Scams and Scammers

Article (PSA-0024)
Submitted by: Billy Joe Long
Company: PSA Computer Services
Titled: Scams and Scammers

There are many types of scams and scammers you may encounter throughout your life. Over the next three articles I would like to talk to you about three different types of scams you may encounter while browsing the web, answering the phone or checking your email.

In this article we will discuss “Browser Hijacks”.

This is a common type of scam/attack and can happen when you are using your computer to browse the web. Here’s how the scam works: when you visit a webpage, the scammers will have some type of “trigger” embedded in the webpage. These triggers are usually in the form of a link, image or ad. Have you ever heard of the term “clickbait”? That’s what these are: typically phrases, or pictures that many people cannot resist clicking on or rolling their mouse over. If you do click on them or roll over them with your mouse it will trigger a routine (execute code) which can then pop-up a dialog box with some kind of alarming text, such as “Virus Alert!”. Sometimes it will even be accompanied by alarming sounds, voices warning you that you have been infected or hacked and may even look like an antivirus software performing a scan and finding thousands of infections! Note – until you click something or call that number on the screen, YOU ARE OKAY. What you do next will determine the outcome of this browser hijack scam. Do they get what they want – your money, control of your computer and perhaps you via extortion or does it simply cost you a few minutes of your time … its up to you. So relax and ignore everything you see and hear on your computer in this moment. It’s all geared to induce a state of panic. Panicking makes it difficult for us to think clearly and more susceptible to making bad decisions and this is the goal of the scammers. Now that you’re relaxed, we have two tried and true methods of ending this “Browser Hijack” scam without actually being scammed. One is for computer savvy users, the other is for the rest of us. You’ll need to decide which one is right for you.

First way – perform a [CTRL]-[ALT]-[DELETE] key combination press and then select “Task Manager” from the displayed menu. This will, as the name states, open the Task Manager utility. This utility lists all the currently running processes on your computer. It can be configured to show “More details” or “Fewer details” by toggling the option in the lower left of the dialog status bar. Either view will work for our purposes. Scan the list of processes for the name of the browser you are using to browse the web. Common browser names are: Google Chrome, Firefox and Microsoft Edge. Right-click the browser name to display a shortcut menu. From the shortcut menu select the option “End task”. This should close your browser AND the alarming virus message. Now open the same web browser you just closed and if asked to “Restore pages … ” decline. If you restore the pages, you’ll be looking at the fake virus alert page again and starting over. If this process seems a bit complex for you, then on to the second way.

The second way. Warning – this process can cause data loss for any documents, currently open on your computer, which have not been saved. If you have data which needs to be saved, I encourage you to work through the “First way”. If you absolutely can not accomplish the first way, give me a call – the number is at the end of this article.

Okay, we are going to perform what is called a “hard stop” of your computer. Press and hold your power button for 4-6 seconds, until you hear it power off. This effectively closes all programs running on your computer – including the browser hijack. This is not ideal and should only be used as a last resort to deal with the browser hijack. Once it has powered off, simply power it back on and open the same web browser. If asked to “Restore pages … ” decline. If you restore the pages, you’ll be looking at the fake virus alert page again and starting over.

In this article we talked about browser hijack scams, which are pretty straight forward to deal with. In the next article we’ll discuss some basic phone scams and what you can do to protect yourself from them.

If you have questions give PSA Computer Services a call at (707) 506-6802 or check us out on the web at

Computer Security Software Considerations

Article (PSA-0023)
Submitted by: Billy Joe Long
Company: PSA Computer Services
Titled: Computer Security Software Considerations
Original release date: June 10, 2023

Is more security really necessary? When is enough enough? Antivirus, spyware protection, malware protection, browser protection and firewalls, where does it all end? As we dive into this issue remember each case is different and depends on where, what and how the computer is used. So, for our discussion we will break computer security up into two categories: “online computers” and “always offline computers”.

Online Computers:
(1) If your computer is connected to a network or the internet, you should have a functioning, properly licensed and updated antivirus program. The antivirus software you choose should offer “Real Time” scanning, “Scheduled” scanning and “Manual: scanning. “Real Time” scanning allows the antivirus program to continually scan files as they move to and from your computer, and will notify you if any of the file(s) are suspicious. Think of this as “preventive protection”. “Scheduled” scanning allows you to schedule a recurring scan of all existing files (or selected files) on your computer hard disk in a systematic effort to locate suspicious files. “Manual” scanning allows you to scan a particular file or files anytime you feel it is necessary.

In the past Antivirus software was purchased and installed on your computer. This usually required an annual subscription and could become quite pricey. For those of us using a modern Windows operating system, antivirus protection is built into the operating system at no additional cost. You can still purchase antivirus protection from a third party vendor such as Symantec, McAfee and AVG, but be aware these programs have become quite expensive and massive. Worse yet, they can often render your computer unuseable.

(2) If your computer is connected to the internet, you should have a functioning, properly licensed and updated firewall. A firewall is software or hardware that checks information coming from the Internet or a network, and then either blocks it or allows it to pass through to your computer using a list of rules. Some of these rules are generated automatically and others are rules we make. A firewall can help prevent hackers or malicious software (such as worms) from gaining access to your computer through your local network or the internet.

A “Software” firewall is installed directly on your computer. Microsoft operating systems have shipped with a software firewall built-in since the release of Windows XP service pack 2. A “Hardware” firewall, in most homes and small businesses, will be your router. With a hardware firewall there’s nothing to install on your computer. There are “paid for” firewall products available, but I would recommend taking a close look at the built in firewall of the operating system you are currently using (if it offers one) before running out and purchasing the newest firewall product. For the majority of computer users the built in firewall is more than adequate.

Non-Internet Connected Security Considerations:
If your computer will NEVER be connected to a network or the internet, EVER, then you are at liberty to relax your protection considerably, allowing more of your systems resources to be used on applications. However, there are still some very important considerations. If you will be using storage media containing files from other computers which are connected to the internet, then there is still the possibility of infection. If your computer will never be connected to the Internet, and you will never load files from another machine onto your computer, then you can bypass antivirus security software all together. If your computer will be using files from another computer then you should have an antivirus program installed.

Is More Protection Really Necessary?
In short, for a computer connected to the Internet, a single antivirus program, a single configured firewall and a healthy dose of common sense is adequate. Installing more than one antivirus program can generate a few notable issues. Let’s take a moment to look at the most critical of these issues.

(1) RAM Depletion. Each program running on your computer is using some of your system memory (RAM). The more programs running, the more RAM is used. When there is no more RAM available, your computer will begin to use your hard disk as a “type” of RAM. Hard disk access is not as fast as RAM access, and when your system has to start using the hard disk as RAM it degrades the performance of your entire system – TREMENDOUSLY!

(2) Software Conflicts. Having more than one antivirus program running on your system may result in a software conflict. If both programs are scanning your computer for “viral activity” there is a high probability they will see each other as “viral activity”, causing a software conflict. This particular problem can be extremely frustrating and can lead to the next very challenging issue.

(3) System Corruption. Files necessary to the other antivirus program can often be identified as “malicious”, and will be quarantined (made inaccessible) or removed, leaving the antivirus program corrupted. Trying to uninstall or repair a program in this state can be problematic, to say the least.

If you are unsure of your “Security” status – give PSA Computer Services a call at (707) 506-6802.

Backup, Backup, Backup!

Article (PSA-0022)
Submitted by: Billy Joe Long
Company: PSA Computer Services
Titled: Backup, Backup, Backup!
Original release date: March 10, 2023

Reliable backups are the backbone of your IT “Disaster Recovery Plan” and “Business Continuity Plan”. Catastrophe can hit any business, no-matter how small or big you are, and catastrophe can come in many forms such as: fire, hardware failure or “ransomware”. The more data lost, the greater the impact on your business. Part of getting your business back up and running after a disaster, is being able to restore operations to where they were before the problem occurred. Businesses who have learned the value of backups employ the 3-2-1-0 backup rule. Lets take a quick look at each one of these rules.

Rule 3: Maintain at least three copies of your data and applications. That’s the one copy you’re using and two backups. This way, if one of your backups is unavailable for any reason, you can still recover what you need in a reasonable amount of time.

Rule 2: Store your backups on at least two different types of media. One reason for this is each type of media has its own vulnerabilities, and you don’t want both of your backups susceptible to the same problem. By utilizing different media, you can reduce your exposure to the same incident preventing access to both of your backups.

Rule 1: Keep one of the backups in a different location. Consider a catastrophe at your business, such as a break-in, fire or natural disaster. If all of your backups are at the same location, they will all be affected. This can result in total data loss for your business.

Rule 0: Verify your recovery plan has zero errors. It is not uncommon for businesses to implement a backup plan but fail to verify it is performing as expected. Regular testing is critical to ensuring you can recover your business data and applications in the event of a disaster.

It doesn’t matter if you are a business or home computer user, if you have anything on your computer that matters to you, it is your responsibility to make sure you have a backup plan in place. In my 20+ years of experience in the IT industry I have seen brand new hard drives fail within 90 days of purchase. I have seen years of family pictures vanish by accidental deletion and I have seen “un-tested” backups fail to restore important business files – files which everybody “thought” were being backed up.

If you are unsure of your backup status, give PSA Computer Services a call at (707) 506-6802.

Additional information on backups:
High availability – following the backup rule
The Importance of Effective Data Backup

Printer Installation 101 – (WiFi)

Article (PSA-0021)
Submitted by: Billy Joe Long
Company: PSA Computer Services
Titled: Printer Installation 101 – (WiFi)
Original release date: December 10, 2022

In our last article, Printer Installation 101 – (USB and Ethernet), we discussed the basic process on how to setup a printer via USB connection and Ethernet connection. In this article we will address setting up a WiFi enabled printer on your WiFi network.

Basic preparation for installing most WiFi printers will include: knowing your WiFi network name (SSID) and having your WiFi connection password. Also, on initial configuration you will want your WiFi printer close to your WiFi router (or access point). Within four feet with clear line of sight will be fine for our purposes. In addition to having the printer installation software available for your make and model of printer, ensure your computer(s) are connected to the same WiFi network you will be connecting the printer too.

There are two common WiFi printer setups you are most likely to encounter – printers “with a touchscreen” and printers “without a touchscreen”.

1. Setting up a printer with a “touchscreen”.
If your WiFi printer has a touchscreen you will need to go into the menu system to access and configure the printers WiFi connection properties. Most of the menu systems are pretty intuitive but can vary greatly – so at this point you may need to refer to your printer user manual for specifics on where to enter your WiFi connection information. Once you are in the correct menu for configuring your printers WiFi connection settings, you will either select your network from a list offered by the printer menu or you will need to enter in the name of your WiFi network manually. If you have to enter it in, make sure it matches exactly! Next, you will be prompted to enter your WiFi connection key (password). Again, make sure you enter it exactly … passwords are case sensitive. If all went well, your printer should now be connected to your WiFi network. You can now unplug your WiFi printer and move it to any location you want, as long as it is within your WiFi network coverage range. There is still more to do before you can print to it though … but for those of you who have successfully completed this step – please skip to step 3.

2. Setting up a printer without a “touchscreen”.
If your WiFi printer does not have a touchscreen, then it will attempt to connect to your WiFi network using technology called WiFi Protected Setup or (WPS). Your WiFi router (or access point) will need to offer this technology for you to successfully connect your printer. If you are unsure whether your WiFi router offers WPS, please refer to your router user manual. Assuming your router offers WPS, the first step is to put your printer in WPS mode. This is usually accomplished by pushing a button on your printer (refer to your printer manual). Next you will need to put your router in WPS mode within two minutes by pushing the provided WPS button. Each WPS enabled printer will offer a visual queue to indicate whether it has successfully connected to your WiFi network or not. Please refer to your printer manual for specifics. Most printers will usually have a blinking light while connecting – which then turns solid once connected. If all went well, your printer should now be connected to your WiFi network. You can now unplug your WiFi printer and move it to any location you want, as long as it is within your WiFi network coverage range.

3. Finally, setting up your computer to print to your WiFi printer.
Run the installation software that came with your printer (or you downloaded from the manufacturers website) on your computer. Each installation setup can be slightly different. If asked what type of installation your are performing (USB, Ethernet or WiFi), choose WiFi. The software will use your computers WiFi network connection to look for your WiFi printer. That is why it is critical that your printer be on the same WiFi network as your computer(s). If all goes well, the installation software should present you with the option to choose your printer from a list. Once you select your printer the installation should proceed with minimal input from you. If there are multiple printers on your WiFi network, you may be asked to choose the correct printer from a list. The printer you want will usually be distinct based on the make and model. Once the installation is completed you can open up Notepad (or the text editor of your choice) type a word or two and hit print. If all went well your printer should jump to life and produce a copy of your document.

Setting up a printer can be challenging if technology is not your thing. This walkthrough is very generalized and may not be sufficient to help with all installation scenarios. If you run into a problem installing your new WiFi printer and feel you need some help, give PSA Computer Services a call at (707) 506-6802.

Printer Installation 101 – (USB and Ethernet)

Article (PSA-0020)
Submitted by: Billy Joe Long
Company: PSA Computer Services
Titled: Printer Installation 101 – (USB and Ethernet)
Original release date: September 12, 2022

So you got that new printer and your thinking … now what? Well don’t panic, depending on how you want to use your printer this should be pretty straight forward. Let’s take a look at the two most common printer setups.

1. You will use your printer on one and only one computer (desktop or laptop).

When you buy a consumer grade printer today it will usually provide, at a minimum, one of these three connection methods: USB, Ethernet or WiFi (or some combination of those three or all three). There are other connection methods, but we will only be addressing these three methods over the next couple of articles.

Setting up your printer directly connected to your computer using USB is the easiest setup, but comes with limitations on where you can put your printer. Typically the USB cable that comes with your printer will be 3 to 6 feet long. That’s not much length to work with, but if that works for you then simply pop the installation disk into your computer (or go online and download the drivers to your computer – the web address will be in the instructions – yes, you should review them as well!). Then run the setup program. The most common software setup routine will be to run the printer setup software BEFORE PLUGGING YOUR USB CABLE INTO THE COMPUTER. At some point in the printer software installation you will be instructed to plug the provided USB cable into the printer and your computer. The software installation will continue once the printer is detected. From there follow the on-screen instructions and once completed you should have the ability to print – congratulations!

(Note on USB printers. USB printers can be shared to other users located on the same network. This setup can produce setup issues and is therefore not covered in this walkthrough. If you would like more information on this type of setup, please give us a call.)

The setup process for a network printer will be the same whether it’s for one or many computers to access it – so we will just skip to section 2 for the ethernet network walkthrough.

2. You will use your printer on one or more computers (desktop or laptop).

Network printer installation is a little more involved. Network printers offer flexibility on where you can put your printer – especially the WiFi variety, but can require a little more work to setup. In this article I will cover ethernet installation only. WiFi installation will be more involved and we’ll take a look at that in my next article.

Setting up your printer on your ethernet network consists of first connecting your printer to an ethernet cable which is connected to your router. Now pop the installation disk into your computer (or go online and download the drivers to your computer – the web address will be in the instructions – yes, you should review them as well!). Then run the setup program. At some point in the printer software installation you will be instructed to choose a printer from a list of available network printers (unless there is only one). The software installation will continue once your new printer is selected. From there follow the on-screen instructions and once completed you should have the ability to print from this computer – congratulations! Run the exact same setup process on any other computer, on the same network, you want to have the ability to print. Congratulations again! Tune in next time as we tackle setting up a WiFi printer.

What Is Cyber Extortion?

Article (PSA-0019)
Submitted by: Billy Joe Long
Company: PSA Computer Services
Titled: What Is Cyber Extortion?
Original release date: June 10, 2022

The news is constantly reporting cyber-criminal activity and the devastating consequences of those who are compromised. This article will define what cyber-extortion is, and some steps you can take to make it less likely that you will fall prey to their criminal schemes. I will also lay out for you a vital step you can do now to help recover in the event you are compromised.

So, what is cyber-extortion? Cyber-extortion is a network/internet crime where an individual or group demands money or some other response to discontinue whatever criminal activity they are enacting against you or your business. In one type of cyber-extortion the attackers compromise a device on the victims network and then attempt to install malware known as ransomware on the device. If successful they will then inform the user of the situation and demand payment for the user to regain access to their data.

How are we so easily compromised? Email. Email has become a serious problem with the shear volume of spam that most of us receive. Cyber-criminals know most people are dealing with large volumes of junk email everyday and are likely to click on a link in an email if the email looks legitimate to the user in someway. So these attackers expend quite a lot of effort to custom craft emails to closely resemble authentic emails from companies most of us are very familiar with. Embedded in these counterfeit emails are links to malware and phone numbers to hack groups. Once the link is clicked or the number is called you are well on your way to full compromise and at their mercy.

So what can we do to help avoid this situation? First step, don’t trust any email. You must exercise restraint and common sense. Let me give you an easy example. You receive an email stating that you just won a million dollars. All you have to do is click this link to start your claim. We now apply common sense and mark the email as Spam and then Delete it. Why? Because you did not just win a million dollars and if you click that link to claim it, your going to get something you’ll regret for a long time. Easy right? Let’s try a harder one. You receive an official looking email stating that your payment of $1,200 dollars has been successfully processed and will deduct from your account within the next 3-5 business days. The email then goes on to thank you for your payment and for being one of their valued customers. At the very bottom of the email, where you would expect it to be, is the statement: if you did not initiate this payment please click this link to cancel the payment. What do you do? Take a careful look at the return email address for the email – does it make sense? Now hover over the link they are directing you to – without clicking on it! Does the link make sense? With some training and skill you’ll be able to identify these scam emails and avoid a lot of trouble. If after examining the email you still can’t determine whether it’s legit or not, contact your IT service provider. They will take a look at the email for you and let you know if it’s legit.

What can you do now to help minimize the pain if you do become compromised? Backups. Backup, backup, backup. You hear it all the time, but are you doing it? Are you doing the right kind of backups? If not, you are in store for some serious heartache. With a proper backup system these compromises become less painful. If for some reason you or your business becomes the victim of a cyber-extortion group, it can be mitigated without paying them a dime and with minimal down-time by restoring the system (or systems) to a previous state.

In this article I have attempted to raise your awareness to the ongoing issue of cyber-extortion and cyber-criminals. These crimes are not just happening to corporations or down in the city, they’re happening to local businesses and our neighbors. Knowledge is power – if it is used correctly! I hope you will take what you have learned here and use it as a starting point for your own research into how to protect yourself and your friends from cyber-criminals.

If you have questions concerning cyber-crime, email, backup systems or any other issues give us a call.

Introduction to 5G

Article (PSA-0018)
Submitted by: Billy Joe Long
Company: PSA Computer Services
Titled: Introduction to 5G
Original release date: March 10, 2022

5G is the 5th generation mobile network. That means it is a new global wireless standard after 1G, 2G, 3G and 4G networks. 5G enables a new kind of network focused on connecting everyone
and everything together.

5G is based on OFDM (orthogonal frequency-division multiplexing). OFDM is a method of modulating a digital signal across several different channels to reduce interference. 5G also uses
wider bandwidth technologies. 5G OFDM operates on the same mobile networking principles as 4G LTE (Long-Term Evolution). However, 5G has a theoretical peak speed of 20 Gbps, while the
peak speed of 4G is only 1 Gbps.

5G promises ultra-low latency, which would improve the performance of business applications as well as other digital experiences, such as online gaming, video conferencing, and self-driving cars. The lower the latency, when sending and receiving data, the closer we get to “real-time” communications.

5G networks will also simplify mobility, with seamless open roaming capabilities between cellular and Wi-Fi access. Mobile users can stay connected as they move between outdoor wireless connections and wireless networks inside buildings without user intervention.

5G technology should improve connectivity in under-served rural areas and in cities where the demand can overwhelm today’s available capacity with 4G technology. 5G is designed to deliver
faster and better mobile broadband services than 4G LTE. Because of this 5G is expected to impact every industry.

If you have questions concerning your email services give us a call.

Email – POP, IMAP, SMTP … What Does It All Mean?

Article (PSA-0017)
Submitted by: Billy Joe Long
Company: PSA Computer Services
Titled: Email – POP, IMAP, SMTP … What Does It All Mean?
Original release date: December 1, 2021

Almost all of us use Email on a daily basis, but most of us have little idea as to what is happening “under the hood” when we send or receive an Email. Like an automobile, not knowing how it works is not a really big deal … until something stops working! A little bit of knowledge about how the automobile works can save you time and money. The same is true about Email.

This article intends to give you basic information about how Email flows from a sender to a recipient and the most common protocols used to perform these functions.

Email works a lot like regular mail works. With regular mail you write a letter and put it in your mailbox with the flag up. This flag lets your post-delivery person know you have an outgoing letter. The postal delivery person will take your mail to the post office, where it will be sorted and routed to the next destination. Each time it is sorted and routed it should, theoretically, be getting closer to the intended recipient address. Once delivered and when the recipient next checks their mailbox – voila! – they get the letter you mailed to them!

With Email you write your message in your Email program and click the send button. If all works as expected, it is sent from your Email program to your Email providers mail server. Your Email providers server then routes the Email to the next appropriate destination, until it finally ends up at the intended mailbox. Once delivered the recipient can use their Email program to download the message from their providers server or they can view their Email on the server directly without removing it from the server.

Email uses different protocols to transport your Email from and to your Email account. They can be grouped into two types: “Incoming” & “Outgoing”. Before looking at the common protocols used today, let’s get a working definition of protocol. An Email protocol is a standard method of information exchange between email clients (programs such as Outlook or Thunderbird) and Email servers (usually hosted by your Email service provider). One type of protocol is used to send Email (SMTP protocol) and the other type of protocol is used to receive Email (POP3 or IMAP).

Knowing this allows you to determine some basic facts about any Email issues you are experiencing. For example, if I am having trouble sending Email, and my Internet service has been verified as working, then my problem may very well be related to my send protocol (SMTP protocol) settings. If I am having trouble receiving Email, and my Internet service is working, then my problem may be related to my receive protocol (POP3 or IMAP) settings. This is a gross oversimplification of the Email troubleshooting process and is intended for basic discussion purposes only.

One last point on email protocols. The receive protocol you use makes a big difference in the way you view and work with your Email. If you need to check your Email from more than one device (computer, laptop and phone) then you should use the IMAP protocol. If you only intend to check your Email on one device then you can use the POP3 protocol, although IMAP is still recommended – if available.

When you use IMAP, your Email program functions as a “Viewer” through which you can view your Email and directories located on your service providers server. Your Email remains on their server(s) and is available for viewing by many devices at the same time. With POP3, your Email program downloads your Email to your computer and removes the Email from your service providers server(s). If you were to attempt to check your Email from a different device now, you would not see any Email other than those that came in since the last time you checked. This can lead to a very complex and confusing Email environment.

If you have questions concerning your email services give us a call.

Windows 11, The Basics

Article (PSA-0016)
Submitted by: Billy Joe Long, Owner
Company: PSA Computer Services
Titled: Windows 11, The Basics
Original release date: September 10, 2021

Yes, we were told by Microsoft in 2015 that Windows 10 would be the last version of Windows. However, recent news has verified there will in-fact be a new version – Windows 11. So let’s take a few moments to have a look at this “new” version of Windows.

As of now, Microsoft expects to begin shipping Windows 11 on October 5th of this year. The new version will be distributed as a “free” Windows upgrade to existing Windows 10 users, if their computers meet the Windows 11 system requirements. Here are the current minimum system requirements (subject to change):

  • A modern 1GHz 64-bit dual-core processor
  • 4 GB RAM
  • 64 GB drive
  • 9-inch display
  • 1366×768 resolution
  • UEFI, Secure Boot & TPM 2.0 compatible
  • DirectX 12 compatible graphics/WWDM 2.x

The first thing to note is Microsoft will not be releasing a 32bit version of the Operating System (OS). This is generally not a serious issue – 32bit programs should continue to run as expected on the 64bit OS.

The next thing to note is Microsoft will be limiting “officially supported” Windows 11 computers to certain Central Processing Units (CPU). Currently, you will need to have an Intel 8th-generation or better CPU to officially run Windows 11.

Microsoft has also increased the required drive storage to 64GB, up from 16GB with Windows 10. The same goes for RAM, being bumped up from 2GB to 4GB.

The greater storage and RAM requirements are probably required to support the myriad of new features and changes needed to differentiate Windows 11 from Windows 10. For example, Windows 11 will feature a brand-new user interface (UI). This new UI will feature a new Start menu and Taskbar experience. I am not particularly thrilled about needing to retrain muscle memory for productivity, but for those of you who love constant change – this should be appealing.

Microsoft has said that Windows 11 is “built for gamers” with features such as: Auto HDR, Direct Storage and DirectX12 Ultimate. These features may matter to you gaming enthusiasts, but for business users, it will make little difference.

A more useful change has to do with Microsoft “Creators” updates which came with Windows 10. Microsoft has been struggling with rolling out two major updates a year with Windows 10. There have been constant, serious, problems for end users as Microsoft engineers have struggled to meet the update release dead-lines. Windows 11 will be returning to one major update per year. This should result in less: data loss, time loss and frustration for end users. This is a welcome change and long over due in my opinion.

As mentioned previously in the article, Windows 11 will be offered as a free upgrade. Microsoft says there’s no time limit on upgrading to Windows 11 and we will not have to upgrade to Windows 11 right away. That is good news indeed, but note – you will need to upgrade at some point in the future and it may require new hardware. We’ll know more about this as it is released from Microsoft.

Original Equipment Manufacturers (OEMs) will still have to pay for a Windows 11 license. OEMs are people/companies who build computers for end users and want to ship Windows 11 on the new computer.

There is not a lot of practical information I can give you about Windows 11 at this point. Once the new OS is released I’ll be able to provide a more in-depth review of Windows 11.

If you have questions or concerns about Windows 11 give us a call.

You’ve Got Spam!

Article (PSA-0015)
Submitted by: Rebekah Long, Technician
Company: PSA Computer Services
Titled: You’ve Got Spam
Original release date: June 10, 2021

Getting spam is a hassle. No argument there, but what’s even worse than that?

Unknowingly sending it.

When fake, unverified, and potentially virus ridden emails go out with your email address, it can look bad. And not only do you look bad, but you also have to deal with the emails that bounce back due to dead addresses.

There’s one reassurance in all of this, your computer is not actually sending out spam, and your computer and IP address are still safe. Unfortunately, there is still some bad news.

If spam is being sent from your email address, your address has either been “spoofed” or “hijacked.” Either way the spam isn’t coming from your computer, and probably not from the bad actors computer either. It’s most likely being sent from someone’s “Malware-Infected” computer – and they probably don’t even know they’ve been hacked!

Spoofing an address is when someone sends email with your email address as the sender, even though they don’t actually have access to your email account.

Unfortunately, as of now, there is no way to prevent spoofing. Additionally, there is no way to know for sure who sent the spoofed emails and no way to stop it from happening.

Fortunately, these bad actors tend to change the email address’s they spoof often, and they will move on from your email address eventually. Your email service provider may administratively block your email address for a period of time when they notice the large amount of email being sent from your email account. If this happens, you will need to contact them to “unblock” your email address.

Hijacking can be much more devastating. In the case of a hijacking the criminal takes control of your email account. This includes them having the ability to read your email, and contacts list. They can then use this information to specifically target people in your contacts. A hijacker can also lock you out of your own email account by changing your password.

Thankfully, unlike spoofing, something can be done about hijacking.

If you can still receive email, try logging into your email account on another computer or by using your internet browser’s private mode. When the login fails, try the services “Forgot your password?” or “Need help?” link. The service will email you a password reset link. You will need to act fast and get the password reset email before the bad actor.

If that fails you’ll have to contact your email service provider and explain the problem. If you have access to the internet, then perform an internet search similar to “I can’t sign into my Gmail account” or “I can’t sign into my Outlook account” or the name of whatever email service you use. This should get you to a support page for your email service provider.

If you’ve been using the same password for other services – you should change those passwords immediately to stop the hacker from moving onto other services you use.

Once you have your email account back under control, don’t forget to email apologies to everyone who received spam from your email address.

Here are four things you can do to help prevent your accounts from being hacked in the future:

  • Use passwords that are 9 characters or more. Utilize upper and lowercase letters, numbers and a special character or two (if allowed).
  • Use different passwords for each different account (don’t be lazy, you’ll regret it later!)
  • If the account offers multi-factor authentication, use it.
  • Do not send passwords in emails …. ever!

If you’ve been hacked and need help give us a call.