by The Same Day Computer Team | Jan 12, 2018 | Blog, Front Page, Laconia, News, Services, Uncategorized, What We Do
Everyone has heard the buzz in the news about major exploits discovered in processors called Meltdown & Spectre. Although the media is vague about these exploits, as it’s a complicated issue, the conclusion is clear: these exploits are big security concerns...
by The Same Day Computer Team | Jan 9, 2018 | Blog, Front Page, News, Services, Uncategorized, Upgrades, What We Do
Hackers have started to attack the software that you have installed to keep them out! It sounds crazy, right? When you are being shut out one way, you try something different. That’s exactly what hackers are trying. If you have an out of date anti-virus, now is a...
by The Same Day Computer Team | Jan 8, 2018 | Blog, Front Page, News, Uncategorized
These aren’t the ones in the ground. These worms are actually a program in your computer that is capable of reproducing and spreading to another computer without any help from us at all. Best Defense against them? 1: Make sure your operating system is up-to-date!...
by The Same Day Computer Team | Jan 5, 2018 | Blog, Front Page, Laconia, News, Uncategorized
Everyone seems to agree that cybercrime in 2017 was terrible. The experts expect higher numbers of attacks and more people affected in 2018! Top threats this year: 1: Cryptojacking. In theory this was a good idea that went bad. This was supposed to be an...
by The Same Day Computer Team | Dec 29, 2017 | Blog, Front Page, News, Services, Uncategorized, Upgrades, What We Do
We are all aware that any device, whether it’s a phone, computer or tablet, has a life cycle. Here are a few things that will help extend the life of your device: 1: When charging your battery make sure to plug it in before it completely dies. Also, be sure that the...
by The Same Day Computer Team | Dec 28, 2017 | Blog, Front Page, News, Services, Uncategorized, What We Do
We are always looking for ways to keep our personal data safe and secure. Here are a few things you can do: 1: If you let someone borrow your device whether it’s your phone or computer, put a password on your account and have them use the guest account. 2: When you...