(608) 755-1524 sales@computer-center.com

FREE RESOURCES

Use these resources to learn a new skill or enhance an existing one

TCC Tuesday Tidbits Issue 399

I feel that luck is preparation meeting opportunity. Oprah Winfrey

IT Security Tip #9: If you installed it, you must update it!

There are thousands of hackers who get up every morning with ONE goal in mind: to find a new vulnerability in a commonly installed software (like Adobe, Flash or QuickTime) to access your computer. That’s why these companies frequently issue patches and updates for KNOWN security bugs; and once a KNOWN vulnerability is announced via a patch, hackers get to work like crazy trying to figure out how to use the vulnerability and access those users who are lazy about installing updates. That’s why it’s important to update installed software programs as soon as possible.

Of course, if you’re a client of ours, we’re monitoring your network for these updates and handling them for you; but your home computers, smartphone and other devices that may NOT be under our protection probably need a little attention.

Microsoft Teams: Always be in the Know With Notifications

Notifications keep you current with what’s happening in your Teams. Turn them on, turn them off, choose how and when to be notified: it’s all up to you.

  1. Select your picture at the top right of Teams.
  2. Choose Options > Notifications.
  3. For each type of notification, choose an option.

Keyboard Keys

Shortcut of the Week

Hold the Shift key and click any icon on the taskbar to open a new program window.

Have an unfortunate co-worker that’s not getting a copy of the TCC Tuesday Tidbits? Forward them your copy. Or, better yet, have them sign up at http://computer-center.com/tidbits/

Submit your TCC Tuesday Tidbit requests and ideas to me by calling (608) 755-1524.

Sincerely,

James Pearson, President
The Computer Center
39 S. Main St. – Upper
Janesville, WI 53545
(608) 755-1524

TCC Tuesday Tidbits Issue 398

The first one gets the oyster, the second gets the shell. Andrew Carnegie

IT Security Tip #8: Bookmark the LEGITIMATE websites you frequently visit

Here’s a sneaky trick used by many hackers: they purchase and set up a fraudulent website that is a close misspelling of a legitimate one. Example: www.faceboook.com instead of www.facebook.com. All you have to do is accidentally fat-finger ONE letter in the URL and up pops a very legitimate-looking fake copy of the site you were trying to get to – and the login and links are full of key-logger malware and virus landmines waiting for you to click on them. This is particularly important for any social networks you belong to.

Microsoft Teams: Have a question about Teams? Fear not, help is on the way!

The Help button in Teams. There’s an app for that. In the bottom left corner of Teams is where you’ll find Help.

Select Topics, then choose from a list of help topics, or check out the Training tab to watch short how-to’s on the basics of Teams.

Keyboard Keys

Shortcut of the Week

The first ten icons on the Taskbar are automatically made as a shortcut and can be opened by pressing the Windows key plus the numbers 1 through 0 on the top of the keyboard.

For example, if you wanted to open the first icon on the Taskbar without using your mouse you can press the Windows key + 1 key.

OneNote is BACK!

Starting in March 2020, when you install Office 365 or Office 2019, the OneNote desktop app will be installed alongside the Word, PowerPoint, and Excel desktop apps. Click the link to learn more about it from Microsoft.

Have an unfortunate co-worker that’s not getting a copy of the TCC Tuesday Tidbits? Forward them your copy. Or, better yet, have them sign up at http://computer-center.com/tidbits/ Submit your TCC Tuesday Tidbit requests and ideas to me by calling (608) 755-1524. Sincerely, James Pearson, President The Computer Center 39 S. Main St. – Upper Janesville, WI 53545 (608) 755-1524

TCC Tuesday Tidbits Issue 397

Forget past mistakes. Forget failures. Forget everything except what you’re going to do now and do it. William Durant

IT Security Tip #7: Never Use PERSONAL Devices to Connect to COMPANY Data

You’re a hardworking team player who likes to check e-mail and get a few things done after hours – all good! But here’s something you might not know: you should never access company data, file servers or applications through personal devices and home PCs that are not properly monitored by us. Why?

If you and your kids are using a home PC to play games, access Facebook, surf the web AND you’re not diligently updating and monitoring the antivirus software, firewall, and security patches on the machine (who does, honestly?), then there’s a high probability you’re infected with spyware or malware. Since most malware is designed to operate in total stealth mode undetected, you won’t know that some hacker is watching you log in to your company’s file server or key cloud application containing critical, sensitive data and capturing your login with a key logger. Bottom line, ONLY use company-approved devices that are properly protected and monitored to access company data; and if you just can’t help but take work home, let us know so we can set you up with a SECURE way to work remote or from home.

Microsoft Teams: It’s All About Meme

Add GIFs to inject some personality into your conversations.

To add a GIF to your reply, just click GIF button at the bottom of the conversation view at the bottom of your conversation view. Search for, or select, a GIF from the picker. Click Send when ready.

Keyboard Keys

Shortcut of the Week

Quickly Find a Name in Your Outlook Address Book.

Quickly locate a user in your address book or a company address book by typing portions of the name or alias and pressing Ctrl + K. For example, if you want to find Steve Smith, start typing “st sm” and then press Ctrl + K to automatically complete the name.

Happy New Year!

From all of us at The Computer Center, Happy New Year! May 2020 be your best year ever. We appreciate your business and wish you all the best in the coming year.

Have an unfortunate co-worker that’s not getting a copy of the TCC Tuesday Tidbits? Forward them your copy. Or, better yet, have them sign up at http://computer-center.com/tidbits/ Submit your TCC Tuesday Tidbit requests and ideas to me by calling (608) 755-1524. Sincerely, James Pearson, President The Computer Center 39 S. Main St. – Upper Janesville, WI 53545 (608) 755-1524

TCC Tuesday Tidbits Issue 396

Even if you are on the right track, you’ll get run over if you just sit there. Will Rodgers

IT Security Tip #6: How to Spot a Phishing Email

A phishing e-mail is a bogus e-mail that is carefully designed to look like a legitimate request (or attached file) from a site you trust in an effort to get you to willingly give up your login information to a particular website or to click and download a virus.

Often these e-mails look 100% legitimate and show up in the form of a PDF (scanned document) or a UPS or FedEx tracking number, bank letter, Facebook alert, bank notification, etc. That’s what makes these so dangerous – they LOOK exactly like a legitimate e-mail. So how can you tell a phishing e-mail from a legitimate one? Here are a few telltale signs.

First, hover over the URL in the e-mail (but DON’T CLICK!) to see the ACTUAL website you’ll be directed to. If there’s a mismatched or suspicious URL, delete the e-mail immediately. In fact, it’s a good practice to just go to the site direct (typing it into your browser) rather than clicking on the link to get to a particular site. Another telltale sign is poor grammar and spelling errors. Another warning sign is that the e-mail is asking you to “verify” or “validate” your login or asking for personal information. Why would your bank need you to verify your account number? They should already have that information. And finally, if the offer seems too good to be true, it probably is.d in cloud apps as well!

Microsoft Teams: Streamline Access With Custom Tabs

Create custom tabs to give your teammates easy access to the files, tools, and sites they use every day.

Select + on the menu at the top of your chat or channel to add a tab. They’ll be visible to all your teammates instantly.

Keyboard Keys

Shortcut of the Week

Use email rules and filters to control your email.

Use the Microsoft Outlook Rules Wizard (or filters through Yahoo! Mail or gmail) to help screen your emails and delete messages that are not important.

Examples of rules that can be set up

  1. Use keywords used in spam emails you frequently get (e.g., Viagra).
  2. Move emails from certain email addresses such as family and friends to a specific folder.
  3. Block web forwarded emails.

Happy Holidays!

From all of us at The Computer Center, Happy Holidays and best wishes for a very Happy New Year!

Have an unfortunate co-worker that’s not getting a copy of the TCC Tuesday Tidbits? Forward them your copy. Or, better yet, have them sign up at http://computer-center.com/tidbits/ Submit your TCC Tuesday Tidbit requests and ideas to me by calling (608) 755-1524. Sincerely, James Pearson, President The Computer Center 39 S. Main St. – Upper Janesville, WI 53545 (608) 755-1524