Charles has a pair of Synology NAS storage devices and one was hit by ransomware. Leo suggests completely format it and rebuild and reinstall everything from the other backup. But Charles wants to know how it happened. Leo says that once he logs into the NAS, it's on the network, and can be bitten. Leo says that if his Synology is visible to the public internet, then he'll need to really limit it to things he really needs. The more services he turns on, the more exposed he is. Leo turns on SSH to keep it protected. Also, turn on IP blocking after a certain number of login attempts.
Randy's credit cards and bank cards have been hacked and stolen. He uses different companies. Did they steal his card numbers because of shopping online? Leo says to look at the common thread. Leo says to look at the common thread. Someone clearly got to where Randy keeps all those numbers stored. So they may have hacked into his Amazon account or his Google account. Make sure those numbers are blocked. The good news is, that his credit card companies will be monitoring it and will warn him. They will then lock the card and reissue them.
Jim has a solution for remembering passwords. He uses a date mixed with his name and an @ symbol. Leo says that's easy enough for a hacker to remember, and anything that makes a password not random makes it easier to break. And hackers are very adept at breaking personal generated passwords. That's why Leo uses a randomly generated and long password using his password manager. But even your OS will do it. It's much better to let the computer do it, and remember it. If you can remember it, it's easy to break.
Georgia wants to know how safe online banking is. Leo says it's very safe now, and you don't need to worry about having your bank account compromised. Nor do you have to have a separate computer dedicated to banking. All websites now are encrypted by design. Google began requiring that last year. Just be safe with your online behavior. Don't click on links, open attachments, or reply to emails from a bank. They will never contact you.
Bob wants to know if he can use his old Samsung Netbook on the Internet. Leo says that Netbooks were woefully slow and underpowered and didn't wear well. It also lowered the expectation of what we should pay for a laptop. It also was driven by Windows 7, which has stopped being supported by Microsoft, and as such, might be a security issue. At some point, a hack may be the risk. Leo says that Bob could upgrade it to Windows 10, or he could even run Linux on it. PopOS is one.
Or better yet, upgrade to a new Chromebook.
Joe got an email from Facebook saying his password has been changed. He changed it and turned on 2-factor authentication, but the password keeps getting changed back. Leo says that's a scary thought and he probably got bit by a phishing scam and that Facebook didn't send him an email at all. Leo says if it was legit, the first thing the hacker would do is change the email notification.
Jim wants to know if Windows Defender is sufficient to protect his Windows machine against malware. Leo says yes and now. You are your own last line of defense and your online behavior can undo the hard work Defender does to protect you. Don't click on links in an email. Only get your software from original vendors. Keep DEFENDER and Windows 10 up to date.
Defender is as good as any other antivirus, but safer since it's designed specifically for Windows.
Wifi router setup: Change the password. Turn off WAN Administration (so bad guys can't log into your router). Turn off UPnP (an Xbox technology that is less useful on most routers). Turn On WPA2 encryption (or WPA3 if present) for a password requirement. Turn on automatic firmware updates, or check up monthly for the latest firmware. A security flaw in your router would be a big problem!
Sometimes, you and your neighbors will have intersecting and overlapping WiFi networks in the surrounding area. Normally, these impacting factors are quite hidden from sight, but the tool "inSSIDer" allows you to see the details. With the software, you can assess channel, channel width, signal strength, WiFi generation, maximum data rate, and security. You can download a Windows version or a Mac OS version for your computer, and use what you learn to improve your speed!
Rob read an article in Forbes that Google's Chromium engine uses Windows code to remain secure. That concerns him. Leo says that the article isto be taken with a grain of salt. First off, consider all the updates. That leads Leo to believe it was written without all the facts. But all programs rely on Windows 10 libraries.