Cleaning Out Your Computer to Free Up Space – Part 2
In our last article, we gave some great tips on how to free up space and let your computer run faster. Here, we will continue those tips and help you do the organizing needed for a thorough deep clean of your computer. Here we go! Deleting Apps If you are a Mac user, drag your unwanted programs an...
Stay Safe from Two of the Newest Ransomware Viruses
Ransomware is a beast for sure. It has a sneaky way of flying under the radar and is always changing so it's hard to detect it. To help you stay safe, we're letting you know of two new ransomware viruses that have recently come to our attention and could seriously impact your computers. You might k...
How to Understand the Terms of Common Computer Viruses
Part of owning a computer is having to deal with the different viruses and bugs that can corrupt your system. In this article, we will educate you about some common terms for computer viruses and what they mean. These terms can get used incorrectly so it's important for you to know what they mean an...
Cleaning Out Your Computer to Free Up Space – Part 1
If you are seeing that dreaded spinning rainbow wheel from your Mac or the inverted hourglass icon from Windows, then you may have a slow running computer that needs a little housework. It's easy to get bogged down in files, pictures and duplicate downloads and all of these can seriously slow down t...
Avoiding Online Scammers After the Orlando Shooting
It seems that scammers always come out in the wake of tragedies to exploit the generosity of people who are anxious to help the victims of these events. Unfortunately, it’s no different with the recent shootings in Orlando. The kindness of strangers is always a unique opportunity for the internet sc...
Tips for Downloading Software Safely
We all have to download software sometimes, and most of the time it’s because we purchased that software from a reputable company, and we don’t worry about the safety of the download. However, there are other times, we’re sort of “shooting in the dark,” and maybe it’s a free download we saw adverti...
Two-Factor Authentication Text Scam
Sometimes, in an effort for enhanced security, an account will require you to wait for a text alert on your phone, then you login using that code....
Why Outsource Your IT Provider?
It's a big decision for any business owner to decide whether to outsource your IT support or go with an in-house approach. Many factors go into this decision and we will help you know what you need to know in this article. First, let's look at the term known as outsourcing. The definition of outs...
The Most Common Types of Cyber Attacks in 2016
2016 presents more cyber threats than ever, but there are also more solutions than ever. Here at Tech Sentries, we're working hard to help you “Guard Your Technology” and stay protected and secure! The following are some great tips to help you get used to practicing “safe cyber” habits. Common Cybe...
The Greatest Offense is a Great Defense
There are safe programs that Tech Sentries considers approved for you to use in your computer work. It may happen that, once in a while, a program will be blocked that you really want. Don’t fret…that’s the robust nature of our security checks and this level of guard against malicious threats is unp...