Our IT Consulting Blog

If you are looking for the latest updates with OAC Technology or in the IT world, check out our IT blog for tips, news, and more!

Protect Yourself From Identity Theft While Traveling

Photo © FreeDigitalPhotos.net

When traveling for business, you probably have more important things on your mind than protecting yourself from identity theft. But when you think about it, you’re at a much greater risk than when working out of your office. You’re hauling around a laptop, tablet and smartphone containing your emails, financial information, photos and more, charging them in all sorts of places and connecting to different WiFi networks.

Continue reading

This entry was posted on .

Asterisk VoIP Phone Systems

OAC Technology’s support team offers professional assistance with installation, configuration, and systems operation issues.

Asterisk is the world’s most popular and powerful open source telephony platform. With Asterisk, virtually any computer can become a phone system, drastically reducing the cost of ownership and delivering a return on investment that no proprietary solution can touch.

Continue reading

This entry was posted on .

Why do you get so much junk email?

Photo © FreeDigitalPhotos.net

We’ve all seen it… You just set up a new email account, and all of a sudden you start receiving SPAM. Or you’ve had the same email account for a few years and you dread having to visit the inbox because you know you’ll have to wade through all the junk to just to find actual email.

Continue reading

This entry was posted on .

How to Share Your Hard Drive Between Windows 7 and Mac OS X

So you just got your new external hard drive, and you want to be able to use it on both a Windows 7 computer and a Mac. You can do this, but your hard drive needs to be formatted in a way that both Windows and Mac can understand. Depending on the hard drive you bought, it came preformatted in one of three ways:

Continue reading

This entry was posted on .

Fake Anti-Virus and Trojan Infections

Fake virus alerts are usually generated by a Trojan. A Trojan is a program that takes control of your computer after you open an email attachment, click on a pop-up advertisement within your browser or by visiting particular shady websites.

Continue reading

This entry was posted on .

How to Protect Your Computer with Microsoft Security Essentials

By now, you should know that having an up-to-date antivirus program installed on your computer is an essential part of protecting your computer and data. There are many antivirus programs out there, and today we’ll be looking at Microsoft Security Essentials (MSE). It’s one of the easiest to use antivirus programs because it checks for updates automatically a few times a day and doesn’t slow your PC down while it works. (And did we mention it’s free for Windows users?)

Continue reading

This entry was posted on .

What to Do if Your Email’s Been Hacked

Photo © FreeDigitialPhotos.net

Unfortunately, hackers love to get into other people’s email accounts… It lets them send spam or scam emails with little risk of being detected. Most of the time, you won’t even know a hacker has access to your account until a family member or friend lets you know you’ve been sending weird emails from your account.

When this happens, don’t panic. Follow these steps to weed out the hijacker and restore order to your inbox.

Continue reading

This entry was posted on .

How to Secure Your Wireless Network

Photo © FreeDigitalPhotos.net

Have you ever been looking for a wireless network to connect to and instead of seeing just your business’s network, you found a whole list of different WIFI networks near you? Have you ever connected to someone else’s unprotected WIFI without them knowing it? Whether you know it or not, if you haven’t secured your wireless network, you’re inviting unwanted guests (and hackers) into your network.

Continue reading

This entry was posted on .

Is Windows 8 right for your business?

With Windows 8 Release Preview out now and the full version due out in October, you may already have heard or seen some of the buzz around Microsoft’s newest operating system. One of the questions we inevitably get asked by business owners whenever a new OS is released is, “Should we upgrade or should we wait?” The answer to which is much more complex than a simple “Yes” or “No.”

Continue reading

This entry was posted on .

How to Buy the Right Tablet for Your Business

There’s no question that tablets are popular right now. They’re easier to carry around than a laptop and they’re easier to read than a smartphone, which is why many businesses are starting to incorporate tablets into their workplace. If you’re thinking about using a tablet in your business, you’ll want to make sure you get the right one.

Continue reading

This entry was posted on .

TIP: 4 Ways to Clear Up More Disk Space

If you’ve had your computer or laptop for more than a year or two, you may find yourself looking for ways to clear up disk space before installing a new program. And although the cost of hard drives continually goes down while the size goes up, you may not want to deal with the headache of installing a larger hard drive and then transferring your files to it. Even on the fastest of machines, it could take between several hours to more than a day to transfer an old hard drive to a new one, depending on the amount of data being transferred.

Continue reading

This entry was posted on .

TIP: Use Disk Cleanup to Clear Up Disk Space on Your Laptop

If you use a laptop for work or at home, you have probably done the disk space dance… You know, it’s the dance you do when when Windows tells you you’re running low on hard drive space. The solid-state drives installed in many newer laptops are fast, but tend to be smaller than their slower, traditional counterparts. And even if you have a larger mechanical hard drive, you may find yourself in the same position–searching for anything you can delete to get more space.

Continue reading

This entry was posted on .

What is VoIP?

There’s been a lot of talk over the past few years about VoIP phone systems… And with good reason. They are less expensive to install, maintain and upgrade than traditional business telephone systems. You also receive more features (e.g., voicemail, long distance, conference calls, etc.) for less money.

Continue reading

This entry was posted on .

Why Do You Need A Good Password?

Photo © FreeDigitalPhotos.net

What do LinkedIn, Yahoo!, Sony, Last.fm and eHarmony all have in common? They’ve all leaked users’ passwords–a combined total somewhere in the tens of millions… And yours may have been one of them. You may be thinking, “So what? I changed it already. What do I care if my old Yahoo! password gets out?”

Continue reading

This entry was posted on .

Why Should I Care About Computer Security?

Photo © FreeDigitalPhotos.net

As a small business, have you ever wondered why you should care about computer security? Why would it matter–you don’t have anything on your computers that anyone would want, right?

Continue reading

This entry was posted on .

Common Networking Terms

Have you ever had a problem with your router because of its firmware? Or you need to buy a longer CAT5 cable for your ethernet card? Want to know what buffer, bandwidth and broadband really mean?

Continue reading

This entry was posted on .

Does Your Business Accept Credit Cards?

Small merchants are prime targets for data thieves. It’s your job to protect cardholder data at the point-of-sale by being PCI compliant.

Are you PCI compliant? If you’re not sure or you don’t know what that means, you could be held responsible if cardholder data is stolen from your business or website. You could incur fines ($5,000 to $100,000 monthly), penalties, even termination of the right to accept payment cards!

Continue reading

This entry was posted on .
Macbook Keyboard

3 Ways to Speed Up Your Mac

Is your mac half as fast as it used to be? We have addressed the 3 most common reasons and their solutions to give you 3 Ways to Speed Up Your Mac to help you speed up your machine.

Continue reading

This entry was posted on .
Firewall

DNS Changer Trojan infects an estimated 500,000 systems, FBI to disconnect compromised systems in July

FirewallThe DNS Changer Trojan is a sophisticated piece of malware which has compromised an estimated 500,000 systems.  Because of the wide-spread damage and repercussions, Google has been making an effort to notify Internet users if their computers or routers are still infected with the DNS Changer Trojan.  Google’s effort to notify users to this Trojan has come a month before July 9, the date on which the FBI has said they will take any computers infected with the malware offline.

Continue reading

This entry was posted on .

Why get an Office Phone System for your Minnesota Business?

Thinking of a New Phone System For Your Small Business?

Maybe you’ve been thinking that when you hit a certain number of people you’ll switch over then. Or maybe you’ve been curious about a Business Phone System for quite a while but don’t really know what the benefits would be for your business. Well you will be surprised to find out that the benefits are many and you can start saving money right away.

Continue reading

This entry was posted on .

5 Slow Computer Fixes

Is your computer half the machine it used to be? All computers slowdown in time due to many different reasons. We have addressed the 5 most common reasons and their solutions to give you 5 Slow Computer Fixes to help you speed up your machine.

There are a handful of simple things that anyone can do to speed up your computer for free and get it back to its shining glory.

Continue reading

This entry was posted on .