WiFi Signal Restraints Most offices will have ethernet wiring throughout the space, eliminating most of the need for WiFi in the office. However, certain cases will require a WiFi connection such as laptops or phones that are used by mobile employees and/or visitors. Residential locations will also typically need WiFi for many devices used by the residents. But there is one major limitation of wireless networks. The current WiFi technology has difficulty with both distance and … [Read more...] about Improving Wireless Networks
General Computing
Technology Trends for 2020 – Part 2: SSD vs HDD Storage Devices
For the past 10 years or so, SSDs (Solid State Drives) have been an available alternative to the older HDD (Hard Disk Drive). SSDs offer much faster data reading and writing speeds with typically smaller capacities than HDDs. While SSDs have developed over time though, the costs for these drives have been steadily lowering. With the development of even faster storage devices such as NVMe, SSDs have been slowly moving into a much more standard position in computer hardware, pushing … [Read more...] about Technology Trends for 2020 – Part 2: SSD vs HDD Storage Devices
Technology Trends for 2020 – Part 1: 5G Cellular Networks
Most cellular providers are advertising 5G networks these days, but they’re not very clear as to what it is or what it will mean for cell phones once these “5G ready” networks turn on the 5G signals. The meaning of 5G is just “5th Generation” which is fairly vague, but the standards for 5G were decided upon a few years ago. However, the technology and investment is just now starting to get to the point where it’s being beta tested. Cellular networks that currently offer any sort of 5G … [Read more...] about Technology Trends for 2020 – Part 1: 5G Cellular Networks
Transferring Data to a New Computer
What to Transfer The majority of what is transferred will be one of the the following: Data (Documents, Desktop, Download, Pictures, Videos, Favorites, etc.)SettingsApplications (even though applications can never be directly transferred, the installers and keys and data, if available, can) For Macs, the type of data is the similar, but exact directories will be a bit different. The fastest method, which we almost always use, is the USB / SATA cable. Once the old hard … [Read more...] about Transferring Data to a New Computer
Multi-Factor Authentication
There are few things more effective at keeping your accounts secure than multi-factor authentication (MFA). The general concept is that when you enter your password correctly, there is an additional step to verify that the person logging into the account is actually the owner, or someone the owner is allowing to access. This second step generally involves a 6 digit code that is sent to the owner of the account whenever anyone enters the correct password. This code is randomized … [Read more...] about Multi-Factor Authentication
September Newsletter: Security Measures and Practices
Security in an office network has always been incredibly important, but now it seems more important than ever. Ransomware is becoming increasingly more threatening as it affects larger and larger targets at an increasing rate. As such, most IT service providers and MSPs (managed service providers) have been focusing harder on making sure that the state of their client's network security is top notch. However, there are a few issues that keep their efforts from being completely … [Read more...] about September Newsletter: Security Measures and Practices
Cloud Services
With the increased effectiveness of cloud-based server solutions, many people are beginning to migrate to these cloud services, attracted by the promise that outsourcing their server environments will increase the reliability of their security and decrease downtime. However, it’s been shown recently that even these services are not immune to ransomware. quickbooks-cloud-hosting-firm-insynq-hit-in-ransomware-attack/ The above article covers the ransomware that infected iNSYNQ’s … [Read more...] about Cloud Services
Security of In House Computers and Servers
Security in an office network has always been incredibly important, but now it seems more important than ever. Ransomware is becoming increasingly more threatening as it affects larger and larger targets at an increasing rate. As such, most IT service providers and MSPs (managed service providers) have been focusing harder on making sure that the state of their client’s network security is top notch. However, there are a few issues that keep their efforts from being completely … [Read more...] about Security of In House Computers and Servers
Windows 7 End of Life: Should You Upgrade or Replace Your Computer?
January 14th, 2020 marks the end of support for both Windows 7 and Windows Server 2008. This means that Microsoft will stop updating these operating systems' security features. For years now, Microsoft hasn't been adding new features to Windows 7, but has continued providing security updates for it. When security updates stop for Windows 7 and Windows Server 2008, it will begin to be unsafe to use them. Security updates for an operating system focus on changing or fixing newly arising … [Read more...] about Windows 7 End of Life: Should You Upgrade or Replace Your Computer?
Switching Email Services: Part 2
Each new email address must have contacts, settings, signatures, and forwarding setup when moving email providers. However, with larger email providers like Microsoft's Office 365, there are programs that automate the process, making the switch seamless. The service Grundig IT uses for migrating email accounts to Office 365 is Skykick. This service transfers all email data associated with the old addresses to the new service. It also automatically transfers settings and other data as well. … [Read more...] about Switching Email Services: Part 2