![]() by Burton Kelso, The Technology Expert Let's face it, 2020 was tough. A fresh start is what many of you are looking for in 2021, so when you resolve to make positive changes to your personal life, take a moment to make some resolutions for your digital life as well.
Just like good personal habits help you live a longer and fuller life, good tech habits help your technology last longer and prevents you from falling victim to many of the scams out there that threaten your tech devices and your personal data. There are so many habits you should pick up when it comes to using your technology. Here are the 6 important ones you need to use in the coming year. 1. Configure Your Devices to Automatically Backup to a Cloud Storage Service. You can easily replace your computers, smartphones, and tablets. Your data such as baby's first photos, wedding pictures, holiday videos, can't be replaced when lost. Even if there was a chance to reclaim those old files can cost thousands if you let us at Integral attempt to retrieve them from you. External hard drives can be used for backup, but most of you won't remember to plug them in your devices to have them backup. Resolve this year to have your devices automatically backup that information to the cloud. Unfortunately, there are no free services that allow you to do this, but most backup services average around $70 a year which is a small price to pay for the peace of mind knowing your files are safe and secure. Not sure what to use? Windows and Macintosh Computers: Carbonite (www.carbonite.com) Will automatically backup your items to the cloud and keep older files for up to 30 days. iPhones and iPad: iCloud. (www.icloud.com) Apple starts you off with a small amount of storage for your tech devices, but for a small monthly fee, you can increase that storage to backup all of your important files on your iPhone, iPad, and even your iMac and Macbook. Android Phones and Tablets: Google Drive. (www.google.com) Google follows the same model as Apple by giving you a free amount of storage space, but for a small monthly fee you can have all of your Android devices and your Windows and Apple computers backed up to the cloud. 2. Use a Password Manager to Store Those Passwords. Hopefully, you're using different passwords for all of your online accounts. If you're not, you're risking identity theft and having your personal online accounts compromised. Cybercriminals are using a method called Credential Stuffing to get access to your information. With all of the data breaches that have occurred over the years, the is a good chance your user information is sitting on the dark web. Once your information is obtained, a criminal just needs to use your credentials to log in. Making sure you have a different password for each of your online accounts is a great deterrent. Keeping track of all of those passwords is the challenge, which is why a password manager is a good tool for you to use. Not the most secure method, but storing those passwords in your favorite browser is better than using the same passwords for your accounts. Edge, Safari, Chrome, Firefox, and Opera all offer an option to store your passwords. If you want a little more security, use LastPass (www.lastpass.com) or DashLane (www.dashlane) to store those passwords. 3. Have a Good Balance between Screen Time and Real Life. Technology has been a great tool during the pandemic allowing us to stay in contact with family and friends, but if you've seen "The Social Dilemma" on Netflix, you know technology is designed to keep you addicted and plugged. It's even worse for younger members of your family with social media creating a host of mental and physical ailments. iPhone users can take advantage of Apple's Screen Time to track and control your smartphone use. Android users can use Digital Wellbeing to set limits on the time you spend on your devices. It helps if you block or unfriend negative people on your social media accounts. Also, set certain areas in your home as 'no tech' zones to help curb the amount of time you spend staring at your devices. 4. Get Rid of those old Tech Devices. Doesn't matter if you give them to family members, charity, or recycle them, make 2021 the year you get rid of those old technology toys. I'm talking old gaming systems, computers, laptops, phones, headphones, and cords. Someone can use that old tech. Before you give away those devices, wipe them clean. The easiest way to wipe these devices clean is to do a full reset. Before you do, make sure you back up all your information like documents, pictures, and videos to an external hard drive or to a cloud storage service. 5. Add a Little 'Green' to Your Tech. One of the great things about technology is all of the environmentally friendly tech that is available. Focusing on 'green' tech can help your home and office finances. The first thing you should do is to replace your standard light bulbs with LED bulbs. LED bulbs can save you up to $6 a year. A small amount when you think of one bulb, but think about how many bulbs you have in your home or office. If you haven't already, you should also invest in a smart thermostat to help with your energy savings. Some utility companies will provide them to you, but once you have one in your home or office, you can program a schedule to make sure there is no waste when it comes to your utilities. You can also take it a step further by setting up a smart home with your Amazon Alexa and Google Home devices. 6. Reevaluate Your Tech Subscriptions. Many products are going to a subscription service. The upside is these products keep you up to date with the latest versions of your software products. The downside is these subscriptions are designed to keep taking money out of your pocket as most companies sign you up for ongoing subscriptions rather than monthly or yearly subscriptions. Check your banking and credit card statements to make sure you aren't being charged for products you are no longer using. While you're at it, contact your cable and Internet providers to make sure you're getting the best package that offers faster internet services. Sometimes companies will modify their TV or Internet package for a lower rate and not inform their current customers. Yes, 2020 was not an easy year and we all could use a clean slate. Think of 2021 as a reset for yourself and your tech devices. In this digital age we live in, take the time to reevaluate your relationship with your gadgets, and make technology a healthier component of your life. Looking for More Useful Tech Tips? Our Tuesday Tech Tips Blog is released every Tuesday. If you like video tips, we LIVE STREAM new episodes of 'Computer and Tech Tips for Non-Tech People' every Wednesday at 6:00 pm CST on Facebook, Instagram, LinkedIn, and Twitter. Technology product reviews are posted every Thursday. You can view previous episodes on our YouTube channel. Want to ask me a tech question? Send it to burton@callintegralnow.com. I love technology. I've read all of the manuals and I'm serious about making technology fun and easy to use for everyone. Need computer or technology help? If you need on-site or remote tech support for your Windows\Macintosh, computers, laptops, Android/Apple smartphone, tablets, printers, routers, smart home devices, and anything that connects to the Internet, please feel free to contact my team at Integral. Our team of friendly tech experts organization can help you with any IT needs you might have. Reach out to us a www.callintegralnow.com or phone at 888.256.0829.
0 Comments
![]() by Burton Kelso, The Technology Expert The holiday shopping season is in full swing. If you're like me, your moving away from shopping for your favorite computers and electronic devices in brick and mortar stores and doing your Christmas shopping at online stores.
Why wouldn't you? It's convenient and it's quick, with online stores delivering your gadgets in a matter of days. With more and more people buying high ticket electronics online, there has been a rise of packages being stolen by porch pirates. They're riding in your neighborhoods, snatching your packages up, trying to take them so you need to do something to protect those packages. Want to make sure your gadgets make it under the tree this year? Here's what you can do to stop porch pirates from running off with your stuff and what to do if they are hijacked by a porch pirate. 1. Have Your Packages Delivered to Your Work Place, a P.O. Box, or Use Ship To Store. Probably one of the best ways to stop porch pirates in their tracks is to avoid shipping to your home. Even if you work from home or you are at home the majority of the time, porch pirates can still get your stuff. These crafty individuals will follow FedEx and UPS trucks so they can pounce immediately after your package has been delivered. Having your packages shipped to a location other than your porch is a smart move, especially during the holiday season. 2. Install a Smart Doorbell or Home Camera Security System. Yes, I know there are a ton of videos of people caught on camera stealing packages even in the presence of a smart door bell such as a Ring (www.ring.com), but they really do work as a way keeping people off your property. If installed and used properly, smart home monitoring systems like Ring, Nest (www.nest.com), or Belkin (www.belkin) can keep your alerted when someone is near your door and allow you to capture on video any activity that occurs. With video, you have a means to retrieve your stolen gadgets. 3. Sign up for delivery alerts and have Your Neighbors Help. Most online retailers offer alerts to let you know when your electronics leave the shipping center and more importantly when they arrive at your door. Alerts can help you take action to make sure your get your gadgets. If you're not able to be home for package delivery, ask a trusted neighbor to get it for you. Also, If possible, require a signature for all deliveries. 4. Help Out Your Neighbors. If you work from home, or are home during the day, make a post on Nextdoor (www.nextdoor.com) or in your neighborhood Facebook group (www.facebook.com) and offer to allow your neighbors to ship their packages and electronics to your house. Also, keep an eye out for suspicious things in your neighborhood. If you notice something that doesn't seem right, check with your neighbors or contact the authorities for help. 5. Use free secure delivery lockers offered by Amazon. Amazon offers self service lockers that allow you to ship your gadgets to a locker. You have 3 days to get your items out of the locker. For more details, check out Amazon's website (www.amazon.com). If you have been a victim of a porch pirate do the following things: 1. File a Police Report 2. Contact the shipper. If your gadgets were delivered via US Postal Service, fill out a Missing Mail Search Request. If it was delivered by UPS, you need to contact the shipper. If it was delivered by FedEx, you can go to their web site and fill out their online form for missing packages. Want to ask me a tech question? Send it to burton@callintegralnow.com. I love technology. I've read all of the manuals and I'm serious about making technology fun and easy to use for everyone. Need computer or technology help? If you need on-site or remote tech support for your Windows\Macintosh, computers, laptops, Android/Apple smartphone, tablets, printers, routers, smart home devices, and anything that connects to the Internet, please feel free to contact my team at Integral. Our team of friendly tech experts organization can help you with any IT needs you might have. Reach out to us a www.callintegralnow.com or phone at 888.256.0829. This year our traditional holiday celebrations are going to be different than previous years as we focus on socially distancing. One tradition that isn't changing this year is the fact cybercriminals are looking for new ways to trick you out of your money and identity.
Some of these scams are specific to the holiday season, others are specific to the COVID19 pandemic. Scams always increase during the Thanksgiving and Christmas season, but with the virus, you can be sure there will be scams designed to prey on people. Unfortunately, early as February 2020, the Federal Trade Commission (FTC) warned that fraudsters would likely be using the coronavirus (COVID19) as a means to scam and trick people. As the year winds down, some charities are reaching out to previous and new donors to provide opportunities for last-minute donation opportunities. a look at some of the pandemic based scams and what you can do to keep yourself safe. 1. The Cryptocurrency Scam. Cryptocurrency has taken off in the past couple of years. If you're not familiar, it's an online currency that works outside of banks and government. Cryptocurrency scams come in the form of emails promising investment opportunities and ransomware attacks. Criminals focus on getting funds via cryptocurrency because once they get your money in the form of online currency, there is virtually no way to get your money back. If you are unfamiliar with investing, it's best to stick with investment firms. You can avoid malware by avoiding phishing emails and texts that want you to click on a link to visit a website. 2. Checks from the government scam. In these tough financial times, people are looking for any way to keep food on the table and to get bills paid. Criminals will try to take advantage of this posing as the IRS or other government agencies to give you stimulus money. If you have people calling or emailing you asking for your personal information or wanting to charge you fees to help you get stimulus money, beware. The IRS will not call you or email you to offer stimulus money. 3. Fake charities scam. During this pandemic, scammers are trying to get your money by posing as a fake charity with names that sound like real charities. These usually come in the form of emails, texts, or fake social media accounts. Sometimes you are solicited via email or messages and posts that show up on your social media feed. Verify charities by going to Charity Navigator (www.charitynavigator.org). If you decide to donate to a charity, go directly to the website of the charity or download their app to your smartphone and tablet. 4. Social Media and Email Takeovers. Data breaches since 2012 have allowed a lot of personal data to be leaked on the web which is why professionals like myself recommend changing the passwords on your online accounts on a regular basis. If you don't get into the habit of changing passwords, you could become the victim of 'credential stuffing' which is the act of cybercriminals using your leaked information to log into your email, social media, and financial accounts. Get into the habit of checking out to see if your information is leaked by using LastPass or the Google Chrome password vault. These tools will notify you if your passwords show up on the dark web. 5. eGift Cards. eGift Card scams aren't new. Criminals focus on eGift Cards as a way to scam people because it's impossible to get your money back once you fall for this trick. The way hackers use this scam is stealing your account information and purchasing gift cards and sending fake alerts that notify you that you need to purchase a gift card to make a payment. Keep alert when people call out of the blue to ask you to pay with a gift card. If it sounds like a scam, it normally is. 6. The Puppy Scam. The demand for pets has increased drastically during the COVID19 pandemic because they can help with stress is PTSD. This results in criminals making fake posts for animals for sale. If you're looking for a pet, avoid online transactions. Go directly to an animal shelter or a breeder. 7. The New Job Scam. Many have suffered job losses during the pandemic due to downsizing and businesses closing. Scammers pretend to be recruiters for new job opportunities, getting their information from recruitment companies. Again, they are after your personal information and money. Do a check on the recruitment company and research to find out if the job opportunity is real before you commit to anything. 8. The Sweepstakes Scam. Who doesn't like winning free stuff? I know I do. These scams start off like most: you get a phone call, email or even a message on social media notifying you that you won the sweepstakes. The catch is always that you need to pay a fee in taxes to claim your prize. Obviously, if you really win a contest, there won't be a fee associated with collecting your prizes. If you're like me, you always want to believe the best about people. Unfortunately, you need to be aware of all of the cybercrime activity that is occurring in the digital age. Cybercriminals don't care about you or your family and have been known to wipe out people's bank accounts and retirement funds. To avoid falling victim to these scams always remember if you are requested to pay money in advance or by gift card, it's not a legitimate source. Also, be careful with who you share your personal information with online, by text message, or email. Want to ask me a tech question? Send it to burton@callintegralnow.com. I love technology. I've read all of the manuals and I'm serious about making technology fun and easy to use for everyone. Need computer or technology help? If you need on-site or remote tech support for your Windows\Macintosh, computers, laptops, Android/Apple smartphone, tablets, printers, routers, smart home devices, and anything that connects to the Internet, please feel free to contact my team at Integral. Our team of friendly tech experts organization can help you with any IT needs you might have. Reach out to us a www.callintegralnow.com or phone at 888.256.0829. Cybercriminals have a 'never die' attitude when it comes to getting your information and money, which means there will always be new threats on the horizon that you should worry about.
Credential Stuffing is affecting consumers and businesses alike and I'm sure you're wondering just what the heck that is. Well, credential stuffing occurs when cyber criminals obtain your online credentials that have leaked onto the dark web. Then they use automated bots to 'stuff' your credentials into the login pages on multiple websites to unlock your online accounts. Years of data breaches and the average person using weak passwords has provided a way for criminals to easily get access to your online accounts. How can you keep safe? Check out these tips: 1. Don't use the same passwords on your online accounts. Cybercriminals know that people use the same passwords for all of their online accounts and are slow to change passwords. Which is why if they get the password for one account, they will use it on all of your web accounts, including sensitive ones like your bank and other financial accounts. If you have different passwords for your online accounts this means if criminals get access to one account, it they won't get to the rest of your online accounts. 2. Change your passwords on a regular basis or just create strong passwords. When criminals get access to your online credentials that have been leaked, the information is usually a few months old, sometimes older. If you get into the habit of changing your passwords on a regular basis, it prevents criminals from using those old passwords to log into your accounts. Now the school of thought on the frequency varies from tech expert to tech expert. The common rule is every 3 months, but I feel if you create a strong password, you don't have to worry about changing your passwords. 3. Do the Two-Step. Two-step authentication is a great way to protect your online accounts. Most web-based accounts now have this feature. When you set up two-step authentication, you will get an alert sent to your smartphone whenever there is an unknown login into your online accounts. You have to confirm from our smartphone to give access to your account. It can be a pain having two sign-ins, but it's better than having someone access your critical information. 4. Find out if you've been hacked. There are a variety of websites that allow you to see if your information has been compromised. One of the more popular sites is www.haveibeenpwned.com This web site allows you to see if your web account login email has been part of a large scale breach or if the information is leaked on the dark web. Another site you can look at is www.fightingidentitycrimes.com. This site allows you to look at web breaches that go all the way back to 2012 to see if any company you have done business with has been part of a breach. If they have, the site gives steps of what you can do to protect your information and identity. 5. Use a password manager. A password manager works in making sure you can keep track of all of those different passwords for your online accounts, as well as helping you create stronger passwords for your accounts and monitor the dark web to see if any password you are currently using can be accessed by cybercriminals. One of the more popular password managers is LastPass (www.lastpass.com). LastPass keeps all of your passwords in a vault which allows you to automatically log in to all of your online accounts, create secure passwords for your accounts, and will even scan the dark web to see if any of your passwords have been leaked there. If you don't want to use another program, you can configure your favorite web browser (Safari, Chrome, Opera, Firefox, and Edge) to do the same things that Lastpass does. Credential stuffing is easy to perform, so its popularity with criminals will increase with time. Even if your business isn’t affected yet, you must protect your website and watch for all the red flags listed in this blog. Credential stuffing is an easy process for cybercriminals, so don't expect it to go away anytime soon. Always remember that 99% of cybercrime requires user interaction and relies on consumers and businesses to be lax in their cyber security methods. Make sure you're always keeping up with your passwords for all of your accounts and keep up with the cybersecurity for your home and business. Want to ask me a tech question? Send it to burton@callintegralnow.com. I love technology. I've read all of the manuals and I'm serious about making technology fun and easy to use for everyone. If you need on-site or remote tech support for your Windows\Macintosh, computers, laptops, Android/Apple smartphone, tablets, printers, routers, smart home devices, and anything that connects to the Internet, please feel free to contact my team at Integral. Our team of friendly tech experts organization can help you with any IT needs you might have. Reach out to us a www.callintegralnow.com or phone at 888.256.0829. One of the most common questions I get from people is 'what is the best anti-virus protection to have for computers and smart devices'. There are a ton of anti-virus tools, such as McAfee, Norton, or Kaspersky, Avira, Avast, and AVG that offer features such as malware removal, spam blocking, and identity protection.
Well, you will be shocked when I tell you the best anti-virus protection is nothing. Why? Windows and Macintosh computers already have it built-in and if you educate yourself, you don't need it for your smartphones or tablets. Read on to see how you can save your money and learn how to keep your devices safe without spending hundreds on protection software. 99% of cybersecurity threats require user interaction which means as long as you aren't falling victim to those phishing emails, texts, and phone calls, your devices, and your data and your devices will stay safe. In recent years, cybercriminals have turned to social engineering as a way of getting your personal information. They are also focused more on collecting your information that has already been leaked to the dark web. These methods of gathering information are much easier and profitable than the work that it takes for hackers to maneuver past personal and business firewalls. Cybercriminals have evolved from kids hanging out in the basement to see what computers they can infiltrate to plant a pesky virus to large criminal organizations whose main goal is to steal your information to make a profit. Also, the term anti-virus is almost dated as it goes back to a time 20 years ago when worms, trojan horses were running rampant on the Internet. Protection for your Windows Computer. If you have a computer running Windows 7, 8, and 10. You already have an anti-virus program installed called Windows Defender. It offers solid protection for your Windows devices. It works in the background automatically updating itself only alerting you when there is a problem. If you're using a third party anti-virus solution, especially a free one, you'll be constantly bombarded with updates asking if you want more protection. Also, you have to deal with an endless supply of software installed on your computer and web browser that could potentially slow your computer down. Protection for your Macintosh Computer. Macintosh computers have a program called Xprotect or File Quarantine which works in the background protecting your Mac from a variety of threats. Unlike Windows Defender, it only works when you are using a function on your Mac that brings a new file onto the computer, such as checking email, downloading files in Safari, even checking iChat and messenger. It works in this manner to save those precious computer resources that can slow down a computer when you have programs like Anti-Virus running in the background. Protection for your Android and Apple Devices. There are threats out there that can infect smartphones and tablets, but for the most part, as long as you download apps for these devices from the Apple App Store or the Google Play store, you can keep your gadgets from getting infected. Good cybersecurity habits are what will keep you safe. There is almost an unlimited number of virus threats on the web and although anti-virus companies attempt to keep up with them, they can never really keep up which is why you should get cyber smart. Along with anti-virus protection, you need to make sure you're using secure passwords, two-factor authentication for your online accounts, automatic backups of your devices, and data encryption. You also need to be careful of what programs download to your computers, smartphones, and tablets, as well as avoiding opening email attachments unless you are expecting them. Looking for More Useful Tech Tips? Our Tuesday Tech Tips Blog is released every Tuesday. If you like video tips, we live stream new episodes of 'Computer and Tech Tips for Non-Tech People' every Wednesday at 6:00 pm CST on Facebook, Instagram, LinkedIn, and Twitter. Technology product reviews are posted every Thursday. You can view previous episodes on our YouTube channel. Want to ask me a tech question? Send it to burton@callintegralnow.com. I love technology. I've read all of the manuals and I'm serious about making technology fun and easy to use for everyone. If you need on-site or remote tech support for your Windows\Macintosh, computers, laptops, Android/Apple smartphone, tablets, printers, routers, smart home devices, and anything that connects to the Internet, please feel free to contact my team at Integral. Our team of friendly tech experts organization can help you with any IT needs you might have. Reach out to us a www.callintegralnow.com or phone at 888.256.0829. ![]() by Burton Kelso, The Technology Expert Wi-Fi has become an essential part of our digital lives that when you don't have access to it or have a weak signal it can leave you feeling frustrated and lost. Dealing with weak Wi-Fi means you have to deal with the stress of kids who aren't able to learn distantly or play games. It also means that you have to deal with slow loading websites and Zoom calls that freeze up or drop altogether.
A good solution to fixing Wi-Fi dead zones in your home is to get a wireless range extender. The challenge is making sure you set them up to make them effective to reach all of the areas in your home. Struggling with the concept of range extenders and how to set them up, check out my tips that will help you get a full signal throughout your home or office. What are Wi-Fi extenders? The best explanation of Wi-Fi range extenders is these are devices that take your current wireless signal in your home and extend it further than your router can reach. When installed properly, this allows all your smart devices such as your smartphones, laptops, tablets, and printers to communicate effectively. The standard router is only designed to reach the area of a 2,500 square foot home or office and works best in open-air environments. However, your home or office could have things that get in the way of your wireless that can disrupt and reflect your signals such as drywall, concrete walls, and ceilings. You probably didn't know your appliances such as washing machines, microwaves, washing machines, and televisions send out electromagnetic waves that can play a major role in getting in the way of your Wi-Fi Signal. Extenders can be a single device to extend your wireless signal or a group of devices that form a 'mesh' network that casts a Wi-Fi net of a wireless signal to reach all areas of your home or office. Weak wireless or slow internet? Many of you mistake slow Internet as weak Wi-Fi. Check with your Internet provider first to make sure you are getting decent Internet speed. Visit www.speedtest.net on your computer, smartphone or tablet while you are near your router to see what speeds you are getting. If you are getting a download speed lower than 25 Megabits Per second, then you will experience issues with streaming movies, kids playing games and glitchy or dropped video calls. Sometimes an increase in Internet speed from your provider is all you need. You also may have to switch providers if your current Internet provider can't offer you faster speeds. How can you find dead areas in your home or office? Well, complaints from your kids and spouse are a good way, but an even simpler way is your smartphone. Your smartphone and the Speedtest.net app can help you identify those dead area. Once you get the app downloaded and you connect your phone to your Wi-Fi, do an initial speed test in the same room as your wireless router. When the test is finished and you get an idea of how fast your wireless connection should be, take a walk around your home or office and pay attention to where the signal is weak. Once you identify all of the weak and dead zones in your area, you can decide where to place your extenders, but first… The location of your router is very important. Just as if you were setting up a brick and mortar business, location is key for the placement of your wireless equipment. If you have a single level home or office, you should have no issues with where to place your router and extender. If your work or home area is multi-level, things get a little more complicated. When you set up your router, you want to try to make sure it's in a central location of your home or office. A router that is in an attic or a basement can cause problems, especially if you have a multi-level home as the router's wireless signal has to travel through many walls. You need to make sure your router is also placed in an elevated location. Three feet or higher is the optimum level for your router. I know you're probably tempted to place them on the floor to hide them, but that will do more harm than good. The location of your extenders is also important. When you set up your extender, you will need to make sure to place it within the range of the router. If you are creating a mesh Wi-Fi network, you want to make sure mesh connected items are within range of one another. If at all possible, make sure you're placing your extender within the line of sight of your router. If you're unable to do this and have to place them around corners or behind walls, make sure they are drywall and not plaster or concrete walls. You need to place your extenders at the same level as you would your routers. Setting up Wi-Fi extenders can take a little trial and error to make sure you cover all of the areas of your home. Also, when using extenders, understand that you will lose some speed as your extenders or mesh network is essentially repeating the signal from your router which can slow down your wireless connection. Once you get your extenders set up properly, you can relax and enjoy robust internet around your home or office. Looking for More Useful Tech Tips? Our Tuesday Tech Tips Blog is released every Tuesday. If you like video tips, we LIVE STREAM new episodes of 'Computer and Tech Tips for Non-Tech People' every Wednesday at 6:00 pm CST on Facebook, Instagram, LinkedIn, and Twitter. Technology product reviews are posted every Thursday. You can view previous episodes on our YouTube channel. Want to ask me a tech question? Send it to burton@callintegralnow.com. I love technology. I've read all of the manuals and I'm serious about making technology fun and easy to use for everyone. Need computer or technology help? If you need on-site or remote tech support for your Windows\Macintosh, computers, laptops, Android/Apple smartphone, tablets, printers, routers, smart home devices, and anything that connects to the Internet, please feel free to contact my team at Integral. Reach out to us a www.callintegralnow.com or phone at 888.256.0829. October is Domestic Violence Awareness Month which is designed to bring awareness to and end domestic violence. Domestic violence affects millions of people every year and includes, both women and men, of every status, race, religion, and culture. Most people think it just involves physical abuse but it also involves verbal abuse, stalking, and isolation.
Unfortunately, as technology advances, abusers find new ways to continue abusive treatment through GPS tracking, text messages, email, cyberbullying, and social media stalking. As a technology expert, I am always looking at ways I can help people get more from the technology they use to increase there quality of life. If you or someone you know is suffering domestic abuse through technology, here are some tips that can help you stop your abuser from harming you through technology. Abuse in any form is about power and control and technology can enable abusers to terrorize their victims from vast distances. My team and I have encountered victims of technology abuse over the years and it seems to be getting worse. Most modern tech devices don't take much expertise to use and most features can be controlled from the abuser's smartphone. A quick search of your computers, smartphones, and tablets can give your abuser access to your passwords for your online accounts. These can include, social media, banking, smart home, and security, even your vehicle. They can even bypass being on your blocked caller's list by use spoofing technology to talk to you or leave threatening voice mail messages. They can take control of your smart home locking you outside of your home or use your smart home hubs to harass you and your family. An abuser can log into your cloud accounts and download personal photos to use to blackmail you. They can also use GPS features on your smartphone, automobile, and fitness tracker car to track you and know your daily habits. Social media can even be used as a means to control you as well. Take steps to protect your devices from your abuser by following these steps: 1. Recognize the warning signs. When encountering victims of domestic technology abuse, I always hear the same warning signs such as their abuser always knowing where they are and who they are spending time with. I hear other things as noticing that email and social media accounts being tampered with, emails that they didn't delete ending up in the trash can, people unfriended that they didn't unfriend. There is also the sign of online accounts being logged into at times the person wasn't on or near a smartphone or computer. What's worse, pictures that were taken meant for personal use can wind up on social media as a means to control or blackmail the victim. Take special note of when you log into your accounts and be very careful what you are sharing on your social media accounts. Most online services keep a log of when and where accounts were logged in, so you can also check account logs to see when your accounts were logged in. 2. Take an inventory of all of your technology. In our digital age, everything is connected to the cloud which is why it's important for you to make note of all your gadgets. Smartphones, computers (including your kids), smart home items, and your car could be used by your abuser. Take special care if your abuser gave you any of these items or set them up as they could have been configured to spy on you. Also, take note of any accounts that you may share and accounts you have shared your login information. Family accounts that come with Android, Windows, and Apple automatically update all devices when you make changes. Apps and changes you make to your devices will be updated on all devices. This means your abuser could be tracking and harassing you with the information you previously shared. In your defense, you can use the family account settings to see if there are devices you don't recognize on your account. If you see some, they could be your abuser's device. 3. Check out the apps on your devices. Sometimes an abuser will install software on your smartphone or computer that can track your keystrokes, your location, phone logs, and text message. If you notice your smartphone isn't holding a charge like it used to, you could have what's called 'stalkerware' installed on your devices. Also if you have any family tracking software installed on your devices, remember those can track your location as well. 4. Use a passcode on your devices rather than a fingerprint or facial recognition. There are some abusers that have become wise enough to unlock your devices with your fingerprint or your face when you're asleep. Passcode technology is more secure, so if you're able to get rid of fingerprint or facial recognition as a login for your devices without arousing suspicion do it. Speaking of passwords, I know many of you are used to saving your passwords in email accounts, the note app on your phone, and even on cloud-based services like OneDrive, Google Drive, or iCloud, but you need to get out of that habit. These cloud-based accounts sync to the cloud so if your abuser has access to those accounts, they will see any changes you make to documents stored on your devices. Depending on your situation, you might want to wait until you make the following changes to your smart devices. When abusers start to lose control of you and are no longer able to access your tech devices, their behavior usually escalates. Once you get into a safe place, you want to have a technology security expert check out your devices, but here are something you can do in the meantime: 1. Change the passwords for all of your devices and online accounts. Seems like something most people would remember, but they don't. Use the inventory of your tech devices and online accounts to help you change those passwords. When you change account passwords, your abuser may get notified which why it's important that you're at a safe place. You should also establish new email and social media accounts (if you can't rename them) creating account names that do not tie into you in any way. When you're creating those new accounts, make sure you set up 2-factor authentication on your accounts, which will alert you when there is unauthorized access attempted on your accounts. You should consider using a password manager such as the one built into your browser or LastPass. A password manager will help you generate secure passwords that your stalker won't be able to guess as well as helping you remember all of those new account passwords you will have to create. 2. Perform a factory reset of all of your devices. It's important to perform a factory reset on your devices as this will wipe out any 'stalkerware' and device settings that are allowing your abuser to track your movement. Devices include desktops, laptops, smartphones, tablets, kids' devices, smart home, and even your automobile systems. For your automobile, you will have to call the manufacture to get this done. Before you perform a factory reset on your devices, make sure you perform a full backup of the information on all of your devices. If you share a mobile carrier account with your abuser, you might consider dropping that account, leaving your phone, and creating a new account with your carrier. If you're unable to do that, consider a prepaid phone plan. 3. Change your privacy settings on your social media accounts. Believe it or not, your social media accounts such as Facebook, Twitter, Instagram, Linkedin, Pinterest, Snapchat and TikTok can be found with a quick Google search. If possible, change your name on these accounts to an alias (you should change your profile picture as well) to keep your accounts safe from the prying eyes of search engines. Take the time to change your privacy settings on your social media accounts on your computers and your devices to make sure you aren't sharing your friend lists and that your social media account will show up online and that the tracking features built into social media software and apps don't reveal your location. You want to change the privacy settings for web-based email accounts such as Google as sometimes these accounts can reveal your physical location. 4. Use a service to remove your identity off the Internet. Data collection sites get your information from a variety of sources and it can be hard to track down every location where your personal information will appear. Services like Unroll.me and Delete.me can make sure your personal information stays off the Internet. You can also send a request to Google, Yahoo, and Bing to have your information removed from search engines. If you suspect that an abusive partner is using technology to spy on you, seek help. Report the abuse to your local authorities. Visit a public location like a library, or your doctor’s office and ask to use their phone to call your local domestic violence shelter, the National Domestic Violence Hotline (800-799-SAFE), or the National Sexual Assault Hotline (800-656-HOPE). If your calls are being tracked, call your local services hotline, like 211 or 311, and ask to be transferred to a local resource center. If you are in immediate danger, call 911. Looking for More Useful Tech Tips? Our Tuesday Tech Tips Blog is released every Tuesday. If you like video tips, we LIVE STREAM new episodes of 'Computer and Tech Tips for Non-Tech People' every Wednesday at 6:00 pm CST on Facebook, Instagram, LinkedIn, and Twitter. Technology product reviews are posted every Thursday. You can view previous episodes on our YouTube channel. Want to ask me a tech question? Send it to burton@callintegralnow.com. I love technology. I've read all of the manuals and I'm serious about making technology fun and easy to use for everyone. Things don't last as they used to and that is true in a sense. In our digital world, most computers, smartphones, and tablets usually don't last longer than a couple of years. When you have problems that occur with your smartphone, you're probably tempted to purchase a new one than to get it repaired.
Times are changing and more and more people stopping the trend of getting new smartphones every two years and holding on to their devices for three years or longer. This is understandable with the average price of an Apple or Android smartphone starting at $1,000. If you take the right steps, you can make your smartphone last a long time. If you want to save some money on smartphone purchases and extend the life of your device, check out the following tips. 1. Reset your Smartphone Back to Factory Defaults. If you start to experience problems with your Apple and Android smartphones, reset it. Doing this will remove any virus, glitches, and other odd things that could be occurring with your devices and make it work as if you just took your phone out of the box. For iPhones: Find the reset option under Settings > General > Reset > Erase All Content and Settings. For Androids: Go to Settings > System > Advanced > Reset options> Erase all data (factory reset) Keep in mind resetting your device will erase all of your information such as pictures, videos, documents and passwords so make sure you back up all of your information to Google Drive, Google Photos, or iCloud. 2. Get a protective case for your phone. A broken screen or case can lead to an expensive smartphone repair bill. Your best bet is to get a protective case and screen for your phone. You will drop it at some point and it's better to shell out $40-$50 dollars for a case rather than a $250 or more bill to repair your smartphone. 3. You know you can replace the battery. Batteries are normally the first thing to fail on an aging smartphone. Batteries that are in smartphones only have a short lifespan, usually only lasting two years or a little longer. Some models of smartphones allow users to easily change out batteries, but many newer models will require you to have a professional do it for you. When getting a replacement battery, make sure you get manufacture approved battery or else you will experience problems down the road. 4. Your smartphone can be fixed. A bad battery, cracked screen, phones dropped in toilets, they can all be fixed. Most repair shops can take care of all of your issues easily, but keep in mind the repair might not be cheap ... but cheaper than the price of a new phone ... even if you're still under contract. Your jaw may drop if you experience a $250 - $300 repair bill on a smartphone, but remember you'll still owe for that phone even if you broke it. 5. Don't load up your phone with too many files and apps. When your smartphone starts to slow down, it could be a sign you have too much stuff on running on your phone. Pictures and videos usually take up the most room, so it's a good idea you save your information with iCloud or Google Photo. Check to see if your phone storage is a capacity. If it is, remove items to clear up some room and restart. Check storage settings on iPhone: Go to Settings > General > iPhone Storage. You'll see a list of apps sorted by the amount of storage space used. When you select an app, you'll have the option of deleting it. You can also automatically offload any apps you haven't used in a while. Go to Settings > iTunes & App Stores and toggle on Offload Unused App. This will remove the app but leave the data behind, in case you want to reload the app at a future date. Check Storage settings on Android: Go to Settings > Storage > Free up space. To delete an app, tap the empty box to the right to select and then tap Free up. If you have an Android phone, you have the option of adding a microSD card to your phone to give you additional storage. 6. Clean the charging port. If your smartphone isn't charging, the charging port is probably dirty. With your phone being stored in your pocket or purse, it's easy to get dirt and lint which will block your phone's ability to charge. A wooden or plastic toothpick is the easiest way to clean up your smartphone's charging port. Android and Apple normally support their phones for about 4 years so keep this in mind when owning your smartphone. Eventually, newer software upgrades will force you to get a new phone, but you might as well use the above habits to experience a long life with your smartphone. Looking for More Useful Tech Tips? Our Tuesday Tech Tips Blog is released every Tuesday. If you like video tips, we live stream new episodes of 'Computer and Tech Tips for Non-Tech People' every Wednesday at 6:00 pm CST on Facebook, Instagram, LinkedIn, and Twitter. Technology product reviews are posted every Thursday. You can view previous episodes on our YouTube channel. Want to ask me a tech question? Send it to burton@callintegralnow.com. I love technology. I've read all of the manuals and I'm serious about making technology fun and easy to use for everyone. If you need on-site or remote tech support for your Windows\Macintosh, computers, laptops, Android/Apple smartphone, tablets, printers, routers, smart home devices, and anything that connects to the Internet, please feel free to contact my team at Integral. Reach out to us a www.callintegralnow.com or phone at 888.256.0829. ![]() by Burton Kelso, The Technology Expert If you see me out and about, you are almost guaranteed to see me looking at my smartphone. No, I'm not a phone addict! My iPhone is an extension of who I am because it allows me to keep track of all aspects of my computer repair business Integral.
Phone calls, invoices, marketing, and communication are all done from the palm of my hand. Times are changing and with more businesses working towards a mobile footprint, I thought it would be a good idea to share some of the things you should do if you want to work entirely from your smartphone. Check out this quick guide that will help you turn your smartphone and tablet to a mobile office. 1. Get the Right Software and Apps. You might actually think the type of smartphone or tablet you own is the foundation of your mobile office, but it's actually the software and apps you use day in and day out. Before rushing out and getting a new phone, check to see if the apps you want to work with will mesh with your current phone or tablet. When it comes to business apps, here are the areas you need to pay close attention to: Email: In most cases, the native email program on Apple and Android devices will work for business email. Most business users are used to Microsoft Outlook, and thankfully there is an Outlook app available for both devices. One other thing to consider with email is if you want to have your email sync with your email service. Some of you prefer to be able to delete emails from their account so the changes will be reflected on both their smartphone and tablet. Some of you prefer to keep emails separated on your smartphone and tablet ... as well as your computer. Sit down take time to choose the best strategy for you. Cloud Storage: One of the reasons for eliminating the need for a computer or a laptop is to be able to access your critical documents from anywhere. There are many cloud storage services out there, but it's my opinion that you settle on one. If you're used to Microsoft and its products, the best option is to sign up for a Microsoft Office 365 account and use OneDrive for your storage. If you prefer using Google Docs, then, by all means, sign up for a Google account. There are options for free and Gmail accounts. With a paid Google account, you're going to get access to tech support when things go wrong. If a paid account isn't in your budget, start out with a free account and budget in for a paid account as your finances grow. Mileage: Check out MileIQ (www.mileiq.com). for $5.00 a month, you can effortlessly track your mileage. If you're a QuickBooks Online user, you can use the mileage tracker built into the software. Accounting: Speaking of QuickBooks (www.quickbooks.com) QuickBooks Online is probably the best option for most of you out there. There is also Freshbooks (www.freshbooks.com) which works well on Apple and Android Devices. Word processing/spreadsheets: If you're going to be writing, reviewing documents, or working with spreadsheets, you need to stick with whatever apps you were used to using on your desktop Windows and Mac. It's a Microsoft world when it comes to documents, but don't let that stop from using Google Docs or Apple's Office suite. If you share documents, you should probably use what your team is using. Scanner: A good scanner app is a must if working mobile. If you need to capture documents on the go, consider Adobe Scan. Use your smartphone's camera to capture documents and then save or send them as PDFs. Payments: If you need to take payments through your phone while on the road, make sure you have PayPal, Square, and Venmo. These are great, safe, and secure options accepting for mobile payments. Social media: If you use social media, make sure you download the apps for your favorite platform. Twitter, LinkedIn, and Instagram allow you to use QR codes to quickly connect with people you meet in the real world. 2. Get The Right Device. There's always that argument over which device is better. Apple? Android? Just about every smartphone and tablet can be turned into a mobile office. I like using an iPhone with a larger screen, but you need to choose a phone or tablet that has the right size and operating environment that fits your comfort level. 3. Make sure you're backing up your device. Anything can happen to a smart device, that's why it's important for you to make sure you're backing up your smart device. Virus threats are still low with smartphones and tablets, but physical damage can always occur and at any time. If you don't take the time to backup your mobile device, you're putting your customers and your reputation at risk. Automatic backup is the key, but What are your options? Well, you are limited to what you can use. Apple users have the option for iCloud Backup which will backup all of the Apple-related files to the cloud. Android users can use Google Drive and photos. Both services offer a limited amount of free storage before you have to purchase more storage, but as a business user, it's worth the investment. 4. Check that warranty. Most mobile devices come with a 1-year warranty that covers factory defects, but they normally don't cover your human goofs with your devices. If you are planning to use your smart device for work, you might want to consider purchasing a factory extended warranty ... not your friendly big box store warranty. Why? Well, when you have to send in your device for extended warranty repair, you're sending it directly to the manufacture, not some third-party vendor that your big box store uses. Also, the rate of return of your device will be quicker. Make sure you find out what the turn around time is for the repair of your tablet or smartphone. In some instances, it could take up to a week to get your device back. 5. Get a printer. It's rare that I use a printer, but it's nice to have one because from time to time, you need to have a hard copy of documents. Most printers have wireless capabilities which means you can print documents from your smartphone or tablet. Some even come with cloud capabilities which means you can send documents from your smart device to be printed back at your office or home office. It doesn't take much to get your business mobile. Once you get the right apps and hardware to work with your smartphone and tablets, the sky is the limit on where you can work. Want to ask me a tech question? Send it to burton@callintegralnow.com. If you prefer to connect with me on social media, you can find me on Facebook, Instagram, LinkedIn, and Twitter and watch great tech tip videos on my YouTube channel. I love technology. I've read all of the manuals and I want to make technology fun and exciting for you. If you need on-site or remote tech support for your Windows\Macintosh, computers, laptops, Android/Apple smartphone, tablets, printers, routers, smart home devices, and anything that connects to the Internet, please feel free to contact my team at Integral. My team of friendly tech experts are always standing by to answer your questions and help make your technology useful and fun. Reach out to us a www.callintegralnow.com or phone at 888.256.0829. The COVID-19 pandemic has changed the way we function as a family. I know many of you have experienced social distancing family gatherings. Going out for dinner means staying in as some of you opt for using dinner delivery services rather than eating in a restaurant. Movie night means a social distancing trip to the drive-in or streaming a movie because theatres are closed.
The pandemic has also changed the way you work and how your kids go to school with your family huddled around tech devices as home as opposed to being in school or at the office. Doesn't matter if your family is new to 'working' from home or if you're an expert, here are a few tricks and tips to help you and your family stay productive and keep a healthy balance. 1. Call your Internet Service Provider and increase your Internet speed. Everything revolves around the Internet. If you and your family will be working from home every day, you need better and faster Internet. Your Internet download speed should be no lower than 50 Mbps (Megabits Per Second) if you have multiple people working and doing online schooling from home. If you're curious about how fast your Internet speed is, check out SpeedTest.net (www.speedtest.net). Regardless of your Internet provider, you can find out what speeds your household is experiencing. Check-in with your provider to see if you can take advantage of any special deals for Internet. If you've had some challenges with your home internet, visit HighSpeedInternet.com (www.highspeedinternet.com) to find out if there are providers in your area that can offer higher speeds. 2. Extend wireless to every corner in your home. Imagine how happy everyone in your household will be if you can extend the Internet to the dead zones. Unless you want your entire family huddled around the dining room table when it's time to work, you need to get Wi-Fi everyone in your home. The most effective method is to have cable professionally run in your home so you can install Wi-Fi extenders, but this process isn't in everyone's budget. Google and Netgear make Wi-Fi Mesh networks that can help eliminate those dead areas. A Mesh network works by repeating your wireless signal from your router to those weak spots. My favorite method is to use a Powerline adapter from TP-Link or Netgear. A powerline adapter uses the power lines in your house to send a wired or wireless signal to those weak areas. Powerline adapters are very easy to set up which makes them the ideal solution to help you give the power of wifi to your family. 3. CyberSecurity is a Must. Don't forget to keep you and your family educated on the latest scams to make it during this pandemic. I know I share this in just about every blog post I make, but remember that 99% of cybercrime requires user interaction. As long as you're careful not to click on any strange emails, texts, web sites, download unknown apps, and don't give any personal information out, you're safe from most threats out there. If you're running a Windows or Macintosh computer, you already have anti-virus built-in. No need to spend extra money on those packages like Norton, McAfee, or Avast. If you are using video conferencing tools with your office, make sure you keep those secure conversations away from your smartphone hubs like Google Home or Amazon Alexa. These devices are designed to listen in to your conversations. Unplug them or work in a room without them during office hours. Finally, set up automatic backups for your information. Doesn't matter what device you work at home from, back up your stuff. Using cloud backup is the most beneficial way to get up to the minute backups. If you have a tablet, take advantage of Google Backup, or iCloud backup If you're using a computer, use Carbonite (www.carbonite.com) for your backups. 4. Purchase a good All in One printer. You never know when you or other members of your family might need to print, scan or fax (yes, I said fax) something out. When looking for an All in One printer, get one that holds half a ream of paper, has a sheet feeder, when scanning in documents and is AirPrint compatible (you don't know what you're missing until you print something from your, iPhone, iPad or Android phone or tablet). You should expect to spend over $100 for a good home printer which means stay away from those cheap printers. They will cause you nothing but headaches. Two of the best brands of printers to purchase are HP OfficeJet Series of printers and Epson's EcoTank printers. 5. Monitor your children’s online activities. The Internet is a pathway to many sites that many consider being dangerous for children. Keep them safe. When kids are using tech devices, it's so easy for them to get distracted. You can't watch them every minute, so you need to make sure they are doing what they should be doing. All Windows, Apple, and Android devices have parental controls on them, but having them use Apple and Android tablets are the best method, as the parental controls on those devices are very robust. Make sure you keep an eye on those gaming devices. Download and use the parental controls apps for the family XBOX, Playstation and Switch so you can lock them down. Keep them out of chat rooms on social media and on games. That friend your child is talking to could be an online predator grooming them. Finally, check those devices daily to make sure they aren't getting around parental controls and using safe Internet habits. 6. Create set 'office' hours. Working from home for your family can be distracting as there are so many things that pull you and your kids from those tasks you should be doing. First, make sure all of your household duties are done before your family workday. Dishes, making the bed, breakfast and other household chores that are unfinished can the eternal distraction that prevents you and your family from getting anything done. Next, create set hours for work and play in your household and stick to them. Finally, don't overdo it. If you or your kids need to take a break from working and tech, do it. Yes, you and your kids need to focus on the 'grind', but never isolate yourself too much. Make the most of your time at home to enjoy the company of your family. Once you get into a set pattern of working at home with your family, you might find it more relaxing and productive than the normal grind. Gone are the hectic schedule of trying to rush you and your kids out of the house to get to school and work. If you follow these steps and get into the groove of having your family work from home, you may never want to leave your house again. Want to ask me a tech question? Send it to burton@callintegralnow.com. If you prefer to connect with me on social media, you can find me on Facebook, Instagram, LinkedIn, and Twitter and watch great tech tip videos on my YouTube channel. I love technology. I've read all of the manuals and I want to make technology fun and exciting for you. Reach out to us a www.callintegralnow.com or phone at 888.256.0829. |
Categories
All
|