Tuesday, February 16, 2021

Assumptions We Shouldn't Have

By Mike Brookhouser
Operations Manager & Partner

There are many things we have a bad habit of assuming people know. These are some things you should know if you don’t already.

Your Laptop Should not be Plugged in all the Time.
Your laptop battery is like a muscle. It needs to be worked in order to stay in shape. If you leave it plugged in all the time it will atrophy and lose the ability to work when you want it to. We recommend using the laptop on battery during the day and charging at night. And heat is the enemy of batteries. Avoid leaving it in a hot car or on the patio if possible.

Turn Off Your Computer Correctly.
There are power settings that change the way your computer powers down, sleeps or hibernates, and settings to change what happens when you tap the power button or close the lid on your laptop. We won’t cover every situation here. Generally speaking if you want your computer on, leave it on. If you want it off do a proper shutdown. That means using the start menu or apple menu and selecting “shut down”. We recommend that twice a month you shut it down at the end of the day and let it rest overnight.

Malwarebytes is Great...and Free.
Almost every computer that leaves our shop has Malwarebytes installed. It’s a great anti-malware program that we recommend you run twice a month, and it’s free! There is a paid version which runs real time protection. Which is great in theory but it also has the annoying side effect of slowing down your system. Stick with the free version.

A Good Anti-Virus is Crucial...But You Only Need One.
Free anti-virus programs often cause more trouble than they are worth. We’ve seen time and again when systems come in running slow and the problem is the anti-virus software. Some have even gone as far as collecting data from you and reselling it. There are many AV programs out there and some of them may be good programs, but due to our experience, we recommend specific AV products based on r
eal-world analysis. Having more than one installed on your system can cause all kinds of conflicts. Stick with one good one.

CCleaner and other Registry Cleaners Are Not Your Friend
We hear time and again how “CCleaner found XX many items and cleaned them for me.” While this may sound great, do you know what it did? The average user won’t know and that’s the main reason they shouldn’t use it. You’re better off and safer using Window's built-in disk cleanup and de-fragmentation tools. Microsoft does not support the use of any registry cleaner. The risk of a serious problem caused by a registry cleaner erroneously removing an entry you need is far greater than any potential benefit it may have. Besides that, registry cleaners often get bundled with malicious programs.

There are Predators out There
This could probably be the longest section in this article, so I’ll try to be brief.

Nobody legitimate will call to tell you there is a problem with your computer. The FBI will show up in person to talk to you, they won’t flash a warning on your screen telling you to call this number. Your grandson isn’t going to send a vaguely worded message saying he needs help that can only be solved with iTunes gift cards. Don’t click links on pop-ups or emails that warn you of a problem. Go directly to the website/account in question. You don’t have to answer every call, text or email. Mark unwanted email as spam or junk and move on.

Password Do's and Don'ts
I misspoke before, this would be the longest section.

Passwords are the keys to your online information. Email, banking, credit cards and shopping are all important online activities that many of us do frequently. And each one can cause havoc if we don't protect ourselves.

The best passwords will be at least 14 characters, totally random consisting of upper and lowercase letters, numbers and symbols. In a perfect world you would remember it. But that’s not very practical. Use a password manager or write it in an address book that you don’t keep by the computer. Don't store passwords on your computer in a word or text document

Realistically if you want a safe easier to remember password come up with a sentence that you will remember and pick the first letter of every word. Then add symbols and numbers. For example: "My first dog was named Ginger and I loved her" can become $MfdwnGa1Lh*

In Summary
If you are unsure of something when it comes to your computer, give us a call or email us and we'll be happy to help answer any questions. We try not to assume, because we all know what that does.


Wednesday, October 16, 2019

Fast Rhino named Arizona’s Top Rated Local® Business in Arizona, Computer IT Services (#1 in 2019)

Fast Rhino ranked #1 Computer IT Service
in the entire state of Arizona for 2019!

We felt extremely proud to have been ranked in the top ten of Arizona's Computer IT services in 2018, but this year's 1st place award left us speechless! We cannot thank our clients enough for sharing their experience with others about Fast Rhino.  We are truly fortunate to work with such generous voices.

Find out more about how we were ranked across various review sites and how our rating score was achieved using aggregate data by Top Rated Local®.

Top Rated Local® Business in Arizona, Computer IT Services (#10 in 2018)
Top Rated Local® Business in Arizona, Computer IT Services (#1 in 2019)
Top Rated Local® Business in Arizona (#27 in 2019) - Out of all business categories in Arizona.

Contact Fast Rhino today for top rated service!

Tuesday, October 15, 2019

Modern Password Security Policies

How secure are your passwords? 
Today's passwords need to be a lot more complicated to be effective.

by Merlin Benningfield, Managing Partner - Fast Rhino, LLC

Pull your house key out of your pocket and take a good look at it. Now put it back in your pocket and grab a pen and paper. Could you draw the notches or teeth exactly as they appear on your key?  Most people answer that question with a resounding, "Of course not!".  My next question is, "Why?".  The answer is because the notches in the key are complicated, and for good reason. 

Passwords are modern day keys. No one expects people to remember the exact shape of their house keys, so why do people think they should somehow remember their passwords, especially since most of them have several?  If you have a password that you can remember, chances are it isn't a very good one.  

Let's look at some modern password policies you should be following today (bear in mind that based on how fast technology is moving, this list will need to be updated regularly):

Password Length:  12-14 characters (the old requirement of "8 character" passwords are easily broken by computers now).

Character Types: You should use all of the following types of characters in your password: 
  • Upper case letters
  • Lower case letters
  • Numbers
  • Special Characters ($, @, *, ?, etc.)

Uniqueness: It is not recommended that you use the same password twice, since it is common that once a hacker has successfully stolen a password, they immediately try using it elsewhere.

How often do I change them?: As a rule, you should be changing your passwords once every 90 days to help defend against data breaches.  Companies are targeted by hackers all the time and if you have an account with one of these companies and their network is breached, its possible your account information (username and password) are stolen and then sold on the dark web.   No matter how complicated your password, a data breach could reveal it.  The idea is that if you are regularly changing your passwords, a data breach might not affect you since it takes time to steal, distribute and then use the stolen account data. Most data breaches include millions of records, so the criminals don't usually use them right away and this gives you the ability to hopefully have changed them before they can be used against you.
Documenting all your passwords in an organized fashion so that you can easily find them is a good idea, however keeping that list safe is important.  Password managers can be a good way of storing and accessing your passwords also, but many are cloud-based, which should also be a consideration regarding security.

The bad guys are not sitting in their underwear late at night lounging around in their grandmother's basement trying to break into your account one password attempt at a time.  They've gotten a lot smarter and are now using super computers with extremely fast processors running brute force logarithms.In summary, the majority of passwords we used last decade are not strong enough to stop these brute force attacks.  If we want to protect ourselves, we have to change our defensive computing strategies.

Tuesday, February 19, 2019

Fast Rhino's 15 Year Anniversary

Celebrate Fast Rhino's
15 Year Anniversary
and take 15% off any service call!
Offer may not be used with any other discount
and does not apply to bench work or products.

Thursday, November 15, 2018

Fast Rhino named Arizona’s Top Rated Local® Computer IT Services Award Winner

Top Rated Local® is pleased to announce that Fast Rhino is a 2018 award winner for computer IT services in Arizona!

Posted on
by Top Rated Local

From malware removal and data recovery to system diagnostics and troubleshooting, when you need computer IT services in Tucson, no company beats Fast Rhino.

Fast Rhino has earned dozens of online reviews with an average rating of 4.89 stars, an impressive 94.86 Rating Score™ and a 2018 Top Rated Local award for being rated among the top 10 computer IT service companies in all of Arizona!
Here is just one of the many five-star reviews they’ve received from their happy clients:

“I had a problem with Error Code 43, tried to find a solution online and ended up disabling my server connection. I called Fast Rhino, and within a day, Merlin from Fast Rhino arrived at my door and solved the problem. He was professional, knowledgeable and solved the problem within minutes. I highly recommend Fast Rhino!” – Wendy J

Not Your Average Computer IT Services Company

Clients at Fast Rhino are pleasantly surprised to learn that they offer a lot of services that other companies do not, and best of all, clients get a ton of services included in one low price. For example, when a client buys a computer at Fast Rhino, set-up, delivery, data transfer, installation, the first year of anti-virus software and a full, one-year warranty are all included.

Another thing that sets Fast Rhino apart is that they don’t force their clients to wait around for them by giving them appointment windows. When they say they’ll show up at 8 AM, they’ll show up at 8 AM.

The team at Fast Rhino is incredibly experienced, and they work hard to keep their clients informed so they feel good about their purchase. They live and breathe by their value proposition: Experience. Enjoyable. Computing.

We asked the owner of Fast Rhino, Merlin Benningfield, why they do what they do. Here’s what he had to say:
“We understand computers and know that many people need someone who not only understands but also who cares about their needs. There is an old saying that we live by every day and keep in mind with every customer interaction, ‘Customers don’t care how much you know; customers want to know how much you care.’

You can read more of the article here.

Wednesday, May 30, 2018

2018 Summer Promotion

This summer is the time to buy a computer from Fast Rhino!
Now until September 1st, 2018 get a great deal on any of our certified pre-owned systems or get a $50 gift card you can use towards any product or service when you purchase any NEW Fast Rhino computer. 

Thursday, September 21, 2017

Credit Monitoring or Credit Freeze?

by Merlin Benningfield, Managing Partner - Fast Rhino, LLC

In today's volatile world of digital hacks and data breaches,the chances of having your identity stolen is becoming more and more a certainty than just a possibility.  So how do you protect yourself?

A common way in which criminals can ruin your life is by gaining access to enough personal information about you that they can then apply for credit under your identity.  Your name, address, date of birth, and social security number can be enough information to apply for credit, perform tax refund fraud, medical services fraud, etc...   and this information is quickly finding itself available to criminals on the dark web.

There are a host of companies now that promote credit monitoring services, which may sound like an effective and affordable solution, however, they only detect fraudulent use of your credit file after the fact. A better solution would be to implement a credit freeze.  This helps lock down your credit record and prevents anyone from accessing it without you first "thawing" it.

The United States Public Interest Research Group (USPIRG) published a comprehensive document (PDF) discussing the importance of why you should consider placing a freeze on your credit report before your information is stolen. They also have some good advice regarding the recent Equifax breach and how you can protect yourself in that regard.

As I continue to say, the bad guys are using the Internet against us.  The more we learn about their tactics, the less likely we are to become a statistic.