Updated August 2024: Tablets have become a popular mobile device that fits a gap between the personal computer and the smartphone. It’s not always convenient to go to your computer to look up a website, and smartphone screens are so small that the experience just isn’t the same. When lounging on the sofa or traveling, tablets can provide a good experience for shopping online, browsing certain sites, or accessing social media. But, they do have limitations and aren’t a full replacement for a desktop or laptop PC. Statistics seem to back this up. While the iPad was first introduced over a decade ago (in 2010), tablets still only represent about 3% of devices used on the web. … [Read more...]
Keep your mobile phone number safe from hackers
Updated 7/3/25 with new information: Your mobile phone number has become increasingly valuable because it’s the way that hackers can gain access to your online financial, email and social media accounts. We now are encouraged to use our smartphone and attached phone number to prove who we are – often via Multi-Factor Authentication (MFA), a method that requires not only entering your username/email address and password into a website, but also entering a code or responding to a prompt sent to your cell phone. But what if someone gained access to your mobile phone – or increasingly more common – your mobile phone number? Hackers that successfully SIM swap or port-out your phone … [Read more...]
Google isn’t evil – Why we like Google
It’s easy to vilify large tech companies. They hold a lot of power over our online lives. One organization that people like to point to as a monopoly is Google. The company owns over 91% of the worlwide search market share, but it got there for a reason. Google’s business model is to give people searching online what they want. So it’s in the company’s best interest to make your online life easier. Keeping people searching on its site allows Google to continue running a successful ad business to earn revenue. Yes, it’s true that you do give up some of your information to the search engine in exhange for using its services (including YouTube, which Google owns). But the trade in … [Read more...]
Watch Computer Techs recommended videos on YouTube
Computer Techs recommended videos is a YouTube playlist consisting of our favorite videos that will educate the viewer about computer and technology related scams, usage tips, and sometimes a funny video that gives us a good laugh. Be sure to press the "Subscribe" button to get notified about new videos that we add from time-to-time. Whenever you need help with your computer or anything related to technology, please contact Computer Techs. … [Read more...]
Reveal passwords stored in your browser – and check for the ones exposed in data breaches
Updated January 2026: All major web browsers have the option to save the login and password for the websites that you visit so it’s easier to login the next time you visit a site. If you don’t already have a password system to create secure and memorable passwords, or a password manager to store your logins and other secure information – your browser’s password manager can securely store logins for you and will suggest a strong and unique password for new websites that don’t have a saved password yet. If you don’t want your logins visible to anyone looking at your computer or device, make sure that you use a password or PIN to access it. Below you find instructions … [Read more...]
Spend a few minutes to check out these scams so that you don’t become a victim
Updated June 2025: Scammers are becoming increasingly clever. Every month we hear from clients who have been scammed by letting someone take control of their computer and coerce them into paying for support for non-existent computer or account-related problems. With a little bit of knowledge of how these scams work, you won't become a victim yourself. Scams typically start with a website pop-up, email, phone call or text message from a well-known company such as Amazon, Windows/Microsoft, Apple, or Netflix. You are notified about a large purchase that has been or will be charged to your account - or there's a problem with your account or device/computer. You're told to call, … [Read more...]
Listen to these recordings of scam calls so that you can recognize them and not fall victim
Please listen to our recordings of scam calls and messages that you’ll likely receive at some point in time, so that you can become familiar with the scams and not fall victim to them. Click the orange Play button below, or listen to all uploaded Scam calls on clyp.it. … [Read more...]
Internet crimes up over 69% in 2020: Phishing scams more than double and people over 60 the most common victims
The FBI’s Internet Crime Complaint Center has released its annual report. The 2020 Internet Crime Report includes information from 791,790 complaints of suspected internet crime—an increase of more than 300,000 complaints from 2019—and reported losses exceeding $4.2 billion. Topping the list of types of reported internet crimes was phishing, which more than doubled last year. People over 60 were the most common victims according to the report. Nevada had the 8th most complaints of the states and territories included in the report – yet it is the 32nd most populous. The phishing category also includes vishing, smishing and pharming – all techniques via email, voicemail, text … [Read more...]
FTC Identity Theft website guides victims through the recovery process
If you’ve been a victim of identity theft, the Federal Trade Commission’s IdentityTheft.gov is the federal government’s one-stop resource for identity theft victims. The site provides streamlined checklists and sample letters to guide you through the recovery process. If you haven’t been a victim, read these tips to help keep your identity from being stolen or compromised in the first place: Prevent Identity Theft. … [Read more...]






