503 769-2121 | csr@sctcweb.com

Questions about your internet technology? We’ve got answers.

We live in a connected world, and SCTC is here to help keep you connected. Whether in your home or at your business, make sure your internet and Wi-Fi are working consistently and efficiently. If you have questions about your internet service, our friendly technical support team is ready to help:


Below are tips to improve your online experience:

Give your device’s brain a fresh start

Icon
Why is rebooting my device important?

If you have ever had to call upon tech support for help with a device malfunctioning, you have likely heard the words uttered “Have you rebooted it?”.

Why is this the first thing that gets suggested? Well, our modern devices are smart. Sometimes, too smart. This odd state cannot be fixed without pulling the power… so to speak. That power cycle can give them a chance to get their tech-brains going again.

If this is something that you have tried when your router, computer, or other personal device is acting up. Just remember, that the professionals with MyITPro are here to help and are only a phone call away.

Quick shortcuts to open your favorite web pages

Icon
Be a master of website entering.

When you enter an address to get to your favorite website, do you enter the http:// or even www in the browser? This is the common for most folks and can sometimes cause us to type the wrong character and send us to a completely different site. There is a shortcut!

For example, if you wanted to visit SCTC, you could just type sctcweb.com and press Enter. One way to make this even faster, when you are visiting a .com address you can type sctcweb and then press Ctrl+Enter on your keyboard and the browser will fill in the full site https://www.sctcweb.com. Give it a try!!

Online attacks and how to avoid them

Icon
Malware, Ransomware, and Phishing, Oh My!

We often hear words that strike fear in the community of technology. Malware, Ransomware, and Phishing are all legitimate phrases that strike fear when mentioned…but what are they?

Let’s start with Malware, which simply put is not as common as it was three years ago. Malware is software that gets installed on your device with the intention to disrupt, damage, or steal your information. Because of the way that it infects, it is not as likely to be seen when the user stays aware of what is being installed and has safeguards in place to keep their device from becoming infected. Typically, Malware can be cleaned from a device with software or by bringing it to MyITPro technicians.

Now let’s talk about Ransomware. The scary term that is used in marketing and media to make us think that someone is doing everything in their power to corrupt us and hold all our precious files until we pay them. This method has often taken the place of Malware, because it can be a way for the “bad people” to make some money. According to recent reports, Ransomware is expected to become a nearly 2-billion-dollar industry. It is no wonder that we all need to be aware and fearful of this malicious activity.

The question is, how does one get infected? Ransomware typically infects through an attachment or link in an email (phishing, we’ll get there) or website that is malicious. Once the link or attachment is activated, the ransomware goes to work encrypting files. This can often be a situation where your Anti-Virus software does not get triggered because it is a file or link that the user initiated. Once the encryption commences, the user will experience a screen on their device notifying them that their files are lost UNLESS they pay.

Finally, lets dive into Phishing. These fraudulent emails come to us appearing as some entity that we trust or are meant to cause an emotional reaction that gets us to click a link or download an attachment. Phishing has quickly become one of the easiest ways for the “bad people” to infect users around the world. The term Phishing is simply sending out numerous lines (emails) until they get a bite on the hook. Reeling us in like a fish to exploit them into sharing info or infect our systems. Phishing emails can look like they are sent from trusted sources like Amazon, Google, Apple or even your co-worker and family members.

One common example is where an email appears to be from a trusted company, let’s say your bank. The email says that there is activity that requires your attention. Once you click the link in the email, you are directed to what appears to be the banks website. You enter your credentials only to receive an error that the site is having issues. When in reality, you have just given those credentials to the “bad people” who can now access your real account and lock you out. This method is used to portray themselves as well-known companies as well as people or entities that we are familiar with and receive emails from on a day-to-day basis.

Ultimately, each of these methods require one thing from us the user to stay safe. To slow down and take steps to become ever more aware of the threats that are being used to entrap us and infect our devices or steal our information. Check links by hovering your mouse to see if it is indeed the site we expect. Take time to look at the senders full email address, as many will be misspelled or from a completely different address.

Do you have more questions about your internet? Call us at 503 769-2121