Remote Access Computer Repair

Remote Access Tech Support
Remote Tech Support / Virtual IT Services

Remote Access Tech Support Service

With today’s advanced Monitoring and Access tools we can offer technical support to full networks or a single computer with secure Remote Access Software.
Warning – 
Never give access to your PC to a third party who calls you on the phone claiming to be with Microsoft (they do not call people) or to anyone who displays a pop up on your computer while you are visiting a web site.  These are scams intent on getting your money and credit card particulars.  Only allow remote access support to your device by legitimate support companies where you make the initial contact.
Real time – 
For those times when a computer is infected or being hijacked by malware, we can do a “remote session” into your machine and resolve the issue as if we are sitting right in front of the computer. As long as you have an Internet connection we can provide remote services.*  Not having to have a “Support Truck Roll” saves everyone on resources and money.
After hours – 
Our “After-Hour” (non-business hours) sessions can keep your entire network running smoothly.  When Updates and new drivers are installed after-hours you save by not having any downtime to your system.  We also provide after-hour weekend backup services that can provide you with a 100% secure off-site backup of all your documents and data.
Security and support – 
One of the first elements we install into your system is “the best” award winning anti-virus/anti-malware software.  This program reports directly to our support staff in real time and most times we know when a computer is infected before you do.  By catching it early we keep your costs low – no downtime or controlled robot machine that might require a trip to the repair shop. Most often our program cleans the malware before you see the pop up notice of infection.  Our backend system allows us to monitor all your computers from one place on one screen and we can see if there are any network wide issues of concern.
Save money – 
By using remote access support you can outsource all your IT work to one party. You will never see us but you will always know that we are there, behind the scenes making sure everything runs smoothly.
USA Services – 
We do not outsource to India or any third party. Services are provided by Americans and the only accents you may hear will be American.
Quarterly or Ala Carte – 
Support contracts are available and based on number of locations and number of computers supported. Monthly or Quarterly billing allows you to budget your support over time.  Support contracts offer lower rates for services provided.  Alternate support billing is available on an Ala Carte basis where billing is done monthly based on services needed/provided at full non-contract rates.
Network / IT Consultation –  
By providing support to many diverse networks we are familiar with configurations and tactics that can make your network more efficient and reliable.  It could be one of the best investments you can make in your networks stability and longevity. Call and schedule a consultation today:
TELE Computers Services
800-766-TELE (8353)    516-350-TELE (8353)

Email Hijacking at an All Time High

Email @ symbol with a locked chain
Email Hijacking at an All Time High
By now you have probably noticed many new spam email arriving into your post office each day.
This is due to the extremely high rate of free email account (Hotmail, Yahoo, etc.) that are being password hacked.
Normally this is due to a poor password choice. While easy passwords (pets names and real words) are easy to remember they are also easy to guess.  Automated programs (Bots) can “brute force” their way into most accounts by running a giant database of likely used passwords (i.e. – Spot, kitty, smile, password, password1, password2, etc.) while attempting to log into the email account over and over again until it works.The best defense against account hijacking is to use strong passwords.To assist you in testing your current password strength or to create a more powerful password we have provided you with this free program running from within our secure pages here:
Password Meter – Click here

The typical hijacked email account is usually used to send out hundreds of thousands of spam email to lists from all over the internet. Your inbox will begin to fill up with “undeliverable” notifications as  what “looks to be” legitimate messages from you are returned when they cannot be delivered for some reason.

Related News:

Recently Yahoo was hacked and more than 450,000 passwords were stolen.   If that isn’t bad enough; they published the entire list online.   See the article about it here:
http://www.pcworld.com/article/259244/yahoo_patches_password_leak.htmlLinkedIn (confirmed this on June 6) had over 6.5 million (161 million users) passwords posted on a Russian hacker’s web site.  If you belong you should change your password right now!
http://www.itworld.com/security/280216/change-your-linkedin-password-right-now

 

Delete QuickTime for Windows ASAP

QuickTime Dead – Delete QuickTime for Windows ASAP

Older QuickTime for Windows is no longer supported by Apple.

Researchers have found two security issues that will never be fixed as Apple stopped patching the program in Feb of 2016.  These two issues can allow a third party access to your computer.

QuickTime is no longer needed anyway as all browsers can play the files QuickTime used to play.

If you have ever installed iTunes or connected your Apple phone to your Windows computer odds are you most likely have some form of apple software  installed on your PC – even if you no longer use it. Best bet is to remove anything that is no longer needed and especially QuickTime.

How to uninstall – Control Panel | Programs and Features

Look for any “unneeded” Apple programs including QuickTime, Bonjour, iTunes, Apple Software Updater and pretty much anything with Apple in it.