Little Dog Tech Logo
CALL US
515-422-1995
5946 Ashworth Rd.
West Des Moines, IA 50266
  • Home
  • Remote Support
  • Services
    • Residential Services
    • Business Services
  • Pricing
  • About
  • Reviews
  • Contact Us
  • Blog
  • Partners

Tech Tips Everyone Should Know

May 30, 2023 by Paul Schwegler

There are billions of computers in the world today. In fact, 286 million computers shipped globally in 2022, and that was a 16% drop! Those figures make it obvious how many of us have access to computers, yet that doesn’t mean we all know the simple shortcuts available to us. This article rounds up top tech tips that can benefit every user.

Search Google smarter

Google is the market leader with over 85% of Web search traffic. But did you know you can search this popular online engine even easier? When you know you are looking for something on a particular site, you can narrow your search. Go to the Google search bar as normal, then, in the search box, type “site: www.website.com” (without quotes) with your search term. This refines your search.

So, if you wanted to find an article on coaching on the Forbes website, you would search “site: forbes.com and coaching.” You’ll see that all the responses you get back come from the Forbes domain.

Undo your mistakes

We all make mistakes while working on our computers. Here are some ways to undo the common ones.

“Unsending” an email is possible in Gmail. Go to Settings and set up the Undo Send section to give yourself 5, 10, 20, or 30 seconds. Then, save your changes, and you’ll have this option enabled in the future. It doesn’t technically “unsend” the email but delays sending it for a few seconds so you can stop it if need be.

You can also reopen a closed browser tab by using Ctrl+Shift+T on your PC or Command+Shift+T on your Mac. This reopens the last tab you closed. If you closed a bunch at once, you can also reopen them from your browser’s History dropdown menu.

Then, there’s Ctrl + Z for just about everything else. Pressing the control button and Z key together undoes your action in many Web browsers and operating systems. It will depend on your application and how far you can go back with this shortcut.

Capture your screen

Some modern PC keyboards come with a “print screen” key, which you can use to get a screenshot of the desktop windows. If you want to crop that screenshot, on Windows 10, go to Start and type Snipping Tool in the Search bar. You’ll get a box you can drag to any shape over your screen.

You can also take a screenshot on a Mac by pressing Command + Shift + 4. To crop the screenshot size and shape, you’ll press Command + Shift + 5.

One more little secret

How many times do you find yourself picking up your USB cable and trying to put it in the wrong way? You can stop doing so by looking for a symbol on the cable near where you’ll plug it in. It’s only found on one side, and it’s not for decoration. The symbol should be facing you when you plug in the USB. This will get it in the first time, whether you’re plugging in a vertical or horizontal cable.

These tech tips can help you be more efficient and effective with your technology, but you may still want help in other areas. Reach out to our IT experts today. We’re here to help. Call us at (515)422-1995.

Filed Under: Productivity, Residential, Tips Tagged With: productivity, residential, tips

Share:

Choosing the Right Laptop for Your Content Creation

May 16, 2023 by Paul Schwegler

Are you an influencer? Or do you aspire to join the more than 50 million people making content for YouTube, TikTok, or Instagram? If you want to be a content creator, don’t struggle with a computer that isn’t up to the task. Considering these factors can help you land the best laptop for your needs.

Yes, the average person can take a video on their smartphone and post it for friends to enjoy, but when you’re serious about your video editing or creating high-quality, long-form content, you’ll need more.

To make your content look professional, pay attention to these factors. It will help you choose the laptop that sets you up to be the next Spielberg.

Video card

Pay attention to the video card. Also known as a graphics card, this is the piece of the computer that renders images on the display.

A laptop typically has a less robust video card than a desktop. That’s because laptops are often thinner. For the benefit of mobility, you compromise on the space available for a beefier graphics card. The card may also run slower because the card needs to be efficient without setting the laptop on fire.

So, when selecting a laptop with plans to edit video, do your research. You can easily find rankings for “laptops with good graphic cards” online. You can get away with an RTX 2080 (that’s a few generations old). Ideally, though, you’ll want the RTX 3080 or Intel Iris Xe.

Processing power

The laptop’s processing power can also play a role in your video editing success. A lot of video editing software needs multi-core processors. You can think of it as having many arms to get different things done at once.

For a PC laptop, go for at least an Intel i9 CPU. For Mac, a modern Macbook Pro with an M2 Pro CPU is a good choice.

Memory

For your laptop to be able to do many things at once, you also need powerful memory. Random access memory (RAM) is what you’ll be comparing here. RAM loads the operating system, runs video editing software, and performs other background functions.

At minimum, you’ll want 16GB of RAM, but the more you have, the better. Obviously, the budget will factor in here.

Storage

Your storage capacity also impacts how efficiently you can do all that you want to do.

If you’re working in Full HD (1920 × 1080), you could have some big project files to move around. The more storage you have, the easier this will be.

You’ll be choosing between hard disk drives (HDDs) and solid-state drives (SSDs). SSDs are good for working on the fly. They can run faster, as they don’t use any mechanical parts, but they can cost more.

A good idea is to work off your SSD for your current editing needs. Meanwhile, you can store archived videos and completed footage on a second hard drive. This can be on the laptop if there’s space, or you can attach an external HDD.

Display

Whether you are the star of your content or someone else is, you’ll also want to consider laptop display size. There are two main display types: Twisted Nematic (TN) and In-Plane Switching (IPS) panels.

TN panels cost less, but you can lose color accuracy on angles. The IPS panels give you more color at more angles, but they cost a little more.

Connectivity

You might want to attach an external HDD or connect to a larger desktop monitor. In that case, look for accessory ports and external display connectivity.

Need help deciding on the laptop that best suits your content creation needs? Our experts are here to help. Connect with us today at (515)422-1995

Filed Under: Productivity, Residential, Tips Tagged With: Content Creation, Laptops, purchasing, residential

Share:

How Much Laptop Storage Do You Need

March 21, 2023 by Paul Schwegler

When looking to buy a laptop, one of the main things you have to decide is how much storage you need. That’s a challenging question for many of us to answer. Let’s discuss the factors that matter and how to decide.

The short answer, for many people, is that you don’t need much laptop storage. Having 512 GB available is often enough for a regular user, but it’s going to depend on how you’re using the laptop.

For example, if you use cloud email, your account likely comes with cloud storage. Using cloud-based applications such as Google Docs also saves storage space.

If you’re using the laptop to stream videos on TikTok or YouTube, or watching your series or movies on Netflix or the like, you’re also taking advantage of the cloud. Very little data is actually stored on your computer.

Even so, remember to account also for your operating system. Microsoft and Apple recommend 32 GB of storage space to accommodate their OSs. Otherwise, you could encounter performance issues.

Also, if you edit videos or work in graphic design, you’ll likely want a lot more available storage.

How storage space impacts your computer use

Storage space is the capacity your computer uses to store files and data. So, when you have a lot of data, images, or video to hold and work with, more storage helps the PC recall them more quickly.

If you are a digital hoarder, that can also factor into your storage needs.

When thinking about storing photos, you’d have to have many albums to make a dent. If the average image size is about 4 MB, it would take 1000 photos to use up 4 GBs of space. But video eats up a lot more space. An hour-long 1080 p video could occupy 10,000 MB (10 GB).

If you regularly download new apps and games, you can quickly fill up your storage space. Purging unused files and apps consistently frees up space.

Considering the cost of laptop storage

More storage can mean a bigger price tag, so you’ll want to balance your storage needs against your budget constraints.

If you can spend freely, go ahead and get more storage. Otherwise, you’ll want to weigh hard disk drive (HDD) and solid-state drive (SSD) upgrades.

HDDs offer more storage for less cost, but slower reading and writing. SSDs can be three to four times as expensive, but you do get greater speed. SSDs are also typically quieter, more durable, and consume less energy.

One option is to buy a laptop with a smaller SSD and get an external HDD to meet both your speed and storage needs. HDDs can be better for data recovery and for storing large amounts of data you’re not accessing often.

Need help making decisions about your laptop purchase or storage needs? Our IT experts have the answers you need. Contact us today at (515)422-1995.

Filed Under: Productivity, Residential, Tips Tagged With: Laptop, residential, storage

Share:

Benefits of a Vertical Monitor

March 7, 2023 by Paul Schwegler

Horizontal is the norm when we’re thinking about televisions or computer monitors. Yet vertical monitors are an option. Consider these advantages of going vertical.

On a horizontal monitor, there is more width than height. The usual 16:9 horizontal monitor is great for watching movies, but when it comes to other processes, there’s a lot of wasted space. If you have a vertical monitor setup, you can enjoy a better viewing experience.

You’ll find it’s easier to scan websites, view search engine results, and read online content or long blocks of code. If you’re big into cryptocurrency, you might enjoy displaying data in an easy-to-read form, plus, you’ll be able to react more quickly.

You can also have a full view of photographs or a project if you’re trying to design something with a vertical layout.

Vertical screens can also reduce eye strain. With this setup you reduce the range of movement, which can save your eyes from getting as tired.

Further, you might be able to save space with a vertical monitor if you have less room on your desk.

A vertical monitor can be appealing if you use two monitors at once. Having dual monitors can increase productivity. You enjoy added viewing space to multitask, browse the Web, watch videos, or games. If you’re working from home, you may also find it easier to collaborate with colleagues with a second screen. When you set up one screen to be vertical, you can benefit from the best of both worlds.

Going vertical is Easy

You don’t have to buy a special monitor to take advantage of a vertical setup. While many screens are only capable of a horizontal display, you may be able to adjust the way it is mounted. You can get a stand or mount that allows you to easily rotate the screen. As long as it is a VESA-compatible monitor, you can easily make the choice of horizontal or vertical. Then, you can change the layout in the operating system’s display settings. Windows, MacOS, and Linux all support vertical screen rotation.

Some monitors have mounts that allow physical rotation, which is a good way to test drive the vertical monitor. That way you can see how it compares to a horizontal layout for your needs. Keep in mind, though, that this repositioning of the monitor will affect your stereo speakers. You’ll need to attach an external pair of speakers to have them work with the new orientation.

Vertical monitors aren’t for everybody; if you game a lot or want to watch movies or do 3D modeling, you might prefer the horizontal screen. Many computer games, for example, are programmed for horizontal play, and opening that game up on a vertical rotation can cut off or compress your visuals.

One other common criticism of vertical screens is that they catch glare from nearby light sources more easily. So, if you don’t want to deal with glare, stick with horizontal.

Our IT experts are here to consult on your computer needs. We can advise you on your screen choices and so much more. Contact us today at (515)422-1995.

Filed Under: Productivity, Residential, Tips Tagged With: Display, Monitor, residential, Vertical

Share:

Why Are Printers Still So Terrible?

February 21, 2023 by Paul Schwegler

Our phones can recognize our faces. Digital watches can detect that we’ve been in an accident. We can put on a virtual reality headset and feel as if we’re swimming with dolphins. With all this technological innovation, why are home printers still so frustrating? This article explains why and how to make the most of the situation.

Hewlett-Packard released its home DeskJet inkjet printer in 1988. These printers spray liquid ink onto the page through printheads. Home laserjet printers followed shortly after. They use lasers to create static electricity to attract and melt toner onto the paper.

And here we are, thirty-five years later, with pretty much the same printer technology. Although now, you might also consider a multifunction (all-in-one) printer. These print documents and can often also scan, copy, fax, and email documents.

But we’re still saddled with clogged inkjets and leaking ink cartridges, plus paper jams, or a printer that can’t recognize the paper that you’ve now taken in and out of the tray 16 times in a row. Why?

Manufacturer priorities for printers

Printer manufacturers often lose money selling you the printer. Printer technology is quite complicated, but you’re getting the device for the price of parts. That’s because the manufacturer banks on making their money back on the sale of the ink.

Because they’re looking to make money off ink sales, printer users now endure:

  • ink cartridges that run out quickly – yes, they’re putting less ink in their cartridges these days;
  • printers designed not to work as well if you use off-brand cartridges;
  • having to perform printer maintenance that uses up more ink.

Even if you do invest in top-quality, on-brand ink, you could still encounter problems. Connectivity issues or error messages when you change paper are common.

That’s because the internal workings of the printer can be outsourced to the lowest bidder. Printer longevity is not the goal, so there’s less incentive to develop robust networking components or print drivers.

Plus, printing is hard

It’s not all down to printer manufacturer choices. Printing is a complicated process. Many moving parts need fine-tuning to apply the right pressure and position the ink. Plus, people could be using glossy photo paper one minute and recycled paper the next. At the same time, humidity or air that is too dry can also impact the paper and how the printer can move it around.

So, what can you do? Prefer a laser printer, which uses dry powder, if you’re going to print mostly in black and white. You’ll pay more upfront, but you’re no longer hostage to the ink-cartridge dilemma. If you need to do color prints, you might find it’s cheaper to actually go to your local print shop or big-box store.

If your Wi-Fi connectivity conks out, connect the USB cable that shipped with the printer. It may not be as pretty, but it will get the job done.

Filed Under: Residential, Tips Tagged With: Printers, residential, tips, troubleshooting

Share:

Is Your Data Breached? What To Do

February 7, 2023 by Paul Schwegler

News of data breaches is all too common. This company apologizes for six million accounts breached. That company acknowledges hackers accessed 35,000 users’ personal identifiable information. But the question that probably matters most: Is your data breached, too?

The company should contact you if your information is in a data leak, but you can’t rely on that. You can also find out if your phone number or email address has been leaked by visiting https://haveibeenpwned.com/.

HaveIBeenPwned has uploaded various breaches and consolidated the information to make searching easy. Enter your address and get a list of breaches that compromised that email. You’ll get a summary paragraph as well as a description of data compromised in each breach.

It is not uplifting reading!

Next, the question is what to do about your breached information.

Steps to Better Security

First, change your passwords for those breached accounts. If you use that same password to access other accounts, change those passwords, as well, even if they are not listed as leaked.

Always avoid reusing passwords. Yes, it can be a hassle to remember many different access credentials, but you risk exposing many accounts if you keep reusing one email address and password combo over and again.

Make using unique passwords for all accounts easier by using a password manager. A manager can store your many passwords in one place and generate strong ones to use. You can often download an app to your mobile device, which gives you the convenience of filling in your credentials when you’re on the go, too.

The next step is to use two-factor authentication (2FA).

Understanding 2FA

This adds a layer of difficulty for hackers trying to access your accounts. Even if they had your username and password, they would need a second way to verify your identity.

Using 2FA requires you to provide one of the following before you can gain access:

  • something you know (e.g. the answer to a secret question);
  • something you have (e.g. your smartphone);
  • something you are (e.g. your fingerprint).

A bad actor would need to have not only your leaked credentials but also your other “something.”

A common approach to FA is an SMS text message or voice-based authentication. You enter your credentials, then the site follows up with a text or phone call providing a separate code you must then enter. This is not the best method, however. Scammers can hack the SIM card associated with your device, and then use your number to make and receive calls and texts.

Software tokens for 2FA are a safer solution. You’ll download and install an application on your phone (e.g. Authy or Okta Verify). It can generate a unique verification code that is valid only for 30-60 seconds.

Want to learn more about password management and soft-token 2FA. We’re here to help. Contact us today at (515)422-1995.

Filed Under: Residential, Security, Tips Tagged With: breach, data, residential, security

Share:

GPU Shortage Ends: The Benefits

January 17, 2023 by Paul Schwegler

You may not think about it much, but your computer needs a graphics processing unit (GPU). The GPU allows you to see multimedia content and renders the graphics of your video games. It can also accelerate high-performance computing. The good news? It’s no longer as difficult to get a new graphics card at a reasonable price.

A global shortage of GPUs in 2021 made it challenging to obtain new graphics cards. That could stall repairs and upgrades. Plus, people who wanted to build their own computers struggled to do so. If you did find a GPU available, you could expect to pay much more than usual. Scalpers were also buying the chips up and charging exorbitant prices.

One problem was that major chip manufacturers were struggling to source silicon. It’s needed for the semiconductor functionality of GPUs. The pandemic slowed and even stopped production at some of the largest silicon manufacturers.

It didn’t help any that cryptocurrency miners were buying up GPUs, too. They needed the processing power to mine efficiently.

Why the shortage is over

Fortunately, the GPU storage is ending. GPU manufacturers continued developing chips while waiting for the silicon semiconductors they needed. Now that those are back online, the graphics card companies can quickly make up for lost time.

At the same time, GPUs are no longer the best option for cryptomining. Instead, they have been replaced by more efficient application-specific integrated circuits (ASICs).

What happens next?

Actually, a surplus of older GPUs is expected, as a new generation of GPUs has arrived.

A new GPU series means manufacturers and computer parts stores will look to clear inventory. They’ll want to sell off older GPUs to make room for the new product.

This can be good news. You can expect prices of the previous generation of technology to come down. Plus, you can take advantage of the GPU surplus to replace a failing GPU. Or you can now upgrade your graphics card more affordably.

Get in the GPU Game

Want help upgrading your GPU or evaluating if your computer can handle the new GPUs coming in a few months? Our experts can help.

Filed Under: Residential, Tips Tagged With: Custom build, GPU, Graphics, residential

Share:

What is SIM Jacking, and Why Should You Care?

January 3, 2023 by Paul Schwegler

If you play the popular SIMS life-simulation video game, you could think SIM jacking means someone takes over your characters, but the reality is even worse. SIM jacking is a type of identity theft targeting your real-life identity via your phone.

In SIM jacking a bad actor uses the subscriber identity module (SIM) card associated with your cellphone number to make calls, send texts, and use data. This has several potential negative outcomes:

  • Your phone bill goes off the charts with international calling and data usage fees.
  • They might impersonate you by sending texts to scam your friends and family.
  • They can sign up for new email and social media accounts using your phone number.

Most importantly? They can use your phone number and SIM card to sign into your personal accounts. Many of us use text messaging for authentication. That’s when a site, say your bank, sends a code to your phone to confirm it’s you.

Now, imagine the criminal has access to your bank account through a leaked password. Whereas they couldn’t get in before because of two-factor authentication, they now have your SIM card, too. That means the SMS to authenticate your account also goes to them. They’re in, and you’re out.

How Does SIM Jacking Work?

Typically it starts, as so many cyberattacks do, with phishing. You might get a text or email that looks like it is from the cellphone carrier that asks you to click on a link. It might tell you there’s been suspicious activity on your account or that your bill is past due. It’s usually something that will make you anxious and feel the need to act urgently.

You’re taken to a fake website where you provide your name, address, cell phone number, and date of birth. With the right information, the scammer contacts your phone carrier and asks for a new SIM card. Once they have that in hand, they access your account and take over your cellphone. If they pair that with leaked credentials, they can really do damage.

If you’ve been SIM jacked, you’ll find out after the fact. You will no longer have a signal connection, so you won’t be able to send texts or make or receive calls. You may also have difficulty signing into the hacked accounts.

If you do think you’ve been SIM jacked, contact your carrier ASAP. Also, change your passwords and let your friends and family know. Otherwise, they might fall victim to a malware attack that appears to come from you.

Protect Yourself from SIM Jacking

Be careful with your personal information. Be wary of any requests to share your sensitive information online. Avoid taking action based on text messages or emails from people you don’t know and trust.

Protect yourself by using an authentication app such as Google Authenticator or Authy. Do this instead of using text messages to authenticate yourself online.

Always update the applications on your smartphone. Yes, it seems like there are constantly new updates, but they can be protecting you from vulnerabilities.

You might also get a request to restart your phone. This is a common sign your SIM card has been hacked. If you do it, you’ll lose control of your SIM card. So, call your carrier first.

It’s also a good idea to regularly review your phone bills for any charges that you don’t recognize.

Want to protect your online activity? Our IT experts can help update your applications and identify any vulnerabilities. Contact us today at (515)422-1995.

Filed Under: Residential, Security, Tips Tagged With: residential, security, SIM, tips

Share:

What You Need to Know About Browser Extension Risks

December 20, 2022 by Paul Schwegler

With “Googling it” now a common expression, it’s safe to say you do a lot online. To do it all you’re using a Web browser (such as Chrome, Edge, Firefox, etc.). To do it all more efficiently or effectively, you could be using browser extensions, but this article is going to warn you against doing so.

To clarify, browser extensions are code add-ons that you connect to your browser. You can use them to personalize your surfing experience, and they accomplish many different things, including:

  • saving time (e.g. Scribe, Evernote, StayFocusd);
  • checking your grammar (e.g. Grammarly);
  • managing your passwords (e.g. Keeper, LastPass);
  • securing your online activity (e.g. DuckDuckGo, Ghostery)

Even though we’ve just said they can help secure your online activity and manage your passwords, the problem is that they are also risky.

Consider the fact that we said this represents added code. Now, how much coding do you know? Most will say “not a lot.” That means you’re blindly trusting that browser extension.

If you download a malicious one, that code can wreak havoc. Suddenly, your default search engine gets changed, or you get redirected to a start page with malware on it. You might face an onslaught of pop-ups or ads. They can also track your browsing history without you knowing it.

That’s just the beginning

Many browsers today want to keep you safe from malevolent extensions. They’ll have permissions in place before allowing access. Yet you still end up giving that extension a lot of access. For example, an extension modifying google.com needs access to all your Google activity. That means your Gmail, too.

Browser extensions access everything you’re doing online. So, a malicious extension could also function as a keylogger capturing passwords or credit card details.

A browser extension can also be sold to or hijacked by a bad actor. Then, it’s easy enough for them to push out an update that turns your trusted extension into malware.

What to do about this issue

Does this mean you should do without browser extensions? There are even browser extensions out there to block other browser extensions, but abstinence from extensions is not your only solution.

Instead, we’d recommend reviewing the safety and credibility of that extension. This means you should:

  • Check to see who published the extension.
  • Look at the reviews. A high number of positive reviews is a good sign. Thousands of people are unlikely to give five stars to a malicious extension.
  • Pay attention to the permissions required. If an extension claims to modify only one website, check that it accesses that site only.
  • Protect yourself with a good antivirus solution.
  • Keep your antivirus solution and other software updated.

It’s also easier to stay safe by limiting the number of installed extensions you use. If you have browser extensions that you aren’t using, uninstall them. This can cut your exposure to potential threats.

Another way to secure your online activity? Work with our IT experts. We can check permissions and review your extensions. We’ll also ensure your antivirus and software are up to date. Contact us today at (515)422-1995.

Filed Under: Residential, Security, Tips Tagged With: Browser Extensions, residential, security, tips

Share:

Avoid Holiday Hoodwinks

December 6, 2022 by Paul Schwegler

The holidays are busy. We’re trying to get work done to have some fun, and we’re hosting family and friends. Plus, parents that have the holiday Elf tradition must remember to move the doll every night. It’s a lot, and it can make us more likely to fall for scams that can lead to data theft.

Hackers like to take the path of least resistance. Why work harder than they have to for their ill-gotten gains? Instead, they’ll use social engineering to get you to give them your data or download their malware. Look out for these top holiday scams.

Parcel delivery scams

More people are expecting packages this time of year. Bad actors take advantage of this with what’s called a smishing scam. It’s a particular type of scam using text/SMS messaging. You get a message from a known service telling you a delivery needs rescheduling, or that there’s an outstanding fee that needs to be paid.

Recipients, who are already expecting a package, are quick to fall for the request. Clicking on the message link, they enter personal information or download malicious software.

Tip: Go to the source of the package you’re expecting and see what they’re saying about your package delivery.

E-card scams

Another common holiday season scam takes advantage of our enthusiasm for money. Scammers send e-cards to your email. When you click on the link, you’ll download a virus or other malware (e.g. ransomware).

Tip: Check the credibility of any e-card sender before downloading the “gift.”

Christmas hamper scams

Everyone wants to be a winner, but don’t fall for the scammer calling or emailing to say you’ve won a Christmas hamper. They’ll claim to be from a legit organization and have some of your personal information already. That helps them make it all seem genuine. Then, they’ll ask for you to provide more personal details to collect your prize or gift.

They may ask only for your full name, address, and phone number (if the request was emailed). They’ll be collecting this information for a more focused attack in the future.

Tip: Use strong passwords and be careful about what personal details you put on social media.

Fake websites

Many people shop sites that are unfamiliar to them at this time of year. Grandparents (even parents) know nothing about that latest trendy shop! Bad actors will set up fake sites offering gifts and services. They’re looking to get your personal details and money.

Tip: Prefer secure website addresses starting with “https” and displaying a locked padlock.

Shopping scams

Every season has its in-demand items. Scammers take advantage of this and set up ads for amazing deals on those items. Desperate to get this year’s toy for your toddler, you might be hooked. Or they’ll ensure people click on their ads by offering ridiculous deals. If you do get the item purchased via these ads, it’s likely to be a sub-par counterfeit.

Tip: Shop with retailers you know and trust.

Bank scams

This scam operates year-round, but bad actors have an edge in the holiday season when people spend more. Fraudsters typically call, text, or email as your bank having noticed suspicious activity. They get you feeling anxious and then urge you to take action (e.g. click a link or share personal details) to address the issue.

Tip: Remember that banks never use unsolicited calls to ask for personal details, pressure you to give information, or tell you to move your money to a safe account.

Protecting yourself this season

The tips shared throughout this article will help. At the same time, setting up password managers and antivirus software can also be useful. We can help you secure your online activity year-round. Contact us today at (515)422-1995.

Filed Under: Residential, Security, Tips Tagged With: Holidays, residential, security, tips

Share:

  • 1
  • 2
  • 3
  • …
  • 10
  • Next Page »

Contact Form

Before submitting your question, you must review and agree to the Little Dog Tech Terms of Service.

Search for Something!

Click to see our BBB Report

FOLLOW US

VISIT US

Privacy Policy

Copyright © 2023 · Little Dog Tech · 5946 Ashworth Rd. , West Des Moines, IA 50266