IT Problems Your Managed Service Provider Can Solve


Unlike quick-fix IT relationships, a managed service provider isn't there just to solve short-term problems and leave. Your managed service provider is your IT's mountain Sherpa, there to guide your business through the ever-changing technology landscape.




Like a mountain guide, your managed service provider gives you a detailed route that will help your business climb to new heights. The secret to a great business is avoiding the pitfalls, dead-ends, and traps inherent in bad IT.







Removing IT Worries




Technology
in business presents both new solutions and new problems too. We are more
efficient and more productive today than we've ever been before. On the other
hand, we are also more vulnerable and more exposed to malware and hackers than
in previous years too.




Major
hacks of large firms are in the news almost daily, they affect millions of
customers worldwide, and even large firms seem to struggle with the fallout
incurred after a major breach. Our number one priority is ensuring that the
customers, suppliers, and business partners of our businesses can rest at ease.




We remove
your IT worries, secure your data, and keep your systems safe so you can focus
solely on your business. Our methods let you return to the passion which makes
your business great while sleeping soundly at night knowing your systems are in
good hands.

Continue reading
  142 Hits
142 Hits

WHY IT PROFESSIONALS ARE TERRIFIED OF RANSOMWARE


If you want to scare someone who works in IT, start talking to them about ransomware. There are few things as scary for IT professionals as the prospect of their systems locking up with hackers demanding money to return things back to normal.







When discussing it, you may notice them breaking into a sweat and starting fidgeting as they contemplate one of the most terrifying cybersecurity threats computers face.




How does ransomware spread?




There are several ways that ransomware can get into computers.




Email is one of the most common ways in. Hackers will send bad files that can trigger a ransomware infection when opened and quickly spread across your network.




Another favorite way to spread ransomware is to send bad URL links that download ransomware when they’re clicked. This ‘drive-by downloading’ can happen without anybody noticing that anything has happened until it’s too late. 

Continue reading
  124 Hits
124 Hits

Why You Should Not Move Your Laptop

Laptops. They’re designed to be portable. But, did you know that by moving your laptop around while it is turned on can be bad news for your device? In the main, it’s definitely a bad idea to carry your laptop around while it’s up and running.

Okay, laptops are meant to be portable devices. But, that means that you have to switch them off beforehand. It’s not a great idea to leave them running if you are on the commute or stuffing it into a laptop bag.

It’s certainly wise to power down the device.

There are a number of reasons why you should not move your laptop when it’s up and running.

Let’s take a look at this in more depth.

Continue reading
  133 Hits
133 Hits

Why Backing up Your Data is Vital

Given how much data the average person has on their computer nowadays, it’s very surprising how few people will actually back it up. Computers are very complex devices and just like anything else, they’re prone to developing faults as they age. With hard drive failures, it’s very possible that you could lose all the data on your computer.

If you think about what files you have on your computer right now and how you’d feel if they were lost for good, then you’ll probably realise just how important backing up your data is.

When it comes to backing up data, many people will use physical storage devices such as USB drives or external hard drives. Whilst this might seem like a good idea, the truth is that these devices can easily get lost, damaged or fall into the wrong hands. Due to these risks, more and more people are now using cloud technology to backup their important files.

The benefits of using the cloud to backup your data Using the cloud to backup your data comes with several key benefits. These include –
  • Access from any device at any time – This is an incredibly useful benefit of using the cloud to backup data. If your computer breaks down, then you can simply log into your account from another device and access your files at any time.
  • Completely secure – Because your data is copied to multiple data centres, it means that even if one centre fails, you’ll be able to access your files from another, which completely alleviates the worry of your files being lost.
  • No extra hardware of software required – When using the cloud to backup your data, you don’t need to purchase any additional equipment. All your files are simply uploaded to a secure server where they can be accessed instantly.
 Our cloud backup service  At Cumbria Computer Repairs, we offer a comprehensive cloud backup service for all types of files. We can tailor our service to make it suited to your particular needs, whether you’re a business or private user.

Because our solution is compliant with the Data Protection Act, you can have full peace of mind that your files are 100% safe and secure.

For more information please contact us we’ll be able to explain more about the benefits of our cloud backup service.  or you ring us on 01228 576090 or email: This email address is being protected from spambots. You need JavaScript enabled to view it. 

  127 Hits
127 Hits

CE Mark and C E Mark

CE Mark and C E Mark

When buying replacement chargers for laptop, phones all tablets, is important to make sure that it has a CE mark on it to ensure it’s safe to use. But there are two types of CE mark on is Conformité Européene meaning "European Conformity" and the other is China Export and the logos are very similar. Below is an example of both logos.

There is not many differences but the main one is that the E is closer to the C on the China Exports and the EU version it’s further apart, they both use the same font.

  172 Hits
172 Hits

Quiz Time

Quiz Time

Let's say you want to download the excellent program CCleaner. To remove temporary files from your computer. Can you tell from this screenshot, which is the RIGHT download button, and which ones are ads?

It’s pretty difficult isn’t it? This is why I install AdBlock Plus onto all repairs. It eliminates the guesswork, and eliminates much of the potential for downloading trouble.

  118 Hits
118 Hits

Warning of New Spam Email Containing the Cryptolocker Virus

Warning of New Spam Email Containing the Cryptolocker Virus

We have being sent a copy of an email, which claims to have medical results. And that you have to download an email and contact your doctor. It is in fact a virus called cryptolocker (This virus encrypts all the files on your computer and holds your computer to ransom.) If you receive this email, just delete it.

 

  136 Hits
136 Hits

Spam, Spam and more Spam

How often do you check your Spam or Junk E-Mail Folder?

We were recently waiting for an important email which had accidently being caught and moved to our spam folder. While most of the email was spam, the email we were waiting for hiding in the folder.

An email can be marked as spam or junk for any reason, it does not matter who the email it has come from whether it be a family members, friend member or staff or a work colleague.

So check your spam folder on a regular basis. If you have not done it recently why not do it now?

  117 Hits
117 Hits

Twitter Keyboard Shortcuts.

There are a number of keyboard shortcuts which allows you to navigate the twitter website using just your keyboard.

I have split the shortcuts into three groups Actions, Navigation and Timeline.

Actions
  • To send a new tweet press 'N'
  • To favourite a tweet press 'F'
  • To reply to a tweet press 'R'
  • To retweet a tweet press 'T'
  • To send someone a direct message press 'M'
  • To block a user press 'B'
  • To unblock a user press 'U'
  • To open a tweet press 'Enter'
  • To close all open tweets press 'L'
Navigation
  • To view all available shortcuts Press ?
  • Move to next Tweet 'J'
  • Move to previous tweet 'K'
  • To scroll down a page of tweets press 'Space'
  • To search twitter press /
  • To load new tweets press '.'
Time Line
  • To view the timeline press 'G+H'
  • To view the connect tab press 'G+C'
  • To view the Activity tab press 'G+A'
  • To view the Mentions/Reply tab press 'G+R'
  • To view the Discovery tab press 'G+D'
  • To view your profile press 'G+P'
  • To view tweets you have favorited press 'G+F'
  • To view your lists press 'G+L'
  • To view you're Direct Messages Press 'G+M'
  • To view the settings menu press 'G+S'
  • To go to a user's profile press 'G+U'
  124 Hits
124 Hits

Keyboard Shortcuts for Firefox Users on Facebook

Did you know there is keyboard shortcuts to help you use Facebook with only a couple of key strokes?

You can navigate Facebook with great ease once you have learned a few keyboard shortcuts.

To comment, scroll between your news feed, like or message someone you can use these shortcuts.

Press C to comment on a post on your news feed.Press J and K = scroll between news feed posts.Press L to like or unlike a post.Press M to message someone.You can also use the keyboard shortcuts below to access the features below.

Shift + Alt + / = To search FacebookShift + Alt + 0 = To get helpShift + Alt + 1 = To go homeShift + Alt + 2 = To view your timelineShift + Alt + 3 = To see your friends listShift + Alt + 4 = To view your message inboxShift + Alt + 5 = To view your NotificationsShift + Alt + 6 = To view your Account SettingsShift + Alt + 7 = To view your Privacy settingsShift + Alt + 8 = To view information about FacebookShift + Alt + 9 = To View Facebook Terms and Conditions Terms

  104 Hits
104 Hits

Keyboard Shortcuts for Facebook Users Using Google Chrome

Did you know there is keyboard shortcuts to help you use Facebook with only a couple of key strokes?

You can navigate Facebook with great ease once you have learned a few keyboard shortcuts.

To comment, scroll between your news feed, like or message someone you can use these shortcuts.
  • Press C to comment on a post on your news feed.
  • Press J and K = scroll between news feed posts.
  • Press L to like or unlike a post.
  • Press M to message someone.
You can also use the keyboard shortcuts below to access the features below.
  • Ctrl + Alt + / = To search Facebook
  • Ctrl + Alt + 0 = To get help
  • Ctrl + Alt + 1 = To go home
  • Ctrl + Alt + 2 = To view your timeline
  • Ctrl + Alt + 3 = To see your friends list
  • Ctrl + Alt + 4 = To view your message inbox
  • Ctrl + Alt + 5 = To view your Notifications
  • Ctrl + Alt + 6 = To view your Account Settings
  • Ctrl + Alt + 7 = To view your Privacy settings
  • Ctrl + Alt + 8 = To view information about Facebook
  • Ctrl + Alt + 9 = To View Facebook Terms and Conditions Terms
  113 Hits
113 Hits

Keyboard Shortcuts for Facebook Users Using Safari

Did you know there is keyboard shortcuts to help you use Facebook with only a couple of key strokes?

You can navigate Facebook with great ease once you have learned a few keyboard shortcuts.

To comment, scroll between your news feed, like or message someone you can use these shortcuts.
  • Press C to comment on a post on your news feed.
  • Press J and K = scroll between news feed posts.
  • Press L to like or unlike a post.
  • Press M to message someone.
You can also use the keyboard shortcuts below to access the features below.
  • CMD + / = To search Facebook
  • CMD + 0 = To get help
  • CMD + 1 = To go home
  • CMD + 2 = To view your timeline
  • CMD + 3 = To see your friends list
  • CMD + 4 = to view your message inbox
  • CMD + 5 = to view your Notifications
  • CMD + 6 = to view your Account Settings
  • CMD + 7 = to view your Privacy settings
  • CMD + 8 = to view information about Facebook
  • CMD + 9 = To View Facebook Terms and Conditions Terms
  107 Hits
107 Hits

Keyboard Shortcuts for Facebook Users Using Firefox for Mac

Did you know there is keyboard shortcuts to help you use Facebook with only a couple of key strokes?

You can navigate Facebook with great ease once you have learned a few keyboard shortcuts.

To comment, scroll between your news feed, like or message someone you can use these shortcuts.
  • Press C to comment on a post on your news feed.
  • Press J and K = scroll between news feed posts.
  • Press L to like or unlike a post.
  • Press M to message someone.
You can also use the keyboard shortcuts below to access the features below.
  • CMD + / = To search Facebook
  • CMD + 0 = To get help
  • CMD + 1 = To go home
  • CMD + 2 = To view your timeline
  • CMD + 3 = To see your friends list
  • CMD + 4 = To view your message inbox
  • CMD + 5 = To view your Notifications
  • CMD + 6 = To view your Account Settings
  • CMD + 7 = To view your Privacy settings
  • CMD + 8 = To view information about Facebook
  109 Hits
109 Hits

Don’t Be a Phishing Victim: 3 Sure Signs an E-Mail is Fake

Don’t Be a Phishing Victim: 3 Sure Signs an E-Mail is Fake

Anyone who has been online more than a few years has likely been the victim of a phishing attack. What starts as a seemingly legitimate e-mail requesting information from a user can lead to account infiltration, e-mails sent to that person's entire contact list, or identity theft.

Over time, phishing has become more sophisticated, using logos and imitating fonts and intensifying threats to prey on the fears of its victims. But there are a few sure-fire signs that an e-mail might not be what it seems. By looking for these small indicators, you can save yourself—and your friends—hours of grief.

Misspellings
If a company the size of Apple or Facebook sends out an e-mail, that e-mail is generally professionally written, including perfect grammar and spelling. Large corporations carefully craft these e-mails and send them to thousands of people over a short period of time. Even one error would be spotted fairly quickly and corrected.

Link
The hallmark of a phishing e-mail is that it revolves around one link. The link invites you to click. Don't be fooled by text in the link that appears as though it will direct you to a major website. The text you see in front of you will not be the link you're directed to if you click. That link will connect you to the cybercriminal's site, where your information will be collected and used.

Urgency
Whether a phishing e-mail promises to reward you with a monetary prize or threatens account revocation if you fail to act, the one thing you'll notice is urgency. The cybercriminal's trick is to get you to act in haste. Don't be afraid to take time to research and ask a tech-savvy friend or colleague for their thoughts on the e-mail.

The best way to avoid being phished is to avoid clicking on links in e-mail. If a notification arrives that one of your accounts is in trouble, go directly to that site by entering the address in your browser. If a problem exists, you should be able to find evidence of it in your account settings. If not, contact the site's support for more information.

 

  110 Hits
110 Hits

Spyware, Viruses and Malware What's The Difference Anyway

Spyware, Viruses and Malware What's The Difference Anyway

Generally speaking, people tend to think that when their computer has been compromised by a hacker online, it 'has a virus'. But did you know that the majority of these problems can be attributed to related issues, such as malware and spyware?


If these terms have gone straight over your head, here is a handy guide that explains more.

Malware, viruses, and spyware: what exactly are they?
Many computer users consider these three terms to mean the same thing - a virus infection in their computers. Whilst broadly speaking this is partially true, these terms are used to describe different things when we talk about such computer problems

Here is what each term means:

Malware

The term malware is short for 'malicious software', and is used to describe software which is invoked to disrupt the normal operation of a computer (such as Windows-based PC), with some types of malware being used to gather sensitive information from a computer such as account login details for online services. Malware can also be used to describe software that operates with an aim to gaining access to private computer systems or networks.

Typically, malware comes in these forms:

● Keyloggers - this type of malware records the keystrokes that a computer user makes, so that a hacker can log in to any online services using their username and password credentials;

● Payware - software that launches as soon as you boot into Windows, purporting to be an antivirus program and telling you that your system has been scanned and has x amount of viruses. It then offers to 'clean' your system but only if you pay some money to download the 'full' version of the software. People that unknowingly pay do not receive any software, nor does the warning notice go;

● Ransomware - a particularly nasty type of malware, in many cases it renders a system inoperable. It will let you boot into Windows, but then a full-screen message allegedly from the police tells you that you have 'committed a crime' and that you must pay a 'fine' of £100 or so before you can continue to use your computer. As with payware, if you pay the fine, the message does not go away, and you have just been defrauded of your money.

Viruses
Computer viruses are a type of malware that, when run on a computer system, replicate itself on the system by inserting a copy of itself into applications, files, and even the boot sector of your hard drive. It has been said that over 99% of viruses are executed on computers running the Microsoft Windows operating system; the reason for this is because most computer users operating a computer using Windows rather than Mac OS X or Linux for example.

Spyware
Spyware is essentially software that monitors what you do at your computer and reveals this collected information to a third party. It can track the websites you visit, or it could be even more invasive and monitor literally everything you do.

Spyware is sometimes inadvertently installed when installing some other software that may have been downloaded, and it usually runs as a browser plugin or extension (although some may run invisibly as a background process).

  118 Hits
118 Hits

Keyboard Shortcuts for Internet Explorer Users of Facebook

Did you know there is keyboard shortcuts to help you use Facebook with only a couple of key strokes?

You can navigate Facebook with great ease once you have learned a few keyboard shortcuts.

To comment, scroll between your news feed, like or message someone you can use these shortcuts.
  • Press C to comment on a post on your news feed.
  • Press J and K = scroll between news feed posts.
  • Press L to like or unlike a post.
  • Press M to Message someone.
You can also use the keyboard shortcuts below to access the features below.
  • Alt + / To search Facebook
  • Alt + 0 To get help
  • Alt + 1 To go home
  • Alt + 2 To view your timeline
  • Alt + 3 = To see your friends list
  • Alt + 4 = to view your message inbox
  • Alt + 5 = to view your Notifications
  • Alt + 6 = to view your Account Settings
  • Alt + 7 = to view Privacy
  • Alt + 8 = to view information about Facebook
  • Alt + 9 = To View Facebook Terms and Conditions Terms
  105 Hits
105 Hits

Activating the redesigned Gmail Inbox

Activating the redesigned Gmail Inbox

Getting your emails under controlGoogle has just released a new version of their Gmail inbox. The new design is designed to help you manage your email quicker. By creating different tabs for email. So all Social media items are in one tab, promotions is another, updates in another, forum related posts in another and the important emails in primary.

 Gmail will filter your email into these tabs.
  • Primary These emails will be from people you have in your address book.
  • Social For emails for social media sites you might have accounts with like Twitter, Facebook, Google Plus
  • Promotions These will normally be from online retailers who you have purchased items from for example, Amazon, eBay and Tescos.
  • Updates These are normally newsletters= and updates on items you have ordered.
  • Forums Updates from forums that you are a member of.
If an email is wrongly moved to a tab or another email needs move to a tab, right click on the email, go to 'Move to Tab' and left click on the tab you would like to move the email too. You can also do this by right clicking chose to achieve an email, Delete it or mark it as read or unread. To activate the new email inbox
  • How do I get the new email Gmail Inbox?
  • Login into Gmail
  • Click on the settings cog in the top right
  • Left click on 'Configure Inbox'
  • Select the tabs you want to use and click Save
  124 Hits
124 Hits

How To Change your Facebook Password

How To Change your Facebook Password

First we need to go to www.facebook.com, and click 'Sign in to your account'. Once logged in, click the cog in the top right of any Facebook page and click on 'Account Settings' in the dropdown list.

Once Account Settings has opened, click on 'Edit' next to Password under 'General Account Settings'.

 Enter the password you currently use to access your Facebook account, then pick a new one and click 'Save Changes'. This will change your password.

  Once you've changed your password, we recommend if asked to click 'Log me out of other devices' and submit.

 Your password has now been changed.

Continue reading
  107 Hits
107 Hits

How To Change Your Twitter Password

How To Change Your Twitter Password

First we need to go to http://www.twitter.com, enter your username and password and click 'Sign In'.

 Once you've signed into your Twitter account you need to click on the cog at the top right of the page.

    Once you've clicked on the cog you'll see a dropdown menu similar to the one above. Left-click on 'Settings'.

 When Settings opens you need to left-click on the 'Password' tab in the menu on the left-hand side.

 Enter the password you currently use to access your Twitter account, then pick a new one and click 'Save Changes'. This will stop any dodgy or spam direct messages your account might have been sending on your behalf.

Continue reading
  105 Hits
105 Hits

Is Paid Anti Virus Protection Worth the Money?

When it comes to anti virus & spyware programs, just how much difference is there between the paid for versions and the free ones?

In the 'olden days' when computer viruses were just beginning to hit their heyday, you had to pay for all virus protection software. Nowadays, there are plenty of free virus protection programs available for users to download from the Internet. There are also many paid programs available, so you may be wondering whether you need to pay for virus protection software or if the free programs are adequate.

To answer that question, you need to determine what your virus protection needs are and in what capacity you will be using your virus protection program. For example, the majority of free programs are designed for personal home use only, not for business use. So if you're looking for virus software for your business, you'll have to purchase a licensed version. There are several other differences between the paid and free versions as well.

PerformanceThe main reason you install virus protection software is to protect your computer against viruses, which can harm your computer. Tests have shown that both the free and the paid virus protection programs perform comparably in terms of detecting viruses on a computer. While this is incredibly important, there are other types of malicious programs and components that can infect your computer and cause irreparable damage or steal personal information. Detection and removal of spyware, malware and other nasty items is where the paid programs shine.

Most of the free programs also detect malware, but the paid programs do a better job and detect more of the little nuisances, which means your computer is cleaner and your information is safer if you're using a paid program.

Continue reading
  113 Hits
113 Hits