Google+ How secure is your computing environment? ~ High Tech House Calls
Expert Computer Consulting for Homes and Small Businesses

Let there be hope...

Life has changed there is no doubt and we wanted to reach out to see how you are doing.

As we go through this interesting time, we are trying to look at this as an opportunity to focus on our family and on friends like you. Let us use this extra time to catch up and talk more. Let us cook food that is not fast, but interesting and satisfying. Let us learn to enjoy a time to try new things. Let us find ways to enjoy time at home!

Computer Security

If my client base is any experience, anyone can be a victim of a Ransomware, Malware or Virus attack.

What can you do about it?

I conduct audits of your entire computer infrastructure and apply best practice solutions to plug the security holes on your computers, Smartphones and networks.

Now offering consultations to give you the best protection possible:


404.229.0839
carlthorne@hthcatlanta.com

Jack of All Trades, Master of Many

Jack of All Trades, and Master of Many

We provide technical support for:


Homes and small businesses

Windows and the Mac OS platform

iPhones and Android Smartphones

Wireless and wired networks

New device setup

Old device upgrade or repair

One-on-one training

Remote assistance


How To Stop Malware

Monday, July 2, 2012

How secure is your computing environment?

What would happen if your  laptop or smartphone were stolen? 
  • Can you replace the data? 
  • Could the thief steal your identity by using the data on your laptop or smartphone?
  • Could someone drive by your house and read the data on your hard drive, or intercept the data you send from your laptop to the Internet, from your wireless network?
Here are some things you can do to minimize your security risks:
  • Password protect your computer and smartphone.
  • Have a backup procedure in place for all your data. Test the recovery procedure to make sure your backups are working.
  • Secure your wireless router by using the strongest encryption protocols your wireless router supports.
  • Encrypt sensitive data so that only those who know the key can access it.
  • Make sure your computing environment has up to date BIOS, hardware drivers, operating system and application software patches.

High Tech House Calls has achieved a  Comp Tia Security + certification. We can review your home or small business computing environment and suggest inexpensive and unobtrusive ways to minimize your risk.
Carl Thorne
Expert Computer Consulting