Boost PC Security & Speed: 5 Dangerous Windows Settings to Disable

Many small business computers are running slower and less securely than they should be and the culprit is often default Windows settings. These overlooked configurations can expose your business to cyber threats and drain system performance. Here is our list of 5 Windows settings to disable and we’d suggest sooner rather than later.

At SofTouch Systems, we help Texas businesses take back control. In this guide, we reveal five Windows settings to disable right now for stronger protection and faster PCs, no expensive upgrades required.


Why You Should Care

Whether you’re managing employee workstations or your own office PC, default Windows settings are often optimized for convenience, not security. This can:

  • Increase exposure to ransomware
  • Allow tracking of your behavior
  • Drain memory and CPU performance

The fix is simple, but you need to know where to look. Here are 5 Windows settings you need to disable.


1. Turn Off the Advertising ID

What it does: Tracks your activity to personalize ads across apps and services.

Why disable it: It’s a privacy concern and opens up tracking data to third-party apps.

How to fix it:
Go to Settings > Privacy & Security > General, and turn off:
“Let apps show me personalized ads by using my advertising ID.”


2. Disable Cortana (Windows 10)

What it does: Cortana listens for voice commands and stores voice activity in the cloud.

Why disable it: It eats up memory and creates a potential privacy loophole.

How to fix it:
Run this PowerShell command as admin:

powershellCopyEditGet-AppxPackage -allusers Microsoft.549981C3F5F10 | Remove-AppxPackage

3. Stop Unnecessary Background Apps

What they do: Apps like Xbox Game Bar, Skype, or Maps run in the background.

Why disable them: They waste resources and may open network ports to the internet.

How to fix it:
Go to Settings > Apps > Installed Apps, click each app and disable background activity.


4. Disable Remote Desktop (RDP) if Unused

What it does: Allows others to remotely control your PC, often a major ransomware vector.

Why disable it: If not used, it’s a huge unnecessary risk.

How to fix it:
Go to Control Panel > System > Remote Settings, and check:
“Don’t allow remote connections to this computer.”


5. Turn Off Network Discovery & File Sharing

What it does: Allows PCs on the same network to discover and access shared files or printers.

Why disable it: If not managed properly, this opens you to lateral movement in a cyberattack.

How to fix it:
Go to Control Panel > Network and Sharing Center > Advanced sharing settings, and disable:

  • Network Discovery
  • File and Printer Sharing

5 Windows Settings to Disable

Pro Tip: Automate These Fixes at Scale

If your business manages multiple PCs, applying these fixes manually is time-consuming and inconsistent. At SofTouch Systems, we configure security policies through Group Policy, Intune, or RMM software for complete coverage.


Protect, Optimize, and Simplify

Disabling these risky Windows settings is a fast, free way to protect your small business and extend the life of your hardware. But it’s just the start.

STS offers:

  • Endpoint protection & patch management
  • Remote monitoring & support
  • System hardening & security audits
  • Backup and disaster recovery planning

Let’s Secure Your Systems Today

Don’t leave security up to default settings.
Schedule your free security checkup with STS now and take back control of your business IT.

Break Free from Big Tech: How Denmark Is Reclaiming Its Digital Independence

As Denmark makes headlines by choosing Linux and LibreOffice over Microsoft, more business leaders are asking how to break free from Big Tech. The Danish government isn’t just chasing cost savings, they’re taking control of their digital future.

And that’s something business owners in Central and South Texas should be thinking about too. At SofTouch Systems, we help small businesses avoid vendor lock-in and reclaim control over their tech stack.


Break free from big tech: Denmark is reclaiming its digital independence and SofTouch Systems is here to explain why you should pay attention.

What’s happening in Denmark?

Denmark’s Ministry of Digitalization recently launched a multi-year plan to move away from Microsoft tools like Office 365 and Windows. Instead, they’re rolling out open-source solutions like LibreOffice and Linux across government agencies.

The reason? Digital sovereignty.

They want to ensure their government systems stay operational and secure without depending on a single private company or foreign supplier. This includes having control over data, code, and access, even in emergencies.

In their words, it’s about freedom and flexibility—not just software.


Why Texas businesses should pay attention

While this might sound like a government issue, small businesses face similar risks. If you rely too heavily on one vendor, whether it’s Microsoft, Google, or another giant, you’re vulnerable. Not just to sudden price increases but privacy concerns, and policy changes you can’t control.

Some common scenarios we’ve seen:

  • A sudden Microsoft subscription fee increase
  • A critical Outlook or Teams outage halting business for hours
  • Data stored in systems you can’t fully access or migrate

When you break free from Big Tech, you reduce these risks and gain the flexibility to choose the tools that truly work for your business.


What does it mean to break free from Big Tech?

We’re not saying you need to delete all Microsoft tools today. But there are real steps Texas businesses can take to move toward digital independence:

  • Explore open-source software alternatives like LibreOffice or Thunderbird
  • Consider Linux for servers and back-office operations
  • Use email hosting providers that let you control your data (STS offers this)
  • Keep a backup system that isn’t tied to one ecosystem

At STS, we support all of these transitions with Texas-based, human support.


How STS helps businesses break free from Big Tech

SofTouch Systems helps businesses in Central and South Texas regain control through:

  • Vendor-agnostic IT consulting: We show you options—not just what’s popular.
  • Secure email hosting: No Big Tech inbox? No problem. We offer locally managed, encrypted alternatives.
  • Linux server hosting and management: Reduce licensing costs and increase stability.
  • Cloud backups and independence audits: Know where your data lives—and who can access it.

If you’re curious about moving away from vendor dependency, we’ll help you map out the safest, most practical path.


What you can do today!

Ask yourself:

  • Could my business operate tomorrow without Microsoft?
  • Do I know where my data is hosted—and who owns the keys?
  • Am I getting real value from the monthly software fees I’m paying?

If these questions raise concerns, don’t worry. We’re here to help you explore new options, without disruption, confusion, or downtime.

Let’s talk about your next step toward digital independence.

How to Prevent a Data Breach: Lessons from the AT&T Leak

86 Million Reasons to Act Now on Data Protection

In a disturbing development, over 73 million current and former AT&T customer records (Orig here) have been posted online, fully decrypted and searchable. Unlike past leaks, these aren’t just usernames and passwords. The exposed data includes names, Social Security numbers, dates of birth, account numbers, and email addresses. So stick around and we’ll explain how SofTouch Systems can help you prevent a data breach like AT&T.

For small business owners, this isn’t just news, it’s a siren. If a company with AT&T’s resources can suffer a breach this serious, no organization is too small to be a target.

So let’s break down what happened and, more importantly, how your business can prevent a data breach from causing irreversible damage.

SofTouch Systems can help you and your business to prevent a data breach.

What Happened to AT&T?

Back in 2021, AT&T denied that a data leak originated from its systems. But in March 2024, that same data resurfaced on a popular hacking forum. What makes it worse? This time, the data was decrypted. Anyone can now read the raw information with zero effort or technical skills.

Although AT&T still claims the data may not have been taken directly from their systems, the consequences for customers are the same: exposed identities, increased phishing risks, and the likelihood of fraudulent account takeovers.

Let’s be clear, whether or not your business is as big as AT&T, you have something valuable: data worth stealing.


Why SMBs Must Pay Attention

Many small and midsize business owners (SMBs) mistakenly assume that data breaches only happen to big corporations. But here’s the truth:

  • 43% of all cyberattacks target small businesses
  • 60% of SMBs shut down within six months of a data breach
  • Only 14% of SMBs are prepared to defend against cyberattacks

A breach doesn’t just cause technical chaos. It breaks customer trust, triggers compliance violations, and can put you out of business.

So, what can you do to prevent a data breach?


5 Proven Ways to Prevent a Data Breach

1. Use Strong Password Protocols

Weak or reused passwords are one of the easiest ways hackers gain access. Implement unique, complex passwords and enforce multi-factor authentication (MFA) for all users.

2. Encrypt Your Data—At All Times

Encryption isn’t just for financial institutions. Whether at rest or in transit, encrypting your sensitive data ensures that even if hackers get in, they can’t read what they find.

3. Limit Access to Sensitive Info

Only give access to data on a need-to-know basis. Too many employees with unrestricted access increases the chances of accidental or intentional data leaks.

4. Train Employees Regularly

The biggest cybersecurity risk is still human error. Employees should know how to spot phishing emails, social engineering scams, and unsafe websites.

5. Schedule Regular Security Audits

Cybersecurity isn’t “set it and forget it.” You need ongoing assessments to identify vulnerabilities and adapt to emerging threats.


How SofTouch Systems Helps You Prevent a Data Breach

At SofTouch Systems, we specialize in protecting small businesses in Central and South Texas from becoming the next data breach headline.

Here’s how we safeguard your data and reputation:

Threat Detection and Monitoring

Our advanced tools run 24/7 to monitor suspicious activity. If something unusual happens, we’re alerted instantly and respond before damage is done.

Routine Vulnerability Scans

We proactively test your systems, networks, and software for vulnerabilities—before attackers can exploit them.

Security Awareness Training

We educate your staff with monthly phishing simulations and real-world training modules. Your team becomes your first line of defense, not your weakest link.

Custom Breach Response Plans

Even with the best precautions, you need a backup plan. We create tailored breach response plans that include containment, legal compliance, and customer notification workflows.

Compliance Reviews

Whether you’re dealing with HIPAA, PCI-DSS, or local data regulations, we make sure your systems meet the requirements. That way you avoid fines and stay credible.

We’re not just IT vendors, we’re your security partners. Our Texas-based team knows how to balance local trust with enterprise-grade protection.


The Time to Act Is Before a Crisis

The AT&T breach serves as a reminder: once the data is gone, you can’t take it back. You can’t un-damage your reputation. You can’t un-leak customer identities.

But you can act today to prevent your business from ever landing in the headlines.


Let’s Secure Your Business Together

SofTouch Systems is currently offering a free cybersecurity readiness assessment for businesses in Central and South Texas. We’ll audit your systems, assess your vulnerabilities, and provide a step-by-step plan to harden your defenses.

Call us now or click below to schedule your free assessment.
Book Your Free Cybersecurity Review