Printer Installation 101 – (WiFi)

Article (PSA‑0021)

What You’ll Need Before You Start

  • Wi‑Fi network name (SSID) and password.
  • Printer’s user manual (or a quick look at the online PDF).
  • Computer(s) that are already on the SAME Wi‑Fi network.
  • The printer should be within about 4 ft of the router for the initial setup (clear line‑of‑sight is best).

Two Ways to Connect a Wi‑Fi Printer

1️⃣ Printers with a Touchscreen

  1. Power the printer and open its **menu**.
  2. Navigate to **Network** → **Wi‑Fi Setup** (the exact wording varies by brand – see the manual).
  3. Select your Wi‑Fi network from the displayed list **or** choose “Manual Entry” and type the SSID exactly as it appears.
  4. Enter the Wi‑Fi password – remember passwords are case‑sensitive.
  5. Confirm and wait for the printer to show a solid “connected” light.
  6. Once connected, you can move the printer anywhere within your Wi‑Fi coverage area.

2️⃣ Printers without a Touchscreen (WPS Method)

  1. Locate the **WPS button** on the printer (often labeled “WPS” or shown as a wireless‑plus‑arrow icon). Press it – the printer will now be in “WPS pairing” mode.
  2. Within 2 minutes, press the **WPS button** on your router or access point. (If you’re not sure where it is, check the router’s quick‑start guide.)
  3. The printer will blink while it searches; a solid light means it’s successfully connected.
  4. Like the touchscreen method, you can now relocate the printer within the Wi‑Fi range.

3️⃣ Adding the Printer to Your Computer

  1. Insert the installation CD that came with the printer **or** download the latest driver/software from the manufacturer’s website.
  2. Run the installer. When prompted for the connection type, choose **Wi‑Fi**.
  3. The setup program will scan the network and list any printers it finds. Select your printer (usually identified by make + model).
  4. Follow any remaining on‑screen prompts – most will finish automatically.
  5. Test the setup: open Notepad (or any text editor), type a line of text, and click **Print**. The printer should produce a page.

Quick‑Troubleshooting Tips

  • Can’t see the printer? Ensure both the computer and printer are on the **same** SSID (not a guest network).
  • Printer won’t connect? Double‑check that the Wi‑Fi password was entered correctly and that the router isn’t set to “AP Isolation” (which blocks devices from communicating).
  • Signal is weak? Move the printer a bit closer to the router or add a Wi‑Fi extender.
  • Still stuck? Restart the printer, the router, and the computer – then repeat the steps.

When to Call for Help

If you run into any of the above issues—or if the instructions don’t match your specific printer model—give PSA Computer Services a call at (707) 506‑6802. We’ll walk you through the process or handle the setup for you.

Printer Installation 101 – (USB and Ethernet)

Article (PSA‑0020)

What to Expect

Most consumer printers ship with at least one of three connection options: USB, Ethernet, or Wi‑Fi. This guide walks you through the two most common scenarios:

  1. Printer used by a single computer (desktop or laptop).
  2. Printer shared with one or more computers on the same network.

Scenario 1 – Single‑Computer Setup

️ Connection Options

  • USB – simplest, but limits where the printer can sit (cable length is usually 3‑6 ft).
  • Ethernet – use a network cable to the router (covered in Scenario 2).
  • Wi‑Fi – covered in a later article.

Step‑by‑Step USB Installation

  1. Locate the installation CD/DVD that came with the printer or download the latest driver from the manufacturer’s support site.
  2. Run the installer **before** plugging the USB cable in. The software will prepare the driver and may ask for a reboot.
  3. When prompted, connect the printer’s USB cable to the computer. The installer should detect the printer and continue automatically.
  4. Follow any remaining on‑screen prompts (e.g., naming the printer, setting it as default).
  5. Print a test page to confirm the installation succeeded.

⚠️ Note on Sharing a USB Printer

You can share a USB‑connected printer with other Windows computers on the same network via Printer Sharing. This adds extra steps (share the printer from the “Devices & Printers” control panel and install the shared driver on each client). If you need help with that, give us a call.

Scenario 2 – Network (Ethernet) Printer

Why Use Ethernet?

  • Places the printer anywhere on the LAN, not just next to one computer.
  • Provides a stable, high‑speed connection—ideal for larger print jobs.
  • Allows multiple computers to print without additional cables.

Ethernet Installation Steps

  1. Connect one end of an Ethernet cable to the printer’s LAN port and the other end to an available port on your router or switch.
  2. Power on the printer and let it obtain an IP address (most printers will print a configuration page showing the address). Tip: Note the IP address for later use.
  3. Insert the installation CD/DVD or download the driver from the manufacturer’s website.
  4. Run the installer. When asked to choose a connection type, select **Network (Ethernet)**.
  5. The installer will scan the LAN for printers. Choose your printer from the list (identified by model and IP address). If it doesn’t appear, you can manually enter the IP address.
  6. Complete the on‑screen wizard and print a test page.

Adding the Same Printer to Additional Computers

Repeat steps 3‑6 on each additional computer. Because the printer is already on the network, the installer will detect it automatically.

Quick Troubleshooting Checklist

  • Printer not detected? Verify the cable is firmly seated, the printer shows a “ready” light, and the router’s LEDs indicate a link.
  • Wrong driver? Download the driver that matches your exact printer model and Windows version (or macOS version).
  • Print jobs stuck in queue? Restart the print spooler service (services.msc → Print Spooler → Restart) or reboot the printer.
  • Multiple computers see different printers? Ensure all PCs are on the same subnet (e.g., 192.168.1.x) and that any guest‑network isolation is disabled.
  • Wi‑Fi later? When you’re ready, we’ll cover Wi‑Fi setup in the next article.

Ready to Print?

Once the test page prints, you’re good to go. If any step didn’t work as expected, don’t worry—just give PSA Computer Services a call at (707) 506‑6802 and we’ll walk you through the process.

What Is Cyber Extortion?

Article (PSA‑0019)

Cyber‑extortion is a crime in which an attacker compromises a device or network and then demands money (or another concession) to stop the malicious activity. The most common form is ransomware – malicious software that encrypts files and displays a demand for payment to restore access.

How Attackers Get In – The Email Factor

  • High‑volume spam gives attackers a huge audience.
  • Phishing emails are crafted to look like legitimate messages from banks, retailers, courier services, etc.
  • These emails contain malicious links or phone numbers that, when clicked or called, can install ransomware or give the attacker remote access.

Spotting a Phishing / Extortion Email

  1. Don’t trust the content at face value. If an email promises a prize, a sudden payment, or urgent action, treat it with skepticism.
  2. Check the sender address. Look for subtle misspellings (e.g., support@micrsoft.com instead of support@microsoft.com).
  3. Hover over every link—no clicks. The URL shown in the tooltip should match the claimed destination and use a trusted domain (e.g., https://www.paypal.com).
  4. Look for generic greetings. Real companies usually address you by name.
  5. If anything feels off, mark the message as Spam/Junk and delete it. When in doubt, forward the email to your IT provider for verification.

Immediate Steps If You’re Compromised

  • Disconnect the device from the network (unplug Ethernet, turn off Wi‑Fi).
  • Do not pay the ransom. Paying encourages the criminal ecosystem and rarely guarantees file recovery.
  • Notify your IT support or a trusted security professional immediately.
  • Run a reputable anti‑malware scan (Microsoft Defender, Malwarebytes, etc.) to identify and remove the malicious payload.
  • If you have recent, verified backups, restore the affected system from the backup.

Why Backups Are Your Best Defense

Even the most diligent user can fall for a sophisticated phishing attack. A solid backup strategy turns a ransomware incident from a disaster into a manageable inconvenience.

The 3‑2‑1‑0 Backup Rule (quick recap)

  1. Three copies of every important file (the original + two backups).
  2. Two different media types (e.g., internal drive + external SSD, or cloud storage).
  3. One copy off‑site (cloud service or physical storage stored at a different location).
  4. Zero‑error verification – regularly test restores to ensure the backup actually works.

Simple Checklist to Reduce Extortion Risk

  • ✔️ Keep OS, applications, and security software up to date.
  • ✔️ Use strong, unique passwords and enable multi‑factor authentication wherever possible.
  • ✔️ Disable macro execution in Office files unless you specifically need it.
  • ✔️ Regularly back up critical data using the 3‑2‑1‑0 rule.
  • ✔️ Educate family or staff to recognize phishing cues (unexpected urgency, generic greetings, mismatched URLs).
  • ✔️ Restrict administrative privileges – only install software when you have admin rights.

Want Help? We’re Here for You

If you have questions about phishing, ransomware, backup strategies, or any other cybersecurity concern, call PSA Computer Services at (707) 506‑6802. A quick conversation can save you a lot of trouble later.

Introduction to 5G

Article (PSA‑0018) – 5G Explained for Everyone

5G is the fifth generation of cellular wireless technology. It follows 1G (analog voice), 2G (digital voice & SMS), 3G (mobile data), and 4G LTE (fast broadband). 5G is a global standard that is being rolled out by carriers worldwide.

Key Benefits Over 4G

  • Much higher speeds – up to 20 Gbps theoretical (typical real‑world speeds 200 Mbps – 1 Gbps).
  • Ultra‑low latency – 1 – 5 ms on many deployments versus ~30 ‑ 50 ms on 4G.
  • Greater capacity – can support many more simultaneous devices per square kilometre.
  • More reliable connections – thanks to new spectrum use and antenna technologies.

How 5G Works – The Technology Behind It

1️⃣ OFDM (Orthogonal Frequency‑Division Multiplexing)

OFDM splits the radio signal into many narrow sub‑carriers that operate side‑by‑side without interfering. 5G uses the same basic modulation as 4G LTE but with higher‑order versions (e.g., 256‑QAM) and much wider bandwidths.

2️⃣ New Spectrum Bands

  • Sub‑6 GHz – similar frequencies to 4G; provides broad coverage and good building penetration.
  • mmWave (24 ‑ 40 GHz and higher) – extremely wide channels that enable the highest speeds, but have limited range and struggle to pass through walls.

3️⃣ Massive MIMO & Beamforming

Base stations now use hundreds of antenna elements that can steer focused “beams” of radio energy toward each device. This increases range, capacity, and reduces interference.

4️⃣ Network Slicing

5G can create multiple virtual networks (slices) on the same physical infrastructure, each tuned for a specific use‑case – e.g., an ultra‑reliable low‑latency slice for industrial robots or a high‑throughput slice for video streaming.

Real‑World Use Cases

  • Augmented/Virtual Reality – Seamless, low‑lag experiences for training, design, and entertainment.
  • Industrial IoT & Smart Factories – Real‑time control of robots, sensors, and production lines.
  • Healthcare – Remote surgery, real‑time patient monitoring, and large‑volume imaging transfers.
  • Autonomous Vehicles – Vehicle‑to‑everything (V2X) communication for safety and coordination.
  • Rural Broadband – Fixed wireless solutions can bring gigabit‑class internet to areas where fiber isn’t economical.

What This Means for You

  • Faster mobile browsing, 4K/8K video streaming, and cloud‑gaming without lag.
  • More reliable Wi‑Fi‑off‑load: many devices will automatically switch between 5G and indoor Wi‑Fi for the best connection.
  • Potential new services from your ISP (e.g., private 5G slices for small businesses).

Quick Checklist – Is 5G Right for Your Business?

  1. Do you need low latency (≤ 5 ms) for real‑time applications? → 5G can deliver it.
  2. Do you have a high device density (e.g., factories, stadiums)? → 5G’s capacity helps.
  3. Is coverage a concern? Sub‑6 GHz offers broader reach; mmWave may need small cells or indoor repeaters.
  4. Are you ready to upgrade your devices? 5G‑capable phones, tablets, or routers are required.

Disclaimer

This article is provided for informational purposes only. PSA Computer Services does not sell, install, or support 5G equipment or 5G network solutions. For professional advice or implementation services, please consult a qualified 5G vendor or telecommunications specialist.

Email – POP, IMAP, SMTP … What Does It All Mean?

Article (PSA‑0017)

Why Knowing What Happens “Under the Hood” Helps

We all send and receive email every day, but only notice a problem when a message won’t go out or an inbox stays empty. Understanding the basic flow and the protocols involved can save you time, frustration, and even money.

Email Flow – From You to the Recipient

  1. You compose the message in an email client (Outlook, Thunderbird, Apple Mail, etc.) and click **Send**.
  2. The client talks to your outgoing mail server using the **SMTP** protocol (usually on port 587 or 465 with TLS). The server accepts the message and places it in a queue.
  3. The SMTP server looks up the recipient’s domain (e.g., example.com) via DNS MX records, then hands the message off to the recipient’s inbound server.
  4. The inbound server stores the message until the recipient’s client retrieves it.
  5. The recipient’s client uses either **IMAP** or **POP3** (both over TLS) to download the message, then displays it in the inbox.

Key Email Protocols

Outgoing – SMTP (Simple Mail Transfer Protocol)

  • Used **only** for sending mail.
  • Modern servers require encryption (STARTTLS on port 587 or SMTPS on port 465).
  • Often works with OAuth 2.0 authentication (e.g., Google, Microsoft 365) rather than plain passwords.

Incoming – IMAP vs. POP3

  • IMAP (Internet Message Access Protocol) – Port 993 (TLS)
    • Keeps mail on the server.
    • Syncs folders across all devices (phone, laptop, desktop).
    • Supports server‑side searching and multiple mailboxes.
  • POP3 (Post Office Protocol) – Port 995 (TLS)
    • Downloads mail to the local device and (by default) removes it from the server.
    • Good for a single device with limited storage, but makes multi‑device access painful.
  • Even when POP3 is used, most providers now keep a copy on the server for a short grace period.

Choosing the Right Receive Protocol

  • If you need to read mail on multiple devices (phone, tablet, work PC) – choose **IMAP**.
  • If you only ever use one device and want to store mail locally – POP3 will work, but IMAP is still the safer default.

Quick Troubleshooting Checklist

  1. Can you connect to the internet? Verify Wi‑Fi/Ethernet works.
  2. Sending problems?
    • Check SMTP server name, port, and encryption.
    • Confirm username/password (or OAuth token) is correct.
    • Look for any firewall or antivirus that might block outbound port 587/465.
  3. Receiving problems?
    • Verify IMAP (or POP3) server address, port, and TLS setting.
    • Make sure the account isn’t set to “offline” or “work offline”.
    • Check that your mailbox isn’t full (many providers impose a quota).
  4. Authentication errors? Many providers now require **app‑specific passwords** or **OAuth 2.0**; generate a new credential in your account portal.
  5. Still stuck? Capture the exact error message and give it to your IT support team – it often points directly to the mis‑configured setting.

Bottom Line

Understanding the three core protocols—SMTP for sending, IMAP/POP3 for receiving—lets you diagnose most common email issues quickly. Use IMAP whenever you want seamless access from multiple devices; stick with POP3 only if you have a strong need to keep mail solely on one machine.

Need a Hand?

If you have questions about configuring your email client, fixing sending/receiving problems, or setting up a more secure authentication method, call PSA Computer Services at (707) 506‑6802. We’ll get your inbox back on track.

Windows 11, The Basics

Article (PSA‑0016)

Microsoft announced that Windows 11 will replace Windows 10 as the latest desktop operating system. The upgrade will be offered **free of charge** to eligible Windows 10 PCs, but only if the hardware meets the new system requirements.

Minimum System Requirements (as of 2025)

  • 64‑bit processor (dual‑core ≥ 1 GHz). Supported families include:
    • Intel 8th‑generation or newer (i3/i5/i7/i9)
    • AMD Ryzen 2000 series or newer
  • 4 GB RAM (8 GB recommended for smoother performance)
  • 64 GB storage (SSD preferred for faster load times)
  • Display: ≥ 720p (1280 × 720) with at least a 9‑inch diagonal
  • UEFI firmware with **Secure Boot** enabled
  • TPM 2.0 chip (hardware‑based security)
  • DirectX 12 compatible graphics (or later) – required for the new visual features and gaming enhancements

Key Differences from Windows 10

  • 64‑bit only – No 32‑bit edition. Existing 32‑bit applications will run under Windows 11’s 64‑bit compatibility layer.
  • New user interface – centered Start menu, refreshed taskbar, and rounded‑corner windows. It’s a visual shift, but familiar functionality remains.
  • Gaming‑focused features – Auto HDR, DirectStorage, and DirectX 12 Ultimate. Helpful for gamers, neutral for most business users.
  • Update cadence – Microsoft is moving to **one major feature update per year** (plus security patches), which should reduce the disruption many users experienced with two‑per‑year rollouts in Windows 10.

Upgrade Path

  • The upgrade is **free** for eligible Windows 10 devices.
  • There is **no deadline** to start the upgrade; you can remain on Windows 10 until you choose to move.
  • When you do upgrade, the installer will verify hardware compatibility. If your PC falls short, you’ll be prompted to either continue with a limited install or keep Windows 10.
  • OEMs (computer manufacturers) will continue to purchase Windows 11 licenses for new systems.

Quick Compatibility Checklist

  1. Run the PC Health Check tool to see if your machine meets the requirements.
  2. Confirm the BIOS/UEFI settings have Secure Boot and TPM 2.0 enabled.
  3. Check for at least 4 GB of RAM (8 GB is better) and 64 GB of free storage.
  4. Verify the graphics driver supports DirectX 12 (or later).
  5. If any item is missing, consider a hardware upgrade (e.g., adding more RAM or swapping to an SSD).

What This Means for You

For most business users the shift to Windows 11 will be a modest change—core productivity apps still work, and the single‑per‑year update cycle should make life simpler. The new UI may require a short period of adjustment, but it is designed to be more streamlined.

Need Guidance?

If you have questions about Windows 11 compatibility, upgrading your hardware, or simply want help planning the transition, call PSA Computer Services at (707) 506‑6802. We’ll walk you through the process and make sure your system is ready.

You’ve Got Spam!

Article (PSA‑0015)

Receiving spam is annoying. Seeing that same spam is being sent **with your own address** is even worse. When that happens one of two things is going on:

  1. Spoofing – the attacker forges the From: field so the message looks like it came from you, even though they have no access to your account.
  2. Hijacking – the attacker has actually taken control of your email account, can read your messages, see your contacts, and send mail as you.

What Spoofing Looks Like (and What You Can’t Do About It)

  • Messages appear in recipients’ inboxes with your address as the sender.
  • The source IP is usually a compromised computer far away – not yours.
  • There is currently no reliable way to **prevent** spoofing, nor to know who is doing it.
  • Spoofers typically move on quickly; most providers will temporarily block the offending address if the volume spikes.

Hijacking Is Treatable – How to Recover Your Account

  1. Try to log in from a clean device (or use a browser’s private/incognito mode). If you can’t sign in, click the provider’s “Forgot password?” or “Need help?” link.
  2. Reset the password immediately.** The password‑reset email must be claimed before the attacker does.
  3. If the reset link has already been used or you can’t receive it, contact the email provider’s support team (e.g., Gmail, Outlook, Yahoo) and explain that your account has been compromised.
  4. After you regain access, review security settings:
    • Enable **multi‑factor authentication (MFA)** if it’s available.
    • Check for any forwarding rules, auto‑responders, or linked applications you didn’t create and delete them.
  5. Change passwords on any other services where you reused the same credentials.** Attackers often try those next.
  6. Send a brief apology to anyone who received spam from your address, letting them know you’ve secured the account.

Prevent Future Compromise – Four Simple Steps

  • Strong passwords: at least 9 characters, mixing upper‑ and lower‑case letters, numbers, and symbols.
  • Unique passwords per account: use a password manager to keep track.
  • Enable multi‑factor authentication (MFA): adds a second verification step (code text, authenticator app, hardware key).
  • Never send passwords by email: never include login credentials in any message.

Need a Hand?

If you suspect your email has been spoofed or hijacked and you need help getting it back under control, call PSA Computer Services at (707) 506‑6802. We’ll guide you through recovery and bolster your security.

What Is Dynamic DNS And How Can It Help Me?

Article (PSA‑0014)

Why a Changing IP Address Can Be a Problem

When you run a server from home (web site, game server, CCTV, VPN, etc.) you need a way for people on the Internet to find *your* device. Most residential ISPs assign a **dynamic public IPv4 address** that can change every few hours, days, or weeks. If the address changes, anyone using the old address will lose connectivity.

Dynamic vs. Static IP Addresses

  • Dynamic IP – Assigned by the ISP’s DHCP server. It may change at any time (often nightly or after a router reboot). No extra charge, but the address is not reliable for a public service.
  • Static IP – Fixed for the life of the contract. Usually only offered on business‑class plans and often costs extra (sometimes $5–$20 per month). It gives you a stable address without extra software.

Quick DNS Refresher

DNS (Domain Name System) translates human‑readable names (example.com) into the numeric IP addresses computers actually use. Think of it as an online phone book: you look up a name, get a number, and the call (or web request) is placed.

The Core Issue: Your Dynamic IP + DNS

Traditional DNS points a domain name to a single static IP. If your public IP keeps changing, the DNS record quickly becomes outdated, and anyone trying to reach your service sees a dead address.

Dynamic DNS (DDNS) – The Solution

Dynamic DNS services automatically keep a DNS record in sync with your current public IP.

  • You sign up for a DDNS provider (e.g., No‑IP, DuckDNS, Cloudflare API‑based updates, or the legacy Dyn service).
  • The provider gives you a sub‑domain such as myhome.no‑ip.org or myserver.duckdns.org.
  • A client (built‑in to most modern routers, or a small program on a PC/Raspberry Pi) monitors your public IP. Whenever the IP changes, the client sends an update to the DDNS provider via a secure API (HTTPS or DNS‑UPDATE RFC 2136).
  • The provider instantly updates the DNS record, so the domain name always points at your current IP.

Where to Run the DDNS Client

  • Router – Most consumer routers (e.g., ASUS, Netgear, TP‑Link, Linksys) have a “Dynamic DNS” or “DDNS” section where you can enter your provider’s hostname, username, and password.
  • Dedicated device – If the router doesn’t support DDNS, install a client on a computer, Raspberry Pi, or NAS (most Synology/QNAP devices include DDNS support).
  • Cloud‑based updates – Some providers (Cloudflare, Google Domains) let you use a simple script or curl command to update the record from anywhere on the Internet.

Security & Best‑Practice Tips

  • Use a **strong, unique password** for the DDNS account – the update client sends these credentials on every change.
  • Prefer providers that support **TLS/HTTPS** for updates (No‑IP, DuckDNS, Cloudflare).
  • Keep your router’s firmware up to date; many updates fix DDNS‑related vulnerabilities.
  • If you only need occasional remote access, consider a **VPN** or a cloud reverse‑proxy (e.g., Cloudflare Tunnel) which provides a stable endpoint without exposing your home IP.

Step‑by‑Step: Setting Up DDNS (Example with No‑IP)

  1. Create a free No‑IP account and choose a host name (e.g., myhome.no‑ip.org).
  2. Log into your router’s admin console → Dynamic DNS (or DDNS) section.
  3. Select “No‑IP” from the provider list, then enter the host name, your No‑IP username, and password.
  4. Save the settings. The router will now test the connection and report the current IP.
  5. Confirm by visiting myhome.no‑ip.org from a device outside your network – it should resolve to your public IP.
  6. Whenever your ISP changes the IP, the router automatically updates the record – no further action required.

Alternative Approaches (When DDNS Isn’t Enough)

  • Purchase a static IP from your ISP – the most reliable method for business‑critical services.
  • Use a cloud‑based reverse proxy (e.g., Cloudflare Tunnel, ngrok) – the tunnel endpoint stays constant even though your home IP changes.
  • Hybrid VPN + DDNS – run a site‑to‑site VPN that uses the DDNS name to reach your home network securely.

Bottom Line

Dynamic DNS lets you keep a stable, easy‑to‑remember address for any service you run from a home connection that receives a dynamic IP. It’s a cheap (often free) alternative to paying for a static IP and works with the vast majority of modern routers.

Need Help Getting Started?

If you’d like assistance setting up Dynamic DNS, configuring your router, or exploring alternatives, call PSA Computer Services at (707) 506‑6802. We’ll get you online and reachable—no matter how often your IP changes.

Remote work in the age of COVID-19

Article (PSA‑0013)

The COVID‑19 pandemic accelerated the shift to remote and hybrid work, and many of those practices are here to stay. Even though most regions are no longer under strict lockdowns, businesses continue to:

  • Allow employees to work from home full‑time or a few days a week.
  • Use cloud‑based collaboration tools for meetings, file sharing, and project management.
  • Prioritize security — VPNs, multi‑factor authentication, and endpoint protection are now standard.

Key Tools for a Productive Remote Set‑up

Video‑conferencing

Popular choices (2024): Zoom, Microsoft Teams, Google Meet, Cisco Webex.

Why it helps: HD video, screen sharing, meeting recordings, integrated calendars.

Instant Messaging / Collaboration

Popular choices (2024): Microsoft Teams, Slack, Discord (for informal teams).

Why it helps: Real‑time chat, file sharing, searchable history.

Remote Desktop / Application Access

Popular choices (2024): TeamViewer, AnyDesk, LogMeIn, Microsoft Remote Desktop, VNC Connect.

Why it helps: Control a workstation from anywhere; useful for legacy apps.

File Collaboration & Storage

Popular choices (2024): OneDrive, Google Drive, Dropbox, SharePoint.

Why it helps: Real‑time co‑authoring, versioning, secure sharing.

Security & Network Access

Popular choices (2024): Cisco AnyConnect, OpenVPN, Pulse Secure, Zscaler Private Access.

Why it helps: Encrypted tunnel to corporate resources; enforces MFA.

Three Simple Practices for a Balanced Remote Work Day

  1. Set Clear Work‑Life Boundaries – Define a start‑time and end‑time, and stick to them. Use a dedicated “work” calendar and mute non‑urgent notifications after hours.
  2. Move Your Body – Short walks, stretching breaks, or a quick home workout boost circulation and lower stress. Even a 5‑minute stretch every hour can improve focus.
  3. Stay Connected Socially – Schedule brief video coffee chats or phone calls with family, friends, or coworkers. Human interaction reduces feelings of isolation and improves morale.

Security Tips You Can Deploy Right Now

  • Enable multi‑factor authentication (MFA) on all cloud services (email, video‑conferencing, file‑sharing).
  • Keep your operating system and applications up‑to‑date; enable automatic patches.
  • Use a trusted VPN when connecting to corporate resources or sensitive data.
  • Lock your workstation when you step away – a quick Windows + L (or macOS Control‑Command‑Q) does the job.
  • Back up critical files regularly (cloud or external drive) following the 3‑2‑1 rule.

Hybrid Work – The New Normal

Many companies now operate on a “flexible” model: a few days in the office for collaboration, the rest remote for focused work. When planning a hybrid schedule, consider:

  • Which tasks need a physical office (e.g., hardware‑intensive work, team workshops).
  • How you’ll keep security consistent across both environments (same VPN, same MFA).
  • Ensuring all employees have a reliable internet connection and an ergonomic workspace at home.

Need a Hand Getting Set Up?

If you’d like advice on choosing the right remote‑work tools, or want a security review of your home office, give PSA Computer Services a call at (707) 506‑6802. We’ll tailor a solution that keeps you productive and protected.

Windows 7 End of Life – What You Need to Know

Article (PSA‑0012)

Historical Overview – Windows 7 End of Support (January 14 2020)

  • All Windows 7 editions (Starter, Home Basic, Home Premium, Professional, Enterprise, Ultimate) stopped receiving **security updates, bug fixes, and Microsoft‑provided technical support** on 14 Jan 2020.
  • Third‑party software vendors began withdrawing support for their products on Windows 7, and many newer applications no longer install on that OS.
  • Microsoft offered an **Extended Security Updates (ESU)** program for businesses that needed extra time, but the program **ended on 13 Jan 2023**.
  • At the time, users who upgraded from a licensed copy of Windows 7 could move to Windows 10 at **no additional OS cost** (Microsoft covered the license upgrade). The upgrade was a one‑time service fee for the technician.

Why the End‑of‑Life Still Matters (2024‑2025)

Even five years after the official EOL, many machines still run Windows 7. The risks are now even higher because:

  • **No security patches** – new vulnerabilities discovered today are never fixed on Windows 7, leaving systems exposed to ransomware, malware, and remote exploits.
  • **Application incompatibility** – modern productivity suites, browsers, and cloud services no longer support Windows 7, leading to loss of functionality and potential data loss.
  • **Compliance issues** – regulations such as GDPR, HIPAA, and PCI‑DSS require supported operating systems for data protection; Windows 7 does not meet those requirements.
  • **Hardware driver shortages** – newer hardware (NVMe SSDs, USB‑C, Wi‑Fi 6) lacks drivers for Windows 7, limiting upgrades or replacements.

Addendum (2024‑2025): What to Do Now

1️⃣ Migrate to a Supported OS

  1. Windows 11 – the current Microsoft desktop OS. Minimum hardware includes a 64‑bit CPU (8th‑gen Intel or newer / AMD Ryzen 2000 or newer), 4 GB RAM, 64 GB storage, UEFI with Secure Boot, TPM 2.0, and DirectX 12 graphics. Ideal for new machines or for hardware upgrades.
  2. Windows 10 – still supported until **14 Oct 2025** (extended support). Good choice if existing hardware cannot meet Windows 11 requirements. After Oct 2025 you’ll need to upgrade again.
  3. Linux (Ubuntu, Mint, Debian, etc.) – free, regularly patched, and increasingly compatible with mainstream business applications (Office‑365 web, Chrome, Firefox). Suitable for legacy hardware and for organizations wanting an OS without licensing fees.

2️⃣ Licensing & Cost Considerations

  • Windows 11/10 licenses are sold per device (OEM or retail) or via volume‑licensing for businesses. Prices vary $100‑$150 per seat for retail; volume discounts available.
  • Many PC manufacturers now include a **Windows 11 Home** license with new hardware at no extra cost.
  • Open‑source Linux distributions are free, but you may need paid support (e.g., Ubuntu Advantage) for mission‑critical environments.

3️⃣ Migration Path – Step‑by‑Step Checklist

  1. Backup everything. Use the 3‑2‑1 rule (3 copies, 2 media types, 1 off‑site). Verify restores before proceeding.
  2. Inventory hardware. Check CPU, RAM, storage, and TPM 2.0. Run the PC Health Check tool or a third‑party scanner.
  3. Choose the target OS. If hardware is borderline, consider Windows 10 (short‑term) or Linux (long‑term).
  4. Plan application compatibility. List critical apps and verify they run on the new OS (use vendor compatibility lists or test in a VM).
  5. Perform a pilot upgrade. Deploy to a single workstation or a small group, resolve issues, then roll out to the rest.
  6. Finalize and document. Update device inventories, license records, and backup schedules.

4️⃣ For Legacy Systems That Must Remain on Windows 7

  • Isolate the machine on a **segmented network** or VLAN with no Internet access.
  • Apply **application‑level firewalls** (e.g., Windows Defender Firewall with strict inbound/outbound rules).
  • Use **air‑gap** strategies: disconnect from the network when not in use.
  • Consider **third‑party extended support contracts** from vendors such as BullGuard or Lumension, though these are expensive and temporary.
  • Plan a **decommission schedule** – set a firm deadline for retirement and budget for replacement hardware.

5️⃣ Security Best Practices (Regardless of OS)

  • Enable **multi‑factor authentication (MFA)** on all cloud services and VPNs.
  • Keep all installed software (browsers, Office suites, drivers) up to date.
  • Run reputable **anti‑malware** solutions and schedule regular scans.
  • Encrypt sensitive data at rest (BitLocker for Windows, LUKS for Linux).
  • Educate users on phishing, social engineering, and safe download habits.

Getting Help with the Transition

If you need assistance assessing your current Windows 7 fleet, planning a migration to Windows 10/11 or a Linux alternative, or securing legacy machines while you transition, call PSA Computer Services at (707) 506‑6802. We’ll help you design a cost‑effective roadmap that keeps your data safe and your business running.