Tech Tips

Cryptocurrencies

Cryptocurrencies are a fairly new type of electronic, ethereal currency available only online. Cryptocurrencies like Bitcoin (BTC), Etherium (ETH) and Tron (TRX) are not backed up or given value by a government like any other sort of fiat currency ($USD). Instead, they’re given a value based on the networks that support them, their usability and…
Read more

What’s new with the most recent Windows 10 update.

New features in the October 2018 update will help you manage your time and get more creative with Windows 10. With this update, it will be easier to get things done on your PC and across your other devices, including syncing to Android and iOS phones.  Your Phone App: The Your Phone app allows you…
Read more

4 Tips for Composing Effective Business Emails.

Descriptive Subject Line When writing an email, the subject line is meant to let your recipient know what the email is about before they open it. Keep this information short, but very informative as to what the email is about. Proofread How many times have you typed an email, sent it, then looked back to…
Read more

National Consumer Protection Week

Scammers, hackers and identity thieves are looking to steal your personal information - and your money. But there are steps you can take to protect yourself, like keeping your computer software up-to-date and giving out your personal information only when you have good reason. The following information has been provided by the Federal Trade Commission.…
Read more

5 Handy Tips for Microsoft Word.

1. Backspacing - By holding down the Backspace button with Ctrl it deletes the entire word instead of each character. 2. Side-by-Side Documents – First, open both documents you want to put side by side. Once open, access the View tab, then you will see a button labeled View Side by Side. After clicking that…
Read more

Google Maps Scam

Scammers have found a new route for defrauding people. Since Google Maps allows users to submit changes and alterations to listings, fraudsters are taking full advantage of this feature. Banks are one of their main targets.  By switching their phone number with a fake one, customers are under the impression they are on the phone…
Read more

Cyber Security Awareness Month – Spoofing

Spoofing is a fraudulent practice in which a person or malicious program is disguised as a known computer/tablet/phone by cloning device information. The purpose of these attacks is to trick the recipient into allowing the transfer of data or secure transactions. The most common spoofing attacks include IP Spoofing, ARP Spoofing, and DNS Spoofing. IP…
Read more

Cyber Security Awareness Month – Spyware

Spyware is one of the most common threats on the internet. It runs quietly in the background collecting your personal data without you even knowing it’s there.  It then sends that information over the internet to a third party. It is this type of malicious software that infiltrates your computer or mobile device, secretly monitoring…
Read more

Cyber Security Awareness Month – Trojan Horse

A Trojan Horse, or, simply, a trojan, is a kind of malware that hides within computer programs and is designed to damage, disrupt, steal, or inflict some other harmful action on your data or network. The infected code is meant to trick you into loading and executing the malware on your device. Unlike viruses, trojans…
Read more