Technology Solved
A member of the Computer Troubleshooters franchise network

Is Your Business Protected by a Remote Monitoring and Maintenance Solution?

Have you recently heard that techy acronym RMM tossed around and felt clueless? If you aren’t sure exactly what RMM is or what it does, here’s a brief explanation:

Managed Service Providers (MSP) employ Remote Monitoring and Maintenance (RMM) tools to manage their clients’ IT systems and equipment. RMM can be described as a collection of IT tools that are loaded onto a client’s workstations and servers to gather information. These RMM tools collect information on a variety of issues such as functionality, maintenance schedules and the detection of problems, and then automatically reports the details back to the MSP at a remote location.

How Does RMM Work?

If that brief description of RMM still makes it a little difficult to envision, consider credit monitoring services as a comparable type of service. Credit monitoring services are based on the continuous monitoring of a customer’s credit status. Many of us use credit monitoring services to prevent identity theft, fraud and to stay informed about any changes in our credit reports. If there is any suspicious activity within a customer’s account, the credit protection service alerts the customer within 24 hours. The alert can come via an e-mail that states, “Hello Customer – please verify that you used your credit card last night to buy $3000 worth of shoes at a resort in the Bahamas.” Good to know, right?

Additionally, the monitoring service keeps you informed about inquiries on your credit report, late payments and changes to your credit rating. These automated alerts enable consumers to take swift action as needed. Other widely used monitoring services include messages from your health care provider reminding you that it’s time for your annual physical and lab tests. If we didn’t get those proactive reminders, we might forget to make the appointment for our car’s oil change or the dog’s rabies shots at the vet’s office.

RMM is a somewhat similar type of service in that it is continuously monitoring the “health” of your technology. RMM is not only looking for problems, inefficiencies and viruses, it enables technicians to actually conduct repairs from a remote location. Plus RMM not only monitors workstations and servers, but also firewalls, printers, and mobile devices. The RMM reporting system is so efficient that the MSP can often correct a problem before you are even aware of the issue. RMM also automates scheduled maintenance tasks such as managing and deploying operating system updates; defragmenting hard disks; sending backup verifications; running antivirus application updates and more. With a RMM solution in place, the System Administrator no longer needs to think about a schedule for maintenance,systems patches or alerts for updates. Your business is covered, because RMM is working behind the scenes in tandem with the MSP at an offsite location.

The Benefits of RMM

Business owners are always on the lookout for new solutions that will cut costs and increase efficiency. That’s the name of the game when it comes to maintaining your business’ competitive position in the marketplace. If you haven’t considered a RMM solution for your business, let Computer Troubleshooters outline the benefits.

  • Save time and money by eliminating onsite IT management and manual repairs that are handled by an overworked staff member. You can save money on infrastructure and cut employee costs with a RMM solution. All of your equipment can be managed from a centralized remote location with real-time information sent to certified professionals. If your business has more than one location, RMM is a perfect solution. Plus, the repairs and upgrades are handled at an offsite location with minimal interruptions. Remember, you can redirect your IT expenditures to more valuable uses for your business. With a RMM solution, your business can produce more results while spending less money!
  • Increase Your Efficiency  by minimizing costly technology disruptions. No business owner, employee or customer wants to waste time because the network is down due to unexpected problems, maintenance or upgrades that have taken longer than anticipated. RMM will minimize downtime through proactive remote monitoring of your network. You can rely on the early detection of problems and swift repairs. If you want to forget about those sudden “disc space is full” messages, RMM can be the answer. 
  • Gain the Competitive Edge   by improving customer satisfaction with increased operational efficiency. Provide enhanced service with up-to-date data and accurate inventory counts because your internal systems are functioning efficiently. Avoid the much dreaded “our network is currently down” conversation with a customer. Enhance your sales efficiency and increase your revenues with RMM troubleshooting the problems in advance. You can stay a step ahead of the competition when you lower operating costs and redirect your resources to support the true goals of your business.

So if you feel your business IT could do with a more proactive management approach, talk to us about RMM and how we can better manage your IT requirements.

Posted in Computer Repair | Leave a comment

Is Your IT Professional Also a Trusted Business Advisor?

As a business owner, one of the best moves you can make is to outsource your IT services to a professional provider. When it comes to outsourcing your IT service needs, there are a wide range of service options that involve varying levels of management responsibilities and costs. An IT professional can provide service for a single specific task such as help desk support or managing network security. At the other end of the service spectrum, an IT professional can assume management responsibilities for a client’s entire IT infrastructure. The advantages of outsourced services are improved operational efficiencies, cost savings and predictable service for a nearly-fixed monthly fee.

Increase Efficiency and Effectiveness with Mobility

An increasing number of businesses have switched to the outsourced IT service model. If you are already working with a contracted IT professional, then you have given your business the advantage of a head-start on the competition. The next big question is whether your business is actually making the best use of your contracted IT professional? It is likely that your IT professional is responsible for repairs, fixes and upgrades for your business’ computers and network problems. Computer repairs might be a key part of the contracted job, but there are probably some value-added IT skills that your business might not be fully

Do You Need a Trusted Business Advisor or a Computer Repair Service?

  • Trusted advisor is an important role that an IT professional can fill by understanding the business owner’s goals and long range plans for the business. By understanding the “big picture,” an IT professional can share expert technical information while understanding various solutions, costs and the latest technology trends. Functioning as a trusted advisor, an IT professional can make experienced recommendations that are in the best interests of the business’ long term goals as opposed to implementing quick fix, computer repairs.
  • Decisions about new technologies might not be in the comfort zone of most business owners. How can a business owner be fully versed in technology and able to identify the difference between the latest hype and a proven strategy? Which technology is going to provide the best return on investment? Is it the best strategy to implement a new technology now or wait until next year? Is your business currently compliant with network security requirements? Is your data safe? If your business needs to update its operating system, is now the time to purchase new computers? If your IT professional is acting as a trusted advisor, these larger issues can be explored together with the shared goal being the long term sustainability and success of your business.
  • Technology coach is another important element of the trusted advisor’s role. As a member of the client’s “inner circle,” the IT professional needs to bring a variety of skills to the table including the ability to carefully explain technology solutions. The ability to really listen to the business owner is also critical. One size does not fit all – especially when it comes to technology decisions. A knowledgeable IT professional must be able to not only recommend the best technology solutions, but also make the best recommendations for a business’s particular needs in the context of their industry, finances and long range goals. A proactive IT professional will be constantly evaluating new technology products, solutions and reliable vendors that will best serve the needs of the client’s business.
  • Thinking Beyond Computer Repair Services

    As a business owner, you know that we all need to think “outside the box” more often. Computer Troubleshooters encourages you think outside of the “computer repair” box and see that your IT professional is a valuable asset that you might be able to utilize to even greater advantage. Computer Troubleshooters values your business and we want to be your trusted advisor when it comes to technology solutions! Give your local Computer Troubleshooters office a call today. We are ready to listen.

Posted in Computer Repair | Leave a comment

The Final Countdown to Microsoft’s XP April 8th Deadline

In 2002, Microsoft presented its official Support Lifecycle Policy that was based on detailed customer feedback. The predictability of support services was cited as a very important issue for Microsoft’s customers. Microsoft responded accordingly by alerting customers years in advance that the XP operating system and Windows 2003 have an “end of life” date scheduled for April 8, 2014. Although XP and Windows 2003 have been very popular, Microsoft will no longer support these products after the April 8th deadline. This information has been well-publicized by Microsoft for many years. There are still over 600 million worldwide XP users and it seems that many have chosen to simply ignore these repeated notifications. We can assume that users who have not upgraded by now fall into one of two categories. The first group includes those who are willing to take their chances and plan to continue using Microsoft legacy products that are no longer supported. The second group is XP users who are truly unaware of the deadline. Do you fall into one of these two groups?

The Final Countdown is Now!

After years of these “end of life” warnings, XP and Windows 2003 are now in the final days of the deadline countdown. Surprisingly, one of Microsoft’s latest strategies has been to ask for help. Computer Troubleshooters recently posted a story on our Facebook page about how Microsoft had begun taking a grassroots approach to spreading the word. Microsoft resorted to asking for help by seeking volunteers to remind business owners, friends, family and colleagues about the upcoming XP deadline. Via their blog, Microsoft asked experienced and technically savvy users to help others understand why it is important to make the switch to Windows 8 and to make the upgrade now!

Ignoring this Deadline is Not an Option

Some users claim a variety of reasons for resisting this XP upgrade, but don’t forget that there are a few key reasons you cannot ignore this deadline. The issues for residential users can be serious, but the consequences for businesses hold additional threats and even possible legal ramifications.

Here’s How You and Your Business Can Be Impacted by Not Upgrading

  • Security Risks: Without the security provided by an updated operating system, all of your business data and personal information are vulnerable to harmful viruses and spyware. Malicious viruses will very likely be unleashed on XP’s “zero day.” Undefended computers can be completely immobilized with viruses quickly spreading over the net to PCs still operating on XP. No business owner wants to think about a virus spreading through all of their computers. All of the data that keeps your business functioning will be placed at risk.
  • Compliance Issues: Businesses that continue to operate on XP can actually face compliance issues. Resulting compliance issues can lead to suspension of certifications, and/or public notification of the organization’s inability to securely maintain its systems and customer information. Compliance problems can place your business in legal peril and seriously damage your business’ reputation in the process.
  • Upgrade Expenses: If you think a system upgrade is just too expensive, Computer Troubleshooters urges you to reconsider this viewpoint. Many technical experts consider using an unsupported product such XP, as an act of irresponsibility on the part of the business. Remember that the problems that are likely to arise can cost your business significantly more than the upgrade. Don’t be penny-wise and pound foolish when it comes to investing in an upgrade.
  • Custom Support Available for a Price: In fact, there will still be some support available to XP users after the deadline, but at the annual cost of $200 per device. Depending on the number of computers your business is using, it’s not much of a bargain. In reality, this is only a temporary, contingency plan.

Upgrade Today!

Playing “chicken” with this deadline is tempting fate and there can be serious consequences. You can find yourself in the cross-hairs of cybercriminals on April 8th and potentially face business compliance problems. If you are still using XP, take action today. Call Computer Troubleshooters and one of our experts can help you understand your XP migration options and work with you to develop an upgrade strategy. Call Computer Troubleshooters before it’s too late. The final countdown is now! Are you prepared?

Posted in Computer Repair | Leave a comment

The Final Countdown to Microsoft’s XP April 8th Deadline

In 2002, Microsoft presented its official Support Lifecycle Policy that was based on detailed customer feedback. The predictability of support services was cited as a very important issue for Microsoft’s customers. Microsoft responded accordingly by alerting customers years in advance that the XP operating system and Windows 2003 have an “end of life” date scheduled for April 8, 2014. Although XP and Windows 2003 have been very popular, Microsoft will no longer support these products after the April 8th deadline. This information has been well-publicized by Microsoft for many years. There are still over 600 million worldwide XP users and it seems that many have chosen to simply ignore these repeated notifications. We can assume that users who have not upgraded by now fall into one of two categories. The first group includes those who are willing to take their chances and plan to continue using Microsoft legacy products that are no longer supported. The second group is XP users who are truly unaware of the deadline. Do you fall into one of these two groups?

The Final Countdown is Now!

After years of these “end of life” warnings, XP and Windows 2003 are now in the final days of the deadline countdown. Surprisingly, one of Microsoft’s latest strategies has been to ask for help. Computer Troubleshooters recently posted a story on our Facebook page about how Microsoft had begun taking a grassroots approach to spreading the word. Microsoft resorted to asking for help by seeking volunteers to remind business owners, friends, family and colleagues about the upcoming XP deadline. Via their blog, Microsoft asked experienced and technically savvy users to help others understand why it is important to make the switch to Windows 8 and to make the upgrade now!

Ignoring this Deadline is Not an Option

Some users claim a variety of reasons for resisting this XP upgrade, but don’t forget that there are a few key reasons you cannot ignore this deadline. The issues for residential users can be serious, but the consequences for businesses hold additional threats and even possible legal ramifications.

Here’s How You and Your Business Can Be Impacted by Not Upgrading

  • Security Risks: Without the security provided by an updated operating system, all of your business data and personal information are vulnerable to harmful viruses and spyware. Malicious viruses will very likely be unleashed on XP’s “zero day.” Undefended computers can be completely immobilized with viruses quickly spreading over the net to PCs still operating on XP. No business owner wants to think about a virus spreading through all of their computers. All of the data that keeps your business functioning will be placed at risk.
  • Compliance Issues: Businesses that continue to operate on XP can actually face compliance issues. Resulting compliance issues can lead to suspension of certifications, and/or public notification of the organization’s inability to securely maintain its systems and customer information. Compliance problems can place your business in legal peril and seriously damage your business’ reputation in the process.
  • Upgrade Expenses: If you think a system upgrade is just too expensive, Computer Troubleshooters urges you to reconsider this viewpoint. Many technical experts consider using an unsupported product such XP, as an act of irresponsibility on the part of the business. Remember that the problems that are likely to arise can cost your business significantly more than the upgrade. Don’t be penny-wise and pound foolish when it comes to investing in an upgrade.
  • Custom Support Available for a Price: In fact, there will still be some support available to XP users after the deadline, but at the annual cost of $200 per device. Depending on the number of computers your business is using, it’s not much of a bargain. In reality, this is only a temporary, contingency plan.

Upgrade Today!

Playing “chicken” with this deadline is tempting fate and there can be serious consequences. You can find yourself in the cross-hairs of cybercriminals on April 8th and potentially face business compliance problems. If you are still using XP, take action today. Call Computer Troubleshooters and one of our experts can help you understand your XP migration options and work with you to develop an upgrade strategy. Call Computer Troubleshooters before it’s too late. The final countdown is now! Are you prepared?

Posted in Computer Repair | Leave a comment

Adapting Your Business to a Mobile on the Go World

Mobility has quickly transformed the way most of us are now working. According to recent research over 50% of mobile phone users use now regularly use their mobile phone to access the internet. This rate has nearly doubled over the past three years. Are you using mobile internet features to enhance your business?

Increase Efficiency and Effectiveness with Mobility

The increased need for productivity coupled with affordable technology has shifted employees away from being tied to a desktop PC. Workers equipped with mobile devices are now communicating with customers from their cars and accessing data from the Cloud while working at home. Employers and employees can keep projects up to date by easily sharing information via mobile devices at any hour of the day. Mobile flexibility is enabling businesses to quickly move forward with enhanced efficiency.

Consider some of the following mobile efficiencies that can help your business:

  • Continuously Connected employees have the flexibility to work from home, while on the go and during travel. Conducting business is now a 24/7 proposition. Accessing information from the office while you are at the airport creates greater efficiency for you and your business. Perhaps you don’t want to be at the airport? Virtual meetings can conveniently connect you with colleagues and customers while saving time and money. Productivity with flexibility has become our new reality.
  • Protecting Company Data has become an increasingly important concern for business owners with the advent of BYOD (Bring Your Own Device). Flexibility has ushered in the trend of employees bringing their own mobile devices into the workplace. This means that company data is probably stored on employees’ mobile devices. What would happen if an employee’s laptop is stolen and it contains confidential business data? Many businesses are now protecting sensitive data by using remote wipes and encryption software on employees’ personal devices in addition to the use of mobile virtual workspaces. Businesses need to establish written BYOD policies and educate their employees about security practices. Many businesses now require employees to sign BYOD contracts. If your business doesn’t have BYOD guidelines in place, you are already falling behind in appropriate business practices.
  • Online Resources can efficiently provide businesses with professional training, technical skill development and new product training with the agility of “as needed” availability. Employees can connect to e-learning opportunities through their iPhone or Android devices from home. Business owners can easily take advantage of online management guides and financial tools that can benefit their business.
  • Mobile Apps are available to help you run your business more effectively and efficiently. Business owners previously needed a core foundation of various office programs, an e-mail system and some industry-specific software to keep their business functioning. Now there are a wide array of mobile Apps that can help business owners with time management, scheduling, travel expenses, cash flow, accounting and e-mail organization. There are Apps for nearly anything a business owner needs and they are easily available. Many of these Apps enable small businesses to compete with larger companies, plus you can run your business from anywhere.

Is Your Business Prepared for a Mobile World?

Computer Troubleshooters can work with you to assess your mobility needs and develop a plan to keep your business’ technology up to date. If your business needs to move to Cloud services, utilize mobile Apps or strengthen data protection – we can help. Computer Troubleshooters is here to help your business stay productive and efficient through mobile technology. Give your local Computer Troubleshooters office a call and one of our computer professionals will be happy to help you.

Posted in Computer Repair | Leave a comment

Be Sure You Are Protected Against Computer Viruses

By the late 1980’s, computers were becoming increasingly popular and almost immediately computer viruses arrived on the scene like a plague of destructive locusts. No one is celebrating the fact that computer viruses have now been around for over 28 years. Especially considering that over this time there have been a number of viruses that have wreaked havoc worldwide. The key to combating the ongoing threat of malicious computer viruses is a combination of vigilance and protection. Since computer viruses aren’t going away anytime soon, Computer Troubleshooters wants to help you stay safe by providing information about how these viruses spread and how to protect your computer.

What is a Computer Virus?

The defining characteristic of a virus is that it’s a self-replicating program that has become installed on a computer without the user’s knowledge or consent. It’s a secret program that is typically hidden within the code of another known program. Once that program is activated, the virus begins infecting the computer by inserting its own replicating code within files. The bad news is that viruses spread quickly. The symptoms of a virus can range from a completely non-responsive computer to spontaneous crashing and corrupted data. A virus can also delete everything on the hard drive, use the email program to spread itself to other computers and display annoying messages on the screen.

How Does a Computer Become Infected with a Virus?

Computer viruses spread across the Internet through online downloads of infected audio and video files. Frequently, viruses are contained within illicit software that is downloaded from the Internet. Viruses also come disguised within e-mail attachments, via instant messaging messages, and are contained within images and digital greeting cards. This is why computer users should never open an email attachment unless it comes from a known source. Even then, be on guard. Recently, Computer Troubleshooters warned our clients to be aware of CryptoLocker, a virus that hijacks computers with a demand for $300 in ransom. This virus was delivered via e-mails that appeared to be from a reputable companies, versions include organizations such as UPS, FedEx, Australian Banks, the Australian Tax Office, & the Australian Federal Police. Even if you get a message that seems legitimate, proceed with caution.

What is the Cost of Computer Viruses?

Worldwide computer viruses cost billions of dollars’ worth of economic damage each year due to systems failure; wasted computer resources; identity theft; lost, stolen and corrupted data; increased labor and maintenance costs; in addition to untold amounts of anxiety, frustration and lost hours trying to remediate the damage. Internet usage continues to grow at a rapid rate, so a virus can start spreading globally within minutes. Plus with the advent of Smartphones, viruses now have more portals and can travel even further and faster.

What’s Your Protection Plan for Computer Viruses?

At home and at the office, continue to be vigilant about Internet downloads. Remember to be cautious about opening unknown e-mail attachments and always “Stop. Think. Connect.” Stay alert and be proactive by educating your employees and family members about appropriate security precautions. Additionally, keep your computer current with the latest updates and antivirus tools. Even with those safeguards, don’t be lulled into a false sense of security that you are totally protected because there is no existing software that is able to catch every new viruses that pops us.

Computer Troubleshooters Can Help with Anti-Virus Protection

If you believe that your computer is infected with a virus, contact Computer Troubleshooters for assistance. Additionally, we strongly recommend an annual anti-virus protection assessment for your business and home computers. Computer Troubleshooters is happy to offer security recommendations and help you develop an anti-virus protection plan.

Posted in Computer Repair | Leave a comment

Creating a Technology Plan for the New Year

We all make personal New Year’s resolutions on January 1st. This year, why not commit to a few professional resolutions for your business, too? Computer Troubleshooters strongly encourages you to put a new technology plan at the top of that list for 2014. We are offering some technology planning guidelines that can help you form a strategy as you think about your business resolutions and professional goals for 2014.

Technology Solutions That Can Benefit Your Business in the New Year

Backup Services: Cloud services include data storage and backup systems plus access to software programs. Information stored on the cloud can be shared with other users anywhere and at any time. Data shows that 61% of surveyed small businesses are currently using some form of cloud-based service with another 5% planning to add cloud services by 2014. If your business is not currently using the cloud for backup service, it’s time to make a plan for switching over. The cloud can provide data storage plus a variety of services and benefits. Put the cloud at the top of your list.
Security Measures: Bring Your Own Device (BYOD) research shows that over two-thirds of surveyed companies already have employees using their own computers on the job. The advantage is that BYOD makes it easier for employees to stay in constant contact and also work from home more productively. The efficiency of BYOD comes with the responsibility on the part of the business for training employees on security policies and standards. Safeguarding your network and ensuring the confidentiality of your data is critical to the security of your business.
Disaster Recovery: Within the past year natural and weather related disasters have raised the business community’s concerns over data recovery solutions. As you consider your disaster recovery plan, try to consider the consequences of losing all of your business’ data. Think of the lost revenue if your business is off-line for several days. This will remind you of how important it is to have a solid disaster recovery plan in place. There are a variety of disaster recovery plans available. After the disaster occurs, it’s too late to wish you had kept that New Year’s resolution for a disaster recovery plan! Commit to a disaster recovery plan now.
Managed Services: Technology is a key component tied to the success of your business. It enables your business to stay efficient, productive and competitive in today’s marketplace. That is as long as your technology systems are up to date and functioning properly.
Have you considered a managed service plan? A managed service provider develops a customized IT service plan that will suit the budget and the needs of the client’s business. A service plan can help your business reduce IT operational costs while actually providing a higher level of IT service.
The need for a managed service provider has become increasingly important as business owners need to make informed and increasingly complex choices about technology solutions.

Prepare for 2014 – TODAY!

Computer Troubleshooters can work with you to assess your IT needs and develop a customized plan for your business. If your business needs to develop a backup system, move to cloud services or develop a Mobile App – we can help. Computer Troubleshooters is here to help your business stay productive, efficient and competitive in 2014. Give your local Computer Troubleshooters office a call and one of our computer professionals will be happy to help you.

Posted in Computer Repair | Leave a comment

Be Prepared To Fight Cyber Crime – Our Checklist

Cyber Crime continues to grow at an alarming rate worldwide and we are all potential victims unless we take a few precautions, here is a brief explanation of the risks & our prevention checklist.

What does “cyber environment” actually mean? We can interchange that term with others such as information technology, computer networks, Internet, digital, wired and virtual. It’s the non-physical terrain created by computer systems that is keeping us more interconnected than ever before. The average person now spends over five hours a day in online activities related to jobs, education, e-mail, mobile banking, health care, online shopping, travel, entertainment and social media communications. All of this digital convenience also presents a wide range of threats, dangers and responsibilities. Especially with more information shared via Smartphones, tablets and other mobile devices, we need to be increasingly vigilant about the security of our personal data.

The Dangers of Cyber Crimes

For individuals, the ever-present danger of cyber crimes includes hacker theft of confidential information, money, credit, banking and even medical information. This type of crime often results in personal identity theft. Other facets of cyber crime include online bullying and stalking that can affect your children. Malicious business scams are probably the most common. The threats to businesses include the loss of intellectual property, stolen client data or harm to the business’ computer network. The statistics on cyber crime are sobering. In 2013, online scams had increased by 355%. Cyber attacks on small businesses had increased by 18% over the past two years, with over 60% of these targeted businesses closing their doors within six months.

How to Protect Yourself, Your Family and Your Business from Cyber Crime

In both our professional and private lives, each of us needs to assume responsibility for our online activities. These responsibilities involve a combination of equipment maintenance and software updates coupled with appropriate online behavior and a constant vigilance against criminal activities. We suggest that you start with this brief checklist:

  • Maintain a Clean Machine by running the most recent operating system, security software, apps and web browser as a defense against online threats such as viruses and malware.
  • Firewalls and Encryption should be in use by businesses to secure their internet connection. Educate employees about passwords and internet security guidelines.
  • Spam and Phishing are hazards you can avoid. Don’t open e-mailed attachments from strangers and never click on unknown links contained within e-mails. Enable the filters on your e-mail programs to screen for spam. Beware of messages indicating upgrades, technical updates and special offers. These tactics are no longer limited to e-mail, so be vigilant when on social networking sites.
  • Backup Your Computer and Mobile Device in the event that your equipment is physically stolen or lost. You might have lost the device, but the data is preserved by the backup system. The theft of smartphones has become a major crime. Be aware of where your smartphone is at all times. If your phone is missing, consider using locator apps and you can even use a remote wipe to clear information from your missing phone.
  • Secure Your Device by activating the key-lock feature and using a password. A particularly complex password is suggested. Change your passwords periodically.
  • Safeguard Your Personal Information when using unsecured, public connection by avoiding apps or websites that require your password. These are the types of connections accessed in airports, hotels, coffee shops and libraries. You might want to reconsider doing your online banking in an airport.
  • Manage Your Social Network Privacy by reviewing the latest changes to privacy settings and be sure you are using these settings properly. Think twice about what you are posting on these sites – more people might see this than you think. Educate your children about social media behaviors. Hide your e-mail address from online profiles.
  • Disposal of Older Computers is another source for the theft of data. Remember when you delete files, the information is not actually erased. The hard drive should be overwritten, degaussed or physically destroyed. Never dispose of a computer that hasn’t been secured. Your information could end up in the hands of a criminal.
  • Computer Troubleshooters Can Help Your Business with Cyber Security

    Computer Troubleshooters can do an assessment of your business’ computer network. We can also provide recommendations for establishing a strategic approach to cyber security and assist you with a variety of solutions to reduce the risk of a security breach. We strongly encourage you to prepare your business for the threat of a cyber security crime, call your local Computer Troubleshooters office today for help and advice.

Posted in Computer Repair | Leave a comment

Microsoft Windows XP: End of Life Issues for an Operating System and How This Will Impact Your Business?

Who Plans A Funeral Years And Years In Advance? Microsoft – That’s Who!

Next year on April 8th, Microsoft officially ends Windows XP operating system’s life cycle. Even with over 600 million worldwide users, Microsoft will no longer sell or support Windows XP and Office 2003. There will be no automatic fixes, updates, free assisted online technical support and security updates. Unfortunately, many of the 600 million users either don’t know or have forgotten about the funeral. If you like it or not, it’s time to accept the death of XP and make a plan for the future.

“When XP goes out of support, it’ll be a lot like driving a car that you can’t buy parts for anymore,” said Jay Paulus, Microsoft’s Director of Windows Small Business Marketing.

If you are feeling like you missed the memo, apparently you are not alone. Microsoft’s customer surveys indicate that for enterprises with 5-250 employees, only 55% of them know about the end of XP and 70% have no idea what the change will entail or how it will impact their business!

Are you part of this group?

Upgrade or Your Business Might Face the Consequences of Security and Compliance Issues

You should take this situation seriously and find out immediately if any of your computers are still running XP. If the answer is yes, your business can be negatively impacted with some significant consequences. You should consider the following information as you make your Windows XP migration plan.

  • Security Risks: The biggest problem is the security threat to your business. Without the security provided by an updated operating system, all of your business data and personal information are vulnerable to harmful viruses and spyware. There is a strong likelihood that malicious viruses will be unleashed on XP’s “zero day”, leaving undefended computers immobilized and viruses spreading quickly over the net to PCs still operating on XP. No business owner wants to think about a virus spreading through all of the computers that keep your business functioning.
  • Compliance Issues: For many businesses, continuing to operate XP can result in compliance issues leading to the suspension of certifications, and/or public notification of the organization’s inability to securely maintain its systems and customer information. Compliance problems can place your business in legal peril and seriously damage your business’ reputation.
  • Upgrade Expenses: As a business owner trying to control costs, do you think an upgrade will be too expensive? Think again. Some experts view a business that continues to run XP as a liability bordering on irresponsibility. The problems that are likely to arise can cost your business significantly more than the upgrade.
  • Custom Support Available for a Price: For businesses in denial about the end of XP, support will actually remain available after April 8, 2014 but at the annual cost of $200 per device. Depending on the number of computers your business is using, it’s not much of a bargain. In reality, this is only a temporary, contingency plan.

Security and compliance are perhaps the two most critical issues facing the business community in regards to the end of the XP life cycle. Tim Rains, Microsoft’s Director of Trustworthy Computing, stated in Microsoft’s Security Blog, “After April 8, attackers will likely have more information about vulnerabilities in Windows XP than defenders.”

Do You Have an XP Migration Plan in Place?

Microsoft is fully invested in ending XP’s life cycle, so this is not a situation you can simply ignore. It’s happening on April 8, 2014, so mark your calendar. Most large organizations have been working on their migration plans for years. For small-medium sized business owners, the hour is getting late so we strongly encourage you to take action today!

Windows 7 and Windows 8 offer greater efficiency for enhanced productivity; more fully integrated WiFi and Bluetooth; improved user-interface; less down time and decreased labor costs for repairs. Again, Computer Troubleshooters encourages you to take this situation seriously and develop a migration plan immediately. Our experts can help you understand your XP migration options and work with you to develop an upgrade strategy for your business. Call your local Computer Troubleshooters office today before it’s too late.

Posted in Computer Repair | Leave a comment

Online Backup Solution – Why Do You Need One

Do You Have a Reliable and Tested Backup System in Place?

Imagine that you are working on some critical financial data at the office or perhaps sorting through family photographs on your computer at home. What would you do if the computer containing all of your business and/or personal information crashed and your entire “digital life” suddenly vanished? What would you do if your computer was lost in a fire, destroyed in a flood or stolen at the airport? Do these scenarios put you into an automatic panic thinking about your data? At least the information can be recovered because you have a reliable and tested backup solution in place. Right?

Backing up is something we all know we are supposed to do. Yet, sometimes we feel that we are simply too busy to spend the time researching various secure backup solutions or we feel that money should be budgeted in other areas. Many of us are still relying on old tapes, stacks of disks and USB flash drives as our backup plan. Even if you have an external hard drive backing up your computer, this system isn’t entirely foolproof. External hard drives can also crash or be stolen and all of your information will be gone. Once disaster strikes and all of your business or personal information have been wiped away, it’s too late to think about what you should have done. Trying to recover this information is impossible in most situations and extremely costly.

We strongly encourage you to be proactive and establish a backup plan immediately. Even if you already have a backup plan in place, you should reevaluate the solution as technology is evolving rapidly!

Backup Solutions Move Online

As ominous as the disaster scenarios above may sound, the good news is that backup options have become significantly more reliable and widely used. Technology and increased internet speeds have switched backup processes to on-line data storage. Here are a few informative pointers on how on-line backup systems work:

  • The on-line backup provider will download their software to your computer.
  • The application simply runs in the background backing up your data to the provider’s secure storage servers. It’s a simple automated system that backs up everything on your computer. Not just select files – everything.
  • Most on-line backup providers encrypt stored data in a class known as “Bank Grade Security.” With this high-level of data encryption, there is no need to worry that your business or personal information can be seen by others.
  • A user friendly interface enables you to set-up a backup schedule and to download and restore files once the files are backed up.
  • Think of on-line backup as insurance for your data. If you lose any files, you retrieve the information via the on-line backup system. You pay a monthly fee to keep your data insured.
  • On-line backup keeps your file structure intact. You can search for backup information just as you would find the information filed on your computer. It’s efficient and user friendly.
  • On-line backups provide easy recovery if disaster happens to strike.

Why On-Line Backup is Your Best Solution

On-line backup is the best solution for ensuring the security of your business data and also personal information. On-line backup provides protection for your data in the event of a computer crash, theft or natural disaster while also delivering an elevated level of security. Within the realm of on-line backup solutions, there are a number of vendors and solutions to consider.

Contact your local Computer Troubleshooters to help you determine the best backup scenario for your business or home use. Be sure that your data is safe, secure and backed up.

Posted in Computer Repair | Leave a comment