Give us a call, we don’t bite! 302.645.7177

Posts Tagged ‘Tech Tips’

How to Set Parental Restrictions on iPad and iPhone

Set Parental Controls on iPad

When your children are using devices that can connect to the internet, you should be using Parental Restrictions to protect them. Apple makes it very easy to set Parental Controls on your iPhone, iPad, or iPod Touch. These restrictions allow you to control a number of things including purchasing, internet browsing, downloading apps, and viewing explicit content. Learn more about Parental Restrictions on iPhone below.

When your children are using devices that can connect to the internet, you should be using Parental Restrictions to protect them. #onlinesafety #internetsafety #parentingtips #parenthood Click To Tweet

Why Use Parental Restrictions

There are parents who don’t let their kids play with technology. These old-school parents sometimes shame others for giving their kids screen-time, and they boast about how tech-free their kids are. Then there’s the rest of us. We’re the ones that need a few minutes of peace to cook dinner or just want the kids to be quiet on car rides.  

Letting your children have screen-time doesn’t make you a bad parent. However, you should be doing everything you can to protect your kids and your wallet from the perils of the internet.

Parental Restrictions allow your children to use their devices and give you peace of mind while they do it. As a parent, all you want to do is protect your kids. The internet makes it easier for your kids to unknowingly interact with predators. To prevent that, use Parental Restrictions. 

Cybersecurity for Beginners

Cyber Security for Beginners

There is a common misconception that you have to be a tech expert to understand cybersecurity. That is simply not true. There is a lot that you can be doing to protect your personal computer and your entire business with little to no knowledge of cybersecurity.

Everyone is a Target

Cybersecurity threats affect everyone. You might think that your digital footprint is small, or that your data isn’t that important, but everyone is a potential target. You could be poor or have a bad credit score, but identity theft should still be a concern.

Cybersecurity threats affect everyone. If you aren't working to protect yourself and your business, you might be the next target. #cybersecurity #phishing #passwordsecurity Click To Tweet

Cyber Criminals and Identity Thieves generally follow a practice of cast a wide net to catch a few fish. They don’t care what fish they catch. They are only looking to catch one or two people that are gullible or vulnerable enough to attack.

If you happen to be the fish that they catch, they could potentially leave you with even worse credit, in more debt, and little to no way to work your way out of it. In some cases, you might not even know that you are facing a cybersecurity problem until it’s too late.

How to Protect Your Device this Summer

Protect your Device this Summer

Your cell phones, laptops, tablets, and other devices are designed to withstand certain weather conditions. Developers know that your device will spend a lot of time outside and needs to be durable. However, that doesn’t make them perfect.

The wear-and-tear associated with summer conditions can seriously harm your device if you aren’t careful. Rather than spend hundreds of dollars to replace a device that was damaged this summer, learn how to protect them instead.

Avoid Extreme Heat

Your devices are built to withstand hot temperatures. However, they aren’t designed to withstand extreme temperatures.

In the summer, the black screen of your phone absorbs more heat than you think. In fact, exposure to extreme heat can cause some elements inside your phone to actually melt. Even in less extreme cases, the heat can damage the internal battery causing it to fail.

Extreme heat can melt your phone at worst, and kill the battery at best. Protect your phone from the heat this summer! #summer #hotphone #phonebattery #techtips Click To Tweet

Something as simple as placing your phone in the dashboard of your car or out on your towel at the pool can cause your device to quickly overheat. To avoid paying for your mistake, here’s how to protect your device from the summer heat.

How to Protect Your Phone from Viruses and Phishing

smishing

Believe it or not, your phone is susceptible to viruses, malware, and phishing scams. Protecting your laptop or desktop computer is vital to protecting your data, but you should be keeping an eye on your phone too.

Your phone is in danger of catching a virus or malware from a variety of sources including:

  • Malicious apps,
  • Fake Wi-Fi,
  • Bad links,
  • Phishing Emails,
  • Phishing Texts,
  • And more.

Learn more about the dangers facing your phone and how to protect yourself below.

Believe it or not, your phone is susceptible to viruses, malware, and phishing scams too! #cybersecuirty #phishing #smishing Click To Tweet

How to Extend the Life of your Phone Battery

Charging batteries

There are a lot of myths out there about how to extend the life of your phone’s battery. In order to truly take care of your device and prolong its life, use these tips and learn to tell fact from fiction.

How long does your battery last?

The lifetime of a phone battery is approximately 2-3 years, but that’s not to say that your phone or device won’t last longer or shorter. A number of variables impact the life of your device’s battery.

Your device’s battery life is determined by “charge cycles” not time. A charge cycle is determined by your device using a net 100% of its charge.

The lifetime of a phone battery is approximately 2-3 years, but that’s not to say that your phone or device won’t last longer or shorter. #phonebattery #tech #iphone #android Click To Tweet

Most obviously, this is when you fully charge the device to 100% and use it until it dies at 0%. However, a charge cycle also includes times when your phone is at 75% and you use it to 25% (a total of 50% charge) then charge it back to 100% and use it to 50% (another 50%).

Charge Cylces from PC Mag

A charge cycle is based on the total charge like a tank of gas. You can only fill the car to half a tank two times, but you still use a full tank of gas.

Say Good Night to Your Electronics

Blue Light on your Electronics

Are you having trouble sleeping lately? Do you use your laptop, phone or tablet in bed at night?

Your phone could be the culprit of your insomnia. Your devices emit a blue light through their screens which has been linked in multiple studies to difficulty falling asleep at night.

The blue light tricks your brain into thinking it is daytime rather than nighttime. This prevents the brain from producing vital sleepy-time chemicals at night.

The blue light tricks your brain into thinking it is daytime rather than nighttime preventing vital sleepy-time chemicals at night. #bluelight #nightshift Click To Tweet

How do we stop this self-inflicted insomnia?

The easiest solution is to turn off the electronics after dark. If you stop using your device at sunset or around an hour to two hours before bedtime, then your brain will naturally produce the sleepy-time alert in your body.

How Does Remote Support Work?

Remote Support with Techno Goober

Remote support is a common practice by IT Support companies like Techno Goober. It’s a relatively simple process on the Tech side, but for the user, it can be uncomfortable or even scary.

A lack of understanding about how remote support works leaves many users with questions and hesitations. Keep reading to learn more about how remote support works and save yourself some worry the next time your computer needs some work done.

How does Remote Support actually work?

If something is going wrong with your computer and you don’t know how to fix it, you call Techno Goober for help. One of our techs will either suggest that you bring the device into our office for repairs or we will suggest remote support.

Remote support is usually suggested when the fix is relatively simple or we need to investigate a little more to determine what’s going wrong on your end.

If something is going wrong with your computer and you don’t know how to fix it, you call Techno Goober for help. (302) 645-7177 Click To Tweet

5 Ways to Manage Your Reputation on Social Media

Unclaimed instagram post

When it comes to managing your business’s reputation, there are a few key metrics you should be paying attention to. You know most of them by now:

  1. Reviews
  2. Followers
  3. Referrals
  4. Retention
  5. Others?

Reviews

The first one is obvious. You want to have different reviews from different customers in a variety of places to ensure that no matter where your prospective customers are looking. Encourage your happy customers to leave reviews on Yelp, Google, Facebook, and directly on your website. Bad reviews can be difficult to manage, but they will happen. Get help managing bad reviews

You’ll want to keep your reviews fresh too. Reviews become outdated to prospective customers after a few weeks. You should aim to earn 1 new (positive) review every week. Rotate through your various review sites to ensure fresh content.

Reviews become outdated to prospective customers after a few weeks. You should aim to earn 1 new (positive) review every week. Rotate through your various review sites to ensure fresh content. Click To Tweet

Why You Should be Wary of Public Wi-Fi

Beware public Wi-FI

Traveling for business is required for many jobs. Working while traveling for pleasure is often a necessary evil for many small business owners as well. To protect you and your devices while you’re working on the go, you should understand the dangers of public Wi-Fi. 

What is Public Wi-Fi?

Public Wi-Fi is any wireless network that can be accessed in a public place. This includes wireless internet at the airport, hotel, train station, library, coffee shop, and more. There is accessible wireless internet nearly everywhere you go. Some wireless service providers even offer Wi-Fi connectivity on major highways.

It may seem relatively harmless or even safe to connect to the wireless network at your hotel or local library. But there could be dangers lurking around every corner on these strange wireless connections. Dangers that you might not even notice or have any power against.

Public Wi-Fi may seem harmless, but there are dangers lurking around every corner on these strange wireless connections. Dangers that you might not even notice or have any power against. Learn how to protect yourself. #wifi Click To Tweet

Slow Internet Connection Driving You Crazy?

high speed internet

Today, the internet is considered a necessity. Nearly everything we do has ties to the World Wide Web. Downloading, streaming, and browsing are everyday activities. Whether you use the internet for work, pleasure, or something in-between, a slow internet connection can disrupt your entire day.

Don’t let a slow connection drive you crazy. Learn how to test your connection and determine exactly what the problem is. Can’t find a solution? Trust our Tech Experts to get the job done fast.

Unfortunately, a number of things can cause a slow connection. It could be your Wi-Fi router, it could be your service provider, it could be your machine, and it could be the websites you are trying to access. To determine exactly what might be causing your problem, try the following steps.

Don't let a slow internet connection drive you crazy. Learn how to troubleshoot the problem and find solutions fast. #goobertips Click To Tweet

Stay Clued In! Join Our Mailing List!

Keep up to date with the Goobers’ involvement in the community & special promotions.

Techno Goober Offcanvas Logo

Give us a call, we don’t bite! 302.645.7177