Steer Clear of Coronavirus Scams (4/9/2020) – With the world grappling with a health pandemic, scams are shocking. Regrettably, bad actors are everywhere, always looking for opportunities, and they’re seeing one in the Coronavirus. This article outlines what you need to watch out for and how to stay cyber safe.
The last thing you want to read right now is that there’s another threat out there – sorry, but it’s true. Cybercriminals take advantage of fear. They take timely concerns and use them to target victims. Using the anxiety and upheaval around Coronavirus is their mission.
So far, several Coronavirus-related attempts to cyber-scam people have been reported. There are examples of:
emails that appear to come from government health departments;
offering a tax refund to get people to click on malicious links;
memos to staff that appear to come from large employers;
COVID-19 test offerings from private companies;
fake websites promising to sell face masks or hand sanitizer;
soliciting donations to help fund a vaccine.
What to Watch Out For
Another concern is the number of bogus websites registered with names relating to COVID-19. The site can look legit but is set up to steal information or infect the victim’s computer with malware.
You may get an email promising the attached information offers Coronavirus safety measures, or information shared by the World Health Organization (WHO) if you click on the link, or a similar email pretending to be from a reputable news source, such as the Wall Street Journal (WSJ).
In another example, an email impersonating a healthcare company’s IT team asked people to register for a seminar “about this deadly virus.” Anyone who didn’t question why IT was organizing the meeting clicked to register. By filling out the form, they gave their details to hackers.
What to Do
Be cautious. It’s understandable that you’re anxious, but don’t let that stop you from taking cyber precautions. You should still:
be wary of anything that tries to play on your emotions and urges immediate action;
question where emails are coming from – remain vigilant even if the communication appears to come from a reliable source;
hover over links before clicking them to see where they will take you – for example, in the WSJ example, the Web address was for the “worldstreetjournal”;
avoid downloading anything you didn’t ask for;
doubt any deals that sound too good to be true (“a mask that stops the virus 99.7% of the time!”);
ignore any communications requesting your personal information;
don’t be suckered by fraudulent pleas for charity.
Global health organizations generally do not send out emails with advice. Instead, navigate directly to that reputable health institution for real news.
If you’re still not sure about the validity of the communication, check it out. Do so by calling or using another medium to get in touch with the “source” of the received message.
While there is not yet a vaccine for COVID-19, you can put anti-virus protection on your computer. Also, make sure that you’ve applied all available security updates to keep your software safe.
We hope you’ll take care and stay healthy both physically and online in these tough times.
Need help installing security software and keeping your technology safe? Our cyber-security experts can give your home a tech immunization. Contact us today at (651) 456-8655 or visit our Contact page!
Requesting Service During Minnesota’s COVID-19 Shelter-in-Place Order – Minnesota Governor, Tim Walz, has ordered Minnesotans to stay home except for essential needs during the period of March 27th – April 10th. Department of Homeland Security CISA has classified IT Support Providers as Essential Critical Infrastructure Workers.
During this unprecedented time, your home PC is considered an essential tool. Many are using their home PCs to work from home, for child education, home banking, shopping, paying bills, etc. That being said, Twin Cities PC Repair will remain open to serve our clients in the event you have issues with your PC..
For more information on Essential Critical Infrastructure Workforce, visit the DHS HERE.
Due to limited secretarial staffing at our offices, If you require sales or support, we are asking our clients to do one of the following prior to visiting our offices:.
1.) Call our office at (651) 456-8655 to arrange a pick up, drop off or remote support session.
Thank you for your business and the opportunity to serve you. I wanted to personally share an update on our efforts to help keep our operations up and running during the Coronavirus (COVID-19).
Twin Cities PC Repair is closely monitoring the latest reports from the Centers for Disease Control (CDC) and the World Health Organization (WHO) and we are taking a number of precautionary measures for the health and safety of our customers and associates. Our goal is to do everything we can to help you keep your computers up and running and people safe during this unprecedented and evolving situation.
We are taking extra precautions to maintain a clean & safe work environment. This includes the wearing of protective gloves as well as thoroughly disinfecting your device before and after we work on it.
We are continuously disinfecting all tools, equipment and work surfaces within our offices.
We have implemented a ticket workflow triage process to determine if a device can be diagnosed and repaired via our secure remote access tools. This could potentially prevent a trip to our office.
All residential onsite visits will be evaluated on a case by case basis before they are scheduled. We reserve the right to halt onsite service calls until the pandemic is under control.
As for now, it’s business as usual until further notice. We certainly don’t want to prevent you from visiting our office. We believe that by following the recommendations of the CDC and our medical professionals, we can all work together to prevent the spread of the Coronavirus (COVID-19). Please take precaution, practice extra personal hygiene measures, and be safe out there.
This crisis is demonstrating that online capabilities are more critical than ever – and so is the high level of support you’ve come to expect from us. If you have any questions or concerns pertaining to our COVID-19 precautionary measures, please don’t hesitate to call (651) 456-8655 or visit our Contact page.
Sincerely,
Patrick Jensen
Owner/Technician
Twin Cities PC Repair
860 Blue Gentian Rd.
Suite 200
Eagan, MN 55121 www.twincitiespcrepair.com
The Advantages of Ad Blocking – Unless you’re in the advertising business, you probably try to avoid ads. You pay extra to stream ad-free content online. You leave the room if you are actually watching live TV shows with ads. You filter spam out of your inbox. You immediately click out of ads on the Web pages you visit. But are you actively blocking online ads? You should be. They are more than an annoyance. They could be a security risk.
Cyber-criminals are smart and savvy crooks. They don’t advertise what they are doing, and it’s not that easy to spot, but they do buy legitimate ad space to lure users to malicious sites.
Malvertising uses legitimate online advertising networks to target you with malicious code. Sites you know and trust that use legitimate ad networks can end up serving up the malicious ads. Cyber-criminals have run ads on the New York Times, Spotify, and the London Stock Exchange redirecting to malicious websites.
Adware is another risk. Packaged with legitimate software, adware runs on your computer without your knowledge. It displays unwanted advertising, redirects search requests to ad websites, and mines your data.
The cyber-criminal wants to steal your ID, or your financial and contact data, or to encrypt your information, spy on, or hijack your computer.
They can do this with exciting ads ($9 iPads?!) or alerts (often warning about infections) to get your click. But they can also take a drive-by download approach. In these cases, you don’t even need to click on anything. You load the Web page hosting the ad (or malicious pop-up window). You’re directed to a page that finds browser or software security vulnerabilities to access your machine.
Protecting Against Malvertising
Keep your software up to date, and run antivirus checks to protect against downloads and malicious code. Avoiding Flash and Java helps too, as they are commonly exploited by malvertisers.
Cyber-criminals mostly target Windows users, because the huge user base gives them the best return on investment. But Macs are just as vulnerable to malvertising attacks. — MalwareBytes
Installing an ad blocker plugin prevents the ad loading in the first place. These take away the annoyance of ads and help you avoid falling victim to a malicious attack hidden in an ad.
At the same time, you will enjoy cleaner Web browsing, and you won’t have to worry about distracting ads flashing at you while you read.
Your pages will also load faster. The ads often run a lot of code on top of the website code your computer needs to read and load. The images or video, for instance, can make a difference to data usage. So, the less you have to load, the faster you’ll get to the content you wanted. This can also help to preserve the battery life of your mobile devices!
There are some other considerations, though. For one, not all ad blocker plugins can be trusted. Some will mine your data and sell it to advertisers, which is exactly what you don’t want happening.
Also, some websites won’t load correctly without the ad code. You can turn off ads on a site-by-site basis. After all, some free sites that you frequent might rely on ad revenue, so there may be sites you trust that you want to support by turning off your ad blocker just for those sites.
Always think before you click. Updating browsers and plugins and installing ad blockers can also help.
For the peace of mind that comes with ad blocking and keeping your computer security current, give us a call at (651) 456-8655 or visit our Contact page. We can help set you up to enjoy a safer online experience.
Is Your Printer an Ink-Sucking Monster? – How long have you had your home printer? Maybe you have a printer that came as a package deal with your desktop or free with your laptop purchase. Look in many home offices and you’ll probably see a less-expensive inkjet printer sitting beside even the swankiest monitor. Here’s why it’s time for an upgrade.
You should know that printers are often sold at cost or even as a loss leader (below cost to get your business). After all, once you get that cheap/free inkjet printer, you’ll pay for ink cartridges for the life of the printer. To make sure they get your money, manufacturers often sell new printers with half-empty ink cartridges from the start!
You’ve heard “you get what you paid for,” right? Well, that’s definitely true for low-cost printers. Manufacturers are cutting production costs to keep the price down. These printers are not built with longevity in mind. Printer owners encounter all kinds of problems:
multiple sheets pulled from the paper tray at once;
paper jams;
slow printer response;
drop off in print quality;
ink smearing.
Frustrated customers soon discover they’ll pay more to fix their printer than they would to buy a new one.
Upgrading to an office-grade printer
Our solution? High-performance commercial printers. Office-grade printers are designed as work horses. These robust printers are built to withstand heavy use with speed and reliably. Yes, they cost more, but they are also less prone to problems and more likely to be a long-term valuable addition to your home office.
You’ll have many printer profiles to choose from. You might select a printer based on its pages-per-minute printing speed. Or maybe you want a larger paper tray capacity and bigger ink cartridges. Depending on your needs, you might want a printer that allows for simultaneous operation. That would let one person print while another is able to scan or copy. Built-in Wi-Fi could also be useful in small home offices if you’re tired of tripping over so many unsightly cords.
While you’re in the market for a new printer, know that we recommend laser printers over inkjet. Laser printers use a dry toner rather than wet ink. The toner cartridges are more expensive, but they print more sheets per cartridge than inkjets, plus, toner doesn’t dry up like ink. And you don’t have to worry about the printer heads getting blocked.
Lasers print faster, and you’ll have fewer problems, which means these printers are typically less expensive to operate long-term.
Inkjet printers typically have a minimum life span of three years, whereas you can expect a laser printer to last five years, although this will depend on frequency of use, of course.
When looking at laser printers, give serious thought to whether you need a color printer. How many times do you actually use color? Does it merit the added expense of that option? People who are printing photos at home only occasionally could probably get their images printed professionally for less overall cost.
Prioritize your printer
Even in our increasingly digital world, there are still times when we want to print. Whether it’s a family photo, school report, resume, or slide deck, you want to count on your printer for high quality and reliable performance.
There are many, many office-grade printers to choose from, and it can become overwhelming. What and how much you print should factor into your decision.
Computer cleaning for the new year – The new year can mean resolutions and promises for a “new you.” One way to start this year feeling more in control is to clean up your computer. Follow these simple steps!
Tackle the inbox
We do a lot of shopping at the end of the year. Whether you shop online or in stores, you’re asked to provide your email address when you buy, which multiplies the number of mailing lists you’re on. Don’t start the new year deluged by unwanted newsletters and advertising emails.
The extra messages in your inbox distract you from the messages that matter. Instead of deleting every new unread message from “Let’s Make Cookies,” click on one and unsubscribe. Usually, there’s a link that lets you do this at the bottom of the email. If you’re a Gmail user, start your effort to cut down on unwanted mail in your Promotions tab. Google’s algorithm sends sales pitches here, so cut messages from this section first.
Clear bookmarks
The internet is built for browsing. We’ve all lost hours to clicking and linking in this vortex of information. “Wait. How did I end up here looking at kittens eating cupcakes?!” To make things easier, we’ll bookmark sites we visit often or put a page we want to return to on a reading list.
By the end of the year, we have marked many sites that we don’t even remember favoriting in the first place. “When was I interested in this?” Getting rid of any bookmarks for passing interests can help you navigate the Web better this year.
In Google Chrome, click on the three dots in the upper-right of your browser window (to the left of your profile icon). The drop-down menu will have a Bookmarks option. Click on this to see another drop-down menu with Bookmark Manager on it. On the next screen every one of your bookmarks will have three dots beside it. Click on this to select the delete option, and get rid of the ones you don’t need any longer.
Safari users can click on Bookmarks on the top menu or the sidebar icon on the tool bar (to the right of the arrows on the left). Then edit your bookmarks by clicking on sites you no longer want and hitting your delete button.
Sort through downloads
We also download a lot of stuff in a year. Sometimes, because we’re impatient or don’t realize we’ve already hit download, we get multiple copies of the same file! A full download folder takes up storage space on your computer and can slow your computer down.
On a Mac, go to the Finder and click on Downloads on the “Go” drop-down menu. You’ll find a folder filled with .pdfs, .docs, and .jpegs you long forgot about. Click on those you don’t need any more and drag them to your trash can.
On Windows, you can usually go to the “This PC” icon and then the “Downloads” Folder. Right-click on the files you don’t want, and choose “Delete.”
Empty trash/recycling bins
Items you put in the trash or recycling bins at home take up space until you take those bins to the curb or the dump, and the same is true of your computer trash or recycling. Empty these bins by selecting “empty trash” on your Mac Finder menu, or “empty recycle bin” after clicking on the bin icon in Windows 10.
Remove unused programs/apps – If you’re not using a program or app, don’t give it computer space. On a Mac, you can click on the icon for that program and drag it to the Trash. With Windows, you’ll open the Start menu, click on Settings, then System, then Apps and Features from the left pane to select what you want to uninstall. Click the uninstall button, and you’ve de-cluttered your computer that little bit more for the new year.
Why You Need Professional Virus Removal. “Your computer has a virus.” Such a dreaded five words! We don’t want to come down with a human virus; we’ll feel awful and miss work. But when a virus hits our computer, we could lose valuable information or be vulnerable to attack. Chicken soup won’t cut it.
Perhaps you have an antivirus product installed on your computer. This computer software is intended to prevent, detect, and remove viruses. Antivirus tools are designed to keep infections out. They can also delete any viruses that may already be on the computer when the software is installed.
The software provides protection by tracking malicious code and other computer threats via:
classifying the actions the file or code drives (as malicious or OK);
inspecting file signatures for matches to an existing signature in its virus dictionary;
scanning for rootkits that can change how your operating system functions.
However, antivirus software isn’t that good at cleaning up. When it detects a malicious file, it will delete it. But what if the virus spread before discovery? If the infection spreads before virus deletion, it can do all sorts of damage.
Think of it this way: you have a cyst on your knee. Doctors decide it is pre-cancerous and operate to remove the cyst before it spreads. But, that’s all they do. They have seen the cyst. They go for the cyst. However, they don’t notice the cancer that’s in your shin or femur, because they were only working on the cyst. The rest of your leg remains unhealthy, and you don’t even know it!
Getting a Second Opinion on Viruses
If the antivirus software is your primary physician, a computer professional is the specialist you go to for an expert second opinion. For one thing, antivirus products don’t always remove all the malicious files. Many viruses start as one thing but can mutate into several different strains. The antivirus software may not be programmed to identify all of the virus variants. A professional actively looks for undetected strains on your computer.
Viruses are always evolving. A recent strain of malware, SquirtDanger, let hackers take computer screenshots, capture passwords, download files, and empty out cryptocurrency wallets.
Some viruses can change the settings of your computer. For instance, a common virus changes your computer’s DNS, which is like a bit like the Yellow Pages for the internet. On a virus-free computer, when you type in “Google.com”, your browser goes to Google’s servers located at the IP address “216.58.203.100.” However, an infection can make Google.com on your computer go to a different address. Perhaps a server address cyber criminals use to capture your personal data. It still looks to you like Google, but it’s no longer safe. These settings can still remain after the infection is long gone.
Viruses can also leave behind browser toolbars, extensions, and other nasties designed to spy on your Web browsing habits. If you’re consistently redirected to unwanted sites, or seeing unwanted pop-up advertisements, it’s likely your computer’s infected with a browser hijacker.
Ultimately, if you detect a virus on your computer, check with a professional. Don’t trust that your antivirus software is going to do the same, thorough job an expert can offer. Sometimes your computer isn’t fully safe until the operating system is reinstalled, but you can’t know that until someone can go in and see what the virus did and what remnants are still there, lurking.
Cyber criminals are growing more sophisticated and better able to design viruses that disguise their tracks. Avoid being an unwitting victim. A computer security expert can diagnosis when your computer gets a virus, or determine if there are strains on your device you don’t know about. Let a security expert protect your computer from harm today! Call us at (651) 456-8655 or visit our Contact page.
3 Top Reasons for Onsite Computer Repair. No one wants to experience computer problems. Whether it’s used for personal or business use, your computer is likely indispensable. Essential customer files are on there! All your downloaded music! The family photos! Vendor contracts and employee payroll information! Compounding the crisis is the hassle of going to get the computer fixed. That’s why we offer onsite repair services.
When You Need Computer Repair
Regrettably, there are common computer problems you might encounter at home or work:
A blue computer screen with some white text, aka the “Blue Screen of Death,” or a STOP error. This one’s scary. It could indicate failing hardware, damaged software, driver problems and more. Don’t know what any of that sentence meant? That’s OK. We do!
Having trouble installing new applications.
The computer is running so slow a turtle would beat it in a foot race.
Your applications are acting possessed and are unpredictable.
The keyboard, mouse, or printer are not working properly.
Your computer keeps restarting on you.
Downloads are taking forever.
You can’t open that attachment from your boss.
The computer freezes or shuts off suddenly.
The graphics on the computer screen look wonky.
Your computer is making noises mimicking an old clunker car.
Troubleshooting these problems to diagnose what is really going on can be challenging. It depends on how much you know about computers to begin with. Since you rely on your computer for so much, it’s a good idea to consult with computer repair experts.
Why Onsite Computer Repair
#1 Convenience.
You don’t need to worry about doing more damage when you unplug everything and drive the computer to a repair shop. You also avoid the commute across town, headache of finding parking, and annoyance of waiting in line. Whether a business office or home, our computer repair experts can come to you.
This is more convenient for you. You don’t have to lug the computer to a store and back only to have to set it up all over again. Your computer stays right where you typically use it. When we’re done, you can just push the power button and get going as if nothing happened.
#2 Context.
Seeing your computer in its natural habitat helps our experts too. Sometimes the issue isn’t internal to the computer. So, we wouldn’t be able to properly diagnose the problem if you brought the computer in to us.
For example, the hiccup could be caused by a faulty power board or misbehaving printer. Unless you thought to bring those into the computer store too, the problem wouldn’t be replicable. And nothing’s worse than going to the trouble of getting help only to say “well, it doesn’t seem to be that annoying thing right now.” That’s when the expert looks at us like we’re crazy and says “next time, just try turning it on and off again.”
#3 Cut Downtime.
When the computer repair service comes to your door, you can also reduce downtime. Whether the computer is essential for homework at home or business services, you probably can’t imagine being without it for a few days. It’s like losing a limb! Onsite computer repair aims to fix the problem in just a few hours, without taking the computer away.
We can handle most repairs onsite. In some cases, it’s more cost-effective to bring the computer back to base. We still save you hassle by dropping the computer back off to you. We’ll also set everything back up again when we return your computer. That way you don’t have to worry about which cord goes where!
We hope you never need computer repairs. But, if you’re ever facing an error message you don’t understand or your computer has ground to a halt, give us a call at (651) 456-8655 or visit our Contact page. Our computer repair service experts will be happy to schedule a time to come to you!
OK Google, How Safe Are You Really? Are you prompting Siri, Google, or Alexa? When you talk to a home assistant, you join a growing number of smart homes.
Smart home assistants search online, start phone calls, order groceries, play music, turn lights on. All with a single spoken command.
Research into how people use Google or Alexa demonstrates the core features. Listening to music ranked first. Checking weather and asking for general information rounded out the top three. Setting timers and reminders, asking for the news or jokes (perhaps to make up for the news?) are also common.
Yet, the question remains, just how safe are these virtual assistants? After all, having a smart speaker in your home means there is always an open microphone in your house.
Smart Speaker and Home Assistant Safety Concerns
The convenience of the speaker demands that it always be on, ready and waiting for you to say “Hey Siri” or “OK Google.” Once triggered the device records the command, sends the data to servers for processing, and figures out its response.
Smart speaker users can log in to view the history of queries on their accounts. This prompts some concerns that these mega-companies will use the information for financial gain. For example, those talking about an overseas holiday might start seeing related ads on their computers.
Someone hacking into the home assistant to gain access to your personal information is another concern. Those who set smart speakers as a hub for many devices also create more points of vulnerability.
It’s difficult to anticipate all the ways the assistant could prove too good a listener. In one case, a voice assistant recorded a private conversation and sent it to the couple’s contacts list.
Steps to Stay Secure with a Smart Speaker
That candid conversation share aside, few big privacy flubs or personal data breaches have been reported. Nevertheless, if taking advantage of Alexa, Siri, or Google helper, keep these strategies in mind.
Clear your history. Don’t leave everything you’ve ever asked it stored on the company server. The assistant will relearn your commands quickly.
Connect with caution. It’s great to be able to turn on the TV and dim the lights without leaving the comfort of your sofa. Be wary of connecting security or surveillance devices to your home assistant.
Mute the microphone. Yes, it undermines your ability to call from the closet “OK, Google, what’s the weather like today?” But, turning off the mic when it’s not in use stops recording without you knowing about it.
Secure your network. Home assistants do their work by connecting to the Internet using your network. Ensure they are accessing a password protected network. They should use devices (e.g. modems) changed from default password settings.
With a little effort you can gain convenience without worry.
Want more questions answered about setting up a smart speaker to be safe and reliable? We’re here to help. Give us a call at (651) 456-8655 or visit our Contact page.
What is the Best Way to Backup? “That will never happen to me.” We get through our lives telling ourselves the worst won’t happen to us. It’s the same with business: “We won’t need this data backup.” Yet, whatever your industry, secure, reliable backup ensures business as usual. So, what’s the best way to backup? Here’s help.
Why You Need to Backup
Business disruptions of any kind can be costly. The disaster might take one of several shapes:
Natural (e.g. wildfires, floods, earthquakes, or hurricanes)
On-site (e.g. hardware/software failure, power outage, inability to access building)
Employee driven (e.g. damaging mistakes or intentional sabotage by a disgruntled employee)
Cyber-attack (e.g. data breach, ransomware, or distributed denial of service attack).
Regardless, the best backup solution can help reduce downtime and damage.
Plan B: Approaches to Backup
There are several off-the-shelf backup options your business can use. Let’s consider the pros and cons of the most popular ones.
USB Thumb Drives — Also known as “flash drives,” “pen drives,” or “memory sticks,” these thumb-sized devices are compact and portable. But, they have size limitations compared to hard drives. Also, the mobility makes them easy to lose (which can actually set the disaster scenario in motion).
Additionally, a USB thumb drive is robust when not plugged in, but more vulnerable when attached. If someone inadvertently snaps the drive or employs too much force, they can put the data on that backup at risk.
The cheap ones also tend to be slow, which can make backing up sluggish.
USB Hard Drives — Portable hard drives increase the data storage available, often at a decent price. They are designed to be compact and mobile. You can prioritize durability, processing speed, storage volumes and more.
Hard drives are less likely to get damaged than a thumb drive. If knocked or jostled, the cables are flexible. Still, a hard drive can be prone to physical failure. Selecting an external solid slate drive (SSD) can help since it has no moving parts. Information is stored instead in microchips.
Cloud Storage — Backing up to the cloud stores data on an external, secure server. If thieves take your computers and USB backup, you can still access your data on the cloud. Cloud storage providers build in redundancy to ensure your backup remains safe.
Most cloud storage services back up to secure centers with thousands of servers storing data. Oh, and they’ll have their own server backups too, just in case they’re the ones hit by a disaster. The providers also encrypt data during transit to further ensure compliance and security.
Migrating to a third-party cloud storage service also cuts the clutter at your premises. You can count on expert help to ensure security and compliance. Plus, you can cut operational costs by offloading in-house storage or external hard drive expenses.
OK, What’s the Best Answer?
Don’t think disaster won’t strike your business. Research has found data loss and downtime are most often caused by:
Hardware failures (45% of total unplanned downtime)
Loss of power (35%)
Software failure (34%)
Data corruption (24%)
External security breaches (23%)
Accidental user error (20%).
We recommend the 3-2-1 backup strategy. This means having 3 copies of your data. Two (2) of these would be located on different devices (e.g. on your computer and on a backup drive). The other remaining backup copy (1) would be secured offsite, in the cloud.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.AcceptNoPrivacy policy
Recent Comments