Top 10 Things Every Business Owner Must Know About Hiring an Honest, Competent, Responsive and Fairly Priced IT Company

Choosing a computer support company isn’t easy. There are no shortages of horror stories about incompetent computer repair “gurus” bungling jobs and causing MORE problems as a result of their lack of knowledge. I’m sure if you talk to your own friends and colleagues you will get an ear-full of the unfortunate experiences they have encountered in this area.

Why is this? Because it is not regulated like many other professional service industries, which means ANYONE can claim they are a “computer repair expert.” In fact, a lot of the businesses in this industry started because the owner was fired or laid off from their job and couldn’t find work anywhere else, or they hire people who are not properly trained to support a business.

Unfortunately, they will try to take advantage of trusting business owners who simply do not have the ability to determine whether or not they know what they are doing. From misleading information, unqualified technicians, poor management and terrible customer service, we’ve seen it all.

This is why it’s so important for you to arm yourself with the information below:
Here is my list of the Top 10 things you should look for (or look out for!) when hiring an IT company…

10. They own all the IT problems.
When something goes wrong with your Internet service, phone systems, printers or other IT services, a good IT company should own the problem for its clients (versus saying “that’s not our problem to fix”). As a business owner, you shouldn’t have to try and resolve any of these issues on your own – that’s just plain old good service and something many computer guys won’t do.

9. They conduct periodic test restores of your backups.
The worst time to “test” a backup is when you desperately need it. A proactive IT company will insist on performing regular “fire drills” and perform a test restore from backup to make sure your data can be recovered in the event of an emergency.

8. They offer a TRULY all-inclusive support plan.
Many IT companies say they offer all-inclusive plans, but they are saddled with “gotchas” hidden in the fine print. An authentic all-inclusive managed services plan is just that – all inclusive.

7. They provide you with a monthly report of your network.
A good IT company should provide you with a detailed report each month that shows an overall health score of your network that includes all updates, security patches, and status of every machine in your network so your know FOR SURE that your systems have been secured and updated.

6. They monitor your network 24-7-365.
Your IT company should continuously watch over your network to look for developing problems, security issues and other problems to address them BEFORE they turn into bigger problems.

5. They consistently (and proactively) offer new ways to improve your network’s performance instead of waiting until you have a problem to make recommendations.
A great IT company will invest in their people with training and education to understand the latest offerings that will fit into their client’s businesses. They will also conduct monthly on-site visits with their clients to look for new ways to help improve their operations, lower costs, increase efficiencies and resolve any problems that may be arising.

4. They avoid “geek-speak.”
A competent IT company should take the time to explain what they are doing and answer your questions in terms you can understand. You should never be made to feel stupid for asking questions. And they should meet with you on a regular basis to make sure you are using technology to grow your business.

3. They have a written, guaranteed response time to your calls.
Your IT company should have a technician working on your problem within 60 minutes or less of your call. A great IT company will have this written into their service agreements.

2. They answer their phone live.
When you have a computer problem that is keeping you from your work, it is especially frustrating to have to leave a voicemail and wait for a call back. A responsive IT company knows this and will answer your call live, every time 24/7.

1. They will offer to complete a FREE audit of your network.
A truly competent IT company will offer to come out to your office and conduct a complementary assessment of your entire network to help you look for any potential issues you are facing, or to at least verify that your current IT company has all your bases covered.

The absolute best way a business can ensure that their systems and networks are secure is to work with an IT partner like us. Our managed services can help ensure that you have proper security measures in place and the systems are set up and managed properly. Tech peace of mind means the focus can be on creating a successful company instead. . Contact us today to learn more.

Published with consideration Joanna Sobran from HuffingtonPost.com. SOURCE

If you’re disturbed by advertisements and “helpful” suggestions that are based on your internet browsing habits, recent research has found yet another source of online tracking. It’s a sneaky tactic that also comes with serious security concerns. Let’s take a look at what you can do to stop it from targeting you.

Why auto-fill passwords are so dangerous
In 2015, the average internet user had 90 online accounts, a number that has undoubtedly grown since then. This has forced users to create dozens of passwords, sometimes because they want to practice healthy security habits and other times because the platforms they’re using have different password requirements.
Web browsers and password manager applications addressed this account overload by allowing usernames and passwords to be automatically entered into a web form, eliminating the need for users to hunt down the right credentials before logging in.
The process of tricking a browser or password manager into giving up this saved information is incredibly simple. All it takes is an invisible form placed on a compromised webpage to collect users’ login information without them knowing.

Using auto-fill to track users
Stealing passwords with this strategy has been a tug-of-war between hackers and security professionals for over a decade. However, it has recently come to light that digital marketers are also using this tactic to track users.
Two groups, AdThink and OnAudience, have been placing these invisible login forms on websites as a way to track which sites users visit. These marketers made no attempts to steal passwords, but security professionals said it wouldn’t have been hard to accomplish. AdThink and OnAudience simply tracked people based on the usernames in hidden auto-fill forms and sold that information to advertisers.

One simple security tip for today
Turn off auto-fill in your web browser. It’s quick, easy, and will go to great lengths to improve your account security.
• If you use Chrome – Open the Settings window, click Advanced, and select the appropriate settings under Manage Passwords
• If you use Firefox – Open the Options window, click Privacy, and under the History heading select “Firefox will: Use custom settings for history.” In the new window, disable “Remember search and form history.”
• If you use Safari – Open the Preferences window, select the Auto-fill tab, and turn off all the features related to usernames and passwords.

This is just one small thing you can do to keep your accounts and the information they contain safe. For managed, 24×7 cybersecurity assistance that goes far beyond protecting your privacy, call us today.

To learn more about how to safeguard your business, or if you are looking for an expert to help you find the best solutions for your business talk to GCInfotech about a free technology assessment

Published with consideration from TechAdvisory.org SOURCE

The new year doesn’t have to mean new IT hardware problems. Sure, some headaches are unavoidable, but you can start the year right by giving your computer hardware a little TLC. Let our handy hardware checklist be your guide.

✓ Clean up your computer components
Wipe your monitor with a clean, static-free fabric; remove excess dirt from your mouse’s exterior; and tidy up your keyboard with compressed air. Don’t forget your computer tower! Dust build-up can block your computer’s air vent and affect its performance. Ensure that your workstation is getting adequate ventilation and isn’t directly exposed to sunlight and other heat sources.

✓ Manage your cables
If you’re not giving your computers’ cables the attention they deserve, now’s a good time to do so. Other than wiping the thick coat of dust on computers’ cables, consider using cable management solutions that unclutter and untangle messy wires. These don’t just organize and secure your cables, they also help ensure your PCs run quieter and are less prone to overheating as a result of blocked air vents.

Planning to relocate or upgrade in the near future? Organizing your computers’ cables now makes future relocation and upgrading processes much easier.

✓ Review and update your inventory
Keeping an inventory of all your hardware helps you manage hardware lifecycles and purchases, identify items that are near their end of life, and ensure you avoid duplicate purchases of items already in-stock.

Your inventory list should include all owned and leased devices: PCs and laptops, printers and scanners, tablets and smartphones, and modems and other network hardware. Update all your assets’ serial numbers and keep track of their respective users and location.

✓ Printer maintenance
Clean the interiors and exteriors of your printers, including paper trays, which are sure to have accumulated dirt from years of use. You should also repair and/or replace parts and accessories such as printheads and cartridges that are no longer in good condition. Should you decide to do a complete printer maintenance, check for the latest software updates for your printers and install them immediately.

✓ Implement a hardware policy
This is also a good time to create a technology guideline that your employees can follow to ensure they work efficiently. These guidelines reduce the need to spend on unnecessary repairs, keeping the succeeding year’s checklist shorter. With clear instructions on the proper use, replacement, and storage of your hardware and devices, you’ll be better able to manage your hardware for years to come.

With a more organized IT hardware inventory, you have one less thing to worry about. Want to get more in-depth hardware management recommendations, or if you are looking for an expert to help you find the best solutions for your business talk to GCInfotech about a free technology assessment

Published with consideration from TechAdvisory.org SOURCE

Whether it’s because of government surveillance or cyberattacks, internet users are more concerned than ever about the privacy of their online activities. Unfortunately, security measures like firewalls and antivirus software can’t help you in this case, but there’s one that can: Virtual Private Network (VPN).
 
What is VPN?
Simply put, a VPN is a group of servers you connect to via the internet. Once you’ve established a connection, your computer acts as if it’s on the same local connection as the VPN, making it seem like you moved to a different location.
When you surf the web through a VPN, all the data transmitted and received is also encrypted, preventing anyone — from hackers to government agencies — from monitoring your online activities.
 
Why should you have one?
Of course, security and privacy are major reasons why you would want a VPN. For example, if you’re connected to a public WiFi network — like the ones you typically see in local cafes and airports — using a VPN encrypts the information you’re sending or accessing online. This means things like credit card details, login credentials, private conversations, or other sensitive documents can’t be intercepted by a third party.
VPNs are also useful for accessing geo-restricted websites. If you’re traveling abroad and certain US websites are blocked in that region, you can simply connect to a VPN located in the US to access the sites you need.
 
Which VPN should you choose?
Given the increasing demand for secure online privacy, VPNs are surging in popularity. The following considerations can help you find the right one.
 
1. Cost
While free VPNs are available, we strongly suggest you avoid them. These keep logs of your internet activity, and in some cases sell them to the highest bidder. Maintaining a VPN service is also expensive, which means the free ones will likely plaster ads on your browser to make a quick buck.

Paid VPNs like SurfEasy and StrongVPN often come with more robust features and configurations that keep you secure. What’s more, they don’t keep a record of the sites you visit and hound you with pop-ups that lead to dangerous websites.
 
2. Location
The physical location of VPN servers is important if you want to access region-blocked websites. So if you’re planning on accessing a UK-based service, your VPN provider must at least have servers installed in London.
 
3. Capacity
Read through a VPN provider’s terms of service to determine how much data you’re allowed to use. If possible, find out how many servers a VPN provider has. If they have plenty of servers online, you can rest assured that they have the capacity to support your internet browsing.
 
4. Device compatibility
Another important factor to consider is whether the VPN can be used across multiple devices. Nowadays, employees work on laptops, tablets, and smartphones, so you’ll want a VPN that’s compatible with all these.
 
5. IP leaking
Finally, a great way to evaluate a VPN service is to sign up for their free trial service and visit https://ipleak.net/, which will allow you to check whether your real IP address is actually being leaked. If it manages to track your physical location, you need to opt for a more reliable VPN service.

VPNs are now a vital component of cybersecurity, and if you need help selecting the right one for your business, consult with our security experts today. We also offer comprehensive cybersecurity services so no hacker or third party can get their hands on your data.
To learn more about how to safeguard your business, or if you are looking for an expert to help you find the best solutions for your business talk to GCInfotech about a free technology assessment
Published with consideration from TechAdvisory.org SOURCE

Finding a power socket is often the first thing you do when carrying a laptop to work in a cafe, a co-working space, or an airport, and not every time will you be lucky to find one available. You’ll be forced, then, to rely solely on your laptop battery — if it still has any juice left. Here are some tips to help your laptop battery last as long as it could.

Some truths about your laptop battery
Batteries in many devices nowadays are lithium-based — either lithium-ion or lithium-polymer — so users must take note of the following guidelines for their proper maintenance:
• They can’t be overcharged, even though you leave your battery plugged in for a long period of time. When the battery hits 100%, it’ll stop charging.
• Leaving your battery completely drained will damage it.
• Batteries have limited lifespans. So no matter what you do, yours will age from the very first time you charge it. This is because as time passes, the ions will no longer be able to flow efficiently from the anode to the cathode, thereby reducing its capacity.

 

What else can degrade your battery
Besides its being naturally prone to deterioration, your battery can degrade due to higher-than-normal voltages, which happens when you keep your battery fully charged at all times. Even though a modern laptop battery cannot be overcharged, doing so will add a stress factor that’ll harm your battery.
Both extremely high temperatures (above 70°F) and low temperatures (between 32-41°F) can also reduce battery capacity and damage its components. The same goes for storing a battery for long periods of time, which can lead to the state of extreme discharge. Another factor is physical damage. Remember that batteries are made up of sensitive materials, and physical collision can damage them.

 

How to prolong your battery life
Now that you know some facts about your laptop battery, it’s time to learn how to delay its demise:
• Never leave your battery completely drained.
• Don’t expose your battery to extremely high or low temperatures.
• If possible, charge your battery at a lower voltage.
• If you need to use your laptop for a long period of time while plugged into a power source, it’s better to remove the battery. This is because a plugged-in laptop generates more heat which will damage your battery.
• When you need to store your battery for a few weeks, you should recharge your battery to 40% and remove it from your laptop for storage.

These are just a few tips on extending the life of your hardware. There are many more ways you can maximize your hardware efficiency and extend its longevity. Call our experts today to find out more!
To learn more about how to safeguard your business, or if you are looking for an expert to help you find the best solutions for your business talk to GCInfotech about a free technology assessment
Published with consideration from TechAdvisory.org SOURCE