Tip of the Week: Hide Your Files in Windows 10

a person using a laptop computer on a desk

No matter what you use your computer for, there are many reasons why you may need to hide your files on your Windows 10 desktop. You could want to hide important files to keep them hidden on a shared computer, or maybe you want to try to prevent anyone from accidentally deleting important files. Or you can hide them to clear the distracting clutter on your desktop. The files you keep on your computer may be essential for you to keep, but if you want to find a better way to organize them, you need to make some changes so they aren’t in the open all the time. 

Windows 10 has built-in functionality that allows you to hide specific folders from view. You can hide your files from view but easily be able to access them all while keeping an organized desktop. If you’re looking to optimize security, you will need to take a little more in-depth path to ensure your files are securely hidden from prying eyes. You can work with IT professionals at 4 Corner IT to learn about file security. 

Hide Your Files from View in Windows 10

Hiding a file from view is more about keeping an organized desktop than security. It’s a personal preference setting that allows you to clean up your desktop and any other folders as you see fit. The setting is easily reversible, so when you need to quickly regain access to those files you’ve hidden on your desktop, it’s a simple task that anyone with any knowledge of folder settings can manage. 

You first need to open your File Explorer and find the File you want to hide to hide your folders. Once you have located your File, right-click on it and select Properties. The Documents Properties window will open on the General tab, where you can review the file settings. If you look towards the bottom of the window, you will see a checkbox next to the word Hidden. When you check the box, it will hide your files from view. This setting does not secure the File. It makes it so that you will not be able to see the File on your desktop any longer.

When you are ready to access any of your hidden files or remove them from the hidden view, open your File Explorer and select the View menu at the top of the window. In the menu items beneath the tab, there is a checkbox next to the word Hidden. When you check this box, you will be able to see all of your hidden items. You can use the above steps to remove your files from the hidden view.  

For more comprehensive security measures and tips, we recommend contacting the technicians at 4 Corner IT. With us on your side, you’ll have nothing to fear from hackers or other cybercriminals stealing your data. To learn more, reach out to us at (954) 474-2204.

Getting Employees to Engage in Cybersecurity

cybersecurity Security

Your staff often needs access to sensitive data and handles it on a daily basis. What they don’t know is that anytime they’re moving files around, corresponding with others over the phone or through email, they’re only a few clicks away from opening your business up to a major cyberattack. Therefore, it’s extremely important that all employees undergo security training. Follow along to discover how to train your staff to spot phishing scams and follow procedures when these situations arise.

To further understand the severity of this issue, simply check the statistics. According to Accenture’s Cost of Cybercrime study, 43% of all cyberattacks are aimed at small businesses, and only a fraction of them know how to defend themselves.

That’s why security training is such a crucial business practice. How you go about educating your staff on cybersecurity is up to you, but here are some tips and methods we’ve found most successful, in our experience. 

#1 Get them to Relate

We’re all aware that cybersecurity isn’t the most exciting topic, but it’s important that your team cares about the issue. That way, they’ll really take it seriously. The best way to do this is by getting them to relate to a victim of a cyberattack and educate them on how common phishing scams and hacks occur, and how damaging they can be.

#2 Always Promote Network Cybersecurity

People are impressionable and tend to follow the lead of others. Creating a company culture that is rooted in network security will impart the same mentality on your employees. 

#3 Consistent Cybersecurity Training

Form a security training plan that is comprehensive, easy to follow, and consistent among all departments. Some beneficial lessons to include are:

  • How to spot a phishing scam
  • Protecting network resources
  • Their role in protecting the company and customer data
  • Password management and best practices
  • How to handle a security breach

If every employee has a solid grasp of these five concepts, you’ll be able to avoid cyberattacks from happening in the first place and have a solid backup plan in case disaster strikes.

#4 Lead by Example

It’s just the truth that cybersecurity is not at the top of everyone’s minds, including most of your employees. Especially if they don’t have a vast knowledge of modern technology and how it functions. Instead of being demanding with them, or getting frustrated at their apathy, support them through security training.

Provide resources, documentation, and communication that will help them understand the severity of the issue, and how they should handle private data in a way that will protect your business. Work with them so they understand how to follow these procedures, and you’ll see major benefits in your network security.

At 4 Corner IT, we can help your business put together a security training plan. To learn more, call us today at 954.474.2204.

Contact Us Today and Check Out Our Blog!

Differences Between Hollywood Hackers and the Real Deal

hackers

In many television shows and movies today, hackers and cybercriminals take the form of evil villains or mischievous antiheroes. While this characterization is undoubtedly fun to watch, they don’t quite get the facts right. Most of the computing constructs demonstrated in entertainment don’t actually exist in real life. This week, let’s discuss what real-life hackers are like, and how they’re different from your favorite computer genius characters.

Hacking Isn’t So Up Tempo

In entertainment, hacking is often portrayed as a fast-paced exercise. Typically, the hacker completes their job in minutes, if not seconds, while exciting music races in the background. The actual work that the, always handsome, hacker is doing consists of typing about 20 lines of code with no mistakes, having a quick revelation as the music swells, and finishing with a flourish of key pressing that results in the victim’s computer crashing or, even more ludicrous, spontaneously combusting. 

While not all television and movie representations are this dramatic, they’re usually still much faster than actual hacking.

Real hacking takes hours, if not more, and isn’t nearly as easy as entertainment makes it seem. Hackers are sometimes sitting in front of their computers for long periods of time reading hundreds of lines of code to try and find some vulnerability. 

Real Hacking Wouldn’t be Fun to Watch

The reason most entertainment platforms depict hacking this way is that the real stuff is…actually pretty boring. This characterization of the insanely smart and good-looking techy hacker that can make technology do anything they want it to is far from the truth. Hackers are usually just average people, or sometimes loners, that often work in a boring office setting to find cracks in networks so they can extract data. 

Real hackers often use automated tools to send out phishing emails, crack passwords, or create scams that fool users into giving them access to their information. None of which would be enjoyable to watch on television. 

Also, a hacker’s goal is usually to collect sensitive information or, at most, install malware on your device. The idea that with a few clicks a hacker could crash your computer or make it explode is absolutely preposterous. 

Why It’s Important to Know the Difference

You may be thinking, “but it’s just entertainment! Why do we care what real hackers do?”. Well, let’s face it, these acts are illegal, and glorifying them the way so many movies and television shows can make it seem like hacking is an acceptable or even cool thing to do. It’s not. Hacking is a crime and these unrealistic characterizations of hackers could give people the wrong impression about the reality of cybercriminals. 

So, should Hollywood change how they portray hackers in entertainment? Not necessarily. It’s true that these depictions of hackers are much more interesting to watch. However, it’s important to know that Hollywood hackers aren’t real and shouldn’t be taken seriously. If anything, view them as comic relief for how ridiculous they are.

What are your thoughts on hackers in movies and television? Do you have a favorite Hollywood hacker? Leave your comments below and check back soon for more great technology content!

Contact Us Today!

Choosing to Enact a Zero-Trust IT Security Policy Can Significantly Reduce Problems

cyber security zero-trust

It’s often difficult to figure out who and what you should trust with your business’ cybersecurity. How can you know for sure that each individual accessing your infrastructure is secured from threats? A zero-trust model can help by providing reassurance that everyone accessing your network is who they say they are. 

What is Zero-Trust? 

Zero-trust policies are when you don’t inherently trust anyone or anything on your network. This includes devices, accounts, or users on the network. Basically, if someone wants to access your network or any information located on it, they will first have to identify themselves, no matter who they are. They could be a business executive or the average office worker; there are zero exceptions made for a zero-trust policy. Generally speaking, zero-trust policies are governed by some form of external authentication. 

There are many benefits to a zero-trust model. As you might expect, when nobody is inherently trusted on the network, security is drastically increased. When identities are verified before any activity occurs, the network is much more secure. Thus, only authenticated individuals can do anything on it. On the other side of this benefit is what happens when the user is genuine but cannot verify themselves. This might make for a rough implementation process, but once your policies get settled, you’ll find that it will make network access much less stressful for your company. 

What Are the Downsides? 

The greatest challenge that an organization will face when implementing zero-trust policies in the workplace is the major infrastructural challenges that will come about as a result of their implementation—particularly for larger enterprises with large workforces, as this means more devices accessing the same infrastructure, and therefore, more need for continuous authentication. The technologies involved in reinforcing these zero-trust policies can make the logistics difficult without committing wholeheartedly to the process. We recommend that, before you implement zero-trust policies, you consult with security professionals like those at 4 Corner IT to determine if it’s the right call for your business. 

 

If you do decide that it’s the right decision for your organization, 4 Corner IT can equip your company with the policies and technologies needed to ensure it is a successful deployment, as well as the support you might need. With multi-factor authentication and additional protections, you can make sure that only authorized individuals are accessing your network. To learn more, reach out to us at 954.474.2204. 

Contact Us Today!

Protecting Employee Privacy is Really Important

employee privacy

Privacy for business means a lot more than protecting the data and personal information of clients. It also extends to just about all data collected by a business, including that of the employees. How can you go about protecting this data without also violating employee privacy? 

Employee Privacy Isn’t Something to Take for Granted 

One particular Pennsylvania state Supreme Court ruling showcases just why it’s important to consider the privacy of employee data. This case was Dittman v. UPMC, a class-action suit that was filed after the University of Pittsburgh Medical Center and UPMC McKeesport had data stolen after hackers accessed the medical center’s systems and stole a considerable chunk of data. This data included personally identifiable information and financial details. Ultimately, the plaintiffsthe employees who had their data stolenwere victorious. According to the case, the hackers had used the data to file illegal tax returns. This cost the IRS a pretty penny. 

 

As a result of this case, the Pennsylvania  Supreme Court established that “an employer has a legal duty to exercise reasonable care to safeguard its employees’ sensitive personal information stored by the employer on an internet-accessible computer system.” On a larger, national scale, employees also have their privacy protected by the Privacy Act of 1974. All that said, we are not legal professionals, so you should not consider this legal advice. However, you are still responsible for protecting the data your employees provide to you. 

Essential Steps to Protecting an Employee’s Privacy 

Thankfully, the right technology can make protecting your employees’ privacy easier. Here are some ways you can accomplish this. 

Private Wi-Fi Connections 

A secure and private Wi-Fi signal can go a long way toward keeping threats away from your network. If you don’t implement a secure wireless connection, you are essentially putting any data sent or accessed over this connection at risk. 

Internet Filtering 

While many solutions will aim to keep threats off of your infrastructure in the first place, this one aims to help your employees keep themselves away from threats found online by blocking access to websites known to house them. You can also filter out websites that are known to waste time throughout the workday. This includes social media or streaming sites. 

Virtual Private Network Use 

VPNs are excellent ways to keep your employees secure when they are away from the protections of your in-house network, a concept which is especially important in today’s age of remote work. 

Device Protections 

Even the most basic protections, like antivirus, firewalls, and spam blocking, can be helpful in preventing the majority of threats. Be sure to have these installed on your devices, and ensure that they are properly activated and maintained at all times. 

Access Controls 

It’s a known fact that the less data someone has access to, the less damage that can be done if their account is compromised. You can also use other factors like two-factor or multi-factor authentication to ensure that only those who are authorized to do so can access specific information. 

You Also Need to Respect Employee Privacy, As Well 

Naturally, there are also limitations as to what you can do with the data you collect from your employees, so it’s your responsibility to know what these limitations are and to ensure that they are followed. Be sure to consider protections, but also to respect the privacy of your employees. 

 

4 Corner IT can help you with this tough balancing act. To learn more, reach out to us at 954.474.2204. 

Contact Us Today