<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Uncategorized Archives - Wolf TG</title>
	<atom:link href="https://www.wolftg.com/category/uncategorized/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.wolftg.com/category/uncategorized/</link>
	<description></description>
	<lastBuildDate>Wed, 24 Mar 2021 01:51:33 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.wolftg.com/wp-content/uploads/2019/03/favicon.ico</url>
	<title>Uncategorized Archives - Wolf TG</title>
	<link>https://www.wolftg.com/category/uncategorized/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>The Worst Password Mistakes That Compromise Security</title>
		<link>https://www.wolftg.com/2018/02/15/password-security/</link>
		
		<dc:creator><![CDATA[Wolf TG Admin]]></dc:creator>
		<pubDate>Thu, 15 Feb 2018 21:01:55 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://www.wolftg.com/2018/02/15/password-security/</guid>

					<description><![CDATA[<p>Choosing a weak or commonly used password invites hackers to help themselves to your business’ [&#8230;]</p>
<p>The post <a href="https://www.wolftg.com/2018/02/15/password-security/">The Worst Password Mistakes That Compromise Security</a> appeared first on <a href="https://www.wolftg.com">Wolf TG</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;"><img decoding="async" class="" style="width: 320px; margin: 0px 0px 10px 10px; float: right;" src="https://www.wolftg.com/wp-content/uploads/2019/08/Insecure-Passwords.jpeg" alt="Insecure Passwords.jpeg" width="320" />Choosing a weak or commonly used password invites hackers to help themselves to your business’ data. More than 80% of hacks involve a password breach. So while password selection may not be at the cutting edge of <a href="https://www.wolftg.com/blog/cyber-security-the-most-sought-after-it-skill-in-2017" target="_blank" rel="noopener noreferrer">cybersecurity</a>, it’s your first line of defense.</span></p>
<p><span id="more-2368"></span></p>
<h2>What are weak passwords?<strong><br />
</strong></h2>
<p><span style="font-weight: 400;">A weak password is one that is unique to you but crackable by even a low-grade hacker. Using the name of your pet, child, or street might be easy to remember, but it’s also a cinch to guess. A quick check of your social media account or a view of your address, and the hacker has all he needs to unlock your accounts.</span></p>
<p><span style="font-weight: 400;">Basically, short and simple is a good mantra for creating your tagline, but it’s not the right way to create a password. Pick something long and complicated instead.</span></p>
<h2>What are some of the most common passwords?</h2>
<p><span style="font-weight: 400;">Many people use the same words and phrases as passwords. For instance, </span><i><span style="font-weight: 400;">password</span></i><span style="font-weight: 400;"> and </span><i><span style="font-weight: 400;">123456</span></i><span style="font-weight: 400;"> are popular and easy-to-guess choices. Even making variations on these password patterns, such as </span><i><span style="font-weight: 400;">password1</span></i><span style="font-weight: 400;"> or </span><i><span style="font-weight: 400;">!23456</span></i><span style="font-weight: 400;"> do little to increase security. </span><i><span style="font-weight: 400;">Login</span></i><span style="font-weight: 400;">, </span><i><span style="font-weight: 400;">admin</span></i><span style="font-weight: 400;">, </span><i><span style="font-weight: 400;">qwerty</span></i><span style="font-weight: 400;">, and (incredibly) </span><i><span style="font-weight: 400;">hottie</span></i><span style="font-weight: 400;"> round out some top lists of common passwords.</span></p>
<p><span style="font-weight: 400;">If a password isn’t unique to you, it probably isn’t the best choice. Reused passwords aren’t a good idea either.  </span></p>
<h2>How do I check my password’s strength?</h2>
<p><span style="font-weight: 400;">Find out how long it would take to crack your password by using an online app like </span><a href="https://howsecureismypassword.net/"><span style="font-weight: 400;">howsecureismypassword.net</span></a><span style="font-weight: 400;">. This user-friendly site lets you type in your password and then tells you how long it would take a computer to track it. What makes this site helpful is trying different variations before settling on your choice. For instance, the site said it would take two hours to crack a test password, but the addition of a single symbol stretched the estimated time to four weeks.</span></p>
<p><span style="font-weight: 400;">A password tester is a quick and accurate way to strengthen your choice.</span></p>
<h2>How can I create a good password?</h2>
<p><span style="font-weight: 400;">Hard-to-crack password patterns combine letters, numbers, and symbols. And long passwords are safer than short ones. You can also try out uncommon phrases. Remember, the first word that pops into your head is probably one of the first words a hacker will try, too. That’s why Bible verses, birthdays, famous sayings, and ordinary English word strings don’t make good passwords.</span></p>
<p><span style="font-weight: 400;">A random collection of letters, symbols, and numbers is your best bet.</span></p>
<h2>What are some helpful tips to remember my passwords?</h2>
<p><span style="font-weight: 400;">The problem with those super-safe random password patterns is that they’re hard to remember. No one wants to be locked out of their own computer. A password manager like </span><a href="https://www.lastpass.com/"><span style="font-weight: 400;">LastPass</span></a><span style="font-weight: 400;"> can store all your passwords for you in a multi-layered encryption safe. By locking all your passwords in a single vault, you have to recall just one master password to get them out. Password managers are a safe, affordable option for many users.</span></p>
<p><a href="/contact/"><img fetchpriority="high" decoding="async" class="aligncenter wp-image-2601 size-full" src="https://www.wolftg.com/wp-content/uploads/2019/09/Is-Your-Data-at-Risk.jpg" alt="" width="858" height="170" srcset="https://www.wolftg.com/wp-content/uploads/2019/09/Is-Your-Data-at-Risk.jpg 858w, https://www.wolftg.com/wp-content/uploads/2019/09/Is-Your-Data-at-Risk-300x59.jpg 300w, https://www.wolftg.com/wp-content/uploads/2019/09/Is-Your-Data-at-Risk-768x152.jpg 768w" sizes="(max-width: 858px) 100vw, 858px" /></a></p>
<p>The post <a href="https://www.wolftg.com/2018/02/15/password-security/">The Worst Password Mistakes That Compromise Security</a> appeared first on <a href="https://www.wolftg.com">Wolf TG</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What Do You Do If Your Company Is Being Held Hostage By Ransomware?</title>
		<link>https://www.wolftg.com/2018/01/16/what-do-you-do-if-your-company-is-being-held-hostage-by-ransomware/</link>
		
		<dc:creator><![CDATA[Wolf TG Admin]]></dc:creator>
		<pubDate>Tue, 16 Jan 2018 19:17:30 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://www.wolftg.com/2018/01/16/what-do-you-do-if-your-company-is-being-held-hostage-by-ransomware/</guid>

					<description><![CDATA[<p>It’s Monday morning, and your project is due the next day. You switch on your [&#8230;]</p>
<p>The post <a href="https://www.wolftg.com/2018/01/16/what-do-you-do-if-your-company-is-being-held-hostage-by-ransomware/">What Do You Do If Your Company Is Being Held Hostage By Ransomware?</a> appeared first on <a href="https://www.wolftg.com">Wolf TG</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="background-color: transparent;"><img decoding="async" style="width: 320px; margin: 0px 0px 10px 10px; float: right;" src="https://www.wolftg.com/wp-content/uploads/2019/08/ransomware-security.jpeg" alt="Ransomware" width="320" />It’s Monday morning, and your project is due the next day. You switch on your computer to find a message that your system is encrypted until you pay the required fee.</span></p>
<p><span id="more-2369"></span></p>
<p><strong>You’re being held hostage by ransomware.</strong></p>
<p><span style="font-weight: 400;">Fortunately, your company created a data </span><a href="https://www.wolftg.com/data/backup/"><span style="font-weight: 400;">back up plan</span></a><span style="font-weight: 400;">, it practices </span><a href="https://www.wolftg.com/blog/7-best-practices-for-preventing-ransomware-on-your-network"><span style="font-weight: 400;">ransomware prevention</span></a><span style="font-weight: 400;"> , and you know the critical steps to remove the invader from your computer. These steps take time, but they can have your office back to business-as-usual within hours.</span></p>
<p><strong>Does this sound too good to be true? It’s not.</strong></p>
<p><span style="font-weight: 400;">Ransomware has been around since 2013. It’s a type of malware that encrypts your files and can prevent you from using your computer. The malware disguises itself as a legitimate file or email. Once opened, it may lock your computer and display a &#8220;lockscreen&#8221; with a message saying you must </span><a href="https://www.wolftg.com/network-design/"><span style="font-weight: 400;">pay a ransom</span></a><span style="font-weight: 400;">, usually with hard-to-trace bitcoins, to regain use of your computer.</span></p>
<p><strong>Preparation is a vital part of prevention, but ransomware can still find its way into your computer system.  </strong></p>
<p><span style="font-weight: 400;">If that happens to your business’ network, don’t panic. First, contact your IT provider and then the authorities, including your local police and the FBI’s </span><a href="https://www.ic3.gov/default.aspx"><span style="font-weight: 400;">Internet Crime Complaint Center</span></a><span style="font-weight: 400;">.</span></p>
<p><span style="font-weight: 400;">Then, examine your directories to determine which files are infected. If your documents have odd extension names, try changing them. Some ransomware uses fake encryption that makes you think your computer is locked but doesn’t actually encrypt it.</span></p>
<p><span style="font-weight: 400;">If this tactic does not work and you have your data saved elsewhere, reset your PC, reinstall your apps, and restore your data from the backup.</span></p>
<h3><span style="font-weight: 400;">Windows users:</span></h3>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Reboot Windows to safe mode</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Install anti-malware software</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Scan the system to find the ransomware program</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Restore the computer to a previous state with backup files</span></li>
</ul>
<h3><span style="font-weight: 400;">Mac users:</span></h3>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Unplug removable storage like external hard disks </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Disconnect from any network shares by clicking the eject icon alongside their entries in the sidebar of Finder</span></li>
</ul>
<p><strong>If you did not create backup files or a <a href="https://www.wolftg.com/data/disaster-recovery/">disaster recovery plan</a></strong><span style="font-weight: 400;"><strong>, you might have to pay the ransom.</strong> </span></p>
<p><span style="font-weight: 400;">Try to contact the cybercriminals who initiated the ransomware. Ask for “proof of life.”  Can they provide assurance you’ll get your data back? Don’t expect them to unencrypt your files for free. But they are businesspeople of sorts, and you may negotiate a lower ransom.</span></p>
<p><span style="font-weight: 400;">Ransomware is a lucrative endeavor for criminals, who constantly create newer, more sophisticated techniques to part you and your company’s money. Although no one method or tool will completely protect your organization from a ransomware attack, you can recover and continue doing business if you have trained your staff, created a disaster recovery plan, and duplicated backup information.</span></p>
<div class="section post-body">
<p>If you have any worries about the safety of your network, please call us at <strong><strong>(833) 482-6435</strong></strong> or click the banner below to schedule an IT security audit so we can find the best security solutions for your business. Preparation for threats like this is a small cost compared to repairing the damage of an actual infection.</p>
<p><span id="hs-cta-wrapper-74df54a7-5836-4bf6-8cbe-b3d66fedf5ae" class="hs-cta-wrapper"><span id="hs-cta-74df54a7-5836-4bf6-8cbe-b3d66fedf5ae" class="hs-cta-node hs-cta-74df54a7-5836-4bf6-8cbe-b3d66fedf5ae" data-hs-drop="true"><a id="cta_button_1546344_8f562a44-27d7-4cd7-b2a1-1f8679e03aec" class="cta_button" href="/contact/"><img decoding="async" id="hs-cta-img-74df54a7-5836-4bf6-8cbe-b3d66fedf5ae" class="hs-cta-img alignnone" src="https://www.wolftg.com/wp-content/uploads/2019/08/f7ab19db-158f-4e82-9514-f360d6b8d7db.png" alt="IT Security Audit" width="900" height="100" /></a></span></span></p>
<p><em><strong>If you enjoyed this IT Support article, please <a href="https://www.wolftg.com/blog">check out other posts on our blog</a> and join us on <a href="https://www.facebook.com/WolfTechnologyGroup" target="_blank" rel="noopener noreferrer">Facebook</a>, <a href="https://twitter.com/WolfTech" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/wolf-technology-group" target="_blank" rel="noopener noreferrer">LinkedIn</a>, and <a href="https://plus.google.com/+WolftgGreenville/about" target="_blank" rel="noopener noreferrer">Google+</a> to see how else we can help your Greenville, SC or Atlanta, GA area business succeed!</strong></em></p>
</div>
<p>The post <a href="https://www.wolftg.com/2018/01/16/what-do-you-do-if-your-company-is-being-held-hostage-by-ransomware/">What Do You Do If Your Company Is Being Held Hostage By Ransomware?</a> appeared first on <a href="https://www.wolftg.com">Wolf TG</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Does Your Wireless Router Act Like a True Professional?</title>
		<link>https://www.wolftg.com/2016/02/09/does-your-wireless-router-act-like-a-true-professional/</link>
		
		<dc:creator><![CDATA[Wolf TG Admin]]></dc:creator>
		<pubDate>Tue, 09 Feb 2016 13:00:00 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://www.wolftg.com/2016/02/09/does-your-wireless-router-act-like-a-true-professional/</guid>

					<description><![CDATA[<p>If you own or manage a small business, you probably learned a long time ago [&#8230;]</p>
<p>The post <a href="https://www.wolftg.com/2016/02/09/does-your-wireless-router-act-like-a-true-professional/">Does Your Wireless Router Act Like a True Professional?</a> appeared first on <a href="https://www.wolftg.com">Wolf TG</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" style="width: 350px; float: right; margin: 0px 0px 10px 20px;" src="https://www.wolftg.com/wp-content/uploads/2019/08/Professional.jpg" alt="business-class wireless routers" />If you own or manage a <a href="http://www.wolftg.com/blog/4-cyber-security-tips-for-small-businesses">small business</a>, you probably learned a long time ago that:</p>
<ol>
<li>You get what you pay for</li>
<li>Not every product is worth the money you&#8217;ll spend on it</li>
<li>You can sometimes find ways to save money without sacrificing performance — especially when it comes to technology</li>
</ol>
<p>That last reason is usually why we see businesses, <a href="http://www.wolftg.com/blog/is-my-small-business-at-risk-for-hacking">especially smaller ones</a>, rely on routers and wireless devices designed for home use to <a href="http://www.wolftg.com/blog/why-more-and-more-companies-are-choosing-fixed-wireless-broadband-connections">keep their offices connected</a>.</p>
<p><span id="more-2443"></span></p>
<p>This substitution may help you save a few bucks on hardware, but it can also lead to frustrating bottlenecks and performance issues. Simply put, when it comes to wireless routers and wireless devices, <a href="http://www.wolftg.com/blog/the-nuts-and-bolts-of-a-business-class-network">business-class</a> is worth the up-front cost.</p>
<p>To help you understand why business-class routers are worth the extra money you&#8217;ll pay, consider what you actually gain by upgrading:</p>
<h2><strong>Speed and Bandwidth</strong></h2>
<p>This is a simple benefit, but it&#8217;s also one of the most important. A router that&#8217;s designed for home use can only handle and process so much information at once, so it&#8217;ll often prioritize one device over another. Think of all of the devices you have operating at once in your business (desktops, printers, mobile devices, etc.)&#8230; can you afford for any of those devices to be less of a priority than another? If your business is using a wireless router intended to handle only a handful of devices, you can say goodbye to speed and performance: two factors that have important bottom-line effects in your office.</p>
<h2><strong>Security</strong></h2>
<p>Business-class routers utilize different <a href="http://www.wolftg.com/blog/is-your-network-secure-common-network-security-risks">security protocols</a> and permission levels than home routers do, and when you&#8217;re working with sensitive information, this is <em>not</em> a place you should be trying to cut corners. If safety is a concern, which it should be, then you need professional equipment for your business. Your network is your first line of defense against <a href="http://www.wolftg.com/blog/why-are-there-so-many-cyber-attacks">hackers and thieves</a>, and this defense is far stronger if you&#8217;re using the right equipment (especially when you factor in the firmware and updates that are built into business-class router processors).</p>
<h2><strong>Range of Connectivity</strong></h2>
<p>Not only are business-class routers faster and more secure, they also extend farther and <a href="http://www.wolftg.com/blog/does-your-business-need-a-5.8-ghz-wireless-router">have the ability to operate on different channels</a>. If your wireless router operates on a different channel than others in the area, you can expect to experience fewer conflicts between devices, and better connections throughout your office or facility — especially if you have workstations that are spread out or separated by walls and/or electrical equipment. That, my friend, is a win-win situation.</p>
<p>Wolf Technology Group is a small business itself, so we definitely understand the value in finding ways to save money. But, on the other hand, we also understand why you can&#8217;t sacrifice the equipment you need just to save a few dollars. In the case of WiFi routers, the price savings aren&#8217;t that great, and for what you lose in speed, security, and range, it just doesn&#8217;t add up.</p>
<p>To learn more about wireless networking in the Greenville, SC or Atlanta, GA areas, contact Wolf Technology Group today! We can conduct site surveys to identify WiFi performance issues, design custom wireless networks, improve existing network speed and security, and more! Just give us a call at <strong>(<strong>833) 482-6435</strong></strong> or <a href="http://www.wolftg.com/contact">contact us online</a>.</p>
<p>If you enjoyed this article, please <a href="http://www.wolftg.com/blog">check out other posts on our blog</a> and join us on <a href="https://www.facebook.com/WolfTechnologyGroup" target="_blank" rel="noopener noreferrer">Facebook</a>, <a href="https://twitter.com/WolfTech" target="_blank" rel="noopener noreferrer">Twitter</a>, and <a href="https://www.linkedin.com/company/wolf-technology-group" target="_blank" rel="noopener noreferrer">LinkedIn</a> to see how else we can help your Greenville, SC or Atlanta, GA area business succeed!</p>
<p>The post <a href="https://www.wolftg.com/2016/02/09/does-your-wireless-router-act-like-a-true-professional/">Does Your Wireless Router Act Like a True Professional?</a> appeared first on <a href="https://www.wolftg.com">Wolf TG</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
