Tech Tips Everyone Should Know – 4/16/2023. There are billions of computers in the world today. In fact, 286 million computers shipped globally in 2022, and that was a 16% drop! Those figures make it obvious how many of us have access to computers, yet that doesn’t mean we all know the simple shortcuts available to us. This article rounds up top tech tips that can benefit every user.
Tech Tips #1: Search Google smarter
Google is the market leader with over 85% of Web search traffic. But did you know you can search this popular online engine even easier? When you know you are looking for something on a particular site, you can narrow your search. Go to the Google search bar as normal, then, in the search box, type “site: www.website.com” (without quotes) with your search term. This refines your search.
So, if you wanted to find an article on coaching on the Forbes website, you would search “site: forbes.com and coaching.” You’ll see that all the responses you get back come from the Forbes domain.
Tech Tips #2: Undo your mistakes
We all make mistakes while working on our computers. Here are some ways to undo the common ones.
“Unsending” an email is possible in Gmail. Go to Settings and set up the Undo Send section to give yourself 5, 10, 20, or 30 seconds. Then, save your changes, and you’ll have this option enabled in the future. It doesn’t technically “unsend” the email but delays sending it for a few seconds so you can stop it if need be.
You can also reopen a closed browser tab by using Ctrl+Shift+T on your PC or Command+Shift+T on your Mac. This reopens the last tab you closed. If you closed a bunch at once, you can also reopen them from your browser’s History dropdown menu.
Then, there’s Ctrl + Z for just about everything else. Pressing the control button and Z key together undoes your action in many Web browsers and operating systems. It will depend on your application and how far you can go back with this shortcut.
Tech Tips #3: Capture your screen
Some modern PC keyboards come with a “print screen” key, which you can use to get a screenshot of the desktop windows. If you want to crop that screenshot, on Windows 10, go to Start and type Snipping Tool in the Search bar. You’ll get a box you can drag to any shape over your screen.
You can also take a screenshot on a Mac by pressing Command + Shift + 4. To crop the screenshot size and shape, you’ll press Command + Shift + 5.
One more little secret
How many times do you find yourself picking up your USB cable and trying to put it in the wrong way? You can stop doing so by looking for a symbol on the cable near where you’ll plug it in. It’s only found on one side, and it’s not for decoration. The symbol should be facing you when you plug in the USB. This will get it in the first time, whether you’re plugging in a vertical or horizontal cable.
These tech tips can help you be more efficient and effective with your technology, but you may still want help in other areas. Reach out to our IT experts today. We’re here to help. Call us at (651) 456-8655 or visit our Contact page.
News of data breaches is all too common. This company apologizes for six million accounts breached. That company acknowledges hackers accessed 35,000 users’ personal identifiable information. But the question that probably matters most: Is your data breached, too?
The company should contact you if your information is in a data leak, but you can’t rely on that. You can also find out if your phone number or email address has been leaked by visiting https://haveibeenpwned.com/.
HaveIBeenPwned has uploaded various breaches and consolidated the information to make searching easy. Enter your address and get a list of breaches that compromised that email. You’ll get a summary paragraph as well as a description of data compromised in each breach.
It is not uplifting reading!
Next, the question is what to do about your breached information.
Steps to Better Security
First, change your passwords for those breached accounts. If you use that same password to access other accounts, change those passwords, as well, even if they are not listed as leaked.
Always avoid reusing passwords. Yes, it can be a hassle to remember many different access credentials, but you risk exposing many accounts if you keep reusing one email address and password combo over and again.
Make using unique passwords for all accounts easier by using a password manager. A manager can store your many passwords in one place and generate strong ones to use. You can often download an app to your mobile device, which gives you the convenience of filling in your credentials when you’re on the go, too.
The next step is to use two-factor authentication (2FA).
Understanding 2FA
This adds a layer of difficulty for hackers trying to access your accounts. Even if they had your username and password, they would need a second way to verify your identity.
Using 2FA requires you to provide one of the following before you can gain access:
something you know (e.g. the answer to a secret question);
something you have (e.g. your smartphone);
something you are (e.g. your fingerprint).
A bad actor would need to have not only your leaked credentials but also your other “something.”
A common approach to FA is an SMS text message or voice-based authentication. You enter your credentials, then the site follows up with a text or phone call providing a separate code you must then enter. This is not the best method, however. Scammers can hack the SIM card associated with your device, and then use your number to make and receive calls and texts.
Software tokens for 2FA are a safer solution. You’ll download and install an application on your phone (e.g. Google Authenticator, Authy or Okta Verify). It can generate a unique verification code that is valid only for 30-60 seconds.
Want to learn more about password management and soft-token 2FA. We’re here to help. Contact us today at (651) 456-8655 or send us a message from our Contact page.
What You Need to Know About Browser Extension Risks – 12/6/2022
With “Googling it” now a common expression, it’s safe to say you do a lot online. To do it all you’re using a Web browser (such as Chrome, Edge, Firefox, etc.). To do it all more efficiently or effectively, you could be using browser extensions, but this article is going to warn you against doing so.
To clarify, browser extensions are code add-ons that you connect to your browser. You can use them to personalize your surfing experience, and they accomplish many different things, including:
saving time (e.g. Scribe, Evernote, StayFocusd);
checking your grammar (e.g. Grammarly);
managing your passwords (e.g. Keeper, LastPass);
securing your online activity (e.g. DuckDuckGo, Ghostery)
Even though we’ve just said they can help secure your online activity and manage your passwords, the problem is that they are also risky.
Consider the fact that we said this represents added code. Now, how much coding do you know? Most will say “not a lot.” That means you’re blindly trusting that browser extension.
If you download a malicious one, that code can wreak havoc. Suddenly, your default search engine gets changed, or you get redirected to a start page with malware on it. You might face an onslaught of pop-ups or ads. They can also track your browsing history without you knowing it.
That’s just the beginning
Many browsers today want to keep you safe from malevolent extensions. They’ll have permissions in place before allowing access. Yet you still end up giving that extension a lot of access. For example, an extension modifying google.com needs access to all your Google activity. That means your Gmail, too.
Browser extensions access everything you’re doing online. So, a malicious extension could also function as a keylogger capturing passwords or credit card details.
A browser extension can also be sold to or hijacked by a bad actor. Then, it’s easy enough for them to push out an update that turns your trusted extension into malware.
What to do about this issue
Does this mean you should do without browser extensions? There are even browser extensions out there to block other browser extensions, but abstinence from extensions is not your only solution.
Instead, we’d recommend reviewing the safety and credibility of that extension. This means you should:
Check to see who published the extension.
Look at the reviews. A high number of positive reviews is a good sign. Thousands of people are unlikely to give five stars to a malicious extension.
Pay attention to the permissions required. If an extension claims to modify only one website, check that it accesses that site only.
Protect yourself with a good antivirus solution.
Keep your antivirus solution and other software updated.
It’s also easier to stay safe by limiting the number of installed extensions you use. If you have browser extensions that you aren’t using, uninstall them. This can cut your exposure to potential threats.
Another way to secure your online activity? Work with our IT experts. We can check permissions and review your extensions. We’ll also ensure your antivirus and software are up to date. Contact us today at (651) 456-8655 or visit our Contact page.
April 2022 – Picking Your Home PC browser: Chrome vs. Edge
Selecting your home computer was challenging enough. Now, we’re asking you to decide on the right PC browser, too? When will the decisions end? At least we’re making the comparison easier. This article helps you decide if Google Chrome or Microsoft Edge works best for you.
It’s estimated that the average individual spends almost a third of their day online. That means you likely already have a go-to browser. It may be the one that was pre-loaded on your computer when you bought it or the same one you’re using on your mobile devices, but those aren’t the best reasons to select a browser. Keep reading to learn the key features of Google Chrome and Microsoft Edge.
Google Chrome vs. Microsoft Edge: The Basics
Google Chrome is today’s most popular browser worldwide. It has been around since 2008 when it was released to compete with Internet Explorer. At that time, Internet Explorer was the big-shot browser, but within a few years, Google had taken the title. Explorer was replaced with Edge, which Microsoft brought out with Windows 10 in 2015.
Chrome and Edge are available for Windows, macOS, Android, and iOS devices. They are both based on the open-source software, Chromium. Still, Edge has a long way to go before it will reign supreme. In July 2021, Chrome had the lead at 65.27% market share. Safari came in second at 18.34%, and Edge third at 3.4%.
The two are not dramatically different. After all, they are competitors, so any big gap is quickly filled. Still, there are differences. Let’s discuss those next.
User Interface
Both Chrome and Edge allow you to have multiple windows open at the same time. Edge allows you to switch your tabs from horizontal (like Chrome) to vertical. You can group tabs by choosing a name and color for related tabs on both. Your tabs will sync with your mobile devices, but where the tabs appear on the screen will be different in Edge or Chrome mobile.
You can also bookmark (Chrome) or favorite (Edge) your pages. Edge allows you to create Collections of favorites. You can send those to Microsoft Docs, Excel, OneDrive, or Pinterest. Meanwhile, Chrome has a similar feature, and its collections can be shared with other Google account users.
If you want to choose the look of your browser (e.g. a theme or Dark Mode), there’s more flexibility with Chrome. Edge allows you to make choices from 14 themes in its Appearance settings. Otherwise, you’ll have to go to the Microsoft Edge Store.
Both browsers offer private browsing. Your default search engine will depend on your browser choice, though: Chrome uses Google to search (surprise!), whereas Microsoft defaults to Bing.
One standout feature of Edge is its immersive reader. This allows you to look at a page as if you are reading it on an eBook. It’s part of the basic Edge browser tools, but you’d have to add it as an extension if you wanted this in Chrome.
Need for Speed
If performance is important, you’ll want to know that Edge runs faster. There are competing claims, but Avast found Edge runs faster than both Chrome and Firefox. Another source tested the resource consumption of both browsers, and Chrome used more random-access memory (RAM).
Chrome did have the lead on cross-device syncing for a while, but in 2021 Edge added features making it convenient to switch between devices. Note: Chrome sync devices by default, whereas you need to enable it manually in Edge.
Security
Security and privacy are another big areas to consider when picking your browser. Browsers are common malware targets. You’ll want a browser that provides you with security features. Both Chrome and Edge do help you out, but if security is your top priority, look at Firefox, Tor, or Brave instead.
Still, since we’re comparing Chrome and Edge, let’s talk about their security tools. Chrome allows you to send “do not track” requests to websites, but Edge allows you to be more selective. Users choose between three tracking-prevention levels and get a blocked tracker list.
Both browsers have built-in anti-malware and phishing protection, but Google is known for updating more regularly, which can keep you safer online. At the same time, though, Google collects more of your data.
Key Takeaway
Microsoft has been steadily closing the gap between its Edge offering and Chrome. For speed and resource consumption, Edge is claiming the lead. Of course, these are only two of the available browsers out there.
Want help deciding on the best browser for your home? We can help you set up your computers and answer any questions you may have. Call us today at (651) 456-8655 or visit our Contact page!
LetMeIn101: How the Bad Guys Get Your Passwords – Passwords are essential to your cybersafety. You know it, but if you’re like the rest of the digital society, you probably have dozens of passwords to remember. It’s a lot. So, you might take shortcuts. Taking advantage of your laissez-faire attitude is one way bad guys access your passwords.
Incredibly, there are still people out there using “password” or “123456” in their access credentials. Some people don’t change the default passwords on their devices. So, anyone can pick up a router, look at the sticker identifying the password, and access that network.
Tip: Avoid the obvious passwords! When you have to create a password, make an effort. When it’s time to update a password, do so. Steer clear of simple, easily guessed patterns.
Cybercriminals can also guess your password. With a little bit of research about you online, they can make some informed guesses. Common passwords include pet names, birthdays, and anniversaries. These are all easy to find via your social media accounts.
Tip: Be careful what you share on social media! Don’t befriend strangers, as you are giving them access to a goldmine of info for personalizing an attack on you.
If that doesn’t work, criminals may try brute force. They might script an automation bot to run thousands of password permutations until they get a hit. The software will try a long list of common passwords and run through dictionary words to gain access.
Tip: Use a complex password with numbers, letters, and symbols or a passphrase. A passphrase is typically at least 19 characters long but is more memorable, as it unique to you.
The criminal may also be working with info from a data breach. In early 2019, a security researcher found more than 2.7 billion email/password pairs available on the Dark Web. Criminals accessing that database could use the data as a starting point, as many people duplicate their passwords across accounts.
Tip: Use a unique password for each site. Yes, that’s overwhelming to remember, and that’s also why you should use a password manager to keep track of it all for you.
Criminals can also access your account if you’ve used a hacked public computer. The bad guys may have installed a key logger on the computer. The logger records every key you press on the keyboard. Or they might have compromised a router or server to be able to see your information.
Tip: Be cautious about your online activity on computers or networks you don’t trust.
Of course, there’s one more method of getting your password that we haven’t addressed yet. It’s the familiar phishing attack. For instance, you get an email that looks like it was sent by your bank. Phishing typically has an urgent message and a link that directs you to what looks like a credible page.
Tip: Pay attention to who is sending the email and hover the mouse over the link to see where it goes. If you are concerned about your bank account, for example, open up a browser and type the URL manually rather than clicking the link.
These tips can help you to protect your valuable passwords. Still, setting up a password manager and amping up your internet security can help too. Need support getting ahead of the cybercriminals?
Check out these additional helpful articles: How Do Hackers Get Passwords? – Click Here
Avoiding and Reporting Scams – Click Here
10 Signs of a Phishing Email | How to Identify Phishing Attacks – Click Here
Contact our experts today! Call us at (651) 456-8655 or visit our Contact page.
The New PC Tune-Up – 11/29/21. How exciting! You got a new computer for Christmas. It’s sleek, shiny, and so much faster than what you had before. That’s great, but it doesn’t mean you should leave it untouched. This article shares several steps you might take to secure your data and keep that new device in tip-top shape.
First things first. Before even logging into personal email or other top sites, you’ll want to update the operating system (OS). Yes, most computers come out of the box with Windows, but you can’t know when that item was boxed. There could be important updates that you don’t want to miss.
You’ll also want to install the latest drivers during your tune-up. Different hardware on your computer can need specialized drivers from the manufacturer. Gamers, for instance, may want to ensure they download the latest to boost performance.
While you’re doing all this uploading and upgrading, also look to remove junk that may have come on the computer. It’s no longer as common, but manufacturers can reduce cost to the consumer by pre-installing software.
You might not have any need for the tools that come already installed. Meanwhile, they slow down your computer. Remove the clutter to improve your computer’s processing. Head to your PC’s Control Panel and look to uninstall programs and utilities that you don’t want. Be careful, though. Just because you don’t know what it is doesn’t mean it’s not serving a valuable purpose.
Starting out on a new computer is also a great time to set up the free software. For many of us this includes:
Google Chrome – the internet browser;
Skype – for instant messaging, voice and video calling;
VLC – a multimedia player;
FoxIt Reader – to create, edit, sign, and secure PDFs;
7Zip – used for archiving files.
Involving an IT expert for Your Tune-Up
If you had a great sales experience, you may not want to seek IT help with your new computer. Still, it can prove useful.
Your new computer may also need BIOS updates during your tune-up. Again, the hardware was current when your computer was boxed up but may be lacking the latest by the time it gets to you. A note of caution: this is not an update to do alone. BIOS updates don’t add new features, security patches, or performance improvements, but they may fix a bug with a piece of hardware or add support for your central processing unit (CPU). These updates can be risky if done incorrectly, so work with an IT tech.
Talk also with an IT tech about the best data backup plan for your needs. You’ll be creating important documents, downloading sensitive data, and uploading valued images. Don’t risk their security by failing to back up.
IT support will also suggest the best security tool for you to use to protect against malware. With so many free and fee-based third-party alternatives to Windows Defender, you may want help deciding on the best one.
We’re here to help you get the most out of your new computer. Or, if you’re not sure yet which one to buy, we can consult with you on that, too. Contact us today at (651) 456-8655 or visit our Contact page!
How to Choose Home Computer Repair (11/10/21). It’s upsetting when a home computer breaks down: “My whole life is on there!” Then, you have to trust someone to take care of your device. It’s a lot to ask, and that’s why we’re sharing these five tips to help you feel better about your choice of repair person.
#1 Avoid the Big Brands
The big-box stores have name recognition, which may make you feel more secure, but the reason they advertise on TV and have big storefronts is to sell stuff. Their people are salespeople first, and their staff are not going to be as experienced with computer and device repair.
For tricky jobs, the big-box stores send your device to a remote, centralized location. That’s where the experienced staff are, so it’s good in that way. Yet you’ll now have to wait for your computer to ship to and from that location, which can mean a couple of weeks when you don’t know where your computer is or who is working on it.
#2 Consult Customer Reviews
You’ll probably start out by asking family, friends, and co-workers to suggest someone they’ve worked within the past. When you’re looking around for computer repair, read online reviews. Customer reviews can help you gauge whether you can trust the service promises. Feel free to check out our Google reviews HERE.
You may also learn about any after-service support. It will help to have someone you can ask questions of in the future.
#3 Research Types of Support
It may help you to make your decision knowing that any work on your device is going to be done on-site. If they come to you, you’ll get to meet the person doing the work and keep an eye on them if you want.
Another option may be to have the IT tech remote into your computer to help solve your problem.
Then, there’s the option of drop-off and pickup from that repair shop’s own brick-and-mortar store. If you take this route, you might want to ask whether your device will remain on-site at all times.
You’ll also want to find out if that computer repair person has a particular area of expertise. Some companies specialize in working with certain brands, whereas others can handle all types of models or brands.
Who doesn’t love a bargain? But the cheapest computer repair may not actually be a better deal. Taking the budget approach, you could get an inexperienced tech with slightly more know-how than you. On the other hand, going for the most expensive repair company doesn’t guarantee the greatest service either. Ask the computer business what their experience is.
Our IT experts are here to help you repair any computer issues. We can work on-site, remote in, or you can bring your device to us for the professional attention it needs. Call us today at (651) 456-8655 of visit our Contact page HERE!
Two-Factor Authentication, How Hackers Get Around SMS – Every time you’re online and a site sends a separate code to check your identity, you’re using two-factor authentication. It’s become the norm. So, of course, hackers have figured out how to get around this, too. This article shows you how they do it and how to stay safe.
With billions of usernames and passwords leaked, access credentials everywhere are at risk, especially if you are reusing your log-in information on more than one site (don’t do it!).
Business websites want to offer a secure user experience, so two-factor authentication (2FA) has become the norm. It’s meant to help stop automated attacks in which bad actors use the leaked usernames and passwords.
Still, if the site you’re visiting uses short message service (SMS) to send a one-time code to your phone, you could still be at risk.
Hackers, using information they have from a data leak, can call your telephone company. They use your name, date of birth, and other identifiers available on the Dark Web, to impersonate you. Then, say you’ve lost your phone, they transfer your phone number to a device with a different SIM card.
That means when the one-time SMS code gets sent your phone number, the message will instead go to their device.
Android Users Also Beware
On Android devices, hackers have an easier time getting access to text messages. If they have access to your leaked Google credentials, they can log into your Google Play account. From there, it’s simply a matter of installing a message-mirroring app on your smartphone.
The app synchronizes notifications across your different devices. It’s for when you really need to be connected, and you’ll be able to see your phone’s SMS alerts on your tablet!
The app won’t work unless you give it permission when prompted to do so, but too many people don’t stop to read alerts from their own accounts: they assume it’s another necessary update and go on with their day. Otherwise, the hacker might call you in a social engineering ploy pretending to be a legit service provider. They’ll be familiar to you, so you’re more likely to listen when they ask you to give permission.
Again, when the one-time SMS code gets sent to your phone, because of the message-mirroring app, the hacker’s device will also receive the code.
What Can You Do to Protect Yourself?
It starts with using unique passwords for all sites you visit. Worried you’ll forget them? A password manager can keep all your access credentials in one secure place for you.
You should also confirm that your credentials haven’t been compromised. If you use Google’s password service, you can head to the password manager site and tap “check passwords” to see if there are any issues. On Firefox, head to the Firefox Monitor page and “Check for Breaches.” On Safari, click on Preferences, and then on Passwords to see what recommendations they have for your security.
Change any passwords that have been involved in a leak!
To avoid the SMS concern specifically, avoid using one-time SMS codes to verify your identity. Instead, you can use a non-SMS authentication tool such as Google authenticator, which provides two-step verification services within the app itself.
Here’s some additional information you may find helpful:
Need help learning if your credentials have been leaked? Or want assistance setting up more security for your online activity? We can help. Contact our IT experts today at (651) 456-8655 or visit our CONTACT page.
Stop Your Technology from Stalking You – Unless you’re a reality television star, you probably don’t like the idea of being watched at all times. So, why would you want your technology to know all about you? With digital technology today, it’s far too easy for our devices to turn creepy. Here are some suggestions to stop the stalker-like tendencies of the technology you rely upon.
Today’s marketing and online communications are all about customization and personalization. If you like a friend’s picture of an Art Deco door in Belgium, you see many more posts featuring similar designs. Or if you view an area rug on a website, you’re suddenly bombarded with ads for rug stores when you next go online.
This can add convenience, but it is also unsettling. What companies online know about you could be more detailed than what your friends know. Take the following steps to regain control of what your computer, phone, and apps know about you.
Review your privacy settings
Whether going online from a phone, laptop, desktop, or tablet, get to know the device’s privacy settings. Some important settings to review include:
email tracking – this can let people know if you opened their message or not;
location tracking – personalizes recommendations but also tells search engines where you are;
voice recordings – manufacturers use these to train virtual assistants, but pause this to keep your conversations to yourself;
purchase history – this helps feed the machine so that businesses know how to target you in the future.
Opt out or block ads
Opting out of ads limits the information collected from your browser or device. The site or business still receives basic information about you, but you will no longer receive targeted, interest-based ads any longer. Apple’s iOS 14 allows app blocking, and you can also express your choice on Android devices.
Otherwise, use browser ad blockers, such as AdBlock Plus, or JavaScript blockers, such Ghostery, to limit ad tracking. Also known as content blockers, these software programs prevent ads from showing on websites you visit. You can find ad blockers for Chrome, Firefox, Opera, Safari, and Internet Explorer.
Check your permissions
Watch the permissions you give apps. We have already talked about checking device settings, but you can also limit the permissions you give to apps. For example, social media accounts have privacy settings that allow you to control what’s logged about you.
Plus, check permissions for other apps. Clash of Clans doesn’t need location services, for instance. Or you might not want to give Slack access to your microphone and video recordings.
Use webcam covers
Covering your webcam stops someone from potentially seeing and recording you. If you think you’d see the light come on to show the webcam is in use, know that hackers can disable that. A simple sliding webcam cover closes the webcam when you are not using it to avoid a cybercriminal having access.
Covering your webcam can also come in handy in all those online meetings you’re having. A covered camera means you don’t run the risk of your colleagues catching you unprepared.
Limit information you provide
Social media has created a culture of oversharing. There are probably many things you’ve seen about friends online that you would rather not know. You’re also sharing more than you need to with the companies that you interact with online.
If you’re filling out a form for a download, you might fill out only the required fields. When you add an app, be stingy with your personal details. Think about it from a need-to-know perspective. For instance, that home design game you love to play doesn’t need to know where you went to high school or with whom you bank.
Need help keeping the privacy-busting algorithms at bay? We can help. Our IT experts can configure device settings to limit information gathered about you online.
Setting Your Scholar Up for Online Learning – Schools around the world have closed their doors during the COVID-19 crisis, students from kindergarten through graduate school are being asked to learn online. It’s a change for everyone, but having the right technology in place can help with the transition.
Your student may have been using the Microsoft Office suite of software at school. If you don’t have Microsoft Word, Excel, and PowerPoint at home, check if your school is providing licenses or free software.
If not, buying a subscription to the online Microsoft 365 package allows you to pay monthly or yearly, and it’s much more affordable than in the past. One month is about the cost of two cafe coffees.
Otherwise, your student may be able to get work done using Google’s suite of tools. Teachers may accept links to Google Docs, Sheets, or Slides. These free options are also useful when your student needs to work on a group project. People can collaborate online in real-time using the G-Suite software.
Teleconferencing with Teachers and Peers
Your student is likely to need to download teleconferencing software such as Zoom or Skype. Beware! Cyber-criminals take advantage of every opportunity. Noticing the increased demand for these services, they’ve set up bogus sites. Make sure that you are downloading from the legitimate sources: www.skype.com or www.zoom.us.
While we’re talking about teleconferencing, you might pass on these best practices:
Use headphones to limit audio distractions.
Join calls from a low-traffic setting with simple backgrounds.
Ask others at home to avoid downloading, streaming, or backing up while the student is live online.
Connect to the router with a network cable, or at least be as close to the wireless router as possible during the call.
Considering Cyber-security
In addition to setting up fake teleconferencing sites, cyber-criminals have other ways to exploit the situation.
Remind any students learning from home that they need to keep their username and password private. This is a lesson that never gets old.
Are you still using Windows 7 on a home computer? This popular operating system (OS) reached the end of its life in January 2020. Yes, it may still work, but it is no longer receiving security updates from Microsoft, and the bad guys know Windows 7 is vulnerable. Continuing to use this OS puts you at risk. Without new upgrades, you’re no longer protected from vulnerabilities or exploits.
You probably already know to avoid using public wireless networks. Although your students can’t go to a coffee shop or public library right now to get online, reminding students to secure their online activity is critical.
This is a good time to review your WiFi setup. Too many homeowners don’t change the default username and password on their routers. Big mistake. You should also:
hide your WiFi network from public view;
set your network up to encrypt transmissions;
update router software regularly.
A Focus on Learning
There’s one more thing parents and guardians might consider. At school, the computers prevent students from going to certain sites or downloading files, but you may not have the same blocking and filtering set up on your home devices. This can be addressed in settings.
If you have to share a computer, set up a student-specific user profile to:
prevent your student from getting distracted during learning;
limit exposure to malware and cyber-threats;
avoid them accessing any of your work files.
You may feel isolated during the coronavirus quarantine, but you’re not alone. Our tech experts can help you set up and secure your technology for work or school from home. Give us a call today at (651) 456-8655 or visit our Contact page.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.AcceptNoPrivacy policy
Recent Comments