New computer recommendations

Updated 11/7/24:

You may be reading this because the operating system on your existing computer will no longer be supported soon. Since you’ll likely be spending the next 5-10 years or more with your next computer, please take a few minutes now to make an informed decision about what to look for in a new computer and accessories – and get the best deal. 

Our recommended minimum new computer specifications are:

  • Intel Core i3/AMD Ryzen 5 processor or better. For an Apple Mac computer we recommend getting Apple’s “M” series processor rather than an Intel processor.
  • 8 GB RAM or more
  • 256GB Solid State Drive (SSD) or larger
  • Please read New Computer Buying Guide for more detailed information.

If you’re thinking about trying to save money by buying a refurbished computer – we don’t recommend it. Typically they won’t last as long as a new computer, and are less secure due to unpatched processor flaws and some cannot be upgraded to more recent secure operating systems.

We’ve seen the best reliability with HP and Dell brands. Keep in mind that cheaper laptops and all-in-ones typically only have a vertical screen resolution of 768 pixels, whereas higher quality and clearer screens are 1080 pixels or higher.

Click on the links below to view recommended computers meeting the minimum recommended specifications noted above at the respective retailer’s website. Some models may be available in-store. If you come across a good deal elsewhere, remember to look for specifications that are a minimum of what’s listed above.

Desktop PCs:

Best Buy – Dell, HP – SSD PC Desktops

Costco – Dell, HP Desktops – make sure hard drive is SSD or HDD+SSD

HP Store – Desktop computer towers with SSD

Dell – Desktop computers & All-in-One PCs with SSD

Laptop/Notebook PCs – regular price differences are due to variances in screen size, processor (speed), screen resolution and 2-in-1 convertibility:

Best Buy – Dell, HP SSD PC Laptops

Costco – Dell, HP – SSD PC Laptops

Apple Mac:

Best Buy – iMac desktop

Best Buy – MacBook laptop

Costco – iMac desktop

Costco – MacBook laptop

Apple – iMac desktop

Apple – MacBook laptop

We can setup your new computer and transfer data from your old one

Please consider our IN-HOME services to get your new computer set-up quickly and properly, vs. the chain stores offerings, or attempting it yourself:

  • Set-up and connect your new computer to your network, printer and other external hardware. If you buy from a national chain store you’ll likely notice that they don’t specialize in in-home service, or they charge much more for the option. We’ll make sure all of your external devices work with your new computer.
  • Transfer data (documents, pictures, music, etc.) and compatible programs from an old computer. Some tech services just transfer your data to a folder on your desktop – we organize your data and put it in the right folders and programs. 
  • Remove trialware and unnecessary adware. We also setup free security, backup and word processing/spreadsheet software.
  • Customization and explanation of Windows features. We’ll setup the menus, controls and buttons with familiarity of your previous computer.
  • Install initial updates. A new computer out-of-the-box is already several months behind critical operating system updates and computer hardware updates.
  • Consulting about questions you have about your new computer system
  • Recommended storage/disposal/donation of an old unused computer

Custom-built computers

If you need a computer custom-built for gaming or business needs, we recommend contacting our friends at Technology Center.

Why You Should Choose an App Over a Website on Your Mobile Device

In today’s digital age, we often find ourselves debating whether to use a mobile app or a website for everyday tasks like shopping, banking, or simply staying informed. While websites are versatile and easily accessible, mobile apps offer unique advantages that make them the better choice for many activities on a smartphone or tablet. Here are the top reasons why you should consider using an app over a website on your mobile device:

1. Enhanced User Experience

Mobile apps are specifically designed for use on smaller screens, providing a more intuitive and seamless experience compared to websites. They often include:

  • Optimized Navigation: Apps prioritize usability, offering clear menus and touch-friendly interfaces.
  • Faster Performance: Since apps store some data locally, they can load content quicker than websites.
  • Tailored Interactions: Gestures like swiping, pinching, and tapping make interactions smoother and more engaging.

2. Offline Accessibility

One of the biggest advantages of apps is their ability to function without an internet connection. While websites require continuous connectivity, many apps allow you to:

  • Access previously loaded content.
  • Use offline features such as note-taking, viewing downloaded media, or tracking fitness progress.

3. Personalization and Notifications

Apps excel in delivering a personalized experience. They use data such as your preferences, usage patterns, and location to tailor content and recommendations. Additionally, push notifications keep you informed about:

  • Exclusive deals and offers.
  • Important updates or alerts.
  • Reminders for tasks or upcoming events.

4. Better Integration with Device Features

Mobile apps seamlessly integrate with your device’s hardware and software, enhancing functionality. For instance:

  • Camera and GPS: Apps can use these features for tasks like scanning a barcode, scanning documents, tracking your location, or enhancing augmented reality experiences.
  • Biometric Security: Apps often support fingerprint or facial recognition for secure and quick access.
  • Instant Sharing: Apps make it easy to share content via social media, email, or messaging platforms.

5. Improved Security

While websites can be secure, apps generally offer an additional layer of safety by leveraging device-level security features. Examples include:

  • Encrypted storage for sensitive information.
  • Two-factor authentication and biometric login.
  • Automatic updates to patch vulnerabilities.

6. Customized Ecosystems

Apps can create an integrated environment tailored to your needs. For instance:

  • Banking apps streamline bill payments, transfers, and account management in one place.
  • Health and fitness apps provide goal tracking, exercise plans, and progress reports.

7. Superior Performance for Frequent Use

If you frequently use a service, an app can save time and effort compared to repeatedly accessing a website. Apps store your login credentials, preferences, and often preloaded content, providing a faster and more efficient experience. Apps are also readily available on your home screen, providing instant access with a single tap. This eliminates the need to search for the website in your browser, saving you time and effort.

Conclusion

While websites are indispensable for certain tasks, mobile apps provide a level of convenience, personalization, and functionality that is hard to match. By leveraging the unique capabilities of your device, apps not only simplify tasks but also enrich your overall digital experience. Whether it’s shopping, banking, fitness, or entertainment, choosing an app can often make your mobile interactions faster, easier, and more enjoyable.

Understanding Two-Factor Authentication (2FA): Enhancing Your Online Security

With the rise in cyber threats and data breaches, protecting your online accounts is more crucial than ever. One of the most effective ways to secure them is through Two-Factor Authentication (2FA). This guide explores what 2FA is, how it works, and why it’s essential for safeguarding your digital identity.

What is Two-Factor Authentication (2FA)?

Two-factor authentication is an extra layer of security used to verify that a user attempting to log into an online account is who they claim to be. Instead of relying solely on a password, 2FA requires a second piece of information—a second “factor”—which can only be obtained by the rightful account owner.

2FA factors typically fall into three categories:

  1. Something you know – like a password or PIN.
  2. Something you have – like a mobile device or a security key.
  3. Something you are – biometrics like a fingerprint, facial recognition, or voice.

With 2FA, you’ll need two of these factors to access your account, making it significantly more challenging for cybercriminals to breach it.

How Does 2FA Work?

The 2FA process generally follows these steps:

  1. Enter Your Username/Password: Begin by entering your usual password, which remains the first layer of protection.
  2. Receive a Verification Prompt: After entering your password, you’ll receive a second prompt to authenticate your identity. This prompt can be:
    • A one-time code sent via text message or email.
    • A code generated by an authenticator app (like Google Authenticator or Authy) that refreshes every 30 seconds.
    • A push notification sent to your phone, which you approve or deny.
    • Biometric verification, such as a fingerprint scan or facial recognition.
  3. Complete the Second Step: After verifying this second factor, you gain access to your account.

Types of Two-Factor Authentication

There are various forms of 2FA, each with its own security strengths. Here are the most common ones:

  1. SMS-Based 2FA:
    • A unique, time-sensitive code is sent to your mobile phone via text message.
    • While convenient, it’s less secure due to the risk of SIM swapping, where attackers can hijack your phone number to intercept the code.
  2. Authenticator Apps:
    • Apps like Google Authenticator, Authy, and Microsoft Authenticator generate time-based codes that expire every 30 seconds.
    • Authenticator apps are highly secure as they aren’t reliant on SMS, making them resistant to SIM swapping and other phone-based attacks.
  3. Hardware Tokens:
    • Devices like YubiKey and Google Titan Key act as physical keys that plug into your computer or connect wirelessly. These tokens verify your identity when logging in.
    • Hardware tokens are very secure, as attackers would need physical possession of the device.
  4. Biometric 2FA:
    • Biometrics, such as fingerprints, facial recognition, or voice ID, serve as the second factor in 2FA.
    • Biometrics add strong security but are less widely supported across platforms and may require specific hardware.
  5. Push Notifications:
    • Many services, like Microsoft and Google, send a push notification to a trusted device. Approving the notification verifies your identity.
    • Push notifications are generally secure, especially if your device is protected with a password, PIN, or biometric.

Why You Should Use 2FA

Two-factor authentication offers several benefits, making it an essential component of a secure online presence:

  1. Increased Security:
    • With just a password, anyone who has your login credentials can access your account. Adding a second factor significantly reduces the risk of unauthorized access.
  2. Protection Against Phishing:
    • Phishing attacks attempt to trick you into revealing your password. 2FA adds a hurdle, as attackers won’t have access to your second factor, like your phone or authenticator app.
  3. Minimal Impact on Usability:
    • While 2FA adds an extra step, it only takes a few seconds and provides substantial security benefits, often with only a small impact on convenience.
  4. Peace of Mind:
    • 2FA can give you confidence that your accounts are safer, helping protect personal information, financial data, and sensitive communications.

How to Enable 2FA on Popular Platforms

Enabling 2FA is straightforward on most platforms. Here’s how to set it up on a few commonly used services:

  1. Google and Gmail:
    • Go to Google Account Security Settings.
    • Select 2-Step Verification and follow the prompts to add an authenticator app or SMS verification.
  2. Facebook:
    • Open Settings & Privacy > Settings.
    • Under Security and Login, find Two-Factor Authentication and choose your preferred authentication method.
  3. Apple ID:
    • Open Settings on your iPhone or Mac, go to Password & Security, and select Two-Factor Authentication.
  4. Microsoft Accounts:
    • Log in to account.microsoft.com.
    • Go to Security > Additional Security Options > Two-Step Verification.
  5. Social Media & Financial Accounts:
    • Most major platforms, including Twitter, Instagram, and online banks, offer 2FA under account security settings.

Tips for Using 2FA Effectively

  • Using Authenticator Apps is better than SMS: Authenticator apps are generally more secure than SMS codes, which can be vulnerable to interception or SIM swapping or someone taking over your cell number. However, using SMS is better than no 2FA at all.
  • Keep Backup Codes Safe: Many services provide backup codes for times when you can’t access your primary 2FA method. Store these codes securely, as they can be a lifesaver if you lose your phone.

Conclusion

Two-factor authentication is an essential security measure that everyone should enable on their online accounts. By adding an extra layer of verification, 2FA makes it much harder

How to save money on internet, phone and TV service in 2025

Saving money on internet, phone, TV, and cell service can be a game of strategy! Here are some tactics to consider:

General Strategies:

  • Negotiate your current bills: Call your providers and politely but firmly negotiate a lower rate or better deal. Mention competitors’ offers or threaten to cancel. Be prepared to walk away.
  • Bundle services: Consider bundling multiple services with the same provider. For example, Spectrum and AT&T both offer considerable discounts on wireless phone service when you bundle with their home internet service. But it may not make sense to bundle ALL of your services.
  • Downsize your plan: Analyze your usage for internet and cell phone data. If you’re not using all the features or amount of internet speed/data in your current plan, downgrade to a cheaper one.
  • Shop around: Compare prices and deals from different providers in your area. You might find a better offer than your current one.
  • Look for discounts: Many providers offer discounts for seniors, students, low-income families, and military personnel. See if you qualify for any.
  • Utilize free options: Explore free alternatives for TV, like streaming services with free trials or using a library card for free access to movies and audiobooks.

Specific Strategies:

  • Internet:
  • Home Phone:
    • Switch providers: AT&T’s home phone service is typically much costlier than Spectrum Voice.
    • Considering cancelling home phone service altogether: If you’re like others, you probably get mostly telemarketing and scam calls on your home phone line. If you cancel your home phone service and just use your cell phone, you can save a lot. But consider the redundancy of having two methods of being able to communicate. Also, don’t cancel your home phone number until you’ve confirmed that all of your online accounts aren’t using that number for account recovery.
    • Switch to a VoIP or wireless provider for your “home” number: If you still want to maintain a second phone line, consider switching to an inexpensive VoIP provider. We can assist with options and setup.
  • TV:
    • Cut the cord: Ditch cable or satellite TV altogether and rely on streaming services. There are many affordable options available. Otherwise, you can downsize your TV subscription by removing live channels, then add free or discounted streaming services to give you more choices for content to watch.
    • Use an antenna: Get an over-the-air antenna to receive local channels for free.
    • Read: Should you really “cut the cord” to save money on TV service?
  • Cell Service:
    • Cost: If you’re paying over $40/month per line for cell service, you’re probably paying too much.
    • Switch to prepaid: Prepaid plans can be cheaper than postpaid plans, especially if you don’t use a lot of data or talk minutes.
    • Consider MVNOs: Mobile Virtual Network Operators (MVNOs) use the networks of major carriers but offer cheaper plans.
    • Look for promotions: Carriers often offer discounts and promotions, especially for new customers.
    • Share a family plan: Consider sharing a family plan with multiple lines.
    • Pay for your smartphone separately from your plan.
    • Read: How to save money on your wireless cell phone service – use an MVNO

Remember:

  • Do your research: Before making any changes, research your options and compare prices.
  • Read the fine print: Watch out for hidden fees and surcharges when comparing plans.
  • Be patient: It may take some time to find the best deal, so be patient and don’t give up.

By implementing some of these strategies, you can significantly reduce your spending on internet, phone, TV, and cell service. Don’t hesitate to get creative and explore different options to find the perfect fit for your needs and budget! There are lots of options to consider which may seem overwhelming. Fortunately Computer Techs stays on top of the latest offerings to help you decide the best methods to save you money on your telecommunications services. Contact Mark for a consultation today!

Personalize Your Web Browsing Experience: A Guide to Customizing your Web Browser

Your web browser is your digital gateway to the internet. By customizing it, you can tailor your browsing experience to your specific needs and preferences. Whether you prefer Google Chrome, Microsoft Edge or Mozilla Firefox, just because the start/home page defaults to a certain page or website, or you don’t have all the bookmarks/favorites in one browser vs the other, doesn’t mean it has to stay that way. Here’s a simple guide to help you personalize your favorite browser:

Changing Your Home Page

Your home page is the first thing you see when you open your browser. Here’s how to change it:

Google Chrome:

  1. Click the three dots in the top-right corner.
  2. Select “Settings.”
  3. Scroll down to “Appearance.”
  4. Under “Show Home button,” toggle the switch on.
  5. Click “Change” and enter your desired URL.

Mozilla Firefox:

  1. Click the three horizontal lines in the top-right corner.
  2. Select “Options” (or “Preferences” on macOS).
  3. Go to the “Home” tab.
  4. Select “Custom URLs” and enter your desired URL(s).

Microsoft Edge:

  1. Click the three dots in the top-right corner.
  2. Select “Settings.”
  3. Under “Start page,” choose “Custom” and enter your desired URL.

Creating Bookmarks/Favorites

Bookmarks or favorites are shortcuts to your frequently visited websites. Here’s how to create them:

Google Chrome:

  1. Navigate to the website you want to bookmark.
  2. Click the star icon next to the address bar.
  3. Choose a folder or create a new one to organize your bookmarks.

Mozilla Firefox:

  1. Navigate to the website you want to bookmark.
  2. Click the star icon in the address bar.
  3. Choose a folder or create a new one to organize your bookmarks.

Microsoft Edge:

  1. Navigate to the website you want to bookmark.
  2. Click the star icon in the address bar.
  3. Choose a folder or create a new one to organize your bookmarks.

Additional Tips for Customization

  • Customize Your New Tab Page: Many browsers allow you to customize your new tab page with your favorite websites, news feeds, or productivity tools.
  • Adjust Your Browser’s Appearance: Change the theme, font size, and other visual settings to match your preferences.

Also read: You May Not be Using All the Great Features of Your Browser.

By following these steps, you can create a personalized browsing experience that suits your unique needs and preferences.

Top 5 Tech Scams to Watch Out for This Holiday Season

As the holiday season approaches, cybercriminals ramp up their efforts to exploit online shoppers and tech enthusiasts. Here are the top five technology-related scams to be aware of during the holiday season:

  1. Phishing Attacks:
    • What to watch for: Deceitful emails or texts that mimic legitimate companies, often urging you to click on malicious links or download attachments. These can lead to malware infections or identity theft.
    • How to protect yourself: Be cautious of unexpected emails, especially those with urgent requests or suspicious links. Verify the sender’s address and avoid clicking on links or downloading attachments from unknown sources.
  2. Fake Online Stores:
    • What to watch for: Counterfeit websites that mimic popular retailers, offering enticing deals and discounts. These fraudulent sites often steal your credit card information and personal data.
    • How to protect yourself: Shop on reputable websites and verify the URL before entering sensitive information. Look for secure payment gateways (HTTPS) and customer reviews.
  3. Social Media Scams:
    • What to watch for: Bogus giveaways, contests, or surveys on social media platforms that promise valuable prizes in exchange for personal information.
    • How to protect yourself: Be wary of unsolicited offers and avoid sharing personal information on social media. Stick to official company pages and verified accounts.
  4. Tech Support Scams:
    • What to watch for: Unexpected phone calls or pop-up messages claiming to be from tech support, often warning of critical issues with your computer. These scammers may attempt to charge you for unnecessary services or gain remote access to your device.
    • How to protect yourself: Never trust unsolicited calls or pop-up messages. Contact your device manufacturer or internet service provider directly for legitimate tech support.
  5. Gift Card Scams:
    • What to watch for: Requests from friends or family to purchase gift cards for various reasons, often through email or text messages. These requests may be fraudulent, with scammers attempting to steal the gift card codes.
    • How to protect yourself: Verify gift card requests directly with the person, preferably through a phone call or in person. Be cautious of unusual requests, especially if they seem urgent or out of character.

Additional Tips:

  • Keep Software Updated: Regularly update your operating system and security software to protect against vulnerabilities.
  • Use Strong, Unique Passwords: Create complex passwords for all your online accounts and consider using a password manager.
  • Enable Two-Factor Authentication: Add an extra layer of security to your accounts by enabling two-factor authentication.
  • Educate Yourself: Stay informed about the latest scams and cybersecurity best practices.

By being vigilant and following these tips, you can significantly reduce your risk of falling victim to tech scams during the holiday season and beyond.

Also read about other scams that are common year-round.

If you’ve fallen victim to a scam and need help recovering your device, accounts or identity, contact Computer Techs for assistance.

Laptop Battery Bulging: A Cause for Concern

Laptop batteries are essential components that power our devices. However, over time, these batteries can experience issues, one of which is bulging. This phenomenon occurs when the battery’s internal components expand, causing the casing to bulge outward. While it may seem like a minor cosmetic issue, a bulging battery can pose safety risks and should be addressed promptly.

Causes of Laptop Battery Bulging

Several factors can contribute to laptop battery bulging:

  • Overcharging: Repeatedly charging your laptop beyond its maximum capacity can lead to internal damage and swelling.
  • Heat Exposure: Excessive heat, either from the laptop’s internal components or external sources, can cause the battery’s chemicals to degrade and expand.
  • Manufacturing Defects: In rare cases, batteries may have manufacturing defects that predispose them to bulging.

Safety Risks Associated with Bulging Batteries

A bulging laptop battery can pose significant safety risks, including:

  • Fire: In extreme cases, a bulging battery can short-circuit and ignite, potentially causing a fire.
  • Toxic Fumes: Batteries contain harmful chemicals that can be released into the air when they overheat or rupture.
  • Physical Injury: A bulging battery can rupture, causing sharp objects to fly out and potentially injure someone.

What to Do if Your Laptop Battery is Bulging

If you notice that your laptop battery is bulging, it’s crucial to take immediate action:

  1. Unplug and Power Off: Disconnect your laptop from any power sources and shut it down immediately.
  2. Inspect for Damage: Carefully examine the battery for any signs of cracks, leaks, or other damage.
  3. Stop Using the Laptop: Avoid using your laptop until the battery issue is resolved.
  4. Contact the Manufacturer or a Professional: Reach out to the manufacturer or a qualified technician for guidance. They may offer repair or replacement options.
  5. Dispose of the Battery Safely: If the battery is damaged or beyond repair, dispose of it according to local regulations. Many electronics retailers offer recycling programs for batteries.

Preventing Battery Bulging

To help prevent battery bulging, consider the following tips:

  • Avoid Overcharging: Disconnect your laptop from the power source once it’s fully charged.
  • Keep Your Laptop Cool: Use a laptop cooling pad or avoid placing it on soft surfaces that can trap heat.
  • Monitor Battery Health: Pay attention to your battery’s health indicators and replace it if it starts to show signs of degradation.

By understanding the causes, risks, and preventive measures associated with bulging laptop batteries, you can take steps to protect yourself and your device. If you notice any signs of battery bulging, it’s essential to act promptly and seek professional assistance.

What You Need to Know About the End of Support for Windows 10

As Windows 10 approaches the end of its lifecycle, it’s essential for users to prepare for the changes and take steps to transition smoothly. Microsoft’s official announcement has made it clear: Windows 10 will reach its end of support on October 14, 2025. This means no more free updates, security patches, or technical support for the operating system, which could leave your device vulnerable to security risks and software incompatibilities.

Why the End of Support Matters

When an operating system (OS) reaches the end of support, it no longer receives updates from its manufacturer—in this case, Microsoft. These updates, which usually occur monthly, include crucial security patches, bug fixes, and improvements that help keep your system running safely and efficiently. After the end of support, any vulnerabilities and bugs will remain unpatched, leaving your computer at risk of viruses, malware, and ransomware.

Additionally, newer software and hardware may eventually become incompatible with the older OS, leading to performance issues or the inability to use modern apps and devices.

What Are Your Options?

As the end of Windows 10 support approaches, users have three primary options:

  1. Upgrade to Windows 11 (recommended)
  2. Continue Using Windows 10 Without Support
  3. Pay to receive Windows 10 security updates into 2026, or use Windows 365 or other cloud-based operating system on your existing device

Let’s explore these options and why upgrading to Windows 11 might be your best bet.


Option 1: Upgrade to Windows 11 (recommended)

For most users, upgrading to Windows 11 will be the better choice. Launched in October 2021, Windows 11 offers a modernized user experience with new features, better security, and enhanced performance. Here’s what you should know about the transition.

Why Upgrade to Windows 11?

Security Features

  • Windows 11 is built with advanced security at its core. It includes features like hardware-based security (TPM 2.0) and virtualization-based security, which help protect against modern cyber threats. Since Windows 11 will continue receiving updates and security patches from Microsoft, your system will stay protected against the latest vulnerabilities. Even though Windows 11 is more secure than Windows 10, safe computing habits is your first line of defense keeping you and your devices safe and secure.

Improved Performance

  • Windows 11 offers performance enhancements, especially on newer hardware, thanks to optimizations in resource allocation, memory management, and power efficiency. This leads to a smoother experience for both work and gaming.

New and Updated Features

  • The OS introduces new features like the Snap Layouts and Snap Groups, allowing users to organize their open windows more efficiently. A revamped Start Menu, updated aesthetics with rounded corners and new themes, and the re-introduction of widgets for real-time information make Windows 11 feel modern and intuitive. Artificial Intelligence features help with finding things, editing and getting things done.

Can Your PC Run Windows 11?

Before upgrading, it’s important to determine whether your current PC meets the minimum system requirements. Windows 11 will typically run on Intel 8th Generation or AMD Ryzen 2000 series and newer processors.

You can check this quickly by going to Settings Update & Security > Windows Update or running Microsoft’s PC Health Check tool, which will tell you if your computer is compatible/eligible for the upgrade.

If your computer cannot be upgraded to Windows 11, continue to Option 2 or 3 below – otherwise view our new computer recommendations.

How to Upgrade to Windows 11

If your PC is compatible, upgrading to Windows 11 is straightforward. Here’s a quick guide:

  1. Back up your data: Before upgrading, ensure all your important files are backed up either to an external drive or cloud storage.
  2. Check for Updates: Go to Settings > Update & Security > Windows Update, and check if the Windows 11 upgrade is available for your device.
  3. Follow the On-Screen Instructions: If eligible, you’ll receive a prompt to download and install Windows 11. The process takes some time, and your computer will restart multiple times before the upgrade is complete.

Option 2: Continue Using Windows 10 Without Support

Some users may choose to stick with Windows 10 even after its support ends. While this may seem like a short-term solution, there are significant risks involved:

  • Security vulnerabilities: Your system will no longer receive crucial updates, leaving it susceptible to malware, viruses, and other cyber threats.
  • Software and hardware incompatibility: Over time, newer software and hardware devices may not work properly or be supported on an outdated OS.
  • No technical support: Microsoft will no longer offer assistance or troubleshooting for any issues that arise on Windows 10. However, Computer Techs will continue to provide technical support to the best of our ability though software bugs are out of our control.

This option is only advisable for users who are comfortable with the potential risks and are using Windows offline for things such as playing games, or for using documents and spreadsheets. However, even these protections can only do so much if the operating system itself is no longer secure.


Option 3: Pay to receive Windows 10 security updates into 2026, or use Windows 365 or other cloud-based operating system on your existing device

If your device doesn’t meet the minimum requirements for Windows 11, for the first time ever Microsoft is offering a one-year Extended Security Updates (ESU) program to help continue protection for personal computers – at a cost of $30. Enrollment will open in 2025. For more information see What is the Windows 10 Extended Security Updates (ESU) program?

Alternatively, you could pay to use a cloud-based operating system such as Windows 365, or ChromeOS Flex on your Windows 10 computer. However at about $32 per month or more for Windows 365, and the learning curve associated with using a cloud-based operating system, this option may not be right for you.


Conclusion: Time to Plan for the Future

The end of support for Windows 10 in October 2025 is fast approaching, and while it may seem like a distant date, it’s important to plan your next steps. Whether you choose to upgrade to Windows 11 or stick with Windows 10 for as long as possible, staying informed and prepared will ensure your system remains secure and functional. Upgrading to Windows 11 is highly recommended for the vast majority of users, offering enhanced security, better performance, and support for the latest hardware and software technologies.

We are here to help. Contact Computer Techs if you’d like help deciding on the best upgrade option for you, and implementing the switch away from Windows 10.

What to do if you’ve been notified that your personal information has been exposed in a data breach or is on the dark web

A data breach can be a frightening experience. If it’s the first time you’ve ever been notified that your personally identifiable information (PII) has been exposed, it’s important to take immediate action to protect yourself from potential identity theft or other harm. Here’s a step-by-step guide on what to do:

1. Assess the Damage

  • Review the breach notification: Companies are required by law to inform you about the breach and provide details on what data was exposed. Understand exactly what information was exposed. This could include your name, address, Social Security number, credit card details, login credentials or other sensitive data.
  • PII on the dark web: The dark web is a portion of the internet that is not indexed by search engines like Google. It’s often accessed through specialized browsers like Tor, which helps to mask users’ identities, and it used for both legitimate and illicit activities. You can subscribe to services that can continually monitor the dark web and notify you if your PII is found, but unfortunately there’s no way to remove such information.

2. Consider Freezing Your Credit

  • Contact a credit bureau: Reach out to Equifax, Experian, and TransUnion to place a security freeze on your credit report. This will help prevent new accounts from being opened in your name.

3. Monitor Your Accounts

  • Review your bank and credit card statements: Look for any unauthorized transactions or charges.
  • Check your credit report: Regularly monitor your credit report for signs of identity theft, such as new accounts or inquiries you didn’t authorize. See AnnualCreditReport.com for more information.

4. Secure Your Accounts:

  • Update passwords for affected accounts: If your passwords were compromised, change them immediately. Use secure, unique passwords for each account.
  • Enable two-factor authentication: Add an extra layer of security to your online accounts by using two-factor authentication (2FA), which requires a code sent to your phone or email in addition to your password.

5. Stay Informed

  • Consider credit monitoring or identity theft protection services: The company where your data was exposed may offer to pay for credit monitoring service for a year or two. Companies that offer such service often try to upsell additional paid services such as identity theft protection assistance and/or insurance.

6. Expect phishing attempts in the wake of data breaches

How phishing attempts work:

  • Leveraging Fear: Scammers may send emails or texts claiming to be from the affected company, offering assistance or updates about the breach. These messages often contain a sense of urgency, urging recipients to click on links or provide personal information.
  • Exploiting Stolen Data: If the breach involved the exposure of personal details, scammers may use this information to personalize their phishing attempts, making them seem more legitimate.
  • Offering False Security Measures: Phishing messages may offer “security solutions” or “identity theft protection services” that are actually scams designed to steal additional information.
  • Impersonation Scams: Scammers with information about you may contact you and claim that they are a representative with a governmental agency, financial institution, security department of a well-known company, or even friends or family. To “prove” their legitimacy they will likely tell you information about yourself – such as your social security number or birthdate – in hopes that they will gain your trust.

How to spot phishing attempts:

  • Verify the Sender: Be cautious of emails or texts from unfamiliar senders, even if they appear to be from a legitimate company. Check the sender’s email address carefully for any typos or inconsistencies.
  • Watch for Suspicious Links: Avoid clicking on links in unsolicited emails or texts. Instead, type the URL directly into your web browser to ensure it’s legitimate.
  • Be Wary of Urgent Messages: Scammers often create a sense of urgency to pressure victims into making quick decisions. If you receive a message demanding immediate action, take a step back and verify the information before responding.
  • Never Provide Personal Information: Never share your personal information, such as passwords, Social Security numbers, or credit card details, in response to unsolicited requests.

What’s a legitimate form of notification?

  • Most scams come as an email, text message or phone call. Scammers can use electronic methods inexpensively and fool many people quickly. Phone numbers, websites and email addresses used by the scammers can be changed quickly if needed.
  • A letter in the postal mail is most likely legitimate. The time, effort and expense to send a letter in the mail is most often done by legitimate companies. Letters in the mail usually contain information that can be verified because it does not change from what’s on paper. If it did contain fraudulent information, it would likely be shut down by the time you receive and read the letter receive in the mail.

By following these steps, you can help minimize the damage caused by a data breach and protect yourself from potential identity theft or scams. Remember, remain calm but staying vigilant and taking proactive measures can make a significant difference in your security. Data breaches are a fact of life in today’s interconnected world.

National Public Data Breach Exposes 2.9 Billion Records: How to Check if Your Information Was Exposed

Data Breach graphic

A significant data breach including 2.9 billion records from the company National Public Data has compromised the personal information of many millions of Americans. National Public Data normally sells data to companies for the purpose of background checks, criminal records and more. But it appears that much, if not all of the data they’ve obtained over the years has been leaked. The breach includes sensitive data such as names, addresses, Social Security numbers and birthdates – information that identity thieves and scammers can use to their benefit.

How to Check If You Were Affected:

To determine if your personal information was part of the breach, here are a few trustworthy websites where you can enter some information to check if your data has been exposed:

These websites will require you to provide a portion of your information, and return any remaining data that matches the search inquiry.

What to Do if Your Information Was Exposed:

If your information was exposed in the breach, take the following steps:

  1. Freeze Your Credit: Contact the three major credit bureaus (Equifax, Experian, and TransUnion) to place a credit freeze on your account. This will prevent unauthorized individuals from opening new accounts in your name.
  2. Monitor Your Accounts: Regularly check your bank statements, credit card bills, and other financial records for any suspicious activity.
  3. Report Identity Theft: If you believe your identity has been stolen, file a police report and contact the Federal Trade Commission (FTC) to report the incident.

Staying Informed:

As more details about the data breach emerge, it’s important to stay informed about the situation. Keep an eye on news reports, official government announcements, and updates from the affected companies.

Remember: While this breach is a significant event, there are steps you can take to protect yourself and minimize the potential damage. By following the advice above and staying vigilant, you can help safeguard your personal information.

Check your email login activity to see if hackers are trying to gain access

Your email account is one of the most important online accounts to keep secure and un-hackable. There are two main reasons why checking recent login activity to your email account is a good idea:

  1. Spotting Unauthorized Access: Your email account likely contains sensitive information, personal documents, and access to other online accounts. By checking the login activity, you can see if someone else has accessed or attempted to access your account from an unrecognized location or device. This could be a sign that your account has been compromised through phishing, malware, or a weak password.
  2. Troubleshooting Login Issues: Sometimes, legitimate login attempts from new devices or locations can cause problems. Reviewing your recent activity can help you identify if there were any login attempts around the time you experienced issues accessing your account. This can help you narrow down the cause of the problem.

In short, checking your recent login activity is a proactive way to protect your email security and ensure that only you are accessing your account.

How to check your login activity for major email accounts

Here’s how to check recent login activity on the major email providers:

Gmail:

  1. Open Gmail on your computer.
  2. Look for the “Last account activity Details” link in the bottom right corner of the window and click on it.

Yahoo Mail:

  1. Log in to your Yahoo Mail account.
  2. Click on your profile icon in the top right corner.
  3. Select “Account info” from the menu.
  4. Find the “Recent activity” section and click on it.

Outlook.com / Microsoft:

  1. Log in to your Outlook.com or Microsoft account.
  2. Click on your profile picture in the top right corner.
  3. Select “View account and profile.”
  4. Under “Security info,” click on “Recent activity.”

Important notes:

  • The information displayed typically includes the location (city and country) of the login and the type of device used. However the location may be incorrect if using a VPN or mobile network.
  • If you see any suspicious activity, it’s recommended to change your password immediately. Also consider adding two-step verification to make it harder for hackers to access your account even if they know your password, and adding it before hackers do.
  • Email provided by Internet Service Providers AT&T and Charter/Spectrum do not offer the ability to check your recent activity or setup two-step verification. That’s one reason why we recommend switching away from using email provided by your Internet Service Provider.

Contact us if you need help with securing your email or other online accounts.