Small Town Tech, Inc.
  • Home
  • Pro+Tech
  • Partner Client
  • Online Store
  • Backstage
Report Emergency

Email Security: Protecting Your Personal and Small Business Accounts

3/14/2023

Comments

 
Email Security: Protecting Your Personal and Small Business Accounts
Email is an essential communication tool for both personal and business use. It's crucial to protect your email accounts from cyber threats such as hacking, phishing, and spam. In this article, we'll discuss the importance of email security and provide recommendations for both personal and small business users to secure their accounts.
Personal Email Security Considerations
  1. Strong Passwords: Use a strong, unique password that includes a mix of letters, numbers, and symbols. Avoid using easily guessable information, such as your name or birthdate.
  2. Two-Factor Authentication: Enable two-factor authentication (2FA) to add an extra layer of security to your account. This requires a second factor, such as a fingerprint or a code sent to your phone, to access your account.
  3. Be Cautious with Attachments: Be wary of attachments from unknown senders, as they can contain malware or viruses. Before opening any attachments, scan them with your antivirus software.
  4. Watch Out for Phishing Scams: Phishing scams are emails that appear to be from a trustworthy source, but are actually designed to steal your personal information. Look out for emails that ask for sensitive information, such as passwords or social security numbers.
Small Business Email Security Considerations
  1. Employee Training: Train employees on the importance of email security and the dangers of phishing scams. Ensure they know how to identify suspicious emails and what to do if they receive one.
  2. Secure Email Servers: Use a secure email server that includes features such as spam filtering and virus scanning. This will help to prevent threats from reaching your inbox.
  3. Backup Emails Regularly: Regularly backup your email data to ensure that you can recover it in the event of a security breach.
  4. Use Encryption: Consider using encryption to secure sensitive business information. This will help to prevent unauthorized access to confidential information.
Email security is crucial to protect your personal and business information from cyber threats. By following these recommendations, you can secure your accounts and keep your information safe. Remember to be vigilant and cautious when using email, and stay informed about the latest threats to stay one step ahead of cyber criminals.
Comments

Network Security: Protecting Your Digital Assets

3/14/2023

Comments

 

Network Security: Protecting Your Digital Assets

As a managed services provider, we understand the importance of protecting your digital assets. Whether you're a small business owner or an individual, your personal and sensitive information is vulnerable to cyber attacks. In this article, we will discuss the considerations that should be taken for both personal and small business customers when it comes to network security.

Personal Customers

  • Always use strong and unique passwords
  • Enable two-factor authentication on all accounts
  • Keep your software and operating systems up to date
  • Be wary of suspicious emails and links
  • Use anti-virus software and keep it updated

Small Business Customers

  • Implement a strong password policy for all employees
  • Train employees on safe internet practices
  • Regularly back up important data
  • Use a firewall to protect against external threats
  • Consider investing in a managed security service

Personal Customers: A Deeper Dive

Your personal information is valuable to cyber criminals, which is why it's essential to take steps to protect it. One of the most important things you can do is to use strong and unique passwords for all of your accounts. This will make it more difficult for cyber criminals to gain access to your accounts.

Another important step is to enable two-factor authentication on all of your accounts. This adds an extra layer of security to your accounts, making it even more difficult for cyber criminals to gain access.

Keeping your software and operating systems up to date is also critical to protecting your personal information. Software updates often include important security patches that can help protect you from cyber attacks.

Be wary of suspicious emails and links. Cyber criminals often use emails and links to spread malware and steal personal information. If an email or link looks suspicious, don't click on it.

Finally, using anti-virus software and keeping it updated is an important step in protecting your personal information. Anti-virus software can help detect and remove malware that may have infected your device.

Small Business Customers: A Deeper Dive

As a small business owner, you have a responsibility to protect the sensitive information of your customers, employees, and business. Implementing a strong password policy for all employees is a good first step. This policy should require employees to use strong and unique passwords and regularly change them.

Training employees on safe internet practices is also critical. Teach them to be wary of suspicious emails and links and to never share sensitive information over email or instant messaging.

Regularly backing up important data is also essential. This will ensure that you can quickly recover from a cyber attack or other disaster.

Using a firewall to protect against external threats is another important step for small business owners. A firewall can help block unauthorized access to yournetwork and protect your sensitive information.

Finally, consider investing in a managed security service. A managed security service can provide ongoing protection for your network and help you respond quickly to any security incidents that may occur.

Conclusion

In conclusion, protecting your digital assets is critical, whether you're a personal or small business customer. By following the considerations outlined in this article, you can help protect yourself from cyber attacks and keep your personal and sensitive information safe.

Comments

Press Release Nov 15 , 2021

11/16/2021

Comments

 
Picture

Find out more about our managed services!

Partner Client
Pro+Tech
Change in services.

Since its inception, we at Small Town Tech have worked hard to meet the technology needs of our community.  Our business model has expanded to include retail, fire and burglar alarm monitoring, electronic repair, managed antivirus (Pro+Tech), managed business services (our Partner Client program), technology systems installations, equipment rentals, website design, and a T-Mobile Authorized Dealer (coming in December).

Over the past year, we have reassessed our business model and reviewed the combination of services we offer to best meet our customers' needs while remaining profitable.  After all, if we don’t stay in business then we can’t help anybody!
Starting today we are shifting our main focus to our managed services programs. This includes our residential and business Pro+Tech and Partner Client programs.

As part of this change, we will now only be providing repair services and technical support to devices enrolled under those service programs.

Our retail offerings will continue to grow.  We are excited to be adding T-Mobile phones and service packages in late December.

This decision has not been made in haste.  The global technology landscape is changing and cybersecurity threats are increasing rapidly.  Our new focus on managed services helps us align better with our customers’ needs.
​

We look forward to a long future helping to strengthen and support our community.

Comments

Why You Might Wait to Upgrade to Windows 11

10/30/2021

Comments

 
Picture
Microsoft is rolling out the next iteration of its operating system, Windows 11. Of course, new = better, right? But, when it comes to Windows 11, you may want to consider waiting. Here’s why.

Typically, software updates are something to install as a matter of course. The manufacturer, after all, is delivering the latest and greatest in its upgrade. This can be new efficiencies, improved processes, and increased security.

CNN calls the Windows 11 release “the biggest update we’ve seen to Microsoft PC software in more than half a decade.”

But when it comes to Windows 11, do some research first. You may not want to be an early adopter.

When to Upgrade

There are still people using Windows 7, even though the system is no longer supported by the manufacturer. That, we do not recommend. Without support or security updates, these systems are vulnerable to malware attacks.

Meanwhile, the release of Windows 11 indicates Windows 10 is on its way out. Yet Microsoft has said it will support Windows 10 until October 14, 2025. The company typically keeps a ten-year lifespan for its products.

So, you don't need to upgrade immediately. And for some businesses, it makes sense to wait longer to make the switch from 10 to 11. After all, it is not yet an essential upgrade.

Those on Windows 10 will see some advantages, yes. We'll talk more about that next. But, unless you’re a heavy multitasker or need a sleeker visual design on your desktop, you can wait.

By waiting, you’ll also get the advantage of others being the ones to discover the launch issues and bugs. The software has been available in beta since June. Still, as more users get access, you can expect more updates on the horizon.

To help you decide if you’re ready to upgrade, you’ll first want to see if you are eligible for the free upgrade. Also, visit Microsoft's website to see if your PC can run the software (https://www.microsoft.com/en-us/windows/windows-11-specifications).

If you have a custom-built desktop, you’ll want to run a health check to see if you have the TPM 2.0 Windows 11 requires. This is a specific security module, so you don’t want to overlook this!

Why Upgrade to Windows 11

Windows 11 is a redesigned operating system aiming at improved user navigation. Expect:
  • a more Mac-like experience;
  • integration with Android apps;
  • a facelift for Microsoft Teams;
  • streamlined switching from monitor to laptop;
  • direct access to widgets from the Taskbar;
  • a few gaming performance enhancements.

How to Upgrade

The upgrade is rolling out gradually. Those who recently purchased a new laptop before Windows 11 was pre-installed have access now.

If you are an existing Windows 10 user, you'll see the Windows 11 upgrade sometime between now and mid-2022. Most users will go to Settings > Update & Security > Windows Update and click Check for Updates. If available, you'll see a Feature update to Windows 11. Click Download and install.

Remember to backup all your important documents before starting the installation process!

Also, don’t fall for any fake versions of Windows 11. Wait to receive an official notification of a systems update. Do not click on links promising the software on social media or via email. You could end up downloading malware.
Comments

6 Never Dos for Your Work Computer

10/24/2021

Comments

 
Picture
Nobody likes to be told what they can’t do. Still, there are certain never dos that you should keep in mind when it comes to your work computer. This article captures the top six things you should avoid doing on your work computer.

#1 Don’t login to personal sites and services
Sure, we’re all guilty of wanting to check our personal email or take a quick peek at social media while at work, but you do not want to login to your personal accounts on a work computer, especially not a shared one!
Browsers that remember our passwords to sites such as Facebook or your bank can be useful. How many different passwords can one human be expected to remember after all? But letting the browser save your personal access credentials risks your security. The next person to use that computer could access your private data.

#2 Don’t allow remote access
Maybe your computer isn’t working the way you want it to: it’s too slow. Something is up with an app. You’re worried you’ve inadvertently downloaded malware onto your work device. Then there’s that friend you have that “knows computers.” With remote support software being so easy to use these days, you figure it’s easier to ask your friend for help. Work doesn’t even need to know.
But would you let that friend walk into the office and start working on your computer? Probably not. Your business has its own people it trusts to do work on its computers. If you were on-site, you’d tell your supervisor, or at least IT, if you had a computer concern. Even when working virtually, you want to do the same thing.
Allowing remote access is both a security and productivity risk. Plus, your computer could be set in a specific way by your company. Your tech-savvy friend isn’t going to know why and how those particular configurations were established.

#3 Don’t store personal data
We’re all in favor of having more than one backup. Still, you don’t want to make your work computer a storage solution for your personal data, because you can’t be sure that other people at work can’t look through your files.
You also run the risk of losing access to that data if the business goes out of business or lays staff off. Employee accounts can be wiped out by businesses when they sever relationships with staff.

#4 Don’t connect personal storage devices
USB or thumb drives are convenient, as such drives help move data around easily. But the drive can be installed in many different computers and networks along the way. Connecting that USB to a work computer could transfer malware.
You really don’t want to connect someone else’s storage device to your work computer. Criminals actually target organizations by leaving infected thumb drives in the parking lot. All they need is one person to pick up the drive and plug it in to a work computer. Trying to reunite the drive with its user didn’t go over so well for that Good Samaritan!

#5 Don’t do your side business or job search
You don’t want to do these on a work computer unless you want to risk getting caught, because your computer activity can be tracked. Some businesses do full-blown screen recording. Others will maintain an overview of sites you visit.
There are different laws in various states and countries regarding employee monitoring, but you are using a work device on a business network. Doing your own side project during work hours on the business computer won’t go over well.

#6 Don’t log on to public Wi-Fi
Don't log in to business applications or sensitive data connected to public Wi-Fi. There are many risks. You could end up:
  • opening yourself up to “man-in-the-middle” hackers;
  • connecting to a malicious hotspot;
  • transmitting data on an unencrypted network.

These never dos could endanger your personal data, business network, or your very job. Steer clear of these common mistakes made on work computers. Be smart, be safe.
Comments

5 Tips to Protect Your Laptop from Physical Damage

10/18/2021

Comments

 
Picture

A laptop can hold your life. If you’re working from home, it’s essential to your income. For students, it’s where you keep all your notes and essays. Plus, there are the personal photos and videos. And you sometimes use it to stream your TV shows, or to video chat with friends and family. You may even make music, create art, or be writing the next bestselling novel on your laptop. So, you want to keep it in great shape. Here are five tips to protect your laptop.

#1 Don’t drop it
Or throw it, or stand on it, or expect it to withstand any serious impact. OK, that’s pretty obvious. You also don’t want to use your laptop in the bathtub or at the pool. Even a simple water spill on a laptop can damage the circuitry. If you do get your laptop wet, immediately turn it off and unplug everything attached to it.

#2 Open carefully
Laptops are getting thinner in every iteration. Some now even have foldable screens. The thinner and more flexible screen may look sleek and cool, but it’s also less rigid, which makes it more prone to damage. Especially on lower-cost laptops, the screen can flex if you open the computer up from just one side.
Yet, many of us hold a laptop in one hand and open the lid with the other. This can cause the screen to twist. Use both hands to open the laptop. Or get into the habit of opening your laptop from the center to avoid flex.

#3 Don’t bedazzle your keyboard or screen
Alright, maybe you weren’t planning on putting faux rhinestones on the screen or keyboard. Still, reconsider any decorations you have thought of adding. Even a keyboard protector (to prevent dust or spills getting into the circuitry) or camera privacy sticker could damage some of the new super-thin laptops. It’s just that there is now so little clearance between the keyboard and the screen.
If you really must have your stickers, put them on the protective sleeve that you get for your laptop.

#4 Disconnect carefully
Your laptop needs a consistent power source. If you damage the power cord connection, you’re done. So, make sure you pull the power cord out straight. Yanking it out sideways could damage the port.
Also be aware of where your power cord is connecting to the wall outlet. If you leave the cord trailing along the floor, someone could trip over it, or it could get caught on a rolling chair. This could not only damage the charging port but even pull the entire laptop onto the floor. That brings us back to #1, don’t drop the laptop!

#5 Keep it cool
No, you don’t have to store it into a refrigerator (please don’t!), but heat isn’t good for your laptop. You’ll want to keep your computer away from external sources of heat.
Again, as the laptops get thinner, they are more vulnerable to internal overheating. Ensure that the laptop’s intake ports are unblocked so that air can flow through and cool the circuitry. You might also blow dust out of the vents using canned air.

Also, avoid placing your laptop on very soft surfaces. A soft, uneven surface is more likely to block the internal fans. This leaves your device unable to regulate its temperature. You could even buy a laptop cooling stand, which provides extra fans to improve air circulation.
Average laptop lifespan will vary between two to five years. Keep your laptop on the longer side of that by taking these tips to heart.

If something does happen to your laptop, give us a call at 218-240-8802. Our IT experts are here to help you find the best laptop for you, upgrade and secure your laptop, or fix your laptop when you need it.
Comments

What to do When Your Warranty Runs Out

10/13/2021

Comments

 
Picture

Most technology you buy in stores comes with a warranty of some sort. It might be included or an add-on. Still, it is unlikely to last the lifetime of the device or software, and it seems inevitable that your desktop will die immediately after the warranty runs out. Don’t worry, you still have options.

Murphy’s Law of warranty says that you will have no problems with your computer or printer while it’s covered. Then, as if waiting for the most inconvenient time to go bust, the technology fails just after your warranty ends.
After the frustration of looking up that warranty plan to see the expiration date a few weeks ago, your first response might be to take that device back to the store. You’ve noticed they have a service desk, and that’s where you made the purchase. But the technicians on-site are likely to send your laptop to the manufacturer repair. That could be far away, which negates the convenience of taking it down to your local store. You could wait weeks for your item to get to the repair center. Then, it stills needs attention and returning to your store.

Also know that many manufacturers charge a premium for outside-of-warranty repairs. Now that you’re one or two years into a relationship with the products, they hope you’ll decide upgrading is easier. They actually have a planned lifecycle for computer hardware and plan the warranty end accordingly.
Of course, if you are within days of your warranty's end, ask if the manufacturer will continue to cover the technology. Sometimes it actually will. The manufacturer may also use this opportunity to sell you an extended warranty.

Some help with manufacturer warrantyOur first piece of advice? Be proactive about technology issues. Don’t put off getting something looked at. You may discover you could have saved money by having it checked out under warranty.
Check your eligibility by visiting the manufacturer’s website and typing in the product serial number to check the warranty. Quickly find the page by searching the manufacturer’s name and “check warranty status.”
It’s a good idea to keep track of when your warranty is set to expire. That way, you’ll be more likely to request service in a timely manner. Don’t believe us? Have you ever planned to take an item back to the store only to leave it until the return window has closed?

Small business computer repair shops specialize in repairing out-of-warranty devices. They can run diagnostic tests to determine the problem. Then, they'll help you decide whether it’s worth the cost of repairs. If so, they can fix it at a competitive rate.

Plus, you get personalized service. There’s also the peace of mind that comes from knowing where your computer is at all times. You're not worrying about it shipping around the country to a manufacturer’s repair shop. The timeline reduces, too, as the IT experts are on-site at a convenient computer repair outfit.

We can help keep your computers and other technological devices up and running. Contact us today at 218-240-8802!
​
Comments

Boss Level: Keeping Your Gaming PCs At Their Best

10/9/2021

Comments

 
Picture

Video gaming is an entertainment for all ages. The main demographic is 18–34 years, but those 34–54 are another big segment – even larger than the under-18 group – although the youngest group may spend the most hours gaming, especially during a pandemic. Regardless, PC gamers of any age want the most powerful, fastest computer they can get.
It’s difficult to beat the Boss Level of that favorite game if your computer is lagging. The horror! If you’re serious about gaming, consider the ideas in this article to achieve your next personal best.
The gaming industry is moving to Triple-A titles. Think Grand Theft Auto or Call of Duty. These AAA video games are the equivalent of blockbuster movies. They take months to years for massive teams of people to develop, everything about such games is ambitious (even the price!). The graphics and animation are more immersive, the storylines offer hours of content and encourage open exploration, and the games have a grander scale and improved sound design, too.
All that requires more from your computer. Depending on the age of your computer, you may not need to replace it to power the latest, greatest games. Or you could upgrade to a more powerful video card. Adding more random access memory (RAM) might also take a computer up to the Triple-A level.

Troubleshooting the Home-Gaming PC
Whether you're trying the Triple A game or not, you may run into other problems. A screen locks up, a system crashes, or you see weird graphics or wonky textures in a game. You shoot an opponent with a direct hit, and he takes the win. Any of these problems can ruin your gaming experience.
Various issues cause these headaches for home gamers. Regrettably, they can be difficult to diagnose. The problems might be tied to:
  • overheating – modify your power settings, and make sure the computer is getting enough air flow;
  • driver issues – games crashing could mean the latest video drivers aren't installed;
  • file corruption – reinstalling the game could help;
  • an unstable internet connection – consider moving to a wired Ethernet connection.
Running too many programs on your PC can also cause games to run less smoothly. Close out other programs. Free up disk space if you can. Also, putting the game’s graphics on a lower setting can make them less resource-intensive.

Build Your Own Gaming PC
If you decide it’s time to get a new gaming PC, a popular option now is to custom-build your own. Our experts can do that for you! When you customize your own gaming PC, you get a computer that matches exactly what you’re trying to do.
Don’t settle for a sale computer using lower-quality parts and offering limited upgradability. Avoid buying a brand-name computer pre-loaded with bloatware. Instead, our technician can help you pick the processing and other parts to personalize your system, even down to the color of the fans or console lights.
Comments

Why You Should Never Use A Free Email Address For Your Business

10/5/2021

Comments

 
Picture
Why You Should Never Use A Free Email Address For Your Business
The message is clear: email is king. Many clients and customers choose to communicate primarily by email and as you know, it gives a fantastic ROI in your marketing strategy…unless you’re using a free email like Hotmail, Gmail, or even your internet provider. If that’s the case, you’re losing business each and every day.

It looks unprofessional: Imagine if banks used free email accounts – you’d never feel comfortable giving them your personal details let alone any money. How people perceive your business is what makes your business. Without that professional touch, you’ll appear temporary and fly-by-night. It puts your credibility into question and sends the message that you’re not serious about doing business – or worse – that you’re prepared to cut corners.

It erases your experience: Newer, fledgling businesses often start out with a free email address. The address clearly communicates that they are new and have little experience, and are perhaps testing the waters in a new direction. They’re not even remotely proven yet and are firmly within the hobby-zone.  Continuing to use the free address once your business moves into the professional arena means you’ll struggle to build momentum and any experience will be negated.

It’s forgettable or inappropriate: Your business success hinges on being memorable enough to gain referral custom and results from your advertising. Unfortunately, free email addresses are by default filled with hard to remember clutter, for example – joesplumbing_1985@hotmail.com or milkshakes_mybabby@gmail.com.
Neither of these roll off the tongue, is appropriate for business, or can be remembered without a high likelihood of typos and bounce back. Branded email addresses such as joe@joesplumbing.com make running a profitable, scalable business much easier.

It’s not permanent or safe: When you use a free email address you are at the mercy of the email provider. They may close down operations or cancel your account for any reason. These types of accounts are also often hacked and leaked on a global scale. When a better internet or email deal comes along, you’re still stuck using the old address because it’s printed on your business cards, car lettering and flyers.
​
Some will agree to keep the address open for a fee, but you’ll lose the control and flexibility you need to grow your business. With your own domain name, you own it and can move it to a new business-grade email service easily. You’ll also have complete master control over the addresses within your domain, resetting passwords and creating/closing accounts at will.
Comments

6 Uses for Your Old, Extra Computers

10/2/2021

Comments

 
Picture

​When you’ve upgraded to a new computer, the old one is a bit of an albatross. You paid good money for that desktop or laptop, and you want to continue to see return on investment. Plus, disposing of that technology feels wasteful. It’s not as if a computer is going to compost itself! To help, we’ve provided seven solid ideas for how to repurpose your old, extra computers.

#1 Turn it into a Kids’ PC
Make the computer available exclusively to your young ones. You can set the device up with parental controls software to:
  • limit the sites they can access;
  • control when and for how long they can use the computer;
  • restrict them from downloading without your approval;
  • monitor their activity.
You can also isolate the device from the family’s home network to further restrict their access and cut the risk of malware infection.

#2 Make a PC for Seniors
Or, accommodate those at the other end of the seven stages of man. Turn the computer into one geared for older family members. Optimize screen display color contrast for those with poor vision. Make the text size bigger. Set up the use of voice commands. You might even use puffy paint on the keyboard to make common keys easier to find.

#3 Convert to Storage
Storing documents, videos, photos, and music on your computer takes up a lot of room. So, turn that extra computer into a media storage device to keep your new computer in top shape. Think of it as an external storage device with much more capacity than a thumb drive.
Backing up your documents and media to the cloud is always an option. Yet, you may have more that you want to store than you want to pay the fee for storing.

#4 Share a Printer on the Network
If you have a printer that connects via a USB cable, you can generally print from that computer only. You can turn your old computer into a print server that shares the printer over the network. This way, any computer on the same network can make use of the printer.

#5 Donate
If the computer is in decent condition, donate it to a school, library, charity or other non-profit. Of course, before doing so, you’ll want to clean it up:
  • Back up and then delete all your files.
  • Consider “zero filling” your hard drive so data cannot be recovered.
  • Reinstall the operating system so it is usable by the recipient.

​#6 Sell Parts
You could continue to see value from that extra computer by parting it out. This is a good idea especially when the computer is no longer working and can’t be held onto as a backup (just in case). In some cases, parts sell for more than complete computers.

When you’re looking for that new computer or would like to recycle or donate your old one, our IT experts can help. Contact us today at 218-240-8802.
Comments

Choosing the Right Computer Monitor

9/23/2021

Comments

 
Picture
Your hardware, software, and internet connection shape your computing experience. The last essential piece of the puzzle? The monitor you use.
The first thing you need to consider is what you’ll be using the monitor for most. Gamers will have different requirements than those professionals or families viewing photos.
Once you've determined monitor usage, you'll need to consider various specifications. We’ll discuss six of them below, but these will not all carry the same weight. Again, it depends on how you use your computer.

Screen resolution
Simply put, a higher resolution equals a better picture. Resolution describes how many pixels there are. A Full HD 1080p resolution monitor – the industry standard – has a 1,920-pixel width and 1,080-pixel height. That’s a total of 2,073,600 pixels, which gives you a more detailed image.
Typical resolutions include:
  • 1080p (aka Full HD)
  • 1440p (aka 2K, QHD)
  • 4K resolution (Ultra HD, UHD)
Keep in mind that a higher-resolution screen demands more effort from the computer’s graphics card, which can affect performance.

Pixel density
This consideration brings size and screen resolution together to find the sweet spot. Think of it this way: the 2 million pixels from 1080p will look different on a 17-inch screen than on a 42-inch one. A greater pixel density results in sharper images. Typically, a 24-inch screen is good for 1080p, but you’ll go up in resolution as your screen size expands. You’ll see a lot of tech gurus recommending you choose a monitor with at least 109 pixels per inch (PPI).

Color accuracy
With good color accuracy you can count on the monitor to reproduce colors and shades as intended. This may not be as critical for a general user, but someone editing photographs or creating branded marketing materials cares about this one.

Refresh rate
Refresh rate tells you how many times a monitor updates information per second, and more is better. For gamers, it’s particularly important. So, if you’re going to be riding the bus in Fortnite, your response rate should be at least 75 Hz. Some even enjoy 144 Hz for a much smoother visual. Those who aren’t gaming should be fine at 60 Hz.

Response time
Response time relates to the time it takes to change the individual pixels on the monitor. While not as important for general or professional users, this matters to gamers. A monitor with higher response time gives the gamer a more immersive experience. A slower response time could mean blurred images in fast-paced action sequences.
​
Panel type
There are different types of LCD monitor to select from, too:
  • Vertical Alignment (VA) LCD monitors give deeper blacks and higher contrast ratios. These monitors are also less susceptible to color bleed at the screen’s edges, which makes them attractive to general users, especially those who want to stream movies.
  • In-Plane Switching (IPS) monitors have faster response times and show color better than the VA option. These are good for professional use (although the most expensive of the three).
  • Twisted Nematic (TN) monitors offer top responsiveness and high refresh rates, but a drawback is that color and contrast on the screen can change depending on your viewing angle. This is not the panel type for a graphic artist or photographer!
                                                 Ready to shop for your new monitor? Visit our online store!
ONLINE STORE
Comments

How to stay safe from scams & malware on facebook

9/13/2021

Comments

 
Picture
At last count, Facebook has clocked up over 2.7 billion users, which makes the platform more attractive than ever for scammers and hackers. While you may be logging in to share your latest family photos or catch up with friends, the chances of accidentally triggering a scam or malware are increasing daily. Here’s how to stay safe on Facebook and stop the spread.
Look out for freebies and surveys
Everybody loves a freebie and for the most part the competition posts on Facebook are legitimate. On the flip side though, when you see a giveaway for vouchers from a mega-store, alarm bells should ring. ‘Do this quick survey and we’ll send you a $50 Amazon Voucher!’ - it’s too good to be true. Even one click can take you on a messy journey through the underbelly of the web, picking up trackers and malware at every stop and at the end, you’re asked to share the post so your friends can get a voucher too...except nobody ever gets the reward.
Check your permissions with games and quizzes
Whenever you access a new game or quiz, you’ll need to give permissions for it to access your Facebook profile. Most people click the okay button without any thought, but if you review the permissions you’re giving, you’ll often find they’re asking for a massive amount of personal data; public profile, friend list, email address, birthday and newsfeed. Do they really need ALL this information? Sometimes the shakedown is from necessity, but sometimes the apps are preparing to launch attacks against you both on and off Facebook. For example, when you call your bank they ask certain questions like your full name, birthday and maybe which high school you went to. All that information is in your Facebook profile and now shared with your permission.
Don’t friend people you don’t know
Having lots of friends is always nice, but that friend accept could end up costing you. It might be someone pretending to know you, or a picture of a pretty girl to entice men (and vice versa). Once you friend them, they get access to everything your friends can see. In this case, it’s more than the risk of someone knowing your personal data, you’ve just given them intimate access to your life. It’s exactly how romance scams start, and there are even cases where the victim finds photos of their children circulating the internet.
If it’s weird, forget it
It doesn’t happen very often, but hackers find ways to take advantage of flaws in Facebook. A common hack that keeps popping up in various forms is to embed malware in a link. The virus then infects your machine and contacts all your friends with an enticing message, like asking whether a picture is of them. When they click to view the picture, the virus catches them and their friend list, and so on. Facebook is pretty good at staying on top of these flaws, but they need time to fix it. Just like if you got a weird email with an attachment from a friend, use that same level of scrutiny in your Facebook and don’t open messages or links that seem out of place.

Set up two-factor authentication
It might seems unnecessary right now, since you already have a password protecting your account it is extremely important to have a two-factor authentication set up. It only takes few minutes to do but It will save you a lot of time later on and might even save you your whole Facebook account.


Comments

How Losing a Mobile Device Puts Your Entire Business at Risk

9/10/2021

Comments

 
Picture
How Losing a Mobile Device Puts Your Entire Business at Risk

Losing a mobile phone or laptop is an experience that everyone dreads.  The expense and inconvenience of buying a new device is unpleasant, but only represents a fraction of the damage done when a device is misplaced.  The cost of data contained within every device can add up to many times more than the total value of the device itself.
Chances are, you already use automatic login on a large variety of online services. Each of these services are vulnerable to an attacker having possession of your device.

Usernames and passwords - An obvious place for an attacker to start is the likely long list of usernames and passwords saved for future use by your browser.  This is often done to save time when logging into sites that you visit often.  Almost universally, people opt to save login information so that they don't have to attempt to remember it every time they return.
In only a short amount of time, a browser is trained to log in to your Facebook, cloud storage, and bank details just by visiting the page using your regular device.  These details, called up by the browser, are saved in a single list accessible to anyone with access to the device. For an unscrupulous stranger with a found device, this list represents a goldmine of information.  Simply by finding a phone misplaced in public they may gain access to a huge array of services.
The problem can be made many times worse where a single password or a combination of similar passwords have been used across several accounts.  In some instances, an attacker need only gain access to a single one and reuse the same stolen credentials across many sites and services.

Email - Email accounts are a key target for attackers looking for access to your personal information.  It is a service that many take for granted, logging in once the first time they set up the device and using automatic login every time after.  It is a service that also unlocks a great deal more than just private messages. Of course, an attacker having free access to read your personal emails is bad news, but with email access a malicious user can gain access to many of the most commonly used web services online.
Using the "forgotten password" button on many sites triggers a response that emails a password reset link to the email address registered on file.  An attacker may use this feature to reset account passwords to one of their choosing.  Doing this both grants themselves access to your account and denies you access to rescue it.

Contacts - One of the best features of instant messaging is that your contacts know the messages come from you.  When a message is sent from your device to someone you know it displays along with your name, details, and likely a photograph too.  This can lead to identity theft, one of the biggest concerns of a lost or stolen device.
With contact information already programmed in an attacker has an opportunity to impersonate you when speaking to anyone in your contacts list.  Using your identity, an attacker may attempt to steal yet more details about you and your contacts.

Social Media - Your social media accounts are often the face of your brand.  They can be a primary way to reach out and contact customers.  They are almost always the first point of contact a client has with your business.  They are also extremely vulnerable to being hijacked from a stolen device.
Fraudulent social media access can allow attackers to harvest both client and business data. Even without profiting directly, posting privileges can be used to cause irreversible damage to a business.
​
Protecting your business - Services, accounts, and entire businesses can be put in great danger by something as simple as misplacing an unsecured mobile phone or laptop computer.


Comments

Are You Sick of Ongoing IT Issues?

9/5/2021

Comments

 
Picture
Are You Sick of Ongoing IT Issues?

Like a persistent cough or muscle strain that won’t go away, many IT issues prove ongoing. Every time they come back you think about getting an expert’s opinion. Then, the cough fades, you can walk freely again, or your computers are back up and running. You keep on going. Until the next time. If you’re sick of ongoing issues with your IT, look to a Managed Service Provider (MSP) for help.
There are many IT ailments that can negatively impact your ability to do work. Let’s consider some of the particularly common ones, and why an MSP is the right prescription.

#1 Network and Internet issues.
Business is done online these days. Not being able to connect to the network and slow connections are frustrating. Without the Internet, how can you do your job? You can’t even check and send emails! Let alone access team documents or enter data into cloud-based accounting software. A lagging network also slows down application and data loading time. It may only be a few moments of thumb twiddling. But add that up over several times a day and multiple by employees. You’re looking at a decrease in productivity that adds up.
An MSP has the know-how to survey the IT environment for what's causing these frustrations. When there’s a problem, they’re at the ready to resolve it and help improve reliability.

#2 Repeated malware infections.
This can mean a couple of things. First, you don’t have effective system and application protections in place. These attacks shouldn’t be able to make it through the door in the first place. With the right firewalls, anti-spam, and protections, you should be able to keep your system on lock down. You don’t have to do this yourself. Your internal IT team has a lot to manage and monitor. Gain expert backup with an MSP reviewing your security protocols to keep the bad guys at bay.
Secondly, educate employees about the dangers of social engineering. Don’t let them keep falling for the pretexts and downloading malicious files. Also, ensure passwords are strong enough to avoid adding another point of entry. 

#3 Printing problems.
Many businesses are printing less today, but we’re not done with hard copies entirely. So, when a printer starts whirring, spinning endlessly, or can’t connect, efficiency halts. Know that printers sold at big box stores are consumer grade quality. Avoid printer frustrations with solid business-class printers (which your MSP can identify).

#4 Application overload.
Maybe some of your employees prefer Dropbox. Others rely on their free Gmail accounts. This hodgepodge of options can cause chaos. Staff have difficulty remembering the passwords to all of the accounts they need. So, they simplify, and that makes their accounts more hackable. 
Upgrading to business-grade versions of important applications is easier with an MSP. They'll help identify the software that best addresses your business needs.

#5 Aging technology.
You’ve had your current computers for ages. They are slower than you’d like, but you don’t have the time to look for something else. Plus, you can’t imagine having to learn something new. You’re too busy. But aging tech is more likely to fail, which could prove catastrophic if you don’t have the right systems backup.
MSPs know IT. Based on your individual business needs, they can suggest a plan of attack to update the IT and keep it secure. They can also provide backup strategies to prepare for the worst and recover quickly.
Basically, a managed service provider has your back when it comes to IT. Work with experts who focus on technology day in and day out. You’ll typically save money and gain time to spend innovating in your field.
​
Gain a competitive advantage with the support of an MSP. Check Pro+Tech today!
Picture
Comments

Got a New Device? Here’s the Essential Tech Prep You Can’t Afford to Skip

9/2/2021

Comments

 
Picture
Got a New Device? Here’s the Essential Tech Prep You Can’t Afford to Skip

It’s tons of fun getting a new device. Whether it’s a new desktop, laptop or phone: the thrill of getting it home and opening the box is great. We know, we love tech too. It even has its own version of new car smell! Once you get it home though, there are a number of things that need to be done before it’s really usable – beyond snazzing it up with a new case or mousepad.

The sellers like to say it’s ready to use straight from the box – and it is – except not quite the way you need it to work. They’ll all turn on, look for wifi, and sure, you can type…but rather like when you buy a new fridge, simply turning it on isn’t enough – it’s still empty and you’re still hungry.  A few minutes now to prep your new device will save you time, stress, and quite possibly money.

Today, we’re talking vital tech prep for new devices:

Security Updates and Fixes
From the factory to your hands, that device has been in the box for at least a month. In the world of security, that’s an eternity. During that time on the shelf, new viruses have come out and new software weaknesses have been discovered. Fortunately, new updates to combat these problems were also created, they just haven’t been downloaded to your device yet. We can make sure your essential software is up-to-date and set to stay that way. That way, you know your device is safe to go online.

Data Transfer From Old to New
Some people want to transfer everything from one device to another, others like to have a fresh start and keep the old device as a backup. We can either transfer your data entirely or just the things you use. For computers, we can even turn your old hard drive into an external drive that you can plug into your new computer and grab files as required.

Setting up Hardware
If your new device is a computer, you’ll need to hook it up to extra tech like a printer or webcam. These tasks that should be plug-and-play can sometimes send you loopy, especially when you’ve got a plug mismatch or incompatible drivers. We can help get you set up, with everything tested and working.
Setting up Email and Software
This is one people commonly forget and then struggle with. Email clients in particular, need special configuration to connect properly. Quite often, we find people are stuck only able to receive, with overflowing unsent mail that won’t go anywhere! We’ll get all your personal software and connections up and going.

Setting up the Network
While tapping in a wifi password is easy enough, it doesn’t mean your browsing is secure, or even as fast as it could possibly be. We can quickly determine which connectivity method will be best for your device and your needs, and hook you up with fast, robust security measures.​

Lockdown Privacy & Permissions
Whether you have children and are looking to provide a safe online experience, files you’d prefer to keep private, or simply want to set up ‘profiles’ for each user to have their own login, we can quickly get your new device configured to meet your needs.
​
We love to help. Give us a call at 218-240-8802 or create a ticket from our website and we'll get your new device up and running.
Picture
Comments

5 Red Flags Of Phishing Emails: Think Before You Click

8/26/2021

Comments

 
Picture
A single click can be the difference between maintaining data security and suffering massive financial losses. From the moment just one employee takes the bait in a phishing email, your business is vulnerable to data breaches and extensive downtime.

Quickly spot the red flags and put phishing emails where they belong:

1. Poor spelling and grammar
While occasional typos happen to even the best of us, an email filled with errors is a clear warning sign. Most companies push their campaigns through multiple review stages where errors are blitzed and language is refined. Unlikely errors throughout the entire message indicate that the same level of care was not taken, and therefore the message is likely fraudulent.

2. An offer too good to be true
Free items or a lottery win sure sound great, but when the offer comes out of nowhere and with no catch? There’s definitely cause for concern. Take care not to get carried away and click without investigating deeper.

3. Random sender who knows too much
Phishing has advanced in recent years to include ‘spear phishing’, which is an email or offer designed especially for your business. Culprits take details from your public channels, such as a recent function or award, and then use it against you. The only clues? The sender is unknown – they weren’t at the event or involved in any way. Take a moment to see if their story checks out.

4. The URL or email address is not quite right
One of the most effective techniques used in phishing emails is to use domains which sound almost right. For example, [microsoft.info.com] or [pay-pal.com]
Hover over the link with your mouse and review where it will take you. If it doesn’t look right, or is completely different from the link text, send that email to the bin.

5. It asks for personal, financial or business details
Alarm bells should ring when a message contains a request for personal, business or financial information.  If you believe there may be a genuine issue, you can initiate a check using established, trusted channels.
While education is the best way to ensure phishing emails are unsuccessful, a robust spam filter and solid anti-virus system provide peace of mind that your business has the best protection available.


Comments

5 Tech Travel Tips You Can Use

8/21/2021

Comments

 
Picture
5 Tech Travel Tips You Can Use

Travelling soon? For most people, this also means making sure your tech is packed and ready for the adventure. Smartphones, ebook readers, tablets, laptops and smart watches are now so light and portable that you’d never think of leaving them behind, plus they can add a ton of value your experience.
Here are a few tips to consider before you hit the road.
1.  Backup to the cloud

While you’re jet setting around, relaxing on a beach or hiking your way to freedom, your tech is always going to be exposed to a level of risk. This might range from accidentally leaving your laptop at a cafe to having it stolen from your bag, but either way the problem is the same - your data is now gone. If you’ve backed up your devices to the cloud (eg Evernote, Microsoft OneNote or Google Drive) you’ll be able to access your files easily and securely from anywhere.
Hot tip: Scan or save important documents like itineraries and passports to the cloud.

2. Pack the right cables
Begging random strangers for a loan of their cable isn’t much fun, so remember to bring the exact cables and chargers you’ll need. Most smartphones and tablets use universal plugs like Micro USB, USB C or Apple Lightning, so you can get away with only packing one cable. Many locations now offer powered USB ports but be sure to also pack the right charger as well, it’s a convenience you’ll appreciate. If you’re travelling overseas and the socket is different, remember to pack a plug converter, and depending on your destination, you might even find the voltage is different. It’s a good idea to check whether you also need a voltage converter before you try and charge.

3. Download offline data
It’s no secret that global roaming can give nasty bill shocks. The easy access data you normally use over Wi-Fi or get included in your cell plan has us all accustomed to being connected. While travelling, you might find yourself in a location where data costs a fortune or it’s not available at all. Download any files you might need, including important documents like itineraries and bookings, so that you can access them even without a connection.

4. Update and scan
Just like you’d make sure you’ve got the right vaccinations and travel gear, make sure your tech is ready to travel too. Set aside a few minutes to run updates for your operating systems and apps, as well as your anti-virus. Go one step further and run a manual anti-virus scan too. The last thing you want to deal with one your trip is a cyber attack!  While you’re doing your pro-active thing, turn on password protection for all devices so that only you can unlock them.
Hot tip: Use a complex password that is hard for thieves to guess.

5. Mark your territory
Almost exactly the way it sounds, let everyone know this tech belongs to you. Write your cell number on portable devices in case you get separated so whoever finds it can give you a quick call and save the day.  Don’t want to use permanent marker on your shiny tech? Grab some sticky labels you can peel off when you get home.
You can also get little Bluetooth tracking tags to stick to your gear, so that if you ever lose something you can chase it down. Similarly, you might like to consider enabling the ‘find my feature on Apple devices. Having this feature switched on also means you can disable your device remotely, an excellent security option if it’s been stolen.

Have a good and safe travel!
Comments

How to Maintain Your Computer (Without Lifting a Finger!)

8/17/2021

Comments

 
Picture
How to Maintain Your Computer (Without Lifting a Finger!)

For a device that’s supposed to make life easier, computers sure do involve a lot of work! There’s so much to keep track of that it’s no wonder most people push ahead and forget the routine maintenance until something breaks. Of course, the problem with being reactive is the damage is already done. Photos and files get lost forever in a crash, and information gets stolen in a hack...by then it’s far too late. It’s a bit like closing the gate after the horses have already fled. This is where proactive people come out on top. Thousands upon thousands of homes around the world are using managed services to put computer problems firmly behind them. It’s a done-for-you maintenance program we offer, and here’s why it’s the best choice.

You’re always up to date. It seems like every second day there’s some new and urgent update waiting to be installed. Whether they’re patching security flaws or adding new features, they seem endless. Sometimes, it goes beyond inconvenient, it gets overwhelming! Even if they do install automatically, they tend to do it at the worst possible moment, leaving you to wait up to 30 minutes when all you wanted to do was quickly check your email. Using our special managed services software, we can make sure your computer’s updates are all finished and done - before you sit down to use it. As part of our service, we also make sure all updates are compatible not just with your hardware, but also with your other software. After all, updates are supposed to make your experience more secure and more enjoyable!

You’ve got super anti-virus. The best anti-virus is the one that’s up-to-date and running, yet you’d be surprised how many people switch it off or never let it update. While you might be in the habit of scanning files and browsing safely, others in your home might not have the same priorities. Having managed services ensures your anti-virus is always running and dealing with any viruses it finds. As soon as a new virus becomes known, we make sure your system is actively protected against it. We also monitor for cyber-attacks and can alert you before they become a problem.

Your hardware stays healthy. While a reactive person is always suddenly stuck without a computer when hardware fails, proactive people with managed services have already had the problem fixed. Our special software monitors the health of your hardware, eg, your hard drive, looking for early warning signs of failure. If detected, we can let you know in advance. This means you’re able to get it repaired at your convenience, making sure no files are lost and no other hardware is damaged in a domino failure.

You never miss a backup. The worst part of a crash or hack isn’t the financial cost, it’s losing your files forever. Many people have their entire collection of photos stored on their computer, plus important family files, most of which can never be replaced or recreated. Whether it’s a report just created, a recipe handed down for generations or a novel you’ve been working on for longer than you’d care to admit, managed services ensures your backup is working correctly. Backed up files are ready to go when you are, and losing files to corruption, failure or theft is a thing of the past.

Support is a phone call away. Just got a new printer and it won’t play nice? Got a weird error popping up? Your laptop won’t talk to the wifi? Our remote support team can help with whatever technology issue has been bugging you and wasting your time. No nonsense advice is just a phone call away, and our team can remotely connect to diagnose and fix many problems. This means you can likely skip the cord shuffle and carting your computer into the shop, and still get your most pressing computer issues fixed.

You’re always optimized. Whether your computer is actively playing up or not, our monitoring service can keep in touch with your event logs, services and processes and look out for anything that needs correction. This means we’re effectively stopping problems before they get to you, making sure that when you sit down to use your computer, it’s doing exactly what you want.

Put computer problems behind you - get managed services today!
Picture
Comments

Why 2-Factor Authentication is Important

8/14/2021

Comments

 
Picture
Why 2-Factor Authentication is Important

You hear about hacks all the time. The news covers major websites who have had data leaks containing your email and password. Computers get infected and capture your login details for bank accounts and credit cards. In the worst cases, identity theft occurs because it is an easy crime to commit with a high reward.
In 2018, the passwords you used to trust to keep the bad guys out of your accounts are not enough anymore. Cyber attackers now use methods such as phishing, pharming, and keylogging to steal your password. Some have the power to test billions of password combinations.

If you’re like the majority of people, you use the same password for several websites. That means anybody who has figured out that password has access to everything you’ve logged into with it. In a time when it is extremely easy to look up what a person named their first pet or high school mascot, security questions aren’t much help.
Consider how a jewelry store operates. They don’t simply keep their valuables locked away with one key. There are alarms ready to be triggered, motion detectors, and sometimes even bars on the windows. Your data is valuable, just like jewelry. You need more than one line of defense to protect it.

In the computer world, your second line of defense (after your username and password combination) is called “2-factor authentication.” Sometimes referred to as multiple-step or multi-factor verification, 2-factor authentication is a way to double check a person’s identity. This can be enabled every time a person logs in or just under certain circumstances. For example, signing in from a new device or different country might trigger 2-factor authentication.
Many of the services you may already use, such as Facebook, Gmail, Xero Accounting, and more, have 2-factor authentication options. If your bank has ever sent you a special code through text or email to enter before logging in, you’ve already used a type of 2-factor authentication. They can also be in the form of a smartphone app or a physical electronic dongle.

2-factor authentication is absolutely crucial for online banking, email, and online shopping such as Amazon or PayPal. It’s also a must-have for cloud storage accounts (like Dropbox or Sync), password managers, communications apps, and productivity apps. This is especially true if you frequently use the same passwords for different websites and apps.
Some may consider 2-factor authentication unnecessary for social networks, but these are actually very important to keep safe. For ease, a lot of websites and apps allow you to sign up through your Facebook or Twitter account. You need to keep these networks safe so that somebody with your password can’t suddenly get into every account you have linked.
The point of using 2-factor authentication is to make hackers’ lives harder and prevent them from getting into your accounts. If they have captured your login username and password, they still need a second device to get in, especially when the computer or phone they are using has never logged into your account before. This makes it significantly more difficult for anybody to breach your account.

Plus, if you receive a notification with a special code to enter for logging in, and you weren’t trying to log into that account, you have a good signal that somebody else was trying to get in. That means it’s time to change that password and be grateful you had 2-factor authentication.
​
It’s unfortunate that there is currently an abundance of skilled hackers ready to take advantage of those unprepared. Luckily, you can still stop them -even if they have your login information at hand. 2-factor authentication is one of the easiest methods to keep your accounts safe.
Comments

How to Tell if You've Gotten Hacked

8/10/2021

Comments

 
Picture

How to Tell if You've Gotten Hacked

Being hacked is the single biggest fear of most computer users.  Many believe the first sign of strange behavior or errors on their PC is a sign hackers have taken control.  But are hackers really inside your machine, stealing your information? Or should we be on the lookout for more subtle signs?  What does being hacked really look like?
There is an important distinction to make between being hacked by a person and being infected with a virus or malware. Virus software and malware are automated processes designed to damage your system, steal your data, or both.  There are of course ways that we can defeat these processes, but what if we are instead hacked by an individual?

Logins not working
One of the first steps a hacker might take would be to change the computers passwords.  By doing so, not only do they ensure future access to the account, they prevent you from accessing the system to stop them. For the hacker, this is a crucial step that keeps them in control.  With this in mind, we always want to make sure to keep on top of our own login details and how often we change them. 

Security Emails or SMS’s from online services
Many services track which device and location you logged into your account from last.  If your account is accessed from a new device or a different country it might trigger an automated email or SMS to ask if this new login is your own.
If you have logged in using a new computer, tablet, or phone; an email that asks "hey, is this you?" need not be cause for alarm.  If you haven't, it may be time to investigate further. This service is an important part of information security. It may be a key first step to identify someone else gaining access to your account.

Bank accounts missing money or strange transactions
Most commonly today, hackers commit crimes to steal money. The end goal for hackers is typically to profit from their crimes by taking money from people online.
It always pays to keep a regular eye on your financial transactions to make sure you know what money is coming and going from your account.
You may see a large sum missing where hackers have attempted to take as much as they can in a single transaction.
Alternatively small, hard to notice transactions may appear.  These often account for small purchases where attackers have tested the details they have to make sure they work.

Sudden loss of cellular connectivity
Network interruption is a symptom that few people expect but occurs commonly when hackers attack. Many banks and online services use a security feature known as Two-factor authentication.  To do this they send a short code to your phone or app when you log in.  Two-factor authentication is ideal in most cases and a great boost to security. 
Hackers can try to work around this by calling your mobile service provider to report your phone as lost or stolen.  During this call, they will request your phone number be transferred to a new sim card that they control. When your bank sends its regular two-factor authentication code to the number registered, it goes instead to the hacker who may be able to log in.  From your perspective phone service will simply stop working. 
​
Keeping vigilant and maintaining security
These are only some of the modern techniques that hackers can try to use to gain access to your accounts.  It pays to be extra vigilant and pay close attention to the signs and signals that indicate you may have been hacked.

If you suspect that you might have been hacked give us a call 218-240-8802.
Comments

Is Your Laptop Running Hot and Loud?

8/7/2021

Comments

 
Picture
Is Your Laptop Running Hot and Loud?

Laptop computers commonly heat up a little in normal operation.  Electronic components, including large capacity batteries, become warm in use.  Your laptop should never become too hot to handle though.  When a laptop turns hot to the touch or starts to sound like a jet engine, it's likely beginning to overheat.  
Modern laptops use nearly silent fans to cool components and keep the system is comfortable and safe to use.  In some cases, the sound the computer makes is the best tool you have to diagnose its running condition.  Excessive heat causes the fans to work harder and faster to compensate.  This jet engine sound is one of the first clues you have to indicate all may not be well.

Why So Hot
Because of their compact size and portability, laptop computers are particularly prone to overheating problems.  Their tiny footprint puts electronic parts closer together, creates less room for cooling vents and adds a heat generating battery which introduces more hot air into the system.
Most laptops have small fans that suck in cool air, passing it over metal fins to exchange heat from the case. The resulting hot air exhaust is expelled through vents back into the room.  This process prevents heat building up inside the machine.  The constant air cycle keeps the laptop running cool no matter the workload placed on it.
This process can be interrupted by any number of factors during operation.  Alongside cool air, computer fans can also suck in dust, stray hairs, even cigarette smoke too.  Smoke in particular contains thick tar which coats the fins, fan blades, and internal components.  
Foreign debris inside the machine prevents components from working at their best.  Tar, dust, and hair slows down the internal fan and coats the heat generating components and cooling fins.  This coating prevents air exchange and keeping components warm as if they were under a blanket.

Causes of overheating
Sometimes the way a laptop is used can cause it to overheat too.  Resting a laptop on thick carpets, blankets, or soft furnishings can block vents, preventing the fans from sucking cold air in or blowing hot air out. Leaving the machine running on carpet or furnishings, particularly for extended periods of time, can cause overheating issues and introduce extra dust into the components too.
The best place to rest a laptop while in use is on a hard surface such as a desk, table, or a cooling pad.  This allows air free access to the vents and helps prevent dust and hairs getting inside the machine.

Overheating Results
As the computer starts running hotter for longer, its fan will attempt to compensate by running faster and more often.  This results in the "jet engine" noise many users report when their computer is struggling to keep up.
Unfortunately, once dust, hair, or tar has already found its way into the machine it is notoriously difficult to clean out.  The only way to reset the machine to run cool and quiet is to disassemble the base and clean out its components.
Much like a car engine, computer components have a designed temperature range in which they can safely and reliably operate without any issues.  Extended periods of running above the temperature they are designed for can cause damage, sudden failures, and drastically shorten the designed lifespan of the computer.  

Unlikely Causes
Often times seemingly random blue screen computer crashes can be traced back to components that have been overheating inside the computer.  As heat builds up, vulnerable components start to fail, sometimes temporarily, in the hotter temperatures.  
By the time the computer is rebooted and cooled down the issue is seemingly resolved.  Back in operation, the computer heats up once more and eventually crashes again.  These irregular crashes are highly inconvenient and can sometimes cause data loss too. 
​
However, these symptoms are minor compared to a complete write-off of the machine.  For some users, the first sign that their machine is too hot to run safely is when the motherboard is burnt out or their data storage has been irreparably lost.

If you think a cooling pad will be a good solution for you, consider getting one from our online store.
Picture
Comments

Keeping Tabs on Children's App Purchases

8/3/2021

Comments

 
Picture
Keeping Tabs on Children's App Purchases

Children today have grown up surrounded by technology their entire lives.  Since before they are old enough to read they can pick up a tablet or smartphone and swipe at apps and games with ease.  Modern kids have an intuitive understanding and ability with technology that older generations can barely imagine.  The abundance of technology, however, comes with a price.
Easy access to any marketplace can be a double-edged sword.  The convenience and ease of use is a boost to those of us needing a quick app, but accidental purchases can cause a lot of headaches.  One-click online shopping was once one of the biggest dangers our bank account faced.  Now, many of us carry multiple devices, each with their own marketplace and app stores.
With modern tech, mobile applications, whether on iOS or Android devices, are easier than ever to buy and download.  So simple in fact, that a child could do it.  

Designed to Appeal - Children love to download mobile applications that feature their favorite characters, cartoons and TV shows.  Advertisements are aimed specifically for children in ways that will invite them to click a link and instantly download a game.
These games are typically free, meaning they don't require authentication by default before downloading.  A new game can be downloaded, installed, and ready to run seconds from clicking an ad.
Developers commonly use, what is known in the business as, a 'freemium' model.  This means that the game is free to download and start, but inserts paid 'upgrades' designed to make the player part with cash.

Freemium Games - Upgrades to games may unlock more levels, purchase an in-game currency, or outfit a character with special attributes.  Competitive online games commonly employ a strategy that gives paying players an unfair advantage over ones who don't pay.  This is often referred to as 'pay-to-win' and entices players to spend more to get on the same level.
Many mobile-based games are designed purely to encourage in-app purchasing.  Some deliberately design a deceptive or tricky user-interface that makes it easy to miss-click or make purchases by accident.
There are regular stories in the news featuring kids spending thousands on in-app purchases for virtual characters.  In some cases, children can use real-world money to buy items thinking they are spending in-game currency.

Apps to Help - Of course, it's unfair to give all applications a lousy name.  Many deserve it, but not all apps are guilty of behaving badly. There are fitness apps, productivity apps, and educational apps that can act as useful tools to help enhance your day.  Children can get a lot from high-quality applications in the same way educational software for the computer can be a huge classroom boost.
Getting the most out of your phone or tablet is about keeping your device safe against applications designed merely to take your money.

Secure Your Device - The best step you can take to prevent running up enormous app bills is to disable in-app purchases on your devices.  This prevents apps from being able to take funds for digital items. The process to do this is simple, takes less than 2 minutes, and can save you huge amounts.

  • On iOS: Enter the settings screen, tap on 'General'.  Then tap on 'Restrictions' and tap the 'Enable restrictions' option.  Make sure to turn "In-App Purchases" off.
  • On Android: Inside the Google Play App: press the phone menu button and go to Settings.  Scroll down to "User Controls", tap on the "Set or Change Pin" option and set a pin that only you will know.
In the "User Controls" menu check the option to "Use Pin for purchases".  Newer phones may label this pin as a password instead.

Safe Apps - With these options enabled, whether using an iOS or Android device, your phone or tablet is safe from app purchases in any hands.
Comments

SSD: Make Your Old Computer Your New Computer

7/30/2021

Comments

 
Picture

SSD: Make Your Old Computer Your New Computer

The solid-state drive (SSD) has swiftly become the go-to upgrade to breathe new life into an ageing computer, and for good reason too.  An SSD swiftly brings an old laptop or desktop up to date with modern machines in just a single step.
The price of solid-state memory has fallen dramatically in recent years. As costs have dropped, the popularity of the technology has increased exponentially.  At one time an SSD was a rare treat for serious PC enthusiasts, now it's cheaper and more readily available than ever. No other single solution is as cost-effective, quick to swap, and impressively effective as swapping out an old hard drive in favor of the faster and more modern SSD.

Out with The Old 
The hard disk drive (HDD) is a technology that dates back as far as the 1950s.  They became the default solution all PCs would use for decades to come.  Most old laptop and desktop machines still contain their original, worn hard drives they left the factory with.

The HDD was a mostly mechanical device.  Inside a solid outer casing was a series of spinning disks arranged in a delicate stack known as a platter. Each disk could read and save data using a tiny needle moving across the disk's surface.  

The technology looked and worked much like a miniature record player.  Like a record player, widely in use at the time that hard drives were developed, the hard drive had some serious drawbacks in their use.
The series of tiny disks and needles that made up the HDD were incredibly fragile.  Vulnerable to dust or movement, computers commonly succumbed to hard drive failures that rendered the machine and its stored data unusable. Occasionally, simply moving a laptop while reading or writing data can damage a hard drive's spinning disk.

In with The New
The primary reason to switch to a more modern SSD, on top of their impressive durability, is the incredible increase in speed.  The SSD has no moving parts at all, working more like a digital camera memory card than a vinyl record player.
An SSD simply makes the process of retrieving and saving data to storage many times faster.  Eliminating the mechanical component, removing the need to move a physical disk, and not needing to physically pick up the data means a much faster and smoother operation.

Computer startup, where the operating system loads all its data from storage, can take as little as one-quarter of the time of a comparable HDD.  Additionally, loading regular applications and data from an SSD takes a fraction of time of an HDD.

An SSD completely breathes new life into an old machine.  Computers with an SSD replacement for the hard drive feel like using an entirely new machine for a fraction of the cost.
​
Replacing the main mechanical component additionally eliminates wear and tear working to break down your machine.  While an HDD slows over time, degrades, and can eventually suffer mechanical failure; an SSD remains as durable as the day it was purchased.

Ideal Laptop Upgrade
In a laptop setting, the SSD makes complete sense.  They require less power than older hard drives, making the most of your battery charge.

In addition, not needing a large disk platter, mechanical parts, or protective outer case means they are about half the weight of a mechanical drive.  Making an old machine lightweight brings it another step closer to a modern machine.
They run almost silently too.  The familiar click-clack of the hard drive inside a laptop is a thing of the past.  Many users comment on the noise their laptop used to make starting up and loading programs.  Noisy laptops are a tech throwback we're happy to leave behind.

For many who feel like their old laptop or desktop is showing its age, the prohibitive cost of purchasing a whole new machine keeps them invested in their old one.  A simple, fast SSD upgrade can make your old machine new again at a much smaller price. If swapping long startups, and slow load times sounds right for you, consider upgrading to an SSD.  You won't look back.

Ready to give your machine a new lease on life? Check out our offer!
Picture
Comments

What is the Best Way to Backup?

7/26/2021

Comments

 
Picture
What is the Best Way to Backup?

“That will never happen to me.” We get through our lives telling ourselves the worst won’t happen to us. It’s the same with business: “We won’t need this data backup.” Yet, whatever your industry, secure, reliable backup ensures business as usual. So, what’s the best way to backup? Here’s help.

Why You Need to Backup
  • Business disruptions of any kind can be costly. The disaster might take one of several shapes:
  • Natural (e.g. wildfires, floods, earthquakes, or hurricanes)
  • On-site (e.g. hardware/software failure, power outage, inability to access building)
  • Employee driven (e.g. damaging mistakes or intentional sabotage by a disgruntled employee)
  • Cyber-attack (e.g. data breach, ransomware, or distributed denial of service attack).  
Regardless, the best backup solution can help reduce downtime and damage. 

Plan B: Approaches to Backup
There are several off-the-shelf backup options your business can use. Let’s consider the pros and cons of the most popular ones.  

USB Thumb Drives — Also known as “flash drives,” “pen drives,” or “memory sticks,” these thumb-sized devices are compact and portable. But, they have size limitations compared to hard drives. Also, the mobility makes them easy to lose (which can actually set the disaster scenario in motion).  

Additionally, a USB thumb drive is robust when not plugged in, but more vulnerable when attached. If someone inadvertently snaps the drive or employs too much force, they can put the data on that backup at risk.
The cheap ones also tend to be slow, which can make backing up sluggish. 

USB Hard Drives — Portable hard drives increase the data storage available, often at a decent price. They are designed to be compact and mobile. You can prioritize durability, processing speed, storage volumes and more. 

Hard drives are less likely to get damaged than a thumb drive. If knocked or jostled, the cables are flexible. Still, a hard drive can be prone to physical failure. Selecting an external solid state drive (SSD) can help since it has no moving parts. Information is stored instead in microchips. 

Cloud Storage — Backing up to the cloud stores data on an external, secure server. If thieves take your computers and USB backup, you can still access your data on the cloud. Cloud storage providers build in redundancy to ensure your backup remains safe.  

Most cloud storage services back up to secure centers with thousands of servers storing data. Oh, and they’ll have their own server backups too, just in case they’re the ones hit by a disaster. The providers also encrypt data during transit to further ensure compliance and security. 

Migrating to a third-party cloud storage service also cuts the clutter at your premises. You can count on expert help to ensure security and compliance. Plus, you can cut operational costs by offloading in-house storage or external hard drive expenses. 

OK, What’s the Best Answer? 

Don’t think disaster won’t strike your business. Research has found data loss and downtime are most often caused by:
  • Hardware failures (45% of total unplanned downtime)
  • Loss of power (35%)
  • Software failure (34%)
  • Data corruption (24%)
  • External security breaches (23%)
  • Accidental user error (20%). 
We recommend the 3-2-1 backup strategy. This means having 3 copies of your data. Two (2) of these would be located on different devices (e.g. on your computer and on a backup drive). The other remaining backup copy (1) would be secured offsite, in the cloud.

Want to secure your data for the worst? Let's chat!
chat
Comments

Why is My Brand New Laptop So Slow?

7/22/2021

Comments

 
Picture
Why is My Brand New Laptop So Slow? 

Your old computer is beginning to slow down. So, you invest in a shiny new laptop. The clouds part and the sun shines down on this bright and lovely new device. Everything will be faster and easier. Only, from the first day, the new laptop is lagging. Why is it running so slow? One of these might be the reason.

#1 Not enough computing power. 
In many cases, the laptop doesn’t have enough RAM (Random Access Memory). RAM is the computer’s main memory. This helps your computer do more at once. Information from the operating system, application programs and data are kept here, when in use, for quicker processing. 
RAM is like the computer’s short-term memory, while the hard drive is the long-term memory. Just as the human brain can’t hold everything in short-term memory, RAM can get overloaded too. When this happens on your laptop, the computer processor needs to go to the hard drive. This slows things down.

Resolution: You might see 4GB, 8GB, 16GB or more of RAM available. How much you need is going to depend on what you plan on doing with the computer. For a laptop with Windows 10, we recommend at least 8GB of RAM, but 16GB is more comfortable for a better experience.
Not all laptops will let you access the RAM. When you can, though, upgrading memory can be quick and affordable.

#2 Mechanical hard drive. 
Often a single part is letting you down. With a less expensive computer, manufacturers skimp. While it’s less common these days, some laptops will come with a mechanical hard drive. You might think of this like a record player with a needle reading the vinyl album. Since something is moving to find data, the laptop runs slower than it would with a Solid State Drive (SSD), which has no moving parts. 

Resolution: In many cases, a mechanical hard drive can be easily upgraded to an SSD. However, some super slim laptops have limited upgradability.

#3 Bloatware. 
Retailers like to tout all the bells and whistles that come with their laptops. So, when you turn on your laptop for the first time, you may notice there’s already a lot of software preloaded. Much of it you’ll probably never use. Maybe there are toolbars you don’t need, games you’ll never use, or stock widgets that you couldn’t care less about. These examples of bloatware slow down your computer.

The third-party applications are a revenue source for the manufacturer, but don’t always help you. Microsoft, for instance, sells a line of computers that come without any pre-installed third-party software. Computerworld reported those PCs “start up 104% faster, shut down 35% faster and have 28 minutes more battery life.”

Resolution: When you get a new laptop, check out the pre-installed software before you add your own. Determine what the existing software will do, and uninstall anything that you won’t want.

If your laptop is slow on the first startup, this may be due to system updates. For instance, a Windows 10 automatic update to bolster the security of the computer. You can’t do much about these, but look on the bright side, your laptop security is current!

Improved speed is a main reason to invest in a new laptop. Don’t let a lagging laptop disrupt your productivity. We can help with a slow running laptop. Bring your computer in or set up an appointment on our website.


Picture
Comments
<<Previous
    More Pro+Tips

    Pro+Tips

    We aim to provide helpful and easy to understand tech articles. 

    Some article relate to products that we sell, so we may link to products or services that we offer.

    Good advice is good advice whether you purchase our products or a competitors.
    ​Our main goal for Pro+Tips is to give you advice and best practices.


    Categories

    All
    Backup
    Business
    Email Security
    Facebook
    Guides
    Hardware
    Network Security
    Online Security
    Safety
    Windows

    Archives

    March 2023
    November 2021
    October 2021
    September 2021
    August 2021
    July 2021
    June 2021
    May 2021
    April 2021

Help & Support

 218-240-8802
304 3rd Street
​International Falls, MN 56649

Ticket Status

Open Monday through Friday 9AM-5PM

Closed Saturday and Sunday

We appreciate your business.

Thank you for choosing Small Town Tech!

Company

About
Careers
Partners
Terms
Privacy
Small Town Tech Inc
Protech Complete Technology Care
  • Home
  • Pro+Tech
  • Partner Client
  • Online Store
  • Backstage