- About Us
- IT Services
- Consulting Services
- Cyber Security
- Cloud Services
- Our Clients
- Contact Us
You want to move to a less harmful method of smoking, or attempt to quit, so you go out and purchase an e-cigarette (e-cig). The joy of making an investment to save you money, and be nicer to your body, you take your first puff. The joy, ease, and sensation of making a good choice. Using up all the battery, there is no power adapter in site, and your phone is already plugged into the wall. You think, why not plug it into your computer? The next day you find pop-ups raging on your machine and, all of the sudden, you have another health issue to worry about. This time, it’s your computer!
It makes sense, every electronic contains some sort of data; firmware, software and/or storage. E-cigs may be the last device you would think contains data, but it needs to in order to run. It can work in many different ways and has been around for many years. Back in 2008, Samsung had alerted their customers that malware came on their installation disc for photo frames. This concept is called “BadUSB” and it manipulates the device at the hardware level. So, what are you going to do?
Choose the Right Manufacturer
Everyone wants to save some money and nobody wants repercussions because of it. Research your manufacturer and find out where you are getting your e-cig from. Reputable retailers are always a good start because they tend to carry the name brand products, or reputable off-brands. If you do choose to go to someone, or look used, research the brand you are purchasing and make sure any serial numbers are still intact. Some of the high-profile manufacturers are:
Protect Your Computers
Not only can malware infect and lock-up your entire computer, but it can move throughout your network, as well. It is protection you should already have, and doesn’t come loaded with many Internet security packages. Having good software for detecting your threats is key on any work or home computer. Malwarebytes is always a good choice.
Check for Authenticity
Just because some things are labeled a brand, doesn’t mean they are that brand. We all have come across a counterfeit product, at some point, and you need to make sure that you don’t get one of those. Check the box for labels that are peeling off or discolored and that all the right markings are on the product. If you are unsure of what you are looking for, research the brand you are looking for and ask the manufacturer for identifiers.
Is your computer running slow or having programs pop up? Maybe your home screen changed on your Internet browser? These could be signs of malware infection and your computer should be serviced. If you have this problem, or are worried about this happening, give us a call at (408) 809-0774 or email us at firstname.lastname@example.org. Don’t let this become a problem, contact Veltec Networks | IT Services In San Jose immediately.