Sidigiqor also specializes in IT Support Outsourcing and Remote IT Support—ensuring seamless IT operations anytime, anywhere. Plus, our Gulf Manpower Supply connects top talent with leading industries in the Gulf.
Learn more www.sidigiqor.com
Sidigiqor also specializes in IT Support Outsourcing and Remote IT Support—ensuring seamless IT operations anytime, anywhere. Plus, our Gulf Manpower Supply connects top talent with leading industries in the Gulf.
Learn more www.sidigiqor.com
Empower your business with IT Consulting and Remote IT Support! Sidigiqor offers consulting services to companies in USA, India, UK, UAE, and beyond.
IT Infrastructure Design, Cloud Migration, and 24/7 support
#ITConsulting #RemoteSupport #TechConsulting #BusinessIT
www.sidigiqor.com
#TeamViewer 15.67.5 has been released (#RemoteDesktop / #RemoteAccess / #RemoteAssistance / #RemoteSupport / #RemotePC / #RemoteSoftware / #RemoteComputer) https://teamviewer.com/
#AnyDesk 9.5.9 has been released (#RemoteDesktop / #RemoteAccess / #RemoteAssistance / #RemoteSupport / #RemotePC / #RemoteSoftware / #RemoteComputer) https://anydesk.com/
Recently I did a remote tech support call with someone in Seychelles, south of the equator in the Indian Ocean. Not long after that, I did a remote tech support call with someone in Brunei, in the South China Sea. Now I’m wondering if there’s a niche market for English-speaking tech support in some of the world’s faraway places.
@ml I've heard of #RustDesk, but lets just say the whole "it's not #SaaS!" when it clearly is a #subscription #licensing scheme is kinda off-putting to me...
https://rustdesk.com/pricing/?lang=en
That doesn't mean they are bad - far from it.
I just use #Dayon because it's very easy to walkthrough #TechIlliterates when it comes to getting #RemoteSupport up and running with them.
Today a repeat client contacted me via text messaging (RCS). It was in the last half of a Friday afternoon. I was sitting at my desk doing paperwork. I texted back, “I can help you right now, if that works for you.” Their reply was, “Now would be great.” I called them, then connected remotely to their MacBook Air, and took care of the issue. And a little before 5pm, I emailed them the invoice.
The paperwork can wait. Speed matters.
“If you have turned on two-step verification and cannot access any of the alternate methods to get a verification, we cannot help you, sorry.” (Source: support(.)microsoft(.)com)
Yesterday I tried to assist a client with Microsoft account recovery. This client had enabled 2FA/MFA on the account using the Microsoft Authenticator app. Then, the phone with the Authenticator app broke.
There was no alternate 2-factor authentication enabled. No alternate email, no option for SMS (text messaging) verification, no Yubikey. When the client initially set up 2FA with the Authenticator app, they were offered the option to save recovery codes, but didn’t write them down.
The client is highly educated. If you blame the client, I will block you, because you’re a jerk.
Microsoft, and other companies, need to do a much better job of ensuring workable account recovery options are not just available, but actually enabled.
This is a paid annual account. By default, Microsoft works hard at making sure at sign-up that you enable auto-renewal. Do you see the problem? The client can’t access the account, and will have to cancel the credit card to avoid continued payments.
THE LESSON
It’s up to you to make sure you have alternate account recovery mechanisms in place. The cloud service companies will not help you. They are not your friend. They don’t even make it easy to contact them to discuss account problems.
If you’re not comfortable setting up secondary account recovery options, I can help. Do it now, before your phone breaks.
“It’s spooky to watch your computer doing things when you’re not touching it. It’s hard to let someone have remote control of your computer.”
I was talking to a client in Colorado yesterday. He was recalling the first time he let me work on his computer remotely from my office here in Seattle.
It does take a certain amount of trust. And right now, I’ll be the one to warn you not to let a complete stranger on the Internet have remote access to your computer! Word-of-mouth advertising and referrals mean a lot.
This morning I did a tech support phone call with an existing client. Based on her area code, I think she’s in California, but I don’t actually know that for sure. It’s kind of humorous! With credit card billing, I have to enter the billing zip code, but I don’t bother looking them up. The location just doesn’t really matter.
Anyway, back to the call. She visited a website for an animal rescue organization. Seems safe enough, right? She ended up with an uncontrollable, noisy pop-up that said her computer was infected. “Don’t turn your computer off!” it said, and it wouldn’t stop beeping.
She did the right thing. She turned her computer off! I’m so proud of her.
At some point, she turned her computer back on, and everything seemed normal. She called me to see if there was anything else to do. An extremely computer literate person in her life had recommended that she do a factory reset on her computer, but she was hoping she wouldn’t have to do that much work.
This is where risk assessment comes in.
I told my client that her advisor was not wrong at all. That was absolutely the safest and best advice.
But, usually those pop-ups are the baited hook, and not the malware. If my client had clicked on a link, or called the “support” phone number in the pop-up, the risk level goes up immediately. Instead, she did the one thing the cybercriminal told her not to do, because it defeats the infection attempt: she turned the computer off.
I offered to reset the browser, but warned her that doing so might delete some saved security settings, and she’d probably have to re-enter passwords on some of the sites she visits. I also told her that she could keep using the computer for a few days without any changes, and if the problem doesn’t reoccur, everything is probably fine.
Remember, the pop-up is the baited hook, not the malware.
For now, she chose to take no action. The call was ten minutes long. She offered to pay. I told her no, let’s call this one customer care. I told her that if she had agreed to have me to reset the browser or run a virus scan, and things like that, I would’ve charged her, but not for answering a few questions.
THE LESSON
The client is the person with the power. Explain options and risks. Let the client make the decision. It’s their equipment. It’s their life. It’s their money.
I could’ve taken advantage of the situation and said, “Oh, yes, your advisor is right! We must factory reset your computer! I’ll help you do that right now!” That’s how I would’ve made the most money today. Instead, I chose to keep a client for life. The money will come.
@nsysteme @expertenkommision_cyberunfall @gborn ich kann aus Erfahrung #Dayon empfehlen.
This morning an existing client texted me to ask about purchasing the extended warranty for the laptop they’re ready to buy. I don’t sell hardware, but I also don’t charge for this sort of pre-purchase assistance.
I know that I’ll make money setting up the laptop after the purchase. And I know that for the life of the laptop, this client is likely to call me for remote tech support. So I’m happy to take some time over a period of days answering questions about memory, storage, CPU types, brand preferences, and so forth. (I texted the client a list of recommended minimum specs several days ago).
Everything I’ve said above is standard customer care stuff. What I want to emphasize to you with this post is rapid availability. The client texted me at 9:05, and I didn’t see it for about a half hour. Whoops! As soon as I saw it, though, I replied. There’s a possibility that the client is in the store, or has a browser tab open ready to complete the purchase online. They need answers. Part of keeping your clients coming back is the seldom talked about attribute of availability.
(If you’re new to my posts, here’s a little background. I make most of my money every year doing on-site cybersecurity projects for public utilities, custom on-site training for network engineers, and solving specialized problems where the in-house expertise needs a brief boost. But that only happens a few times a year. For instance, my next trip is currently scheduled in August. To fill the time between the big revenue generating gigs, I do tech support for companies that are too small to have a full-time IT staff, and for residential customers. I’m not going to sit around and watch TV all day. I love doing this stuff. It’s fun for me).
A 79 year-old man on the East Coast surprised me this weekend. He called me to work remotely on his Windows 7 computer. I think I talked him into upgrading to a new computer with Windows 11. He asked me for recommendations. I gave him the minimum specs I recommend and taught him how to read the specs in the ads at Best Buy. He said he knows a local computer shop, and he thinks he’ll just go in there with the list of specs I gave him and ask them to put one together.
That was the part that shocked me.
He’s in a state on the Atlantic Coast. He knows a local computer shop. Yet he calls me, in Washington State, for tech support.
Okay then. I’m honored, and happy to help.
Q) What's the most dangerous folder in a Windows computer?
A) The default downloads folder.
Okay, if you asked me that question out of the blue, I’d probably say C:\Windows\System32, but just go with me for a minute here.
In the world of small business/home office/residential IT support, moving someone’s data to their new computer is a common task. And, often, the user is the Administrator on their own computer, so they can download and install anything. Anything at all.
Some things I always transfer: Documents, Music, Pictures, Favorites, and so on. But the Downloads folder is a crazy beast. Some people use it as a storage location. They download stuff and just leave it there. Manuals, legal documents, bank statements, all kinds of things. So I have to check, I can’t just ignore it.
But the default downloads folder is also full of executable files, mostly installers for apps and printer driver packages. If the client downloaded a program – maybe a game – that contains a trojan, this is where it will be. The Downloads folder is frequently the home of malware origin files.
(Sidenote: three malware file types you should know about are origin files, loader files, and active files. They exist in various combinations. For example, the origin file may be the active file, but sometimes it’s not, and the origin file may pass a virus scan).
Okay, back to the main point.
When I’m transferring the data to the client’s new computer, I put the contents of the Downloads folder on the screen and ask them, “Do you need any of these files?” Usually, they look confused, and then I know it’s safe to not transfer the Downloads folder’s contents. I don’t care about the app installers and printer drivers, because I’m going to download and install the latest version anyway. The installers in the Downloads folder may be older versions.
THE LESSON
Be wary of the client’s default downloads folder. Transfer any items after evaluating them individually. Don’t just copy the folder contents.
A small business client called me this morning in a panic. Their Dell computer prompted them to do “an update,” the client clicked okay, things happened, and then the screen went black. The client then tried to restart the computer and got a black screen again. Next they unplugged the computer, and that’s when they called me.
I asked, “During this whole time, did you ever see the word ‘firmware’ on the screen? Or B-I-O-S?”
“Yes.”
I cringed a little. “Okay, let’s plug it back in and see what we can do.”
Reports of various blinking lights, sounds, then nothing.
“Let’s leave it alone for several minutes, don’t do anything with it, and I’ll call you back.”
I waited about ten minutes and then called the client.
Now we were able to power off, power back on, it booted normally, and the client logged in. Crisis averted!
Sometimes updates – firmware or otherwise – take longer to complete than we might like. This calls for patience. Go get a cup of coffee, or read “Gone With the Wind,” or something. Give it time. If you turn the computer off or try to reboot it at the wrong time during a firmware update, you run the risk of “bricking” the computer.
“My daughter’s personal computer, she uses for school work, came up with needing a BitLocker recovery password.”
Over the weekend I was contacted by a dad on the other side of the country trying to locate the BitLocker key. This is a very common problem. Microsoft’s position is, “Don’t worry, we store you BitLocker keys for you in your Microsoft account!” Microsoft’s attitude seems like: “I know you’re in water over your head, and you can’t swim, and you’re drowning and choking, but don’t worry, we have life preservers right here on the boat. Come get one!”
The reality is that many people have no idea what to do when faced with this challenge.
You must protect yourself. Get your BitLocker recovery key for every BitLocker device, and store it safely yourself. You can find information on how to get your recovery key by searching for “find my BitLocker recovery key,” or a similar phrase, using any search engine.
If you don’t want to do that, contact me, and I’ll help you get your BitLocker key(s) for a very reasonable fee.