• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
A1 Computer Repair

A1 Computer Repair

Computer Services

  • Computer Repair
    • Local Computer Repair
    • Laptop Repair
    • Slow Computer Repair
    • Online Computer Repair
    • Custom Computer Builders
    • Get a Repair Quote
    • Schedule a Computer or Laptop Repair
  • Our Services
    • Cell Phone Repair
    • Backup and Restore Services
    • Managed Services
    • Computer Repair Services
    • Malware Removal
    • Full System Tune-Up
    • Data Recovery Services
    • Cryptolocker Prevention
  • Support
    • Online Malware Removal
    • Create a Support Ticket
    • Remote Support Request
    • Schedule a Computer or Laptop Repair
    • Online Repair Quote
  • Pay Invoice
  • Contact Us
    • Contact A1 Now
    • Schedule a Computer or Laptop Repair
    • Customer Support
    • Remote Support Request
    • Get a Quote
  • Call (530) 903-8838
  • About Us

e-mail fraud

How To Protect Your Files From Malware

April 11, 2015 by admin

Protect Your Files From Malware and Viruses

Backing up your files is the best way to protect your files and data. Once you have a great backup system installed, you’ve already taken the most important step in protecting your computer – but there are threats beyond data loss that you can prepare for.

How To Protect Your Files From Malware

Malware (short for malicious software) is software that is developed to disrupt or damage a computer system. It can appear in a number of ways and can be used to gather private information, delete data or even lock people out of their own files. According to Kaspersky Labs, there are more than 200,000 new malware threats per day!

One such malware, Cryptolocker, has been making the internet rounds over the past several weeks. The software is called “ransomware”, as it encrypts the files on infected computers so users can’t access them. When someone tries to open a file on a computer infected with this malware, they are alerted that they must pay $300 for their files to be unencrypted so they can access them. Deleting the malware or refusing to pay the ransom will leave their files encrypted.

As a trusted partner in data protection, Carbonite Backup wants to ensure that our customers are aware of these threats and know how to prevent them from infecting their computers and servers. Here are some tips that can help you avoid malware and other types of viruses to protect your files:

  • Be an email skeptic: Malware is often spread through email links or attachments. Don’t open attachments or click on links from people or companies you’re not familiar with.
  • Free software – too good to be true?: Downloading free software is tempting, but it may include spyware and other malicious content. Only download software from trusted vendors.
  • Down with the pop-ups: Block pop-up windows and don’t click on links or buttons within them.
  • Bump up your browser security: Go into your web browser settings and make sure your security settings are set to medium or higher.
  • Beware of illegal downloads: While it’s tempting to watch a movie that’s still in theatres on your computer, many files shared on illegal file-sharing sites have pieces of malware attached to them.

These are just a few tips that can help you avoid the headaches to protect your files and other negative effects of malware. Need more information on backup software? Contact Us or Open a Support Ticket, we are here to help.

Reprinted from an article

Filed Under: Tech Support Blog Tagged With: anti cryptolocker, anti malware, apple security, back up, backup, computer help, Computer Tips, Cryptolocker Prevent, e-mail fraud, internet security, malware protection, ransomware removal, remove hijacker, remove malware, security, windows security

What is Phishing? Phishing and Identity Theft

November 23, 2013 by admin

Scammers and Hackers are Phishing For Your Identity

what is phishingWho hasn’t received an email directing them to visit a familiar website where they are being asked to update their personal information? The website needs you to verify or update your passwords, credit card numbers, social security number, or even your bank account number. You recognize the business name as one that you’ve conducted business with in the past. So, you click on the convenient “take me there” link and proceed to provide all the information they have requested. Unfortunately, you find out much later that the website is bogus. It was created with the sole intent to steal your personal information. You, my friend, have just been “phished”.

Phishing (pronounced as “fishing”) is defined as the act of sending an email to a recipient falsely claiming to have an established, legitimate business. The intent of the phisher is to scam the recipient into surrendering their private information, and ultimately steal your identity.

It is not as easy as you think to spot an email phishing for information. At first glance, the email may look like it is from a legitimate company. The “From” field of the e-mail may have the .com address of the company mentioned in the e-mail. The clickable link even appears to take you to the company’s website, when in fact, it is a fake website built to replicate the legitimate site.

Many of these people are professional criminals. They have spent a lot of time in creating emails that look authentic. Users need to review all emails requesting personal information carefully. When reviewing your email remember that the “From Field” can be easily changed by the sender. While it may look like it is coming from a .com you do business with, looks can be deceiving. Also keep in mind that the phisher will go all out in trying to make their email look as legitimate as possible. They will even copy logos or images from the official site to use in their emails. Finally, they like to include a clickable link that the recipient can follow to conveniently update their information.

A great way to check the legitimacy of the link is to point at the link with your mouse. Then, look in the bottom left hand screen of your computer. The actual website address to which you are being directed will show up for you to view. It is a very quick and easy way to check if you are being directed to a legitimate site.

Finally, follow the golden rule. Never, ever, click the links within the text of the e-mail, and always delete the e-mail immediately. Once you have deleted the e-mail, empty the trash box in your e-mail accounts as well. If you are truly concerned that you are missing an important notice regarding one of your accounts, then type the full URL address of the website into your browser. At least then you can be confident that you are, in fact, being directed to the true and legitimate website.

Filed Under: Tech Support Blog Tagged With: anti phishing, e-mail fraud, email, identity theft, phishing, phishing scams, spam

Primary Sidebar

Call Today: (530) 903-8838

(530) 903-8838

Find A1 on Social Media

  • Facebook
  • LinkedIn
  • Twitter
  • YouTube

a1 computer repair google reviews

yelp reviews

Copyright © 2025 A1 Computer Repair · Serving the Placerville area since 2014 - Website Design and Website Hosting by WebOvative

  • Get Quote
  • Customer Support
  • Computer Repair
  • Laptop Repair
  • Computer Services
  • Cell Phone Repair
  • Blog
  • Privacy Policy
  • Terms and Conditions