Your hardware, software, and internet connection shape your computing experience. The last essential piece of the puzzle? The monitor you use.
The first thing you need to consider is what you’ll be using the monitor for most. Gamers will have different requirements than those professionals or families viewing photos.
Once you've determined monitor usage, you'll need to consider various specifications. We’ll discuss six of them below, but these will not all carry the same weight. Again, it depends on how you use your computer.
Simply put, a higher resolution equals a better picture. Resolution describes how many pixels there are. A Full HD 1080p resolution monitor – the industry standard – has a 1,920-pixel width and 1,080-pixel height. That’s a total of 2,073,600 pixels, which gives you a more detailed image.
Typical resolutions include:
This consideration brings size and screen resolution together to find the sweet spot. Think of it this way: the 2 million pixels from 1080p will look different on a 17-inch screen than on a 42-inch one. A greater pixel density results in sharper images. Typically, a 24-inch screen is good for 1080p, but you’ll go up in resolution as your screen size expands. You’ll see a lot of tech gurus recommending you choose a monitor with at least 109 pixels per inch (PPI).
With good color accuracy you can count on the monitor to reproduce colors and shades as intended. This may not be as critical for a general user, but someone editing photographs or creating branded marketing materials cares about this one.
Refresh rate tells you how many times a monitor updates information per second, and more is better. For gamers, it’s particularly important. So, if you’re going to be riding the bus in Fortnite, your response rate should be at least 75 Hz. Some even enjoy 144 Hz for a much smoother visual. Those who aren’t gaming should be fine at 60 Hz.
Response time relates to the time it takes to change the individual pixels on the monitor. While not as important for general or professional users, this matters to gamers. A monitor with higher response time gives the gamer a more immersive experience. A slower response time could mean blurred images in fast-paced action sequences.
There are different types of LCD monitor to select from, too:
At last count, Facebook has clocked up over 2.7 billion users, which makes the platform more attractive than ever for scammers and hackers. While you may be logging in to share your latest family photos or catch up with friends, the chances of accidentally triggering a scam or malware are increasing daily. Here’s how to stay safe on Facebook and stop the spread.
Look out for freebies and surveys
Everybody loves a freebie and for the most part the competition posts on Facebook are legitimate. On the flip side though, when you see a giveaway for vouchers from a mega-store, alarm bells should ring. ‘Do this quick survey and we’ll send you a $50 Amazon Voucher!’ - it’s too good to be true. Even one click can take you on a messy journey through the underbelly of the web, picking up trackers and malware at every stop and at the end, you’re asked to share the post so your friends can get a voucher too...except nobody ever gets the reward.
Check your permissions with games and quizzes
Whenever you access a new game or quiz, you’ll need to give permissions for it to access your Facebook profile. Most people click the okay button without any thought, but if you review the permissions you’re giving, you’ll often find they’re asking for a massive amount of personal data; public profile, friend list, email address, birthday and newsfeed. Do they really need ALL this information? Sometimes the shakedown is from necessity, but sometimes the apps are preparing to launch attacks against you both on and off Facebook. For example, when you call your bank they ask certain questions like your full name, birthday and maybe which high school you went to. All that information is in your Facebook profile and now shared with your permission.
Don’t friend people you don’t know
Having lots of friends is always nice, but that friend accept could end up costing you. It might be someone pretending to know you, or a picture of a pretty girl to entice men (and vice versa). Once you friend them, they get access to everything your friends can see. In this case, it’s more than the risk of someone knowing your personal data, you’ve just given them intimate access to your life. It’s exactly how romance scams start, and there are even cases where the victim finds photos of their children circulating the internet.
If it’s weird, forget it
It doesn’t happen very often, but hackers find ways to take advantage of flaws in Facebook. A common hack that keeps popping up in various forms is to embed malware in a link. The virus then infects your machine and contacts all your friends with an enticing message, like asking whether a picture is of them. When they click to view the picture, the virus catches them and their friend list, and so on. Facebook is pretty good at staying on top of these flaws, but they need time to fix it. Just like if you got a weird email with an attachment from a friend, use that same level of scrutiny in your Facebook and don’t open messages or links that seem out of place.
Set up two-factor authentication
It might seems unnecessary right now, since you already have a password protecting your account it is extremely important to have a two-factor authentication set up. It only takes few minutes to do but It will save you a lot of time later on and might even save you your whole Facebook account.
How Losing a Mobile Device Puts Your Entire Business at Risk
Losing a mobile phone or laptop is an experience that everyone dreads. The expense and inconvenience of buying a new device is unpleasant, but only represents a fraction of the damage done when a device is misplaced. The cost of data contained within every device can add up to many times more than the total value of the device itself.
Chances are, you already use automatic login on a large variety of online services. Each of these services are vulnerable to an attacker having possession of your device.
Usernames and passwords - An obvious place for an attacker to start is the likely long list of usernames and passwords saved for future use by your browser. This is often done to save time when logging into sites that you visit often. Almost universally, people opt to save login information so that they don't have to attempt to remember it every time they return.
In only a short amount of time, a browser is trained to log in to your Facebook, cloud storage, and bank details just by visiting the page using your regular device. These details, called up by the browser, are saved in a single list accessible to anyone with access to the device. For an unscrupulous stranger with a found device, this list represents a goldmine of information. Simply by finding a phone misplaced in public they may gain access to a huge array of services.
The problem can be made many times worse where a single password or a combination of similar passwords have been used across several accounts. In some instances, an attacker need only gain access to a single one and reuse the same stolen credentials across many sites and services.
Email - Email accounts are a key target for attackers looking for access to your personal information. It is a service that many take for granted, logging in once the first time they set up the device and using automatic login every time after. It is a service that also unlocks a great deal more than just private messages. Of course, an attacker having free access to read your personal emails is bad news, but with email access a malicious user can gain access to many of the most commonly used web services online.
Using the "forgotten password" button on many sites triggers a response that emails a password reset link to the email address registered on file. An attacker may use this feature to reset account passwords to one of their choosing. Doing this both grants themselves access to your account and denies you access to rescue it.
Contacts - One of the best features of instant messaging is that your contacts know the messages come from you. When a message is sent from your device to someone you know it displays along with your name, details, and likely a photograph too. This can lead to identity theft, one of the biggest concerns of a lost or stolen device.
With contact information already programmed in an attacker has an opportunity to impersonate you when speaking to anyone in your contacts list. Using your identity, an attacker may attempt to steal yet more details about you and your contacts.
Social Media - Your social media accounts are often the face of your brand. They can be a primary way to reach out and contact customers. They are almost always the first point of contact a client has with your business. They are also extremely vulnerable to being hijacked from a stolen device.
Fraudulent social media access can allow attackers to harvest both client and business data. Even without profiting directly, posting privileges can be used to cause irreversible damage to a business.
Protecting your business - Services, accounts, and entire businesses can be put in great danger by something as simple as misplacing an unsecured mobile phone or laptop computer.
Are You Sick of Ongoing IT Issues?
Like a persistent cough or muscle strain that won’t go away, many IT issues prove ongoing. Every time they come back you think about getting an expert’s opinion. Then, the cough fades, you can walk freely again, or your computers are back up and running. You keep on going. Until the next time. If you’re sick of ongoing issues with your IT, look to a Managed Service Provider (MSP) for help.
There are many IT ailments that can negatively impact your ability to do work. Let’s consider some of the particularly common ones, and why an MSP is the right prescription.
#1 Network and Internet issues.
Business is done online these days. Not being able to connect to the network and slow connections are frustrating. Without the Internet, how can you do your job? You can’t even check and send emails! Let alone access team documents or enter data into cloud-based accounting software. A lagging network also slows down application and data loading time. It may only be a few moments of thumb twiddling. But add that up over several times a day and multiple by employees. You’re looking at a decrease in productivity that adds up.
An MSP has the know-how to survey the IT environment for what's causing these frustrations. When there’s a problem, they’re at the ready to resolve it and help improve reliability.
#2 Repeated malware infections.
This can mean a couple of things. First, you don’t have effective system and application protections in place. These attacks shouldn’t be able to make it through the door in the first place. With the right firewalls, anti-spam, and protections, you should be able to keep your system on lock down. You don’t have to do this yourself. Your internal IT team has a lot to manage and monitor. Gain expert backup with an MSP reviewing your security protocols to keep the bad guys at bay.
Secondly, educate employees about the dangers of social engineering. Don’t let them keep falling for the pretexts and downloading malicious files. Also, ensure passwords are strong enough to avoid adding another point of entry.
#3 Printing problems.
Many businesses are printing less today, but we’re not done with hard copies entirely. So, when a printer starts whirring, spinning endlessly, or can’t connect, efficiency halts. Know that printers sold at big box stores are consumer grade quality. Avoid printer frustrations with solid business-class printers (which your MSP can identify).
#4 Application overload.
Maybe some of your employees prefer Dropbox. Others rely on their free Gmail accounts. This hodgepodge of options can cause chaos. Staff have difficulty remembering the passwords to all of the accounts they need. So, they simplify, and that makes their accounts more hackable.
Upgrading to business-grade versions of important applications is easier with an MSP. They'll help identify the software that best addresses your business needs.
#5 Aging technology.
You’ve had your current computers for ages. They are slower than you’d like, but you don’t have the time to look for something else. Plus, you can’t imagine having to learn something new. You’re too busy. But aging tech is more likely to fail, which could prove catastrophic if you don’t have the right systems backup.
MSPs know IT. Based on your individual business needs, they can suggest a plan of attack to update the IT and keep it secure. They can also provide backup strategies to prepare for the worst and recover quickly.
Basically, a managed service provider has your back when it comes to IT. Work with experts who focus on technology day in and day out. You’ll typically save money and gain time to spend innovating in your field.
Gain a competitive advantage with the support of an MSP. Check Pro+Tech today!
Got a New Device? Here’s the Essential Tech Prep You Can’t Afford to Skip
It’s tons of fun getting a new device. Whether it’s a new desktop, laptop or phone: the thrill of getting it home and opening the box is great. We know, we love tech too. It even has its own version of new car smell! Once you get it home though, there are a number of things that need to be done before it’s really usable – beyond snazzing it up with a new case or mousepad.
The sellers like to say it’s ready to use straight from the box – and it is – except not quite the way you need it to work. They’ll all turn on, look for wifi, and sure, you can type…but rather like when you buy a new fridge, simply turning it on isn’t enough – it’s still empty and you’re still hungry. A few minutes now to prep your new device will save you time, stress, and quite possibly money.
Today, we’re talking vital tech prep for new devices:
Security Updates and Fixes
From the factory to your hands, that device has been in the box for at least a month. In the world of security, that’s an eternity. During that time on the shelf, new viruses have come out and new software weaknesses have been discovered. Fortunately, new updates to combat these problems were also created, they just haven’t been downloaded to your device yet. We can make sure your essential software is up-to-date and set to stay that way. That way, you know your device is safe to go online.
Data Transfer From Old to New
Some people want to transfer everything from one device to another, others like to have a fresh start and keep the old device as a backup. We can either transfer your data entirely or just the things you use. For computers, we can even turn your old hard drive into an external drive that you can plug into your new computer and grab files as required.
Setting up Hardware
If your new device is a computer, you’ll need to hook it up to extra tech like a printer or webcam. These tasks that should be plug-and-play can sometimes send you loopy, especially when you’ve got a plug mismatch or incompatible drivers. We can help get you set up, with everything tested and working.
Setting up Email and Software
This is one people commonly forget and then struggle with. Email clients in particular, need special configuration to connect properly. Quite often, we find people are stuck only able to receive, with overflowing unsent mail that won’t go anywhere! We’ll get all your personal software and connections up and going.
Setting up the Network
While tapping in a wifi password is easy enough, it doesn’t mean your browsing is secure, or even as fast as it could possibly be. We can quickly determine which connectivity method will be best for your device and your needs, and hook you up with fast, robust security measures.
Lockdown Privacy & Permissions
Whether you have children and are looking to provide a safe online experience, files you’d prefer to keep private, or simply want to set up ‘profiles’ for each user to have their own login, we can quickly get your new device configured to meet your needs.
We love to help. Give us a call at 218-240-8802 or create a ticket from our website and we'll get your new device up and running.
We aim to provide helpful and easy to understand tech articles.