Author Archives: tg0163868

  • -

How To Keep Your Tech Squeaky Clean

Category : Uncategorized

How To Keep Your Tech Squeaky Clean

 

Our tech is something we use every day, and because of this, it accumulates a lot of dust, debris and even germs. Your screen may look clean, but studies show that you would be safer licking a toilet seat in a public bathroom than the screen on your phone. That’s just gross.

It gets worse…Sorry…that keyboard you tap at while eating your breakfast? It’s probably the biggest bacterial threat in your house, with about 20,000 times more germs than a toilet seat. Oh, and if you have kids…well, lets not go there.

It’s not just germs and bacteria that we’re up against. Dust builds up inside gadgets over time which can cause them to slow down, malfunction or overheat. Your device essentially chokes on gunk. The vents and filters become clogged by sucking in pet hair, dander, dust, and any other floating debris. Think about how your ceiling fan can build up dust, your tech isn’t any different.

Here’s how to clean your essential tech items without damaging them:

1. Skip the household cleaners: Most cleaning products are way too harsh for our technology and can end up causing permanent damage. You want something that can kill germs and remove everyday grime, without scratching or leaving behind a scented residue. A good option is a mix of 50/50 Isopropyl Alcohol and distilled water. It has the capability to kill germs as well as remove the gunk. Alternatively, there are many commercial cleaners specifically designed for technology which are available in sprays and cleaning wipes. You can typically find them in the electronics section of the big box stores.

2. Power down completely: This is a must! Electricity and liquids don’t mix. Turn your tech off all the way, not just sleeping, and unplug from any power sources. Switch wireless keyboards, mice, etc off underneath or remove the batteries.

3. Remove any cases or covers: Undress your device as much as you can, but leave screen protectors on (unless there’s grime underneath). If your screen protector needs replacing, have a new one ready to apply.

4. Grab a microfiber cloth: Dampen a clean microfiber cloth with the Isopropyl Alcohol mix, and gently wipe external surfaces. Older or more stubborn build-up may require a little elbow grease. Always apply the cleaning solution to the cloth – never to the equipment or screen.

5. Go deep: You can use a toothbrush or cotton swab to clean between most crevices, but some areas will need a bit more ‘oomph’ to clear. For really stubborn grime, use pure Isopropyl Alcohol, but be cautious, as too much rubbing may cause discoloration.

Insider tip: Use a can of compressed air to blow the dust out. You can get these from many stores and they come with a long nozzle so you can really get in and direct the pressure. You’ll be surprised what flies out, so it’s best to do this outside! Be careful using compressed air on your computer’s internal fans though, as they can spin too fast and cause damage.

How often you clean your tech is really up to you. I typically recommend dusting out your tech at least twice a year and wiping down your tech 1-2 times per week. Following these guidelines will definitely help reduce bacteria, germs, and grime.

Here at Clever Technology, every computer that comes through our doors gets a thorough cleaning inside and out. Contact us today to schedule service and we’ll make sure your tech is squeaky clean!

Get My Tech Cleaned Up

 


  • -
WannaCry Ransomware

WannaCry Ransomware Explained

Category : Malware

WannaCry Ransomware Explained:

Are You At Risk?

You’d be hard-pressed to miss last week’s biggest headline, the WannaCry cyber-attack sent shock-waves around the globe. Home computers, businesses of all sizes, and even police departments found themselves crippled without warning.

Among the most prominent victims were many NHS hospitals in the UK, affecting up to 70,000 individual devices such as essential MRI scanners and blood-storage refrigerators. However, by the time it hit the news, it was too late – either your system was protected, or it was infected. Here’s how it all went so wrong…so fast.

 

What is WannaCry?

The WannaCry cyber-attack was a type of malware (the collective name for computer viruses & bad juju) called ‘ransomware’. Just like the name suggests, it’s actually a demand for money. Like all ransomware attacks, WannaCry encrypts your files and holds them hostage until you pay.
In this case, the price was set at $300, payable with internet currency Bitcoin, and you had 3 days to pay before it doubled. If you didn’t pay, the ransomware threatened to delete your files permanently. It’s yet unknown how much money the WannaCry hackers have earned with their latest attack, but you can be sure plenty of people have paid the ransom. Even the FBI recommends paying the ransom, especially if the ransomed files are of a sensitive nature or weren’t backed up.

 

How It Spread So Fast

WannaCry is a ‘computer worm’ that self-replicates and spreads through a vulnerability in Windows, rather than a phishing attack email that needs to be activated with a click. So far, no common trigger has been identified, as is normally the case with phishing links. WannaCry moved rapidly from system to system, spreading through the entire network, including all connected backups and storage devices. At the same time, it spread out to infect other networks, who then spread it further, and so on. Given the nature of the internet, it was everywhere within hours. Think of it like a super mutant Flu…but for computers.

 

Why Some Computers Were Safe

WannaCry could ONLY infect systems that had fallen 2 months behind in their Windows updates. This is because it was created to take advantage of a specific vulnerability in Windows, one which Microsoft patched months ago. Without that patch, the ransomware could waltz right past the firewall, past the anti-virus and directly into the system (the NHS were reportedly running Windows XP – no longer supported). Those running Windows 10 or a fully patched, recent version of Windows were completely unaffected – the virus literally had no way in.

It just goes to show the importance of staying up to date. We haven’t seen a second spike in WannaCry attacks yet, but that doesn’t mean there won’t be one. A quick update could protect you or your business from weeks of downtime and lost revenue, making attacks like this a non-issue.

With our Clever Care Maintenance Packages, one of the many things we do is ensure that your software stays up to date. Starting at just $5 a month per computer, you can have peace of mind knowing that your computer is protected. We even have Virus Protection Plans that come with FREE Virus Removals if you become infected.*

You can read more about our plans by visiting our Clever Care page


*Recovery of files encrypted by Ransomware are not covered by our Virus Protection Plans. The encryption used is nearly impossible to break in most cases.


  • -
Internet Lingo 101

Internet Lingo 101

Category : Internet

Internet Lingo 101: Cheat Sheet for Beginners

The Internet is growing and evolving so fast that even Webster, and his dictionary have trouble keeping up. Here are 12 suddenly common terms that are helpful to know.

 

Browser

A browser is a free piece of software that lets you view web pages, videos and other online content. It’s a core requirement of going online, as it converts the computer languages like HTML, Javascript and XML into human-readable form.
Basically, it takes all the gobbeldy-gook that makes up the webpage and translates it into something you and I can see.

The most popular browsers in 2017 are Google Chrome, Safari, Firefox and Microsoft Edge*. (*Internet Explorer has been superseded and is no longer recommended due to security concerns)

 

Encryption

Before important data is sent over the internet, it’s scrambled to turn it into gibberish that means nothing to anybody who might intercept it. Unless there’s been a massive security breach, only the sender and intended recipient will have the decryption key to turn it back into readable data. Think of it like the “Enigma Machine” the Germans used during WWII to sc

You don’t have to encrypt your own data as it happens automatically. Your email provider and important places like banks and online stores have digital security systems that take care of the encryption/decryption for you.
HTTP and HTTPS

These are acronyms for the rules of how data is transmitted to your computer screen. The actual mechanics behind the magic is incredibly complicated, but the terms have one very important distinction:

HyperText Transfer Protocol (HTTP) means the images, text and links should appear in your browser.

HyperText Transfer Protocol Secured (HTTPS)  goes hand in hand with encryption and means the page has an added layer of security to hide your personal information from hackers. Data sent through pages with this prefix is securely encrypted before transmission.
Firewall

A firewall is a security measure designed to act like airport security for your network.  When an unauthorized user attempts to gain entry, the firewall blocks their path until it’s checked them out thoroughly. If there’s anything suspicious, the firewall refuses to let them in.

 

IP Address

Every device that accesses the Internet is assigned a unique IP address to identify itself.Just like your house has a unique mailing address. Your IP Address is used to make sure when you request a webpage or document, it’s sent to you – and not someone in Alaska. Your IP will look something like ‘202.9.64.55’ and may be referred to as fixed or dynamic.

 

ISP

Your Internet Service Provider (ISP) is the company that allows you to connect to the Internet. Typically the phone company or cable company. These guys are the ones you pay each month for internet access. ISP is to internet as the water company is to water. They’ll also offer extra services like email or web hosting. It’s impossible to bypass the ISP level and connect directly to the Internet.

 

Malware

An acronym for (Mal)icious Soft(ware). A very loose and broad term to describe viruses and other malicious things that can infect your computer. Malware can manipulate you into paying money, take control of your computer, steal your private details or break your computer in some way. Instead of listing each specific threat, you’ll commonly see them lumped together under ‘malware’.

 

Router

The traffic system for your network, connecting computers and devices within the home and acting as a defensive gateway to the Internet. These hardware devices can be wired or wireless, and allow you to share one Internet connection amongst all the computers/devices in your home.

 

Social Media

A broad term to describe all the websites and applications that let you share and interact with others online. To fit this umbrella, the site needs to allow user profiles, live updates and the ability to add friends/followers.

The most common social media applications are Facebook and Twitter, and Instagram.

 

Spam and Filtering

Any unsolicited messages sent over the Internet, usually in bulk, are called spam. Basically, it’s the electronic form of junk mail that the postman delivers, but it’s also a technique hackers use to trick people into clicking links to their malware.

E-mail applications are reasonably good at identifying spam and should shift it automatically to a spam folder before you see it. Occasionally, the filters get it wrong and you may find a relevant email needs to be dragged back to your inbox.
URL

Each website has a unique address on the web known as a URL (Uniform Resource Locator). URLs are the addresses to a website, most commonly ending in .COM or .NET but can also end in a country specific extension like .com.au or .fr, or more recently, in new and exciting extensions such as .xyz or .me
Examples of URLs include:
Google.com
Yahoo.com
CleverTechnology.net
etc…

Hope this helps!! Until next time…Thank you for being a customer of Clever Technology. As a small business owner, I truly appreciate your patronage.


  • -
Anti-Virus

Your Free Anti-Virus May Be Letting You down

Category : Anti-Virus

ALERT: Your Free Antivirus May Be Letting You Down

Some say the best way to avoid a computer virus is by using common sense, but that doesn’t necessarily mean you’ll be safe from attack. Even the most careful user (including myself) can find themselves infected in an instant and spreading the a virus faster than a sneeze in flu season. This reason Is why antivirus software is still the first package I install on all systems I work on – because you never know when you’ll be attacked. But the real question is, should you choose free or paid antivirus?


Advertising: Much like a free app making its fortune with in-app purchases, the free antivirus software will push you to purchase the paid version. Expect popup boxes pestering you to buy their products at least daily. Some free options will also try to change your browser home page and default search engine, an inconvenience you may be stuck with. Whereas paid options are more respectful and largely invisible unless they’ve detected a problem.

Effectiveness: It’s fair to expect your antivirus to detect malware, and testing showed that in a head-to-head battle free and paid are about equal at catching known infections. And therein lies the kicker…Known Infections. Generally speaking, a free antivirus needs to know about a virus BEFORE before it can detect it. However, a paid antivirus product is more likely to identify and stop a new virus. It essentially bases the detection on suspicious behavior, source and attributes, a far more effective method of detection.

Features: Free antivirus options are usually created from the paid version, they rip out everything except the bare minimum. Whereas, in your paid version, you can expect advanced features like spam filters, firewalls, parental controls and secure web browsing. Some paid antivirus will also update your other software packages, forming a more secure protection against attacks. For example, you might view a malicious image file that takes advantage of an exploit in your PDF software. Unfortunately, hackers have advanced beyond simple tactics and it’s not just about avoiding email attachments anymore.

Support:  Free antivirus options are the most popular choice because they’re…free. Obviously.  This also means there’s generally no support available. If there’s a problem or conflict with another program, you may find yourself without protection until it can be resolved. Paid antivirus options usually include telephone support, ready to help with problems ranging from installation to system diagnostics.

Ease of use: Depending on what you use your computer for, this may be an important concern. Free antivirus options are easy to install and use, but are very limited in their flexibility. They come as-is, with no guarantee, meaning you can’t pick and choose what it monitors or how it reacts. For example, users occasionally find it necessary to disable some protections in order to install a particular piece of software or for troubleshooting other problems. Paid versions are more likely to allow you to change the way it runs, switching features on and off as required.

Free antivirus is fine for very basic protection, those on a budget. In these cases, my opinion has always been “something is always better than nothing”. But I generally recommend you go with a paid antivirus to defend you from the new attacks that are released daily, and to ensure you’ve got solid protection that will make a real difference to your digital safety.


Wouldn’t it be great if an Anti-Virus company stood behind their product and got rid of that virus that slipped through the cracks? …We do!
Clever Technology uses Emsisoft Anti-Malware as its recommended paid virus protection platform. We’re so confident in its abilities to keep your computer virus free that we have developed the Clever Care Virus Protection Plan. For $99 we will provide you with a 1 year license of anti-virus for your computer, and if your computer becomes infected while under our care, we will remote in and clean it for FREE.

Virus Insurance for your computer, just without all the fine print.

Call us today!


  • -

Will That Click Cost You Thousands?

Category : Internet , Malware

Will That Click Cost You Thousands?

Ransomware has undeniably been the biggest security threat of 2016. No-one was safe. Hackers targeted everyone and everything, including home PCs – and they were astoundingly successful – earning themselves upwards of $846million from US reported incidents alone. Business is booming for hackers, with thousands of attacks each day bringing in an average of $640 per target. Perhaps even more alarmingly, the financial cost of each individual attack is on the rise – the more ransomware proves to be an easy earner for them, the more they demand each time.

For a quick payday, some hackers offer to ‘rescue’ you from immediate danger – for a fee. One method is to trick you into thinking you have a virus that will spread if you don’t pay money to remove it immediately. Another much scarier method is to pretend to be the FBI and say your computer was involved in a crime (anything from money laundering to child pornography) and you can avoid going to prison by paying a few hundred dollars.

Thousands of regular people are also waking up every day to discover they’ve been locked out of their own files. Entire music and video libraries, digital photos from the past 5 years, personal budget files and even their secret novel draft …all held hostage until the user pays a ransom. The encryption is so strong and unbreakable that paying the ransom often becomes the only solution.

The way ransomware gets onto your computer is deviously simple. Generally, the hackers convince you to click an email attachment/link or pop-up. With both approaches, the hacker usually offers helpful information, for example:

  • Tracking an unclaimed parcel
  • Alerting that a virus was found and needs to be removed
  • Advising details of a recent traffic fine

It’s so tempting to click through for more details and that’s what the hackers count on. Their messages and pop-ups aren’t obvious threats and so slip easily under our radar. Unfortunately, they’re not the most trustworthy bunch so paying may not actually unlock your files, and one payment can quickly become several.

To make matters worse, they can encrypt any backups connected to your computer too, like a USB drive. Having a backup is super important in any situation, but in cases like this, the right backup is needed. Not only one stored separate from your network, but one created recently with all the files you can’t bear to lose. Before restoring your backup, however, you’ll need to make sure the malware isn’t lurking in the background, ready to not just re-infect your restored files but also the backup drive itself.

To avoid finding yourself up to the waist in ransom demands or sending hackers money each month, we recommend being wary of email attachments, even from friends and family. If you’re not sure what the file is, don’t click it. They may not have sent that email intentionally; their infected system may be auto-emailing everyone in the address book. You should also be careful with any popups that appear out of place, especially ones that try to make you panic. If it doesn’t sound right or look right, don’t click it. Ransomware is just too dangerous to risk.

Call us to set your computer up with protections against ransomware, and put backups in place that will keep your important files safe. Get Me Protected


  • -
laptop showing love

How to love your laptop

Category : Uncategorized

5 Ways to Love Your Laptop (and Make It Last Longer)


Laptop computers are one of the most fragile pieces of tech you’ll ever buy, but they also receive the roughest treatment. Extend your laptop’s life with these five easy tips.

laptop showing love

 

Avoid sharp movements during use:  While some newer laptops have an SSD drive with no moving parts, many laptops still have mechanical drives which work a bit like a record player. It has a read/write head which is like the needle, and a data storage platter which is like the vinyl record itself. The head hovers just microns over the surface of the spinning disk and a knock or bump can cause them to collide. Just like a deep scratch on a record, whatever “music” was on that section will be corrupted and lost. Make sure you always power down the laptop before moving it or packing it away.Upgrading your hard drive to a new Solid State Drive is easier than you think and the performance boost is night and day.Your computer will go from being a mini-van to a Ferrari. For as little as $159 and a couple of hours, we can upgrade your computer and breathe a whole new life into it like you’ve never seen before.

 

Keep it cool: Your laptop has 2 sure ways of telling you when it’s too hot – the fan and auto-shut off.  Each component in your laptop is generating heat, and the harder it’s working, the more heat each creates. The fan runs to blow that heat out the vent and keep the components cool enough to continue operating. Because there’s no clear temperature indicator, your fan volume is the best guide to monitoring laptop heat. While the laptop is working hard (and getting hot), the fan will spin faster and louder.  It’s not uncommon for it to sound like a hair dryer at times! Help it out by keeping your fan vent clear of books, blankets, and other blockages. If you feel that your fan is running hard all the time, give us a call, it could be time to clean out the fan and the coils.

 

Respect the cords: Inside those robust looking power cords are a bunch of delicate wires, begging you to be gentle. You’d think they should be able to take a beating, get bent, twisted and run over with chair wheels, but unfortunately not. Keep cords clear of sharp or flat-edged items, and when wrapping for transport try to mimic how it came out of the box. Wrap the cord gently around itself or the power adapter and secure with Velcro or similar. If your cord is getting to the point it’s not working anymore, we can help. We can provide you with a replacement cord and get you back up and running.

 

Carry it in padded style: Look for a bag that not only fits your laptop but also provides padding. Your system will endure countless bumps and bangs as the bag is moved around, even with careful use. Ideally your bag has bottom, side AND top padding, as well as a waterproof outer. If backpacks aren’t your style, look for padded or hard-shelled sleeves. Need a recommendation? Give us a call.
Back it up: Laptops give us fantastic mobility but as mentioned above they’re quite fragile. While a backup won’t make your laptop components last longer, it will make minor repairs that much easier. You’re more likely to take it in for a service if your data is accessible elsewhere, and of course, in the event of accident or theft, you’re fully prepared. Consider an off-site backup for additional protection, so no matter what happens with your laptop you still have your important files. Clever Technology recommends BackBlaze  for a secure cloud backup solution. For as little as $50 a year you can have the confidence knowing that your important files are safe no matter what happens. You can download a free, unlimited 15 day trial so you can see how easy it is.

If your laptop just isn’t running right, having issues, or it’s time for your yearly service, give us a call, We can take care of things remotely, or we also offer a free local pick up and delivery.


  • -
snail and computer being slow

Why do computers slow down over time

Category : Uncategorized

Why Do Computers Slow Down Over Time?


Remember the awe you felt when you turned on your new computer and it loaded in a flash? Your computer was the envy of your friends and you weren’t afraid to bathe in that glory. The button on, ready to go, those were the days!

After a year or two, though, it doesn’t seem to be quite as zippy…no, you’re not imagining it. It really has slowed down, not just in comparison to newer models and your expectations…There’s a measurable drop in speed and power that has nothing to do with worn out parts. The good news is a little maintenance can have that baby cruising at top speed again. Let’s take a leisurely walk through the system and spot the culprits:

snail and computer being slow

Start-up applications: It’s super convenient to have Skype start automatically and your anti-virus too. In fact, many of the applications starting themselves with the computer are essential to your experience. But some of them are getting a little too ‘helpful’.

For example, iTunes helper loads in the background to speed things up when you connect your device – but if you can’t even remember the last time you ran iTunes on your computer, then it can go. Programs like that are holding onto a portion of your processing power and adding to your speed issues. The average home computer automatically loads around 75 programs at start-up!

Temporary junk: Computers are kind of messy. They leave temporary files and snippets of information all over your hard drive, each action leaving a trail rather like a roaming toddler with a sticky sandwich. Every web page, every image on that web page, every program you run and every game you play leaves something behind.

It may be the tidbits of information called “cookies”, saved game files, auto-restore files or even a log so that you can hit the undo button 100 times while it remembers your actions for you.

The more junk your computer builds up, the slower it gets.

Viruses and malware: These infections sit in the background consuming resources while doing various nightmarish things. They may be spying on your actions, stealing your information or reaching out through your network to infect others. Occasionally, the impact is limited to seeing your computer slow to a crawl, however, the flow-on financial costs of an infection can easily reach into the thousands.

Bloating: With every new version of software comes a new set of features, introductory sequences, and design improvements. The problem with this is the application becomes larger and larger with each new version, requiring more system resources to install and run – and slowing your computer down.


We’ve always used the analogy that a computer is like a car – They need regular maintenance just like your car needs an oil change, tire rotations, and the brakes done.

We offer a Tune-Up service to bring your computer back to its original speed and extend its life. Its economical, painless, and via remote support, it can be done while you wait.

Call today and we’ll schedule a time that is convenient for you.

417-233-1717


  • -
Samsung Solid State Drive

SSD Upgrade

Category : Uncategorized

Revive Your Slow Computer with an Easy Bottleneck Blitz


Old age creeps up slowly – unless you’re a computer.

Then it seems to happen overnight. One day you’re logging in normally and jumping right into the action, the next day booting up takes so long you not only have time to make a cup of coffee, you could have run out to the local café for the good stuff.

This is the stage where many people throw their hands in the air and start wishing for a new computer.

Except your computer isn’t broken and doesn’t need replacing, it’s just….slow.

Time-wasting, focus-losing, frustratingly slow. Like any machine, computers have parts that wear out – particularly if they have moving parts that are in near-constant use.

The hard drive is the #1 cause of speed bottlenecks in most computers.

Traditional hard drives are made up of a stack of round magnetic platters, spinning at up to 7200rpm, while a read/write head on a mechanical arm whizzes back and forth. Think of it like an old record player. Eventually, the platters take longer to spin up, unable to reach full throttle, and the mechanical arm becomes sluggish.

Which leaves you waiting. And waiting…

Samsung Solid State Drive

Samsung Solid State Drive

SSD’s Can Give Aging Computers A New Lease On Life

The new era of data storage is here with Solid State Drives – and they have no moving parts.

Zero. Zip. Zilch. Nada.

They’re actually a lot like your USB stick that continually takes a beating but still performs perfectly.

Making a simple upgrade to SSD can knock minutes (an eternity) off boot time, as well streamline regular computer operations with rapid fire functionality. Think of it this way…

As soon as you hit the power button and before you can sit down and get settled, your computer is booted up and waiting on you…For once, your computer is waiting on you!

They’re:

  • Cool – Don’t generate heat, which means other components also run more efficiently
  • Durable – No moving parts to wear out
  • Compact – A little larger and thicker than a credit card
  • Long-lasting – You’re actually more likely to replace your entire system before the SSD wears out
  • Lightning fast – Data is accessed instantly
  • Suitable for all systems– laptop, desktop and even netbooks
  • Battery Friendly – your laptop will run longer before having to be plugged in

Upgrading your tired hard drive to a super-fast SSD can often be done within one day.

Contact us today and we can get your computer blazing fast!

 


  • -
Cyber-criminal in Santa Suit

Holiday Shopping App Scams

Category : Uncategorized

The Holiday Shopping Season is here,
Learn How To Not Get Scammed

Fake Shopping Apps to Be aware of during 2016 holiday season

The biggest shopping weekend of the year is here. I’m sure you’ve noticed how many pre-Black Friday deals are already available. But for many consumers who shop on their cell phones (last year, mobile devices accounted for over 30% of online Black Friday sales and almost 50% of Cyber Monday sales), we recommend you do your due diligence.

The problem? Industry estimates show that two out of three retailers don’t have an iOS or Android app. That provides an incredibly easy opportunity for scammers to create fake apps using legitimate information and recognizable names, all in hopes of luring unsuspecting shoppers to fall for the fake app.

Here’s what you can do to protect yourself as this holiday season gets going.

1) Vet any shopping apps by visiting a retailer’s website. 
If you see an app for a brand you like in the Apple or Android app stores, don’t just download it blind — visit that retailer’s website to verify the app and then follow their link to its correct source.

2) Read those reviews! 
If the app you’re looking at seems fishy, chances are that will be reflected in the app’s reviews by those who’ve downloaded it before. And if there aren’t any reviews, beware — a good rule of thumb is “Don’t be the first to try a new app out,” just like you should rely on the advice of IT experts and not be the first to download a new operating system or software update.

3) Look out for misspellings and other typos.
This applies equally to the world of apps as it does to the world of phishing emails and other social engineering scams. If an appeal to download an app is riddled with odd language or misspelled words, it’s probably a fake. Professional developers and major retailers employ stringent quality control before they release an app. You can also look at the screenshots that are required to be included in an app store description — if they look grainy or low resolution, avoid downloading that app.

4) Avoid giving out too much information. 
This should be a no-brainer in our data breach-dominated day and age, but if an app requests a lot of info from the get-go (credit card numbers, access to photos or contacts), it’s probably a fraud. Accidentally granting permission like that is often just the mistake hackers are waiting for you to make.

5) Don’t click on any pop-up ads. 
This applies equally to websites as to apps, but any time you get a lot of irritating pop-up ads, use caution. Clicking on one of those can lead a user to an external illicit site that installs malware or other viruses on your device.

This holiday season, vigilance is required to stay safe on the digital front. If you plan on doing any shopping online or via smartphone app, make sure the portal you’re using is legitimate and safe by following the tips outlined above.


  • -
Pile of computers

Getting Rid of Your Old Computer

Category : Data Transfer

Don’t let your Hard Drive become a hackers playground!

Black Friday is upon us and many of you may end up purchasing a new computer and there’s one important fact I want to bring to your attention before you decide to throw away that old hunk of junk…

Computers often contain a wealth of personal information in the form of passwords, account numbers, and the like that nobody wants that information to fall into the wrong hands. Once your computer hits the trash, you don’t know what can happen to it and as the old saying goes, “it’s better to be safe than sorry”.
In the spirit of Black Friday, Clever Technology is offering a discount on our Data Transfer Service. Simply mention this post and we will transfer the data from your old computer to your new computer for $39.99. We can move all of your Documents, Music, Pictures, Favorites, Email’s, and so much more. In addition, for our valued clients, if you no longer need your old computer we will be happy to wipe the hard drive free of charge, and provide you a certificate of destruction upon request.

Also, Clever Technology offers the best Anti-Virus on the market powered by Emsisoft Anti-Malware. Call us today to learn more about how we work hard to keep your computers secure.

Clever Technology
417-233-1717