Element IT Logo

Previously

BW Computers

CALL US
1300 600 550
  • Home
  • Services
  • Newsletter
    • Newsletters – Residential
    • Newsletters – Business
  • Testimonials
  • Prices
  • Contact
  • Support

The Unexpected Benefits of Password Managers

January 6, 2022 by Barry Walker

The main advantage of a password manager is obvious to anyone with more than one account online (i.e., everyone). Instead of remembering all 100 usernames and passwords, the password manager autofills them. It’s a boon. But it’s not the only reason to use a password manager. This article shares several more unexpected benefits.

Password manager programs generate, manage, and store many different passwords. You may be concerned about whether a password manager is safe to use. But the cybersecurity industry consensus is “yes, it is.”

A password manager uses top-notch encryption to protect passwords. Plus, they take a zero-knowledge approach. They can’t see the passwords they store and prefill on sites. The password is encrypted before it reaches the manager’s server and can’t be deciphered. Therefore you need to be so careful not to forget your master password!

That said, the password manager offers more than a vault for encrypted credentials.

More Benefits of Password Managers

For one thing, many password managers have apps for download onto mobile devices. Then, you can use the password manager to prefill forms on those, too. This gives you the advantage of convenience not only on your desktop computer but also on the go.

Some password managers offer added security benefits, as well. They might:

  • warn you of weak password and login credentials.
  • remind you to change your passwords.
  • notify you if your passwords may have been compromised in a breach.
  • advise you against repeating access credentials if you’re about to do so.

Another advantage is that you can conveniently share passwords with others. Maybe you want to give family members shared access to streaming accounts or allow a work colleague access to applications you’re using remotely. A managed password sharing feature can allow them to see selected passwords. You aren’t showing everything: you can pick what you make available. Plus, when you change your credentials, the password will change on their end, too. This doesn’t need to be permanent either. You can easily revoke password sharing.

You can also use a password manager to secure other important information. You might store things such as credit card numbers or other personal identifying information. Keeping that kind of data in an unencrypted note on your desktop or mobile device is unsafe, but you can take advantage of password manager encryption to safely store those precious details.

Secure your passwords with a manager

You can’t expect to remember all your unique passwords. Yet the days of writing down passwords on post-it notes are over. Use cloud-based password management to secure your passwords and do more.

Contact us today on (03) 5273 0230 to find out more about password management. We’re happy to suggest the best solution for your needs and set it up, too.

 

 

Filed Under: Residential Blogs

Share:

3 Reasons to Avoid Signing in With Facebook or Google Accounts

January 6, 2022 by Barry Walker

Nine out of ten times today when you visit a website, you’re asked to sign in. To add convenience, many sites offer the ability to sign in using a Facebook or Google account. Sure, it’s simpler, but this article will share three key reasons why you might want to avoid this easy route.

It’s estimated that we each have an average of 100 passwords. That’s a lot to remember, especially as we need unique logins for every site to lower our risk of cyberattack.

At the same time, every website wants us to set up an account. It helps them get to know their users. This can help them to target marketing and product development efforts. They might also share the information with third parties as another source of income.

Still, the website wants to keep its users coming back, so they allow you to sign in with Google or Facebook accounts to streamline the process. Weigh the value of that added convenience against these three considerations.

#1 You’re giving away more data

By using Google or Facebook to sign in on other websites, you are giving the sites greater access to information about you. Now, they not only know what you do on their sites, but you’re also allowing them to build out their picture of you with data insights from the shared sites.

Google and Facebook have powerful tools to dig deeper into your online activity, and other websites can also extract data from your Facebook and Google accounts. If you don’t read the privacy policies, you may not know what sensitive data the platforms share.

#2 You could lose access

You may join those who are deciding to quit Facebook or leave Google in favor of another platform. If you do so, and you have used that account to access other sites, you’ll have to create new logins.

Even if you’re not ever going to do away with your Facebook or Google account, you could still lose access. If there’s a major outage at one of those two sites, you won’t be able to log in at any of your connected sites either. The other websites won’t be able to authenticate you until Facebook or Google is back up and running.

#3 Your attack surface gets bigger

If you have one, unique login credential for a website, you risk your data there only if that site gets hacked. However, if you use Facebook or Google login, and bad actors compromise that account, they can access any shared sites.

Think of it like dominos. The Facebook or Google account is the first to fall, but all those other accounts you “conveniently” login to using those credentials will come tumbling down soon after. Don’t think the attacker won’t bother looking for other connected accounts. All they have to do, once they breach one account is go into your settings to see what you have connected.

Social media accounts are also a prime target. Don’t believe us? Bet you’ve seen a post from a Facebook friend (or ten) telling you to ignore strange activity due to a hacked account.

Protect your online identity

Account compromise is a top cause of data breaches worldwide. Protect your online identity by following best practices for cyber hygiene.

Need help with password security? Our IT experts can set you up with a password manager or provide other online security help. Contact us today on (03) 5273 0230.

 

 

Filed Under: Residential Blogs

Share:

The New PC TuneUp

December 10, 2021 by Barry Walker

How exciting! You got a new computer for Christmas. It’s sleek, shiny, and so much faster than what you had before. That’s great, but it doesn’t mean you should leave it untouched. This article shares several steps you might take to secure your data and keep that new device in tip-top shape.

First things first. Before even logging into personal email or other top sites, you’ll want to update the operating system (OS). Yes, most computers come out of the box with Windows, but you can’t know when that item was boxed. There could be important updates that you don’t want to miss.

You’ll also want to install the latest drivers. Different hardware on your computer can need specialized drivers from the manufacturer. Gamers, for instance, may want to ensure they download the latest to boost performance.

While you’re doing all this uploading and upgrading, also look to remove junk that may have come on the computer. It’s no longer as common, but manufacturers can reduce cost to the consumer by pre-installing software.

You might not have any need for the tools that come already installed. Meanwhile, they slow down your computer. Remove the clutter to improve your computer’s processing. Head to your PC’s Control Panel and look to uninstall programs and utilities that you don’t want. Be careful, though. Just because you don’t know what it is doesn’t mean it’s not serving a valuable purpose.

Involving an IT expert

If you had a great sales experience, you may not want to seek IT help with your new computer. Still, it can prove useful.

Your new computer may also need BIOS updates. Again, the hardware was current when your computer was boxed up but may be lacking the latest by the time it gets to you. A note of caution: this is not an update to do alone. BIOS updates don’t add new features, security patches, or performance improvements, but they may fix a bug with a piece of hardware or add support for your central processing unit (CPU). These updates can be risky if done incorrectly, so work with an IT tech.

Talk also with an IT tech about the best data backup plan for your needs. You’ll be creating important documents, downloading sensitive data, and uploading valued images. Don’t risk their security by failing to back up.

IT support will also suggest the best security tool for you to use to protect against malware. With so many free and fee-based third-party alternatives to Windows Defender, you may want help deciding on the best one.

We’re here to help you get the most out of your new computer. Or, if you’re not sure yet which one to buy, we can consult with you on that, too. Contact us today on (03) 5273 0230.

Filed Under: Residential Blogs

Share:

Finding the Best Place for your Desktop PC

November 25, 2021 by Barry Walker

There’s a lot of talk about the best places to use your laptop. We’ll recap that discussion briefly below, but the real focus of this article is where it’s best to put your desktop PC.

First, why does it even matter? Of course, you care how your workstation looks, but beyond the aesthetics, airflow is important too. Computers cool themselves with fans to suck in cool air and expel hot air out the back or top. If you’re not leaving room for the computer to “breath” it can overheat.

When a computer overheats it can become unstable or suddenly shut down. The hot air can also damage internal components. This is true of both laptops and desktops.

That’s why you’ll hear that it’s a good idea to put your laptop on a raised, slatted service where air can reach the vents. A table over a furnace duct or in direct sunlight should be avoided too.

OK, But Where Do I Put My PC?

You don’t want to put your computer somewhere it is going to get dusty, which is a good reason not to put it on the floor. It’s exposed to more dust, hair, and other junk that way. Since the computer’s fans are sucking in cool air, they can suck in debris too.

Also, on the floor, you risk accidentally hitting or kicking the PC. Sudden jolts are bad for mechanical hard drives. Plus, USB drives or anything else plugged into the front could be knocked out, which damages the port.

Some desks have cabinets under the desk where you can put the computer. But, these may not have been designed with enough airflow.

It’s best to set up your computer on a stable surface to avoid any bumps or drops. You also want to position it so that the cord is not going to create a tripping hazard. If you fall, you could damage the power connection or, worse, knock the computer off your table or desk.

Since, the big thing is airflow, you also don’t want to set the PC too close to the wall. This can damage cables in the back if they bend too much. Or, when the hot air exhausts out the back, it will be harder to expel the heated air.

Securing Your Desktop PC

Putting your PC parallel to the monitor, safely stable on your desk or table, with good airflow and room for the cords is your best option for safety and longevity of your desktop computer.

Need help setting up your desktop PC or finding the best place to position it in your home? Our tech experts are available to help. Contact us today at (03) 5273 0230.

Filed Under: Residential Blogs

Share:

Delivering SMS “Smishing” Scams

October 15, 2021 by Barry Walker

Smishing is high up on the list of words that do not sound as intimidating or threatening as they should. Smashing the word fishing together with the “SM” for short messaging service (aka text), smishing is a cyberscam.

Especially with online shopping skyrocketing during the pandemic, delivery smishing has gained traction. Don’t fall victim to this type of cyberattack.

What does smishing look like?

You’ll get a text message that appears to be from a shipping company. You’re told you have a package coming, but that more information is needed to ensure delivery. You’ll squeal, “a package!” OK, maybe you won’t squeal, but you’ll feel anticipation and click on the link to help deliver that package to your door.

You might already be expecting a package. After all, as recently as June 2021, PWC was describing a “dramatic shift” toward online shopping. According to its most recent consumer survey, in the last twelve months:

  • 44% of those surveyed bought online using a mobile phone or smartphone;
  • 42% used smart home voice assistants to shop online;
  • 38% used a tablet for online shopping;
  • 34% bought something online via PC.

So, you might not think twice about clicking on a link appearing to be from a major delivery service.

Don’t do it.

What happens next?

You click on the link and are asked for personal information, even a credit card number or password. Otherwise, clicking on the link will download malware onto your phone. The bad guys use their access to snoop and/or send your sensitive data to its servers, without you knowing it.

The smishing scam is a global one:

  • March 2021 saw a 645% jump in Royal Mail-related phishing attacks, equating to an average of 150 per week.
  • UPS warns about this type of fraud on its website.
  • FedEx has tweeted the reminder, “We do not send unsolicited texts or emails requesting money, packages or personal information. Suspicious messages should be deleted without being opened and reported to [email protected]”

Package delivery isn’t the only common smishing tactic either. You might also see:

  • urgent messages saying your bank account is locked;
  • a warning from your credit card company about a fraud alert;
  • something promising that you’ve won a great prize;
  • an unusual activity report from a company where you have an account.

All that would get your attention, right? So, what do you do about smishing? That’s covered next.

Protect against smishing

Avoid getting drawn in by the urgency or emotional appeal of the SMS. Don’t click the link, and don’t call the number in the message either. Instead, look through your bills or go online into your account for information on how to contact that company.

Reputable mail carriers and financial institutions won’t send text messages asking for credentials, credit card numbers, ATM PINs, or banking information.

Look at the sender more closely. A message from a number with only a few digits was likely sent from an email address, which can flag that it’s a scam.

Also, don’t store personal banking or credit card information on your mobile phone. That way the criminals can’t access it, even if they do get you to download malware onto your phone.

You can help others to not fall victim to smishing as well. Report any attempts to your telecommunications carrier or your communications regulatory body.

For more helpful information on mobile security threats and how to protect your home network from cyberattack, contact us today on (03) 5273 0230.

Filed Under: Residential Blogs

Share:

How Hackers Get Around SMS Two-Factor Authentication

September 20, 2021 by Barry Walker

Every time you’re online and a site sends a separate code to check your identity, you’re using two-factor authentication. It’s become the norm. So, of course, hackers have figured out how to get around this, too. This article shows you how they do it and how to stay safe.

With billions of usernames and passwords leaked, access credentials everywhere are at risk, especially if you are reusing your log-in information on more than one site (don’t do it!).

Business websites want to offer a secure user experience, so two-factor authentication (2FA) has become the norm. It’s meant to help stop automated attacks in which bad actors use the leaked usernames and passwords.

Still, if the site you’re visiting uses short message service (SMS) to send a one-time code to your phone, you could still be at risk.

Hackers, using information they have from a data leak, can call your telephone company. They use your name, date of birth, and other identifiers available on the Dark Web, to impersonate you. Then, say you’ve lost your phone, they transfer your phone number to a device with a different SIM card.

That means when the one-time SMS code gets sent your phone number, the message will instead go to their device.

Android Users Also Beware

On Android devices, hackers have an easier time getting access to text messages. If they have access to your leaked Google credentials, they can log into your Google Play account. From there, it’s simply a matter of installing a message-mirroring app on your smartphone.

The app synchronizes notifications across your different devices. It’s for when you really need to be connected, and you’ll be able to see your phone’s SMS alerts on your tablet!

The app won’t work unless you give it permission when prompted to do so, but too many people don’t stop to read alerts from their own accounts: they assume it’s another necessary update and go on with their day. Otherwise, the hacker might call you in a social engineering ploy pretending to be a legit service provider. They’ll be familiar to you, so you’re more likely to listen when they ask you to give permission.

Again, when the one-time SMS code gets sent to your phone, because of the message-mirroring app, the hacker’s device will also receive the code.

What Can You Do to Protect Yourself?

It starts with using unique passwords for all sites you visit. Worried you’ll forget them? A password manager can keep all your access credentials in one secure place for you.

You should also confirm that your credentials haven’t been compromised. If you use Google’s password service, you can head to the password manager site and tap “check passwords” to see if there are any issues. On Firefox, head to the Firefox Monitor page and “Check for Breaches.” On Safari, click on Preferences, and then on Passwords to see what recommendations they have for your security.

Change any passwords that have been involved in a leak!

To avoid the SMS concern specifically, avoid using one-time SMS codes to verify your identity. Instead, you can use a non-SMS authentication tool such as Google authenticator, which provides two-step verification services within the app itself.

Need help learning if your credentials have been leaked? Or want assistance setting up more security for your online activity? We can help. Contact us today on (03) 5273 0230.

Filed Under: Residential Blogs

Share:

What Does “Right to Repair” Mean, and Why Does It Matter?

August 30, 2021 by Barry Walker

You may not think of yourself as “handy,” so the thought may not even have crossed your mind to take apart your cell phone or laptop to try and repair it. But did you know that in certain cases it might be illegal for you to even try? There is a debate raging over “right to repair.”

The right to repair issue crosses many products. Car enthusiasts have fought to access parts and guides to repair their vehicles. Farmers are pushing for the right to fix their John Deere agricultural equipment. Now, there are people lobbying for the right to fix laptops, cell phones, and other electronics.

Manufacturers, meanwhile, maintain that doing so risks their intellectual property. There may also be safety risks.

Additionally, they make money from planned obsolescence. Many PC users know what this means already. Anyone on the widely popular Windows 7 operating system had to move to new software in 2020. Microsoft is on a ten-year cycle. It provides a software product its full attention for five years, then it begins offering new options and stops supporting the old one. At the end of the decade, the software is no longer updated or supported. That means no security patches either, which means vulnerability to cyberattack, so users must go to the next version.

Now, you’re not going to build your own operating system, but what about when something goes wrong with your smart phone or tablet? You don’t always want to have to buy a new one. Plus, trading out the old one for a new device runs counter to sustainability goals. You end up with one more piece of hardware destined for the landfill.

Right to Repair Activism

Consumers, repair pros, watchdogs, and green activists have all joined the right to repair debate. They want to be able to upgrade processing power, memory, or battery power in electronics.

But many companies refuse to release the necessary parts (e.g. Apple). Manuals and product guides aren’t made available either. This makes it almost impossible to do-it-yourself repair the company’s products. The consumer must pay the manufacturer for repairs, or they can turn to a third party vendor (affiliated with the manufacturer).

When it comes to technology, the tide may be turning. Why? We are increasingly reliant on our phones and other devices. There’s more push back against a business model that forces us to upgrade every two to four years.

Plus, we’re more aware globally of the value of recycling and up cycling. One American grassroots group notes that repairing tech could bridge the digital divide. PCs for People wants to improve access to technology by rebuilding donated devices.

What It Means for You

Laws are in the works in many places to legislate the right to repair. In the U.S., Apple and Tesla are among those lobbying against state efforts. Nevertheless, 14 states have passed laws on right to repair. The EU has a law requiring companies to provide parts to independent repair workers. The UK’s right to repair regulations come into effect this year. Australia is currently assessing its laws related to right to repair, too.

Until laws change, consumers pay whatever the manufacturer demands for products that aren’t built to last. This also has each of us contributing to global technology waste. For more on the issue, visit repair.org, the site of the Digital Right to Repair Coalition.

Meanwhile, if you have technology that needs repairing, our IT experts can help. Contact us today on (03) 5273 0230

Filed Under: Residential Blogs

Share:

Beware These Social Media Scams

July 26, 2021 by Barry Walker

 

Huntington Volvo? Rowe Subaru? What will your hilarious quiz results be when you enter your fourth-grade teacher’s name and first model of car? You may think it’s silly entertainment … until it isn’t. Many fun social media questionnaires are set up by hackers to steal your identity.

It seems like a harmless collection of random facts from your past. These quizzes might ask for details such as:

  • What was your first job?
  • What was the name of your first-grade teacher?
  • What car did you learn to drive in?
  • What was your first concert?

These popular quizzes promise to tell your “rock star” name or your “superhero” name. You know it’s as reliable as the Magic Eight ball, but you play along anyway. We all need a laugh, right?

Except that the people really laughing are hackers. Many of the questions posed are also security prompts used to verify your identity online.

Cybersecurity experts agree: don’t take these quizzes. It’s not as if there is any real value in filling out the social questionnaire. You’re simply taking the bait and risking having your personal data stolen.

 

Avoiding Social Media Scams

Here are some tips to help keep you safe from social media hackers:

  • Don’t get hooked by clicking on that post that seems too good to be true, especially shocking, or scandalous.
  • Be wary of any quiz that asks for information that could be relevant to your online password.
  • If you must quiz, fill out questionnaires on reputable websites only.
  • Avoid quizzes that ask you to provide your email address.
  • Contact companies through trusted channels only.
  • Make sure that you are dealing with the proper entity’s real website and not a look-alike site created by a scammer.

Also, think twice about apps that change your face into a cartoon character or a painting. Facial recognition is a more common security tool. Be cautious about letting unknown apps collect your photos and facial details.

 

What to Do If Your Online Accounts Are Hacked

Cry. Curse. Panic. Any of these may seem like a reasonable response in the moment. Still, there are better things to do for long-term recovery.

#1 Have your devices inspected by trusted IT experts. This is one more area to be wary. Scam artists will set up sites that appear to be affiliated to the manufacturer or phone numbers that appear to go to technical support specialists. It’s best to take your devices to a physical repair shop with a real human doing the work.

 

#2 Change your passwords. When your account is hacked, you’ll want to change that password immediately. Plus, as annoying as it is, change passwords for all accounts accessed on the compromised device. The hackers may have installed a malware that tracked all data transmitted on the device.

#3 Set up credit monitoring. Notify any financial institutions or credit card companies if those accounts are hacked. You’ll likely need to have them issue you new cards with fresh account numbers. You can also ask them to monitor your accounts for fraudulent transactions. You might also set up credit monitoring with your region’s credit reporting agencies.

Keep in mind that criminals can be patient and may not use your information right away. So, don’t think you’re in the clear because nothing happens in the first month.

Need help protecting your devices and online accounts? Contact our IT experts today. We can also review your security setup at home to help prevent you being victim of a cyberattack.

 

Filed Under: Residential Blogs

Share:

Stop Your Technology from Stalking You

June 23, 2021 by Barry Walker

Unless you’re a reality television star, you probably don’t like the idea of being watched at all times. So, why would you want your technology to know all about you? With digital technology today, it’s far too easy for our devices to turn creepy. Here are some suggestions to stop the stalker-like tendencies of the technology you rely upon.

Today’s marketing and online communications are all about customization and personalization. If you like a friend’s picture of an Art Deco door in Belgium, you see many more posts featuring similar designs. Or if you view an area rug on a website, you’re suddenly bombarded with ads for rug stores when you next go online.

This can add convenience, but it is also unsettling. What companies online know about you could be more detailed than what your friends know. Take the following steps to regain control of what your computer, phone, and apps know about you.

 

Review your privacy settings

Whether going online from a phone, laptop, desktop, or tablet, get to know the device’s privacy settings. Some important settings to review include:

  • email tracking – this can let people know if you opened their message or not;
  • location tracking – personalizes recommendations but also tells search engines where you are;
  • voice recordings – manufacturers use these to train virtual assistants, but pause this to keep your conversations to yourself;
  • purchase history – this helps feed the machine so that businesses know how to target you in the future.

 

Opt out or block ads

Opting out of ads limits the information collected from your browser or device. The site or business still receives basic information about you, but you will no longer receive targeted, interest-based ads any longer. Apple’s iOS 14 allows app blocking, and you can also express your choice on Android devices.

Otherwise, use browser ad blockers, such as AdBlock Plus, or JavaScript blockers, such Ghostery, to limit ad tracking. Also known as content blockers, these software programs prevent ads from showing on websites you visit. You can find ad blockers for Chrome, Firefox, Opera, Safari, and Internet Explorer.

 

Check your permissions

Watch the permissions you give apps. We have already talked about checking device settings, but you can also limit the permissions you give to apps. For example, social media accounts have privacy settings that allow you to control what’s logged about you.

Plus, check permissions for other apps. Clash of Clans doesn’t need location services, for instance. Or you might not want to give Slack access to your microphone and video recordings.

 

Use webcam covers

Covering your webcam stops someone from potentially seeing and recording you. If you think you’d see the light come on to show the webcam is in use, know that hackers can disable that. A simple sliding webcam cover closes the webcam when you are not using it to avoid a cybercriminal having access.

Covering your webcam can also come in handy in all those online meetings you’re having. A covered camera means you don’t run the risk of your colleagues catching you unprepared.

 

Limit information you provide

Social media has created a culture of oversharing. There are probably many things you’ve seen about friends online that you would rather not know. You’re also sharing more than you need to with the companies that you interact with online.

If you’re filling out a form for a download, you might fill out only the required fields. When you add an app, be stingy with your personal details. Think about it from a need-to-know perspective. For instance, that home design game you love to play doesn’t need to know where you went to high school or with whom you bank.

Need help keeping the privacy-busting algorithms at bay? We can help. Our IT experts can configure device settings to limit information gathered about you online. Contact us today at (03) 5273 0230!

 

Filed Under: Residential Blogs

Share:

5 Tips to Protect Your Laptop from Physical Damage

April 14, 2021 by Barry Walker

A laptop can hold your life. If you’re working from home, it’s essential to your income. For students, it’s where you keep all your notes and essays. Plus, there are the personal photos and videos. So, you want to keep it in great shape. Here are five tips to protect your laptop.

#1 Don’t drop it

Or throw it, or stand on it, or expect it to withstand any serious impact. OK, that’s pretty obvious. You also don’t want to use your laptop in the bathtub or at the pool. Even a simple water spill on a laptop can damage the circuitry. If you do get your laptop wet, immediately turn it off and unplug everything attached to it.

#2 Open carefully

Laptops are getting thinner in every iteration. Some now even have foldable screens. The thinner and more flexible screen may look sleek and cool, but it’s also less rigid, which makes it more prone to damage. Especially on lower-cost laptops, the screen can flex if you open the computer up from just one side.

Yet, many of us hold a laptop in one hand and open the lid with the other. This can cause the screen to twist. Use both hands to open the laptop. Or get into the habit of opening your laptop from the center to avoid flex.

#3 Don’t bedazzle your keyboard or screen

Alright, maybe you weren’t planning on putting faux rhinestones on the screen or keyboard. Still, reconsider any decorations you have thought of adding. Even a keyboard protector (to prevent dust or spills getting into the circuitry) or camera privacy sticker could damage some of the new super-thin laptops. It’s just that there is now so little clearance between the keyboard and the screen.

If you really must have your stickers, put them on the protective sleeve that you get for your laptop.

#4 Disconnect carefully

Your laptop needs a consistent power source. If you damage the power cord connection, you’re done. So, make sure you pull the power cord out straight. Yanking it out sideways could damage the port.

Also be aware of where your power cord is connecting to the wall outlet. If you leave the cord trailing along the floor, someone could trip over it, or it could get caught on a rolling chair. This could not only damage the charging port but even pull the entire laptop onto the floor. That brings us back to #1, don’t drop the laptop!

#5 Keep it cool

No, you don’t have to store it into a refrigerator (please don’t!), but heat isn’t good for your laptop. You’ll want to keep your computer away from external sources of heat.

Again, as the laptops get thinner, they are more vulnerable to internal overheating. Ensure that the laptop’s intake ports are unblocked so that air can flow through and cool the circuitry. You might also blow dust out of the vents using canned air.

 

Also, avoid placing your laptop on very soft surfaces. A soft, uneven surface is more likely to block the internal fans. This leaves your device unable to regulate its temperature. You could even buy a laptop cooling stand, which provides extra fans to improve air circulation.

Average laptop lifespan will vary between two to five years. Keep your laptop on the longer side of that by taking these tips to heart.

If something does happen to your laptop, give us a call at (03) 5273 0230. Our IT experts are here to help you find the best laptop for you, upgrade and secure your laptop, or fix your laptop when you need it.

Filed Under: Residential Blogs

Share:

  • 1
  • 2
  • 3
  • 4
  • Next Page »

Newsletter Categories

  • Newsletters – Business
  • Newsletters – Residential

Recent Newsletters

  • The Unexpected Benefits of Password Managers January 6, 2022
  • 3 Reasons to Avoid Signing in With Facebook or Google Accounts January 6, 2022
  • The New PC TuneUp December 10, 2021
  • Finding the Best Place for your Desktop PC November 25, 2021
  • Delivering SMS “Smishing” Scams October 15, 2021

Element IT

1300 600 550
Suite 32 / 3 Dyson Court
Breakwater, Vic 3219

Element IT – Geelong

Monday to Friday 9am to 5pm

Terms and Conditions

FOLLOW US

Copyright © 2022 · Element IT · Suite 32 / 3 Dyson Court, Breakwater, Vic 3219