Advantage of the Thanksgiving Break to Update Your Critical IT Systems

As the year draws to a close, the Thanksgiving break presents an opportune moment for businesses to take a step back and assess their IT infrastructure. While many companies focus on holiday festivities and family gatherings, this period also offers a chance to perform critical IT maintenance and updates without disrupting daily operations.

Why Utilize the Thanksgiving Break for IT Updates?

  1. Reduced Impact on Business Operations: The Thanksgiving break naturally coincides with a lull in business activity, minimizing the impact of downtime caused by system updates.

  2. Enhanced Security Measures: System updates often include security patches and enhancements, addressing potential vulnerabilities and protecting against cyberattacks.

  3. Improved System Performance: Updating software and hardware can optimize system performance, leading to increased productivity and smoother operations.

  4. Proactive Problem Prevention: Addressing potential issues during the break can prevent disruptions during peak business periods.

Planning and Preparation for IT Updates

  1. Identify Critical Systems: Prioritize updating critical systems that support core business functions, such as customer relationship management (CRM) and enterprise resource planning (ERP) systems.

  2. Schedule Updates: Create a detailed schedule for updating systems, allocating sufficient time for testing and validation.

  3. Engage IT Personnel: Ensure adequate IT personnel are available during the break to oversee updates and address any issues promptly.

  4. Communicate to Stakeholders: Inform employees and relevant stakeholders about the planned updates and potential downtime.

Optimizing the Thanksgiving Break for IT Maintenance

  1. Perform Backups: Before initiating any updates, ensure comprehensive backups are in place to restore systems in case of unforeseen issues.

  2. Test Updates Thoroughly: Test updates in a non-production environment before deploying them to live systems.

  3. Monitor System Performance: Closely monitor system performance after updates to identify and resolve any irregularities.

  4. Document Updates: Maintain detailed documentation of updates, including patch versions and configuration changes.

Conclusion

The Thanksgiving break provides a valuable opportunity for businesses to enhance their IT infrastructure without interrupting daily operations. By carefully planning, preparing, and executing IT updates during this period, companies can reap the benefits of improved security, enhanced performance, and reduced downtime, positioning themselves for success in the coming year.

AI Learning and Artificial Intelligence Concept. Business, moder

Your Personal AI Assistant: Details about Microsoft Copilot for Office 365

Your Personal AI Assistant: Details about Microsoft Copilot for Office 365

 

Imagine a tool that could anticipate your needs, suggest relevant information and data, automate tedious tasks, and help you create compelling content, all within the familiar interface of Office 365. That’s precisely what Microsoft Copilot for Office 365 promises to be – your personal AI assistant for tackling work efficiently and intelligently.

What is Microsoft Copilot for Office 365?

Microsoft Copilot is an AI-powered feature integrated into Microsoft 365, designed to enhance productivity and streamline workflows within apps like Word, Excel, PowerPoint, Outlook, Teams, and more. It leverages the power of large language models and your organization’s data to provide contextually relevant suggestions and actions, automate repetitive tasks, and even answer your questions in an informative way.

Pricing Plans for Microsoft Copilot:

Microsoft Copilot for Office 365 is available for commercial customers with a subscription to specific Microsoft 365 plans. Here’s a breakdown of the pricing:

  • Microsoft 365 E3, E5: $30 per user per month
  • Business Standard, Business Premium: $30 per user per month

Reviewing the Pros and Cons:

Pros:

  • Enhanced Productivity: Copilot saves time by suggesting relevant information, formatting content, and automating tasks.
  • Improved Creativity: Generate compelling presentations, emails, reports, and documents with Copilot’s intelligent suggestions and insights.
  • Streamlined Workflows: Automate routine tasks like scheduling meetings, adding contacts, and summarizing data.
  • Contextually Relevant Help: Get answers and insights on your specific work within the context of your organization’s data.
  • Seamless Integration: Copilot works intuitively within your existing Office 365 apps, eliminating the need for switching platforms.

Cons:

  • Limited Availability: Currently, Copilot is only available for certain Microsoft 365 plans.
  • Cost: The price point might be a deterrent for smaller businesses.
  • Learning Curve: Adapting to Copilot’s suggestions and automation may require a learning curve for some users.
  • Potential Bias: AI-powered tools like Copilot can inherit biases from the data they are trained on, requiring careful scrutiny.

Overall verdict:

Microsoft Copilot for Office 365 holds immense potential for those seeking to improve their productivity and creativity within the Microsoft ecosystem. Its ability to anticipate needs, automate tasks, and provide contextually relevant information makes it a valuable tool for busy professionals. However, the price point and potential for bias require careful consideration before adopting Copilot for your organization.

Conclusion:

Microsoft Copilot for Office 365 is a powerful AI assistant with immense potential to improve the way we work. While not without its limitations, its ability to boost productivity, automate tasks, and provide contextually relevant information make it a tool worth considering for any individual or business striving for efficiency and effectiveness in their daily work.

Learn More: Microsoft CoPilot

QR code and hacker with laptop

Cybersecurity Alert – What is Quishing?

Cybersecurity Alert – What is Quishing?

 

Quishing is a relatively new type of cybersecurity risk that has emerged in recent years and has been growing quickly. According to a ZDNet article 1, the term “quishing” was first used to describe the use of QR (Quick Response) codes in phishing scams in 2023. QR codes, which are two-dimensional barcodes that can store various types of information, are used for quickly linking to websites, applications, making payments, accessing menus or other information quickly. As they store information horizontally and vertically, they can hold up to 100 times more information than a traditional bar code.

 

Quishing is derived from the words “QR” and “phishing”. Scammers use deceptive QR codes to lure people into visiting fraudulent websites that may look legitimate. Once on the site, the user is prompted to enter sensitive information such as personal identity data, credit card numbers, bank account details, and passwords. The scammers then use this information to steal your money and/or your identity. 

 

Tips to Prevent Being Compromised:

  1. Only scan QR codes from trusted sources. Be wary of QR codes in public places or received through unsolicited messages.
  2. Before entering any personal information, check the URL of the website you are visiting. Misspelled variations of the domain name or excessive hyphens can indicate a fraudulent website. The address should start with “https//” with a padlock icon in front of it to indicate it is a secure connection. Be very careful providing any sensitive information if you do not see the “https//” and padlock.
  3. Use a QR Code Scanner with Built-In Security. Some QR code scanner apps come with built-in security features that can alert you if a scanned QR code leads to a potentially harmful website or application.
  4. As the QR Code typically opens a browser, use a secure browser and malware protection that can detect fraudulent websites and warn you before you enter any sensitive information.
  5. Keep your operating system, browser, and antivirus software up-to-date and ensure that you have the latest security patches installed.
  6. Check for signs of tampering on signs with QR codes. If the code looks altered or damaged, do not scan it.
  7. Stay informed about quishing, phishing and other cybersecurity threats. Educate yourself and your coworkers and family members about the risks and how to recognize potentially dangerous QR codes. Human error is a common cause of cybersecurity incidents.

 

By following these tips, you can protect yourself from quishing scams and keep your personal and financial information safe.

1: https://www.zdnet.com/article/quishing-is-the-new-phishing-what-you-need-to-know/