Archives 2024

Windows 10 – End of Support

Article (PSA‑0028)

Why This Update Matters

Microsoft will stop providing security updates, bug fixes, and technical support for Windows 10 on October 14, 2025. After that date a Windows 10 PC becomes far more vulnerable to malware and other attacks. The safest path is to move to a supported operating system—most users will choose Windows 11.

Key Windows 11 System Requirements

1. CPU (Processor)

  • Minimum: 1 GHz or faster, ≥ 2 cores.
  • But the CPU must be on Microsoft’s approved‑CPU list. Even a fast, dual‑core chip can be rejected if it’s not on that list.

2. Firmware – UEFI + Secure Boot

  • Old BIOS systems won’t work. The PC must use the modern UEFI (Unified Extensible Firmware Interface) firmware.
  • Secure Boot, a feature of UEFI that only lets trusted OS loaders start, must be enabled.

3. TPM 2.0 (Trusted Platform Module)

  • TPM 2.0 is a small crypto‑processor that stores keys and helps verify the integrity of the boot process.
  • Most computers made after 2016 include it, but it can be disabled in the BIOS/UEFI settings.

How to Check Your PC Today

Microsoft provides a free utility called **PC Health Check**.

  1. Open the Windows 10 search bar and type “PC Health Check”. If it appears, launch it.
  2. If it’s missing, download it here: https://aka.ms/GetPCHealthCheckApp.
  3. Click the **Check now** button. The app will tell you which (if any) requirements you’re missing.

What to Do If Your PC Fails the Check

  • CPU not on the list? You’ll need a newer processor or a new computer.
  • UEFI/Secure Boot disabled? Re‑boot, enter the firmware settings (usually F2, Del, or Esc during startup), and enable UEFI mode and Secure Boot.
  • No TPM 2.0? Some newer motherboards have a TPM header you can add a module to; otherwise you’ll need a newer system.
  • If fixing the hardware isn’t practical, consider purchasing a new Windows‑compatible PC. Look for a model that advertises “Windows 11 ready”.

Quick Upgrade Checklist

  • ✔️ Run the PC Health Check app.
  • ✔️ Verify your CPU is on Microsoft’s approved list.
  • ✔️ Ensure firmware mode is UEFI and Secure Boot is ON.
  • ✔️ Confirm TPM 2.0 is present and enabled.
  • ✔️ Back up your important files (external drive or cloud) before any OS change.
  • ✔️ If any step fails, decide whether to upgrade hardware or replace the PC.

Next Steps After the Checklist

When your machine passes all three requirements, you can upgrade to Windows 11 directly from Windows 10 Settings → Update & Security → Windows Update. If you run into errors, let us know—there are often simple work‑arounds (e.g., enabling TPM via the BIOS) that a technician can walk you through.

Need a Hand?

If you’re unsure about any of the requirements, want help troubleshooting the PC Health Check, or need a recommendation for a new Windows 11‑compatible computer, give PSA Computer Services a call at (707) 506‑6802.

A Brief Introduction to AI

Article (PSA‑0027)

Why Knowing About AI Now Is Important

Artificial Intelligence (AI) appears in headlines every day – from chat‑bots that write emails to medical tools that flag possible strokes. Even if you’re not a tech‑person, AI is already touching everyday life, so a basic, up‑to‑date understanding helps you make smarter decisions and avoid common misconceptions.

What AI Really Means (2025)

AI is the **simulation of human‑like intelligence by machines**. In practice this means computers use algorithms and large statistical models (often called “machine‑learning models”) to perform tasks that traditionally required human thought.

Core Capabilities of Modern AI

  • Reasoning – Using data and logic to reach conclusions (e.g., recommending a product based on your purchase history).
  • Learning – Improving performance over time by spotting patterns in new data (e.g., a spam filter that gets better after you mark messages as “junk”).
  • Acting – Carrying out tasks automatically, from answering a chat question to controlling a robot arm.

Major AI Sub‑Fields You’ll Hear About

  • Expert Systems – Rule‑based programs that mimic human decision‑making (e.g., a tax‑prep helper).
  • Natural Language Processing (NLP) – Understanding and generating human language (chat‑bots, voice assistants, translation tools).
  • Speech Recognition – Converting spoken words into text (digital assistants, automated call‑centers).
  • Computer Vision / Machine Vision – Interpreting images and video (face‑recognition, medical‑image analysis).

How AI Is Used Today (Real‑World Examples)

  • ⚕️ Healthcare: AI models analyze CT or MRI scans and flag possible strokes, tumors, or fractures for radiologists.
  • Virtual Assistants & Chatbots: Provide basic medical info, schedule appointments, or answer common customer‑service questions.
  • Image & Video Analysis: Detect faces, vehicles, or objects in security footage; power photo‑search features on smartphones.
  • Industrial Automation: Robots with vision and predictive maintenance algorithms keep production lines running smoothly.
  • Scientific Research: Large language models help scientists draft hypotheses, analyze datasets, and even design new molecules.

Types of AI – How “Smart” Is It?

  • Reactive Machines – No memory; they react to current inputs only (e.g., IBM’s Deep Blue chess computer).
  • Limited‑Memory AI – Stores recent data to improve decisions (most modern self‑driving‑car systems, recommendation engines).
  • Artificial General Intelligence (AGI) – “Self‑Aware” AI – Currently **theoretical**. No system today truly understands its own existence or sets independent goals.

Common Misconceptions (Quick Reality Check)

  • “AI will replace humans.” – AI excels at repetitive or data‑heavy tasks, but it still needs human oversight, especially for judgment, ethics, and creativity.
  • “AI thinks like a person.” – AI models find patterns; they don’t possess consciousness or emotions.
  • “If a tool is AI‑powered, it’s automatically safe.” – Bias, privacy, and security issues still exist; always verify sources and keep software updated.

Simple Checklist for Everyday Users

  • ✔️ Know the source. Use AI tools from reputable companies (Microsoft, Google, OpenAI, etc.).
  • ✔️ Don’t share sensitive personal data. Treat AI chatbots like any public website—avoid posting credit‑card numbers, passwords, or medical IDs.
  • ✔️ Verify critical information. If AI gives you health, financial, or legal advice, double‑check with a qualified professional.
  • ✔️ Keep software current. Updates often contain security patches for the underlying AI services.
  • ✔️ Understand limitations. AI can hallucinate (produce plausible‑sounding but false statements); be skeptical of statements that seem too absolute.

Next Steps (If You Want to Explore Further)

In future posts we’ll dive deeper into:

  • How to use free, beginner‑friendly AI tools safely (e.g., Microsoft Copilot, Google Bard, OpenAI’s ChatGPT).
  • Basic privacy‑preserving habits when interacting with AI.
  • How small businesses can start leveraging AI for productivity without big budgets.

Need More Guidance?

If you have questions about AI tools, security concerns, or want a personalized recommendation, call PSA Computer Services at (707) 506‑6802.

Scams and Scammers – Email

Article (PSA‑0026)

Why Email Scams Matter

Scammers use email to trick you into handing over personal data (passwords, Social‑Security numbers, account numbers) or to install malicious software that can turn your device into ransomware. Even if you pay the ransom, the attackers almost never unlock your files.

Common Ways Email Scams Look

  • Urgent pleas for help (e.g., “My account is locked – send money now”).
  • Fake password‑reset or security‑alert messages.
  • Impersonations of familiar institutions – government agencies, the IRS, banks, or popular services like Netflix.

Why Businesses Are Prime Targets

Scammers can harvest a company’s public data (website, LinkedIn, press releases) and craft highly specific, believable messages that appear to come from a trusted partner or vendor.

Key Statistics (to put the risk in perspective)

According to Symantec research, **≈ 85 % of all email traffic is spam or malicious**. Roughly **9 out of 10** messages are not legitimate, and most contain malicious links or attachments.

Three Pillars of Protection

1. Adopt a Healthy Distrust of Email

  • Assume every unsolicited email could be a trap.
  • Never click links or open attachments unless you’re 100 % sure they’re legit.

2. Keep Your Basics Up‑to‑Date

  • Install operating‑system and application security updates promptly.
  • Run reputable antivirus/anti‑malware software and keep its definitions current.
  • Enable a firewall (built‑in Windows Defender Firewall or a third‑party solution).
  • Configure your email provider’s spam‑filter and junk‑mail settings.

3. Examine Suspicious Emails Carefully

  1. Don’t rush. If you’re busy, set the message aside and review it later.
  2. Ask yourself:
    • Do I actually have this service or account?
    • Does the request make sense for me?
  3. Check the sender address. Look at everything after the “@”.

    Real Netflix example:
    admin@netflix.com

    Fake Netflix examples (watch the domain part carefully):
    admin@netflix.ru
    admin@netflex.com

    The legitimate address always ends with .com and the domain name is spelled exactly “netflix”. Anything else (e.g., .ru, “netflex”) is a red flag.

  4. If anything feels off, mark the message as Spam/Junk and delete it.

Quick Email‑Scam Checklist

  • ✔️ Treat every unexpected email as suspicious until verified.
  • ✔️ Hover over links – the URL displayed must match the claimed site.
  • ✔️ Verify the sender domain (e.g., @bankofamerica.com, not @bankofamerica.co).
  • ✔️ Keep your OS, apps, antivirus, and firewall up to date.
  • ✔️ Use strong, unique passwords and enable multi‑factor authentication where possible.
  • ✔️ Report phishing attempts to your email provider and to the FTC (reportfraud.ftc.gov).

What to Do If You Think You’ve Been Compromised

  • Disconnect the device from the internet.
  • Run a full scan with your antivirus/anti‑malware solution.
  • Change passwords for any accounts that may have been exposed – start with email, banking, and any services that store personal data.
  • Consider enabling credit‑monitoring or a fraud‑alert with the major credit bureaus.

Need Help?

If you have questions about a specific email, need assistance tightening your security, or want a quick safety review, call PSA Computer Services at (707) 506‑6802.