Social Engineering

Social Engineering is the number one way hackers break into computer systems and networks. As I explain in my blog post, Social Engineering: The Weakest Link In The Chain, the person operating a computing device is the weakest link in the security chain. Someone will click on a phishing email or be tricked into allowing …

Continue reading Social Engineering

Social Engineering: The Weakest Link In The Chain

When it comes to security online, the weakest link in the chain is, unfortunately, the computer user. That’s you, that’s me. Oh, there are other security issues – hence, updates to our software, etc. But, it’s the person in front of the computing device’s screen who makes up the most vulnerable aspect of the virtual …

Continue reading Social Engineering: The Weakest Link In The Chain

Help

We have lots of ways for your to get help with any of your computing issues. Listed below are the options we offer. Remote Technical Support We have been helping people remotely for almost 20 years. We can often save a service call and the time you need to wait to have one scheduled by …

Continue reading Help

Even More Browser Features You May Not Be Using – Firefox

Today, we’re going to look at even more browser features you may not be using. This post is a continuation of the series called “Browser Features You May Not Be Using.” This is the third post. You’ll find the first one which was all about Microsoft Edge HERE. The second one was about Google Chrome …

Continue reading Even More Browser Features You May Not Be Using – Firefox

Five Important Videos You Need To Watch

I want to share five important videos from our YouTube Channel. I realize this post will sound self-promoting but I promise you, it’s based on what we are seeing in Remote and hearing over the phone. Why Do I Have A YouTube Channel? There are a number of reasons I have a YouTube Channel. At …

Continue reading Five Important Videos You Need To Watch

Microsoft and Apple Won’t Do This

You need to remember that Microsoft and Apple won’t do this: they won’t, really. What won’t they do? They won’t cause pop-ups to appear which try to scare you. No pop-ups telling you to not turn your computer off. Or, asking you to call a toll-free number. No pop-ups telling you there’s a zillion infections …

Continue reading Microsoft and Apple Won’t Do This

How Tooltips Are Being Used For Phishing

It’s important that you understand how tooltips are being used for phishing. First, I’ll explain terms and then I’ll outline the phishing process being used. Definitions Tooltips Are you familiar with the term tooltip? You probably see them all the time when you use a computing device but you might not know the term. Let’s …

Continue reading How Tooltips Are Being Used For Phishing

How A Large Company Ripped Off One Of My Computer Customers

Talk about a computer rip-off! I’m going to relate to you how a major company ripped off one of my computer customers. It happened just last week. But first: Let’s Set The Scene If you’ve been reading this blog for some time or you’ve been our customer for awhile, you should be familiar with scam …

Continue reading How A Large Company Ripped Off One Of My Computer Customers

Ransomware Caused A Panic Which Caused A Gas Shortage…

Or, Why You Should Keep Your Computing Devices And Anti-virus Up-To-Date Even though I’ve talked about ransomware a number of times here in our blog, there were still people who really didn’t understand the term until Colonial Pipeline was hit. At that point, the company shut down their pipelines and they remained closed for almost …

Continue reading Ransomware Caused A Panic Which Caused A Gas Shortage…

How To Avoid Smishing Scams

I suppose that before I explain how to avoid smishing scams, it might help to understand the meaning of the word “smishing.” Basically, smishing is phishing through text rather than email. All clear now? That definition works fine if you understand what phishing is. Okay, let’s go to the Mirriam-Webster dictionary to find out the …

Continue reading How To Avoid Smishing Scams

I Have To Share Bad News With You-Email Scam

“I have to share bad news with you” is actually the first sentence from the email pictured above. (You can click on the image to see a larger, more readable version.) Lately, I’ve been getting about six of these a day. So far, we’ve had one customer log in to Remote Technical Support because they …

Continue reading I Have To Share Bad News With You-Email Scam

Security Notifications

June 19, 2021 Hackers Use Google Doc For Phishing If you use Google Docs, you need to be aware of a new phishing attack. Hackers are creating web pages that appear to be the well-known Google Doc form. These scammers are sending out links to what looks like a Google Doc. However, before you can …

Continue reading Security Notifications

IC3 2019 Report

As I shared in my post, “Soapbox,” the FBI has released the Internet Crime Complaint Center (IC3) 2019 Internet Crime Report. While my “Soapbox” post was focused on Tech Support Fraud, I think it’s important to share some of the other information found in this compte ren·du. For the record, I’m not passing this information along …

Continue reading IC3 2019 Report