Our IT Consulting Blog
If you are looking for the latest updates with OAC Technology or in the IT world, check out our IT blog for tips, news, and more!
If your business has grown beyond you and a handful of employees, you’ve probably realized that your business needs a better way to share data–and often, that solution means buying your first server.
When it comes to setting up a server in your business, you have plenty of options to choose from. Here, we’ll cover a few different types of servers and how they could benefit your company.
If you pay any attention to tech news these days, you’ll see story upon story about hackers, leaked passwords and data theft. With the increased portability of data–laptops, smartphones, tablets and flash drives with large capacities–and the emerging popularity of cloud services that store your data on computers you don’t control, the less naive you can afford to be about your business’s sensitive data.
If you’re an Apple user and upgraded your iPhone or iPad to the new iOS 6, you have probably experienced some disappointment with the new Apple Maps app. With the arrival of iOS 6, Apple announced it would move away from the tried-and-true Google Maps app and instead develop it’s own app. Unfortunately, Apple Maps has not been well received–to the point that Apple CEO Tim Cook wrote iOS 6 users an apology.
With the low prices and convenience of flash drives, USB drives and external hard drives, the chances are greater than ever that your company’s sensitive data could be easily lost or stolen. To combat this, you may have thought about having these types of drives encrypted. Encryption can be done two different ways, using either hardware or software.
If your small business is using Exchange Server 2003, you may want to consider upgrading to Exchange Server 2010. Microsoft lists a whole host of improvements and new features, but which ones will make a difference in your business?
In addition to a higher level of reliability, Microsoft Exchange Server 2010 can also help you lower costs and enhance user productivity as well. Exchange Server 2010 now has integrated archiving capability, better disaster recovery and enhanced information protection–such as email moderation and automatic email encryption. It also has the flexibility to run on-site, as a Microsoft-hosted service or a combination of both.
If you use a VoIP phone system in your small business, you may not know that they require software updates, just like any other software application. Systems like Asterisk are software-based solutions, and as such, regular upgrades mean bugs get fixed and security holes get patched. While not every update is required, you should pay particular attention to updates that improve the security of your system.
What do you do with your old equipment when it comes time to get that new computer or replace that 4 lb. laptop? Do you put it in storage somewhere and let it collect dust for years? Perhaps you recycle it and hopefully you don’t throw it in the trash.
We’ve heard small-business owners ask time and time again, “Why would I need to be concerned about security? There’s nothing valuable on my servers, so why would anyone want to hack it?” This question comes from a lack of knowledge about why hackers do what they do and the ramifications it could have on your company’s bottom line.
If your small business has grown to more than a few employees, it may be time start looking at installing a server to fit your technological needs. There are a multitude of options to choose from, and finding one that’s right for your business depends on several different factors. Today, we’ll focus on Windows Server 2012 Essentials. Not only is it an affordable first-server option, but it can also be used in multi-server environment.
Starting around 1pm EDT on September 10th, 2012, you may have noticed problems sending or receiving emails or had trouble accessing some websites.
A hacker launched a denial of service attack on GoDaddy’s servers and took down a major portion of their systems, leaving many websites and email boxes unreachable.
Using WiFi has helped reduce the clutter of wires in your office while simultaneously increasing the flexibility of where you choose to work and collaborate. However, using WiFi also often comes with a downside: slow speed. Here are a few suggestions on how to get the most speed out of your company’s WiFi network:
By now, you’ve heard that the dust found in your computer could be harmful to it. But how could something as innocuous as dust be harmful to a computer?
Sometimes your computer catches a nasty virus or malware no matter how careful you are. It could be that a legitimate document was infected by a coworker or someone used your computer without you looking. But now that you have malware, what do you do next?
The quick answer is no. Most surge protectors are based on the same technology, and how fast they switch on is similar amongst even the cheapest models. Sure, more expensive surge protectors may include extra features, such as status lights and good looks, but that doesn’t necessarily mean they’ll protect your computer any better than a less expensive version.
The question of whether or not you should leave your computer on overnight has been debated as long as we can remember. On one hand, people argue that turning your computer on and off unnecessarily stresses components, leading to a shorter overall lifespan. On the other hand, people say that it saves power and that programs do well to be shut down every so often.
In a recent episode of Breaking Bad, Jesse Pinkman suggested using a magnet to destroy the data on a laptop hard drive. While the magnet they used was effective for other reasons (it was as big as a small truck and flung the laptop 20 feet across a room into a wall), a magnet in and of itself won’t affect your hard drive in the least.
With laptop sales growing steadily and as manufacturers continue to up the specs, more and more people are using laptops and ultrabooks as their main computer. While batteries have also improved greatly over the past few years, a single charge probably won’t last you an entire day of work. So if you’re working on your laptop at your desk all day, should you just leave it plugged in all the time? What’s best for the long-term life of the battery?
Have you ever visited a website and had to enter a bunch of random, hard-to-read characters? Ever wonder why you had to enter them? Well, that’s called a CAPTCHA or “Completely Automated Public Turing test to tell Computers and Humans Apart.” It’s a type of test used in programming to verify whether or not a human is interacting with the program.
The basic idea behind a CAPTCHA is that it’s easy for a human to answer but difficult for a computer. That way, certain functions could ideally be limited to humans, while keeping computers and automated programs (bots) out.
Microsoft Outlook is a popular email client for business, and many businesses use it for email, even if they’re not using Exchange Server. If you’re one of those businesses, you may run into the issue of having to sync your contacts between two different computers (for example, your office computer and your laptop).
A few weeks ago, we talked about whether or not your business should jump into the cloud. While ease-of-use and scalability are potential benefits of using cloud storage services, a recent study from Ponemon Institute shows that data security in the cloud could be a cause for concern. In fact, they indicate that a full 90% of businesses have experienced a leak of sensitive or confidential information in the past year.
Over the past decade, one of the reasons to buy an Apple computer over a Windows computer was the idea that Macs don’t get viruses. In fact, for many years, Apple claimed on its website that Macs weren’t susceptible to viruses like PCs were and that computers running Mac OS X “don’t get PC viruses.” While the validity of that statement was always questionable, Apple just as recently as June 2012 updated its website to say “It helps keep you safe.”
Bot. You’ve heard the term before, but you’re not quite sure what one is or what it does. Basically, a bot (short for web robot) is a program created to perform automated tasks faster than any human could. Like any tool, a bot may or may not be used for malicious purposes. In fact, there are some beneficial uses for bots as well.
Here at OAC Technology, we get asked this question a lot. If you view your computer as a status symbol, then you should get a new one every 6 months. For the rest of us, the answer is, “It depends.”
You’ve heard it over and over again… Back up your data. It’s the only way to protect your business information, financial data and the rest of your digital life from inevitable hardware failure. Running regular backup will greatly reduce your risk for data loss.
We’ve said it again and again: Back up your data. You know it’s important, but for some reason, you just haven’t gotten around to it yet. You may be hung up on all sorts of options, solutions and types of backups or you might not think you have the time to set it up and keep it running. Well, the good news is that creating a backup is probably easier than you think.
Let’s face it, our lives are becoming more digital every day. From digital photos to financial documents to business emails, the amount of information we store has grown exponentially over the past decade. Now think about what were to happen if all that information disappeared. Where would your business be?