Contact us today!

FRS Pros Blog

Five Biggest Tech Myths BUSTED

Five Biggest Tech Myths BUSTED

Businesses rely on thought out, researched decisions in order to succeed. But what happens when the internet possesses false information, and misleads you from the truth? Today, we decided to bust some common tech myths.

Myth #1 - RAM determines how fast your computer runs.

Most mislead tech gurus believe that a computer with more RAM, or random-access memory, means a faster performing PC in general. RAM is essentially a temporary storage space where active programs are called from. This super-fast storage space does nothing more than allow you to run more programs at the same time. While it is necessary, and more RAM does improve your computer, it isn’t the fix-all component. It doesn’t give it hyper-loading abilities, but you could see small improvements depending on the workload you give the computer and the intensity of the software. 

Myth #2 - “Safely remove USB” prevents data loss.

USB drives might seem the same as they were 10 years ago, plug it in, download information, click “safely remove USB”, and pull the drive out. Simple, but do you know what clicking “safely remove USB” does for your computer, and your USB drive? When this option is selected, your computer ensures it is not sending or receiving data from the disk. If you aren’t saving anything, or pulling data off of your drive, there is no harm in removing your USB drive.

Myth #3 - It is unsafe to use your smartphone while charging.

This myth is brought up frequently enough that we thought we should address it. Some scenarios, like the Samsung Galaxy Note 7 snafu where devices caught fire, have led people to believe that using a device while it’s charging could lead to burns, fires, or even explosions. Sure, your smartphone will take on extra heat if you’re using it while it is plugged in, but they are designed to be used while charging.

Myth #4 - You should not use a different phone manufacturer’s charger.

Let’s take a look at an actual phone manufacturing company’s Q&A regarding charging their cell phones.  “Ensure a manufacturer-approved wall plug and USB charging cable are used to avoid extended charging times or other charging issues." A common corporate-infused idea is that using a lesser-known charger brand will corrupt your device or destroy the battery. The truth is, your phone does not recognize who made your charger, and it does not care. All your phone looks for when plugged in is a charge to store. We’re not saying go out and buy the cheapest, lowest quality charger money can buy, but if you need to charge your phone with an Amazon Kindle charger, your phone will be fine. 

Myth #5 - Using a private (or incognito) browser hides my identity.

Sometimes, private browsing is used for absolutely no reason. It doesn’t make you a ghost, you’re not unhackable, and you’re not untraceable. The only thing a private browser does is ignore locally saved data, and clear any additional localized data added whilst the browser is open. Any external source still is able to track your activity. If you’d like a secure and private experience, you will need a Virtual Private Network. 

Do you have any additional myths you’d like us to bust? Leave your thoughts in the comments section below and return to our blog for more technology information.

Are You On the Lookout for Payment Card Skimmers?
Tip of the Week: Email Signature Strategy

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Technology Best Practices Network Security Productivity Business Computing Privacy Internet Hackers Software User Tips Google Microsoft Cloud Business Management Hardware Computer Innovation Tech Term Data Data Backup Efficiency Smartphones Malware Mobile Devices Data Recovery Email Cybersecurity Hosted Solutions Windows 10 Office 365 IT Services Browser Outsourced IT Smartphone Communication IT Support Android Backup Business Upgrade Internet of Things Gadgets Windows Data Security Apps VoIP Phishing Workplace Tips Small Business Business Continuity Disaster Recovery Communications Cybercrime Cloud Computing Mobile Device Management Saving Money Network Operating System Ransomware Facebook Managed IT Services Users Information Vulnerability Money Artificial Intelligence Alert OneNote Server Law Enforcement Social Media Employer-Employee Relationship Managed Service Spam Two-factor Authentication Microsoft Office Virtualization Managed IT Services Collaboration Passwords Miscellaneous IT Support Best Practice Health Automation Applications Wireless Blockchain Chrome Gmail Windows 10 Bring Your Own Device Save Money Computers Holiday Data Storage Information Technology Networking Mobile Device Word Telephone Systems Patch Management Tech Support Managed Service Provider Managed IT Router Password Augmented Reality BYOD Unsupported Software Google Drive Settings App Hacking Fraud Encryption Printing Safety Mobile Security SaaS Vendor Proactive IT Evernote User Error Going Green Social Google Assistant Hybrid Cloud Touchscreen Government Budget Risk Management WiFi Cortana Wireless Technology Data Loss Data Management Robot Conferencing Wi-Fi Windows 7 Update Productivity Business Technology Audit The Internet of Things Meetings Google Docs Project Management Sports Shortcut Data Protection VPN iPhone Wireless Charging Politics Devices Hard Drive Display Telephony History BDR Cost Management IT Management Data Breach Payment Cards Quick Tips Travel Commerce Hosted Solution WannaCry Access Control Avoiding Downtime Mobility File Sharing Application Search Excel Laptop Firewall Apple Employee Webinar Transportation Antivirus Telephone Mobile Office Tablets Maintenance Security Cameras Consultant Private Cloud Sales Proactive Projects PowerPoint Admin Remote Monitoring Virtual Private Network Storage Social Engineering Files Battery OneDrive Smartwatch Sync DDoS Hyperlink Touchpad Processor Edge Disaster Instant Messaging Hacker Break/Fix IT solutions FAQ Recovery Development NFL eWaste Emergency Machine Learning Retail Websites Identity Wireless Internet Saving Time Remote Workers Identities Point of Sale Employee-Employer Relationship Voice over Internet Protocol iOS WIndows Server 2008 Server Maintenance Value Wasting Time Humor Benchmarks Ciminal Medical IT Windows 10s HBO Charger Administrator Entertainment Micrsosoft Device Security Lithium-ion battery Amazon Downtime Screen Mirroring Data Theft Streaming Media Identity Theft Data Privacy Computer Care Nanotechnology Workers Gamification Keyboard Shortcuts Unified Threat Management Personal Information Managed IT Service Legislation Language Office Investment Adobe Accessory Myths Software as a Service 5G Solid State Drive Sabotage Access Business Intelligence Windows Ink Virtual Assistant E-Commerce Emails Cast Reputation Gifts Computing Chromecast Vendor Management Root Cause Analysis Licensing Updates Memory Human Resources Upgrades Managed Services Provider Comparison Scam Testing Computer Fan Data storage ROI Computer Forensics Peripheral Threats Microsoft Excel IT budget Education Bandwidth YouTube Hard Disk Drive Remote Computing PC Outlook Internet Exlporer Digital Signage Google Maps Spyware Alexa for Business Marketing Credit Cards App store Samsung Chromebook Co-Managed Services Microsoft Word Uninterrupted Power Supply Financial Payroll Facebook Privacy Specifications Virus Camera Windows Server 2008 R2 Management Scams Employees IT Solutions Paperless Office Legal Office tips Save Time Advertising Computer Accessories Training Monitors Music Smart Technology Flexibility Television CrashOverride Compliance Printers Company Culture Scalability Analytics HaaS End of Support Keyboard Regulation Relocation Black Market Cleaning Thank You Big Data Automobile Twitter Managing Stress PDF USB Worker Congratulations How To Books Mobile Computing Hiring/Firing Video Games Experience Text Messaging Virtual Reality Work/Life Balance Current Events Electronic Medical Records Crowdsourcing Employer Employee Relationship Cache Benefits es Phone System