New computer recommendations

Updated 1/26/26:

There’s been a global supply shortages for RAM and SSDs that have caused a dramatic increase in prices over the past few months. RAM and SSDs are major and expensive components that are used in computers. Therefore, inventory of computers that were built by manufacturers a few months ago before the dramatic increase in prices are now being sold through, and we expect prices of computers to rise dramatically in the next few months.

You may be reading this because the operating system on your existing computer is no longer supported. Since you’ll likely be spending the next 5-10 years or more with your next computer, please take a few minutes now to make an informed decision about what to look for in a new computer and accessories – and get the best deal. 

Our recommended minimum new computer specifications are:

  • Intel Core i3/AMD Ryzen 5 processor or better. For an Apple Mac computer we recommend getting Apple’s “M” series processor rather than an Intel processor.
  • 8 GB RAM or more
  • 256GB Solid State Drive (SSD) or larger
  • Please read New Computer Buying Guide for more detailed information.

If you’re thinking about trying to save money by buying a refurbished computer – we don’t recommend it. Typically they won’t last as long as a new computer, and are less secure due to unpatched processor flaws and some cannot be upgraded to more recent secure operating systems.

We’ve seen the best reliability with HP and Dell brands. Keep in mind that cheaper laptops and all-in-ones typically only have a vertical screen resolution of 768 pixels, whereas higher quality and clearer screens are 1080 pixels or higher.

Click on the links below to view recommended computers meeting the minimum recommended specifications noted above at the respective retailer’s website. Some models may be available in-store. If you come across a good deal elsewhere, remember to look for specifications that are a minimum of what’s listed above.

[Read more…]

Beware: The Latest Tech Scams You Need to Know About

Cybercriminals are always looking for new ways to trick people, and we at Computer Techs are seeing an uptick in scams that target computer and internet users. These scams often look convincing on the surface, but with a little extra caution, you can spot the red flags before becoming a victim.

Fake Invitations and Social Security Statements

One of the most dangerous scams making the rounds is an email that appears to come from someone you know—a neighbor, friend, or even a family member. The message might say something like “RSVP for the celebration (of life)” ,“Click here to view the invitation.”, “Check out this important document” or “Check out the pictures”.

If you click the link, it discreetly downloads a remote access trojan onto your computer. Once installed, scammers can take control of your system, access your online accounts, steal data, or even lock you out completely.

Since the re-named file is a legitimate remote support tool often used by businesses, antivirus programs do not detect it as malicious. But what scammers can do via remote access to your computer can be very dangerous and impact your finances and identity.

This same method of a disguised remote support tool has also been seen as a fake Social Security Statement, and will likely evolve into other methods of deceptive delivery.

👉 How to protect yourself:

  • Never click unexpected links, even if they appear to come from someone you trust.
  • If the email feels suspicious, call the person directly to confirm they really sent it.

Fake Invoice Scams (McAfee, Geek Squad, and More)

Another common scam involves fake invoices seemingly from big-name companies such as McAfee, Geek Squad, Norton or PayPal. These emails claim you’ve been charged for a subscription renewal and provide a phone number to call if you want to cancel.

Of course, the invoice is fake. If you call, scammers may trick you into giving them remote access to your computer or your credit card details.

👉 How to protect yourself:

  • Legitimate companies don’t send invoices out of the blue for services you didn’t order.
  • Check your bank account or official account page directly instead of trusting an email.
  • Don’t call the number in the email—go to the company’s official website for real contact information.

Fake cloud storage notices

Unfortunately, cybercriminals have found ways to exploit the popularity of cloud services through phishing scams. A recent surge in email and text message scams involves messages that claim:

  • Your cloud storage is full.
  • Your cloud account is about to expire.
  • You’ve exceeded your storage quota and must pay to continue accessing your files.
  • Your files will be deleted.

These messages often include a link that leads to a fake login page or payment form, which can steal your login credentials or credit card information. Some variants will even try to sell you an alternative bogus cloud storage service. The scammers may even spoof legitimate services like Google, Apple, or Dropbox, making the messages look authentic.

Read more info here…

How to Spot a Scam Message

Scammers rely on urgency, fear, or curiosity to get you to click. Before responding to any unexpected email, text, or phone call – even if it appears to come from someone you know – take a step back and look for these signs:

  • Bogus addresses or phone numbers – Hover over (but don’t click) an email address or link to see where it really leads.
  • Bad grammar and spelling mistakes – Billion-dollar corporations don’t send sloppy emails.
  • Generic greetings – Messages that start with “Dear Customer” instead of your actual name are suspicious.
  • Pressure to act quickly – “Act now or lose your account!” is a classic scam tactic.
  • Think about the situation – Why would a friend send you something out of the blue? Why would you get an email from PayPal or McAfee if you don’t even have an account with them?

The Golden Rule: Don’t Click

Above all, never open unexpected email links or attachments. If something looks even a little off, pick up the phone and call the person or company using a number you trust—not the one in the suspicious message.

Click here to view examples of the latest phishing and scams that we’re seeing.

Final Thoughts

Scams are becoming more sophisticated, but with a little vigilance you can stay safe. When in doubt, remember: slow down, verify, and never click blindly.

What You Need to Know About the End of Support for Windows 10

  • Microsoft ended support for Windows 10 on October 14, 2025. There’s no more free updates*, security patches, or technical support available from Microsoft – unless you take action.
  • Most users have 3 options: upgrade to Windows 11, get a new computer with Windows 11, or extend Windows 10 security updates until October 2026.
  • Upgrading to Windows 11 is recommended for most users for its advanced security, improved performance, and new features.

Updated 11/1/25:

Now that Microsoft’s Windows 10 operating system has reached the end of mainstream support, computer users that haven’t taken action yet to address their out-of-date operating system should do so as soon as possible and definately before the end of 2025. One option is to enroll in Microsoft’s first-time ever “Extended Security Updates” program for personal computers using Windows 10, that will extend security updates for an additional year – until October 13, 2026. Continue reading below to become more informed about all of the options.

The Start button taskbar icons for Windows 10 vs Windows 11.

What Are Your Options?

If you haven’t already taken action, it’s time to do so now. Windows 10 users have three primary options:

  1. Upgrade your existing computer to Windows 11 for free
  2. Get a new computer with Windows 11
  3. Enroll in the Extended Security Updates program for free to Continue using Windows 10 until October 2026

Let’s explore these options and why ultimately upgrading to Windows 11 is probably your best choice.

[Read more…]

The most dangerous new threat on your computer is not a virus, and may come from someone you know

One of the most dangerous scams making the rounds is an email that appears to come from someone you know—a neighbor, friend, or even a family member. The message might say something like “RSVP for the celebration (of life)” ,“Click here to view the invitation.”, “Check out this important document” or “Check out the pictures”.

If you click the link, it discreetly downloads a remote access tool onto your computer. Once installed, scammers can take control of your system, access your online accounts, steal data, or even lock you out completely. They wait for you to step away from your computer, or the middle of the night when you’re asleep. They go through your web browser, password manager and files. If they can access your financial institutions they may attempt to transfer money out. If they can access your Amazon or other online shopping accounts, they may try to purchase gift cards using your saved payment information. If they can access your email, they may intercept account sign in links and codes, make a copy of your address book, and use your email address and/or familiar name to send a similar “invitation” to your contacts in hopes to scam others.

[Read more…]

How to save money on internet, phone and TV service in 2026

Saving money on internet, phone, TV, and cell service can be a game of strategy! Here are some tactics to consider:

General Strategies:

  • Negotiate your current bills: Call your providers and politely but firmly negotiate a lower rate or better deal. Mention competitors’ offers or threaten to cancel. Be prepared to walk away.
  • Bundle services: Consider bundling multiple services with the same provider. For example, Spectrum and AT&T both offer considerable discounts on wireless phone service when you bundle with their home internet service. But it may not make sense to bundle ALL of your services.
  • Downsize your plan: Analyze your usage for internet and cell phone data. If you’re not using all the features or amount of internet speed/data in your current plan, downgrade to a cheaper one.
  • Shop around: Compare prices and deals from different providers in your area. You might find a better offer than your current one.
  • Look for discounts: Many providers offer discounts for seniors, students, low-income families, and military personnel. See if you qualify for any.
  • Utilize free options: Explore free alternatives for TV, like streaming services with free trials or using a library card for free access to movies and audiobooks.
[Read more…]

The Case Against Using the Email that AT&T and Spectrum Provides

Most people that have been using the Internet in the Reno area for a long time have an email address that ends in @att.net, @sbcglobal.net, or @charter.net. You probably got this email address for free when you first signed up for internet service years ago.

It is the address your friends use to contact you, and it is the username for financial, device, social media and medical accounts. The idea of changing it now probably feels like a huge headache.

However, Computer Techs and other technology experts strongly suggest that you stop using email provided by your Internet provider – commonly AT&T and Charter/Spectrum in the Reno area. It isn’t just about having the newest technology—it is about protecting your freedom and keeping your information safe.

Here is a simple explanation of why you should consider making a change, and why it is worth the effort.

[Read more…]

Backup Options in 2026: Safeguarding Your Digital Life Across Devices

In 2026, our digital lives are more intertwined with our devices than ever before. From cherished family photos to critical work documents to keeping track of medications and health history, the data on our computers, tablets, and smartphones is invaluable. Losing it can range from a minor inconvenience to a catastrophic event. Fortunately, a robust ecosystem of backup solutions exists, offering peace of mind across Windows, macOS, iOS, iPadOS, and Android devices.

This article explores the essential backup options available in 2026, covering both popular cloud services and reliable local methods, ensuring your data remains safe and accessible.

The Importance of a Multi-Layered Backup Strategy

“Moving” you photos or documents to an external flash drive or other storage media to save space is not a backup – and not recommended. If that external storage gets lost or the data gets corrupted, the data is lost. It’s crucial to understand the “3-2-1 backup rule.” This golden standard recommends:

  • 3 copies of your data: The original and at least two backups.
  • 2 different types of media: For example, a local hard drive and cloud storage.
  • 1 offsite copy: To protect against local disasters like fire or theft (typically handled by cloud backups).

Adhering to this rule significantly reduces the risk of permanent data loss.

Cloud Backup Solutions: Convenience and Accessibility

Cloud services offer automatic, offsite backups that are accessible from virtually anywhere. They often come with subscription plans that scale with your storage needs.

[Read more…]

Fortress Inbox: The 4 Pillars of Securing Your Email Account

Your email is the “master key” to your digital life. It’s where you receive sign-in codes and password resets for your bank, social media, healthcare portals and even other email accounts that you likely have. If a hacker gets into your email, they can get into most everything else.

Securing it doesn’t have to be complicated. By implementing these four layers of defense—unique passwords, passkeys, 2FA, and recovery info—you can make your account virtually impossible to breach.

[Read more…]

How to use a passkey on your smartphone to sign in on a computer

One of the best things about passkeys is that they aren’t trapped on just one device. Even if you haven’t synced your passkeys through a cloud service like iCloud Keychain or Google Password Manager, you can still use your iPhone or Android phone as a “physical key” to sign into websites on any computer.

This cross-device login uses a combination of Bluetooth (to prove the phone is physically near the computer) and a QR code (to establish a secure encrypted connection).

If you aren’t already familiar with setting up and using passkeys, read this article first: A Beginner’s Guide to Passkeys: How to Set Them Up, Use Them, and Sync Across Devices

Here is how to use a passkey stored on your smartphone to sign into a website on your Windows PC or Mac.

[Read more…]

Do this now: Protect your browser passwords from prying eyes

Browsers are designed for speed. By default, if you are logged into your computer, your browser assumes it is safe to autofill your usernames and passwords the moment a login page loads.

This creates a dangerous “single point of failure.” If you step away from your unlocked laptop for just a minute, or if someone gains remote access to your computer, they have instant access to your bank, email, and sensitive accounts without needing to know a single password.

You should fix this immediately. Every major desktop browser allows you to require re-authentication—entering your computer’s PIN, password, or using a fingerprint scan—before it fills in credentials. This adds a layer of protection that stops unauthorized users in their tracks.

Here is how to enable these protections on desktop versions of Chrome, Edge, Firefox and Safari.

[Read more…]

Browsing Made Easier and Safer: What’s New in Your Web Browser

The internet is always changing, and so are the tools we use to explore it—our web browsers (like Chrome, Edge, and Safari). In 2025, you might notice some exciting new features designed to make your time online easier, safer, and smarter, especially when it comes to logging in and protecting you from tricky scams.

🤖 Smart Helpers: The New AI Features

Artificial Intelligence (AI) is like a clever assistant built right into your browser now. These new AI tools are designed to help you understand and interact with the web more efficiently.

  • Quick Summaries: If you open a long article or a complicated page about a topic, the AI can read it and provide a short, easy-to-understand summary for you. This saves you time and gets you the main points right away.
  • Ask Questions: Instead of searching for something and clicking through many links, you can sometimes just ask your browser a direct question about the page you’re looking at. For example, if you’re on a recipe website, you could ask the AI, “How many calories are in this dish?”
  • Better Accessibility: The AI is also making the web easier for everyone. It can now describe images for those with vision impairments or offer new tools that let you easily adjust the color, contrast, and text size of a webpage to reduce eye strain.

🛡️ Stronger Protection Against Scams (Scareware)

Scammers often try to trick you with alarming, fake messages called scareware. These are those shocking pop-ups that suddenly appear, flashing warnings that your computer is infected with a virus and urging you to call a fake “tech support” number right away.

In 2025, web browsers like Microsoft Edge are building in powerful new features to spot and stop these scams before they can trick you.

  • Automatic Blocking: The browser now uses its own “smart sensors” to look for the signs of a fake warning page (like the screen suddenly going full-size or blocking your “Back” button).
  • Shutting it Down: When the browser detects one of these scary scams, it will automatically block or shut down the malicious page, often before the fake warning even finishes loading. This prevents you from seeing the scary message or accidentally calling the scammer’s number.

🔑 Say Goodbye to Passwords with Passkeys!

One of the biggest changes is a new way to log into your favorite websites called Passkeys. Think of Passkeys as a digital “key” that is much more secure and easier to use than your old passwords.

  • No More Remembering: You won’t have to remember long, complicated combinations of letters and numbers anymore.
  • Simple Log-in: To use a Passkey, you simply unlock your device (your phone, tablet, or computer) the way you normally do—using your fingerprint, your face (Face ID), or your device’s simple PIN.
  • Super Safe: Passkeys are much harder for scammers to steal because the “key” stays locked on your personal device. They can’t trick you into giving away your fingerprint or PIN over the phone or email.

Tip: You don’t need to switch all at once! Most websites will still let you use your old password as a backup. When you see a site ask you to “Create a Passkey,” you can give it a try for better security.

These new changes are all about making the internet a more comfortable, convenient, and most importantly, safer place for you to explore.