Summer Guide to Cyber Safety

Summer Guide to Cyber Safety

The summertime is here in full force – tourists, vacations, travel for fun and business. Most of us will hit the road sometime this summer.  With all the devices that travel with us to stay connected from laptops to iPads to SmartPhones, we are more than ever at risk to a security breach. Some of this risk is harmless and others will cause you to need serious computer repair. Hackers love to take advantage of unaware travelers and we need to stay sharp.  Keep in mind that hotels, airports and other WIFI networks are hostile territory and we need to have our defenses up for cyber safety. Here are a few tips from Myrtle Beach Computer Repair Common Sense Check – you have all heard the saying “If it looks to be good to be true, it probably isn’t true.”  This philosophy holds true in the cyber world as well as in the real world.  If your summer vacation to Washington DC offers a personal meeting with the president, chances are it won’t happen.  Do your homework on any offer and make sure that the company that stands behind the offer has a good reputation.  Look for any hidden charges or requests for information that is not necessary for the transaction.  Check with the International Air Transportation Association or the Better Business Bureau to ensure cyber safety. Unbelievable Coupon Deals – there are reputable social media sites such as Groupon or Living Social that offer great deals.  However, many sites have taken on the “look and feel” of a legitimate site and are there to simply scam you, install...
What Is Phishing And How To Protect Your Computer

What Is Phishing And How To Protect Your Computer

The best holiday gift we can give is to always make sure that your computer is fully backed up.  No matter how cautious you are online, you are still open to a cyber security threat.  Call us today and ask about our backup plans. Phishing attacks are also rampant and one of the major cyber threats to any company today. So, you need to be highly aware and vigilant of these as well. Phishing usually involves hackers making use of fake emails to trick you into sharing important personal data such as your social security number or perhaps your credit card number and online accounts and passwords. What are the ways that these Phishers can attack you in the cyber space? Through the use of fake emails. Phishers can make use of the identity of established and reputable companies such as online banks, retailers or credit card companies to send out fake emails to individuals and organizations. Emails of this nature usually contain links that are fake but highly similar to the actual online website of that company they are representing. The moment you put in your account information and log ins to those websites, the information can already become available to the phishers who tricked you into sharing your important data. Through the so-called keystroke programs. Phishers will still employ fake emails that contain links that will then install programs on your computer without your knowledge and permission. These programs have the ability to record every keystroke typed by the computer owner. Information like usernames, passwords, account numbers, credit card numbers could then become available to phishers. Hijacking...
Security and Your Computer

Security and Your Computer

Whether you are a business owner or a home user, computers have found their way into every aspect of our daily lives. We use them to store data, do homework, for online shopping and sometimes tools for our jobs.  The amount of data, photos and videos that are stored on our computers grows daily.  Many of these items are one of a kind and can never be replaced.  We need to protect ourselves from loss of the valuable information. Most businesses have systems to secure their data from hackers.  Home computer users need to do the same.  Think of the information that may be on your computer – credit card numbers, social security numbers and other personal data is stored on your computer.  Everyone is a computer security risk. When a computer is intentionally “broken into”, this is called cybercrime.  Agencies such as the FBI watch for this type of crime and unethical computer activity such as cracking, hacking and cyber extortion. Types of Computer Villains There was a period in time when hacking had a positive connotation.  However, since the onset of computer crimes, hacking has become a crime that is closely watched.  A hacker is an individual whose goal is to gain access to your computer or computer network illegally.  Their primary purpose is to obtain personal information which they can use or sell on the internet.  Many hackers use the excuse they are doing the system administrator a favor by showing them where there are deficiencies in their computer security. Give PcRx a call if you suspect your computer has been hacked. We can help you...
The What, Who, Where and Why of Spam

The What, Who, Where and Why of Spam

Spam – Can You Avoid It? If you have been watching our Facebook page, you know that we have been trying to keep you posted on spam emails that are harmful to your computer. At one time, spam was nothing more than clutter in your inbox, however, now it is commonly used as a way to commit electronic crime and even corporate espionage.  We have develop the 4 Ws of spam to answer the questions we get asked most often. What is Spam? Often referred to as junk email, it is defined by internet fraud detectors as unsolicited commercial email.  This is email that is sent out in bulk to a vast number of people who never requested email from the sender.  These emails can range from simple advertisements to a program that is designed to hijack your system and to cause damage to your computer. Some of the most common spam commercial advertisers are for: Pyramid schemes Pornographic websites Mortgage loans Chain letters Credit repair Fraudulent pharmaceuticals Software that has been stolen or pirated The more dangerous forms of spam include viruses that will infect your computer, what is called a Trojan horse than will take over your email program and then proceed to send spam to your friends and phishing scams whose intent is to obtain financial and personal information. Who Spams? People responsible for spam are referred to as “Spammers.”  There are actually two types of spammers. Honest spammers – these are people who have complied with all anti-spam laws and actually have the consent of the recipient to receive the email. These are businesses who...
Are You Taking Your Computer Security Seriously

Are You Taking Your Computer Security Seriously

With all that is going on in the world, it seems that as time goes by we become more and more complacent.  An orange alert doesn’t mean much to us anymore.  This same complacency often applies to our computer security.  It isn’t until something happens that we wish we had taken the recommended precautions. Exactly what are we referring to when we talk about computer security?  The primary purpose of computer security is to protect your information and computer property from not only theft but also from natural disaster such as a power outage and from corruption.  At the same time, you still need for the information to remain accessible to you and others to whom you grant access.  In other words, you want to make sure that valuable or sensitive information is kept secure and safe and that the bad guys are kept out. With today’s technology, computer security is affordable and there is really no excuse for not taking the necessary precautions.  We have mentioned VIPRE in previous posts and their home license allows you to protect your home computer, laptop and iPad for one low annual fee. Here are 7 simple tips on computer security Make sure that you keep your anti-virus and firewall up to date.  There are over 70,000 new software applications being developed every day and many of these are malicious invaders that are just waiting to attack your computer.  Check with your local computer dealer on how to ensure that your spyware is current. Don’t forget to install your patches.  When you start your computer, you will receive a pop up on...
Email Account Hacked? Follow These Computer Help Tips

Email Account Hacked? Follow These Computer Help Tips

One of the many reasons why computer users call for professional computer help is because their email accounts get hacked. Emails are one of the easiest programs to get hacked, especially if you use only one email account for everything that you do online. Remember that you need an email account to register in most online programs and software. If you use only one email address, you’ll most likely get spam messages and eventually you’re email address will be at risk of getting hacked.And the last thing any of us wants is a hacked email account! In fact, most people consider this the worst thing that could happen because there are lots of important files and information that the hacker could get access to when your emails get hacked. There are some preventive measures that you can do to avoid being hacked. But of course, these viruses and hackers continuously evolve and get smarter and are able to work around your security measures. This is why it is also important for you to learn about what you can do to remediate the situation should it happen to you. Professional computer help tips for hacked email accounts Change your password immediately If you notice your email account has been hacked, log into your account immediately and change your password. Remember to keep your new password long with a mixture of upper and lower case letters, numbers, punctuation marks, and symbols. Try not to use real words or names. The more complex the password is the more difficult it will be for the hackers to access your email account. Check all...