Crowned Computer Services Logo
FOLLOW US
CALL US
(469) 454-8628
  • Home
  • About
  • Services
  • Blog
  • Contact

I just need a computer! – Know before you go

August 16, 2022 by S. Singleton

Have you ever walked into a store looking for something specific and the selection is very small? It’s annoying right? Sometimes I just go with what they have, to prevent going from store to store.

Before you go into your favorite electronic store or the electronic section of your favorite store, think back to that one question we asked before: What will you be using the computer for?

Answering this question will keep you on the right track. Once you are in the store it is easy to get distracted by the new shiny computers placed perfectly on the display with the specifications next to them. If you do not know what you want, you’ll end up walking out with something you do not need. If you do know what you want and it is not there, consider a custom build on the manufacturer’s website.

If you need help determining what to get, we’re always available to help.

Filed Under: Uncategorized

Share:

I just need a computer!

July 14, 2022 by S. Singleton

Your old computer finally stopped working and it’s well beyond the point of no return. It’s just time for a new one. Where do you even begin? Before you head to the electronic section of your favorite store and get bogged down with the technical specifications consider this:

• What will you be using the computer for?
Are you only browsing the internet? Playing the latest and greatest computer game? Maybe you’re typing documents or creating spreadsheets for work/school and storing them on the computer?
How you answer this single question will determine the type of computer you need to go for. Now take a look at the typical specifications:

CPU (Central processing unit) – Gives the computer all of the power it needs to work. It processes instructions from all of the software on the computer.
o If you’re using a particular software like Photoshop be sure to check the manual for details. If not, the i5 or i7 is good for basic use.

RAM – This memory is used by various applications and processes that are installed on the computer.
o 8GB, in my opinion, is a good starting point for basic use. If you’re gaming though you may find that 32-64GB will help everything run faster and smoothly.

Hard drive – determines how much space will be available for software programs, documents, pictures, music, etc. There are a couple of variations here.
o SSD (solid state drive) uses flash memory. Your computer will load much faster.
o HDD (hard disk drive) uses a mechanical arm on a spinning platter (think old school record player). While you can get larger amounts of storage for less, this is not as fast as the SSD.

Based on your specific use case you can get a general idea of what to go for. As always, we can always help. Happy shopping!

Filed Under: Uncategorized

Share:

Cyber security wrap up

June 20, 2022 by S. Singleton

As we close out our cyber security series let’s recap:

We all play a part in cyber security. It is not just the responsibility of businesses. If you own a computer, phone, or have smart devices in your home, you should be concerned with cyber security just as much as a business. Cyber attacks are very costly but not just in the sense of money. A cyber attack could cause you to lose precious memories that are often never recoverable.

Helping prevent cyber attacks involve simple things such as:
• Creating strong passwords and changing them regularly
• Updating your computer and other software when prompted, to close security gaps
• Avoiding plugging in random flash drives and charging cables as they may contain malicious code
• Being aware when people are phishing for your information
• Being cautious about the information we put on social media.

In 2022, let’s take cyber security seriously and realize that is everyone’s responsibility. Be safe out there!

Filed Under: Uncategorized

Share:

Cyber security at home?

May 13, 2022 by S. Singleton

How can we practice cyber security outside of work? We do this by bringing in some of the same practices we are taught in web trainings at work.

• Don’t click links in emails that come from people we don’t know
• Be careful of the information you share online and over the phone
• Use strong passwords
o Change these passwords monthly
o Don’t use the same passwords on all your online accounts
o Enable two factor authentication
• Keep your software up to date. Updates close any security gaps your software may have.
• Change the default settings on your devices including internet routers and IoT devices (smart
refrigerators, smart locks/doors and cameras).

Practicing cyber security at home is a must. Be sure you’re doing all you can to protect your home network and all the devices that are within it.

Filed Under: Uncategorized

Share:

Preventing cyber-attacks in the workplace

April 14, 2022 by S. Singleton

You just bought this beautiful new house and secured it with a fancy top of the line security system. There are cameras at all angles of the house including the front yard, back yard and one on the front door. On the way out for work you left the door unlocked. Later a thief walks right past the security cameras, into your home then takes whatever they want.

That’s kind of what it’s like in organizations. There are several solutions that are sold and bought to help tighten the security around the network. However, none of them are effective when the threat, whether intentional or not, could be coming from within. Therefore, one of the most important solutions that can be employed is user training.

Many organizations are requiring web-based training every quarter to remind users of the importance of cyber security. These trainings are becoming more interactive and entertaining to capture attention and bring awareness to the important subject.

Web-based security trainings help employees:
• Spot bogus emails
• Protect sensitive data leaving the organization
• Reiterate password security
• Learn laptop safety

Come back soon to learn more about cyber security at home.

Filed Under: Uncategorized

Share:

That’ll cost you!

March 14, 2022 by S. Singleton

Cyber attacks can result in the loss of data, productivity, equipment and money. Each year IBM releases a cost of data breach report. The 2021 report shows the average cost of company breaches was $4.2 million! This is up 10% percent from last year with an additional $1.07 million caused by those that are working from home. The most compromised type of data is PII (Personally Identifiable Information) which will cost an average of $180 per record that is illegally obtained.

In terms that more of us can relate to…

Imagine having your most precious memories stored on your computer with no backup. Pictures and videos of your kid’s first steps, birthday parties, vacations or loved ones that are no longer with us. One day you click a link in your email and suddenly you see a message on the screen that says, “Pay us $500 and we’ll release your computer.” That’s ransomware. Do you pay the money? Did you just cringe at the thought? I did!

Cyber attacks don’t just hit businesses. They hit home and they hit hard. If the proper precautions aren’t in place, it’ll cost you.

Filed Under: Uncategorized

Share:

Cyber Attacks

February 15, 2022 by S. Singleton

What is a cyber-attack? It’s an attempt to steal information. This can be done using a variety of methods, many of which we’ve covered before.

• Phishing – Hackers send emails that look legitimate, but they really aren’t.
• Passwords – Weak passwords that are easily hacked such as Password, 12345 or those that contain your name.
• IoT (internet of things) – Security cameras, smart thermostats, etc with little to no security setup.
• Unsecured wifi – Open networks gives the wrong person the chance to log in, lock you out and cause chaos.
• Malware – Probably the most common type of attack. Your computer system or network is susceptible to viruses, spyware or ransomware.
• Man in the middle – Without you ever knowing a hacker sits between your computer and the computer you’re sending your data back and forth to and is able to intercept it.

These types of attacks are dangerous whether it’s happening to you as an individual or a major corporation. Stay with us as we continue our journey…

Filed Under: Uncategorized

Share:

Cyber security is for everyone!

January 15, 2022 by S. Singleton

When I would hear the term cyber security, I always believed it was something only businesses had to be concerned about. It was probably because of all the movies I watched where some hacker was looking to steal top secret data from the companies.

As I’ve grown along this journey in the IT world, I’ve come to realize cybersecurity is for everyone! Cyber security is a term used to represent various methods of protecting data, networks, and devices from attacks. We’ve discussed many of these in previous posts.
Stay tuned as we discuss how it all fits together.

Filed Under: Uncategorized

Share:

Tis the season…for scammers

December 2, 2021 by S. Singleton

It’s the holidays! Time to break out the decorations, stock up on egg nog and binge watch all the classic holiday movies! It’s also time for SHOPPING! This is my favorite holiday of the year. Unfortunately, it’s the time of year when thieves are most prevalent.

Remember all the things we learned this year to protect yourself:
• Use two factor authentication on all accounts (especially those connected to your money!)
• Take it, lock it, hide it
• Do not click links in emails from strangers (You likely did not win $1000)
• Question anyone calling asking for your personal information over the phone.

Also, watch out for porch thieves. If you are having something delivered to your home be sure you are there for the delivery.

Wishing you all a safe and happy holiday!

Filed Under: Uncategorized

Share:

Pay now or you’re going to jail!

November 15, 2021 by S. Singleton

I cannot tell you how many phone calls and voicemails I’ve received lately from people claiming to be from the police department, insurance agency, law agencies, etc. Each of them telling some convincing story about how I need to pay this or that or someone is coming to get me. I’m then asked to verify my identity starting with my social security number.

In social engineering an individual is tricked into giving up their personal information. The example provided above is known as vishing (voice phishing). We talked about phishing before in terms of emails designed to trick you into clicking links that may be malicious. Vishing is something to be concerned about as well.

These master manipulators will say whatever they need to get your confidential information. Put them in the hot seat and start asking questions like “What is the name of the company you work for? What’s the company’s address? What’s your company’s website? Shouldn’t you already know that information?” Don’t fall victim to their attacks.

Filed Under: Uncategorized

Share:

  • « Previous Page
  • 1
  • …
  • 3
  • 4
  • 5
  • 6
  • 7
  • Next Page »

Copyright © 2025 · Crowned Computer Services · Powered by Tech Site Builder