Stay Safe Online with Computerz R Us
Most cyber attacks start with one click: a fake email, a bad link, or a password reused too many times. This page walks you through real-world examples, demo “attacks”, and simple steps to protect yourself at home and at work.
Big picture: why this matters
- 👀 90%+ of attacks start with phishing.
- 💻 Ransomware can lock all your files in minutes.
- 🔑 Weak or reused passwords make attackers’ lives easy.
- 🧠 Your best defense is slow down, verify, and ask.
Computerz R Us – Clara City, MN
Phone: 320-403-1122
Email: computerzrus@outlook.com
✉️ Phishing & Scam Emails
Phishing emails pretend to be someone you trust (IT, your bank, a friend) to trick you into clicking a link, opening an attachment, or typing your password into a fake website.
How to recognize a bad email
- Sender address is “off” – looks close to real but not exact.
- Urgent threats – “pay in 2 hours or your account is deleted”.
- Generic greeting – “Dear user” instead of your name.
- Spelling and grammar mistakes in “official” messages.
- Unexpected attachments – ZIP, EXE, strange invoices.
- Weird reply-to address that doesn’t match the sender’s domain.
What to do when in doubt
- Pause. Don’t click any links or open attachments yet.
- Hover your mouse over links to see the real destination.
- Verify using another channel (phone call, known website, official app).
- Use your company’s “Report phishing” button if available.
- Ask IT / Computerz R Us for help – better safe than sorry.
Spot the difference
https://yourbank.com/login✅ Legit (if typed yourself)https://yourbank.secure-login-support.com❌ Fakehttps://company.com.hr-portal.co❌ Fakehttps://portal.company.com✅ Can be legit subdomain
In general, the real company name should be right before
.com / .org, not buried in the middle.
💀 Ransomware: “Your Files Have Been Encrypted”
Ransomware is malware that silently encrypts your files, then demands money (usually in cryptocurrency) to get them back. Many outbreaks start from a phishing email.
Typical ransomware screen
- Bright red or scary warning page taking over your screen.
- Message like “Oops! Your files have been encrypted.”
- Countdown timer, threatening permanent data loss.
- Instructions to pay in Bitcoin or another cryptocurrency.
Our demos below show what this can look like – but no actual file encryption is happening. They’re safe training simulations.
Immediate steps
- Stay calm. Don’t click any buttons on the ransom screen.
- Disconnect from the network: unplug network cable / disable Wi-Fi.
- Take photos of the screen (messages, IDs, timers).
- Contact IT / Computerz R Us immediately.
- Do not plug in USB drives or external backup drives.
- Don’t decide to pay the ransom yourself – follow the incident plan.
How to reduce the risk
- Don’t click suspicious links or open unknown attachments.
- Keep systems and software patched and up to date.
- Use strong, unique passwords + multi-factor authentication (2FA).
- Use reputable antivirus/EDR and let it update automatically.
- Have offline or cloud backups that aren’t always connected.
🔑 Passwords, 2FA & Account Safety
Your accounts are only as strong as your weakest password. Attackers love reused passwords and simple patterns they can guess in seconds.
Things to avoid
- Using the same password on multiple websites.
- Simple passwords like
Password123orSeason+Year. - Writing passwords on sticky notes on your monitor.
- Sharing passwords by email or text message.
Better habits
- Use a reputable password manager to store unique passwords.
- Turn on 2FA / MFA (code or app) wherever possible.
- Use long passphrases (e.g.
blue-train-sundae-rocket). - Change passwords immediately after any suspected compromise.
Other things that help
- Lock your screen when you step away from your computer.
- Be careful with public Wi-Fi – use a VPN if possible.
- Don’t post private info (address, phone, birthday) publicly on social media.
🧪 Cyber Security Training Lab
Click a demo to see a safe simulation. These are visual examples only – no real malware, no real encryption, just training.
Phishing Email Example
See what a fake “IT Help Desk” email might look like, with mismatched domains, urgent threats, and a suspicious “invoice” link.
Tip: look at sender address, reply-to, and the real URL.
Ransomware Lock Screen
View a simulated ransomware “Your files have been encrypted” screen. Great for showing how serious it looks – and what to do next.
Simulation only. No real files are touched.
Safe vs Unsafe Links
Practice spotting dangerous links that try to trick you with look-alike domains and extra words after the real company name.
If you’re not 100% sure, don’t click – type it in yourself.
✅ Top 10 Ways to Protect Yourself Online
These simple habits stop a large percentage of common attacks against everyday users.
- Pause before you click. Don’t rush when an email feels urgent or emotional.
- Check the sender’s address and make sure the domain is exactly correct.
- Hover over links to see where they really go before clicking.
- Use strong, unique passwords and a password manager.
- Turn on 2FA / MFA for email, banking, and important accounts.
- Keep devices updated – apply Windows/macOS and app updates regularly.
- Back up important data to a secure cloud or offline backup.
- Be careful on public Wi-Fi – avoid logging in to sensitive accounts.
- Don’t overshare on social media (address, phone, birthdays, answers to security questions).
- Ask for help. If something feels off, contact Computerz R Us or your IT team.