Mon-Thurs. 10AM-6PM
(541) 223-7745
50219 US-101 Suite C, Bandon, OR 97411

Is your browser protected? Websites that mimic trusted services to collect your passwords/payments often appear at the top of web results

We highly recommend the free browser extension Malwarebytes Browser Guard to help prevent threats when browsing the web.

iphone screen with icons on screen

How Can You Leverage the New MS Teams Payment App?

Are you a small business owner or a freelancer who offers services online? If so, you might be wondering how to get paid by your customers in a fast and convenient way. You might have tried different payment platforms. But they often require you to switch between different apps or websites. This can be time-consuming […]
Read More
Free cyber security internet security computer security illustration

Beware of These 2024 Emerging Technology Threats

The global cost of a data breach last year was USD $4.45 million. This is an increase of 15% over three years. As we step into 2024, it’s crucial to be aware of emerging technology threats. Ones that could potentially disrupt and harm your business. Technology is evolving at a rapid pace. It’s bringing new […]
Read More
MacBook Pro on table

14 Helpful Tips for New Year Digital Decluttering

These days, our lives are intricately woven into the digital fabric. From emails to photos, documents to apps, our devices store tons of information. It’s easy to feel overwhelmed at the sight of an endless inbox or app library. As the new year begins, it’s the perfect time for a digital declutter. A clean and […]
Read More
Free Faceless person showing recycle symbol on mobile phone screen Stock Photo

11 Ways to Responsibly Get Rid of E-Waste at Your Home or Office

In our tech-driven world, electronic devices have become indispensable. But with constant upgrades, what happens to the old gadgets? They tend to pile up and eat up storage space. But you can’t just throw them in the trash. E-waste poses a significant environmental threat if not disposed of responsibly. E-waste is a term that refers […]
Read More
Free technology trend development illustration

7 Transformative Technology Trends Changing the Way We Work

Technology is reshaping the world of work at an unprecedented pace. From artificial intelligence to web3, from the metaverse to the hybrid work model. We are witnessing a series of technological revolutions. They are transforming how we communicate, collaborate, create, and innovate. Let’s explore some of the most impactful technology trends that are changing the […]
Read More
Free log in password sign on illustration

What Is the Most Secure Way to Share Passwords with Employees?

Breached or stolen passwords are the bane of any organization’s cybersecurity. Passwords cause over 80% of data breaches. Hackers get in using stolen, weak, or reused (and easily breached) passwords. But passwords are a part of life. Technologies like biometrics or passkeys haven’t yet replaced them. We use them for websites, apps, and more. So, […]
Read More
Free cybersecurity digital security illustration

How to Organize Your Cybersecurity Strategy into Left and Right of Boom

In the pulsating digital landscape, every click and keystroke echoes through cyberspace. The battle for data security rages on. Businesses stand as both guardians and targets. Unseen adversaries covet their digital assets. To navigate this treacherous terrain takes a two-pronged approach. Businesses must arm themselves with a sophisticated arsenal of cybersecurity strategies. On one side, […]
Read More
people sitting down near table with assorted laptop computers

Coolest Smart Gadgets at Europe’s Biggest Tech Trade Show (IFA)

Every year, tech enthusiasts eagerly anticipate Europe’s most prominent technology trade show. It’s the Internationale Funkausstellung Berlin, or simply IFA. This is a showcase of the latest and greatest innovations in consumer electronics. The show includes everything from cutting-edge smartphones to futuristic smart home gadgets. IFA never fails to impress. Let’s take a closer look […]
Read More
artificial intelligence network programming illustration

9 Smart Ways for Small Businesses to Incorporate Generative AI

There is no escaping the relentless march of AI. Software companies are rapidly incorporating it into many business tools. This includes tools like Microsoft 365, Salesforce, and others. Many people are still concerned about where AI will go. But there is no denying that it makes certain work more efficient. It can generate custom images […]
Read More
black and white laptop computer

7 Helpful Features Rolled Out in the Fall Windows 11 Update

In a world where technology constantly evolves, Microsoft stands at the forefront. It continues to pioneer innovations. Innovations that transform how we interact with our digital universe. The fall Windows 11 update is a testament to Microsoft’s commitment to excellence. It’s more than just an upgrade. It’s a leap into the future of computing. Microsoft […]
Read More
white laptop computer on white table

What Is Microsoft Sales Copilot & What Does It Do?

The use of AI-driven processes is exploding. Every time you turn around, software has gotten more intelligent. Harnessing the power of AI and machine learning is crucial for staying competitive. Microsoft is a pioneer in the tech industry and this new AI era. It continues to lead the way with innovative solutions designed to empower […]
Read More
Free malware ransomware scam vector

Watch Out for Ransomware Pretending to Be a Windows Update!

Imagine you’re working away on your PC and see a Windows update prompt. Instead of ignoring it, you take action. After all, you want to keep your device safe. But when you install what you think is a legitimate update, you’re infected with ransomware. That’s the nightmare caused by an emerging cybersecurity threat. Cybercriminals are […]
Read More
Free Turned on Silver Imac With Might Mouse and Keyboard Stock Photo

These 18 Sustainable Tech Habits Are a Win for Your Bottom Line

In today’s world, sustainability isn’t just a buzzword; it’s a necessity. Businesses around the globe are increasingly embracing eco-friendly practices. This isn’t only for the positive impact on the environment. It’s also for the benefits they can bring to the bottom line. Sustainable technology habits are not only about reducing your carbon footprint. They’re also […]
Read More
Free Round Grey Speaker On Brown Board Stock Photo

How to Keep Your Smart Home from Turning Against You

Smart homes have become a ubiquitous part of modern living. It doesn’t even seem unusual anymore to tell your refrigerator to add milk to the digital grocery list. Smart homes offer unparalleled convenience and efficiency. You can control your lights and thermostat with a smartphone app. And have a virtual assistant like Alexa at your […]
Read More
Free cyber security information illustration

10 Biggest Cybersecurity Mistakes of Small Companies

Cybercriminals can launch very sophisticated attacks. But it’s often lax cybersecurity practices that enable most breaches. This is especially true when it comes to small and mid-sized businesses (SMBs). Small business owners often don’t prioritize cybersecurity measures. They may be just fully focused on growing the company. They think they have a lower data breach […]
Read More
MacBook Pro turned-on

What Is SaaS Ransomware & How Can You Defend Against It?

Software-as-a-Service (SaaS) has revolutionized the way businesses operate. It offers convenience, scalability, and efficiency. No more dragging software from one device to another. Everyone can collaborate easily in the cloud. But alongside its benefits, SaaS brings with it potential threats. When software and data are online, they’re more vulnerable to attacks. One of the latest […]
Read More
Download free HD stock image of Update Upgrade

Should Your Business Upgrade to the New Microsoft Intune Suite?

Endpoint management has changed a lot over the last two decades. There was a time when companies housed all endpoints in the same place. This made managing them simpler. But it held offices back from being mobile and flexible. Today’s office can include endpoints around the globe. Remote teams can work from anywhere. And people […]
Read More
Free cybersecurity data security firewall illustration

Why You Need to Understand “Secure by Design” Cybersecurity Practices

Cybersecurity has become a critical foundation upon which many aspects of business rely. Whether you’re a large enterprise or small business, network security is a must. Cyberattacks can have long-term consequences. The frequency and sophistication of cyberattacks continue to increase. In 2022, IoT malware attacks saw a sobering 87% increase. Attack volume is also ramping […]
Read More
turned on two flat screen computer monitors with speakers

Handy Tips to Optimize a Dual-Monitor Setup for the Best Experience

Two monitors are often better than one when it comes to getting things done efficiently. A dual-monitor setup can significantly enhance your productivity. This is true whether you’re a gamer, a creative professional, or an office wiz who loves to multitask. A study by Jon Peddie Research found that dual displays can increase productivity by […]
Read More
black and white remote control

9 Reasons to Use Airplane Mode Even If You’re Not Traveling

Most people are familiar with their device’s Airplane Mode. You’ve probably used it when jetting off to exotic locations. But did you know that it’s not just for globetrotters? That’s right! Airplane Mode isn’t only for flying; it can be a handy feature for your everyday life. Here are some top reasons why you should […]
Read More
Free robot technology artificial vector

Learn How to Spot Fake LinkedIn Sales Bots

LinkedIn has become an invaluable platform for professionals. People use it to connect, network, and explore business opportunities. But with its growing popularity have come some red flags. There has been an increase in the presence of fake LinkedIn sales bots. These bots impersonate real users and attempt to scam unsuspecting individuals. This is one […]
Read More
Free tech trends report magazine illustration

These 5 Small Business Tech Trends Can Fuel Your Growth

In today’s ever-evolving digital landscape, small businesses have more opportunities than ever. Many of these call for leveraging technology to their advantage. Embracing the right tech trends can help businesses compete. It enables them to streamline operations, enhance customer experiences, and fuel growth. But it can be confusing knowing which routes to take. Most small […]
Read More
Free Gray Laptop on Table Top Stock Photo

These Technologies Can Help You Run Your Small Business Better

Running a small business can be challenging. But advancements in technology have opened a world of opportunities. Small business owners can use digital tools to streamline operations. As well as improve efficiency, and boost productivity. From innovative software to cutting-edge hardware, there are a lot of tools to choose from. The right technology can help […]
Read More
Free malicious code virus hacker illustration

What is Zero-Click Malware? How Do You Fight It?

In today’s digital landscape, cybersecurity threats continue to evolve. They pose significant risks to individuals and organizations alike. One such threat gaining prominence is zero-click malware. This insidious form of malware requires no user interaction. It can silently compromise devices and networks. One example of this type of attack happened due to a missed call. […]
Read More
iPhone charging on MacBook

What Should You Expect in the New iOS 17?

Apple’s iOS updates have always been eagerly anticipated. iPhone and iPad users around the world get excited to see what their devices can do next. The newest major upcoming release will be for iOS 17. This fall, Apple is set to introduce a host of exciting new features and improvements. iOS 17 promises to deliver […]
Read More
Free banner cyber security illustration

6 Reasons Access Management Has Become a Critical Part of Cybersecurity

Cybersecurity has become paramount for businesses and individuals alike. Cyber threats abound, and data breaches and malware attacks are costly. Attacks come from all sectors, including the cloud tools you use every day. The average employee uses 36 cloud-based services daily. Managing access to sensitive data and resources has become crucial. It’s a vital piece […]
Read More
macbook pro on white couch

Have You Tried Out Microsoft Designer Yet?

As technology continues to advance, so does the landscape of design tools. Microsoft has been a company at the forefront of business apps. Microsoft 365 began with about seven apps. It now offers new users access to over 20. One of the newest ones added is Microsoft Designer. This quick-and-easy design tool has caught the […]
Read More
Free Laptop With Cyber Security Text on the Screen Stock Photo

Top 7 Cybersecurity Risks of Remote Work; How to Address Them

Remote work has become increasingly popular in recent times. It provides flexibility and convenience for employees. Additionally, telecommuting reduces office costs for employers. Many also cite productivity benefits due to fewer distractions. Research shows a 56% reduction in unproductive time when working at home vs. the office. But there are some drawbacks to working outside […]
Read More
StoreFrontBlog

We’re Moving!

Some rumors are true. New carpet, paint, and electrical are in progress. We expect to be moved into the new offices by Monday July 25th. Where? 50219 US HWY 101 Suite C. That’s in the business complex across the street from Tire Pros, down in the corner by Norris the Tailor and the Hair Club. […]
Read More
silver Android smartphone

Making Your Mobile Devices Safe From Cyberattacks: The 9 Best Practices

The reality is, mobile devices are less safe than desktop computers. Boosting security on such devices is essential if you use them in business.  Technological breakthroughs have streamlined your operations in several ways. Primarily, you can now use mobile devices to make your communication and data sharing more convenient. But this technological advancement also means […]
Read More

Is Your Data Secure? 8 Best Practices for Vetting Cybersecurity Vendors

An effective way to bolster your business’s data security is to work with a Managed Service Provider (MSP) or I.T. Service Provider (ITSP). They address network vulnerabilities to prevent cybercriminals from exploiting them. Besides monitoring and organizing your servers, a Managed Service Provider (MSP) or I.T. Service Provider (ITSP) plays a pivotal role in the […]
Read More
desktop

7 Tips on Organizing Your Office Desktop to Improve Productivity

Increasing productivity in your business doesn’t just entail optimizing your equipment and sharpening your attention. Decluttering your computer desktop is also essential.  A clutter-free office is paramount to improving your productivity. Piles of stationery on your desk can cause you to waste a lot of time searching for a critical document. As a result, you’re […]
Read More

The University That Was Hit by a Cybersecurity Attack (and the 6 Cybersecurity Vulnerabilities You Need to Ensure Your Business Doesn’t Have)

Cybercriminals can take advantage of various vulnerabilities in your company. Patching them up is crucial to protecting your reputation. Taking your cybersecurity seriously is essential regardless of your organization. Otherwise, criminals can easily halt your operations.  Take the University of Sunderland as an example.  At first, it seemed like they had a standard IT issue […]
Read More
image

The Five Steps for Creating a Business Continuity Plan

How will your business respond when faced with an unexpected situation? With a business continuity plan, you’ll know exactly what steps to take. Leading a small business is a challenging endeavor. According to a January 2021 article published by Entrepreneur, 20% of small businesses fail within their first year of operation. And a staggering 50% […]
Read More
Windows 11

5 Biggest Questions About Windows 11 Answered

Microsoft’s latest operating system is starting to take the world by storm. But before jumping ship and upgrading to the new OS, better read this first. It’s finally here.  After six years, Microsoft has just released the latest version of its operating system — Windows 11. At a time when computers and technology play a […]
Read More

Yes, We Are OPEN

We are still open for walk-ins, and we have invested in faster, more secure remote access software to handle most issues without you needing to leave your office (or home!) Remote support is now just a click away https://bandon.it/online-support/
Read More
bact

Hygiene 101

While keeping your computing devices free from harmful virtual viruses on the internet is important, there is another type of harmful element that often is overlooked. The physical virus. There are hundreds of studies that show the average keyboard and smartphone are hundreds, if not thousands of times dirtier than your toilet, per square inch […]
Read More

Uninterruptible power supply (UPS)

  It’s that time of year again (I’ve received six calls before 9AM today)  when power outages have the potential to wreak havoc upon computer systems and networks.  While having a surge protector helps protect your electronics from surges, it does nothing to prevent damage from a brownout or sudden unexpected loss of power. This […]
Read More

Might be interesting

Reading a summary of my own history, I feel like a vagabond man.  Write up from The World newspaper about Bandon IT, and myself (Aaron.) http://theworldlink.com/bandon/news/business/bandon-it-offers-computer-adds-internet-at-t-directv-services/article_955310e4-769a-5db2-a8ac-a5bae5d7f140.html
Read More

Google Drive – New Features and Name

For the few folks out there that may be unaware or not use Google Drive – this is a software based virtual “drive” associated with your Google / Gmail account (similar to Microsoft’s Onedrive)  You can place any type of file in your Google Drive folder on your computer, and it automatically synchronizes to your […]
Read More

Podcasts

  When I was ten (well before the internet age) I would secretly stay up late at night listening to my scratchy AM radio and tune into the adventures of Don Quixote and his faithful squire Sancho, as he battled windmills and musketeers. Today I don’t even own a radio, but the spirit of Don […]
Read More

Before you Switch

  This may come as a surprise for some – if you change your ISP (Internet Service Provider) you lose your hosted email services from that provider. Example, if you use Charter and switch to ComSpan you no longer get to use your @charter.net email. If you switch from Frontier to another provider, you no […]
Read More

Card Compromised

Today we are going to look at a few of the more common ways your credit or debit card number can be compromised. Skimmer – this is a device that card thieves insert into a normal looking “swipe” location. It could be at the gas station, your ATM, or any retail store you go to.  […]
Read More

Windows 10 Adds Ads

  Market share wise Microsoft continues to dominate the laptop and desktop world with claiming ownership of 89% of such devices or roughly 283 million machines. The remainder are Apple devices, Chromebooks and a few Linux operating systems. As competition continues to grow, and Microsoft continues to make poor choices in implementation (everyone remember your […]
Read More

Know Your Numbers

  Scammers come in varieties of sheep clothing. They call impersonating Microsoft and Google, stating that there is “something wrong with your computer.”  They send pop-ups to your computer stating the same.  But did you know they advertise? If you do any type of search for Microsoft,  HP, Dell, Gmail, or other major computer hardware […]
Read More

Amazon – Delivery to the Moon

  Last week Amazon announced that they are slated to begin deliveries to the moon by mid 2020. What does that mean? It means they believe by that time there will be humans (or maybe robots) living there that may require products from their vast supply chain. Over the last few years Amazon has continued […]
Read More

Who is watching you?

  In the age of Siri, Google Now, Cortana, and Amazon’s Alexa (all virtual assistants) we are becoming more accustomed to having electronics constantly listening for our next verbal command.  We know there is a trade off between privacy and convenience. What about your television, though? You may (or may not be) aware that some […]
Read More

Online Competition

Today there are virtual marketplaces online across the globe that you can purchase anything you could possibly imagine, legally – and – illegally, online.  We will not be discussing the “how-to” for hiring a hit man or human trafficking today, rather the competition between the legal companies. Walmart steps up the ante.  Recently Walmart began […]
Read More

Types of Backup

  Last week I discussed the cost of backup failure. This week I am presenting the different types of backups along with some of the pros and cons of each. First to clarify what is and is not considered a backup.  Programs that automatically synchronize data directly from your computer to an online service such […]
Read More

Backups – Cost of Failure

After years in the IT business it has become quite evident that most people do not backup their data.  It is a weekly occurrence in this office when the phone rings and the panicked caller presents the problem of a computer system that has crashed, pleading for hope and assurance that everything can be restored […]
Read More

Hacktivists Say Hello

October is Cybersecurity Awareness Month – learn more from https://www.dhs.gov/stopthinkconnect   Last Friday you may have noticed something was afoot with the internet. The largest, full scale cyber attack ever launched was underway and the main target was the United States, affecting millions of users across the continent, then spreading beyond to Europe and Australia. […]
Read More

Be watchful for identity theft, fraud, phishing

  October is Cybersecurity Awareness Month – learn more from https://www.dhs.gov/stopthinkconnect Identity Theft Identity theft is the illegal use of someone else’s personal information in order to obtain money or credit. Identity theft can happen to anyone in any location across the country. Take simple steps to protect your online identity by: Locking and password […]
Read More

Stop. Think. Connect.

Every Day Steps Towards Online Safety with Stop.Think.Connect. October is Cybersecurity Awareness Month – learn more from https://www.dhs.gov/stopthinkconnect This month is all about security and we are starting off with the basics of Stop, Think, and Connect. Stop hackers from accessing your accounts – set secure passwords and do not use the same password more […]
Read More

Printers

Of all the possible complex issues to deal with in the technology field nothing makes me falter a step forward until I hear “Something is wrong with my printer.”  Printers are the greatest bane in information technology. Usually most printing issues are resolved rather quickly by clearing a print queue, restarting the print spooler, or […]
Read More

What you leave behind

Most of us in our day to day activities do not spend much time pondering what happens when we die. Perhaps it is due to not being exactly sure of what happens after we leave this plane of existence, or the fear of leaving loved ones behind. Regardless of why we do not think about […]
Read More

Updates, Recalls, and More

Apple Security. Last week Apple released an important security update to the OSX operating system.  If you use a Mac, you need to get this update installed ASAP.  This follows Apple’s security update to iOS devices (iPhones and iPads) to version 9.3.5, also a security update.  If you have been telling your iOS device ‘later’ […]
Read More

Email – best choices

  Today there are a plethora of choices when it comes to whom to choose to handle your primary email.  Your ISP (Internet Service Provider) gives you email accounts as part of your service.  You can also get free accounts from Google, Microsoft, Yahoo, and many more. We’re going to examine a few of these. […]
Read More

Cutting the Cord

  How much do you pay for television?  Depending on your provider and the package you have it can be upwards of $120.  But of those 500 channels how many do you really watch? Is it worth it?  How would you like to change that $9.99 a month? You may have heard the term “cord […]
Read More

Internet Outage Cripples Bandon

  Even if you were not a direct customer chances are you were affected by the 12 hour ComSpan outage on Thursday.  Multiple businesses had signs posted stating “cash only” just for those customers to find many ATMs said “Out Of Order – Internet Issue.”  Many other businesses that rely on web based servers were […]
Read More

Let’s get DiRTy

Let’s get DiRTy DiRT, otherwise known as Disaster Recovery Testing, is Google’s attempt to break the web. More specifically this team’s mission is to provide (and actually simulate) worst case scenarios to Google’s sprawling worldwide infrastructure, taking entire live data centers offline without notice.  The end goal is to find weaknesses in their own disaster […]
Read More

First Anniversary Thank You

  August marks our first full year with the Bandon IT office on 101.  Thanks to our great Clients, Partners, Colleagues, Family and Friends that have made it all possible. In this last year we have: Welcomed 383 new clients Completed 769 work orders Performed 116 onsite support visits, ranging from Port Orford, Powers, North Bend, […]
Read More

Do you brush your teeth?

  Do you brush your teeth? Most people do. It is a standard proactive maintenance procedure that helps stave off cavities, bad breath, root canals, and a plethora of other dental maladies. Just as proactive maintenance is good for your dental hygiene it is also good for your computer.  No, you should not take a […]
Read More

2FA – Do it and sleep better

  2FA.  It sounds like either some gaming group or military acronym however it is not. It stands for 2 Factor Authentication, and it’s what may save you from being hacked. Recently MySpace and not too long before that LinkedIn were hacked; the hackers obtained the usernames, email addresses and passwords of millions of users.  […]
Read More

QuickBooks users – update now

A common mantra we have is “update, backup, update, backup”.  If you are a QuickBooks user, today is your day. Intuit has identified and is implementing an update to address a security vulnerability in QuickBooks desktop software.  This does not impact QuickBooks desktop for Mac or QuickBooks Online. Below is an outline of the steps required […]
Read More

Bandon Business Fair 4/28/16

3rd Annual Business Fair We are excited to be participating in the Bandon Business Fair tomorrow 4/28/16 at the Bandon Community Center (The Barn). The event begins at 1PM running until 7PM.  There will be up to 40 different local businesses in attendance.  This event is open and free for the public to attend. There […]
Read More

QuickTime joins the legacy software list

  A few days ago Apple announced it was officially abandoning support for QuickTime. This affects Windows and Apple users as the software is cross-platform (works on both types of computers). If you have QuickTime installed on your computer, you need to uninstall it. The reason it needs to be removed – there are currently […]
Read More

New Year – New Classes

First quarter schedule for 2016 has been posted and classes start this week at the Bandon Library.  Classes are spread out throughout the week in the afternoon and evenings.  Windows Mac and iOS classes are available. CyberLynx Online Calendar: http://cyberlynxoregon.org/current.html PDF Class Schedule: PDF Class Schedule 1st Qtr 2016
Read More

New – Screen Repair

The drive is over!  Bandon IT now offering repairs to most types of smart phone screens in-store in Bandon. No more need to drive to Coos Bay, Roseberg or Eugene.  Same day turnaround provided parts are in stock (most are).  Contact us for more information, or check out our Cracked Screen page for which models […]
Read More

Free classes!

Bandon IT has paired up with Cyberlynx,  which offers computer literacy classes in collaboration with the Bandon Public Library and Bandon Library Friends and Foundation. Classes labs and workshops are offered to the public at no charge. Bandon IT will be bringing the additional expertise for Apple, and iOS training to the organization. Class schedule and […]
Read More

Bandon IT joins the Bandon Chamber of Commerce

Today I am very pleased to announce that Bandon IT has joined with our fellow local businesses and we are now a member of the Bandon Chamber of Commerce. I look forward in seeing how Bandon IT may assist the Chamber in our region in securing a continual and favorable business climate for our current […]
Read More

Windows 10 available July 29th

Just over three years ago the world was introduced to Windows 8, Microsoft’s “next great thing” to help users transition from the idea of the old school desktop into a more universal platform designed to be used in tandem with laptops, tablets, and smart phones.  The public’s general response: we hated it. Overall the system was […]
Read More

Audible coming to Apple CarPlay

  I spend roughly no less than 14 hours a week in my vehicle driving.  With that much time on my hands I greatly enjoy listening to audiobooks. Earlier this year I upgraded my car’s sound system from the stock baseline Toyota radio to the Pioneer Apple CarPlay. The primary goal in this was safety, […]
Read More

Periscope Up – time to get onboard

What is Periscope? Periscope is an instant live streaming app that lets the user broadcast sound and video to the world.  Viewers can type in questions / comments that the broadcaster can then verbally respond to.  From www.periscope.tv/about: “Just over a year ago, we became fascinated by the idea of discovering the world through someone else’s […]
Read More

Windows 10 will be the last

Microsoft announced this week after the new Windows 10 release later this year, there will be no more. Instead of waiting years to release major upgrades to the Windows platform Microsoft intends to adopt more of a “when it’s ready, we’ll update it then” approach, similar to how smartphones today receive updates. Microsoft has not […]
Read More

Tip # 10 – Run anti-virus scans regularly

Check your security programs and make sure they are actually working.  If a third-party handles your computer and network security, have them show you that they are working.  The programs should be doing live scanning along with scheduled quick and full scans. It’s Cyber Security Month! 31 security tips in 31 days brought to you […]
Read More

Tip # 9 – Do not open unexpected email

Have you received this email?  You were not expecting any packages? Someone else in the office must have ordered this, so I should click on the attachment to ‘print’ my label to pick it up, right? No! Fake email.  The spoofed (to be made to look real) sender address @fedex.com helps the legitimacy of the […]
Read More

Tip # 8 – Identify Fake Updates

One of these two update notifications is real.  The other is fake, leading the user down a long a dark demon filled road full of malicious software.  Can you correctly pick out the fake? If you chose the first image as the fake you are correct.  At first glance it may seem legitimate however on […]
Read More

Tip # 6 – Fine tooth comb

Continuing from yesterdays post Tip # 5 – Maintain your systems. Update update update we are going to segue into another important security task – monitoring. Let’s explain the term monitor: in this context, to monitor means to actively watch on a 24/7/365 basis all software and hardware.  From a security standpoint monitoring the services, processes […]
Read More

Tip # 5 – Maintain your systems. Update update update.

From a security perspective ensuring that workstations and servers on your network have proactive maintenance performed on a regular (weekly) basis is key.  Most malicious software target security holes found within out of date programs.  If the anti-virus product fails at catching malicious software (and none are 100%), the chances that it can gain a […]
Read More

Tip # 4 – Stop using Yahoo. Just stop it. Now.

I bring this security tip to bear due to continued mounting issues we see when our clients use Yahoo.  There are three separate pitfalls that users of other web portals and email services have not had yet to encounter to the degree of Yahoo users. Email hacks from the back-end.  Think you have the strongest […]
Read More

Tip # 3 – Read installers carefully

On occasion we need to either install new software on our computers or update them.  Today with most software you install or update, they will try to add on additional software that you really do not want. Take for example CutePDF.  It takes anything that you can print and turns it into a PDF document. […]
Read More

Tip # 2 – Stop using Internet Explorer

  CERT (United States Computer Readiness Team) has on more than one occasion released the following information to system administrators and the general public:  Stop using Internet Explorer. Why? What’s wrong with the big blue E?  Security issues.  While IE is down to 23% of market share, it still leads in vulnerabilities.  Reports of bugs, […]
Read More

Tip # 1 – Don’t click on ads

While browsing the internet we all occasionally see flashy ads on the web pages we are looking at.  Some are harmless.  Others are trying to trick you into clicking on them to download software you did not need, or want. Clicking on these ads may install ‘junkware’ aka adware, or worse some derivative of malware. […]
Read More

Jimmy Johns Data Security Breach

Have you eaten at Jimmy Johns in Reno between June 16th and September 5th and used a credit card to pay for it? If so, go to the front of the line and get a new credit card. Jimmy John’s says it’s the latest business hit by hackers.  There are 216 stores involved in the credit […]
Read More

Study: 43% of companies had data breaches in past year

An annual study of on data breach preparedness by the Ponemon Institute has found that 43% of companies have experienced a data breach within the last year, up 10% from the year before. Despite the rise in breaches in 2014, 27% of companies did not have a data breach response plan in place. The survey was conducted […]
Read More

HP Power cord recall

  Important Safety Recall HP Program Replacement and Recall Safety Cord Power AC PC Notebook August 26, 2014 In cooperation with various government regulatory agencies, HP has announced a voluntary recall and replacement program for certain AC power cords used with AC adapters shipped with HP and Compaq notebook and mini notebook computers, as well […]
Read More

Today Is World Password Day. You know what to do.

  Today Is World Password Day, So It’s Time to Change Some Settings POLLY MOSENDZ Today is World Password Day, a holiday/public service announcement created to remind millions of internet users to protect themselves online. Created by Intel Security and supported by over 170 organizations, including the likes of Microsoft, Toshiba, and Dell, it asks […]
Read More

National Star Wars Day!

    Keep the younglings close as you venture forth into May 4th, also known as the say named, ‘May the Force be with you”! According to StarWars.com, one of the earliest known records of “May the 4th” came in 1979, when Margaret Thatcher won the election to become Britain’s first woman prime minister. To […]
Read More

Heartbleed – what you need to know

An encryption flaw called the Heartbleed bug is already being called one of the biggest security threats the Internet has ever seen. The bug has affected many popular websites and services — ones you might use every day, like Gmail and Facebook — and could have quietly exposed your sensitive account information (such as passwords and credit […]
Read More

Defend yourself – April Fools is Nigh

Last year around this time we introduced the EMPP following the surrender of France to North Korea. This year (if you can read this upside down) we would like to invite you to partake in the shenanigans. Buzzfeed has a top 17 list of tech April Fool pranks for you to share with your friends (or […]
Read More

The Problem with Facebook

Ever wonder why you can’t find that post someone else swears they made? Or perhaps why your friends and family say they didn’t see yours? This was originally brought to my attention by a post from Felicia Day: “This is the reason why I don’t enjoy interacting on Facebook, in order to have my posts […]
Read More

Have you been Targeted?

Today Target began sending out the obligatory “we’re sorry” emails to the estimated 110 million (up from the original 40 million) customers that have been affected by the security compromise in November and December 2013. A quick recap of what happened (in case you’ve been under a rock).  Hackers gained access to Target’s database of […]
Read More

Security Recommendation – MalwareBytes

Due to increased malware / virus / trojan activity, and specifically some ransomeware named Cryptolocker, we are now strongly advising all clients to purchase MalwareBytes Professional for all Windows based computers that attach to your networks. MalwareBytes Professional (at this time) is the only product that is catching and stopping this particularly hideous program. A […]
Read More

Viruses and trojans – how not to get infected

Wednesday October 16th at 3PM PST we will be presenting a live Q&A about the science of viruses, trojans, malware, spyware, rootkits and other nasty beasts.  Central theme will be how to protect a computer from these threats.  You can watch live by going to our site at www.lassenpc.com and enter questions during the presentation. […]
Read More

Windows 8 Review – and it’s not pretty

After months of frustration and speaking with other techs about Windows 8, I came across today an animated review that is spot-on with all of our angst and disgust. It is rather long, but he gets the point across.  Just avoid the farting goblins if you can. From http://www.loopinsight.com/2013/01/04/windows-8-review-the-thing-blows/      Written by Jim Dalrymple
Read More

One Ring to Rule Them All

Imagine a day in the not-so distant future. A day where, when you walk up to your computer, it automatically logs you in. A day when you go to login to your Gmail, Newegg, bank, Amazon, and 10 other online accounts that they as well login you in with no hassle, no fuss… just open […]
Read More

JAVA Security Alert – Suggested to disable until updated

Due to new found security vulnerabilities in JAVA, and with a patch not coming out until at least this coming Tuesday the Department of Homeland Security along with the majority of anti-virus companies are recommending disabling the software until the security update is available. Apparently the security issue in question makes the web browser vulnerable to virus / trojan infected websites […]
Read More

Apple moves production to USA

Tim Cook CEO of Apple announced today that in 2013 production will begin in the USA of some of their products, previously that had been made oversees in China. Apple putting Americans to work? We salute you! CNET has a more in-depth story that can be found here: http://news.cnet.com/8301-13579_3-57557480-37/tim-cook-apple-to-pour-$100m-into-u.s-mac-production/    
Read More
Apple USA 1

The new iMac – bring your glue gun

It’s no secret that we like and work on macs. However Apple’s newest iMac to enter the playing field is not going to be a favorite to perform any hardware upgrades on. This article from Zdnet http://www.zdnet.com/ifixit-teardown-apple-makes-new-imac-as-hard-as-ever-to-repair-7000008173/ details the iFixit teardown of the new iMac, and the troubles within. I think I’ll stick with the mac minis […]
Read More