Pro Tech Guy Logo
CALL US
508-364-8189
855 Worcester Rd.
Framingham, MA 01701
  • Home
  • About
  • Services
    • Cloud Care
    • Business IT Services
  • Get Help
  • PTG News
  • Podcast
  • Contact

Dangerous Phishing Scams You Need to Watch Out for This Fall

October 16, 2019 by Kyle Kenyon


bigstock-Login-Into-Account-In-Email-En-239697814.jpgbigstock-Login-Into-Account-In-Email-En-239697814.jpg

One constant that continues to lurk in people’s inboxes are phishing scams. Those emails that are disguised to look legitimate, so they’ll trick you into clicking on a malicious link or opening a dangerous attachment.

Unfortunately, these scams are so popular because it’s fairly cheap to send out millions of emails, and they work.  

Phishing attempts have increased 65% within the last 12 months and they account for 90% of all data breaches. 

Many high-profile breaches, such as the one a few years back at the DNC, are the result of a sophisticated phishing email, which fooled an unsuspecting user and allowed the hacker to gain entry to a computer or entire network full of data.

Companies and individuals that fall victim to phishing attacks end up losing time and productivity as well as having to pay for virus removal services.

Phishing attacks come in a few different shapes and sizes, but they’re all designed to do the same thing, plant a virus, spyware or other malicious malware on a user’s computer or otherwise gain sensitive information.

Types of Phishing Attacks

  • Phishing: General phishing is when you get an email that’s not particularly targeted at you or your company, it’s just a wide net cast by the spammer to try to catch someone in their trap. 

  • Spear Phishing: Typically targets to a particular user or organization.

  • Whaling: Phishing emails sent to someone of a high position (CEO, CFO, or other administrator).

  • Smishing: Phishing sent over text message (often purporting to be from someone you know).

  • Social Phishing: Phishing that’s done over social media channels, typically through use of direct messages.

  • Vishing: Before phishing, these used to just be called scam calls. Now when you receive a voice call scam it’s put into the phishing category

What new phishing scams are making the rounds that you need to be aware of? Read on to find out, and be sure to share with your friends, family, and work colleagues.

Be on High Alert for These Phishing Scams 

As mentioned above, phishing scams can come in the form of emails, direct messages, texts, and even phone calls. Here are the ones you need to watch out for this fall.

IRS Reminder Scam

A phishing scam that the IRS has recently warned taxpayers about has to do with emails sent appearing to be from the IRS and providing a link for taxpayers to get information on their tax refunds.

Subject lines might be along the lines of “Electronic Tax Return Reminder” or “Automatic Income Tax Reminder.” The scheme is designed to get you to put sensitive information into a spoofed page that makes you think you’re entering it on the IRS site.

 According to the IRS: “The emails have links that show an IRS.gov-like website with details pretending to be about the taxpayer’s refund, electronic return or tax account. The emails contain a ‘temporary password’ or ‘one-time password’ to ‘access’ the files to submit the refund. But when taxpayers try to access these, it turns out to be a malicious file. The IRS does not send emails about your tax refund or sensitive information.  This latest scheme is yet another reminder that tax scams are a year-round business for thieves.” 

Social Security Number Vishing Scam

The Federal Trade Commission warns about a new robocall that’s designed to get you to divulge your social security number using scare tactics. The call states that there is a problem with your SSN and warns that all your benefits will end if you don’t take action.

You can listen to a recoding of the vishing scam on the FTC’s site, and they warn that in the first six month of 2019, Social Security imposters scammed people out of $17 million.

Data Breach Settlement Scams

When there is a data breach at a large company, like Equifax, they usually have a dedicated webpage where consumers can find information on any remedies or free credit monitoring services that they offer the victims. Scammers take advantage of this by sending out emails pretending to be from companies that recently announced a breach, including links to malicious sites that can perform drive-by downloads of malware.

Beware of phishing emails trying to exploit the recent breaches of:

  • AMC Networks

  • Café Press

  • Capital One

  • Dunkin’ Donuts

  • Flipboard

  • Houzz

Bluehost Hosting Account Scam

Bluehost is a popular website hosting provider and some users recently reported receiving emails that looked like they were coming from an admin address at the company’s domain. The email mentioned that a hosting account was about to be suspended and gave a link to a login screen that looked just like the company’s. When the victim logged in, it took them to an FAQ page about billing that appeared to be legitimate… but it wasn’t.

The scam was designed to grab the user’s login credentials, from which they could control their hosting account and any data that it contained.

Stay a Step Ahead of the Bad Guys!

Protect your computer and network and stay a step ahead of phishing scammers with Cloud Care Premium by Pro Tech Guy. This powerful managed antivirus and malware protection includes safeguards like Hacker Check and Threat Detection. 

Find out more today by calling 508-364-8189 or using our contact form.

Filed Under: Uncategorized

Share:

Best Practices for Protecting Your Laptop to Prevent Damage and Data Loss

October 9, 2019 by Kyle Kenyon


bigstock-Digital-Cybersecurity-And-Netw-298305520.jpgbigstock-Digital-Cybersecurity-And-Netw-298305520.jpg

Many computer users love the freedom of laptops because they give them the ability to take their computer anywhere. Laptops represent the first “mobile computing” device, and even with the popularity of tablets and smartphones, those devices still can’t pack the same power as a laptop computer. 

The problem with all that mobility is that it can result in a dropped laptop, broken screen, spills of food or drink on a keyboard, and any number of other events that can cause hardware crashes, physical damage, and the need for emergency laptop repairs. 

But physical damage isn’t the only thing you have to worry about when you own a laptop. They’re also much easier to lose or have stolen than a desktop computer. 

It’s estimated that there is a 1 in 10 chance a laptop will be stolen during its lifetime.

When it comes to best practices for safeguarding your laptop, protections come in two main categories:

  • Protection from physical damage and wear that can shorten lifespan

  • Data protection for a lost or stolen device

Next, we’ll go over tips for each category to help you enjoy the mobility of your laptop while also keeping it safe.

Tips for Physical Protection of Your Laptop 

No matter how careful you are, it’s easy to accidentally bump your laptop bag into a wall or spill that Red Bull on the keyboard. Here are some protections that will help mitigate the damage.

Use a Laptop Keyboard Skin

Ultra-thin skins made from materials like Silicone are designed to lay over your keyboard without interfering with your typing. They help keep dust out of the nooks and crannies and also are a lifesaver if you happen to spill your drink. A bonus is they help keep the printing on the keys from wearing away over time.

Get a Protective Shell Case

If you take your laptop out and about regularly, commuting, traveling, or visiting job sites, then it’s a good idea to find a study hard case that’s designed to attach to the exterior for extra shock and scratch protection. It’s the same idea as a phone case and will also help protect against damage from being dropped.

Use a Firm Surface, Always!

We know it’s called a “lap” top, and many people put them directly on their laps or on a soft surface, like a pillow, but that’s going to promote overheating, which can damage your laptop’s internal components. 

Instead, use a firm laptop desk, designed with a cushion on the bottom and a solid surface. There are vents at the bottom of most laptops and if it’s not sitting on a hard surface, the vents can easily get covered up by fabric. 

Use a Screen Protector 

Broken laptop screens are a common visitor to all IT repair shops. A laptop screen protector will not only keep your screen cleaner it can also add an additional barrier that may help protect it from a scratch or worse. 

Tips for Data Loss Prevention of Your Laptop 

It’s a sinking feeling when you realize your laptop has been left on an airplane or it’s been stolen. Once it’s gone, there’s not much you can do, but you can take precautions that will help ensure you only lose the hardware and not everything that’s on it.

Backup Automatically

Ensure your laptop is attached to a cloud-based backup system (you may also want to back up on a local hard drive too). This will ensure that even if you’re traveling, any new files being added are continually being backup up, so you’ll have a copy of all your laptop contents if you need to restore it to another computer.

Physically Secure Your Laptop

It seems like common sense to make sure your laptop isn’t left in an unlocked car or out in a booth at a trade show, but people still make the mistake of leaving them unattended or thinking that no one will bother with it.

Beyond keeping your laptop either with you or in a locked location, you can also use laptop security cables with a lock combination or a locked case for additional security.

Use a “Find My Computer” Feature

Apple users should turn on the “Find My Computer” feature that iCloud has. It not only allows you to geo locate your MacBook, you can also lock it with a passcode, or delete your files remotely so a thief won’t rifle through them.

Windows users can turn on a “Find my device” feature in settings, it will let you locate and lock your device remotely.

Use a Good Antivirus/Anti-Malware

Just like desktop computers, laptops are susceptible to all the same viruses and malware, so make sure you’re using a good antivirus and malware program and keeping it up to date to keep dangerous threats from infecting your system.

Need Expert Laptop Repairs? 

Broken screen? Laptop acting “funny?” Hard drive crash? We know how urgent it is when you’ve got computer problems and Pro Tech Guy can help with fast and expert support.

Serving the Framingham, Natick, Sudbury, Wayland, Wellsley, Ashland and surrounding Metrowest area.

We’re here when you need us at 508-364-8189 or online.

Filed Under: Uncategorized

Share:

6 Reasons to Get a Custom-Built PC Rather than “Out of the Box”

September 25, 2019 by Kyle Kenyon


bigstock-Hands-Installing-Computer-Part-7968816.jpgbigstock-Hands-Installing-Computer-Part-7968816.jpg

When it’s time to get a new computer, most people start searching big box stores like Best Buy or comparing brands online. They often end up choosing the one that best meets their needs and price range even if it doesn’t have all the features they want. 

Have you ever thought about having a custom computer built that matches what you want exactly?

It’s something gamers often do so they can get the graphics and processing power to enjoy all types of games without lagging or freezing issues, but you don’t have to be a gamer to benefit from computer that’s custom built just for you.

Pro Tech Guy specializes in custom computer builds so customers can have quality computers with all the features they desire. We do: 

  • Standard Desktop Builds (for home or office)

  • Custom Gaming Builds

  • Tiny Desktop PC Builds (energy saving)

The average amount of time people keep their computers before replacing them has increased from an average of 4 years just a few years ago to 5 or 6 years now. 

People want to get the most mileage out of a PC purchase, but if it doesn’t have quality components, they could be suffering with a sluggish computer those last few years before replacement that isn’t serving them well and is quickly adding onto the original price tag in repair costs.

If you’ve dreamed of having a computer that has both the memory and storage capacity you’re looking for and one that doesn’t have parts that wear out in just a couple of years, read on to learn the advantages of owning a custom-built PC.

Benefits of Having Your Next Computer Custom Built 

Have you ever had to settle for a computer that wasn’t exactly what you wanted just because it was the best match you could find at the store? Did you think that custom-built meant you had to figure out how to put a computer together yourself?

There’s no reason to settle when you can have a PC built from the motherboard up for you… and you don’t have to do it yourself! IT experts can help you both choose the parts that match the types of features you want, put them all together for you, and provide local support when you need it.

Here are the reasons to consider a custom PC. 

Quality Parts

 When you’re purchasing a pre-built computer, you don’t have any control over the quality of the parts that the manufacturer used. Many times in consumer computers, in order to offer cheap prices the manufacturer is using cheap parts that will mean you have to pay repair costs in the near future.

1 out of every 49 motherboards failed in 2018.

When you get a custom-built PC, you can ensure quality parts are being used that have low failure rates and can mix and match components that get high marks from different manufacturers to ensure the longest lifespan with the least amount of problems. 

Fewer Upgrade Costs

While some people may think building a custom PC is more expensive, it often costs less than a pre-built machine when you factor in upgrade costs. If you need more memory or a better graphics card in an out of the box computer, that’s an additional cost down the road for the upgrades.

With a custom-built PC, you can choose exactly the features and capacity you want, meaning there is less chance that you’ll need to do any upgrades in the future.

Local Support & Service

If something goes wrong with your Dell or HP out of the box computer and you want manufacturer support, often you’ll be stuck on the phone for hours waiting for technical support or have to mail your computer to a centralized service location, being without it for weeks.

When you have a custom build done locally by a trusted computer shop, you have local support and service when you need it by the team that actually put the PC together for you, meaning less frustration and faster service.

No “Bloatware” Installed

Most of the pre-built computers you get at the store will come with a bunch of pre-installed programs, or bloatware, that are really just advertisements to get you to purchase the program after a trial. These can slow down your system and add intrusive programs you never asked for.

With a custom-build computer, you can designate the exact software that you want pre-installed or have it completely free of any additional software so you can add it yourself. 

Parts Warranties

If you’re worried that you’ll be without the manufacturer’s warranty if you get a custom-built computer, you can rest easy. Most parts manufacturers have their own warranties on their products, which are typically in the range of 2-3 years, so you’re still covered by warranties. You also avoid having to send your entire PC for a warranty repair to just fix a single part.

Better Performance & Reliability

Because your PC is being put together with precision and individual attention to each component, you get a better performing computer than you would just buying off the shelf. Your IT pro has a lot more control to choose the best and more reliable parts because they’re not tied to any third-party parts contracts like many major computer manufacturers are.

What Does Your Dream Computer Look Like?

Pro Tech Guy can make your dream computer a reality. Whether it’s the ultimate gaming rig or a work/home PC that gives you the flexibility and power you need. 

Give us a call today to discuss your custom computer build at 508-364-8189 or reach out online.

Filed Under: Uncategorized

Share:

The Rise of Ransomware: How It Infects Computers & How to Defend Against It

September 18, 2019 by Kyle Kenyon


bigstock-Padlock-Or-Lock-On-Laptop-Comp-250641376.jpgbigstock-Padlock-Or-Lock-On-Laptop-Comp-250641376.jpg

Ransomware attacks rose 195% in the first quarter of 2019, backing up the fact that this form of cyberattack is still very much a threat to both businesses and individuals alike. 

If a computer or network doesn’t have proper IT security in place to protect against ransomware intrusions, they can end up costing the data owner dearly. With costs being attributed to: 

  • Cost of ransom, if paid

  • Cost of data recovery, if a backup is available

  • Cost of downtime and lost productivity

  • Cost of lost customer trust

 Ransomware costs the average business $2,500 per attack. 

While small and medium-sized businesses are the biggest targets of ransomware attacks because they generally have less defenses than large enterprise companies, attackers also haven’t overlooked the individual residential PC user. 

Often, cybercriminals just looking for a quick buck will demand “budget ransoms” from residential victims who aren’t expecting an attack and not sure what to do when one happens.

How Does Ransomware Work?  

Ransomware is a specific form of malware that encrypts the infected computer’s files, or otherwise makes them unusable, via a malicious script, essentially holding them for ransom. The attacker then demands a ransom from the victim to regain the use of their data.  

The ransom is typically requested in the format of bitcoins or electronic gift cards so it won’t be trackable back to the perpetrator. 

For the victim, it’s a nightmare because their business or ability to access their data comes to a screeching halt, and if they do not have a reliable data backup to recover, they’re only left with the option of paying the ransom and hoping the crook will make good on the file restoration or to lose everything on the infected hard drive.

Ways that Ransomware Infects Computers 

There are a number of ways that a computer can become infected by Ransomware and often a user might not even realize their device has been infected until the hacker pulls the trigger on their script.

There are four key ways that your computer can get a ransomware infection:

  • Phishing email

  • Drive-by download

  • Social phishing

  • Botnet

Phishing Emails

The number one cause of data breaches around the world today is from phishing emails. These are those emails designed to fool the user into opening an infected file or clicking through to a website designed to download the ransomware script as soon as they visit it.

They’ll often look like an email from a legitimate business, like a payment confirmation, a shipping tracking notice, or request to update your information.

 You can protect against phishing email attacks by taking a multi-layered approach in your cybersecurity plan:

  • Anti-phishing software

  • Employee training

  • Email antivirus program and uses sandboxing

Drive-by Download

Have you ever been on a website and videos and ads start popping up and you accidentally click on one and are taken to a strange page? That could be a Drive-by Download. Hackers often hide links to malicious sites behind ads and buttons that might look like a legitimate or enticing ad on a website. Streaming video sites are being increasingly used for this type of attack.

Using a browser-based anti-ransomware/anti-malware application can help you avoid these drive-by infections. Additionally, being very suspicious of ads that sound too good to be true is a good best practice that will help keep you safe.

Social Media Phishing

An offshoot of phishing emails and one that’s continuing to grow is social phishing. This is where the hacker uses social media posts or direct messages to deliver the same type of false message meant to trick the recipient into clicking a malicious link or downloading an infected file.

The shortened URLs that are popular on social media sites exasperate the issue because they obscure the true URL.

Some ways to protect yourself from a social media phishing attack: 

  • Don’t click a link unless you are 100% certain it’s legitimate

  • Use privacy settings on social media to keep non-friend/family from seeing your feed

  • Stop, think, and research before you respond to a strange direct message

  • Remember, even if a DM comes from a person you trust, their account may have been hacked.

Botnet 

A botnet represents a number of internet-connected devices that are being controlled as one. This type of attack typically plants a malicious script on a computer or network without the owner’s knowledge. The script is designed to run undetected for months or years, and the computer can be used unknowingly for things like denial-of-service-attacks, to send spam, or steal or encrypt data. 

Ways to ensure your computer isn’t running a botnet script in the background include having a managed security plan or managed antivirus that includes constant monitoring and to keep your devices scanned regularly for and infections or strange activity.

Is Your Computer Safeguarded from Ransomware?

Don’t leave your devices at risk. Both computers and mobile devices can be infected by ransomware that makes their contents unreadable by the user. Get out in front of the attackers with managed antivirus and anti-malware solutions from Pro Tech Guy.

Contact us today at 508-364-8189 or through our website.

Filed Under: Uncategorized

Share:

How and Why Do Computer Hard Drives Fail? (+ Warning Signs)

September 11, 2019 by Kyle Kenyon


bigstock-Disassembled-Hard-Drive-From-T-269819959.jpgbigstock-Disassembled-Hard-Drive-From-T-269819959.jpg

Hard drive failures can happen anytime, often without warning, and can cause loss of everything on your computer if it hasn’t been backed up. Sometimes you’ll get a few warning signs if a computer is displaying strange behavior, but many times it comes out of the blue, catching the user by surprise. 

How long a hard drive lasts varies according to manufacturer. According to annual and quarterly studies by Backblaze, hard drives fail at a rate of 5.1% per year in the first 1.5 years of life. After 3 years of life, the failure rate more than doubles to 11.8% per year. 

If you’ve ever had a hard drive crash, then you know how important it is to have a backup of your data or it may be lost forever. While some data can be resurrected through expert data recovery, sometimes the nature of the crash makes it impossible to recover it. 

 Why do hard drives crash and are there any warning signs you can watch out for? We’ll go through the main causes of crashes and discuss how to anticipate one might be coming. 

What Causes Hard Drive Crashes? 

There are several reasons that hard drives can crash, and no manufacturer is immune, but some drives are more susceptible to crashes than others. 

The Backblaze report offers annual failure rates (AFR) for active drives through 2018, and found the following:

  • Toshiba models ranged from 0% to 3.03% AFR

  • Seagate models ranged from 0.33% to 2.13% AFR

  • HGST models ranged from 0.36% t0 1.58% AFR

Drive crashes are caused by these main reasons.

Excess Heat

If the fan isn’t running properly, it can cause excess heat buildup inside a desktop or laptop. Improper ventilation also contributes this issue. That’s why many laptop manufacturers will state not to place the device on a soft surface (that could potentially block ventilation). 

Heat buildup inside the case causes the components to overheat and can result in failures and shutdowns. This is a reason why data center temperature control is of vital importance in that industry.

Firmware or Manufacturer Problems

If a crash happens shortly after getting a new computer, then there is a good chance it’s a manufacturer fault due to not properly testing the drive and firmware before releasing it for sale. In most cases, you can fall back on the manufacturer warranty for a resolution. 

Mechanical Failure

The moving parts of a hard drive can wear out over time and cause failures. Mechanical failures can also be caused due to bad sectors and blocks in a hard disk or a virus attack designed to alter hard disk operation.  

Keeping your system updated with patches regularly and ensuring you have a strong antivirus program can help ward off some of these mechanical failures. 

It’s also important to remember that computers are typically designed to last 3-4 years, so if yours is older than that, you may want to consider upgrading because the longer its in service, the bigger chance of a hard drive crash. 

Physical Damage

If a computer has been dropped, has gotten wet, or had an electrical surge during a power outage, these can all cause catastrophic failure of the hard drive. The electrical parts inside aren’t designed to withstand water and aren’t shock resistant.

When dropped, a read-write head inside the drive can touch the magnetic platter, causing scratches on the platter surface, which can result in data loss that’s not recoverable. 

Hard Drive Warning Signs that Signal a Potential Crash  

In some cases, there are warning signs that you can watch for that might indicate an impending hard drive crash. Being aware of these will give you time to take action before your drive fails.

Strange Clicking Sounds

If the fan is slowing down or making strange sounds, that can indicate it has an obstruction (like dust bunnies) or the motor is wearing out. You’ll want to replace this before the PC ends up overheating. 

System Freezes or Black Screen After Booting

If you’re experiencing strange behavior like a black screen after booting or unexplained system freezes, there is a chance that there is some type of internal mechanical failure.

Files & Folders Disappearing or Becoming Corrupt

A symptom of a possible virus intrusion is if your files are suddenly not opening due to a corruption error or files and folders are becoming invisible. If you see this type of behavior, you’ll want to do a virus scan as soon as possible.

New Computer that Hangs During Boot Process

If you have a newer computer or laptop that is having problems with the boot process or you get errors that the hard disk is undetectable, that’s a red flag that you may have bought a lemon and it’s a manufacturer problem.

Get a PC Checkup Today from Pro Tech Guy!

If you’re seeing any of the signs above of a potential hard drive failure, take action before it’s too late and contact Pro Tech Guy. We can quickly diagnose and repair issues for both Windows and Mac devices.

We’re here for you at 508-364-8189 and online.

Filed Under: Uncategorized

Share:

The Do’s and Don’ts of Data Migration (Make Sure You Do It Right!)

September 4, 2019 by Kyle Kenyon


bigstock-File-Transfer-Two-Laptops-Wit-240860503.jpgbigstock-File-Transfer-Two-Laptops-Wit-240860503.jpg

When it’s time for a computer upgrade, the thought can leave users both excited and a little apprehensive. A brand new machine that’s faster and has more capabilities is great, but how do you get everything from the old system to the new one smoothly?

And what if it’s a Windows to Mac migration, or vice versa? How can you reduce any errors that might cause data loss?

Migrating data from one computer to another can be tricky, and if not done properly, it can mean hours of frustration and having to manually drag each file one by one onto the new system or it can result in data loss. 

Of the small businesses who’ve lost data, 85% of them never recover it. 

But if you know what “don’ts” to avoid during a data migration, you can sail through smoothly with all your files and folders safety intact in your new system.

Data Migration Mistakes to Avoid

While data migration can be complicated, if you don’t rush it and carefully go through the proper steps, it can save you tons of time when it comes to getting started on a new computer with everything you need.

Here are common mistakes to avoid when you’re migrating data from one device to another.

Migrating “Junk” Data

Over time, it’s not unusual to get a lot of “junk” files built up on your computer. They could be duplicates of files that came about over time, files with corruption problems, or outdated files that were left on your workstation from a previous user. 

You don’t want to start off a new system with unnecessary files that will only get in your way. So, before migrating your data, go through your hard drive thoroughly and either store on a separate drive or delete anything that you don’t need copied to the new computer.

Not Checking Your Migration Compatibility

When moving data over from one system to another, you can’t just assume that every system is going to speak to another one perfectly. You may need to format a transfer differently or save the files on a different type of backup. 

For example, if you’ve used the Time Machine backup on an iMac to back up the data you’re migrating to an external drive, is the new Mac using the same operating system as the old one? If not, your migration can hit some snags.

Be sure to check out compatibilities between the old and new file structures and operating systems so you can address any compatibility issues in advance. 

Neglecting Validation or Business Rules

Companies often have certain business and validation rules in place for their data. This can be something as simple as a particular naming convention for files and folders or something like permissions and where files are backed up in a cloud storage system.

If you just migrate data over without taking your business rules into consideration, that new data can become problematic and get lost outside your normal data protocols.

Sensitive files, such as payroll data, financial records, or inventory should also be validated when moving from a legacy system to a new system.

Not Having the Proper Expertise for the Migration

Data migrations can be complex, and there are any number of issues that can come up in the middle of a data transfer. If you don’t have an IT professional on hand to ensure things go smoothly, you could end up spending hours for something you thought would take minutes or losing valuable data in the event of a major problem. 

It’s always smart to let a pro handle the transfer of your files and folders from one computer or server to another to you can be sure it’s done properly. 

Forgetting About Cross-object Dependencies

If you have a PowerPoint or Excel document that’s referencing other files on your hard drive using a local file address, you can end up with a bunch of blank boxes with X’s if you don’t take these dependencies into consideration during migration. 

This is a common mistake when someone is trying to migrate their own data. They think everything will just magically appear the same exact way on a new system, but those cross-object dependencies can be broken if they’re not handled properly up front. 

Neglecting Post Migration Testing & Data Handling 

Just because everything moved over, doesn’t yet mean you can kick back and call your migration a success. It’s important to test data integrity after a migration and ensure nothing was missed or corrupted during the transfer. 

And what happens to the data on the source computer or backup drive? If you have to comply with data privacy regulations, then you’ll want to be sure to properly clear and decommission the old device so you don’t leave sensitive data laying around that could cause a breach later.

Call Pro Tech Guy for Data Migrations Made Easy

If you need help transferring data from one device to another (Windows & Mac), Pro Tech Guy can get the job done efficiently and quickly. Rather than spending hours and possibly hitting some major snags, just contact us and we’ll handle everything! 

Schedule your data migration today by calling 508-364-8189 or contacting us online.

Filed Under: Uncategorized

Share:

AMD’s New Zen 2 CPUs: A Great Choice for Your Custom Build

August 28, 2019 by Kyle Kenyon


There are several things that go into an excellent central processor to make it a popular base for things like cloud computing, gaming, and next-gen applications. 

The best CPUs can balance things like speed, stability, and security for seamless performance and an architecture that is efficient and versatile. Basically, the CPU is at the heart of any custom computer build, and without a strong one, you can be left with a computer that lacks the performance and power that you need.

The Zen architecture, introduced by AMD in their Ryzen™CPU series in early 2017, immediately garnered recognition for delivering a clean sheet design that was a step beyond the prior architectures in use at the time.

A few of the advancements included:

  • Ability to execute more instructions per cycle

  • A redesigned cache system

  • Support for quad-channel DDR4 RAM

  • Compact chip design that allowed for scaling between laptops and small-form factor mini PCs up to high-end desktops and servers

The newest update to the Zen architecture by AMD, “Zen 2”, is hitting the streets in July of 2019 and it promises even more performance and additional benefits that make it perfect for custom computer builds. Zen 2 enables the 3rdgeneration of Ryzen™processors and that’s a big deal for gamers and developers alike.

What are the Benefits of AMD’s Zen 2 CPU?

 Why should you get excited about Zen 2 and the third generation of Ryzen™processors? Here are some of the benefits that you’ll see from AMD’s updated Zen 2.

7nm CPU Architecture

One of the biggest advancements that Zen 2 brings to the table (ahead of Intel) is the use of 7nm CPU architecture. Currently 10 nm is used extensively and companies like competitor Intel have been working to scale down to the 7nm size. 

The smaller transistor size means there is less power demand. They also tend to resist overheating better than larger chips and offer processing efficiency improvements. As these transistors have continued to get smaller, the shrinking process has become more complicated. The 10nm version was introduced in 2013, so it’s been a while since a smaller transistor has come out.   

Increased Gaming Performance

The 3rdgeneration Ryzen™processor that’s enabled by Zen 2 offers some serious performance boosts for game playing. In fact, the next generation of Xbox will be using Zen 2 core processors.

Three factors that go into the increased gaming performance are:

  • 2x Last Level Cache (L3)

  • Increased Effective CPU Frequency (the higher the frequency, the faster the processor)

  • Approximately 15% IPC(inter process communication) uplift (meaning better data sharing without interference from other processes)

So, how much better will your Counter Strike game play be? According to AMD, Ryzen 7 3800X gaming performance over the previous version, Ryzen 7 2700X will be as follows:

  • 34% better for Counter Strike

  • 30% better for League of Legends

  • 22% better for PlayerUnknown’s Battlegrounds

  • 21% better for Overwatch

  • 15% better for Dota 2

  • 11% better for Grand Theft Auto

Improved Data Transport Speeds via Higher Infinity Fabric Bandwidth

“Infinity Fabric” sounds like it should be the chest alongside the Invisibility Cloak, but it’s a HyperTransport technology used by AMD. Infinity Fabric is designed to offer high data transport speeds between CPUs, GPUs, and RAM.

It initially became available in 2017 along with the first Ryzen™processors and with Zen 2, it’s getting an upgrade to be twice as fast, increasing to 512-bit.

New TAGE Branch Predictor

 Another component to CPU speed is the branch predictor, which makes an educated guess as to the outcome of a conditional CPU operation to prepare ahead of time for the most likely result.

 TAGE is known as one of the most advanced branch predictors with a high accuracy rate. And the more accurate a branch predictor is, the faster your CPU operations will be.

 Improved Energy Performance

 With the smaller transistor size and other improvements for faster CPU communication comes improvements in energy performance. Zen 2 is expected to offer the same performance for up to half the power consumption. 

 AMD also notes a 75% performance per watt gain over the previous Zen generation and a 45% boost per watt over its competition.

Protections Against Spectre Vulnerability

AMD is adding additional protections to mitigate the well-known Spectre vulnerability. This is a vulnerability that impacts modern microprocessors that perform branch prediction and can result in hackers gaining access to private data.

 The Zen 2 architecture has hardware mitigation against the Spectre V4 vulnerability, which takes the protection a step further from operating system-level. In addition, Zen 2 is inherently immune to:

  • Meltdown

  • Foreshadow

  • Spectre V3a

  • Lazy FPU

  • Spoiler

  • MDS

Get the Computer You Want with a Custom Build 

 You don’t have to just settle for an off-the-shelf computer. Pro Tech Guy can help you build the computer of your dreams. We do custom gaming builds, tiny desktop PCs, and standard desktop builds, all for a reasonable price.

 What would you like to see in your dream computer? Tell us by calling 508-364-8189 or reaching out online.

Filed Under: Uncategorized

Share:

Memory 101: Everything You Need to Know about Upgrading Your Computer’s Memory

August 21, 2019 by Kyle Kenyon


Do you get frustrated when you hit a webpage with a bunch of ads that locks your entire computer up? Find yourself silently screaming at your screen while you’re waiting for yet another locked up program?

 Slow computers drag down productivity and increase stress and frustration. PC optimization is one of our popular services, and often by the time we see them people are at their wit’s end with a sluggish Mac or Windows device and just want it to work right.

 While there are several things that can cause a computer to get sluggish, running low on memory is a key player in performance drops. Often a memory (RAM) upgrade can transform a slow computer into a fast one, and it’s usually a fairly simple an inexpensive fix that can make you feel like you’ve got a brand new system.

 So, how do you go about doing a memory upgrade? We’ll go over the steps below and tell you everything you need to know.

Simple Steps to Upgrading Your Computer’s RAM

 How much can a memory upgrade help? If you have a computer with 4GB of memory, then you’re most likely suffering from slowdowns and a “sticky” computer when you have too many programs or too many browser tabs open.

 If you were to upgrade that to 12GB of memory (3x’s more capacity), you’d feel like you went from a 20-year old economy car to a new Ferrari. The additional memory capacity allows your computer to multi-task much better and handle those webpages that are heavy with videos and ads.

 An average office worker can lose up to 40 minutes of productivity a day due to slow technology.

 Here are the steps to take to do a memory upgrade and increase your computer’s capabilities.

Step 1: See if Memory is Your Issue

Before you assume that upgrading RAM can solve all your PC problems, it’s a good idea to see if your current memory is reaching capacity. 

 On Windows: Check in Task Manager to see memory usage. You can view current processes and % of memory each uses, and also on the Performance tab, the amount of memory used overall versus the amount you have. 

 On Mac: Go to Utilities, and Activity Monitor, then the System Memory tab.

 If you’re seeing that you’re in the upper range (70% and up) of memory usage, an upgrade is a good idea.

 Step 2: Find Out If an Upgrade is Possible 

 If you got a super cheap laptop during that last Black Friday sale, there is a good chance you might be stuck with the amount of memory it currently has. Not all computers can have their memory upgraded.

 Some things that keep you from upgrading are:

  • No available memory slots

  • No customer access to the memory (i.e. a laptop with a sealed bottom)

  • Memory that is soldered onto the motherboard, rather than an insert

 Both of the memory usage areas mentioned in Step 1 will also have details on the amount of memory your desktop or laptop computer currently has installed. You should also be able to see if any open memory slots are available and how much memory they can take.

 For example, you might see that your device has 4 memory slots total with 2 of them taken up and 2 open that can take 4GB each. That lets you know how much you can upgrade.

 If you’re having trouble finding this information, pull out or search online for your computer’s instruction manual, the details should be in there as well.

Step 3: Identify What Type of Memory Can be Used

Different types of computers accept different types of RAM, so you want to be sure you purchase the right kind. You can search on the manufacture’s site for your specific model number or use a tool like the one from Crucial Advisor that helps you find compatible memory.

Step 4: Find Your Memory Slots 

You may have run across the physical location of your memory slots when you were looking for the other memory information, but if not, you want to look that up before you attempt to just go looking around. You may also need a small Philip’s head screw driver to open the memory area.

Step 5: Turn Off Your Computer & Install the RAM

 You want to turn off your computer and be sure to ground yourself so you don’t damage any of the internal parts of your computer with static electricity. Be sure you have the RAM module pointing the correct way, and then fit it into the open memory slot. Be sure it’s in there tightly. If the door or other closure won’t go back on correctly, there’s a good chance you haven’t slid the memory in far enough.

 In some cases, you may be replacing another memory module. For example, if there is a slot that can hold 8GB, but it only has a 4GB module installed, you may want to swap a larger capacity RAM for the lower one.

Step 6: Turn on Your System & Check that the New RAM is Reading

 Once the memory is installed, turn your computer back on and go back to your memory settings. Your computer should be reflecting the newly installed memory. If it’s not, then it might not be installed correctly or may be incompatible.

 You should notice an immediate speed improvement. Also, keep an eye out for any strange behavior like sudden reboots. Some older systems (especially iMacs) can get finicky when new memory is installed, even if it’s the right kind. If you’re having trouble after a memory upgrade, it’s best to have your device looked at by a professional.

Sluggish Computer? Pro Tech Guy Can Help! 

 Whether you need help with a memory upgrade or would like to get a full virus removal and PC optimization, we’re here to help and can get your system running at top efficiency.

 Don’t struggle with a sluggish computer! Call us at 508-364-8189 or contact us online.

Filed Under: Uncategorized

Share:

10 of the Best Mac Tips to Make You a Super User

August 14, 2019 by Kyle Kenyon


Once people go Mac, they rarely go back and one of the reasons is that it’s known to be an operating system that make things easy for the user. From installing and uninstalling applications to connecting with a printer, Apple makes it a fairly trouble-free experience.

If you’re an iMac or MacBook user, a way to streamline your desktop computer experience even more is to learn some tips that will make everyday tasks take less time and effort.

Even if you’ve been a Mac user for years, there’s a good chance there are still a few tricks out there you may not have discovered. Read on for some of the best Mac tips to help you save time and become a super user!

Mac Tips & Tricks That Will Make Your Life Better 

While Windows still holds the lion’s share of the global computer market, with Mac at just under 10%, Mac users have a loyalty for their tech that outmatches just about any other PC brand.

Love your Mac? Love it even more, make your life easier, and impress your friends with these nifty Apple tricks.

1. Add ™and ®Quickly

 You’re typing along, then hit a brand name that needs a trademark symbol and you come to a standstill while searching for the symbol insert command. Just two easy keyboard shortcuts can make adding the trademark and registered trademark symbols a breeze.

For ™ use: Option + 2

For ® use: Option + r 

2. Choose Where You Take a Screenshot

This shortcut could totally change your life if you like to take screenshots – but not of the entire screen. 

Just hold down the Cmd + Shift + 4 keys and you’ll get a crosshatch on your cursor. Just drag it over the exact area of your screen that you want to capture and let go. The screenshot will be saved as a PNG on your desktop. 

3. Use Preview for Light Photo Editing

 You have an image you need to crop, but you don’t have any fancy photo editing programs on your computer. No problem, just use Mac’s native Preview app. Besides previewing PDFs and images, it also allows you to make tweaks such as:

  • Image cropping

  • Image resizing

  • Color management

  • Annotation

4. Make Your Own Keyboard Shortcuts

Do you wish you had a specific keyboard shortcut for something you do all the time? Mac lets you easily make your own. Just go to System Preferences, click Keyboard, click Shortcuts, and click the “+” button at the bottom and you’ll get all kinds of options for applications to use to design your own keyboard shortcut.

5. Remotely Control Another Mac User’s Screen

A nifty built-in feature on Mac is a way to screenshare and even take over another Mac remotely without needing to go through a 3rdparty application. This can be especially helpful if you’re helping a new Mac user ramp up the learning curve.

Set up sharing on both computers by going to System Preferences, choose Sharing, and input the user’s Apple ID. Here are detailed instructions. 

6. Merge Your Finder Windows

Are you working with multiple finder windows and forgetting which one has the file you need? Don’t click around aimlessly, instead merge them all easily and have each on its own separate tab in a single window.

With Finder active, click on Windows in the top menu bar, then click Merge all windows.

7. Quickly View Hidden Files

Certain files default to hidden and can drive you crazy trying to find them on your computer. For example, if you’re trying to edit your website’s .htaccess file, it’s going to be hidden until you reveal it. 

Easily see any hidden file in a folder by using keyboard shortcut: Command + Shift + . (period key).

8. Control What Items Start on Login 

It can be annoying when every time you boot up your computer an unnecessary program automatically opens. Some software put themselves in your startup sequence by default, but you can get control back.

Choose which programs you want to start at login by going to System Preferences, click Users and Groups, click your User Name, and uncheck any applications you don’t want opening at startup.

9. Use Windows on a Mac 

If you have some programs that you just need to use on Windows, you can host a Windows operating system on your Mac using the native utility called Boot Camp.

First check to make sure your computer or laptop matches the Apple requirements. Then purchase a copy of Windows 10 and the Boot Camp assistant will walk you through partitioning your drive so you can run both Windows and Mac on your system. 

10. Remove Big File Attachments in Mac Mail

Is your Mac Mail getting big and you need a way to remove some file weight without deleting messages? You can strip any attachments pretty easily to free up space.

 Highlight the mailbox or folder (like “Sent”) in which you want to delete the mail attachments. Hit Command + A to select all messages, pull down the Messages menu and choose “Remove Attachments.” You can repeat the process for various folders. If you only want to strip attachments from certain emails, just highlight those emails instead of using select all.

Windows or Mac – Pro Tech Guy Can Help 

Have you been frustrated trying to find an IT shop to repair or customize your Mac? Look no further, because Pro Tech Guy has expertise in both Mac and Window computer services.

Contact us anytime for tech help at 508-364-8189 or reach out online.

Filed Under: Uncategorized

Share:

Will the Upcoming Wi-Fi 6 (802.11AX) Really Make Public Wi-Fi More Secure?

August 7, 2019 by Kyle Kenyon


It’s always been a given that connecting to public Wi-Fi can leave you at risk of having your internet session spied on by a hacker. Cyber safety commercials typically show a shady looking person sitting with a laptop at the back of a coffee shop stealing the confidential data of an unsuspecting patron using the shop’s free hotspot.

 But public Wi-Fi is often necessary to use, especially when traveling, and people tend to want that internet connection so much, that they’ll connect without even knowing much about where the free Wi-Fi is coming from. And a good antivirus program can’t always stop them, depending upon their tactics.

 In a study performed by Avast Antivirus they set up 3 public Wi-Fi spots at a local Barcelona airport to see how many users would connect, not knowing where the free Wi-Fi was coming from. In four hours, over 2,000 people used the free hotspots even though they knew nothing about them.

 So, do you have to just resign yourself to the fact that security is going to be a price you pay for public Wi-Fi? Not for much longer, because coming out by the end of 2019 is a major update to wireless connection protocols known as 802.11ax aka Wi-Fi 6. 

The Security Benefits of 802.11ax with WPA3 Security Protocol

 It’s been about 15 years since there’s been an update to the security protocol used for wireless connections, known as Wi-Fi Protected Access (WPA). 

 The current Wi-Fi standard that’s used is 802.11ac (known as Wi-Fi 5). While this standard was released just five years ago, the WPA2 security protocol it uses was released in 2004, a decade earlier.

 The Security Issue with 80211.ac (Wi-Fi 5) and WPA2

 The reason it’s dangerous to connect to an unsecure public Wi-Fi is because of a severe security vulnerability (nicknamed KRACK) found in WPA2. It allows hackers that are within range of a vulnerable device to intercept the traffic and basically spy on you to gain access to passwords, emails, and other data. They can also infect a website that you’re visiting with malware.

 This vulnerability allows the hacker to break the encryption of traffic that’s supposed to be secure. Hackers can steal things like:

  • Chat messages

  • Photos & other files

  • Emails

  • Credit card numbers

  • Login credentials

 Safeguards Built into 802.11ax (Wi-Fi 6) and WPA3 

 While Wi-Fi 6 is offering improvements in the speed, battery life, and multi-device handling, its biggest benefit will be in the safety department. Its going to make connecting to public hotspots much more secure.

 A combination of security measures in Wi-Fi 6 will make it much safer to connect to public Wi-Fi

 Here is a rundown of the security enhancements you’ll see coming in Wi-Fi 6 with WPA3.

 Individualized Data Encryption

 The traffic between your device and the pubic Wi-Fi network you’re connecting to is going to be encrypted individually, greatly increasing privacy. That encryption will happen automatically, even if you didn’t need to enter a password to connect.

 This makes it impossible for people to spy on your traffic just by being on the same Wi-Fi without cracking your individual encryption.

 Protection from Brute-Force Attacks

 When any device connects to a wireless router a “handshake” is performed that checks the password and connects you to the Wi-Fi network. This handshake procedure is part of the KRACK vulnerability discovered in WPA2.

 In WPA3, the security of this handshake procedure is greatly increased. It uses what’s known as a Dragonfly handshake, which requires network interaction on any potential login. This keeps hackers from downloading a network’s cryptographic hash and trying to crack it offline by use of special software.

 Forward Secrecy

 Another security quality of that handshake comes from the fact that WPA3 uses what’s called Simultaneous Authentication of Equals (SAE). This offers forward secrecy, which is a security feature that stops hackers from capturing older traffic to decrypt if they’ve hacked a network password. 

 Advanced Encryption for Sensitive Networks

 While you most likely won’t see this security feature employed on free public Wi-Fi networks, it’s a big enhancement for government organizations or industries that have particularly sensitive data. WPA3 will come with the ability to use a higher encryption level, 192-bit encryption, which will make it even harder to be hacked.

 Check Before You Connect

 There is no specific date when 802.11ax (Wi-Fi 6) and WPA 3 will be available. Router manufacturers are already rolling out Wi-Fi 6 enabled routers, but the only date we have as of now is that it will be released by the end of 2019.

 Even once it’s available, you’ll still want to check when connecting to public Wi-Fi to see if they advertise use of the new standard. It may take a while for everyone to roll it out, and you don’t want to have a false sense of security if they’re still using a WPA2 protocol on their network.

Get Managed Antivirus & Malware Protection 

 Keep your computer safe no matter what with Pro Tech Guy’s Cloud Care Premium. We offer multiple safety features including managed antivirus and malware, threat detection, secure backup, and more.

 Contact us today to learn more at 508-364-8189 or through our contact form.

Filed Under: Uncategorized

Share:

  • « Previous Page
  • 1
  • …
  • 10
  • 11
  • 12
  • 13
  • 14
  • …
  • 17
  • Next Page »

Follow Us

Hours & Directions

M-F 9AM to 5PM

Click here for updated hours and directions

Our Services

> Cloud Care
> Business IT Services
> Home Computer Repair
> New and Reconditioned Computers

VISIT US

Reviews

[reviewstream]

Recent Posts

  • Are You Sabotaging Your Employee Phishing Training by Doing This?
  • What Should You Look for When Auditing Your Privileged Accounts?
  • The Biggest Cybersecurity Mistakes That Can Leave Your Company at Risk
  • 5 Technology Resolutions You Should Make for the New Year
  • What IT Issues Can We Solve Using Remote Support?

Copyright © 2025 · Pro Tech Guy · 855 Worcester Rd., Framingham, MA 01701