Windows 7 support ends on January 14, 2020 – Microsoft made a commitment to provide 10 years of product support for Windows 7 when it was released on October 22, 2009. When this 10-year period ends, Microsoft will discontinue Windows 7 support so that we can focus our investment on supporting newer technologies and great new experiences. The specific end of support day for Windows 7 will be January 14, 2020. After that, technical assistance and software updates from Windows Update that help protect your PC will no longer be available for the product. Microsoft strongly recommends that you move to Windows 10 sometime before January 2020 to avoid a situation where you need service or support that is no longer available.
What does end of support mean for me? After January 14, 2020, if your PC is running Windows 7, it will no longer receive security updates. Therefore, it’s important that you upgrade to a modern operating system such as Windows 10, which can provide the latest security updates to help keep you and your data safer. In addition, Microsoft customer service will no longer be available to provide Windows 7 technical support. Related services for Windows 7 will also be discontinued over time. For example, certain games such as Internet Backgammon and Internet Checkers as well as Electronic Program Guide for Windows Media Center are scheduled to be discontinued in January 2020.
What should I do?
For most Windows 7 users, moving to a new device with Windows 10 will be the recommended path forward. Today’s PCs are faster, lightweight yet powerful, and more secure, with an average price that’s considerably less than that of the average PC eight years ago. Our Guide can help you choose a new PC in just a few easy steps.
Want to learn more about Windows 10? Check out our overview page to learn more.
Can I upgrade my existing PC to Windows 10? To take advantage of the latest hardware capabilities, we recommend moving to a new PC with Windows 10. As an alternative, compatible Windows 7 PCs can be upgraded by purchasing and installing a full version of the software. For more information, see Windows 10 upgrade FAQ.
How can I upgrade to Windows 10 for free?
The Windows 10 free upgrade offer ended on July 29, 2016. To get Windows 10 you will need to either purchase a new device or, if you have a compatible PC, purchase a full version of the software to upgrade your existing device. We recommend that you don’t install Windows 10 on an older device, as some Windows 7 devices are not compatible with Windows 10 or could experience reduced feature availability.
What happens if I continue to use Windows 7?
If you continue to use Windows 7 after support has ended, your PC will still work, but it will become more vulnerable to security risks and viruses. Your PC will continue to start and run, but you will no longer received software updates, including security updates, from Microsoft.
Can Windows 7 still be activated after January 14, 2020?
Windows 7 can still be installed and activated after end of support; however, it will be more vulnerable to security risks and viruses due to the lack of security updates. After January 14, 2020, Microsoft strongly recommends that you use Windows 10 instead of Windows 7.
Will Internet Explorer still be supported on Windows 7?
Support for Internet Explorer on a Windows 7 device will also be discontinued on January 14, 2020. As a component of Windows, Internet Explorer follows the support lifecycle of the Windows operating system it’s installed on. See Lifecycle FAQ – Internet Explorer for more information.
Will Microsoft Security Essentials continue to protect my PC after end of support? Microsoft Security Essentials (MSE) will continue to receive signature updates after January 14, 2020. However, the MSE platform will no longer be updated. Click here to learn more about learn more about Microsoft Security Essentials.
What if I’m running Windows 7 Enterprise?
If you are using Windows as part of a work environment, we recommend you check first with your IT department or see Windows 10 deployment support to learn more.
What about Windows 7 Embedded? Windows for embedded devices such as ATMs or gas pumps have lifecycle dates that sometimes differ from versions of Windows that are used on PC devices.
Can I move my existing programs to a new Windows 10 PC? For the best possible experience, we recommend doing a fresh installation of your programs and apps on your new Windows 10 PC. Microsoft Store has a variety of third-party apps that can be easily downloaded and installed. On your Windows 10 PC, you can open Microsoft Store by selecting the icon on the taskbar or by searching for “Microsoft Store” in the search box on the taskbar.
For any software not currently available in Microsoft Store, we recommend going to that company’s official website and downloading the Windows 10 version from there. In limited circumstances, some older software may not have an updated version that’s compatible with Windows 10.
How will Windows 7 end of support affect my Microsoft Office apps?
Your experience may be different depending on the Office version you’re running. To learn more, see Windows 7 end of support and Office. It’s important to note that Windows 7 itself will no longer receive security updates, leaving your device vulnerable to security threats. As such, if you’re running Microsoft Office on a Windows 7 PC, we recommend you move to a new Windows 10 PC.
Now that you’re probably confused about Microsoft’s explanations above, there is no need to worry because you’re in good hands with Twin Cities PC Repair!! We can certainly take this burden off you by offering upgrade options for your current PC or the option to upgrade to a new or refurbished PC which is already Windows 10 certified. Please feel free to call us at (651) 456-8655 or visit our CONTACT page.
Why You Need Professional Virus Removal. “Your computer has a virus.” Such a dreaded five words! We don’t want to come down with a human virus; we’ll feel awful and miss work. But when a virus hits our computer, we could lose valuable information or be vulnerable to attack. Chicken soup won’t cut it.
Perhaps you have an antivirus product installed on your computer. This computer software is intended to prevent, detect, and remove viruses. Antivirus tools are designed to keep infections out. They can also delete any viruses that may already be on the computer when the software is installed.
The software provides protection by tracking malicious code and other computer threats via:
classifying the actions the file or code drives (as malicious or OK);
inspecting file signatures for matches to an existing signature in its virus dictionary;
scanning for rootkits that can change how your operating system functions.
However, antivirus software isn’t that good at cleaning up. When it detects a malicious file, it will delete it. But what if the virus spread before discovery? If the infection spreads before virus deletion, it can do all sorts of damage.
Think of it this way: you have a cyst on your knee. Doctors decide it is pre-cancerous and operate to remove the cyst before it spreads. But, that’s all they do. They have seen the cyst. They go for the cyst. However, they don’t notice the cancer that’s in your shin or femur, because they were only working on the cyst. The rest of your leg remains unhealthy, and you don’t even know it!
Getting a Second Opinion on Viruses
If the antivirus software is your primary physician, a computer professional is the specialist you go to for an expert second opinion. For one thing, antivirus products don’t always remove all the malicious files. Many viruses start as one thing but can mutate into several different strains. The antivirus software may not be programmed to identify all of the virus variants. A professional actively looks for undetected strains on your computer.
Viruses are always evolving. A recent strain of malware, SquirtDanger, let hackers take computer screenshots, capture passwords, download files, and empty out cryptocurrency wallets.
Some viruses can change the settings of your computer. For instance, a common virus changes your computer’s DNS, which is like a bit like the Yellow Pages for the internet. On a virus-free computer, when you type in “Google.com”, your browser goes to Google’s servers located at the IP address “216.58.203.100.” However, an infection can make Google.com on your computer go to a different address. Perhaps a server address cyber criminals use to capture your personal data. It still looks to you like Google, but it’s no longer safe. These settings can still remain after the infection is long gone.
Viruses can also leave behind browser toolbars, extensions, and other nasties designed to spy on your Web browsing habits. If you’re consistently redirected to unwanted sites, or seeing unwanted pop-up advertisements, it’s likely your computer’s infected with a browser hijacker.
Ultimately, if you detect a virus on your computer, check with a professional. Don’t trust that your antivirus software is going to do the same, thorough job an expert can offer. Sometimes your computer isn’t fully safe until the operating system is reinstalled, but you can’t know that until someone can go in and see what the virus did and what remnants are still there, lurking.
Cyber criminals are growing more sophisticated and better able to design viruses that disguise their tracks. Avoid being an unwitting victim. A computer security expert can diagnosis when your computer gets a virus, or determine if there are strains on your device you don’t know about. Let a security expert protect your computer from harm today! Call us at (651) 456-8655 or visit our Contact page.
3 Top Reasons for Onsite Computer Repair. No one wants to experience computer problems. Whether it’s used for personal or business use, your computer is likely indispensable. Essential customer files are on there! All your downloaded music! The family photos! Vendor contracts and employee payroll information! Compounding the crisis is the hassle of going to get the computer fixed. That’s why we offer onsite repair services.
When You Need Computer Repair
Regrettably, there are common computer problems you might encounter at home or work:
A blue computer screen with some white text, aka the “Blue Screen of Death,” or a STOP error. This one’s scary. It could indicate failing hardware, damaged software, driver problems and more. Don’t know what any of that sentence meant? That’s OK. We do!
Having trouble installing new applications.
The computer is running so slow a turtle would beat it in a foot race.
Your applications are acting possessed and are unpredictable.
The keyboard, mouse, or printer are not working properly.
Your computer keeps restarting on you.
Downloads are taking forever.
You can’t open that attachment from your boss.
The computer freezes or shuts off suddenly.
The graphics on the computer screen look wonky.
Your computer is making noises mimicking an old clunker car.
Troubleshooting these problems to diagnose what is really going on can be challenging. It depends on how much you know about computers to begin with. Since you rely on your computer for so much, it’s a good idea to consult with computer repair experts.
Why Onsite Computer Repair
#1 Convenience.
You don’t need to worry about doing more damage when you unplug everything and drive the computer to a repair shop. You also avoid the commute across town, headache of finding parking, and annoyance of waiting in line. Whether a business office or home, our computer repair experts can come to you.
This is more convenient for you. You don’t have to lug the computer to a store and back only to have to set it up all over again. Your computer stays right where you typically use it. When we’re done, you can just push the power button and get going as if nothing happened.
#2 Context.
Seeing your computer in its natural habitat helps our experts too. Sometimes the issue isn’t internal to the computer. So, we wouldn’t be able to properly diagnose the problem if you brought the computer in to us.
For example, the hiccup could be caused by a faulty power board or misbehaving printer. Unless you thought to bring those into the computer store too, the problem wouldn’t be replicable. And nothing’s worse than going to the trouble of getting help only to say “well, it doesn’t seem to be that annoying thing right now.” That’s when the expert looks at us like we’re crazy and says “next time, just try turning it on and off again.”
#3 Cut Downtime.
When the computer repair service comes to your door, you can also reduce downtime. Whether the computer is essential for homework at home or business services, you probably can’t imagine being without it for a few days. It’s like losing a limb! Onsite computer repair aims to fix the problem in just a few hours, without taking the computer away.
We can handle most repairs onsite. In some cases, it’s more cost-effective to bring the computer back to base. We still save you hassle by dropping the computer back off to you. We’ll also set everything back up again when we return your computer. That way you don’t have to worry about which cord goes where!
We hope you never need computer repairs. But, if you’re ever facing an error message you don’t understand or your computer has ground to a halt, give us a call at (651) 456-8655 or visit our Contact page. Our computer repair service experts will be happy to schedule a time to come to you!
Why is My Brand New Laptop So Slow? Your old computer is beginning to slow down. So, you invest in a shiny new laptop. The clouds part and the sun shines down on this bright and lovely new device. Everything will be faster and easier. Only, from the first day, the new laptop is lagging. Why is it running so slow? One of these might be the reason.
#1 Not enough computing power.
In many cases, the laptop doesn’t have enough RAM (Random Access Memory). RAM is the computer’s main memory. This helps your computer do more at once. Information from the operating system, application programs and data are kept here, when in use, for quicker processing.
RAM is like the computer’s short-term memory, while the hard drive is the long-term memory. Just as the human brain can’t hold everything in short-term memory, RAM can get overloaded too. When this happens on your laptop, the computer processor needs to go to the hard drive. This slows things down.
Resolution: You might see 4GB, 8GB, 16GB or more of RAM available. How much you need is going to depend on what you plan on doing with the computer. For a laptop with Windows 10, we recommend at least 8GB of RAM, but 16GB is more comfortable for a better experience.
Not all laptops will let you access the RAM. When you can, though, upgrading memory can be quick and affordable.
#2 Mechanical hard drive.
Often a single part is letting you down. With a less expensive computer, manufacturers skimp. While it’s less common these days, some laptops will come with a mechanical hard drive. You might think of this like a record player with a needle reading the vinyl album. Since something is moving to find data, the laptop runs slower than it would with a Solid State Drive (SSD), which has no moving parts.
Resolution: In many cases, a mechanical hard drive can be easily upgraded to an SSD. However, some super slim laptops have limited or more advanced upgradability.
#3 Bloatware.
Retailers like to tout all the bells and whistles that come with their laptops. So, when you turn on your laptop for the first time, you may notice there’s already a lot of software preloaded. Much of it you’ll probably never use. Maybe there are toolbars you don’t need, games you’ll never use, or stock widgets that you couldn’t care less about. These examples of bloatware slow down your computer.
The third-party applications are a revenue source for the manufacturer, but don’t always help you. Microsoft, for instance, sells a line of computers that come without any pre-installed third-party software. Computerworld reported those PCs “start up 104% faster, shut down 35% faster and have 28 minutes more battery life.”
Resolution: When you get a new laptop, check out the pre-installed software before you add your own. Determine what the existing software will do, and uninstall anything that you won’t want.
If your laptop is slow on the first startup, this may be due to system updates. For instance, a Windows 10 automatic update to bolster the security of the computer. You can’t do much about these, but look on the bright side, your laptop security is current!
Improved speed is a main reason to invest in a new laptop. Don’t let a lagging laptop disrupt your productivity. We can help with a slow running laptop.
What Happens to Your Data When You Die? Death is a morbid topic most of us try to avoid. Making a will and saying we prefer cremation is the extent of our advance planning. Yet, you may want to also think about what’s going to happen to your data.
Consider your digital footprint. You have photos, files, and emails on your computer and your phone. You’re also documenting your life on social media, and sharing on more than one channel.
Your wearable technology (say an Apple Watch or a Fitbit) may be recording information too. If you have a virtual assistant in your home, it’s recording your search history and saving that data on the cloud.
Yet many of us never think “what will happen to my data after I die?” Do you want it deleted? Are there digital assets you want to share? Perhaps there is tangible value attached to some of your digital assets. At the very least, some photos and videos that may have sentimental value for those who survive you. So, let’s explore advance planning you can do to protect your digital legacy.
Personal Files on Computer or Phone
Your personal devices are password protected. While necessary, this makes it more difficult for your survivors.
Now, they could physically pull the computer or phone apart if needed. But, it’s easier to have a copy of your passwords in a secure place for someone to access in the event of your death. Another option is to use a password manager. You can designate someone as your backup contact. They will be able to gain access to your passwords should you die.
Digital Media Collections
Often, when you click the “Buy” button, you’re not really purchasing that movie or music forever. Your contract with iTunes, for instance, was only for your lifetime. Your rights expire at your death.
Cloud Accounts
Consider the personal and private data you have in the cloud, such as Google or Microsoft’s Outlook. This might include calendars, emails, GPS, documents and financial information.
Google’s Inactive Account Manager lets you make plans for your account. You decide:
When Google should consider your account inactive
What it should do with your data afterwards
Whether to share account access with someone (providing email and phone number)
When or if your account should be deleted.
Microsoft won’t provide your passwords after death. However, via their Next of Kin process someone could be sent a DVD of the data in your outlook.com account.
Other cloud providers ask for proof of death and of legal right to access. In Dropbox’s case for instance, your survivors will need a court order. Even with all this, there’s no guarantee your personal data is completely removed from the cloud. It may exist in other datasets in system backups.
Social Media Accounts
Social media companies do not provide login credentials. Many require proof of identity and a death certificate to deactivate the account. Facebook and Instagram will “memorialize” your accounts. The public can’t see, but Friends or Followers can still view it and post memories. You can assign a legacy contact to look after the account or have it deleted.
You don’t want someone using your social account to send out spam or inappropriate photos. For instance, a sexy spam bot took over a New York Times media columnist’s Twitter after his 2015 death.
Plan ahead to protect your privacy and provide access where necessary. Think of the pain and heartache you can save your survivors by managing your digital legacy now.
Twin Cities PC Repair Receives 2019 Best of Eagan Award
Eagan Award Program Honors the Achievement
EAGAN October 14, 2019 — Twin Cities PC Repair has been selected for the 2019 Best of Eagan Award in the Computer Repair Service category by the Eagan Award Program.
Each year, the Eagan Award Program identifies companies that we believe have achieved exceptional marketing success in their local community and business category. These are local companies that enhance the positive image of small business through service to their customers and our community. These exceptional companies help make the Eagan area a great place to live, work and play.
Various sources of information were gathered and analyzed to choose the winners in each category. The 2019 Eagan Award Program focuses on quality, not quantity. Winners are determined based on the information gathered both internally by the Eagan Award Program and data provided by third parties.
About EAP
The EAP is an annual awards program honoring the achievements and accomplishments of local businesses throughout the Eagan area. Recognition is given to those companies that have shown the ability to use their best practices and implemented programs to generate competitive advantages and long-term value.
The EAP was established to recognize the best of local businesses in our community. Our organization works exclusively with local business owners, trade groups, professional associations and other business advertising and marketing groups. Our mission is to recognize the small business community’s contributions to the U.S. economy.
Loving your External Hard Drive. External hard drives free up storage, offer portability, and provide a lifeline in case of computer disaster. It pays to take good care of these compact, convenient devices.
Here are some helpful strategies.
1. Don’t knock the drive.
Depending on the type of drive you have, impact could damage it. The hard drive’s mechanical drives work a little like a record player. Envision a spinning platter and a needle reading it. Note, you don’t have to worry about this with a Solid State Drive (SSD) as there are no moving parts. ***If you are using an older, traditional spinning external hard drive, it might be worth having us quote you a SSD external hard drive. We will even migrate your data over to the new external drive!
2. Don’t pull.
You can damage the drive port with a hard or sideways yank on its USB plug. Remove the device cable with a gentle pull. It’s best to unplug the drive cable when it’s not in use. Then, when you are reconnecting the external drive, inspect the connector before plugging the cable back in. Look for any damage, debris, or corrosion to help maximize the device’s lifespan.
3. Don’t skip steps.
You may be in a hurry, but always take the time to remove the hard drive from your desktop before physically unplugging it. On Windows, you’ll usually right click on the drive and press Eject. For Macs, you can drag the drive icon to the recycle bin (which changes to an eject button). Never unplug the drive while moving data to or from the hard drive unless you want to risk data corruption.
4. Don’t suffocate the drive.
Ever put your hand on the hard drive after prolonged use? It’s hot. Don’t immediately store it away in a bag or tight space. Give it some time to cool off first.
When it’s out, and in use, keep the drive’s vents clear of other objects so that it has some airflow. Set it on a flat, level surface. Avoid placing it on paper, towels, or other cloth items that could add to its heat levels.
5. Don’t take the drive swimming.
OK, you’re probably not going to do that. Yet it’s our way of reminding you that condensation is an enemy to your hard drive. Hard drive failures can be caused by environmental factors such as temperature and air quality too.
6. Don’t expect immortality or invincibility.
A hard drive isn’t going to last forever. They aren’t built for that. They can also get lost or stolen. Don’t let one external hard drive be the only place you are backing up your data.
Have a backup on your computer, on the drive, and a copy in the cloud. Then, you’ll always be ready to move on to a new drive that you will love with the same care and consideration outlined above.
OK Google, How Safe Are You Really? Are you prompting Siri, Google, or Alexa? When you talk to a home assistant, you join a growing number of smart homes.
Smart home assistants search online, start phone calls, order groceries, play music, turn lights on. All with a single spoken command.
Research into how people use Google or Alexa demonstrates the core features. Listening to music ranked first. Checking weather and asking for general information rounded out the top three. Setting timers and reminders, asking for the news or jokes (perhaps to make up for the news?) are also common.
Yet, the question remains, just how safe are these virtual assistants? After all, having a smart speaker in your home means there is always an open microphone in your house.
Smart Speaker and Home Assistant Safety Concerns
The convenience of the speaker demands that it always be on, ready and waiting for you to say “Hey Siri” or “OK Google.” Once triggered the device records the command, sends the data to servers for processing, and figures out its response.
Smart speaker users can log in to view the history of queries on their accounts. This prompts some concerns that these mega-companies will use the information for financial gain. For example, those talking about an overseas holiday might start seeing related ads on their computers.
Someone hacking into the home assistant to gain access to your personal information is another concern. Those who set smart speakers as a hub for many devices also create more points of vulnerability.
It’s difficult to anticipate all the ways the assistant could prove too good a listener. In one case, a voice assistant recorded a private conversation and sent it to the couple’s contacts list.
Steps to Stay Secure with a Smart Speaker
That candid conversation share aside, few big privacy flubs or personal data breaches have been reported. Nevertheless, if taking advantage of Alexa, Siri, or Google helper, keep these strategies in mind.
Clear your history. Don’t leave everything you’ve ever asked it stored on the company server. The assistant will relearn your commands quickly.
Connect with caution. It’s great to be able to turn on the TV and dim the lights without leaving the comfort of your sofa. Be wary of connecting security or surveillance devices to your home assistant.
Mute the microphone. Yes, it undermines your ability to call from the closet “OK, Google, what’s the weather like today?” But, turning off the mic when it’s not in use stops recording without you knowing about it.
Secure your network. Home assistants do their work by connecting to the Internet using your network. Ensure they are accessing a password protected network. They should use devices (e.g. modems) changed from default password settings.
With a little effort you can gain convenience without worry.
Want more questions answered about setting up a smart speaker to be safe and reliable? We’re here to help. Give us a call at (651) 456-8655 or visit our Contact page.
What is the Best Way to Backup? “That will never happen to me.” We get through our lives telling ourselves the worst won’t happen to us. It’s the same with business: “We won’t need this data backup.” Yet, whatever your industry, secure, reliable backup ensures business as usual. So, what’s the best way to backup? Here’s help.
Why You Need to Backup
Business disruptions of any kind can be costly. The disaster might take one of several shapes:
Natural (e.g. wildfires, floods, earthquakes, or hurricanes)
On-site (e.g. hardware/software failure, power outage, inability to access building)
Employee driven (e.g. damaging mistakes or intentional sabotage by a disgruntled employee)
Cyber-attack (e.g. data breach, ransomware, or distributed denial of service attack).
Regardless, the best backup solution can help reduce downtime and damage.
Plan B: Approaches to Backup
There are several off-the-shelf backup options your business can use. Let’s consider the pros and cons of the most popular ones.
USB Thumb Drives — Also known as “flash drives,” “pen drives,” or “memory sticks,” these thumb-sized devices are compact and portable. But, they have size limitations compared to hard drives. Also, the mobility makes them easy to lose (which can actually set the disaster scenario in motion).
Additionally, a USB thumb drive is robust when not plugged in, but more vulnerable when attached. If someone inadvertently snaps the drive or employs too much force, they can put the data on that backup at risk.
The cheap ones also tend to be slow, which can make backing up sluggish.
USB Hard Drives — Portable hard drives increase the data storage available, often at a decent price. They are designed to be compact and mobile. You can prioritize durability, processing speed, storage volumes and more.
Hard drives are less likely to get damaged than a thumb drive. If knocked or jostled, the cables are flexible. Still, a hard drive can be prone to physical failure. Selecting an external solid slate drive (SSD) can help since it has no moving parts. Information is stored instead in microchips.
Cloud Storage — Backing up to the cloud stores data on an external, secure server. If thieves take your computers and USB backup, you can still access your data on the cloud. Cloud storage providers build in redundancy to ensure your backup remains safe.
Most cloud storage services back up to secure centers with thousands of servers storing data. Oh, and they’ll have their own server backups too, just in case they’re the ones hit by a disaster. The providers also encrypt data during transit to further ensure compliance and security.
Migrating to a third-party cloud storage service also cuts the clutter at your premises. You can count on expert help to ensure security and compliance. Plus, you can cut operational costs by offloading in-house storage or external hard drive expenses.
OK, What’s the Best Answer?
Don’t think disaster won’t strike your business. Research has found data loss and downtime are most often caused by:
Hardware failures (45% of total unplanned downtime)
Loss of power (35%)
Software failure (34%)
Data corruption (24%)
External security breaches (23%)
Accidental user error (20%).
We recommend the 3-2-1 backup strategy. This means having 3 copies of your data. Two (2) of these would be located on different devices (e.g. on your computer and on a backup drive). The other remaining backup copy (1) would be secured offsite, in the cloud.
This month, we talk about 5 Common Computer Myths Debunked. Common urban myths would have us believe alligators live in sewers or people put razor blades in kids candy. Common misconceptions about computers are just as persistent. Here are several IT myths debunked for your benefit.
#1 A slow-running computer has a virus
A virus can be to blame. Spyware or other malware can also cause a computer to slow down. However, there are also many other reasons your computer might run slower:
You may have a lot of programs that start up when you boot up the computer. You could remove or disable programs that start every time.
The computer has gone into power save mode every night, but you haven’t rebooted the computer in a long time.
There are many programs running in the background. On a Windows PC, you can go into task manager and see what is running and the computer resources in use.
A security utility is running. If it’s an antivirus scanner, let the scan finish first, then see if your computer speed improves.
Temporary files or other junk are taking up too much hard drive space. Your computer needs at least 200–500MB of free space on the hard drive to be able to move and manage files.
Your computer doesn’t have enough RAM to run programs within memory. If your computer has to swap information on the hard drive to get enough memory to run programs, it’s going to work slower.
The computer is old. You may need to upgrade to a computer that can handle current software needs without slowing to a snail’s pace.
#2 Macs don’t get viruses
Many Apple owners believe their Macintosh computers are immune to viruses. If only. Macs do get viruses; they are simply targeted less than PCs. Why? There are many more computers running Windows, which means a bigger, easier target for cyber-criminals.
As Apple’s market share rises, the threat to Macs is growing. Apple works to protect its users from malware, but you still need to use caution with downloads and when clicking on links from unknown sources.
#3 My Windows registry needs cleaning up
Registry cleaning companies will say that scanning your Windows registry can speed up the computer and avoid error messages. The cleaner finds unused registry keys and any malware remnants for removal.
But let’s consider the fact that Microsoft has not released its own registry cleaner. Why not? Because it’s really not necessary. Worse still, going in to clean your registry (when you don’t know what you’re doing) can actually do serious damage.
#4 My laptop battery needs to be dead before I recharge if I want it to last longer
This was once true. Nickel-cadmium batteries suffered from what was called a “memory effect.” If discharged and recharged to the same point several times, they would remember that point in the future and not go further.
Now, however, laptops typically come with lithium-ion (or Li-ion) batteries. They don’t suffer from this memory effect. In fact, they function better with partial discharge instead of letting the battery run down to zero.
#5 I don’t have anything hackers would want
Cybersecurity should be a priority for everyone, not only sprawling enterprises. Let’s put it this way:
Do you have any money?
Do you have an identity cyber-criminals could use to access money or sell for money?
Do you work anywhere?
Hackers have all kinds of ways to profit from your data or from hijacking your computer’s processing power. They can turn your computer into part of a bot network or use your information as a bridge into a business target’s system.
Keep all your computers at top speed with the best security measures in place with the help of our experts. Contact us today at (651) 456-8655 or visit our CONTACT page!
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.AcceptNoPrivacy policy
Recent Comments