tablet
Disinfecting Your Computer!
In light of the heightened awareness of cleanliness the COVID-19 pandemic has brought on, we thought it would be prudent to indicate the safe and correct ways to disinfect your devices, especially if multiple people are using them! Viruses, bacteria and germs often lurk in a variety of office equipment, including keyboards, mice, monitors and phones, and are easily transferred by hand contact. This contamination can pose health risks for you and your employees, as well as cost your company time and money in lost productivity. Sanitize your office equipment to prevent the spread of bacteria and disease. Make sure to wash your hands prior to cleaning your equipment.
Computer
Power off the computer and monitor. If using a laptop with a removable battery, go ahead and take the battery out as well. If you are using a wireless keyboard and mouse, power off or remove the batteries for cleaning.
Remove dirt, dust and crumbs from the keyboard by using a can of compressed air. Hold the can approximately 6 inches from the keyboard and spray along the perimeter of each key. Or turn the keyboard upside down and tap on the bottom to dislodge any debris.
Sanitize the keyboard by using a disinfectant wipe or a soft, linen-free cloth dipped in isopropyl alcohol. Rub the cloth or wipe on the top and sides of each key and then clean the surface and bottom of the keyboard thoroughly. Use a new disinfectant wipe or cloth to clean the mouse.
Dampen a microfiber cloth with plain water. Gently wipe the computer monitor to remove dirt and fingerprints. Avoid placing pressure on the screen. Pushing on the screen can damage the pixels of a flat-screen monitor. Sanitize the monitor by using a disinfectant wipe specifically designed for LCD and laptop screens.
Cellphone/Smartphone/Tablet
Wipe the entire surface of the phone by using a bleach-free disinfectant wipe or a soft cloth dabbed in isopropyl alcohol. Use a separate cloth or disinfectant wipe to clean the entire surface of the headset, including the speaker and microphone.
And now, some DON’TS
- Don’t use disinfectant wipes containing bleach or disinfectant sprays in general.
- Don’t use an extremely damp disinfectant wipe to clean the area. If you encounter a very damp wipe it may need to be squeezed to remove some of the excess liquid before use.
- Don’t use rough towels or cloths to dry the area.
- Don’t use excess force when disinfecting the area around the keyboard; this could damage the keys.
This process will add some time to your always compressed schedule, but in the interest of your health and well being, we are recommending it be done frequently for shared workstations or when a new user takes control of the device. If you have any questions or concerns about cleaning your devices, feel free to give us a call! We want to make your technology easier!
Travel Tips For Your Devices
Our wireless devices have become such a part of our everyday lives that it’s almost unthinkable to not take them with us on our trips. With all the hustle and bustle of traveling, it’s easy to forget that our devices need to prepare for the trip just like you do.
These are some tips to help ensure that your devices come home safely with you, and your trip is not ruined by a theft or failure.
Laptops
You don’t want to be that person forgetting his computer at a coffee shop or a victim of theft. Use these tips to keep your laptop safe while on the road.
Don’t Be A Target
Don’t advertise what you are carrying. Many experts suggest removing any computer logos from the bag as it only shouts out its expensive contents. A bag that’s not identifiable as a computer bag but still is protective of your laptop is even better. Backpack style bags are good for this.
Tag It
Make sure your bag has tags with your name and phone number (and possibly email address), but do not include your home or office addresses or the name of your employer. You want just enough information so that you can be contacted if you are separated from your bag. This is a great tip for any baggage.
Keep Your Eye On It
Don’t lose sight of your laptop. At the airport place your laptop between your other items through the airport X-ray machine (carry-on bag, laptop, then shoes, pockets, etc.) Go through the metal detector at the same time as your computer passes the scanning machine. Don’t leave your phone or tablet unattended at public charging stations.
Don’t Leave It
Avoid leaving your devices in your hotel room as the room may not be completely secure. If you do, put the “do not disturb” sign on the door to limit access by staff.
ID It
Write down the serial and model numbers of your devices. These are usually found on the bottom of most PCs or the backs of other devices. For Macbook/Macbook Pro users check out these tips.
Coffee Shops/Internet Cafes/Etc.
VPN
If you are going to be using public Wi-Fi networks for business or purchases, you should consider investing in a Virtual Private Network (VPN) service from a reputable security company (like an antivirus manufacturer for example). These services protect your information by establishing a single, encrypted connection to the provider that all your web browsing passes through. Just be warned that all of your web use can still be tracked by the VPN provider which is why we recommend sticking to reputable security companies.
Lock It Down
A security cable lock is a fairly cheap security device that works like a bicycle lock. You loop it around a fixed object (such as the coffee shop table), connect it to the laptop and lock it with a combination or a key. There are more advanced models with a motion sensor system and alarm. When someone moves the laptop, it will trigger the alarm, alerting you.
General Tips
These tips apply to any other devices like your smartphone, camera, tablet, etc.
Get Travel Insurance
A good travel insurance policy could be a lifesaver. Get a policy that covers theft and loss of personal items. Make sure the amount of coverage will be enough to replace your devices.
Use Theft Recovery Software
Nothing on the market is 100% fool-proof, but your chances of getting a stolen laptop or smartphone back are a lot higher if you have this type of software installed on your device. Typically, this will allow you to locate the device so you can alert the local authorities to its approximate location. Some theft recovery software works even if the thief has erased all data and installed a new operating system.
Backup Your Data
The information stored on a laptop or smartphone can be more valuable to you than the device itself. Protect that data by backing it up on an external hard drive or online cloud storage REGULARLY.
Be Aware of Your Surroundings
Be watchful of people watching you, following you, or acting suspicious. When in doubt, get to a public area or walk into a store. You don’t have to be paranoid, just be aware of what’s going on around you!
Memory
Keep external hard drives, SD cards, thumb drives, etc. separate from the devices. That way if something does happen to the device, you still have your pictures or documents safe.
The Wrap Up
In the end, nothing will ever beat common sense for helping to deter theft or loss of your electronic devices & computers. But a combination of good behaviors and security technology will give you peace of mind and let you enjoy your travels more thoroughly. Geek Easy Computers is always here to answer questions or assist with making your technology easier!
WiFi vs Wired
What’s better, wireless or wired, when it comes to internet connections? Most people would instinctively say “WiFi”. Wireless does have many advantages, and in today’s connected culture it’s fairly ubiquitous. But is it truly better? Let’s find out!
Read the rest of this entry »Power Adapter/Cable Care
Everyone has been through it before. You go to charge your smartphone or your tablet, or even your laptop; you plug in your power adapter, and…. nothing happens. So you unplug it and try again. Still nothing. You wiggle the connector to make sure it’s in all the way. Nope. Your device isn’t charging. ARRRGH! WHY?
Read the rest of this entry »
Q & A: User Questions, Tech Answers! Year End 2017
Welcome to the 2017 edition of our “User Questions, Tech Answers”. In our ongoing mission to help make your technology easier, we like to provide you with tools and knowledge to make your computer interaction more “user friendly.” This edition will showcase some of the most popular questions asked throughout 2017, and also include some new things that we haven’t covered yet.
Phishing: What is it & How to detect it!
You get an new email. It’s from Paypal. It says there is a problem with your account. It provides a link and instructs you to click on it to “verify your login credentials.” You follow instructions, but when you you enter in your username and password, it doesn’t take you to your account. It takes you to a fake (but mostly legit-looking) page, and now your info is in the hands of criminals. What just happened? It’s called “phishing”.