Skip to main content
Amped by Pro Tech Guy

Amped by Pro Tech Guy

By Kyle
We make technology work for you. This podcast will keep you up to date with latest "must know" tips in the fast paced world of computing.
Listen on
Where to listen
Apple Podcasts Logo

Apple Podcasts

Breaker Logo

Breaker

Google Podcasts Logo

Google Podcasts

Overcast Logo

Overcast

Pocket Casts Logo

Pocket Casts

RadioPublic Logo

RadioPublic

Spotify Logo

Spotify

Is it really on sale? Holiday shopping tips!
https://getchrome.com camelcamelcamel.com https://camelcamelcamel.com/camelizer Price Blink https://chrome.google.com/webstore/detail/priceblink-coupons-and-pr/aoiidodopnnhiflaflbfeblnojefhigh https://slickdeals.com https://brickseek.com uBlock (Ad Blocker) https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm HTTPS Everywhere https://chrome.google.com/webstore/detail/https-everywhere/gcbommkclmclpchllfjekcdonpmejbdp?hl=en
26:40
December 3, 2020
BlogCast: Ransomware Exposed! What it is and How it Works
 Click here to see all of our links #cybersecurity #cybersecurityawarenessmonth Ransomware has become an undeniable threat to business growth, profitability and security. It’s a ruthless type of malware that locks your keyboard or computer to prevent you from accessing your data until you pay the ransom, which is usually demanded in untraceable Bitcoin. Cyber criminals are turning this type of attack into big business, raking in billions each year as many businesses have no choice but to pay up. How does ransomware get into the network? Surprisingly, it’s NOT those random USB drives floating around from unknown sources. That’s old school, and cyber criminals operate much more effectively now. The most common vehicle for ransomware attacks today are email and compromised websites. One email is all it takes. We’ve all become so used to email as the major form of business communication that getting someone to click a link is easier than ABC. Ransomware attacks come disguised as legitimate emails that can trick your employees into clicking through to an infected website or opening an infected attachment. Unfortunately, cyber criminals have gotten really, REALLY good at faking internal emails, external communications from stakeholders and seemingly genuine inquiries from customers. They’ll often conceal their ransomware in normal attachments like invoices and reports in Office docs as well as PDFs. Even TXT files can actually be an executable javascript in disguise! Infected websites aren’t always obvious. Let’s face it, cyber criminals will infect any web page they can get their hands on, which is why of the less reputable sites should be avoided. But it’s not just about making sure you and your employees stick to suitable sites, mainstream websites can also carry ransomware infections ready to spread to all visitors. It’s happened before – in 2016 the New York Times, BBC & MSN homepages accidentally exposed thousands of web visitors when their infected site showed malicious ads. What happens during an attack? As soon as ransomware is in the door, it immediately scans local and connected drives (including connected backups) and encrypts thousands of files. Within minutes, everything from Office files to multimedia is locked up tight, inaccessible to all users – even admin. Then a notification appears demanding a ransom to unlock the files and gives helpful instructions on how to pay it. At this point, many businesses are on hold until the situation can be resolved. Typical options include: restoring from safe, external backups; wiping the entire system and starting again; or paying the ransom and learning a hard lesson in data security. Ransomware may not be fun, but it certainly makes for an interesting day at the office! We can help you with a complete data security plan, including safe backups. Call us today at 508-364-8189 or email support@protechguy.com.
03:41
October 2, 2020
Trust me, it's a scam! - Amped by Pro Tech Guy
Interested in Cloud Care? www.protechguy.com/cloudcare Follow us on social: Facebook: www.facebook.com/protechguy Instagram: instagram.com/kyleprotechguy
09:29
May 7, 2020
QuickBit: New Website and Online Store Coming Soon!
New Website and online store will be up soon at www.protechguy.com Need help? www.protechguy.com/help
04:15
May 5, 2020
BlogCast: Here’s Why You Need to Stop Using Free Services (@gmail, @yahoo, etc.) for Business Email
Blog Link: https://www.protechguy.com/blog/stop-using-free-email Need tech help? https://www.protechguy.com/
04:58
April 29, 2020
BlogCast: COVID-19 PHISHING SCAMS ARE RAMPANT! LEARN WHAT TO DO TO STAY SAFE
Looking for the blog article? https://www.protechguy.com/blog/covid-19-phishing-scams Need tech support? https://www.protechguy.com/
05:45
April 28, 2020
BlogCast: WHAT TYPES OF PC ISSUES CAN REMOTE TECH SUPPORT HANDLE?
Looking for the blog article? https://www.protechguy.com/blog/pc-issues-remote-support Need support: https://www.protechguy.com/
04:58
April 28, 2020
QuickBit: Blog updates
Outlining the 4 most recent blogs from www.protechguy.com/blog Need computer support? https://www.protechguy.com/
09:15
April 28, 2020
QuickBit: Info & Updates
This is just a quick recoding from my phone to touch base with everyone and let you know what the plans are for this new podcast!
07:15
April 27, 2020
BlogCast: 6 REASONS YOUR BUSINESS SHOULD HAVE A GOOGLE MAPS LISTING
Looking for the article? https://www.protechguy.com/blog/business-google-maps-listing Need tech help? https://www.protechguy.com 
04:38
April 20, 2020
BlogCast: 7 TIPS FOR SECURING YOUR WORK PC IF YOU'RE TELECOMMUTING DUE TO COVID-19
Looking for the blog article? https://www.protechguy.com/blog/tips-securing-work-pc Need help with a technology issue? https://www.protechguy.com 
05:51
April 20, 2020