Updates keep you safe!

Computers continue to advance at a rapid pace and the Internet has expanded to the point it encompasses our everyday lives. Moving just as quickly is the downside to all this technology, those exploiting flaws. The Internet is overrun with exploit sites and viruses that are looking to take advantage of vulnerabilities in software, this is why keeping your system up to date is all the more important.



Updates, whether for the operating system or an application, are vitally important to keeping you safe. These updates are almost always a security fix rather than a feature change. As each new exploit is found, developers work hard to fix these and release them to the public.

Installing updates is a fairly simple process as the operating system or program will alert the user there are updates waiting. While some may view it as an inconvenience to stop what they are doing to install, the inconvenience is small compared to fixing an infection the update would have prevented. Some even give the option to install automatically to minimize the impact on the user.

Microsoft has recently changed their update policy to better reflect the current atmosphere. Where users could disable updates all together, in Windows 10, home users have no choice. Microsoft also sped up the delivery on these updates. It used to be once a month a batch of updates where released. Now, in Windows 10, the updates are released once they have been developed. This not only helps speed up the update process, but keeps your computer better protected.

As long as computers continue to be a part of everyday life, we can count on dealing with viruses and exploits. One of the many ways a user can help shield themselves is to keep the operating system and programs up to date.

Written by: Andrew Owen, MCP

If you need assistance with your PCs or software updates, please contact our experts today! http://www.hccsinc.com


“Will you be able to recover my files?”


As our lives become more intertwined with the digital world, the importance of protecting these bits of ourselves becomes greater. A frequent question we are asked when given a computer that is not functioning properly is, “Will you be able to recover my files?” Depending on the scenario this can be quite a costly endeavor. As the saying goes, an ounce of prevention is worth a pound of cure, so too is the value of having a good backup.

Microsoft also recognizes the importance of backing up your files and has included a backup utility in their operating system for some time now. A utility that has evolved right along with the way users interact with their files. However, no matter which iteration you have it is of no value unless it is used and used properly.

Before you begin backing up your files it is important to have a good place to store them. We recommend getting an external hard drive with a capacity at least the size of the hard drive in your computer, preferably twice that. This will give you enough room to store several copies of your files and protect these files in case of a hard drive failure in your computer.

The next thing you will want to do is establish some schedule for backing up the files. When using the older backup utility found in Windows 7 and older, this entails picking a day of the week and time. As the backup can take several hours to complete, you will want to pick a time where you are less likely to be using the computer heavily. If you run it weekly, the time needed will not be too bad, but at a minimum you will want to run it monthly. If you have a Windows 8 or newer machine, Microsoft phased out their old utility in favor of something called File History. This is a constant backup, so beyond the initial first run, this will take no time. Best of all is runs constantly and saves your files when it detects a change and even lets you restore an older version if you made a change by accident.

No matter what your case is, having a good and current backup is almost always worth it. It brings peace of mind and can save you considerable money in the event your computer heads south. If you are not comfortable with setting up your own backup or just want some reassurance you did it correctly, give us a call. We are always happy to lend a helping hand.

By: Andrew Owen, MCP, Tech Services @HCCS, INC.


Discover the “Heritage difference” in network administration & tech support




For 25 years, HCCS, Inc. has provided technology solutions for individuals and businesses in various industries, but you may be surprised to learn that even we rely on a technician to keep our computer network and equipment running smoothly.  We are so committed to providing quality services, we even offer Microsoft Certified technical support for our clients!   In today’s computer era, small businesses have to keep up with the pace of new technologies to stay relevant.  The only techs we trust with your technology are the same technicians we trust to care for our own network and equipment.  Andrew Owen, MCP, leads our tech services department, providing a myriad of network administration and computer services.  He does a little bit of everything, from troubleshooting printer issues over the phone to personally setting up a home or business network.

“I take a lot of joy from helping someone out, no matter how simple or complex,” Andrew says.  “Everyone needs help from time to time, so it is great when you can be the one lending a hand.”

Andrew lends his expertise to clients who recognize a technician is essential to maintaining a healthy and functional network.  He says his calling to provide technical support comes from his own passion for experiencing new technology, and the speed at which it moves and develops.

“I am a fan of shining new things and learning new skills,” Andrew claims.  “With the pace at which technology evolves being so fast, it really does make [information technology] an interesting field, as there is always something new and exciting just around the corner.”

For consumers, new and exciting technology often means new and frustrating issues with your computers, network and security. Luckily for our clients, Andrew provides technical support and training to help everyday users become masters of their own technology.  He recommends hiring an IT specialist to anyone who works with computers.

“You get prompt service, and can leverage expertise when you need it,” Andrew says. “It also allows you to build up a rapport and get comfortable with those taking care of your equipment.”

Andrew has some advice for computer users to keep their equipment healthy:

“Install updates on a regular basis and keep your antivirus up to date,” Andrew suggests.  “Be sure what you download and install is something you want, and read everything closely before clicking that button.”

Of course, you know who you can call if something does go wrong with your technology: Andrew Owen, MCP,  HCCS, Inc. 913-529-4227.

HCCS Holiday Shopping Guide 2014


Are you asking the right questions about your technology purchase?

Buying the perfect gift is hard, but when you are purchasing technology for someone else, it can be even more stressful.  Before you jump on that Cyber Monday deal for a new tablet or computer this holiday, it is important to research the device fully to make sure your bargain is not lacking any important hardware or software features.  When we purchase new technology for the company, we entrust this responsibility to our IT department, but not everyone has a Tech on hand to address concerns.   So, what questions should consumers ask before purchasing a new device?

What is the device being used for?

It is important to determine how a device will be used before deciding which version of the device is right for you. For example, a person who is on the go will probably prefer a laptop over a desktop computer.  A person using a device for business will have different needs and expectations for it than a person using a device for personal or recreational reasons. For instance, a gaming device may require better graphics than a business device.  Knowing how the user will utilize the technology helps determine which device is best suited for their individual needs.

What is included on the device already?

There are certain hardware and software components vital to determining which device is best suited for your gift.  When looking at a new device, consider the hardware requirements for the way it will be used.  If it will be purposed for gaming, it is important to look at the memory requirements, processing speed and hard-drive space necessary to run a game or specific software.  If the device will be used for business, does it come with Microsoft Office or will the user also need to purchase additional software?  Some of the holiday promotions and special offers are available for a reduced price because the device is not fully furnished. Once you know the answer to question 1, it is easier to determine your system requirements and verify that the sale item contains everything the full price device includes.

What happens if it breaks?

When disaster strikes, it is good to have a plan in place.  That’s why it is so important to get a device with a warranty.  Find out the return policy before you purchase a new device, so there are no surprises.  Many stores will not accept returned computers if they have been removed from their packaging, and even unopened devices sometimes only allow a refund of store credit.  Depending on where you purchase your new technology, the vendor may have a store warranty to cover the device, or there may be a manufacturer’s warranty.  Sometimes there is an option for both! Be sure to ask the vendor who will honor the warranty on your new device.

When you encounter an enticing sale price this holiday shopping season, use this guide to research the device, and make sure the deal includes everything you want from your new technology.

Happy hunting and Happy Holidays from Heritage Computer Consulting & Services, Inc.

Beware of new Phishing attack disguised as an update! Photo examples in post….

The Internet is great for providing entertainment, information, or anything else you could imagine. It is also filled with malware and other programs that cause harm to your computer. One of the methods these programs use to infect your computer is called phishing.

Think of it like actual fishing. A piece of bait is used to draw the target’s attention. Once that bait has been taken, the program is then installed. Sometimes the programs cause more annoyance than actual harm. Other times they quietly steal your personal information and pass it along. Here are some tips you can follow to help limit your chance of falling victim to a phishing scheme.

1.  Never download or install anything unless you are sure of what it is. A lot of the time, these phishing attacks pose as one thing but are really something different.
2.   Be wary of any windows that popup while you are on the Internet. More often than not, it is a phishing attack hoping you will click on it.
a. When you close any popups, always use the X in the upper right corner. Pay close attention that you are clicking the correct X. Sometimes these popups are cleverly designed and have their own X they hope you will click on.
3.   Along the same lines, be cautious when clicking on anything telling you software is out of date, especially when on the Internet. Internet Explorer, Firefox, and Chrome do not alert the user in a popup. If you see any of these, close them by using the X in the upper right corner.
4.   Be skeptical of any window or popup stating your computer is infected. This is one of the more popular phishing schemes. Antiviruses are smart enough to work without you telling it to clean your computer. Your safest bet is to just close the Window. If you really have an infection it will alert you again.

We have added a few pictures of various phishing attacks. Remember to be 100% sure of what you are downloading and close any obnoxious popups with X in the upper right corner. Following these simple rules should make your time on the Internet more enjoyable.


Mobile Security, Part II: Managing your passwords securely

Many consumers are questioning the security of their mobile transactions and monitoring their online accounts and digital assets more carefully in recent weeks.  With scares like Heartbleed and the breach in Target consumer information in recent months, the threat of identity theft and website fraud seems to be on the rise.  According to a web article by USA Today, their user survey showed consumers are checking personal online banking accounts and credit card balances more frequently to better monitor fraud.   With all the anxiety and upheaval surrounding these security concerns, many users are adapting the method of keeping different passwords for different websites, in an attempt to be more secure.


In our last post we addressed how to develop a secure password or passphrase for your devices, applications, and websites.  Another challenge to users is the amount of passwords individuals are expected to remember for different apps, websites, personal online accounts, business account access, and sometimes also school account access.  It is not recommended to store sensitive information on your mobile device, so how do you record that information for reference while still maintaining separate passwords for security purposes?  Our experts have a few ideas for storing and recording sensitive information on your computer or mobile device.


  1. DO NOT RECORD PASSWORD INFORMATION: One of our technicians specializes in network security and administration for our company and our clients.  He says he never records password information for his personal accounts because it is too risky.  If he forgets his password, he prefers to go through the website’s recovery prompts to retrieve or reset his log-in information.
  2. TRY NOT TO STORE PASSWORDS ON MOBILE DEVICES: While there are exceptions to every rule, our technicians suggest passwords and personal data be stored as little as possible on mobile devices.  If you feel you must write down or record your password to remember it, make sure you don’t label it as such, and then keep it in a safe place.  Some users even develop a code to help them remember their log-in information!  For instance, if your password is a name and number that is significant to you, it would be easy to create a code or some prompts to help jog your memory!  Let’s say your password is the year you were born and the name of your street:  1975Mastin. Your reminder prompt could say: birth year (YYYY)street (M—-n) to give you an idea how many characters are in the password, and a clue as to the code you used.
  3. USE A SECURE SPREADSHEET TO ORGANIZE SENSITIVE INFORMATION: There are security risks associated with storing any data, no matter the method, but some users like to organize their sensitive information in a password-protected spreadsheet on their laptop or desktop computer. If that is the method you choose, please use our tips to develop a strong password to protect your digital assets! For our administrative staff accessing multiple vendor sites each day, this method is preferred.  This way it is easy to copy and paste information from the spreadsheet, so it becomes less of a chore to change the passwords regularly.

Different methods work better for different users.   As soon as you find a method that suits you, your personal information will be much more safe and secure.   Now that you know how to keep your information safe at home, make sure you check out our next post about safe browsing on your mobile device over public Wi-fi.


By: Lacey Rickert, Marketing Director at HCCS, Inc.


Reference: http://www.usatoday.com/story/tech/2014/06/03/internet-security-survey/9907947/

Mobile Security, Part I: Tips to Develop a Strong Password


Identity theft and online account security is a popular discussion amongst users of mobile devices.  It’s a hot topic because computer hackers are constantly finding new ways to scam the everyday user.  As technology continues to grow, the potential for security risks online will also increase.  Just last week, many consumer sites announced the discovery of a serious security flaw called the “Heartbleed bug” affecting the website encryption software  protecting the sensitive personal data of millions of web consumers.  According to Mashable.com, companies with popular sites such as Google, Facebook, Instagram, LinkedIn, Pinterest, Tumblr, Twitter, and Yahoo acknowledged the Heartbleed bug last week, and issued a security patch to fix it.  (The same article also lists these sites as potential Heartbleed victims: Etsy, GoDaddy, Flickr, Netflix, Soundcloud, Dropbox, OKcupid, Wikipedia and Youtube.)   The affected companies urged users to change their passwords immediately in order to remain secure on their sites.  Heritage also encourages users to change their online passwords regularly in order to protect sensitive personal information.  Whether on a laptop, tablet, or mobile phone, the first line of defense against hackers and other potential security risks is a strong password.

In their post, “Tips for creating strong passwords and passphrases,” Microsoft says a strong password is a code that has 8 characters or more and contains both uppercase and lowercase letters, a numerical character, and a symbol.  It is best to avoid using your username, real name, company name or other publicly available information in your code.  Unfortunately, hackers have all the tools on their side to help crack your code. To develop a strong password, first make sure it does not contain a word from the dictionary.  If you use an English word for your password, Microsoft suggests substituting numerical characters for some letters in the word to meet the strong password criteria.  In their example, Microsoft says the password “Hello2U!” meets all the criteria of a strong password but would still be considered weak because it contains a complete word.  A stronger alternative password suggestion is “H3ll0 2 U!” because it breaks up the real word with numbers and spaces.

There are many methods for developing a strong password, but at Heritage, we prefer to develop a strong passphrase instead.  A passphrase is just a series of words that create a phrase the user can remember easily.  According to Microsoft, a strong passphrase contains at least 20-30 characters, and does not contain common phrases found in literature or music, like song lyrics or a line of poetry.  As with passwords, it is more secure if the passphrase does not contain your username, real name, company name, any repeats of prior passwords, or personal information that is publicly available.  The long phrase creates a more complex code to help protect the user’s sensitive information.

Another challenge to users is the amount of passwords individuals are expected to remember for different apps, websites, personal online accounts, business account access, and sometimes also school account access.  It is not recommended to store sensitive information on your mobile device, so how does one record that information for reference while still maintaining separate passwords for security purposes?  In our next post, “Mobile Security, Part II: Managing your passwords securely,” the experts at Heritage discuss safe ways to store your log in information.


By: Lacey Rickert, Marketing Director, HCCS, Inc.

Read More about the Heartbleed Bug here

Mashable.com’s “Heartbleed Hit List” of affected sites