Thursday, July 18, 2024

Rebooting and why I should do it

For many, having to reboot/restarting our computers seems to be such an issue. Why can’t I just leave it turned on for days at a time and even connected to the company for hours and days without anyone complaining.

Here are some of the reasons why we all need to reboot/restart our computers/device:

  • A full shut-down restart/reboot is required for completing many of the security patches needed to keep your (personal, corporate, and family) data and reputation safe.
  • A restart refreshes your system of the many "temporary" processes that have done their job, but haven't fully release system resources

We have been working with a client and when we talk to them about getting the end users to reboot/restart their devices it seems to be such a challenge. Of course, there are so many reasons why someone cannot reboot their system on a timely basis:

  • I have files open that I need to keep open because I am working on the files (these files are open for hours even when the person isn’t working).
  • My system takes too long to reboot when I do a restart (maybe the issue is you haven’t done restarts lately and there are too many things that need to be updated).
  • I just don’t have time to do a restart (why not restart your computer at the end of the day, and it will ready when you get back the next business day).

There are so many reasons why someone will tell you that they cannot reboot/restart their system, and a lot of those reasons are that they just can’t be bothered or there isn’t a reason for them to reboot. In some cases, the reason someone isn’t rebooting/restarting their device in a timely manner is because there is no policy in place that says that all devices must be restarted with x number of days. When a business doesn’t have a policy as to how often machines need to be rebooted/restarted, that doesn’t help at all.

For a business to be successful and secure, they need to understand the importance of restarting/rebooting each machine is vital. Some users think that either putting their device into hibernation mood/sleep or a system crash means that a computer has rebooted, has completed the task. What people don’t understand is a crash doesn’t mean a total system restart, and putting a computer into hibernation is not a restart.  For a device to work effectively, they need to have regular, total reboot/restarts. It doesn’t matter if it is a computer or tablet, they all need that bit of time when they can turn off and restart to clear all the stuff that has been bothering/hindering them.

It is important that we understand that our devices, either a computer or tablet, need a bit of time when they can turn off and refresh. So, yes, it is important that we remember that our devices need a bit of time to sleep, even if it is just for a couple of minutes. It helps them recharge and know that they are ready to go and meet your needs again.

Thursday, June 27, 2024

The risk of inactive/off-line systems

 The risk of inactive/off-line systems if just turned on and used

In our fast-paced world with cyber warfare going on, from nation states jockeying for the secrets of other nations with zero day hacks, to the many criminals looking for every way to get value out of everyone they can, software is constantly being patched to try and keep ahead. With so many people and businesses not patching, even old bugs are being probed all the time, and getting attacked. Using unpatched systems is a huge risk, sometimes even if just a few weeks, or sometimes days, out of date.

There are many reasons why a system might be unused for a while. They aren't just sitting there for no reason, but generally in one of the following paths

  • Primary user on extended vacation or other extended leave.
  • Pending deployment, with an active plan to do so.
  • In reserve, with not active plan, other than to be available if needed. Perhaps on an eventual path to be decommissioned.
  • On the way to being decommissioned and disposed.

If there is any intention of bringing a system into active use with little warning, they must be kept up to date, otherwise they represent a security risk as breachable/hackable defects are found but not patched. These machines would need to be regularly (every week or two) brought online and the full patch process run (Not just the few obvious ones, but the whole patch management process). This does not mean for all the system in reserve inventory, just enough for quick deployments (loaner or replacement) and the next ones are brought up to ready from extended off-line status.


Any system that has been off-line for an extended time, is a huge safety risk to us if it is just deployed, until it has been through a few restarts, with time in between for the patch process to see what is needed and deployed. After the OS has gotten its patches, open the primary apps, and go to their ‘Help’ ‘About’ menu to check for any updates there. Browsers and email clients are a big target and the front lines of many cyberattacks.

If a system is on the path to likely being decommissioned, but we are just keeping it around "Just in case" then pull it out of any active monitoring systems it might be a part of, as those usually have a licensing cost you can free up, and they usually alarm/bug someone when they haven’t “called home”. Essentially some effort to ‘Mothballing’ the device, just like the Navy does with their ships, Air-forces often do with planes, or even clothes kept in the attic for that ‘maybe some day we might need this again’

There is a very active cyberwar going on, nation states juggling for control to avoid bullets, through all the criminals trying to get at what every they can grab. This has been accelerating at a rapid pace, and we can not rest on "it won't hit us" as we are all being actively probed all the time.

To be safe or as safe as possible, it is important that you keep your systems (both personal and business) as up to date as possible before and when actively using them.

Thursday, June 13, 2024

A messy computer desktop is a slow computer

How many icons do you have on your desktop? Is it just a few icons (like 15 or so) or it is so populated you cannot see your background?

The reason we ask is that each of the icons takes a finite amount of time to load and display. The further away the information that each icon represents, the longer it will take to update/load the icon. It may be just milliseconds per icon, but that does add up. This applies to folders on your desktop as well. We've seen systems with thousands of files in folders on their desktop, but after moving them to a regular documents folder off the Desktop, they noticed how responsive their system got.

Recently I was able to see a desktop on a monitor, and you couldn’t see very much of the background because of all the different icons that were there. This person was also complaining that his computer was no good because it just took way too long to start up.

Here are some questions that I asked this person about their computer.

  • How often do you reboot your computer?
  • Are all these icons on your desktop necessary?

Now these are the answers that I got.

  • I don’t reboot my system very often because it just takes way too long to start up again.
  • All of these icons are necessary so that I can do my job, and he immediately pulls up a photo that has nothing to do with work.

What is very important to understand is that a lot of the icons on the desktop were for files that he felt he needed to access quickly. Of course, these files were located on a server and not on his computer, so each took longer to load. I tried to explain to him that having all these file icons on his desktop was a major reason why his system took so long to startup. When you have icons on your desktop, what happens when the system starts up is it must look up each of these files so that it can draw it on the desktop. The more files you have on your desktop, the longer it is going to take for your system to start up and refreshes during the day. If you need access to these files quickly, it is better to have them in a folder elsewhere and then just the link to the folder on the desktop. Then the only time the files will be searched for is when you open the folder.

So, the best thing you can do to ensure that your computer starts up at a reasonable speed is to limit the number of icons that you have on your desktop, especially icons that are to remote files. Shortcuts can be useful but remember that they can also impact how you work. The convenience of all these icons has it's cost in time.


Thursday, June 6, 2024

Scams, scams and more scams

There seems to be more and more scams out there, and probably because people are falling for them. We recently heard that a student lost quite a bit of money from their bank account as they fell for one of these scams. Nowadays, it just seems that every day you either get a phone call, email or text message that doesn’t look like. Businesses get similar scam emails, so don’t think you are alone. Below are some of the scams that we have received in the last little while, that is not including our favourite “Duct Cleaning” phone calls.


Netflix: Your payment cannot be completed. To keep access to the service, please visit (factious website)

  • If you don’t have Netflix never click on the link and even if you do have Netflix DO NOT click on this lick. To see if there is an issue with your Netflix account, go to where you would normally log in into your account and check the status of it.

RBC Your client card starting with 4519** has been flagged due to unusual activity. To reactivate your online access, please visit: (Factitious website)

  • All RBC credit cards start with this, so that isn’t any information that is helpful. Also, most banks have other means of letting you know that there is an issue with your card. I know that when our card had some unusual activity, we received a phone call. If you think there might be something wrong with your card, DO NOT click on the link. You can sign in to your account the normal way and check your account.

[Canada-post]Your package has been put on hold because the street number is missing from the package. Please check and submit the correct address. (Factitious website)

  • If you aren’t expecting a package to be delivered, just ignore this text message. If you are, contact the sender to see if they may have missed addressing it correctly. DO NOT click on the link no matter what.

Amazon: This is to inform you that today your account will be charged for Amazon Prime (funny the phone number you are calling isn’t linked to an Amazon account)

  • This is a phone scam that they want you to click a number on your phone and provide them with your credit card and other personal information. DO NOT click on that number.

Email: your e-mail account has been disabled and some features might be restricted or may not work. It seems there has been a violation of the terms and conditions with your email account If the account has been already access from unusual or suspicious locations or devices, Google might have disabled it to prevent potential unauthorized access. (now the interesting thing about this one is the account that they showed had nothing to do with Google at all and the website in the form also had nothing to do with Google)

  • If you receive an email like this from a company that has nothing to do with where your email is hosted, DO NOT click on the link. Now, the other thing about this message is it contradicts itself. First it says the account has been disabled, and then it says some features might be restricted or not working. Well, if the account has been disabled, all the features won’t work.

Invoice email: Good afternoon! I am quite disappointed! Obtained the complaint from our contractor, and I have a large amount of questions. Please resolve this problem, or I shall apply legal penalties! It is very important! Copy of the complaint you’ll find via the Invoice Link lower (well we don’t do business with the company that is sending the complaint and when you read the actually working it doesn’t make sense)

  • This is something that some accounts payables or receivables may receive. Again, DO NOT click on the link that is provided. Check with others to make sure that this company is real and if not block the sending.


What we have been trying to show you is there are a lot of different methods of text, phone, and email scams that are out there. We have left the messages just as we received them to show you some of the things you can see when you take the time to really read a message. We all must be extremely careful and try and black as many of these accounts as we can. I know that it is hard to control all these scams because when one is caught, at least one more starts up, so we just must be as careful as we can.

It is very important that we start educating our kids and family members about what not to click on when they are on social media or on their email. Being able to increase the awareness of SCAMS may help fewer people become victims of them. If you have any Cyber Security Awareness available, take it as it applies everywhere. Our biggest piece of advice is if a message, whether text, call, email or any other path, doesn’t make sense, it’s best to ignore it.

Thursday, May 30, 2024

Why Cybersecurity Awareness Training is Important

So many people, when you mention to them about cybersecurity awareness training, they think it is a waste of time. Cybersecurity awareness training is a good idea and not just for you at work but also for you as an individual and for your family as well.

Cybersecurity awareness training is a means of teaching someone what all the different ways you can be compromised through different media/channels. It also trains you to be aware of all those other techniques that someone wanting to get access to your information or your company’s information can do it. Yes, it is amazing how many people fall for those messages that sound too good to be true. Cybersecurity awareness training also educates you on what to be aware of when you are visiting websites as well.

There are so many different techniques that a scammer/bad actor can do to make it look like the message you are getting looks valid. It doesn’t matter the size of the company because attacks can happen to any size of company or any individual. Being aware of what you should look at to ensure you aren’t clicking on something you shouldn’t or replying to something you shouldn’t help a lot.

If your company provides you with this type of training, it is a good idea to step into the training and take full advantage of it. It may require you to watch some short videos and answer questions, but they are normally not very long but are often required if the company has Cyber insurance. The other part of this training is you maybe getting random messages that will be testing your knowledge. It is a great way of making sure that you have been paying attention to the training, and it also reinforces it. If you happen to be clicking on everything in these messages, you will get more training to take to make sure you are learning the material. The training is a continual process to ensure that you are staying current to the new threats.

One thing that is important to know is that it doesn’t matter how large or small your organization is, everyone is a target. Also, anyone at home or at work can click on something that they shouldn’t or answer that question that they shouldn’t answer when it comes in a message. Remember, if you have a credit or debit card or have internet access, you can get taken advantage of personally. The material that you learn at work through this type of training will also help you and your family at home. If you have learned something, remember to pass this on to those that you love because it will help them as well.

Cybersecurity awareness training may seem like a waste of time, but you don’t want to be the person that clicks on something that they shouldn’t and cost your company hundreds of thousands of dollars or worse, they are forced to close. In some cases, the information that was stolen meant they couldn’t get back to operating like they did before the attack, therefore your job is gone. This training can also mean that it could help you prevent clicking on something at home and giving someone access to your banking information. So, remember it’s important to take that training when it’s offered as it is important to you as both an individual and an employee.


Thursday, May 23, 2024

Doc's or it didn't happen

On your job, how many times have you been asked for the documentation to back up your decision or your work? Well, here is why documentation is so important when it comes to work.

  1. Provides guidance to someone else if you are unable to do the task, such as when you are on vacation or maybe just too busy to get everything done or no longer with the company.
  2. Helps to provide why something is done in a specific way.
  3. Provides the necessary steps in a process to ensure that a business can continue to operate.

What is funny about writing this is that so many individuals in IT don’t like writing documentation or even quick notes about why something is being done a specific way.  I normally get a very funny look when I say I love writing documentation. Yes, documentation can be a challenge to write, but in so many ways it is also enjoyable because you can help a department, or a business get the necessary notes down, so everyone is working the same way.

For various departments there are different needs for the documentation, but I do know that for IT departments it can the vital process that needs to be done if the servers are compromised or if there is damage to the equipment and how does the department get everything up and running again because downed servers mean people aren’t able to get work done and the business mission accomplished.

I have heard some say that “If I document what I do, it means that they can replace me easily, but if I don’t document stuff they need to keep me.” Well, that might sometimes work, but there are also the times that not documenting something can mean that you end up being a cost to the business, and you will be replaced. Knowing how to write the documents is also important because it can help others as well as yourself. If the document is good, you can even use it as a reference when you are doing a task that you don’t do frequently.

Docs or it didn’t happen is something that I have heard so often when talking to people, but these same people are the ones that don’t write the documentation. So, next time you are doing something think about the steps that you do and maybe make some notes even if it isn’t every step but at least it could remind you how to do something quickly or it could help someone else.

 Ultimately it is pic's, or it didn't happen, doc's or it isn't done

Thursday, May 16, 2024



This is a question that I ask so often and the reason I do that is to get an answer that I think someone knows, but I am not certain, and/or make them think why .

As a documentor being able to ask someone why they are doing something in a specific way can help provide either an answer to that standard question or it might not. I have asked that question before and the answer I got back was “Because it’s how it’s always been done.” In some many jobs you are taught by someone how to do a specific task, and you will continue to do it that way because that is how you do it or at least that is how the other person did it. It is amazing when you can look at the specific task and take it apart step by step that you may find an easier way of doing something. For me, I will sit and listen to the person explain the task and make lots of notes and then see if there is an easier way to do that task and get

This is a question that I ask so often and the reason I do that is to get an answer that I think someone knows, but I am not certain.

As a documentor being able to ask someone why they are doing something in a specific way can help provide either an answer to that standard question or it might not. I have asked that question before and the answer I got back was “Because it’s how it’s always been done.” In some many jobs you are taught by someone how to do a specific task, and you will continue to do it that way because that is how you do it or at least that is how the other person did it. It is amazing when you can look at the specific task and take it apart step by step that you may find an easier way of doing something. For me, I will sit and listen to the person explain the task and make lots of notes, and then see if there is an easier way to do that task and get the same or even better results.

When you can ask that simple question of “Why do you …” it will make people think about why they are doing something and how they are doing it. It is a matter of sitting back and thinking about a process and how it might be done differently. Also asking the question, “Why?” can help with building the documentation, especially if there are specific steps that are required. In some jobs there are specific tasks/steps that must be performed and for a lot of people they just become routine, and they don’t think about them at all and sometimes can't remember the steps outside of doing the steps (autopilot isn't always the best).

Here are several different ways of asking questions that will give you different answers.

  • Why do you do this specific step before another step?
  • Why do you do have to take copies of the item so many times?
  • Why does it work that way?
  • Why can't you do it a different way?

It is always fun when you can sit back and think through a process and see ways to improve it, even if they are just small changes. Some of these small changes can make the process a lot easier to do and maybe even faster to accomplish.

Why, seems like such a simple word, but it can spark a conversation that will provide a lot of information. Yes, there are times when I may sound silly asking that question quite a few times, but the more detail I can get, the better documentation I can do. Sure, just watching a person do a job is one way to document it but understand the steps and why they are doing something is also a key part of understanding the job so that it can be documented.

So, next time you hear me ask “Why” understand that I am trying to make sure that you also know why you are doing a specific task a specific way.

Thursday, May 9, 2024

Why blind copying recipients in emails is a good idea

Recently, I received an invitation to a Zoom meeting/interview, (for a volunteer board position).  It made me feel good, knowing that I had at least got a change for the interview.  Nice, I made the first cut, but then my security senses start seeing some issues that concerned me.

Here are the issues that concerned me with the invite:

  1. The invite to the Zoom meeting was sent to everyone in one email, and all applications were in the main address to field.  The applicants were not blind copied, which now shows each person who else has put their hand up for this position.

    1. It should have been blind copied to each of the applicants, so that they don’t know the email addresses of the other applicants. When you are sending an email to a non-team bunch of people, you should always blind copy to protect each individuals' privacy. This is also an HR level confidentiality issue of providing email addresses to others that may not have it, and they now know who their competition is. 

  1. The interview was going to be a single Zoom call and each person had 15 minutes for their interview before the next person was to sign-in.

    1. It would have been a better idea that each interview was done via a separate Zoom invite/meeting, so there was complete isolation from each individual.

    2. 15 minutes is not a lot of time to answer questions about a position, given there was no job description ever provided. Sure, a Treasurer position you can figure out the basics of the position but is there a term, and of course a lot of the other things. What is really required of this Treasurer role?

    3. What was stopping the rest of the individuals that are being interviewed to sign on early so they could watch the other person getting interviewed?

The basic courtesy when you are sending an email to a bunch of people that do not know the involvement of each other is to blind copy them instead of putting each of their email addresses in the to field. Also, if you are going to be interviewing different people, I would recommend that there be three different invites sent out to three different Zoom meetings. It might mean a bit more work for the individuals doing the interviewing, but at least then each person has their own meeting and not part of another person’s interview.

Blind copying people in emails is always a good idea when you don’t want each person to know who else has been included, and it is also a good security measure so that email addresses cannot be shared with others or possibly compromised if another person’s email account is compromised. So, next time you are wanting to talk to a group of people that probably don’t know each other or their involvement, I would blind copy everyone to ensure that privacy and security is part of the communication.

PS: the outcome of this was that one person immediately pulled because they thought they would be the only one, and then I pulled after drafting this and then letting the organization know my concerns about how things were handled.