Why Managed Services Will Save You More Than Money
“Downtime costs money.”
That’s no secret, but it doesn’t quite capture the whole experience…you arrive to work in the morning, grab your coffee knowing you’ve got a hectic day ahead, and are ready to dive in.
For some reason your computer can’t access the database and neither can anyone else’s. You restart the server while fielding calls left, right and center, but are unable to answer any client queries. Your hands are completely tied…and now the server is beeping furiously…what’s going on??!
You’re not just in crisis mode, you’re on damage control as you call every tech you can think of, trying to find one who can come NOW.
Not exactly the day you had planned.
The Break/Fix Days Are Gone
Previously, businesses only addressed their IT needs when something broke. A few hours down meant little in the scope of things. In today’s fast world, businesses rely heavily on IT and downtime just isn’t an option. Even the legalities of simply restoring financial, legal or medical files after a breach raises issues.
The cost of break/fix is now too high, both financially and emotionally.
Simply put, your IT services are remotely monitored and proactively managed by a professional, external business. Your Managed Service Provider (MSP) runs regular diagnostics on equipment to identify impending failure and resolves problems before they happen.
Benefits of Managed Services
Small to medium businesses in particular benefit from managed services, because they don’t usually have an on-site technician to oversee the multiple systems in use. By subscribing to a managed service provider, businesses can have reduced labor costs, access to a knowledge base, future-pacing, better data security and reduced downtime. Businesses can also know exactly what their upcoming costs are and plan accordingly.
Some of the managed services we can provide are:
Remote support – This allows us to help you quickly without needing to be on-site.
Hardware monitoring – We monitor your servers and workstations to catch hardware failures before they happen.
Managed anti-virus – We make sure your anti-virus is up to date and take immediate action if an infection occurs.
Patch management – We make sure your computer’s operating system is up to date, closing access to known vulnerabilities as soon as possible.
Are you interested in giving a managed service a go? Check out Pro+Tech provided by us, your local Small Town Tech folks!
You’ll know if you’re a victim of ransomware. Often you’re met with a red screen telling you your business files are encrypted. You won’t be able to do anything on the computer, although the cybercriminals will provide helpful instructions for how to pay up. How nice. Here’s what to do instead if you’re the victim of a ransomware attack.
Cybersecurity Ventures predicts ransomware will impact businesses every 11 seconds in 2021. Yes, you read that right. That’s up from every 14 seconds in 2019. Another research company reported ransomware increasing 485% year-over-year in 2020.
Know that it’s widely considered a bad idea to pay the ransom, because you’re rewarding the cybercriminal. Plus, you can’t even be sure that they will provide the encryption key needed to regain the use of your files. What! You were going to trust the bad guys?
The Important First Step
The first thing you’ll want to do is make it all go away. Yet wishful thinking is not going to get the job done. Instead, you’re going to have to turn immediately to your disaster response plan, because, of course, you have one of those already. Really, don't underestimate the value of planning in advance for IT infrastructure compromise. Doing it proactively means calm, considered decisions rather than reacting in a crisis.
Step one is going to be identifying the systems involved and isolating them. Once you detect a compromise, limit the spread of infection by disconnecting the devices affected. Ideally, you take only a few computers offline or disconnect an individual network. Even in a large-scale compromise, remove all affected devices from the network to contain the malware.
As part of the isolation, don’t forget to disconnect any connected devices such as storage drives. The ransomware infection will even seek out USB thumb drives.
Power down only the affected devices if you are unable to disconnect them from the network. Why? Because turning them off means you might lose potential evidence.
Malicious actors may be monitoring your business communications. So, move offline to coordinate your response. Phone calls or text messaging will work, or personal email accounts.
Don’t attempt to restore critical systems until you have identified and isolated. After that, your business can move into triage mode. Prioritize what to restore, and recover using your data backup (again, of course, you have one of those, too). Consider how critical each system is for health and safety and revenue generation. Then, get to work restoring systems in an efficient, organized fashion.
Minimizing Ransomware Risk
Ransomware is a major threat to every business sector, and you don’t want to become the next victim. Common best practices include:
Businesses that partner with a managed services provider have someone supporting their efforts to cut ransomware risk. Plus, if the worst happens, the MSP’s IT experts are at the ready to identify and isolate. They can find the samples needed, determine the malware strain you are dealing with, and report the attack.
Your data backup should have recent copies of all information up to (or close to) the time of infection. So, once the MSP has removed all ransomware, they will wipe your systems and storage devices. They can swiftly reformat the hard disks and reinstall everything from scratch.
An MSP can help you plan ahead to contain the damage from a cyberattack. Let our IT experts install best practices, set up safe backups, and track activity on your network. Sign up for Pro+Tech today!
Desktop vs Laptop: Which is Right for You?
Laptops have become the go-to choice for most people in the market for a new computer. They’re sleek, portable and heavily advertised. But are they the best choice for your needs? Before you buy your next computer, take a look at these considerations - you may discover you’ve been dreaming of a desktop all along!
How portable do you need it to be?
Hands down, laptops are easier to move around than a desktop. You can pick them up, pop them into a backpack and away you go. That doesn’t mean desktops are bolted to the floor, just that they’re not designed to take on holidays or go with you to the local cafe. With that portability though, comes a trade-off: thin and light means your computer performance takes a hit. The more powerful your laptop, the bigger and heavier it is, and you won’t enjoy lugging that weight around all day. If that’s got you leaning towards an ultra-portable, consider this: The smaller and lighter your laptop is, the weaker it is. In fact, some laptops struggle to run the most basic apps. Fortunately, when you do choose a desktop, cloud technology means your data is mobile, even if your main computer isn’t.
What balance of power and price do you need?
The bottom line here is that a desktop will always give you more power for less money. Their larger cases allow for bigger and better components, with more effective systems to avoid overheating. Even the most powerful laptop is going to be hotter than its desktop equivalent, and much noisier too. If you’re using power-hungry software like games or video editing, we recommend choosing a desktop. The heat control alone is worth it as frequently overheated laptops don’t survive long.
Desired screen size
As laptops are designed to be portable, screen sizes are usually small, around 11-15”. Larger, more powerful laptops often go up to 17”. Desktop monitors however, start at 17” and average at 22”. These larger sizes give you more space to work in, options to tile your applications and multi-task, and even sit back and watch an HD (or even 4K) movie. They also allow for nice big text and images, with a better ability to choose the visual experience that suits your needs. If you’re after a large screen size without the actual desktop computer, all-in-one PCs are a great option with many offering impressive screen quality.
Your working comfort
Many people buy a laptop only to get home and find it’s a pain in the neck - literally! The traditional laptop design means you’re always looking down at the screen which can put a strain on your neck. You can try to raise the screen by placing the laptop on a stand, but then the keyboard is out of easy reach. The smaller keyboards and touchpad designs may also leave you more prone to repetitive strain injuries. Many people end up connecting their laptops to external monitors, keyboards and mice, simply so they can work in comfort. Desktop computers on the other hand, allow you to create the perfect working environment for your needs and even cater for other family members. Monitors are usually height adjustable, keyboards and mice are wireless, and you’re able to place the desktop on the floor out of the way. If you’re on your computer for more than short bursts, your body will appreciate you choosing a desktop.
Are you looking for flexibility?
When you choose a laptop computer, it’s like ordering from a set menu. You get this brand, in this design, with these specifications. Changing out parts for repair or upgrade can be difficult and expensive as there’s not a spare inch of space. Some parts are extremely hard to get to, which can turn a simple swap into a dealbreaker. The extra space inside a desktop gives infinite flexibility for upgrades over time and fast repairs. This means you’re able to easily pop in more powerful components for a fraction of the price and extend the life of your computer by years.
Are you ready to pick up your new computer? Check our online store or choose chat option if you need help finding a right one for you!
How Many Good Battery Habits Do You Really Have?
Batteries are rarely talked about - until they’re drained – then we’ll tell everyone as we beg desperately for a charger, hoping to get enough juice to last the day. The truth is, they’re a miracle of engineering that gets taken for granted when full and cursed when flat. If it feels like your battery is running out faster, you might be right. But it’s not because of ‘battery memory’ and needing to be cycled (that’s an older battery type called NiMh), it’s because the modern LITHIUM-ION batteries in phones and laptops just simply wear out over time. Fortunately, extending your battery life is easier than you think! Which of the following GOOD battery habits do you have?
1. Charge whenever you can: Lithium-ion batteries don’t like being charged all the way up and then drained all the way down. No wonder, it even sounds exhausting. Give them a little charge here and there, and they’ll be happy.
2. Leave your laptop plugged in all the time: You can’t over-charge the battery, it will just sit there waiting to be used. The laptop also helps out by cutting the flow of power when the battery registers as fully charged.
3. Watch for overheating: If you can, remove your laptop battery while charging, because while it won’t overcharge, it may overheat. You might also consider removing the battery if you’re using your laptop plugged in all the time. Sure, you might lose data if there’s a power outage, but overheating is a far more common occurrence and it’s been proven to degrade battery life considerably. Check your vents are clear with good airflow, and if necessary, help it out with a cooling laptop stand.
4. Leave your phone plugged in all night: Just like your laptop, your charger knows to stop when the battery is full. Those chargers do generate heat though, so make sure you have enough airflow around both charger and phone, and never sleep with it under your pillow.
5. Charge batteries before storing: If you’re blessed with backup batteries, make sure to give them a half charge before storing. They’ll naturally discharge and age over time, so this gives them a fighting chance to still be viable when you need them.
6. Keep your cool: We know to avoid water with our phones, but we’re less careful about exposing it to heat. This includes leaving it in your car all day, placing it on top of your PC, or even in a sunny spot by the window. Wireless and rapid chargers can also be an issue, as the amount of heat they generate will affect your battery.
Your battery will wear out over time, but you can push that day a few years into the future if you remember to keep it charged and keep it cool.
We have cooling pads available in our online store. Click here to start shopping.
Fake Invoice Attacks Are on the Rise - Here’s How to Spot (and Beat) Them
Businesses around the world are being struck with a cyber-attack that sends victims a fake invoice that looks real enough to fool to most employees. It’s an old scam that used to see bills faxed or mailed in, but it’s made its way into the digital world and instances are on the rise.
Chances are you’ve already seen some of the less effective attempts, like an email advising your domain is expiring, except it’s not from your host and your domain is nowhere near expiration. These new attacks are more advanced, in that they look completely legitimate and are often from contractors/suppliers you actually use. Logos are correct, spelling and grammar are spot on, and they might even refer to actual work or invoice numbers. The sender name may also be the normal contact you’d associate with that business, or even a co-worker, as cybercriminals are able to effectively ‘spoof’ real accounts and real people. While it’s worrying that they know enough about your business to wear that disguise so well, a successful attack relies on you not knowing what to look for, or even that fakes are a possibility. With that in mind, here are two types of invoice attacks you might receive:
The Payment Redirect
This style of fake invoice either explicitly states payment should be made to a certain account, perhaps with a friendly note about the new details, or includes a payment link direct to the new account. Your accounts payable person believes they’re doing the right thing by resolving the invoice and unwittingly sends company money offshore. The problem usually isn’t discovered until the real invoice from the real supplier comes in or the transaction is flagged in an audit. Due to the nature of international cybercrime, it’s unlikely you’ll be able to recover the funds even if you catch it quickly.
The Malware Click - Rather than go for the immediate cash grab, this style of attack asks your employee to click a link to download the invoice. The email may even look like the ones normally generated by popular accounting tools like Quickbooks or Xero, making the click seem safe. Once your employee has clicked the link, malware is downloaded that can trigger ransomware or data breaches. While an up-to-date anti-virus should block the attack at that stage, it’s not always guaranteed, especially with new and undiscovered malware. If it does get through, the malware quickly embeds itself deep into your systems, often silently lurking until detected or activated.
How to Stay Safe
Awareness is key to ensuring these types of attacks have no impact on your business. As always, keep your anti-virus and spam filters up to date to minimize the risk of the emails getting through in the first place. Then, consider implementing a simple set of procedures regarding payments.These could include verifying account changes with a phone call (to the number you have on record, not the one in the email), double checking invoices against work orders, appointing a single administrator to restrict access to accounts, or even two-factor authorization for payments. Simple pre-emptive checks like hovering the mouse over any links before clicking and quickly making sure it looks right can also help. Like your own business, your contractors and suppliers are extra careful with their invoicing, so if anything looks off - even in the slightest - hold back on payment/clicking until it’s been reviewed. Fake invoices attacks may be increasing, but that doesn’t mean your business will become a statistic, especially now that you know what’s going on and how you can stop them.
If you're looking for a good anti-virus solution that includes local tech team on hand - try our offer!
We aim to provide helpful and easy to understand tech articles.