• Skip to primary navigation
  • Skip to main content
  • Skip to footer

Tech Solutions NC

Your one stop for home and small business computer and network support

  • About Us
    • Knowledgebase
  • Contact Us
  • Appointments
  • Testimonials
  • Subscribe

Tech Solutions

Holiday Gift Cards

October 24, 2016 by Mike Ellis Leave a Comment

Holiday Gift Cards

With the holidays fast approaching, what better way to show your special loved one just how much you care for them than with one of our Tech Solutions NC holiday gift cards? Available in any of these four patterns, you can load them up with 1 hour of service, 2 hours of service, or you can choose any amount you like!

By doing so, you are showing that you care for them, and that you want them to get the best possible service when they have a computing need.  Your gift card can be used as payment for any of these technology needs:

  • Computer diagnostics
  • Data backups
  • iPhone repairs
  • Application training
  • Network setup/diagnostics
  • and more!

As always, drop in service receives a 15% discount, but we also can travel to your home or business if that is more convenient for you.  Service typically starts at $75 per hour, but some services, such as email or printer configuration issues, cost less, typically $40 for a half hour block of time.

So stock up today on all the gift cards you’ll need to give as presents this holiday season.  Your family will appreciate it, and you’ll have peace of mind knowing that a) they aren’t calling on you for help all of the time, and b) they are getting top notch service at a reasonable price.  Remember, our core values are integrity, experience, flexibility, and value.

To purchase your gift card, start by giving us a call at 919-606-6725, shooting me an email at mike@techsolutionsnc.com, or stop by our location at 4900-B Craftsman Dr., Raleigh, NC!

Tech Solutions NC, LLC — your one stop location for all your computing needs!

Filed Under: Featured, Financial, Tech Solutions Tagged With: Amazoncom, Apple Inc., Apple Store, Australia, Best Buy, Build-A-Bear Workshop, Cabela's, Canada, Gift card, ITunes

Breaking News: Yahoo! Data Breach

September 22, 2016 by Mike Ellis 3 Comments

Data Breach

Breaking News out of Yahoo! The company confirms that as many as 500 million data accounts were breached by a hacker in a huge data breach.  Information obtained through the data breach may have included names, email addresses, dates of birth, telephone numbers, and possibly even encrypted or unencrypted security questions and answers.  Yahoo! believes that the hack is the result of a state sponsored attack, but at this point information is scarce on all of that.  However, regardless of the source, the data breach occurred, and here’s what you should attempt to do if you rely on Yahoo! for your email:

  1. In your browser, go to login.yahoo.com to access the login screen.
  2. Enter your login username, then click Next.
  3. Enter your existing password, then click Sign In.
  4. After you login, look near the top right of your browser for your name, hover over your name, then click on “Account Info“.  I’ve linked that page in case you have any issues.
  5. On the left side of your screen, click on Account Security, then in the middle click on “Change password”.
  6. Enter your new password, type it again to verify it, then click “Continue”.
  7. After you change your password, you will receive an indication that it has been updated.  Click “Continue” to proceed.

Keep in mind, if you access your Yahoo! account from any other devices, such as automatically on your phone, you need to update the password on those devices or you will lock yourself out.

Any questions? Reach out to us and we’ll be happy to help! Just contact us via email, or you can give us a call at 919-606-6725, leave us a comment below, or even send us a Facebook message or a Tweet!

Account security is a big priority for all of us, so it’s important that we all do our part to keep our online presence safe and secure!

Filed Under: Security, Tech Solutions Tagged With: Bank account, Data breach, Email address, Hacker (computer security), Login, Mailbox provider, Password, Payment card, Rambler, Rambler (portal), Russian language, Security question, Telephone number, User (computing), Verizon Communications, Yahoo!, Yahoo! Mail

Update your iOS device to 9.3.5 today!

August 26, 2016 by Mike Ellis Leave a Comment

2016-08-26 11.29.27

Today Apple announced an important update to their iOS software that is found on iPhone and iPad devices. This update is in response to a hacking incident whereby an attacker could remotely turn on your microphone and record your conversations without your knowledge. This is an extremely important update for obvious reasons, and I urge you all to take a moment and update your iOS devices.

Updating your iOS Devices

Updating your iPhone and iPad (aka iOS devices) to the most recent software version is not a hard process to do.  To do this, follow these steps:

  1. Before updating your phone, it’s a good idea to back it up first either to iCloud or to your computer if you are old school like me.  This is a minor update, but it’s a good habit to be in to backup before updating.
  2. On your device, go to Settings.
  3. Next, tap on the General section.
  4. After that, tap on Software Updates.
  5. The system will automatically check for updates, and tell you if there is an update available.
    • If there is no update available, the device will tell you, and also show you what version you are running. If you are running 9.3.5, then you’re all set!
    • Note: Older iPhone models, such as the iPhone 4, can not run this version so will not show an update available to take it to 9.3.5, although there may be other updates available for the phone that are not installed yet.
    • If you see an update available, click on the link to install the update, and click agree when prompted. If your device prompts you for not having enough battery available, connect it to a power source or your computer to complete the process.

If you are having difficulty with this, reach out to me — we are here to help!  I can be reached by phone at 919-606-6725, email at mike@techsolutionsnc.com, or you can make an appointment online.

Filed Under: Security, Tech Solutions Tagged With: Apple Inc., Apple iPhone 5C, Apple iPhone 5S, Apple Software Update, ICloud, IOS, IPad, IPhone, IPod Touch, Wi-Fi

How email hacks teach us what email is used for.

July 26, 2016 by Mike Ellis Leave a Comment

email hacks
Image ©Google

How email hacks teach us what email is used for.

Email hacks have been around for quite a while.  Take a look at these dates.

  • January 2012: Rupert Murdoch’s News International admits they hacked emails as well as phones.
  • February 2013: Former President George H. W. Bush’s personal email account was hacked.
  • 2010 – 2014: Then Secretary of State Hillary Clinton has her own private email server that is used for conducting government business.  The server had reportedly been attacked, perhaps even hacked from China, South Korea, Germany, and perhaps even Russia.
  • 2015 – 2016: Democratic National Committee email servers are hacked; emails disclosed favoritism from DNC to Clinton campaign in presidential race. It is presumed that the hack started around the same time that the U.S. State Department and White House servers were hacked.

People, the list goes on and on, and could be a mile long with all of the hacks that are out there.  The simple fact is this:

When it comes to email, the rule is simple: never put something in an email that you would not want to see posted on the cover of the New York Times.*

Why do you think so many people fail at this very simple rule? What causes the Hillary Clinton’s of the world decide that they can circumvent proper channels and check their common sense at the door?  Here’s my thoughts on that.

  1. At some level, people think that the normal rules don’t apply to them.  They believe that they can do what they want because of the position they hold.  This is not the case.
  2. Far too often, IT staff jump to the conclusion that they can keep the hackers from committing their email hacks on their people.  The simple fact is if the target is high profile enough, the hackers will keep at it until they succeed.
  3. Society has become too dependent on computers and technology.  What used to take place via a phone call or an in person meeting is now being handled by an email. Technology is great, but it has it’s place in society. We have blurred the lines way to much, and it is proving costly.
  4. The financial gain is so great.  What causes email hacks to happen is partly because there is so much profit to it.  In the News International experience, it was to drive ratings and insider information to sell papers, among other things.  In government hacking situations, it was to discover state secrets that could lead to one country having an advantage over another.  In the Clinton email server, I believe that was done so that she could maintain the power she sought more easily.  In the Target hack, which didn’t involve email, the motivation was in making money off of identity theft.  In all of these instances, there is a perceived gain to be had, and it is a significant gain.
  5. Lastly, far too often security is an afterthought in many organizations.  Security should be one of the factors in determining the cost of doing business on the Internet.  However, in many organizations, it is the first thing cut from the budget.  Training organizations such as SANS and GIAC are fighting an uphill battle to secure the infrastructure, but when budgets are tight, training money is cut.  The end result is that too much is expected with too little investment, and that leads to email hacks.

Remember, people, there is a time and a place for email.  There is also a proper way to secure it.  It’s time to learn that, and use email the way that it is intended, not for something it’s not meant for.

*h/t to my friend and former boss Kim, who was the first person I heard use that phrase.

Filed Under: Featured, Security, Tech Solutions Tagged With: ABC News, Beet, Bernie Sanders, Bill Clinton, Bruce Willis, Democratic National Committee, Donald Trump, George H. W. Bush, Hillary Clinton, Republican Party United States

Alert: Phishing Attacks via Text Message

July 22, 2016 by Mike Ellis Leave a Comment

Text Message

Today I received a very unusual text message.  In the message, I was notified that my “account” was disabled, and that I should go to the link in the text message to unblock the account.  Just like any email phishing attempt, there are things here that you can decipher to give you clues about the message to determine it’s legitimacy.

Text Message

Look to the following tips when determining whether a message is legitimate or not:

  1. First of all, I turned my phone sideways in order to realign the screen in order to pick out more details.
  2. Ask yourself whether or not you have a Wells Fargo (in this example) account.
  3. Take note of the information — the domain is actually cityinno.com, not wellsfargo.com.  That’s a red flag right there.
  4. Look at the account ID — usually an account ID is a username, not a series of numbers.  Of course, that’s not always the case, but usually it is.
  5. Note that, while the link in the text message does reference wellsfargo.com, it is not an encrypted website.  The link is http://, not https://, and thus, isn’t secure.
  6. Lastly, one trick you can do on your smartphone is to hold your finger on the link.  This will show you whether the link referenced actually goes to a different website.  In this case, it doesn’t, but if it did, you would see a window with the domain listed.

Most people realize that a smartphone often has an email address associated with the phone number.  So, while this message came in via my text message app on my phone, it was actually emailed to me, as the email address in the details screenshot reveals.  Despite that, the message reminds us that we can receive phishing attacks from any device, whether it is our laptop, desktop, smartphone, even something like an iPod Touch or an iPad.  Anything that can connect to the internet can be susceptible to a phishing attempt, so keep that in mind when you see a link in a message.

Do you seem to receive an unusually high number of phishing attempt emails? If so, I can help — just reach out to me via email at mike@techsolutionsnc.com, phone at 919-606-6725, or make an appointment via our online appointment page.

Filed Under: Featured, Financial, Security, Tech Solutions Tagged With: 12-hour clock, 401(k), IOS, IPad, IPhone, Microsoft Windows, Mobile phone, Personal computer, The Bank, Wells Fargo

Watch Out for Pokemon Go Scams!

July 15, 2016 by Mike Ellis Leave a Comment

Pokemon Go
Image ©Pokemon.com

Pokemon Go is seemingly all the rage since it’s release this week, but beware – there is a great risk in spending all your time with this game and losing track of your surroundings in the process. There have been reports of robberies in the St. Louis area, reports of two men falling off a cliff while playing the game, reports of a player coming across a dead body, and now, from our friends at the NC Department of Justice, concerns over Pokemon Go scams. From the alert email I received today:

WANT TO CATCH ‘EM ALL? HAVE FUN BUT AVOID POKÉMON GO SCAMS

The new mobile game Pokémon Go has attracted millions of excited new users, but unfortunately scammers aren’t far behind. A new scam is out to trick Pokémon Go users into giving up their personal information and paying money to play the game that’s actually free. If you’re trying to catch ‘em all, make sure you know how to avoid Pokémon Go subscription scams.

The scam begins with a phony email claiming that because of a record-breaking number of users, game developer Niantic has begun charging players $12.99 per month to play Pokémon Go. The email claims that anyone who doesn’t pay the upgrade fee immediately will have their game accounts frozen within one day. Concerned users who click the upgrade link are asked to provide their email login credentials, giving the scammers access to information in their email accounts that can be used for identity theft.

Remember:

  • Don’t be fooled by logos, websites, or links that seem like the real thing. Many scam emails use real company’s logos to seem authentic. Past phishing emails have claimed to come from major companies like Paypal, eBay, banks, credit card companies, non-profits, charities, and even government agencies like the IRS.
  • Report phony emails to the legitimate business directly. Contact the company using a telephone number or web address you know to be right, not using the contact information in the phishing email. Also, forward the entire email to the Federal Trade Commission at spam@uce.gov.
  • Never share your personal or financial information by email. Be wary of any email that asks you to key in login credentials to one of your personal email or financial accounts. Instead, use legitimate, secure login websites to access your accounts, not links included in questionable emails.
  • If you receive one of these phony emails, report it to the Attorney General’s Office at 1-877-5-NO-SCAM or online at ncdoj.gov.

This message brought to you on behalf of North Carolina Attorney General Roy Cooper.

The point of all of this is to remind you that you need to make sure that you are aware of your surroundings, make sure that you are not falling into some sort of scam, and you need to make sure that you use good old common sense when playing games like this and others.  Remember, there are a lot of different apps out there that track location, Pokemon Go is not the first by any stretch, so just be thoughtful when playing these games.  Have fun, but don’t do something that could end up getting yourself or someone else hurt.

Filed Under: Featured, Financial, Security, Tech Solutions Tagged With: Android (operating system), Apple Inc., Australia, awareness, Charitable organization, CNNMoney.com, Confidence trick, email scams, Federal Trade Commission, Florida, Gameplay of Pokémon, Google+, Hillary Clinton, Internal Revenue Service, Internet leak, Japan, Moon, ncdoj, Nintendo, Orlando, pii, Pikachu, Pokémon, pokemon go, security, Silicon Valley, Sun

Choosing the right Internet Device for your child

July 12, 2016 by Mike Ellis Leave a Comment

Internet Device

In today’s world, our children are going to be exposed to technology at a much younger age than we were as kids. I remember my daughter as a toddler being given a LeapFrog type system which she loved to play with and did a great job helping her to learn some stories.  While this wasn’t an Internet device, it was her first exposure to technology, and was definitely a precursor to her exposure to the Internet.

In this day and age, there are a lot of different options available for everyone to get connected, so what type of Internet device should you get for your child so they can connect? This post will explore some of the options you have available and what you should look for in a device.

Computers and Laptops

For most users, when it comes to a computer or a laptop, the main question becomes “Do I want a desktop or a laptop?”  After that question, the followup usually revolves around whether to use Windows operating system or Mac OSX.  The answers to these questions often revolve around such thoughts as the amount of desk space, whether or not your computer will travel with you, and whether or not you want a bigger display than a laptop screen can provide.

  • Desktop Pros
    • Permanent setup
    • Bigger display
    • More natural keyboard and mouse
    • Cost is usually cheaper
    • More easily upgraded as needs evolve
  • Desktop Cons
    • Space constraints
    • Mobility — can’t easily transport to other locations.
    • Usually requires either a computer desk or home office setup
    • Usually requires hard wire connection to network
  • Laptop Pros
    • Small form factor, can work from anywhere
    • Battery power source, less need to be constantly plugged in to wall outlet
    • Wi-Fi enabled
    • All shapes and sizes, very flexible configurations
  • Laptop Cons
    • More rigid in terms of upgrades
    • Price is sometimes more because of small components

Tablets and Phones

When it comes to tablets and phones, the options are many and varied.  In the one corner you have the Apple products — the iPad series of tablets and the various iPhone models.  In the other corner you have the Android line of devices, which includes a whole host of manufacturers.  Then, in a smaller third corner, you even have some devices that are built based on Windows operating systems.

For me, my tablet and phone of choice is from the Apple side of the ring, primarily out of experience and the past history I’ve had with them.  I’ve worked with and on both Apple and Android products, and for me, the reason I choose Apple over Android is because the components work better.  For example, in my experience, on an Android phone inevitably there will some issue with the email and calendar setup that will cause the calendar to stop syncing data with the server.  On Apple devices, I’ve not experienced this issue.

I know that there those that swear by both platforms — those that love Apple products and those that love Android products.  I also know that you aren’t going to change the minds of one over the other very easily, if at all.  So, in the end, the best advice I can give for this is to do your homework, check out multiple products on both sides of the aisle, and try them out to see which one you like best.  When you have that figured out, go with it, and don’t look back.

Other Devices

Lastly, there are other devices besides desktops and laptops, tablets and phones.  There are also internet ready gaming systems such as the Nintendo 3DS, music devices such as iPod Touch, and others.  These devices will also provide access to the Internet, although in my experience that appears to be more limited in scope, although I haven’t explored these as much lately.  For a device that you are going to be using for your schoolwork, though, I would imagine that these wouldn’t be the best choice.

Conclusion

In the end, the device you choose for your child’s Internet activities for school or other use will in large part be determined by three components:

  1. The cost of the device and your budget to spend
  2. The requirements for the school, if any.
  3. The durability and length of use you’ll expect to get out of it.

For my family, when it became time to get an Internet device for our daughter, we ended up going with the Apple MacBook Air.  She has had it for approaching 3 years, and it has been a great system for her.  She uses it for school, she uses it for writing, and by following the rules that we have in place for online safety, I expect that it will last her for several more years.  While it is a more expensive up-front cost, the long term value has been realized and then some.

What Internet device do you have for your child?  Please let us know in the comments, and thanks for stopping by today!

Filed Under: Featured, Financial, Tech Solutions Tagged With: Android (operating system), Apple Inc., Association for Computing Machinery, Communications of the ACM, Google Play, ICloud, IOS, IPad, IPhone, IPod Touch

Beware of Phony Tech Support!

July 6, 2016 by Mike Ellis Leave a Comment

phony tech support

Yesterday I received from the North Carolina Department of Justice Alert mailing list a warning — to beware of phony tech support.  The ruse is elaborate and devious, and can cost you hundreds, even thousands, of dollars if you fall victim.  Here’s the email I received:

Phony tech support and overpayment: two scams in one

For years, crooks have charged victims to repair nonexistent problems on their computers in order to gain access to sensitive personal and financial information stored inside. Now they’ve added a new scam: trying to talk you into long-term technical support that is actually just an excuse to swindle you out of as much as $10,000.

It starts when you agree to charge the tech support membership to your credit card. The scammers call back a few days later to say the company is closing and needs your bank account information so they can to refund money directly into your checking account. To get the so-called refund, they take a large cash advance from your own credit card and deposit it into your account. Next, the con artists claim that they’ve accidentally overpaid you by thousands of dollars and need you to wire the extra funds back to them, usually in China, India or the Philippines.

These greedy crooks have been known to take out another credit card advance, put those funds into the victim’s account, and then claim that the first wire transfer didn’t go through. Victims have been convinced this way to send multiple wire transfers to the scammers. One elderly North Carolina woman ran up $10,000 in credit card debt when she fell for this scam.

Remember:

  • Avoid tech support scams. You can learn more about phony tech support from Microsoft and the FTC.

  • Be very skeptical if anyone asks you to wire money overseas. Once you’ve wired money it’s nearly impossible to get it back.

  • If you receive one of these calls, report it to the Attorney General’s Office at 1-877-5-NO-SCAM or online at www.ncdoj.gov.

I’ve been a subscriber to the NCDOJ Alert mailing list for years, and I suggest you do the same.  Click the link to subscribe. Also, check out their website for their list of alerts that they have written about in the past.

So how do you know who to trust? I’ve written a post about that, please read it, and remember that you need to do your homework when it comes to who you are going to trust. Contact us if you have any questions, or need any support for your computer. We are a source you can trust.

Related articles
  • How do you know who to trust to work on your computer?

Filed Under: Featured, Financial, Security, Tech Solutions Tagged With: Antivirus software, Comcast, Confidence trick, Contact number, Customer service, EBay, Editor's Note, Email address, Email spam, Help desk, Identity Theft, Information technology, Internet service provider, Intuit Quickbooks Online Basic, Microsoft, Network security, Personally identifiable information, Phishing, Technical support, Website

  • « Go to Previous Page
  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Go to page 4
  • Go to page 5
  • Go to Next Page »

Footer

Archives

Copyright © 2023 Tech Solutions NC, LLC

 

Loading Comments...