Computer Tips

Scams to watch out for!

 

Have you been getting email that ask you urgently to pay for antivirus that you don’t remember signing up for in the first place? Or do you get email suggesting that you have been infected with a virus, especially from Microsoft, Norton, McAfee or iCloud like the ones below? 

 

 

First, DON’T PANIC and DON’T CLICK ON THEM! If perchance you do click on one to open, all is not lost. These types of emails are called Malware. Malware is software specifically designed to disrupt, damage, or gain unauthorized access to a compute system. There are many types from Ransomware, Spyware, Adware, Trojans, Keyloggers and a few more. I won’t go into the definition of each, however there are some things you as a computer user need to be aware of, and how to protect yourself and your computer from becoming infected with these. The most common types listed prior seek to invade your computer and lock your computer and hold your data ransom, usually a ransom will have to be paid in order to recover your data, usually your pictures, documents and music, all the things that are valuable to you. The second type of Malware is called spyware. This is used to gain access to your system to copy or “spy” on you via your computer. Spyware can give the assailant the ability to capture banking data, your webcam and your passwords. The third most common Malware is called Adware, this type of software automatically displays or downloads advertising material when a user is online, sometimes it will install a web browser like one launch or another. It may seem harmless, but every time you go web browsing, it will direct you to sites with ads, and can be a gateway for other malicious types of software to invade your system. 

There are ways to protect yourself, however no method is 100% foolproof. The best way to protect your computer and your information is education and common sense. For example, if you receive and email like the ones above and you know that you don’t have a subscription to any of those services, delete the emails immediately, same for messages that tell you that a package is waiting for you but you need to verify the address. Again, if you have not subscribed or ordered anything from said emails, don’t open and delete them immediately. 

Other ways to protect yourself is to use an antivirus (they usually have malware and ransomware protection built in)! There are free antivirus packages out there, but if you have ATT or Spectrum, Charter, Comcast – They will have free antivirus software you can download for free. Usually Norton, McAfee are the most popular ones, Check with your internet service provider. For Windows, Microsoft comes with Defender, it catches most items. Again mileage may vary, check with GPBSAC IT Department for more info. As for Apple they have built in protection, but you can also get McAfee or Norton for those type of computers. 

Online Cloud Storage Tips

 

Storing financial documents in the cloud can be a convenient and efficient way to manage your financial records, but it’s important to take security measures to protect your sensitive information. Here are some advanced security measures you can use:

  1. Use strong and unique passwords: Ensure you use strong and unique passwords for your cloud account, and enable two-factor authentication (2FA) whenever possible. You can also use a password manager to generate and store strong passwords.
  2. Encrypt your files: Use encryption software to encrypt your financial documents before uploading them to the cloud. This will add an extra layer of security and prevent unauthorized access to your files.
  3. Use a secure cloud provider: Choose a cloud provider that has a good reputation for security and offers features like encryption, access controls, and regular backups. Research the provider’s security practices and read their terms of service to ensure they meet your needs.
  4. Limit access: Limit access to your financial documents to only those who need it. Use access controls and permissions to restrict access to your files, and regularly review and revoke access for any outdated permissions.
  5. Regularly monitor your account: Monitor your cloud account for any suspicious activity and review your access logs regularly. Report any unauthorized access or suspicious activity to your cloud provider immediately.
  6. Backup your data: Regularly backup your financial documents to a local storage device or an additional cloud service to ensure you have a copy of your files in case of any data loss or security breaches.

By following these security measures, you can ensure that your financial documents are stored safely and securely in the cloud.

What is ChatGPT?

ChatGPT is a computer program that can have conversations with you, just like talking to a person. It’s designed to understand your questions and provide helpful responses. It has been trained on a lot of information from the internet, so it knows a wide range of topics. You can use it to ask questions, get explanations, find information, or even get creative suggestions. It’s like having a smart assistant that can chat with you and assist you with various tasks. However, keep in mind that it’s still a computer program, so it might not always have the correct answer and might not know things that haven’t been in its training.

Is ChatGPT like “Big Brother” listening in on me?

No, ChatGPT, or any Artificial Intelligence (AI) language model, is not a form of “Big Brother” listening in on conversations. ChatGPT operates as a language model that generates responses based on the input it receives. It doesn’t have the ability to actively monitor or record conversations. It doesn’t have access to personal information unless explicitly provided in the course of the conversation.

It’s important to note that while OpenAI, the organization behind ChatGPT, may collect and use data for research and improvement purposes, they have privacy policies and measures in place to protect user data. However, as a user, it’s always advisable to exercise caution and avoid sharing sensitive or personally identifiable information in any online conversation, including with AI models.

It’s worth noting that concerns about privacy and data usage are valid and important in the age of digital technology. As users, it’s essential to be aware of the privacy policies of the platforms and services we engage with and take appropriate measures to protect our personal information.


There are several reasons why you might consider using ChatGPT:

 

1. **Conversational Assistance**: ChatGPT can provide real-time responses to your questions, engage in discussions, and assist you in finding information on a wide range of topics.

 

2. **Language Comprehension**: The model has been trained on a vast amount of text data, enabling it to understand and generate text in a coherent and contextually relevant manner.

 

3. **Learning and Exploration**: ChatGPT can help you explore different subjects, explain complex concepts, and provide insights that may assist you in your learning journey.

 

4. **Creativity and Writing Assistance**: If you’re a writer, content creator, or storyteller, ChatGPT can serve as a creative companion, offering suggestions, generating ideas, and helping with the writing process.

 

5. **Task Automation**: ChatGPT can automate certain tasks by generating code snippets, providing step-by-step instructions, or assisting with problem-solving in programming and other domains.

 

6. **Availability and Accessibility**: ChatGPT is accessible online, making it available whenever you have an internet connection. It can be accessed through various platforms, including websites, applications, or integrated into other software.

 

It’s important to note that while ChatGPT is a powerful tool, it has limitations. It may occasionally generate incorrect or nonsensical answers, and it doesn’t possess real-world knowledge beyond what it has been trained on. It’s always good to verify critical information from reliable sources and use your judgment when relying on the model’s responses.

 

Overall, ChatGPT offers a versatile conversational AI experience that can be valuable for a wide range of users, from those seeking information and assistance to those looking for creative inspiration and support.

 

Cellphone Tech Tip

 

Did you know your phone can help you call for help in an Emergency?

Cellphones can be used to call for help if you fall down or find yourself in an emergency situation even if you can’t talk, but can push a button it’ll work! Most modern cellphones have the capability to make phone calls to emergency services such as 911 and people in your Emergency Contact SOS list. This works on Android and Apple phones. This feature is reached through your phone app on Android phones and the settings app on your iPhone. For more information, please see your phone vendor or reach out to your phone carrier. Typically, you will want to go to your phone provider and have them set this up for you. AT&T, Spectrum, T-Mobile will be able to help. They will help you set up a contact group for Emergency SOS, I usually have family members in the list that will be notified as well as 911. If you have any questions, please drop by the IT office or send your questions to info@gpbsc.net. Stay safe!

Should I buy a phone protector? 

 

As a techie I highly recommend a phone protector, for many reasons — one being that it’s a cheap alternative to sending it in for repair if you drop it and break the glass or crack or chip the case. Another reason is that in most cases it can protect your phone from spilled liquids and from sand. The sand at our beautiful beaches can scratch the surface of unprotected screens and get into places that can damage electronics.

 Many types of cases and screen protection are available at Walmart, Amazon, or at the store where you purchased your phone. I prefer the all-inclusive Otter Defender series. It’s pretty much bullet proof and offers a great protection to your smart-phone. If that seems to be a little overkill due to its rugged persona, then I suggest at minimum getting a “gel case.” 

They offer protection that is lightweight and cheap compared to some of the other cases. To ensure that your phone protector is effective and long-lasting, consider the following: Choose Quality Protectors: Invest in high-quality screen protectors and cases from reputable brands. Quality materials provide better protection and are less likely to interfere with touch sensitivity or display clarity. Combine with a Case: For comprehensive protection, pair your screen protector with a durable phone case. 

Cases provide an extra layer of defense against drops and impact, reducing the chance of damage to your device. Avoid Overloading Your Pockets: Don’t keep your phone in the same pocket as sharp objects like keys or loose change. These items can scratch the screen protector and compromise its protective abilities. Avoid Extreme Temperatures: Exposing your phone to extreme temperatures (hot or cold) can weaken the adhesives used in phone protectors. Avoid leaving your phone in direct sunlight.

 

Scams to watch out for!

 

Have you been getting email that ask you urgently to pay for antivirus that you don’t remember signing up for in the first place? Or do you get email suggesting that you have been infected with a virus, especially from Microsoft, Norton, McAfee or iCloud like the ones below? 

 

 

First, DON’T PANIC and DON’T CLICK ON THEM! If perchance you do click on one to open, all is not lost. These types of emails are called Malware. Malware is software specifically designed to disrupt, damage, or gain unauthorized access to a compute system. There are many types from Ransomware, Spyware, Adware, Trojans, Keyloggers and a few more. I won’t go into the definition of each, however there are some things you as a computer user need to be aware of, and how to protect yourself and your computer from becoming infected with these. The most common types listed prior seek to invade your computer and lock your computer and hold your data ransom, usually a ransom will have to be paid in order to recover your data, usually your pictures, documents and music, all the things that are valuable to you. The second type of Malware is called spyware. This is used to gain access to your system to copy or “spy” on you via your computer. Spyware can give the assailant the ability to capture banking data, your webcam and your passwords. The third most common Malware is called Adware, this type of software automatically displays or downloads advertising material when a user is online, sometimes it will install a web browser like one launch or another. It may seem harmless, but every time you go web browsing, it will direct you to sites with ads, and can be a gateway for other malicious types of software to invade your system. 

There are ways to protect yourself, however no method is 100% foolproof. The best way to protect your computer and your information is education and common sense. For example, if you receive and email like the ones above and you know that you don’t have a subscription to any of those services, delete the emails immediately, same for messages that tell you that a package is waiting for you but you need to verify the address. Again, if you have not subscribed or ordered anything from said emails, don’t open and delete them immediately. 

Other ways to protect yourself is to use an antivirus (they usually have malware and ransomware protection built in)! There are free antivirus packages out there, but if you have ATT or Spectrum, Charter, Comcast – They will have free antivirus software you can download for free. Usually Norton, McAfee are the most popular ones, Check with your internet service provider. For Windows, Microsoft comes with Defender, it catches most items. Again mileage may vary, check with GPBSAC IT Department for more info. As for Apple they have built in protection, but you can also get McAfee or Norton for those type of computers. 

Online Cloud Storage Tips

 

Storing financial documents in the cloud can be a convenient and efficient way to manage your financial records, but it’s important to take security measures to protect your sensitive information. Here are some advanced security measures you can use:

  1. Use strong and unique passwords: Ensure you use strong and unique passwords for your cloud account, and enable two-factor authentication (2FA) whenever possible. You can also use a password manager to generate and store strong passwords.
  2. Encrypt your files: Use encryption software to encrypt your financial documents before uploading them to the cloud. This will add an extra layer of security and prevent unauthorized access to your files.
  3. Use a secure cloud provider: Choose a cloud provider that has a good reputation for security and offers features like encryption, access controls, and regular backups. Research the provider’s security practices and read their terms of service to ensure they meet your needs.
  4. Limit access: Limit access to your financial documents to only those who need it. Use access controls and permissions to restrict access to your files, and regularly review and revoke access for any outdated permissions.
  5. Regularly monitor your account: Monitor your cloud account for any suspicious activity and review your access logs regularly. Report any unauthorized access or suspicious activity to your cloud provider immediately.
  6. Backup your data: Regularly backup your financial documents to a local storage device or an additional cloud service to ensure you have a copy of your files in case of any data loss or security breaches.

By following these security measures, you can ensure that your financial documents are stored safely and securely in the cloud.

What is ChatGPT?

ChatGPT is a computer program that can have conversations with you, just like talking to a person. It’s designed to understand your questions and provide helpful responses. It has been trained on a lot of information from the internet, so it knows a wide range of topics. You can use it to ask questions, get explanations, find information, or even get creative suggestions. It’s like having a smart assistant that can chat with you and assist you with various tasks. However, keep in mind that it’s still a computer program, so it might not always have the correct answer and might not know things that haven’t been in its training.

Is ChatGPT like “Big Brother” listening in on me?

No, ChatGPT, or any Artificial Intelligence (AI) language model, is not a form of “Big Brother” listening in on conversations. ChatGPT operates as a language model that generates responses based on the input it receives. It doesn’t have the ability to actively monitor or record conversations. It doesn’t have access to personal information unless explicitly provided in the course of the conversation.

It’s important to note that while OpenAI, the organization behind ChatGPT, may collect and use data for research and improvement purposes, they have privacy policies and measures in place to protect user data. However, as a user, it’s always advisable to exercise caution and avoid sharing sensitive or personally identifiable information in any online conversation, including with AI models.

It’s worth noting that concerns about privacy and data usage are valid and important in the age of digital technology. As users, it’s essential to be aware of the privacy policies of the platforms and services we engage with and take appropriate measures to protect our personal information.


There are several reasons why you might consider using ChatGPT:

 

1. **Conversational Assistance**: ChatGPT can provide real-time responses to your questions, engage in discussions, and assist you in finding information on a wide range of topics.

 

2. **Language Comprehension**: The model has been trained on a vast amount of text data, enabling it to understand and generate text in a coherent and contextually relevant manner.

 

3. **Learning and Exploration**: ChatGPT can help you explore different subjects, explain complex concepts, and provide insights that may assist you in your learning journey.

 

4. **Creativity and Writing Assistance**: If you’re a writer, content creator, or storyteller, ChatGPT can serve as a creative companion, offering suggestions, generating ideas, and helping with the writing process.

 

5. **Task Automation**: ChatGPT can automate certain tasks by generating code snippets, providing step-by-step instructions, or assisting with problem-solving in programming and other domains.

 

6. **Availability and Accessibility**: ChatGPT is accessible online, making it available whenever you have an internet connection. It can be accessed through various platforms, including websites, applications, or integrated into other software.

 

It’s important to note that while ChatGPT is a powerful tool, it has limitations. It may occasionally generate incorrect or nonsensical answers, and it doesn’t possess real-world knowledge beyond what it has been trained on. It’s always good to verify critical information from reliable sources and use your judgment when relying on the model’s responses.

 

Overall, ChatGPT offers a versatile conversational AI experience that can be valuable for a wide range of users, from those seeking information and assistance to those looking for creative inspiration and support.

 

Cellphone Tech Tip

 

Did you know your phone can help you call for help in an Emergency?

Cellphones can be used to call for help if you fall down or find yourself in an emergency situation even if you can’t talk, but can push a button it’ll work! Most modern cellphones have the capability to make phone calls to emergency services such as 911 and people in your Emergency Contact SOS list. This works on Android and Apple phones. This feature is reached through your phone app on Android phones and the settings app on your iPhone. For more information, please see your phone vendor or reach out to your phone carrier. Typically, you will want to go to your phone provider and have them set this up for you. AT&T, Spectrum, T-Mobile will be able to help. They will help you set up a contact group for Emergency SOS, I usually have family members in the list that will be notified as well as 911. If you have any questions, please drop by the IT office or send your questions to info@gpbsc.net. Stay safe!

Should I buy a phone protector? 

 

As a techie I highly recommend a phone protector, for many reasons — one being that it’s a cheap alternative to sending it in for repair if you drop it and break the glass or crack or chip the case. Another reason is that in most cases it can protect your phone from spilled liquids and from sand. The sand at our beautiful beaches can scratch the surface of unprotected screens and get into places that can damage electronics.

 Many types of cases and screen protection are available at Walmart, Amazon, or at the store where you purchased your phone. I prefer the all-inclusive Otter Defender series. It’s pretty much bullet proof and offers a great protection to your smart-phone. If that seems to be a little overkill due to its rugged persona, then I suggest at minimum getting a “gel case.” 

They offer protection that is lightweight and cheap compared to some of the other cases. To ensure that your phone protector is effective and long-lasting, consider the following: Choose Quality Protectors: Invest in high-quality screen protectors and cases from reputable brands. Quality materials provide better protection and are less likely to interfere with touch sensitivity or display clarity. Combine with a Case: For comprehensive protection, pair your screen protector with a durable phone case. 

Cases provide an extra layer of defense against drops and impact, reducing the chance of damage to your device. Avoid Overloading Your Pockets: Don’t keep your phone in the same pocket as sharp objects like keys or loose change. These items can scratch the screen protector and compromise its protective abilities. Avoid Extreme Temperatures: Exposing your phone to extreme temperatures (hot or cold) can weaken the adhesives used in phone protectors. Avoid leaving your phone in direct sunlight.