(608) 755-1524 sales@computer-center.com

FREE RESOURCES

Use these resources to learn a new skill or enhance an existing one

TCC Tuesday Tidbits Issue 349

Success is not final, failure is not fatal: it is the courage to continue that counts

Winston Churchill

IT Security Tip #5: How to Foil Ransomware

Not too long ago, the CryptoLocker ransomware virus was all over the news, infecting over 250,000 computers in its first 100 days of release (at least that’s the number reported – the real numbers are probably MUCH higher. The threat was fairly straightforward: Pay us or we’ll delete all your data.

Ransomware, like the CryptoLocker attack, works by encrypting your files to prevent you from using or accessing them. After your files are compromised, the hackers behind the attack then pop up a demand screen asking for payment ($400 to $2,000) within a set time frame (e.g., 72 hours or three days) in order to get the key to decrypt your files. The last CryptoLocker virus forced many business owners to lose data or pay up since there was no other way to decrypt the files.

Obviously the best way to foil a ransomware attack is to be incredibly diligent about IT security; but with hundreds of thousands of new attacks being created daily, there are no guarantees that you won’t get infected. Therefore, it’s critical to maintain a full, daily backup of your data OFF-SITE so that IF you do get whacked with ransomware, you can recover all your files without having to pay a thin dime; and don’t forget to back up off-site PCs, laptops, remote offices and third-party software data stored in cloud apps as well!

Write Your Best Resume in Microsoft Word With Help From LinkedIn

Take the next step in your career. Resume Assistant shows you real work experience examples, top skills, and jobs for a given role so you can target your resume and land that perfect job.

  1. Go to Review > Resume Assistant
  2. Type the role you want
  3. Explore the results

Keyboard Keys

Shortcut of the Week

Scroll one page at a time in all major browsers by pressing the Spacebar key. Move back up the page by pressing Shift + Spacebar.

Have an unfortunate co-worker that’s not getting a copy of the TCC Tuesday Tidbits? Forward them your copy. Or, better yet, have them sign up at https://computer-center.com/tidbits/

Submit your TCC Tuesday Tidbit requests and ideas to me by calling (608) 755-1524.

Sincerely,

James Pearson, President
The Computer Center
One Parker Pl, Ste. #655
Janesville, WI 53545
(608) 755-1524

TCC Tuesday Tidbits Issue 348

I have not failed. I’ve just found 10,000 ways that won’t work.

Thomas Edison

IT Security Tip #4: If This Type of Alert Pops up, DON’T Click on it!

You’re working at your computer when all of the sudden – BAM! – you get a pop-up notification that your PC is infectred with a virus and you must “click here” to run a scan or install antivirus software. This is a common scareware tactic used by hackers to get you to click and download a virus. (You should know we would NEVER deliver that type of pop-up to you!)

Often it will appear to be a system alert or a Microsoft operating system alert. Regardless of how legitimate it looks, NEVER click on the site or the pop-up. The safest thing to do is close your browser; do not click on the X, “Close” or “Cancel” button in the pop-up or on the site because clicking on anything on the page or pop-up will trigger a virus download. If that won’t work, bring up your task manager (hold Control + Alt + Delete on a PC and Command + Option + Esc to “Force Quit” on a Mac) and close the web browser or application where it appeared. Next, notify your IT department (us!) that this has happened so we can double-check with a legitimate scan if your computer was infected.

Type Hands-Free

Got a microphone? Click Dictate and watch Word, Outlook, Powerpoint, or OneNote for Windows 10 type while you talk.

Watch Out For Extortion Emails

Another very convincing “validate your information Netflix scam” is spreading. Click the link above if you have received an email claiming that Netflix failed to validate your payment information.

Crooks use leaked passwords in an adult content extortion scam. The scam uses real usernames and passwords from previous security breaches to make it appear legitimate that they have footage of you watching adult content. Those that use a password manager, use different passwords for each website, and change passwords regularly will have nothing to be concerned about. However, if they’re still actively using that password, they should change it on any website they have used it on.

Keyboard Keys

Shortcut of the Week

To quickly find a name in your Outlook address book, start by typing portions of the name or alias and pressingĀ Ctrl + K.

For example, simply type “jo sm” for John Smith and then pressĀ Ctrl + K to automatically complete the name. This is helpful if you have a large address book or if you don’t know how to spell the name.

Have an unfortunate co-worker that’s not getting a copy of the TCC Tuesday Tidbits? Forward them your copy. Or, better yet, have them sign up at https://computer-center.com/tidbits/

Submit your TCC Tuesday Tidbit requests and ideas to me by calling (608) 755-1524.

Sincerely,

James Pearson, President
The Computer Center
One Parker Pl, Ste. #655
Janesville, WI 53545
(608) 755-1524

TCC Tuesday Tidbits Issue 347

Never before in history has innovation offered promise of so much to so many in so short a time.

Bill Gates

IT Security Tip #3: Use STRONG Passwords!

Thanks to the powerful brute-force-attack software readily available online, hackers can try tens of millions of possible password combinations per second. For example, hacking software can guess a five-character password in under three hours. If you only use lowercase letters, it’s 11.9 seconds.

You KNOW you need to have a better password than “password” or “letmein” if you have any hope of keeping hackers out of your PC; but what does a “strong” password mean? A good password should be at least eight characters long (or longer!) and have a combination of uppercase and lowercase letters, numbers and symbols that are hard to guess. Don’t use dictionary words with proper capitalization because they’re easy to guess (like Password123#). Even though it meets the requirements we just discussed, it’s easily hacked; remember, hackers have sophisticated password-hacking software that will run 24/7/365. If you want a quick tip for remembering your password, use a phrase and insert letters and numbers into it, like $h@KeNb8ke.

Microsoft Word One-Click Fixes

Accessibility Checker tells you if your messages and documents can be read by people of all abilities.

  1. With your email message or file open, select Review > Check Accessibility.
  2. Review your results.

Available in all your Office apps.

Keyboard Keys

Shortcut of the Week

In Microsoft Excel, by highlighting the cells you want to know the value of and pressing ALT + = together, you can quickly create an automatic formula that will provide you with the sum.

Submit your TCC Tuesday Tidbit requests and ideas to me by calling (608) 755-1524.

Sincerely,

James Pearson, President The Computer Center One Parker Pl, Ste. #655 Janesville, WI 53545 (608) 755-1524

TCC Tuesday Tidbits Issue 346

The science of today is the technology of tomorrow.

Edward Teller

IT Security Tip #2: Working From Home? DON’T! Until You Read This…

If you plan on catching up on some work from home AND you’re using a personal device such as a smartphone or personal laptop – DON’T! Unless your personal device is covered under our plan, you could accidentally introduce a virus to the company’s network.

ONLY devices that are under our vigilant watch of patching, updating and monitoring should be used to work remote. Side Note: We can set up a way for your to work from home securely; call our office if you would like us to set that up: (608) 755-1524.

Chat While You Edit in Microsoft Word

Collaborate with co-authors without leaving Word. Save your document to the cloud to get started. Available in Excel and Powerpoint, too.

Keyboard Keys

Shortcut of the Week

Pin a Google Drive document to the bookmarks bar.

  1. Open Google Drive
  2. Open the document you would like to pin
  3. Click the Bookmark this page icon on the right side of the address bar
  4. In the small window that appears, select Bookmarks bar from the drop-down menu
  5. After you have selected Bookmarks bar, click the Done button

Submit your TCC Tuesday Tidbit requests and ideas to me by calling (608) 755-1524.

Sincerely,

James Pearson, President The Computer Center One Parker Pl, Ste. #655 Janesville, WI 53545 (608) 755-1524