Technology
First 10 things to do if you got a new PC
If you’re reading this, you might have gotten a new PC for the holidays or you’re considering buying one in the new year. Thaddeus from Ellenton, Florida, reached out to us with this question after purchasing a new PC.
“I just bought a new PC laptop for the first time in 8 years (how times change!). I want to set this one up correctly and in the most secure way possible from the very start. I mean from the first time I boot it up. QUESTION: Is there a checklist of suggestions that I can follow to [set up] a new computer correctly & securely?” – Thaddeus, Ellenton, FL
Yes, Thaddeus, we have some great suggestions for you. Here’s how to set up your new PC, fresh out of the box. And for those who have a new Mac, check out these five essential steps to set up your Mac.
CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS, AND EASY HOW-TO’S TO MAKE YOU SMARTER
1) Getting started with Windows
Man typing on PC (Kurt “CyberGuy” Knutsson)
When you first open your new PC, Windows will ask you to pick some basic settings. First, it’ll ask you to select a language. Then, it’ll ask to connect to your Wi-Fi. Select whatever network you use and input your password. You can then click on “connect automatically” so Windows won’t ask you for a password every time you want to connect to the internet.
After connecting to your Wi-Fi, Windows will ask you to set up your language, time and calendar settings. It then asks you to create a login. Windows might ask you to create an online Windows account, but that’s optional. While it does sync up your new PC to other PCs you might own, you can also create a local account.
2) Updating to latest version of Windows
First thing’s first, you should make sure you have the latest version of Windows. It doesn’t matter if you’re using Windows 10 or Windows 11 — you should be using the most up-to-date version. Luckily, Windows allows you to easily update your new computer.
Once you connect your PC to the internet, Windows will automatically search for updates. If you want to update your computer once it has been set up, here’s how:
Windows 10:
- Click Start and select Settings
- Select Update & Security and then click Windows Update
- Click Check for updates and if one is available, click on Download and install
Windows 11:
- Click Start and select Settings
- Select Windows Update
- Windows should automatically start Checking for updates, if not, select Check for updates
- Click Download and install
MORE: WATCH OUT FOR THIS NEW MALICIOUS RANSOMWARE DISGUISED AS WINDOWS UPDATES
3) Install a new browser
Windows comes preinstalled with Microsoft Edge. The browser is perfectly serviceable, however, it may not be your cup of tea, and you might want to go with an alternative. You might prefer Google Chrome, Mozilla Firefox, Opera GX or Brave instead. Each has its upsides and downsides.
Google Chrome is more ubiquitous and features a huge library of extensions for you to download and use. It also connects to your Google profile, letting you have a more seamless experience across multiple devices. Firefox is more catered toward privacy and also features a pretty big selection of extensions. And if you’re a fan of gaming or have gamers in your family, Opera GX has features that focus on your CPU, RAM and network connectivity. Or you may want to go with Brave, a browser that blocks ads and trackers by default and also offers built-in firewall and VPN services. Brave is fast, secure, and privacy-focused.
To download any of those browsers, just head to their respective websites and click on the version that works best for your PC.
MORE: TOP BROWSER EXTENSIONS TO MAKE YOUR LIFE EASIER
4) Setting up your computer security settings
Windows 10 and 11 both come preinstalled with Windows Security (also known as Windows Defender). It’s turned on by default unless you have a third-party antivirus preinstalled. You can access it pretty easily, here’s how:
- Click Start and select Settings
- Select Windows Security
- Use the options on screen and make sure everything has a green check
Windows security screen (Microsoft) (Kurt “CyberGuy” Knutsson)
Windows Defender, integrated as a complimentary antivirus software in Windows 10 and 11, offers capabilities to detect and remove a variety of malware, along with firewall and device protection features. However, its scope is limited. It does not safeguard against phishing or spam, and its functionality is confined to the individual Windows 10 or 11 system where it’s installed, primarily supporting other Microsoft products. Unfortunately, it lacks compatibility with popular browsers like Chrome, Firefox, and Safari, leaving third-party applications and programs susceptible to security and privacy breaches. Consequently, Windows Defender may not be sufficient for comprehensive security needs, and exploring reliable third-party alternatives could provide more robust and extensive protection.
No matter what, the best way to protect yourself from having your data breached is to have antivirus protection installed on all your devices. Having good antivirus software actively running on your devices will alert you of any malware in your system, warn you against clicking on any malicious links in phishing emails and ultimately protect you from being hacked. Get my picks for the best 2023 antivirus protection winners for your Windows, Mac, Android & iOS devices.
5) Backing up your PC
Backing up your PC gives you some security in case something goes wrong. You can use it to restore your Windows back to normal. And a backup feature is built right into Windows.
Windows 11:
- Connect the external drive for your backup to your computer
- Open File Explorer
- You should see the external drive in the left-side panel
- Copy the content you want to back up by
- Paste the copied files or folders into the external drive
Windows 10:
- Connect the external drive for your backup to your computer
- On the main desktop, go to the ‘Windows’ icon to open the menu
- Click Settings
- Scroll down the ‘Windows Setting’ page, and click Update & Security
- Click Backup
- Select Add a drive
- Choose the external drive or network location you want to back up the files
6) Transferring your files
While transferring files to a new PC can seem daunting, it’s actually quite simple. All you need to do is backup your files onto a cloud storage service like Dropbox, One Drive or Google Chrome. Then log into your service on your new PC and download/restore those files onto your new computer. For an offline option, you could upload your files to a thumb drive or external hard drive. You’d then plug them into your new PC and download them.
7) Cleaning up bloatware
Many PCs bought off the shelf will have bloatware, which is software that is pre-installed by the manufacturer or retailer, often without the user’s consent or knowledge. It’s that unneeded Candy Crush clone or antivirus software trial that you don’t really need taking up space on your computer. Luckily, it’s pretty easy to get rid of. Here’s how:
Windows 10: uninstalling apps:
- Select Start, then select Settings
- Click on Apps and then select Apps & features
- Choose the bloatware you want to Uninstall
Uninstall programs from the Control Panel
- Use the search box to find the Control Panel
- Click on Programs and then select Programs and Features
- Right-click on the program you want to get rid of and select either Uninstall or Uninstall/Change
- Follow the directions on the screen
Windows 11: uninstalling apps:
- Click Start and select Settings
- Select Apps
- Click on Installed Apps and uninstall any bloatware
You’ll also want to have a quality performance optimization program to do a deep clean up all that redundant junk from your device so that it can perform the way it’s supposed to and serve your needs. Here are my top picks for the best performance optimization programs in the industry. Before you clean out your computer with these programs, it’s always a good idea to back up your devices.
MORE: 5 WAYS TO DEAL WITH SPAM FOLLOWING THE HOLIDAY SEASON
8) Register your PC, software and hardware
Image of laptop PC (Kurt “CyberGuy” Knutsson)
You should register your device with its manufacturer. It’s an additional record that you’ve bought their product in case you ever need help with it. It also gives the manufacturer a way to contact you in case there’s a recall.
You can register your device online, but that could put you on a mailing list and subject you to spam. One way to combat that is using an alias email. An alias email address is an additional email address that can be used to receive emails in the same mailbox as the primary email address. It acts as a forwarding address, directing emails to the primary email address.
In addition to creating throwaway email accounts for online sign-ups and other circumstances where you would not want to disclose your primary email address, alias email addresses are helpful for handling and organizing incoming communications.
Sometimes, it’s best to create various email aliases so that you don’t have to worry about getting tons of spam mail and having your email eventually stolen in a data breach. An alias email address is a great way for you to stop receiving constant spam mail by simply deleting the email alias address. See my review of best secure and private email services here.
MORE: CONTROL SPAM – HOW TO CREATE A QUICK ALIAS EMAIL ADDRESS
9) Set up a password manager
One of the most critical steps in securing your new PC is to use a password manager. Password managers help you generate strong, unique passwords for each of your accounts, store them securely, and automatically fill them in when you need to log in. This helps protect your accounts from hacking attempts and simplifies your online life. After installing your chosen password manager, make sure to set it up and start using it to store and manage your passwords.
By using a password manager, you’ll enhance the security of your online accounts and ensure that you’re not using weak or duplicate passwords, which can be a significant vulnerability. With this additional step, your new PC laptop will be even more secure.
10) What to do with your old PC
The first thing you should do with your old PC is wipe it clean. You don’t want to risk compromising your own data. If you don’t, you could be leaving your information exposed.
Windows 10:
- Click Start and select Settings
- Select Update & Security and then click Recovery
- Click on Get Started and select Remove Everything
- Click on Local reinstall and click on Change Settings, then choose Wipe the drive
- Select Confirm and then Next and then click Reset
Windows 11:
- Click Start and select Settings
- Select Update & Security and then click Recovery
- Click on Reset PC and select Remove everything
- Click on Local reinstall or Cloud download
- Select Change Settings in Additional settings
- Select Clean data
- Select Confirm and then Next and then click Reset
Instead of adding your old PC to your pile of unused tech, consider selling or recycling them. Some services will pay you even if your devices are not working. Here are two services that you can use.
1) Amazon’s Trade-In Program
Amazon’s Trade-In Program is a quick and easy way for you to earn something from your old and unused electronics. Most older electronics decrease in value as time goes on, so it’s not likely that you’ll be able to earn a ton of money by selling them. Sure, you could always give your old item to a friend or family member if it’s still in good shape. However, if they are going to want to use something newer as well, then this is the perfect way for you to recycle your items and earn money back at the same time. Follow these steps on how this program works.
2) Decluttr
Decluttr is one of the easiest and fastest ways to sell used tech, including cell phones, unwanted MacBooks, tablets, and game consoles, but also CDs, DVDs, games and books, too. Decluttr pays 30% more on average compared to Apple or Samsung buyback programs for smartphones. You can see what they would pay for your old tech online before committing to selling it here on Decluttr.
Click here for ways to sell, donate or recycle your phone and all of your old devices.
Kurt’s key takeaways
Setting up a PC can seem like a daunting task. But this handy checklist shows how easy it can be. Just follow these 10 steps and you’ll be on your way to surfing the web, streaming videos and more!
What do you do first when you buy a PC? What are your biggest issues or challenges? Let us know by writing us at Cyberguy.com/Contact.
For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.
Ask Kurt a question or let us know what stories you’d like us to cover.
Answers to the most asked CyberGuy questions:
Ideas for using those Holiday Gift cards
Copyright 2024 CyberGuy.com. All rights reserved.
Technology
Nothing’s noise-canceling CMF Buds 2A are down to just $19.99 just for today
It’s not every day you find a decent pair of wireless earbuds with active noise cancellation, a transparency mode, and app support for less than $20, which is why the current lighting deal on the CMF Buds 2A stands out. Now through 11:15PM ET today, April 7th, Nothing’s budget earbuds are available on Amazon in all three colors for just $19.99 ($29 off), which matches their lowest price to date.
For the price, the Buds 2A cover the basics and then some. They deliver decent (albeit a little tinny) sound and 42 decibels of noise cancellation, along with an IP54 rating and a useful transparency mode for staying aware of your surroundings. They also provide a commendable eight hours of battery life per charge with ANC disabled — or up to 35.5 with the included charging case — and feature four onboard mics that leverage Nothing’s noise reduction tech, which helps boost voice call quality. I wouldn’t say voice clarity is their strong suit, though, again, they’re a $20 pair of earbuds.
Like the rest of Nothing’s entry-level earbuds, the 2A also work with the Nothing X app, adding a level of flexibility that’s hard to find at this price. With the app, you can tweak EQ settings, adjust the bass response, switch between ANC modes, or quickly enable multi-device pairing. There’s even a “find my earbuds” feature if you lose them, and you can assign a gesture to trigger your phone’s virtual assistant on the fly, whether that’s Siri or Google Assistant. On top of that, if you’re using a Nothing or CMF phone, you can use your voice to access ChatGPT directly through the earbuds.
Technology
Healthcare data breach hits system storing patient records
NEWYou can now listen to Fox News articles!
Healthcare data breaches keep coming. Now, CareCloud is the latest to confirm a serious security incident.
The company says hackers accessed one of its systems that stores electronic health records, not confirmed patient records themselves. The intrusion lasted more than eight hours on March 16. That window matters because even a short breach can expose sensitive data at scale.
At this point, there is still uncertainty. CareCloud has not confirmed whether any data was taken or what specific information may be involved. However, the investigation is ongoing, and the company has brought in outside cybersecurity experts.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily. Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.
HEALTH TECH BREACH EXPOSES 3.4M PATIENT RECORDS
A CareCloud security breach exposed a key healthcare system used by providers nationwide, raising new concerns about whether patient data may have been taken. (Nansan Houn/Getty Images)
What exactly happened inside CareCloud’s systems
CareCloud operates multiple environments where patient records are stored. According to its filing with the U.S. Securities and Exchange Commission, attackers gained access to one of those environments.
Here is what we know so far:
- Unauthorized access began on March 16
- Hackers stayed inside for more than eight hours
- The company restored full system functionality and data access the same day
- The company believes the attackers are no longer inside
CareCloud also says the incident was contained to that single environment and did not impact its other systems or platforms. Even so, the biggest unanswered question remains whether any data left the system. That detail matters because stolen health data often fuels identity theft, insurance fraud and targeted scams.
Why healthcare data is such a valuable target
Healthcare companies sit on a goldmine of personal information. That includes names, Social Security numbers and medical histories. Unlike a credit card, you cannot simply cancel your medical history. We saw the scale of this risk during the Change Healthcare ransomware attack. That breach disrupted systems across the U.S. and delayed care for weeks. It also exposed just how interconnected the healthcare infrastructure has become. CareCloud serves more than 45,000 providers and supports millions of patients. That kind of reach makes any incident more serious.
Where patient data may be stored
CareCloud has not shared full technical details yet. Public records suggest much of its infrastructure relies on Amazon Web Services. Cloud platforms are widely used across healthcare. They offer scale and flexibility. At the same time, they require strict security controls to prevent unauthorized access. It is still unclear how CareCloud separates or backs up data across its systems. That detail could affect how far attackers were able to move once inside. We reached out to CareCloud for a comment, but did not hear back before our deadline.
BANKING TECH DATA BREACH EXPOSES 672K IN RANSOMWARE ATTACK
The latest healthcare cyber incident puts CareCloud in the spotlight as investigators work to determine whether sensitive patient information left the system. (shapecharge/Getty Images)
What this means to you
Even if you have never heard of CareCloud, your doctor might use it. That is how these breaches work. A behind-the-scenes company gets compromised, and patients feel the impact later. Right now, there is no confirmation that patient data was stolen. Still, this is the moment to stay alert. If your information was involved, notifications could come weeks or even months later.
Ways to stay safe from healthcare data breaches
Healthcare breaches can feel out of your control. Still, a few simple habits can make a real difference.
1) Watch your medical statements closely
Check every explanation of benefits and billing statement you receive. Look for charges, prescriptions or visits you do not recognize. Even a small, unfamiliar charge can signal fraud. If something looks off, contact your insurer or provider right away.
2) Set up identity theft monitoring
Health data can be used to open accounts, file fake claims or commit identity theft. Identity Theft companies can monitor personal information like your Social Security number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. The faster you catch it, the easier it is to limit the damage. See my tips and best picks on Best Identity Theft Protection at Cyberguy.com
3) Consider data removal services
Your personal details often end up on data broker sites without your knowledge. That information can be used to target you after a breach. Removing your data from these sites with a data removal service reduces how much scammers can find and use against you. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com
4) Use strong antivirus protection
If you receive emails about medical updates or billing issues, be extra careful. Malicious links and attachments are common after breaches. Strong antivirus software can help detect threats before you click and stop harmful downloads in real time. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com
SSA IMPERSONATION SCAMS ARE GETTING MORE PERSONAL
CareCloud says hackers accessed one of its electronic health record environments for more than eight hours during a March 16 cyber incident now under investigation. (AndreyPopov/Getty Images)
5) Use strong, unique passwords
Secure your patient portals with a password you do not use anywhere else. Reusing passwords makes it easier for attackers to access multiple accounts. A password manager can generate and store strong passwords for you so you do not have to remember them. Check out the best expert-reviewed password managers of 2026 at Cyberguy.com
6) Enable two-factor authentication
Turn on two-factor authentication (2FA) if your provider offers it. This adds a second step, such as a code sent to your phone. Even if someone gets your password, this extra layer can stop them from getting into your account.
7) Be cautious with follow-up scams
After a breach, scammers often pose as healthcare providers or support teams. They may send emails, texts or even call you. Do not click links or share personal details unless you verify the source. When in doubt, go directly to your provider’s official website or call their listed number.
Kurt’s key takeaways
The CareCloud data breach is still unfolding. That uncertainty is part of the problem. Healthcare systems are complex. They rely on multiple vendors, cloud services and interconnected tools. That creates more entry points for attackers. Even when companies respond quickly, the ripple effects can last much longer.
If your most sensitive health data can pass through multiple companies you have never heard of, who should be responsible for keeping it safe? Let us know by writing to us at Cyberguy.com
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily. Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
Gemini is making it faster for distressed users to reach mental health resources
Google says it has updated Gemini to better direct users to get mental health resources during moments of crisis. The change comes as the tech giant faces a wrongful death lawsuit alleging its chatbot “coached” a man to die by suicide, the latest in a string of lawsuits alleging tangible harm from AI products.
When a conversation indicates a user is in a potential crisis related to suicide or self-harm, Gemini already launches a “Help is available” module that directs users to mental health crisis resources, like a suicide hotline or crisis text line. Google says the update — really more of a redesign — will streamline this into a “one-touch” interface that will make it easier for users to get help quickly.
The help module also contains more empathetic responses designed “to encourage people to seek help,” Google says. Once activated, “the option to reach out for professional help will remain clearly available” for the remainder of the conversation.
Google says it engaged with clinical experts for the redesign and is committed to supporting users in crisis. It also announced $30 million in funding globally over the next three years “to help global hotlines.”
Like other leading chatbot providers, Google stressed that Gemini “is not a substitute for professional clinical care, therapy, or crisis support,” but acknowledged many people are using it for health information, including during moments of crisis.
The update comes amid broader scrutiny over how adequate the industry’s safeguards actually are. Reports and investigations, including our probe into the provision of crisis resources, frequently flag cases where chatbots fail vulnerable users, by helping them hide eating disorders or plan shootings. Google often fares better than many rivals in these tests, but is not perfect. Other AI companies, including OpenAI and Anthropic, have also taken steps to improve their detection and support of vulnerable users.
-
Atlanta, GA3 days ago1 teenage girl killed, another injured in shooting at Piedmont Park, police say
-
South-Carolina1 week agoSouth Carolina vs TCU predictions for Elite Eight game in March Madness
-
Movie Reviews6 days agoVaazha 2 first half review: Hashir anchors a lively, chaos-filled teen tale
-
Vermont1 week ago
Skier dies after fall at Sugarbush Resort
-
Politics1 week agoTrump’s Ballroom Design Has Barely Been Scrutinized
-
Politics1 week agoJD Vance says he was ‘obsessed’ with UFOs, believes aliens are actually ‘demons’
-
Atlanta, GA1 week agoFetishist ‘No Kings’ protester in mask drags ‘Trump’ and ‘JD Vance’ behind her wheelchair
-
Entertainment6 days agoInside Ye’s first comeback show at SoFi Stadium