Help! I’ve Been Scammed

Help! I’ve Been Scammed…Contributed by RescuTechs

Have you fallen victim to a PC support scam? Did you get a message on your screen urgently telling you to call the number on your screen, or you receive a call from someone claiming to be from Windows Support telling you your computer is sending out SPAM, or errors or possibly reporting a virus?

During the call, you get the feeling that something doesn’t seem right, but the person on the other end sounds polite and extremely eager to help you with your problem. In order to prove their case they will ask you to open your Windows Event Viewer and download TeamViewer or some other remote desktop control software so that they can connect to your computer to show you the errors and “fix” your problem. They will also ask for your credit card information so they can charge a small fee for their service.

If any of this sounds familiar, you have been victimized by the PC Support Scam, also known as the Ammyy Scam, Fake Microsoft Support Scam, TeamViewer Scam, or Tech Support Scam. The names may change, but these scams have been going on for years and have swindled millions of trusting people.

What do you do now?

The first step is to call your bank or credit card company as soon as possible. They more than likely have experience with scams and will be able to tell you what they can do about the fraudulent charges and adding a security alert on your account. If they do not offer to issue a new card to you, you should request one.

Once the charges are taken care of, the next step is taking care of your computer. It is critical to isolate your computer, especially if they successfully took control of your computer system. Turn off your computer. Or, at least physically disconnect your computer system from the Internet. Although you are no longer on the phone with them, the remote desktop control software may still be providing them with access to your computer. As well, they could install viruses or malware that that could harm your computer, cause data loss, or provide them ongoing access to your computer.

Then, you should engage the services of a reputable and skilled computer technician to remove any and all traces of malware and viruses. This may require the backing up all of your data and re-installing the computer’s operating system, or performing a complete system restore operation. When someone takes full control of your computer system, there is no limit to what they can do. You want to make certain that there was nothing left behind to cause you problems later on.

Once your computer has been restored, be sure to change your passwords. You may want to sign up for identity theft or credit monitoring protection so you will be alerted as soon as anyone tries to your financial or personal information.

Educate Yourself

Education is key to protecting yourself from scams. Learn from your mistakes because you can bet that the scammers are learning from theirs. They are constantly changing tactics, refining what works and discarding what doesn’t. Unfortunately, these scammers stay in business because we fall victim to the scams.

The PC or Microsoft Support scam has fooled many people because we tend to believe what we see.   Typically your caller ID will read Microsoft support or something to that effect. What many people don’t know is that scammers will trick you by using ”spoof” caller ID information which lends credibility.

The scammer will log into the spoofing service provider site. They will enter the phone number of the intended victim and give the fake or spoof information that they want to show up as the caller ID. The victim sees the fake caller ID believing it is real and they are now connected to the scammer.

It is illegal to falsify caller ID information, so if you believe a caller is trying to scam you and they have spoofed the caller ID, you can report it to the Federal Communications Commission. Do not give your credit card information to someone who has called you that you do not know. If you are unsure of the person on the other end of the line, get a call back number then look it up to see if they are legitimate or if the number is associated with a known scam.

Arm yourself with knowledge and keep these scammers at bay.


What’s the best way to prevent viruses

As a computer repair shop, we’ve seen our fair share of viruses.  And when our CEO asked everyone what we all personally believed to be the best way to protect yourself from malware and viruses in general, the answer was pretty one-sided. Common sense.

Common Sense

More than anything else, the best way to protect yourself online is by using common sense. Be careful what you’re clicking on, what attachments you’re opening, what you’re downloading, and who you’re trusting. Common sense is a really ambiguous term though, so here are some specific tips to help you out.

Browse with caution

Browsing with caution doesn’t necessarily mean being afraid to open up Yahoo or CNBC, but if you think a website or email looks sketchy or out-of-place, maybe skip it.  Phishing can take many forms: a Nigerian prince asking for money is obviously a ploy, but “Well’s Fargo” sending you an email saying you need to verify your information in the next 24 hours or they’ll close your account isn’t quite as obvious.  When in doubt, look for signs to verify the email is legitmate, like a phone number or contact information at the bottom of the email and verify that it matches with Wells Fargo’s actual number.

Make sure you’re on the right website

Take a quick look at a website’s domain to make sure you’re on the correct site before you submit personal information or download anything.  If you’re going to download Microsoft Office, make sure you’re on, not  It’s a small detail, but that’s exactly how people get malicious software.

Check for an SSL certificate

An additional security measure on websites is having an SSL Certificate (Secure Sockets Layer).  That’s the little lock next to the website’s name:


It essentially just means that any information sent to or from that website will be encrypted and is therefore much harder to access for any 3rd party.

Don’t click sketchy ads

If you’re going to websites to illegally stream your favorite shows or sports, you should probably be cautious, use an adblocker, and don’t click the ads you DO see on the page.  But if you’re the type of person to go to those websites, you probably know that already.

When all else fails: use your common sense. If something doesn’t feel right, it probably isn’t.

Our favorite antivirus = Windows Defender

Windows Defender is a program that comes on every Windows computer with Windows 8 or newer (also called Microsoft Security Essentials) and it does a pretty decent job. It’s downloadable for all Windows computers with older operating systems as well.

Why paid antivirus solutions come up short

Besides using common sense, you still need an antivirus. But that doesn’t mean you need a paid antivirus.

Essentially, many of those common “big” antivirus programs do exactly what you want to prevent: slow down your computer.  They often force bloatware onto your computer or make you download extensions that make your browser slow and clunky. It’s pretty ironic that the programs you’re downloading to STOP your computer from slowing down/having pop-ups will have the opposite effect.  If you don’t want to be constantly pestered by your antivirus your best bet is to just stick with the security your computer came with, because it’s definitely good enough.

Why Windows Defender is the best

How to Geek says it caught 99.9% of all “widespread and prevalent” malware.  According to them, it may not hit quite as many benchmarks as some paid options, but it’s good enough.  Frankly, you won’t notice any difference in protection between Windows Defender and Norton/AVG/McAfee.  What you WILL notice though, is how annoying that paid antivirus program is.

Windows Defender is smooth and runs in the background while it does its job. It will give you the rare notification that isn’t invasive or distracting, but that’s how you know it’s working. Plus, it’s free. And unless you really feel like financially supporting the antivirus community, free is always better.

Now that DOESN’T mean that you’re 100% protected all the time. Viruses and malware are persistent and you are always at risk of being infected – whether you have an additional antivirus program or not.

Even more protection: monthly Malware Scans

If you really want to double down and cover all of your bases, you can use a malware scanner once a month (or once every few months) to ensure that you haven’t picked up any malicious software. Malwarebytes has developed a good reputation for routine malware scanning, and they have both free and paid versions.

If you go with a scanner that is manually controlled – which we would recommend since you are already running Windows Defender in the background – just remember to use it. It’s not helping you if the icon is just sitting on your desktop. Make sure to run it every now and then!


These suggestions are for the average user for their personal computer. Large and medium businesses are obviously at more risk and will require more layers of protection for their network, because they have more to lose and attackers have more to gain.  However for personal use, most paid antiviruses hurt more than they help and you just shouldn’t worry about it too much.  Browse with common sense and stick with the basics.

Worst case scenario: a virus removal from a computer repair shop just like ours is always an option. If that doesn’t do the trick, a system reinstall will cure your sick computer and have it back up to speed in no time.

The Lifespan of a Laptop, and when you should consider a laptop repair

Fort Collins Laptop Repair

Laptops don’t last forever. That’s not groundbreaking news, however, you’re not alone if you’re wondering just how long a laptop should last, whether it’s time to buy a new laptop, or whether it is worth your time and money for a laptop repair on a laptop that is running extremely slow.
Tech experts generally agree that a laptop should last anywhere between three to five years before needing to be replaced. Of course, there are a number of factors that play into this number, including intended use, software maintenance, usage patterns, and computing power.
Don’t Panic IT Solutions tells us the factors that play into the lifespan of your laptop, and whether or not you should consider a laptop repair or replacement.

Intended Use
Perhaps the most important factor in determining whether or not you need to buy a new laptop is your intended use. If you are using your laptop primarily for simple tasks such as writing, creating spreadsheets, or putting together a PowerPoint presentation, you may be able to “repair” the laptop you already have (more on this later).
If you are wanting to use your laptop for state-of-the-art programs, apps, or gaming, you may experience significant slowdown or compatibility issues unless you decide to purchase a new laptop, or put a good deal of money into upgrading the laptop you already have.

Software Maintenance
If you don’t want to spend a good deal of money on upgrading your laptop and you’re not quite ready to make the leap to buying a new laptop, there are a number of things you can do to help prolong your laptop’s lifespan. One of the best things you can do would be to update your software, your operating system, or your security software.
It’s no secret that viruses and malware slow down the processing speed of your laptop and significantly shorten its expected lifespan. Staying up-to-date with your security software and protecting your laptop’s system is crucial in prolonging it’s expected lifespan. It is also crucial to stay on top of BIOS and driver updates. These updates help your laptop to work “behind the scenes”, interfacing with your laptop’s hardware to fix common problems that crop up, solve compatibility issues, and improve functionality.

Usage Patterns
Obviously the way you use your laptop can extend or decrease its lifespan. If you always leave your laptop on, it is likely that it will need maintenance or repairs much quicker than laptops that are only on while being used (fan failure or hard drive replacement are common repairs for laptops that are used like this).
Keeping your laptop in a cool space may prolong its lifespan slightly as the internal components (such as the fans) won’t have to work as hard to function properly. Similarly, laptop batteries can only be charged so many times before they begin to fail. Typically, a laptop battery starts to deteriorate after a few hundred charge cycles. Replacing your laptop battery would be the most common laptop repair that you might need during its regular lifespan. To increase your laptop’s battery life, try to avoid leaving it plugged in all the time, and only charge it when it needs battery life.

Computing Power
The most common end of a laptop’s lifespan is related to the processing speed, or when the laptop’s memory becomes inadequate for modern software. Tech experts estimate that computing power doubles approximately every two years.
Software capability increases generally in tandem with computing power, which naturally makes older laptops obsolete over time. If you are using your laptop primarily for simple tasks (as mentioned earlier), you could “repair” your laptop that is slowing down by purchasing and installing more RAM or a new hard drive until you decide to purchase a new laptop. Unfortunately., these are usually the only components of laptops that can be upgraded or repaired as other hardware replacement is difficult to perform or not cost effective to pay someone else to perform.
It is inevitable; however, that your laptop’s computing power will be outdated by the software that tech companies continue to put out. Keep this in mind as you make the decision on whether to upgrade / update or repair your current laptop versus purchase a new laptop that will last you the next three to five years.

Computer Repair vs. Buying a New Computer

The following post has been shared by Garrett Tate of Don’t Panic IT Solutions, a Fort Collins Colorado computer repair company

Computer Repair vs. Buying a New Computer

We have all been there. Your trusty PC just doesn’t have the get up and go that it used to. You shop around for a replacement, but the prices you find send you right back to your old machine. Then it happens. One day your computer finally gives up the ghost, and you are left with a decision. Repair or replace? The age-old question of home computing.

I should tell you that I build computers for fun. There was a time that this hobby saved me a bit of money. However, those times have changed. Lately, I have been purchasing new computers because the prices have come down and the costs of parts have gone up. But that is for an entire machine. For repairs, it is often far cheaper to fix the computer than replace the entire unit, especially if your budget does not allow you to upgrade to a better PC.

Ignorance is not Bliss. It Costs You Money

The greatest obstacle to repairing a computer is ignorance of how computers are made. Yes, many of the components are very complicated, but you will not be working on those. Repairing the hardware of a computer normally means swapping out a bad part for a good one. And swapping out parts in a computer is easy because they are modular.

The Power of Modular Assembly

In modular design, a PC is just a framework for different parts to be plugged into. Computers use a very limited number of interfaces, or sockets and plugs. Most parts will fit into most machines. This means that if your computer dies and you decipher that the power supply is to blame, you can buy a new power supply and plug it into the remaining good parts. Voila! Computer repaired for around 30 bucks. All in around the same time it would take you to change a car’s battery. Sounds simple, right? It should because it is.

A friend called me to say he needed a new computer and wanted my advice. After gathering some facts, I offered to fix his slow, crashing PC if he would buy a $50-dollar part. He agreed so one afternoon I spent about fifteen minutes installing some solid-state memory in his machine and reorganizing where he kept his operating system and where he stored his thousands of image files. When I finished, his three-year-old PC was back on track, and I was a hero.

Home Computer Repair is Not Brain Surgery, but it Does Require the Power of Google

Neither of the problems above required any engineering training or exceptional intelligence to solve. I have neither. The solutions to each issue were found by searching Google and watching a YouTube video. The installation of the parts falls about at Lego level on the construction expertise scale. Seriously, anyone can do this. It just requires firmly believing that if something is already broken, it is hard to make it much worse. The cost of the part is the only real gamble.

Sometimes Repair is Not Worth the Time or Money

Occasionally I run into an issue where the cost of the parts, the age of the machine, or the amount of time required for the repair do not justify the project. That is when I shop for a new machine. But, I do not buy the latest greatest thing out there. I get a big case, and a solid CPU and the included operating system. Everything else I just upgrade along the way. Piece by piece.


10 Most Common Security Attacks That Will Kill Your WordPress Blog

Your WordPress blog is like your home online. You must take care of it to prevent unauthorized access and other security attacks. Failure to do so can lead to the downfall of your blog as whoever gets access to it or its code may control it and do whatever they want.

As a blog owner, you must learn about the security threats that you may face on your WordPress blog. There are several of them so you must always be on the look-out and do everything you can to prevent your site from being a victim of an attack.

Shared hosting is common nowadays. You share the hosting server with other users, making it possible for hackers to use any unsecured connection within the shared network, leaving your blog vulnerable to security problems. Consider going for one that is not shared or at least ensure that the shared server has strong security protection.

Hackers who successfully gain access to your code or account may also cause users to be redirected to other sites when accessing your blog. This can be a huge issue as your audience will not be able to access your blog and they might get tired trying if they cannot reach it.

There are more blog threats out there that you must be aware of. We listed some of the most common in an infographic so you can take the step to avoid them.

See our organized and informative image below to protect your blog from these security attacks.

10 Most Common Security Attacks That Will Kill Your WordPress Blog (SBO)

Hiring and Managing your Computer Repair Shop Employees

Fort Collins Computer Repair Company
Fort Collins Computer Repair Company

This is a guest contribution from Garrett Tate of Don’t Panic IT Solutions, located in Fort Collins, CO

Hiring and Managing your Computer Repair Shop Employees

As a business owner since 2003, we have been through the ringer with employees. Sure, starting out, we were just doing all the computer repair and IT services work ourselves. I remember going into multiple businesses knowing that I was going to spend hour after hour simply setting up the servers and then the countless hours it was going to take to monitor and administer everything for that specific business. 16 hour days were the norm, I was tired, and I knew that I couldn’t sustain the long hours.

Fast forward 14 years, and we have been through 3 different storefronts, and have a very successful business. Looking back, there were the highs and lows, but every single long hour was worth it to build what we can now have. We are so proud to offer a valuable resource, whether that’s computer repair, managed it services, or just lending an ear to people who call in to help walk them through a simple issue.

What’s helped so much after the initial trials and tribulations are our coveted employees. We have been very fortunate to have many great employees, some who have stayed with us for many years. We have seen some employees that weren’t the greatest fits, and to be honest that was nobody’s fault but our own.

And that’s the reason why I’m writing this post. I want to help you, the computer repair shop owner, make sure that you have the resources to not only hire but manage the right people. If you can take one, or maybe all of the items listed below and apply them into your business, you will be on the winning side of things to come.

First, let’s talk about hiring:

  1. Hire based on Evidence. Not based on Enthusiasm. We took this piece of advice from Darren Hardy, and we wish we had made this the number one hiring thought right out of the gate! We hired one of our first employees because he was so happy, enthusiastic, and we thought he would draw customers in because of his charming personality. The problem was, he didn’t have the requisite skills to even send out emails, let alone work on computer. That hire didn’t last long, but we have gotten much better about making sure we read a resume and understand someone’s skills before pulling the trigger.
  2. Be Clear about what you want. As a hiring employer, we have to be incredibly crystal clear about what we are hiring for. If we need someone to be client facing and go into businesses to diagnose network problems, we have to make sure not only that they are pleasant to be around, but that they know how to look at a network and diagnose a problem. There are so many tools that we can use that will help us perform the network diagnostics, but if we hire someone that does not have that skill, they simply won’t last long. Make sure that wherever you post your hiring ad, you detail every single technical skill that your prospective employee must have, any soft skills that would be requirements, and discuss with your team anything that you may have left out.
  3. Ask your Advisors! I belong to a rotary club. You might have a few people you can trust either in a networking group, or, if you are really unsure, ask a trusted family member what they think your best hiring practices should be. You can run your interview questions by them, and ask them if they would recommend asking different questions or expounding on your current ones.

Now that you’ve got some great tips for hiring, here’s some tips for managing your employees:

  1. Make sure you put them in the best position to succeed. If your employees are better at repairing computers than speaking with customers, they might be better served being back in the shop working on motherboards. If you have an employee who is well spoken, smiles a lot, and gives a great handshake, maybe they can be in charge of your client interaction. If you are interchanging roles between two people who have different skills, and they are not a good fit for an alternative role, simply take them and put them in the best place where they can help you, and ultimately grow.
  2. Have weekly or monthly one-on-one meetings with your employees. Asking key questions about how they are feeling about working with or for you can work wonders with employees. They will not only feel like they are valued, but they won’t be afraid to speak with their boss – you, about problems when they come up. If you are offering a new server administration service, and one of your current employees is qualified to fill that role, you may be able to figure out that information through your weekly or monthly meetings.
  3. Compensate well. As the boss, you see the numbers for your computer repair business. You know how many clients you need to blow past your bottom line, and you know what your breakeven is. If and when you succeed, make sure that you give your guys in the shop a raise or a bonus. If they upsell a popular remote support service after they sell a PC, give them a little bonus for the improved performance. They will not only want to stay longer, but ask how they can sell more to earn more, which also benefits the business.

We have been fortunate to have some great employees stay around for a long time, and because of them, our computer repair and IT company has become a mainstay in Fort Collins.

Ways You Can Reuse Your Office Gadgets

Ways You Can Reuse Your Office Gadgets


There are many ways to minimize business expenses, the best is to reuse and recycle the old office gadgets that are of no use.  Recycling items is very common to people but what probably people don’t know is there are many ways to reuse the gadgets. Reusing the office gadgets is the best way to save money. After all, it is the same material that you are using, only the need of the material is changed, we are using it for some other kind of need. Reusing the gadgets also shows your creativity.

How to reuse office gadgets:

Office supplies often goes sold in bulk. Help keep needy items from collecting dust or going to waste by following adopting creative ways to reuse and recycle those things. There are many ways to reuse and recycle the used or unusable gadgets in your office. Here are few ideas that you can try out. Read on the ideas:

1.  Making and using old tablets as e-readers: If you are still using the old and junk computers for business purpose, then it is time for you and your office mates to switch over to old tablets. You and your rest of the office people can use old tablets in order to read the materials that are needed for the business. Using tablets as e-readers will make it easy and comfortable for you to get the reading done. If you have some old tablets than replace them with old and worn out computers.

2.  Media Player as Storage Device: Flash Drives and Portable media devices are considered to be the most misplaced gadget in the office. If by chance it goes missing then there is no need to buy a new one. Simply find an old media player, and use it to store, transfer and save office data. The capacity of media player is very large and they are capable of storing bulks of data. Thus it can perform dual operations. We can hear music through them and at the same time can use it as a storage device.

3.  Using old computer monitors as TV screens:  If next time, the TV of the office goes burst, you can look for an old computer monitor and can replace it with the broken screen. Thus the monitor can be used as are placement for the TV. It can give both you and your ofice mates a relaxed space to breathe. Thus it is advisable to place the TV in the floor’s common area or in a office pantry.

4.  Using old CCTV as spare parts: Repairing a worn out CCTV will cost more money as its parts are expensive. What best can be done is to take that CCTV, break it apart, cut the spare parts out and use those parts to maintain and upgrade the other things in the system of CCTV. Thus in this way one can save money on buying the new parts. Thus the technique is very cost effective and it will also show creativity of oneself.

5.  Help others: It is often said that what is a thrash for one man may be the treasure for the other man. If you have some old gadgets which are really not of your use any longer then its better and advisable to donate such things to non-profit organisations that can recycle such stuffs for the use of other people. So pick up the phone and dial such non profit organisations and maintain the ecosystem of the society.

6.  Use old device to get money: There are many Tech companies in the world that can happily buy your old devices. Ask your boss or employees whether the particular device is of any use or not. If it is of no use then contact such programs and ask them if they are interested in taking such devices. Give suchdevices to them and in return they will pay you handsome money. Treat yourself and your employees happily.


Old devices can gather only dust. They cannot do anything other. The best thing is to reuse and recycle these gadgets. You can also show your creativity. You can also take help from any third party organizations too in it. Thus you will succeed in maintaining a cost effective office. Reusing and recycling devices is a fun which you and your employees will enjoy doing.

Hope you have enjoyed reading it. If you have your own ideas on how to reuse and recycle stuffs then please write it in the comment box. All your comments would be entertained.

This Post is written by Margaret. She is a writer/blogger. She writes articles on Technology, social media, WordPress, Gamification, website Hosting, website development and online development etc. These days she contributes on play euromillions

6 Types of Malware You Should Be Aware of

6 Types of Malware You Should Be Aware of

Malware programs can really be some of the worst stuff on the internet, and they’re more common than mosquitos in the middle of the jungle. They are also so numerous in variety that it would be nearly impossible to pick out a few specific pieces to talk about. Every hacker has their own trademarks and strategies to insert into their own malware, meaning that there are millions of different types being created every month.

What you can realistically learn about are the general types out there and what they look like. Many people already defend themselves perfectly, and you and your customers can as well. All are meant to harm you, and the first thing you need to think about is that there is no limitation on what a piece of malware can do except the imagination of the hacker. Nonetheless, trends do emerge.


Here are the six main types of malware that you need to know about:


Out of all the types of malware out there, ransomware appears to be the most immediately menacing and hardest to get rid of. It works by effectively locking down your computer and then demanding a payment to unlock it, often pretending to be a security program in the process.

Don’t fall for it, as ransomware never leaves you alone, even if you pay the ransom. They’ll just want more. The best method to fight it is to not get it in the first place, but after that, deleting it in safe mode or a reinstall of the operating system might be in order. Don’t give in to pressure and keep a calm head should you encounter it.


Rootkits are the absolute worst in terms of how difficult it is to get rid of them. They hide by acting as files within your operating system itself, and are therefore nearly undetectable by scanners. They’re also undetectable to any but the most experienced of technicians, and even they would prefer to simply wipe the hard drive and start over instead of spending many hours looking through files. Fortunately, they are more difficult than other types of malware to install, and most hackers won’t find your information worth the extra effort.


Personal data is valuable, and the creators of spyware know this. The main goal of a piece of spyware is to remain undetected while collecting information on the user, usually with identity theft as the end goal. It might also be put on your computer to scope out vulnerabilities for later attacks. A manual check of all of your files and frequent scans (with a good malware defense program) are your best hope for detecting and destroying it.

Mobile Malware

A few years ago, malware on smartphones was such a miniscule problem that it wasn’t even considered. Now it is one of the largest threats that security professionals and users alike have to worry about, and due to the limitations of the operating system and difficulties accessing the deeper functions of a smartphone, mobile malware is tricky to remove. People need to start using the internet on their smartphones much like they would on their home computer so they avoid trouble. It is also recommended that people install mobile security apps on their devices.


Adware is much maligned subset of malware that focuses on selling you things you didn’t know you didn’t want to have. They’re often paired with other types of malware to maximize effectiveness, and the ads themselves nearly always lead to a scam or legally questionable activity. The sooner it is deleted, the less of a risk that other types of malware will invade and cause deeper problems than pop-up ads from your browser or desktop.


While you might not think of bots as malware in the traditional sense, they are malicious programs used for criminal activity, in this case often to try to hack accounts. They’re the reason you have to type in verification words, and they allow hackers to sit back and let something else do all the work. While the average person cannot directly combat them, they should avoid making important accounts on websites that don’t have a defense against them.

Defenses to Use

While the nature of malware will change significantly over time, there are tools and strategies you can use in order to improve your general defense against these kinds of threats and more.

  • You need a security suite on your computer. You also can’t afford to use a free program that isn’t up to par with the rest of the industry. You additionally need to update it whenever possible, as hackers and malware distributors take advantage of the gap between average update time and update release.
  • If you are going out into the world, you need to use a Virtual Private Network (VPN). While most people will consider it a tool that allows people to connect to Netflix from another country, its best purpose is to keep people safe on public networks and bypass government censorship. Hackers can steal your information on these networks and use it to perform identity theft and spread malware later, so you need the encryption a VPN provides in order to remain completely safe.
  • Most cybersecurity problems are caused by people neglecting important habits, so the most important thing you need to work on is your own cybersecurity strategy. Only use websites that you trust, and don’t download any file that looks suspicious. If you let a piece of malware in the front door with an invitation, your tools won’t be able to help you.

Do you have any other thoughts concerning malware and defending against it? It is a complex topic, so any input would be appreciated in order to keep the conversation going. Please leave any questions or comments below.

FieldNation and Essintial

If you are doing work orders on FieldNation then look out for Essintial…Quite a few of their jobs are for preventive maintenance at Walmarts.

The work order states:

Under “Hide Confidential Information” it states;


***Any aborted site will be restructed to an $80/flat rate Unfinished Site payment.***

So I do a job for them and sure enough was turned away by the client due to them not being notified of the job. Apparently this was a common occurrence based on my call that night to the call center about the issue. So sure enough they reschedule it and send me again. I accept the work oder and show up and once again the manager on duty turns me away. So the same route, call the call center and let them know and they close the ticket.

Next thing I know I get paid less than $30 (after everyones cut) and their justification was “2nd retry only pay $30.00”. Problem is nowhere in the work order was this stated. So apparently the only one that knew about this whole “2nd retry” thing was Essintial….

Contacted FieldNation about the is and their answer ended up being. “It’s entirely up to buyer what they would pay you after reviewing a WO since they might take different/dissimilar decision’s based on provider’s performance. We suggest you to click on one of their available WO and decline it. It gives you an option to block the company when you do so.”

This makes absolutely NO sense at all. So it’s up to the buyer to change the terms and not notify anyone? And then I’m’ suppose to just “block the company”? So basically what FieldNation is saying is “we condone this type of practice”….Great job FieldNation.

Thumbs down for Essintial and FieldNation on this deal.

Humans of Technology


I am putting together this new thing sort of like “Humans of New York” . If you have never heard of it you can check it out here:

Reason i’m doing it is, it’s interesting to me and in my 20+ years I have met and talked with thousands in the industry and always take something away from it. So I have thought about this for some time and I really think it would be a nice thing to throw out there for our industry.

Some of the differences is obviously I am not in New York and the one I am doing is not going to be about a city…Rather it is going to be “IT” (Information Technology) people from all over the world. Can be business owners, network engineers or anything related to “IT”.

That is where you come in. I’d like to have you on the site.

All that is required is this:

1. Picture….It can be of you, your family, you and your dog, you and your car, you at your store or whatever you want. But, you have to be in it in some shape or form 😉

2. Write something (this will go under the picture)…Now this can be really anything you want but a few thoughts are this:

What the technology industry means to you…

What do you see the technology industry moving towards…

Why you love the technology industry…

Heck you can even put in there about your family if you’d like….

Nothing extreme of course maybe a paragraph or two is about it.

Of course I will be glad to put your name, business name, location or whatever you’d like and I can even link to your website at the end of it.

Facebook Page: