Computing News That You Can Use - February 2021 To Repair or Replace Your Computer? - That is the Question Quote of the Month: “Mastering others is strength, mastering yourself is true power." - Lau Tzu Computers (and networking equipment) have a useful lifespan which is much shorter than the other major things we own and use, such as houses, cars and appliances. Given that computers wear out and become outdated so fast, the question becomes: Do we upgrade them, making incremental … [Read more...] about Grundig IT Newsletter: To Repair or Replace Your Computer?
Grundig IT Newsletter Computing News That You Can Use - January 2021 How to Ask For Technical Support: Getting The Most Efficient Resolution Quote of the Month: “Success is not final; failure is not fatal: it is the courage to continue that counts." - Winston Churchill Unsurprisingly, in our line of work, we have a lot of requests for technical support. It’s our job to help and fix things, and we want you back on your feet and working as efficiently as possible. There’s a method … [Read more...] about Grundig IT Newsletter: How to Ask For Technical Support
Grundig IT Newsletter Computing News That You Can Use - December 2020 Quote of the Month: “By failing to prepare, you are preparing to fail.” - Benjamin Franklin With the dangers of COVID-19 still lingering about the world, multitudes of users are spending more and more time online. Similarly, more and more illicit businessmen - you know, criminals? - are pushing their work online even harder. More than ever, a wealth of data exists on your network that cybercriminals want to get their … [Read more...] about Defending Against Common Phishing Attacks
Grundig IT Newsletter Computing News That You Can Use - November 2020 OK. Usually, we are talking about computers, IT and other ways to enhance and grow your business with technology. This time, a slight detour. Phones. Equally important, but not focused on so much. I have an iPhone and have used one since I switched from Blackberry (remember Blackberry?) a long time ago. Benjamin has a Samsung (Android) device. Both are great and perform similar functions. Which one is better is really a … [Read more...] about Phones – Not Quite Computers, But Equally Important
Grundig IT Newsletter Computing News That You Can Use - October 2020 For the last 4 weeks, I had been searching for a new technician to add to the Grundig IT team. Now, I am proud to announce that we have found our guy! Benjamin Gratch survived the interview and testing process, distinguishing himself along the way and emerging as the top candidate among 3 final contenders. He started last week, has transitioned nicely into his current position and is busy learning about Grundig IT’s clients … [Read more...] about Introducing Benjamin Gratch, Grundig IT’s New Technology Expert
One of the most dramatic and difficult things that can happen to a computer system is storage failure. There are three general causes for damaged data and all of them can be caused by multiple things. Data can be corrupted when changes to files are interrupted, which can affect just one file or the whole drive, and if the drive itself is somehow damaged, the data will become hard, or even impossible to access. If only a few folders or files are inaccessible on the storage device, it's … [Read more...] about Data Recovery Scenarios When a Hard Drive Goes Bad – And How Grundig IT Can Help
Last month, we looked at some of the latest potential security threats to computing environments. This month, a look into some of the main differences between G Suite and Microsoft 365... When considering services for your business functions, it's very likely that Microsoft 365 (formerly Office 365) and Google G Suite are examined. At face value, these services are strikingly similar. They both offer three tiers of services at relatively similar prices, and when comparing one tier of one … [Read more...] about What are the Real Differences Between G Suite and Office 365?
Most of the people who are attacking networks, accounts, and other computer systems are more likely to be relying purely on chance to be successful. What this means is that these attackers are picking systems that they know to be used by a large number of people, and targeting the largest possible number of users on that system. The goal of this method is to be successful at least a small number of times based on statistical figures for success. As one might expect, it follows that these … [Read more...] about What is a Bigger Target During COVID?
During these times of most workers only being able to work from home, solutions for allowing remote workers to maintain similar levels of productivity are becoming increasingly necessary. Fortunately, there are a considerable number of systems that can be implemented to make working remotely feasible. The type of system we will be discussing this month is full remote access to a computer. Remote Desktop Services Remote Desktop Services, or RDS, is a system that can be deployed and set up on … [Read more...] about Remote Desktop Services and Other Remote Access
If an email phishing attempt is successful there are two general things that can happen. Generally, the most common is sensitive information is gathered about accounts that you hold, and less common is something gets installed on your computer that can perform various actions without your knowledge. Read on to learn more about how to protect yourself... Information Can be Recorded The information that is recorded from you depends on the attacker. If your login credentials are recorded, the … [Read more...] about How Email Phishing Can Harm You and How to Recognize Scams