Keep in Touch While Social Distancing – Quarantine doesn’t have to mean you’re on your own all the time. Sure, back in the days of the plague or pox, people were stuck. But now, we have technology to let us remain connected even while social distancing. Here’s a roundup of top options for fun with family and friends.
You can’t have an actual party at your home right now, but a virtual house party could be fun.
The Houseparty app (houseparty.com) allows up to eight people to connect online in a video chat “room.” There’s no need to call people (like on FaceTime) – you get a notification when friends are online. Plus, you can switch between rooms easily. It’s like wandering from the kitchen into the backyard.
Zoom (zoom.us) is another app that lets you have a virtual get-together. Only the host needs to have a Zoom account, and the other participants follow the link to the video conference. Free meetings are capped at 40 minutes, though, for groups of three or more.
If your friends and family are on Google, you can bring up to 150 of them together in a Google Hangout (hangout.google.com). Long a go-to for international calling, Skype is another video chat option.
Social Distancing Chat
Maybe you want to catch up but really don’t need to see each other’s faces. Perhaps you don’t want to have to get dressed!
Take texting up a notch with Slack (slack.com), which can keep clubs and teams together during quarantine. You can easily share files, instant message, share gifs, and also jump on a video call.
Discord (discordapp.com) is another app that combines text chat, voice chat, video chat, and more. A favorite already with gamers, Discord offers helpful templates to get started. People also use this app to live-stream art creation, read stories, play music together, and even host digital conventions.
Nextdoor (nextdoor.com) helps you connect with your neighbors. Did you see a coyote? Want to know when garbage pickup is coming this week? Hosting a virtual garage sale? This is social media specific to your ‘hood – and you don’t have to go out of doors to get caught up.
Movies with Friends
Another way to chill together online is by enjoying a movie or binge watching a TV series.
With Watch2Gether (watch2gether.com) you can create a room and invite friends and family to watch YouTube, Vimeo, Dailymotion, and SoundCloud. You could even use this app to replicate the group gym class experience. PopSugar, for instance, offers a wide range of free videos available on YouTube.
If you have a Netflix account and a Google Chrome browser, you can tune in together with Netflix Party (netflixparty.com). The app lets you chat back and forth while viewing. The best thing is that all party members are watching the video in sync. No one ruins that big moment by texting a response a few seconds early!
Other Great Options
Looking for more active virtual fun? With Rave (rave.io) you can host a virtual dance party. You can sync music videos from YouTube, Vimeo, Reddit, Google Drive, Dropbox, and Viki with friends in real-time, or create a playlist of songs, then text and video chat simultaneously.
If you’re wishing you could meet someone new, try Quarantine Together (quarantinetogether.com). This dating app starts out by asking you if you’ve washed your hands today. Then, it will match you with someone else for a text chat. After 20 minutes of texting, you’ll be sent a video chat URL.
Really, there’s no excuse for being a hermit during quarantine – unless you want to be, of course!
If you need help setting your devices up with any of these apps or the video or voice technology, our experts can help – remotely. Contact us today at (651) 456-8655 or visit our Contact page!
Steer Clear of Coronavirus Scams (4/9/2020) – With the world grappling with a health pandemic, scams are shocking. Regrettably, bad actors are everywhere, always looking for opportunities, and they’re seeing one in the Coronavirus. This article outlines what you need to watch out for and how to stay cyber safe.
The last thing you want to read right now is that there’s another threat out there – sorry, but it’s true. Cybercriminals take advantage of fear. They take timely concerns and use them to target victims. Using the anxiety and upheaval around Coronavirus is their mission.
So far, several Coronavirus-related attempts to cyber-scam people have been reported. There are examples of:
emails that appear to come from government health departments;
offering a tax refund to get people to click on malicious links;
memos to staff that appear to come from large employers;
COVID-19 test offerings from private companies;
fake websites promising to sell face masks or hand sanitizer;
soliciting donations to help fund a vaccine.
What to Watch Out For
Another concern is the number of bogus websites registered with names relating to COVID-19. The site can look legit but is set up to steal information or infect the victim’s computer with malware.
You may get an email promising the attached information offers Coronavirus safety measures, or information shared by the World Health Organization (WHO) if you click on the link, or a similar email pretending to be from a reputable news source, such as the Wall Street Journal (WSJ).
In another example, an email impersonating a healthcare company’s IT team asked people to register for a seminar “about this deadly virus.” Anyone who didn’t question why IT was organizing the meeting clicked to register. By filling out the form, they gave their details to hackers.
What to Do
Be cautious. It’s understandable that you’re anxious, but don’t let that stop you from taking cyber precautions. You should still:
be wary of anything that tries to play on your emotions and urges immediate action;
question where emails are coming from – remain vigilant even if the communication appears to come from a reliable source;
hover over links before clicking them to see where they will take you – for example, in the WSJ example, the Web address was for the “worldstreetjournal”;
avoid downloading anything you didn’t ask for;
doubt any deals that sound too good to be true (“a mask that stops the virus 99.7% of the time!”);
ignore any communications requesting your personal information;
don’t be suckered by fraudulent pleas for charity.
Global health organizations generally do not send out emails with advice. Instead, navigate directly to that reputable health institution for real news.
If you’re still not sure about the validity of the communication, check it out. Do so by calling or using another medium to get in touch with the “source” of the received message.
While there is not yet a vaccine for COVID-19, you can put anti-virus protection on your computer. Also, make sure that you’ve applied all available security updates to keep your software safe.
We hope you’ll take care and stay healthy both physically and online in these tough times.
Need help installing security software and keeping your technology safe? Our cyber-security experts can give your home a tech immunization. Contact us today at (651) 456-8655 or visit our Contact page!
Requesting Service During Minnesota’s COVID-19 Shelter-in-Place Order – Minnesota Governor, Tim Walz, has ordered Minnesotans to stay home except for essential needs during the period of March 27th – April 10th. Department of Homeland Security CISA has classified IT Support Providers as Essential Critical Infrastructure Workers.
During this unprecedented time, your home PC is considered an essential tool. Many are using their home PCs to work from home, for child education, home banking, shopping, paying bills, etc. That being said, Twin Cities PC Repair will remain open to serve our clients in the event you have issues with your PC..
For more information on Essential Critical Infrastructure Workforce, visit the DHS HERE.
Due to limited secretarial staffing at our offices, If you require sales or support, we are asking our clients to do one of the following prior to visiting our offices:.
1.) Call our office at (651) 456-8655 to arrange a pick up, drop off or remote support session.
A Custom-Built Computer Can Be a Good Deal – Big-box stores have big names and aisles of computers on offer. They post tempting deals on pre-built computers. But how does buying one of those computers compare to purchasing a custom-built one?
When you shop in a big-box store, you are one of the many people those salespeople are going to work with in a day. If you’re lucky, you may get to speak with someone actually assigned to the computer area on a regular basis.
Working with us to customize a computer, you get individualized expert service. Our specialists know computer users have different needs. You deserve a computer that matches what you’re trying to do. You might want to run the latest-and-greatest games at full graphic quality. Someone else wants something basic to support only email and Web surfing. Or how about a stock day trader who doesn’t need a fast computer but wants to run six screens at once?
It may be easier to walk into a big-box store and walk out with a desktop computer, but the big-box computer aims to appeal to everyone; it isn’t customized to each of these different aims.
Problems with Pre-Built Computers
The computers sold for less in big-box stores have cut corners to bring down costs. They can use lower-quality parts. There’s also limit to upgradability of the parts. Prebuilt brand-name systems often use proprietary parts unique to that manufacturer. This makes it difficult and expensive to replace a part.
You could end up saving money by paying for a system that has only 4 GB of RAM. Sure, the sticker price was lower, but your computer won’t run as well. Today, you need a computer with at least 8 GB of RAM. Depending on how you plan to use the computer, we might even suggest 16 GB.
The big-box stores sell computers from brand-name manufacturers pre-loaded with bloatware. The manufacturer keeps prices down by installing unwanted software in return for kickbacks. So, you paid less, but your computer runs slower from day one because it’s brimming with software you didn’t want. A customized computer comes only with what you need.
Our specialists can explain the benefits of the processing, power supply, and other parts. Picking every part of your computer, you can also count on high-quality parts that are easy to upgrade.
A Personal, Expert Relationship
Another selling point for big-box stores is the warranty. This is one more way they’re making money off the sale of your computer. But keep in mind that most of these stores aren’t going to fix your computer on-site. You explain your problem to a retail employee – again, maybe someone knowledgeable about computers (fingers crossed). Then you wait as the computer gets sent into a central repair base, where someone you haven’t spoken with is working on your computer. Then you wait for the computer to come back, hopefully fixed. Something that would take our experts 30 minutes to fix has you waiting a week. That’s a big deal if you depend on that computer on a daily basis.
When you buy from computer specialists, you’re working with a qualified computer technician. You’re building a relationship with someone who knows you and your computer, and you’ll always know where your computer is during the repair process. Additionally, since all parts are hand-picked, you might enjoy individual part warranties.
Building your own computer in the past was expensive, but today there are many more high-quality parts available. Your computer customizer can offer you affordable, reliable cases, RAM, hard drives, fans, GPUs, CPUs, and cooling, and they can help you weigh the benefits of each.
Whether you’re looking for an entry-level or high-end gaming machine, we can customize the best computer for you.
Why settle for a standard, pre-built option made to appeal to the largest number of people? Contact our experts today to start putting together your purpose-built, personalized computer. Call (651) 456-8655 or visit our Contact page.
The Advantages of Ad Blocking – Unless you’re in the advertising business, you probably try to avoid ads. You pay extra to stream ad-free content online. You leave the room if you are actually watching live TV shows with ads. You filter spam out of your inbox. You immediately click out of ads on the Web pages you visit. But are you actively blocking online ads? You should be. They are more than an annoyance. They could be a security risk.
Cyber-criminals are smart and savvy crooks. They don’t advertise what they are doing, and it’s not that easy to spot, but they do buy legitimate ad space to lure users to malicious sites.
Malvertising uses legitimate online advertising networks to target you with malicious code. Sites you know and trust that use legitimate ad networks can end up serving up the malicious ads. Cyber-criminals have run ads on the New York Times, Spotify, and the London Stock Exchange redirecting to malicious websites.
Adware is another risk. Packaged with legitimate software, adware runs on your computer without your knowledge. It displays unwanted advertising, redirects search requests to ad websites, and mines your data.
The cyber-criminal wants to steal your ID, or your financial and contact data, or to encrypt your information, spy on, or hijack your computer.
They can do this with exciting ads ($9 iPads?!) or alerts (often warning about infections) to get your click. But they can also take a drive-by download approach. In these cases, you don’t even need to click on anything. You load the Web page hosting the ad (or malicious pop-up window). You’re directed to a page that finds browser or software security vulnerabilities to access your machine.
Protecting Against Malvertising
Keep your software up to date, and run antivirus checks to protect against downloads and malicious code. Avoiding Flash and Java helps too, as they are commonly exploited by malvertisers.
Cyber-criminals mostly target Windows users, because the huge user base gives them the best return on investment. But Macs are just as vulnerable to malvertising attacks. — MalwareBytes
Installing an ad blocker plugin prevents the ad loading in the first place. These take away the annoyance of ads and help you avoid falling victim to a malicious attack hidden in an ad.
At the same time, you will enjoy cleaner Web browsing, and you won’t have to worry about distracting ads flashing at you while you read.
Your pages will also load faster. The ads often run a lot of code on top of the website code your computer needs to read and load. The images or video, for instance, can make a difference to data usage. So, the less you have to load, the faster you’ll get to the content you wanted. This can also help to preserve the battery life of your mobile devices!
There are some other considerations, though. For one, not all ad blocker plugins can be trusted. Some will mine your data and sell it to advertisers, which is exactly what you don’t want happening.
Also, some websites won’t load correctly without the ad code. You can turn off ads on a site-by-site basis. After all, some free sites that you frequent might rely on ad revenue, so there may be sites you trust that you want to support by turning off your ad blocker just for those sites.
Always think before you click. Updating browsers and plugins and installing ad blockers can also help.
For the peace of mind that comes with ad blocking and keeping your computer security current, give us a call at (651) 456-8655 or visit our Contact page. We can help set you up to enjoy a safer online experience.
OK Google, How Safe Are You Really? Are you prompting Siri, Google, or Alexa? When you talk to a home assistant, you join a growing number of smart homes.
Smart home assistants search online, start phone calls, order groceries, play music, turn lights on. All with a single spoken command.
Research into how people use Google or Alexa demonstrates the core features. Listening to music ranked first. Checking weather and asking for general information rounded out the top three. Setting timers and reminders, asking for the news or jokes (perhaps to make up for the news?) are also common.
Yet, the question remains, just how safe are these virtual assistants? After all, having a smart speaker in your home means there is always an open microphone in your house.
Smart Speaker and Home Assistant Safety Concerns
The convenience of the speaker demands that it always be on, ready and waiting for you to say “Hey Siri” or “OK Google.” Once triggered the device records the command, sends the data to servers for processing, and figures out its response.
Smart speaker users can log in to view the history of queries on their accounts. This prompts some concerns that these mega-companies will use the information for financial gain. For example, those talking about an overseas holiday might start seeing related ads on their computers.
Someone hacking into the home assistant to gain access to your personal information is another concern. Those who set smart speakers as a hub for many devices also create more points of vulnerability.
It’s difficult to anticipate all the ways the assistant could prove too good a listener. In one case, a voice assistant recorded a private conversation and sent it to the couple’s contacts list.
Steps to Stay Secure with a Smart Speaker
That candid conversation share aside, few big privacy flubs or personal data breaches have been reported. Nevertheless, if taking advantage of Alexa, Siri, or Google helper, keep these strategies in mind.
Clear your history. Don’t leave everything you’ve ever asked it stored on the company server. The assistant will relearn your commands quickly.
Connect with caution. It’s great to be able to turn on the TV and dim the lights without leaving the comfort of your sofa. Be wary of connecting security or surveillance devices to your home assistant.
Mute the microphone. Yes, it undermines your ability to call from the closet “OK, Google, what’s the weather like today?” But, turning off the mic when it’s not in use stops recording without you knowing about it.
Secure your network. Home assistants do their work by connecting to the Internet using your network. Ensure they are accessing a password protected network. They should use devices (e.g. modems) changed from default password settings.
With a little effort you can gain convenience without worry.
Want more questions answered about setting up a smart speaker to be safe and reliable? We’re here to help. Give us a call at (651) 456-8655 or visit our Contact page.
What is the Best Way to Backup? “That will never happen to me.” We get through our lives telling ourselves the worst won’t happen to us. It’s the same with business: “We won’t need this data backup.” Yet, whatever your industry, secure, reliable backup ensures business as usual. So, what’s the best way to backup? Here’s help.
Why You Need to Backup
Business disruptions of any kind can be costly. The disaster might take one of several shapes:
Natural (e.g. wildfires, floods, earthquakes, or hurricanes)
On-site (e.g. hardware/software failure, power outage, inability to access building)
Employee driven (e.g. damaging mistakes or intentional sabotage by a disgruntled employee)
Cyber-attack (e.g. data breach, ransomware, or distributed denial of service attack).
Regardless, the best backup solution can help reduce downtime and damage.
Plan B: Approaches to Backup
There are several off-the-shelf backup options your business can use. Let’s consider the pros and cons of the most popular ones.
USB Thumb Drives — Also known as “flash drives,” “pen drives,” or “memory sticks,” these thumb-sized devices are compact and portable. But, they have size limitations compared to hard drives. Also, the mobility makes them easy to lose (which can actually set the disaster scenario in motion).
Additionally, a USB thumb drive is robust when not plugged in, but more vulnerable when attached. If someone inadvertently snaps the drive or employs too much force, they can put the data on that backup at risk.
The cheap ones also tend to be slow, which can make backing up sluggish.
USB Hard Drives — Portable hard drives increase the data storage available, often at a decent price. They are designed to be compact and mobile. You can prioritize durability, processing speed, storage volumes and more.
Hard drives are less likely to get damaged than a thumb drive. If knocked or jostled, the cables are flexible. Still, a hard drive can be prone to physical failure. Selecting an external solid slate drive (SSD) can help since it has no moving parts. Information is stored instead in microchips.
Cloud Storage — Backing up to the cloud stores data on an external, secure server. If thieves take your computers and USB backup, you can still access your data on the cloud. Cloud storage providers build in redundancy to ensure your backup remains safe.
Most cloud storage services back up to secure centers with thousands of servers storing data. Oh, and they’ll have their own server backups too, just in case they’re the ones hit by a disaster. The providers also encrypt data during transit to further ensure compliance and security.
Migrating to a third-party cloud storage service also cuts the clutter at your premises. You can count on expert help to ensure security and compliance. Plus, you can cut operational costs by offloading in-house storage or external hard drive expenses.
OK, What’s the Best Answer?
Don’t think disaster won’t strike your business. Research has found data loss and downtime are most often caused by:
Hardware failures (45% of total unplanned downtime)
Loss of power (35%)
Software failure (34%)
Data corruption (24%)
External security breaches (23%)
Accidental user error (20%).
We recommend the 3-2-1 backup strategy. This means having 3 copies of your data. Two (2) of these would be located on different devices (e.g. on your computer and on a backup drive). The other remaining backup copy (1) would be secured offsite, in the cloud.
This month, we talk about 5 Common Computer Myths Debunked. Common urban myths would have us believe alligators live in sewers or people put razor blades in kids candy. Common misconceptions about computers are just as persistent. Here are several IT myths debunked for your benefit.
#1 A slow-running computer has a virus
A virus can be to blame. Spyware or other malware can also cause a computer to slow down. However, there are also many other reasons your computer might run slower:
You may have a lot of programs that start up when you boot up the computer. You could remove or disable programs that start every time.
The computer has gone into power save mode every night, but you haven’t rebooted the computer in a long time.
There are many programs running in the background. On a Windows PC, you can go into task manager and see what is running and the computer resources in use.
A security utility is running. If it’s an antivirus scanner, let the scan finish first, then see if your computer speed improves.
Temporary files or other junk are taking up too much hard drive space. Your computer needs at least 200–500MB of free space on the hard drive to be able to move and manage files.
Your computer doesn’t have enough RAM to run programs within memory. If your computer has to swap information on the hard drive to get enough memory to run programs, it’s going to work slower.
The computer is old. You may need to upgrade to a computer that can handle current software needs without slowing to a snail’s pace.
#2 Macs don’t get viruses
Many Apple owners believe their Macintosh computers are immune to viruses. If only. Macs do get viruses; they are simply targeted less than PCs. Why? There are many more computers running Windows, which means a bigger, easier target for cyber-criminals.
As Apple’s market share rises, the threat to Macs is growing. Apple works to protect its users from malware, but you still need to use caution with downloads and when clicking on links from unknown sources.
#3 My Windows registry needs cleaning up
Registry cleaning companies will say that scanning your Windows registry can speed up the computer and avoid error messages. The cleaner finds unused registry keys and any malware remnants for removal.
But let’s consider the fact that Microsoft has not released its own registry cleaner. Why not? Because it’s really not necessary. Worse still, going in to clean your registry (when you don’t know what you’re doing) can actually do serious damage.
#4 My laptop battery needs to be dead before I recharge if I want it to last longer
This was once true. Nickel-cadmium batteries suffered from what was called a “memory effect.” If discharged and recharged to the same point several times, they would remember that point in the future and not go further.
Now, however, laptops typically come with lithium-ion (or Li-ion) batteries. They don’t suffer from this memory effect. In fact, they function better with partial discharge instead of letting the battery run down to zero.
#5 I don’t have anything hackers would want
Cybersecurity should be a priority for everyone, not only sprawling enterprises. Let’s put it this way:
Do you have any money?
Do you have an identity cyber-criminals could use to access money or sell for money?
Do you work anywhere?
Hackers have all kinds of ways to profit from your data or from hijacking your computer’s processing power. They can turn your computer into part of a bot network or use your information as a bridge into a business target’s system.
Keep all your computers at top speed with the best security measures in place with the help of our experts. Contact us today at (651) 456-8655 or visit our CONTACT page!
Many of us have one solution to try when something goes wrong with our computers: turn it off and back on again. When that doesn’t work, we panic: “How am I supposed to do anything?” People often turn to a friend or family member for help in the moment. But computer repair is better left to experts.
Calling tech support (if that’s an option) can be time-consuming and frustrating. So, people turn to the nearest teenager or that cousin with all the latest technological gadgets. Think of it this way, though: Driving a car doesn’t mean you can fix one. Having a lot of cars doesn’t show the owner knows what to do when one of those vehicles breaks down.
Consider the investment you’ve made in your computer. Now, ask yourself: when was the last time I backed up? Please, say recently! If not, think about the value of the content you might lose if the computer is not handled with care.
When a computer expert sets out to investigate the problem, they do so with utmost caution. Before doing anything, they’ll know to make a clone of your hard drive. Then, in identifying and solving the problem, they know what is safe to try. They also know what actions to avoid.
The Price of Amateur Fixes
Your family/friend tech support might turn to the internet for help. Sure, Google and YouTube will provide some answers, but context matters. Will your oh-so-helpful friend know which answers are relevant to your situation? Trying different things can be dangerous if the approach isn’t suited to the problem.
Ask any computer repair expert. They’ll have stories to tell about computers “fixed” by amateurs who made the problem worse. They may even have lost data along the way.
Just as you wouldn’t turn to the Web to diagnose cancer, don’t trust just anyone with the health of your computer. Computer repair may look simple, but expert decision-making determines the best solution.
As with most jobs, computer experts draw upon specialized training and hands-on experience. They’re also up on the latest threats, technologies, and solutions. This helps them to diagnose the problem more quickly. They can go in and fix the problem right away, because they’ve seen it before read about the problem. Or perhaps they have colleagues who have done something like this before, or they’ve researched the technology to identify different options. Can your Aunt Sue or friend Frank say the same thing?
Think also of your typical answer when someone asks you for help. You’re human. You want to help, even if you don’t actually know that much about the problem. So, when you ask a family member, they’re likely to say, “sure.” Even when they should be saying, “I don’t know how to fix that.”
When friends admit the repair is beyond them, you’ve already wasted time letting them take a crack at it. Worse, they may actually break your computer or lose important files. You have to go to the experts now for that new part or in the hope of retrieving the data. Meanwhile, you’re not feeling so friendly towards the person who created the new problem, are you? They may also feel annoyed that you didn’t pay them for their services.
Don’t jeopardize your relationships, and avoid doing more damage to your computer. Bypass the friend/family tech support solution and turn to the professionals first.
Fixing a computer isn’t always simple. Get expert help to preserve as much data as you can, and avoid expensive replacements as long as possible.
Have computer problems? We can help. We do computer repairs for a living! And our experts are friendly, too.
Maintain your computer without lifting a finger with Twin Cities PC Repair’s Residential Managed Services! For a device that’s supposed to make life easier, computers sure do involve a lot of work! There’s so much to keep track of that it’s no wonder most people push ahead and forget the routine maintenance until something breaks. Of course, the problem with being reactive is the damage is already done. Photos and files get lost forever in a crash, and information gets stolen in a hack…by then it’s far too late. It’s a bit like closing the gate after the horses have already fled. This is where proactive people come out on top. Thousands upon thousands of homes around the world are using managed services to put computer problems firmly behind them. It’s a done-for-you maintenance program we offer, and here’s why it’s the best choice.
You’re always up to date. It seems like every second day there’s some new and urgent update waiting to be installed. Whether they’re patching security flaws or adding new features, they seem endless. Sometimes, it goes beyond inconvenient, it gets overwhelming! Even if they do install automatically, they tend to do it at the worst possible moment, leaving you to wait up to 30 minutes when all you wanted to do was quickly check your email. Using our special managed services software, we can make sure your computer’s updates are all finished and done – before you sit down to use it. As part of our service, we also make sure all updates are compatible not just with your hardware, but also with your other software. After all, updates are supposed to make your experience more secure and more enjoyable! Let Twin Cities PC Repair maintain your computer’s Windows and third-party updates & patches.
You’ve got super anti-virus. The best anti-virus is the one that’s up-to-date and running, yet you’d be surprised how many people switch it off or never let it update. While you might be in the habit of scanning files and browsing safely, others in your home might not have the same priorities. Having managed services ensures your anti-virus is always running and dealing with any viruses it finds. As soon as a new virus becomes known, we make sure your system is actively protected against it. We also monitor for cyber-attacks and can alert you before they become a problem. Twin Cities PC Repair utilizes an award-winning lightweight Antivirus software named Emsisoft to maintain your computer safely and securely without hogging system resources.
Your hardware stays healthy. While a reactive person is always suddenly stuck without a computer when hardware fails, proactive people with managed services have already had the problem fixed. Our special software monitors the health of your hardware, eg, your hard drive, looking for early warning signs of failure. If detected, we can let you know in advance. This means you’re able to get it repaired at your convenience, making sure no files are lost and no other hardware is damaged in a domino failure. Let Twin Cities PC Repair keep tabs on and maintain your hardware to ensure a clean bill of health!
You never miss a backup. The worst part of a crash or hack isn’t the financial cost, it’s losing your files forever. Many people have their entire collection of photos stored on their computer, plus important family files, most of which can never be replaced or recreated. Whether it’s a report just created, a recipe handed down for generations or a novel you’ve been working on for longer than you’d care to admit, managed services ensures your backup is working correctly. Backed up files are ready to go when you are, and losing files to corruption, failure or theft is a thing of the past. We’ll maintain your backup sets and make sure they are in safe keeping!
Support is a click or phone call away. Just got a new printer and it won’t play nice? Got a weird error popping up? Your laptop won’t talk to the WiFi? Our remote support team can help with whatever technology issue has been bugging you and wasting your time. No nonsense advice is just a click or phone call away, and our team can remotely connect to diagnose and fix many problems. This means you can likely skip the cord shuffle and carting your computer into the shop, and still get your most pressing computer issues fixed. If you sign up for our Residential Managed Services, you will have a convenient communication app right on your desktop which communicates directly to your technician.
You’re always optimized. Whether your computer is acting up or not, our monitoring service can keep in touch with your event logs, services and processes and look out for anything that needs correction. This means we’re effectively stopping problems before they get to you, making sure that when you sit down to use your computer, it’s doing exactly what you want.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.AcceptNoPrivacy policy
Recent Comments