I.T. Deidre Frith I.T. Deidre Frith

How to Clean Out the Cruft

Software cruft are basically “digital dust bunnies.” You know, those duplicate files, forgotten downloads, abandoned files from apps you deleted, and so on. They’re slowing you down big time. Getting the cruft out may sound daunting, but it is actually easy to do. Apple, Microsoft and Google have all joined the anti-cruft global crusade and  have added cruft-removal tools to their operating systems. You just need to remind yourself to use them.

Software cruft are basically “digital dust bunnies.” You know, those duplicate files, forgotten downloads, abandoned files from apps you deleted, and so on. They’re slowing you down big time. Getting the cruft out may sound daunting, but it is actually easy to do. Apple, Microsoft and Google have all joined the anti-cruft global crusade and  have added cruft-removal tools to their operating systems. You just need to remind yourself to use them.

Windows 10: From the Start menu, open Settings, System and then Storage. If you click “Free up space now,” Windows displays a list of cruft categories that it’s safe to delete, and shows how many gigabytes you’ll reclaim.

00sl-datacleanse2-jumbo.jpg
  • Here, you can also turn on Storage Sense, which prevents cruft from accumulating in the first place. (Click “Change how we free up space automatically” to adjust the frequency of the deletions.)

Windows 10 offers a simple way to reclaim disk space from orphaned files.


Mac: Apple’s cruft cruncher can reclaim huge swaths of space. (It’s available on macOS High Sierra and later.) To see it, from the Apple menu, choose About This Mac; click Storage; and then Manage.

00sl-datacleanse3-jumbo.jpg

Here, you’ll see options like “Automatically remove watched iTunes movies and TV shows” and “Download only recent attachments” (in the Mail app). Click Review Files to see a sortable list of everything on your drive, which makes it easy to spot duplicates, or your biggest and oldest files, and delete them.

The Mac, too, suggests ways to pinpoint abandoned and gigantic files for deletion.


00sl-datacleanse4-superJumbo.jpg
  • Android: Beginning with the Oreo version of Android, Google has made it fantastically easy to clean out junk files from your phone: Tap Settings, Storage & Memory, and then “Free Up Space.” The resulting list includes downloaded files, photos and videos that you’ve already backed up, and apps you haven’t used in some time. You can delete them by category or individually.

When your Android phone is feeling stuffed, open Settings to lighten its load.


00sl-datacleanse5-superJumbo.jpg
  • iOS: On the iPhone or iPad, tap Settings, General, and then iPhone Storage. You’re now facing iOS’s cruft-removal options: Offload Unused Apps, Review iTunes Videos (enormous TV and movie files), plus an app-by-app listing of space gobblers. Music, Photos, Podcasts and TV usually top the list.

    To delete the individual songs, videos, photos and other files that are eating up your space, you still have to open the corresponding app. But at least now you know where to begin.

The iPhone and iPad make it easy to see which big and underused apps are junking up your storage.




*Information courtesy of https://www.nytimes.com/2019/02/01/smarter-living/how-to-do-a-data-cleanse.html



Read More
I.T. Deidre Frith I.T. Deidre Frith

Breakup with your password...it's cheating on you.

You have to face facts that your password is easy! Literally. And you have no idea who has been running around with your password over the last year and a half. Take this opportunity to make a change - now that you know the truth - and secure yourself a much better password. And don’t worry about the old password; it has cheated (at least) once, and it will cheat again.

realtime blog .jpg

You love your password.

You use it on every platform you can imagine: Your email, online banking and even Facebook! You are so happy every time you think about your password, you can never imagine changing it.

But what you don’t realize is, while you are caught up in those tingly feelings of love, and that false sense of security that you can always rely on your password to work, your password has been cheating on you.

You have to face facts that your password is easy! Literally. And you have no idea who has been running around with your password over the last year and a half. Take this opportunity to make a change - now that you know the truth - and secure yourself a much better password. And don’t worry about the old password; it has cheated once, and it will cheat again. (You’ve got 99 problems, but your password’s not one of them).

broken heart.png

 How to break up and move on to something better: 

Breakups are tough, but I guarantee you that once you see there are better passwords out there (that are tough and have your best interest at heart) you will get over the breakup quickly. 

  1. It’s Complicated.

    A good password is one that is complex and something you can remember. Finding that sweet spot can be hard sometimes, but I promise it’s necessary. Try using a passphrase. A passphrase is a combination of words used to create a sentence that generates complex, long passwords that are easy to memorize. 
    For example: Che@t=r (i.e. Cheater…see how easy?) 



  2. It’s not for life.

    Don’t grow too attached to your new passwords – you’ll be breaking up frequently. So, how often should you change your password? We recommend at least every six months, if not more. Mix it up, don’t give your password time to cheat on you again. 



  3. Adopt long passphrases.

    Size does matter. We recommend you use at least 16 characters for your password. Once you hit the 12 – 16 range, you make it WAY harder for cyber criminals to use brute force or guess your password. 
    For example: myV@lentin3 does little for protection compared to a passphrase like hewill%cheaton*yout00. 



  4. Don’t ever take that password back.

    If your password cheated on you once, don’t give it another chance to do it to you again! A new, long passphrase is exactly what you need! Meaning, do not reuse old passwords because they’re comfortable. There’s a reason they’re in your past. Leave them there. 

Make online security a lifetime love affair to protect yourself. You are worth it!


WHO WE ARE:

RealTime provides real I.T. solutions to businesses. If you need more information on ways that we can help your business, contact us now or continuing reading here.

Read More
I.T., Blog Deidre Frith I.T., Blog Deidre Frith

Play Hard To Get With Strangers

Cyber criminals cast wide nets with phishing tactics, hoping to drag in victims.

October is Cyber Security Awareness Month

If you receive a suspicious email that appears to be from someone you know, reach out to that person directly on a separate secure platform.

If you receive a suspicious email that appears to be from someone you know, reach out to that person directly on a separate secure platform.

Phishing

Play hard to get with strangers.

Cyber criminals cast wide nets with phishing tactics, hoping to drag in victims. Seemingly real emails from known institutions or personal contacts may ask for financial or personal information.

Cyber criminals will often offer a financial reward, threaten you if you don’t engage, or claim that someone is in need of help. Don’t fall for it! Keep your personal information as private as possible. If they have key details from your life—your job title, multiple email addresses, full name, and more that you may have published online somewhere—they can attempt a direct spear-phishing attack on you. Cyber criminals can also use social engineering with these details to try to manipulate you into skipping normal security protocols.

If you’re unsure who an email is from—even if the details appear accurate—do not respond, and do not click on any links or attachments found in that email. Always avoid sending sensitive information via email.

If you receive a suspicious email that appears to be from someone you know, reach out to that person directly on a separate secure platform. If the email comes from an organization but still looks ‘phishy,’ reach out to them via customer service to verify the communication.

*This information is courtesy of the Department of Homeland Security as part of the 2018 National Cybersecurity Awareness Month.

Read More
I.T., Blog, Social Media Deidre Frith I.T., Blog, Social Media Deidre Frith

Never Click and Tell.

Everyone seems to be posting their information on social media - from personal addresses to where they like to grab coffee. You may figure, if everyone’s doing it, why can’t I?

October is Cyber Security Awareness Month

While it’s tempting to do otherwise, limit your social networks to people you actually do know in real life.

While it’s tempting to do otherwise, limit your social networks to people you actually do know in real life.

Oversharing and Geotagging

Never click and tell.

Everyone seems to be posting their information on social media - from personal addresses to where they like to grab coffee. You may figure, if everyone’s doing it, why can’t I?

What many people don’t realize is that these seemingly random details are all criminals need to know to target you, your loved ones, and even your physical belongings—online and in the real world. Avoid posting names, phone numbers, addresses, school and work locations, and other sensitive information (whether it’s in the text or in the photo you took). Disable geotagging, which allows anyone to see where you are—and where you aren’t—at any given time.

While it’s tempting to do otherwise, limit your social networks to people you actually do know in real life, and set your privacy preferences to the most restrictive settings.

*This information is courtesy of the Department of Homeland Security as part of the 2018 National Cybersecurity Awareness Month.

Read More