Author Archives: mike

Ransomware Is on the Rise: Learn How to Protect Your Macs

In cybercriminal circles, ransomware is all the rage. Once it has infected a computer, it encrypts all the files and then presents a ransom demand—pay up to get the decryption software necessary to recover the data.

Ransomware has been in the news all year, with the Colonial Pipeline attack in particular spending weeks in the headlines. Attacks rose 485% in 2020 and show no signs of abating. The amounts demanded by the attackers are increasing, too, with PC manufacturer Acer and Apple supplier Quanta both hit with $50 million demands. Worse, some ransomware attackers are adding an extortion component where they threaten to reveal confidential data if the victim doesn’t pay. It’s scary, we know.

First, the good news. Although there are several examples of ransomware that target the Mac, none of them have been particularly well done or (as far as we know) successful. Right now, the chances of Macs falling prey to ransomware are very low, and there’s no reason to panic.

However, complacency is dangerous. There’s a trend toward “ransomware as a service” (RaaS). The RaaS operators maintain the ransomware malware, offer a payment portal for victims, and provide “customer service” for victims who don’t know how to pay with Bitcoin or other cryptocurrencies. Affiliates spread the ransomware and split the revenues with the operators. It’s a tidy little cybercriminal enterprise, and separating the malware development and network penetration tasks has made it significantly easier for more criminals to leverage ransomware. It’s only a matter of time before they turn their attention to Macs.

For the most part, protecting your Macs from ransomware is no different than protecting against any number of other security problems. Follow this core advice:

  • Keep Macs and apps up to date: Always install macOS and security updates, and keep other apps up to date. With every update, Apple addresses numerous security vulnerabilities, fixing the vast majority of them before attackers can exploit them with malware. Every so often, however, Apple’s security notes include this sentence: “Apple is aware of a report that this issue may have been actively exploited.” That means there may be malware that targets that vulnerability; install such updates immediately!
  • Use strong passwords with a password manager: You’ve heard it from us before, and you’ll hear it again, but it’s essential that everyone in your organization use strong, unique passwords through a password manager like Apple’s iCloud Keychain. Just one weak password could allow attackers to infiltrate a computer or server and install ransomware.
  • Be suspicious of links and attachments: Ensure that everyone in your organization is careful about opening attachments or clicking links in email messages from unknown people or that seem off in some way. Phishing attacks are one of the primary ways of distributing malware. (If your group needs training in phishing awareness, contact us.)
  • Never download pirated software! Even aside from the fact that it’s ethically problematic, the most recent piece of Mac ransomware—ThiefQuest—was initially found in a malicious installer purporting to be for the LittleSnitch network security utility (ironic, eh?). Get apps only from the developers’ official sites or the Mac App Store.
  • Make frequent backups: Backups are essential so, even if you do fall prey to ransomware, you can restore data from before the infection point. The caveat is that some of your backups must be isolated from the Macs in question—some ransomware intentionally tries to encrypt or delete connected backups.
  • Have anti-malware software: For the most part, if you’re careful about following the advice above, you’ll be fine. But it’s a good idea to have a current anti-malware app around and run it occasionally—if you don’t already have one, try the free version of Malwarebytes. If you—or your users—aren’t good about the basic precautions, you might want to run anti-malware software all the time or set up broader network protections.
  • Have a disaster management plan: Every business should think about how it would react to a fire, flood, earthquake, or other disaster. When building a disaster management plan, be sure to include ransomware. How would you shut down infected systems, rebuild them from scratch, and restore uninfected files?

Setting up a backup strategy that protects against ransomware requires a little more thought. As noted, ransomware often tries to render backups useless in one way or another. You need to have versioned backups that allow you to restore from before the ransomware infection, and those backups need to be isolated from the computers and network being backed up. Techniques that help include:

  • Isolate backup drives: Rotate multiple Time Machine drives, with at least one that’s always disconnected. However, this strategy assumes you’ll detect a ransomware infection before you’ve rotated all the drives. Ransomware could lie undetected for weeks or months before activating. Manually run current anti-malware software before connecting any backup drive.
  • Use Internet backup: Set up an Internet backup system that will maintain versions of backed-up files, such as Backblaze with its Extended Version History feature. Retrospect 18 also supports object locking on cloud storage systems, which provides immutable storage. It ensures that no one—even someone who acquires root credentials—can delete the backups during the retention period.
  • Consider tape backups: Long ago, tape backups were the go-to solution for network backups, but as the price-per-gigabyte of hard drives dropped precipitously and Internet backups became feasible, tape has largely fallen by the wayside. But tape backups are still an option. They can hold a lot of data and are easily kept offline in a separate location. Plus, some tape drives can even operate in a write-once, read-many (WORM) mode that guarantees data can’t be erased or overwritten. Tape requires more human interaction than other backup methods, but it’s still a cost-effective way to protect hundreds of terabytes of data against ransomware.

Again, there’s no reason to panic about ransomware, but if it could significantly damage your business, you should take steps to reduce the chance of getting hit and ensure that you could restore your data if your computers were to get infected. There is no single approach that’s ideal for everyone, but we can help you think about what’s involved and develop a strategy that balances protection, cost, and effort.

(Featured image by iStock.com/chainatp)

Reopening Your Office? Now’s a Great Time to Evaluate Your IT Infrastructure

As vaccination rates climb, many businesses are starting to think about reopening their offices and bringing back employees who have been working from home for the last year. That’s a big decision that will undoubtedly vary from company to company, but we’d like to suggest a few things to consider. Please contact us early in such deliberations so we can provide guidance before problems crop up.

Full Return or Hybrid Model?

Perhaps the biggest question firms will have to answer is if they’ll require all employees to return or if some can continue to work remotely. Many organizations have discovered that physical presence isn’t as important as they thought it was. In a post-pandemic world, many employees may prefer to continue working from home if they can, at least for a while.

If you decide on a hybrid model, you’ll want to put some thought into what technology you’ll need to enable hybrid meetings, with some people connecting remotely via videoconferencing software and others gathering in person. Large screens, specially mounted cameras, and dedicated speakerphone hardware may be necessary to conduct a hybrid meeting effectively.

With some workers remaining at home, it will also be important to ensure that everyone has appropriate access to on-premises servers. Obviously, that has been a problem for the last year as well, but it may be tempting to revert to old approaches upon reopening an office. That may not be effective in a new hybrid workplace, so check with us on cloud-based alternatives that could work better in the new world order.

Consider Your Physical Space

Particularly if you do decide on a hybrid model, it’s worth evaluating whether you need the same amount and type of space as you did before. There’s no single answer here. You don’t want to downsize your physical space only to discover in a few months that some of those employees who swore that they never wanted to come back feel that they’re missing out. Simultaneously, if your offices are a warren of small, poorly ventilated rooms, employees may be even more hesitant about returning.

Plus, your physical space is inherently related to your IT infrastructure, so don’t ignore the costs surrounding an office move. A new space might require pulling new Ethernet cables, testing Wi-Fi signal strength to ensure sufficient coverage, evaluating the cleanliness of the electrical power, and more.

We don’t mean to dissuade you from moving offices if that’s what makes the most sense for the future of your company, but talk to us before signing any new leases so we can help identify and head off any technical problems with the physical plant.

Finally, this isn’t related to IT, but if your existing office space has been entirely vacant for the last year, it’s worth reading the information that the Centers for Disease Control puts out to help employers create safe and healthy workplaces. Buildings don’t do well with prolonged shutdowns.

Does Network Infrastructure Need Updating?

Before you bring employees back, at least en masse, it’s also worth touching base with us about your IT infrastructure. If you’ve been limping along with sketchy Ethernet cabling, or if you have dirty power that could be damaging your Macs and peripherals, it’s a great time to consider addressing such problems. Pre-pandemic, attempting to install new electrical circuits or pull new network cabling might have been too disruptive, but with an office that’s empty or nearly so, such work can be done more quickly and cheaply.

Similarly, this could be a good time to replace aging computers, printers, or even phone systems. Such infrastructure upgrades and transitions can cause interruptions in normal times, but if you’re bringing people back, wouldn’t it be nice to have the office provide a better IT experience than it did before?

(Featured image by Shuki Harel from Pexels)

Disable Unused Sharing Options on Your Mac If You’re Not Using Them

Many security breaches—even high-profile ones—stem from simple oversight. There’s one spot in macOS that has long been particularly susceptible to such lapse: the Sharing pane of System Preferences. In it, you can enable a wide variety of sharing services, some of which could allow another user to access your Mac remotely. They all let you limit access to particular users, but passwords can be stolen, accounts can be compromised, and server software can have bugs. For safety’s sake, if you’re not actively using a sharing service, turn it off. The most important ones to disable when not in use are Screen Sharing, File Sharing, Remote Login, Remote Management, and Remote Apple Events. We also caution against leaving Printer Sharing and Internet Sharing on unnecessarily.

(Featured image by Morgane Perraud on Unsplash)

Reduce Your Email Load with Three Features in Apple’s Mail: Mute, Block, and Unsubscribe

Complaining about getting too much email is like complaining about bad traffic—we brought it upon ourselves, and while it’s impossible to escape entirely, it’s worth knowing how to reduce it. Apple is fully cognizant of the issue, too, and has built features into the last couple versions of Mail—on the Mac, iPhone, and iPad—to help out. Here are three that you might find useful in different situations: mute, block, and unsubscribe.

Mute

It’s a huge email conversation about the annual holiday party at work, but you can’t go, and more people keep weighing in. However, since it’s just a ton of addresses on the Cc line, there’s no way to remove yourself, even though you don’t need to be notified of all the back-and-forth.

To help you quiet a too-chatty conversation, Apple added the Mute feature to Mail. On the Mac, select the conversation and choose Message > Mute or click the Mute button in the toolbar. On an iPhone or iPad, touch and hold the message until you get a popover, then tap Mute. You can also swipe left on the message, tap More, and tap Mute.

Messages will continue to flow in, but if you normally get notifications of Mail messages, you won’t get notifications for the muted conversation. In Mail, a little bell icon with a slash through it reminds you that the conversation is muted. To unmute a conversation, repeat these steps, but pick Unmute instead.

Do you never want to see those muted messages at all? You can discard them automatically. On the Mac, in Mail > Preferences > General, select “Archive or delete muted messages.” In iOS and iPadOS, go to Settings > Mail > Muted Thread Action, where you can choose between Mark as Read and Archive or Delete.

The “archive or delete” wording may seem confusing, but Apple lets you choose whether “discarding” a message archives it (removes it from your Inbox) or deletes it (moves it to the Trash mailbox). On the Mac, look for that setting in Mail > Preferences > Viewing > Move Discarded Messages Into. In iOS and iPadOS, it’s a per-account option in Settings > Mail > Accounts > accountName > Account > Advanced, under Move Discarded Messages Into.

Block

Muting is about conversations, not people. But what if you never want to see email from a particular person ever again? Perhaps it’s an angry ex-housemate, your embezzling ex-business partner, or someone who just won’t stop forwarding politically offensive memes. For such people, Apple provides blocking.

On the Mac, open a message from the offending person, hover the pointer over their name, click the down-pointing arrow, and choose Block Contact. In iOS and iPadOS, tap the person’s name so it turns into a blue link, tap it again to reveal their contact card, tap Block this Contact, and confirm your decision. Should you change your mind, repeat the steps and choose Unblock.

All that changes immediately is that Mail puts a banner at the top of the message that says “This message is from a blocked sender.” However, Mail also provides a button or link to preferences that offer more options. On the Mac, they’re in Mail > Preferences > Junk Mail > Blocked. In iOS and iPadOS, you’ll find them in Settings > Mail > Blocked Sender Options. You can choose between leaving blocked mail in your Inbox or moving it to the trash.

Note that we used spam senders as examples here, but for actual spam, you should instead use the Move to Junk command to mark it as spam and train Mail’s junk mail filter. Blocking is useful only for actual people, and it works only on specific email addresses, so if someone can send from another address, Mail won’t know to block that address until you block it too.

Unsubscribe

It’s all too easy to end up on a bazillion mailing lists these days. That may not be a problem if you find the messages useful and infrequent enough so as not to be annoying. But if you order something online and immediately start receiving two email blasts per week advertising new products, you don’t have to sit there and suffer.

What you shouldn’t do, however, is use the Move to Junk command to mark those messages as spam. If you have a legitimate business relationship with the organization, they’re not doing anything illegal by sending you email, and marking their messages as spam might mistrain Mail’s spam filter to catch related mail you do want. It will also hurt their deliverability rate unnecessarily, and while that’s not your problem, there is a better way.

Whenever Mail detects that a message is from a mailing list, it displays a banner saying so, along with an Unsubscribe link. Click or tap it, confirm your decision, and Mail sends an unsubscribe message from you to the mailing list server.

Alas, between mailing lists not providing the necessary details and Mail not being able to understand everything, this feature is a little weak. When it works, it’s great, but just because an Unsubscribe banner doesn’t appear doesn’t mean you can’t unsubscribe.

Whenever that happens, scroll to the bottom of the message and look for an Unsubscribe link. Click it to visit a website where you can sign off. Alas, as shown below, commercial mail from Apple itself seems to be exempt from Mail’s Unsubscribe banner, and the company has one of the less obvious Unsubscribe links out there.

As helpful as muting and blocking can be, you’ll get the biggest bang for your buck from unsubscribing from mailing lists. Remember, you can always find those companies on the Web should you wish to interact with them again.

(Featured image by Brett Jordan on Unsplash)

Live in the Future by Using Apple Pay on Your Apple Watch

With mask wearing over the past year rendering Face ID ineffective at cash registers, we’ve become fond of using the Apple Watch for contactless payments with Apple Pay. We recommend it highly since it’s so fast and convenient. Once you’ve set up a credit card in the Wallet app on your iPhone, switch to the Watch app, go to My Watch > Wallet & Apple Pay, and tap the Add button next to the desired card. From then on, to pay for a purchase, double-click the Apple Watch’s side button and put it very close to the reader. (We generally turn our arms so we can put the Apple Watch face flat on the reader.) It takes just seconds and tends to wow cashiers who haven’t seen it before.

(Featured image by Karolina Grabowska from Pexels)

Don’t Cook Your Digital Devices in the Summer Heat

As climate change continues to wreak havoc on our weather, many areas are seeing record temperatures this summer—all of us in the Pacific Northwest know about that! You may be able to trade your business suit for shorts or skirts to stay more comfortable, but your electronic gear can’t do the same. Keeping your tech cool is about more than comfort—as temperatures rise, performance can suffer, charging may get slower or stop, various components might be disabled, and devices can become unreliable.

How Hot Is Too Hot?

You might be surprised by how low the recommended operating temperatures for Apple devices are—whether you’re talking about an iPhone 12 or an M1-based MacBook Pro, the company recommends keeping them under 95° F (35° C).

Such temperatures happen regularly throughout the summer. Even in cooler climes, the temperature in a parked car in the sunshine can easily hit 130º F (54º C) in an hour and rise higher as time passes. And no, opening the windows a few inches won’t make much difference. You know you shouldn’t leave a kid or dog in a parked car for that reason, and now you can see that leaving your iPhone in the car during an afternoon at the beach might be problematic as well. Apple says its products shouldn’t even be stored—turned off—at temperatures over 113º F (45º C).

It’s not just cars you have to think about. Temperatures in homes and offices without air conditioning can also rise higher than electronics would prefer, and that’s especially true for computers that stay on most of the time and aren’t located in well-ventilated areas.

What’s the Danger?

First off, remember that all electronic devices produce their own heat on top of the ambient heat in the environment, so the temperature inside a device can be much, much hotter than outside. The CPU in an iMac can hit 212º F (100º C) under heavy loads.

Temperatures that exceed component design specs can have the following detrimental effects:

  • Chips of all types can behave unpredictably as increased thermal noise (electrons vibrating more) causes a higher bit error rate. Because electrical resistance increases with heat, timing errors can also occur.
  • Lithium-ion batteries discharge well in high temperatures, but the increased rate of chemical reactions within the battery will result in a shorter overall lifespan.
  • As devices heat and cool, the uneven thermal expansion of different materials can cause microscopic cracks that can lead to a variety of failures over time.

Some heat-related problems are temporary, so when the device or component cools down, it will resume working correctly. But others are irreversible and worth avoiding.

When a Mac gets too hot, it will spin up its fans in an attempt to keep its internal components cool. (The M1-based MacBook Air doesn’t have a fan, so it won’t be able to provide the same level of advance warning.) If your Mac’s fans ever run at full tilt for more than a few minutes, first quit apps you aren’t using, particularly those that might be CPU-intensive, thus creating a lot of heat. If that doesn’t make a difference, restart it to ensure the problem isn’t some rogue process. If the fans come back on at full speed quickly, shut it down and let it cool off for a bit. In the worst case, an overheated Mac may start acting unpredictably or crash.

iOS devices don’t have fans, so they employ other coping mechanisms. If your iPhone or iPad gets too hot, the device will alert you.

Apple says you might notice some of the following behaviors with an overheating iPhone or iPad:

  • Charging, including wireless charging, slows or stops.
  • The display dims or goes black.
  • Cellular radios enter a low-power state. The signal might weaken during this time.
  • The camera flash is temporarily disabled.
  • Performance slows with graphics-intensive apps or features.

If you’re using Maps on an overheating iPhone for GPS navigation in the car, it may show a “Temperature: iPhone needs to cool down.” screen instead of the map. You’ll still get audible turn-by-turn directions, and the screen will wake up to guide you through turns,

How to Keep Your Tech Cool

For the most part, keeping Apple devices cool just requires common sense:

  • Avoid using devices when the temperature is over 95º F (35º C). If that’s impossible, keep usage to a minimum.
  • Don’t leave devices in cars parked in the sun for long periods of time. If it happens accidentally, let the device cool before using it.
  • Provide good ventilation so air can cool the device. Don’t block ventilation ports in the back of desktop Macs, and don’t use Mac laptops in bed, propped on a pillow, or under the covers. It can be worth blowing dust out of ventilation ports with compressed air every so often.
  • Never put anything on the keyboard of an open Mac laptop.
  • Avoid stacking things on top of a Mac mini.
  • Monitor the temperature of server closets. If they get too hot, keep the door open, add a fan, or run the air conditioning.

Luckily, the temperatures that cause problems for Apple hardware aren’t terribly comfortable for people either, so if you’re way too hot, that’s a good sign your gear is as well.

(Featured image by Sergo Karakozov from Pexels)

Two Important Tips for External Storage Devices

It’s tempting to think that most external storage devices—whether simple hard drives or more complicated network-attached storage (NAS) units—are relatively similar because they all do roughly the same thing. However, a recent problem with older Western Digital My Book Live NAS devices highlighted that there can be large differences. In that case, hackers figured out how to cause a factory reset that wiped the entire drive of all files. (If you have one, note that Western Digital recommends disconnecting it from the Internet immediately.) Two tips: Although no one could have anticipated this particular problem, ask us before buying external storage because we may be able to recommend known good products or warn you away from sketchy manufacturers. Also, if you store unique data on an external drive, you must back up that drive just like your Mac’s internal drive or risk losing everything, like these My Book Live owners did. Backup, backup, backup!

(Featured image by Western Digital)

Going on Vacation? Learn How to Write an Effective Out-of-Office Message

For many people, increasing vaccination rates mean that long-delayed vacations are now possible, and in-person conferences are slowly starting up again too. But before you head out for the beach or the convention center, you’ll want to write an out-of-office email auto-reply message to send to everyone who tries to get in touch while you’re away. A bit of thought upfront could reduce stress for your correspondents—and ensure that they don’t hunt you down for that burning question.

Before we look at what information should be in an effective out-of-office message, a quick tip. Don’t create a custom rule in Mail or another email app that automatically replies to every message. It is too easy to end up sending replies to every message from a mailing list or to an address that will itself reply back, causing a mail loop where each message generates another reply, ad infinitum. Plus, the Mac has to stay turned on and active while you’re gone or else it will do nothing while you’re gone and then reply to everything when you return to work and turn it on! Instead, set up such auto-responders in the server settings for your email provider, which are better about avoiding mail loops. Here are instructions for Gmail, iCloud, Outlook.com, Spectrum, Xfinity/Comcast, and Yahoo. If you use a different email provider or an email account provided by your employer or school, check with support for additional details.

The key to writing an out-of-office message that satisfies your correspondents is to put yourself in their shoes. What information are they likely to want from you? How will they react when they learn you’re away? Do the answers to these questions vary with different audiences?

There’s no single perfect out-of-office message, but while crafting yours, we strongly recommend including—or at least considering—all the following information.

  • Reason for the trip: Significant detail isn’t necessary, but there’s a big difference between being on vacation and at a conference. You may be too busy to read and reply to email quickly at the conference, but you’re probably not entirely unavailable, as you would be while canoeing in the Canadian wilderness. Being candid helps set expectations.
  • Location: Sharing your rough location may be helpful if you’re semi-available but in a radically different time zone. It can also sometimes lead to happy coincidences when a contact realizes you’re in their city. But if you’re trying to unplug and get away, there’s no need to get specific.
  • Availability: Some of the time, the answer is easy—you’re unavailable. But if you’re semi-available or available in case of emergency, try to set expectations appropriately for how much you want to handle versus sending to colleagues.
  • Dates: Always include the date range you’ll be gone. Many things can wait, and if your correspondent sees you’ll be back on the 17th, they may just shrug and make a reminder to respond to you after that. Others will realize that they need to scramble on different plans right away.
  • Alternative contacts: Who’s picking up the slack while you’re gone, or who can help in case of emergency? Put some thought into the different sets of people who send you email and write simple IF/THEN sentences directing them to the right person. “If you need help with print production, contact John Gutenberg at ppress@example.org.” Needless to say, always ask those people if they can field questions about your responsibilities first, in case they’re overscheduled or planning to be away too. If you find yourself listing lots of people, see if you can instead designate a single primary contact.
  • Provide contact info: Unless you’re in a large organization with a corporate directory and don’t communicate with outsiders much, you’ll want to provide at least an email address, perhaps along with a phone number, for each of the contacts you list.
  • FAQs: If many of your email questions can be answered with a pointer to a Web page, consider using such links instead of alternative contacts. Correspondents might be happier if a page provided the necessary answer rather than having to wait for a reply from another person.

Here are a few more general tips:

  • Keep the message short and sweet.
  • Stay positive—it’s a good opportunity to praise an assistant or colleague—and be careful with humor since you never quite know how others will take it.
  • Don’t promise to reply within a particular time frame after you get back. Even if that’s your plan, airline flights can get canceled, you might return with a bad case of the flu, or something else might conspire to delay your reply.
  • Edit carefully to make sure email addresses and phone numbers are correct and to eliminate typos. You don’t know who might send you email while you’re gone, and if it were the head of your company, a key supplier, or a potential investor, such mistakes wouldn’t do your career any favors.
  • If your email service doesn’t let you set an automatic end date, remember to turn off your out-of-office message as soon as you get back!

(Featured image by Dziana Hasanbekava from Pexels)

Name That Tune with Siri or Control Center

Don’t you hate it when a familiar song is playing but you can’t think of what it’s called? Or worse, when you hear a new track you really like but have no one to ask what it is? Never worry about that again, thanks to your iPhone or iPad. Back in 2018, Apple bought the music identification app Shazam and has since integrated it into iOS. You can still use Shazam, but it’s easier to ask Siri, “What’s playing?” or tap the Music Recognition button in Control Center (add it in Settings > Control Center) and then let your iPhone listen to the music for a few seconds. Siri is easiest, but the Control Center button is perfect in situations where you’d prefer to keep your question quiet. The music recognition feature recognizes only recorded music—no high school glee club versions, sorry—and while not perfect, is often helpful. Tap the notification that appears to open the song in Apple Music.

(Featured image by Laura Balbarde from Pexels)

Pin Your Chats in Messages for Faster Access

A new feature of Messages in both iOS 14 and macOS 11 Big Sur is the option to pin up to nine conversations at the top of the conversation list for easy access. No longer do you have to worry about them scrolling out of sight. On an iPhone or iPad, touch and hold a conversation and tap Pin in the menu that appears; on a Mac, Control-click the conversation and choose Pin. (Remove them by repeating the action and choosing Unpin.) Each of your devices can have different conversations pinned. If you are used to scanning the left side of Messages for blue new-message indicators, also be sure to look for those blue dots amongst your pinned icons at the top of the screen. Also, note that on the Mac, it can be a little too easy to see a notification banner about a new message, switch to Messages, and type in the currently selected (but wrong) conversation.

(Featured image by Polina Zimmerman from Pexels)