Don't be a victim. Malicious cyber-criminals may attack your home network to gain access to personal, private and confidential information.
Tech Mentor 4 Seniors can help you evaluate the quality of your cyber security by analyzing the security status of your PC and network. The cybersecurity actions protect your from theft of your identity.
One of the latest threats is AI voice cloning which a malicious party can use to make it seem like they have a loved one held hostage.
To verify the call - hang up and call that person’s number from your phone .
Ask a challenge question – something only your loved one would be able to answer.
Never answering calls from unknown numbers – let them go to voicemail .
Password Management Software systems are software utilities that securely store passwords and automatically fill them into login pages for you. They make it easy for you to protect each of your online accounts with strong, unique passwords. I help clients install a password manager.
2FA is a log in process that requires you to enter a second code in addition to your password each time you sign in to a computer. In the most common version, the vendor sends the second code to your cell phone and you copy it into your computer to log in. I help clients learn how to log in using a 2FA process and evauate setup choices they can use to make the process easier to operate.
The basics of how “smart” technology works and how to use the gizmos. I teach tips and tricks to make it easier to use smart technology.
Computer data is stored in files. Lots of files. I help design and set up a filing system. The system helps you find files when you need them. As an added benefit, I can also help you implement a process to store computer images of papers to make storage easier.