Every day it seems like there’s another new threat to be wary of. A company’s email lands in your inbox informing you that their servers have been breached and your data, in one form or another, has been accessed. Some offer reassurance that the stolen data was encrypted or incomplete, that no financial data was in danger, or if the breach was extensive, they might promise you a free period of credit monitoring to thwart any legal action, should some trouble arise.
If this sounds familiar, it’s only the tip of the iceberg, so to speak. Leaks happen to large companies, and it does signify that the need for greater security exists, but people can do a lot at all levels to prevent those who mean harm.
Take the recent EquiFax data breach, which was confirmed to be caused because an employee neglected to update security software and patch a known security hole. Two months later, still without an update, over 145 million customers’ data was stolen.
If you use a reliable antivirus and anti-malware program, then keeping it updated keeps you ahead of the curve. The key is to use reliable software. Safety and vigilance need to start with some basic prevention. If you use your devices in public, invest in privacy screens. Even make sure there’s no one looking over your shoulder. In many cases, passwords or codes are intercepted. Yet, beyond these basics, it’s important to keep updated reliable protection. Despite what some believe, malware can make its way onto tablets, and mobile phones in addition to both PC and Mac computers. Some basic prevention and maintaining vigilance can help prevent trouble.
Yet if you need advice on reliable software or want to set up a regular maintenance schedule, companies like ours, PCMac Express, should be part of your team. We have cleaned malware from many customers’ systems, as well as helped them once their computers were compromised. We’ve helped defeat ransomware and related scams, and left customers’ computers secured and ready for use again.
The recent Equifax security breach has been making headlines due to the scope and potential consequences of leaked data of 145.5 million affected people. Yet, your company can learn a lesson from this recent catastrophe. One of the early finds regarding the Equifax situation was that it was caused, in large part, by someone in the company failing to patch a bug in software that sat there, waiting to be exploited, for two months. If you run a business with sensitive consumer data, you should learn a lesson from this incident.
You, as a business owner, may not be dealing with 145 million customer accounts, but you, like us, rely upon keeping your customers’ information secure and private. This is why you need the peace of mind of regular maintenance.
Keep Your Systems Updated:
Equifax admitted its lack of security updates left a wide open hole for information to be stolen. “Upon discovering a vulnerability in the Apache Struts web application framework as the initial attack vector, Equifax patched the affected web application before bringing it back online,” read a statement. However, the vulnerability was discovered in March, and Equifax’ systems were breached in May.
For a small business, be sure to keep your operating system up to date. If you’re running Windows, be sure to keep the version up to date as well. Microsoft has ended support for Windows Vista and earlier, with only limited support for Windows 7, which is incompatible with some modern chips and software. If you are able to, moving to Windows 10 will keep things completely up to date and at the same pace across all of your machines.
If you run a Mac, you too should keep your systems updated as, despite clichés, Macs are not insulated from vulnerabilities.
Keep Strong Security:
In addition to keeping things up to date, it’s important to keep running strong security applications. We help our customers navigate through the options out there. Some sound too good to be true, and often are. Still, some, like CCleaner, that we do continue to recommend, have also been subject to exploits just this year. It makes the case that having strong security and protections on multiple levels is important.
Keep Regular Backups:
Should your system or protections come under threat, it is vital to keep regular backups of your valuable data. We can help you set up backups and choose which backup options fit your needs and budget. There are varieties within types of backup options and differences between PC and Mac. Let us help you out whether you choose an external drive, the cloud, or a combination of options.
Keep Your Computers Running Smoothly:
Finally, do not underestimate the need to keep your computers tuned up and running smoothly. Most computers in regular use will begin to see normal wear and tear long before problems arise that we can notice. Having scheduled computer maintenance for your business can keep things running smoothly and last longer, saving you time and money.
For a free phone consultation with no obligation to contract service, call us! 212-682-6878 or 718-459-9477
It seems like every other week these days, the news carries mentions of ransomware or malware unleashed to hold unsuspecting people and businesses’ information for, as the name indicates, ransom. It is a lucrative and growing form of theft, with a surge of 167 times more ransomware in 2016 than in 2015. Yet, this week, what was first thought to be the latest ransomware attack was something intended to be much worse.
The havoc caused this week by the infection known as Petya/ExPetr acted like ransomware at first look –it would pop up and lock data behind a fake screen demanding money for a code to unlock the data and break the encryption. However, there were holes in the way it operated, and experts quickly realized after analysis that the codes customers had paid for were useless. This malware attack wasn’t to ransom data –it was to destroy it. The alleged unlock codes were just random characters that failed to decrypt anything. It wasn’t spread to make anyone money. Experts are calling it a “wiper”. Data on infected systems is lost forever.
The list of infected people and businesses grew rapidly, but security firms also jumped right into action. There are ways to catch a potential infection and stop it.
We’ve long been advocates of staying on top of security and protecting your data. Maintenance is one of the many services we provide, and we understand that losing access to everything on your computer or even an entire office network, could be a devastating and costly process to address. That is the case even when the data that has been encrypted or infected can be cleaned up and restored. In the case of this latest round, that data is simply lost, the extent of which is unknown just yet.
Imagine if your data was suddenly lost forever. We’re often able to recover data due to drive failure, erasure, or common malware infection, but this is worse.
And it’s preventable! Be proactive and save yourself the trouble by contacting us. We’ll set up options to meet your needs, from data backups, top of the line anti-malware and virus protection, to regular maintenance.
As a local computer repair business, we rely on earning our customers’ trust and word of mouth through delivering high quality work. However, as an independent service company repairing both Apple computers and PCs across all brands, we do business in a market that has seen pushback from companies intended to preserve their services and accessories as the only way to fix your devices. However, 11 states, including New York, have bills known as “Right to Repair” (New York’s official bill is called the Fair Repair Act) which, if passed, allow for independent businesses (like us) to repair devices and obtain parts and official documentation more easily.
Requires manufacturers of digital electronic parts to offer for sale diagnostic and repair information in the same manner as such manufacturer provides such diagnostic and repair information to such manufacturer’s repair channel
In other words, this legislation is aimed at expanding consumer choice and letting independent businesses offer a fuller range of options for customers.
A decision by the U.S. Supreme Court on May 30th also gives hope for changes. In the decision, passed 7-1, the printer company Lexmark lost its case against a small printer ink business, Impression, that was selling refilled ink cartridges at lower cost. The Court decided that once a consumer purchases a device, that consumer doesn’t have to be beholden to one single manufacturer for official supplies or repair. It is of note that Lexmark is one of the companies—including Apple, Verizon, and Toyota—actively lobbying against Right to Repair in New York. It remains to be seen just what effect the Court decision has on consumer options, but as a repair business responsible for fixing many computers over our 35 year history, we welcome more options through which to continue delivering high quality service and options.
There’s a new malware attack seriously infecting computers and stealing data, but the most surprising part of it might be that the targets are Mac computers running OSX. While Apple has taken measures to prevent attacks from the malware, known as OSX.Dok, some users may have already allowed it to live on their machines. OSX.Dok will continuously infect the computer it is installed on every time the computer reboots.
OSX.Dok is unique in that it has been called “the first major scale malware to target OS X users via a coordinated email phishing campaign” by Check Point . It’s true that malware and phishing attacks like this are usually more apt to snare PC users, but this one is one you should pay attention to. Do not click or download any strange attachment or files, and be on the lookout for a .zip file called Dokument.zip.
If you’re infected, you may find fullscreen, but fake messages being displayed that there are OSX updates to be installed, and it requests your password. Do not enter any information if you see one of these screens appear.
Doing so would give the malware administrative privileges, install it on your system, and then be able to steal your data. It could also potentially steal any saved passwords, financial information, or any other sensitive or personal information on your computer.
Mac OS may often be safer from phishing and malware attacks, but this shows that it is definitely not impossible to infect one. Although this attack seems to primarily target European users, with global reach, email could have sent this anywhere.
Apple’s response has been to revoke the privileges of a certificate that has been potentially hijacked to serve as an agent facilitating this malware, so it will likely now be rejected if you aren’t careful and it finds its way to your inbox. If you are infected, contact a trusted computer repair professional, who will be able to remove this malicious software and restore your computer to working order quickly.
Nothing makes us sadder than when drives crash and people lose their important data. Data recovery is often possible, but it can take time and expertise, and be quite expensive. The good thing is that data loss can be prevented.
Don’t let data loss happen to you! We can help you with both data recovery and creating backups. Here are some tips for you – our Six Dos and Don’ts of backing up your data:
We’ve had a few customers come to us with similar situations recently. Their computers were showing signs of slowdown, sometimes sluggishness, and occasionally, their systems were in a bit more trouble than that– computers that wouldn’t turn on or were experiencing sudden shutdowns.
We opened up one case and found a ton of dust inside (see photos with this post – and this was after initial dusting). The dust combined with a lack of air circulation to go and fry the video card. Too much heat inside your computer is going to lead to problems eventually. There is a limited amount of space in the case, so making sure the fans have room to circulate the air and cool your system is important. So, too, is regular cleaning and maintenance. Dusting your computer helps it run better in the long run. Investing in a couple of cans of compressed air to dust out the fans now and then is the least you can do.
In another case, a customer who used his laptop for gaming came to us with slow computer problems. The games he enjoyed playing were rather resource intensive, and many laptops not specified for gaming purposes might chug when trying to play them. Gaming on laptops is possible, but again, heating can be a real danger when it comes to running programs that demand a lot from your system. After cleaning out this customer’s computer and performance testing everything with games and programs running, temperatures were mostly within a workable range. We suggested that the customer buy a cooling pad for laptops. Not only do cooling pads help reduce temperatures, they tend to elevate a laptop a little bit, which makes it easier for air to circulate out of the vents and below the computer. By not resting the laptop on a desk or table itself, the air can get out and disperse, letting the additional fans help prevent issues. What’s more, they begin at under $20, so it can be an affordable way to keep your hardware healthy if you use your laptop for gaming or other intensive work, like video editing.
Keeping an eye on the temperature during all your most common activities on your computer will help too, because it will give you an idea of what is normal for each demand you place on your system and alert you if excessive heat starts to become a pattern. This can help you notice heating occur before it causes any obvious problems. If you can investigate the cause and find out how to stop overheating early enough, it might spare your system repairs later.
Of course, you can invest in regular computer maintenance from a shop you trust to keep things running smoothly. We are happy to provide maintenance services for all computer models. Call us for a free, no obligation phone consultation.
These days, our computers are our constant companions, and we find ourselves on our machines while going about many activities. Though it’s advisable to keep all liquids away from computers, the truth is that life these days often has us working on something with our coffee right next to us or a water bottle nearby. Many a modern office or co-working space features open places, laptops, charging outlets all around and the perks of free beverages. All of these pose a danger to the inner workings of your computer.
First, here are some tips for you if you spill anything on your computer.
1. Turn off the power immediately. Unplug it.
2. Turn the computer over and allow it to air dry, up to a few days.
3. Try to turn it on and see if it is working.
Liquid spills are a common reason for computer repair these days. We repair liquid spill damage for PC or Mac. We have noticed the number of spills on MacBooks in particular growing in recent years. We specialize in Apple computer repair at less than the cost of Apple. In the last week alone, we completed several of these repairs. Some were ready for customer pickup within 24 hours.
If you are in need of repair, call us! We will give you a free phone consultation and assess your situation. Give us the model and year of your computer and we can price out parts and the cost of a repair. If your spill is minor, it’s possible to get away with just a logic board/motherboard replacement, but if it’s a bit more extensive, we would need to also replace your keyboard. All costs will be given to you upfront before we begin repairs. Of course, you can always drop off your computer at one of our two convenient locations where we will have our certified techs diagnose the extent of the damage and what is needed.
Are you a Windows 7 user? Do you still use old software like Office 2010?
Then we’ve got some important news for you!
Mainstream support deadlines for these products, along with some other ones from Microsoft, are approaching. But, what does this mean?
Mainstream support is the typically five-year period when Microsoft provides free patches and fixes for its products. When a product exits the mainstream support phase, Microsoft continues to provide a period (also often five years) of extended support. This means users get free security fixes but other types of updates are paid and require specific licensing deals.
In other words, free support is ending on January 13, 2015 for a number of major Microsoft products, including all versions of Windows7.
Extended support for Windows 7 lasts until January 14, 2020, so you will still be receiving free security updates, but not features updates.
Some specialists have been speculating, though, that Microsoft will end up pushing out Windows 7’s support dates the way the company did for XP, given Windows 7’s popularity and pervasiveness, but so far, there’s been no word from Microsoft officials that this is the plan.
Support for Office 2010 with Service Pack 1 ends on October 14.
In this case, you have two options. You can migrate to the next available Service Pack (Service Pack 2, in this case), or to the next Office version, which in this case is Office 2013.
If you want to be loyal to Microsoft, you can also migrate from Windows 7 to Windows 8. You can buy a hard copy of the program, or you can do the update online. Windows 8.1 Upgrade Assistant will tell you if your PC can run Windows 8, and then will provide you with a compatibility report and optional steps for you to buy, download, and install Windows. If you want to check out the system requirements, you can, but you don’t have to. Upgrade Assistant will do all that for you, and the best thing is that you don’t need to buy the upgrade to run it.
Upgrading Office requires an extra step, because first you need to uninstall the previous version running on your computer. It’s a very simple process, but this new version of the suite doesn’t replace the old one while you install the new one, like previous versions did. You just need to go to the control panel, and perform the uninstall process from there.
In any case, if you have doubts or need help, don’t hesitate to contact us. We are here to help you!
(212)682-6878 / (718)459-9477
Do you know that you can use Windows to personalize and customize your computer to make it easier to see, hear, and more comfortably use. As we rack up birthdays, sooner or later we all experience some loss of vision, hearing, or physical dexterity. Fortunately, personalization options in Windows make it easy to adjust your PC. Here are a few tips on how to counter the effects of aging to make your computer more comfortable to use.
Do you often find yourself fighting the urge to press your nose against the screen because you can’t see text and objects clearly? Have you considered changing your monitor display settings to increase the size of icons or text for documents and Web pages?
All you need to do is:
1. Open Screen Resolution by swiping in from the right edge of the screen, tapping Search (or if you’re using a mouse, pointing to the upper-right corner of the screen, moving the mouse pointer down, and then clicking Search)
2. Enter “Make text larger” in the search box, and then tap or click “Make text and other items larger or smaller”.
3. Drag the slider until the items in the preview image are the size you want them to be.
4. Finally, tap or click Apply.
Having trouble seeing things that are close up? Magnifier, one of the accessibility utilities in Microsoft Windows, opens a window that enlarges all or parts of the screen you choose, just like a magnifying glass. Magnifier enlarges different parts of the screen and is part of the Ease of Access Center. To open it quickly, click Start, and then type Magnifier.
There are three Magnifier modes:
• Full-screen mode. In full-screen mode, your entire screen is magnified. Depending on the size of your screen and the zoom level you choose, you might not be able to see the entire screen at the same time.
• Lens mode. In lens mode, the area around the mouse pointer is magnified. When you move the mouse pointer, the area of the screen that’s magnified moves along with it.
• Docked mode. In docked mode, only a portion of the screen is magnified, leaving the rest of your desktop unchanged. You can then control which area of the screen is magnified.
You can also change the screen resolution, which adjusts the clarity, size, and amount of things that fit on your computer monitor.
If you find yourself searching for mouse pointer more often than you search the Web, you can change the size, appearance, width, speed, color and blink rate of your cursor, or the appearance of your pointer.
Also, to maximize mouse comfort, try a Microsoft mouse that is designed for maximum comfort.
If you have more questions, don’t hesitate to contact us. We can help you!