Centrend

Author name: admin

How to Fix Common Zoom Meeting Problems

https://youtu.be/cc2rpvI-SH8 Technology Tips by Centrend Podcast: Episode 1 We’ve all come to rely on online meetings to stay connected with business associates, remote learning for our children, and keep in touch with our loved ones that we can’t visit in person. That’s why in this first episode of my video podcast, I’m going to show you how to diagnose and repair one of the most popular tools for online meetings: Zoom. In addition to going over troubleshooting and repair steps for your sound, video, and microphone problems, I’ll also show you how to change your name’s appearance in Zoom calls. You can watch by clicking the video or scroll down if you prefer to read and view the relevant screenshots. Troubleshooting Sound, Video, and Microphones in Zoom The scenario is I’m in a Zoom meeting, and the other participants tell me that they can’t see or hear me. Putting my mouse at the bottom of the window, I can see that my microphone is muted, and my video is off. I click the Microphone with the line through it, and now my Microphone is on. But when I click to start the camera, I get an error: To troubleshoot, click the small arrow pointing up next to the Video icon, and a menu will appear. Taking a closer look, I see that the selected camera is “Logi Capture,” and that is not my web camera!  The correct camera is HD Pro Webcam C920. Once I select the correct camera, I can click the icon, and my video starts! If your situation is that you don’t see a camera listed, check the physical connection cable between your camera and your computer. If you are on a laptop and your camera is built into your screen, you might need help troubleshooting hardware drivers. Call us or fill out our Quick Contact form to the right, and we’ll give you a hand with it. If you are having problems with not being able to start the microphone, or if it starts and they can’t hear you, click the small arrow pointing up next to the Microphone icon, and a menu will appear as shown in the picture below. From this menu, you can select the correct microphone and speaker that you are using. If you aren’t sure which to choose, the webcam is probably the correct choice for the microphone, and “Same as System” will probably work for your speaker selection. Note: If you are using a headset on your computer, your headset model should be selected for both microphone and speaker. Changing the Appearance of Your Name in ZoomSometimes the host of a meeting will ask participants to have the name appear a certain way. Usually, they request identifying information to appear with your video feed, such as your First Name – Company Name. In the scenario I’m going to cover, I had to quickly change my name to save myself some embarrassment. ???? I had been away on business and set up to do a Zoom call with my little girls back home.  I changed my name to their nickname for me, “Daddy Dragon.” The next day I hosted a Zoom call and waited for the other participants to join when I realized my name still said, “Daddy Dragon.” Rather than have to explain myself, I quickly went to work to change my name. Here’s how I did it. I clicked the icon at the bottom of the screen that says, Participants. This made a list of participants appear at the top right of the Zoom screen. I hovered over my name and selected More > Rename. Then a window pops up that lets me change my name. I hope my blog gives you the confidence to resolve video, sound, and microphone issues and manage your name’s appearance on conference calls. We publish Technology Tips by Centrend every other week, so please subscribe to our newsletter and blog for more great tips!

How to Fix Common Zoom Meeting Problems Read More »

What 6 things increase the longevity of your computer?

Individuals and small businesses struggle with ways to increase the lifetime value of their PC hardware. ​ What can you do​ to keep your computer running strong like you?​ Extending the life of existing desktops and laptops to reduce your cost and lower your budget is critical in today’s economic climate. Families and companies alike are dealing with limited resources and need their computers to last more than a couple of years. The truth is a quality computer that is maintained will last several years – perhaps even a decade! So how do you make sure your PC investment lasts? The first factor is your buying strategy. Start with a quality computer build. If you buy the cheapest, bargain-basement computer off the shelf, you can’t expect it to last as long as a solid business-class or mid-range residential system. The reality is for a few dollars more you end up with hardware that will last six or more years. Assuming you started with a decent build to begin with, a PC tuneup will go a long way toward extending your computer’s speed and overall life. Here’s a list of things you should be doing at least quarterly to keep your computer running well: Proactively clean and defrag your computer Repair registry issues with your system Keep up to date with hardware drivers Your operating system should be updating regularly – make sure that it’s happening Maintain antivirus software (besides what the computer operating system comes with) Check for add-ons and other unwanted leeches that sap your computer’s resources Centrend can take care of all these things for your business with our automated tools. Give us a call! If you are a home user or solopreneur, visit our whizkidsupport.com site for affordable maintenance plans tailored to your individual needs.

What 6 things increase the longevity of your computer? Read More »

Is My Internet Service Provider’s Firewall Strong Enough?

When an Internet Service Provider (ISP) installs internet access in your business, you are usually provided with a router/firewall combination. Do you need to invest in a commercial-grade firewall, or is the ISP’s firewall sufficient? Let’s start with a simple description of what a firewall is and how it protects your network from intruders. The role of a firewall is to determine what data can come in, and what data will not be allowed. The pieces of data that arrive at your firewall are called packets. For a basic firewall, the rule is simple:  If somebody requested the packet, it is allowed into the network. If the packet was not requested, the firewall burns the packet. The graphic below shows a typical small business network. BASIC FIREWALL – LIKE FROM YOUR ISP When a packet approaches the firewall, It is analyzed to see if it should be let in. A basic firewall is only going to ask one question before deciding to let the packet of information into the network: Was the packet requested by someone inside the firewall? COMMERCIAL-GRADE FIREWALL When a packet approaches a commercial-grade firewall, it is scrutinized much more carefully and in BOTH directions – IN and OUT, When it decides to let the packet pass through, the decision is logged in a database. The activity log proves invaluable in chasing down and isolating data breaches. Here are some of the things a business-class firewall considers before letting a packet pass: Was the password Requested? Is the packet SAFE to let in or does the packet contain a virus, malware, or other malicious code? Is the destination internet address listed on any “blacklists” due to bad activity coming from there? Is traffic from the country of origin allowed? Does the corporate policy for content filtering allow access to the material that is on the destination website? The chart below shows examples of the types of traffic that are allowed or blocked by the different firewall options. The commercial-grade firewall is not only a strong defense against unsolicited traffic, but it also gives business control over what content is allowed on their network. Business-class firewalls are surprisingly affordable. If you would like help evaluating whether it’s right for your home or business, please give us or fill out the contact form below.

Is My Internet Service Provider’s Firewall Strong Enough? Read More »

Six Ways Scammers are taking advantage of COVID-19

Cyber Criminals are taking advantage of the COVID-19 pandemic in some of the worse ways. Read on to learn how to avoid their evil scams… 1. Phishing: Phishing (pronounced fishing) occurs when criminals send fake mail, email, or phone calls pretending they are legit. They try to convince you to share your sensitive information like passwords or credit card details. They pretend they are from an organization you know, such as FedEx, UPS, or even a government agency. 2. Fake Products: Keep your eye on e-commerce websites, social media accounts, and emails from people and stores claiming to sell medical supplies currently in high demand. Supplies might include things like hand sanitizer, toilet paper, and surgical masks. When you make purchases from these fake stores, criminals will keep your money, but you will never see the products you purchased. 3. Fake Charity: Individuals and companies, sometimes with real-sounding names, call or email to ask for donations for people and groups affected by the coronavirus. Some of their elaborate backstories sound extremely legitimate and emotional but completely fake. 4. Medical scams: People are getting calls and emails from people pretending to be hospital workers or medical professionals claiming they treated someone they know for the coronavirus and demand payment. 5. Malware. Think of these malicious applications as Trojan Horses. You download them to your computer or phone for some purpose, and behind the scenes, the program is stealing your personal information. Sometimes these record your logins to banking sites, email, Facebook, etc., and send the data back to the hackers. 6. Zoom Bombing. Lots of businesses, schools, and individuals are using Zoom to hold online meetings. To make it easier, meeting hosts often don’t require a password. Unfortunately, not having a password makes it all too easy for hackers to jump on your meeting and flood your virtual room with swear and porn. They can embed virus code in the image files or stealthily share a file with all the participants that have virus or malware code in it. Check our blog next week for details on how to keep hackers out of your Zoom meetings. The number one way to protect yourself from cybercrime is to use strong passwords on your computer, phone, and meetings and make sure your computer is tuned up and secure. If you ever feel concerned that your computer system is hacked or you just want a security checkup, please contact us at 774-241-8600 or submit the quick contact form on this page. We’re always here to help!

Six Ways Scammers are taking advantage of COVID-19 Read More »

How do you know if you have Spyware in your computer?

Sometimes, it’s obvious, right?  There is a big obnoxious warning that pops up and tells you that you are infected and you need to call for support! Don’t call the number presented because that’s a scam. Call us instead!  Other times, the infection is much more subtle. Here are some things to watch out for… Signs that your computer is infected with a virus or malware Random pop-ups – if you are using your computer, especially the web browser and you are getting a lot of pop-up messages without clicking If you click a link in a web search but get an unexpected, less relevant result If in the bottom right, you are bombarded with notifications and solicitations If your browser has extra “toolbars” across the top or bottom that weren’t always there, or that you don’t see on other computers If you suddenly can’t open documents on your computer that you have always been able to open You are prompted for a password at a strange time. Such as when you are just working on a Word document or browsing a website that doesn’t require login Your virus scanning software is no longer running – malware or a virus may have shut it down If you have any of these problems, please call us for help! If you aren’t sure if you are infected, we are glad to offer a free consultation. Just fill out the Quick Contact form or call us at 774-241-8600.

How do you know if you have Spyware in your computer? Read More »

How to Clean and Disinfect Computer Equipment Without Destroying it

With the threat of coronavirus (COVID-19) all around us, we are all being more diligent about wiping down our work areas. One of the highest touch areas in your environment is your keyboard, mouse, and touch screens. If you’re a customer of Centrend, I already have the inside of your computer covered with strong antivirus software. So here’s how to keep your stuff clear of the other types of viruses. Important note: Off-the-shelf brands of “electronic wipes” are NOT disinfectants unless they specifically say so. At the left is an image of a common one that is NOT a disinfectant. It may wipe away the virus but if there is any left on the surface, it will stay alive. I recommend using Isopropyl alcohol. The CDC recommends the solution have at least 70% alcohol content. The one I use is pictured at right. Mine is 91% but as long as you are 70% it should be effective. So how to disinfect your equipment with these products? It will depend on the specific equipment so I’ll go through each category one by one. Screens & Phones Make sure the device is off. Always apply the solution to a cloth and don’t spray the equipment directly Use a MicroFiber to make sure dust and lint don’t collect on the screen. If the screen appears physically dirty, you may want to clean it with a paper towel or other soft cloth and save the microfiber for after. If your Microfiber cloth gets dirty, you can wash it with mild detergent and a soft-bristled brush like an old toothbrush. Dry the screen or wait till it is dry to turn it on again. Keyboard Unplug your keyboard from the computer or shut it off if it is wireless. Hold it upside down over a trash can and give it a few shakes. This will knock food crumbs and other particles out of the keyboard. You can use compressed air to help blow out crumbs. Just don’t hit it too hard with the air stream or you will blow keys off the keyboard! Apply the cleaning solution to the cloth. Never spray solutions directly onto the keyboard. To get in between the keys, you can use a cotton swab (Q-Tip) that you dip in the solution. Be sure there isn’t so much solution on the swab that it drips into the keyboard. Mouse or Touchpad Unplug your mouse from the computer or shut it off if it’s wireless. If your mouse has a scroll wheel, hold it upside down and spin it a few times to get any loose particles out of the inside. Apply the cleaning / disinfecting solution to a cloth and be sure it’s not too saturated. Your mouse has openings that you can’t let the liquid run into. Let the mouse dry before plugging it back in or turning it on again. I hope you’ve enjoyed my article and it helps you stay safe and healthy!

How to Clean and Disinfect Computer Equipment Without Destroying it Read More »

Working Remotely? Are you secure?

Since the Coronavirus pandemic outbreak, there has been a massive surge of remote workers. Your information is at risk when remote access is not done correctly! Read on to learn what to avoid when it comes to remote workers. Remote access requires careful thought and planning to keep business data private and safe. As a result of COVID-19, many organizations are rushing to piece together remote access solutions to mobilize their workforce and remain productive while serving customers.  The haste to mobilize has created a dangerous situation for business data.  Since the Coronavirus pandemic outbreak, there has been a massive surge of remote workers. Your information is at risk when remote access is not done correctly! Read on to learn what to avoid when it comes to remote workers. Remote access requires careful thought and planning to keep business data private and safe. As a result of COVID-19, many organizations are rushing to piece together remote access solutions to mobilize their workforce and remain productive while serving customers.  The haste to mobilize has created a dangerous situation for business data.   Here are some of the things I see happening that create the riskiest scenarios: VPN Connections are being set up quickly by inexperienced personnel, and their encryption policies are weak.  Companies lack the knowledge to accurately monitor remote activity to identify and mitigate a data breach that originates from these new remote channels. When a VPN is not available, very insecure connections are being created to remote desktop servers, or directly to desktops. Remote desktop connections that are open to the outside world are vulnerable to all types of hacking. If systems have not been regularly patched and maintained, they are at risk of known vulnerabilities that hackers will exploit. Employees may be using their own computers to log in from home, and the individual’s computers lack adequate security protection.  The lack of sufficient security on the home computers allows an attack from the inside – through the VPN. An attack launched from within the trusted, secure tunnel is tough to identify and close the door on. Entry-level or free versions of software like Team Viewer, Logmein, or GoToMyPC are being used to provide remote control over office desktops. The limited versions of these software packages generally work well but offer limited or NO AUDITING capability. If your system is compromised, you will not know what the thieves stole or how long they had access to your business data. Centrend wants to help.  We are now offering free consultation AND free implementation of remote access solutions to businesses affected by COVID-19. Reach us at 508-347-9550 or submit the Quick Contact form below to get help.

Working Remotely? Are you secure? Read More »

Centrend COVID-19 Response

Centrend cares about our employees’ and our customer’s safety, and we’re doing our part to reduce the spread and flatten the curve. Read on to learn what we are doing to keep safe and keep our customers’ information systems running well. We are practicing social distancing and utilizing our extensive remote support and remote management tools to maximize efficiency and safety for our staff and our customers. We’ve limited our travel and on-site visits to only the essential times when we must be physically on-site. For the safety of our staff and our customers, projects requiring us to be hands-on at the customer’s location have been deferred until after the crisis is over, and the restrictions are lifted. Since Governor Baker’s announcement that only critical businesses would be allowed to operate, Centrend expanded our support hours and has been working tirelessly to implement secure remote access solutions for our customers.  We can help with secure, remote access, training on video conferencing tools, or support for your remote workers. You need your staff to work remotely and keep your business operating as best it can. We can help. Starting in Mid-April, Centrend will offer free consultation and free set up of remote access solutions tailored to your unique business environment. Stay tuned to our blog for more information. You can also give us a call at 774-241-8600 or submit the short form below. 

Centrend COVID-19 Response Read More »

Don’t Frankenstein your IT!

Are you trying to cobble together pieces of disparate systems that weren’t meant to talk to each other? Are you hopeful that connecting mismatched data sets will breathe life into your IT Systems? Don’t Frankenstein your IT! Read on to find out what I mean. You know the story of Dr. Victor von Frankenstein, right? He was a promising young doctor who was so devastated by the death of a loved one that he became obsessed with bringing the dead back to life. He worked feverishly to create a creature out of body parts and spends the rest of his time trying to decide if his creature can be trusted.  Is a maddeningly similar experiment taking place month after month, year after year in your own workplace?  Do you spend countless hours piecing together systems that have never talked to one another? Have you seen or even fallen victim to your company’s “separate islands” of information? If this sounds like your business I can help you break out of the scary, torturous pitfalls of information segmentation!  Contact me using the phone, email, or form below for a free consultation. Meanwhile, Happy Halloween!!

Don’t Frankenstein your IT! Read More »

Is Your Router Slowing Down Your Wi-Fi?

Your router is the box that connects your computers, phones, and tablets to the outside world. If your router is old or undersized for the number of devices you have, it can create a bottleneck. Here are a few essential things to keep in mind when assessing your router. These rules apply to home users or businesses alike, so read on! It’s not uncommon for me to hear a complaint from a client about slow internet connection speeds. When I plug my testing equipment directly into the Internet Service Provider’s device, I often see the full speed they are paying for. So what’s the reason for slow speeds beyond the provider’s gear? It’s often a fault of the Internet Router. The internet router is responsible for blocking unwanted/unrequested traffic from getting into your devices. A router provides basic firewalling services at a minimum. Simply stated: nothing gets in unless it was requested from the inside. This means that the router is VERY BUSY processing all the packets of information and deciding which ones should be let in and which ones should be dropped.  You can visit http://www.speedtest.net and see if you are getting the speed you are paying for. If not, here are the possible reasons: Your “off-the-shelf” router and not built for the number of devices you have connecting at once Your router is too old and can’t communicate at the speeds of your internet connection If Wi-Fi is slow, you may have a 54g network which is about 1/2 the speed of a 100MB speed modem Need help to figure out network performance problems? Reach out to me at the contact info below, and we’ll be glad to help!

Is Your Router Slowing Down Your Wi-Fi? Read More »

Scroll to Top