Has your computer mouse been acting weird? Has it been erratic or unresponsive? Your mouse might need cleaning! Your mouse can suffer from the accumulation of dirt and oils from your hands and the surface under your mouse. No idea how to clean your mouse? Don’t worry! After you’re done with this article, you’ll be ready to clean your mouse like a pro.
There are two main types of mice: mechanical and optical. Both types are basically cleaned the same way, although the mechanical mouse requires a bit more work.
Note: Unplug your mouse or turn off your computer before you clean the mouse.
Also known as ball mice, these types of mice are especially susceptible to dust and particles that accumulate inside the mouse, which can make it difficult to move properly. Here’s how you can clean this type of mouse:
Remove the ball from the mouse. Most mice have a small turning cover around the ball. Just turn it a little and it comes off right away.
Use an alcohol wipe to rub down the mouse ball with. Hopefully the majority of its built up grime gets removed.
Pick the dirt off the rollers inside the mouse with a pair of tweezers.
Scrape any small bits of gunk out with a toothpick. Your rollers and wheels should be clean after this step.
Spray the inside of your mouse with canned air, blowing out any of the bits that might have fallen into the casing in the last few steps.
Wipe down the exterior of the mouse with an alcohol wipe. Aaaaand you’re done!
This type of mouse requires no internal cleaning because there aren’t any rotating parts. However they can get sticky over time as dust collects near its light emitter, which may cause erratic cursor movement or prevent the mouse from functioning properly. So how do you clean an optical mouse?
Check the feet of the mouse for any sticky residue and remove it with your fingernail. Be sure to wash your hands!
Place a small amount of alcohol at the end of a q-tip and clean out the optical port. Wipe down the exterior of the mouse with an alcohol wipe.
Portable devices such as jump drives, personal audio players, and tablets give users convenient access to business as well as personal data on the go. As the use of such devices increase, so do the associated risks. But what exactly are the associated risks?
Here are some of the risks of using portable devices:
Increase the risk of data loss, which happens when device is lost.
Increase data exposure, which happens when sensitive data is exposed to the public or a third party without consent.
Increased exposure to network-based attacks to and from any system the device is connected to, both directly and via networks over the Internet.
TechAdvisory.org reports that 25% of malware, also known as malicious software, is spread today through USB devices. These devices plug into the USB port of your PC and may contain malware that you copy unknowingly or that gets launched automatically by the Autorun or Autoplay feature of your computer or laptop. Once the malware infects your computer to steal or corrupt all your data, it might spread to other computers in your home or within your organizational network. Portable devices can also give malicious insiders the opportunity to steal data easily and inconspicuously since these devices are easy to hide and their use is hard to track.
Bluetooth and Wi-Fi can also pose the most risk to your devices. When Bluetooth is on, the device becomes discoverable to your headset but it also becomes discoverable to malicious attackers seeking to exploit the connection. Attackers can also target home and public Wi-Fi networks.
Another potential risk when it comes to storage devices and smart devices comes from their small size and portability. You can accidentally leave them at a café and never see them nor the data stored on them ever again. If your device happens to contain sensitive or proprietary organizational data, your company’s reputation and well-being — and yours — could be in serious jeopardy.
So what can you do to minimize the risks?
The most obvious thing you can do is to install an antivirus software that will scan any device that connects to your computer via a peripheral port, such as USB.
Never connect a found jump drive or media device to your computer. Give any unknown storage device to the security or IT personnel where you found it.
Keep your personal and business data separate.
Secure all sensitive information stored on jump drives, CDs, and DVDs using strong encryption.
Set up a firewall and install antivirus as well as antispyware software on your computer.
Ensure all software on your PC stays up to date with current patches. To make things easier, enable automatic updates so you don’t have to bother checking for updates.
When transferring sensitive data from a USB drive, be sure to delete it using a secure delete utility once you’re done.
Consider using jump drives that have an onboard anti-virus capability which automatically scans both the drive and any computer you plug them into.
Here are some good practices to keep your smart devices secure:
Protect the device using a strong password or PIN and change it regularly.
Before downloading applications, find out what access they want to have on your device. Most applications provide that information. Be wary of downloading applications that don’t.
Download applications, games, and music from trusted sources only.
Run anti-malware software on the device and take the appropriate action when it identifies something suspicious.
Set up a local firewall on the device to filter inbound and outbound traffic and block malicious software.
Configure your device settings in such a way that it will automatically lock itself when you’re not using it.
Do not jailbreak the device. Jailbreaking the device removes the limitations imposed on a device by its manufacturer, often through the installation of custom operating-system components or other third-party software. This makes the device more vulnerable because it removes safeguards against malware.
Activate the GPS functionality so you can track the location of the device if you happen to misplace or lose it.
Disable Bluetooth, Wi-Fi, and other services when you’re not using them.
When using Wi-Fi, be sure to encrypt your home network, use a VPN connection, or otherwise ensure that traffic is encrypted when you’re in a semi-trusted environment
When using Bluetooth, set it to non-discoverable mode to make the device invisible to unauthenticated devices.
Secure all the data stored on tablets using AES 128/256-bit encryption.
Enable a remote-wiping feature to erase all data on the device if you misplace it or if someone enters too many incorrect passwords.
Encountering problems with your keyboard? Here are some of the most common causes as well as what you can do to fix them.
• One of the causes of keyboard problems is an improper connection. Improper connection can be fixed by reconnecting your keyboard then restarting your computer.
• If the keyboard still doesn’t work after you reconnect it, then connection is not the problem. Turn off your computer, unplug the keyboard, and then check for bent or broken pins. Straighten the bent pins gently with the help of a ball point pen or a pencil. If the pins are broken, it’s time to get a replacement.
• Another method you can try is updating your device driver. Visit the manufacturer’s site for the latest drivers available for your keyboard maker and model.
• While you’re at the website, see if there are software updates available for your keyboard. If there are any, install them as well.
• If you are using a multimedia type keyboard, be sure to remove the software before installing any new drivers for this type of keyboard.
If you’re wary about trying out these methods on your own or you’ve tried them all but nothing seems to get your keyboard to start working properly again, it’s time to call the experts! Our technical team is more than willing to help you with your situation. Just give us a call and we will be right at your service!