How do you manage your passwords? Memory? Notes on your phone? Several scattered, semi-legible sheets of paper? Frequent resets?
If you answered yes to any of the above, try downloading this simple, easy to use password management tool. You can print it out, save it to your computer - even password protect it!
Don't forget to include passwords for critical business tools that other people manage for you - like your website or bookkeeping service. You don't want the only person with access to these systems to win the lottery and hop on a plane to Aruba...without leaving your passwords behind.
Is your Inbox a place where good emails go to die? Do you cringe at the thought of digging up a specific conversation? Would you love to have a way to know who has and has not replied to your SUPER IMPORTANT EMAILS? Look no further - I've compiled my favorite tips that help me manage my inbox without chasing the dragon of "Inbox Zero."
Please note: These tips are created for Gmail Users, and specifically those people using Chrome, so proceed with caution, Outlookians.
Phase 1: The Purge.
Raise your hand if 75% of the emails that come into your inbox are promotions, blogs, and other things you wouldn't read even if you had unlimited time. Email marketing is huge, and your email address is like gold to both legitimate and illegitimate spammers. So here's what we're going to do:
Whew! Alright, that's the hard stuff. Everything else below is meant to polish up your experience so you might even enjoy handling emails once in a while
Phase 2: Fine-tuning
I am a die-hard fan of Chrome extensions, and use so many that I need at least 12GB of RAM to even operate. Please note - the more extensions you have, the more of a toll it will take on your machine. The good news is: everything I list below is absolutely free for normal use by a single user.
Questions? Thoughts? Did I miss something SUPER AMAZING??? Comment below or email me at email@example.com
You already know how to take a screenshot, but what if you just want to copy a small section of your computer screen? The Microsoft "Snipping Tool" is just the utiliity for you!
Click the "New" Button to select any rectangular section of your screen. The newest version of Snip includes free-form snips, full-window snips, and fullscreen snips, so you never need to use any other utility for your screengrabs!
Bonus: If you right click the Snipping Tool Icon at the botton of the page, you can select "Pin to Taskbar" so it is always available!
Email firstname.lastname@example.org or call 215-906-1467 if you have any questions!
It’s all over the news: malware in Yahoo advertisements, exploits in Firefox Add-ons – sometimes it can seem like computer viruses are inevitable. Here are some easy habits that will help you ensure your computer is as protected as possible:
1) Update your software
Keep your software current – this includes Java, Adobe Flash, and internet browsers like Chrome, Internet Explorer, and Firefox – as well as regular Windows Updates. This is as simple as clicking “yes” when you are prompted to install. It you prefer not to get notified for every update, most applications have an “update automatically” option.
2) Ensure your primary User Account is not set as Administrator
When you use an account with administrator permissions, it is much easier for software to run and install itself on your computer without your approval. Create a second, password protected user account with administrator rights called “Admin” and change your primary account type to “Standard.”
3) Make software ask permission before installing
Open the “User Account Control” window by typing “UAC” into your start menu. Make sure the setting is at “Notify me when apps try to make changes to my computer” or higher. This will cause your computer to display a prompt like this when you try to install or update a program:
This prompt gives you the opportunity to decide whether you want to install the software.
4) Look before you approve a software installation
Just enabling User Account Control is not enough – make sure you look at the program name and the publisher before you click Yes. If either one seems unfamiliar, a quick Google search for the program name and publisher will help you determine whether to install.
For example – a search for CCleaner – a legitimate, well-known computer maintenance and optimization program – returns the following list of places to download the software:
On the other end of the spectrum, a search for Vosteran – an annoying and invasive browser extension that causes pop-ups and changes your home page – reads more like a laundry list of complaints, warnings, and instructions for how to remove the program:
If you have questions or if you need help with virus removal and/or training employees to recognize and avoid viruses, contact us at email@example.com
We’ve all done it- no matter how careful we are, somehow we all manage to pick up a virus at some point. One of the most common ways people get computer viruses is through spam email.
Although a large percentage of spam is easy to identify, some varieties use more subtle and difficult to detect methods. This article will help you identify and avoid many types of email-borne viruses.
Most email-borne viruses come in the form of attachments or web links. Before you click, ask yourself: Do I recognize the person or organization sending me the email? Am I expecting this information? If the answer to either or both of these questions is “no,” think twice before clicking links or downloading attachments.
Even if you recognize the sender, they may have had their account compromised. Read the language of the email carefully before opening links and attachments – most illegitimate email from known email addresses will sound very different from the sender’s usual style. Common giveaways include:
Below is the full address from a link in an email from MyNewCompany.com. When I hovered over the link with my mouse, the web address contained the word “mynewcompany,” so it is a safe assumption that this is a legitimate communication.
If you are still uncertain, you can always navigate to the page yourself. For example, if you get a suspicious email that says it is from your bank, just type www.mybank.com into the address bar instead of clicking on the embedded link. If you don’t find the information from the email on the bank’s website – congratulations! You just successfully avoided email spam.
Stay tuned for our next post, where we will discuss other ways to avoid viruses – and how to remove them if they make it through your best defenses.
If you have questions or if you need help with virus removal and/or training employees to recognize and avoid viruses, contact us at firstname.lastname@example.org - ask about our spam training courses!