Setting Your Scholar Up for Online Learning – Schools around the world have closed their doors during the COVID-19 crisis, students from kindergarten through graduate school are being asked to learn online. It’s a change for everyone, but having the right technology in place can help with the transition.
Your student may have been using the Microsoft Office suite of software at school. If you don’t have Microsoft Word, Excel, and PowerPoint at home, check if your school is providing licenses or free software.
If not, buying a subscription to the online Microsoft 365 package allows you to pay monthly or yearly, and it’s much more affordable than in the past. One month is about the cost of two cafe coffees.
Otherwise, your student may be able to get work done using Google’s suite of tools. Teachers may accept links to Google Docs, Sheets, or Slides. These free options are also useful when your student needs to work on a group project. People can collaborate online in real-time using the G-Suite software.
Teleconferencing with Teachers and Peers
Your student is likely to need to download teleconferencing software such as Zoom or Skype. Beware! Cyber-criminals take advantage of every opportunity. Noticing the increased demand for these services, they’ve set up bogus sites. Make sure that you are downloading from the legitimate sources: www.skype.com or www.zoom.us.
While we’re talking about teleconferencing, you might pass on these best practices:
Use headphones to limit audio distractions.
Join calls from a low-traffic setting with simple backgrounds.
Ask others at home to avoid downloading, streaming, or backing up while the student is live online.
Connect to the router with a network cable, or at least be as close to the wireless router as possible during the call.
Considering Cyber-security
In addition to setting up fake teleconferencing sites, cyber-criminals have other ways to exploit the situation.
Remind any students learning from home that they need to keep their username and password private. This is a lesson that never gets old.
Are you still using Windows 7 on a home computer? This popular operating system (OS) reached the end of its life in January 2020. Yes, it may still work, but it is no longer receiving security updates from Microsoft, and the bad guys know Windows 7 is vulnerable. Continuing to use this OS puts you at risk. Without new upgrades, you’re no longer protected from vulnerabilities or exploits.
You probably already know to avoid using public wireless networks. Although your students can’t go to a coffee shop or public library right now to get online, reminding students to secure their online activity is critical.
This is a good time to review your WiFi setup. Too many homeowners don’t change the default username and password on their routers. Big mistake. You should also:
hide your WiFi network from public view;
set your network up to encrypt transmissions;
update router software regularly.
A Focus on Learning
There’s one more thing parents and guardians might consider. At school, the computers prevent students from going to certain sites or downloading files, but you may not have the same blocking and filtering set up on your home devices. This can be addressed in settings.
If you have to share a computer, set up a student-specific user profile to:
prevent your student from getting distracted during learning;
limit exposure to malware and cyber-threats;
avoid them accessing any of your work files.
You may feel isolated during the coronavirus quarantine, but you’re not alone. Our tech experts can help you set up and secure your technology for work or school from home. Give us a call today at (651) 456-8655 or visit our Contact page.
Steer Clear of Coronavirus Scams (4/9/2020) – With the world grappling with a health pandemic, scams are shocking. Regrettably, bad actors are everywhere, always looking for opportunities, and they’re seeing one in the Coronavirus. This article outlines what you need to watch out for and how to stay cyber safe.
The last thing you want to read right now is that there’s another threat out there – sorry, but it’s true. Cybercriminals take advantage of fear. They take timely concerns and use them to target victims. Using the anxiety and upheaval around Coronavirus is their mission.
So far, several Coronavirus-related attempts to cyber-scam people have been reported. There are examples of:
emails that appear to come from government health departments;
offering a tax refund to get people to click on malicious links;
memos to staff that appear to come from large employers;
COVID-19 test offerings from private companies;
fake websites promising to sell face masks or hand sanitizer;
soliciting donations to help fund a vaccine.
What to Watch Out For
Another concern is the number of bogus websites registered with names relating to COVID-19. The site can look legit but is set up to steal information or infect the victim’s computer with malware.
You may get an email promising the attached information offers Coronavirus safety measures, or information shared by the World Health Organization (WHO) if you click on the link, or a similar email pretending to be from a reputable news source, such as the Wall Street Journal (WSJ).
In another example, an email impersonating a healthcare company’s IT team asked people to register for a seminar “about this deadly virus.” Anyone who didn’t question why IT was organizing the meeting clicked to register. By filling out the form, they gave their details to hackers.
What to Do
Be cautious. It’s understandable that you’re anxious, but don’t let that stop you from taking cyber precautions. You should still:
be wary of anything that tries to play on your emotions and urges immediate action;
question where emails are coming from – remain vigilant even if the communication appears to come from a reliable source;
hover over links before clicking them to see where they will take you – for example, in the WSJ example, the Web address was for the “worldstreetjournal”;
avoid downloading anything you didn’t ask for;
doubt any deals that sound too good to be true (“a mask that stops the virus 99.7% of the time!”);
ignore any communications requesting your personal information;
don’t be suckered by fraudulent pleas for charity.
Global health organizations generally do not send out emails with advice. Instead, navigate directly to that reputable health institution for real news.
If you’re still not sure about the validity of the communication, check it out. Do so by calling or using another medium to get in touch with the “source” of the received message.
While there is not yet a vaccine for COVID-19, you can put anti-virus protection on your computer. Also, make sure that you’ve applied all available security updates to keep your software safe.
We hope you’ll take care and stay healthy both physically and online in these tough times.
Need help installing security software and keeping your technology safe? Our cyber-security experts can give your home a tech immunization. Contact us today at (651) 456-8655 or visit our Contact page!
Requesting Service During Minnesota’s COVID-19 Shelter-in-Place Order – Minnesota Governor, Tim Walz, has ordered Minnesotans to stay home except for essential needs during the period of March 27th – April 10th. Department of Homeland Security CISA has classified IT Support Providers as Essential Critical Infrastructure Workers.
During this unprecedented time, your home PC is considered an essential tool. Many are using their home PCs to work from home, for child education, home banking, shopping, paying bills, etc. That being said, Twin Cities PC Repair will remain open to serve our clients in the event you have issues with your PC..
For more information on Essential Critical Infrastructure Workforce, visit the DHS HERE.
Due to limited secretarial staffing at our offices, If you require sales or support, we are asking our clients to do one of the following prior to visiting our offices:.
1.) Call our office at (651) 456-8655 to arrange a pick up, drop off or remote support session.
Computer cleaning for the new year – The new year can mean resolutions and promises for a “new you.” One way to start this year feeling more in control is to clean up your computer. Follow these simple steps!
Tackle the inbox
We do a lot of shopping at the end of the year. Whether you shop online or in stores, you’re asked to provide your email address when you buy, which multiplies the number of mailing lists you’re on. Don’t start the new year deluged by unwanted newsletters and advertising emails.
The extra messages in your inbox distract you from the messages that matter. Instead of deleting every new unread message from “Let’s Make Cookies,” click on one and unsubscribe. Usually, there’s a link that lets you do this at the bottom of the email. If you’re a Gmail user, start your effort to cut down on unwanted mail in your Promotions tab. Google’s algorithm sends sales pitches here, so cut messages from this section first.
Clear bookmarks
The internet is built for browsing. We’ve all lost hours to clicking and linking in this vortex of information. “Wait. How did I end up here looking at kittens eating cupcakes?!” To make things easier, we’ll bookmark sites we visit often or put a page we want to return to on a reading list.
By the end of the year, we have marked many sites that we don’t even remember favoriting in the first place. “When was I interested in this?” Getting rid of any bookmarks for passing interests can help you navigate the Web better this year.
In Google Chrome, click on the three dots in the upper-right of your browser window (to the left of your profile icon). The drop-down menu will have a Bookmarks option. Click on this to see another drop-down menu with Bookmark Manager on it. On the next screen every one of your bookmarks will have three dots beside it. Click on this to select the delete option, and get rid of the ones you don’t need any longer.
Safari users can click on Bookmarks on the top menu or the sidebar icon on the tool bar (to the right of the arrows on the left). Then edit your bookmarks by clicking on sites you no longer want and hitting your delete button.
Sort through downloads
We also download a lot of stuff in a year. Sometimes, because we’re impatient or don’t realize we’ve already hit download, we get multiple copies of the same file! A full download folder takes up storage space on your computer and can slow your computer down.
On a Mac, go to the Finder and click on Downloads on the “Go” drop-down menu. You’ll find a folder filled with .pdfs, .docs, and .jpegs you long forgot about. Click on those you don’t need any more and drag them to your trash can.
On Windows, you can usually go to the “This PC” icon and then the “Downloads” Folder. Right-click on the files you don’t want, and choose “Delete.”
Empty trash/recycling bins
Items you put in the trash or recycling bins at home take up space until you take those bins to the curb or the dump, and the same is true of your computer trash or recycling. Empty these bins by selecting “empty trash” on your Mac Finder menu, or “empty recycle bin” after clicking on the bin icon in Windows 10.
Remove unused programs/apps – If you’re not using a program or app, don’t give it computer space. On a Mac, you can click on the icon for that program and drag it to the Trash. With Windows, you’ll open the Start menu, click on Settings, then System, then Apps and Features from the left pane to select what you want to uninstall. Click the uninstall button, and you’ve de-cluttered your computer that little bit more for the new year.
Why You Need Professional Virus Removal. “Your computer has a virus.” Such a dreaded five words! We don’t want to come down with a human virus; we’ll feel awful and miss work. But when a virus hits our computer, we could lose valuable information or be vulnerable to attack. Chicken soup won’t cut it.
Perhaps you have an antivirus product installed on your computer. This computer software is intended to prevent, detect, and remove viruses. Antivirus tools are designed to keep infections out. They can also delete any viruses that may already be on the computer when the software is installed.
The software provides protection by tracking malicious code and other computer threats via:
classifying the actions the file or code drives (as malicious or OK);
inspecting file signatures for matches to an existing signature in its virus dictionary;
scanning for rootkits that can change how your operating system functions.
However, antivirus software isn’t that good at cleaning up. When it detects a malicious file, it will delete it. But what if the virus spread before discovery? If the infection spreads before virus deletion, it can do all sorts of damage.
Think of it this way: you have a cyst on your knee. Doctors decide it is pre-cancerous and operate to remove the cyst before it spreads. But, that’s all they do. They have seen the cyst. They go for the cyst. However, they don’t notice the cancer that’s in your shin or femur, because they were only working on the cyst. The rest of your leg remains unhealthy, and you don’t even know it!
Getting a Second Opinion on Viruses
If the antivirus software is your primary physician, a computer professional is the specialist you go to for an expert second opinion. For one thing, antivirus products don’t always remove all the malicious files. Many viruses start as one thing but can mutate into several different strains. The antivirus software may not be programmed to identify all of the virus variants. A professional actively looks for undetected strains on your computer.
Viruses are always evolving. A recent strain of malware, SquirtDanger, let hackers take computer screenshots, capture passwords, download files, and empty out cryptocurrency wallets.
Some viruses can change the settings of your computer. For instance, a common virus changes your computer’s DNS, which is like a bit like the Yellow Pages for the internet. On a virus-free computer, when you type in “Google.com”, your browser goes to Google’s servers located at the IP address “216.58.203.100.” However, an infection can make Google.com on your computer go to a different address. Perhaps a server address cyber criminals use to capture your personal data. It still looks to you like Google, but it’s no longer safe. These settings can still remain after the infection is long gone.
Viruses can also leave behind browser toolbars, extensions, and other nasties designed to spy on your Web browsing habits. If you’re consistently redirected to unwanted sites, or seeing unwanted pop-up advertisements, it’s likely your computer’s infected with a browser hijacker.
Ultimately, if you detect a virus on your computer, check with a professional. Don’t trust that your antivirus software is going to do the same, thorough job an expert can offer. Sometimes your computer isn’t fully safe until the operating system is reinstalled, but you can’t know that until someone can go in and see what the virus did and what remnants are still there, lurking.
Cyber criminals are growing more sophisticated and better able to design viruses that disguise their tracks. Avoid being an unwitting victim. A computer security expert can diagnosis when your computer gets a virus, or determine if there are strains on your device you don’t know about. Let a security expert protect your computer from harm today! Call us at (651) 456-8655 or visit our Contact page.
Why is My Brand New Laptop So Slow? Your old computer is beginning to slow down. So, you invest in a shiny new laptop. The clouds part and the sun shines down on this bright and lovely new device. Everything will be faster and easier. Only, from the first day, the new laptop is lagging. Why is it running so slow? One of these might be the reason.
#1 Not enough computing power.
In many cases, the laptop doesn’t have enough RAM (Random Access Memory). RAM is the computer’s main memory. This helps your computer do more at once. Information from the operating system, application programs and data are kept here, when in use, for quicker processing.
RAM is like the computer’s short-term memory, while the hard drive is the long-term memory. Just as the human brain can’t hold everything in short-term memory, RAM can get overloaded too. When this happens on your laptop, the computer processor needs to go to the hard drive. This slows things down.
Resolution: You might see 4GB, 8GB, 16GB or more of RAM available. How much you need is going to depend on what you plan on doing with the computer. For a laptop with Windows 10, we recommend at least 8GB of RAM, but 16GB is more comfortable for a better experience.
Not all laptops will let you access the RAM. When you can, though, upgrading memory can be quick and affordable.
#2 Mechanical hard drive.
Often a single part is letting you down. With a less expensive computer, manufacturers skimp. While it’s less common these days, some laptops will come with a mechanical hard drive. You might think of this like a record player with a needle reading the vinyl album. Since something is moving to find data, the laptop runs slower than it would with a Solid State Drive (SSD), which has no moving parts.
Resolution: In many cases, a mechanical hard drive can be easily upgraded to an SSD. However, some super slim laptops have limited or more advanced upgradability.
#3 Bloatware.
Retailers like to tout all the bells and whistles that come with their laptops. So, when you turn on your laptop for the first time, you may notice there’s already a lot of software preloaded. Much of it you’ll probably never use. Maybe there are toolbars you don’t need, games you’ll never use, or stock widgets that you couldn’t care less about. These examples of bloatware slow down your computer.
The third-party applications are a revenue source for the manufacturer, but don’t always help you. Microsoft, for instance, sells a line of computers that come without any pre-installed third-party software. Computerworld reported those PCs “start up 104% faster, shut down 35% faster and have 28 minutes more battery life.”
Resolution: When you get a new laptop, check out the pre-installed software before you add your own. Determine what the existing software will do, and uninstall anything that you won’t want.
If your laptop is slow on the first startup, this may be due to system updates. For instance, a Windows 10 automatic update to bolster the security of the computer. You can’t do much about these, but look on the bright side, your laptop security is current!
Improved speed is a main reason to invest in a new laptop. Don’t let a lagging laptop disrupt your productivity. We can help with a slow running laptop.
What Happens to Your Data When You Die? Death is a morbid topic most of us try to avoid. Making a will and saying we prefer cremation is the extent of our advance planning. Yet, you may want to also think about what’s going to happen to your data.
Consider your digital footprint. You have photos, files, and emails on your computer and your phone. You’re also documenting your life on social media, and sharing on more than one channel.
Your wearable technology (say an Apple Watch or a Fitbit) may be recording information too. If you have a virtual assistant in your home, it’s recording your search history and saving that data on the cloud.
Yet many of us never think “what will happen to my data after I die?” Do you want it deleted? Are there digital assets you want to share? Perhaps there is tangible value attached to some of your digital assets. At the very least, some photos and videos that may have sentimental value for those who survive you. So, let’s explore advance planning you can do to protect your digital legacy.
Personal Files on Computer or Phone
Your personal devices are password protected. While necessary, this makes it more difficult for your survivors.
Now, they could physically pull the computer or phone apart if needed. But, it’s easier to have a copy of your passwords in a secure place for someone to access in the event of your death. Another option is to use a password manager. You can designate someone as your backup contact. They will be able to gain access to your passwords should you die.
Digital Media Collections
Often, when you click the “Buy” button, you’re not really purchasing that movie or music forever. Your contract with iTunes, for instance, was only for your lifetime. Your rights expire at your death.
Cloud Accounts
Consider the personal and private data you have in the cloud, such as Google or Microsoft’s Outlook. This might include calendars, emails, GPS, documents and financial information.
Google’s Inactive Account Manager lets you make plans for your account. You decide:
When Google should consider your account inactive
What it should do with your data afterwards
Whether to share account access with someone (providing email and phone number)
When or if your account should be deleted.
Microsoft won’t provide your passwords after death. However, via their Next of Kin process someone could be sent a DVD of the data in your outlook.com account.
Other cloud providers ask for proof of death and of legal right to access. In Dropbox’s case for instance, your survivors will need a court order. Even with all this, there’s no guarantee your personal data is completely removed from the cloud. It may exist in other datasets in system backups.
Social Media Accounts
Social media companies do not provide login credentials. Many require proof of identity and a death certificate to deactivate the account. Facebook and Instagram will “memorialize” your accounts. The public can’t see, but Friends or Followers can still view it and post memories. You can assign a legacy contact to look after the account or have it deleted.
You don’t want someone using your social account to send out spam or inappropriate photos. For instance, a sexy spam bot took over a New York Times media columnist’s Twitter after his 2015 death.
Plan ahead to protect your privacy and provide access where necessary. Think of the pain and heartache you can save your survivors by managing your digital legacy now.
Loving your External Hard Drive. External hard drives free up storage, offer portability, and provide a lifeline in case of computer disaster. It pays to take good care of these compact, convenient devices.
Here are some helpful strategies.
1. Don’t knock the drive.
Depending on the type of drive you have, impact could damage it. The hard drive’s mechanical drives work a little like a record player. Envision a spinning platter and a needle reading it. Note, you don’t have to worry about this with a Solid State Drive (SSD) as there are no moving parts. ***If you are using an older, traditional spinning external hard drive, it might be worth having us quote you a SSD external hard drive. We will even migrate your data over to the new external drive!
2. Don’t pull.
You can damage the drive port with a hard or sideways yank on its USB plug. Remove the device cable with a gentle pull. It’s best to unplug the drive cable when it’s not in use. Then, when you are reconnecting the external drive, inspect the connector before plugging the cable back in. Look for any damage, debris, or corrosion to help maximize the device’s lifespan.
3. Don’t skip steps.
You may be in a hurry, but always take the time to remove the hard drive from your desktop before physically unplugging it. On Windows, you’ll usually right click on the drive and press Eject. For Macs, you can drag the drive icon to the recycle bin (which changes to an eject button). Never unplug the drive while moving data to or from the hard drive unless you want to risk data corruption.
4. Don’t suffocate the drive.
Ever put your hand on the hard drive after prolonged use? It’s hot. Don’t immediately store it away in a bag or tight space. Give it some time to cool off first.
When it’s out, and in use, keep the drive’s vents clear of other objects so that it has some airflow. Set it on a flat, level surface. Avoid placing it on paper, towels, or other cloth items that could add to its heat levels.
5. Don’t take the drive swimming.
OK, you’re probably not going to do that. Yet it’s our way of reminding you that condensation is an enemy to your hard drive. Hard drive failures can be caused by environmental factors such as temperature and air quality too.
6. Don’t expect immortality or invincibility.
A hard drive isn’t going to last forever. They aren’t built for that. They can also get lost or stolen. Don’t let one external hard drive be the only place you are backing up your data.
Have a backup on your computer, on the drive, and a copy in the cloud. Then, you’ll always be ready to move on to a new drive that you will love with the same care and consideration outlined above.
OK Google, How Safe Are You Really? Are you prompting Siri, Google, or Alexa? When you talk to a home assistant, you join a growing number of smart homes.
Smart home assistants search online, start phone calls, order groceries, play music, turn lights on. All with a single spoken command.
Research into how people use Google or Alexa demonstrates the core features. Listening to music ranked first. Checking weather and asking for general information rounded out the top three. Setting timers and reminders, asking for the news or jokes (perhaps to make up for the news?) are also common.
Yet, the question remains, just how safe are these virtual assistants? After all, having a smart speaker in your home means there is always an open microphone in your house.
Smart Speaker and Home Assistant Safety Concerns
The convenience of the speaker demands that it always be on, ready and waiting for you to say “Hey Siri” or “OK Google.” Once triggered the device records the command, sends the data to servers for processing, and figures out its response.
Smart speaker users can log in to view the history of queries on their accounts. This prompts some concerns that these mega-companies will use the information for financial gain. For example, those talking about an overseas holiday might start seeing related ads on their computers.
Someone hacking into the home assistant to gain access to your personal information is another concern. Those who set smart speakers as a hub for many devices also create more points of vulnerability.
It’s difficult to anticipate all the ways the assistant could prove too good a listener. In one case, a voice assistant recorded a private conversation and sent it to the couple’s contacts list.
Steps to Stay Secure with a Smart Speaker
That candid conversation share aside, few big privacy flubs or personal data breaches have been reported. Nevertheless, if taking advantage of Alexa, Siri, or Google helper, keep these strategies in mind.
Clear your history. Don’t leave everything you’ve ever asked it stored on the company server. The assistant will relearn your commands quickly.
Connect with caution. It’s great to be able to turn on the TV and dim the lights without leaving the comfort of your sofa. Be wary of connecting security or surveillance devices to your home assistant.
Mute the microphone. Yes, it undermines your ability to call from the closet “OK, Google, what’s the weather like today?” But, turning off the mic when it’s not in use stops recording without you knowing about it.
Secure your network. Home assistants do their work by connecting to the Internet using your network. Ensure they are accessing a password protected network. They should use devices (e.g. modems) changed from default password settings.
With a little effort you can gain convenience without worry.
Want more questions answered about setting up a smart speaker to be safe and reliable? We’re here to help. Give us a call at (651) 456-8655 or visit our Contact page.
What is the Best Way to Backup? “That will never happen to me.” We get through our lives telling ourselves the worst won’t happen to us. It’s the same with business: “We won’t need this data backup.” Yet, whatever your industry, secure, reliable backup ensures business as usual. So, what’s the best way to backup? Here’s help.
Why You Need to Backup
Business disruptions of any kind can be costly. The disaster might take one of several shapes:
Natural (e.g. wildfires, floods, earthquakes, or hurricanes)
On-site (e.g. hardware/software failure, power outage, inability to access building)
Employee driven (e.g. damaging mistakes or intentional sabotage by a disgruntled employee)
Cyber-attack (e.g. data breach, ransomware, or distributed denial of service attack).
Regardless, the best backup solution can help reduce downtime and damage.
Plan B: Approaches to Backup
There are several off-the-shelf backup options your business can use. Let’s consider the pros and cons of the most popular ones.
USB Thumb Drives — Also known as “flash drives,” “pen drives,” or “memory sticks,” these thumb-sized devices are compact and portable. But, they have size limitations compared to hard drives. Also, the mobility makes them easy to lose (which can actually set the disaster scenario in motion).
Additionally, a USB thumb drive is robust when not plugged in, but more vulnerable when attached. If someone inadvertently snaps the drive or employs too much force, they can put the data on that backup at risk.
The cheap ones also tend to be slow, which can make backing up sluggish.
USB Hard Drives — Portable hard drives increase the data storage available, often at a decent price. They are designed to be compact and mobile. You can prioritize durability, processing speed, storage volumes and more.
Hard drives are less likely to get damaged than a thumb drive. If knocked or jostled, the cables are flexible. Still, a hard drive can be prone to physical failure. Selecting an external solid slate drive (SSD) can help since it has no moving parts. Information is stored instead in microchips.
Cloud Storage — Backing up to the cloud stores data on an external, secure server. If thieves take your computers and USB backup, you can still access your data on the cloud. Cloud storage providers build in redundancy to ensure your backup remains safe.
Most cloud storage services back up to secure centers with thousands of servers storing data. Oh, and they’ll have their own server backups too, just in case they’re the ones hit by a disaster. The providers also encrypt data during transit to further ensure compliance and security.
Migrating to a third-party cloud storage service also cuts the clutter at your premises. You can count on expert help to ensure security and compliance. Plus, you can cut operational costs by offloading in-house storage or external hard drive expenses.
OK, What’s the Best Answer?
Don’t think disaster won’t strike your business. Research has found data loss and downtime are most often caused by:
Hardware failures (45% of total unplanned downtime)
Loss of power (35%)
Software failure (34%)
Data corruption (24%)
External security breaches (23%)
Accidental user error (20%).
We recommend the 3-2-1 backup strategy. This means having 3 copies of your data. Two (2) of these would be located on different devices (e.g. on your computer and on a backup drive). The other remaining backup copy (1) would be secured offsite, in the cloud.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.AcceptNoPrivacy policy
Recent Comments