Securing a Computer Network
JUL 12, 2017

Effective Strategies for Securing a Computer Network

During the growth of any business, somewhere between two computers and ten, companies realize the need for a computer network. Computer networking allows multiple computers and devices to communicate and share information and resources, such as all sharing the same main printer.

The ability to communicate directly between the computers on your network and share files can greatly increase productivity. There is also a cost savings associated with the ability to share devices like printers and scanners between several computers.

With any connection between computers and other devices, whether wired or wireless, there comes potential security risk. But if you know how to safeguard your network, you can enjoy the convenience and savings without putting your systems in danger.

Continue reading →
IT Support For Business
JUN 21, 2017

Why a Free PBX Solution is Right for Your Business

As a business grows and adds employees, customers, and vendors, one of the first things upgraded is the phone/communication system. As you add staff, usually each one needs a phone at their desk and a way to easily communicate with each other internally.

Many companies end up getting a PBX phone system, which stands for Private Branch Exchange. The easiest way to think of it is a multi-line system that allows inter-office communication by means of extensions. Each of the internal extensions all share a specific number of outgoing phone lines to communicate with customers or others outside your building.

Continue reading →
Cost Effective Support
JUN 06, 2017

Finding Cost Effective IT Support For Your Business

No matter what size your company, having reliable IT support for business systems is crucial. With technology now powering everything from accounting to sales contact management to your corporate website and emails, no company can be without an IT support team, whether in house or outsourced.

When computers or networks go down, it costs businesses money in a number of ways. There is the cost of lost employee productivity, lost business if customers are trying to find you on the web, but can’t, and other costs that can include overtime to accomplish work that was delayed.

The costs can add up as each minute passes and are often higher than a company may realize.

Continue reading →
Data Backup
MAY 15, 2017

How Effective Data Backup Can Prevent Falling Victim to Ransomware

In the world of viruses, malware, and other malicious computer scripts, Ransomware is becoming one of the most dangerous of the bunch for businesses. Like other types of malware, it can infiltrate a computer or a server with multiple connected computers by one click on a fake email attachment or a bad web page.

If your business doesn’t have regular and reliable data backup, you could be paying $10,000 to $40,000 to get your data back once you’ve been a victim.

Continue reading →
MAR 04, 2016

What happens to a deleted file?

This is quite possibly the simplest and shortest video we've found yet that explains what happens to data when it's deleted.

AUG 14, 2015

Quick quide on how to setup Windows 10 for Power Users and Gaming

Windows 10 is pretty great and getting it for free (if you have a legitimate version of Win 7 or 8) is pretty awesome too. However, switching to Windows 10 comes at the price of privacy. The steps outlined in this video will help minimize the information that Microsoft will collect from you.

JUL 17, 2015

Wi-Fi vs. Ethernet: How Much Better is a Wired Connection?

WiFi vs Ethernet; the pros and cons explained in a simple way by

JUN 19, 2015

Creepy Things They Know About You

Excellent, short and simple video outlining why internet security is so important.

NOV 21, 2014

How to setup Outlook 2010 to work with Gmail

Here is a great video on how to connect your Gmail account to Microsoft Outlook 2010.

NOV 21, 2014

Understanding SEO (Search Engine Optimisation)

Hopefully this helps clarify what Search Engine Optimization (SEO) is and why it's important for your business. If you'd like to learn more, here is a great page for even more SEO videos.

NOV 14, 2014

How does Google Search work?

An excellent review of the hands down best Wireless Access Point (WAP) device we've come across yet.

NOV 14, 2014

Ubiquiti UniFi AC Wireless Access Point

If you're looking to upgrade your WiFi, consider using Uniquiti Unify WAP devices for seamless connectivity and truly reliable WiFi. However, remember that your typical off the shelf WAP also contain a built in firewall. So if you're go to make the switch to Ubiquity Unify WAPs you'll need a standalone firewall.

NOV 7, 2014

How much Random Access Memory (RAM) do you need in your computer?

Linus Tech Tips attempts to answer that by running some benchmark tests in this video. Here is the PDF version of their research.

JUN 20, 2014

Don't use promotional USB drives.

Simply put, you shouldn't use any device that is capable of carrying a virus and that has not been vetted unless you absolutely need to. Eli expresses one of the many security risks involved in using storage devices from unknown sources in this video.

If you "had to" use one of these devices, your best bet is to plug it into a machine, say a windows computer, that does not handle sensitive data and that does not have access to the sensitive data on your network. Then run an antivirus and anti-malware scan on the device, before plugging it into any other machine. See our post on which antivirus and anti-malware software is best.

If you use a secure firewall, such as those offered by Cisco or Watchguard, you can plug the flash drive into a computer that is connected to your network, but that does not have access/permissions to share or view anything on the network. Typically, this would be a "guest" computer, or one that has internet access only and no ability to share files. Also, it's a good idea for this computer's user not to have Admin. privileges.

Is all of this worth the hassle? We say no, but at the same time, it is not uncommon to receive a neat little flash drive that you'd like to keep for aesthetic purposes.