Patient Computer Help for Grown Ups Logo

 

440-476-3351

Bruce Corson, President

Patient Computer Help is servicing only existing clients. No new clients will be accepted. 

  • Home
  • About
  • Contact
  • Services
  • Blog
  • Testimonials

What is Microsoft Office 365?

January 18, 2017 by Bruce Corson

What is Microsoft Office 365?

Microsoft’s Office suite of software has been a mainstay of workplace productivity for many years. Despite how widespread and well-known Office is, many of its users dislike the fact that the major updates that arrive every few years tend to shake up the interface and other features. The latest version, Office 365, is an even bigger change that has made waves, but for a new reason: 365 represents not just an upgrade to the way the software looks, but its entire business model. It’s a radical change that will completely change the way offices interact with Office, and we’re going to explain it all in this post.

Previously, Office underwent updates about as often as Microsoft released new versions of Windows. New versions of Office added new tools and features each time, but there was always a learning curve because of a new interface and a new way of doing things. This was disruptive to businesses, because it takes a lot of time to learn new software. The result was that many businesses kept old versions of Office just because they already knew how to use it. The same thing happened with Windows itself: despite updates, many businesses still run very old versions like Windows XP because they know how it works and it costs a lot of time and some money to upgrade. That is a major problem for Microsoft (and for you) because these old versions of Office and Windows are no longer officially supported, so they are full of security holes that will never be fixed. They also don’t contain the shiny new bells and whistles MS spent time developing.

Windows 10

To resolve this problem, MS adopted a whole new philosophy for the latest version of Windows, Windows 10. Windows 10 is meant to be “the last Windows” because instead of releasing repeated new versions, Microsoft wants to have one base package and release frequent, small updates to it indefinitely. In other words, no more big changes every few years. Now, Windows will have occasional smaller changes. That means more stability for the user and easier care and security for Microsoft. We suspect that, instead of buying a big update every few years, users will in the future pay for annual subscriptions instead, but that hasn’t yet happened with Windows 10.

Office 365

It has happened with Office 365, with a similar revamp. The new base version of Office is called Office 365, with 365 referring to the number of days in a year; conveniently, the time between subscription payments. 365 is a product based on an annual subscription, which gives you access to the base software and all software updates that come out in that year. As with previous versions of Office, it is possible to get it for a reduced price under certain conditions, such as if you are a student. Once again, this greatly simplifies the way Office works. Instead of having to make a choice between keeping an old, familiar version and getting a new version that is safer and better, the company just has to stay current on its subscription.
Overall, this should be a positive change for Office. The one downside is the more frequent updates means that there will be new features and changes for Office multiple times a year, although each update should be small enough to be manageable. If it turns out that Microsoft puts out updates too quickly or the updates are too different, then we at Patient Computer Help are ready and able to provide you with detailed and customized support. We have years of experience helping businesses get the most out of their software and we can do the same for you as Office 365 becomes the new standard.

Contact us to learn more about how we can help keep you with Windows 365.

Filed Under: Microsoft

Share:

Viruses vs Malware

January 4, 2017 by Bruce Corson

Viruses vs. Malware

Hackers attack personal and business networks at an alarming rate. Victims most often use the term virus to describe the attacks. However, computer security experts classify most threats as malware. Despite the type, all cyber threats can cause serious harm.

Cyber Attacks Increase Annually

In 2015, hackers stole or destroyed almost half a billion files and continue to discover new computer vulnerabilities almost every week. They exploit 75 percent of those vulnerabilities on unwitting Internet users through commandeered websites.

In the same year, businesses experienced a 55 percent increase in security breaches, and a single virus protection firm reported 100 million information theft attempts via technical support ruses. When these attacks succeed, hacking victims often find themselves left with damaged computers.

Why the Confusion?

Differentiating between malware and viruses is sometimes difficult because computer attacks share similar characteristics. As Internet users grow more cautious, hackers find new and complex ways to find and attack victims. Affected computers may show several symptoms, such as:

• Unwanted pop-up advertising
• Sluggish operation and startup
• Unexplained crashes
• Disappearing files
• Numerous error message

Hackers attack all device types including desktops, laptops, tablets and cellular devices using several methods that computer experts classify in different ways.

Differentiating Threats

Malware is a technical term combining the words malicious software. This includes several software attack classifications, including viruses. Other cyber threats include Trojan horses, worms and spyware. Hackers sometimes use one method to introduce other cyber threats. Different threats affect computer systems with variable impact. As a rule, if an unsolicited virus warning pops up on the screen, do not follow the instructions.

One thing the programs share is the intention to harm computer systems and ultimately the users. Some threats spy on users’ activities to discover sensitive information, while others mine unique identifiers to sell to rouge businesses. Other programs hijack computers and instruct them to perform illegal acts without the owner’s consent or knowledge. Once hijacked computers complete the tasks, they are often severely crippled.

Internet security experts classify malware threats in several ways.

Worms attack computers by jumping from network to network without human input and damaging each infected network.

Spyware observes user activity and may change system security settings.

Ransomware locks down a user’s computer and demands payment to free the system.

Hackers use bots – originally intended to gather information for legitimate purposes – to execute illicit commands on hijacked computers, which can include other malware or a distributed denial of service (DDoS) attack. DDoS attacks employ many hijacked computers to query a single web page at once and disrupt service.

Hackers also use rootkits – intended to allow computer support technicians remote access – to covertly enter systems and deploy other malware.

What about Viruses?

Viruses are a type of malware that infects multiple files on a user’s computer. They jump to other computers and networks via email or removable storage media. The National Institute of Standards and Technology (NIST) credits a pair of software retailers for creating the first official virus to curtail illegal software duplication, which went on to spread exponentially as users shared the stolen software. According to Technopedia, hackers began to exploit viruses for their entertainment, then later moved on to hijacking computers for other, more illicit, reasons.

These malicious programs operate invisibly on unsuspecting computer users’ mcahines. Once installed, the programs duplicate, corrupt data and destroy files. This continues until the computer can no longer process the many programs and freezes. Due to viruses’ long history and devastating impact, victims commonly use the term as a catchall phrase to describe computer attacks, while the term malware has only recently grown popular as more software vendors advertise the term. Viruses are malware, but all malware are not necessarily viruses.

Computer attacks, frequently labeled viruses, are increasingly crippling important systems around the world. Yet, hackers deploy several kinds of computer threats. Identifying the attack method is the first step to recovering a damaged system. It is also important to know how to recover a damaged system without causing more harm and possibly losing data forever. If your computer is functioning poorly, you may have contracted malware.

Contact Patient Computer Help today to schedule a support session and return your computer or network to optimum performance.

We have recently begun recommending and installing Emsisoft Anti-Malware/Anti-Virus. It is a great program that does its job without slowing down your computer. Our preferred method to install it is with Kabuto, which gives us remote-monitoring of your Emsisoft’s performance, as well as other health-check items on your computer itself. Call us if we can help.

Filed Under: Malware

Share:

How to Make Money from YouTube

December 21, 2016 by Bruce Corson

How to make money from Youtube

If you are thinking about starting a YouTube channel and want to know how to make money from it then we at Patient Computer Help are here to give you the information you need. Anybody can start a YouTube channel, but you will need some technical information if you want to monetize your videos and start getting paid. Here is what you’ll need to do:

Create a Google AdSense Account

YouTube is a Google-owned website, and so the first thing you have to do to start making money on your channel is create a Google AdSense account. When you set up an account, Google places advertisements in the sidebar of your website as well as in the beginning of your videos. The advertisers pay Google to display these ads and in turn, Google pays you based on how much traffic comes to your channel. The longer people watch your videos with ads, the more money you will make. We at Patient Computer Help will gladly answer any technical questions you have about setting up an AdSense account.

Start Monetizing Your Content

Uploading a video to YouTube does not automatically mean it begins to make money. You will have to go into the settings of your video and choose to monetize it, either with sidebar advertisements, in-video advertisements, or both. Once you have selected this option, the video will begin making money based on view-time. We will help you navigate this option if you are having difficulty, and can help you setup your account settings so that each upload is automatically monetized.

Follow YouTube Guidelines

YouTube has their own set of guidelines, and if you don’t follow them your video won’t remain monetized. The most common way for videos to break guidelines is by using copyrighted music. If a copyrighted song appears in your video then YouTube will leave it up on your channel, but the money it draws in from advertisements will go to the owner of the copyright instead of you. Avoid this by visiting YouTube’s Audio Library, which contains free music that you are able to include in your videos without worrying about copyright infringement.

Attract Traffic to Your Channel

Monetizing your videos doesn’t do you any good if nobody clicks on them. There are a few things you can do to attract traffic to your channel. The first impression that people get of your content is the video thumbnail. Hundreds of videos of the same subject matter pop up when somebody does a search on the YouTube homepage. Your thumbnail is your chance to stand out from the other videos and make people want to click on your content. Create engaging images that immediately let viewers know what the subject of your video will be. Additionally, make sure that your video is of good quality. With so many options on the internet, people won’t hesitate to find a new video after just a few seconds if your quality is no good. Put effort into your channel and drive traffic by promoting your videos on other social media sites.

Please contact us for more details if you are serious about making money from YouTube.

Filed Under: Google

Share:

What is My Firewall and Should it be Turned On?

December 7, 2016 by Bruce Corson

What is my firewall and should it be turned on?

A firewall, just as in a car or a building, is a layer of protection between the risks and you. On a computer, that layer protects your computer while it’s connected to the Internet. With all the sneaky malware floating around, you need one, and you definitely should have one in place.

What is a firewall?

Some organizations might have three firewalls (or more): one on each Internet-connected server, one on the internal router, and one on each computer. The firewall is the first line of defense against any cyber attacks. Most computers today come with firewalls installed, and for good reason. When you’re connected to a global network like the Web, your computer is always at risk. Many attacks are filtered and blocked by your firewall without you even knowing, while allowing traffic that you choose to download, such as webpages or music. A firewall can tell the difference between traffic you initiate and traffic you didn’t. In IP (Internet protocol) technology, data is broken up into chunks, or packets, each with its own network addressing information.

Basic Types

Hardware firewall – this is a device, whether external or internal, between your Internet connection and your computer that acts as a router (or may be a router). Routers send incoming traffic to the computer with the specified IP address; if an incoming transmission doesn’t have a specific IP address, or one on your network, it goes nowhere.

Software firewall – if you aren’t using a router, all network traffic will reach your computer. Software firewalls are programs that monitor this incoming traffic so that suspicious traffic never reaches internal systems. This is not dissimilar to a hardware firewall, however a software firewall on many networks can also be configured to block out-going traffic from you computer (i.e., to prevent a virus from affecting other computers). Most PCs come with a software firewall turned on by default.

How firewalls work

Your firewalls use one or more of three basic approaches to control traffic coming in or out of a network:

Packet filtering – This packet information is checked against a set of filters. If the packet is prohibited by any filter, it is discarded.

Proxy services – incoming information is held by the firewall until it can be verified by the requesting computer.

Stateful inspection – key identifiers in each packet are compared against a database of approved senders. If the packet info doesn’t match any of these trusted sources, it gets discarded.

Trusted sources, like your favorite website or cloud storage, get recorded and information from them is allowed through your firewall. But any suspicious Internet packets that were never requested by your computer are simply cut off.

Leave it on

Firewalls work in one critical sense – they protect you from computers that your network doesn’t trust. Nothing can guarantee safety from all the clever hacker tricks out there, so you really shouldn’t trust any network. If you have kids at home on their own computers, make sure that both their devices and your WiFi router are firewall-protected. If you connect to the Internet via someone else’s WiFi, you want your software firewall active.

Newer firewalls on both PC and Macs are checking each packet in micro-seconds, so they don’t have much drag on speed or system resources. Turning them off won’t give you any real benefit, so it’s better to leave them on and have that extra layer of protection.

If you have any questions about firewalls or computer security, we at Patient Computer Help can assist you with all of your Internet concerns.

Filed Under: Mac, Malware, Microsoft

Share:

How Can I Tell if My Computer is Too Old?

November 23, 2016 by Bruce Corson

 How can I tell if my computer is too old?

Computers are mysterious. They are a box that takes keyboard inputs then outputs beautiful results that we use everyday. The feeling of owning a new computer is like having the world at your fingertips — anything is possible. When your computer is too old, everything feels stagnant. There are several signs that indicate the age of your computer. But what age is too old? We at Patient Computer Help have curated a list of four telltale signs of aging for any computer.

4 Signs that Your Computer is Too Old:

#1 You Cannot Run The Latest Updates

The biggest indicator of an old computer is its ability to handle the newest generation of software. There is a rule of computing that every two years, the average computer will double in its computing ability. Therefore, an eight year old computer is 6% as quick as than a new computer. As you spend time with a computer, you may not notice the slowing speed of the processor. What’s worse, most new software is designed to work with the fastest computers, the newer ones. While they still work with older computers (sometimes), it introduces additional strain on the older computer to keep up.

The minute you upgrade to a new generation computer, the difference will be obvious. If you are unable to install current applications or software, consider upgrading the operating system or purchasing a new computer. Or, let us know and we’ll see if a solid state hard drive (SSD) upgrade can fix your issues.

#2 You Can’t Install the Latest Operating System(OS)

The operating system is the interface that allows you to utilize the pointer and click to any application you wish to use. PCs run on the windows OS while Macs run on the OS X operating system. Although they have different names, the functionality is quite similar. As a computer ages, the specifications or the hardware within the computer become outdated. Many of these parts are soldered into the computer making it impossible to upgrade. Therefore, if your computer is unable to update to the latest version of OS X (Capitan) or Windows (10), your computer may be too old.

#3 There Are Constant Noises Coming From Your Computer

Most technology will make a noise or two during its lifespan. Computers are known to have loud fans that turn on when you are utilizing all of its resources. However, as a computer ages, it will begin to create more noise, more frequently (much like people). This is due to the lifespan of the internal hardware. Computers are not built to last forever. Many computer companies urge consumers to buy or replace their computers every two to six years. This way, they can maintain an optimal level of performance and avoid issues with customer service.

#4 Constant Pop-Up Messaging

As previously mentioned, the internal hardware of your computer is not meant to last a lifetime. As your time with the computer increases, the amount of errors that take place is bound to increase as well. Like most things, a computer will age and die. We at Patient Computer Help are equipped to increase the endurance of your computer but unfortunately, they cannot last forever. If you are constantly dealing with error messages, blue screens, or freezing, your computer may be too old.

A computer is a tricky machine but it doesn’t have to be. At Patient Computer Help, we are dedicated to giving you the greatest possible experience from any computer. Although computers may get old, purchasing a new one is a great experience as well. Furthermore, acquiring a new machine will allow you to reap the benefits of enhanced productivity, newer technologies, and less stress when dealing with your computer.

If you are having troubles with your computer, contact us today!

Filed Under: Mac, Microsoft

Share:

Why Should I Upgrade to Windows 10?

November 9, 2016 by Bruce Corson

Why should I upgrade to Windows 10?

It is that time again to start thinking about bringing your systems up to date. An operating system upgrade to Windows 10 may seem like a daunting task, but it might be more advantageous than you think. To help you make an informed decision as to why you should take the leap and upgrade now to Windows 10, let us address a few things you should be weighing as you consider moving forward.

Older Operating Systems Losing Support

We all like holding on to those classic operating systems as long as we can. We get used to the look and feel of a particular operating system environment and the thought of change is, by all accounts, somewhat disturbing. With each new operating system upgrade there is always going to be a period of familiarization that is necessary for helping you regain your bearings; however, one thing to seriously consider is that Microsoft could stop providing support for your older operating system at any time. Although they will perhaps continue to support Windows 7 and 8, for example, for some time, other older versions of the Microsoft OS environment will simply become less important to support as more and more users take advantage of upgrading to the latest Windows 10 operating system.

Less Crashing

Another great reward for upgrading to Windows 10 is that there is improved reliability. While older operating systems had a tendency to freeze or crash every time you turned around, Windows 10 has the ability to operate more reliably than its predecessors. One way to increase the operational efficiency of your Windows 10 operating system is to utilize the on-board Reliability Monitor feature to debug and troubleshoot systems problems across a number of different causal areas of concern. From application to hardware problems, Reliability Monitor will be a useful tool for helping your Windows 10 PC run as smoothly as possible.

New Features

With the release of any new operating system, you always expect some level of new functionality. This is generally introduced in the form of new features and Windows 10 has a number of new features that make it easier to use than Windows 8. For starters, the designers over at Microsoft got the hint and returned the start menu to the windows 10 environment for easier use of the operating system. The revised start menu also helps to organize metro apps and is highly customizable for user needs.

Most people, however, don’t like the new Start Menu either. A lot of our clients have found it useful to install “Classic Start,” from Ninite.com. It gives a Start Menu a lot like you’ll remember from Windows 7, and you don’t have to put up with what Microsoft thinks you need.

Another key feature to look for is Microsoft’s personal digital assistant, Cortana, which has migrated from their smartphone application environment over to their operating system environment. Whether Cortana is helping you perform a search or making you crack a smile with a joke, it has become a useful feature that many Windows 10 users have come to appreciate; that’s what’s been reported, though we haven’t found a soul who likes it. Another key feature that has been improved some is the Windows 10 Narrator feature. This feature makes it possible for people with low vision, for example, to have greater flexibility in navigating their Windows 10 operating system and improves browsing functionality on the web; however, do not expect this feature to replace a fully integrated screen reader for blind accessibility use.

Edge

If you thought you would be stuck with Internet Explorer in Windows 10, think again. Microsoft finally got around to taking a seriously new look at the online browsing experience of their users and provided Windows 10 with a sleek, faster browser called Edge. Edge strips away much of the clutter and provides users with an improved browsing experience on the web. Edge even tries to anticipate your needs to some degree and will provide additional information, such as directions to that restaurant you are looking up or other related information that might be useful during your browsing experience.

At Patient Computer Help, however, we always install Google’s Chrome web browser as well as Mozilla’s Firefox. We personally like the ease of use of those two over Edge.

Conclusion

Making the transition to Windows 10 is no small decision. While this will come with certain inevitable changes to your computer’s operation, it will also come with a number of benefits. It is time to start taking advantage of these benefits today.

Contact us at Patient Computer Help to help you with any questions or concerns you have with getting your new Windows 10 PC operating at peak performance.

Filed Under: Microsoft

Share:

Strategies to Manage Passwords

October 26, 2016 by Bruce Corson

Strategies to Manage Passwords

In today’s world, it’s nearly impossible to get through a day without using a password at least once. Whether it’s logging in to your computer at the office or purchasing items online, passwords are now a part of our lives. However, while passwords may be a necessity of life, it can often be difficult for the everyday computer user to come up with good strategies to manage them in ways that are safe and effective. With hackers and criminals vying everyday to steal personal information and use it for identity theft or other crimes, it’s more important than ever to know what to do once you’re at the keyboard. If you find yourself in need of some new ideas to manage your passwords, we here at Patient Computer Help are ready to help you solve these and other complex computer issues.

Different Passwords for Each Account

Because password management can be complex at times, many people choose to take the easy way out and use one password for all of their accounts. This is a huge mistake. If the worst happens and hackers manage to access one account, they’ll usually try the same password on the rest of your accounts. Chances are you’ll be in for lots and lots of headaches trying to convince people you didn’t buy this or that. Therefore, using different passwords for each account gives you the best chance to outsmart the criminals and keep your information safe and secure.

Create Unusual Passwords

If there is one thing we see on a regular basis, it’s people who use passwords that are far too easy for hackers to figure out. For example, in a recent Wall Street Journal survey, it was discovered that some of the most common passwords used were password, 123456, and 12345678. With passwords as simple as these, it’s no wonder hackers are having such an easy time gaining vast amounts of personal information. Instead of letting yourself be a victim, try to make your passwords as unique as possible, utilizing a variety of letters, numbers, and symbols.

Password Managers

If you would rather not be bothered with trying to come up with numerous secure passwords, the good news is that there is now numerous programs or apps designed to do the work for you. Known as password managers, these programs can generate unique passwords that are almost hack-proof. In addition, the password managers also memorize the passwords and enter them into your website for you each time a person returns to the site. Some of the most popular password managers include LastPass, KeePass, and RoboForm, all of which have been given high marks for their effectiveness. Made to integrate with most Web browsers, they are becoming more and more popular with consumers. However, while they are made to be easy to install on most computers and smartphones, we advise customers that if they have any questions, we are equipped to help you examine and install the software. And for those customers who surf the Web mostly through their smartphones, we and help install the software on your phones as well. While coming up with strategies to manage passwords sounds as if it can be an impossible task at times, the good news is that it can be made much simpler by asking us for help. Whether you need advice on how to come up with secure passwords or need help installing software, our knowledgeable and experienced staff can make sure your passwords are safe and secure.
If you’re looking for advice on strategies to manage passwords, contact Patient Computer Help.

Filed Under: Password Protection

Share:

Why do Hackers Want Access to My Email?

October 12, 2016 by Bruce Corson

Why do hackers want access to my email?

You might not take the security of your email seriously because you might be thinking that nobody would want to see correspondence between you and members of your family. In truth, there’s more connected to your email than you might realize.

There are normally 3 reasons that a hacker would want access to your email.

#1 Havoc on Your Account

The first reason involves a sort of vandalism. A hacker can change your password, gain personal information stored in your profile and send email to your contacts. This is how friends can get the message that you’re trapped in Belize and need money wired to come home. Not good. They could also delete all your contacts and messages so you don’t have access to them anymore.

This can be a serious problem. When you sign up for most services, they’ll send you login and account details through your email. Without that information, you won’t be able to get access to your accounts. If your password is changed so you don’t have access to your email, you might not be able to restore your accounts.

#2 Gaining Sensitive Information

With access to your email account, a hacker could gain access to other accounts connected with the email. They can not only stop you from getting past emails. They could contact the accounts from places like your bank or credit cards that are linked through email. Hackers could use that information to change passwords, change the address and request new cards to that new address.

Much of your personal information is available in your email accounts, and hackers can gain that information quite easily. With control of your main email account, they have access to other vital accounts. For example, Miriam’s email account is hacked. The hacker contacts her bank online and asks for a new password. The bank sends an email to her asking that she verify the request. The hacker clicks the verification and has access to all her money.

#3 Spamming Your Contacts

Some hackers can use your email address to send an email to someone you know asking for money. This has happened a lot. The hacker sends all your contacts an urgent email saying that you lost your phone, and you’ve been in an accident. Your friends and family are worried, so they’ll immediately send money to the place selected by the hacker. They have no reason to suspect that it’s not you emailing them.

They can also send emails to places you do business with asking for information about you that will help them hack into more areas of your life. They’ll pose as you to get your account information from third parties.

Protecting Yourself

Your bank accounts, in fact all accounts, should have a unique passwords. Some people recommend using a separate email address for your financial accounts and your  social media. Make abso-darn-lutely sure you’re not using the same password for every single account you have. Have extra security measures in place like two-step authentication on your vital bank or credit card accounts.

If you notice that you have a virus, or your computer is running slowly, you can contact us at Patient Computer Help to remove the virus.

Filed Under: Malware, Password Protection

Share:

Backup Strategies to Prevent Ransomware From Blackmailing You

September 28, 2016 by Bruce Corson

Backup Strategies to Prevent Ransomware From Blackmailing You

The internet is a valuable tool that you can use to stay in touch with friends, conduct research and more. As more people start using the internet than ever before, they are becoming more dependent on it, and criminals see this trend as an advantage that they can use against you. By the time you notice that your computer has been infected with ransomware, it’s too late to do anything. From the moment it gets installed, ransomware will start encrypting the files on your hard drive.

Your family photos, tax records and important projects will be locked. The encryption algorithm is so strong that the only way to access your files is to submit to the hackers’ demands, and they will likely ask for a significant sum of money. If you are not yet infected, then taking action to keep yourself and your data safe from harm is vital.

Backup Your Data

When you want to protect yourself from ransomware, backing up your important files is a good place to start. You can use an external drive to store the backup. However, with most ransomware, your external drive, if connected, will also get infected.

Thus, we recommend as a minimum to have TWO backups. One is the backup as discussed above, the second is an additional hard drive that is alternated with the first. In this way, if the computer and the backup are infected, you always have the second one to fall back on. We typically recommend alternating the backup drive every day or every week.  (For further safety in the case of disasters, such as a fire or electrical strike, taking one drive home or to the office will ensure that you will always have a fairly recent backup of your files.)

For those not wanting to worry about plugging and un-plugging drives, a third option is to go with an online backup, such as from Carbonite or Gillware, both of which we re-sell. With online backups, while they are not immune from infection, if you contact us as soon as you discover the infection, we can restore files from the day before the infection started. This presupposes that you notify us less than thirty days after infection, as the typical plans call for retention of data for only that period.

A good belt-and-suspenders approach uses both the external drives and the online options. The online option is safest and most convenient. However, a full restore of your data via an online provider can take some time. Physical external drives are quicker.

You should back up your important files each time you make changes or updates to them if you don’t want anything to get lost or permanently destroyed. If you get infected with ransomware after backing up your files, you won’t need to worry because they will still be safe from harm. If you store anything valuable on your computer, backing up your files is always worth the effort. What’s valuable? Your Quickbooks? Your children’s pictures? Letters you’ve written? Tax filings? You decide…help us help you save it all.

Run Virus Protection

Not having an anti-virus program on your computer is risky, and you will have no way to defend against malicious programs that were designed to steal your information and harm your computer. Some people install and a run program that offers protection from harmful software, but they don’t keep it updated, rendering it useless.

An updated anti-virus program will scan for known versions of ransomware, and it will attempt to contain it before the ransomware takes control of your computer. No program can offer complete protection from ransomware, but it will go a long way in keeping you safe and reducing your risk of an infection.

In addition to a good anti-virus program, we are now recommending inclusion of active malware and anti-exploit technology from Malwarebytes. Exploits are compromises in your internet browsers (Chrome, Firefox, Edge, Internet Explorer) that the bad guys take advantage of as soon as they’re discovered. Infections through this route are not technically viruses. This is a common way for ransomware to enter your computer when you visit an infected website (this happened to thousands of visitors to the New York Time’s website last year). Malwarebytes Anti-Exploit(r) can help prevent these attacks.

Lastly, if the worst happens and your data is ransomed, Patient Computer Help maintains a small stash of BitCoin, the currency normally needed to pay off the ransom. Typically getting BitCoin for the first time is a lengthy process, and somewhat daunting as well, so we have this as a service to our customers.

Take Preventative Measures

In addition to running system backups and using anti-virus software, learning the proper steps to take when your computer gets infected can help you minimize the damage. Once the ransomware has done its job on your system, it will start looking for other computers in your network to infect.

So, it’s vital you disconnect your computer at the first sign of trouble when you don’t want the virus to spread to other systems. At this point, the damage to your machine has already been done, but you need to ensure that the other computers were not infected if you don’t want the cycle to repeat. If you have enough experience, you can scan each system to prevent further damage from occurring.

Final Thoughts

Most people are caught off guard when ransomware strikes, and they lose a lot of important data as a result. The time to act is now if you don’t want to end up at the mercy of a hacker who wants to extort money from you. Never overlook the importance of making backups consistently.

For help with Backup Strategies to Prevent Ransomware please contact us today.

Filed Under: Backup, Malware

Share:

Mac vs PC: Which is Best for me?

September 14, 2016 by Bruce Corson

Keepass vs 1Password

There are some important differences between Mac and PCs for the average consumer. Macs tend to be popular with people who want everything working fairly quickly without having to download more software. PCs tend to be popular with people who value expandability and want a good price on a computer. What you end up buying will depend on how you intend to use your computer.

Macs vs. PCs – Hardware

PCs tend to get the latest hardware faster than Mac computers. This is especially evident with CPUs, as PCs are more likely to have higher clock speeds than their Mac equivalents. Macs go through product release cycles which limit the number of times they can change their hardware internals.

It’s undeniable that Macs look like higher quality machines than your average PC. There is a perception that Macs are better for creative people, but that might just be because artistic people value Apple’s designs. Although the Adobe suite of applications like Photoshop and Lightroom are available for both Mac and PC, creatives likely favor iMacs and Macbook Pro laptops because of their stylish aluminum designs. But higher end computers come with a higher price. One advantage that PCs enjoy is that they’re more cheaper than Macintosh products out of the box. Whether they are a better long-term value is open to opinion.

Windows PCs offer lots of flexibility and much more customization. If you’re a gamer, then you’ll want to go with a PC desktop machine. A PC desktop can be expanded with a high-end graphics card to keep up with demanding games. A Mac is more of a controlled-environment machine that isn’t meant to be expanded much beyond plugging in USB devices. As far as gaming, it should be noted that you can game on a Mac, but the gaming titles available for the Mac pale in comparison to what’s available for a PC machine.

Macs vs. PCs – Software

Macs traditionally have system software that is more optimized for their hardware. This is because Macs provide both the hardware and the software that runs on that hardware. Windows has to create an operating system that runs across a variety of 3rd-party hardware, which requires regular maintenance.  But compatibility is usually assured as long as you stick with a name brand PC vendor.

Many people elect to stay with PCs because they run software that is better optimized to run on it compared to a Mac. But this is going to depend entirely on the type of software that you’re using. If you use Office, then you might go with a PC since Office is well optimized for Windows. There are plenty of video editing and audio editing software packages that are better optimized for Macs, so it comes down to what software you use the most.

PCs are famous for their blue screens of death, and for freezing up, though that’s getting better. Windows and Mac computers both suffer from occasional slow downs or crashes, but the remedy in both cases is often restarting the computer. (Kicking it is not recommended, but there’s a reason it’s called “re-booting.”) If that doesn’t work, then call us at 440-476-3351.

Many people say that Macs are overpriced, but it depends on your perspective. Some people are willing to pay more for the integrated, dependable, reproducible experience that a Mac gives them. The included apps on a Mac, like iTunes and Photos, are more fully featured than their PC equivalents. But it is true that if you’re just comparing technical specs, a PC will be cheaper. It all comes down to whether or not you think the premium is worth it. It’s often noted that while PCs have users, Macs have a following.

If you’re looking for guidance in choosing or setting up your new computer, contact Patient Computer Help.

Filed Under: Mac, Microsoft

Share:

  • « Previous Page
  • 1
  • 2
  • 3
  • 4
  • Next Page »

Services

  • Personalized Computer Repair
  • Computer Training
  • Concierge Service
  • Antivirus Installation And Support
  • Data Recovery
  • Remote Support

Testimonials

  • I have worked with Bruce on several occasions and can attest he has an impressive knowledge base and troubleshooting ability. He is also very easy and pleasant to communicate with. He is a great resource. Read More
    Betsy Gustafson
  • Bruce does a fantastic job helping people who may not be completely computer literate. My PC was running really slowly and we couldn’t figure out what the problem was. It turns out we were infected with some sort of virus. He was able to come in and fix it in a short amount of time. Read More
    Terry Dorland
  • Bruce is so helpful, PATIENT, friendly, and knowledgable when it comes to helping people through PC challenges and opportunities! He is my go to resource when I have gone beyond my tinkering capacity and he’s always quick with a suggestion or with ideas to get past many issues we encounter in our connected lives, with... Read More
    OhioFranks

FOLLOW US

Copyright © 2025 · Patient Computer Help for Grown Ups · 16850 Knolls Way, Chagrin Falls, OH 44023 · Powered by Tech Site Builder