Profile cover photo
Profile photo
TechHeads Technology Services, Inc.
1 follower
1 follower
About
Posts

Scammers are sending out many emails trying to get you to click a link that will infect your computer. They make it look like it is coming from Microsoft and provide a link so you can "Validate" your account. Microsoft will never send an email like this to you. The "From" email is also a clue that something is wrong. Always be on your toes and delete and email that looks like this! Please view the graphic we attached to this message for an example.
Add a comment...

Post has attachment
Fake web page messages that your computer is infected or hacked are on the rise. These messages are meant to scare you into calling and giving the cyber criminal your credit card. Call your local, trusted computer company for help if you see a message like this on your computer.
Photo
Add a comment...

Post has attachment
Thank you for voting us the "Best Tech Support Company" for Hilton Head Island! We truly appreciate it!
Photo
Add a comment...

Post has attachment
We would like to wish all our customers and friends a very happy Independence Day.
Photo
Add a comment...

Computer and mobile device security can be greatly enhanced by making sure your device is locked when you are not using it.

Here are a few simple tips to lock your computer from unauthorized use. This is especially useful in a business setting where you do not want anyone to use your computer when you are not there:
-Windows PC: Press the "windows" key on your keyboard. While holding the "Windows" key, press "L". This will lock your screen. Make sure you have a password setup so the only way to get back into Windows is to enter the password.
-Mac Computer: Use Control-Shift-Power to lock your Mac. (For older Macs with an optical drive, use Control-Shift-Eject.)

These tips are especially useful when your computer is always on and needs to be secured with a password. Make it a habit to lock your computer whenever you will be away from it for an extended period of time.
Add a comment...

Post has attachment
A massive ransomware attack named WannaCry has reached around the world causing significant alarm. Ransomware will encrypt your files on your computer, rendering them unreadable.
Specifically, on May 12, 2017 a new strain of the Ransom.CryptXXX (WannaCry) ransomware began spreading widely impacting a large number of organizations, particularly in Europe.
Wcry is demanding a ransom of $300 to $600 in Bitcoin to be paid by May 15, or, in the event that deadline is missed, a higher fee by May 19. The messages left on the screen say files will remain encrypted. It's not yet clear if there are flaws in the encryption scheme that might allow the victims to restore the files without paying the ransom.
If you have yet to install the Microsoft fix—MS17-010— you should do so immediately. You should also be extremely suspicious of all e-mails you receive, particularly those that ask the recipient to open attached documents or click on Web links.
TechHeads has some advice for avoiding and recovering from a Ransomware attack:
1) Backup. Backup. Backup. Backup. Backup.
2) Install all the latest updates for your computer operating system.
3) Ensure all 3rd party apps such as Adobe Reader are patched and up to date.
4) Make sure your Anti-Virus is up to date. Do not use a free Anti-Virus.
5) Question the validity of every email you open.
6) Be aware of the websites you are visiting.

If you need assistance securing your computer, or fall victim to this type of infection, call us today.
Photo
Add a comment...

Post has attachment
TechHeads offers modern phone systems for your business using the latest in VOIP technology.

Allworx® Reach™ and Reach Link™
A Complete Business Communication System That Fits in Your Pocket. Allworx Reach is software designed to work with an Allworx VOIP Phone system and your mobile device.

Popular Uses
•Road ninjas who always want to be within reach on their business numbers.
•Legal and health care professionals who need to be reachable without giving out their personal mobile number.
•Employees who work in a distributed work area such as car dealerships, retail showrooms, and schools.

Allworx Reach on iPad and iPhone — The Reach mobile app extends the rich functionality of your Allworx VoIP communication system right to your iOS and Android devices. Allworx Reach Link ensures a seamless voice experience, even as your mobile data network change.

Allworx Reach Highlights:
•Enjoy the new mobility-integration features with Allworx Verge™ IP
phones including personal contact sharing, instant call hand-offs, and many more.
•Transfer, hold, and park calls with a single touch.
•Make easy three-way calls.
•Access call history, see parked calls, andcall into scheduled conference calls.
•Search across Allworx system users and extensions, and personal mobile contacts.
•Check voicemail messages.
•Change presence setting.

Call us today -843-715-1039
Photo
Add a comment...

Post has attachment
We have noticed a large increase in "Social Engineering" phone calls to local businesses. For those not familiar with the term:
Social Engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information. (Source: Wikipedia).

If you receive a random phone call from a company claiming to need information from you about your website, computer systems or network, it is most likely a fake call. Do not give them any information!

Most reputable companies will never ask you for personal information over the phone about any of your technology systems. We have had some customers give these "entities" their credit card numbers and pay large sums of money, only to lose that money with no benefit.

We are available to help if you have become a victim of Social Engineering. 843-715-1039
Photo
Add a comment...

Post has attachment
Let us help you with your next business IT challenge.
Photo
Add a comment...

Post has attachment
NO computer is ever totally secure. There are many attach vectors a cyber criminal can take to gain control of your computer, even your identity. The graphic is a sampling of exposure you have while using the Internet from your computer.

Total security does not exist but a layered approach, with the proper training and backup, will protect you from a situation that you could otherwise not recover from.

Always:
1) Have an Anti-Virus that is up to date.
2) Use a firewall to protect your network and your computer(s).
3) Have a backup that is monitored everyday to ensure it is properly running and backing up the correct files.

Call us today 843-715-1039.
Photo
Add a comment...
Wait while more posts are being loaded