5 basic tech tips every computer user needs – TechRepublic

5 basic tech tips every computer user needs
Your email has been sent
Jack Wallen offers IT pros advice to pass along to end users that could prevent headaches and save a great deal of time.
Every so often, I start to do something on a computer and have to stop myself to say: “That’s not a good idea.” Fortunately, it’s all I need to prevent myself from doing something I shouldn’t that could lead to possible disaster or a least ruin my day. But not every computer user has the understanding or the control to stop themselves from making such a mistake.
With that in mind, I’m sharing basic tech advice that you can give your end users, friends and family.
SEE: Security Awareness and Training Policy (TechRepublic Premium)
I cannot tell you how many times I’ve had to stop a user from randomly clicking buttons when something goes wrong with their computer. It doesn’t matter if they’re using Linux, macOS or Windows, when something isn’t working, the default action of an end user is to start clicking things. They may or may not know the things they are clicking, but should they click the wrong thing, they could wind up rendering their PC useless until you undo what they did.
The problem is many users simply don’t understand that some settings options aren’t exactly user-friendly. Imagine, if you will, an end user somehow winds up accidentally opening the Windows Registry Editor and starts clicking around and deleting entries. You know what happens then.
It’s imperative that you help your users to understand that when something goes wrong, they need to immediately contact the help desk to fix the problem. Just randomly clicking buttons can do more harm than good.
Phishing and other internet scams are going strong. I would say that at least 50% of the email I receive daily is attempted phishing scams. But most users aren’t quite savvy enough to be able to quickly tell what is an attempted scam and what isn’t. One way you can help your users to easily see if something is a scam is by instructing them to either hover their mouse over a link and see if what is revealed matches the expected domain of the sender or by having them copy the link and paste it into a notepad to verify the legitimacy of the link.
For example, I have been receiving emails that are obvious scams to convince me I’ve won a Dyson vacuum. Now, I know those emails are scams, because I can see the tell-tale signs, such as the entire body of the email being nothing more than an image, misspelled words and the like. One of the first things I do when suspect emails arrive is to check the sender. If the sender’s address doesn’t match the domain of what’s being promoted in the email, chances are pretty good it’s a scam.
It’s absolutely crucial that you help your end users understand this concept, as it will help them avoid malware and other attacks.
As long as Mr. Murphy has a say in it, things will go wrong. It’s inevitable. Printers will stop working, networks will go down, applications will crash and operating systems will cease to respond. When those things happen, users mustn’t panic, as panic leads to button clicking and other behaviors not conducive to a healthy relationship with technology.
Make sure your users understand that when something goes wrong all they have to do is pick up the phone and let their IT staff know. The problem will get fixed and the user can get back to being productive.
If you don’t already have a security policy put in place that prevents users from installing applications on their PCs, you should at least help them to understand the dangers of randomly installing untrusted software. I remember, back in my days of serving as tech support, how often I’d go to help a user who said their PC had become unresponsive, only to see they’d installed a ton of browser extensions. Those users assumed browser extensions were safe, not knowing just how bad they could be.
Your company should employ a policy that prevents users from installing software. That policy alone could go a long way to help keep your users from making the mistake of installing malicious software.
SEE: Cybersecurity best practices: An open letter to end users (TechRepublic)
I’ve witnessed my fair share of chaos on computers. I’ve seen desktops covered with files, folders and shortcuts, directories riddled with random files and folders, and PCs with absolutely no sense of organization. When your users approach PC usage with a nod to organization, they can achieve a level of efficiency they’ve never before experienced. Most often, this begins with the file manager.
Educate your users on the importance of keeping a tidy file system so that they create sub-folders in directories like Documents that make sense. If they have to keep shortcuts on their desktops, help them understand how to organize those shortcuts into categories or even create folders to hold them. When chaos reigns supreme on the PC, a chaotic workflow will be the result.
Pass this advice down to your end users, friends and family, so you don’t have to constantly be putting out fires that could have been avoided with what should be common sense.
We deliver the top business tech news stories about the companies, the people, and the products revolutionizing the planet.
5 basic tech tips every computer user needs
Your email has been sent
Your message has been sent
TechRepublic Premium content helps you solve your toughest IT issues and jump-start your career or next project.
Looking for the best payroll software for your small business? Check out our top picks for 2022 and read our in-depth analysis.
Next year, cybercriminals will be as busy as ever. Are IT departments ready?
The company, which for several years has been on a buying spree for best-of-breed products, is integrating platforms to generate synergies for speed, insights and collaboration.
Organize a number of different applicants using an ATS to cut down on the amount of unnecessary time spent finding the right candidate.
Whether you are a Microsoft Excel beginner or an advanced user, you’ll benefit from these step-by-step tutorials.
SAP developers are currently in high demand. This job description provides an overview of SAP, and discusses the responsibilities and qualifications that the position requires. From the description: SAP developers will create, code or maintain all programs run on SAP systems, ensuring that all new SAP programs are integrated with other programs and applications that …
This System update policy from TechRepublic Premium provides guidelines for the timely update of operating systems and other software used by the company. It also offers guidance for devices not connected to a network. The processes outlined in this policy will guide the IT and/or security staff through the update process, ensuring that proper backups …
This policy will help your organization safeguard its hardware, software and data from exposure to persons (internal or external) who could intentionally or inadvertently harm your business and/or damage physical assets. From the policy: PHYSICAL SECURITY GUIDELINES AND REQUIREMENTS The following guidelines should be followed in designing and enforcing access to IT assets. Server room/IT …
In order to maintain a consistent, predictable and supportable computing environment it is essential to establish a pre-defined set of software applications for use on workstations, laptops, mobile devices and servers. When employees install random or questionable software on their workstations or devices it can lead to clutter, malware infestations and lengthy support remediation. Company-approved …


Leave a Comment