Security

First steps in response to ransomware

How do I know I have been attacked by ransomware? The first sign may be a “ransom letter” appearing in a new text file, your browser or desktop created by the ransomware alerting you to on-going damage with instructions and threats. Your work files may appear corrupted or unusable. How did I get attacked? Ransomware

How to take precautions against ransomware

Ransomware is malicious software that encrypts files on a victim’s device or drives. The encrypted files are then unusable to anyone without the encryption key. Once the attack starts the ransomware warns the victim on how to pay a ransom in order to unlock their data. The cyber criminals may also threaten to expose or

Virus scan with BitDefender

Simply having Antivirus software installed on your computer does not mean it will always be a virus free environment. You can run a scan with anti-virus software to check for computer viruses and remove any found. The Kindergarten IT Program provides BitDefender Antivirus software; you may have your own alternative Antivirus software. To run a

Scam emails targeting kindergartens

Scammers are targeting kindergartens with fake messages with malicious attachments. Please treat all email received from addresses claiming to be kindergartens with the same level of caution as other email. Our system admin has identified malicious email that looks like it is from another kindergarten. Double check the sender information of all email you receive,

Bluekeep: Windows RDP Vulnerability

What is Bluekeep? Microsoft has advised users that there is a vulnerability within its Remote Desktop Services. Remote Desktop Services allow others to access your computer without physically being at the machine. Cyber attackers can connect to targeted computers and send specially crafted commands. This can happen without you allowing them to do so. Computers

Business Continuity

Before your kindergarten closes for the Christmas holidays, we have a few IT tips to ensure business continuity. File Backup We suggest that you should back up your files and images to an external hard drive. This is to prevent you from losing any important documents or photographs. To do so, please follow the below

Password protecting electronic documents

When sending electronic document via email, you need to take the following basic security steps: Password-protect the Word document. To do this, open the word document. Go to “File” tab. Under “Info”, click on “Protect Document” and select “Encrypt with Password”. Enter the password (use a mixture of upper and lowercase letters and numbers), then

Turning off peer-to-peer software

Checking if uTorrent in running in the background Peer-to-peer file sharing programs are designed to run in the background, constantly sharing files with other users online. The program may be using resources and bandwidth without your knowledge. Although there are some legitimate uses for peer-to-peer sharing, usually it is not a service you will need

Tips to protect your privacy

Know your rights The more you know about your rights, the easier it will be for you to exercise them. Read Australian Privacy Principles (APPs) to know more about your right. Familiarise yourself with the APPs so that you can exercise your rights. Read privacy policies and collection notices All entities must have a clearly

How to factory reset your browser

Reset Internet Explorer Click on Tools and select Internet Options. Click on the Advanced tab. Click on the Reset button. Reset Chrome Click on Customize and control Google Chrome button Click on Settings. Click on Advanced Settings. Click on the Reset settings button. Reset Firefox In the address bar of the FireFox. type in about:support

Go to Top