Check the Source to Help Stop Phishing and Scams

In today’s digital world, phishing and online scams remain some of the most common ways criminals trick people into giving up sensitive information. These attacks often look convincing—emails that appear to be from your bank, websites that resemble popular retailers, or texts that mimic delivery services. However, most phishing attempts can be uncovered with a simple habit: checking the source email address or website before taking action.

Why Source Details Matter

Scammers rely on urgency and trust. They want you to act quickly—click a link, download a file, or share personal information—before you pause to think. The messages might use official logos, professional language, or even the names of real employees. But what they cannot fully hide is where the message came from.

Spotting these differences is one of the easiest ways to recognize a scam.

Common Red Flags in Email Addresses and Websites

  1. Misspellings or substitutions – “paypaI.com” with a capital “i” instead of “paypal.com.”
  2. Unnecessary prefixes or suffixes – “login-verification-yourbank.com.”
  3. Free email providers – If “Apple Support” emails you from @gmail.com, it’s fake.
  4. Non-matching links – Hovering over a link shows the true URL. If the text says “www.bankofamerica.com” but the link points somewhere else, don’t click.

Simple Steps to Protect Yourself

  • Always hover before you click. Place your mouse over a link (without clicking) to see where it really leads.
  • Check the sender. If the email claims to be from your bank, but the address isn’t from the official domain, delete it.
  • Look for HTTPS. Secure sites start with https://. While not foolproof, a missing “s” is a red flag.
  • When in doubt, go directly. Instead of clicking a link in an email, open your browser and type the official website address yourself.

The Bottom Line

Phishing and scams succeed when people act without verifying. By taking just a few seconds to check the source email address or website, you can avoid most of these traps. It’s a simple but powerful defense that costs nothing and protects everything.

Check out our public album on Google Photos of screenshots from phishing and scam texts, emails and websites – which can help you know what to look for in every unsolicited message. Click here: Phishing and scam examples.

What You Need to Know About Backup and Cloud Storage – And How to Avoid Recent Scams

In today’s digital world, the importance of backing up your data cannot be overstated. Whether it’s precious family photos, important documents, notes, contacts, or your calendar/reminders, losing data can be devastating. Cloud storage has become one of the most popular and convenient ways to ensure that your files are safe, accessible, and recoverable in case of loss. However, as the use of cloud services has grown, so too has the number of scams targeting unsuspecting users.

Understanding Cloud Storage and Backups

Cloud storage is a service that lets you save data on remote servers accessed via the internet. Major providers like Google Drive, Apple iCloud, Microsoft OneDrive, and Amazon Drive offer users the ability to store files securely and sync them across multiple devices.

Backup refers to the process of copying data from your devices and storing it elsewhere (such as in the cloud or on an external hard drive), so you can restore it in case the original is lost, damaged, or compromised.

Some common uses for cloud storage and backup include:

  • Automatic photos, messages, device settings uploads from smartphones.
  • Syncing of contacts, calendars, files between devices.
  • Document sharing and collaboration for work or school.
  • Restoring data after device failure, theft, or ransomware attacks.
  • Archiving important files you don’t need every day but don’t want to lose.

For more information about cloud backup, read “What is the Cloud?”.

Recent Cloud Storage Scams: What You Should Know

[Read more…]

Why Senior Citizens Shouldn’t Be Afraid of AI – How It’s Used in Their Everyday Lives

Artificial Intelligence, or AI, is becoming a part of everyday life—but for many senior citizens, it still feels like something to fear. Negative headlines, privacy concerns, and the mystery of how it all works can be intimidating. However, the truth is that AI is already helping seniors in simple, supportive ways—often without them even realizing it.

From health reminders and voice assistants to easier Google searches and improved home safety, AI is designed to enhance independence, not take it away. This article will show you why there’s no need to fear AI and how it can make daily life easier, safer, and even more enjoyable.

💡 Why Seniors Shouldn’t Be Afraid of AI

1. You’re Probably Already Using AI Without Realizing It

If you’ve ever used Siri, Alexa, or even a GPS app on your phone—you’ve already used AI. Other common tools include:

  • Smart TVs that suggest shows you might like
  • Smartphones that correct typos or block spam calls
  • Voice assistants that can set reminders or answer questions

AI isn’t some complex robot—it’s a helpful background feature in many devices you already own.

2. AI Helps, But You Stay in Control

Some worry that AI will “take over” their choices. But AI doesn’t make decisions for you—it simply provides suggestions, reminders, or shortcuts. Think of it like a helpful assistant who follows your instructions, not a boss.

You can also turn AI features on or off as you wish. You’re always in the driver’s seat.

3. Privacy and Safety Controls Are Built In

Modern AI tools often include strong privacy features:

  • You can mute or disable microphones and cameras.
  • You choose what to share and when.
  • Trusted brands like Apple, Google, and Amazon have security settings you or a family member can easily review.

If you’re ever unsure, a family member, friend, or tech help center can walk you through it step by step.

✅ How AI Is Already Helping Seniors Today

[Read more…]

A Beginner’s Guide to Passkeys: How to Set Them Up, Use Them, and Sync Across Devices

Updated 12/31/25 – clarified platform and browser support:

If you’re tired of remembering complex passwords or worrying about phishing attacks, passkeys offer a simpler, safer alternative. Major platforms like Google, Microsoft, Apple and Yahoo now support passkeys, and they’re designed to replace passwords entirely. In this guide, we’ll explain what passkeys are, how to set them up, and how you can use them across multiple devices—even for the same account.

A passkey is a modern, more secure alternative to traditional passwords. Instead of remembering a string of characters, you use the same methods you already use to unlock your devices to sign in to websites and apps — such as your fingerprint, facial recognition, or screen lock PIN/password.

How It Works

Passkeys are built on the WebAuthn standard and use public-key cryptography. When you create a passkey, your device generates a unique pair of cryptographic “keys”:

  • The Public Key: Shared with the website or app you’re using.
  • The Private Key: Stored securely on your device (and never shared).

When you sign in, the website sends a digital “challenge” to your device. Your device uses the private key to sign the challenge and sends it back. Since the website has the matching public key, it can verify your identity without ever seeing your actual biometrics or a password.

Why Passkeys Are Better

  • Phishing Resistant: Since there is no password to type or steal, hackers can’t trick you into giving it away on a fake website.
  • Less Worry About Data Breaches: If a company’s passkey database is hacked, they only have your public keys, which are useless to attackers without your physical device.
  • Simplicity vs Passwords: You only have to know your account username – which is typically your email address. During account creation you don’t have to abide by complex password rules (like “must be unique and include a symbol and a number”), nor write down or manually save the passkey for the account.

Where Are They Stored?

Most passkeys are stored on your device and synced through your cloud account (like Microsoft Password Manager, Apple/iCloud Keychain, Google Password Manager, or passkey managers such as LastPass or Bitwarden). This means if you get a new computer or device, your passkeys move with you automatically with your cloud account, so you aren’t locked out of your accounts. They are then available for signing into your accounts via supported web browsers and apps. See chart below for specifics.

What websites support Passkeys?

Major email providers Google, Microsoft and Yahoo now support passkeys. Many major retailers such as amazon.com, besybuy.com and costco.com also support passkeys. However, banks and brokerages – likely where most of your money is kept – have been slow to adopt passkeys. Here’s a non-comprehensive list of websites that support passkeys: passkeys.directory

How to set up a passkey for each of your online accounts

[Read more…]

The Anxiety of Data Breaches and Dark Web PII Exposure: What You Can and Cannot Do

In today’s digital world, data breaches are no longer rare events—they are a near-constant threat. From social media platforms to healthcare providers to internet service providers, major organizations have seen their systems compromised, often resulting in personally identifiable information (PII), being leaked onto the dark web. Understandably, this has created a new wave of anxiety for individuals—many of whom have no idea their data has been exposed until it’s too late.

But while the fear is real, and in many ways justified, it’s important to know where your control begins and ends. In this article we’ll discuss what you can and cannot do when it comes to dealing with PII leaks on the dark web—and how to manage the anxiety that comes with them.

Why Data Breaches Cause Anxiety

PII includes names, addresses, Social Security numbers, birthdates, login credentials, and financial account numbers—data that, in the wrong hands, can be used to commit identity theft, financial fraud, and more. The dark web, a hidden part of the internet accessible through anonymizing tools like Tor, acts as a marketplace where this stolen data is bought and sold.

For victims, the emotional fallout can be intense:

  • Loss of control over who sees and uses your information.
  • Fear of future harm, like fraudulent loans, damaged credit or being scammed.
  • Lack of visibility into how deep the breach goes.
  • Confusion over what steps to take and whether any actions will even help.

What You Can Do About It

[Read more…]

Why Retirees Are Targets for Identity Theft or Credit Fraud

When people retire, it’s easy to assume that certain financial concerns fade away—especially the fear of identity theft or credit fraud. After all, if you’re no longer applying for loans or opening new credit cards, why would anyone want to target your credit file?

In reality, seniors remain prime targets for identity thieves, and freezing your credit can be one of the simplest and most effective ways to guard against potential financial harm. Here’s why even retirees should seriously consider placing a credit freeze.

Retirees Still Have Active Credit Files

Even if you’re no longer working or making big purchases on credit, your credit reports still exist—and they contain valuable information. Identity thieves can use your Social Security number, address, and other details to open fraudulent accounts, take out loans, or even commit medical or tax fraud in your name.

A credit freeze makes it much harder for bad actors to do this. It blocks access to your credit reports, preventing new credit inquiries unless you lift the freeze yourself.

Seniors Are Prime Targets for Scammers

Unfortunately, older adults are frequent targets for scammers. The FBI’s Internet Crime Complaint Center (IC3) has consistently reported high financial losses among seniors due to fraud. Criminals may assume that retirees are less likely to monitor their credit actively or to notice small irregularities in financial statements—making them easier prey.

A credit freeze serves as a protective barrier. If someone attempts to open a credit card or loan using your name, they’ll be denied access to your credit file, effectively shutting down the scam before it starts.

Credit Freezes Are Free and Reversible

Thanks to federal legislation, placing and lifting a credit freeze is free through the major credit bureaus—Equifax, Experian, and TransUnion. If you ever do need to apply for credit, you can temporarily lift the freeze online or by phone in just minutes.

This flexibility makes freezing your credit a low-hassle, high-reward action, especially if you’re not regularly opening new credit accounts.

A Freeze Offers More Protection Than Credit Monitoring Alone

Credit monitoring services notify you after suspicious activity has occurred. While useful, they are reactive by nature. A credit freeze, on the other hand, is proactive. It prevents the activity from happening in the first place.

For retirees who want peace of mind without having to keep a constant eye on their credit report, freezing credit can be a set-it-and-forget-it security measure.

It Protects Your Legacy and Estate

If you’re managing a large estate, or simply trying to preserve your financial health for heirs, protecting your credit is part of protecting your legacy. Identity theft doesn’t just impact you—it can complicate estate management, trusts, and beneficiary distributions after death.

In some cases, deceased individuals are even targeted by fraudsters. Taking steps now to lock down your credit while you’re alive helps ensure fewer headaches for your loved ones later.

Final Thoughts: A Simple Step for Serious Peace of Mind

Even in retirement, you’re not off the radar of cybercriminals. In fact, you may be more vulnerable than ever. Freezing your credit is a powerful tool in the fight against identity theft, and it costs nothing but a few minutes of your time.

If you haven’t already, consider visiting the official sites for Equifax, Experian, and TransUnion to place a freeze on your credit reports. It’s a smart, simple way to help safeguard your golden years. If you need help navigating the process of setting up a credit freeze, you can contact Computer Techs for help.

Need a new printer? Why you should consider getting laser/LED vs. inkjet

When purchasing a new printer, there are several reasons you should consider getting laser vs. inkjet.

We are often asked to troubleshoot printing problems with inkjet printers. With Nevada’s dry climate, if you don’t frequently print something the ink in inkjet printers often dries out and clogs the ink cartridges and print heads, thus reducing print quality or completely rendering the printer useless.

When shopping for a printer you may be inclined to get an inexpensive printer because you don’t print very often. Though inkjet printers are usually less expensive, the cost of the ink and repair can make it a more expensive investment in the long run.

Let’s look at the pros and cons…

Pros of laser/LED printers:

  • The toner powder that’s used in laser printer toner lasts longer than ink – typically thousands of pages (vs hundreds of pages for standard ink cartridge printers). You may only have to buy more toner cartridge(s) every few years.
  • Cost-per-page of toner vs. ink is lower.
  • The toner isn’t susceptible to drying up or clogging the printer.
  • Laser printers print faster.

Cons of laser/LED printers:

  • The initial equipment cost of a laser printer is usually more expensive. Color laser printers are usually hundreds of dollars more than their inkjet alternatives.
  • Laser printers don’t print high-quality photos.
  • All-in-one laser printers are usually larger and may not fit if you have a small space to place your printer.

More information about the choosing a printer can be found in the Consumer Reports Printer Buying Guide.

The technical differences between inkjet and laser/LED printers

Inkjet and laser printers operate on very different technologies, each with their own strengths. Here’s a breakdown of how they work:

Inkjet Printers

  • Technology: Inkjet printers spray tiny droplets of liquid ink directly onto the paper. These droplets can be as small as a few microns, allowing for precise details and vibrant colors.
  • Process: They use one of two methods: thermal inkjet (heating the ink to create bubbles that force the ink out) or piezoelectric inkjet (using vibrations to eject ink).
  • Best For: High-resolution photo printing and documents requiring vivid colors. Inkjet printers are generally slower and more suitable for low-volume printing.

Laser Printers

  • Technology: Laser printers use toner, a powdered ink, and static electricity to transfer the image or text onto the paper.
  • Process: A laser beam “draws” the image on a drum inside the printer, creating an electrostatic charge. The toner adheres to the charged areas, and heat is used to bond the toner to the paper.
  • Best For: Fast printing of high-volume, monochrome documents. They are great for efficiency but less suitable for detailed photo printing.

If you’re debating which one suits your needs, it boils down to what you’re printing and how often.

Having problems with a website? Try these tips.

That moment of frustration when a website refuses to cooperate is all too familiar. Whether it’s a slow loading page, a broken link, or a complete inability to connect, website problems can throw a wrench in your productivity or simply be a major annoyance. But before you throw your hands up in despair, take a deep breath and try these simple yet effective troubleshooting tips. You might be surprised at how often the solution is quick and easy.

Try an alternative web browser

Most computers have more than one web browser installed. The most common browsers are Google Chrome, Microsoft Edge, Mozilla Firefox and Safari (macOS). If a specific website isn’t working or displaying correctly in your normal browser, open your other web browser and go to the same website. If the problem is happening with multiple browsers, and your internet connection is OK (verified by other websites working), then the problem is likely something that out of your control. Try the website again later.

Delete the cookies and website data for the website you are trying to use

Here’s how to delete cookies and website data for a specific website in the four major browsers: Chrome, Edge, Firefox, and Safari.

Google Chrome

Method 1: Through Site Information (Quickest)

  1. Navigate to the website: Open the website for which you want to delete cookies and data.
  2. Click the padlock icon (or “Not secure”) in the address bar to the left of the website’s URL.
  3. Click on “Cookies and site data” in the dropdown menu.
  4. A small window will appear showing the cookies and storage used by the current website.
  5. Click on the specific website’s entry (it will likely be the first one listed).
  6. Click the “Remove” button next to each individual cookie or data entry you want to delete.
  7. Alternatively, you can click the “Remove all” button at the bottom to delete all cookies and data for that website.
  8. Click “Done” to close the window. You might need to refresh the page for the changes to take full effect.

Method 2: Through Browser Settings

  1. Open Chrome’s menu: Click the three vertical dots (⋮) in the top-right corner of the browser window.1
  2. Go to “Settings”: Click on “Settings” in the dropdown menu.2
  3. Navigate to “Privacy and security”: Click on “Privacy and security” in the left-hand sidebar.3
  4. Click on “Cookies and other site data”.
  5. Click on “See all site data and permissions”.
  6. Search for the website: In the search bar in the top-right corner, type the name of the website.
  7. Click on the arrow next to the website in the search results. This will expand the details.
  8. Click the “Remove” icon (trash can) next to each cookie or data entry you want to delete.4
  9. Alternatively, you can click the “Clear all data” button at the top of the expanded website information to remove everything.
  10. Close the settings tab. You might need to refresh the page for the changes to take full effect.

Microsoft Edge

Method 1: Through Site Information (Quickest)

  1. Navigate to the website: Open the website for which you want to delete cookies and data.
  2. Click the padlock icon (or “Not secure”) in the address bar to the left of the website’s URL.
  3. Click on “Cookies and site permissions” in the dropdown menu.
  4. Under “Cookies and site data,” click on “Manage and delete cookies and site data.”1
  5. A page will open showing all stored cookies and site data.2 Find the entry for the specific website. You might need to expand the list by clicking the arrow next to the domain name.
  6. Click the trash can icon next to the specific cookie or data entry you want to delete.
  7. Alternatively, you can click the “Remove all” button at the top of the website’s expanded section to delete all cookies and data for that website.
  8. Close the settings tab. You might need to refresh the page for the changes to take full effect.

Method 2: Through Browser Settings

  1. Open Edge’s menu: Click the three horizontal dots (…) in the top-right corner of the browser window.3
  2. Go to “Settings”: Click on “Settings” in the dropdown menu.4
  3. Navigate to “Cookies and site permissions”: Click on “Cookies and site permissions” in the left-hand sidebar.5
  4. Click on “Manage and delete cookies and site data”.6
  5. Click on “See all cookies and site data”.
  6. Search for the website: Use the “Search cookies and site data” bar in the top-right corner and type the name of the website.
  7. Click the down arrow next to the website in the search results to expand the details.
  8. Click the trash can icon next to each individual cookie or data entry you want to delete.
  9. Alternatively, you can click the “Remove all” button at the top of the expanded website information to remove everything.
  10. Close the settings tab. You might need to refresh the page for the changes to take full effect.

Important Considerations for Edge:

  • Deleting cookies and website data for a specific site will log you out of that website and may reset any preferences you had set.
  • Be careful when deleting data, as it might remove important settings or information you want to keep for other websites.
  • After deleting the data, the website might take slightly longer to load on your next visit as it needs to retrieve the information again.

Mozilla Firefox

Method 1: Through Site Information (Quickest)

  1. Navigate to the website: Open the website for which you want to delete cookies and data.
  2. Click the padlock icon in the address bar to the left of the website’s URL.
  3. Click on “Cookies and Site Data” in the dropdown menu.
  4. A dialog box will appear showing the cookies and storage used by the current website.
  5. Select the specific website in the list.
  6. Click the “Remove Selected” button to delete the highlighted entries. You can select multiple entries by holding down the Ctrl (or Cmd on Mac) key while clicking.
  7. Alternatively, you can click the “Remove All” button to delete all cookies and data for that website.
  8. Click “Save Changes” and then “OK” to close the dialog box. You might need to refresh the page for the changes to take full effect.

Method 2: Through Browser Settings

  1. Open Firefox’s menu: Click the three horizontal lines (☰) in the top-right corner of the browser window.
  2. Go to “Settings”: Click on “Settings” in the dropdown menu.
  3. Navigate to “Privacy & Security”: Click on “Privacy & Security” in the left-hand sidebar.5
  4. Scroll down to the “Cookies and Site Data” section.
  5. Click the “Manage Data…” button.
  6. Search for the website: In the “Search websites” field, type the name of the website.
  7. Select the website in the list.
  8. Click the “Remove Selected” button.
  9. Click “Save Changes” in the pop-up confirmation window.
  10. Click “OK” to close the “Manage Cookies and Site Data” dialog box.6 You might need to refresh the page for the changes to take full effect.

Safari (macOS)

Method 1: Through the “Privacy” Tab in Preferences

  1. Open Safari’s menu: Click on “Safari” in the top-left corner of your screen.
  2. Go to “Preferences…”: Click on “Preferences…” in the dropdown menu.7
  3. Click on the “Privacy” tab.
  4. Click on “Manage Website Data…”.
  5. Search for the website: In the search bar in the top-right corner, type the name of the website.
  6. Select the website in the list.
  7. Click the “Remove” button.
  8. You can remove multiple websites by selecting them (using Cmd + click) and then clicking “Remove”.
  9. Click “Done” to close the “Manage Website Data” window.8 You might need to refresh the page for the changes to take full effect.

Method 2: Through the “Develop” Menu (If Enabled)

  • Enable the “Develop” menu (if you haven’t already): Go to Safari > Preferences > Advanced and check the “Show Develop menu in menu bar” box.9
  • Navigate to the website: Open the website for which you want to delete cookies and data.
  • Click on “Develop” in the menu bar.
  • Hover over “Website Data”.
  • Find and select the specific website in the submenu.
  • Click the “Remove” button.
  • Click “Done” in the “Website Data” window.10 You might need to refresh the page for the changes to take full effect.

Important Considerations:

  • Deleting cookies and website data for a specific site will log you out of that website and may reset any preferences you had set.
  • Be careful when deleting data, as it might remove important settings or information you want to keep for other websites.
  • After deleting the data, the website might take slightly longer to load on your next visit as it needs to retrieve the information again.

By following these steps, you can effectively manage the cookies and website data stored by your browser for individual websites.

Can your data really be taken off the dark web?

While no service can guarantee the complete and permanent removal of your data from the dark web, some services can reduce your exposure. Here’s a breakdown of what they can and cannot do:

What Dark Web Monitoring Services Can Do:

  • Monitor: These services continuously scan known dark web marketplaces, forums, and other hidden areas for your personal information. This includes things like:
    • Email addresses
    • Passwords
    • Social Security numbers
    • Credit card numbers
    • Bank account details
    • Other sensitive data
  • Alert You: If your information is found, the service will typically notify you immediately. This allows you to take action, such as changing compromised passwords or contacting financial institutions.
  • Provide Guidance: Many services offer advice and support on what to do if your data is found on the dark web. This might include steps to secure your accounts or mitigate potential damage.
  • Automated Removal Requests (Data Broker Removal): Some services go beyond just monitoring and will actively work to remove your information from publicly accessible data broker sites. These are not the dark web itself, but they are sources from which your data can be aggregated and potentially end up on the dark web. They send opt-out requests on your behalf to these data brokers.

What Dark Web Monitoring Services Cannot Do:

  • Directly Remove Data from the Dark Web: Once your data appears on the dark web, it’s extremely difficult, if not impossible, to have it completely removed. The decentralized and anonymous nature of the dark web makes it challenging to track down and control the spread of information.
  • Prevent Initial Data Breaches: These services can only help you respond after your data has been compromised and has appeared on the dark web. They cannot prevent the initial data breach that led to your information being exposed.
  • Guarantee Complete Protection: Even with monitoring, there’s no guarantee that all instances of your data on the dark web will be found. New marketplaces and methods of sharing information constantly emerge.

Think of it this way:

Imagine your personal information is like a piece of paper that has been copied and spread to many different, hidden locations. A dark web monitoring service can act like a search party that tries to find those copies and alert you to their existence. Some services can even try to stop new copies from being made by targeting the original sources on the open web (data brokers). However, they can’t go to every single hidden location and retrieve every single copy that already exists.

In conclusion, it’s your responsibility to keep informed.

Dark web monitoring services can be a valuable tool for staying informed about potential compromises of your personal data. They can provide early warnings and help you take steps to protect yourself. However, it’s crucial to understand their limitations. They cannot magically erase your data from the dark web once it’s there. Prevention through strong security practices and being mindful of where you share your information remains the most effective way to minimize your risk.

Your best defense against identity theft is freezing your credit with the major credit bureaus. This makes it difficult for identity theives to use your name and information for financial gain.

You also need to keep informed about the latest scams such as imposters using your personal information to convince you that they are a company, bank or government official, or even a friend or loved one. Imposter scams are often someone trying to persuade you to perform a financial transaction such as purchasing gift cards or Bitcoin, or process a refund into your bank account.

Visit Computer Techs YouTube playlist to watch videos about the latest scams to keep you informed.

What You Need to Know About the End of Support for Windows 10

  • Microsoft ended support for Windows 10 on October 14, 2025. There’s no more free updates*, security patches, or technical support available from Microsoft – unless you take action.
  • Most users have 3 options: upgrade to Windows 11, get a new computer with Windows 11, or extend Windows 10 security updates until October 2026.
  • Upgrading to Windows 11 is recommended for most users for its advanced security, improved performance, and new features.

Updated 11/1/25:

Now that Microsoft’s Windows 10 operating system has reached the end of mainstream support, computer users that haven’t taken action yet to address their out-of-date operating system should do so as soon as possible and definately before the end of 2025. One option is to enroll in Microsoft’s first-time ever “Extended Security Updates” program for personal computers using Windows 10, that will extend security updates for an additional year – until October 13, 2026. Continue reading below to become more informed about all of the options.

The Start button taskbar icons for Windows 10 vs Windows 11.

What Are Your Options?

If you haven’t already taken action, it’s time to do so now. Windows 10 users have three primary options:

  1. Upgrade your existing computer to Windows 11 for free
  2. Get a new computer with Windows 11
  3. Enroll in the Extended Security Updates program for free to Continue using Windows 10 until October 2026

Let’s explore these options and why ultimately upgrading to Windows 11 is probably your best choice.

[Read more…]