Amazon Related Scams

Article (PSA-0031)

Why This Matters

Amazon serves millions of shoppers worldwide. Because of that huge customer base, scammers love to impersonate Amazon in order to steal money or personal data.

Amazon’s Official Stance

Amazon will never ask you for payment info, passwords, or personal details over the phone.

Common Scam Tactics

Off‑Platform Payments

  • How it works: A seller lists a product on Amazon, then contacts you with a link to pay via CashApp, Venmo, Zelle, or a wire transfer.
  • Why it works: You lose Amazon’s buyer‑protection and the scammer gets your credit‑card data directly.
  • What to do: Never pay outside Amazon’s checkout. If a seller asks for an alternate payment method, hang up and report the listing.

Phishing Phone Calls

  • How it works: Someone pretends to be an Amazon rep and asks you to “verify” your account by giving a password or credit‑card number.
  • Why it works: With over 220 million Prime members, scammers know a few will be waiting for a call back from Amazon support.
  • What to do: Never share passwords or payment info on an unsolicited call. End the call and call Amazon’s official number (888) 282‑395 (or use the Help page).

How to Spot a Fake Amazon Message

  • Look for a URL that ends in amazon.com or amazon.com/support. Hover over links to see the real address.
  • Beware of urgent language: “Your account will be closed in 5 minutes – click now.”
  • Legitimate Amazon emails will address you by name and never contain spelling mistakes.

What to Do If You Think You’ve Been Scammed

Scam‑Avoidance Checklist

  • ✔️ Amazon never asks for passwords or payment info over the phone.
  • ✔️ Verify every link – it must contain “amazon.com”.
  • ✔️ Never pay outside Amazon’s checkout.
  • ✔️ Hang up on suspicious calls; call Amazon’s official support line.
  • ✔️ Report any scam to Amazon and the FTC.

Need Help?

If you have questions or think you’ve been targeted, call us at (707) 506‑6802 and speak with a technician.

How do antivirus and antispyware work to protect you?

Article (PSA-0030)

Overview

Antivirus and antispyware are software tools that work together to keep your computer safe from viruses, spyware, ransomware and other unwanted programs.

Key Protection Features

1. Real‑Time Scanning

  • Continuously watches your system while you browse, download or run programs.
  • If a file looks suspicious, a pop‑up warns you right away.
  • What to do: Click **Quarantine** (or **Remove**) and then run a quick full scan.

2. Scheduled Scanning

  • Runs a deep scan of selected folders or the whole drive at a time you set (daily, weekly, …).
  • Finds hidden threats that may have slipped past real‑time checks.
  • Tip: Leave it on a night when you’re not using the computer.

3. Signature‑Based Detection

  • Uses a constantly‑updated list of known‑bad code called **definitions** (think of a “cheat sheet” for malware).
  • When a new virus appears, the vendor releases a fresh definition and your program downloads it automatically.
  • Keeping the program **licensed and up‑to‑date** guarantees you get the newest cheat sheet.

Why Up‑to‑Date, Licensed Software Matters

  • Only a current, licensed product receives the latest definitions.
  • Out‑of‑date software may miss brand‑new threats.
  • A licensed product also includes technical support if you ever get stuck.

Built‑In Windows Protection (Free)

  • Windows 10/11 includes **Microsoft Defender Antivirus**, **Microsoft Defender SmartScreen** (antispyware) and a built‑in firewall.
  • All three update automatically through **Windows Update** – no extra subscription needed.
  • For most home users these tools provide solid baseline protection.

Safe‑Browsing Habits (Bonus Tips)

  • Never click a link or open an attachment from an unknown sender.
  • Check the URL: genuine Amazon, Google, or bank sites start with https:// and show the correct domain.
  • Keep your operating system, browsers, and plugins (e.g., Flash, Java) patched.

Quick Security Checklist

  • ✔️ Enable real‑time scanning and automatic updates.
  • ✔️ Schedule a full scan at least once a week.
  • ✔️ Verify your antivirus/antispyware is licensed and not expired.
  • ✔️ Use the built‑in Windows firewall (or a reputable third‑party one).
  • ✔️ Practice safe browsing: verify links, avoid unknown attachments, keep software current.

Need More Help?

If you have a specific question about PC security or want a quick health check, call us at (707) 506‑6802 to speak with a technician.

Current Computer Security Landscape

Article (PSA‑0029)

Why This Matters

Every computer – whether it lives in a home office or a corporate data‑center – is a potential target for criminals seeking money or data. In October 2023 ransomware attacks were 66 % higher than a year earlier (Symantec). This increase shows how lucrative “locking you out” of your own files has become.

What Is Malware?

Malware is malicious software. It is a catch‑all term for any program that harms a computer without the user’s consent. The most common families are listed below.

Common Ways Malware Gets In

  • Infected email attachments
  • Compromised USB or thumb drives
  • Software downloaded from the internet
  • Links in emails, social‑media posts, or chat messages
  • Exploits in legitimate Windows apps and features (the “living‑off‑the‑land” technique)

Typical Malware Types (brief)

  • Viruses – Replicate themselves, slow or cripple a system, and can delete or corrupt files.
  • Spyware / Keyloggers – Record what you type and steal passwords, banking information, etc.
  • Adware – Show unwanted ads; sometimes the ads contain malicious links.
  • Scareware – Pretend to be an antivirus, claim you’re infected, and try to sell fake cleanup software.
  • Ransomware – Encrypt files and demand a ransom to unlock them. Often follows another infection.
  • Botnets – Networks of compromised computers used for spam, DDoS attacks, and other large‑scale threats.

How Attackers Do It Today

Recent research (Symantec) shows the main infection route is no longer massive botnets but exploiting known vulnerabilities in publicly‑facing applications. Attackers increasingly use legitimate Windows tools—remote‑desktop programs, PowerShell scripts, or built‑in admin utilities—to move laterally across a network. Because these tools appear normal, traditional antivirus signatures often miss them.

Why Everyone—Home or Business—Should Care

  • Financial loss – Ransom payments, fraud, or the cost of data recovery.
  • Legal risk – Breached customer data can trigger fines and lawsuits.
  • Reputation damage – Clients lose trust when you can’t protect their information.
  • Personal impact – Family photos, tax records, and other irreplaceable files could disappear.

Basic Steps to Stay Safe (Quick Checklist)

  • ✔️ Keep software up to date. Enable automatic Windows updates and patch third‑party applications.
  • ✔️ Use a reputable antivirus/antispyware suite and keep its definitions current.
  • ✔️ Enable the built‑in Windows firewall (or a trusted third‑party firewall).
  • ✔️ Back up important files regularly – at least weekly, using an external drive or a cloud service with versioning.
  • ✔️ Be skeptical of unexpected emails, links, or attachments. Hover to see the real URL before clicking.
  • ✔️ Limit admin privileges. Use a standard (non‑administrator) account for everyday activities.

If You Suspect an Infection

  • Disconnect the computer from the internet (disable Wi‑Fi/Ethernet).
  • Run a full scan with your security suite.
  • If ransomware messages appear, do NOT pay the ransom. Contact a professional (see phone number below).
  • Restore files from a clean backup if possible.
  • Change passwords for any accounts that may have been compromised.

Need Help Now?

If you think your PC is infected or you have questions about securing your network, call us at (707) 506‑6802 to speak with a technician.

Windows 10 – End of Support

Article (PSA‑0028)

Why This Update Matters

Microsoft will stop providing security updates, bug fixes, and technical support for Windows 10 on October 14, 2025. After that date a Windows 10 PC becomes far more vulnerable to malware and other attacks. The safest path is to move to a supported operating system—most users will choose Windows 11.

Key Windows 11 System Requirements

1. CPU (Processor)

  • Minimum: 1 GHz or faster, ≥ 2 cores.
  • But the CPU must be on Microsoft’s approved‑CPU list. Even a fast, dual‑core chip can be rejected if it’s not on that list.

2. Firmware – UEFI + Secure Boot

  • Old BIOS systems won’t work. The PC must use the modern UEFI (Unified Extensible Firmware Interface) firmware.
  • Secure Boot, a feature of UEFI that only lets trusted OS loaders start, must be enabled.

3. TPM 2.0 (Trusted Platform Module)

  • TPM 2.0 is a small crypto‑processor that stores keys and helps verify the integrity of the boot process.
  • Most computers made after 2016 include it, but it can be disabled in the BIOS/UEFI settings.

How to Check Your PC Today

Microsoft provides a free utility called **PC Health Check**.

  1. Open the Windows 10 search bar and type “PC Health Check”. If it appears, launch it.
  2. If it’s missing, download it here: https://aka.ms/GetPCHealthCheckApp.
  3. Click the **Check now** button. The app will tell you which (if any) requirements you’re missing.

What to Do If Your PC Fails the Check

  • CPU not on the list? You’ll need a newer processor or a new computer.
  • UEFI/Secure Boot disabled? Re‑boot, enter the firmware settings (usually F2, Del, or Esc during startup), and enable UEFI mode and Secure Boot.
  • No TPM 2.0? Some newer motherboards have a TPM header you can add a module to; otherwise you’ll need a newer system.
  • If fixing the hardware isn’t practical, consider purchasing a new Windows‑compatible PC. Look for a model that advertises “Windows 11 ready”.

Quick Upgrade Checklist

  • ✔️ Run the PC Health Check app.
  • ✔️ Verify your CPU is on Microsoft’s approved list.
  • ✔️ Ensure firmware mode is UEFI and Secure Boot is ON.
  • ✔️ Confirm TPM 2.0 is present and enabled.
  • ✔️ Back up your important files (external drive or cloud) before any OS change.
  • ✔️ If any step fails, decide whether to upgrade hardware or replace the PC.

Next Steps After the Checklist

When your machine passes all three requirements, you can upgrade to Windows 11 directly from Windows 10 Settings → Update & Security → Windows Update. If you run into errors, let us know—there are often simple work‑arounds (e.g., enabling TPM via the BIOS) that a technician can walk you through.

Need a Hand?

If you’re unsure about any of the requirements, want help troubleshooting the PC Health Check, or need a recommendation for a new Windows 11‑compatible computer, give PSA Computer Services a call at (707) 506‑6802.

A Brief Introduction to AI

Article (PSA‑0027)

Why Knowing About AI Now Is Important

Artificial Intelligence (AI) appears in headlines every day – from chat‑bots that write emails to medical tools that flag possible strokes. Even if you’re not a tech‑person, AI is already touching everyday life, so a basic, up‑to‑date understanding helps you make smarter decisions and avoid common misconceptions.

What AI Really Means (2025)

AI is the **simulation of human‑like intelligence by machines**. In practice this means computers use algorithms and large statistical models (often called “machine‑learning models”) to perform tasks that traditionally required human thought.

Core Capabilities of Modern AI

  • Reasoning – Using data and logic to reach conclusions (e.g., recommending a product based on your purchase history).
  • Learning – Improving performance over time by spotting patterns in new data (e.g., a spam filter that gets better after you mark messages as “junk”).
  • Acting – Carrying out tasks automatically, from answering a chat question to controlling a robot arm.

Major AI Sub‑Fields You’ll Hear About

  • Expert Systems – Rule‑based programs that mimic human decision‑making (e.g., a tax‑prep helper).
  • Natural Language Processing (NLP) – Understanding and generating human language (chat‑bots, voice assistants, translation tools).
  • Speech Recognition – Converting spoken words into text (digital assistants, automated call‑centers).
  • Computer Vision / Machine Vision – Interpreting images and video (face‑recognition, medical‑image analysis).

How AI Is Used Today (Real‑World Examples)

  • ⚕️ Healthcare: AI models analyze CT or MRI scans and flag possible strokes, tumors, or fractures for radiologists.
  • Virtual Assistants & Chatbots: Provide basic medical info, schedule appointments, or answer common customer‑service questions.
  • Image & Video Analysis: Detect faces, vehicles, or objects in security footage; power photo‑search features on smartphones.
  • Industrial Automation: Robots with vision and predictive maintenance algorithms keep production lines running smoothly.
  • Scientific Research: Large language models help scientists draft hypotheses, analyze datasets, and even design new molecules.

Types of AI – How “Smart” Is It?

  • Reactive Machines – No memory; they react to current inputs only (e.g., IBM’s Deep Blue chess computer).
  • Limited‑Memory AI – Stores recent data to improve decisions (most modern self‑driving‑car systems, recommendation engines).
  • Artificial General Intelligence (AGI) – “Self‑Aware” AI – Currently **theoretical**. No system today truly understands its own existence or sets independent goals.

Common Misconceptions (Quick Reality Check)

  • “AI will replace humans.” – AI excels at repetitive or data‑heavy tasks, but it still needs human oversight, especially for judgment, ethics, and creativity.
  • “AI thinks like a person.” – AI models find patterns; they don’t possess consciousness or emotions.
  • “If a tool is AI‑powered, it’s automatically safe.” – Bias, privacy, and security issues still exist; always verify sources and keep software updated.

Simple Checklist for Everyday Users

  • ✔️ Know the source. Use AI tools from reputable companies (Microsoft, Google, OpenAI, etc.).
  • ✔️ Don’t share sensitive personal data. Treat AI chatbots like any public website—avoid posting credit‑card numbers, passwords, or medical IDs.
  • ✔️ Verify critical information. If AI gives you health, financial, or legal advice, double‑check with a qualified professional.
  • ✔️ Keep software current. Updates often contain security patches for the underlying AI services.
  • ✔️ Understand limitations. AI can hallucinate (produce plausible‑sounding but false statements); be skeptical of statements that seem too absolute.

Next Steps (If You Want to Explore Further)

In future posts we’ll dive deeper into:

  • How to use free, beginner‑friendly AI tools safely (e.g., Microsoft Copilot, Google Bard, OpenAI’s ChatGPT).
  • Basic privacy‑preserving habits when interacting with AI.
  • How small businesses can start leveraging AI for productivity without big budgets.

Need More Guidance?

If you have questions about AI tools, security concerns, or want a personalized recommendation, call PSA Computer Services at (707) 506‑6802.

Scams and Scammers – Email

Article (PSA‑0026)

Why Email Scams Matter

Scammers use email to trick you into handing over personal data (passwords, Social‑Security numbers, account numbers) or to install malicious software that can turn your device into ransomware. Even if you pay the ransom, the attackers almost never unlock your files.

Common Ways Email Scams Look

  • Urgent pleas for help (e.g., “My account is locked – send money now”).
  • Fake password‑reset or security‑alert messages.
  • Impersonations of familiar institutions – government agencies, the IRS, banks, or popular services like Netflix.

Why Businesses Are Prime Targets

Scammers can harvest a company’s public data (website, LinkedIn, press releases) and craft highly specific, believable messages that appear to come from a trusted partner or vendor.

Key Statistics (to put the risk in perspective)

According to Symantec research, **≈ 85 % of all email traffic is spam or malicious**. Roughly **9 out of 10** messages are not legitimate, and most contain malicious links or attachments.

Three Pillars of Protection

1. Adopt a Healthy Distrust of Email

  • Assume every unsolicited email could be a trap.
  • Never click links or open attachments unless you’re 100 % sure they’re legit.

2. Keep Your Basics Up‑to‑Date

  • Install operating‑system and application security updates promptly.
  • Run reputable antivirus/anti‑malware software and keep its definitions current.
  • Enable a firewall (built‑in Windows Defender Firewall or a third‑party solution).
  • Configure your email provider’s spam‑filter and junk‑mail settings.

3. Examine Suspicious Emails Carefully

  1. Don’t rush. If you’re busy, set the message aside and review it later.
  2. Ask yourself:
    • Do I actually have this service or account?
    • Does the request make sense for me?
  3. Check the sender address. Look at everything after the “@”.

    Real Netflix example:
    admin@netflix.com

    Fake Netflix examples (watch the domain part carefully):
    admin@netflix.ru
    admin@netflex.com

    The legitimate address always ends with .com and the domain name is spelled exactly “netflix”. Anything else (e.g., .ru, “netflex”) is a red flag.

  4. If anything feels off, mark the message as Spam/Junk and delete it.

Quick Email‑Scam Checklist

  • ✔️ Treat every unexpected email as suspicious until verified.
  • ✔️ Hover over links – the URL displayed must match the claimed site.
  • ✔️ Verify the sender domain (e.g., @bankofamerica.com, not @bankofamerica.co).
  • ✔️ Keep your OS, apps, antivirus, and firewall up to date.
  • ✔️ Use strong, unique passwords and enable multi‑factor authentication where possible.
  • ✔️ Report phishing attempts to your email provider and to the FTC (reportfraud.ftc.gov).

What to Do If You Think You’ve Been Compromised

  • Disconnect the device from the internet.
  • Run a full scan with your antivirus/anti‑malware solution.
  • Change passwords for any accounts that may have been exposed – start with email, banking, and any services that store personal data.
  • Consider enabling credit‑monitoring or a fraud‑alert with the major credit bureaus.

Need Help?

If you have questions about a specific email, need assistance tightening your security, or want a quick safety review, call PSA Computer Services at (707) 506‑6802.

Scams and Scammers – Phones

Article (PSA‑0025)

Why Phone Scams Are a Big Deal

Scammers use the phone to steal personal information—identity data, bank‑account numbers, credit‑card details—or to extort money directly. Because a voice can sound professional, friendly, and urgent, it’s easy to let your guard down.

Typical Phone‑Scam Tactics

  • Impersonating a trusted source – they claim to be from Microsoft, your bank, the IRS, or a government agency.
  • Urgent “security” alerts – “Your account has been compromised, call us now!”
  • Requests for personal data – passwords, Social‑Security numbers, credit‑card codes.
  • Directing you to a fake website – they’ll ask you to type a URL or click a link while on the call.

Red Flags to Spot a Phone Scam

  • They ask for any personal or financial information over the phone.
  • They claim “we’ll never call you” if they *are* a legitimate company (the opposite is true).
  • They create a sense of urgency: “You must act now or you’ll lose money.”
  • The caller ID shows a suspicious, foreign, or “spoofed” number.

Simple, Effective Defense: Hang Up

  1. When you suspect a scam, end the call immediately. Do not answer follow‑up questions.
  2. If the caller claims to be from a company you do business with, look up the official phone number on the company’s website or on your billing statement, then call that number yourself.
  3. Never provide passwords, credit‑card numbers, or Social‑Security numbers to unsolicited callers.

Quick Phone‑Scam Checklist

  • ✔️ Never give personal data** to an unexpected caller.
  • ✔️ Hang up** as soon as something feels off or you feel pressured.
  • ✔️ Verify by calling the organization’s official number** (don’t use the number the caller gave you).
  • ✔️ Register your mobile number on the National Do‑Not‑Call Registry** (if available in your country).
  • ✔️ Report the call** to the FTC (reportfraud.ftc.gov) or your local consumer‑protection agency.

If You Think You’ve Already Given Information

  • Contact your bank or credit‑card issuer immediately and explain the situation.
  • Change passwords for any accounts that may have been compromised.
  • Place a fraud alert on your credit reports (Equifax, Experian, TransUnion).
  • Monitor your accounts for unusual activity over the next 30‑60 days.

What’s Next?

The next post will dive into **email scams (phishing)**—another common way attackers try to steal your data. The same principles—skepticism, verification, and not engaging—apply.

Need More Help?

If you have any questions about a recent call or want a quick security review, call PSA Computer Services at (707) 506‑6802.

Scams and Scammers – Web Browsers

Article (PSA‑0024)

Why Browser Hijacks Are a Problem

When you browse the web, a malicious link, image, or ad can act as a “trigger.” If you click—or even hover over—it, the page can launch a fake virus‑alert dialog, play alarming sounds, and display a phone number that urges you to call right away. The goal is simple: create panic so you’ll act without thinking.

How the Hijack Works (plain language)

  • Click‑bait / pop‑under ads – bright headlines or images that urge you to click.
  • The trigger runs a tiny piece of code that opens a fake scanning window (often looks like a legitimate antivirus).
  • The dialog tells you “your PC is infected” and shows a phone number or a link to “pay to clean it.”

Two Safe Ways to Stop a Browser Hijack

Method 1 – Use Task Manager (recommended for most users)

  1. Press Ctrl + Alt + Delete and choose Task Manager.
  2. In the Processes tab, locate the browser you were using (Chrome, Firefox, Edge, etc.).
  3. Right‑click the browser name and select End task. This closes the browser **and** the fake alert.
  4. Re‑open the same browser. If it asks to “Restore pages,” click No – restoring will bring the fake alert back.

Note: This method does not affect any unsaved documents because only the browser is stopped.

Method 2 – Hard Power‑Off (last resort)

  1. If you can’t reach Task Manager, press and hold the computer’s power button for 4‑6 seconds until it powers off.
  2. Wait a few seconds, then turn the computer back on.
  3. Open your web browser again and decline any “Restore pages” prompt to avoid the fake alert.

Warning: This forces all programs to close abruptly, so any unsaved work in other applications will be lost. Use Method 1 whenever possible.

Quick Checklist to Keep Your Browser Safe

  • ✔️ Never click on pop‑ups or ads that look too “urgent.”
  • ✔️ Close the browser via Task Manager if a fake alert appears.
  • ✔️ Decline “Restore pages” prompts after a crash or forced shutdown.
  • ✔️ Keep your browser and OS updated; patches often block known hijack scripts.
  • ✔️ Consider installing an ad‑blocking extension (uBlock Origin, AdBlock Plus) to reduce malicious ads.
  • ✔️ Run a reputable anti‑malware scan periodically (Microsoft Defender, Malwarebytes, etc.).

What to Do If You Accidentally Call the Scam Number

  • Hang up immediately.
  • Do NOT provide any personal or payment information.
  • If you think you may have given details, contact your bank or credit‑card issuer right away.
  • Monitor your accounts for unfamiliar activity over the next 30 days.

What’s Next?

The next article will cover phone scams – how to recognize them and what to do if you receive a suspicious call.

Need a Hand?

If you’re unsure how to stop a hijack or want a quick security review, call PSA Computer Services at (707) 506‑6802.

Computer Security Software Considerations

Article (PSA‑0023)

What Does “Enough” Security Look Like?

Every computer is different, but we can split the discussion into two groups:

  • Online computers – connected to a network or the internet.
  • Offline computers – never (or almost never) connected.

Online Computers – The Basics

1️⃣ Antivirus / Antimalware

  • Use **one** properly‑licensed, **up‑to‑date** product that offers:
    • Real‑time scanning – checks files as they are opened, created, or downloaded.
    • Scheduled scans – runs a full or selective scan at a set time (e.g., weekly).
    • On‑demand (manual) scans – you can scan a file or folder whenever you want.
  • Windows 10/11 include **Microsoft Defender Antivirus** at no extra cost. It meets the needs of most home users.
  • Third‑party suites (e.g., Norton, Bitdefender, Kaspersky) are fine, but they are often more expensive and can cause performance or compatibility issues if you try to run **more than one** AV product at the same time.

2️⃣ Firewall

  • Every Windows PC ships with **Windows Defender Firewall** – a software firewall that monitors inbound and outbound traffic.
  • A hardware firewall is typically your **router**; most home routers already provide basic NAT and packet‑filtering protection.
  • For the majority of users, the built‑in Windows firewall plus a router’s basic protection is **more than sufficient**. Buying a separate firewall product is rarely needed unless you run a small business with specific compliance requirements.

Offline (Never‑Online) Computers – When You Can Relax … a Bit

  • If the machine truly never connects to any network and never receives files from other computers, you can skip antivirus entirely.
  • However, if you ever plug in USB drives, external hard disks, or copy files from another (online) computer, you **should still run an antivirus scan** on that media before opening anything.
  • Even an offline system benefits from a firewall‑like rule set (e.g., disabling unnecessary services) to keep the attack surface minimal.

Why Adding More Security Tools Can Hurt More Than Help

  • RAM depletion – Each extra security program consumes memory. When RAM runs low, Windows uses the hard drive as “virtual memory,” which dramatically slows the entire system.
  • Software conflicts – Two real‑time scanners will often see each other as malicious activity, leading to constant alerts, false positives, or system freezes.
  • Potential corruption – One AV may quarantine the other’s core files, leaving the second product broken and difficult to uninstall.

Bottom Line for the Average User

For a computer that accesses the internet, a **single, up‑to‑date antivirus** (Microsoft Defender or a reputable third‑party product) plus the **built‑in Windows firewall** provides solid protection. Combine that with common‑sense habits (don’t click unknown links, keep software patched, back up data) and you’re well covered.

Need a Quick Security Check?

If you’re unsure about your current setup or would like a brief review, call PSA Computer Services at (707) 506‑6802.

Backup, Backup, Backup!

Article (PSA‑0022)

Why Backups Matter

A reliable backup strategy is the cornerstone of any IT Disaster Recovery or Business Continuity plan. Fires, hardware failures, ransomware attacks, or simple user error can wipe out data in seconds. The quicker you can restore what you’ve lost, the less impact on your business (or personal life).

The 3‑2‑1‑0 Backup Rule

Rule 3 – Three Copies

  • Primary data + two separate backups.
  • If one backup becomes corrupted or unavailable, you still have a second copy to fall back on.

Rule 2 – Two Different Media Types

  • Use at least two distinct storage media (e.g., external HDD/SSD, network‑attached storage, tape, or cloud object storage).
  • Each medium has its own failure modes; mixing them reduces the chance that a single incident wipes out all copies.

Rule 1 – One Copy Off‑Site

  • Store one backup in a different physical location – a secondary office, a trusted friend’s house, or a reputable cloud service.
  • This protects against site‑wide disasters like fire, flood, or a break‑in.

Rule 0 – Zero‑Error Verification

  • Regularly test restores (at least quarterly). A backup that can’t be recovered is useless.
  • Automate verification where possible (many cloud services provide built‑in integrity checks).

Putting the Rule Into Practice (Simple Checklist)

  1. Identify critical data. Documents, photos, databases, configuration files, etc.
  2. Create the three copies. Primary + two backups.
  3. Choose media. Example combination:
    • External SSD (local, fast recovery)
    • Network‑attached storage (NAS) or a second external HDD
    • Cloud storage (OneDrive, Google Drive, Backblaze B2, Amazon S3 with versioning)
  4. Automate backups. Use built‑in tools (Windows Backup, macOS Time Machine) or third‑party software (Macrium Reflect, Veeam Agent, Acronis). Schedule daily or weekly runs.
  5. Secure backups. Encrypt at rest, enable MFA on cloud accounts, and keep the off‑site copy in a location you can access quickly when needed.
  6. Test restores. Pick a random file or a full system image and restore it to verify the process works.

Common Pitfalls to Avoid

  • Keeping only one backup (single point of failure).
  • Relying solely on “online sync” services without a true separate copy.
  • Neglecting the verification step – many businesses discover a broken backup only after a disaster.
  • Storing backups on the same type of media (e.g., two external HDDs that are both vulnerable to power surges).

Additional Resources

Need a Backup Review?

If you’re not sure whether your current backup strategy meets the 3‑2‑1‑0 rule—or you’d like help setting one up—call PSA Computer Services at (707) 506‑6802.