How Protected Is Your PC?

computer-protection

Almost every computer today has protection, whether it’d be a firewall, anti-virus software or a self created program. It’d be silly to argue that a computer without protection is not an issue at all, especially with the rising level of threats towards technology and the high number of reported viruses.

Think of it this way: Your home has a form of protection. You already have a lock on the front door, but still, you either have a firearm, alarm system, an occupant who knows martial arts, or even a knife in the kitchen, so why take a risk with your computer? A computer without protection is an open invite to attacks, just as much as sleeping with your front door unlocked. It’s too bad we can’t do that anymore.

There are many options computer users have, many companies to choose from, ranging from the famous Norton, to Nod32, all the way to McAfee. Take time to research the options you have. Some users might find one program works better than another, which is normally the case.

But my computer already comes with Microsoft Security Essentials.

This is true for most Windows PCs. They automatically come with self-protection, such as MSE, however, those programs are not monitored and updated as frequently as a program, such as Norton. Microsoft does release updates, however, they are a corporation that deals with more than just protection, where Norton or McAfee solely focuses on protection and releases security updates, almost daily. All teams of dedicated security specialists are able to research and receive reports of new attacks and vulnerabilities.

I have Malwarebytes, which scans for viruses and threats.

Malwarebytes is a great program to use for the searching and removal of threats, however, if you’re only using the free version as most are, you aren’t receiving live monitoring, like Norton or McAfee provides, meaning you only see threats when you scan for them. Once you scan for a threat and identify one, it may be too late, as your computer might already be infected in several spots, which removal isn’t always the solution. Some viruses can literally attack files, to the point where they are no longer useful. Now you’re stuck with a computer that needs a factory reset and are at risk of losing important files.

I don’t feel I’m currently a risk. I have no enemies and I don’t download from bad sites.

It’s always important to avoid downloading movies from “free” sites, downloading “free” adult content and torrents, however, just because you don’t download these types of files, doesn’t mean you aren’t vulnerable for attack. Many computers are attacked daily, just because someone sent an email, not realizing their computer was infected and that file they sent, just happened to have the virus. Always have protection and always make sure it’s capable of scanning inbound emails.

With all of the information provided today, we hope this brings awareness to the importance of computer protection. Ensure your software is up-to-date, is a decent program and is not a free anti-virus software. Never take the risk. The one time you do, could be the last time your computer operates in normal mode.

 

Signs You’re Falling for a Scam


Scams are everywhere, it’s quite unfortunate, but as long as the Internet is free and real information can be hidden, scams aren’t going anywhere, so better protect yourself!

The first mistake isn’t falling for the scam, but failing to fully and accurately research the business or product. Sure, type in a search engine the name of a business and see positive results. Can it still be a scam? Most definitely. But how is that so? Easy!

Experienced scammers can simply write positive content about themselves. It’s quite easy and mostly free to write positive articles on. Take Google reviews for example. An individual can simply make several Google accounts and rate their own business five stars. So how can you truly identify a phony? That’s actually easy.

Check the reputation of the business on a reliable website

Most people don’t even think about it, but the Better Business Bureau can provide information upon request about a particular business. You can even search for “Rip Off Reports” and visit http://www.scamadviser.com, where many individuals have left feedback about almost every website and scam out there.

Check to see if the business has a Doing Business As (DBA) license

Most websites won’t display their DBA, but most will have a license number, especially if it deals with financial information. It’s normally posted somewhere on the website or at times available upon request. If you don’t see a license number or aren’t provided one, don’t take a chance.

View the website for contradicting information or incomplete sections

It’s not always the case, but some scammers will misspell words on their website, leave important sections incomplete, not give enough detail in the about section and won’t use emails ending in a company domain. Small businesses are of course important, email domains can be expensive, but still keep this in mind.

Observe how many employees seem to be working for the company

If you’re only talking to the same person repeatedly or are refused to be transferred to another employee, chances are there are no other employees and this can be a sign of a lone wolf working a scam. Some small businesses only function with limited employees, so not every company with limited employees is a scam.

Are you viewing pictures on their website all downloaded from Google?

A lot of companies take pride in posting real photos of their company and employees. If you’re not seeing any real photos or a limited amount, stay on alert!

We hope that more internet users can stay safe online with this information. Be sure to stay on alert and always pull out of a business deal if you feel something isn’t right. Chances are, it’s not.

Cyber Bullying Stories to Come in June 2016


Each month is an important month, but June 2016 plans to be an important month for Cyber Crime Response Agency, especially for those who were victims of cyber bullying attacks in their past.

The agency plans to conduct interview stories for those victims, by collecting the details and full stories of those who were maliciously attacked in their past online. Stories will include all situations, both on cellular device and social media.

“It’s important that we make these stories public, especially for the victims who are now survivors, who wish to have their voice heard and bring awareness to these current and past issues.” said Executive Director Matthew Baumgartner. “It’s just a shame that we have a large number of victims who couldn’t make it to the point of being a survivor.” he continued.

Stories will come from all genders and all ages. They will range from your minor issues of name calling, to the situations of where suicide was even thought to have been an option for these survivors.

If you have a personal story you’d like to be heard, email your detailed full story to sbernardoni@ccra.agency.

CCRA Lead Director to Have Record Expunged


Executive Director Matthew Baumgartner is your average adult and entrepreneur, who’s always been in the business of investigations and Internet safety, starting his run in 2008 with merged non-profit, Civilians Against Online Predators. In 2010, Director Baumgartner created a new organization named Teens Against Cyber Crime. A few years later, that name was changed to Cyber Crime Response Agency. Everything seemed to be running smoothly until 2014.

Director Baumgartner has a large skill set, first proving himself in online decoy operations, then eventually creating his speciality in investigations. Director Baumgartner performed an investigation in 2014, to recover a stolen cellular device for a client, who had no success with law enforcement tracking the phone.

During the course of the investigation, in order for Director Baumgartner to locate and recover the device, he did what any investigator would do and contacted the service provider for assistance. As per phone company policy, Director Baumgartner was required to complete a customer release of consent form, which authorized Director Baumgartner to receive the information on the phone. The request was honored and the device was found and returned to it’s rightful owner.

Unfortunately, the document stated “law enforcement”, which Director Baumgartner made aware to the service representative. The received answer to that issue was for Baumgartner to not edit the form or scratch out words, such as law enforcement, even though he suggested and recommended so. The document had been stored away in the proper filing cabinet once the investigation concluded.

Later in 2014, a firefighter supervisor with Director Baumgartner’s local volunteer fire department, observed Baumgartner’s CCRA email signature and was curious to know if the agency had violated any charitable rights. A request to search the property for financial records of guilt was honored, no violations were found, however, the form Baumgartner completed regarding the stolen cellular device was found and picked up as evidence.

It was at that moment that detectives made a decision to charge Director Baumgartner with impersonating a police officer. The case went to court, then to trial, however, the district attorney’s office was unable to find sufficient evidence to find him guilty, which resulted in a plea bargain of “Accelerated rehab disposition”,¬†which stated “Do not violate laws or be arrested for 6 months and your charges will be erased.”

Towards the end of May 2016 and after many months of successful completion of the ARD, Baumgartner’s attorney submitted documentation to all departments involved in the investigation, that they are ordered by court decision to destroy and erase all evidence and documentation of Baumgartner.

CCRA is pleased to report that Director Baumgartner has successfully cleared his name, will no longer have to admit to charges and that all news companies who partnered with the DA’s office, shall remove or edit all negative articles written on Director Baumgartner. The agency will now be able to return to normal and continue all operations as planned.