Internet Down? Connect Using Your Cell Phone; Mail Theft, Ransomware

With so many people working from home and children attending school virtually, uninterrupted Internet access is more important now than ever. We describe how to use your cell phone as a wi-fi hotspot that your computer can use to access the internet if your normal provider is down.

If your area is experiencing mail theft, You may want to consider a locking mailbox and/or a mailbox sensor.

In the news recently, the gas pipeline ransomware incident can provide everyone with some important reminders.

In this issue
1. Online Self-Scheduling Up To 21 days in Advance!
2. Technical Tips/Notes
 Using your cell phone as a wi-fi hotspot when your Internet is down
 Locking mailboxes and mailbox alarms
 Important lessons to be learned from the recent ransomware attacks

Online Self-Scheduling Update
For your convenience, you may now self-schedule your remote and in-person appointments online on our website www.lamorindatechnology.com

You can pick an appointment up to 21 days in advance. You may also reschedule or cancel appointments online with 24 hours notice. There’s even an app available for your smartphone or tablet that saves clicks.
Technical Tips/Notes
Using Your Cell Phone as a Wi-Fi Hotspot
If your home or business Internet service is not working, you may be able to use your cell phone as a wi-fi hotspot to allow your computers to access the internet using your cell phone internet service.

Most smartphones have the ability to share their internet service by turning on their hotspot. Here are a few tips on how to turn on your cell phone’s hotspot.
1. Contact your cell phone provider to make sure your plan allows you to use the hotspot feature, and to enable the feature. Please note that some cell phone providers charge extra or limit hotspot usage.
2. Enable the hotspot feature on your cell phone.
    Instructions for enabling your iPhone hotspot https://apple.co/33RBkB6
    Instructions for enabling your Android phone hotspot https://bit.ly/2QssGGg
3. Connect your devices to your hotspot.

Locking Mailboxes and Mailbox Sensors
Mail theft is becoming a problem in some areas as criminals steal mail in hopes of finding checks. or personal information such as credit card numbers that can be used for identity theft.

You might consider a locking mailbox to deter thieves. We have been very happy with our Mailboss locking mailbox There are several different colors and styles.
   Front Locking $99
   Rear Locking $125
   Package Size Mailbox $225
   Wall Mount $115
  
If you’d like to be notified when your mailbox is opened, check out the Ring Mailbox Sensor $79.98, currently on sale for $49.99. Note: make sure to order the bundle with the bridge and sensor. It’s needed to enable smartphone notifications, etc.

What Can We Learn From the Recent Ransomware Attacks?
There are a few important lessons to be learned from the ransomware attacks that we see happening to large companies and governments. While you are not likely to be the target of a sophisticated attack, the ease, anonymity, and low cost of email, make fishing for victims on a large scale, easy and inexpensive.

Here are some facts and tips to keep in mind.
1. the vast majority of the attacks come in the form of an email that seems legitimate and requires you to click a link or open an attachment that either installs a malicious program on your computer or takes you to a website to attempt to get you to provide some personal information.

For example, an email purportedly from Amazon or FedEx about package delivery tracking, or an email from a vendor confirming the purchase of an Apple laptop computer. We’ve recently seen emails with an attachment purporting to be a received voicemail message or document.

If you click the link or open the attachment in these emails, they will try to download malicious software onto your computer (even software that encrypts your hard drive and demands a ransom), or they will direct you to a site that looks legitimate and asks for personal information, such as login credentials, or credit card information.

In some cases, the email will offer a phone number for you to call if you think there’s a mistake. If you call the number, they will ask you to “identify yourself” by giving your credit card number, reading them a text confirmation code, or giving your login credentials,

Most of the big companies and governments that were successfully attacked became a victim because someone clicked a malicious link in an email, or the organization had out-of-date software.

Please remember to keep all your software programs updated, do not click links in emails or call phone numbers provided in emails. Also, it’s super-important to use long, complex passwords and to use different passwords for every site, especially your email password and any sites that can access your money.

Thank you for being part of our family. We are fortunate to serve you.

Betina, Ryan, & Edward