News and Specials!
Sign up for our monthly email newsletter by entering your email address below, and clicking subscribe


We Have Moved!

We’re now conveniently located near the corner of Whitcomb and Westnedge behind the Burger King. We are the upper suite in the rear of the building. If you need driving directions, please don’t hesitate to call!

Geek Easy Computers
435 Whitcomb St. UL 201
Kalamazoo, MI 49001
(269)548-TECH (8324)

tablet

Disinfecting Your Computer!

In light of the heightened awareness of cleanliness the COVID-19 pandemic has brought on, we thought it would be prudent to indicate the safe and correct ways to disinfect your devices, especially if multiple people are using them! Viruses, bacteria and germs often lurk in a variety of office equipment, including keyboards, mice, monitors and phones, and are easily transferred by hand contact. This contamination can pose health risks for you and your employees, as well as cost your company time and money in lost productivity. Sanitize your office equipment to prevent the spread of bacteria and disease. Make sure to wash your hands prior to cleaning your equipment.

Computer
Power off the computer and monitor. If using a laptop with a removable battery, go ahead and take the battery out as well. If you are using a wireless keyboard and mouse, power off or remove the batteries for cleaning.

Remove dirt, dust and crumbs from the keyboard by using a can of compressed air. Hold the can approximately 6 inches from the keyboard and spray along the perimeter of each key. Or turn the keyboard upside down and tap on the bottom to dislodge any debris.

Sanitize the keyboard by using a disinfectant wipe or a soft, linen-free cloth dipped in isopropyl alcohol. Rub the cloth or wipe on the top and sides of each key and then clean the surface and bottom of the keyboard thoroughly. Use a new disinfectant wipe or cloth to clean the mouse.

Dampen a microfiber cloth with plain water. Gently wipe the computer monitor to remove dirt and fingerprints. Avoid placing pressure on the screen. Pushing on the screen can damage the pixels of a flat-screen monitor. Sanitize the monitor by using a disinfectant wipe specifically designed for LCD and laptop screens.

Cellphone/Smartphone/Tablet
Wipe the entire surface of the phone by using a bleach-free disinfectant wipe or a soft cloth dabbed in isopropyl alcohol. Use a separate cloth or disinfectant wipe to clean the entire surface of the headset, including the speaker and microphone.

And now, some DON’TS

  • Don’t use disinfectant wipes containing bleach or disinfectant sprays in general.
  • Don’t use an extremely damp disinfectant wipe to clean the area. If you encounter a very damp wipe it may need to be squeezed to remove some of the excess liquid before use.
  • Don’t use rough towels or cloths to dry the area.
  • Don’t use excess force when disinfecting the area around the keyboard; this could damage the keys.

This process will add some time to your always compressed schedule, but in the interest of your health and well being, we are recommending it be done frequently for shared workstations or when a new user takes control of the device. If you have any questions or concerns about cleaning your devices, feel free to give us a call! We want to make your technology easier!

Holiday Safety For Your Computer!

‘Tis the season for online shopping and travel! With excitement and distractions aplenty, it’s easy to get caught unawares by an online scam or hacker. It is also a time for increased sharing on social media. That increased information sharing also makes us more vulnerable to online threats and expensive identity thefts. Below are steps you can take to ensure your personal information stays safe and secure. 

ONLINE

– Limit Your Personal Information Online: Review the security settings of your online profiles and limit access to people not on your friends list (or them too!). The more specific information you share publicly, the easier it is for you to be compromised. .

– Use Strong Passwords and Change Them: Many sites now force you to use strong passwords and that’s a good thing. Use different passwords for each of your online accounts and set up two-step verification, when possible. You should also CHANGE YOUR PASSWORDS every three months. If you’re comfortable with it, password manager software like LastPass, Dashlane, RoboForm, etc. can help you set very complex secure passwords without having to remember or write them all down somewhere. 

– Keep Your Operating System Up to Date: Computer operating systems are periodically updated to stay in tune with technology requirements and to fix security holes. Be sure to install the updates to ensure your computer has the latest protection. Make sure your browser is also updated for similar reasons.

– Be Careful What You Download: Opening attachments in email is one of the top 3 (if not #1) way computers get infected with malware or otherwise compromised. Never open an email attachment from someone you don’t know and be suspicious of unexpected forwarded attachments from people you do know. They may have unwittingly sent you an infection!!.

– Use Secure URLs: Check to be sure websites are security enabled when performing an online transaction. Look for web addresses that start with “https://” which means the site takes extra measures to help secure your information. Stick to well-known, thoroughly vetted sites. Don’t pick the holiday season as the time to “try out” that new online shopping site that popped up in a Facebook ad!

– Turn Off Your Computer: Probably the simplest solution. When you are not using the computer, turn it off.  It can’t get hacked if it’s not on.

– Trust Your Instinct: If it looks too good to be true, then it probably is.

TRAVEL

The Bag – you definitely want a cushioned protective bag. With the new thinner, sleeker laptops and tablets, it’s tempting to buy an equally sexy case. Unfortunately, those cases tend to be focused on fashion, not protection. Also, a flashy case or bag is like a bullseye for thieves. Don’t advertise that you have a laptop or device! Tamper resistant zippers or checkpoint friendly bags are a good idea if you are flying.

Insurance – Make sure your insurance policy covers theft and loss of personal items, and the amount of coverage will be enough to buy you a new laptop. A good travel rewards credit card may cover travel protection. Check the terms of your card issuer.

WiFi – When traveling, using public WiFi is very tempting and sometimes unavoidable. Using public WiFi networks can lead to security breaches. Especially when using hotel or airport WiFi. Make sure your computer or device is protected by antivirus software, and that the software is updated and current. Avoid shopping online or logging on to your online banking website on a public WiFi network. Consider investing in a Virtual Private Network (VPN) service from a reputable security company. These services protect your connection by encrypting all the data you send and receive online through the security company’s servers.

Backup Your Data – You should be doing this regularly anyway, but definitely do it before you travel with your laptop or device. The data stored in your laptop can be more valuable than the computer to you. Protect yourself from losing your data by backing it up on an external hard drive or in the cloud.

The crew at Geek Easy Computers wants you to be able to enjoy the holidays with your friends and families, and not have to worry about your technology! We are here to make your technology easier! Let us know if you have any questions or concerns!  Happy Holidays!


Adonis Pointer is a photographer, a collector of vintage razors, and a certified technology geek!
Adonis has been involved in computer technology since well, a LONG time! He has been involved in nearly every aspect of the industry from sales to repair to training to consulting. As the Social Media Manager he writes the majority of the posts on the Geek Easy Computers blog.

Travel Tips For Your Devices

Our wireless devices have become such a part of our everyday lives that it’s almost unthinkable to not take them with us on our trips. With all the hustle and bustle of traveling, it’s easy to forget that our devices need to prepare for the trip just like you do.

These are some tips to help ensure that your devices come home safely with you, and your trip is not ruined by a theft or failure.

Laptops

You don’t want to be that person forgetting his computer at a coffee shop or a victim of theft. Use these tips to keep your laptop safe while on the road.

Don’t Be A Target

Don’t advertise what you are carrying. Many experts suggest removing any computer logos from the bag as it only shouts out its expensive contents. A bag that’s not identifiable as a computer bag but still is protective of your laptop is even better. Backpack style bags are good for this. 

Tag It

Make sure your bag has tags with your name and phone number (and possibly email address), but do not include your home or office addresses or the name of your employer. You want just enough information so that you can be contacted if you are separated from your bag. This is a great tip for any baggage.

Keep Your Eye On It

Don’t lose sight of your laptop. At the airport place your laptop between your other items through the airport X-ray machine (carry-on bag, laptop, then shoes, pockets, etc.) Go through the metal detector at the same time as your computer passes the scanning machine. Don’t leave your phone or tablet unattended at public charging stations. 

Don’t Leave It

Avoid leaving your devices in your hotel room as the room may not be completely secure. If you do, put the “do not disturb” sign on the door to limit access by staff.

ID It

Write down the serial and model numbers of your devices. These are usually found on the bottom of most PCs or the backs of other devices. For Macbook/Macbook Pro users check out these tips.

Coffee Shops/Internet Cafes/Etc.

VPN

If you are going to be using public Wi-Fi networks for business or purchases, you should consider investing in a Virtual Private Network (VPN) service from a reputable security company (like an antivirus manufacturer for example). These services protect your information by establishing a single, encrypted connection to the provider that all your web browsing passes through. Just be warned that all of your web use can still be tracked by the VPN provider which is why we recommend sticking to reputable security companies.

Lock It Down

A security cable lock is a fairly cheap security device that works like a bicycle lock. You loop it around a fixed object (such as the coffee shop table), connect it to the laptop and lock it with a combination or a key. There are more advanced models with a motion sensor system and alarm. When someone moves the laptop, it will trigger the alarm, alerting you.

General Tips

These tips apply to any other devices like your smartphone, camera, tablet, etc.

Get Travel Insurance

A good travel insurance policy could be a lifesaver. Get a policy that covers theft and loss of personal items. Make sure the amount of coverage will be enough to replace your devices.

Use Theft Recovery Software

Nothing on the market is 100% fool-proof, but your chances of getting a stolen laptop or smartphone back are a lot higher if you have this type of software installed on your device. Typically, this will allow you to locate the device so you can alert the local authorities to its approximate location. Some theft recovery software works even if the thief has erased all data and installed a new operating system.

Backup Your Data

The information stored on a laptop or smartphone can be more valuable to you than the device itself. Protect that data by backing it up on an external hard drive or online cloud storage REGULARLY.

Be Aware of Your Surroundings

Be watchful of people watching you, following you, or acting suspicious. When in doubt, get to a public area or walk into a store. You don’t have to be paranoid, just be aware of what’s going on around you!

Memory

Keep external hard drives, SD cards, thumb drives, etc. separate from the devices. That way if something does happen to the device, you still have your pictures or documents safe.

The Wrap Up

In the end, nothing will ever beat common sense for helping to deter theft or loss of your electronic devices & computers. But a combination of good behaviors and security technology will give you peace of mind and let you enjoy your travels more thoroughly. Geek Easy Computers is always here to answer questions or assist with making your technology easier!

WiFi vs Wired

What’s better, wireless or wired, when it comes to internet connections? Most people would instinctively say “WiFi”. Wireless does have many advantages, and in today’s connected culture it’s fairly ubiquitous. But is it truly better? Let’s find out!

Read the rest of this entry »

Q & A: User Questions, Tech Answers! March 2019

Welcome to the first installment of the 2019 edition of our “User Questions – Tech Answers”. In our ongoing mission to help make your technology easier, we like to provide you with tools and knowledge to make your computer interaction more “user friendly.” This edition will showcase some of the most popular questions asked us, and also include some new things that we haven’t covered yet.

Q. Why don’t you guys fix smartphones or tablets? Aren’t they all computers?

A. Short answer, no. Back when Geek Easy Computers first came into existence, it was decided that we would focus on what we did best – small business IT services and computer repair. As we have grown and evolved, we have added a multitude of other services, but all relating to our core of computer service and repair. While smartphones and tablets can perform many of the same functions as an actual computer, the technology behind them is actually fairly different from computer technology. As such, it takes a different set of specialized skills to service them effectively. We strive to be the best at what we do. So we devote our valuable time and resources to perfecting those skills, as opposed to branching out to other types of devices. We want to be your expert computer repair choice, not your mediocre fix-it-all place.

Q. Why don’t you give estimates over the phone?

A. Phone estimates are usually wrong or incredibly vague. We can’t provide any accurate cost estimates without knowing what is specifically wrong with your computer and what parts and services it needs. Your description of what is happening (or not happening) lets us know what the symptoms are, but to determine the cause of those symptoms, we would need to perform a physical diagnostic examination of the unit. Once we have determined the cause of the issue, we provide you with repair options. The only accurate phone estimate is that our repairs start with the $50 deposit minimum and could end up being more expensive than replacing the system depending on what all is wrong.

Q. Why don’t you buy used computers or parts? Don’t you sell used computers?

A. As a company policy we do not purchase used computers or parts from individuals. There are several reasons for this, but first and foremost we don’t want to create a market for stolen computers or encourage computer theft in any way. Chances are what you can find at pawn shops or often via Craigslist are being sold because they were stolen.

It is also difficult to guarantee the performance of used items. We specialize in the sale of refurbished desktop & laptop computers. The difference is the computers we sell are business class computers that were previously leased by other businesses. Once off lease, they were purchased by a professional refurbishing company who then refurbishes the computers and puts them through rigorous testing. We only purchase grade “A” models from the company, put them through our own testing, then offer them to our customers.

Q. Do I really need to run updates?

A. Short answer, yes. Software updates offer many benefits which include patching security holes that have been discovered in the software. Updates can also add new features to your devices and remove outdated ones. Cybercriminals love security flaws, also known as software vulnerabilities, which are weaknesses found in programs that a virus author or hacker could exploit to gain access to some part of your device. By the time a software company has the chance to patch and test a fix to a vulnerable program, the weakness is already well known in the security community which also includes people looking to gain access to your computer resources for malicious purposes. It’s best to run security updates as quickly as you can and replace any device that is no longer receiving security updates.

We are always available to help make your technology easier. Geek Easy Computers is your place for news on the latest & greatest, and your place to get answers to your questions!

Adonis has been involved in computer technology since well, a LONG time! He has been involved in nearly every aspect of the industry from sales to repair to training to consulting. As the Social Media Manager he writes the majority of the posts on the Geek Easy Computers blog.

Have You Turned It Off & On Again?

You’re working on that report that’s due in class tomorrow when suddenly – up pops a blue screen with an error message on it. Or you’re trying to finish up that spreadsheet with the numbers your boss needs for his meeting in the morning, when the computer just freezes up! Or you’re in the middle of a firefight in Fortnite when the computer screen goes black. Or you’re checking out a web site and pop-ups start appearing on your screen! What do you do now? Don’t panic…

Read the rest of this entry »

Power Adapter/Cable Care

Everyone has been through it before. You go to charge your smartphone or your tablet, or even your laptop; you plug in your power adapter, and…. nothing happens. So you unplug it and try again. Still nothing. You wiggle the connector to make sure it’s in all the way. Nope. Your device isn’t charging. ARRRGH! WHY?

Read the rest of this entry »

Are Smartphones & Tablets computers? Not Quite.

Smartphones and tablets have gotten more powerful and capable over the last 5 years. Many people rely on them as their primary device to access the Internet or to consume media (stream video, listen to music). But are they really ready to replace a computer? In this article we’ll clarify the differences between computers & mobile devices, and hopefully answer any questions.


Read the rest of this entry »

Q & A: User Questions, Tech Answers! Year End 2017

Welcome to the 2017 edition of our “User Questions, Tech Answers”. In our ongoing mission to help make your technology easier, we like to provide you with tools and knowledge to make your computer interaction more “user friendly.” This edition will showcase some of the most popular questions asked throughout 2017, and also include some new things that we haven’t covered yet.

Read the rest of this entry »

Phishing: What is it & How to detect it!

You get an new email. It’s from Paypal. It says there is a problem with your account. It provides a link and instructs you to click on it to “verify your login credentials.” You follow instructions, but when you you enter in your username and password, it doesn’t take you to your account. It takes you to a fake (but mostly legit-looking) page, and now your info is in the hands of criminals. What just happened? It’s called “phishing”.

Read the rest of this entry »

Categories
Archives