We have had multiple users contact us in the past few days, stating that they are unable to use their keyboard and mouse no matter what they try. (It happened to me, too!)
It is a recent, but known error with USB devices that is linked to Windows 10 update KB4074588.
We have blocked this update in our computer management portal for devices that have Zypes' Managed Services installed, but many computers had already received the patch automatically from Microsoft.
Currently the simple solution is to uninstall the update and reboot the computer. That has luckily solved the issue for all of the devices that have reported this problem so far.
If you are comfortable with navigating this within your own machine, you can do it yourself by going to Control Panel > Programs and Features > View installed updates > right click on “Security Update for Microsoft Windows (KB4074588)” and select “Uninstall”.
To process the uninstall the computer will require a reboot and usually the USB devices work as soon as that completes.
If you would like Zypes to walk you or your staff through this process then please call us at 425-212-2244 or email at email@example.com.
We're always here to help.
Rachel for the Zypes team
There has been a lot of discussion as of late between the differences of Office 365 and Office 2016. We would like to answer a few questions for you.
At the five year mark, Microsoft ends mainstream support for its products and Windows 7 has entered the extended support phase as of January 14, 2015.
Over the past year, Zypes has updated our client’s computers numerous times to fix critical security vulnerabilities in Flash and Java.
eBay is asking users to change their passwords as hackers obtained unauthorized access to a database that allowed them to view customers' security credentials.
The US and UK governments advised on Monday computer users to use a different browser until Microsoft Corp fixes a security weakness, which hackers have used.
The bottom line is that a very serious vulnerability was discovered and made public in the authentication system that SOME websites and services use.
Recently, a sophisticated phisher has come up with a way of taking Google login information by using the company’s own servers against it.