Archives 2022

Holiday Schedule

In celebration of Thanksgiving, we will follow these hours:

Tuesday – 9:00 am to 7:30 pm
Wednesday – 9:00 am to 1:00 pm
Thursday – Closed
Friday – Closed
Saturday – Closed

Please have a Blessed thankful Thanksgiving!

Anti-Virus/Anti Malware/VPN

Anti-Virus Recommendations

We do not recommend the virus protection that we all hear on the radio and TV. In addition we do not recommend auto renewal because this ensures you will pay the highest price offered.

Virus Software.
1) Trend Micro – We sell the corporate version if this product.
2) Webroot – We sell the corporate version if this product.
3) Kaspersky – A Russian Owned Company No Longer Recommended.

Anti Malware
1) Trend Micro
2) Webroot
3) Malware Bytes Free – Use and uninstall because it is a resource hog.

VPN
1) Nord
2) Express

Computer Passwords

This is a short tutorial on passwords. Passwords are a very important part of security that is often overlooked. Often we keep lists in our desks or in a notebook which is a hacker’s dream. Here are some suggestions that can help you remain safe.

  • Do not use common and easily discovered passwords such as a spouses, kids, or pets name.
  • Use associated words and example of this is PurpleMonkey.
  • Do not use clear text, instead use character substitution. So our example above of PurpleMonkey would become Purpl3Monk3y.
  • Consider using a password manager such as Dashlane or Keypass. These will also create complex passwords for you.
  • Whatever you decide make sure you at least follow the first three rules.

Lock Screen Protection

Lock screen protection is easy security and should be used whenever someone else may have access to your computer. The lock screen is your logon password and may be used to prevent security risk as well as to limit access to your computer.

Security can be to resist prying eyes or to safeguard from improper use. It is important to protect children from the internet. A search for something as innocent as a baby doll can return pornographic results.

Use Two-Factor Authentication

Two factor Authentication is very important particularly when using secure site such as banking. Although it may be inconvenient it provides a level of security that can’t be matched simply by using a password.

The are various forms of to factor authentication including:

  • Pass Code – This is a texted or emailed pass code and a good form of authentication. It is the least secure as if your phone or email is compromised you are at risk.
  • Online Pass Code – This is a service provided by a secure internet connection. It is better then the first because you are required to set up a user name and password. We suggest a complex previously unused password.
  • Fob Pass Code – This is the most secure form of authentication. It requires the user to self generate a pass code at random that is authenticated with the server. The code is secure and regenerated every time you use it. Problems you need a=the fob with you at the time of login. There is additional security as someone would need your user name and password and the fob to access your account. Additionally fobs are generally unlabeled so if you loose it, it gives no hint to what it is used for or your user name and password.

Software Updates

Software updates are an important part of keeping your your computer safe.

Windows Updates

These generally happen every Tuesday automatically. You computer will restart automatically or a yellow dot will appear on the lower left of your task bar.

It can also be displayed on the power button. The restart should be done as soon as possible for system security.

Additionally you should check Windows update by going to Start – Setting – Windows Update one a quarter at least. You can look for optional updates and install them. These are generally feature updates that will, if not installed, eventually effect performance.

Additionally you will want to update application software as this can be an entry point for hackers. Updates are generally offered by the software manufacturer through the the application.

Beware of pop-ups in your web browser offering updates. These are generally phishing operations to compromise your computer. My advice is to right click on the browser on the taskbar and select close. Feel free to contact us for additional information.

Using the Same Password for Everything

Using the same password for every is a common mistake, and one that hackers love! Hackers who compromise your computer system will use passwords stolen on different sites and hope hey strike gold.

Things to avoid

  1. Avoid reusing passwords. Advantage easy to remember. Disadvantage easy to hack.
  2. Avoid familiar things like names and birthdays.
  3. Do use character substitution instead of clear text. HappyDay becomes H@ppyD@y or PurpleMonkey Becomes Purpl3M0nk3y.
  4. Use a password tracking and creation tool such as Keypass or Dashlane.

For more information stop by and see us.

Avoid Bad Computing Habits

Here are some tips for bad habits to avoid when using a computer. They are but no means all the things that should be avoided but hey are a good start. In future posts we will provide more information.

  • Using the Same Password for Everything.
  • Ignoring Software Updates.
  • Downloading Free Software.
  • Not Using Two-Factor Authentication.
  • No Lock Screen Protection.
  • No Computer Password.
  • No Anti-Virus/Anti Malware.
  • Uploading Files to the Cloud with No Precautions.
  • Open and/or Clicking Links in E-mail.
  • Downloading E-Mail Attachments
  • Using Sites Beginning with HTTP://.
  • Checking Anything Personal/Private on Public Wi-Fi.
  • Clicking on Virus Warning Pop-Ups.
  • Using Simple/Sequential Passwords
  • Downloading Files from Unknown Sites.
  • Weak Wi-Fi passwords.

You Can Never Be To Careful With You’re Personal Security!

  • Agreeing to all Terms on Software Installation.
  • Dissmissing privacy Concerns.
  • Using a Cell Phone as a Secure Device.
  • Not using a VPN while on Public Wi-Fi.

Contact us for Assistance!