All posts by john babineaux

VoIP Phone System

REACH4’s Hosted VoIP solution is a hosted PBX phone system that allows businesses to customize their communications. Hosted PBX delivers more functionality and flexibility than a traditional phone system, without the costs of managing and maintaining a PBX. Enjoy Lower Startup Costs and Monthly Savings. With a Hosted PBX system, there’s no PBX equipment to buy or lease, and no maintenance contracts or fees for account changes. Service is configured through an easy-to-use web portal with dozens of features and options for a truly customized system. All you need are IP phones and a voice gateway router.

With full control over our network, REACH4 is able to prioritize voice from end to end. We use best-in-class Cisco equipment to ensure crystal-clear call quality. Together that means that, unlike other providers, we can provide true Quality of Service.
All packages are customized to fit your business needs. We can deliver the right service with the right features at the right price. Save up to 40% on your business phone bill by choosing one of REACH4’s state-of-the-art voice options for your business.

For more information please contact technical support

Burglars and Social Media

1. Location Sharing Applications 

Checking in at different locations may be a simple way to let your friends and family know how you’re doing, but they aren’t the only ones checking in on you. Criminals use location sharing services to gather information for potential victims. With a rough idea of where you live and access to Google Street view, criminals can begin to plan a break in.

Many applications have location sharing features that may communicate with other applications on your device, some having less security. A way to avoid any unwelcome guests into your privacy would be to go through your applications and fully understand the privacy and location settings. Many social media applications have a way for you to adjust these settings to your desired security level.

For example you can check your Facebook privacy settings to see who is able to see your post, and then adjust accordingly.

Being aware of which applications use your GPS automatically is a great way to avoid any security surprises. Not only can they leave you vulnerable to prying eyes, but they also have been know to drain battery life.

2. Hidden Media Data 

Being able to share your media content with friends, and family is one of the greatest parts of social media. Unfortunately the wrong people may also be taking a glimpse at the content as well, and using that information to target you.

Every picture you upload online has many different pieces of information. Such as where the picture was taken, the time stamp of when, and on what device.

It is known as EXIF data. There are a few sites that help to remove this data from your upload automatically, such as Facebook. While many other sites do not. Any criminal who knows how to find this information can use it to your disadvantage.

Fortunately EXIF data is not something that cannot be removed.

It is still wise to remain cautious when making a post even if the EXIF data has been cleared. It is not very difficult for someone to find your location based on landmarks, street names, or personal information you may have posted.

3. Too Informative Posts 

It is understandable to have the urge to alert the masses about you having an amazing time while on vacation. Yet it may not be the wisest idea to do this while it is happening in real time. Nothing ruins a good moment like an unwanted guest.

A better way of expressing yourself would be to wait until you are home safe and sound. You may even decide to be a little more private with some things than others. Sometimes it is best to keep those moments between you and the people who made them. Using private photo sharing applications like Flickr, or Google Photos would be a great way to make sure the memories are shared with those who appreciate them.

4. Reverse image search

When posting pictures to multiple sites you become vulnerable to reverse image searches. This type of search can show all of the sites that the image has been uploaded to.

How it works is if you post an image onto multiple sites, it creates a way for criminals to track it from site to site. All it takes is downloading that image and then putting it through a simple Google search to find all of the sites that it is posted to.

While doing this a criminal could find out your name and then use that information to do another search to then possibly find even more information.

Remaining cautious with where, and how you upload photos can help to prevent this type of intrusion.

Reach4 Communications now has access to the latest generation Internet and the service offerings are far better than any that have been available in the past. Contact us for more info.

Home Computer Security, Part 3

In REACH4 Communications’ ongoing efforts to keep you safe and secure online, we’ve talked about antivirus software and antispyware. Now, we’re going to look at a few more safety precautions you can take, and the easiest ways to do so.
Windows Updates
This really goes without saying, but make sure you download all critical Windows updates. These are frequently security patches, released as the dangers are found. The easiest thing to do is set up automatic updates. This way you never miss an update, and if you set it to update overnight, it all updates and the computer reboots without you even noticing.
Firewall
The term “firewall” can be a little intimidating for some people, but it’s a very simple concept. A firewall does just what it sounds like: it creates a barrier between your computer or home network and the Internet at large. Why is this important? When your ISP sets up your connection, it assigns you an IP address. Usually, it’s a public address, which means that anyone, anywhere online can access it, for any reason. A firewall blocks any traffic coming in that doesn’t match up with a request you made, thereby protecting your system from other computers trying to access it.
Windows has a firewall system built in, and as long as you keep everything set to medium security or higher, it’s effective. If you manually set it to low security, it will tell you that’s a bad idea, and if you choose to keep it there, you will not be fully protected. Another option is simply to install a router. Most homes today have at least one or two devices that use WiFi (cell phones, tablets, iPods, laptops, etc.), so the wireless router has become commonplace. Almost any router will have a firewall function you can configure. A router also takes on the public IP address assigned by your ISP, and issues private addresses to devices on your network. This means that no device on your network can be accessed from the outside, and provides another layer of protection. If you use a wireless router, make sure to configure a wireless network name and password! This protects your bandwidth from piggybackers, but it also ensures your firewall functions properly. Any device can connect to an unsecured wireless network from hundreds of feet away, and once a device is on your network, a firewall will think it belongs to you, so it won’t block access to other devices.
This may sound like a lot, but it’s really just a few minutes to set things up the first time. REACH4 Communications is proud to have the fastest and most reliable Internet service in Crowley, Louisiana and surrounding areas. Check out the IT Solutions, Phone and Internet services that we offer to your home or business today! We’ve got more information coming – check back for more security tips!

Home Computer Security, Part 2

Keeping Your Home Computer Safe and Secure

REACH4 is continuing our look at easy and inexpensive ways to keep your computer clean and in great shape. Last time, we discussed antivirus software (link). Today, we’re talking about the less obvious kinds of malware that can creep up every day.

Antispyware

Spyware and adware are some other little nasty things that can cause trouble in your computer. They can watch your activity, pop up ads, redirect you to websites you never meant to see, and any number of other unsavory things. Even if you’re extremely careful in your browsing and downloading habits, there is probably some spyware or adware on your computer right now. Some freeware programs have it built in, and won’t work without it. But there are ways around it.

Unlike antivirus software, which will conflict if you run more than one program, antispyware programs benefit from backup, and running two is a good idea. Make sure that you are downloading these from trusted sources, because there have been some knock-offs which may insert more spyware than they remove.

After you have downloaded and installed your antispyware programs, make sure that they have the latest spyware signature files, and then run a full scan. This will take a long time, maybe even longer than the initial antivirus scan. When it finishes, you will have the option to fix the errors, which you should do. Then run another scan. Immediately. Nine times out of ten, the second scan will still show a good number of errors. Rinse and repeat until a scan runs clean, or, as is more likely, it keeps showing just the same few errors every time. At that point, reboot, and run your second program, and continue running scans until that one runs clean (or as close as you can get). If there are still errors showing, try searching the web for specialized removal tools. Be careful, though! Back up your system thoroughly before running any of those extra strength spyware removers.

Now your computer is clean. But you still need to configure those antispyware programs to keep it that way. It’s a good idea to set one program to run every time the computer boots up, and also set both to run once a week. Don’t worry, you aren’t going to spend your life unable to use your computer because it’s running scans! You can schedule your antispyware scans right behind your weekly antivirus deep scan (antivirus runs at 12am on Sundays, Spybot runs at 1am, Ad-aware runs at 2am), or you can set them each for a different day. Just don’t try to run any two scans at the same time. While you’re configuring things, make sure to turn on any real-time blocking or monitoring your antispyware offers. This can warn you before anything gets entrenched in your system.

Spyware can be nasty and persistent, but it doesn’t have to bog down your computer! REACH4 Communications wants to help protect our customers from harmful Malware, spyware and other hacking techniques. REACH4 Communications offers the best Residential and Business Internet services to the Crowley LA and surrounding areas. Contact REACH4 today to find out more about our availability and prices of all the Phone and Internet services that we provide! See you soon for more tips and tricks for a secure system!

Home Computer Security, Part 1

Home Computer Security, Part 1

REACH4 Communications is Crowley, Louisiana’s premiere residential Internet service provider and wants to help you keep your home computer safe and secure from viruses and hackers that may be threatening your personal information. This is part 1 of our 5 part series on simple things you can do to keep you and the private materials on your computer safe from an attack.

It’s a simple truth that there is danger in the world. We’ve been taught our whole lives how to deal with danger in the physical world, but the world of the Internet is still young and new, and we’re making up the protections as we find new dangers. It can be scary, sure, but taking a few simple steps can go a long way towards giving you peace of mind. Here we’ll look at some options that are pretty easy, mostly free, and, best of all, effective!

Antivirus

Most people know by now that you need an antivirus program. Most people also take whatever is bundled into their computer’s software, and never think of it again. The problem is that those bundled programs are almost always *trial* versions, which will expire, and then cost money to renew. But there are some great free options! REACH4 is proud to partner with AVG and offer the option of a free trial version of their antivirus software. Click here to learn more!

Once you’ve downloaded your chosen antivirus, run an immediate full scan, or deep scan. Whatever the biggest, baddest scan your antivirus offers, that’s the one to run NOW. This will take a while. Be patient, and remember this is just as important for your computer as going to the doctor is for you. When the scan is done, you will be notified of any files that are infected, and given options for how to handle them. First, try “repair” or “clean”, which will actually remove the viruses from the files. Sometimes that doesn’t work, but don’t panic – send the files to “quarantine” or “vault”; it’s a separate space created by the antivirus where the infected files can’t do any harm.

After the initial scan, it’s time to configure the AV software so that you don’t have to think about it anymore. First, make sure there’s an icon for the program in your system tray, so you know at a glance that it’s still running. Also make sure that it’s set to update its virus database automatically. Then, set up scheduled scans. Yes, you really need to do this. A good practice is to schedule a deep scan to run once a week, when you know your computer will be on, but you won’t be using it. Midnight is good, or maybe some time while you’re at work, or even dinnertime (because dinnertime is family time, not computer time, right?). Along with that, you’ll want a light scan to run every day (light scans don’t slow down your machine so much, so you can still use your computer, but don’t set it for a time when you’ll want to watch movies or something). This is just like house cleaning: when you do a little every day, the big jobs aren’t so big when you get to them. The last thing you’ll want to configure is on-access scanning. This means that your antivirus will scan or ask to scan every application, program, or attachment you open or download. It can get a little tedious, but it’s much better than getting a big-bad-ugly into your system!

By following these few steps, your system should be safe from most viruses. Remember though, nothing is foolproof. If you would like more information and keeping your private information safe contact REACH4 Communications. And stay tuned for more easy ways to stay safe online!

Service Upgrades!

Service Upgrades To KBON Area

REACH4 is proud to provide our residential and business Internet customers with the highest quality of service. Currently we are optimizing our network in the KBON area and upgrading the services as needed. We are excited to provide the best experience possible to our High speed Internet Customers in Crowley, LA and surrounding areas. Look for your service to feel faster than ever!

If you are not included in this upgrade, don’t fear, we will be assisting more of our customers in the near future with unbeatable Internet speeds and the best customer service in the area! REACH4 would like to thank all of our current and future customers for your support of a local business and this is just one way we can show how truly we appreciate your business! If you would like more information on our Internet or other services that we offer, please contact REACH4