Quality Computers

All Professionals No Geeks

CALL US
478-474-0861
2940 Riverside Drive
Macon, GA 31204
  • Home
  • Retail Store
  • Services
  • Blog
  • Contact
  • About
  • Testimonials

Facebook is for Sharing, Not Storing

February 17, 2020 by Quality Computer's Staff

When was the last time you held an actual photo album or actual prints of photographs in your hands? Maybe you look back at older photographs only when Facebook’s TimeHop app reminds you of a pic from five years ago. If so, you may be risking your visual history.

Facebook is a great way to share photos with friends and family around the world. You get to enjoy their comments and the affirmation of their likes. But using Facebook as storage for your photos is not a good plan. Here’s why.

Some people treat Facebook as their photo album archive. They delete the originals from their devices or digital camera when they need more space. But Facebook compresses images for faster download. It satisfies impatient social media users, which means photo quality suffers. If you wanted to print those photos in the future, they wouldn’t look as good as the originals.

That’s not the only drawback. When you trust Facebook with all your photos, you’re letting a company control your visual archive. It’s hard to imagine, given Facebook’s reach today, but what happens to your photos if the company goes defunct? We don’t know. The people who were keeping their photos on Myspace in 2006 might have an idea.

The younger crowd is already moving onto other social platforms. Plus, Facebook’s growth rate in North America and Europe is slowing. Those daily active users are the primary source of revenue. So, you know Mark Zuckerberg is in some meetings about that.

Even if Facebook continues as the business behemoth it is today, we don’t know what policy changes it might make. It could change its terms of service whenever it wanted (if you even read those in the first place). Users have no guarantee for how long Facebook will store their images or any type of content.

Keep in mind also that many of the photos showing up in your timeline are actually taken by friends. Facebook provides an entire album of other people’s photos when they’ve tagged you, but if they decided to untag you or remove it, that photo would be gone.

Finally, there’s also the risk of your account getting shut down or hacked. You’ve probably had friends warn you not to accept any new friend requests from them because they’ve been compromised. You wouldn’t want a thief to steal all your photo albums. Similarly, you don’t want a cybercriminal to gain access to all your images.

Our Recommendation

Just as with data, we recommend you have a “3-2-1” backup system for your digital photographs. This means having three copies of the photos you care about. You don’t need to back up the blurry ones if you don’t want to.

You might keep one copy on the original device, but you’d have two other copies of the high-quality, uncompressed, original image as well. One might be kept on an external storage device such as a USB thumb drive, and the other you could upload to cloud storage.

The cloud backup gives you access to the photos from any device in any location. So, if a flood, hurricane, or fire devastates your home, and you lose your device and the USB thumb drive, you still have a backup. Your Facebook photos and videos are just there to be shared with friends and family.

Not sure where or how to safely store your photos and videos? We can help! Our experts may even become new Facebook friends. Then we can all like each other’s photos with the peace of mind that the original photos aren’t going anywhere.

Filed Under: Newsletter, Uncategorized Tagged With: #bestservice, #qualitycomputers, consumer, data loss, online safety, service

Share:

How to Destroy Data Properly

December 30, 2019 by Quality Computer's Staff

How to Destroy Data Properly

When we accidentally delete something, it feels like the end of the world. If a client file or new presentation is deleted, you may have to start again. Oh no! Yet deleting files is not as permanent as you may think. When it comes to destroying data properly, you’ll want to take a more thorough approach.

Deleting items, or “trashing” them, doesn’t permanently remove them from computer memory. While the data is still stored on your device’s hard disk, it’s possible someone could restore that deleted data.

Data does reach a point at which it’s no longer useful, and you are no longer required to maintain it. Nevertheless, it may still be valuable to cybercriminals. Bad actors can use names, addresses, credit card numbers, banking accounts, or health data. You need a policy to destroy paper records, magnetic media, hard drives, and any storage media.

Your obligation to protect customer and staff information extends to properly destroying all identifying data. Installing a new operating system isn’t going to do it. Encryption doesn’t do the job if the cybercriminal can figure out the password.

Some industries require you to prove you have correctly destroyed all data. Even if you have no compliance standards to meet, carefully dispose of any computer-related device. Whenever you are recycling, discarding, or donating an old computer, disk drive, USB stick, or mobile device, make sure the data is already properly deleted or destroyed. Otherwise, criminals could get their hands on confidential business information.

Fully, Safely Destroying Your Data

So, what do we mean by “properly” destroyed? You know about shredding paper documents. You can actually do the same with some devices. You might send the computer or device to a company with a mega-shredder. When compliance matters, keep a record of the chain of custody of the data throughout the process.

Overwriting the data, often called zeroing, is another solution. No data is properly deleted until it’s written over – that’s where the information is hidden under layers of nonsensical data and cannot be retrieved through disk or file recovery utilities. Think of this as writing three new books over the top of the pages of an erased book rather than just ripping the pages out.

With magnetic devices, you can neutralize the magnetism (degaussing) to break down the data. This scrambles up the data beyond recovery. A strong degausser will turn the device into a shiny metallic paper weight. An ultraviolet erase could be necessary for some erasable programmable memory. You might also need to perform a full chip erase.

If you’re really committed to destroying data, physically destroy the device. There’s the shredding solution, or you might actually pay to have the device smelted or pulverized.

Other Components to Destroy with Data

Don’t forget proper disposal of printers, too. Run several pages of unimportant information (maybe a font test) before destroying a laser printer. With an impact printer (if you still have one!), you’d want to destroy all ribbons, too.

One last element you might think about? Business monitors. You’ve probably seen a computer screen with information burned onto it. Before donating or recycling a monitor, inspect the screen surface and destroy the cathode ray tube.

Now, that’s what we call being thorough about properly destroying data. Need help with proper disposal of computer data or equipment?

We can help. Contact our experts today at 478-474-0861!

Filed Under: Uncategorized Tagged With: #bestservice, #qualitycomputers, bad hard drive, computer repair, consumer, data loss, data recovery, Hacker, service, small business

Share:

Handle with Care: Sending Data Securely

November 4, 2019 by Quality Computer's Staff

In our digital economy, we send and receive information quickly online. The Internet offers immediate communication with colleagues, clients, vendors, and other strategic partners. Yet we shouldn’t prioritize convenience over data security.

What data do you send in a day’s worth of emails? Sensitive data you send might include:

  • personally identifiable information (PII);
  • credit card or payment card information;
  • attorney’s client privileged information;
  • IT security information;
  • protected health information;
  • human subject research;
  • loan or job application data;
  • proprietary business knowledge.

The problem is people sending without thinking about the security of the transmission. One way to gauge the need for security is to consider how you might send that same information via the postal service. Would you put that data on a postcard that anyone could read? Or would you send a sealed, certified mailing and require the recipient’s signature?

Transmitting data on the Internet in plain text is like the postcard – anyone can read the information. And before you think that no one can actually see your data in transit, think about where you are sending from. Your office network may be password protected and secure, but what if someone waiting for their coffee at Starbucks opens the message using the free Wi-Fi network?

Anyone can intercept communications on open networks with the right tools. This type of cyberattack is common enough to merit its own name: a “man-in-the-middle” attack.

So, how can you stay safe when sending sensitive data?

Embrace encryption. Encrypting the data is like sending that sensitive information in a locked box. Encryption encodes the information to add a level of security. If encrypted data is intercepted, the scrambled data is unreadable by unauthorized users. Only a user with the correct decryption key can access the text.

Encryption also provides additional confirmation that the information is coming from a reliable source.

Your business should also require Secure File Transfer Protocol (SFTP) for sending and receiving large or numerous digital files. You may have heard of FTP, but this file transfer protocol is not encrypted. SFTP is the secure version of FTP, as it encrypts the files in transit. If a nefarious entity does intercept the files, it won’t be able to read them without the decryption key.

Specifically, encourage your employees to:

  • use encrypted email only (common providers such as Gmail and Outlook support it; others require third-party apps or services);
  • encrypt files before sending to the cloud (in case accounts are breached or services hacked);
  • never open business communications on unsecured Wi-Fi networks;
  • keep good track of laptops and other portable devices and use drive encryption in case – with encryption, a lost laptop or stolen thumb drive is more secure, and criminals will have a difficult time stealing sensitive information, too;
  • control data access – grant permission to view, edit, or send files with sensitive information only to users who need that data for their jobs.

Managed service providers help your business decrypt how to send its sensitive information. Turn to experts in cloud services and IT security to learn how to securely send and receive data.

Contact us today at 478-474-0861!

Filed Under: Newsletter Tagged With: #bestservice, #computerrepair, cloud, data loss, online safety, QualityCareSuite, remote support, service, small business

Share:

Loving your External Hard Drive

July 15, 2019 by Quality Computer's Staff

External hard drives free up storage, offer portability, and provide a lifeline in case of computer disaster. It pays to take good care of these compact, convenient devices.
Here are some helpful strategies.

1. Don’t knock the drive.

Depending on the type of drive you have, impact could damage it. The hard drive’s mechanical drives work a little like a record player. Envision a spinning platter and a needle reading it. Note, you don’t have to worry about this with a Solid State Drive (SSD) as there are no moving parts.

2. Don’t pull.

You can damage the drive port with a hard or sideways yank on its USB plug. Remove the device cable with a gentle pull. It’s best to unplug the drive cable when it’s not in use. Then, when you are reconnecting the external drive, inspect the connector before plugging the cable back in. Look for any damage, debris, or corrosion to help maximize the device’s lifespan.

3. Don’t skip steps.

You may be in a hurry, but always take the time to remove the hard drive from your desktop before physically unplugging it. On Windows, you’ll usually right click on the drive and press Eject. For Macs, you can drag the drive icon to the recycle bin (which changes to an eject button). Never unplug the drive while moving data to or from the hard drive unless you want to risk data corruption.

4. Don’t suffocate the drive.

Ever put your hand on the hard drive after prolonged use? It’s hot. Don’t immediately store it away in a bag or tight space. Give it some time to cool off first.

When it’s out, and in use, keep the drive’s vents clear of other objects so that it has some airflow. Set it on a flat, level surface. Avoid placing it on paper, towels, or other cloth items that could add to its heat levels.

5. Don’t take the drive swimming.

OK, you’re probably not going to do that. Yet it’s our way of reminding you that condensation is an enemy to your hard drive. Hard drive failures can be caused by environmental factors such as temperature and air quality too.

6. Don’t expect immortality or invincibility.

A hard drive isn’t going to last forever. They aren’t built for that. They can also get lost or stolen. Don’t let one external hard drive be the only place you are backing up your data.
Have a backup on your computer, on the drive, and a copy in the cloud. Then, you’ll always be ready to move on to a new drive that you will love with the same care and consideration outlined above.

If you need help deciding on the best hard drive for your needs, give us a call at 478-474-0861.

Filed Under: Uncategorized Tagged With: backup, cloud, computer repair, consumer, data loss, data recovery, recover data

Share:

External Drives Are NOT Backups

April 12, 2019 by Quality Computer's Staff

Public Service Announcement:
If the ONLY copy of your Data is on that External Drive
THAT IS NOT A BACKUP!!
We can Help You Pick a Cloud Storage Company.
We are the best at data recovery and computer repair in Macon, It is just not fun.

Filed Under: Uncategorized Tagged With: backup, bad hard drive, data loss, data recovery, recover data

Share:

VISIT US

Recent Posts

  • How to Stay Focused Working from Home
  • “So Slow!” Is it your Computer or your Internet Connection?
  • Is Your Tech Partner a Team Player?
  • 5 Best Practices for Buying Technology for Employees
  • How to Get Your Devices to Play Nicely Together: Home Networking Help

Recent Comments

    Archives

    • April 2020
    • March 2020
    • February 2020
    • January 2020
    • December 2019
    • November 2019
    • October 2019
    • September 2019
    • August 2019
    • July 2019
    • June 2019
    • May 2019
    • April 2019
    • February 2019
    • August 2018

    FOLLOW US

    Recent Posts

    • How to Stay Focused Working from Home April 28, 2020
    • “So Slow!” Is it your Computer or your Internet Connection? April 13, 2020
    • Is Your Tech Partner a Team Player? April 6, 2020
    • 5 Best Practices for Buying Technology for Employees March 30, 2020
    • How to Get Your Devices to Play Nicely Together: Home Networking Help March 23, 2020

    Tags

    #bestservice #computerrepair #coronavirus #covid19 #IT #nocontract #qualitycomputers #remoteworkforce #remoteworking backup bad hard drive cloud computer repair consumer data loss data recovery email Hacker msp new computer new laptop online safety QualityCareSuite recover data remote support repair sale scam service small business Webcam

    Copyright © 2022 · Quality Computers · 2940 Riverside Drive, Macon, GA 31204