NEWS FROM THE EDGE

Tech Tips and Advice from the Experts at Dynamic Edge

You are in need of a computer for your office, for your kids, for your mom—fill in the blank. You head into Best Buy, Walmart, or the closest shop with at least a couple computer options. Prices seem reasonable and guess what? There’s a new operating system—one that hasn’t been advertised much.

When you’re at the store talking to a rep, you really don’t notice anything. You ask about Windows 10, they tell you it’s included!

So, as most would, you pull out your credit card or check book and make a purchase, assured that this is your computer and that, if needed, you can customize it with whatever software you want.

Come to find…

Your brand new computer now has Windows 10 S.

continue reading

To pay or not to pay the ransom?

That has been a major hurdle for organizations across the US. Local governments, manufacturing, accounting, even hospitals—have all ended up concluding that paying the ransom was the only way to get their systems up and running.

This dilemma—the one in which you will have to make a serious decision about whether you pay criminals to give back your data or recover in spite of them and their threats.

While in general, the FBI has stated time and time again to NOT PAY THE RANSOM—because in doing so you are waving a big red target stating that you’re willing to pay—not to mention the fact that you’re filling their coffers and allowing them to grow they cyber crime businesses.

The reality in 2019 is that many folks have succumbed to attacks and now are paying hefty ransoms either because their cyber insurance providers told them that’s all they’d be able to cover or because they had no other options (they simply weren’t prepared for a recovery effort).

Scores of municipalities and businesses caught with their networks frozen and ability to work halted have made the hard decision to pay the ransom.
continue reading

Have you been to the store lately and wondered why in the heck do certain computers—with seemingly similar specs—are priced so different?

The answer might lie in what processing chip is inside the machine.

As we get into addressing the Windows 7 chaos—that is the end of Windows 7 on January 14, 2020—we are facing a time where your organization will likely need to upgrade or replace old machines.

When you’re thinking about purchasing your next laptop or desktop computer, you might want to understand the differences between Intel and AMD chips.
continue reading

Is Your Computer Infected?

I’m sure you remember the last time you were sick. Maybe your head was pounding, your nose completely stopped up, as you recall, you might have had the worst cough in history. Fortunately, we are pretty good at battling infections—even if we have to sleep practically non-stop for a couple of days.

More than likely, our bodies will fight off whatever wasn’t welcome and we’re confident we’d get back to the daily grind pretty soon.

While your body is healing itself, the symptoms of that illness might be indicative of a variety of health issues.
continue reading

Your Many Problems With Email Blasts?

But, unfortunately, there are many problems.

Why are your emails missing their inboxes?

At this point in 2019, I’m sure most of you are aware of SPAM and SPAM filters. Depending on your email solution, you may be using a variety of different algorithms that automatically filter through your mail and determine whether something looks “spammy”.

Spam filters search and flag a variety of words and language, pictures, subjects, IP addresses, among other data encapsulated in your email, to determine whether it ends up in your inbox or in your junk or filtered-out mail.

Your email gets a spam score.
continue reading

Security is not getting any simpler. With more exploits targeting your users’ personal information, today more than ever before we need to make sure every single person on your team is vulnerable to a personal cyberattack, which may end up putting your business at risk.

Today, I want to go through some simple steps everyone on your team can take to protect their identity by being conscious of their Facebook security.

Here are 11 simple Facebook security tasks to ensure your teams are keeping their information safe online:
continue reading