The New PC Tune-Up – 11/29/21. How exciting! You got a new computer for Christmas. It’s sleek, shiny, and so much faster than what you had before. That’s great, but it doesn’t mean you should leave it untouched. This article shares several steps you might take to secure your data and keep that new device in tip-top shape.
First things first. Before even logging into personal email or other top sites, you’ll want to update the operating system (OS). Yes, most computers come out of the box with Windows, but you can’t know when that item was boxed. There could be important updates that you don’t want to miss.
You’ll also want to install the latest drivers during your tune-up. Different hardware on your computer can need specialized drivers from the manufacturer. Gamers, for instance, may want to ensure they download the latest to boost performance.
While you’re doing all this uploading and upgrading, also look to remove junk that may have come on the computer. It’s no longer as common, but manufacturers can reduce cost to the consumer by pre-installing software.
You might not have any need for the tools that come already installed. Meanwhile, they slow down your computer. Remove the clutter to improve your computer’s processing. Head to your PC’s Control Panel and look to uninstall programs and utilities that you don’t want. Be careful, though. Just because you don’t know what it is doesn’t mean it’s not serving a valuable purpose.
Starting out on a new computer is also a great time to set up the free software. For many of us this includes:
Google Chrome – the internet browser;
Skype – for instant messaging, voice and video calling;
VLC – a multimedia player;
FoxIt Reader – to create, edit, sign, and secure PDFs;
7Zip – used for archiving files.
Involving an IT expert for Your Tune-Up
If you had a great sales experience, you may not want to seek IT help with your new computer. Still, it can prove useful.
Your new computer may also need BIOS updates during your tune-up. Again, the hardware was current when your computer was boxed up but may be lacking the latest by the time it gets to you. A note of caution: this is not an update to do alone. BIOS updates don’t add new features, security patches, or performance improvements, but they may fix a bug with a piece of hardware or add support for your central processing unit (CPU). These updates can be risky if done incorrectly, so work with an IT tech.
Talk also with an IT tech about the best data backup plan for your needs. You’ll be creating important documents, downloading sensitive data, and uploading valued images. Don’t risk their security by failing to back up.
IT support will also suggest the best security tool for you to use to protect against malware. With so many free and fee-based third-party alternatives to Windows Defender, you may want help deciding on the best one.
We’re here to help you get the most out of your new computer. Or, if you’re not sure yet which one to buy, we can consult with you on that, too. Contact us today at (651) 456-8655 or visit our Contact page!
How to Choose Home Computer Repair (11/10/21). It’s upsetting when a home computer breaks down: “My whole life is on there!” Then, you have to trust someone to take care of your device. It’s a lot to ask, and that’s why we’re sharing these five tips to help you feel better about your choice of repair person.
#1 Avoid the Big Brands
The big-box stores have name recognition, which may make you feel more secure, but the reason they advertise on TV and have big storefronts is to sell stuff. Their people are salespeople first, and their staff are not going to be as experienced with computer and device repair.
For tricky jobs, the big-box stores send your device to a remote, centralized location. That’s where the experienced staff are, so it’s good in that way. Yet you’ll now have to wait for your computer to ship to and from that location, which can mean a couple of weeks when you don’t know where your computer is or who is working on it.
#2 Consult Customer Reviews
You’ll probably start out by asking family, friends, and co-workers to suggest someone they’ve worked within the past. When you’re looking around for computer repair, read online reviews. Customer reviews can help you gauge whether you can trust the service promises. Feel free to check out our Google reviews HERE.
You may also learn about any after-service support. It will help to have someone you can ask questions of in the future.
#3 Research Types of Support
It may help you to make your decision knowing that any work on your device is going to be done on-site. If they come to you, you’ll get to meet the person doing the work and keep an eye on them if you want.
Another option may be to have the IT tech remote into your computer to help solve your problem.
Then, there’s the option of drop-off and pickup from that repair shop’s own brick-and-mortar store. If you take this route, you might want to ask whether your device will remain on-site at all times.
You’ll also want to find out if that computer repair person has a particular area of expertise. Some companies specialize in working with certain brands, whereas others can handle all types of models or brands.
Who doesn’t love a bargain? But the cheapest computer repair may not actually be a better deal. Taking the budget approach, you could get an inexperienced tech with slightly more know-how than you. On the other hand, going for the most expensive repair company doesn’t guarantee the greatest service either. Ask the computer business what their experience is.
Our IT experts are here to help you repair any computer issues. We can work on-site, remote in, or you can bring your device to us for the professional attention it needs. Call us today at (651) 456-8655 of visit our Contact page HERE!
Finding the Best Place for your Desktop PC (11/10/21). There’s a lot of talk about the best places to use your laptop. We’ll recap that discussion briefly below, but the real focus of this article is where it’s best to put your desktop PC.
First, why does it even matter? Of course, you care how your workstation looks, but beyond the aesthetics, airflow is important too. Computers cool themselves with fans to suck in cool air and expel hot air out the back or top. If you’re not leaving room for the computer to “breath” it can overheat.
When a computer overheats it can become unstable or suddenly shut down. The hot air can also damage internal components. This is true of both laptops and desktops.
That’s why you’ll hear that it’s a good idea to put your laptop on a raised, slatted service where air can reach the vents. A table over a furnace duct or in direct sunlight should be avoided too.
OK, But Where Do I Put My PC?
You don’t want to put your computer somewhere it is going to get dusty, which is a good reason not to put it on the floor. It’s exposed to more dust, hair, and other junk that way. Since the computer’s fans are sucking in cool air, they can suck in the debris too.
Also, on the floor, you risk accidentally hitting or kicking the PC. Sudden jolts are bad for mechanical hard drives. Plus, USB drives or anything else plugged into the front could be knocked out, which damages the port.
Some desks have cabinets under the desk where you can put the computer. But, these may not have been designed with enough airflow.
It’s best to set up your computer on a stable surface to avoid any bumps or drops. You also want to position it so that the cord is not going to create a tripping hazard. If you fall, you could damage the power connection or, worse, knock the computer off your table or desk.
Since the big thing is airflow, you also don’t want to set the PC too close to the wall. This can damage cables in the back if they bend too much. Or, when the hot air exhausts out the back, it will be harder to expel the heated air.
Securing Your Desktop PC
Putting your PC parallel to the monitor, safely stable on your desk or table, with good airflow and room for the cords is your best option for the safety and longevity of your desktop computer.
Need help setting up your desktop PC or finding the best place to position it in your home? Our tech experts are available to help. Contact us today at 555-5555.
Two-Factor Authentication, How Hackers Get Around SMS – Every time you’re online and a site sends a separate code to check your identity, you’re using two-factor authentication. It’s become the norm. So, of course, hackers have figured out how to get around this, too. This article shows you how they do it and how to stay safe.
With billions of usernames and passwords leaked, access credentials everywhere are at risk, especially if you are reusing your log-in information on more than one site (don’t do it!).
Business websites want to offer a secure user experience, so two-factor authentication (2FA) has become the norm. It’s meant to help stop automated attacks in which bad actors use the leaked usernames and passwords.
Still, if the site you’re visiting uses short message service (SMS) to send a one-time code to your phone, you could still be at risk.
Hackers, using information they have from a data leak, can call your telephone company. They use your name, date of birth, and other identifiers available on the Dark Web, to impersonate you. Then, say you’ve lost your phone, they transfer your phone number to a device with a different SIM card.
That means when the one-time SMS code gets sent your phone number, the message will instead go to their device.
Android Users Also Beware
On Android devices, hackers have an easier time getting access to text messages. If they have access to your leaked Google credentials, they can log into your Google Play account. From there, it’s simply a matter of installing a message-mirroring app on your smartphone.
The app synchronizes notifications across your different devices. It’s for when you really need to be connected, and you’ll be able to see your phone’s SMS alerts on your tablet!
The app won’t work unless you give it permission when prompted to do so, but too many people don’t stop to read alerts from their own accounts: they assume it’s another necessary update and go on with their day. Otherwise, the hacker might call you in a social engineering ploy pretending to be a legit service provider. They’ll be familiar to you, so you’re more likely to listen when they ask you to give permission.
Again, when the one-time SMS code gets sent to your phone, because of the message-mirroring app, the hacker’s device will also receive the code.
What Can You Do to Protect Yourself?
It starts with using unique passwords for all sites you visit. Worried you’ll forget them? A password manager can keep all your access credentials in one secure place for you.
You should also confirm that your credentials haven’t been compromised. If you use Google’s password service, you can head to the password manager site and tap “check passwords” to see if there are any issues. On Firefox, head to the Firefox Monitor page and “Check for Breaches.” On Safari, click on Preferences, and then on Passwords to see what recommendations they have for your security.
Change any passwords that have been involved in a leak!
To avoid the SMS concern specifically, avoid using one-time SMS codes to verify your identity. Instead, you can use a non-SMS authentication tool such as Google authenticator, which provides two-step verification services within the app itself.
Here’s some additional information you may find helpful:
Need help learning if your credentials have been leaked? Or want assistance setting up more security for your online activity? We can help. Contact our IT experts today at (651) 456-8655 or visit our CONTACT page.
DIY Computer Repair: Don’t Do It! – Most people like to take a shot at fixing things something themselves. With some things that works out great, but when it comes to do-it-yourself computer repair, it’s probably not worth the effort. This article shares some of the things to consider before trying to do that repair solo.
#1 Computers are complicated
Computer developers put a lot of work into making it easy for you to use your computer. A good user experience is part of the appeal for one brand over another. But that doesn’t mean that what’s going on inside the actual device is simple to fix.
There are a lot of complicated connections “underneath the hood” of your laptop or desktop, and prying the device open to see if you can do a DIY repair could prove disastrous. It’s going to be safer to turn to a trained repair tech instead.
#2 You could make things worse
Maybe you’ve done this around the house when trying to be “handy.” That leaky faucet becomes a full-blown broken fixture thanks to your efforts.
You might think that you can watch a YouTube video and do an amateur fix, but know that just hitting the wrong key combination could create a different problem. Digging into the backend of your programs could change something for the worse.
Tip: If you do try to fix something solo, don’t erase your history. It could be important for the tech expert to retrace your steps to figure out where you went wrong.
#3 You risk being scammed
Bad guys are always finding ways to exploit people, and there are scams out there that appear to be repair assist programs. You may be looking for a fix but instead you click on a link that installs malware on your device. Now, you’ve got another problem to deal with!
#4 You could lose your valuable data
We store a lot of our lives on our computers or smartphones these days. If you attempt to fix your device without first backing up your files, media, and other data, you could lose it all.
#5 It may not be worth it
It’s not that difficult to find a reasonably priced computer today. You may end up paying for expensive repairs for an old computer when you could have bought new. Take your computer to a fix-it shop. You’ll get expert input into whether your device is worth the time, effort, and money to repair before you go too far down that road.
Choosing the right repair service
With age comes the wisdom to ask for help when we need it. Regrettably, not all repair services are as reliable. When looking for computer fix-it help, read reviews, and check credentials and service guarantees.
Don’t hesitate to contact our IT experts for your computer repair needs. You have your skills, we have ours. Let us do the hard work and keep your devices ship shape for you. Contact us now at (651) 456-8655 or visit our CONTACT page.
Stop Your Technology from Stalking You – Unless you’re a reality television star, you probably don’t like the idea of being watched at all times. So, why would you want your technology to know all about you? With digital technology today, it’s far too easy for our devices to turn creepy. Here are some suggestions to stop the stalker-like tendencies of the technology you rely upon.
Today’s marketing and online communications are all about customization and personalization. If you like a friend’s picture of an Art Deco door in Belgium, you see many more posts featuring similar designs. Or if you view an area rug on a website, you’re suddenly bombarded with ads for rug stores when you next go online.
This can add convenience, but it is also unsettling. What companies online know about you could be more detailed than what your friends know. Take the following steps to regain control of what your computer, phone, and apps know about you.
Review your privacy settings
Whether going online from a phone, laptop, desktop, or tablet, get to know the device’s privacy settings. Some important settings to review include:
email tracking – this can let people know if you opened their message or not;
location tracking – personalizes recommendations but also tells search engines where you are;
voice recordings – manufacturers use these to train virtual assistants, but pause this to keep your conversations to yourself;
purchase history – this helps feed the machine so that businesses know how to target you in the future.
Opt out or block ads
Opting out of ads limits the information collected from your browser or device. The site or business still receives basic information about you, but you will no longer receive targeted, interest-based ads any longer. Apple’s iOS 14 allows app blocking, and you can also express your choice on Android devices.
Otherwise, use browser ad blockers, such as AdBlock Plus, or JavaScript blockers, such Ghostery, to limit ad tracking. Also known as content blockers, these software programs prevent ads from showing on websites you visit. You can find ad blockers for Chrome, Firefox, Opera, Safari, and Internet Explorer.
Check your permissions
Watch the permissions you give apps. We have already talked about checking device settings, but you can also limit the permissions you give to apps. For example, social media accounts have privacy settings that allow you to control what’s logged about you.
Plus, check permissions for other apps. Clash of Clans doesn’t need location services, for instance. Or you might not want to give Slack access to your microphone and video recordings.
Use webcam covers
Covering your webcam stops someone from potentially seeing and recording you. If you think you’d see the light come on to show the webcam is in use, know that hackers can disable that. A simple sliding webcam cover closes the webcam when you are not using it to avoid a cybercriminal having access.
Covering your webcam can also come in handy in all those online meetings you’re having. A covered camera means you don’t run the risk of your colleagues catching you unprepared.
Limit information you provide
Social media has created a culture of oversharing. There are probably many things you’ve seen about friends online that you would rather not know. You’re also sharing more than you need to with the companies that you interact with online.
If you’re filling out a form for a download, you might fill out only the required fields. When you add an app, be stingy with your personal details. Think about it from a need-to-know perspective. For instance, that home design game you love to play doesn’t need to know where you went to high school or with whom you bank.
Need help keeping the privacy-busting algorithms at bay? We can help. Our IT experts can configure device settings to limit information gathered about you online.
Making Technology Easier for Seniors. The pandemic has changed the world. More people have been pushed online in new ways, and for senior citizens this can be particularly challenging. Even registering for a COVID-19 vaccination requires going online in many countries. Plus, social gatherings and other appointments have gone virtual. Don’t add to a seniors’ social distance. Here’s how we can help seniors with their technology needs.
Think of all that has moved online in 2021:
telehealth
scheduling services
service appointments
church, club, association, and neighborhood meetings
shopping
selecting and reserving library books
It’s not that these things weren’t using technology before, but there were other options. Now, seniors may need to get online to take part in weddings, funerals, or baby showers. Thus, it’s essential that they have the right tools and know-how to log in and connect virtually.
Another problem? The senior is stuck at home and can’t go out to get computer help the way they might have done before. Meanwhile, family members may not yet be able to visit to help out.
How We Help Seniors with Technology
Socially distancing can have an especially negative impact on senior citizens, and factoring in a technology barrier doesn’t help. A managed service provider can help seniors tackle tech challenges. With their coaching, the senior can connect confidently and securely.
To stay in touch with family today, the senior has many online channels available. They can get on Facebook, use FaceTime on a mobile phone, start a video call on their desktop, or send an email. They also might play online games with family members, or join a watch party on a streaming service such as Amazon, Hulu, or Netflix. The list goes on and on.
All this requires technology in the home. Deciding on what kind of computer to get or upgrade to can be daunting, not to mention the challenge of setting it all up and connecting it to other devices in the home or installing a router or making sure the software is up to date and patched to lower the risk of malware or hacker attack.
Then, once the technology is installed, the learning curve doesn’t flatten out entirely.
In our digital environment, there are so many more devices to connect to one another. Maybe the printer is wireless and connects to the phone, or the router provided by the cable service isn’t giving a good enough signal throughout the house. A residential IT expert can help with that, too.
Our IT team can also suggest software solutions to make life easier for seniors online. We can recommend ways to integrate all the technology to simplify the environment. We know about changing default passwords for cybersecurity, and we can also set up password wallets. This can help forgetful seniors who might otherwise repeat access credentials across accounts.
Connect with Our Residential Support Team
You can rest assured that you or the seniors in your life have the IT help needed to stay connected. We’re able to explain, coach, and troubleshoot at any time. As we’ll get to know the technology, we can often help faster, too, plus we can do a lot of our work remotely if that makes the senior feel safer.
Some seniors fear technology. We get it. We can address concerns about going online. We will reassure with the right precautions and by setting up a secure system. Our experienced techs are always happy to help. Contact us today at (651) 456-8655! You may also send us a message from our Contact page!
Video gaming is an entertainment for all ages. The main demographic is 18-34 years, but those 34-54 are another big segment – even larger than the under-18 group – although the youngest group may spend the most hours gaming, especially during a pandemic. Regardless, PC gamers of any age want the most powerful, fastest computer they can get.
It’s difficult to beat the Boss Level of that favorite game if your computer is lagging. The horror! If you’re serious about gaming, consider the ideas in this article to achieve your next personal best.
The gaming industry is moving to Triple-A titles. Think Grand Theft Auto or Call of Duty. These AAA video games are the equivalent of blockbuster movies. They take months to years for massive teams of people to develop, everything about such games is ambitious (even the price!). The graphics and animation are more immersive, the storylines offer hours of content and encourage open exploration, and the games have a grander scale and improved sound design, too.
All that requires more from your computer. Depending on the age of your computer, you may not need to replace it to power the latest, greatest games. Or you could upgrade to a more powerful video card. Adding more random access memory (RAM) might also take a computer up to the Triple-A level.
Troubleshooting the Home-Gaming PC
Whether you’re trying the Triple A game or not, you may run into other problems. A screen locks up, a system crashes, or you see weird graphics or wonky textures in a game. You shoot an opponent with a direct hit, and he takes the win. Any of these problems can ruin your gaming experience.
Various issues cause these headaches for home gamers. Regrettably, they can be difficult to diagnose. The problems might be tied to:
Overheating – Modify your power settings, and make sure the computer is getting enough air flow;
Driver issues – Games crashing could mean the latest video drivers aren’t installed;
File corruption – Reinstalling the game could help;
Unstable internet connection – Consider moving to a wired Ethernet connection.
Running too many programs on your PC can also cause games to run less smoothly. Close out other programs. Free up disk space if you can. Also, putting the game’s graphics on a lower setting can make them less resource-intensive.
Build Your Own Gaming PC
If you decide it’s time to get a new gaming PC, a popular option now is to custom-build your own. Our experts can do that for you! When you customize your own gaming PC, you get a computer that matches exactly what you’re trying to do.
Don’t settle for a sale computer using lower-quality parts and offering limited upgradability. Avoid buying a brand-name computer pre-loaded with bloatware. Instead, our technicians can help you pick the processing and other parts to personalize your system, even down to the color of the fans or console lights.
Our IT experts can bring your PC up to speed, get you back in the game at full power, and build you the perfect customized PC. Contact us today at (651) 456-8655! Or, visit our Contact page.
Setting Your Scholar Up for Online Learning – Schools around the world have closed their doors during the COVID-19 crisis, students from kindergarten through graduate school are being asked to learn online. It’s a change for everyone, but having the right technology in place can help with the transition.
Your student may have been using the Microsoft Office suite of software at school. If you don’t have Microsoft Word, Excel, and PowerPoint at home, check if your school is providing licenses or free software.
If not, buying a subscription to the online Microsoft 365 package allows you to pay monthly or yearly, and it’s much more affordable than in the past. One month is about the cost of two cafe coffees.
Otherwise, your student may be able to get work done using Google’s suite of tools. Teachers may accept links to Google Docs, Sheets, or Slides. These free options are also useful when your student needs to work on a group project. People can collaborate online in real-time using the G-Suite software.
Teleconferencing with Teachers and Peers
Your student is likely to need to download teleconferencing software such as Zoom or Skype. Beware! Cyber-criminals take advantage of every opportunity. Noticing the increased demand for these services, they’ve set up bogus sites. Make sure that you are downloading from the legitimate sources: www.skype.com or www.zoom.us.
While we’re talking about teleconferencing, you might pass on these best practices:
Use headphones to limit audio distractions.
Join calls from a low-traffic setting with simple backgrounds.
Ask others at home to avoid downloading, streaming, or backing up while the student is live online.
Connect to the router with a network cable, or at least be as close to the wireless router as possible during the call.
Considering Cyber-security
In addition to setting up fake teleconferencing sites, cyber-criminals have other ways to exploit the situation.
Remind any students learning from home that they need to keep their username and password private. This is a lesson that never gets old.
Are you still using Windows 7 on a home computer? This popular operating system (OS) reached the end of its life in January 2020. Yes, it may still work, but it is no longer receiving security updates from Microsoft, and the bad guys know Windows 7 is vulnerable. Continuing to use this OS puts you at risk. Without new upgrades, you’re no longer protected from vulnerabilities or exploits.
You probably already know to avoid using public wireless networks. Although your students can’t go to a coffee shop or public library right now to get online, reminding students to secure their online activity is critical.
This is a good time to review your WiFi setup. Too many homeowners don’t change the default username and password on their routers. Big mistake. You should also:
hide your WiFi network from public view;
set your network up to encrypt transmissions;
update router software regularly.
A Focus on Learning
There’s one more thing parents and guardians might consider. At school, the computers prevent students from going to certain sites or downloading files, but you may not have the same blocking and filtering set up on your home devices. This can be addressed in settings.
If you have to share a computer, set up a student-specific user profile to:
prevent your student from getting distracted during learning;
limit exposure to malware and cyber-threats;
avoid them accessing any of your work files.
You may feel isolated during the coronavirus quarantine, but you’re not alone. Our tech experts can help you set up and secure your technology for work or school from home. Give us a call today at (651) 456-8655 or visit our Contact page.
Steer Clear of Coronavirus Scams (4/9/2020) – With the world grappling with a health pandemic, scams are shocking. Regrettably, bad actors are everywhere, always looking for opportunities, and they’re seeing one in the Coronavirus. This article outlines what you need to watch out for and how to stay cyber safe.
The last thing you want to read right now is that there’s another threat out there – sorry, but it’s true. Cybercriminals take advantage of fear. They take timely concerns and use them to target victims. Using the anxiety and upheaval around Coronavirus is their mission.
So far, several Coronavirus-related attempts to cyber-scam people have been reported. There are examples of:
emails that appear to come from government health departments;
offering a tax refund to get people to click on malicious links;
memos to staff that appear to come from large employers;
COVID-19 test offerings from private companies;
fake websites promising to sell face masks or hand sanitizer;
soliciting donations to help fund a vaccine.
What to Watch Out For
Another concern is the number of bogus websites registered with names relating to COVID-19. The site can look legit but is set up to steal information or infect the victim’s computer with malware.
You may get an email promising the attached information offers Coronavirus safety measures, or information shared by the World Health Organization (WHO) if you click on the link, or a similar email pretending to be from a reputable news source, such as the Wall Street Journal (WSJ).
In another example, an email impersonating a healthcare company’s IT team asked people to register for a seminar “about this deadly virus.” Anyone who didn’t question why IT was organizing the meeting clicked to register. By filling out the form, they gave their details to hackers.
What to Do
Be cautious. It’s understandable that you’re anxious, but don’t let that stop you from taking cyber precautions. You should still:
be wary of anything that tries to play on your emotions and urges immediate action;
question where emails are coming from – remain vigilant even if the communication appears to come from a reliable source;
hover over links before clicking them to see where they will take you – for example, in the WSJ example, the Web address was for the “worldstreetjournal”;
avoid downloading anything you didn’t ask for;
doubt any deals that sound too good to be true (“a mask that stops the virus 99.7% of the time!”);
ignore any communications requesting your personal information;
don’t be suckered by fraudulent pleas for charity.
Global health organizations generally do not send out emails with advice. Instead, navigate directly to that reputable health institution for real news.
If you’re still not sure about the validity of the communication, check it out. Do so by calling or using another medium to get in touch with the “source” of the received message.
While there is not yet a vaccine for COVID-19, you can put anti-virus protection on your computer. Also, make sure that you’ve applied all available security updates to keep your software safe.
We hope you’ll take care and stay healthy both physically and online in these tough times.
Need help installing security software and keeping your technology safe? Our cyber-security experts can give your home a tech immunization. Contact us today at (651) 456-8655 or visit our Contact page!
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.AcceptNoPrivacy policy
Recent Comments