(817) 439-3051

Author page: admin

US Data Breach Victims Can Now Request Credit Freezes for Free
US Data Breach Victims Can Now Request Credit Freezes for Free

Thanks to a new federal law, US citizens no longer have to pay fees to freeze access to their credit reports. If you have been a victim of a data breach, you should consider taking advantage of this new policy. Here is what you need to know and do.


Data breaches are common nowadays in the United States. Victims of this type of cyberattack are at risk of identity theft, especially if the stolen data includes their social security numbers, as was the case in the massive Equifax data breach in 2017. Cybercriminals like to use this information to open new financial accounts (e.g., credit cards, loans) in the victims’ names. To make matter worse, the stolen data is often stored on the dark web for years, so the victims are at risk for a long time.

One way in which data breach victims can protect themselves is to restrict access to their credit reports, which is known as freezing them. A credit freeze can stop identity thieves from opening new accounts because lenders typically won’t approve an application if they cannot check the person’s credit reports.

In the past, people often had to pay to freeze and unfreeze reports at each credit bureau, which stopped many people from doing so. Fortunately, this has changed in the United States, thanks to a new federal law that went into effect on September 21, 2018. People can now freeze and unfreeze their credit reports at the three credit bureaus — Equifax, Experian, and TransUnion — for free.

If you were one of the 143 million US consumers who had their social security numbers stolen in the Equifax breach or you were the victim of another data breach, you should consider taking advantage of this new law. Here is what you need to know and do.

What You Need to Know

Before you freeze your credit reports, it is important to know the following:

  • A credit freeze won’t stop cybercriminals from making charges to your existing accounts (e.g., credit card accounts) if the stolen data included those account numbers. So, you will need to continue monitoring your account statements for suspicious activity.
  • Some groups will still have access to frozen reports, such as existing creditors and debt collectors.
  • A credit freeze won’t affect your credit score. Nor will it prevent you from getting your free annual credit reports. (US citizens have the right to obtain free copies of their Equifax, Experian, and TransUnion reports once a year.)
  • A credit freeze remains in place until you ask the credit bureau to temporarily lift it or permanently remove it. This is important to keep in mind if you want to fill out a credit card application, get car insurance, or apply for a job. If you make the request online or by phone, the credit bureau must lift the freeze within an hour. If the request is made by mail, the bureau has up to three business days to lift the freeze after it receives the request.
  • All three credit bureaus offer services such as credit monitoring and identity-theft protection. It is important not to confuse credit freezes with these services, as the services typically have monthly fees. You need to be sure that you are requesting a credit freeze, which is sometimes called a security freeze.

If you do not want the hassle of freezing and unfreezing your credit reports, another option is to request a fraud alert, which is also free. With a fraud alert, lenders can get copies of your credit reports as long as they take steps to verify your identity. The new law lengthens how long a fraud alert remains in place from 90 days to one year. However, if you are an identity theft victim, you can get an extended fraud alert, which can be in place for seven years.

What You Need to Do

If you decide to freeze your credit reports, you need to do so at each credit bureau You can request a credit freeze online, by phone, or by mail. Here is each bureau’s website and telephone number:

When requesting a credit freeze, you need to provide your name, current address, social security number, and date of birth. You might also need to provide other information to confirm your identity, such as your previous address or existing credit cards. Once the freeze is in place, you will be given a personal identification number (PIN). You need to remember the PIN because you will need it to temporarily lift or permanently remove the freeze.

You can also use the contact information just given to set up fraud alerts. However, in this case, you only have to contact one of the credit bureaus. That bureau will then let the other two bureaus know they have to set up a fraud alert for your credit reports.

iPhone XS, XS Max, and XR: Which Would Work Best for Your Business?
iPhone XS, XS Max, and XR: Which Would Work Best for Your Business?

Discover what the three models have in common and how they differ from each other.


If your business is in the market for new iPhones for employees, you are in luck. You have three new models from which to choose. Apple rolled out two new models — the iPhone XS and the iPhone XS Max — on September 21, 2018. The third model — the iPhone XR — is scheduled for release on October 26, 2018.

The XR model is an entry-level smartphone, so it is less expensive (starts at $749) than the flagship XS and XS Max models (start at $999 and $1,099, respectively). But, as with any IT asset, you need to consider more than just the cost. Here are some points to keep in mind when deciding which model would work best for your business.

What the Models Have in Common

The iPhone XS, XS Max, and XR have more than just the iOS 12 operating system in common. Here are some of the features they share:

A12 Bionic chip. The new A12 chip has a six-core central processing unit (CPU), a four-core graphics processing unit (GPU), and a neural engine. According to Apple, the A12 chip can process 5 trillion operations per second, making it 15% faster than its predecessor (A11) while using up to 50% less power. The neural engine uses real-time machine learning, which enables the smartphones to recognize patterns, make predictions, and learn from experience.

Dual subscriber identification module (SIM) technology. The devices are designed to have one physical SIM card (nano-SIM) and one digital SIM (eSIM). As a result, you can have two phone numbers or two phone plans on the same device without having to physically swap SIM cards. This can come in handy, for example, if you want to have separate phone numbers for business and personal calls. If you are anxious to use this new feature, you will have to wait, though. The eSIM will be delivered through a software update later in 2018. Plus, some carriers might not support eSIM.

Intel XMM7560 modem. Thanks to the new Intel XMM7560 modem, the iPhone XS, XS Max, and XR will work with all four major US carriers (AT&T, Sprint, T-Mobile, and Verizon). In the past, the iPhones offered by AT&T and T-Mobile did not work on Sprint and Verizon networks.

Face ID authentication. With Face ID, you can use your face instead of a password to unlock your iPhone and log in to apps. Although this feature has been around since 2017, it is faster in the iPhone XS, XS Max, and XR. Face ID uses the TrueDepth camera to scan your face and the neural engine’s machine learning capabilities to recognize you, even if you are donning a hat or wearing glasses instead of contacts.

How the Models Differ

There are many ways in which the iPhone XS, XS Max, and XR differ from each other. Here are five of the most notable differences:

Display type. The display type is probably the biggest differentiator between Apple’s flagship and entry-level iPhones. The XS and XS Max models have organic light-emitting diode (OLED) screens, while the XR model has a liquid-crystal display (LCD) screen. OLED displays provide more vibrant colors, offer better contrast, and have higher resolution than LCD screens. The XS Max model has a slightly higher resolution (2688×1242 at 458 pixels per inch, or ppi) than the XS model (2436×1125 at 458 ppi). The resolution of the iPhone XR is 1792×828 at 326 ppi.

Display size. Based on price, you might expect that the most-expensive model (XS Max) has the largest screen while the least-expensive model (XR) has the smallest one. But that is not the case. While the iPhone XS Max does have the largest screen (6.5 inches), the iPhone XR comes in second with a screen size of 6.1 inches. The iPhone XS’s screen is 5.8 inches.

Battery life. While the iPhone XR’s LCD screen might not be as flashy as the OLED displays in the iPhone XS and XS Max, it has one redeeming value: It consumes less battery power. This power savings — combined with the fact that the iPhone XR’s battery is slightly larger than the one in the iPhone XS — means that you will likely have to charge the iPhone XR less often than the other two models (especially the XS). table 1 compares how long each model’s charge will last when using it for various activities.

table 1: How Long Each iPhone Model Lasts on a Battery Charge






iPhone XS

(2,658 mAh lithium ion battery)
iPhone XS Max

(3,174 mAh lithium ion battery)
Talking Up to 25 hours Up to 20 hours Up to 25 hours
Using the Internet Up to 15 hours Up to 12 hours Up to 13 hours
Playing videos Up to 16 hours Up to 14 hours Up to 15 hours
Playing audio files Up to 65 hours Up to 60 hours Up to 65 hours

Memory capacity. For the first time, Apple is offering smartphones with 512 gigabytes (GB) of storage. This storage capacity is available in the XS and XS Max models. Each model offers three storage options. table 2 shows those options and how much they cost.

table 2. Storage Options for Each iPhone Model






iPhone XR

iPhone XS

iPhone XS Max

64 GB

$749

$999

$1,099

128 GB

$799

256 GB

$899

$1,149

$1,249

512 GB

$1,349

$1,449

Cameras. The iPhone XS and XS Max have three cameras. On the front, they have the TrueDepth 7 megapixel (MP) camera. On the back, there are the dual wide-angle and telephoto 12MP cameras. The iPhone XR has only two cameras. It has the TrueDepth 7MP camera on the front and a 12MP camera on the back.

Still Not Sure?

The best phone for your business will be the one that meets your employees’ needs at the lowest price point. For example, if your employees need a phone with a large memory capacity so they can store a lot of business data, then one of the flagship models might work best since they offer 512 GB of storage. However, if your employees do not need that much storage, the iPhone XR might be the best buy. Although it does not have an OLED screen or the dual wide-angle and telephoto 12MP cameras, it offers the same powerful A12 chip found in the iPhone XS and XS Max.

If you are still uncertain as to which iPhone model would be best, contact us. We can explain the differences in more depth so you can make an informed choice.

Are Your Employees a Security Liability or a Security Asset?
Are Your Employees a Security Liability or a Security Asset?

While many companies realize they should provide IT security training, they often do not know where to begin. If your business is one of them, here are some suggestions to get you started.


The actions of careless and uninformed employees are a leading cause of serious IT security breaches, second only to malware attacks, according to a study by Kaspersky Lab and B2B International. Even when a security incident is caused by malware, employees’ actions are often a contributing factor.

These study findings point to the need for IT security training. This training can mean the difference between employees being a security liability or a security asset. While many businesses know they should be training their employees, they often do not know how often to provide the training, what to cover, and how to make it effective.

How Often

When it comes to IT security training, taking a “one and done” approach is not advisable. Instead, companies need to provide ongoing training because cybercriminals are constantly changing their tactics and devising new cyberthreats. The organization that oversees the United States’ Health Insurance Portability and Accountability Act (HIPAA) recommends monthly security updates in addition to bi-annual training. Yet, only a quarter of employees receive cybersecurity training at least once a month, according to a Finn Partners survey.

Although there are expenses associated with providing ongoing training, the costs incurred from a serious IT security incident would be much higher. In 2017 alone, phishing and business email compromise (BEC) scams set US companies back $705 million.

What to Include

Your training program should be tailored to meet your company’s needs. It should cover the specific types of IT security risks that your employees might face on the job. The program also needs to address the security requirements employees are expected to meet. This is particularly important if your business must comply with any industry or government regulations such as HIPAA or the European Union’s General Data Protection Regulation (GDPR).

Topics commonly covered in IT security training include:

  • The need for strong, unique passwords and how to create them
  • The different types of malware (e.g., ransomware, spyware) and how they are spread
  • Email security, including how to spot phishing emails and BEC scams
  • What employees should do if they receive a suspicious email or encounter another type of IT security problem
  • How to safely use the Internet
  • Social engineering threats
  • How to use mobile devices securely
  • Physical IT security measures being used
  • Your company’s IT security policies

All employees — including managers and executives — should receive basic security training. Some employees might need additional instruction that is specific to their particular jobs.

How to Make the Training More Effective

The IT security training will be pointless if your employees do not remember any of it. Fortunately, there are several ways to help make your IT security training more memorable and effective. For starters, you should hold short training sessions rather than marathon meetings. Bombarding employees with information for many hours will result in information overload, which means they will likely forget most of it. Providing ongoing training in small chunks is a more effective way to get employees to retain information. Plus, it will be easier for them to fit shorter training sessions into their work schedules.

Including hands-on activities in the training sessions will also help employees remember the information presented. For example, in addition to discussing on how to spot phishing scams, you could place the employees into small groups, give them copies of emails, and have them pick out the ones they think are phishing scams.

Another way to increase the effectiveness of your training is to make the information relevant to employees on a personal level. For example, a good way to get employees interested how to use company-owned mobile devices securely is to start by discussing how they can protect their personal smartphones (e.g., only use hotspots known to be safe and reliable). Once they learn good security habits in their personal lives, they will be more likely to practice them at work.

Finally, after employees have completed their training on a particular topic, you might consider testing what they have learned. For instance, after covering how to spot phishing emails, you could send out a fake phishing email with a suspicious link. If clicked, the link could lead to a safe web page that states the phishing email was an IT security training exercise. This type of testing can reinforce what employees have learned. It can also help determine the effectiveness of the training.

It is important to follow up with employees after the test, especially with the individuals who clicked the suspicious link. However, you should never embarrass or scold these employees during this discussion. Instead, you should offer them additional training and resources.

Your Employees Are an Important Part of Your Line of Defense

Educating employees about IT security is important. With training, they can bolster your line of defense against cyberattacks rather than be a weak link in it. To make this happen, you need to develop an effective IT training program that will teach your employees what they need to know to help keep your business secure. If you are uncertain of what to include, contact us. We can suggest topics based on your business’s IT environment.

Thousands of WordPress Websites Hijacked
Thousands of WordPress Websites Hijacked

Cybercriminals hijacked thousands of WordPress websites in September 2018. Learn how hackers carried out these attacks and what you can do to protect your business’s website.


Hackers hijacked thousands of websites in September 2018 and installed malicious code in them. All the sites were using the WordPress content management system. WordPress sites are a popular target for cybercriminals because they are so common.

The September Attacks

The security researchers who discovered the barrage of attacks in September believe that the cybercriminals accessed the sites through outdated WordPress plugins and themes. Once the hackers gained access, they modified the sites’ code for malicious purposes. For example, in some cases, the code sent site visitors to tech support scam pages. The cybercriminals also planted backdoors in the sites so they could easily access them in the future.

Don’t Become the Next Victim

Many small and midsized businesses use WordPress because it is free yet full-featured. If your business is one of them, you need to protect your WordPress site. A good place to start is to:

  • Keep the number of plugins and themes to a minimum. Each plugin and theme you use increases your site’s attack surface, so only use the ones your site needs.
  • Keep your site’s plugins and themes updated. It is important to install any updates released for your site’s plugins and themes. Besides providing new and improved features, the updates often patch any recently discovered security vulnerabilities. Outdated plugins and themes can give hackers the opening they need to access your site.
  • Update the WordPress CMS software. Although the hackers exploited outdated plugins and themes in the September 2018 attacks, they sometimes exploit vulnerabilities in the core WordPress software instead. Thus, you need to keep the core software updated.
  • Make sure your hosting service is doing its part. Your hosting service needs to keep its security measures up-to-date and regularly update its infrastructure. Failure to do so will leave your site vulnerable to cyberattacks.

There are also other measures you can take. For example, if visitors log in to any part of your WordPress site, you should implement a password policy or possibly use a two-step authentication system. We can evaluate your site and devise a customized plan to protect it from hackers.

How to See Which Files Are Taking Up the Most Space in Windows 10
How to See Which Files Are Taking Up the Most Space in Windows 10

The longer you have your computer, the more files you will accumulate on it. Here is how you can find out how much space you have left on the hard drive of your Windows 10 computer and which files are taking up the most space.


Although large hard drives are the norm nowadays, it is still a good idea to know how much space you have left on your hard drive and which files are taking up the most space.

You can quickly find out how much room you have left on your hard drive using Windows 10’s File Explorer, but it does not give you any clue as to which files are hogging all the space. The “Storage” page in the Settings app provides both pieces of information. It specifies the amount of free space available and lets you explore how much space your documents, pictures, and other types of files are consuming. Equally important, it lets you drill down to the file level, so you can view and manage those files.

How to Access the “Storage” page

Getting to the “Storage” page in the Settings app is easy. Follow these steps:

  1. Open the Start menu by clicking the Windows button.
  2. Click the gear icon in the lower left corner of the Start menu to open the Settings app.
  3. Choose “System” in the Settings app.
  4. Select “Storage” in the left pane.
  5. Click “This PC (C:)” in the “Local storage” section.

You will see a list of file types, ranked by the amount of space they consume, as Figure 1 shows.

While many of the categories are self-explanatory (e.g., “Mail”, “Pictures”, “Music”, “Videos”), some are not. For instance, the “Other” category is vague. If you click that category heading, you will be taken to a page that notes the category is a catchall for files and folders that Windows 10 couldn’t characterize.

Each category page lets you view and manage the files in them. The only exception is the page for the “System & reserved” category. It just briefly describes the types of files found in this category because removing them would harm your computer. It does, though, give you the option to manage the system restore process.

What You Can Do If You Want to Free Up Space

If you want to free up space on your hard drive, you have several options, including:

  • Deleting unused and duplicate files.
  • Moving files you seldomly use to the cloud (or another storage medium).
  • Uninstalling apps you do not use.
  • Using the “Free up space now” option on the “Storage” page to reclaim space.

Deleting unused and duplicate files is fairly straightforward. The other options are more involved. If you need help moving files to the cloud, uninstalling unwanted apps, or using the “Free up space now” option, let us know.

Find Out What Data Microsoft Is Saving about You
Find Out What Data Microsoft Is Saving about You

If you use Windows 10 and have a Microsoft account, you can easily see the types of data that Microsoft has stored about you. Learn where you can find this data and how to delete it.

 

Like Google, Apple, and other tech giants, Microsoft collects and saves information about the people who use its products and services. If you use Windows 10 and have a Microsoft account, you can easily see the types of data that Microsoft is storing about you in the “Activity history” page of the Privacy Dashboard. You can also delete the stored data from this page.

 

How to Access Your Activity History

 

To get to the “Activity history” page, follow these steps:

 

    1. Go to the Microsoft Privacy web page.

 

    1. Log in with your Microsoft account credentials.

 

    1. Click the “Activity history” tab in the Privacy Dashboard.

 

On the left side of the “Activity history” page, you will see the following six categories. When you click them, here are the types of data you might see:

 

    • “Apps and services” The Microsoft apps and services you use each day will likely be listed here. For example, the listing might show that you used Bing, Microsoft OneDrive, Microsoft Word, and MSN Web on September 1, 2018.

 

    • “Voice” — If you use voice commands with Windows, Cortana, or other voice-enabled Microsoft products and services, the company saves your audio recordings. Information about those recordings will be shown here.

 

    • “Search” — If you use the Bing search engine on any web browser, you will see the search terms you used and when the searches took place.

 

    • “Browse” — Your web browsing history will be displayed if you use Microsoft Edge and Cortana’s “Browsing history” option is enabled in Windows 10.

 

    • “Media” — Data about your media activity will be shown if you watch movies or TV programs using a Microsoft app or service.

 

    • “Locations” — Maps showing your locations each day will be displayed. To create these maps, Microsoft uses the locations you provide and the locations it detects using technologies such as GPS.

 

You can download a copy of your activity history from the dashboard’s “Download your data” page.

 

How to Delete the Stored Data

 

If you do not like the amount of information being stored about you, you can delete it directly from the “Activity history” page. You have the ability to delete individual data records by clicking the “Clear” link embedded in each one. However, this could be time-consuming if there are numerous records in a category. In that case, you might want to take advantage of the “Clear activity” link in the top right corner of the page. Clicking this option will delete all the data records in that category.

 

Changing Your Privacy Settings

 

The Privacy Dashboard provides you with information on how to change your privacy settings in Windows 10 and various Microsoft apps and services so that less data will be collected and stored about you in the future. However, this information is scattered throughout the “Overview”, “Activity history”, “Cortana’s Notebook”, and “Ad settings” pages in the dashboard. If you need help finding the privacy settings you want to change or you do not want to take the time to make the changes, contact us.

 

Why Using Gmail’s Confidential Mode Is Not a Good Idea for Businesses
Why Using Gmail’s Confidential Mode Is Not a Good Idea for Businesses

 

As part of Gmail’s redesign in 2018, Google introduced the Confidential Mode to protect sensitive information sent by email. Learn how it works and why you should avoid using it in your business.

 

As part of Gmail’s redesign in 2018, Google introduced the Confidential Mode to protect sensitive information sent by email. However, the Electronic Frontier Foundation (EFF), an international nonprofit digital rights group, notes that calling this new mode “confidential” is misleading as it lacks the privacy features needed to be considered a reliable and secure communications option for most users.

 

To understand the potential problems with Gmail’s Confidential Mode, your first need to understand how it works.

 

How the Confidential Mode Works

 

Gmail’s Confidential Mode is designed to protect sensitive information by:

 

    • Allowing you to set an expiration date for an email, thereby limiting the amount of time the recipient has to view it

 

    • Allowing you to immediately revoke access to an email you already sent, regardless of its expiration date

 

    • Preventing the email’s recipient from forwarding, copying, printing or downloading the email’s contents

 

    • Requiring the recipient to enter a one-time passcode to view the email (this is optional)

 

The Confidential Mode is possible because Google stores the email’s message (the body of the email) and any attachments on its servers, creating a link to the stored information. It then sends the email’s subject line and link to the recipient using a standard email protocol (Simple Mail Transfer Protocol, or SMTP).

 

What the recipient sees depends on the email address to which the message was sent. If the email is sent to a Gmail address, the message and attachments will automatically render. The email will appear like any other, except it will include a note like that shown in Figure 1.

 

 

If the email is sent to a non-Gmail address, the recipient will be sent the link, which they can click to access the message, as Figure 2 shows.

 

The Potential Problems

 

Some security experts warn that emails sent using the Confidential Mode might not be private nor secure. One of the EFF’s main concerns is that Google can read the confidential emails people send because end-to-end encryption is not used. In addition, the EFF is concerned that Google has the technical capability to store these emails indefinitely, regardless of their expiration date. Google is not sharing any information about how long they are keeping them. “We’re not able to comment on internal procedures,” stated one Google official.

 

Online copies of expired confidential emails might also exist in a different location: in the “Sent” folders of the people who emailed the messages. When a Gmail user sends a confidential email, the full email (including the body of the email and any attachments) remains in the person’s “Sent” folder until it is manually deleted.

 

Another concern with confidential emails is the ease in which the recipients can share the messages, despite the forward, download, and copy options being disabled in confidential emails. A recipient could simply take a screenshot or photo of the email’s message and share it with others. So, using the Confidential Mode to provide proprietary or sensitive business data is not a good idea.

 

Furthermore, using the Confidential Mode might violate a company’s email retention policy. Failing to adhere to this policy could potentially put the business in harm’s way if it must comply with regulations such as the Sarbanes-Oxley Act (SOX) in the United States.

 

Finally, all businesses — even those that do not use the Confidential mode — need to watch for phishing attacks that use spoofed confidential emails. The emails sent to non-Gmail addresses (like the one in Figure 2) would be ideal for spoofing since they tell recipients to click a link to view the confidential message.

 

 

Better Alternatives

 

Because of all the potential problems, you might want to avoid using Gmail’s Confidential Mode. There are more secure ways to share sensitive information with people outside your company, including:

 

    • Encryption

 

    • Using an email to let someone know the information is available and having that person log in to an access-controlled share on a company’s network or server

 

We can help you set up a secure system that will protect your business’s data.

 

Is the Desktop Computer Becoming Obsolete or Is It Here to Stay?
Is the Desktop Computer Becoming Obsolete or Is It Here to Stay?

The fate of the desktop computer has been the topic of debate for several years. Knowing both sides of the argument can be beneficial when you need to purchase new computing devices for your business.


Will desktop computers be joining electric typewriters, rotary phones, floppy disks, and cassette tapes in the technology graveyard? This question has been the subject of debate for several years. If you search the Internet, you will find discussions both supporting and rebutting the idea that the desktop computer is slowly dying. Knowing both sides of the argument can be beneficial when your business needs to replace computing devices or add new ones.

Why Some People Believe the Desktop Computer’s Days Are Numbered

Some people believe it is only a matter of time before desktop computers become obsolete, replaced by smartphones, tablets, and other mobile devices. They often bring up the following points when stating their case:

  • Desktop computers do not provide the portability that people desire nowadays. Mobile devices give users the freedom to access emails, run apps, and access the Internet whenever and wherever they want. The same cannot be said for desktop computers.
  • Desktop solutions take up much more space than mobile devices. Although desktop computers and their monitors have gotten smaller over the years, they still require a lot more desktop real-estate than mobile devices.
  • Mobile devices are becoming more capable and powerful. Despite their small size, mobile devices are becoming increasingly capable and powerful, thanks to hardware and software improvements, enhanced graphics, and boosts in memory capacity. According to industry experts, top-of-the-line smartphones and tablets can be as powerful as mid-range desktop computers if the mobile devices have multicore processors, large amounts of RAM, and powerful graphics hardware.
  • Desktop computer sales have been steadily declining. In 2010, 157 million desktop computers were shipped worldwide, according to Statista. In 2017, only 97.8 million shipped — more than a 35% drop in sales in just 7 years.

Why Some People Believe the Desktop Computer Is Here to Stay

Some people are not convinced that the desktop computer’s days are numbered. They believe it will stick around for many years for several reasons:

  • Desktop computers are easier to customize than mobile devices. For instance, desktop computers often come with many USB and other types of ports, enabling users to easily add peripherals. Similarly, most desktop computers offer features such as memory card slots so that users can increase the machines’ memory capacity. Few mobile devices offer a plethora of ports and expandable storage.
  • Most companies still use desktop computers. According to a 2018 Spiceworks study, 68% of businesses are using desktop computers as their primary computing device. Only 1 percent are using tablets for this purpose.
  • Desktop computers typically last longer than mobile solutions. Thanks to their fairly sturdy construction and repairability, the average life expectancy of desktop computers is 4.5 years, compared to only 2.5 years for smartphones. However, the Spiceworks survey found that companies tend to use both their desktop and mobile solutions longer in real life. Seventy percent typically use their desktop computers for 5 or more years and 24% use them for 7 or more years. As for smartphones, 42% use them for two years or less and 41% use them for three to four years.
  • Mobile devices sometimes do not have what it takes to effectively run apps. All apps are not created equal. Some apps (e.g., business apps, gaming apps) need to run on a high-performance machine to work properly. Although mobile devices are getting more powerful, desktop computers have the performance edge because they are powered by electricity rather than batteries, according to experts. Plus, some apps are easier to use on desktop computers because these machines have large screens, external keyboards, and other amenities.

The Bottom Line

When you list the reasons why some people believe the desktop computer is dying next to the reasons why other people think it is here to stay, it becomes evident that there is currently no clear-cut evidence indicating that one group is right and the other wrong. And that is a good thing. It means you can concentrate on what is really important — finding the computing device that best meets the needs of your business.

When It Comes to Diagnostic Data, Windows 10 Is a Chatterbox
When It Comes to Diagnostic Data, Windows 10 Is a Chatterbox

By default, Windows 10 sends a large amount of diagnostic data to Microsoft. If you are concerned about the types of data being sent, you might want to take advantage of the Diagnostic Data Viewer. Learn how to use this tool and what you can do if you do not like what you see.


When Windows 10 first rolled out, many users were upset about the amount and types of data that the operating system was sending to Microsoft by default. The users’ backlash, coupled with the creation of data privacy laws like EU’s General Data Protection Regulation (GDPR), has prompted Microsoft to become more transparent about its data collection practices. It has also resulted in Microsoft giving users more control over the types of data being collected from them.

To provide more transparency about the diagnostic data it collects, Microsoft introduced the Diagnostic Data Viewer in the Windows 10 April 2018 Update. You can use this tool to view the data that your Windows 10 computer has sent to Microsoft’s servers for analysis. Microsoft groups the diagnostic data (aka diagnostic events) it receives into categories based on how it uses the information. Here are the categories and the types of data in them:

  • Common. Includes the data commonly found in the headers of most diagnostic events (e.g., a device’s unique ID, the unique ID associated with a person’s Microsoft account or local account).
  • Device Connectivity and Configuration. Contains details about a device’s configuration, connectivity capabilities, and connectivity status (e.g., a device’s processor and wireless capabilities).
  • Software Setup and Inventory. Includes data about software installations and updates (e.g., which apps and drivers are on a computer and when they were installed).
  • Product and Service Performance. Contains information about the health of a device’s operating system, apps, and other components (e.g., error codes and messages received, system settings such as registry keys).
  • Product and Service Usage. Includes details about the usage and states of a device’s operating system and apps (e.g., how often apps are used, when they were used, and for how long).
  • Browsing History. Contains information about web browsing activities in Microsoft browsers (e.g., text entered in the address bar and search box).
  • Inking, Typing, and Speech Utterance. Includes details about the usage of Windows 10’s inking, typing, and voice input features (e.g., recognized text in speech recognition results).

The Diagnostic Data Viewer is a fairly large program (about 46 MB). Plus, the diagnostic data it displays can take up to 1 GB on your computer. However, you can reclaim the 1 GB of space by disabling the viewer once you are done using it. You can enable it again at any time.

How to Obtain and Use the Viewer

The Windows 10 April 2018 Update added an option in the Settings app that lets you easily download the Diagnostic Data Viewer from the Microsoft Store. Follow these steps:

  1. Open the Start menu by clicking the Windows button.
  2. Click the gear icon in the lower left corner of the Start menu to open the Settings app.
  3. Choose “Privacy”.
  4. Select “Diagnostics & feedback” to open the Diagnostics & Feedback page in the Settings app.
  5. Move the “Diagnostic data viewer” switch into the “On” position.
  6. Click the “Diagnostic Data Viewer” button, which launches the Microsoft Store app.
  7. Click the “Get” button to download the viewer, which will be automatically installed.
  8. Click the “Launch” button that appears in the Microsoft Store app to open the viewer. You can also launch the viewer at any time by clicking the “Diagnostic Data Viewer” entry in the Start menu.

When the Diagnostic Data Viewer opens, you will see a list of events in the left pane. Clicking an event will reveal its category and details in the right pane.

By default, Windows 10 is configured to send a large amount of diagnostic data. So, if you run the Diagnostic Data Viewer and have not changed the “Diagnostic data” setting, you will likely see numerous events. You can easily search them using the viewer’s search box. For example, Figure 1 shows the search results for “Excel” after Microsoft Excel was opened on a Windows 10 laptop. The right pane shows the details of the first event triggered. As you can see, the details are not presented in a user-friendly format.

You can also filter the diagnostic data by category (e.g., Device Connectivity and Configuration, Product and Service Usage). Clicking the button with the three horizontal lines in the upper left corner of the viewer exposes the filtering options.

How to Minimize the Amount of Data Sent

If you are uncomfortable with the amount and types of diagnostic data being sent to Microsoft, you can change several settings to minimize it. (There is no way to completely stop it.) These settings are located in the Diagnostics & Feedback page of the Settings app.

For starters, you can change the “Diagnostic data” setting from “Full” (the default) to “Basic”. When you select the Basic level, Microsoft will only send data about your device, its settings and capabilities, and whether it is performing properly. If you want to compare the types of data sent under each level, Microsoft provides complete listings for the Full and Basic levels.

Another change you can make is to move the “Improve inking & typing recognition” switch from “On” (the default) to “Off”. When enabled, your computer sends details about your inking and typing actions to Microsoft so that the company can improve the language recognition and suggestion capabilities of apps and services running on Windows 10. Selecting “Off” will stop this data from being collected.

Finally, you can make sure the “Tailored experiences” option is not enabled. It is typically set to “Off” by default, but it might have been turned on at some point. When enabled, Microsoft uses some of the diagnostic data it receives from your device to provide you with more personalized tips, ads, and recommendations when using Windows 10. Having this option set to “off” prevents Microsoft from using your data for this purpose.

How to Minimize the Amount of Data Stored

You can delete the diagnostic data that Microsoft has stored about your computer at any time by clicking the “Delete” button in the “Delete diagnostic data” section of the Diagnostics & Feedback page. Afterward, you will see the message “Last delete request” followed by the date, which will persist after you close the Settings app.

The “Last delete request” date is important since Microsoft will continue to receive diagnostic data from your device at the level you configured. (Remember, you cannot completely stop the collection of this data.) So, if you want to minimize the amount of data stored by Microsoft, you will need to periodically use the “Delete” button.

As Microsoft notes in the “Delete diagnostic data” section, there might be additional diagnostic data to delete if you have a Microsoft Account. You can manage and delete any additional data by accessing your account through the Microsoft Account portal.

It’s All in the Details — And They Can Be Confusing

Although downloading and using the Diagnostic Data Viewer is pretty straightforward, the event details you see in it can be confusing. We can help you better understand the diagnostic data and your options to minimize it.

3 Ways Your iPhone Can Help You Be More Prepared and Organized During Business Trips
3 Ways Your iPhone Can Help You Be More Prepared and Organized During Business Trips

If your iPhone is running iOS 11 or later, you can use it for more than just staying in touch with the office. Here are three features you can use to help your business trip go more smoothly.


You likely already use your iPhone to stay in touch with your office when you are traveling for business. However, if your device is running iOS 11 or later, it can help you be more prepared and organized during the trip. Here are three features you can use to help your business trip go more smoothly:

1. Check a Flight’s Status

If you are traveling by plane, you can use your iPhone to check your flight’s status before leaving for the airport. In iOS 11 and later, Safari has a flight tracking feature that makes it extremely easy to do so.

To check a flight’s status, all you need to do is type the airline’s name and your flight number into Safari’s address bar, and then tap your flight in the “Flights” list that appears. You will then see your flight’s status, departure and arrival times, terminal, gate, and more. When your plane lands, you can use this feature again to check which baggage claim to go to.

2. Become Familiar with an Airport’s Layout

In iOS 11 and later, the Map app has an “indoor maps” feature that lets you look at the floor plans of many airports and malls. These floor plans can be invaluable if you are unfamiliar with an airport you will be visiting. You can find out the location of terminals, gates, security checkpoints, restaurants, restrooms, and other facilities. Because the airport maps are so detailed, so you will know the quickest way to get to your connecting flight, the baggage claim, or wherever you need to go.

Indoor maps are available for many airports in the United States and abroad, and Apple is continually adding new ones. Airports and malls with indoor maps will have a “look inside” badge beneath their names in the Map app. You simply click the badge to view the facility’s floor plan.

3. Scan Your Receipts and Business Cards

The Notes app in iOS 11 and later has a feature that lets you scan documents. This can come in handy for keeping track of and organizing expense report receipts and business cards when you are on the road.

To scan a receipt or business card, open the Notes app and do the following:

  1. Create a new note or open an existing one.
  2. Tap the icon that looks like a plus sign inside a circle.
  3. Tap “Scan Documents”.
  4. Place the item you want to scan in the iPhone camera’s view.
  5. Use the shutter button or one of the volume buttons to start the scan. You can use the camera’s flash and filters when capturing scans.
  6. Tap “Keep Scan” if you are happy with it. Otherwise, tap “Retake” and repeat step 5.
  7. Tap “Save” for the scan you want to keep.