Archives 2022

Printer Installation 101 – (WiFi)

Article (PSA‑0021)

What You’ll Need Before You Start

  • Wi‑Fi network name (SSID) and password.
  • Printer’s user manual (or a quick look at the online PDF).
  • Computer(s) that are already on the SAME Wi‑Fi network.
  • The printer should be within about 4 ft of the router for the initial setup (clear line‑of‑sight is best).

Two Ways to Connect a Wi‑Fi Printer

1️⃣ Printers with a Touchscreen

  1. Power the printer and open its **menu**.
  2. Navigate to **Network** → **Wi‑Fi Setup** (the exact wording varies by brand – see the manual).
  3. Select your Wi‑Fi network from the displayed list **or** choose “Manual Entry” and type the SSID exactly as it appears.
  4. Enter the Wi‑Fi password – remember passwords are case‑sensitive.
  5. Confirm and wait for the printer to show a solid “connected” light.
  6. Once connected, you can move the printer anywhere within your Wi‑Fi coverage area.

2️⃣ Printers without a Touchscreen (WPS Method)

  1. Locate the **WPS button** on the printer (often labeled “WPS” or shown as a wireless‑plus‑arrow icon). Press it – the printer will now be in “WPS pairing” mode.
  2. Within 2 minutes, press the **WPS button** on your router or access point. (If you’re not sure where it is, check the router’s quick‑start guide.)
  3. The printer will blink while it searches; a solid light means it’s successfully connected.
  4. Like the touchscreen method, you can now relocate the printer within the Wi‑Fi range.

3️⃣ Adding the Printer to Your Computer

  1. Insert the installation CD that came with the printer **or** download the latest driver/software from the manufacturer’s website.
  2. Run the installer. When prompted for the connection type, choose **Wi‑Fi**.
  3. The setup program will scan the network and list any printers it finds. Select your printer (usually identified by make + model).
  4. Follow any remaining on‑screen prompts – most will finish automatically.
  5. Test the setup: open Notepad (or any text editor), type a line of text, and click **Print**. The printer should produce a page.

Quick‑Troubleshooting Tips

  • Can’t see the printer? Ensure both the computer and printer are on the **same** SSID (not a guest network).
  • Printer won’t connect? Double‑check that the Wi‑Fi password was entered correctly and that the router isn’t set to “AP Isolation” (which blocks devices from communicating).
  • Signal is weak? Move the printer a bit closer to the router or add a Wi‑Fi extender.
  • Still stuck? Restart the printer, the router, and the computer – then repeat the steps.

When to Call for Help

If you run into any of the above issues—or if the instructions don’t match your specific printer model—give PSA Computer Services a call at (707) 506‑6802. We’ll walk you through the process or handle the setup for you.

Printer Installation 101 – (USB and Ethernet)

Article (PSA‑0020)

What to Expect

Most consumer printers ship with at least one of three connection options: USB, Ethernet, or Wi‑Fi. This guide walks you through the two most common scenarios:

  1. Printer used by a single computer (desktop or laptop).
  2. Printer shared with one or more computers on the same network.

Scenario 1 – Single‑Computer Setup

️ Connection Options

  • USB – simplest, but limits where the printer can sit (cable length is usually 3‑6 ft).
  • Ethernet – use a network cable to the router (covered in Scenario 2).
  • Wi‑Fi – covered in a later article.

Step‑by‑Step USB Installation

  1. Locate the installation CD/DVD that came with the printer or download the latest driver from the manufacturer’s support site.
  2. Run the installer **before** plugging the USB cable in. The software will prepare the driver and may ask for a reboot.
  3. When prompted, connect the printer’s USB cable to the computer. The installer should detect the printer and continue automatically.
  4. Follow any remaining on‑screen prompts (e.g., naming the printer, setting it as default).
  5. Print a test page to confirm the installation succeeded.

⚠️ Note on Sharing a USB Printer

You can share a USB‑connected printer with other Windows computers on the same network via Printer Sharing. This adds extra steps (share the printer from the “Devices & Printers” control panel and install the shared driver on each client). If you need help with that, give us a call.

Scenario 2 – Network (Ethernet) Printer

Why Use Ethernet?

  • Places the printer anywhere on the LAN, not just next to one computer.
  • Provides a stable, high‑speed connection—ideal for larger print jobs.
  • Allows multiple computers to print without additional cables.

Ethernet Installation Steps

  1. Connect one end of an Ethernet cable to the printer’s LAN port and the other end to an available port on your router or switch.
  2. Power on the printer and let it obtain an IP address (most printers will print a configuration page showing the address). Tip: Note the IP address for later use.
  3. Insert the installation CD/DVD or download the driver from the manufacturer’s website.
  4. Run the installer. When asked to choose a connection type, select **Network (Ethernet)**.
  5. The installer will scan the LAN for printers. Choose your printer from the list (identified by model and IP address). If it doesn’t appear, you can manually enter the IP address.
  6. Complete the on‑screen wizard and print a test page.

Adding the Same Printer to Additional Computers

Repeat steps 3‑6 on each additional computer. Because the printer is already on the network, the installer will detect it automatically.

Quick Troubleshooting Checklist

  • Printer not detected? Verify the cable is firmly seated, the printer shows a “ready” light, and the router’s LEDs indicate a link.
  • Wrong driver? Download the driver that matches your exact printer model and Windows version (or macOS version).
  • Print jobs stuck in queue? Restart the print spooler service (services.msc → Print Spooler → Restart) or reboot the printer.
  • Multiple computers see different printers? Ensure all PCs are on the same subnet (e.g., 192.168.1.x) and that any guest‑network isolation is disabled.
  • Wi‑Fi later? When you’re ready, we’ll cover Wi‑Fi setup in the next article.

Ready to Print?

Once the test page prints, you’re good to go. If any step didn’t work as expected, don’t worry—just give PSA Computer Services a call at (707) 506‑6802 and we’ll walk you through the process.

IC3 Annual Report – 2021 Elder Fraud Report

Dear Reader,

Working with the Department of Justice Elder Fraud Initiative and other internal and external partners, the FBI is committed to identifying, investigating, and prosecuting criminals who target seniors. The Internet Crime Complaint Center (IC3) is a key component in this endeavor, as it provides victims a venue to identify the subject and the fraud committed against them.

Through this voluntary submission of information, the IC3 receives and tracks thousands of complaints each day. These complaints contain the details of multiple types of schemes, including romance scams, investment fraud, government impersonation, and tech support fraud.

The number of elderly victims has risen at an alarming rate, while the loss amounts are even more staggering. In 2021, over 92,000 victims over the age of 60 reported losses of $1.7 billion to the IC3. This represents a 74 percent increase in losses over losses reported in 2020.

As a result of these trends and the emphasis by the FBI on protecting our seniors, the FBI is publishing the 2021 IC3 Elder Fraud Annual Report. This information is a companion report to the 2021 IC3 Annual Report released in March 2022. These reports, along with other publications, are available at www.ic3.gov.

The intent of this information is to educate, warn, and protect potential victims of all ages. Highlighting the crimes specifically affecting seniors will it be possible to ensure the necessary emphasis and resources are allocated to address this problem.

For those who unfortunately fall victim to these criminal tactics, please know the information you provide to the FBI is vital in bringing the criminals responsible to justice.

Luis M. Quesada
Assistant Director
Federal Bureau of Investigation
Criminal Investigative Division

Read the full report here: https://www.ic3.gov/Media/PDF/AnnualReport/2021_IC3ElderFraudReport.pdf

IC3 Annual Report – 2021 Internet Crime Report

Dear Reader,

In 2021, America experienced an unprecedented increase in cyber attacks and malicious cyber activity. These cyber attacks compromised businesses in an extensive array of business sectors as well as the American public. As the cyber threat evolves and becomes increasingly intertwined with traditional foreign intelligence threats and emerging technologies, the FBI continues to leverage our unique authorities and partnerships to impose risks and consequences on our nation’s cyber adversaries.

The FBI’s Internet Crime Complaint Center (IC3) provides the American public with a direct outlet to report cyber crimes to the FBI. We analyze and investigate the reporting to track the trends and threats from cyber criminals and then share this data with our intelligence and law enforcement partners. The FBI, alongside our partners, recognizes how crucial information sharing of cyber activities is to prepare our partners to combat the cyber threat, through a whole-of-government approach. Critical to that approach is public reporting to IC3 – enabling us to fill in the missing pieces with this valuable information during the investigatory process. Not only does this reporting help to prevent additional crimes, it allows us to develop key insights on the ever-evolving trends and threats we face from malign cyber actors.

In 2021, IC3 continued to receive a record number of complaints from the American public: 847,376 reported complaints, which was a 7% increase from 2020, with potential losses exceeding $6.9 billion. Among the 2021 complaints received, ransomware, business e-mail compromise (BEC) schemes, and the criminal use of cryptocurrency are among the top incidents reported. In 2021, BEC schemes resulted in 19,954 complaints with an adjusted loss of nearly $2.4 billion.

IC3’s commitment to cyber victims and partnerships allow for the continued success through programs such as the IC3’s Recovery Asset Team (RAT). Established in 2018, RAT streamlines communications with financial institutions and FBI field offices to assist freezing of funds for victims. In 2021, the IC3’s RAT initiated the Financial Fraud Kill Chain (FFKC) on 1,726 BEC complaints involving domestic to domestic transactions with potential losses of $443,448,237. A monetary hold was placed on approximately $329 million, which represents a 74% success rate.

In 2021, heightened attention was brought to the urgent need for more cyber incident reporting to the federal government. Cyber incidents are in fact crimes deserving of an investigation, leading to judicial repercussions for the perpetrators who commit them. Thank you to all those readers who reported crimes to IC3 throughout the year. Without this reporting, we could not be as effective in ensuring consequences are imposed on those perpetrating these attacks and our understanding of these threats would not be as robust. Please visit IC3.gov to access the latest information on criminal internet activity.

The FBI’s Cyber Division is working harder than ever to protect the American public and to instill safety, security, and confidence in a digitally connected world. We encourage everyone to use IC3 and reach out to their local FBI field office to report malicious activity. Together we can continue to create a safer and more secure cyber landscape.

Paul Abbate
Deputy Director
Federal Bureau of Investigation

Read the full report here: https://www.ic3.gov/Media/PDF/AnnualReport/2021_IC3Report.pdf

What Is Cyber Extortion?

Article (PSA‑0019)

Cyber‑extortion is a crime in which an attacker compromises a device or network and then demands money (or another concession) to stop the malicious activity. The most common form is ransomware – malicious software that encrypts files and displays a demand for payment to restore access.

How Attackers Get In – The Email Factor

  • High‑volume spam gives attackers a huge audience.
  • Phishing emails are crafted to look like legitimate messages from banks, retailers, courier services, etc.
  • These emails contain malicious links or phone numbers that, when clicked or called, can install ransomware or give the attacker remote access.

Spotting a Phishing / Extortion Email

  1. Don’t trust the content at face value. If an email promises a prize, a sudden payment, or urgent action, treat it with skepticism.
  2. Check the sender address. Look for subtle misspellings (e.g., support@micrsoft.com instead of support@microsoft.com).
  3. Hover over every link—no clicks. The URL shown in the tooltip should match the claimed destination and use a trusted domain (e.g., https://www.paypal.com).
  4. Look for generic greetings. Real companies usually address you by name.
  5. If anything feels off, mark the message as Spam/Junk and delete it. When in doubt, forward the email to your IT provider for verification.

Immediate Steps If You’re Compromised

  • Disconnect the device from the network (unplug Ethernet, turn off Wi‑Fi).
  • Do not pay the ransom. Paying encourages the criminal ecosystem and rarely guarantees file recovery.
  • Notify your IT support or a trusted security professional immediately.
  • Run a reputable anti‑malware scan (Microsoft Defender, Malwarebytes, etc.) to identify and remove the malicious payload.
  • If you have recent, verified backups, restore the affected system from the backup.

Why Backups Are Your Best Defense

Even the most diligent user can fall for a sophisticated phishing attack. A solid backup strategy turns a ransomware incident from a disaster into a manageable inconvenience.

The 3‑2‑1‑0 Backup Rule (quick recap)

  1. Three copies of every important file (the original + two backups).
  2. Two different media types (e.g., internal drive + external SSD, or cloud storage).
  3. One copy off‑site (cloud service or physical storage stored at a different location).
  4. Zero‑error verification – regularly test restores to ensure the backup actually works.

Simple Checklist to Reduce Extortion Risk

  • ✔️ Keep OS, applications, and security software up to date.
  • ✔️ Use strong, unique passwords and enable multi‑factor authentication wherever possible.
  • ✔️ Disable macro execution in Office files unless you specifically need it.
  • ✔️ Regularly back up critical data using the 3‑2‑1‑0 rule.
  • ✔️ Educate family or staff to recognize phishing cues (unexpected urgency, generic greetings, mismatched URLs).
  • ✔️ Restrict administrative privileges – only install software when you have admin rights.

Want Help? We’re Here for You

If you have questions about phishing, ransomware, backup strategies, or any other cybersecurity concern, call PSA Computer Services at (707) 506‑6802. A quick conversation can save you a lot of trouble later.

Introduction to 5G

Article (PSA‑0018) – 5G Explained for Everyone

5G is the fifth generation of cellular wireless technology. It follows 1G (analog voice), 2G (digital voice & SMS), 3G (mobile data), and 4G LTE (fast broadband). 5G is a global standard that is being rolled out by carriers worldwide.

Key Benefits Over 4G

  • Much higher speeds – up to 20 Gbps theoretical (typical real‑world speeds 200 Mbps – 1 Gbps).
  • Ultra‑low latency – 1 – 5 ms on many deployments versus ~30 ‑ 50 ms on 4G.
  • Greater capacity – can support many more simultaneous devices per square kilometre.
  • More reliable connections – thanks to new spectrum use and antenna technologies.

How 5G Works – The Technology Behind It

1️⃣ OFDM (Orthogonal Frequency‑Division Multiplexing)

OFDM splits the radio signal into many narrow sub‑carriers that operate side‑by‑side without interfering. 5G uses the same basic modulation as 4G LTE but with higher‑order versions (e.g., 256‑QAM) and much wider bandwidths.

2️⃣ New Spectrum Bands

  • Sub‑6 GHz – similar frequencies to 4G; provides broad coverage and good building penetration.
  • mmWave (24 ‑ 40 GHz and higher) – extremely wide channels that enable the highest speeds, but have limited range and struggle to pass through walls.

3️⃣ Massive MIMO & Beamforming

Base stations now use hundreds of antenna elements that can steer focused “beams” of radio energy toward each device. This increases range, capacity, and reduces interference.

4️⃣ Network Slicing

5G can create multiple virtual networks (slices) on the same physical infrastructure, each tuned for a specific use‑case – e.g., an ultra‑reliable low‑latency slice for industrial robots or a high‑throughput slice for video streaming.

Real‑World Use Cases

  • Augmented/Virtual Reality – Seamless, low‑lag experiences for training, design, and entertainment.
  • Industrial IoT & Smart Factories – Real‑time control of robots, sensors, and production lines.
  • Healthcare – Remote surgery, real‑time patient monitoring, and large‑volume imaging transfers.
  • Autonomous Vehicles – Vehicle‑to‑everything (V2X) communication for safety and coordination.
  • Rural Broadband – Fixed wireless solutions can bring gigabit‑class internet to areas where fiber isn’t economical.

What This Means for You

  • Faster mobile browsing, 4K/8K video streaming, and cloud‑gaming without lag.
  • More reliable Wi‑Fi‑off‑load: many devices will automatically switch between 5G and indoor Wi‑Fi for the best connection.
  • Potential new services from your ISP (e.g., private 5G slices for small businesses).

Quick Checklist – Is 5G Right for Your Business?

  1. Do you need low latency (≤ 5 ms) for real‑time applications? → 5G can deliver it.
  2. Do you have a high device density (e.g., factories, stadiums)? → 5G’s capacity helps.
  3. Is coverage a concern? Sub‑6 GHz offers broader reach; mmWave may need small cells or indoor repeaters.
  4. Are you ready to upgrade your devices? 5G‑capable phones, tablets, or routers are required.

Disclaimer

This article is provided for informational purposes only. PSA Computer Services does not sell, install, or support 5G equipment or 5G network solutions. For professional advice or implementation services, please consult a qualified 5G vendor or telecommunications specialist.