As Mark Twain once said, A lie can travel halfway around the world while the truth is still putting on its shoes." Myths, Disinformation, and Fake News have a habit of lingering in people’s minds long after they have been debunked. It’s like a newspaper retraction, where the outrageous but incorrect ‘facts’ appear on the front page – above the fold, but when it’s found to be untrue, the tiny retraction is buried on page 14 somewhere near the bottom. So, what do most people believe? The fake news.

In this digital age, technology plays a significant and constantly expanding role in both our lives and our work. Along with the rapid advancements and innovations, several myths continue to persist.

Do Macs get viruses? Is it okay to leave your smartphone charging overnight? There are quite a few, but let’s concentrate on the most common myths.

Misunderstandings abound because those tech myths are still making the rounds. They can even hinder your ability to fully use various tools and devices. All hands on deck for a little debunking! We will explore the truth behind them.

Fake News:

1: Charging your devices overnight damages the battery

This fake news is largely outdated, but it is one of the most persistent tech myths. Modern smartphones, laptops, and other devices have advanced battery management systems that prevent overcharging.

Your device automatically stops charging when reaches its maximum charge capacity. This is true even if it remains connected to the power source. In fact, it is often recommended to keep your device plugged in overnight to ensure a full charge by morning.

Stop worrying about this and feel free to charge your gadgets overnight without worrying about battery damage. Plug it in, go to bed, and forget about it.

2: Incognito mode provides complete anonymity

Incognito is not some kind of Harry Potter invisibility cloak. The feeling that you are completely secure while surfing the internet using this mode is not entirely accurate. Incognito mode does provide some privacy benefits, but they’re limited.

It mainly prevents your device from saving the following items:

Browsing history

Cookies

Temporary files

It does NOT hide your activities from your internet service provider (ISP) or from the websites you visit. ISPs and websites can still track your IP address. They can also still watch your online behavior and collect data, which they typically do.

Use a virtual private network (VPN) or other specialized tools - they provide enhanced privacy protection if you really want complete anonymity online.

Goofing off is another reason people use incognito mode at work, to browse websites like Amazon or Facebook. It is true that no evidence of the sites you’ve visited can be found in your cookies, temporary files, or browsing history, BUT if someone on your IT services team monitors your computer to see what you’re doing in REAL TIME, they can see your incognito pages if they are open.

3: Macs don’t get viruses.

It is absolutely untrue that Mac computers are impervious to viruses and malware – and it never was. It was only ‘deemed’ true because of market share.  Microsoft has always been the big gorilla in the room, and their offerings, specifically Windows OS are for PCs. As of January 2023, Windows had about 74% of the desktop OS share. Mac’s OS had just 15%.

Cybercriminals are like sharks – they go where the feeding is most plentiful.

That’s why Macs have historically been less prone to such threats compared to Windows PCs, but this does not make them immune.

The reason why people tout this myth is because of a misreading of malware statistics. For example, in 2022, 54% of all malware infections happened in Windows systems. Just 6.2% of them happened in macOS.

These numbers indicate that the systems aren’t that different when it comes to virus and malware risk. The infection rate per user on Macs is 0.075. This is slightly higher than on Windows, at 0.074, so both systems have a fairly even risk of infection. This is the case even though Macs have a significantly lower infection count – it’s a per capita calculation.

However, the interest of hackers in targeting Macs is growing as their popularity grows. Malicious software specifically designed for Macs does exist. Users should take proper precautions, no matter the operating system in use.

Protect yourself by keeping the operating system and applications up to date and install reliable antivirus software. Exercise caution when downloading files or clicking on suspicious links. Being aware of potential security risks and practicing safe browsing habits is crucial. This is true for Mac users, just as it is for any other platform.

Better yet, consult with your IT services provider, whether an in-house IT Support Department or an outsourced Managed IT Services firm, like ITFIRM.COM, and let them do the heavy lifting. That’s what an IT service provider gets paid for.

4: More MPs (MegaPixels) provide better image quality.

Nope, it’s only one factor. Savvy marketing creates a lot of this fake news by touting their best features as ‘the only thing to look for’ in a product like theirs. For example, when it comes to smartphone cameras, people have been led to believe that more megapixels equal better image quality. This is a common misconception.

The number of megapixels is an essential factor in determining the resolution of an image, but it is certainly not the sole indicator of image quality. Other factors play significant roles, such as:

The size of individual pixels

Lens quality

Image processing algorithms

Low-light performance

A camera with a higher megapixel count may produce larger images, but it does not guarantee superior clarity, accuracy of colors, or dynamic range.

For best results, manufacturers often strike a balance between pixel count and other image processing technologies. When choosing a smartphone or any camera, consider the complete camera system.  Don't just focus on the megapixel count.

Know the difference between Fact and Fiction

We all rely on technology, so educate yourself on what’s rue and what’s FAKE NEWS.

Frequently Asked Questions

Can someone see my Internet history if I use their Wi-Fi?

Yes. The Wi-Fi owner can see the browsing information performed on their Wi-Fi network because they have access to the admin panel from the Wi-Fi router, which also means they can see your log information on your router.

Chrome itself can also track you.

Can you be tracked in incognito mode?

Yes. When you go to a website, it will see you as a new user unless you log in. As Google Chrome Help states, incognito mode “(will not) prevent you from telling a website who you are. If you sign in to any website in Incognito mode, that site will know that you’re the one browsing and can keep track of your activities from that moment on.”

What MP is a good phone camera?

Generally, 12 to 16 MP (MegaPixel) is enough for standard use. A high MP count is useful when cropping photos, but other factors, like sensor size, which decides how much light to capture for a set shutter speed, can affect the picture quality as much or more than the MP count.

Is Mac or PC better for cyber security?

That’s ‘six of one, a half-dozen of the other. There isn't a definitive answer because it all depends on the specific user's needs. Whereas both operating systems have reliable strengths, their respective weaknesses could influence user preferences. The mere fact that are almost 4 times more PCs than Macs simply means that cybercriminals are more likely to target PCs.

How secure is your network?

As a longstanding, reputable member of the Charlotte IT Support community, ITFIRM.COM offers a FREE, no-risk network and Cybersecurity assessment. We perform a non-intrusive scan that allows us to deliver a comprehensive report of the state of your system and its vulnerabilities that is yours to keep. There are no strings attached, and you are under no obligation to ever use our Managed IT Services.

The two best defenses are next-generation Cybersecurity to protect your data from theft, and a top-notch Managed Services Provider to ensure continued reliability and defenses against newly emerging threats.

We put our 100% Money Back Guarantee in writing, so there is no risk in trying us out. Because we do not require a ‘hard’ contract, our clients can fire us at any time with 30 days’ notice. We have to be good.

Among the Managed IT services we provide:

IT HelpDesk Service
Onsite IT Support
Cybersecurity
Cloud migration and management
Email migration services
Backup and disaster recovery
VoIP phone systems
IT disposition and recycling
Office moves
White label services (IT to IT)

Planning an Office Move?

Contact ITFIRM.COM today! We have the experience to ensure a seamless transition. After the office move, your employees will arrive at the new location to find their IT infrastructure ready and open for business!
For more information on office moves, or to receive your FREE no-risk network and Cybersecurity assessment, just fill out the form on this page or call us at:
704-565-9705