Category: Computing Tips

Social engineering scams becoming more common than computer viruses – What you need to know to avoid them

Print This Article Print This Article

When I started Computer Techs in 2003, the most common danger on the computer was the virus. The computer virus was often spread through email attachments. Fast forward 20 years, now the most common danger is social engineering scams. And what was once just random guesses of people’s email addresses, now scammers also use phone numbers to call or send messages to contact their potential victims.

These days scammers and hackers have a lot more information about you due to website data breaches and the treasure trove of information that has been exposed about you – such as your name, email/physical address, phone number – and sometimes passwords. They often use that information to send emails, text messages or phone calls to persuade you to that there’s a problem that needs immediate attention. Examples of what they want you to do include:

  • Click a link or open an email attachment. Links often lead to look-alike websites in which you are asked to provide personal information – such as username and password – or even financial information
  • Call a number provided in the email or message so that you can dispute a (false) charge or purchase that was made
  • Request remote access to your computer or smartphone to fix or help with an account problem

When you receive such messages or calls – do not act immediately, it’s likely a scam. Instead read the following information to help you determine the authenticity of what you just received.

Can you spot a “phish”? Check out these phishing and fake email examples – Computer Techs

Avoid Social Engineering and Phishing Attacks – CISA

What is Social Engineering? Examples and Prevention Tips – Webroot

Top 5 computer and phone scams to watch out for – Computer Techs

Tips for Properly Cleaning Electronics So You Don’t Harm Them

Filed under: Computing Tips,Tech Support - Dec 30 2022
Tips for Properly Cleaning Electronics So You Don't Harm Them

No matter what type of electronic device you own, proper cleaning and maintenance are essential for keeping them running efficiently and smoothly. This ensures that your device continues to serve its purpose for many years to come. However, it’s important to be aware of how to clean electronics properly to not cause any damage to them in the process.

It’s easy to overlook the importance of cleaning electronic devices, especially if you’re not aware of the dangers of improper cleaning. Not only can incorrect cleaning methods destroy the device itself, but in some cases, they might also cause harm to the user. This is why it’s essential to know which cleaning methods are appropriate for each

The following tips will guide you in properly cleaning and maintaining your electronics so you don’t end up doing more harm than good:

Always Unplug Devices

While there are some exceptions such as keyboards and other peripherals, it is safest to power down and unplug all electronic devices before you begin cleaning them. This eliminates the potential risk of electric shock and other hazards associated with having the device on and powered while attempting to clean. If you’re not using liquids, like water or wet cleaning wipes, you might not need to unplug your device, but it’s still a good safety precaution.

Use Appropriate Cleaning Materials

It is important to choose the right cleaning materials for each device to not damage them. For example, if you have a laptop or a phone, it’s best to use a lightly damp microfiber cloth or a screen-specific cleaning product. For other devices, like a gaming device or computer monitor, you can use either a microfiber cloth or compressed air.

It’s worth noting that it’s rarely a good idea to use harsh chemicals such as bleach or other harsh cleaning products to clean electronic devices. These chemicals can be too abrasive and cause irreparable damage to the device.

Avoid Excess Moisture

Moisture and electronics don’t mix, so you should always avoid using too much liquid when cleaning an electronic device. It’s best to use the least amount of moisture you can and make sure it’s evenly distributed. Never submerge an electronic device in liquid, and don’t spray any liquid directly onto the device.

When using cleaning cloths or wipes, make sure they are only slightly damp and not dripping with water. You should also avoid using abrasive paper towels or other rough materials, which can damage the device’s surface.

Make Sure Areas are Completely Dry Before Connecting

Once you’re finished cleaning, make sure everything is completely dry before plugging any device back in or connecting it to a power source. This includes checking the plug and ports for any remaining traces of liquid or dampness before plugging them in. Usually, this shouldn’t pose an issue, unless you accidentally spilled a liquid on the device while cleaning or used too much cleaning solution.

Clean Similar Items at the Same Time

If you have multiple electronic items that require cleaning, it’s best to clean them all at the same time. This can help save you time and make sure all the items get the same level of care and attention. It’s especially important to do this with items that are stored near each other, as it will reduce the spread of any dust or other particles.

Use Gloves

No matter what type of electronic devices you’re cleaning, if you’re cleaning many it’s a good idea to wear gloves. Not only do gloves protect your hands from any cleaning agents or sharp edges ( such as from inside a computer case), but some tech-specific gloves (or bands) can also help prevent accidental electrostatic discharges that can damage sensitive components.

Maintain A Regular Cleaning Schedule

Finally, it’s important to keep up with regular cleaning and maintenance of your electronics to keep them running properly. Dust and grime can build up over time, so it’s best to keep an eye on the state of your devices and follow the above steps whenever necessary.

Cleaning electronics is an important part of maintaining them long term so they’re always able to keep functioning as intended. However, it’s important to make sure that you’re cleaning them properly, to avoid any potential damage.

By following these tips and utilizing the right tools, you can ensure that you’re cleaning your electronics safely and efficiently.

If you have any other questions or need help with your tech cleaning don’t hesitate to contact us!

How to Keep Money from Being Stolen Through Online Banking

Filed under: Computing Tips,Passwords,Scams,Security - Dec 16 2022
Print This Article Print This Article
How to Keep Money from Being Stolen Through Online Banking

Online banking is one of the most convenient services available and offers individuals, businesses, and organizations a way to quickly and easily manage their finances. Unfortunately, online banking is also vulnerable to all of the same security risks that stem from the virtual nature of the internet. It’s important to take steps to ensure that your hard earned money is secure from theft and fraud.

You wouldn’t want to suddenly realize that your bank account has been drained of your hard-earned cash!

Let’s take a look at a dozen ways to keep your money safe while banking online.

(more…)

How Does a Virtual Doctor Visit Work?

Filed under: Computing Tips,Internet Tips - Oct 12 2022
How Does a Virtual Doctor Visit Work?

Have you ever wondered how a virtual doctor visit works? With more and more people working remotely and/or juggling a million different commitments, it’s no wonder that virtual doctor visits are becoming increasingly popular. In this article, we’ll take a look at what a virtual doctor visit is, how they work, and some of the pros and cons.

What is a virtual doctor visit?

A virtual doctor visit is a consultation between a patient and a doctor that takes place over video chat (or other electronic avenues). That means you can consult with a doctor from the comfort of your own home – no need to travel to an office. All you need is a computer or smartphone with a webcam and an internet connection.

Make sure you consult with your specific doctor to see what types of appointments they’re able to do virtually. Some appointments might not be able to be done virtually (like a physical exam), but many common appointments – like follow-ups, prescription renewals, and mental health check-ins – can be easily done online.

How do virtual doctor visits work?

Once you’ve found a doctor that you’d like to consult with, you’ll need to book an appointment. How you proceed next will depend on the institution you’ve made the appointment with. However, it’s common that once the appointment is booked, you’ll receive an email or text with a link to the video chat. On the day of your appointment simply click the link at your appointment time and you’ll be connected with the doctor.

During the consultation, the doctor will ask you about your symptoms and medical history. They may also order some tests, like blood work or X-rays, which can be done at a local lab at a later date. The doctor will then make a diagnosis and recommend a treatment plan. If you have any questions, you can ask them during the consultation.

What are the benefits of virtual doctor visits?

There are a few benefits of virtual doctor visits that are worth mentioning:

  • *They’re convenient:* As we mentioned before, you can consult with a doctor from the comfort of your own home. No need to drive across town and spend time in a waiting room.
  • *They’re affordable:* Virtual doctor visits are often cheaper than in-person visits since you’re not paying for the doctor’s office overhead.
  • *You can see a specialist:* /If you live in a rural area, you may not have access to certain specialists. With a virtual doctor visit, you can consult with any specialist, no matter where they’re located.

The benefits generally outweigh the negatives, but there are a few potential downsides to consider as well

What are the drawbacks of virtual doctor visits?

There are a few potential drawbacks of virtual doctor visits that are worth mentioning:

  • They’re not suitable for emergency care: if you’re having a heart attack or another medical emergency, you’ll still need to go to the hospital immediately.
  • You may not have access to certain tests: if the doctor needs to order a CT scan or MRI, you’ll need to go to a local imaging center.
  • The doctor may not be able to prescribe certain medications: if the doctor needs to prescribe a controlled substance, like narcotic pain medication, they may not be able to do so.

Are virtual doctor visits covered by insurance?

This is a tricky question since insurance coverage varies so much. In general, however, most insurance companies will cover at least part of the cost of a virtual doctor visit. Check with your insurance company to find out if they cover virtual doctor visits and, if so, how much they’ll cover.

How do I find a doctor for a virtual visit?

If you’re interested in scheduling a virtual doctor visit, the best place to start is by asking your regular doctor if they offer virtual visits. Many primary care physicians and specialists offer virtual visits these days. You can also search for doctors that offer virtual visits in your area.

Virtual doctor visits are a convenient and affordable way to consult with a doctor from the comfort of your own home. However, they’re not suitable for emergency care and you may not have access to certain tests or medications.

If you have any other questions or need help figuring out how to stay connected with your virtual physician don’t hesitate to contact us!

Should I Install a Phone or Computer Update Now, Or Wait?

Filed under: Computing Tips,Internet Tips - Oct 12 2022
Should I Install a Phone or Computer Update Now, Or Wait?
  • Read the details of the update to determine if it’s a security or feature update – or both.
  • Install security updates right away.
  • It’s best to wait to install feature updates for at least a few weeks after release.

We’ve all been there before. You’re in the middle of working on something important when a notification pops up letting you know there’s an update available for your phone or computer.

Should you stop what you’re doing and install it right away? Or can it wait?

It can be tempting to just ignore the notification and continue on with your work, but it’s important to remember that updates usually contain important security patches or new features that can improve your experience. So how do you decide when to install an update?

Here’s a quick guide to help you make the decision.

Why Updates are Important

There are two main reasons why it’s important to keep your devices updated: security and new features.

Security updates usually address specific vulnerabilities that have been found in the software. By installing these updates, you can help protect your device from being hacked or compromised.

New features, on the other hand, can improve your experience using the device. For example, a new operating system update might include a better interface, more efficient battery usage, or support for new applications

How to Decide When to Install an Update

So now that you know why updates are important, how do you decide when to install them?

If the update is a security patch, it’s generally a good idea to install it as soon as possible. These types of updates are usually critical and can help protect your device from any external threats.

If the update is a new feature, it depends on how important the new feature is to you. If it’s something that you really need or would improve your experience using the device, then it’s probably worth installing the update right away. However, if it’s something that you can live without, you may want to wait until you have some downtime to install it.

Why You Might Want to Wait to Install an Update

There are a few reasons why you might want to wait to install an update:

  • The update is a major release: Major releases often contain a lot of new features and can take up a lot of space on your device. If you don’t have enough storage or you’re in the middle of something important, you may want to wait until you have some free time to install the update.
  • You’re worried about losing data: If you’re worried about losing data or having problems with the update, you may want to wait until you have a backup or some free time to troubleshoot any potential issues.
  • You’re not ready for the new features: If you’re not ready for the new features in the update, you may want to wait until you’re more familiar with the device or you have some free time to explore the new features.

How to Set Your Update Preferences

Most devices will allow you to choose when you want to install updates. For example, you can usually set your device to automatically install updates or to prompt you before installing an update.

If you’re not sure how to set your update preferences, you can usually find the option in the settings menu on your device. Once you’ve set your preferences, your device will usually handle the rest.

Always Keep Your Devices Up-To-Date?

There’s no right or wrong answer to this question. It really depends on your personal preferences and needs. If you’re someone who values security and always wants to have the latest features, then you’ll probably want to keep your devices up-to-date.

On the other hand, if you’re someone who values stability and doesn’t mind missing out on the latest features, you may want to wait until there’s a major release or you have some free time before installing an update.

Choose what’s right for you

At the end of the day, it’s up to you to decide when to install an update. Just remember to keep security and new features in mind when making your decision. It’s also a good idea to familiarize yourself with your device’s update preferences so you can choose when and how you want to install updates.

If you have any other questions or need help setting up your updates don’t hesitate to contact us!

4 Things You Can Learn from Cybersecurity Awareness Month in October

4 Things You Can Learn from Cybersecurity Awareness Month in October

Cybersecurity isn’t just about companies preventing their networks from being breached. It’s something that everyone that uses technology needs to be mindful of. On a personal level, you can think of it as information and device security. 

Stopping hackers from getting to your personal data and keeping dangerous viruses out of your computer requires a personal level of cybersecurity. Being safe online is one part of the equation. The consequences of being lax about things like passwords and using free Wi-Fi without safeguards can be high.

Over 24 million Americans have had online accounts taken over by hackers, this includes workplace retirement apps. It’s scary to think of accounts having to do with your money being emptied by a scammer, but it happens all too often. Last year, account takeovers rose nearly 72%. 

Every October, two US government agencies promote Cybersecurity Awareness Month. The Cybersecurity and Infrastructure Security Agency (CISA) and the National Cybersecurity Alliance (NCA) provide helpful tips and resources for both consumers and businesses to raise cybersecurity awareness.

Why not take some time this October to brush up on your security hygiene? You can visit the Cybersecurity Awareness Month website to get some free resources, and below we’ll highlight four key best practices being promoted this year.

Tips to Be “Cyber Smart” and Protect Your Data

This year’s Cybersecurity Awareness Month theme is “See Yourself in Cyber” and it’s all about breaking the misconception that cybersecurity is just for companies and IT people.

The site notes that cybersecurity is really all about people adopting best practices when using computers, mobile phones, and accessing online accounts.

Here are four simple, but effective ways to improve your cyber hygiene and keep your devices and online accounts from being hacked.

Enable Multi-Factor Authentication

Multi-factor authentication (MFA) is also called two-factor authentication (2FA) and two-step verification. What it means is that there is more than one step to gain access to your account.

MFA is very, very effective at stopping scammers from breaching your online accounts, such as a bank account, Facebook account, Amazon account, and others. Microsoft, which sees about 300 million attempts by hackers to breach its cloud services each day, says that using multi-factor authentication can stop 99.9% of attempted fake sign-ins.

With MFA/2FA, you will receive an additional prompt before you can access your account. This typically will come in the form of a one-time passcode (OTP) that is sent to your mobile phone. 

Once you log in with your username and password, you will normally see a button to send the MFA code. Some systems give you a choice to send via text, email, or automated voice call. This OTP is usually about 5 or 6 digits, and you need to enter it to get access. 

How do you add MFA/2FA to an account?

  • Go to your account settings for an online account.
  • Look for an area for privacy or security.
  • If there is a search option in the settings, search on either “multi-factor, two-factor, or two-step.
  • When you find this, turn this feature on.
  • Go through the prompts to set up a phone number (or another method) to receive the one-time passcode.

Tip: Open a new browser tabs to quickly check your email for a one-time passcode, then go back to the website to enter the passcode you just received.

How and why to use browser tabs

Use Strong Passwords

The #1 cause of data breaches around the world is not some big virus or another form of malware. It’s breached passwords. Hackers are having a field day breaking into personal and business accounts by guessing, stealing, and otherwise compromising weak passwords.

Ditch those easy passwords that you find simple to remember. If they’re easy to remember, then they are easy to hack. You should use strong password best practices to create passwords.

Strong passwords look like this:

  • Have at least 10-12 characters
  • Use at least one uppercase letter
  • Use at least one symbol
  • Use at least one number

The best way to manage strong and unique passwords for every login is to use a password manager. There are both free and paid versions you can find online. Just be sure to use a reputable password management tool. I use LastPass since I can use it on multiple operating systems and devices. You can also use the password manager built into your browser or operating system as long as your devices are password protected.

Recognize Phishing 

Fake emails and text messages can trick you into giving away your login information to a website. They can also cause you to download malware. Phishing can look like a shipping notification from Amazon or an urgent notification to update your email account.

Learn how to recognize phishing so you can avoid falling into its trap. It’s also helpful to use an email system – such as Gmail – with good spam and phishing detection.

Phishing recognition tips:

  • Hover over links without clicking them to see the real URL
  • Any slight misspellings or grammar that is “off”
  • If the email is unexpected (such as a receipt for something you never bought)
  • An email address that uses the company name first, instead of after the @ symbol – for example: (name of bank)@strangedomain.com instead of contact@(name of bank).com

Update Your Software

Software often has vulnerabilities that allow hackers to exploit a device. For example, poorly written code might allow a scammer to use a loophole to take control of your computer or smartphone.

Your best defense against software and operating system vulnerabilities is to keep all software and apps on your devices updated regularly. Those updates will include the latest patches for newly found vulnerabilities that keep hackers from using them.

Get Help With Your Personal Cybersecurity

Computer Techs enjoys working with Reno area residents to improve their cyber hygiene. We can help with virus scan and removal, email filtering to reduce phishing, MFA setup, and much more.  

Contact us today with any questions or computer needs!

Taskbar Icons: What Do They Mean?

Filed under: Computing Tips,Internet Tips,Passwords - Sep 16 2022
Taskbar Icons - What Do They Mean

We’ve all seen them before: those little icons that show up in our taskbars next to the clock. They come in all sorts of shapes and colors. 

*But, what do they mean?* 

The specific icons may vary depending on your operating system of your computer, but they will usually have similar functionality.

While some of them are fairly self-explanatory, others can be a bit more confusing. Let’s take a look at what some of the most common taskbar icons mean.

Sound Icon

One of the most common taskbar icons is the sound/speaker icon. This icon indicates the status of the sound on your system. 

For example, if the speaker is crossed out, that might mean that your system’s sound is muted or disabled. 

You can usually click the icon to toggle your sound on/off or to change the system’s output to another device (for example, for switching over to some Bluetooth headphones or speakers). 

Wi-Fi / Network Icon

Another common taskbar icon is the Wi-Fi icon (or networking icon if you’re connected via ethernet cable to your router). This looks like a small dot with waves coming out of the top, forming somewhat of an upside-down triangle.

This icon lets you know if you’re connected to a network or not. 

If you’re on Wi-Fi and the icon has full bars that means you have a strong connection. If the icon is empty or grayed out, that means your connection is weak you don’t have a connection, respectively. 

When you hover your mouse over the icon, you’ll also see the name of the network you’re currently connected to.

If you’re not connected to a network, you might see “Not connected” instead.

It’s also a quick way to access the network settings, which can be useful if you need to troubleshoot a connection issue or change your Wi-Fi password.

Battery / Power Indicator Icon 

Probably one of the most important icons for laptop/mobile users will be the battery icon. This one lets you know, at a glance, how much battery life your laptop or mobile device has. 

The more full the icon, the more battery life you have. If the icon is empty, that means your battery is running low and you should plug in your laptop soon.

If you’re connected to power it will let you know your current charging status and how much time is left before your battery is fully charged. 

A picture containing text, clock

Description automatically generated

Bluetooth Icon

If you have Bluetooth turned on, you’ll see a Bluetooth icon in your taskbar. This one looks kind of like a jagged capital “B” letter.

This icon lets you know that your system is able to connect to wireless Bluetooth devices and the status of your Bluetooth connections – such as a wireless speaker/headphones, keyboard or mouse.

You can usually click on the icon to see a list of available Bluetooth devices that you can connect to. 

Airplane Mode Icon

The airplane mode icon is another common and quite useful icon. It allows you to toggle airplane mode on/off. It will look like an airplane on most devices.

Airplane mode is a setting that disables all wireless communication on your device. This includes things like Wi-Fi, Bluetooth, and cellular data. 

You’ll usually only use this icon when you’re on an airplane (hence the name) but you might also find it useful in other places where wireless communication is not allowed. 

Boost Productivity

Now that you know what some of the most common taskbar icons mean, you can start using them to your advantage. 

For example, if you’re trying to conserve battery life, you can click on the battery icon and see how much power you have left. If you’re trying to be productive and minimize distractions, you can click on the speaker icon to mute your sound.

Knowing what the taskbar icons mean can also help you troubleshoot problems. 

For example, if your sound isn’t working, you can check to see if the speaker icon is crossed out. If it is, that means your sound is muted and you can just click on the icon to unmute it.

Need Expert Computer Help?

Overall, the taskbar icons are a helpful way to see what’s going on with your computer at a glance. 

Next time you’re looking at your taskbar, take a minute to familiarize yourself with the icons and what they mean. It’ll come in handy more often than you think!

We hope this article has helped you understand what some of the more common icons on your taskbar mean. 

If you have any other questions about taskbar icons, or need computer help of any kind, don’t hesitate to contact us!

6 Tips For Organizing Your Gmail to Avoid a Bottomless Inbox

Filed under: Computing Tips - Aug 26 2022
6 Tips For Organizing Your Gmail to Avoid a Bottomless Inbox

How often have you missed out on an appointment, paying a bill, or responding to an important message because the e-mail notice got lost in your cluttered inbox?

Every day, we receive lots of e-mails, both important and unimportant, which can be overwhelming. Due to the numerous amount of e-mails, it can cause unnecessary stress, including taking up time to clear them out and differentiate between the important and unimportant.

One thing that quickly fills up e-mail inboxes is newsletters, e-mail circulars, catalogs, and event invitations. These e-mails contribute to the build-up of e-mails in your inbox.

According to Marketing Charts, 84.5% of e-mails in the inbox are promotions, while 86.8% of e-mails in the inbox are updates. Only 55.5% of e-mails in the inbox are primary e-mails. However, whatever the reason, the accumulation of all these e-mails over time if left unmanaged will cause your Gmail to be filled with a bottomless inbox of unread messages.

Especially for the elderly, it is essential to keep Gmail organized. This helps them focus on important tasks and frees up valuable time. With an organized Gmail, you will be able to get important and relevant messages and meet up with various payments and appointments.

You don’t have to dread opening your Gmail account. Here are some essential tips to help organize your Gmail.

Tips to Organize Your Gmail to Avoid Endless Inbox: Six Effective Ways

1. Create Labels

This is a great way to organize your Gmail. One of the great features of Gmail is that they use labels instead of folders. This labeling system allows you to associate e-mails with different subjects, senders, and categories. You can have labels like “Friends and family,” “Bills,” “Invites,” and more. As a result, when a mail comes in, it goes into the appropriate label, keeping your Gmail organized.

Creating the label

To create a label, one method is to click the “+” icon next to Labels in the left-hand column. Name your label such as “Travel”, “Bills”, “Appointments” or “Friends” – and give it a color if you wish.

Organize your Gmail inbox with labels

Step 1: Once you have created your label(s), you will see it in the list under the Labels section.

Step 2: To add the e-mails associated with each label, select the message and open it.

Step 3: At the top of the mail is a list of icons. Click on the label icon to add the label to the message. A drop-down label list will appear (if your label is not visible, click more), select the appropriate label, and select “Apply.” 

Step 4: Create a filter. 

  • On the right side, click on the three dots and select “Manage Inbox Setting.” 
  • Go to “Filter and Blocked Addresses.” 
  • Select “Create a new filter.”
  • Insert the “From” address. You can type the e-mail address or select it from the drop-down menu. Ignore the other fields. Once done, create a filter. Look for “Apply the label” and choose the label. Next, click “Create filter.”

2. Archive Unimportant E-mails or Ones You Don’t Need

Removing unwanted e-mails creates space. However, we often don’t delete e-mails because we might need them later. So instead of keeping and piling them stored in your inbox, you could Archive them. This doesn’t delete them; they are just removed from your inbox and stored in the “All Mail” folder. This keeps your Gmail inbox looking organized.

To archive an e-mail message in Gmail:

  • Open an e-mail, or select e-mail(s) from the list of messages.
  • Click the “Archive” button, and the message is archived.

Remember, the e-mail is not deleted. You can still see all e-mails archived in the “All Mail” folder.

3. Make Unread E-mails Important or Come First

Many e-mails are received daily, and you won’t want to miss an important mail, such as a medical appointment reminder, in your bottomless unread e-mails. You can change the settings by putting unread e-mails on top or setting it as important.

  • On the upper-right side, click on the Settings gear icon then choose the Inbox type as “Unread first”. You can also change it to “Important first”, “Starred first”, “Priority Inbox”, and others.
  • In the Inbox section, if you selected “Priority Inbox”, you can arrange the section in order of how you want the mail to appear. 
  • Scroll to the bottom and click “Save changes.”

4. Unsubscribe from newsletters and unwanted e-mails

Newsletters can be sent numerous times daily, piling up in your inbox. You can unsubscribe from the brand to stop receiving newsletters or promotional e-mails.

  • First, make sure the e-mail is from a legitimate and reputable sender. Read Why you should never unsubscribe from certain emails before continuing.
  • Look for an “unsubscribe” or “manage preferences” link in the bottom footer of the email then click it. Follow any further instructions.

5. Star important messages so they are easy to find later

Star important e-mails to make them easy to find. This works similar to the “Important” option, except this helps you focus on the more important e-mails.

Assigning stars to Gmail messages is easy:

  • Go to your inbox and select the e-mail you want to star
  • Click on the star icon. As a result, you can easily find the emails that you’ve starred in the “Starred” folder.

6. Search for e-mails and delete or archive many at once 

See Search Gmail like a pro for tips on searching and managing a group of emails.

Ready to Organize your Gmail Inbox?

If you are ready to organize and improve your Gmail’s look, Computer Techs is available to help provide extra steps for your Gmail’s organization.

For more information, contact us to schedule a consultation.

Chromebook vs. Laptop. Which Is Better?

Filed under: Computing Tips - Aug 16 2022
Chromebook vs. Laptop. Which Is Better?
  • Chromebooks offer a less-expensive alternative to a traditional laptop, however they offer less features and flexibility.
  • Many things we do on a computer these days can be done in a web-browser – from email, messaging and conferencing, listening to music, watching video, word processing and spreadsheets, and of course everyday reading and web browsing.
  • If you can imagine using just a Google Chrome browser for all of your computing needs, then a Chromebook may be right for you.

On the surface, laptops and Chromebooks have the same build and element; however, one has to be better than the other for your needs.

Laptops have existed for years, a portable version of the desktop computer with the screen, keyboard, pointer, storage and “smarts” all-in-one device.. Chromebooks are a new breed that is different from regular laptops. They are budget-friendly and are sometimes faster. Though they are inexpensive, they are not for everyone.

The main thing to note when comparing a Chromebook to a laptop is their differences. Aside from the price, the main difference is the operating system. Chromebooks, running the ChromeOS operating system, can do the things laptops do, such as listening to music, streaming and watching videos, editing pictures, and more.

This, however, does not bring down the value of laptops. If you want to know which is better between Chromebooks and laptops, continue reading this article for a detailed breakdown.

What is a Chromebook?

Chromebooks are relatively new products to the mobile computer category. Chromebooks are technically laptops but look like notebooks from the outside. They are lightweight computers that run on the Linux-based Google Chrome OS, with the Chrome browser as its main interface. 

Thanks to their simplified design and ease of use, Chromebooks are a prevalent choice, especially in the education sector. They are meant for browsing and light work, making them perfect for studying and researching. 

According to a study, the sales of Chromebooks dropped 67% in the first quarter of 2022. However, Chromebook is still making an impact as people tend to buy more for educational purposes.

Chromebook relies on Google apps and cloud services to function because they don’t require a lot of RAM or heavy processing power. It has everything from a music and video player to word processing. It can sync with your Android devices and is updated automatically. Therefore, it goes without saying that a Chromebook can do most of the things a laptop can do.

Although Chromebooks can’t replace feature-rich laptops, they are for people on a budget and are worth every penny.

What is a laptop?

Laptops, as previously stated, are the ‘Undisputed Kings of Mobile Computers.’ They have the abilities of a desktop computer but are mobile and easy to use. 

Unlike Chromebooks that run on the Chrome OS, laptops run on Windows OS and macOS and are more well-rounded. They have more resources and require powerful components to work effectively.

Laptops were built to consume less power and are equipped with lots of RAM and heavy processing power to handle tasks effortlessly. They are used by anyone in various industrial, commercial, and even educational sectors. Due to their powerful OS, they can work with demanding software.

You can compare laptops to jack-of-trades; however, they are expensive.

Differences Between Chromebook and Laptop: Which is Better?

Operating System

There are three main competing operating systems for laptops: Windows OS (10, 11, or others), OS X for MacBook, and Linux. On the other hand, the operating system for Chromebook is ChromeOS.

The ChromeOS is a Google-developed OS and is similar and feels instantly familiar to the Google Chrome browser. Due to its smaller OS, it tends to load faster. In contrast, Windows 10, by far, has a large OS. This can be a blessing and a curse. Because laptops have a more extensive OS, they are more flexible and can run complex tasks and programs. However, it’s heavy, tends to load slowly, and requires regular updates.

Storage Capacity

Laptops come in various types of storage configurations. They have SSD, HDD, 3TB hard drive, and more storage capacities. There are laptops available for your specific storage; either you want an operating system on an SSD or games/movies on an HDD. The storage capacity of laptops includes 256GB, 512GB, 1TB, and more.

In contrast, Chromebooks only have an SSD storage capacity with onboard storage of 32GB or 64GB. As compensation, Chromebook has a cloud storage capacity of 100GB.

You should go for a laptop if you don’t want to store your data in the cloud.

Performance

Performance is comparative. A machine’s performance is influenced by its specs, workload, and other factors. Based on specs, a Chromebook outperforms the laptop.

However, if what you want is a great performance, you won’t get it in a Chromebook. Laptops have all the necessary power to perform and run anything thrown at them. Also, they are compatible with demanding software.

Battery life

In terms of battery life, Chromebooks have a battery life of about 10-12 hours. In contrast, laptops have a battery life of about 8 to 10 hours.

In laptops, the battery’s energy is mainly consumed from their processor, graphics card, and performance demands. However, because Chromebooks mostly rely on the internet, they do not require powerful processors or graphics cards, which results in lower battery use.

As a result, the life of the battery is dependent on the Chromebook or laptop’s performance.

Price

Without a doubt, Chromebooks are more budget-friendly than laptops. Due to the hardware specs and the OS on laptops, they are more expensive. In contrast, because Chromebooks have minimal hardware specs and rely on the internet, they are more affordable.

Portability

When it comes to portability, Chromebooks have the upper hand. They are thin, lightweight, and have minimal hardware. In contrast, laptops come in various sizes, weights, and dimensions. Some laptops are light and thin, and some are heavy.

As a result, Chromebooks are more portable than laptops.

Offline Capabilities

Laptops are in the lead with their great offline capabilities. Without using the internet, you can utilize various software, do work or academic activities, play games, and perform multiple other tasks.

In contrast, Chromebooks have limited offline capabilities and require a constant internet connection to function properly.

Which is better? Laptops or Chromebooks?

It appears that the choice between Chromebooks and laptops will ultimately come down to personal preference.

Knowing what you’ll use your Chromebook or laptop for most of the time is the only way to determine if it’s the best choice for you. A Chromebook is the best option if all you need is to go online, open websites, and type away at will.

But investing your money in a laptop might be better if you require greater flexibility.

Contact us at Computer Techs if you find it difficult to decide between a laptop or a Chromebook.

Is Zelle Safe? How To Protect Yourself When Using Payment Apps

Filed under: Computing Tips,Passwords,Scams,Security - Jun 24 2022
Is Zelle Safe? How To Protect Yourself When Using Payment Apps

Payment apps like Zelle and Venmo are a customer favorite because they are a convenient, fast, and easy way of electronically exchanging money between others. Zelle’s popularity and quick exchange of funds between one bank and another attracts more than just new customers. Unfortunately, it attracts hackers and scammers too.

With so many headlines about Zelle scams on the news lately, many users can’t help but wonder about the platform’s safety. Scammers target Zelle users and siphon off their hard-earned money through phishing scams. The truth is, Zelle is safe as long as you are careful, and you pay attention. 

By the time you’re done reading this article, you’ll know more about Zelle and how you can safely use the platform without falling victim to scammers

What exactly is Zelle?

Zelle is a popular payment application operating a peer-to-peer (P2P) model. It makes it easy for users to move money and pay for things without going to the bank or handling cash. Zelle is the joint effort of several major banks in the US. It’s easy to use through an iPhone and Android app. Zelle also integrates with the mobile app of major banks such as Bank of America, Wells Fargo and Chase.

How does the Zelle scam work?

Zelle scams are mainly social engineering scams. Social engineering is manipulating or influencing people using scare tactics or fraudulent information. Scammers trick consumers into unintentionally authorizing money transfers by making fraudulent claims and promises.

One of the most common Zelle scams involves sending a text message or an email requesting confirmation for what ends up being a fake payment. Most users often respond to try and disprove the transaction. Instead of putting the scammers off, it opens the door for further communication. The scammers then call the user pretending to be from the user’s bank and pretend to give the user instructions that’ll reverse the claim. In reality, the money ends up in the scammer’s account.

Safety precautions when using Zelle

While the news may sound scary, most Zelle scams are social engineering. As long as you heed the precautions below, you should be relatively safe. 

Only use Zelle for people or businesses you trust

P2P payments should not be used to send money to anyone you don’t know and should rarely be used for online purchases. Only use Zelle to send money to your family and friends if possible. Verify that the phone number, email, and recipient’s name are all correct. 

Ignore unsolicited emails and text messages

Your bank will rarely contact you unsolicited. If you received a message from any party posing as a banking representative when you haven’t contacted them, ignore it. Reach out to your bank directly and ask them to check your account for any suspicious activity.

 If you gave out your personal details before you noticed anything, that is, you fell for the phishing scam, call your bank so they can help you secure the account. 

Use two-factor authentication (2FA)

Two-factor, two-step, or multi-factor authentication is a security process that helps secure your accounts by asking users to verify their identity using two different authentication factors. When you authorize 2FA, you’ll need to input a one-time password (OTP) anytime you sign in to your account. You should never share your OTP with anyone, no matter how insistent they appear. Criminals posing as your bank may demand your passcode for various reasons, but no legitimate bank will ever ask for it.

Don’t get pressured by urgent or immediate payments

If you observe any suspicious behavior from someone claiming to be a representative of your bank, a utility, or another institution demanding quick payment, it’s likely a scam. End the call and reach out to the business through official channels.

Scammers also send payment requests from businesses, banks, and utilities you don’t pay with Zelle to trip you up. Confirm from the organization’s official channels that the request is legitimate before paying. 

Be cautious of anyone insisting on using only Zelle

Anyone who insists on transacting only through Zelle should send warning bells to your mind. If they say the only payment option they can accept is Zelle, then make sure the transaction and the individual are genuine before sending any money. 

Don’t send money to yourself

Scammers may try to get you to authorize a reversal by claiming that a payment failed to go through or that your account has been compromised. Remember that banks won’t reach out to you unless you contact them first. 

We’re Here to Help Keep Your Tech Safe

Need more information on staying safe while using online apps? Then visit Computer Techs. Schedule an appointment by calling 775-624-6888

« Previous PageNext Page »