Computer Support Blog

Please enter a valid ZIP code.

Tech Support Blog

Tech Support Blog

Is your Password Guessable?

Using the same password for most or all online activities may be convenient, but it is a dangerous Internet security practice that we should all avoid. Sure, recycling passwords makes remembering them easier, but it also makes it easier for cybercriminals to steal that information. Even when you’re using a trusted network service like your home network, having weak or recurring passwords is an unnecessary threat to your Internet security.

Along with monitoring how you use public network services and keeping your anti-virus updated, consider using a different and difficult password for each of your accounts. Varying your passwords is an easy way to increase the level of your Internet security. When cybercriminals learn one of your passwords, they may try to use it to gain access to your other accounts. Using significantly different passwords can drastically limit the damage to your overall Internet security.

To check the strength of a password (or even just for fun), consider searching for a list of the worst passwords and making sure yours isn’t on it! One online list includes the 500 worst passwords of all time, and among these are: 123456, password, eric, gandalf, rainbow, barney, and butter!

Even when passwords are not as ridiculous as these (barney?), Microsoft’s Safety and Security Center suggests changing them periodically. When coming up with passwords, keep in mind that you may have to enter them while using public network services where Internet security is not very high. The Security Skeptic also offers some easy ways to create better passwords to improve your Internet security.

To test a password’s Internet security level use an online service, and keep these tips in mind:

  • Avoid common words
  • Don’t use personal information such as a telephone number, address or birthday
  • Use at least eight characters, the more the merrier
  • Combine upper and lowercase characters
  • Include numbers and symbols (%4#3*1)
  • Start with a sentence and change it around (Somewhere over the rainbow/ SomeWhereOverDaR@inbow22)

If you’re worried about forgetting a password, write it down! Storing your passwords on paper isn’t necessarily a threat to your Internet security. Cybercriminals will try to target your information through your online network, not your desk. Still, keep your password in a safe place.

Prevent cybercriminals from infiltrating your Internet security, personal accounts, and network services by changing your passwords often and making them difficult. If a password is too difficult for you to remember, then it’ll certainly be difficult for a hacker or virus to figure out.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Watch out for Free Wi-Fi

Watch out for Free Wi-Fi

Many people find it hard to go even a few hours without an Internet connection. Shops, restaurants and a variety of other venues are adapting to this need by providing free Wi-Fi. Whether you’re at your favorite coffee shop, shopping at the grocery store, or waiting in an airport lounge, you’ll probably find that you have access to a free Wi-Fi network. If you decide to use it though, you should be aware of the dangers of using a network service without proper Internet security.

It may be tempting to quickly connect to a public network service and log into a social networking site such as facebook or check your bank account, but unless you can trust the network service provider’s Internet security, you should only do casual surfing. If you find yourself using a questionable network, avoid logging into websites and services that require you to type a username and password. Faulty Internet security leaves room for cyber thieves or hackers to infiltrate your network service and steal your private information without your knowledge.

Good Internet security practices can spare you potentially disastrous outcomes like identity theft. So when choosing a public network, always make sure you select a secure connection. If you’re at a Starbucks, for example, ask an employee to verify the name of the network service before connecting. Avoid using unsecured network services because they are easily prone to Internet security breaches.

Keeping your anti-virus software up to date and your computer’s firewall turned on are just two of the basic principles of achieving Internet security and using public networks safely. Besides, having anti-virus software does not guarantee your device’s safety; it’s merely a basic component of Internet security.

Another common Internet security problem occurs when cyber thieves record keystrokes, giving them access to your usernames and passwords. Changing your passwords periodically can help counter this kind of threat, especially if you use a public network regularly.

Even with these precautions, the strength of your Internet security can be hard to gauge, and networks that appear safe can still place your device at risk.  If you do suspect that a virus or malware has breached your Internet security, get professional help immediately.  Some viruses can seriously damage your device if they’re not caught quickly. In fact, because the average user cannot detect malware, it is essential to have a computer or network services specialist look at your system from time to time.

Always try to balance the advantages of using public network services and the potential threats to your Internet security that accompany them. What appears to be a free Wi-Fi service could end up costing you a lot in virus removal costs and privacy breaches.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Smartphone Users: Beware the Fraud

Fraud is not new to humanity.  Impostors and counterfeiters are as old as the idea of property.  The only new developments occur in the scams we see and the venues where they are attempted.  The birth of the World Wide Web created a digital world loaded with sensitive information where clever con artists could ply their trade.  Today, Internet security is paramount to protecting financial information from theft by nefarious individuals.  Everyone needs to consider seeking computer support to ensure effective Internet security.

Internet security as a way to identify and prevent fraud, started simply.  Over time, increased Internet security and the computer support it requires have become more and more a priority for people doing business on the Internet.  As Internet security becomes more sophisticated, so do the methods used to steal information.  Internet security, cybercrime, and the constant computer support needed to help in this conflict represent a daily battleground.  Personal users, out of concern and genuine fear, need the help of expert computer support, and they need continuous education in effective ways to maintain their own Internet security.  As an example, banks and private companies have begun offering identity protection to consumers worried about the safety of their transactions.

The most current and troubling threat to Internet security is the growing number of mobile web users.  Smartphones and tablets alter the digital landscape once again, and wireless options and expanded coverage are right alongside them.  Knowledgeable computer support is all the more important as threats to the Internet security of mobile users multiply due to the lack of anti-virus software on many devices.

Improving Internet security against mobile fraud continues as a top priority for commercial entities and the computer support personnel they employ.  Simple prevention is still the best solution to reduce the possibility of a cybercrime affecting you, and effective, reliable computer support is the key to peace of mind.  Take the time to install protective software on that smartphone.  Do your shopping while on the go, but wait until you get home to make that purchase.  The Internet security of your home machine is probably far superior to your mobile device.  A little education and proactive computer support can help prevent the huge hassles caused by a breach in your internet security.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Even Google Gets Hacked Sometimes

Hackers continue grabbing headlines with high profile attacks against the Internet security of governments and major corporations.  Hacktivists (hacker activists) attempting to make statements attacked various targets this year, again showing the importance of good virus removal and protection in a digital world.  Targets have ranged from PayPal and Visa to FBI associate Infragard, not always with obvious reasons.  Recent hacker arrests in the United States and Europe are attempts to combat the problem.   Google announced on Wednesday, July 20, they were the latest victim as hackers compromised their Internet security.

Read more »


Protection Against Zero-Day Attacks

Zero-day virus attacks get the credit for a hacker group’s entry to websites for PBS and Sony, raising concern about computer security. The average user can remain safe against attacks easily using the anti-virus protection software that already exists.

Read more »


Share Life Not Secrets

People like to enjoy life and talk about it, but no one wants everyone knowing every detail. Social networks provide the chance for people to share lives with friends all over the world, and with people who are complete strangers. Online social network users do not have to give up privacy to the entire internet.

Read more »


Don’t Suffer from the Crash: Store Data Online

Don’t Suffer from the Crash: Store Data Online

Crashing computers and multiple devices create difficulties in getting documents on demand. Entire papers can be lost, or the wanted photograph is on another device.  Online data storage offers a solution to the issue. Customers can arrange for a digital file cabinet for data files and avoid lengthy processes to recover or carry wanted items.

More customers use storage websites as more people grow more mobile. The number of available websites to store information also increases with the demand. Some options include: Carbonite.com, Dropbox, and MobileMe. Remember for expert and personal computer support, RESCUECOM offers a Remote Backup solution to protect all files against human or system errors through the device’s Internet connection. RESCUECOM’s trained technicians install the Remote Backup and will help retrieve lost information24 hours a day.

Read more »


Five Simple Steps to Secure Online Shopping

More shoppers buy items online everyday, with entire websites devoted to buying and selling. With the threats of identity theft and viruses, some shoppers still hesitate about making purchases over the internet.

Rescuecom offers five things you can go to protect yourself on and off the computer

  1. Keep the browser and anti-virus software updated. Anti-virus software will keep information stored on personal computers safe from online exposure. When entering purchase information, like credit card numbers, a pause in the processing can endanger the information. The order might be lost, and someone else might get a look at the card number.  An updated browser ensures smooth processing of information on websites, and reduces the risk of private information getting exposed.
  2. Know who you are dealing with. Stick to well-known stores or online marketplaces like Amazon.com. Legitimate businesses will help resolve an error or false charge and can refund the full amount sometimes. Business and marketplace websites also sometimes employ protective software to ensure customer privacy.
  3. Never give out passwords. Private information needs to remain private. The less information available online, the less shoppers need worry about security. Create usernames and passwords with numbers and symbols to make guessing harder.
  4. Use one card for transactions. Use only one credit card for online transactions. Shopping records are easier to follow and confirm on one card. Credit cards have to comply with Fair Credit Billing Act, so after reporting the theft of a card or a card number, the owner is only responsible for a small amount of the purchases. Each credit card company has the amount listed in the contract. More than one credit card used online not only increases the chance of stealing the numbers, card owners are also responsible for different amounts on each card. Using a check or bank card gives access to the entire account.
  5. Record it. Keep detailed records of online spending by choosing to print the receipt copies. Check card bills every month and be sure that all transactions appear on both the bill and the receipts. Report any items that do not match the receipts to the credit card company and the online store immediately.

Shoppers can easily protect personal computers, identities, and personal bank accounts. Rescuecom’s five steps let customer shop online securely.

Next Windows Almost Ready

Personal technology goes far beyond just a home computer. So, Microsoft designed an operating system modified to perform on many different personal devices. Windows 8, due to release next year, adapts to each product that runs it.

Rescuecom has five things customers need to know about the upcoming operating system.

The classic design remains.  The classic Windows operations still exits for anyone who needs it. The basic programs like Word and Excel present similarly to Windows 7. Private individuals and businesses that make and store crucial documents in these files can still create and save work the same as before without needing to learn a new format.

New applications appear. The tile interface, a set of mosaic-like boxes showing different applications, lets customers find needed items quickly and choose which tiles appear instantly. The tiles are large enough to reduce mistakes in opening tiles on touch screen products and new information is clearly visible. Tablet and smartphone users can find favorite websites, while computer users shorten searches for files.

Customizable adjustments are possible. Microsoft designed the Windows 8 system to allow individual customization. Users who need certain pieces of information regularly choose which applications appear on the home screen. The constant connection to a favorite news website appears above the file for last summer’s vacation pictures as soon as the device turns on, and either one opens at one touch.

Fewer resources are needed. The Windows 8 operating system’s memory design lets the programs work more efficiently. The ability to multi-task and run several programs at once increases, letting customers do more. Downloads and updates will not cause other programs to run more slowly.

Microsoft is ready for the future. The new focus on compatibility helps the system get ready for future technology. Microsoft’s design includes many facets of smartphones, tablets and netbooks, integrating needs for a variety of devices. Windows 8 adapts to products already, and will adapt to new products. Customers will not need to learn new systems as products appear.

Windows 8 mixes what customers like about the operating system with the needs of new applications and devices. Customers will choose how the system works, instead of the system controlling how the customer works.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


“Save the regret. Separate your e-mail accounts.”

Over the weekend, Epsilon notified millions of customers that the company had experienced a break-in and email addresses were stolen.  One consequence is that now it’s open season for phishing!  Now, instead of using bait to “catch” personal information, a more direct line of attack against your private information exists. 

You can avoid having your sensitive material, including your email address, exposed in this or some similar way.  Josh Kaplan, President of RESCUECOM, strongly recommends that you take immediate action to set up a separate e-mail address for all online transactions – and ONLY use this address for online transactions.  You should be aware that it is not safe to give your personal e-mail address used by your friends and family to any company. 

Even “reputable” companies with whom you may have been doing business for years should not be given your personal email address.  Companies regularly outsource their e-mail communication.  For example, companies such as Marriott, JPMorgan Chase, Walgreens, Capital One, and others contracted with Epsilon to manage their email information and send out e-mail blasts to customers.  Rather than directly overseeing the security of this information base, a third party is involved, thereby increasing the chances of compromised data.

Unfortunately, for many people, such as those affected by the recent data breaches at Epsilon, this warning may come too late.  Be sure that you set up a separate email address for those online business transactions today.  Consider setting up a new personal address as well if your existing address has already been compromised.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Increased Corporate Victimization Highlights Need for Better Internet Security

A recent survey has revealed some troubling data for corporate technology users when it comes to Internet security.

According to the Sixth Annual Enterprise IT Security Survey, conducted by Amplitude Research, 67% of large companies (minimum of 5,000 employees) reported at least one significant security intrusion.

That was over 25% higher than the year before.

Companies cited various potential reasons for the increase, ranging from significant Internet security weaknesses to employee Internet usage.  No matter the reason, one thing is clear:  large corporations are coming under increased attack. Read more »


© 1997-2025 RESCUECOM Corporation
Patented - Patent Numbers: 6,898,435, 8,832,424 and 9,477,488
Additional Patents Pending