We need even more staff – Client Services Manager

10995540_947559981933539_4816912941172161594_n

Client services manager

We are seeking a highly skilled individual with the extremely important task of managing our affiliate network.
These clients are essential to the business and therefore need full focus and attention.
Daily updates, weekly personalised reports, continuously looking to build the relationship and looking for further opportunities.
With this role comes additional responsibility reporting directly to the CFO, working closely with and assisting the sales manager with stats and training.
The candidate will be a quick learner, have excellent communication skills verbal and written, forward thinking, ambitious and professional.
This is a key role in the business and provides a real opportunity within a growing company.
Further information or to hand in CV: gary@mysecuritycenter.com

3 Main Reasons Your PC May Be Running Slowly

Tired of your computer taking ages to start up and feeling that it is working against you? IT expert Janus R. Nielsen from MYSecurityCenter gives advice on how you can ensure smooth PC performance.

  1. Too many programs are running at the same time

It is very common for PC users to download programs that automatically run in the background. These can be applications or utilities and this could be one of the reasons your PC is running slow. The more programs that are running – whether or not you see them – the more it takes a toll on your PC’s resources, especially on your RAM.

Random-access memory (RAM) is what your computer uses for temporary processing of the data inside your PC. The more the program running at the same time, the more RAM is used.

How to solve

Try to avoid downloading web browser helpers, applications that claim to speed up your PC, or and too many utilities programs that promise to help your PC.

Try to avoid installing more than one internet security program. As these programs work best alone they will take a toll on your PC, especially when you have more than one internet security program.

Try to run fewer programs at a time or upgrade your RAM.

 

  1. Fragmented hard drive

Using your PC a lot can mean your hard drive will become disorganised without regular defragmentation. Hard drive is the library part of your computer where everything is stored, everything from large programs to small files like photos and documents. The hard drive of your computer proceses a lot of files back and forth on your PC based on your own usage. The PC saves a lot of time by scattering bits of files in different places rather than all together. So without regular maintenance your “Libery” will become so disorganised that your computer takes longer and longer to find your files which slows down your PC. It sounds complicated but this is basically the way your hard drive works.

How to solve

“Defragmentation” is where all your files are put back in the right places, so they are easier to find. Therefore your PC will be able to operate more quickly.

Make sure to defragment your hard drive to help the computer organize itself.

 

  1. Virus or malware infection

A virus or malware infection is very common nowadays. Especially if the PC doesn’t have the proper protection while being connected to the internet. Even with proper protection you cannot completely prevent malware from getting on your PC. Some of the typical symptoms would be internet slowdowns, slower PC operation than normal, unwanted pop up commercials (typically porn, lottery campaign etc.), unwanted programs and e-mails.

How to solve

Ensure to have a proper internet security for your PC.

You must have a good internet security program that will ensure the safety of your PC while being connected to the internet. You are welcome to get our free antivirus program which is based on the best antivirus technology in the world. Go to our web page and choose a convenient time to get our IT expert to call you and install the program.

 

 

Which smartphone user are you?

 

Do you want full control over your phone or do you only use it for calls, emails and text messages? See if you can recognize yourself in these four smartphone types, and hear what security expert Janus R. Nielsen from www.MYSecurityCenter.com advises you to do in order to prevent yourself from hackers and malware.

 

The Unaware: You use a smartphone because you have been urged to do so by your boss or children, but in reality, you are better off with a traditional mobile phone. You cannot manage to familiarize yourself with the functions, which mean you only use your phone for calling, texting and to send emails. And lastly, you do not download apps unless you are guided through the process.

 

The Minimalist: You are happy with your phone and use it for the most basic things. You download apps every once in a while, but only the most necessary ones such as WhatsApp, Skype and Facebook. You keep the smartphone until it breaks and the latest phone models do not have an interest for the Minimalist. “Both the Unaware and the Minimalist should be extra careful when clicking on links in emails and text messages, because they are not as trained to see whether it is malware or not”, believes Janus R. Nielsen. “It is often these two groups who do not have passwords on their phones because they think it is a little too difficult, which just means they are more vulnerable if they lose their phones.”

 

The Enthusiast: You find it hard to be without your phone.All your pictures are on it, most of your communication happens through it and you are curious to download apps, so that you can get even more out of your phone. You play various interactive games with the people around you and transfer money with mobile banking.“You need to be extra careful when downloading apps – always read their reviews before installing. If there are no comments or stars, then make sure to do further research about the app on the internet. Lastly, stay away from using mobile banking in public places with wifi.”

 

The Extensive: Your phone has become an extension of your arm, both at home and at work. You use it for everything and continue to explore new features and apps in order to make it even more efficient. You have extensive technical knowledge of how your phone works and demand high level of safety. “This type of smartphone users often installs antivirus protection on their device so that they can detect, block and back-up the phone if anything should happen. Of course these people are also exposed to potential wifi hotspot risks, man-in-the-middle attacks are getting increasingly widespread on public networks. Here, an attacker can interfere and manipulate the information that transfers from your phone to the network.

 

The obsessive: You often replace your smartphone with new ones to get the newest technology. In order to get the maximum from you phone, you delete several of the phone’s default programs in order to organize it to your liking. “Users are rarely aware that hacking (jailbreaking and rooting) opens the phone’s SSH port, which means anyone potentially can connect to your smartphone and steal or add data”, says Janus R. Nielsen. These users often installs unauthorized third-party apps which are free, but these can easily add malware to your phone. “The Obsessive can for instance benefit from a mobile VPN-service (virtual private networks), where they can connect to their home network, away from home, via encrypted channels, so that strangers are not able to track their online surfing.”

 

No matter what type of smartphone user you are, Janus R. Nielsen recommends first and foremost that you make sure to have the basic security measures in place:

 

1.      Get a password on your mobile, consisting of both numbers and letters.

 

2.      Read reviews and comments before downloading an app. If it has none then stay away.

 

3.      Read the terms carefully before you approve and start downloading an app. For instance there would be no need for a puzzle game to get access to your messages and location.

 

4.      Consider whether you would benefit from an antivirus program that can track your phone, block it and make back-ups if you lose it.

 

5.      Beware of public wifi hotspots.

 

6.      Please note that the warranty does not apply when you jailbreak your phone.

 

7.      Be careful with apps from unauthorized app stores, as they can easily contain malware. The same applies push advertisement in free apps.

 
 
 

The most efficient malware methods

 

Malware; those pesky malicious programs that can make life miserable by infecting your PC and Smartphone and, at worst, steal your money, is a growing problem. Security Expert Janus R. Nielsen from the antivirus company www.mysecuritycenter.com comments on the four most efficient malware methods today.

 

By Security Expert Janus R. Nielsen, www.mysecuritycenter.com

 

Malware is becoming an increasingly lucrative business among internet criminals. Today it is not only to annoy users with the largest amount of spam and amateurish chain letters, hoping that someone falls for a link to a highly questionable website. Now, hackers are working in a much more professional and targeted fashion, in order to make money from each individual victim.
I have noticed that American FortiGuard has listed the four most efficient methods that internet criminals use to get in the pockets of PC users, and I would like to make a few comments on these.

 

1. An Adobe Flash update that tricks users into providing full access during the installation.
Since most videos on YouTube are streamed through Adobe Flash Player, which is a plug-in for your web browser, it is not surprising that hackers aim to make fake updates in order to reach the maximum number of users. When PC users click on the pop-up, which installs the fake update, the program will be able to steal passwords for online banking and other online payment sites and this way get hold of the users’ money. The best known example of a fake Flash update was the Flashback Trojan Horse that attacked more than 600,000 Mac users a few years ago, but this is still a potential trap, which makes it one of the most lucrative scams on the internet.
The best advice is to download the update directly from Adobe.com – this way you know it is original.

 

2. Fake antivirus alerts
“Your PC is infected with viruses. Click here to install suitable antivirus software” or “Your antivirus software has expired”. There are many fake pop-ups in circulation that try to imitate the real antivirus programs, thus fooling users into paying for something they believe protects them, but which is in fact malware. What these programs typically do is to steal contact information, which they can sell to third parties. But how do you separate false warnings from the real ones? The fake pop-ups are more aggressive, more frequent, and keep popping up even though you are offline. If your PC has been infected, it will run considerably slower, adding new toolbars, new wallpaper and a new home page, which all indicate that you have installed malware instead of antivirus software. The best advice is never to click on pop-up warnings – do not even try to close them with the “X” in the corner, as this can lead to even more pop-ups. Delete it instead by pressing Control + Alt + Delete to see the list of programs running and remove the pop-up warning from the list. If you are unsure about the authenticity of the update, then go to the respective antivirus company’s website and check if they have issued updates recently.

 

3. Ransomware
Ransomware is the name of a specific type of software that hackers use to block a user’s PC and then demand money to unlock it again. Latest example of this type was the so-called Police Virus that infected millions of PCs worldwide. The virus also flourished in Denmark from the Danish National Police, which resulted in police scam warnings nationwide. Many Danes paid around 100 Euro to get their PC unlocked. But then again; you need to use common sense before you pay.

 

4. Trojan attack on Smartphones
Nowadays, the term Trojans covers the most prevalent group of malicious programs that often reminiscent of worms, but does not contain an automatic spreading mechanism. Originally, the Trojans scattered via web pages and links in e-mails, but today the Trojans also target Smartphones, which especially is an issue because of the increasing use of services such as online banking on mobiles. The hackers are becoming more cunning and they constantly improve their ability to trick money out of the consumers’ pockets. There are even examples of false requests from the banks to install new banking apps on the phone, and when they are installed, the fraudsters have installed spyware that can intercept codes for online banking, etc.

 
 

As a consumer, it is important to constantly be skeptical of what you download, click on, etc. Furthermore, the security industry and the authorities must make all efforts to tackle this increasing problem. Malware is illegal in the legal sense, but the problem is that it almost never has any consequences to emit the harmful programs. For this there are several explanations; firstly, it is a question of resources and if there is not a profound organized attack against one of the big companies, it does not have high priority for the police to identify those targeting random people with spam, phishing, viruses, etc. – it is simply too time consuming. Secondly, it can be difficult to track the exact position of the senders. Fortunately, we regularly hear about unveilings of organized cybercrime, which indicates that the police actions have a positive effect.

 
 

Zou ik willen investeren in Windows 8?

Het is nu bijna 6 maanden geleden dat Microsoft  hun nieuwe besturingssysteem lanceerde, Windows 8. Microsoft stelt dat de overgang van Windows 7 naar Windows 8  hun grootste up-to-date is. De belangrijkste wijzigingen in het besturingssysteem hebben veel mensen in twijfel of ze wel willen investeren in Windows 8. Hier bij www.mysecuritycenter.com, hebben we een kijkje genomen in het nieuwe besturingssysteem van Microsoft en hebben de voor-en nadelen met Windows 8 geïdentificeerd,die de aankoopbeslissing kunnen beïnvloeden.
Wat is Windows 8?
Het nieuwe besturingssysteem van Microsoft Windows 8 is geïnspireerd door de populariteit die tablets en smartphones hebben gekregen in de afgelopen jaren. Oude operationele programma’s in het systeem zijn vervangen door Apps en een betere touch-technologie die is geïmplementeerd om de navigatie-ervaring voor Windows 8 gemakkelijker te maken
Nieuwe functies
– Touch-functie: Hoewel Windows 7 dit al had, heeft het nieuwe besturingssysteem de touch-functie naar een hoger niveau genomen. Met de touch-functie is de gebruiker in staat om snel en gemakkelijk  met documenten en programma’s te wisselen,en dit ook met in-en uitzoomen op het scherm kan doen.
 – Oppervlakte: Het nieuwe oppervlak is een combinatie tussen een PC en een tablet. Het menu Start in Windows 8 is hetzelfde als het Start Screen op Windows Phone. Alle programma’s in het besturingssysteem zijn vervangen door Apps die je kunt downloaden van Windows Store, en alle commando’s  zijn eveneens  vervangen door de touch-technologie die we al kennen van tablets en smartphones.
.
– Charms: ‘Windows 8 Charms’ is een totaal nieuwe en andere functie van Windows. Charms is een klein menu dat verschijnt als u de muis door de rechterkant van het scherm op uw computer sleept of op uw tablet met uw vingers. Het menu bestaat uit essentiële functies zoals; Access Start Screen, zoeken, delen, apparaten en Instellingen. Zo kan de Search Charm worden gebruikt om niet alleen te zoeken op het internet, maar ook door middel van al je apps
– Meerdere schermen: Windows 8 is verbeterd met de mogelijkheid om meerdere schermen te gebruiken. Het nieuwe besturingssysteem biedt u de mogelijkheid om je startscherm op een scherm te gebruiken, en je bureaublad op de andere. Een andere functie is dat u verschillende achtergronden kunt gebruiken op de schermen, en  je ook de mogelijkheid geeft om uw scherm te splitsen in twee schermen, zodat u b.v.  uw werk-gerelateerde taken aan de ene kant van het scherm kunt hebben en uw prive zaakjes aan de andere kant van het scherm. 
 – Windows Store: Hoewel Windows Store geen nieuwe functie is, is het nu des te belangrijkervoor het besturingssysteem dan ooit tevoren. Windows winkel geeft u de mogelijkheid om allerlei gratis en betaalde apps te downloaden. Bovendien kunt u eenvoudig updates downloaden voor de apps die u geïnstalleerd heeft op uw pc, tablet of smartphone
voordelen:
– Snelste Windows ooit: Windows 8 is het snelste besturingssysteem van Microsoft tot nu toe. Niet alleen is het snel op te starten, maar de algemene snelheid van het systeem is ook snel.
. Beter geheugenbeheer: Het nieuwe besturingssysteem heeft een beter geheugen management. De Apps laat minder sporen op uw computer achter, wat resulteert in lagere geheugengebruik.
– Betere levensduur van de batterij: De levensduur van de batterij wordt verlengd met Windows 8. Het besturingssysteem zet Apps en programma’s op het bureaublad tijdelijk af als de pc slaapt.
– Apparaat ondersteuning: Windows 8 geeft u een betere kans om meerdere schermen te gebruiken. Verder is USB 3.0 direct geïmplementeerd in het systeem.
– Windows Store: Windows Store maakt het mogelijk om eenvoudig en snel nieuwe en bestaande applicaties te downloaden en bij te werken op uw pc, tablet of smartphone.
– Prijs: Als u al met Windows 7, XP of Vista, hebt u de mogelijkheid om uw versie te upgraden naar Windows 8 voor de kleine prijs van 39,99 euro.
Toekomst: Windows 8 heeft alle mogelijkheden om het gewenste besturingssysteem van de toekomst te worden. Waarschijnlijk zullen meer programma’s in de toekomst worden gemaakt speciaal voor dit soort platform
Nadelen
– Start Scherm en menu: Het “Metro” Start Screen voor Windows 8 kan niet worden gewijzigd naar het oorspronkelijke Start Screen. Bovendien is ook het Start Menu van het bureaublad verdwenen.
– Niet voor iedereen: Niet alle CPU’s kunnen de nieuwe Windows 8 draaien. Vooral CPU’s  kleiner dan 1 GHz lopen risico’s.
Geen essentiele veranderingen: Behalve de touch-functie en de nieuwe oppervlakte, biedt Windows 8 niet echt grote belangrijke verbeteringen in verhouding met de vorige versie van het besturingssysteem.
– Slechte beveiliging: Een recente test van het besturingssysteem laat zien dat Windows 8 het mogelijk maakt 15 van de 100 meest voorkomende malware-programma’s er door laat. Daarom is het een noodzaak om een alternatieve veiligheidsoplossing te ïnstalleren die actief is op uw PC. Zorg ervoor dat u niet twee antivirusprogramma’s tegelijk gebruikt, want deze kunnen met elkaar conflicteren.
onze aanbeveling
Denk na over wat voor soort behoeften u nodig heeft als een pc-gebruiker. Vindt u het gemakkelijk om vertrouwd te raken met nieuwe systemen? Als u een tablet of een Windows-of Android-telefoon heeft dan moet u  verandering onmiddellijk overwegen. Als u meer comfortabel bent met het oude Microsoft Office-pakket, omdat u alle functies weet of als u een oudere computer (meer dan vijf jaar) hebt, is het de moeite waard niet om je geld aan een upgrade te besteden

Should I invest in Windows 8?

It has now been almost 6 months since Microsoft launched their new operating system, Windows 8. Microsoft states that their transition from Windows 7 to Windows 8 is their biggest up to date. The major changes in the operating system have put many people in doubt whether they should invest in Windows 8. Here at www.mysecuritycenter.com, we have taken a look at Microsoft’s new operating system and have identified the pros and cons with Windows 8, which might influence your purchase decision.
What is Windows 8?
Microsoft´s new operating system Windows 8 is inspired by the popularity which tablets and smartphones have had in recent years. Old operating programs in the system have been replaced by Apps and a better touch-technology has been implemented to ease the navigation experience for Windows 8.
New features
        Touch-feature: Even though Windows 7 already had it, the new operating system has taken the touch-feature to the next level. The touch-feature allows the user to quickly and easily move around the documents and programs, as well as zooming in and out on the screen. 
        Surface: The new surface is a combination between a PC and a tablet. The Start Menu in Windows 8 is the same as the Start Screen on Windows Phone. All programs in the operating system has been replaced by Apps you can download from Windows Store, and all commands have
         likewise been replaced by the touch-technology we already know from tablets and smartphones. 
        Charms: ‘Windows 8 Charms’ is a totally new and different feature to Windows. Charms is a small menu which appears if you mouse through the right side of the screen on your computer or drag out with your fingers on your tablet. The menu includes essential functions as; Access Start Screen, Search, Share, Devices and Settings. For example, the Search Charm can be used to search through not only the internet, but also through all your Apps. 
        Multiple Screens: Windows 8 have improved the ability to use multiple screens. The new operating system gives you the possibility to have your Start Screen running on one screen, and your Desktop on the other. Other features allow you to use different backgrounds on the screens, and also gives you the possibility to split your screen into two screens, so you for example can have your work-related tasks on one side of the screen and your private encounters on the other side of the screen. 
        Windows Store: While Windows Store is not a new feature, it is now more essential for the operating system than ever before. Windows store gives you the possibility to download all kinds of free and paid Apps. Furthermore, you can easily download updates for the Apps you have installed on your PC, tablet or smartphone. 
Pros:
        Fastest Windows ever: Windows 8 is the fastest operating system from Microsoft to date. Not only does it boot fast, the general speed of the system is fast as well. 
        Better memory management: The new operating system has a better memory management. The Apps leaves fewer traces on your computer, which results in lower memory usage. 
        Better battery life: The battery life is extended with Windows 8. The operating system suspends Apps and programs on the desktop while the PC is at sleep. 
        Device support: Windows 8 gives you a better opportunity to use multiple screens. Furthermore, it has USB 3.0 implemented directly into the system. 
        Windows Store: Windows Store allows to you easily and quickly download new and update existing Apps to your PC, tablet or smartphone. 
        Price: If you are already using Windows 7, XP or Vista, you have the opportunity to upgrade your version to Windows 8 for the small amount of 39.99 USD. 
        Future: Windows 8 has all the possibilities to become the preferred operating system of the future. Most likely more and more programs in the future would be built specially for this kind of platform. 
Cons:
        Start Screen and Menu: The “Metro” Start Screen for Windows 8 cannot be changed back to the original Start Screen. Furthermore, the Start Menu has also disappeared from the Desktop. 
        Not for everyone: Not all CPU’s can run the new Windows 8. Especially CPU’s smaller than 1GHz are at risk. 
        No essential changes: Apart from the touch-feature and the new surface, Windows 8 does not really offer you any major improvements from the previous version of the operating system. 
        Bad security: A recent test of the operating system shows that Windows 8 allows 15 out of the 100 most common malware-programs to slip through. Therefore, it is a necessity to have an alternative safety solution installed and running on your PC. Be sure though not to have two antivirus programs running simultaneously, as they can conflict with each other. 
Our recommendation
Think about what kind of needs you have as a PC user. Do you find it easy to familiarize yourself with new systems? If you have a tablet and a Windows or Android phone then you should consider changing immediately. If you are more comfortable with the old Microsoft Office package, because you know all the functions or if you have an older computer (over five years), it may not be worth spending money on an upgrade.

How to Dual Boot Windows 8 and Windows 7

 

Want to try Microsoft’s next operating system, Windows 8, without losing your Windows 7 system? Installing Windows 8 in dual-boot mode is a snap with our guide.

1

Want to test the wild new waters of Windows 8 but don’t want to lose your current Windows setup? You can do this with the Windows 8 installer, which can create a multi-boot setup. I’ve been running one of my test PCs at PCMag this way for several months, and the clear new-style (we can’t use the term Metro anymore) multi-boot menu dutifully appears whenever I restart the system. Setting up such a system isn’t hard at all, as long as you prepare for this kind of installation.
One note to bear in mind: The multi-boot setup only works with Windows 7 and Vista: You can’t set up a multi-boot system with Windows XP, let alone Ubuntu.

STEP 1: BACK UP!
Before you attempt this, however, you should back up your existing Windows PC. You never know what will happen when installing a new Operating System. As a minimum you should back up all your photos, videos, and documents. There are many great utilities designed to backup the contents of your computer but we recommend MYSecureOnlineBackup, powered by Mozy, the world leader in online secure backup. Register today and take advantage of our incredible 3 month trial offer at less than 1 Pound per month!

2

STEP 2: PARTITION
You’ll have to create a partition of at least 16GB (20GB for 64-bit Windows 8) for your side-by-side Windows 8 installation, we recommend a partition size of 50GB.. To do this, type “disk management” in the Start button’s text box, which will display a “Create and format hard disk partitions” choice at the top of the Start panel. Click on that to open the Disk Management utility. You’ll probably have two partitions. Right-click on the largest one, and choose Shrink Volume from the context menu.

3.png

A “Querying Shrink Space” dialog will appear for a while, then another message will tell you how much free space can be squeezed out of the drive in MB. Enter a size above 16GB for the 32-bit version of Windows 8 and over 20GB for the 64-bit flavour, and then hit the Shrink button. This will create an unallocated section equal to the size you chose in the chart at the bottom of the window. Leave it be for now, we’ll let the Windows 8 installer take over from here.

4.png
STEP 3: DOWNLOAD THE INSTALLER.
Now it’s time to actually get your copy of Windows 8, which at this point means making a purchase (if you haven’t already). You can purchase and download this from Microsoft’s Web Shop. You have a choice between 32-bit and 64-bit; since most modern PCs are 64-bit capable, that’s a better choice. Use Windows 7’s included disc image burning utility to create an installer DVD from the ISO file once you’ve downloaded it, or you can create a bootable USB key using the Windows 7 USB/DVD Download tool. You must boot to the upgrade disk or USB drive: You can’t create a dual-boot system by starting the installer within Windows while it’s running.

STEP 4: RUN THE WINDOWS 8 INSTALLER
Pop in the installer DVD you burned or the USB stick you prepared, and restart your PC. Choose your language, then “Install Now.” You will have received a product key when you made your purchase, you will need this key at the next stage. Accept the software license, and after this, choose Custom and not Upgrade. Now is when you will be presented with the choice of partitions, click “Drive options (advanced)” and then select the Unallocated space we created in step 2. Next, click New from the drive options icons below. Accept the full size displayed, and hit Apply.

5.png

Now we’ve got a fresh partition to on which to install Windows 8 onto. Hit Next, and setup is off and running. Go have a coffee or a snack of your choice; it takes about 20 minutes. Note there was no choice for specifically creating a multi-boot setup—since you used a separate partition that will be enabled automatically.
Your system will reboot into Windows 8, where you’ll go through the typical first-run options of choosing a color pattern, WiFi connection, and Microsoft account. The next time you restart your system, however, you’ll see this Windows 8 multi-boot menu before the OS starts:

6.png

By default, this screen displays for 30 seconds, and then Windows 8 launches. To change that default to your older OS, choose “Change defaults or other options” from the bottom of this multi-boot screen. Here you can change the timer value and the default boot operating system. You can also use troubleshooting tools like Refreshing or Resetting your PC, and you also have access to advanced options like system recovery and a command prompt.
And that’s about all there is to say about multi-booting with Windows 8. For more on getting, installing, and running Windows 8, contact our experienced support department, and ask them about installing and dual booting Windows 7 and 8.

Steeds meer Nederlanders bedot op Facebook

 

Phishing gevaar op Facebook, het komt jammer genoeg steeds vaker voor. Internetcriminelen proberen je als niets vermoedende gebruiker naar fake Facebook sites te lokken, alleen maar om je wachtwoord te ontfutselen, of je kredietkaart gegevens te stelen. Door het immense succes van Facebook, die ondertussen al met meer dan 900 miljoen gebruikers rekent, is de site het ultieme doelwit geworden van scammers over heel de wereld. Beveiligingsexpert Janus R. Nielsen van www.mysecuritycenter.com beaamt dat deze nieuwe vorm van cibercriminaliteit steeds vaker voorkomt en geeft enkele nuttige tips, hoe je veilig facebookt.

 

Je ontvangt een e-mail, die lijkt te komen van Facebook: Jan Klaassen wil je toevoegen als vriend. Welke Jan Klaassen? Wanneer je twijfelt of je hem of haar die het verzoek stuurde wel degelijk kent, kan je beter twee keer nadenken vooraleer het verzoek te accepteren. Facebook gaf onlangs nog publiekelijk toe, dat er aan de beveiliging nog heel wat werk verzet moet worden, en schat dat het aantal gecreëerde fake profielen de 83 miljoen overschrijdt. Uit een recente studie van “The Anti-Phishing Working Group”, een officieel erkende organisatie ter bestrijding van phishing, blijkt een enorme stijging van het aantal bedreigingen van phishing gerelateerd aan sociale netwerken zoals Facebook, Twitter, MSN, dating sites, etc.

 

Let op voor fake e-mails

 

Bedrog via Facebook kan op verschillende manieren. Meest voor de hand liggend is via een fake e-mail, waarbij je uitgenodigd wordt om in te loggen op je Facebook account. Je hebt bijvoorbeeld zogezegd een nieuw bericht ontvangen, of je wordt uitgenodigd voor een nieuw event, of je bent getagd in een foto, of je wordt aangespoord je account te actualiseren opdat het niet gewist zou worden. Normaliter moet je dan op een (foute) link klikken om verder te gaan. Op deze manier installeren de scammers virussen of spyware op je computer, om zo al je online activiteiten te registreren en privé-informatie te bemachtigen.

 

Ook in de Benelux een groot probleem

 

Janus R. Nielsen van de firma MYSecurityCenter zegt dat hun support team in de afgelopen maanden een opvallende stijging opmerkt in het aantal meldingen van virussen en spamgevaar via Facebook. “Onze klanten, die onze anti-virus software op hun pc geïnstalleerd hebben, contacteren ons omdat hun facebook account op het eerste zicht geblokkeerd wordt door ons beveiligingsprogramma. Uiteindelijk blijkt dat ze op een valse Facebook link geklikt hebben, een kopie van de originele versie. De layout van Facebook is vrij eenvoudig, dus het is ook niet zo moeilijk om een vervalste pagina te maken, gebruik makende van dezelfde kleuren, logo, etc. Scammers proberen zo via deze neppagina de inloggegevens van de gebruikers te weten te komen. Ook waren er enkele klachten van klanten, die het vriendschapsverzoek van valse profielen geaccepteerd hadden en op die manier virussen op hun computer kregen. Hun computer begon zich plots zonder reden heel raar te gedragen.

 

“Vaak zien onze IT-experten, wanneer ze vanop afstand verbinding maken met de geïnfecteerde computer om te controleren wat er precies foutloopt, dat het probleem aan Facebook gerelateerd is. Heel vaak ook sluipt malware en spyware binnen via de vele gratis games op Facebook”. Janus R. Nielsen schat dat het aantal verwerkte incidenten binnen MYSecurityCenter, waarbij gebruikers het slachtoffer werden van malware via een nep Facebook account, in vergelijking met de maand augustus van vorig jaar, van 30 naar 220 meldingen gestegen is.

 

Scammers die erin slagen je Facebook account te hacken, krijgen toegang tot al je prive-berichten, die bij ieder van ons heel wat persoonlijke informatie bevatten. Ook kunnen ze al je contacten bestoken met spam e-mails. Steeds vaker kan je via andere websites op je facebook account inloggen, zoals bijvoorbeeld via Spotify, de overgrote meerderheid van de deal sites en andere e-shops. “Wanneer je account op Facebook gehacked wordt, staan niet alleen je persoonlijke foto’s en gegevens op het spel. Het is ook wat je online koopt of verkoopt, je kredietkaartgegevens, wachtwoorden en eenderwelke informatie die tot je privacy behoort, dat in gevaar komt,” zegt hij.

 

Hoe kan je jezelf beveiligen?

 

Je hoeft niet rustig af te wachten tot je op een ongelukkige dag een verkeerde link aanklikt en het slachtoffer wordt van een phishing aanval. Je kan echt wel je voorzorgen nemen om jezelf tegen scammers en het fenomeen phishing te beveiligen.We zetten de tips van Janus R. Nielsen hier even op een rijtje:

 

– Bewaar de correcte link naar www.facebook.com in de lijst van favorieten, zo heb je de correcte link steeds bij de hand. Wanneer je iedere keer via je favorieten inlogt op Facebook, ben je veilig.

 

– Vermijd vooral het klikken op links in e-mails die van Facebook ontvangt. Het is namelijk niet zo eenvoudig om uit te maken of de e-mail authentiek is en dus echt wel van de enige echte Facebook komt.

 

– Zorg ervoor dat je een anti-virusprogramma op je computer hebt en dat die volledig up to date is. Op die manier zal je gewaarschuwd worden wanneer de site of links enig gevaar inhoudt, en kan je voorkomen dat je schadellijke sites bezoekt. Let wel dat er steeds nieuwe virussen opduiken, die zullen meestal niet herkend worden door de software, aangezien ze op dat moment nog niet als virus bestempeld werden. Het kan tot 24 uur duren vooraleer een virus toegevoegd wordt aan de zwarte lijst.

 

– Geef nooit je log-in gegevens vrij aan anderen. Hackers sturen soms e-mails uit waarin je je inloggegevens moet bevestigen om je account te heractiveren. Ga hier niet op in, want meestal gaat het om een poging tot phishing.

 

– Verwijder alle berichten die wachtwoorden en/of informatie van bankgegevens bevatten, op die manier vermijd je dat deze persoonlijke informatie beschikbaar is in het geval je account in de handen valt van hackers.

 

– Schrijf naar phish@fb.com, dit is de afdeling binnen Facebook die je kan contacteren bij vragen of twijfels over phishing en hackers.

 

– Verander op regelmatige basis je wachtwoord.

 

More Brits are being cheated on Facebook

 

Facebook phishing, where users are encouraged to visit fake Facebook sites to cast their passwords or credit card information is an increasing problem. With over 900 million users, Facebook has become one of the most attractive sites for scammers around the world. Security expert Janus R. Nielsen from www.mysecuritycenter.com confirms that the problem is increasing among their British customers and gives tips on how to stay safe.

 

You receive an email in your inbox from what you think is Facebook: Melanie Smith has sent you a friend request. Who could she be? If you are in doubt, think twice before you accept. Facebook recently admitted that they are facing serious security challenges, and estimated the number of fake profiles to be above 83 million. Also a study performed by “The Anti-Phishing Working Group” showed that a growing number of phishing attacks in the first quarter were related to social networking sites such as Facebook, Twitter, MSN, dating sites, etc.

 

Beware of fake emails
In general, Facebook fraud can be carried out in different ways. In the case of a fake emails, it may be a notification that you have a new message in your inbox, you are invited to a new event, you have been tagged in a photo, or something will happen to your account if you do not keep it activated. The common denominator is that you must click on a bad link in order to move forward. This way scammers can install viruses or spyware on your computer, so everything you do online will be registered by the hacker.

 

Also a problem among Brits
Janus R. Nielsen from MYSecurityCenter says that their support department the past few months has seen a growth of Facebook-related viruses and spam from new and existing British customers. “The customers, who already have our antivirus program installed, typically contact us because their Facebook page has been blocked by the software which they are a bit confused about. It turns out that they have clicked on a fake Facebook site, a copy of the original. Facebook is simple in its layout, so it is relatively easy to make a copy of the same colours, logo, etc. Scammers do it in order to gain access to other people’s login information. We have also seen examples of scams that we have been able to trace back to the fake profiles”, he says that, some customers explain that their computers start to behave strangely for no apparent reason.
“When our technicians diagnose the problem via” remote control “, a remote take over software, by which they connect to the customer’s computer, they can see that the problems are in some way related to Facebook. Often, customers have tried one of the many free games on Facebook, which makes a computer very vulnerable to malware “. Janus R. Nielsen estimates that the number of Facebook-related malware from the MYSecurityCenter database of approximately 180.000 British customers has increased from 30 inquiries in August last year to 220 inquiries in August this year.

 

The scammers who hack into the unfortunate Facebook accounts will have access to all private messages, which often contain sensitive information. They can also get hold of all your contacts and can send them spam mails. It becomes more and more common that your Facebook login is used in various external services for example Spotify, the majority of deal sites and other commercial e-shops. “If your account on Facebook gets hacked, it is not only personal pictures that hackers have access to. It is also the stuff you sell or buy, credit card information, address book and all other highly sensitive information,” he says.

 

How to stay safe
You do not have to sit back and wait for the scammers to reach you, actually you can do something yourself to reduce the risk of falling into the trap. Here is Janus R. Nielsen’s advice:

 

– Save www.facebook.com as a bookmark, so you are sure that you always go to the right site. If you always click on the bookmark before you log in you should be safe.
– If you need to stay sure, you should avoid clicking on links in the emails you get from Facebook as it can be very difficult to identify whether the email is sent from the real Facebook.
– Keep your antivirus program updated, so you are warned against unsafe sites that are reported as phishing. It can prevent you from visiting known malicious sites. However it does not warn against the new malicious sites that are constantly emerging. It can take up to 24 hours before a new virus or a malicious website will be blacklisted.
– Never give your Facebook login information to others unless you are logging into Facebook.com. Some hackers send out emails that you must confirm your login to ensure that your account is still active, but that is just a clever trick.
– Delete messages containing passwords and bank account information in your inbox, so you make sure that such information is not available if your Facebook account is hacked.
– Write to phish@fb.com, Facebook’s new department against phishing, if you have been exposed to phishing attacks.
– Change your password regularly.

 

MYSecurityCenter.com No.1 in PC & Mobile Security based in El Rosario require:

 
 

Danish speaking IT & Customer Service Person

 

Dealing directly with our end-users you should have a sound IT background. You will be required to support our products, trouble-shoot & fix hardware & software issues and provide support for an extremely busy Danish customer support desk.

 

You should be organized and able to work under pressure. In return we offer an excellent salary plus commission.

 

For more information please send your CV to marion@mysecuritycenter.com