Computer Support Blog

Please enter a valid ZIP code.

Tech Support Blog

Tech Support Blog

Don’t Suffer from the Crash: Store Data Online

Don’t Suffer from the Crash: Store Data Online

Crashing computers and multiple devices create difficulties in getting documents on demand. Entire papers can be lost, or the wanted photograph is on another device.  Online data storage offers a solution to the issue. Customers can arrange for a digital file cabinet for data files and avoid lengthy processes to recover or carry wanted items.

More customers use storage websites as more people grow more mobile. The number of available websites to store information also increases with the demand. Some options include: Carbonite.com, Dropbox, and MobileMe. Remember for expert and personal computer support, RESCUECOM offers a Remote Backup solution to protect all files against human or system errors through the device’s Internet connection. RESCUECOM’s trained technicians install the Remote Backup and will help retrieve lost information24 hours a day.

Read more »


Five Simple Steps to Secure Online Shopping

More shoppers buy items online everyday, with entire websites devoted to buying and selling. With the threats of identity theft and viruses, some shoppers still hesitate about making purchases over the internet.

Rescuecom offers five things you can go to protect yourself on and off the computer

  1. Keep the browser and anti-virus software updated. Anti-virus software will keep information stored on personal computers safe from online exposure. When entering purchase information, like credit card numbers, a pause in the processing can endanger the information. The order might be lost, and someone else might get a look at the card number.  An updated browser ensures smooth processing of information on websites, and reduces the risk of private information getting exposed.
  2. Know who you are dealing with. Stick to well-known stores or online marketplaces like Amazon.com. Legitimate businesses will help resolve an error or false charge and can refund the full amount sometimes. Business and marketplace websites also sometimes employ protective software to ensure customer privacy.
  3. Never give out passwords. Private information needs to remain private. The less information available online, the less shoppers need worry about security. Create usernames and passwords with numbers and symbols to make guessing harder.
  4. Use one card for transactions. Use only one credit card for online transactions. Shopping records are easier to follow and confirm on one card. Credit cards have to comply with Fair Credit Billing Act, so after reporting the theft of a card or a card number, the owner is only responsible for a small amount of the purchases. Each credit card company has the amount listed in the contract. More than one credit card used online not only increases the chance of stealing the numbers, card owners are also responsible for different amounts on each card. Using a check or bank card gives access to the entire account.
  5. Record it. Keep detailed records of online spending by choosing to print the receipt copies. Check card bills every month and be sure that all transactions appear on both the bill and the receipts. Report any items that do not match the receipts to the credit card company and the online store immediately.

Shoppers can easily protect personal computers, identities, and personal bank accounts. Rescuecom’s five steps let customer shop online securely.

Next Windows Almost Ready

Personal technology goes far beyond just a home computer. So, Microsoft designed an operating system modified to perform on many different personal devices. Windows 8, due to release next year, adapts to each product that runs it.

Rescuecom has five things customers need to know about the upcoming operating system.

The classic design remains.  The classic Windows operations still exits for anyone who needs it. The basic programs like Word and Excel present similarly to Windows 7. Private individuals and businesses that make and store crucial documents in these files can still create and save work the same as before without needing to learn a new format.

New applications appear. The tile interface, a set of mosaic-like boxes showing different applications, lets customers find needed items quickly and choose which tiles appear instantly. The tiles are large enough to reduce mistakes in opening tiles on touch screen products and new information is clearly visible. Tablet and smartphone users can find favorite websites, while computer users shorten searches for files.

Customizable adjustments are possible. Microsoft designed the Windows 8 system to allow individual customization. Users who need certain pieces of information regularly choose which applications appear on the home screen. The constant connection to a favorite news website appears above the file for last summer’s vacation pictures as soon as the device turns on, and either one opens at one touch.

Fewer resources are needed. The Windows 8 operating system’s memory design lets the programs work more efficiently. The ability to multi-task and run several programs at once increases, letting customers do more. Downloads and updates will not cause other programs to run more slowly.

Microsoft is ready for the future. The new focus on compatibility helps the system get ready for future technology. Microsoft’s design includes many facets of smartphones, tablets and netbooks, integrating needs for a variety of devices. Windows 8 adapts to products already, and will adapt to new products. Customers will not need to learn new systems as products appear.

Windows 8 mixes what customers like about the operating system with the needs of new applications and devices. Customers will choose how the system works, instead of the system controlling how the customer works.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


“Save the regret. Separate your e-mail accounts.”

Over the weekend, Epsilon notified millions of customers that the company had experienced a break-in and email addresses were stolen.  One consequence is that now it’s open season for phishing!  Now, instead of using bait to “catch” personal information, a more direct line of attack against your private information exists. 

You can avoid having your sensitive material, including your email address, exposed in this or some similar way.  Josh Kaplan, President of RESCUECOM, strongly recommends that you take immediate action to set up a separate e-mail address for all online transactions – and ONLY use this address for online transactions.  You should be aware that it is not safe to give your personal e-mail address used by your friends and family to any company. 

Even “reputable” companies with whom you may have been doing business for years should not be given your personal email address.  Companies regularly outsource their e-mail communication.  For example, companies such as Marriott, JPMorgan Chase, Walgreens, Capital One, and others contracted with Epsilon to manage their email information and send out e-mail blasts to customers.  Rather than directly overseeing the security of this information base, a third party is involved, thereby increasing the chances of compromised data.

Unfortunately, for many people, such as those affected by the recent data breaches at Epsilon, this warning may come too late.  Be sure that you set up a separate email address for those online business transactions today.  Consider setting up a new personal address as well if your existing address has already been compromised.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Increased Corporate Victimization Highlights Need for Better Internet Security

A recent survey has revealed some troubling data for corporate technology users when it comes to Internet security.

According to the Sixth Annual Enterprise IT Security Survey, conducted by Amplitude Research, 67% of large companies (minimum of 5,000 employees) reported at least one significant security intrusion.

That was over 25% higher than the year before.

Companies cited various potential reasons for the increase, ranging from significant Internet security weaknesses to employee Internet usage.  No matter the reason, one thing is clear:  large corporations are coming under increased attack. Read more »


RESCUECOM Warns of Stuxnet Dangers

SYRACUSE, N.Y., October 8, 2010 – Stuxnet, the most sophisticated piece of malware ever, highlights the dangers of malware.  Stuxnet’s method of infection and the likelihood of imitation put everyone’s Internet security at risk. RESCUECOM’s computer support experts explain what you need to know about Stuxnet, Internet security, and protecting yourself.

Most malware targets an individual’s Internet security, but Stuxnet worked on a much larger scale.  Stuxnet targeted industrial computers, intent on compromising their Internet security and taking control of them.  “It’s larger and more sophisticated than most other pieces of malware,” says RESCUECOM CEO David Milman.  Read more »


“Here You Have” Illustrates Internet Security Failures

A new Internet security attack spread through email Thursday, though it came in somewhat old packaging.

The attack, dubbed “Here you have” after the subject line of the phishing attack emails, was reminiscent of attacks from 2000 and 2001.  Those attacks, the ILoveYou and Anna Kournikova worms, were the last significant mass email attacks, until now.  The Kournikova worm even used the same “Here you have” subject line. Read more »


iTunes Users Victimized by Phishing Scams

Users of Apple’s iTunes store have been victimized yet again, but not because of Apple.

A series of ongoing phishing scams have tricked users of Apple’s online service into revealing login information.  In turn, this has allowed hackers to bypass the Internet security of those users with ease.

Once logged into the account, hackers have rung up hundreds or even thousands of dollars in charges.

Most of the attacks have happened with accounts linked to PayPal.  In many cases, hackers have used the stolen funds to purchase iTunes gift codes – online gift cards – which they can then resell on the Internet for a profit.

Unlike many Internet security attacks which originate with a security breach on the part of the vendor, this attack seems to be largely caused by trusting users being victimized by phishing emails.

These sorts of fraudulent emails are sent to users, often requesting that they verify login information.  Because the emails appear to be legitimate, many users click on the links within them or enter their private account information.

Once hackers posses that info, they simply log in.  The account, and everything linked to it, is easy pickings.

To protect yourself and your iTunes and PayPal accounts, follow these simple Internet security tips:

  • Never provide your login information via email
  • iTunes and other legitimate businesses will not request such information through email
  • If you suspect an email is a phishing attack, report it to the merchant, your ISP, and/or your email provider
  • Verify the legitimacy of an email by contacting the supposed sender at the email address or website you know is real

 

For more information on protecting yourself, read Rescuecom’s 5 Tips to Detect Phishing.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


The How’s and Why’s of Malware

The number one cause for concern among Internet security and computer repair experts is malware.  A little known threat just a few years ago, these malicious programs can slip past Internet security and bring on extensive computer repair costs.

But what is malware?

Malware involves several different kinds of programs:

  • Trojan Horses
  • Rootkits
  • Viruses / Worms
  • Data Thieves Read more »

40 Windows Apps Feature Critical Vulnerabilities

For users of Windows and its associated applications, the news is not good this morning.

Noted Internet security researcher HD Moore, of Rapid 7, reported Wednesday that 40 different Windows applications have serious security vulnerability.

The vulnerabilities are, according to Moore, similar to one found in Apple’s iTunes for Windows.  Apple has patched the vulnerability in that program. Read more »


RESCUECOM Releases Top 5 Tips for Defending Against Malware

SYRACUSE, N.Y., August 16, 2010 – McAfee, a top Internet security company, recently announced that malware attacks are at an all-time high.  According to McAfee, 10 million new pieces of malware were cataloged during the first half of this year.  With this Internet security threat reaching such significant heights, Rescuecom offers these tips to protect your computer from such an attack.  Read more »


91-100 of 1857
© 1997-2025 RESCUECOM Corporation
Patented - Patent Numbers: 6,898,435, 8,832,424 and 9,477,488
Additional Patents Pending