Watch Out For Phishing Scams!

Cyber-attacks are becoming more common, affecting millions of people around the globe. The computers that connect us to the world can also expose our world. One of the most common threats that can expose our data is phishing attacks in the form of emails.

What is a Phishing Attack?

To start, what is a phishing attack? The definition of phishing is the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information such as passwords and credit card numbers.

Scammers are getting more creative in executing their attacks. Their emails are looking more like legitimate emails sent from companies. Users must be vigilant before clicking on any links included in an email. Check the sender’s email address and hover over the link to see where it will send you.

Google Wants To Quiz You…

Jigsaw, a think tank created by Google, has created a quiz to help users identify phishing emails. The quiz will show you an email and give you the option to pick whether or not it is legitimate. Then it will explain why it is legitimate or fake. Jigsaw posted on Medium explaining the importance of spotting phishing emails and why they created the quiz.

Click here to test your skills!

If you found this article interesting or helpful, check out our other posts!

Windows 7 Losing Support on January 14, 2020

Local news, WWAY News Chanel 3 did a report on Monday about Windows 7. This past Friday marks the six-month mark of remaining support for the operating system. It is estimated that 35% of computers still have Windows 7 installed. Windows 7, first introduced in 2009, will be losing official support from Microsoft on January 14th, 2020. This means the OS will not receive any updates or security features.

“Changes and upgrades in technology are inevitable,” said Brad Anderson, Corporate Vice President for Microsoft 365, in a blog post on January 14th, 2019. “And there’s never been a better time to start putting in motion the things you need to do to shift your organization to a modern desktop with Microsoft 365.”

What can you do?

We recommend updating to either Windows 8 or Windows 10. Windows 10 is the ideal option because it is the most current iteration of the Windows OS. This will keep your computer secure and up to date. There will be a final Windows 7 update that will take place this July.

Microsoft will offer extended coverage for businesses who do not want to upgrade, but they will have to pay for that privilege. It is estimated that millions of people still use Windows 7. You may begin seeing the pop up below as we get closer to January 14th, 2020.

Updating to Windows 10 can be intimidating, but Computer Warriors can make it a seamless transition. Some older Windows 7 machines may struggle to run Windows 10 effectively. Bring your computer in for an evaluation, and we can see what the best course of action is for you!

Check out WWAY’s full report here!

If you found this article interesting or helpful check out our other posts!

Recalling An Email In Gmail

Ever send an email and immediately regret sending it? If the email was sent via Gmail, the good news is that there is a way to undo the email. However, you only have a short period to do so. Here’s how to recall an email in Gmail.

Email Cancellation Period

Google allows Gmail a 5-second window to recall an email once the sent button is hit. It’s a small window, but Gmail allows the length of time to get extended if you need more time. After this period of time, the email will not be able to get recalled. Google only allows the length of the recall window to be changed in the web browser.

Changing the recall length of time is a breeze. Firstly, open Gmail on your favorite web browser. Secondly, find the settings icon in the right corner of your screen. Next, navigate to the General tab and find the Undo Send section. The recall window can be set to 10, 20, or 30 seconds. Still not a lot of time, but more than you start with.

Recalling A Email

Once the email is sent, you only have the time in the recall window to retrieve the email. This timer starts immediately after the Sent button is hit. To recall the message, simply hit the Undo button in the sent message confirmation. The same process can be used for emails sent on mobile devices. By pressing Undo, the email will return you to the Compose draft screen.

If you found this article interesting or helpful, check out our other posts!

How To Free Up Storage On Your Android Device

If you have an Android device, with less than 64GB of storage capacity, chances are you have run out of space before. If your device doesn’t have a MicroSD card slot, or you’re not ready to replace the device, here are some tips on freeing up storage.

Free Up Space Tool

Go to your device settings and look for your storage tab. There will be a blue button that says something along the lines for ‘Free up space’ or ‘Clean space.’ Using it will get rid of unnecessary files eating away at your storage. If your device has a ‘Device Care’ tab in the settings, it will do the same.

You can also go into your Settings > Applications and see how much space your apps are taking. Here you will have the ability to delete the cache and media of the app. Clearing the cache is generally safe, but clearing media may delete pictures or other information contained in the application. There is also a setting called ‘Smart Storage’ that will be removed backed up videos and pictures after 30, 60, or 90 days.

Store Your Photos Online

Use Google Photos to store your media. Open up the Photos app, select the menu icon (three lines). Next, choose the option for ‘Settings,’ then select ‘Back up & sync.’ Once you are here, make sure the toggle is turned on. This menu will also let you pick the account you want to back up (if you have multiple tied to your phone). You can select a variety of backup options as well.

Once you are sure that the photos are backed up, you can delete them. Most of the time, there will be an option to do this on the main menu for Photos but if not, go back to the settings. Clicking on the option ‘Free up device storage’ will tell you how much information you are deleting before you do.

Other Managers

There are other cloud file managers like Google Drive, Dropbox, One Drive, and several others. Transferring as much data as possible to these options will save a boatload of space. Some antivirus apps like Malwarebytes will also help get rid of unneeded files.

If you found this article interesting or helpful, check out other posts!

Protecting Your Kids Online

In the digital age we live in, it can feel impossible to protect your kids. The Internet moves very fast and while its a place of limitless information, it can also be a dangerous place for our kids. Smartphones are one of the great products of our time, but some applications can put your kids at risk.

Firstly, talk to your kids about cellphone safety. Ensure that they know despite what an application will say, once post, picture, or text goes digital; there is no such thing as removing it entirely. In addition, add your kids to your iCloud or Google account. You will be able to see what applications they download.

Lastly, here are some applications that you should keep an eye out for on your kid’s devices.

Hot or Not

Encourages other Hot or Not users to rate your profile, check out people in the area, and chat with strangers. The purpose of this app is to facilitate hookups.


Calculator% and other apps like it require a pin to access. It was designed to hide in plain sight. Once the pin gets entered, the app contains hidden pictures, videos, files, and browser histories.

This app is known for cyberbullying. It encourages anonymous users to ask users questions.

A live-streaming app that uses geolocation to share videos. As a result, people can find the broadcasters exact location. Users can earn ‘coins’ to pay minors for photos.


Holla is a video chat app that allows users to connect with people all over the world. Users have reported explicit content, racial slurs, and more.


An anonymous social media network that promotes users to share their secrets. It also has a feature that reveals a user’s location so they can meet.


Bumble is like ‘Tinder’ but encourages women to make the first contact. Kids have used this app to create fake accounts and lie about their age.


You have probably heard of this one. After content is viewed, the app ‘deletes’ the picture or video. Consequently, it has been used to spread explicit content in the past. In addition to those features, it shares a users location. It will map the surrounding area and show users where their friends are (this can be turned off in the settings).


This app allows anyone to direct message and contact your children. Kik can result in unlimited access to anyone, anywhere, at any time.


WhatsApp is a popular messaging app used around the world. It is slowly starting to make its way in the US. The app allows users to send text, photos, video chats, phone calls, and voicemails. WhatsApp uses an internet connection, so when connected to WiFi, high usage will not show up on your phone bill.


A popular new app among kids who create and share short videos. There are minimal privacy controls, and cyberbullying is rampant on TikTok.


Badoo is a dating app where users can chat, share photos, and videos. While designed for adults, accounts created by teenagers were discovered in the past.


Another social media dating app. It will connect users based on their geographic location. The app encourages face to face meetings.


A location-based dating app. Like other apps, users can share pictures and additional personal information.


A dieting app that allows users to track their fasting activity. It has a social media component that will connect users with other people on the app. Kids with eating disorders may abuse the app, even though the intent is for health benefits.

Furthermore, new apps are coming out all the time that can expose our kids to things they shouldn’t be. Most of these apps will allow access to explicit materials, cyberbullying, and even predators. Most of these apps do not have parental controls. It is just as important to know where your kids are hanging out online, as is it to know where they are in the real world.

If you found this post interesting or helpful, check out our other posts!

Measure Anything With Your Phone

Your phone is capable of a lot of things. In today’s post, we give you some useful apps that will measure just about anything.


All smartphones are built with accelerometers and other sensors that measure speed. Google Maps on iOS and Android now displays your speed when in use. Alternatively, SpeedView (Android) and Speedometer Speed Box App (iOS) are great options. Both apps allow your speed to be shown over on a graph, as well as many other features.


Unfortunately, you can’t way yourself with your phone. Some apps will estimate the weight of items placed on top of it. However, smart scales are becoming a thing that will sync up to your phone. For example, the Fitbit Aria will help keep you on track for your goals.


Smartphones come with many sensors; one they do not have is a hygrometer to measure humidity. However, plenty of apps will relay the information to your device. All-weather apps will come with humidity reporting. Hygrometer (iOS) and the Thermometer-Hydrometer (Android) are apps that specialize in relaying the humidity around you.


Measure is an app that uses augmented reality to measure the length of an option and floor space. It is available on both Apple and Google. The results aren’t always exact, but if you are trying to get an estimate of the size of an object, it will work well.

Air Quality

Similarly to humidity, your smartphone doesn’t have sensors to measure the air quality. Two great options for getting real-time, accurate air quality rating is AirVisual and Air Matters. Both apps are available for download on iOS and Android. There are options for air quality monitors that work with a smart home for about $200.


Most phones have a built-in internal barometer or will figure out your elevation based on GPS signals and map readings. In order to get your elevation, you will need to install the app. My Altitude is iOS, and My Elevation for Android are great options.

If you found this article interesting or helpful, check out our other posts!

Pet Trackers

Humans have their Fitbits, and soon Fido might have one too. GPS or WiFi electronic pet trackers can give all sorts of information about your pet. Like Fitbits and other wearables, they will provide their location, sleeping habits, activity levels, and additional vital health information. Today, we discuss some of the options available.

Cat Tailer

If you have a cat that is a master of sneaking out of the house with ninja-like speed, Cat Tailer will be a huge help. It is a Bluetooth tracking device with a 328-foot range with a line of sight. The range diminishes if vehicles, trees, or houses are between you. Don’t forget that this is Bluetooth, not GPS. It connects to your phone with an app. Check it out here.

Bartun Mini Pet Tracker

This tracker is designed for small pets. Even though its small, it’s waterproof, shockproof, and provides real-time tracking. The tracking is completed through GPS, LBS, AGPS networks, and GPS satellites. It locates and monitors by SMS and the Internet, and will display information up to 5 meters. The tracker has iOS, Android, and website support. In addition, it includes a SIM card and has national coverage for $4 per month or international coverage for $9 per month. Check out the Bartun Tracker here.

Whistle Go Explore

Whistle Go and the Whistle Explore pack several features into their device’s. They combine GPS tracking, fitness, and health monitoring into one device. Each will pinpoint your pet’s location and combines behavior monitoring. It allows the user to set fitness goals for your pets and will send weekly summary reports. The battery will last 20 days on a single charge. The Whistle devices also give the ability to set safe spaces and will notify you if they leave it. This device does require a subscription for more information, click here.

Link AKC Smart Collar

Link is a leather smart collar for dogs who weigh at least 10 pounds. It has a rechargeable battery and designed to curve around your dog’s neck. It has several features that relay the wellness, training, and safety of your dog. The collar will notify you if your dog wanders off. The app gives the ability to track your dog’s daily activity. It will provide recommendations based on age, breed, and gender. It has a built-in LED light that can be activated remotely. Check out the Link Collar here.

There are other options out there but these highly-rated options for your pets. If you found this article interesting or helpful, check out our other posts!

What Are Internet Trolls?

Ever get in an argument on social media? Internet trolls are people who lurk on various social media platforms looking to upset others for their enjoyment. Similar to schoolyard bullies, there are some telltale signs and ways to handle them. Find out more below.

What Is An Internet Troll?

An internet troll is someone who posts/ make intentionally inflammatory, mean spirited, or upsetting comments to start arguments. Most trolls will make these comments on unrelated threads or other’s posting to steer the topic off a conversation. Trolls come in many forms, but most do it for their amusement.

While it draws comparison to cyberbullying, online trolling is its own thing. Traditionally, the comments are not directed at any specific person. For them to succeed, other people need to take notice and get provoked. Trolls lurk are on online gathering places. For example, find them on online forums, Twitter, and the comment sections on sites like YouTube or news outlets.

Indicators Of A Online Troll

With everyone has their own opinions, sometimes, it is difficult to distinguish a troll from a strongly opinionated person. While difficult to detect, below are some commons signs of an online troll are:

  • Refusal to accept evidence, regardless of how many sources you provide
  • Obliviousness to those responding to their comments
  • Off-topic remarks
  • Using unrelated pictures or memes
  • Overall condescending tone

However, the characteristics are by no means definitive. If someone seems uninterested in a real discussion and act provocative for no reason, they are likely a troll.

What To Do About Them

Firstly, the best tactic in handling online trolls is to ignore them. They will make it very difficult, as their comments will typically warrant a response. However the more you feed them, the more successful they are. Don’t take them seriously. Lastly, if they don’t go away on their own, report them to the site moderators or admins. They have the power to boot them from the conversation.

If you found this article interesting or helpful, check out our other posts!

Apps To Help Secure Your Phone

We heavily depend on our phones in our everyday lives. While the Android and iOS platforms are continually improving, some users want extra protection on their devices. In today’s post, we list some apps that will help boost your security on these devices.

GlassWire (Android)

GlassWire keeps an eye on your phone when you cant. It monitors the install apps data usage and will alert you when a new app starts using an Internet connection. This app is useful when trying to not go over on a data plan. It also allows you to see if any apps are using more data then normal.

Fing (Android & iOS)

Fing tells users what devices are on your network at any given time. This way, you can pinpoint any devices that are using too much of your broadband. Knowing this information can help with troubleshooting WiFi issues and keeping your network secure. You can use Fing when traveling to stay safe as well. When in a hotel, Fing will scan to detect any hidden cameras.

Bouncer (Android)

Bouncer helps manage the installed apps on your phone and what permissions they have. It allows users to grant certain permissions to apps on a temporary or one-time basis. For example, say an app needs your location, but you don’t want it to have access to your location all the time. Bouncer allows you to grant permission but revokes it after a period of time or after the app closes.

Access Dots (Android)

Apple devices receive an onscreen alert when an app attempts to access the camera or microphone. Access Dots allows Android users the same thing. Whenever an app tries to access either feature, a dot will appear in the toolbar.

Jumbo (Android & iOS)

Social media companies intentionally make their terms of service extremely difficult for the average person to understand. Jumbo steps in to help decipher the complicated legalese, so you know exactly how much and what information you were giving away. The app takes it a step further and helps keep your accounts in line. For example, it will stop Google from collecting information on your web usages, delete old tweets, and much more.

Twilio Authy (Android & iOS)

Two-factor authentication is very important for keeping all of your online accounts secure. Twilio Authy helps manage all of your online accounts in one spot. Adding new accounts to the app is easy and works with a multitude of online providers like Google, Facebook, Microsoft, and more.

Firefox Focus (Android & iOS)

Firefox Focus is a browser that blocks ads and trackers by default. This allows users faster and more secure browsing experience. It comes with a big trash can that automatically wipes your browsing history.

If you found this article interesting or helpful, check out our other posts!

Online Security Tips

In today’s post, we want to cover some security basics that our clients ignore or don’t know about. Following these steps will help keep you protected online.

Not Keeping Your Device Updated

Many people don’t like updating their devices because updates can cause problems or change the way we interact with the device. What most people overlook is that most updates contain security patches. These updates patch over vulnerabilities in the operating system that hackers exploit. Follow the steps below to check if your device needs updating:

  • Windows 10: Start button > Settings > Update & Security > Windows Update > Check for updates
  • Mac: Apple Menu > System Preferences > Software Update
  • Mobile devices: Every manufacturer has a different location for updates. However, usually, they can be found in the settings menu.

Sharing Too Much Information

Facebook is a great way to keep friends and family up to date on what’s going on in your life. Facebook and other social media sites are the perfect stalking grounds for hackers, thieves, and other threats. For example, posting that you are on vacation and how long you will be gone is an announcement to the world that your home will be empty. Additionally, many apps, games, and other services encourage you to link them with your social media. By allowing it, you are opening up your data to companies with less than stellar security records.

Check The Information

Further, if you receive an email or call from someone claiming to be from a government organization or other entity, make sure they are who they say they are. Phishing and spam emails are becoming more and more convincing—double check all links, phone numbers, and other information in these emails. These emails are typically crafted by non-English speakers. Consequently, most spam emails will contain spelling or grammatical errors.


One of the most common things we recommend to our clients is to have multiple passwords for their online accounts. Using the same password for multiple online accounts is a major security risk. All a hacker needs to do is break into one account; they will be able to break into all of your accounts. Once they have access, they can cause all sorts of damage. For instance, they could spam your email or social media contacts, to transferring money from your bank account.

Plan B

Lastly, back up everything. Your computer, phone, tablet. Any device that has personal information, pictures, or other important information to you needs to have a backup. Ideally, you will want to back up to the cloud; that way, your data isn’t on a single device that could be lost, stolen, or damaged. Another benefit to the cloud is the information is available on any device with an internet connection.

If you found this article interesting or helpful, check out our other posts!