News

July 22, 2020


Help Protect Your Data from Physical Device Theft

No matter how secure your passwords and accounts are device theft is always a major concern. Even if the users have everything locked up correctly the uneasy feeling of someone having your property is still there. To help mitigate that feeling we look to device tracking software. There are some protections built into mobile devices (e.g. Apple or Google’s Find My Device service) but what if that is not enough? What if you want to be alerted when a device is taken from the office?

For this we use the strong arm of Prey. This software allows tracking of devices and recording of evidence such as nearby WiFi networks or GPS (if available). It allows for automatic deletion of data, screenshots and snapshots of users and much more. For just the cost of a few dollars a month you can add some extra protection and peace of mind. Contact us for more information.

July 21, 2020


Manage Your Practice Using the Combination of Microsoft 365 and Matter365

We have recently partnered with an amazing Practice Management software for attorneys called Matter365. This platform sits right on top of Microsoft 365 and integrates fully with the cloud-based system to maintain a unified structure. Time spent is tracked within emails, documents and more with billing automatically exported to QuickBooks Online for invoicing. Unlike many other systems file names are left as they are, and tags are attached to each document to link them to a matter. This gives you full control and allows documents to still be usable outside of the management system.

Please reach out to our office if you would like to hear more about how Matter365 can improve productivity in your office or to schedule a demo.

May 20, 2020

PRESS RELEASE
West Hartford Information Technology Company is Collecting and Refurbishing Computer Equipment to Provide to Students Throughout Greater Hartford

Contact:
Avi Smith-Rapaport
860-836-4191
info@wecarecomputers.com

A West Hartford based technology company, We Care Computers, is collecting donated computer equipment, refurbishing it, and providing these devices to local students free of charge. They are working with school districts, municipalities, and nonprofit organizations to get the computers to the students who need them and have donated over 30 computers so far.

Avi Smith-Rapaport, owner of We Care Computers, had been hearing that there was a significant need for computing equipment among students that have been forced into remote learning over the past couple of months.

“I had been told by many people throughout the community that there was a shortage of computers for remote learners because of Covid-19.” Avi stated. “I got the idea for donating refurbished computers when I realized there was an inventory of available machines from organizations upgrading their equipment.”

Donations have come in from individuals, businesses, schools, and a few other organizations.

“We continue to post our need for used equipment through social media and our newsletter,” Avi went on to say. “We will continue to provide computer equipment as long as there is a need.”

Mr. Smith-Rapaport said that We Care Computers will gladly continue to take donated equipment as well as cash donations so they can expand the numbers of students that can receive computers.

They have set up a fund called WCC Students in Need:
https://www.gofundme.com/f/we-care-computers-students-in-need

For more information email Avi Smith-Rapaport at info@wecarecomputers.com or call 860-836-4191.

ABOUT WE CARE COMPUTERS
We Care Computers is a Managed Services Provider and full-service computer technology company providing onsite and remote computer support to businesses throughout Connecticut and western Massachusetts. For more information please see www.wecarecomputers.com.

May 19, 2020


We Care About More

Over the years we have strived to operate a business that not only cares about your IT needs but also about the overall well-being of our clients. We want to do everything we can to make sure that our clients are running at top capacity in all sectors of their business.

Throughout the last 16 years we have built relationships with hundreds of businesses and thousands of individuals that offer a wide variety of business services. By using the connections we have made we have been able to save thousands of dollars on the services we depend on while continuously streamlining operations.

We want to take a moment to touch on some of the areas where we have made changes that have improved our business in hopes that they can also improve yours.

Business Management Software

We now use a PSA (professional services automation) software called AutoTask. This software allows us to schedule our specialists, automatically export labor hours and parts to QuickBooks for billing, keep client notes, track sales processes and maintain overall business management with ease. While AutoTask is an IT-focused product there are purpose-built applications for almost every industry imaginable. Whether you have no business management software or you have something that does not do what you want, we can help you look for options to help make your business easier to manage, maintain, and grow.

Phones and Internet

As you may have read in recent newsletters, we have made the swap to new VoIP Phone and Internet vendors and could not be happier. We have been able to save money while adding new features and capabilities. We are happy to discuss how changes like these can not only save your business money but save yourself ongoing headaches at the same time.

Credit Card Processing

This is a field that almost all businesses deal with and credit card fees can add substantially to the costs of getting paid. By shopping around and finding a vendor that works we have been able to reduce our credit card processing fees to more agreeable rates.

Employee Safety

With talks of businesses beginning to open back up in the month(s) to come, we have prepared our own offices by having a protective coating sprayed on all the touchpoints in the office. PermaSafe is an anti-microbial coating that has become popular in the auto industry and is designed to provide disinfection that lasts for years. It is non-corrosive, non-toxic and odor-free. It can even be sprayed over electronics and will ensure that your employees can return to the office confidently.

If you have any questions about these tools please contact us at info@wecarecomputers.com or call 860-836-4191.

May 5, 2020


Boost Your Ability to Work Remotely with Fiber Optic Internet

For years there has been a split monopoly of internet provider choices in Connecticut and many other places across the United States. Those lucky enough to have the option of more than two internet providers will know the reliability and cost savings that can come from having a little competition in the area.

A new fiber optic provider is now giving parts of Connecticut that same competition by expanding into towns such as West Hartford and New Haven. With new fiber optic lines being run every day the fast expansion in the area brings not only an increase in options but quality customer service along with it. One of the major issues that users have with other providers is that prices can spike to unexpected levels after an introductory period. GoNetSpeed offers a Lifetime Price Pledge guaranteeing that their price will never increase as long as customers remain in the GoNetSpeed territory.

In addition to the stellar customer service features (such as the above pledge) fiber optic internet also provides symmetrical internet speeds. While this may seem like technical jargon to some people this can prove to be extremely valuable when working remotely.

When a user is in the office, uploading files to a centralized server is done locally and only has the limits of the internal network. When users work remotely the files need to be sent through the internet to arrive back at that same location. When this happens the upload speed of the user’s internet plays a huge part. Other providers offer non-symmetrical speeds and focus advertisements on the higher download speed. Many times there can be up to a ten-fold difference in the two speeds with packages such as 150Mbds download and only 15Mbps upload. This means sending a file BACK to a location can take longer especially when dealing with large files such as videos. GoNetSpeed’s symmetrical speeds ensure those files can be received AND sent at the same speeds.

If you would like to find out if your business or residence is in the GoNetSpeed service area, please go to https://GoNetSpeed.com and click “Check Availability” in the top right hand corner. Then input your address to see if you are in a current service area. Whether or not GoNetSpeed services your area it is worth it to put in a request as this helps them decide where they will be expanding to next. They begin looking at expanding to a new area once they reach a 10% request rate.

** Don’t forget to put We Care Computers as the referrer and in the notes so that we can assist with any questions you may have during the sign-up and setup.

If you have any questions, please reach out to us at info@wecarecomputers.com or call 860-836-4191.

April 28, 2020

Video Conferencing: Zooming Past Security Checks

As the world continues its trend of doing everything we can to work remotely, technologies that specialize in this ability have come to the forefront of news. Zoom has been one of the fastest growing video conferencing providers in the space but recent concerns of their security methods or lack of have come to light, not the least of which is a recently discovered cache of account password being released, for free, on the dark web.

Over half a million accounts have been found for sale for tenths of a penny or given away for free with information such as email addresses, Zoom account passwords and meeting links. These passwords were found using a method called credential stuffing, which is basically using a previously released credential set for another account, furthering the importance of not re-using passwords across multiple sites. While these accounts do not mean that Zoom themselves got hacked, it is just one more example of Zoom making the news over security concerns.

Recently a number of companies and government organizations have blocked access to non-specialized Zoom platforms and told their employees they are no longer allowed to use them on company property or for company purposes.

Just a few names on that list are:

  1. S. Department of Defense
  2. Taiwanese Government Agencies
  3. Google (Note: Google has their own business-class video conferencing platform)

Many of the concerns can be mitigated by using different levels of the Zoom products beyond the base $16/month membership or using features such as password protected rooms but other issues such as their encryption methods and China-based R&D teams lie at the root of the company itself.

The enormous amount of need for remote communication that is now needed have brought many of these issues to light as companies begin to more intensely vet the products they use in day-to-day business life.

While this is not meant to completely discount Zoom as a service, it is important to realize the limitations of the products we use each day. Other free alternatives such as Microsoft Teams and the open source Jitsi.org, can offer many of the same features while providing some additional advantages in security.

If you would like to discuss any of these other options or would like assistance in setting up secure Zoom meetings, please reach out to us at info@wecarecomputers.com or call 860-836-4191.

April 21, 2020


Microsoft Teams: A Key Tool in Communication

As we continue to quarantine ourselves it is important to stay socially interactive while remaining socially distant. One of the tools we use to do this is Microsoft Teams. Teams is part of the Office 365 Suite but has been released as a free product for businesses and schools to allow for robust communication during these times. While Zoom has been under the watchful eye of security teams as of late, Microsoft Teams allows for a reliable and secure way to communicate with your staff through text, audio or video chats, screen shares, file sharing and more.

Microsoft Teams has become an indispensable product for us in our business lives and we utilize it on all our devices to communicate.

Here are just a few reasons why:

  • Conversation history is kept within the program, as well as within Outlook if you use Office 365 for email hosting.
  • Simple integration with Outlook allows for Teams meeting creation with the click of a button – calendar access without needing to leave the Teams app.
  • Every Office 365 service, including Teams, follow compliancy rules for HIPPA, SOC2, ISO 27001 and EU Model Clauses.

If you would like to see how Microsoft Teams work take a look at Microsoft’s interactive demo at https://teamsdemo.office.com and find additional online training for Microsoft products at https://support.office.com\en-us\office-training-center.

As always we are here to assist with getting you and your staff on the road to boosting your communication abilities with Microsoft Teams or with any other Microsoft questions you may have.

April 17, 2020

Not Selling in the Coronavirus environment: Maybe the best questions you can ask your customers

Article by Marc Kitz

March 24, 2020


Working Remotely During These Times

As the news unfolds more each day and new precautions are taken to reduce the further spread of the Covid-19 virus, businesses will need new ways to survive and we will all need to help each other to help ourselves. While many businesses may have no way of operating during these times, new technologies can assist with reducing the impact that these precautions make and allow for at least some functionality.

In order to try to assist our clients and the community in maintaining some functionality of their businesses, we want to provide a breakdown of the tools we ourselves use to work remotely.

Email
When physical contact is brought to a minimum, digital contact becomes even more important and email is often at the forefront of that contact. There are many ways to host email in the digital age and each has their own advantages and disadvantages. By utilizing a reliable host like Microsoft’s Office 365 platform, we can ensure that there are resources put forth to maintain email flow during moments of high server stress. In addition to the reliability of cloud hosting, it allows for reliance to be taken off in-house server resources so that they may be shut down during times of power outages or inactivity. Migration to Office 365 can sometimes even reduce monthly costs below other third-party hosts.

File Access
While each organization is different and may have their own needs for business operation, one of the most basic needs is the ability to access the files and documents that make up day-to-day operations. The emergence of cloud file hosting has brought a new era of always ready file access. Business class hosts like our Egnyte offering allow for access from any device with an internet connection and the ability to cache files for offline use should internet not be immediately available. Setup of Egnyte can be done remotely and installation of device apps is a breeze. Once files are in the cloud, updates to these files are made immediately available for all members of your organization, wherever they may be working.

Phones
Now that many businesses have made the swap from traditional landline phones to VoIP systems that work over the internet, phone systems are no longer tied to the office building where they were installed. A cloud-hosted VoIP provider like our partner, RingCentral, allows users to disconnect their phones in the office and take them home to continue communications as they would in the office. Phone transfers, conference calls and more can all take place from the comfort of our homes without the need for expensive hardware to handle the calls. Onboarding with RingCentral can be done in less than 2 weeks, including porting over your existing numbers.

Cloud Hosted Applications
When deciding on the mission-critical applications that run your business, there are often cloud hosted options or alternatives that can be used to maintain a level of functionality that was not possible 10 years ago. Cloud hosted options will provide a greater level of mobility and help allow your business to maintain during times when in-office usage is not possible. We can assist with deciding between the numerous options and help you prepare for disaster in the best way possible.

VPN
Even when cloud-hosting options are not available, a VPN connection to your office will plug users into the internal resources they need to continue working. By utilizing a business-class firewall, such as a SonicWALL, these connections can be in place and ready when they are needed.

Additional tools
• Reliable internet – While a multitude of internet provider options is often not available to many users, choosing between providers and the plans they have to offer can be daunting but we recommend using a reliable cable or fiber optic internet connection whenever possible.
• Comfortable setup – Bringing home a laptop may be easy for many users, but sometimes working at that laptop is not as easy. By taking advantage of docking stations, wireless keyboards and mice, multiple monitors and other tools, users can make the switch between office and home effortlessly.

As we make our way through the problems at hand, we will need to band together to ensure that we remain healthy and happy. Many workers are afraid of what is to come and have a reasonable uncertainty about the weeks and months ahead. By supporting each other every day and making sure our family, friends, neighbors and community stand united in an effort to overcome and maintain we can be sure that we as a people will make it through these times stronger than before. Helping your community by buying gift cards to places such as local restaurants will help make sure that your favorite local businesses can stay afloat during these times.

We will be here to assist you with maintaining your business as much as we can reasonably do so over the coming weeks, months and beyond. If you would like more information on implementing any of these tools we are available during our regular office hours for remote support so please call 860-836-4191 or email us at info@wecarecomputers.com with any appointment requests.

Stay smart. Stay safe. Stay productive.

The We Care Computers Team

March 6, 2020

What Can You Do With the Power of Two Monitors

For some users having multiple monitors may be nothing new but for the uninitiated it can revolutionize the ability to multi-task. Being able to dedicate each monitor to a separate task while seamlessly moving between the two without the need to click through windows allows users to shave seconds of their workflow hundreds of times a day. Over the course of time these seconds can add up to hours of extra productivity for yourself and your staff.

Most users will find that they have one or more applications that they spend large amounts of time in during the workday. By placing these applications (e.g. email, company database, etc.) in their own dedicated space, the user can help build muscle memory that will make finding information effortlessly efficient.

You may be asking yourself, “what if I am already using multiple monitors?”

Well, we still have some helpful tips and suggestions for you to make the most out of your hardware.

  1. Make your space your own with a mount that will help position the monitors at just the right height and help reclaim your desktop space.
  2. Memorize keyboard shortcuts to perform common tasks even faster.
    Keyboard Combination Action Secondary Action
    Win + Home Minimize all but the current window
    Win + M Minimize all windows
    Win + Up-arrow Maximize the current window
    Win + Down-arrow Minimize the current window (if not maximized) Restore the current window (if maximized)
    Win + Left-arrow Snap the current window to the left half of the screen Cycles the half-sized window to the left through additional screens
    Win + Right-arrow Snap the current window to the right half of the screen Cycles the half-sized window to the right through additional screens
    Win + Shift + Up-arrow Extends the current window to full vertical height leaving horizontal size
    Win + Shift + Down-arrow Restore the current window (if maximized) Minimize the window
    Win + Shift + Left-arrow Move the current window to the left screen Cycles through screens to the left
    Win + Shift + Right-arrow Move the current window to the left screen Cycles through screens to the right
  3. Why stop at 2 monitors? Some computers can even use 3 or more monitors to allow for more screen space.
  4. Docking stations and upgraded video cards can add the capability of multiple monitors to laptops or desktops without multiple outputs.
  5. Ultra-wide screen monitors can provide the same functionality of multiple monitors without the space between monitors or need for multiple outputs and power connections.

It may take a few days to get used to the multiple monitors but once the break-in period is over the functionality can be indispensable. If you would like to maximize your multi-tasking please reach out to our offices to find out what you will need to get started.

November 27, 2019

Email Spam and Phishing


The best way to prevent phishing attacks is to know what to look for when suspicious emails arrive in your inbox. Here are some ease ways to help weed out phishing emails from the rest of your legitimate emails:

1. Double check the sender’s email.

It may appear to be from a known contact or company, but make sure to check that the email and domain match up. Example: John Smith (jsmith@notyourcompany.com). Many times phishers will change the display name to a name you may recognize to get you to follow the links or download a file. . If your contacts are receiving strange emails from you, make sure to check the actual email address to verify that it did or did not come from you.

2. Double check the link.

By moving your mouse over the link without clicking on it, the address that it directs to will be displayed. Try it on this link: http://www.wecarecomputers.com/

3. Just because it looks real does not mean it is.

Most phishing scams that are attempting to retrieve login information will copy the real login pages from common email sites in order to lull you into a sense of false comfort.

If you would like to test your ability to recognize phishing emails, take the Sonicwall Phishing IQ Test at the link below:

https://www.sonicwall.com/en-us/phishing-iq-test-landing

If you would like to additional training, please call (860-836-4191) or email (info@wecarecomputers.com) our office to discuss the options available for training on Phishing, Ransomware and more.

June 1, 2019

Windows 7: That’s All She Wrote

Are the 2020’s coming faster than you thought? It is certain that big things will happen in the next 10 years but before that happens we need to concern ourselves with what happens in the next 7 months. On January 14th, 2020, the Microsoft Windows 7 operating system will be put out to pasture and Microsoft will no longer provide support for it.

Microsoft will no longer release security vulnerabilities patches or update other important features that may affect reliability. This can leave serious security issues without these important updates.

In order to stay protected with a supported operating system, you will need to upgrade your computer to Windows 10.

To find out if which version of Windows operating system you have:

• Open the start menu by clicking the Windows icon in the bottom left hand corner of the screen.
• Type System Information in the Search box and then open the resulting item.
• Operating System version will be listed under OS Name

If you are running Windows 7 and would like to discuss upgrading to Windows 10, please call us at 860-836-4191.

May 31, 2019

Managed Services Update – New Features for Mac Users

We are excited to offer some new features for our Mac OS clients on Managed Services (compatible with Mac OS 10.11 and above). We will be activating a new antivirus in the coming month to swap compatible users over to BitDefender antivirus.

In addition to the new antivirus offering, the same great managed document backup solution we offer to our Windows clients is now available for our Mac OS clients (Mac OS 10.11 and above). For now, this is limited to office documents of specific file types (details below) but a full backup option is in the works and will be released in the future.

Document Protection – $5/month per computer
Automatic backup any office documents twice a day. These documents are held for 28 days providing 58 restoration points for a single price.

File types include: Word, Excel, PowerPoint, PDF, OpenOffice, TXT, Microsoft Works, WordPerfect.

May 30, 1019

Maintenance Schedule

Here is a suggested schedule for computer maintenance:

DAILY/WEEKLY
Update antivirus *
Perform virus scan *
Check for critical updates *
Reboot
(* Performed Automatically Under our Managed Services)

MONTHLY
Check event logs
Delete temp files
Check local backups
EVERY 3 MONTHS
Change passwords to email and domain login

EVERY 6 MONTHS
Check for third-party software, driver and BIOS updates
Remove old downloads and unused software
Employee Q&A
Secondary malware scan
Hard drive check and defrag

YEARLY
Physically clean device and perform cable management
Battery backup checks
Clean and reorganize file structure
Disaster recovery testing
Hardware audit
Group Policy review for domain users
Penetration testing for security vulnerabilities and phishing email testing
Change passwords to all logins

December 20, 2018

Microsoft Office 2019

Another 3 years has past, so it is time for a new version of Microsoft Office. Now that Microsoft has had a few months to work out some kinks, we are offering the new 2019 version of the Office software to our clients in need of a new install or upgrade. With some major changes in the core applications, here is what you are missing by running an older version:

1. Translations
New to Word, Excel and PowerPoint is the ability to translate words, phrases, and other text selections to another language with Microsoft Translator.

2. PowerPoint’s Big Additions
PowerPoint has become slicker than ever with the addition of slide morphing , zoom capabilities allowing you to flip to other slides without changing your current slide location, and the ability to use the Surface pen as a remote.

3. New Visual Effects
In Word, Excel and PowerPoint, users can now add Scalable Vector Graphics and even apply filters to those graphics. The new Inking feature brings the ability to draw on documents using a touchscreen or mouse. Office can then convert these drawings to moveable shapes.

4. LaTeX Equations
Word now gives the ability to create complex math equations using the LaTeX syntax.

5. And Much More…..
New Functions in Excel. New Charts and Data Types in Access. Simple click to link tasks in Project and easily view progress of those tasks. New Diagrams and Templates in Vizio.

If you are ready to dig into more of what the new Microsoft Office 2019 has to offer check out Microsoft’s website. You can also find helpful Microsoft tips, training and quick start guides here.

If you have any questions or would like to order Office 2019, please contact our offices at 860-836-4191.

November 19, 2018

Preparing for the Worst

Nobody wants to think about death but it is something we will all will have to face, along with our loved ones. It is important to be sure that your digital life is organized. Everything from credit card access, financial institutions, email, social media profiles and more should be organized so that your loved ones can properly close down any unneeded accounts. To make sure you are ready follow these quick tips:

1. Make an inventory of your current digital accounts.
• Financial Institutions
• Utilities (Electric, cable, etc.)
• Social Media Accounts
• Email Services
• Other various accounts

2. Make sure you are aware of the correct passwords and record them for easy access.
Set up a password management product such as KeePass, LastPass, Dashlane or 1Password to simplify this process. By keeping all of your information in a password manager, you will only need to provide a single password to your loved ones to access the rest of your accounts.

3. Make note of any accounts with 2 Factor Authentication
Using 2 Factor Authentication greatly increases security but will make it harder, if not impossible, for your loved ones to access your accounts when needed. Make sure to record the 2 Factor Authentication recovery codes provided during setup of this feature and store this along with the password information.

If you need assistance in setting up a password manager or have any questions on what we can do to prepare your digital assets, please contact our office at 860-836-4191.

November 13, 2018

Why Small Businesses Matter – We Care Computers

HamletHub has published an article about We Care Computers. Read the article here.

October 24, 2018

Phishing – Educating your Staff


Our WCC Managed Services will mitigate the effects of malicious entities online, but the best prevention from phishing attacks comes from user education. By training your staff on what to look for, you can help avoid these threats altogether. Some of the biggest threats come from phishing emails that are infected with a malicious file or links to websites trying to get your passwords. Luckily there are some easy ways to help weed out phishing emails from the rest of your inbox.

1. Double check the sender’s email.

It may appear to be from a known contact or company, but make sure to check that the email and domain match up. Example: John Smith (jsmith@notyourcompany.com). Many times phishers will change the display name to a name you may recognize to get you to follow the links or download a file.

2. Double check the link.

By moving your mouse over the link without clicking on it, the address that it directs to will be displayed. Try it on this link: http://www.wecarecomputers.com/

3. Just because it looks real does not mean it is.

Most phishing scams that are attempting to retrieve login information will copy the real login pages from common email sites in order to lull you into a sense of false comfort.

If you would like to test your ability to recognize phishing emails, take the Sonicwall Phishing IQ Test at the link below:

https://www.sonicwall.com/en-us/phishing-iq-test-landing

If you would like additional training, please contact our office to discuss the options available for training on Phishing, Ransomware and more.

October 22, 2018

Comcast’s New Failover Internet Option


If you are a Comcast internet customer, a new service has been released to make sure you are always connected to the internet. By adding a 4G cellular hotspot connection and Comcast Cradlepoint router, your Comcast router will automatically cut over to a 4G connection if the main connection cuts out. While the service will be much slower than that of the traditional connection, it will ensure important functions such as email and credit card functionality will continue in the event of a power failure.

This service is available at a cost of only $29.95 a month and also includes an 8-hour battery backup.

If you are interested in adding this feature for your business or home, please contact our office and we will refer you to a Comcast representative.

August 10, 2018

You Have the Power…. Until You Don’t

When setting up a computer for the first time, some users unsuspectingly plug them directly into a wall outlet thinking this will be fine and not knowing the real truth.

Not all power outlets are created equal.

A computer plugged directly into the wall is susceptible to power surges from lightning, electrical line issues, blown fuses and more. These electrical surges can destroy computer components, including the hard drives that store your valuable data, leaving you with a hefty bill to recover from these disasters.

Power strips and surge protectors are not the same thing.

While many people use these terms synonymously, a power strip is essentially just a way of adding more physical outlets to a wall outlet. One side plugs into the wall and the other has multiple outlet in a strip. Unless the strip says surge protection somewhere on it, it is most likely not going to provide protection from a harmful electrical surge. The red power switch alone is also not an indicator of this feature.

Surge protectors are not good forever.

Once a surge protector has been tripped by an excess electrical current, that surge protector should be replaced. They can also wear out with time and should be replaced after about 3-5 years to be safe. After all, a $15 surge protector is a lot easier to replace than an entire computer or a decade worth of photos.

A battery backup is even better than a surge protector.

A surge protector will help prevent damage from excess electrical current but an abrupt stop to that same electrical current can also be damaging for your devices. A battery backup will ensure that your computer has a few extra minutes to prepare itself for this event and by utilizing the USB connection your computer will automatically shut itself off to prevent damage. These few minutes can also provide one last chance to save the documents you have been working before losing power.

It is important to use the proper accessories to prevent these issues from occurring. These tips will help you to get the right equipment for the job.

If you would like to ensure you are properly protected or purchase a battery backup for your systems please call us at 860-836-4191.

August 8, 2018

Why We Recommend Solid State (SSD) Drives


More Durable
Because there are no moving parts SSDs are generally more durable when compared to traditional hard disks.

Fast
They are super fast. If a computer has no malware and sufficient RAM the largest bottleneck for speed will be the hard disk! An SSD is about 100 times faster than a traditional hard disk and computers will boot up in less than a minute.

Go Green Save Energy
SSDs consume less power. For a laptop or table, you will be able to get more minutes out of your battery life.

Lightweight
For laptops, SSDs will reduce weight. An average SSD is 77 grams, while an average traditional hard disk is 752 grams.

Cool and Quiet
SSDs will run cooler, and make virtually no noise.

May 29, 2018

Time to Reboot your Routers


It was recently revealed that a group named the Sofacy Group has been able to infiltrate hundreds of thousands of routers in over 50 countries. Many major manufacturers such as Linkysys, Netgear and TP-Link have already been found to be compromised. A full list of devices has not been released but it is believed that a large number of manufacturers and models have been infected by the malware, called VPNFilter.

The Sofacy Group aka A.P.T. 28 and Fancy Bear, is believed to be under the direction of Russia’s military intelligence agency and is best known for being connected to the hacking of the Democratic National Committee prior to the 2016 Presidential election.

Effects of the VPNFilter malware include data surveillance, using your device to continue the spread to other devices, cutting off internet access and more.
The good news is that the FBI has already taken action to seize the domain used to communicate back to the originators in order to reduce further spreading.

Reducing the effects on your devices can be done by rebooting your router but, as always, the firmware should be kept current in order to provide the best protection. Additionally, any routers using default passwords should be changed to a more secure choice.

If you unfamiliar with how to reboot your router (which can be done by unplugging for 30 seconds) or how to upgrade your firmware we are happy to assist you in the process.

Confirmed list of infected devices: (this list does not include all affected devices)

• Linksys E1200
• Linksys E2500
• Linksys WRVS4400N
• Mikrotik RouterOS for Cloud Core Routers: Versions 1016, 1036, and 1072
• Netgear DGN2200
• Netgear R6400
• Netgear R7000
• Netgear R8000
• Netgear WNR1000
• Netgear WNR2000
• QNAP TS251
• QNAP TS439 Pro
• Other QNAP NAS devices running QTS software
• TP-Link R600VPN

May 25, 2018

Windows 10 Updates


It is time for another round of big Windows 10 updates to roll out. With the recent 1803 update, we have seen some issues with clients that use Avast or AVG antivirus programs. Several computers have come in not being able to completely boot up after the update was performed. We were able to get into the user profile to see that the update had completely botched the Windows installation, rendering it useless. There have been other reportable instances of this occurring with both Avast and AVG.

As with any large Windows update, it is recommended that a full backup of the computer be performed and any antivirus protection that may interfere with the update be turned off. It may also be necessary to uninstall the antivirus completely.

If you find yourself prompted with an update, make sure to follow the proper steps to ensure the installation goes smoothly or call us so that we can assist you with the update. If you are on Avast or AVG, this is a great time to consider our We Care Computers Managed Services with World-Class Bitdefender Antivirus.

Call us at 860-836-4191 for more information.

May 9, 2018

Scareware – What is it and how do you get rid of it?

What is it?

Scareware is malicious software that tricks computer users into visiting malware-infested websites. The reason it has this name is because it is designed to scare you and make you think there is something wrong with your computer. The good news is that this message is almost always just a persistent pop-up that stays in front of other windows.

How do I get rid of it?

The best way to get rid of these messages is to follow these steps:

Note: You will lose all unsaved work that had been done during your internet browsing session.

Windows

1. Hit the ctrl-alt-del buttons at the same time or right-click the time in the bottom right hand corner of the screen and click Task Manager in the menu that pops up.
2. In the window that opens, left-click the name of the web browser you are using. The most common choices are Google, Chrome, Firefox and Internet Explorer.
3. Click End Task.
4. Reopen the web browser and choose to not restore closed pages if the option is given.

Mac

1. Hit the command-option-esc buttons at the same time or left-click the Apple menu in the top left-hand corner of the screen and click Force Quit in the dropdown menu.
2. In the window the opens, left-click the name of the web browser you are using. The most common choices are Google, Chrome, Firefox and Safari.
3. Click Force Quit.
4. Reopen the web browser and choose to not Restore closed pages if the option is given

Why?

These messages are most commonly received by clicking on a malicious ad or mistyping the name of a website (e.g. amazno.com, mircosoft.com, facebok.com).

The hope of those that put these messages there is that you will call the number in the warning. They will tell you that you have a serious problem with your computer and that they can help. They will request access to your computer by using a remote desktop application. Once in your computer they can copy files from your computer to access confidential information or use benign technical information to attempt to convince you to buy counterfeit software from them. There are many ways that they can make money from this scam but the important thing to remember is that there is a reason it is called SCAREWARE.

If you need help with any unwanted popup message, please call us at 860-836-4191.

February 22, 2018

Welcome to our new website! We are introducing a new exciting and modern design to our logo and website. Please send any comments/suggestions to info@wecarecomputers.com. Thank you for you continued support.

Unlimited Monthly Maintenance Plans

We Care Computers now offers an ALL INCLUSIVE/PLATINUM Monthly Maintenance Plan. With this package we will monitor your systems, back up your files, protect you from malicious web traffic, update your servers and much more.

The all-inclusive plan includes:

  • Remote help desk support
  • Onsite repairs – normal onsite repair for hardware malfunctions/minor repairs
  • Server support – remote and onsite
  • Switch and firewall management
  • Remote monitoring/management of all workstations and servers:
    • Remote monitoring
    • Antivirus protection
    • Web protection
    • Patch management
    • MOB – 500gb per server
    • Monthly reports
    • And Much More

Call us at 860-836-4191 for more information.