Death and Tariffs


We are stuck with technology when what we really want is just stuff that works. – Douglas Adams (Author)


Fun or Not So Fun things I Googled:

Computer Part Tariffs Timeline

President Trump announced that tariffs on computer parts and other electronics would go into effect starting on March 4, 2025, with a 25% tariff on products from Canada and Mexico.

Additionally, on April 1, 2025, tariffs on semiconductors and other electronic components imported from China could increase to as high as 80.6%.

These tariffs are expected to significantly raise the prices of computer parts and other electronic components.

End of Windows 10 Support

The end of life for Windows 10 is set for October 14, 2025.

This means that Microsoft will no longer provide updates or security patches for Windows 10 after this date.

For businesses and organizations, there are options to extend support through the Extended Security Updates (ESU) program, but this comes at a cost.

And now a word from your sponsor:  Janet at Comp-U-Talk:

We have taken lots of frenzied calls from people this past month.  They are seeing the Microsoft nag that their operating system is going to expire.  Here is what we know:

YES!! Windows 10 is going to expire on October 14, 2025.  When Windows 10 expires, your system will continue to run but any flaws found in Windows 10 will not be corrected.  You will be on your own.  This is problematic for businesses that have cyber insurance as part of their business insurance.  Most cyber insurance policies want/require computer systems to run on fully patched and currently supported software.  To do otherwise, risks having your cyber insurance deny your claims.  If you are in a HIPAA industry, you have to run on Windows 11 Pro come October 14, or you will not be in HIPAA compliance.

There are two ways to get Windows 11. 

1. If your computer is less than 4 years old, we can do an in-place upgrade.  Our technicians have been roughly 90% successful with this even when Microsoft says your hardware is not compatible.  There are a few computers that refuse to co-operate.  We have no way of knowing which ones will be obstinate before we start the job.  Again, you need to have newer hardware.  Besides the obvious price saving advantage, you also get the advantage of not having to reinstall programs or transfer data.

2. You can purchase a new system with Windows 11 already installed.  It’s a good idea to replace your laptop every 2-3 years and replace your desktop every 4-5 years.  I know IRS says you can depreciate your computer over 5 years but the reality is, a laptop that moves from place to place rarely survives 4 years.  Desktops are less fragile but the new style of hard drives used in desktops and laptops have a nasty habit of dying without notice.  That normally happens 30 days after the warranty has expired.

To complicate matters, Trump has announced tariffs on imports.  The majority of computer parts are manufactured over seas. In anticipation of extremely high tariffs, we have stock piled extra components.  If you would like to replace a computer at pre-tariff prices, come see us.  Once we are out of inventory, the computer prices will definitely be higher.

If you would like to do an in-place upgrade, please make an appointment with the technicians.

Stay Safe, Spend Wisely,

Janet

Because It Made Me Laugh!

Spread the Love

At a fundraising dinner for a school that serves children with learning disabilities, the father of one of the students delivered a speech that would never be forgotten by all who attended. After extolling the school and its dedicated staff, he offered a question:  ‘When not interfered with by outside influences, everything nature does is done with perfection.  Yet my son, Shay, cannot learn things as other children do. He cannot understand things as other children do.  Where is the natural order of things in my son?’

The father continued. ‘I believe that when a child like Shay, who was mentally and physically disabled comes into the world, an opportunity to realize true human nature presents itself, and it comes in the way other people treat that child.’  Then he told the following story:  Shay and I had walked past a park where some boys Shay knew were playing baseball. Shay asked, ‘Do you think they’ll let me play?’ I knew that most of the boys would not want someone like Shay on their team, but as a father I also understood that if my son were allowed to play, it would give him a much-needed sense of belonging and some confidence to be accepted by others in spite of his handicaps.

I approached one of the boys on the field and asked (not expecting much) if Shay could play. The boy looked around for guidance and said, ‘We’re losing by six runs, and the game is in the eighth inning. I guess he can be on our team, and we’ll try to put him in to bat in the ninth inning.’

Shay struggled over to the team’s bench and, with a broad smile, put on a team shirt. I watched with a small tear in my eye and warmth in my heart. The boys saw my joy at my son being accepted.

In the bottom of the eighth inning, Shay’s team scored a few runs but was still behind by three.

In top of the ninth inning, Shay put on a glove and played in right field. Even though no hits came his way, he was obviously ecstatic just to be in the game and on the field, grinning from ear to ear as I waved to him from the stands.

In the bottom of the ninth inning, Shay’s team scored again. Now, with two outs and the bases loaded, the potential winning run was on base, and Shay was scheduled to be next at bat.  At this juncture, do they let Shay bat and give away their chance to win the game? Surprisingly, Shay was given the bat. Everyone knew that a hit was all but impossible because Shay didn’t even know how to hold the bat properly, much less connect with the ball.

However, as Shay stepped up to the plate, the pitcher, recognizing that the other team was putting winning aside for this moment in Shay’s life, moved in a few steps to lob the ball in softly so Shay could at least make contact.

The first pitch came, and Shay swung clumsily and missed. The pitcher again took a few steps forward to toss the ball softly towards Shay. As the pitch came in, Shay swung at the ball and hit a slow ground ball right back to the pitcher.

The game would now be over. The pitcher picked up the soft grounder and could have easily thrown the ball to the first baseman. Shay would have been out and that would have been the end of the game.

Instead, the pitcher threw the ball right over the first baseman’s head, out of reach of all teammates.

Everyone from the stands and both teams started yelling, ‘Shay, run to first!

Never in his life had Shay ever run that far, but he made it to first base. He scampered down the baseline, wide-eyed and startled.

Everyone yelled, ‘Run to second, run to second!’

Catching his breath, Shay awkwardly ran towards second, gleaming and struggling to make it to the base.

By the time Shay rounded towards second base, the right fielder had the ball. The smallest guy on their team who now had his first chance to be the hero for his team.  He could have thrown the ball to the second baseman for the tag, but he understood the pitcher’s intentions so he, too, intentionally threw the ball high and far over the third-baseman’s head.

Shay ran toward third base deliriously as the runners ahead of him circled the bases toward home. All were screaming, ‘Shay, Shay, Shay, all the Way Shay’

Shay reached third base because the opposing shortstop ran to help him by turning him in the direction of third base, and shouted, ‘Run to third!

As Shay rounded third, the boys from both teams, and the spectators, were on their feet screaming, ‘Shay, run home! Run home!’

Shay ran to home, stepped on the plate, and was cheered as the hero who hit the grand slam and won the game for his team

‘That day’, said the father softly with tears now rolling down his face, ‘the boys from both teams helped bring a piece of true love and humanity into this world’.

Shay didn’t make it to another summer. He died that winter, having never forgotten being the hero and making me so happy, and coming home and seeing his mother tearfully embrace her little hero of the day!

A wise man once said every society is judged by how it treats it’s least fortunate amongst them.  May your day be a Shay Day.

In Honor of February, the month notable for Valentines Day, show love to someone less fortunate.

Janet

Tasteless Cookies

Goodbye 2024! Welcome 2025! 

I can’t say I’m going to miss 2024, but I am looking forward to what 2025 might bring. I’m hoping for more cookies.  ~I just received a big box of Christmas cookies from my daughter!  Yum!! But did you know some cookies can be tasteless?  I’m talking about advertising cookies!  You’ve seen them, those annoying popups asking you to accept cookies in order to use the web site.

A little bit of a back story:  Several months ago, I thought I would experiment with one of those services that offers to erase your data from the dark web.  Now I’m a natural born skeptic but I figured the most I could lose would be the 1-year subscription fee.  The best would be to get rid of the annoying phone calls on our land line.  Yes, I still have a land line.  I live in rural America with lots of trees that like to throw branches through the greenhouse roof and block cell signals. The 5 a.m. robo calls are the worst.  They were trying to sell Medicare supplements.  I thought I would trick them and answered affirmative to their questions (even though I’m not eligible for Medicare). I thought if could speak with a person and explain that I’m not eligible, they would stop calling.  I was SO WRONG!  I accidentally inflamed them and we went from receiving a couple of phone calls in the early morning hours to receiving several calls per hour, all day long.  We unplugged the phone.  I checked with my phone provider and they recommended that I sign up at nomorobo.com.  I would like to say that solved the problem.  It lessened the problem, but the real solution was to wait for the Medicare signup period to expire.  Our spam calls are down to just a couple per week now.

Meanwhile, I was receiving reports about all the stuff my “REMOVE ME” service from incogni.com was doing. Getting me off the robo phone call list isn’t something they excel at.  But one of their reports included a link to the hidden costs of using apparel shopping apps.

(https://blog.incogni.com/apparel-shopping-apps-research/)  The report made me throw-up a little (or maybe that was because of an overindulgence of Christmas cookies?)

Regardless, here is the Janet synopsis:  Incogni researched 180 apps belonging to the top apparel brands.  45 of the apps collect your photos, 12 collect videos, 9 search your history, 6 collect your sexual orientation, 24 share photos with third parties, 2 share sexual orientation, 1 shares health information!  What?!  Nike & H&M collect the greatest numbers of data points, including photos, videos and messages!  As expected, and necessary for making online purchases, the email address is the most collected data point. 

Do you have to participate?  NO!  When the popup appears asking you to accept their cookies, say NO!  I’ve never had a site break because I refused to accept the marketing or performance cookies.

I really like the Incogni conclusion:  A mousetrap only works because the mouse doesn’t understand why the cheese is free. Variations of this phrase regularly do the rounds in the cybersecurity and privacy-advocacy communities. The incentives associated with using proprietary apps to buy apparel—or even just the convenience of doing so—come with hidden costs.

It’s arguably easier to tap on an app icon than it is to dig up a bookmark or type in a URL. As our research shows, though, these and other benefits come at a price. Consumers are, of course, free to decide whether the deal on offer is right for them, but this has to be an informed decision. It is our hope that research like this will go some way towards helping consumers get the most bang for their personal data.

At the very least, they should know that the cheese in front of them is demonstrably not free.

That’s cheese for thought this January.  Have a great new year!

Stay Safe and keep your data private.

Janet

Because It Made Me Laugh!

Don’t get Malvertising for Christmas!


“What if Christmas, he thought, doesn’t come from a store. What if Christmas … perhaps … means a little bit more!”  – The Grinch, How the Grinch Stole Christmas


Merry Christmas!  The shopping frenzy has begun and with it, an uptick in malvertising.  

Malvertising is the use of online ads for malicious purposes.  Cybercriminals no longer need to know your email address, login credentials, or anything else.  Instead, they are attempting to fool you into clicking on a search result that looks legitimate.

Malwarebytes explains: Malvertising is not malware itself. Instead, it’s a sneaky process of placing malware, viruses, or other cyber infections on a person’s computer, tablet, or smart phone. The malware that eventually slips onto a person’s device comes in many varieties, but cybercriminals tend to favor malware that can steal a person’s login credentials and information. With this newly stolen information, cybercriminals can then pry into sensitive online accounts that belong to the victim. (https://www.malwarebytes.com/blog/news/2024/02/malvertising-this-cyberthreat-isnt-on-the-dark-web-its-on-google)

This is how it happens: Cybercriminals create ads that look legitimate but when you click the link, they take you to a malicious website.  Nothing on the malicious site indicates that you should “RUN!”  instead it looks and feels like the real thing.  When you click, you get  the infection.

Unfortunately, these ads are embedded in the google search results.  They also are showing up on mainstream websites like Lowe’s and Slack.

Over the Thanksgiving holiday I was reading an article about the best gadgets to give as Christmas gifts this year.  Several of them were interesting and I clicked.  Fortunately for me, Avast Antivirus software closed several of the sites before I had a chance to click on anything. 

Besides a quality antivirus, there are other tricks to limit your exposure.  Next time you google something, notice the results.  The top of the list are “SPONSORED” results.  You have to pay to be listed as a sponsored link.  It’s interesting to me, that cybercriminals are good at business.  They promote their shenanigans the same way a legit business would.  Never click a sponsored link.  Anything that is listed in the Sponsored section is typically listed again below the sponsored section.  Open the site from an unsponsored link.

If you do click a sponsored link, check the web address once you get there.  And check it carefully!  Is it spelled correctly?  Is it plural when it should be singular? 

Just because you trust a site, doesn’t mean you can trust the ads on the site.  The ads are placed by a service that typically has nothing to do with the host site itself.  Avoid the eye candy!  That is easier when you use an ad blocking browser like DuckDuckGo (https://duckduckgo.com) or Brave (https://brave.com).  You can also install Ad Blocking extensions like  AdBlock Plus (https://adblockplus.org).

The goal this year is to spread Good Cheer—not malware!  And taking my cue from television which replays the same Christmas Specials it  has been showing for the past 60+ years, I’m replaying my favorite Christmas play in the box below.

Stay Safe & Merry Christmas!

Janet

There Are Laws Against Stalking


“There’s a fine line between support and stalking, and let’s all stay on the right side of that.” – Joss Whedon


In my youth, I taught computer classes.  My typical schedule was Monday – Thursday, 3 – 9.  This afforded me the luxury of staying home in the morning which gave me time to exercise.  Since riding an exercise bike or jumping on a rebounder is boring, I choose to pass the time by watching TV.  Back in the day, the morning talk shows included Geraldo, Jenny Jones, Phil Donahue.

Exercise is supposed to make you feel better, but in my case, it wasn’t working.  Every morning was a struggle to get out of bed. It wasn’t long until my exhaustion was so complete, that I was too tired to turn on the TV.  After a week of no media, I was feeling better.  I turned on the TV.  My exhaustion returned, with a vengeance!

It was my first personal experience with what is known in the computer industry as “Garbage In, Garbage Out” or GIGO.  Watching the morning talk shows exploit all things deviant was exhausting me. 

I will admit, I am a sensitive person.  I cried when I watched Pinocchio, and I cried every time Esmeralda sought sanctuary in the cathedral in Hunch Back of Notre Dame.  And the kids watched Hunch Back many times when they were little. 

To protect my emotional health,  I’ve setup my computer to limit the uninvited news feeds.  My big concern in doing so, was that I would never know what is going on in the world.  But I found a solution to that as well.  If you are interested in limiting the GIGO in your life, here is what I did:

1. Choose a browser that doesn’t  track you and force feed ads to you.  My favorites are Brave, available at https://brave.com, and DuckDuckGo, available at: https://duckduckgo.com.  Both of these browsers will block ads and stop trackers.  A friend was telling me she is inundated with ads for wedding planning.  She is planning a wedding but the onslaught of ads is making her nuts.  I can think of no good reason to allow anyone or anything to follow me around on the internet.  If they were doing that in real life it would be called stalking. There are laws against stalking!

2. Set your browser homepage to something bland like the duckduckgo search engine. Open your browser of choice. Go to the browser control.  This is always in the top right corner of the screen.  Sometimes it looks like 3 vertical dots, sometimes it looks like 3 horizontal dots and sometimes it is 3 horizontal lines.  Open the browser control and then click on  settings.  Somewhere in here there is a getting started option. All browsers have this feature.  It will allow you to choose what you see when you open the browser.  Scrolling news windows and eye candy with rabbit trials to follow on Microsoft’s default msn.com do not improve my productivity. I do a lot of research.  I especially like the option to continue where you left off.  I can have 20-30 tabs open and turn off the computer.  Next time I open the browser, all of those tabs are still available to me.  Alternatively, you can set it to always open to a blank page, or a set of pages of your choosing.

3.  I want to limit the Garbage that comes in, but I still want to know what is going on the world.  I do that by subscribing to a newsletter.  The two I read daily are 1440 and Morning Brew.

4.  Turn off the personalized ads in Windows 11.  Find Settings.  There are lots of ways to get here.  Click on the start menu and look for it there.  If it is MIA then Right click on the Start menu to find it there.  If all else fails, search for settings by typing “settings” into the search bar at the bottom of the screen.  Once successfully in the settings, look for privacy and security.  I have turned off everything.

These small tweaks have improved my life.  Hopefully, they will help you too.

Happy Thanksgiving,

Janet

Because It Made Me Laugh!

Cybersecurity Awareness Month


“Don’t be scared if you don’t do things in the right order. I didn’t think I’d have dessert
before breakfast today, but hey, it turned out that way and I wouldn’t change a thing.”
Mindy Kaling, comedian


Welcome to National Cybersecurity Awareness Month – also known as October!

I am certain you are sick of being told to use unique passwords and a password manager to protect your online presence.  However, it is the number one tool for protecting your data and identity.  And it’s FREE!  To steal Nike’s phrase:  Just Do IT! (And, yes, the capital I T is intentional.)

Here are some additional suggestions for protecting your identity and finances.

Setup a separate and secret email address to use only for banking, investments and other highly sensitive information.  Don’t share this email address with your friends and colleagues.  One of the benefits of having this secret account is when you get a phishing email from your bank saying there is some sort of problem, you will know it is phishing because it landed in your everyday account and your bank accounts only communicate via the secret account!  If it lands in your secret account, then you can take it more seriously.

You can create a free email account at gmail, but there are no guarantees it will remain secret.  For better security, create a free email account at https://proton.me or https://tuta.com

Want to protect your credit card number?  Use tap to pay.  Most credit cards have added this feature.  When you use tap to pay, the vendor receives a unique token that connects their sale to your credit card, but they never get the actual credit card number.  If they never have your credit card number, they can’t accidentally expose it!  It’s a win-win. 

If you are traveling, avoid public Wi-Fi.   Instead, tether your device to your cell phone data plan, also known as a hot spot, if that is included in your phone subscription.  If you must use public Wi-Fi, do so with a VPN.  Proton.me has a highly rated VPN.  Comp-U-Talk includes the Avast VPN with all antivirus subscriptions and that would cover your laptop. 

Backup your phone.  Backup your computer.  All modern  cell phones have the ability to backup your data to the cloud.  Go into your settings and search for backup.  It will walk you through the process from there.

Your Windows 10 and Windows 11 computers can also backup data.  You will need an external drive.  We have those in stock, swing by and get one if you need one.  Once the external drive is available, on Windows 10 go to Settings -> Update & Security -> Backup.  On Windows 11 search for Control Panel, switch to large or small icon view (top right) and choose Backup & Restore (Windows 7).  Follow the prompts to complete a backup.

Mission critical/business data should be backed up to the cloud.  Comp-U-Talk has several affordable plans for backing up business data.  Give us a holler and we will set it up for you.

Getting the annoying popups about “our site uses cookies”?  Never accept the cookies.  The cookies are tracking you with the intent to directly sell you “stuff” or sell your data to someone else.  It’s OK to say no to cookies!  Your privacy and hips will say Thank You!

Until Next Month,
Stay Safe,

Janet

Because It Made Me Laugh!

Your Social Security Number Has Been Exposed


“If you spend more on coffee than on IT security, you will be hacked.” ~ Richard Clarke


Happy September!!

Let’s start with the big news:  In mid-August it became public knowledge that National Public Data exposed personal data of 2.9 Billion (yes! Billion, with a “B”) people.  The exposure was actually found on the dark web four months earlier.  On April 8 the cybercriminal group (USDoD) posted the data for sale for a measly $3.5 million.  (https://news.bloomberglaw.com/privacy-and-data-security/background-check-data-of-3-billion-stolen-in-breach-suit-says)  Unfortunately, no one anted up with the $3.5 million and the cybercriminals had a change of heart.  They started giving the data away for free!  (https://www.komando.com/news/security/national-public-data-breach-how-to-protect-yourself-and-your-ssn/

On a side note, inquiring minds would like to know:  Did the criminals remove their personal data and that of their loved ones from the list before giving it away?  Do cyber criminals have loved ones?  If they did scrub the data, can we use AI to reverse the list and figure out who is missing from the list (and then arrest them)?  Just curious!

After reading numerous trusted sites, I have learned the breach was a result of accidentally posting a list of usernames and passwords for administrative access to the database on the internet.  (https://krebsonsecurity.com/2024/08/national-public-data-published-its-own-passwords/) Note to everyone:  This is why we use password managers.  Keeping spreadsheets with passwords is very risky!  Need a password manager?  Call me.  I’ll give you the first month for free!

What has been exposed?  Full name, current and past addresses, social security numbers, some email addresses and information about relatives, including some who have been deceased for years.  Having your social security number exposed is the largest of threats.

Want to see if you are on the list?   Check out https://npd.pentester.com/search  Full disclosure:  I have not hired pentester.com to scrub my data.  I’m not certain anyone can remove data from the dark web.  Pentester can tell you if you are exposed.

The most important step to protection is freeze your credit.  This is a pain in the rump, but trust me, this pain is way more enjoyable than trying to reclaim your credit history after someone fraudulently pretends to be you.  Kim Komando did a really nice job of laying out how to contact the three credit bureaus here:  https://www.komando.com/tips/money/instructions-to-freeze-your-credit/

Other Things to Watch For:
Watch your bank and credit card statements like a hawk. Change your passwords.  While you are at it, change the passwords on your email accounts too!

Medical Explanation of Benefits (EOB):  Watch for services you did not receive and notify health care facilities and insurance companies immediately if you see false charges.

Urgent Emails: Double check and then triple check the sending address.  If you are replying, verify the address before you hit send. It is easy to spoof an email address and even easier to modify a signature line.    If there is any doubt, manually lookup the address and/or phone number and call them.  DO NOT trust the signature line!

If you have loved ones,  please share this!

Until Next Month,
Stay Safe,

Janet

End of Life


“You better live every day like your last because one day you’re going to be right.” –Ray Charles


It’s time to talk about a really difficult and emotional  subject:  End of Life.  Fortunately, we are not talking about my End of Life, and hopefully, we aren’t talking about your End of Life.  God, in His mercy, didn’t tell us when we are due to expire.  Microsoft, on the other hand, is playing god of the software universe and they have told us when their products are going to expire. 

The expiration dates are referred to as “End of Life”.

What does “End of Life” mean in the world of software?

Unlike the mystery bowl in the back of your refrigerator, it does not mean your computer will suddenly grow green and moldy.  It does mean that Microsoft will cease to love and care for it.  Continuing to use the software is “At Your Own Risk”.

I asked AI to summarize what that means, and here is the response:

Security:  After end-of-life, software is no longer patched or updated, leaving it vulnerable to security risks and exploits.

Compatibility: Old software may not be compatible with new hardware or new operating systems.

Compliance:  Continued use of outdated software may violate industry regulations or legal requirements.

Support: Vendors stop providing technical support, making it difficult to resolve problems.

Insurance Woes:  Cybersecurity insurance providers often view the continued use of outdated software as a potential risk, as it can increase the likelihood of a security breach or data loss. This is because outdated software may have unpatched vulnerabilities that can be exploited by cybercriminals. 

When assessing risks, insurers may consider factors such as:

· The type of software and its end-of-life status

· The sensitivity and value of the data being protected

· The organization’s overall cybersecurity posture and practices.  Continued use of outdated software may lead to higher insurance premiums, reduced coverage, or even denial of coverage in some cases. It’s essential to maintain up-to-date software and follow best cybersecurity practices to minimize risks and ensure comprehensive insurance coverage.

I am not an insurance agent, so please, consult with your cybersecurity insurance expert to understand the specific terms and conditions of your policy.

Why do I mention this now?  Windows 10 expires in 14 months but the nagging popups are happening now.  Replacing an aging computer is a pain in the rump and it’s not free either!  Hopefully, this will give you time to plan and budget.  Comp-U-Talk would love to be a part of the replacement/upgrade process.

Give us a call.  We will put you on the schedule.

Janet

Create a Video Using Snipping Tool


“I need a six month vacation, twice a year.” – Unknown


Last month we chatted about the need for using in private browsing and purchasing plane tickets for the summer vacation.  We all love vacations, however the problem with vacations is either your job waits for you to get back, or a co-worker attempts to fill in for you.  The co-worker filling in for you can be a blessing or a curse, depending on how well they are trained.    So I thought I would introduce you to a training tool.  It’s called the snipping tool.  It’s been around for decades but Windows 11 ramped it up and turned it into a video recorder.

Lets Get Started:

windows search

In your search bar type snipping tool.

Click on the Snipping Tool App

snipping tool

There are two main modes in the snipping tool.  You can take screen shots (still pictures like all of the examples you see in this newsletter),

camera

or you can record videos.

video

Choose pictures or videos and then click New.

new button

Use the mouse to draw a box around the desired area to capture.  If you are taking screen shots, the area selected will appear in the snipping window and you can use the features on the snipping tool ribbon bar to circle, highlight, save and copy the image.

If you are recording a video, select an area of the screen to capture (drag the mouse to form a box) and click start.

start-record

When you are finished with the recording, click Stop.

stop-record

Your videos automatically save to the Screen Recordings Folder which is a sub folder of videos.

Next time you are doing a complicated project, record it and share it with your co-worker.  It will make coming back to work after a vacation way less stressful!!

Happy Summer,

Janet

What to do with the Beach Balls after returning from a beach vacation.

beach balls with eyes

Internet Privacy


Privacy is not an option, and it shouldn’t be the price we accept for just getting on the Internet.
~Gary Kovacs


Welcome to June and the start of summer.  Hopefully you have an awesome vacation planned.  Every couple of years, we fly to Ohio to visit with Neal’s family.  The tedium of finding plane tickets always lands on my to-do list. Something I’ve noticed over the years is the price of plane tickets can change, sometimes dramatically.  If I want the best price, I need to be ready to purchase immediately, checking back the next day might be harder on my wallet.

But there is something that might help with that.  Microsoft Edge calls it InPrivate browsing.  Chrome refers to it as Incognito. Brave and Firefox refers to it as a Private Window.  All browsers have this capability.  I’m going to refer to this as the “Privacy” feature.

What does the “Privacy” feature do?

Basically, it “forgets” things.  It forgets to keep a record of which websites you visited, what videos you watched, what forums you posted to.  It forgets to save the cookies the website would normally leave, it forgets user names, passwords and information you may have plugged into forms while working on the web.  It will remember (save) everything you download or bookmark. 

Why on God’s Green Earth would you want to forget things?  Here are some examples:

· Are you using a friend’s computer, or a public computer at the library or hotel? Using a private browser on a shared computer will prevent other users from viewing your  search records and browsing history and keeps your passwords from being saved on that device.

· Accessing Several Gmail Accounts? Open each Gmail account in a private tab to effortlessly switch between the accounts without the need to constantly sign in and sign out.

· Gift Shopping? You can keep your ideas and purchases a secret.  The annoying ads for what you were shopping for won’t follow you for the next several weeks.

· Researching a delicate topic? A private browser may save you from embarrassment or revealing a health concern.

· Vacation Planning? Looking for airfares and travel accommodations,  a private browser may help by disabling web tracking — which means ticket sellers are less likely to hike those fares.

What does the “Privacy” feature not do?
Just because the workstation forgets where you have been, don’t assume you can get away with murder.  There are still ways for your employer, your internet service provider and government agencies to track your activities by your IP address. 

Where to find the “Privacy” feature

browser menus

Open the menu on the top right corner of the browser.  It will either be three bars or three dots as pictured above.  Click on the appropriate option at the top of the menu.  You will know you have successfully entered the “Privacy” state because the browser will display a splash screen saying you have entered the “Privacy” mode.

Conclusion:
And you thought forgetfulness was an age related disease!  Sometimes forgetting is a good thing!  Have a great summer and travel safe!

Janet

Possible Vacation Destinations

vacation Destinations

May is National Small Business Month


The difference between stupidity and genius is that genius has its limits.  ~Albert Einstein


May is national Small Business Month.

Some interesting facts about small business, compliments of https://nationaltoday.com/small-business-month/

  • Small businesses account for 99.9% of all U.S. businesses.
  • Small businesses create 1.5 million jobs annually
  • Approximately 70% of small businesses are owned and operated by a single person.
  • It takes just six days to start a business in the U.S.
  • Only 50% of small businesses survive for the first five years.

I’m proud to say Comp-U-Talk has surpassed the 5 year mark by 35 years.  We celebrated 40 years in January. 

Know what closes businesses?  There’s the obvious: death and poor health, bad financial management, and the not so obvious: Cyber Attacks. 

According to some studies, the impact of a cyber attack on small businesses can be significant. For instance, a report by the U.S. National Cyber Security Alliance found that 60% of small businesses close within six months of a cyber attack.

What’s it take to prevent a Cyber Attack?  A multi-faceted approach is best. Here are the key strategies:

1. Educate and Train Employees.  Often, cyber attacks exploit human error and ignorance.  Regular training can help employees recognize and avoid potential threats.  And it’s cheap, just $3/month. 

2. Implement Strong Password Policies.  Complex passwords and unique passwords for every site is a must.  A password manager makes this easy. 

3. Keep your software updated.  Microsoft releases patches to its software on the second Tuesday of every month and critical patches are released as soon as a potential exploit is discovered.  Chrome, Firefox and Adobe release updates on a regular basis as well.  Keeping these updated reduces your risk for a breach.

4. Install Antivirus and Anti-Malware Software.  Paid versions are proactive in protecting your system. 

5. Secure the Network.  Firewalls are critical.

6. Encrypt Data.  This is a security technique used to protect data by converting it into a format that can only be read by authorized parties.  Windows 10 and Windows 11 have the ability to encrypt data.  It is not on by default.

7. Backup your data.  The best backups are automated.  They run every day at the same time.  It’s a good idea to keep these backups offsite or in the cloud.  I’ve seen multiple instances of local, onsite, USB backup drives being wiped out in a ransom attack.  It makes grown men (and women) cry.

8. Monitor for suspicious activity.  There are services that can watch for suspicious and unusual activity on your network.  They are affordable.

You can do all of this on your own.  It will take you some time to lookup and implement the processes and then you need to keep on top of it so it stays current.  Alternately, you can hire Comp-U-Talk to stay on top of it for you.  We are experienced, have already sleuthed out which tools work best and provide the best bang for the buck, and unlike you, we actually enjoy doing this!  Give us a call today.  We would love to  help you out!

Janet

I’m Planting Corn this Year!!

Spring Cleaning


You know what would make spring cleaning a lot more fun?
 A   MAID!


Spring is here!! Last week I did a tribute to John Denver.  I played “Sunshine on My Shoulders Makes Me Happy!” multiple times throughout the day.

I’m curious how many of my readers are going to google “Sunshine On My Shoulders”.  Respond back and let me know.

Anyway… On to more traditional spring activities… cleaning.  If you’ve got the spring cleaning bug here are some tips for spiffing up your computer.

To clean a LED or LCD  monitor:  LED and LCD montiors are skinny, this is most probably what you have, you will need a microfiber cloth and maybe, some distilled water.  Don’t use Window Cleaners (I know it’s tempting because it has Windows right there in the name!) or other kitchen cleaners, makeup remover is a bad idea, as is dish soap and hand soap. 

It’s best to clean the screen without the use of liquids and definitely turn the computer off.  Use a gentle, circular motion with a microfiber cloth to clean the screen. If this doesn’t get all of the grime off, then add distilled water.  I  never spray anything directly on to the screen. Instead, spritz the cloth and then wipe the screen.

While the frame and base are less sensitive, I recommend using the microfiber cloth and distilled water.  You’ve already got it out, take a couple of extras swipes and clean the frame.

Keyboards need love too.  If you are working on a desktop computer, turn it off and unplug the keyboard.  You can lay down a towel to catch the dirt, or go all commando and dump the dirt onto your desk or floor. Turn the keyboard over and GENTLY, I said GENTLY, shake it the get the big crumbs off.  If you are cleaning a laptop keyboard, skip the shaking and just turn it over.  Shaking a laptop can be hazardous to its health.  Now that the big stuff is gone, grab a portable vacuum cleaner and suck the rest of the grime from the keyboard.  Avoid using a full sized vacuum, as they have stronger suction and can pop keys off of the keyboard.  A Q-Tip dipped in rubbing alcohol will get the grime between the keys.  Again, don’t pour liquids onto your keyboard.  Pour a teaspoon of rubbing alcohol onto a saucer and then dip the Q-Tip there.

If you have a desktop computer, remove the side panel, grab a can of compressed air and blow the dust out.  If there is enough dirt inside the computer to grow panseys, then pack it outside before you clean it.  Give the fans a good blast, if gunk is stuck to the fan blades, then use the microfiber cloth to clean them.  Your goal is to blow the dirt out, not in, so point the nozzle accordingly.  The inside of the computer is sensitive to static, so touch the metal computer frame to discharge static before you touch anything inside. 

If you would rather leave the cleaning to the professionals, then bring it in.  Besides cleaning the physical machine we will also clean the operating system, removing temp files and turning off all sorts of random services that don’t need to run constantly. De-gunking the operating system will make the computer run faster.  Normally, we charge $95 for this service, but for the month of April, we will help you out for just $45.  Come see us.  We can sing “Sunshine On My Shoulders Makes Me Happy”, together!

Janet

Because It Made Me Laugh!!