Believing common cybersecurity myths can leave your IT infrastructure vulnerable. Therefore, it’s important to understand the dangers behind these myths.

Myth Busting the Biggest Mistakes You Could Make

In today’s IT-driven business environment, PCs are prime targets for cybercriminals. Regardless of whether you’re working in an office or remotely, your computer will hold highly sensitive and valuable company data. This can take the form of storage drives, access to email accounts, and connections to cloud services. Unfortunately, many PC users rely on outdated or misguided beliefs about cybersecurity – all of which leaves their systems wide open to attack.

Luckily, Ophtek are on hand to debunk seven common myths which could be putting your IT infrastructure at risk of being hacked:

  1. Antivirus Software is All You Need: antivirus software is crucial, but it’s not a 100% solution. Modern threats will often bypass traditional antivirus tools using phishing emails or zero-day vulnerabilities. Accordingly, if you rely purely on antivirus software without additional security support such as firewalls, regular updates, and careful browsing, your risk of being hacked remains high.
  2. Only Big Companies Get Hacked: small and medium-sized businesses are increasingly targeted by attackers because they tend to lack the strong security measures associated with larger organizations. And remember, any PC within your business represents a target as it can provide a backdoor into your company’s wider network – it could just as easily be your receptionist’s PC which gets hacked rather than your CEOs.
  3. Sensitive Info Isn’t Stored on Your PCs: even if you don’t store financial or client data locally on your PCs, it’s likely that at least some of the PCs on your network have the credentials to access this data saved on them. This enables hackers to quickly gain a foothold within your infrastructure and gain access to sensitive data.
  4. Your Employees Can Spot Suspicious Links: phishing emails are getting harder to spot as threat actors become more skilled in the art of deception. Modern threats often mimic real coworkers, vendors, or official notices from software developers. As even a single accidental click on a cleverly disguised link can put your entire network at risk, it’s vital that you conduct regular refreshers with your staff on the dangers of malicious links.
  5. Strong Passwords Are Enough: yes, strong passwords are essential, but they’re not enough on their own. Without multi-factor authentication, a stolen or leaked password can give attackers instant and full access to your network. With multi-factor authentication in place, however, you immediately add an extra layer of defense, even if your password is compromised.
  6. Software Updates Can Wait: postponing software updates, especially for your operating system or browser, is the biggest mistake you can make. Many PC users underestimate just how quickly hackers will identify and exploit these vulnerabilities, leaving countless PCs at risk of being compromised. Consequently, enabling automatic updates whenever possible is the only way to stop falling victim to this myth.
  7. Your IT Team Handles Everything: it’s your IT team’s responsibility to monitor and maintain your IT systems, but every employee has a shared responsibility to contribute towards IT security. Ensuring that your employees follow simple practices – such as locking screens and not writing down passwords in the office – can make a huge difference to the strength of your network’s security.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


A vulnerability has been discovered within AMD processors which has the potential to expose affected PCs to incredibly stealthy strains of malware.

AMD processors are used to power computers, and this is achieved by executing instructions within software applications. Therefore, everything you do on a PC is powered by a processor e.g. running Windows, processing data, and calculations. Some processors are more powerful than others, and the type chosen depends on the user’s need e.g. a diehard gamer will need a high-performance processor to get the best gaming experience, while someone working in a small office will need something less powerful to complete word processing tasks.

As AMD is a highly popular manufacturer of PC processors, we’re going to take a close look at this vulnerability and discuss the impact it could have on your PC users.

Understanding the AMD Chip Vulnerability

The vulnerability in AMD’s chips was discovered by the security firm IOActive, who has named the vulnerability Sinkclose. The flaw was first found in October 2023, but it appears Sinkclose has been present in AMD processors for close to two decades, a remarkable amount of time for a vulnerability to go unnoticed.

Sinkclose affects a specific operating mode within the processors named System Management Mode. This function is used to control systemwide processes including power management and system hardware control. Key to the Sinkclose vulnerability is the fact that System Management Mode also offers high privilege access. And it’s this access which, potentially, could allow a threat actor to run malicious code undetected.

Gaining access deep enough within a PC to even tackle the System Management Mode is difficult for even the most skilled hackers, but it’s not impossible. After infecting a machine with a bootkit – a form of malware which executes very early in the boot process – a threat actor could make their way deep within the system. And if a threat actor does manage to install malware through the Sinkclose vulnerability, the location of the infection means it would survive multiple reinstallations of Windows.

Are You Safe from Sinkclose?

With the Sinkclose vulnerability potentially active since 2006, and IOActive warning that all AMD chips dating back to this period could be affected, the potential damage is huge. AMD has been quick to respond and, since Sinkclose was first identified last year, has been working on an update ever since. Patches for AMD Ryzen and Epyc chips have recently been issued, but clearing up this debacle looks to be a long-term project for AMD.

While the threat is currently difficult to exploit, if threat actors discover an effective method to abuse it, countless PCs could be at increased risk of being compromised. Therefore, it’s crucial you follow these best practices to maintain the security of your PCs:

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


The key to a successful IT infrastructure is ensuring that your PCs are cared for and run smoothly. However, not everyone knows how to achieve this.

Computers which are not performing optimally can have a negative impact on your organization’s productivity. Accordingly, you need to make sure your devices – both PCs and laptops – are correctly cared for. Devices which have been looked after will offer both high productivity and a long lifespan, both attractive factors for any business.

But where do you start? After all PCs are such complex machines that it may seem overwhelming to organize and schedule a plan to put your technology back on track. Luckily, Ophtek is here to serve up our 5 best tips for keeping your PCs running smoothly.

Transforming Your PCs into Efficient Machines

The good news is that you don’t need to get too technical to maintain and enhance the productivity of your devices. Instead, you can start with relatively simple practices to take care of your PCs and boost their performance:

  1. Keep Your Laptops Ventilated: Laptops are fantastic devices for employees who are on the move, but they’re also prone to overheating and this can impact a laptop’s performance. Therefore, you need to keep them ventilated at all times. You can do this easily by following the best laptop ventilation practices. Always use laptops on a flat surface and, if possible, elevate them with a laptop stand to enhance ventilation. You also need to ensure laptops are kept clean, so use compressed air to blast out any dust buildup in ports.
  2. Minimize Startup Applications: Many PCs end up running far too many apps at startup, and this can slow your startup time and compromise performance. To address this, press Ctrl + Alt + Delete and then select the Task Manager option on the resulting menu. Head into the ‘Startup apps’ tab and disable any unnecessary apps from loading at startup e.g. if Xbox App Services is showing as enabled, and you don’t use an Xbox, you may as well disable this.
  3. Beware of Bundled Software: Often, when you’re installing software downloaded from the internet, additional and unnecessary software is included with the download. The software manufacturer is paid to include these additional downloads, but they almost always serve no purpose for the end user. And this takes up valuable storage space on your devices. So, when installing software, always check the installer pop-up windows and make sure you tick the option to not include bundled software.
  4. Perform Antivirus Scans: There’s no such thing as good malware, and even the least dangerous malware will put a strain on a PC’s resources. This is why it makes sense to perform regular antivirus scans to eliminate any potential threats to your PC’s performance. Free antivirus software such as Malwarebytes, AVG, and McAfee will all run automated background scans and instantly alert you to any security issues which need addressing.
  5. Optimize Laptop Battery Usage: New laptops come with a long battery life, but this doesn’t mean you should neglect optimizing them. Not only will this keep your laptop powered for longer, but it will improve the longevity of your battery. If you type “edit power plan” into your Windows search bar, you will be provided with a wide range of battery options such as putting the computer to sleep or turning the display off after a set amount of inactivity.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


Back in 2020, a new banking trojan by the name of BBTok emerged into the digital landscape and was responsible for numerous attacks. And now it’s back.

Banks in Brazil and Mexico appear to be the main targets of BBTok’s new campaign, and it’s a variant which is far more powerful than any of its previous incarnations. Its main deceptive threat is that it is able to spoof the interfaces of 40 different banks in Brazil and Mexico. This means that it’s perfectly placed to harvest sensitive data. In particular, this new strain of BBTok is deceiving victims into disclosing their credit card details and authentication codes. This gives the campaign a financial angle and highlights the serious threat it poses.

How Does BBTok Launch Its Attacks?

BBTok’s latest strategy begins with a phishing email, one that contains a malicious link which kickstarts the attack by launching the malware alongside a dummy document. BBTok is particularly successful as it has been coded to deal with multiple versions of Windows, and it also tailors the content of the attack to both the victim’s country and operating system. BBTok also allows the threat actors behind it to execute remote commands and steal data without the victim being aware.

Most notably, however, is the way in which BBTok replicates the interface of numerous banking websites – such as Citibank and HSBC – to truly deceive the victim. Appearing to be genuine at first glance, these interfaces are used to trick victims into entering security codes and passwords associated with their accounts. This gives the threat actors full access to their financial data and, more disturbingly, full control over their finances. This means that unauthorized payments and bank transfers can quickly land the victim in severe financial trouble.

How to Stay Safe from Banking Malware

In an increasingly digital world, where we all make numerous financial transactions online every week, it’s important to remain guarded against banking malware. As well as the financial damage that malware such as BBTok can cause, it can also create a foothold for threat actors to delve deep into your networks. And this represents a major threat to the security of both your data and your customer’s data. Accordingly, you need to stay safe, and here are some crucial tips to help you:

For more ways to secure and optimize your business technology, contact your local IT professionals. 

Read More


An organization which keeps on top of productivity will regularly replace PCs which have become outdated. But what are the best ways to set up a new PC?

A new PC should instantly bring a boost to productivity to its user, but there’s always room for improvement. The complexity of hardware and software mean that it’s virtually impossible to get a PC’s configuration exactly right, especially the first time that it’s started up. However, there are a few useful tips which can help your organization maximize the functionality of its new PCs from day one. It’s merely a question of understanding the procedures behind this and then taking the time to implement them.

Luckily, we’ve decided to save you some time by outlining five useful tips for setting up a new PC.

Getting Your New PC Up to Speed

If you want to get your PC set up correctly and effectively, make sure you are mindful of these best tips:

  1. Check for Updates: While a new PC is ‘new’ it’s not completely new as its likely been sat in a warehouse for some time before being shipped. As a result, there are likely to be new updates available for not just Windows, but many of the applications pre-installed on the PC. Therefore, one of the first things to do is check for Windows Updates. You can then install these updates to ensure your new PC is as secure and productive as it should be.
  2. Run Your Antivirus Software: It’s not unheard of for new PCs to be pre-infected with malware before they leave the factory. Accordingly, it makes sense to run your antivirus software before a new PC is connected to the internet. This strategy ensures that your PC has the best chance of entering your network with the minimum security risk.
  3. Select Your Default Browser: Connecting to the internet is an important part of business life these days, but there are several options when it comes to browsing the internet. As an organization, it’s useful to adopt a company-wide default browser. Not only does this allow technical issues to be minimized, but it makes training much simpler. So, once a PC has been started for the first time, make sure you apply the default setting to your preferred browser.
  4. Check Existing Hardware is Compatible: A new PC doesn’t mean that you have to replace each and every piece of associated hardware. A mouse, for example, should be fine to keep and connect to your new PC. However, these pieces of hardware may not always be compatible with a new PC or operating system. Therefore, take the time to test existing peripherals to confirm if they can be transferred over or need replacing.
  5. Set Power Options for Laptops: If you are dealing with a new laptop then you need to make sure that its power options are optimized. Your employees are unlikely to be proficient in fine tuning this to provide maximum battery life, so make a point of implementing the best settings for them.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More