No One Likes a Nag. Make Them Stop in 6 Easy Steps.

We can’t help everyone, but everyone can help someone. ~Ronald Reagan


Well I don’t know about you, but I’m very glad to have February behind us. The cold, the rain, the floods! I’m so ready for warmer weather. Besides the weather, February’s complaint was: Where are those annoying pop-ups coming from and how do I stop them?

If you use the Chrome browser, you might be wondering the same thing. The pop-ups are called notifications and they appear in the lower right corner of the screen. Sometimes they close automatically, sometimes they have to be closed manually, and frequently they are an interruption to the task at hand.

Typically, the sites sending notifications have asked permission to do so, and typically you didn’t realize what an annoyance it would become when you agreed. So without further ado, here are the steps to turn them off:

Chrome-3 dots1-These are native to Chrome, so open up the Chrome Browser and click the triple dots in the top right corner

2-Choose Settings from the drop down menu

Chrome-Advanced3-Scroll to the bottom of the settings page and click on Advanced

4-Scroll down to Content Settings, click on the right pointing arrow

Chrome-Notifications5-Scroll down to Notifications and click on its right pointing arrow

6-The items under the Allow Section are the notifications that may or may not be driving you nuts. Use the triple dots to the right to block/edit/remove

Chrome-allow-block

That’s it for this month. Until Next Month, remember to Keep Your Data Safe!

~Janet

 

 

Ploy or Good Idea?

Just realized the weather must have froze my brain.  February’s post never made it to the blog.  Here it is now.  The March post is coming soon.


Simply put it is possible to have convenience if you want to tolerate insecurity, but if you want security, you must be prepared for inconvenience”  General Benjamin W Chidlaw, December 12, 1954


It’s February 1st and my daffodils are beginning to show yellow. It takes all of my self control to not take a picture of them and send it to my sister in Wisconsin. Temps in Wisconsin have been in the –20 to –40 (with wind chill) range this week. Really, I don’t understand why people live in climates like that. Although it does give them a valid excuse to stay inside and play on their computers. Which brings me to this months subject.

After receiving this pop up, a customer asks: “Is this just AVG’s ploy to get me to pay for upgraded software or what?  And what do those four items really mean?”

AVG Upsell

The short answer is, “Sort Of”. AVG is trying to get you to upgrade to a more secure program. Like all businesses, they do need to sell product in order to keep the light bill paid. But they are also warning of possible ways you can be compromised.

Do you remember CB radios? They were really popular during the 70’s. Or party line telephones from the 60’s? If you tuned your CB to a particular channel, you could listen in on anyone’s conversation. Same for the party line telephone services. I remember Mom angerly confronting the neighbor because said neighbor would eaves drop on mom’s conversations. Mom knew because she heard “Hey! Madge! I’m Home!!” Madge was the neighbor, and not the neighbor mom was conversing with.

Well, wireless signals are sort of like the CB radios and party lines of old. With the proper hacking tools (available on the internet), degenerates can sit in your driveway or down the street, and watch/listen what goes across your wireless network. If you are casually surfing the net, then there’s not huge amounts of worry. Similar to someone reading over your shoulder, it’s annoying, but probably not life threatening. However, if you are shopping, or paying bills, you’ve got a potential problem. Your account numbers could be seen, and potentially used, without your consent. So how do you protect yourself? The first tool that comes to mind is VPN. VPN is an acronym for Virtual Private Network. In English, a VPN creates a tunnel between you and your destination and hides all of the data passing thru. It can also route your data through various servers, effectively hiding your location. There are multiple brands of VPN’s to choose from. We are partnered with AVG and Avira. If you would like to help us pay our light bill, we can reciprocate by providing an appropriate subscription.  

Until Next Month, remember to

Keep Your Data Safe!

Janet

Happy Anniversary to ME!!!

Fun Fact: The number of exclamation points now necessary to convey genuine enthusiasm online is, according to most internet users, three!!!   ~ https://tinyurl.com/y9a53w42


Thirty-five years ago, I was faced with a decision: Unemployment or Self-Employment? Both options were terrifying! So, I made a deal with God. I promised to be self-employed but God had to keep the bills paid. I’m pleased to announce: 35 years of bills have been faithfully paid.

Lots of things have changed over the past 35 years. I still remember my mentor telling me he would never outgrow a 10 Meg Hard Drive. That still makes me smile. I frequently get calls from people in distress because the file they are trying to email is larger than 10 Meg and their email provider has a 5 Meg limit.

Computers are much smaller and much faster and much more fun than they were 35 years ago. My first computer was a portable, although calling it a luggable was much more appropriate. It had 2-5.25” floppy disk drives, no hard drive and weighed about 30 pounds. The screen had awesome green characters on a black background; No horrible amber letters for me!

Today I carry a computer in my back pocket. It has a 5” screen, weighs less than a pound and lets me make phone calls, read email, look up stuff on the internet and play games.

Technology has made significant changes over the years. Unfortunately, not all of them have been good. It doesn’t much matter if you talk computer technology, medical technology, advancements in transportation, or even education. Whenever something good comes along, there will be some small segment who will figure out a way to use the good for something evil. Computing is no different. 2018 saw it’s share of bad via data breaches.

In November, Marriott announced that as many as 500 million people were affected by a data breach. In September, Face book announced it had accidently shared 30 million users’ data. The City of Atlanta was crippled by ransomware in March. Russian hackers launched cyberattacks on the Olympics in February. And in October, our beloved Google admitted to exposing the data of 500,000 users of Google+. https://tinyurl.com/y7a8kyf4

What’s a discerning computer user to do? Chances are, your data has been exposed. You can verify here: https://haveibeenpwned.com/. If your data has been breached, I highly recommend changing passwords for the breached accounts. If you are responsible for others’ data, i.e. customers, vendors, employees, a good firewall is imperative. Employee education is highly recommended and affordable. Our colleagues at KnowBe4.com report that email is still the #1 attack method. They say 92% of malware is delivered by mail.   https://tinyurl.com/y6wo6hft You don’t want to be the cause of a data breach. If you would like personal training, let me know. I’m considering putting together an official class. I will add your name to my list.

Are you interested in seeing a more comprehensive list of data breaches? Check out: https://en.wikipedia.org/wiki/List_of_data_breaches

Until Next Month, Happy New Year and remember to

Keep Your Data Safe!

~Janet

Because it Made Me Laugh!

no calculator

It’s Beginning to Cost A Lot Like Christmas!

Spammers & Fraudsters are running rampant this season. Be cautious while surfing and shopping on line this holiday season.

Merry Christmas!! May your Holidays Be Merry & Bright and Fraud Free!

I received a major shock last week. I gleefully went to the bank to deposit a check into my checking account. The teller asked if I would like to know my balance. I gave her a mystified “Why?” look, and told her what the approximate balance should be. To my surprise, she replied back: “Well it isn’t.” That got my attention. The account was more than $800 less than it should have been. With a little bit of investigation, I discovered I had unknowingly purchased three reservations with AirBnB.com. It is the Christmas Season, so I checked with Neal to see if he was planning a Vacation Surprise Get-Away for me and was disappointed to learn that he was not. Bummer!!

Bigger Bummer: Someone got ahold of my debit card number and successfully made three purchases without using the PIN. I didn’t know you could pretend your debit card was a credit card. So that’s my first lesson. (auto correct just changed my lesson to a lesion—how funny is that?) I immediately cancelled my debit card, I never use it anyway. Somewhere in my past I was told it is nearly impossible to dispute a charge on a debit card, where as you can dispute any charge on a credit card, so I have always preferred to use credit cards. The only reason I have a debit card is because I was required to make three purchases with the debit card in order to claim the $75 spiff for opening a new account. I used the card three times to claim my reward, and haven’t used it since.

Next up: I disputed the charges with the bank. They plainly list on the statement that the charges were made via my debit card WITHOUT using a PIN. The bank tentatively put the money back into my account. Then I was off to AirBnB. The first attempt, in the early afternoon, was a frustrating merry-go-round of phone trees that resulted in me giving up and hanging up. I tried again in the early evening and was successful at finding someone to talk to, albeit, the English was a little rough. A few keystrokes on their side and they figured out that I have never used AirBnB. They did see that I made a reservation many years ago and then cancelled it. They also refused to tell me where I was staying or when I could check in. “Privacy Issues”, they said. I’m not certain how they can use my money and then not tell me what I bought, but I digress! The end result was AirBnB decided the charges were fraudulent and gave me back the money.

Why do I tell you this? It’s the Christmas buying season. You need to be wary of scammers. They are working overtime. The windows scam team called me twice, ON THANKSGIVING! If you are reusing passwords, STOP. A password manager can ease the burden of keeping track of many passwords. I use Dashlane, available at https://dashlane.com. Don’t open email attachments unless you are expecting the attachment.

If something does slip in and you need help eradicating it, please keep us in business. Bring your system in and let us fix it for you.

Keep Your Data Safe!

Janet

 

Because It Made Me Laugh!

 

 

Holiday Season is Here. Scammers are Working Overtime.

“As we express our gratitude, we must never forget that the highest appreciation is not to utter words, but to live by them.”– John F Kennedy



First: A Public Service Announcement:

I joined the Soroptimist last month. This is a women’s organization with a mission to improve the lives of women and girls. The Soroptimists sponsor events like The Safe Project-Dignity Bags, Community Baby Shower and Backpack for Kids. Now thru November 9, we are having a fund raiser. One dozen beautifully boxed florist carnations can be hand delivered (inside Coos Bay-North Bend city limits only) to someone special for $20. You can add 1/2 pound of Fire House Fudge for an additional $10. The delivery will happen on Friday, November 16. If you would like to bless someone with flowers and/or candy, and also bless the underprivileged in our community, give me a call or drop me an email.   I will complete the appropriate paperwork to make it happen on your behalf. And “Thank You” in advance for sharing with the less fortunate in our area.

Second: Halloween is over.

The Holiday Season has officially started. Your inbox is going to be inundated with ads, and scammers are going to be working overtime, so lets review proper email habits.

Colleague, Jack, over at vpngeeks.com brought this to my attention: 30% of phishing emails in the U.S. are opened and 12% are actually clicking on the attachments. They look like they are coming from your bank, Apple, PayPal, etc. and they are asking for sensitive information. Many times they will have Microsoft Word or Excel Attachments.   DO NOT, DO NOT open these emails. Why? The attachment will contain scripts which will use any variety of methods to obtain their goal. Any personal information they obtain will be sold for $0.20-$15. (They get so little while the victim gets exponentially more in grief.)   If ransomware is the end result, you can expect to pay an average of $1077. Also, a high price to pay to reclaim your data! I might suggest that if you have $1077 in disposable income to spend, you should bring it to me and buy a really nice computer. “Thank You” in advance for spending local and keeping us in business.

That’s the skinny for this month. The staff at Comp-U-Talk wishes you a Blessed Thanksgiving.

Keep Your Data Safe!

Janet

Because it Made Me Laugh

Turkey Chillin'

Plan Now to Save Later


I am not a product of my circumstances. I am a product of my decisions.

~Stephen Covey


I can’t believe Fall is here. Where did this year go? As we start the final quarter of the year, it’s time again to think about minimizing the tax bill. One way to do that is with the purchase of new equipment.

Besides tax benefits, there are other benefits to replacing aging servers and workstations. IDC studied mid to large businesses last year and found that businesses that refresh hardware more frequently were able to reduce operating costs which in turn, increased revenues.

Now, if you are like me, you might be thinking: “Who is IDC? And why should I care about their study? Anybody can do a study! After all, my dog did a study and he has determined that the side yard makes a perfect rest area, and the back yard is a lousy bedroom!”

So for the hesitant: IDC stands for International Data Corporation and their website states they are the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. They offer global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. (www.idc.com/about) You can read all about their study here: https://tinyurl.com/y6w6apby

Back on topic, IDC listed these reasons contributed to the savings:

  • new hardware is more efficient and more reliable
  • like vehicles, older computer equipment is more expensive to maintain
  • new hardware/software improves employee productivity thru faster processing

And a new reason to consider replacing hardware sooner rather than later: Trade Tariffs. The majority of computer components are manufactured in China. We are expecting to see component prices increase anywhere from 10% to 25%.

With these reasons in mind, if you are using equipment that is over 3 years old, I recommend you start planning and budgeting for its replacement. Current workstation pricing is here. And if you are replacing a server, give us a call and we can assist with the sizing and licensing requirements for your specific needs.

Keeping Your Data Safe!

Janet

Because it made me laugh:

German Shepherd had 9 pups

Cyber Crime, Are You At Risk?

“There are only two types of companies: those that have been hacked, and those that will be.”

Robert Mueller, FBI Director, 2012

Motivations: Cyber Crime, Cyber Espionage, Cyber Warfare, HacktivismCyber Crime: criminal activity or a crime that involves the Internet, a computer system, or computer technology: identity theft, phishing (dictionary.com)

Cyber Espionage: a form of cyber attack that steals classified, sensitive data or intellectual property to gain an advantage over a competitive company or government entity: Russians influencing the election, spying on the DNC. (carbonblack.com)

Cyber Warfare: virtual conflict initiated as a politically motivated attack on an enemy’s computer and information systems. Attacks disable financial and organizational systems by stealing or altering classified data. (techopedia.com)

Hacktivism: the practice of gaining unauthorized access to a computer system and carrying out various disruptive actions as a means of achieving political or social goals: a hacker tries to alter or deface a website. (dictionary.com)

 

The following statistics are from https://www.comparitech.com/vpn/cybersecurity-cyber-crime-statistics-facts-trends/ & https://www.comparitech.com/identity-theft-protection/identity-theft-statistics/

 

  • An attacker resides within a network for an average 146 days before detection.
  • A University of Maryland study found that hackers are attacking computers and networks at a “near-constant rate”, with an average of one attack every 39 seconds.
  • 43 percent of cyber attacks against businesses worldwide target small companies.
  • According to a CSID survey, 52% of small businesses don’t invest in cyber risk mitigation, believing that they don’t store any private information. However, 68% at a minimum store email addresses, which is one potential entry vector for hackers.

 

Worried about your security? We have tools. We can help.

 

Keeping Your Data Safe!

 

~Janet

Because It Made Me Laugh!

Stolen Identity

Do You Know Where Your Password Is?

What we see depends mainly on what we look for. ~John Lubbock


Wanna see what showed up in my inbox last month?

From: Eada Amis <vzladrienmj@outlook.com>   (just a side note: eada means wealthy, amis is French for friends)

Sent: Monday, July 23, 2018 6:27 PM

To: me@??????.com

Subject: janet – MyRealPassword

Lets get directly to the purpose. None has paid me to investigate about you. You may not know me and you are most likely thinking why you’re getting this e mail?

In fact, I setup a software on the 18+ videos (porn material) site and do you know what, you visited this website to experience fun (you know what I mean). While you were viewing videos, your browser began operating as a Remote Desktop with a key logger which provided me with accessibility to your screen and web camera. Just after that, my software gathered your complete contacts from your Messenger, Facebook, as well as e-mail . Next I made a double video. First part shows the video you were watching (you have a nice taste hahah), and next part displays the recording of your web cam, & its u.

There are two different solutions. Lets read up on these types of possibilities in details:

1st alternative is to just ignore this e mail. In such a case, I most certainly will send out your very own video clip to every single one of your contacts and then think concerning the disgrace you will definitely get. In addition in case you are in a committed relationship, exactly how it can affect?

Other option would be to give me $7000. We are going to call it a donation. In this scenario, I will straightaway erase your videotape. You can carry on with your way of life like this never took place and you are never going to hear back again from me.

You will make the payment through Bitcoin (if you don’t know this, search “how to buy bitcoin” in Google).

BTC Address to send to: 1qLu2Nc9VYY2ZciPwqKVH7HAGbdGYG4Ge [CASE-SENSITIVE, copy and paste it]

If you may be making plans for going to the cop, very well, this email can not be traced back to me. I have taken care of my moves. I am not attempting to demand very much, I just like to be paid. You have one day in order to pay. I’ve a special pixel in this email, and right now I know that you have read through this email message. If I don’t get the BitCoins, I will certainly send out your video to all of your contacts including close relatives, co-workers, and so on. Nonetheless, if I receive the payment, I’ll erase the video right away. It is a nonnegotiable offer and so do not waste mine time & yours by responding to this email. If you want proof, reply with Yes! then I will send your video to your 5 contacts.

Just to keep the record straight: I don’t hang out on porn sites. I don’t own a web cam. I have way more than 5 contacts. I didn’t buy any bitcoin. I did freak out a little. I did change several passwords.

Want to know how they got my password? Or better yet, do they have your password? Head on over to https://haveibeenpwned.com and get the results for yourself.

As always, if we can help you with your computing needs, please give us a call.

Keeping Your Data Safe!

 ~Janet

 

How the Spammer is Planning to Cover Her Tracks!

More Secure Internet Headed Your Way

Don’t let the noise of others’ opinions drown out your own inner voice. ~Steve Jobs

Changes are a coming! Starting approximately July 22, Google will release a new version of it’s popular Chrome web browser, affectionately named Chrome 68. (Good thing Google can’t give birth to real babies! I’d hate to see them named Boy 1 and Boy 2. But I digress.)

The new release is going to mark a lot of web sites as “Not Secure”. Currently there are two types of web sites, HTTP and HTTPS. And just in case you are curious, HTTP stands for HyperText Transfer Protocol. HTTPS stands for HyperText Transfer Protocol Secure.

In English, HTTP means any data being communicated between your computer and the website server is transmitted in plain text. If someone intercepted the communication, they would easily be able to see the information you are viewing and sending. This becomes a huge problem when the data you are transferring contains credit card numbers, passwords, private information.

HTTPS corrects this problem. The Secure transfer uses something called Secure Sockets Layer (SSL) and Transport Layer Security (TLS) to encrypt and transfer the data, rendering it nearly impossible for spying eyes to read. HTTPS has been a requirement for years on any site that collects credit card data. Google Chrome is already noting HTTP sites that collect data via user forms as “Not Secure”, but starting later this month, they are going to mark all HTTP sites as insecure, regardless of what data is on the site.

What does this mean to you? First, if you are a Chrome fan, you will start to see more “Not Secure” messages popping up as you surf the web. You will also notice faster response from the web. I was delighted to learn that encrypted traffic displays approximately 90% faster than unencrypted traffic. You can test this yourself at: https://www.httpvshttps.com/.

Not a Chrome user? You can expect other browsers to follow suit.

Second, if you have a web site for your business, you will want to secure it. This is done by purchasing an SSL certificate and then working through the steps to install it on your web site. If you would like assistance with the process, please give me a call. I’ve done a few, and have access to affordable SSL’s. You might believe this is a big hassle. You would be right. It is a hassle, but if your web traffic is important to you, I suggest you do it anyway. I was surprised to learn that roughly 60% of all internet traffic is coming through Chrome. (https://en.wikipedia.org/wiki/Usage_share_of_web_browsers). Displaying a big red warning sign to 60% of potential customers might not be the best decision. I’m here to help if you need me.

Keeping Your Data Safe!

 ~Janet

Because it made me laugh:

 

Choosing My Nursing Home

Don’t downgrade your dream just to fit your reality.   Upgrade your conviction to match your destiny. ~Stuart Scott

It’s June! And for a lot of people that means a vacation is just around the corner. I was searching for an original vacation destination and look at what I found. Affectionately called “The Pad”, this 24-story building in Dubai is scheduled to open sometime this year. It was purposely designed to look like a giant iPad sitting in a charging dock. The building is even tilted 6.5 degrees. James Law is the architect. Law aims to fuse technology, software and architecture to create structures that are more responsive to the needs of people. He calls this approach “cybertecture” (as opposed to architecture).

When finished, this building will host 231 “intelligent” apartments with the ability to monitor health, control air filters, monitor security and each apartment will sport a virtual reality wall. The virtual reality wall can project a variety of different world destinations (like a movie screen) or be used to video chat with friends and family. Lights and music can be customized to mirror the moods of residents. (Watch out, if momma ain’t happy….)

When my kids were little, they had no respect for bathroom time. Seems every time I entered, they would need something immediately. Bathroom privacy was not an option. Same is true of this building. The bathroom will monitor weight, blood pressure, internal temperature and “other metrics” (whatever that means) and then display said info on the mirror. I already know I’m fat. Again, I say: if momma ain’t happy…. Although, I can see this bathroom as a wonderful asset in every nursing home in America.

You can read the full article and see all of the pictures here: https://tinyurl.com/y8p62e75

So why did I choose to write about a building in Dubai? No particular reason. Guess I’m enamored with all things tech, although I have to say, I think this one is a little bit over the top. But it is in Dubai. Rumor has it, Dubai is pretty extravagant.

It doesn’t matter if your tech needs are as extravagant as “The Pad” or more mundane, I invite you to work with Comp-U-Talk. The slower pace of summer can be the perfect time to upgrade/expand servers and workstations, clean out old files and implement offsite backups. And while I don’t recommend you purposely build your offices at 83.5 degrees, I can recommend some fabulous contractors who might welcome the opportunity to construct something that isn’t Plumb-Square! (And then again, they might want to hurt me, for even suggesting such a thing!)

Keeping Your Data Safe!

Janet

 

Because It Made Me Laugh:

Encryption Can Be Your Friend

“If we did all the things we are capable of, we would literally astound ourselves.” ~ Thomas Edison, Inventor

April was filled with lots of questions about PCI compliance. For the uninitiated, PCI DDS is the acronym for Payment Card Industry Data Security Standard. It came about as a result of numerous data breaches at entities like Equifax, Target and Facebook to name a few. When sensitive data is leaked, credit card companies are not happy. Customers are not happy. Criminals are happy. Or at least I presume them to be. I haven’t actually asked them. Maybe I should launch one of those Monkey Surveys and find out. Anyway, the point is:

Any business or person that accepts credit card payments is now required to show due diligence toward protecting customer credit card information. Even if you don’t accept credit cards, you are expected to protect personal data of employees, students, vendors, clients… Personal data includes things like address, phone numbers, social security numbers, account numbers, mother’s maiden name… You get the drift.

So the question becomes, How do you protect this information?

One way to protect is to encrypt. I’ve talked about encrypting before. But only in the negative. Before, I’ve mentioned ransomeware that invades your system, scrambles your data, and leaves you high and dry. But encryption can also be used in your favor.

What is Encryption?

Encryption is the process of encoding data in such a way that only authorized parties can access it.   It requires the use of an encryption key (think fancy password). If you don’t have the encryption key, you can’t read the data.

3 Simples Questions to determine if you should Encrypt the data:

  1. If this data was on piece of paper, would you shred it?
  2. If this data was leaked, lost or stolen, would your business or its reputation be negatively affected?
  3. If this data was leaked, lost or stolen, would your customers, clients, vendors be negatively affected?

If you answered YES to any of the above, then you should encrypt!

How do you Encrypt?

I went searching for tools that will encrypt data. First up is Windows 10 and it’s built in BitLocker.   I would like to say it was a huge success. I experimented with it on three machines and all 3 machines baulked. In order to make it work, I had to create a self signed certificate and edit group policy. That’s a lot of work for something that is supposed to work out of the box. So I went looking for third party apps.

The app I settled on is AxCrypt available at https://www.axcrypt.net. It has a free version and a paid for premium version. It has several small tutorial videos to teach you how to install and use it. And it works. Out of the box. With ease.

If you are needing to protect sensitive data, I recommend you check out AxCrypt.   If you need additional assistance securing your network and data, please give us a call.

Keeping Your Data Safe!

~Janet

 

Because it Made Me Laugh:

Sync Services vs Backup Services

Strive not to be a success, but rather to be of value. ~Albert Einstein

Happy Spring! This month I want to talk about the differences between file syncing services and backup services. People frequently tell me they are using sync services for their backup. While that is better than not using anything, it does have some hazards. So what is a sync service?

You might recognize sync services by their more popular names: Dropbox, Google Drive, or Microsoft OneDrive. With any of these services, you create an account with a user name and password. The process of creating an account will install a specialized folder onto your computer. Dropbox names their folder “Dropbox”. Microsoft names their folder “OneDrive”. Clever, huh? Once the folders are in place, it is just a matter of saving your important files into this folder. If you frequently take work home, this is a major time saver. When you get home, you can login to your sync service and all the files will be there. If you change a file, add new files or delete files, it will update the office automatically. It is slick! I really like sync services. I’ve been a Dropbox user for years.

So what’s the problem? Ransomeware is the problem. Ransomeware is a vicious virus that encrypts all of your data and throws away the key. As it encrypts your sync folder, you lose your data on every device, not just the infected device. Your best defense against ransomeware is a good backup. And while it is true, sync services normally have a “restore to previous version” button hidden somewhere in the service, they do the restore one file at a time. If you only have 10 files to restore, this is not a huge issue. If you have 100 files, it is still doable, but painful. Have, 1000+ files? Don’t call me. I’m not going to volunteer to help you. I’ll feel sorry for you, but NO, I’m not going to help you restore those files, one-by-one. Even Noah loaded the ark two-by-two. Why should you expect anyone to restore huge numbers of files one-by-one?

The solution? True Backup services. A true backup service isn’t limited to just files in one specific folder. It can backup an entire computer, or just your data folders. It can be configured to keep one copy of each file up to infinite copies of each file. And should a time come when you need to restore files, it can restore everything with a few simple clicks. I’ll say it again: It can restore EVERYTHING with a few simple clicks. That’s way faster than Noah!

I’m a fan of keeping both local and cloud backups. That’s because a local backup isn’t going to help me if my house burns down. But a backup in the cloud, that can protect me from fire, theft and all sorts of calamities. This month I’m offering a “Try-Before-You-Buy” get started package. This is how it works: Call (541-756-8770) or email me.  (Please put “Backup” in the subject line.) I will coordinate my schedule with yours so I can install backup and monitoring software onto your computer. The monitoring software alerts me to possible problems like outdated virus definitions and hackers attempting to take over your computer. I will configure your off site backup. Service for the remainder of April is free. If you appreciate the service, on May 1st, you may continue the subscription for $25/month. If you change your mind, the software will need to be uninstalled and there are no hard feelings. This offer is limited to workstations only. Similar service is available for fileservers at varying costs due to the complexity of file servers. If you are interested in backing up a file server, give me a call (541-756-8770) and we can discuss details.

Keeping Your Data Safe!

~Janet

Because it Made Me Laugh: