What You Need to Know About the End of Support for Windows 10

  • Microsoft ended support for Windows 10 on October 14, 2025. There’s no more free updates*, security patches, or technical support available from Microsoft – unless you take action.
  • Most users have 3 options: upgrade to Windows 11, get a new computer with Windows 11, or extend Windows 10 security updates until October 2026.
  • Upgrading to Windows 11 is recommended for most users for its advanced security, improved performance, and new features.

Updated 11/1/25:

Now that Microsoft’s Windows 10 operating system has reached the end of mainstream support, computer users that haven’t taken action yet to address their out-of-date operating system should do so as soon as possible and definately before the end of 2025. One option is to enroll in Microsoft’s first-time ever “Extended Security Updates” program for personal computers using Windows 10, that will extend security updates for an additional year – until October 13, 2026. Continue reading below to become more informed about all of the options.

The Start button taskbar icons for Windows 10 vs Windows 11.

What Are Your Options?

If you haven’t already taken action, it’s time to do so now. Windows 10 users have three primary options:

  1. Upgrade your existing computer to Windows 11 for free
  2. Get a new computer with Windows 11
  3. Enroll in the Extended Security Updates program for free to Continue using Windows 10 until October 2026

Let’s explore these options and why ultimately upgrading to Windows 11 is probably your best choice.

[Read more…]

New computer recommendations

Updated 11/7/24:

You may be reading this because the operating system on your existing computer will no longer be supported soon. Since you’ll likely be spending the next 5-10 years or more with your next computer, please take a few minutes now to make an informed decision about what to look for in a new computer and accessories – and get the best deal. 

Our recommended minimum new computer specifications are:

  • Intel Core i3/AMD Ryzen 5 processor or better. For an Apple Mac computer we recommend getting Apple’s “M” series processor rather than an Intel processor.
  • 8 GB RAM or more
  • 256GB Solid State Drive (SSD) or larger
  • Please read New Computer Buying Guide for more detailed information.

If you’re thinking about trying to save money by buying a refurbished computer – we don’t recommend it. Typically they won’t last as long as a new computer, and are less secure due to unpatched processor flaws and some cannot be upgraded to more recent secure operating systems.

We’ve seen the best reliability with HP and Dell brands. Keep in mind that cheaper laptops and all-in-ones typically only have a vertical screen resolution of 768 pixels, whereas higher quality and clearer screens are 1080 pixels or higher.

Click on the links below to view recommended computers meeting the minimum recommended specifications noted above at the respective retailer’s website. Some models may be available in-store. If you come across a good deal elsewhere, remember to look for specifications that are a minimum of what’s listed above.

[Read more…]

Beware: The Latest Tech Scams You Need to Know About

Cybercriminals are always looking for new ways to trick people, and we at Computer Techs are seeing an uptick in scams that target computer and internet users. These scams often look convincing on the surface, but with a little extra caution, you can spot the red flags before becoming a victim.

Fake Invitations

One of the most dangerous scams making the rounds is an email that appears to come from someone you know—a neighbor, friend, or even a family member. The message might say something like “Check out this important document” or “Click here to view the invitation.”

If you click the link, it doesn’t open a document—it silently downloads a remote support trojan onto your computer. Once installed, scammers can take control of your system, steal data, or even lock you out completely.

👉 How to protect yourself:

  • Never click unexpected links, even if they appear to come from someone you trust.
  • If the email feels suspicious, call the person directly to confirm they really sent it.

Fake Invoice Scams (McAfee, Geek Squad, and More)

Another common scam involves fake invoices seemingly from big-name companies such as McAfee, Geek Squad, Norton or PayPal. These emails claim you’ve been charged for a subscription renewal and provide a phone number to call if you want to cancel.

Of course, the invoice is fake. If you call, scammers may trick you into giving them remote access to your computer or your credit card details.

👉 How to protect yourself:

  • Legitimate companies don’t send invoices out of the blue for services you didn’t order.
  • Check your bank account or official account page directly instead of trusting an email.
  • Don’t call the number in the email—go to the company’s official website for real contact information.

How to Spot a Scam Message

Scammers rely on urgency, fear, or curiosity to get you to click. Before responding to any unexpected email, text, or phone call, take a step back and look for these signs:

  • Bogus addresses or phone numbers – Hover over (but don’t click) an email address or link to see where it really leads.
  • Bad grammar and spelling mistakes – Billion-dollar corporations don’t send sloppy emails.
  • Generic greetings – Messages that start with “Dear Customer” instead of your actual name are suspicious.
  • Pressure to act quickly – “Act now or lose your account!” is a classic scam tactic.

The Golden Rule: Don’t Click

Above all, never open unexpected email links or attachments. If something looks even a little off, pick up the phone and call the person or company using a number you trust—not the one in the suspicious message.

Click here to view examples of the latest phishing and scams that we’re seeing.

Final Thoughts

Scams are becoming more sophisticated, but with a little vigilance you can stay safe. When in doubt, remember: slow down, verify, and never click blindly.

Using Webmail for Reliable Email Troubleshooting

In today’s digital world, many people access their email through email clients or apps installed on their mobile devices or computers. Popular email clients include the Mail app on Mac and iOS, Microsoft Outlook and Thunderbird on Windows, and Samsung Email on Samsung Android devices. These applications provide a convenient, organized way to view and respond to email from one or multiple accounts in a single interface.

However, when encountering email problems such as missing messages, sending or receiving errors, or synchronization issues, it is best to troubleshoot by going directly to the source of your email — known as webmail. Webmail is the online interface or website hosted by your email provider where your email is stored on their servers. From a webmail interface, you interact directly with the email server, bypassing the email client or device-specific issues.

Why Check Webmail?

  • Source of Truth: Since webmail interfaces connect directly to the email server, they show the true state of your inbox and messages without local app caching or syncing delays.
  • Bypasses Device Issues: If an email client or app is misconfigured or experiencing software problems, your webmail will still show your emails correctly.
  • Larger Screen Advantage: Using webmail on a computer or large-screen device offers better visibility, navigation, and options for managing complex email tasks.
  • Settings and Configurations: Many webmail portals offer comprehensive settings and diagnostic tools that can help identify issues such as filters, blocked addresses, or forwarding rules.

Common Webmail Services

Below are links to the most popular webmail services where users can log in to directly access their email accounts:

  • Yahoo Mail: A popular webmail service with a clean interface and organizational tools.
  • Gmail: Google’s widely used email service known for its powerful search and spam filtering.
  • AOL Mail: The classic free email provider is still around and popular with seniors.
  • Outlook.com Mail: Microsoft’s webmail for personal accounts including Outlook, Hotmail, and Live.com.
  • AT&T/Yahoo Mail: AT&T’s partnership with Yahoo offers a simplified version of Yahoo Mail branded for AT&T internet subscribers. Also accessible from the Mail button on AT&Ts Currently.com.
  • Spectrum Email: Spectrum’s webmail accessible for Charter/Spectrum internet subscribers.

Troubleshooting Tips Using Webmail

  • Log into your webmail account on a desktop or laptop browser.
  • Verify that new emails are arriving and old emails appear as expected.
  • Check your spam, trash, and other folders for misplaced or redirected emails.
  • Review account settings, filters, forwarding rules, and security notifications.
  • Test sending and receiving emails directly from webmail to isolate client-specific issues.
  • Reset passwords or security settings if login problems exist.

By starting troubleshooting at the source with webmail, users ensure they understand the true status of their email accounts before adjusting device or app settings. This approach simplifies diagnosing issues and often highlights whether the problem resides with the email provider or your local email client.

If you’re having problems with accessing all of your emails, contact Computer Techs for personal help.

Using the Same Password Everywhere Is Like Using Your House Key for All of Your Locks

Imagine if one single key unlocked your house, your car, your office, and even your safety deposit box at the bank. Convenient? Sure. Safe? Absolutely not. If you were to lose that key—or if someone were to steal it—they would instantly have access to everything important in your life.

That’s exactly what happens when you reuse the same password across multiple accounts.

The Convenience Trap

It’s easy to see why people reuse passwords. With dozens of logins for banking, shopping, email, and social media, it feels impossible to remember them all. One strong password used everywhere seems like the simplest solution. But that convenience comes at a steep cost.

The Domino Effect of a Breach

When a website suffers a data breach—and millions do every year—your password may end up exposed. If that password is the same one you use for your bank or email, cybercriminals can walk right in without resistance. Just like losing your universal key, one compromised password means every part of your digital life could be unlocked.

This is known as credential stuffing, where hackers try stolen email and password pairs across hundreds of sites until they find matches. It works disturbingly well when people reuse the same password everywhere.

Building a Better Lock System

Instead of one “master key,” you should think of your online security like a set of different, specialized locks:

The Bottom Line

Using the same password everywhere may feel easier, but it’s the digital equivalent of handing out a single key that opens your entire life. A smarter approach is to use different keys for different locks—keeping your most valuable accounts protected even if one password gets lost.

Check the Source to Help Stop Phishing and Scams

In today’s digital world, phishing and online scams remain some of the most common ways criminals trick people into giving up sensitive information. These attacks often look convincing—emails that appear to be from your bank, websites that resemble popular retailers, or texts that mimic delivery services. However, most phishing attempts can be uncovered with a simple habit: checking the source email address or website before taking action.

Why Source Details Matter

Scammers rely on urgency and trust. They want you to act quickly—click a link, download a file, or share personal information—before you pause to think. The messages might use official logos, professional language, or even the names of real employees. But what they cannot fully hide is where the message came from.

Spotting these differences is one of the easiest ways to recognize a scam.

Common Red Flags in Email Addresses and Websites

  1. Misspellings or substitutions – “paypaI.com” with a capital “i” instead of “paypal.com.”
  2. Unnecessary prefixes or suffixes – “login-verification-yourbank.com.”
  3. Free email providers – If “Apple Support” emails you from @gmail.com, it’s fake.
  4. Non-matching links – Hovering over a link shows the true URL. If the text says “www.bankofamerica.com” but the link points somewhere else, don’t click.

Simple Steps to Protect Yourself

  • Always hover before you click. Place your mouse over a link (without clicking) to see where it really leads.
  • Check the sender. If the email claims to be from your bank, but the address isn’t from the official domain, delete it.
  • Look for HTTPS. Secure sites start with https://. While not foolproof, a missing “s” is a red flag.
  • When in doubt, go directly. Instead of clicking a link in an email, open your browser and type the official website address yourself.

The Bottom Line

Phishing and scams succeed when people act without verifying. By taking just a few seconds to check the source email address or website, you can avoid most of these traps. It’s a simple but powerful defense that costs nothing and protects everything.

Check out our public album on Google Photos of screenshots from phishing and scam texts, emails and websites – which can help you know what to look for in every unsolicited message. Click here: Phishing and scam examples.

What You Need to Know About Backup and Cloud Storage – And How to Avoid Recent Scams

In today’s digital world, the importance of backing up your data cannot be overstated. Whether it’s precious family photos, important documents, notes, contacts, or your calendar/reminders, losing data can be devastating. Cloud storage has become one of the most popular and convenient ways to ensure that your files are safe, accessible, and recoverable in case of loss. However, as the use of cloud services has grown, so too has the number of scams targeting unsuspecting users.

Understanding Cloud Storage and Backups

Cloud storage is a service that lets you save data on remote servers accessed via the internet. Major providers like Google Drive, Apple iCloud, Microsoft OneDrive, and Amazon Drive offer users the ability to store files securely and sync them across multiple devices.

Backup refers to the process of copying data from your devices and storing it elsewhere (such as in the cloud or on an external hard drive), so you can restore it in case the original is lost, damaged, or compromised.

Some common uses for cloud storage and backup include:

  • Automatic photos, messages, device settings uploads from smartphones.
  • Syncing of contacts, calendars, files between devices.
  • Document sharing and collaboration for work or school.
  • Restoring data after device failure, theft, or ransomware attacks.
  • Archiving important files you don’t need every day but don’t want to lose.

For more information about cloud backup, read “What is the Cloud?”.

Recent Cloud Storage Scams: What You Should Know

[Read more…]

Why Senior Citizens Shouldn’t Be Afraid of AI – How It’s Used in Their Everyday Lives

Artificial Intelligence, or AI, is becoming a part of everyday life—but for many senior citizens, it still feels like something to fear. Negative headlines, privacy concerns, and the mystery of how it all works can be intimidating. However, the truth is that AI is already helping seniors in simple, supportive ways—often without them even realizing it.

From health reminders and voice assistants to easier Google searches and improved home safety, AI is designed to enhance independence, not take it away. This article will show you why there’s no need to fear AI and how it can make daily life easier, safer, and even more enjoyable.

💡 Why Seniors Shouldn’t Be Afraid of AI

1. You’re Probably Already Using AI Without Realizing It

If you’ve ever used Siri, Alexa, or even a GPS app on your phone—you’ve already used AI. Other common tools include:

  • Smart TVs that suggest shows you might like
  • Smartphones that correct typos or block spam calls
  • Voice assistants that can set reminders or answer questions

AI isn’t some complex robot—it’s a helpful background feature in many devices you already own.

2. AI Helps, But You Stay in Control

Some worry that AI will “take over” their choices. But AI doesn’t make decisions for you—it simply provides suggestions, reminders, or shortcuts. Think of it like a helpful assistant who follows your instructions, not a boss.

You can also turn AI features on or off as you wish. You’re always in the driver’s seat.

3. Privacy and Safety Controls Are Built In

Modern AI tools often include strong privacy features:

  • You can mute or disable microphones and cameras.
  • You choose what to share and when.
  • Trusted brands like Apple, Google, and Amazon have security settings you or a family member can easily review.

If you’re ever unsure, a family member, friend, or tech help center can walk you through it step by step.

✅ How AI Is Already Helping Seniors Today

[Read more…]

A Beginner’s Guide to Passkeys: How to Set Them Up, Use Them, and Sync Across Devices

Updated 7/10/25 – added websites that support passkeys:

If you’re tired of remembering complex passwords or worrying about phishing attacks, passkeys offer a simpler, safer alternative. Major platforms like Google, Microsoft, Apple and Yahoo now support passkeys, and they’re designed to replace passwords entirely. In this guide, we’ll explain what passkeys are, how to set them up, and how you can use them across multiple devices—even for the same account.

What websites support Passkeys?

Major email providers Google, Microsoft and Yahoo now support passkeys. However, banks and brokerages – likely where most of your money is kept – have been slow to adopt passkeys. Here’s a non-comprehensive list of websites that support passkeys: passkeys.directory

How to Set Up a Passkey

  1. Go to the account’s security settings — For example, in your Google Account, look for Security > Passkeys.
  2. Click “Create a passkey” — The website will guide you through setup.
  3. Choose where to store the passkey — Your device will usually suggest saving it to your platform’s password manager (Google Password Manager, Apple’s iCloud Passwords & Keychain or Windows Hello).
  4. Verify yourself — Confirm with Face ID, Touch ID, fingerprint, or PIN to finish creating the passkey.

💡 Tip: You don’t have to create the passkey on just one device—you can (and should) create a passkey for the same account on multiple devices!

How to Use a Passkey

[Read more…]

The Anxiety of Data Breaches and Dark Web PII Exposure: What You Can and Cannot Do

In today’s digital world, data breaches are no longer rare events—they are a near-constant threat. From social media platforms to healthcare providers to internet service providers, major organizations have seen their systems compromised, often resulting in personally identifiable information (PII), being leaked onto the dark web. Understandably, this has created a new wave of anxiety for individuals—many of whom have no idea their data has been exposed until it’s too late.

But while the fear is real, and in many ways justified, it’s important to know where your control begins and ends. In this article we’ll discuss what you can and cannot do when it comes to dealing with PII leaks on the dark web—and how to manage the anxiety that comes with them.

Why Data Breaches Cause Anxiety

PII includes names, addresses, Social Security numbers, birthdates, login credentials, and financial account numbers—data that, in the wrong hands, can be used to commit identity theft, financial fraud, and more. The dark web, a hidden part of the internet accessible through anonymizing tools like Tor, acts as a marketplace where this stolen data is bought and sold.

For victims, the emotional fallout can be intense:

  • Loss of control over who sees and uses your information.
  • Fear of future harm, like fraudulent loans, damaged credit or being scammed.
  • Lack of visibility into how deep the breach goes.
  • Confusion over what steps to take and whether any actions will even help.

What You Can Do About It

[Read more…]

Why Retirees Are Targets for Identity Theft or Credit Fraud

When people retire, it’s easy to assume that certain financial concerns fade away—especially the fear of identity theft or credit fraud. After all, if you’re no longer applying for loans or opening new credit cards, why would anyone want to target your credit file?

In reality, seniors remain prime targets for identity thieves, and freezing your credit can be one of the simplest and most effective ways to guard against potential financial harm. Here’s why even retirees should seriously consider placing a credit freeze.

Retirees Still Have Active Credit Files

Even if you’re no longer working or making big purchases on credit, your credit reports still exist—and they contain valuable information. Identity thieves can use your Social Security number, address, and other details to open fraudulent accounts, take out loans, or even commit medical or tax fraud in your name.

A credit freeze makes it much harder for bad actors to do this. It blocks access to your credit reports, preventing new credit inquiries unless you lift the freeze yourself.

Seniors Are Prime Targets for Scammers

Unfortunately, older adults are frequent targets for scammers. The FBI’s Internet Crime Complaint Center (IC3) has consistently reported high financial losses among seniors due to fraud. Criminals may assume that retirees are less likely to monitor their credit actively or to notice small irregularities in financial statements—making them easier prey.

A credit freeze serves as a protective barrier. If someone attempts to open a credit card or loan using your name, they’ll be denied access to your credit file, effectively shutting down the scam before it starts.

Credit Freezes Are Free and Reversible

Thanks to federal legislation, placing and lifting a credit freeze is free through the major credit bureaus—Equifax, Experian, and TransUnion. If you ever do need to apply for credit, you can temporarily lift the freeze online or by phone in just minutes.

This flexibility makes freezing your credit a low-hassle, high-reward action, especially if you’re not regularly opening new credit accounts.

A Freeze Offers More Protection Than Credit Monitoring Alone

Credit monitoring services notify you after suspicious activity has occurred. While useful, they are reactive by nature. A credit freeze, on the other hand, is proactive. It prevents the activity from happening in the first place.

For retirees who want peace of mind without having to keep a constant eye on their credit report, freezing credit can be a set-it-and-forget-it security measure.

It Protects Your Legacy and Estate

If you’re managing a large estate, or simply trying to preserve your financial health for heirs, protecting your credit is part of protecting your legacy. Identity theft doesn’t just impact you—it can complicate estate management, trusts, and beneficiary distributions after death.

In some cases, deceased individuals are even targeted by fraudsters. Taking steps now to lock down your credit while you’re alive helps ensure fewer headaches for your loved ones later.

Final Thoughts: A Simple Step for Serious Peace of Mind

Even in retirement, you’re not off the radar of cybercriminals. In fact, you may be more vulnerable than ever. Freezing your credit is a powerful tool in the fight against identity theft, and it costs nothing but a few minutes of your time.

If you haven’t already, consider visiting the official sites for Equifax, Experian, and TransUnion to place a freeze on your credit reports. It’s a smart, simple way to help safeguard your golden years. If you need help navigating the process of setting up a credit freeze, you can contact Computer Techs for help.

Need a new printer? Why you should consider getting laser/LED vs. inkjet

When purchasing a new printer, there are several reasons you should consider getting laser vs. inkjet.

We are often asked to troubleshoot printing problems with inkjet printers. With Nevada’s dry climate, if you don’t frequently print something the ink in inkjet printers often dries out and clogs the ink cartridges and print heads, thus reducing print quality or completely rendering the printer useless.

When shopping for a printer you may be inclined to get an inexpensive printer because you don’t print very often. Though inkjet printers are usually less expensive, the cost of the ink and repair can make it a more expensive investment in the long run.

Let’s look at the pros and cons…

Pros of laser/LED printers:

  • The toner powder that’s used in laser printer toner lasts longer than ink – typically thousands of pages (vs hundreds of pages for standard ink cartridge printers). You may only have to buy more toner cartridge(s) every few years.
  • Cost-per-page of toner vs. ink is lower.
  • The toner isn’t susceptible to drying up or clogging the printer.
  • Laser printers print faster.

Cons of laser/LED printers:

  • The initial equipment cost of a laser printer is usually more expensive. Color laser printers are usually hundreds of dollars more than their inkjet alternatives.
  • Laser printers don’t print high-quality photos.
  • All-in-one laser printers are usually larger and may not fit if you have a small space to place your printer.

More information about the choosing a printer can be found in the Consumer Reports Printer Buying Guide.

The technical differences between inkjet and laser/LED printers

Inkjet and laser printers operate on very different technologies, each with their own strengths. Here’s a breakdown of how they work:

Inkjet Printers

  • Technology: Inkjet printers spray tiny droplets of liquid ink directly onto the paper. These droplets can be as small as a few microns, allowing for precise details and vibrant colors.
  • Process: They use one of two methods: thermal inkjet (heating the ink to create bubbles that force the ink out) or piezoelectric inkjet (using vibrations to eject ink).
  • Best For: High-resolution photo printing and documents requiring vivid colors. Inkjet printers are generally slower and more suitable for low-volume printing.

Laser Printers

  • Technology: Laser printers use toner, a powdered ink, and static electricity to transfer the image or text onto the paper.
  • Process: A laser beam “draws” the image on a drum inside the printer, creating an electrostatic charge. The toner adheres to the charged areas, and heat is used to bond the toner to the paper.
  • Best For: Fast printing of high-volume, monochrome documents. They are great for efficiency but less suitable for detailed photo printing.

If you’re debating which one suits your needs, it boils down to what you’re printing and how often.