Meet our Director of First Impressions, Jay Clements

Syndacor-TechPros-Creativetopia-Jay-Clements-Franklin-TN

Director of First Impression, Jay Clements

Jay is the newest edition to the TechPros family. He grew up right here in Franklin, so he feels right at home in our office on Church St. As the Director of First Impressions, Jay is responsible for running the front-end of our office. He keeps our retail area neat and organized, answers a majority of phone calls, and checks in new systems to be serviced in our shop. If you walk into our office, chances are that Jay’s smiling face will be the first thing you see.

Although Jay is new to the IT field, he is always eager to learn something new from our technicians. He’s also willing to pick up odd jobs, where needed, to improve the overall appearance of our office. From cleaning up systems to updating our social media pages, Jay works to increase customer satisfaction and strives to provide an exceptional customer experience for everyone.

Jay’s interest in computers started when he was in middle school. He would often play strategy games on his family’s first home computer which was a Windows 98 Gateway PC. Since high school, Jay has been an Apple user, but his coworkers are slowly convincing him of the benefits of owning a PC. Jay is learning more and more each day from his co workers, and can’t wait to further his knowledge of the IT field.

3 Fun Facts about Jay

  1. Favorite Food: Texas Style Brisket (Dry Rubbed and Smoked)
  2. Favorite Thing to Do: Rock Climbing
  3. Favorite Band: The Beatles

If you are having any issues with your computer, we encourage you to come into our office located at 601 Church St to pay Jay a visit. He, and the rest of our team, will do our absolute best to assist you. If you have any questions, please feel free to call us at 615-595-6399 or email us.

TechPros Tips & Tricks for Windows 10

Getting the Most out of Your Windows 10 Experience

TechPros Tips & Tricks for Windows 10

TechPros Tips & Tricks for Windows 10

Windows 10 is arguably the best Windows operating system to be released thus far. It is fast, user friendly, and contains many new features that can improve your overall experience. Below are a few tips and tricks to help Windows 10 users get the most out of their experience.

  1. Rather than upgrading to Windows 10, we recommend bringing your PC into TechPros for a clean installation. This helps to minimize any issues with drivers, programs, etc.
  2. You don’t have to create a Microsoft account to use Windows 10.
    • Microsoft tries to steer you toward creating a Microsoft account online. While there are some benefits to using a Microsoft account with Windows 10, it is not necessary to have an account in order to use it.
    • If you do decide to use a Microsoft account with Windows 10, it should be for your own personal use, not for use with a business.
    • For a guide on how to create a local account go to this link.
  3. Snap Assist
    • Snapping initially started back with Windows 7, but there are new snapping features available with Windows 10.
    • In order to snap a window, all you need to do is left click and hold your mouse on the window, and then drag the window to the left or right of your screen. Once you’ve dragged the window, a transparent overlay will show you where your window will be placed on the screen. Then simply release your hold on the mouse button for the window to take this position.
    • For further snap assist information visit this link.
  4. Helpful Keyboard Shortcuts:
    • Press and hold the Windows key + X to bring up the Quick Link menu
    • Press and hold the Windows key + left arrow key or right arrow key to snap a window to the left or right.
    • Press and hold the Windows key + up arrow key or down arrow key to maximize or minimize a window.
    • Press and hold the Windows key + L to lock the computer. If you have a password, it would be required to unlock it.
    • Windows 10 still has all the old keyboard shortcuts as well. If you need a refresher, feel free to visit Microsoft’s website for a list of these shortcuts.
  5. Printer management has changed.
    • To manage a printer or a scanner, simply go to the Start Menu and click on Settings. Once in the Settings menu, click on Devices. Printers & Scanners should be the first sub menu. Scroll down past your available printers and scanners to toggle default printer controls as well as downloading software over metered Internet connections.
  6.  Making Windows 10 feel more like Windows 7
    • Some Windows users that are more familiar with Windows 7, may desire to make their desktop more like the older operating system. Here are a few tips to make Windows 10 feel a bit more like Windows 7.
    • Right click on the desktop → Select Personalize → Set Background and Lockscreen as TechPros wallpaper → in Colors tab, turn on “Automatically pick color from background” → in Start tab, turn off “Show recently added apps” → click on the link below to choose which folders appear on the start menu → turn on the following: File Explorer, Settings, Documents, Pictures, Videos, Music
    • Open File Explorer → right click on “Quick Access” → change the Open File Explorer to: dropdown to This PC → Uncheck the two checked boxes under the Privacy section.

With these tips and tricks in mind, Windows 10 should be much easier to use. If you are a new Windows 10 user and you need some additional help adjusting to your new operating system, or if you would like to have us perform a clean installation of Windows 10, feel free to email us at support@tech-pros.com or call us at 615-595-6399.

 

protecting computer malware nashville virus cleanup

Protecting Your Computer from Malware

protecting computer malware nashville virus cleanup

protecting computer malware nashville virus cleanup

Protecting your computer from malware and dealing with an infected computer can be one of the most frustrating problems that computer users face. Not only can malware(viruses) keep your computer from running properly, it can also jeopardize the security of your personal information. As a result, it is important for computer users to know how their computers can get infected in the first place, as well as how to prevent any malware from infecting their computers.

Click After Reading

One of the most common ways that a computer can become infected is when a computer user accepts a message that appears on their screen before they even read what it says. For example:

  • An Internet advertisement or window pops up and tells you that your computer requires a specific plug-in or that your computer is already infected with malware. By downloading the plug-in or accepting the message without fully understanding what is happening, you may have unknowingly subjected your computer to infection.
  • When updating or installing a computer program, you may be prompted to install additional programs that you do not need or that could monitor your use of the original program. These additional programs could cause significant problems for your computer and could even subject it to infection.

Downloading Infected Software

Another common way that a computer can become infected is when a computer user downloads software programs from the Internet. It is important to make sure that the software you are downloading is coming from a reliable source.

  • Java is a prime example of a program that can cause an infection if it is not downloaded correctly. If you are in an Internet browser and a message appears prompting you to update Java from within the browser, then it is likely an unreliable download. If a new version of Java is ready to be upgraded, then your computer will prompt you from the desktop, not from the browser.

Opening Unexpected Emails

Unexpected emails are yet another way that your computer can contract an infection. Use caution when downloading attachments or opening links from emails as they may contain malware. Strange emails that prompt users to input log-in information are another problem. While you are not necessarily downloading a virus by entering your information, you may be unknowingly giving someone access to your personal information.

Pirating

The unlawful exchange of copyrighted movies, software, or music is not only illegal, but it is also a very easy way to get your computer infected. Many of the files and programs that are available for download on these torrenting sites also include additional files that could contain malware that could lead to an infection in your computer.

Using Antivirus Software and Keeping it Updated

The most effective way to prevent your computer from getting infected is to ensure that it has a reliable Antivirus Software program installed and that it is up to date. Utilising this software keeps your computer running well and it provides protection against any potential malware or other malicious software. Microsoft Security Essentials and Windows Defender are two of the best antivirus software programs on the market today for your PC.

Microsoft Security Essentials covers computers using older Windows operating systems like Windows 7 and Windows Vista. It will provide routine system scanning and cleaning both on and offline. It also provides real-time protection against spyware, viruses, rootkits, and other malicious software.

Windows Defender does much of the same thing that Microsoft Security Essentials does, but it covers newer Windows operating systems such as Windows 8, Windows RT, and Windows 10.

No computer user wants to have to deal with a computer that has been infected with malware, but now that we know more about how computers can get infected, it should be much easier to prevent that from happening. As long as you are cautious and have a good antivirus software program installed, your computer should be protected. If any issues arise with your computer regarding a malware infection, feel free to give us a call at 615-595-6399 or email us at support@tech-pros.com.

bank wire transfer scam

Bank Wire Transfer Scam

bank wire transfer scam

bank wire transfer scam

Being in the technology business has its fair share of benefits and troubles. Over the past couple of months, we have experienced an alarming scam that we wanted our loyal customers to be aware of.

We are calling this scam BANK WIRE TRANSFER SCAM, and here is the information that we’ve gathered on this attack.

Overview: The goal of the Bank Wire Transfer Scam.

The primary purpose of this scam is to attempt a wire transfer via email from the victim’s (your) bank account to the hacker’s bank account. Unfortunately, we have seen the hackers be successful.

Here is how they do it…

newsletter-techpros-bank-wire-scam-email

#1 Suspicious Email

This is an example of an email that appeared to be from a familiar sender but it was a spoofed email that contained the entryway for the hacker to gain access to the victim’s email account.

If the blue “Click Document” button was clicked, it took the user to a screen that appeared to be a Google login screen (but it was not.) When the email address and password was entered, the hacker captured the information.

newsletter-techpros-bank-wire-scam-activity1

#2 Hacker Adapting

The next step for the hacker is to take several minutes or hours to learn about the victim. To do this, they search emails, read emails and understand who the bank is, whom the victim communicated with from their team, and how they worded emails.

newsletter-techpros-bank-wire-scam-filters

#3 Create Filters & Send Email

After the hacker knows how the victim operates and communicates with their bank, they setup filters to discard (or trash) all emails that may thwart their plans. Then, they send an email to the victim’s bank contact requesting the wire transfer. The bank would typically respond via email to confirm the request (although the victim would not get this email since the filter was put in place.)

Tips on how to prevent a breach (or attack)…

  • Call your bank and make sure you have voice authorization required for bank wires.
  • Do not type in your email username and address into a screen that you are unfamiliar with.
  • Hover over the button or link to detect the actual URL that it is directing too. If it looks fishy, do not click it.
  • If the email appears strange and it is from a user or email address of a person that you know, call them and confirm they sent it.
  • See if your email provider offers 2-Step authentication to prevent unauthorized access.
  • Check your email filters if you suspect unauthorized access.
  • Check your email security settings to make sure you are the only person logging into your email account.
  • Tell your friends and family! Education is the most important tool. Share this newsletter and make sure they sign up for our newsletter here: Click to signup!
  • Call us, we are always here to help!

Call us for assistance with safeguarding tips!
(615) 656-3307
-or-
Click here to contact us!

Online Tracking

Deter your security concerns with cookie control

cookiecontrol

Most computer users have some general knowledge as to what cookies are, and we don’t mean the kind your grandma makes. We are talking about the online tracking every time you visit websites. Learning a little more about a cookie can help you control your privacy easily.  Basically, a cookie is a note passed back and forth from web servers to web browsers. When you visit a website, the browser will send a cookie that has information about your visit to the server.  It can also contain information about you, such as the voluntary information you enter onto their website.

Cookies are used to monitor website activity. Most servers use them to either track which websites receive the most attention or record personal information that a user inputs onto their site so that they can create customization for them.  Cookies are only visible to the site that creates them, which means others cannot see your information. A server does not have access to your computer if you accept a cookie from them, nor are they a means to carry a virus. Some cookies are automatically erased once you leave the website. These are called session or transient cookies.

Regular cookies may be innocent, however there are some cookies out there that are not. The ones that pose a threat to your privacy are called Malicious Cookies, also known as Tracking Cookies. They monitor your online search habits for a period of time to provide advertisers information about weather you are their target audience. Most antivirus software can prevent malicious cookies.

Your computer allows you the tools to control cookies for your own privacy reasons. Under your settings, you can enable them or control how long they may be used. Some may consider simply blocking all cookies, however surfing may be a tad more difficult.  Sites you frequently visit will not remember you or your preferences. Most cookies are harmless and even convenient, and if you keep your antivirus software current, you should rarely worry about the bad ones.

Create Strong Passwords

Protect your online activity and information

password

Everyone prefers top-notch security for their homes and vehicles, but what about their online accounts? It is unfortunate to say that most people prefer a convenient password instead of a strong one. Quality always works best, which means you need a strong password. A password is basically the lock to your online door, so you want it to be extremely difficult to break into, especially since cyber crimes are becoming more common than burglaries. So, what makes a password strong or weak?

Qualities of a strong password:

  • It is over 7 characters
  • It does not have your name, username, or brand
  • It does not have a complete word or phrase
  • It is not the same as your other passwords
  • It has at least one capital letter (A, B, C, etc.)
  • It has at least one lower case letter (a, b, c, etc.)
  • It has at least one number (1, 2, 3, etc.)
  • It has at least one symbol (!, @, $, etc.)

Even if your password has all these qualities, it could still be weak. Use acronyms of words instead of using full words or deliberately misspell the word. In order to remember your password more easily, try and choose something related to your personal life. If you write it down in case you forget it, don’t label it.  It is also important to keep it hidden in a private place.

Avoid passwords that have these:

  • It has the same letter used over and over (ex. Aaaaaa}
  • It has letters or numbers in sequential order (ex. 123abc)
  • It has the word “password” in it
  • It has the phrase “iloveyou” in it
  • It is exactly the same or similar to other passwords you have

It was reported recently that “123456” was the number one most used password among the users that were hacked on October 4th. Almost 2 million Adobe users had that password. If you recognize that your favorite password has any qualities like this, consider changing it. For more information about Adobe’s recent breach and why it is important to create strong passwords, click here- http://www.businessinsider.com/the-worst-passwords-to-use-2013-12

Traveling with Technology

Stay savvy, stay safe

travelsavvy

When you are traveling this summer, consider a few safety precautions for your electronics to be a necessity. There are the basic rules for safe traveling with technology, and then there are a few that you may not have been aware of. These precautions are not strenuous, and they can save loads of potential trouble in the future.

 The basics:

Before leaving, make sure you have all the correct cords and accessories you need then store them in luggage that will protect them from water and denting.  Travelers should always remember not to leave them in places where they can be stolen. Make sure your electronics are locked up in your hotel room or car if you are away from them. Also, your devices are more likely to get knocked around or dropped while your traveling, so put a protective case on them. One more basic precaution that you should follow no matter what is back up your data. Make sure you have any important information stored somewhere else just in case your technology does get damaged, lost, or stolen.

Now that we have covered the basics, here are a few extra habits that travelers need to know:

First, familiarize yourself with your mobile’s roaming and data charges, especially if you are going to be away for a long period of time. There are ways to minimize costs, such as setting a limit to your data usage or turning it off. You can contact your mobile provider for further information.

If you need a laptop during your travels, it is best to bring one with no PII (personally identifiable information) on it. There are places that rent out laptops specifically for this reason, but if you prefer to bring your own, you can encrypt it. However, if you are traveling out of the U.S, research the policies of bringing encrypted information into a country. Some areas heavily regulate or restrict encrypted laptops.

Setting a strong password is a great rule for any device as well as ensuring any anti-virus software is up to date. There is also software you can download to track devices that have been stolen or lost. ­

Beware of Free Public Wi-Fi

Protect yourself when delving into the free Wi-Fi networks

beware-free-wifi-2

Public Wi-Fi exists in most of our stores, libraries, coffee shops, airports, and public transportation areas that we visit daily. Since the general public has access to this convenience from day to day, then so do criminals. If you decide to use public Wi-Fi, keep your guard up at all times. The main rule to beware of free public Wi-Fi networks is to never make financial transactions, use credit cards, or shop at all. Online shoppers in public networks are easy targets for hackers.

Kevin Clark, an expert in cybercrime has said, “Public Wi-Fi is inherently unsecure. Anyone using it ought to do so with the premise that everything you do is visible to a third-party stranger with access to that hot spot…the chances of you being hacked far exceeds the chances of your home being burglarized. This is a big business.”

If you have the option, choose the Wi-Fi that is at least protected by a password. The most dangerous Wi-Fi is the open to all, no password needed, networks. However, they are so attractive for their convenience. Awareness is the key to preventing attacks and theft on your computer.

To become more aware of such crimes,

Cyber Attacks Are More Common Than You May Think

Cyber Attacks Are More Common Than You May Think

Target is not the only one

Cyber Attacks Are More Common Than You May Think

Cyber Attacks Are More Common Than You May Think

During the latest shopping season, over 70 million customers’ information had been stolen when Target’s online security was invaded. This identity theft included names, mailing addresses, phone numbers, email addresses and credit card information. Over the years, retailers have taken measures to make cyber crimes more difficult, but some still manage to slip through the cracks by using malware, also known as a RAM scraper. Criminals use this to catch encrypted data when it travels through a live memory feed in a computer. This information just goes to show that cyber attacks are more common than you may think, but rarely publicized.

Most retailers attempt to keep breaches in cyber security secret because they are afraid it will hurt their business. Neiman Marcus, J.C Penney, and Nissan have also been victims of hackers while others try their best to remain unknown.

Shawn Henry, F.B.I.’s top former cyber police officer has stated, “There are two types of companies: companies that have been breached and companies that don’t know they’ve been breached…I’ve seen behind the curtain. I’ve been in all the briefings. I can’t go into the particulars because it’s classified, but the vast majority of companies have been breached.”

To learn more about what cyber experts have to say about situations such as this, visit

Computer Viruses

What do they do and why

virusestoo

Unfortunately, computers can get viruses much in the same way that humans do. Everyone does their best to prevent catching colds by staying healthy and clean. Our electronics need a similar kind of attention to avoid a computer virus. Even though a Mac is less likely to fall victim from a virus than a Windows PC,  they are not bullet proof from them either. Therefore, weather you own a PC or a Mac, learning what a virus does is beneficial to taking care of your investments.

Computers are susceptible to different viruses just the way humans are susceptible to different viruses.

The three most common computer viruses

Trojans
Earning its name from the famous Greek story, it firstly appears as a safe file that you have in your computer. Then it releases code that has the ability to destroy your computer from the inside by deleting data, blocking data, modifying data, copying data, and disrupting the computer’s functions.

Backdoors

This is a form of malware that goes around your computer’s defensive line by unlocking the backdoor and creating a hole in the software. Backdoors can be combined with Trojans, which creates twice the mayhem. Hackers control this malware more closely, which is worse for you. They have all the ability a Trojan has, plus the ability to send and receive files.

Rootkits
This virus has been considered some of the worst to extract. Hence its name, it conceals itself deep into the computer where they can’t be detected easily. Rootkits have the ability to copy, hide, and restart itself even after you have stopped it. This makes them difficult to locate and fight off because they can retaliate over and over.

A virus can appear in the form of anything, which makes it important to keep your antivirus software current. Hackers create these viruses because they can attain information, which can lead to access to all of your personal accounts. Most people do not realize when they have a virus and when they finally find out its too late. If you are concerned that you may have a virus or need to update your software, feel free to give TechPros a call.