Password Resets

Passwords are important, keeping your recovery information and contact information current and updated is important.  Download the and print the free password keeper in the link below to help you keep track of your passwords and information tied to your accounts.

NEW ACCOUNTS & DEVICES – Pay attention when setting up accounts and devices, record the settings because one day you will need that information. Otherwise you risk being locked out of your devices permanently


  • You can be permanently  locked out of devices if they are not set up and maintained properly which means recording the information to recover the account and being able answer your account recovery questions when required.
  • You must have current information on your accounts if you initially tied it to a phone number or email address that you no longer have access to there is no way you can receive the text that code they send you to recover the account.
  • Any device that requires valid account access cannot be unlocked if you don’t the answers.

Below are some links to password

SELF HELP: Common Password Reset Pages



MTS/Bell  Email

Westman Email Reset

Hotmail / Outlook / Microsoft Account





How does the system get infected?

Common Ways of Getting Infected

There are countless ways computers can get infected by viruses and malware and yes unsafe user behaviour. Most often they fall under the categories below

  • Searching for help and support whether it be for a driver or a computer problem you are having. These searches often lead to scammers that post fake support websites and they pay to have their pages returned in the top of the search results. Once you engage them they quickly get acess to your machine and scare you that alot is wrong when really it isnt.  They then charge hundreds of dollars to suposedly repair the system they can also plant key-logger software or malware that sends the information you enter into websites directly back to them.
  • Opening attachments or links from unknown or spoofed emails. Watch out for unusual emails urging you to open a link or take action immediately
  • Downloading software, music, and movies from malicious sites. Always go to official websites and avoid pirated and cracked content
  • Online Ads. Criminals often place clean ads on trustworthy websites and after they establish credibility and trust, replace the ads with malicious links
  • Social media. Be careful when clicking on links even if your trusted friends sent them. Their accounts might be hacked
  • Outdated software. Older versions of Microsoft Windows, Office, Adobe Acrobat and Java make the job of cybercriminals much easier!