Hands of Support - Reliable IT Security & Support
  • Is This You?
  • Services
    • Service Desktop Implementation
    • Service Virus Scan and Removal
    • Managed Service Packages >
      • Store
  • We're Hiring
  • Business & Tech Blog
  • WHY CHOOSE US
    • Hand of Support in the Community
  • FREE CONSULTATION
    • Tech Hacks Weekly
  • Computer Training
  • Tech Field adds 14k jobs
  • Case Studies
  • Phishing attacks hit financial services, tech companies hardest: How to stay safe

Business & Technology Talk for Everyone

Bluetooth security: Flaw could allow nearby attacker to grab your private data

7/30/2018

0 Comments

 
Patches incoming for Bluetooth bug that could affect Apple, Intel, Broadcom, and some Android devices.
Picture
A cryptographic bug in many Bluetooth firmware and operating system drivers could allow an attacker within about 30 meters to capture and decrypt data shared between Bluetooth-paired devices.
Click to Learn more
0 Comments

13 Simple Mac Shortcuts to make you more Productive

7/27/2018

0 Comments

 
Picture
I’m sure most Mac users know Command-C means copy and Command-V means paste, but there’s a host of other useful shortcuts that make a Mac user’s life much easier. I’ve assembled this short collection to illustrate this truth:

    Show me 13 Simple Mac Shortcuts

Click for shortcuts
0 Comments

Windows 10 Keyboard Shortcuts

7/25/2018

2 Comments

 
Picture
Get my Cheatsheet
2 Comments

Web Attack Survival Guide

7/23/2018

0 Comments

 
The Internet has quickly become the frontline in an ongoing battle with industrial espionage, sabotage and cyber terrorism. This results in lost revenue, stolen data, service interruptions and damaged reputations.  Prepare for attack!!!  Follow these 7 rules to protect your organization..
Picture
show me the rest
0 Comments

Preventing Ransomware

7/20/2018

0 Comments

 
Ransomware can bring your business operations to a halt, encrypting sensitive data, and forcing you to pay the attacker to regain access.  Keeping your organization safe requires a fundamental shift toward prevention, and away from simply detecting and requiring remediation after infection.  The right architecture can make prevention real, and you can use this checklist to implement a true prevention-based platform.
Picture

    Fill out to see the rest

Preventing Ransomware Tips
0 Comments

Digital Security Travel Hacks

7/18/2018

0 Comments

 
Its summertime and everyone is traveling. Have you considered your digital security while you travel? We have some tips to keep you safe so you can have a Bon Voyage.
Picture

    Digital Security while traveling

Help me travel safely
0 Comments

10 tips and Tricks to make the most of Windows 10

7/16/2018

0 Comments

 
Picture

Picture
1. Click the active (front most) window and move it left and right with your mouse.
Picture
Picture
2. They make navigation so much easier, but they only work on precision touchpads (like the ones on Surface tablets).
Picture
First, check to see if your laptop has precision touch by going to Settings > Change PC Settings > PC and devices > Mouse and touchpad. You should see Your PC has a precision touchpad. 
Then you can try 3 finger swipe up to see "task view," which shows you all open windows.

3. Three finger swipe down: Show desktop.

4. Three finger flick left or right: Return to previous app (left) or go back to current app (right)
​

5. Three finger tap: Opens Cortana Search.
Picture
Picture
More Windows 10 tricks
0 Comments

Top 10 ways to protect your family online

7/13/2018

0 Comments

 
Top 10 ways to protect your family online
Send me more Security Tips
0 Comments

How to see who is on your Wi-Fi

7/11/2018

0 Comments

 
Picture
Is your internet moving a little slower than usual? Are you seeing hints of devices you don't recognize in Windows Explorer, or when you cast media to your TV? If you suspect a neighbor is stealing your Wi-Fi, here's how to check (and boot them off).
"So someone's watching Netflix on my internet," you may say. "What's the big deal?" Even if you have a little bandwidth to spare, you probably don't want other people on your network, especially if it's unsecured. If someone has access to your network, they have access to all the computers on that network, and that's dangerous. They could access files you're unknowingly sharing, they could infect you with malware, and in certain situations they could even steal your passwords and other personal information.
As a result, you should take care to make sure each device connected to your network is one you can trust. Thankfully, there are free tools that'll help you see everyone on your Wi-Fi right now.

​See Who's On Your Network
Windows users can download a free, portable program called Wireless Network Watcher (scroll down to the Zip download link below "Feedback" to get it), and Mac users can download a free, slightly more complex program called Who Is On My WiFi from the Mac App Store. Both tools will provide a list of every device currently connected to your network, so you can identify the ones that belong to you.

Wireless Network Watcher
To use Wireless Network Watcher, just launch the program, and it will immediately begin scanning your network. This will take a minute or two—you'll know it's working if the bottom-left corner reads "Scanning..." Once it's done, that message will disappear, and you'll be presented with a full list of connected devices.
Picture

​Find Users

The resulting list may look a little cryptic, especially if you aren't super tech-savvy, but don't worry. You can ignore the IP address and MAC address listings for now. If you're using Wireless Network Watcher, just focus on the "Device Name" and "Network Adapter Company" columns. For example, I see an item named "Dulce" in Wireless Network Watcher, which is the name of my wife's MacBook. I see another with no name, but with "Philips Lighting BV" as the network adapter manufacturer, which means it's probably the hub for my Philips Hue lights. You can double-click on a device to add "User Text" that helps you identify each device, which will help you narrow down all the items in this list.
Picture

See who is on my Wi-Fi

* indicates required
0 Comments

How to add a Gmail account to Outlook

7/10/2018

0 Comments

 
If your organization uses a Google Apps account to handle email and you’re an Outlook 2013 user, it makes a lot of sense to configure that account to send and receive email through Microsoft’s email client.
That way, it’s much easier to never miss an important email and answer it the second it comes in.
Picture
Configuring Outlook 2013 to work with your Google Apps email account isn’t too difficult, as long as you follow the steps below exactly.

GOOGLE APPS EMAIL IN OUTLOOK 2013
Step 1: Start Outlook 2013 and click File in the top menu of Microsoft’s email client.
Picture
Step 2: Make sure Info is selected in the menu on the right side of your Outlook 2013 window (not the Options one you used when enabling the Auto Complete feature).

Picture

Step 3: Let’s start configuring your account. In order to start doing this, click the Add account button.
​
Step 4: I probably don’t need to mention this, but I will anyway: the next step requires you to have your Google Apps email account username and password close by. You’ll need them for it.
Set the configuration process to Manual setup or additional server types and then click the Next button.

Picture
Step 5: Select POP or IMAP in the window that comes up, then click Next to proceed to the next step.

Step 6: This is the fun part, the one where you fill in all the settings needed. Worry not, if you do it right, it’s the last time you’ll be required to go through it (at least for this email account).
Start by setting the email account to IMAP, under Server information, like I did in the screenshot you’re seeing below.

Picture
Click to see the rest
0 Comments
<<Previous

    RSS Feed

    Archives

    August 2018
    July 2018
    June 2018
    May 2018
    April 2018
    March 2018
    February 2018
    January 2018

    Categories

    All

    I Need Help!

    Picture

Powered by Create your own unique website with customizable templates.
  • Is This You?
  • Services
    • Service Desktop Implementation
    • Service Virus Scan and Removal
    • Managed Service Packages >
      • Store
  • We're Hiring
  • Business & Tech Blog
  • WHY CHOOSE US
    • Hand of Support in the Community
  • FREE CONSULTATION
    • Tech Hacks Weekly
  • Computer Training
  • Tech Field adds 14k jobs
  • Case Studies
  • Phishing attacks hit financial services, tech companies hardest: How to stay safe