Business Computer Safety, Part 5

Keeping Your Business Computer Safe and Secure

Welcome back to our series on home computer security! We’ve talked about antivirus, antispyware, firewalls, and strong passwords. This post may be the hardest for a lot of people, because it involves changing the way you use the Internet. You don’t have to be paranoid, just be mindful of what you read and download, and you’ll be much safer.

Surf Smart and Stay Away from Spam

Everyone knows what spam is, and most of us can recognize it, but it bears repeating. If you don’t recognize the address an email came from, don’t open it. You know if you signed up for a newsletter or updates from a certain site – if you didn’t, don’t open it, just delete it. Anything that appears to come from a large company, unless you gave them your email address for ordering or other purposes, will be spam, and should be immediately deleted. If you want to be extra safe, delete anything that appears to come from someone you know, but has a subject line that doesn’t look right. You know how your friends and family talk and/or type. If the sender looks right but the subject line doesn’t, delete it. Then email or call your friend and tell them the subject line looked iffy, so you didn’t open it, and if it was real, would they please send it again. They’ll understand. You might also recommend that they clean their computer.

As mentioned previously, some free programs that you can download have spyware built in. The way to avoid loading down your computer with it is simple. Read everything that pops up before you install anything! One of the most common things you’ll see with free programs is a toolbar. A box will come up with check boxes next to every item the program is trying to install, and if you see anything that says “toolbar” or “search”, make sure to uncheck it. If you don’t, once you have a few of these programs downloaded, you’ll have six inches of toolbars on your screen and very little space to view any web pages. While you’re looking for toolbars, read everything else with a check box next to it. Most of the time, you can uncheck every last one of those with no effect on the program you’re downloading. If you uncheck anything that would prevent the program from working, it will tell you. At that point, you make the decision whether or not to continue.

When downloading a free program, you may also get a box that says “publisher could not be verified” and asks if you want to continue. This can go either way. It means that Windows does not recognize the creator of the program, for whatever reason. It’s actually very common and, usually, it’s not that big a deal. If it’s a well-known program, there’s nothing to worry about. However, if you’ve never heard of this program before, and don’t know anyone who uses it, try searching for reviews of the program online before you install it. It’s a good rule to follow anyway, but especially if you get a “publisher could not be verified” message.

Another thing to look out for is random pop-ups that tell you something needs to be updated. If you see one of these, do not click on it! Instead, go to the official page or other trusted source for the application and get an update there. There was recently a hoax update that locked up the computer, activated a webcam, and said “searching for face”. It popped up on an ISP website, and looked very official. It also resulted in the computer having to be wiped, which means anything that wasn’t backed up was lost and everything, including the Windows operating system, had to be re-installed. This is more than just a hassle; it can run into quite a bit of money. Don’t let that happen to you! It doesn’t matter what website it seems to come from, or how real it looks – never try to get updates from a pop-up.

Tec Info is the premiere Internet and phone service provider to Jackson, Leland, Greenville, Greenwood, Tupelo, Oxford and Cleveland Mississippi. Tec Info provides High speed Internet Service to residential and business locations with friendly, knowledgeable staff and unsurpassed speeds. Contact us today for more information on Internet, Phones and all our other services available!

Keeping Your Business Computer Safe and Secure, Part 4

Keeping Your Business Computer Safe and Secure, Part 4

We’re bringing you more ways to stay safe and secure online. So far, we’ve covered antivirus protection, antispyware software, and firewalls and updates. This time, we’re bringing up a very sore point – password security!


Pretty much everything you do online will require a password. Bewteen email, Facebook, banking, bill paying, shopping, and everything else, it can be tempting to just use the same password for everything. But what if just one of those accounts is compromised? Say your Facebook account gets hacked; that account on its own is not that big a deal, but if you use the same password for your banking, bill paying, and insurance, you could be looking at losing money, if not full-blown identity theft.

Now that you’re scared, here’s the good news. You don’t have to have a separate password for every single thing you do online. You can stick to two or three strong passwords, and organize them by type of account. You might have one password for vital information (banking, bills, insurance, etc.), another for shopping accounts (Amazon, Etsy, etc.), and another for those accounts that don’t involve any financial or personal information (online communities, games, etc.). Another option is to start with one strong password, and add an abbreviation to the end for each site (for example, add “az” for Amazon, “fb” for Facebook, “em” for email, etc.).

The key point here is that your passwords must be strong. But what exactly does that mean? A strong password is one that is not easily cracked by a computer program that is designed to figure out passwords. At minimum, you’ll want at least eight characters, but longer is better. Include at least one capital letter, one numeral, and a special character like an exclamation point, @ symbol, colon, or pound sign. Special characters make passwords especially strong, but be aware that some sites will only allow certain special characters in passwords, so if you’re using a more obscure character, it might not be accepted.

Of course, the only way to make absolutely sure that your password or other information stays completely private is to keep it in your own head, but by putting some thought in your passwords and how you use them, you can safely enjoy all the convenience the web has to offer.

Tec Info offers the best residential and business Internet solutions to Jackson, Leland, Greenville, Greenwood, Oxford, Tupelo and Cleveland Mississippi. Contact us today to find out more about the services that we offer. Stay tuned; our next post will help you with safe surfing habits!