Keeping Your Remote Computing Environments Safe

There are more people working remotely than ever before. Depending on where you are and your connection to the Internet, performance may be an issue. While your connection may be slower than what you are used to in an office, keeping the connection secure is incredibly important. Remember, the bad guys are working from home too and have nothing else better to do than hack vulnerable computers.
 
Here are some suggestions for how best to secure your home systems.  If any of this is gibberish, please call us. 607-257-3524.  We can help you out.
 
  • When connecting to your home WiFi make sure that the router is password protected and not using the default admin password that it came with.

  • We're all working over the phone, via email, or by text. If you get an unexpected tech support phone call, email, or text, DO NOT GIVE OUT ANY PERSONAL INFORMATION including passwords. Verify that every tech support contact (even from us) is from somone you know and can trust. 
  • Make sure you office connections are over a VPN or other secure connection. 

  • Make sure that your home workstations, laptops, and tablets have Anti-Virus software installed and that the "definitions" are up to date.

  • Watch out for fake emails, texts, and phone calls.  Although the Chinese language fake phone calls have stopped (for now), there are plenty more fake ones out there.  Confirm everything. 
 
Like your personal health, keeping your technology safe is more important that ever.

 

Deploying Two-Factor Authentication!

 how to deploy two factor authentication

 

Put those passwords in their place!

Cybercrime is constantly on the rise. It seems like every quarter there is a new breach of a major website, with hackers stealing the online credentials of hundreds of thousands to millions of unwitting users, including small businesses. A Poneman Institute study showed that the average cost of a data breach increased from $7.91 million in 2018 to $8.19 million in 2019 which is the highest cost globally.
 
Passwords offer one level of protection. But for a deeper level of protection, you also need two-factor authentication.

[More]

Is Private Browsing Really Private?

A lot of people get confused with private browsing thinking it's something that it is not. This is a good explanation of what it is and how to get want you likely "really want"!

You probably expect your “private” browser to be private. It’s not. So-called private browsers are a standard feature of several web browsers, and have private-sounding names like Private Browsing, Private Tab, and Private Window. Using a private browsing mode can help you to do a lot of things, but maintaining total privacy isn’t one of them.

That doesn’t mean they’re not useful.

It’s important to understand what a private browser does, and does not, do. For instance, do you know that browsing history can still be accessed in most browsers when you browse in private mode? Chances are, you want privacy and safety when you go online. So how do you get it?

Hint: Think VPN or virtual private network.

[More]

Upgrading your PCs

We get it! Like the majority of our clients, The Computing Center is a small business. For us to continue to be successful, we need to carefully plan all our equipment purchases. And like many of our clients, we do keep some of our equipment longer than what's recommended by manufacturers. But when it's time, we carefully select the right machine for the job at hand. We also select machines that will last. 

Is it time to consider replacing your business computers?

So, you’re a small business owner and confident you’re on the path to success. You’ve defined your target market. Set realistic goals. Carved out your budget. Hired top talent. Even solidified your marketing plan. As a result, you’re thriving. Congratulations!
But what about your company’s computers? Sure, when you launched your small business, you researched and purchased the most current equipment available - at the time. But as new technology continues to emerge, and operating systems evolve, your hardware may not be very up to date.

Whether you’re working solo or leading a small group of successful team members, here are four reasons why you might want to consider investing in more powerful business computers:

[More]

Creating a Modern IT Strategy

Nearly all businesses need some kind  of IT leadership. For many smaller businesses, we help provide that leadership and guidance. However, whether you provide the leadership or outsource it, the goals are the same.

As an IT leader, your job is growing more challenging by the day. Your IT strategy must be sophisticated and agile, balancing digital transformation priorities with security imperatives—and you probably have to stick to a lean budget too. What are the non-negotiable priorities you absolutely must include? Here’s a look at some of the most important IT issues that a modern CIO or CTO must tackle and why they matter to your success.

1. Enable digital maturity

Digital transformation may be the buzzword phrase of the moment, but there’s a good reason for that. Businesses that fail to become digitally mature will struggle to compete and thrive within the evolving digital landscape. While the transition to digital maturity often involves updating legacy infrastructure and implementing new technology systems that enable powerful business capabilities, it also requires a considerable amount of cultural change.

According to TechTarget, IT and business leaders often underestimate the degree of change management and political acumen required to lead an organization to a state of digital maturity. With that in mind, remember to keep a close eye on the softer human elements associated with digital transformation as well as the innovative technologies your organization is pursuing.

[More]

More Entries