Tech Tips

 

Tips for Exploring UPS Battery Backup

Uninterruptible power supply (UPS) is a type of power supply system that contains a battery to maintain power to provide power to electronics in the event of a power surge or outage. Typically UPS power keeps a personal computer (PC) running for several minutes after a power outage, enabling you to save data that is in memory and shut down the computer gracefully. Many uninterruptible power supplies now offer a software component that enables you to automate backup and shut...

Tips for Isolating WIFI Clients

Wireless Client Isolation is a security feature that prevents wireless clients from communicating with one another. This feature is useful if you want to share WIFI with the public or you have a BYOD policy in your business, client isolation adds another level of security to limit attacks and threats between devices and gives you controls to preventing clients accessing your back-office servers, equipment and resources. This feature confines and restricts clients connected to the Wi-Fi network. They can’t interact...

Tips for Securing WIFI Networks

The good news is that it's not too difficult to lock-down your WIFI networks, which will both prevent others from stealing your internet and will also prevent hackers from taking control of your computers through your own wireless network. Here are a few simple steps to help secure your wireless network: Step 1. Open your router settings page First, you need to know how to access your wireless router’s settings. Usually, you can do this by typing its IP address into your...

Tips for Enabling WIFI Encryption

In order to prevent other computers in the area from accessing your WIFI network and data, you need to encrypt your WIFI signals. You might already have this in-place however it wouldn't hurt to double check your settings to ensure your protected. There are several encryption methods for wireless networks, including WEP, WPA (WPA-Personal), and WPA2 (Wi-Fi Protected Access version 2). WEP is basic encryption and therefore least secure and can be easily cracked easily and should NOT be used...

Tips for Implementing 4G for Internet Redundancy

In today’s business reliable access to the internet is your lifeblood, without internet you won't be able to send/receive emails and possibly be unable to process orders and run your normal operations, and if you running a phone system that’s using VoIP or SIP you will also be unable to take and receive calls which will not only annoy you and your staff, it will also prevent your customers from contacting you, which could possibly cause serious reputation damage...

Tips for Choosing Anti-virus and Internet Security

John McAfee turned some heads in the security community a few years ago when he declared that the virus protection software industry, which he is widely credited with creating 30 years ago, is dead. “In 1987, new applications for the Windows platform were being developed and released at a rate of about one new application per month,” he wrote. “Today, there are over 10 million malicious apps.” In short, conventional antivirus techniques simply can’t keep up. Many security experts don’t agree....

Tips for Password Managers

A password manager is a software application that is used to store and manage the passwords that a user has for various online accounts and security features. Password managers store the passwords in an encrypted format and provide secure access to all the password information with the help of a master password. There are many types of password managers, differing in the way they encrypt the information, type of storage and the additional features provided. Password managers usually incorporate some...

Tips for Purchasing a UPS (battery backup)

Power outages, brown-outs, surges and electrical storms are all mortal enemies of computer equipment, the damaged they can cause may immediately fry equipment or sometimes causes minor damage that takes weeks before equipment fails or degrades. Power surge equipment should always be used on computer equipment, however, that only protects your equipment from surges, a brown-out or power outage can also cause just as much damage to equipment and even permanent loss of data, for example a server uses Memory...

Tips for Proper Computer Equipment Ventilation

All computer equipment or electrical device used by your ICT needs to stay cool. Computers have fans and various heatsinks that draw out and dispel heat from components. Networking equipment like Routers, Modem, Switches, Hubs etc typically don't use fans to dispel heat, instead they use small vents in their case or sometimes their case is the heatsink, this is why its important you don't stack devices on top of each other, if equipment lives within a data cabinet...

Tips for Storing Data Offsite (Secondary location)

Throughout this portal we will refer to different Offsite Backup locations as "Primary" and "Secondary”, Primary backup and the Secondary backups live in different geographical locations (typically different States or Countries), both Primary and Secondary backup data is exactly the same, this method is used to protect against hackers, fires, floods, outages or other events that might impact both your main data source and the primary backup site. Let’s look at a couple of scenarios that utilize a Secondary backup...

Tips for Testing Backups

When it comes time to restore data from a backup, you want to feel confident that your data is going to be there, this is why it's critical to test your backups regularly, this could be once a month and can be added to your DYI Maintenance register. If you were to adopt the Grandfather-father-son backup scheme and you had a corrupted backup in the cycle that was never picked up, there is a real potential for significant data loss,...

Tips for Offsite Storage

Storing data offsite refers to geographically separating data from its main data source, or it can mean storing data somewhere that's not in your office, like the cloud. These days cloud storage is very popular due to its ease of access, however storing data in the cloud comes with some considerations around security, a more security conscious method of storing data online would be data-centre storage or a private-cloud, which is similar to the traditional cloud (some would argue exactly...

Tips for Evaluating Your IT Needs

Looking for new IT systems can be daunting and the options seem to change constantly, so we will boil it down into 4 simple steps that will help you narrow down which system is best for you business. Create a list of what the new system needs to achieve. Collect staff input with Observations, Surveys or Interview to understand how a new system would make their job more efficient and their pain-points with the current system. List all the...

Tips for Storing Data

We recommend keeping duplicates of data backups in different geographical locations for safekeeping, it is critical that data is encrypted to prevent someone from viewing the content. You should also consider what type of backup media you are going to use, each has its limitations and some can become very expensive to maintain. Backup Storage Options: Portable USB hard drives are the most common and cost-effective way to store large backup files, these drives are fast and can be reused...

Tips for Transporting Data

To ensure your data is safe it should be sent to various locations for safekeeping, however transporting data can be risky business, if the backups aren’t encrypted you run the risk of someone viewing your data, the risk increases when staff are asked to take data home with them on USB hard-drives, sometimes these drives get left in cars or knocked around in transport, which can cause data loss. Moving data to the cloud (in addition) will provide robust...

Tips for Encrypting Data

You wouldn’t perform Internet banking without encrypting your traffic, the same goes for your backup data, encryption is the only way to prevent someone from finding or stealing one of your backup files and viewing all the content with it. Have you considered what would happen if your IT guy gets hit by a bus, do you have all the “keys” need to decrypt your data? Adding encryption to your backup data can be performed during the backup process and most...

Tips for Finding your important data

When backing up data, it’s important to understand exactly which data needs to be backed up, you can do this by making note of each system or platform you use on a daily and monthly basis and noting down how critical that system/platform is to your business, from there you can determine if there is critical data within that system/platform that needs to be backed up. You may need to ask key staff from different departments which systems/platforms they use...

Tips for Backing up data

Data backups are never straightforward and it's not uncommon to have multiple software packages and methods backing up your data, this makes documentation of backups even more critical in understanding which data needs to be backed up. When approaching backups, we should consider the below items, you may want to add these to your backup plan: What Systems/Platforms are you backing up? Do these systems/platforms use different backup methods or software? How many days old can your backup be, before...