Yellowstone Computing
(715)-669-6136
  • Home
  • Services
  • Support
  • Contact
  • Blog
  • About
  • Reviews
  • Repairs

Protecting Shared Computers for Work from Home

8/26/2020

 
Picture
Many families today have a shared home computer to help with day-to-day activities. A teen can search for a job and stream shows. A parent can check work emails, pay household bills, and shop online. A youngster can play an educational game to buy Mom or Dad a few minutes of peace. Yet with COVID-19 sending so many people home to work, the shared computer is getting a lot more use.

Not every employee was lucky enough to get sent home with a business laptop. Some employers ask you to use your own computer. At the same time, you may also be accommodating kids doing online learning, and those little ones still want to go online and point and click to help Elmo plan a birthday party.

But sharing the computer can now present a security risk. You may have important work documents on the home computer. You could log in to the business network unaware of malware downloaded onto your home device, and, of course, that malicious software isn’t doing your home computer any favors either.
With so many people using the computer, make sure to set up virus protection on your home device. Additionally, you may set security patching and software upgrades to happen automatically. One of your young users could be seeing the message requiring an update and ignoring it. That leaves you unaware the software is vulnerable to bugs or threats.

Setting Up Personal Profiles
With everyone sharing the desktop, your work is at risk. You could have downloaded a spreadsheet containing employee personal identification information. That represents a compliance risk if another user inadvertently accesses the document. Or you could lose hours of work. Someone else might drag that project you’ve been working on to the trash with a school assignment rubric.
Our IT experts can set up different account profiles for each user. Doing this not only helps to secure your work from home but can also add protection for your kids.

The immediate appeal is personalizing the desktop for the individual user. Your kids can pick their own home screen backdrops and menu bars. You might not need access to Netflix, but your teen is thrilled to have it right there on the desktop. For smaller children, you can make icons and text bigger. Set up narration to give yourself a break from the umpteenth reading of Goodnight Moon.
For parents, security advantages of the profiles include being able to set up the following:

·        Web filtering enables you to set rules to screen incoming Web pages. This can help avoid children seeing explicit content or accessing a malicious site. You might also limit Web browsing to particular sites.
·        App limitations can ban kids from buying and downloading certain apps or making in-app purchases. For older kids you could require parental permission first.
·        You can set up Screentime limits for particular sites (e.g. Netflix or YouTube) or allow young people to access online content only at certain hours of the day.
·        Age restrictions allow you to filter mature content from search results. These also filter what apps, games, and media the young user can view or buy.
Individual profiles also make it easier for parents to track online activity and computer use. We can even set it up for you to receive reports on Web browsing and application use.
​
Secure your work from home and protect your family of users. Get help setting up the right controls for your home computer needs. Visit us online at www.YellowstoneComputing.com or visit our new store at 219 N Washington St, downtown Thorp. We’re open Monday through Friday from 9am to 5pm.

What We Do

8/26/2020

 
Picture
​Now and then we get a customer who will stroll through the office and they’ll say something like, “do you sell computers” or “where can I find a new mouse”? Questions like this make us aware that some of our customers are still figuring out what Yellowstone Computing offers the community. 

Years ago, when Scott’s Computing was located on Washington Street in Thorp, Joe worked there as a technician, performing the numerous repairs and services that they offered. Around 10 years after moving from Scott’s Computing, we find ourselves back in the same building, but now with our own computing business. It was in 2014 that we decided Joe would quit his full-time job at another business in Thorp to go full time with our computer repair business. Initially operating under the name DeepCore5 Consulting, we eventually renamed our business as Yellowstone Computing, which is fitting not only considering the area’s Yellowstone Trail, but also because of Joe’s love of history. 

Over the intervening years, many of you have visited our old office in our little one-room basement location. However, as our business has grown, we’ve increasingly seen the need for more space, so we are very excited to be in a bigger office. We see God’s hand in leading us back to the same place Joe worked from as a teenager, and now having come full circle as a business owner. 

With hundreds of clients, largely in a 50-mile radius of Thorp, we offer our community a wide range of services and technical equipment. This includes: 
- Desktop and laptop computers, servers, keyboards, monitors, and almost any accessory you need for your home or office.
- Tune Ups, malware removal, hardware and software repair and diagnostics
- Data backup and transfers
- Technical consulting
- Premier business technical consulting, network and IT infrastructure, support and installation 
- Managed service plans
- Project planning and financing options  for business or residential clients

Our customers range from individuals in the community who use their computers at home, to medical offices, municipalities, businesses, and farmers who require dependable technical support. It is our goal that with our new office, and as we add new staff, that we continue provide quality support for any technical need for many years to come.
​
We look forward to seeing you at our grand opening on September 3rd!

New Office Update

8/18/2020

 
Hello everyone! I wanted to take this opportunity to update all of you on where we are at as a company. First, I must apologize for the sporadic articles and lack of consistent updates on social media and our website. We are still in business and plan to be for a very long time. Over the past two months, we have been focused on creating a new store front and office space for our growing company. Essentially, this translates to countless hours of renovation and updates, while continuing to be available to the pressing needs of our customers. It’s been a full summer! Now that we’ve essentially finished with our office preparation we are better equipped to serve you. Indeed, were it not for God’s favor and the blessing of all of you, we would still be in the basement office you’ve come to know so well. 
Now that the major work is complete, we are pleased to welcome you to our new location at 219 N Washington Street in Thorp! (Located between Dairy Bar and Knockout Nutrition.) We now have space for more computer and accessory displays, more inventory, an expanded service desk, and offices. We are also blessed to host office space for Derek and Jeannie of Edwin-Marie Web Developers! Derek and his wife Jeannie work together to create beautiful, functional, high-end websites. We are excited to welcome them to our area. 
When you visit Yellowstone Computing, you may bump into other new but familiar faces as we begin adding employees in the coming months. At the beginning of September we are starting up Coffee & Cookie Thursdays, as well as celebrating an official grand opening that our customers and friends are all invited to join. We look forward to seeing you soon!

Backup Your Apple Computer

8/18/2020

 
Picture
​There are many moments in life when we would like to travel through time. One common instance is when an important document disappears from our computer screen. Making things worse, we forgot to save it! That’s hours of work lost. Fortunately, Apple users have Time Machine’s built-in backup feature for added protection.

This software automatically backs up apps, music, photos, email, documents, and system files. You can backup to
·         external storage devices;
·         another Mac set up as a backup destination;
·         network-attached storage (NAS).

It’s simple. Connect your Mac to an external drive, then Open Time Machine to select your backup destination. You can select when backups happen and what gets backed up, and you’ll also have the option of encrypting your backup, which is a good idea.
Time Machine keeps hourly backups for 24 hours, daily backups for a month, and weekly backups for previous months until full. The oldest backups get deleted when space is needed.
All you need to do to restore your original files is turn on and connect the Time Machine backup disk. Then, you can use the timeline on the Time Machine screen to find the items to restore.
We recommend all Mac users set up Time Machine to backup to at least an external drive, and Apple makes it easy to setup this minimum level of backup. With the local device, you’ll have a first line of defense close at hand if you need to recover or restore your computer.
However, this basic backup does limit your options. To amplify your protection, consider these alternatives.

Gaining More Control of Your Backup
Third-party software offers additional layers of protection. You gain detailed control of what is backed up and when, and what happens afterwards (perhaps you’ll want the software to eject the external device or shut down). You can also find software that backups operating systems and settings too. This could prove useful if your Mac gets stolen or damaged. You’ll be able to move to another device and quickly get all your data and applications configured as they were.
Another alternative for enhanced backup is the cloud. Time Machine and third-party software solutions require a local device to hold the backup. But if your computer is stolen, the thief is likely to have taken your backup too. Or, if your laptop is damaged in a flood or fire, the backup is probably also destroyed.
You’re also at risk of ransomware with Time Machine and third-party software. If malicious software compromises a device (yes, Macs are vulnerable too), it’s going to spread to connected or networked devices. So, the USB backup drive or NAS is as susceptible to encryption as the main Mac device.
Cloud backup provides a solution that helps avoid all these issues. Your backup data is stored in a datacenter that the thief, fire, flood, or ransomware can’t touch. Most cloud backup providers boast rigorous security protocols.

Eventually, all hard drives will fail. Backing up important data to one device leaves you at risk of a single point of failure. Cloud backup removes the fear that the one backup drive isn’t going to be working when you need it. Need help setting up Time Machine, a third-party backup, or configuring your cloud backup? Let our computer experts help! We don’t want anyone to go without the safety and security of a reliable backup. 

Your Webcam Could Be Spying On You

8/18/2020

 
Picture
In the midst of a global lockdown, many of us have been relying on webcams to stay connected. These cameras let us join virtual meetings for work and online hangouts with friends. But bad actors can also use a webcam to spy.
Someone watching through a small laptop or personal computer camera may sound farfetched. And if you don’t make a hat out of tinfoil, aliens will take over your brain, right?
Except, it is true that webcams can be used for spying.
Seeing someone with a piece of tape over their webcam isn’t that unusual. Even Facebook’s founder does it. At conferences now, you might even receive a branded sliding webcam cover as swag.

How Webcam Spying Works
How can someone access your webcam in the first place? Typically, they’ve installed malware. The malicious software allows them to remotely control your computer and view its webcam.
A cybercriminal might access your webcam using spy software, a remote access trojan (RAT). The software spreads through freeware, spam emails, infected attachments, or fake website links.
The software allows the remote user to take control of your computer. They could view your online activity, read messages, or capture screens and keystrokes, and they’ll be able to turn your webcam on to spy on you – without you knowing it.
The webcam light located near the lens will indicate whether camera is currently recording. However, it’s easy to miss and many people don’t understand what the light means.

What to Do About Webcam Spying
Well, there’s that piece of tape, or you might use a Post-It note to cover the camera, but that doesn’t address the bigger issue. Since we’re talking about malware here, the usual rules apply.
  • Don’t trust attachments, even from people you know.
  • Hover over external links to see where they will take you before clicking.
  • Question the credibility of any freeware you might download onto your computer.
  • Install a good antivirus system, especially one that checks emails.
  • Put a good firewall in place to prevent attackers from accessing your computer.
  • Install patches for your operating system, browser, and software to keep security current.
  • Choose a laptop or webcam with a built-in physical shutter. For example, Lenovo devices typically label this as ThinkShutter. 

While we’re talking about webcams, keep in mind your smartphone camera and any surveillance cameras need protection too. On your phone, keep your passcode private and make sure antivirus and security patching is up to date. With a surveillance system, always change the default password – you’d be amazed how many people don’t bother to do so – as that’s just making the hackers job easy for them!
Want to be sure you’re not being spied on? Our IT experts can make sure you have a strong firewall in place to monitor network traffic and block suspicious activity. We can also ensure your antivirus and malware security is top notch.

Tips for Trouble-Free Online Meetings

8/18/2020

 
Picture
Online meetings are the new norm for many, but that doesn’t mean people magically know how to enjoy a trouble-free online conference experience. These tips can power more successful meetings.
Many businesses today are working from home with a reliance on Skype, Microsoft Teams, Google Hangouts, Zoom, or GoToMeeting. But even with these platforms offering voice or video capabilities, there can be tech problems. These tips can minimize the trouble and enhance business collaboration.
 
1. Go Wired
Connecting to Wi-Fi offers flexibility and mobility. Yet when it comes to an online meeting, prefer a wired connection. Enjoy a more reliable meeting connection by plugging your laptop or desktop into the internet router using a network cable.
If you need to use a mobile device and can’t connect via cable, reduce Wi-Fi obstacles. Call in from as a close to the wireless access point as you can. Wi-Fi signals are a form of radio wave, which means they can be hindered by:
·         large metal objects near the router;
·         thick walls;
·         other electronics;
·         Wi-Fi congestion from your neighbors’ access points.
 
So, that important meeting is not the one you join from a cement-bricked basement, not when your Wi-Fi router is in an upstairs bedroom and your neighbors are all relying on Wi-Fi signals, too.
 
2. Prioritize Your Meeting
When you have a scheduled meeting, announce it to the rest of the household. Ask kids not to get on Xbox or stream movies at the same time as you connect to your meeting. See if you can’t persuade your partner, who is also working from home, not to download large files or new software at the same time as your meeting.
Program your devices to back up at times that won’t compete with your work hours. In the office, your IT team scheduled updates or security patches outside of business hours. Now that you’re doing it all at home, be smart about when you do upgrades. Depending on your home internet speed, trying to do too many things at once can cause trouble for everyone.
 
3. Test Connections Before the Meeting
You may feel that all you’re doing is meeting online right now. Why would you need to test audio and video each time? Well, every time you unplug a device such as a microphone or headset the settings will return to the default. That means the next time you connect you aren’t set up the way you want to be. You were expecting to listen in using your USB headphones, but the last time you unplugged them your computer switched back to the next available audio input (e.g. your monitor or built-in laptop speakers). 
 
By checking the connection first, you also make sure you have the most up-to-date platform software. You don’t want to be late to a call because your device has decided it needs to re-install Skype right at that moment.
 
4. Use the Right Equipment
Headsets and external microphones limit the ambient noise, so you’ll hear better. Plus, it will make your contributions easier to hear, too.
Muting your microphone when you’re not talking also helps – it reduces the noise pollution. Problems can arise when your mic picks up other people talking through your speakers. This precaution also saves you from apologizing when your dog barks ferociously at the FedEx delivery person.
 
5. Pick the Best Setting
Plan the best place to take that online meeting. The closer you are to your wireless access point, the better your connection.
Plus, you want to avoid high-traffic areas, as you’re more likely to be distracted. A child or furry colleague could make an unplanned appearance.
Select an area with a simple background, too. Sitting in front of a window may seem like a good idea, but it makes your face darker and more difficult to see on video. Ideally, you want to be in a well-lit room with a plain wall as your background.
 
6. Take Full Advantage of Online Meeting Features
You may have done conference calls in the past. Everyone called in, spoke when necessary, and that was that. But much of the top business collaboration software offers added features:
·         Call recording provides a record that can be checked later.
·         Call transcripts give you an efficient way to capture all that happened in a meeting.
·         Some platforms let you add virtual backgrounds to video calls.
·         You might also enable an interactive shared whiteboard, presentation slides, or co-browsing.
 
Online meetings are efficient and cost-effective. With the current health crisis forcing many of us to adapt to connecting virtually, implementing these ideas can help.

    Yellowstone Computing

    To read about us, click here!

    Archives

    December 2021
    September 2021
    August 2021
    May 2021
    April 2021
    March 2021
    February 2021
    January 2021
    December 2020
    November 2020
    October 2020
    September 2020
    August 2020
    July 2020
    June 2020
    May 2020
    April 2020
    March 2020
    February 2020
    January 2020
    December 2019
    November 2019
    October 2019
    September 2019
    August 2019
    July 2019
    June 2019
    May 2019
    April 2019
    March 2019
    February 2019
    January 2019
    December 2018
    November 2018
    October 2018
    September 2018
    August 2018
    July 2018
    June 2018
    May 2018
    April 2018
    March 2018
    February 2018
    January 2018
    December 2017
    November 2017
    October 2017
    September 2017
    August 2017
    July 2017
    June 2017
    May 2017
    April 2017
    March 2017
    February 2017
    January 2017
    November 2016
    October 2016
    December 2015
    September 2015
    July 2015
    May 2015
    April 2015
    March 2015
    February 2015
    January 2015
    December 2014
    November 2014
    October 2014
    September 2014
    August 2014
    July 2014
    June 2014
    May 2014
    April 2014

    Categories

    All

    RSS Feed

Visit Us!

What Our Clients Are Saying

Joe is really in tune with what our business needs are... what a great guy with amazing skills... - Grassland Veterinary Service

Yellowstone Computing goes above and beyond for their customers! Joe is very knowledgeable and will go the extra mile to make sure his customers not only get what they asked for but also makes sure they are taken care of for many years to come! Between the great business services they provide and their involvement in the Thorp Chamber I'd highly recommend doing business with Yellowstone Computing! Whether you are an individual looking for computer or other technology help or a large employer who needs to either supplement your current IT support or completely outsource it Yellowstone Computing should be one of your first calls! - Justin Z.