Tech Support Scams have been by far one of the fastest growing malicious attacks to hit computer users in 2015 and they don’t appear to be slowing in 2016. These criminals manufacture authentic looking popups via advertising schemes to scare users into calling an overseas technical support site where the innocent user is scared into paying hundreds of dollars to get “phantom” infections removed from their computers. Beware of these scammers! Read more at https://blog.malwarebytes.org/fraud-scam/2015/12/safebrowsing-scam-from-amazon-to-rackspace/
Posts Tagged ‘computer repair’
By definition, managed services is a process whereby a business offloads it’s IT operations to an IT service organization that assumes the responsibility of 24/7 monitoring, managing, troubleshooting, and problems resolution for the IT systems within the business generally on a subscription basis.
If you’re waiting for computer problems to occur and reacting the way many small business owners do, you’re likely dealing with unnecessary downtime and stress at work, you’re looking at higher costs in the break-fix model where “an ounce of prevention is worth a pound of cure”, and you’re overlooking the serious benefits that larger businesses have been taking advantage of for years. By dealing proactively with your business IT infrastructure, you can reduce your downtime, the frustration experienced by your employees and customers, and the repair costs associated with catastrophic failures.
If you’re interested in managed services, contact us at email@example.com for a quote.
Over the last two weeks, we, your computer magicians at CET, have seen several systems infected with viruses due to “tween” sons straying from homework assignments into some of the worst garbage on the internet. It was one of this summer’s biggest news stories that has ultimately resulted in the ‘unintended’ proliferation of pornographic images across television, the internet, and Facebook postings. Strange to ponder and difficult to imagine but today’s teens and tweens are subjected almost nonstop to sexually explicit images. In an article published Monday, September 21, in “Christian Today”, the writer laments the fact that today’s teen and tween boys (and girls) are practically encouraged to engage in more and more risky behaviors involving sexting, videotaping, sending of sexually explicit images, taking part in sexually explicit conversations and surfing for pornographic websites and videos (http://www.christiantoday.com/article/xxx.church.advice.what.parents.should.do.when.they.catch.their.children.sexting/65311.htm). But there is a brighter side to that same technology that parents and grandparents can tap into – parental controls. In fact, nearly all internet-connected devices, from computers and gaming consoles to smartphones and tablets, can be configured for parental controls.
The website http://www.onguardonline.gov/ offers this breakdown of the different types of parental controls.
1. Filtering and blocking – limiting access to specific websites, words, or images
2. Blocking outgoing content – preventing the sharing of personal information online
3. Time limiting – setting limitations on the amount of time or hours of the day access is available
4. Monitoring tools – software or configurations that warn parents or record information regarding certain activities on the monitored system
Your child’s safety is important and unfettered access can be a pitfall, particularly for tween boys. If you need help, we’re here to assist you. Call us or come by our office.