“So Slow!” Is it your PC or your Internet Connection? – “Why is this computer running so slow?” It’s a common complaint. The question is whether it’s your computer or your internet connection.
You may feel your computer is moving at a snail’s pace, but it used to be cheetah-fast! You’re going to want to identify and address the issue to get back up to speed. Yet it’s hard to know whether to blame your computer or the internet, especially now that so many computer applications rely on internet connectivity.
So, how do you determine whether it’s your computer or connectivity that’s the problem? If you are having the problem only on one device in a network, you can guess it’s the computer not the connectivity. Otherwise, think about when you are having slow woes.
If you notice programs are taking longer to load up, your computer may not be up to the task. Running large applications such as Adobe Photoshop, Microsoft Office, or some accounting packages can cause slowdowns. The hardware may be overwhelmed. You may not have enough available storage space. Sometimes your computer’s parts are simply too old and not fast enough.
Even a new computer could be the problem if it’s an inexpensive one. Or perhaps you didn’t get enough random access memory (RAM). Your computer needs RAM to run applications or games; it’s the short-term memory of the computer. This is where the computer loads all the things it thinks it might need soon so that it can process them quickly. Without enough available RAM, the computer has to work harder (and slower) to get the results you want.
No wonder common advice for people dealing with slow computers is to invest in more RAM. If your device is less than five years old, you can often upgrade the RAM inexpensively, or switch to a solid-state drive (SSD). An SSD reads and writes differently than a traditional hard drive, which allows it to access information faster.
Meanwhile, buying a replacement computer may be the answer if your device is more than five years old.
Then Again, Maybe It’s the Internet Connection
On the other hand, you might notice computer slowness when online. Web pages might be slow to load, or you might be waiting ages to access YouTube videos.
If the lag is happening on only one website, it could be that site’s problem. Otherwise, internet slowness could be a provider problem. Or you might have a poor connection.
One way to confirm a connection issue is to check your internet speed. A site such as fast.com or speedtest.net can measure your speed, then you can compare it against the connection speed you’re paying for. Don’t know that? Check your service bill. You may have a slow internet speed plan. Maybe you haven’t changed it in years but have added many more devices. In that case, you’ll want to call your service provider about an upgrade or confiscate the kid’s devices when you want to stream a favorite show.
When testing, you are looking for a speed of at least 10 Mbps. Anything below that, and you’ll start seeing slowdowns and start hearing the complaints from all corners of the house. To put that in perspective, Netflix needs at least 5mbps to stream in HD.
Other Tidbits to Tackle Slowness
You might also try rebooting your computer or your modem and router. If you leave these running all the time, never actually turning them off, they can get stuck in a slow rut.
If you’re on Wi-Fi, that could also be the root of your problem. Maybe you’re on a network with too many users making demands. For instance, if everyone in your family is streaming on their devices, expect a slowdown. You might be in a signal dead zone. In that case, you could look into a Wi-Fi mesh network.
Here are some other helpful computer performance related articles: Why is My Brand New Laptop So Slow? – Click Here How to Figure Out What’s Slowing Your Computer Down – Click Here
Ultimately, there are many reasons for a slow computer or internet connection. Don’t get stuck with a tortoise of technology. A managed services provider can find the root cause and get you running faster. Contact us today at (651) 456-8655 or visit our Contact page..
LetMeIn101: How the Bad Guys Get Your Passwords – Passwords are essential to your cybersafety. You know it, but if you’re like the rest of the digital society, you probably have dozens of passwords to remember. It’s a lot. So, you might take shortcuts. Taking advantage of your laissez-faire attitude is one way bad guys access your passwords.
Incredibly, there are still people out there using “password” or “123456” in their access credentials. Some people don’t change the default passwords on their devices. So, anyone can pick up a router, look at the sticker identifying the password, and access that network.
Tip: Avoid the obvious passwords! When you have to create a password, make an effort. When it’s time to update a password, do so. Steer clear of simple, easily guessed patterns.
Cybercriminals can also guess your password. With a little bit of research about you online, they can make some informed guesses. Common passwords include pet names, birthdays, and anniversaries. These are all easy to find via your social media accounts.
Tip: Be careful what you share on social media! Don’t befriend strangers, as you are giving them access to a goldmine of info for personalizing an attack on you.
If that doesn’t work, criminals may try brute force. They might script an automation bot to run thousands of password permutations until they get a hit. The software will try a long list of common passwords and run through dictionary words to gain access.
Tip: Use a complex password with numbers, letters, and symbols or a passphrase. A passphrase is typically at least 19 characters long but is more memorable, as it unique to you.
The criminal may also be working with info from a data breach. In early 2019, a security researcher found more than 2.7 billion email/password pairs available on the Dark Web. Criminals accessing that database could use the data as a starting point, as many people duplicate their passwords across accounts.
Tip: Use a unique password for each site. Yes, that’s overwhelming to remember, and that’s also why you should use a password manager to keep track of it all for you.
Criminals can also access your account if you’ve used a hacked public computer. The bad guys may have installed a key logger on the computer. The logger records every key you press on the keyboard. Or they might have compromised a router or server to be able to see your information.
Tip: Be cautious about your online activity on computers or networks you don’t trust.
Of course, there’s one more method of getting your password that we haven’t addressed yet. It’s the familiar phishing attack. For instance, you get an email that looks like it was sent by your bank. Phishing typically has an urgent message and a link that directs you to what looks like a credible page.
Tip: Pay attention to who is sending the email and hover the mouse over the link to see where it goes. If you are concerned about your bank account, for example, open up a browser and type the URL manually rather than clicking the link.
These tips can help you to protect your valuable passwords. Still, setting up a password manager and amping up your internet security can help too. Need support getting ahead of the cybercriminals?
Check out these additional helpful articles: How Do Hackers Get Passwords? – Click Here
Avoiding and Reporting Scams – Click Here
10 Signs of a Phishing Email | How to Identify Phishing Attacks – Click Here
Contact our experts today! Call us at (651) 456-8655 or visit our Contact page.
Stay Safe Shopping Online This Holiday Season (11/29/21) – Retail research tells us that over 75% of people are shopping online each month, and, with the holiday season upon us, you’re likely to be one of them. But don’t let the appeal of convenience distract you from the need to stay safe when shopping online.
The number of digital buyers is steadily climbing. In 2020, according to Statista, more than two billion people purchased goods or services online. During the same year, e-retail sales surpassed $4.2 trillion U.S. dollars worldwide.
Retailers are embracing the change in consumer behavior. But, do you know who else is taking advantage? Cybercrooks. Before you buy, consider these strategies to stay safe.
#1 Question that great deal
If a deal looks “too good to be true,” it probably is. You’re not going to get a new Apple laptop for $29.99, or the latest Beats headphones or Xbox gaming console for under $20. Anyone offering you that price is trying to lure you to their site to enter your payment details, so don’t be surprised when your product never arrives!
#2 Review safe seller feedback
While scrolling social media you see adverts for perfect gifts for someone on your list. And it’s so easy to click the link and buy! Still, before purchasing, take the time to research the seller.
Read the feedback from other buyers on independent sources. It adds only a few moments to check sites such as Trustpilot and Google My Business.
#3 Research the business domain
Think about it: who are you more likely to trust with your sensitive data? Someone who has been in business 10 years or someone who set up shop 10 days ago? Quickly check how long a business website has been around. Enter the URL into the Internet Corporation for Assigned Names and Numbers’ lookup tool [https://lookup.icann.org].
#4 Watch out for email scams
Before clicking on any offer links in emails, check the URL. You can hover over the link before actually redirecting there and check the target. Double-check that the address is to the site you’re expecting.
Also, slow down and be sure that the address doesn’t have any typos or atypical endings. You don’t want to confuse www.nike.com with www.n1ke.co and end up a victim of identity theft instead of the proud owner of the latest Air Max.
#5 Check safe payment site security
There are several ways to verify the security of a payment site. These include:
verifying that the site uses an SSL certificate – it will start with “https” instead of “http”;
checking for a physical address and phone number – call the contact number to confirm it is not fake;
reviewing the Terms and Conditions and Return and Privacy policies – any reputable brand has these!
#6 Pay with Online Payments
When you do decide to buy, prefer to pay using PayPal or another online payment tool. You won’t be giving the seller your credit card details. If you can’t take this approach, use a credit card from a credit account rather than debit. You will have more protection this way. You can start a chargeback through your credit card company when the item isn’t as advertised and the seller’s customer service doesn’t help.
Before online shopping, at any time of the year, update your operating system, and keep your anti-virus software current, too.
The New PC Tune-Up – 11/29/21. How exciting! You got a new computer for Christmas. It’s sleek, shiny, and so much faster than what you had before. That’s great, but it doesn’t mean you should leave it untouched. This article shares several steps you might take to secure your data and keep that new device in tip-top shape.
First things first. Before even logging into personal email or other top sites, you’ll want to update the operating system (OS). Yes, most computers come out of the box with Windows, but you can’t know when that item was boxed. There could be important updates that you don’t want to miss.
You’ll also want to install the latest drivers during your tune-up. Different hardware on your computer can need specialized drivers from the manufacturer. Gamers, for instance, may want to ensure they download the latest to boost performance.
While you’re doing all this uploading and upgrading, also look to remove junk that may have come on the computer. It’s no longer as common, but manufacturers can reduce cost to the consumer by pre-installing software.
You might not have any need for the tools that come already installed. Meanwhile, they slow down your computer. Remove the clutter to improve your computer’s processing. Head to your PC’s Control Panel and look to uninstall programs and utilities that you don’t want. Be careful, though. Just because you don’t know what it is doesn’t mean it’s not serving a valuable purpose.
Starting out on a new computer is also a great time to set up the free software. For many of us this includes:
Google Chrome – the internet browser;
Skype – for instant messaging, voice and video calling;
VLC – a multimedia player;
FoxIt Reader – to create, edit, sign, and secure PDFs;
7Zip – used for archiving files.
Involving an IT expert for Your Tune-Up
If you had a great sales experience, you may not want to seek IT help with your new computer. Still, it can prove useful.
Your new computer may also need BIOS updates during your tune-up. Again, the hardware was current when your computer was boxed up but may be lacking the latest by the time it gets to you. A note of caution: this is not an update to do alone. BIOS updates don’t add new features, security patches, or performance improvements, but they may fix a bug with a piece of hardware or add support for your central processing unit (CPU). These updates can be risky if done incorrectly, so work with an IT tech.
Talk also with an IT tech about the best data backup plan for your needs. You’ll be creating important documents, downloading sensitive data, and uploading valued images. Don’t risk their security by failing to back up.
IT support will also suggest the best security tool for you to use to protect against malware. With so many free and fee-based third-party alternatives to Windows Defender, you may want help deciding on the best one.
We’re here to help you get the most out of your new computer. Or, if you’re not sure yet which one to buy, we can consult with you on that, too. Contact us today at (651) 456-8655 or visit our Contact page!
How to Choose Home Computer Repair (11/10/21). It’s upsetting when a home computer breaks down: “My whole life is on there!” Then, you have to trust someone to take care of your device. It’s a lot to ask, and that’s why we’re sharing these five tips to help you feel better about your choice of repair person.
#1 Avoid the Big Brands
The big-box stores have name recognition, which may make you feel more secure, but the reason they advertise on TV and have big storefronts is to sell stuff. Their people are salespeople first, and their staff are not going to be as experienced with computer and device repair.
For tricky jobs, the big-box stores send your device to a remote, centralized location. That’s where the experienced staff are, so it’s good in that way. Yet you’ll now have to wait for your computer to ship to and from that location, which can mean a couple of weeks when you don’t know where your computer is or who is working on it.
#2 Consult Customer Reviews
You’ll probably start out by asking family, friends, and co-workers to suggest someone they’ve worked within the past. When you’re looking around for computer repair, read online reviews. Customer reviews can help you gauge whether you can trust the service promises. Feel free to check out our Google reviews HERE.
You may also learn about any after-service support. It will help to have someone you can ask questions of in the future.
#3 Research Types of Support
It may help you to make your decision knowing that any work on your device is going to be done on-site. If they come to you, you’ll get to meet the person doing the work and keep an eye on them if you want.
Another option may be to have the IT tech remote into your computer to help solve your problem.
Then, there’s the option of drop-off and pickup from that repair shop’s own brick-and-mortar store. If you take this route, you might want to ask whether your device will remain on-site at all times.
You’ll also want to find out if that computer repair person has a particular area of expertise. Some companies specialize in working with certain brands, whereas others can handle all types of models or brands.
Who doesn’t love a bargain? But the cheapest computer repair may not actually be a better deal. Taking the budget approach, you could get an inexperienced tech with slightly more know-how than you. On the other hand, going for the most expensive repair company doesn’t guarantee the greatest service either. Ask the computer business what their experience is.
Our IT experts are here to help you repair any computer issues. We can work on-site, remote in, or you can bring your device to us for the professional attention it needs. Call us today at (651) 456-8655 of visit our Contact page HERE!
Finding the Best Place for your Desktop PC (11/10/21). There’s a lot of talk about the best places to use your laptop. We’ll recap that discussion briefly below, but the real focus of this article is where it’s best to put your desktop PC.
First, why does it even matter? Of course, you care how your workstation looks, but beyond the aesthetics, airflow is important too. Computers cool themselves with fans to suck in cool air and expel hot air out the back or top. If you’re not leaving room for the computer to “breath” it can overheat.
When a computer overheats it can become unstable or suddenly shut down. The hot air can also damage internal components. This is true of both laptops and desktops.
That’s why you’ll hear that it’s a good idea to put your laptop on a raised, slatted service where air can reach the vents. A table over a furnace duct or in direct sunlight should be avoided too.
OK, But Where Do I Put My PC?
You don’t want to put your computer somewhere it is going to get dusty, which is a good reason not to put it on the floor. It’s exposed to more dust, hair, and other junk that way. Since the computer’s fans are sucking in cool air, they can suck in the debris too.
Also, on the floor, you risk accidentally hitting or kicking the PC. Sudden jolts are bad for mechanical hard drives. Plus, USB drives or anything else plugged into the front could be knocked out, which damages the port.
Some desks have cabinets under the desk where you can put the computer. But, these may not have been designed with enough airflow.
It’s best to set up your computer on a stable surface to avoid any bumps or drops. You also want to position it so that the cord is not going to create a tripping hazard. If you fall, you could damage the power connection or, worse, knock the computer off your table or desk.
Since the big thing is airflow, you also don’t want to set the PC too close to the wall. This can damage cables in the back if they bend too much. Or, when the hot air exhausts out the back, it will be harder to expel the heated air.
Securing Your Desktop PC
Putting your PC parallel to the monitor, safely stable on your desk or table, with good airflow and room for the cords is your best option for the safety and longevity of your desktop computer.
Need help setting up your desktop PC or finding the best place to position it in your home? Our tech experts are available to help. Contact us today at 555-5555.
Two-Factor Authentication, How Hackers Get Around SMS – Every time you’re online and a site sends a separate code to check your identity, you’re using two-factor authentication. It’s become the norm. So, of course, hackers have figured out how to get around this, too. This article shows you how they do it and how to stay safe.
With billions of usernames and passwords leaked, access credentials everywhere are at risk, especially if you are reusing your log-in information on more than one site (don’t do it!).
Business websites want to offer a secure user experience, so two-factor authentication (2FA) has become the norm. It’s meant to help stop automated attacks in which bad actors use the leaked usernames and passwords.
Still, if the site you’re visiting uses short message service (SMS) to send a one-time code to your phone, you could still be at risk.
Hackers, using information they have from a data leak, can call your telephone company. They use your name, date of birth, and other identifiers available on the Dark Web, to impersonate you. Then, say you’ve lost your phone, they transfer your phone number to a device with a different SIM card.
That means when the one-time SMS code gets sent your phone number, the message will instead go to their device.
Android Users Also Beware
On Android devices, hackers have an easier time getting access to text messages. If they have access to your leaked Google credentials, they can log into your Google Play account. From there, it’s simply a matter of installing a message-mirroring app on your smartphone.
The app synchronizes notifications across your different devices. It’s for when you really need to be connected, and you’ll be able to see your phone’s SMS alerts on your tablet!
The app won’t work unless you give it permission when prompted to do so, but too many people don’t stop to read alerts from their own accounts: they assume it’s another necessary update and go on with their day. Otherwise, the hacker might call you in a social engineering ploy pretending to be a legit service provider. They’ll be familiar to you, so you’re more likely to listen when they ask you to give permission.
Again, when the one-time SMS code gets sent to your phone, because of the message-mirroring app, the hacker’s device will also receive the code.
What Can You Do to Protect Yourself?
It starts with using unique passwords for all sites you visit. Worried you’ll forget them? A password manager can keep all your access credentials in one secure place for you.
You should also confirm that your credentials haven’t been compromised. If you use Google’s password service, you can head to the password manager site and tap “check passwords” to see if there are any issues. On Firefox, head to the Firefox Monitor page and “Check for Breaches.” On Safari, click on Preferences, and then on Passwords to see what recommendations they have for your security.
Change any passwords that have been involved in a leak!
To avoid the SMS concern specifically, avoid using one-time SMS codes to verify your identity. Instead, you can use a non-SMS authentication tool such as Google authenticator, which provides two-step verification services within the app itself.
Here’s some additional information you may find helpful:
Need help learning if your credentials have been leaked? Or want assistance setting up more security for your online activity? We can help. Contact our IT experts today at (651) 456-8655 or visit our CONTACT page.
DIY Computer Repair: Don’t Do It! – Most people like to take a shot at fixing things something themselves. With some things that works out great, but when it comes to do-it-yourself computer repair, it’s probably not worth the effort. This article shares some of the things to consider before trying to do that repair solo.
#1 Computers are complicated
Computer developers put a lot of work into making it easy for you to use your computer. A good user experience is part of the appeal for one brand over another. But that doesn’t mean that what’s going on inside the actual device is simple to fix.
There are a lot of complicated connections “underneath the hood” of your laptop or desktop, and prying the device open to see if you can do a DIY repair could prove disastrous. It’s going to be safer to turn to a trained repair tech instead.
#2 You could make things worse
Maybe you’ve done this around the house when trying to be “handy.” That leaky faucet becomes a full-blown broken fixture thanks to your efforts.
You might think that you can watch a YouTube video and do an amateur fix, but know that just hitting the wrong key combination could create a different problem. Digging into the backend of your programs could change something for the worse.
Tip: If you do try to fix something solo, don’t erase your history. It could be important for the tech expert to retrace your steps to figure out where you went wrong.
#3 You risk being scammed
Bad guys are always finding ways to exploit people, and there are scams out there that appear to be repair assist programs. You may be looking for a fix but instead you click on a link that installs malware on your device. Now, you’ve got another problem to deal with!
#4 You could lose your valuable data
We store a lot of our lives on our computers or smartphones these days. If you attempt to fix your device without first backing up your files, media, and other data, you could lose it all.
#5 It may not be worth it
It’s not that difficult to find a reasonably priced computer today. You may end up paying for expensive repairs for an old computer when you could have bought new. Take your computer to a fix-it shop. You’ll get expert input into whether your device is worth the time, effort, and money to repair before you go too far down that road.
Choosing the right repair service
With age comes the wisdom to ask for help when we need it. Regrettably, not all repair services are as reliable. When looking for computer fix-it help, read reviews, and check credentials and service guarantees.
Don’t hesitate to contact our IT experts for your computer repair needs. You have your skills, we have ours. Let us do the hard work and keep your devices ship shape for you. Contact us now at (651) 456-8655 or visit our CONTACT page.
Stop Your Technology from Stalking You – Unless you’re a reality television star, you probably don’t like the idea of being watched at all times. So, why would you want your technology to know all about you? With digital technology today, it’s far too easy for our devices to turn creepy. Here are some suggestions to stop the stalker-like tendencies of the technology you rely upon.
Today’s marketing and online communications are all about customization and personalization. If you like a friend’s picture of an Art Deco door in Belgium, you see many more posts featuring similar designs. Or if you view an area rug on a website, you’re suddenly bombarded with ads for rug stores when you next go online.
This can add convenience, but it is also unsettling. What companies online know about you could be more detailed than what your friends know. Take the following steps to regain control of what your computer, phone, and apps know about you.
Review your privacy settings
Whether going online from a phone, laptop, desktop, or tablet, get to know the device’s privacy settings. Some important settings to review include:
email tracking – this can let people know if you opened their message or not;
location tracking – personalizes recommendations but also tells search engines where you are;
voice recordings – manufacturers use these to train virtual assistants, but pause this to keep your conversations to yourself;
purchase history – this helps feed the machine so that businesses know how to target you in the future.
Opt out or block ads
Opting out of ads limits the information collected from your browser or device. The site or business still receives basic information about you, but you will no longer receive targeted, interest-based ads any longer. Apple’s iOS 14 allows app blocking, and you can also express your choice on Android devices.
Otherwise, use browser ad blockers, such as AdBlock Plus, or JavaScript blockers, such Ghostery, to limit ad tracking. Also known as content blockers, these software programs prevent ads from showing on websites you visit. You can find ad blockers for Chrome, Firefox, Opera, Safari, and Internet Explorer.
Check your permissions
Watch the permissions you give apps. We have already talked about checking device settings, but you can also limit the permissions you give to apps. For example, social media accounts have privacy settings that allow you to control what’s logged about you.
Plus, check permissions for other apps. Clash of Clans doesn’t need location services, for instance. Or you might not want to give Slack access to your microphone and video recordings.
Use webcam covers
Covering your webcam stops someone from potentially seeing and recording you. If you think you’d see the light come on to show the webcam is in use, know that hackers can disable that. A simple sliding webcam cover closes the webcam when you are not using it to avoid a cybercriminal having access.
Covering your webcam can also come in handy in all those online meetings you’re having. A covered camera means you don’t run the risk of your colleagues catching you unprepared.
Limit information you provide
Social media has created a culture of oversharing. There are probably many things you’ve seen about friends online that you would rather not know. You’re also sharing more than you need to with the companies that you interact with online.
If you’re filling out a form for a download, you might fill out only the required fields. When you add an app, be stingy with your personal details. Think about it from a need-to-know perspective. For instance, that home design game you love to play doesn’t need to know where you went to high school or with whom you bank.
Need help keeping the privacy-busting algorithms at bay? We can help. Our IT experts can configure device settings to limit information gathered about you online.
Is Your Instagram Account Secure? Why would someone want to target your Instagram account? You share what you ate, maybe the books you read, the shoes you bought, or that really cool image of the sky above. How is that going to help a hacker? Read on to learn more.
OK. Your obvious love of chicken and waffles isn’t going to mean a lot to a cybercriminal, not unless your password is “chicknwaffles.” But there are people who make a living from Instagram. Influencers can make millions by posting a pic of their latest smoothie or the new pair of socks they love. Their IG accounts are their business. A hacker gaining access could destroy an influencer’s reputation, their livelihood.
Businesses, too, are moving to IG as a way to reach a targeted audience with vibrant visuals. They can’t afford to have their accounts taken over by an ill-intentioned hacker. That could lead to lost customers and brand damage.
Then, there’s you, the “average” IG user. Yes, the cybercriminal might still target your Instagram account. For one, they might use your IG handle to reach out to your friends and say, “I’m stuck overseas. I need some money.” Caring friends, not knowing it’s not you, could end up a victim of a scam.
How to Protect Your Instagram Account
#1 Go Private
Instagram lets individuals, influencers, and businesses show creativity. However, you want to control who sees what you post. You may not want everyone to see your photos. Limit your content visibility to friends and family in the Instagram profile window:
Click on the three dots in the right corner.
Scroll to the bottom of the options.
Turn on the Private account setting (the button should turn blue).
You can also block followers you don’t know. Click on your Followers list, and tap on the users you don’t recognize. Tap on the menu button and choose “Block User.”
#2 Disable cross-app sign-ins
Using your IG account to sign in to other applications is convenient, because you have to remember only your IG access credentials. Still, by streamlining your sign-in you are also making it easier for a hacker to compromise your accounts. Now, they can get access to one account and use that as a way into the other connected accounts.
Log in to your account and review all connected applications. You can do this by visiting the Authorized Applications tap under the Edit Profile tab.
#3 Don’t overshare
Sure, that’s the golden rule of social media. Still, we’re talking here about reviewing personal information you share on Instagram. Take a look at your profile information and review whether all those details really need to be there. A hacker could use anything specific you write in your Bio to verify your identity elsewhere. Reconsider posting your birth date, alma mater, anniversary, favorite sports team, etc.
#4 Turn off location services
Instagram’s location services can let you check in at a particular place. But by doing this, you’re giving thieves extra information they can use against you. Instead, go into your phone’s Privacy settings and turn off location services for IG.
You also don’t want to cue criminals that you’re away for a vacation with posts from the beach. You might want to share that sunny sand pic. Then, you regret it when you come home to a burgled home.
#5 Enable two-factor authentication
Of course, the starting point is to pick a strong, unique password for your Instagram account, but Instagram has added two-factor authentication for an added layer of security.
In Instagram’s mobile app you click on the Options icon at the top right to get to a menu offering this option. You will get a short link to click on. Do so, and turn on the two-factor authentication. You’ll set it up using your mobile phone. Then, in the future, you’ll have to log in with the added security of a unique code sent to your phone via text message.
#6 Review your login activity
Keep an eye out for illicit use of your account by reviewing Login Activity. This is under Settings on the desktop app and shows a list of locations from which you’ve logged in. So, if you’ve never been to Thailand, but your IG account has, that would be a red flag. If you do spot locations you don’t recognize, log out from your device, and change your password.
Need help securing your Instagram account or other social media channels? Our helpful IT pros have the expertise you need. Contact us today at (651) 456-8655 or by visiting our Contact page!
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.AcceptNoPrivacy policy
Recent Comments