Our IT Consulting Blog

If you are looking for the latest updates with OAC Technology or in the IT world, check out our IT blog for tips, news, and more!

What Are The Dangers of an Outdated Firewall?

Firewalls are components of a computer network or system that prevents unauthorized system access while permitting outbound communication. A firewall does this by inspecting data going into and out of the computer system to ensure it meets predefined security standards. With time, a firewall will become obsolete and their efficiency diminishes.
Continue reading

This entry was posted on .

Windows 10 and Microsoft Edge

Windows 10 is the latest release of the ever-popular and oh-so-familiar Microsoft Windows operating system.  It promises to bring the best of Windows 7 and Windows 8.1 together, while adding new features and tools for productivity, education, news, and entertainment. Continue reading

This entry was posted on .

About the CyptoLocker Virus

crypto-locker-150x150 Viruses can be annoying, but the CryptoLocker virus (and other crypto-malware infections) are down right scary. They may appear like any other type of ransomware, but don’t be fooled; infections like these will have lasting effects on your environment or workstation. Continue reading

This entry was posted on .

What is Active Directory and Why Should I Use It

What Is Active Directory

Active Directory is a centralized database for all of your security principles. What is a security principle? A security principle can be anything from a user account, group, group policy, file share, to objects like printers. It is the single place to administer every user account in your organization. Active Directory is a building block for programs and operating systems to authenticate against for Single Sign On purposes.

Continue reading

This entry was posted on .

When Should We Upgrade Our Company’s Server?

It used to be servers could easily last 10 years, and for the money spent, they should have!

Today, technology changes so fast, it doesn’t matter what you buy. Software requirements change so quickly, it’s hard to keep your hardware current. Still, that doesn’t mean you need to replace your servers every year.

Continue reading

This entry was posted on .

The Importance of Data Center Monitoring

Data Center

Today’s data centers are evolving quickly in order to keep up with the demands of cloud computing, web-based applications, high-availability services and the rest of today’s computing needs. Many businesses choose to host their servers or at least part of their network infrastructure in offsite locations–often in different regions of the country or world. Continue reading

This entry was posted on .

Windows Server 2012 Features for IT Teams

Microsoft Windows Server 2012 New Features

When Microsoft released Windows Server 2012 in September 2012, IT pros around the world scrambled to study and learn the countless new features it offered. Compared to its predecessor, Windows Server 2008 R2, Server 2012 offers a host of improvements geared toward IT professionals with the hopes of making life a little bit easier in the server room. Continue reading

This entry was posted on .

Microsoft Exchange Server: Hosted vs. On-Site

Microsoft Exchange Server 2010

Starting with version 2010, Exchange Server added the capability of being hosted in an offsite location or via a hosting service. Since then, many IT administrators have had to answer the question: Host Exchange via a hosting service or manage it all in-house? And which of those options is the most cost-effective and makes the most business sense?

Continue reading

This entry was posted on .

Windows 8 in the Workplace

Window 8

Since Microsoft released Windows 8 last fall, we have seen marketing campaigns and quarterly reports leading us to believe that it is a huge hit. Even if we take Microsoft’s word for it in the tablet and home user market, Windows 8 is nearly non-existent in the business market based on our experience.

Continue reading

This entry was posted on .

Microsoft Office 365 Small Business Premium

Office 365 Small Business Premium

Microsoft recently released Office 365 Small Business Premium, the latest version of their ubiquitous Office software suite. Office 365 is Microsoft’s online version of Office geared toward collaboration. While Office 2013, the newest version of the traditional app-based suite, has been available for some time, businesses interested in the cloud-based Office 365 had to wait a bit longer.

Continue reading

This entry was posted on .

Protecting Your Privacy Online

Fingerprint

We recently discussed just how public your online privacy actually is. If online privacy is a concern in your business, it may have been a bit of a wake-up call. While there is really no way to be completely anonymous while still using the internet in a practical way, there are a few things your company can do address certain concerns.

Continue reading

This entry was posted on .

Your Privacy Online

Fingerprint

Chances are you visit several websites a day that have Facebook or Twitter icons on them. Or perhaps some of the sites you visit have advertising. While the operators of these sites may not be doing it intentionally, your information is being logged, tracked and analyzed by third-party websites every time one of these types of plugins are loaded. Depending on the level of security required at your company and the sensitivity of its data, you may not want external websites tracking your employees every online move.

Continue reading

This entry was posted on .

Reduce Your Company’s Phone Bill

Reduce Costs

Do you run a small- to medium-sized company? If so, you are well aware of the constant balancing act between profit and expenses. The idea of increasing profits while reducing expenses is ingrained in everything you do. Because, let’s face it, even if you have an outstanding quarter of sales, your profits quickly begin to disappear once expenses are factored in. From rent and utilities to salaries and cost of goods, the all-so-important margin starts to dwindle.

Continue reading

This entry was posted on .

Data Theft Is Still Theft

Photo © FreeDigitalPhotos.net

If you use email or computers in your company (and who doesn’t?), chances are your employees are stealing from you. It may not be intentional, and it may not be in the way you are thinking. If an employee has ever emailed a work document to a personal account and did not delete it when they were done working on them, that is data theft. If an employee has ever transferred files to a thumb drive or one of their own devices without your permission, that is data theft.

Continue reading

This entry was posted on .

Why am I Blacklisted?

Have you ever been blacklisted? Well, not you personally, but your company’s email server? Blacklisting when referring to email occurs when an email account or server raises enough red flags to be effectively blocked from having its emails delivered. In other words, if your email server is on a blacklist, chances are your emails will not be delivered.

Continue reading

This entry was posted on .

Apple iOS 6.1 and Microsoft Exchange

iOS 6.1.2

At the end of January 2013, Apple released iOS 6.1, an update to the operating system used on iPad, iPhone and iPod Touch. While there were improvements over 6.0, such as a boost in both the wifi reception and battery life, a fairly significant bug came along with it. If you use Microsoft Exchange Server for mail or calendar service, a bug is causing iOS devices to generate excessive transaction logs, which could slow down or crash your Exchange server completely.

Continue reading

This entry was posted on .

VoIP Optimization

VoIP

VoIP Optimization Services

Although VoIP’s adoption rate has been increasing due to its ease-of-use and affordability, many businesses overlook the benefits of (and sometimes the need to) optimizing their network for their VoIP needs. After the initial joy of cost-savings wears off, the need for call quality becomes more important. Let’s face it… Dropped calls and garbled voices are not something you signed up for when you made the decision to transition to VoIP.

Continue reading

This entry was posted on .

VoIP Basics

Voice over Internet Protocol (VoIP) has been gaining in popularity over the last few years. But what exactly is it?

Continue reading

This entry was posted on .

Security Considerations in IPv6

IPv6As IPv6 gains in popularity, so does the popularity of its vulnerabilities. As we have discussed recently, the rollout of IPv6 is taking quite some time. Even if your company has not yet made the leap in IPv6, hackers are now using IPv6 to attack IPv4 networks, so you should be aware of security gaps found in IPv6 in order to protect your network.

Continue reading

This entry was posted on .

IP Telephony

Many businesses are looking for ways to reduce costs, and a great place to start looking is by switching to IP telephony. Traditional PBX systems are isolated from the data network, which means the PBX hardware in the server room is directly connected to the user’s desk phone. At a basic level, PBX systems require separate wiring from the data network, which can turn simple repairs and maintenance a juggling act between your telephony and IT providers.

Continue reading

This entry was posted on .

Is it time to trade in your desk phone?

With the advent of internet-based voice communication software, more and more companies have been asking whether or not they should get rid of their desk phones and replace them with softphones. A softphone is a piece of software that allows a user to place phone calls using the internet. Popular softphones include Skype, Google Talk and MagicJack. In order to make a telephone call using a softphone, you will need a computer running the softphone software equipped with a speaker and microphone (or a traditional phone hooked up to a USB adapter) and a high-speed internet connection.

Continue reading

This entry was posted on .

3 Types of IPv6 Addresses

We recently talked about Internet Protocol version 6 (IPv6) addresses, what they are, how they are different from IPv4 addresses and the additional benefits they provide. There are four types of IPv6 addresses. Three of them correspond to how they interact with the network, and one is used specifically for the transition from IPv4 to IPv6. Each network-connected device can typically support more than one IPv6 address for each address type, as well as multiple address types.

Continue reading

This entry was posted on .