Little Dog Tech Logo
CALL US
515-422-1995
5946 Ashworth Rd.
West Des Moines, IA 50266
  • Home
  • Remote Support
  • Services
    • Residential Services
    • Business Services
  • Pricing
  • About
  • Reviews
  • Contact Us
  • Blog
  • Partners

Tackle These Four False Assumptions about Cyber Attackers

May 30, 2023 by Paul Schwegler

There’s one big assumption about cyber attackers that we regularly refute: “It can’t happen to me.” At this point, most businesses do recognize the serious nature of the cyberattack threat. Yet other assumptions about cyberattackers may also make your business vulnerable. Educate your employees about these four main misconceptions. Raising their awareness can help secure your systems against social engineering attacks.

Start with the assumption that any technology is 100 percent safe. This is as misguided as the idea that your business won’t be a victim of a cyberattack. Some employees may believe that Google and Microsoft activity is always secure. That’s not the case.

Google and Microsoft have massive market shares, and it makes sense that bad actors target their cloud storage and content distribution. Once they’re in, they have ample opportunity to scam people.

Another false assumption is that threat actors go in blind with a scatter-shot approach. In fact, many social engineers do their research first. They learn what they can about your employees, your org chart, and what your business does. This helps them to develop more credible attacks.

Cybercriminals take the time to build rapport before initiating an attack. They may send unassuming conversational emails first, which helps them lull your people into seeing them as a trusted source. After establishing false security, criminals make an urgent request or plea for help.

Counter these misconceptions too

Cyberattackers may also make their play over the phone. So, don’t assume that your online interactions are the only thing to protect. There are hundreds of thousands of “vishing” threats every day. The bad actor may send an email without any malicious links or attachments, but there’s a number to call. If your employee calls in, they’ll talk with a convincing criminal. The bad actor might act as a call center or customer service agent.

Also warn employees against the assumption that responding to an existing email is always safe. It is much easier than they might think for someone to hijack a colleague or client’s email inbox. Then, the criminals use a pre-existing email thread to send a malicious attachment or URL, or use the connection to ask the employee to perform some action for the threat actor.

Finally, emphasize the point that anything is fair game. Cybercriminals will attack anyone, in any way they can. This includes leveraging current events, pop culture, and even international health crises. One campaign exploited victims by offering early access to Season 2 of the streaming success “Squid Game”, and during COVID lockdowns, hackers offered free masks or free tests to get people to download infected files.

There is money in cybercrime – a lot of it. The bad guys are highly motivated and always looking for new ways to exploit human weaknesses. Discuss cybersecurity assumptions with your employees and put protective measures in place to secure your IT. Our experts can help. Contact us today at (515)422-1995.

Filed Under: Business, Security, Tips Tagged With: business, cyberattack, security, tips

Share:

Tech Tips Everyone Should Know

May 30, 2023 by Paul Schwegler

There are billions of computers in the world today. In fact, 286 million computers shipped globally in 2022, and that was a 16% drop! Those figures make it obvious how many of us have access to computers, yet that doesn’t mean we all know the simple shortcuts available to us. This article rounds up top tech tips that can benefit every user.

Search Google smarter

Google is the market leader with over 85% of Web search traffic. But did you know you can search this popular online engine even easier? When you know you are looking for something on a particular site, you can narrow your search. Go to the Google search bar as normal, then, in the search box, type “site: www.website.com” (without quotes) with your search term. This refines your search.

So, if you wanted to find an article on coaching on the Forbes website, you would search “site: forbes.com and coaching.” You’ll see that all the responses you get back come from the Forbes domain.

Undo your mistakes

We all make mistakes while working on our computers. Here are some ways to undo the common ones.

“Unsending” an email is possible in Gmail. Go to Settings and set up the Undo Send section to give yourself 5, 10, 20, or 30 seconds. Then, save your changes, and you’ll have this option enabled in the future. It doesn’t technically “unsend” the email but delays sending it for a few seconds so you can stop it if need be.

You can also reopen a closed browser tab by using Ctrl+Shift+T on your PC or Command+Shift+T on your Mac. This reopens the last tab you closed. If you closed a bunch at once, you can also reopen them from your browser’s History dropdown menu.

Then, there’s Ctrl + Z for just about everything else. Pressing the control button and Z key together undoes your action in many Web browsers and operating systems. It will depend on your application and how far you can go back with this shortcut.

Capture your screen

Some modern PC keyboards come with a “print screen” key, which you can use to get a screenshot of the desktop windows. If you want to crop that screenshot, on Windows 10, go to Start and type Snipping Tool in the Search bar. You’ll get a box you can drag to any shape over your screen.

You can also take a screenshot on a Mac by pressing Command + Shift + 4. To crop the screenshot size and shape, you’ll press Command + Shift + 5.

One more little secret

How many times do you find yourself picking up your USB cable and trying to put it in the wrong way? You can stop doing so by looking for a symbol on the cable near where you’ll plug it in. It’s only found on one side, and it’s not for decoration. The symbol should be facing you when you plug in the USB. This will get it in the first time, whether you’re plugging in a vertical or horizontal cable.

These tech tips can help you be more efficient and effective with your technology, but you may still want help in other areas. Reach out to our IT experts today. We’re here to help. Call us at (515)422-1995.

Filed Under: Productivity, Residential, Tips Tagged With: productivity, residential, tips

Share:

Pros and Cons of Employee-Monitoring

May 23, 2023 by Paul Schwegler

Employee-monitoring is a phrase that generates discomfort. It sounds very Orwellian, or as if you’ll have all sorts of cameras on your people as if they’re in a reality TV show. When thinking of installing software on work computers, consider both pros and cons.

The pandemic sent many people home to work. Businesses that were reluctant to support hybrid and remote workers had to do so. But the concern about whether people are actually working remained.

Many IT departments answered by installing software on employees’ computers. Remote monitoring can track keyboard and mouse activity, websites visited, and app usage.

It’s the best of both worlds, right? The business gets increased productivity and improved employee morale through remote work. Plus, the software allows you to keep an eye on the off-premises work environment.

Your employees may not agree, however, and that’s only one of the considerations when deciding whether to monitor people working off-site.

Pros of employee-monitoring

Employee-monitoring allows you to see what people are doing during work hours. This helps management to identify time-wasters. Additionally, letting employees know that you’re watching can cut their time wasting.

Not all time-wasting is intentional either. So, this software can help you to see that certain tools or processes are eating up too much employee time. You can identify where new technology is needed, or put new processes in place to simplify workflow.

Monitoring employee time can also make client billing simpler. Add transparency with data about how long each individual works on a certain project.

Cons of employee-monitoring

Trust is a key component of employee engagement. Employees who feel trusted are likely happier and more willing to go above and beyond. Employee-monitoring can jeopardize the employee–employer bond. In fact, you may even lose employees who would rather work elsewhere than be monitored.

At the same time, you may be monitoring activity without gauging whether they are working. You can put software on their devices, but that won’t track everything. They could be using their brains for your business in some other important yet offline way.

You also run the risk of legal ramifications. Employee consent may be required to install the software on personal computers. You’d also want to let employees know if you’re monitoring them through the camera on their work devices.

Making the monitoring-employees decision

Monitoring often prompts employee concerns for their privacy and complaints about disrespect. Still, it may prove worthwhile for your business. If you do take the decision to install remote monitoring software, do so carefully. You should have clear goals for the software and communicate these to your employees. This lets them know how you will use this monitoring tool and what you will do with the information.

Looking to install remote-monitoring software for your business? Contact our IT experts at (515)422-1995. We can help you decide on goals, select the software, and implement a plan that works for you.

Filed Under: Business, Productivity, Tips Tagged With: business, Employees, productivity, Software

Share:

Choosing the Right Laptop for Your Content Creation

May 16, 2023 by Paul Schwegler

Are you an influencer? Or do you aspire to join the more than 50 million people making content for YouTube, TikTok, or Instagram? If you want to be a content creator, don’t struggle with a computer that isn’t up to the task. Considering these factors can help you land the best laptop for your needs.

Yes, the average person can take a video on their smartphone and post it for friends to enjoy, but when you’re serious about your video editing or creating high-quality, long-form content, you’ll need more.

To make your content look professional, pay attention to these factors. It will help you choose the laptop that sets you up to be the next Spielberg.

Video card

Pay attention to the video card. Also known as a graphics card, this is the piece of the computer that renders images on the display.

A laptop typically has a less robust video card than a desktop. That’s because laptops are often thinner. For the benefit of mobility, you compromise on the space available for a beefier graphics card. The card may also run slower because the card needs to be efficient without setting the laptop on fire.

So, when selecting a laptop with plans to edit video, do your research. You can easily find rankings for “laptops with good graphic cards” online. You can get away with an RTX 2080 (that’s a few generations old). Ideally, though, you’ll want the RTX 3080 or Intel Iris Xe.

Processing power

The laptop’s processing power can also play a role in your video editing success. A lot of video editing software needs multi-core processors. You can think of it as having many arms to get different things done at once.

For a PC laptop, go for at least an Intel i9 CPU. For Mac, a modern Macbook Pro with an M2 Pro CPU is a good choice.

Memory

For your laptop to be able to do many things at once, you also need powerful memory. Random access memory (RAM) is what you’ll be comparing here. RAM loads the operating system, runs video editing software, and performs other background functions.

At minimum, you’ll want 16GB of RAM, but the more you have, the better. Obviously, the budget will factor in here.

Storage

Your storage capacity also impacts how efficiently you can do all that you want to do.

If you’re working in Full HD (1920 × 1080), you could have some big project files to move around. The more storage you have, the easier this will be.

You’ll be choosing between hard disk drives (HDDs) and solid-state drives (SSDs). SSDs are good for working on the fly. They can run faster, as they don’t use any mechanical parts, but they can cost more.

A good idea is to work off your SSD for your current editing needs. Meanwhile, you can store archived videos and completed footage on a second hard drive. This can be on the laptop if there’s space, or you can attach an external HDD.

Display

Whether you are the star of your content or someone else is, you’ll also want to consider laptop display size. There are two main display types: Twisted Nematic (TN) and In-Plane Switching (IPS) panels.

TN panels cost less, but you can lose color accuracy on angles. The IPS panels give you more color at more angles, but they cost a little more.

Connectivity

You might want to attach an external HDD or connect to a larger desktop monitor. In that case, look for accessory ports and external display connectivity.

Need help deciding on the laptop that best suits your content creation needs? Our experts are here to help. Connect with us today at (515)422-1995

Filed Under: Productivity, Residential, Tips Tagged With: Content Creation, Laptops, purchasing, residential

Share:

Don’t Give Up on Password Managers

May 16, 2023 by Paul Schwegler

Seeing a major password manager breached, it’s hard not to throw up your hands and say, “it’s helpless.” Still, don’t give up on all password managers. Used properly, they are still better than a password spreadsheet or sticky notes of your credentials. Plus, it’s definitely smarter than reusing the same password to access more than one account.

According to LastPass, the December breach affected 30 million users and 85,000 businesses. Threat actors stole a large amount of data, including encrypted customer vaults. Industry experts are not enthusiastic about the breach handling or why it happened. So, leaving LastPass may make sense.

Yet abandoning password managers may not help you secure your sensitive data. Instead, prefer a cloud-based password manager that has no way of decrypting your data. This is a zero-knowledge password management architecture, which means that you are one with the secret key needed to access your encrypted data. That way, if the data is stolen or lost, the threat actors would still need to decode your key.

This means, of course, that you need to protect your secret key. Also, you need to make it complicated enough that the bad actors can’t hack it. So, using “password123” as your secret key would not be secure. Many security experts now recommend using a passphrase instead of complicated passwords.

Enforce Multi-Factor Authentication

Multi-factor authentication (MFA) helps stop bad actors by making access more difficult. They can’t get in with a username and password alone. You add another variable for confirmation before they can compromise your account.

You’re likely already familiar with two-factor authentication. It’s typically done through a text message or an email to another account, but these can both be compromised as well.

Biometric MFA is typically best (e.g. fingerprint or face identification). If that’s not available, prefer an authenticator app (e.g. Microsoft authenticator) or a Fido 2.0 key (e.g. YubiKey).

A Fido 2.0 key is a USB device that you keep in your physical possession to provide passwordless MFA logins. Instead of having an authentication code sent to you, you press a button on your key. It sends your code to confirm your identity. When your unique code is received, the system logs you in.

Worried you’d lose the physical key? That’s not ideal. That’s why it’s a good idea to get two. Meanwhile, the Fido 2.0 key doesn’t store identifiable usernames or any of your passwords. So, anyone finding that lost key would have no way of knowing what you use it to authenticate.

Ultimately, it’s best to prepare for any service to be breached. Cut your risk by keeping up with the latest technology for protecting your data. We can help. Contact our experts today to help you put appropriate security measures in place. Call us at (515)422-1995.

Filed Under: Business, Productivity, Security, Tips Tagged With: breach, business, passwords, security

Share:

What Is Co-Managed IT?

March 28, 2023 by Paul Schwegler

To be successful in business today you need technology and the expertise to manage it. Yet recruiting and retaining internal IT experts is challenging. Those who know how to support, secure, and scale technology assets are in high demand. That’s one reason many take advantage of co-managed IT.

Co-managed IT sees your internal teamwork alongside a managed service provider (MSP). Together, you improve agility and better manage complex IT environments.

You choose what roles and responsibilities stay in-house and outsource the rest. This is useful if you have an understaffed or overworked internal IT team or when you’re struggling to staff up.

The co-managed IT approach offers several advantages:

  • increased efficiency
  • external expertise
  • improved business offerings
  • cost-effectiveness
  • enhanced end-user experience
  • better retention of internal IT staff
  • security gains

We’ll discuss each in more detail next.

Increased efficiency

Co-managed IT service providers can take on a range of technology tasks. This includes upgrading software, backing up and protecting data, and troubleshooting. They can also add or provide security, support cloud migration, and maintain servers.

You might also turn to co-managed IT to help with regulatory compliance or to manage remote locations. This route is also an expeditious way to support a growing company and meet an immediate need.

When you have specialized requirements, adapt quickly by partnering with an MSP with those skills. This saves you the time and effort needed to learn that new area or to hire new people.

External expertise

Having another set of IT experts supporting your objectives can help you succeed. You don’t risk the tunnel vision of only internal people validating each other’s decisions; you get the benefit of an outsider’s perspective. Plus, the MSP experts can bring varied backgrounds. They’ll also have experience with many different clients, which could help identify fresh opportunities.

Improved business offerings

Established MSPs focus on cost-effectiveness and operational efficiency. They keep current on emerging technology trends and the ever-evolving threat landscape. Their insights can help you install best practices. You can learn how to streamline processes and improve outcomes.

You also gain an IT partner that wants to take the pressure off your internal team. This can help you achieve a competitive advantage.

Cost-effectiveness

Instead of a break-fix model or a project basis, co-managed IT is typically long-term. This can provide cost savings with a consistent budget line item that you can plan around.

You also expand IT resources without having to recruit, train, retain, and pay benefits.

Enhanced end-user experience

When someone else is handling routine tasks, your IT can install top technologies. Giving your internal team freedom to innovate can also bring greater access to time savings and real-time insights for end users.

Co-managed IT can also provide your users with 24/7/365 support. There is a support system in place when your own internal IT staff members are sick or go on vacation.

Better retention of internal IT staff

By sharing IT responsibilities, you free your people up to focus on what matters most. Co-managing IT also provides a relief valve to take pressure off of overworked teams. Aligning with a partner to achieve goals can also enhance IT staff satisfaction.

Security gains

MSPs can help improve your cybersecurity posture by identifying unnecessary complexity. They provide a fresh look at your systems. Co-managed IT experts can monitor networks and install system protection, and they can handle security patches as well as software and hardware upgrades. These experts can also put preventative measures in place to avoid downtime, handle data backup, and prepare a disaster recovery plan.

Want to learn more about co-managed IT services? Talk to our experts about the role we can play in your business success today. Call us now at (515)422-1995.

Filed Under: Business, Maintenance, Tips Tagged With: business, maintenance, MSP, support

Share:

How Much Laptop Storage Do You Need

March 21, 2023 by Paul Schwegler

When looking to buy a laptop, one of the main things you have to decide is how much storage you need. That’s a challenging question for many of us to answer. Let’s discuss the factors that matter and how to decide.

The short answer, for many people, is that you don’t need much laptop storage. Having 512 GB available is often enough for a regular user, but it’s going to depend on how you’re using the laptop.

For example, if you use cloud email, your account likely comes with cloud storage. Using cloud-based applications such as Google Docs also saves storage space.

If you’re using the laptop to stream videos on TikTok or YouTube, or watching your series or movies on Netflix or the like, you’re also taking advantage of the cloud. Very little data is actually stored on your computer.

Even so, remember to account also for your operating system. Microsoft and Apple recommend 32 GB of storage space to accommodate their OSs. Otherwise, you could encounter performance issues.

Also, if you edit videos or work in graphic design, you’ll likely want a lot more available storage.

How storage space impacts your computer use

Storage space is the capacity your computer uses to store files and data. So, when you have a lot of data, images, or video to hold and work with, more storage helps the PC recall them more quickly.

If you are a digital hoarder, that can also factor into your storage needs.

When thinking about storing photos, you’d have to have many albums to make a dent. If the average image size is about 4 MB, it would take 1000 photos to use up 4 GBs of space. But video eats up a lot more space. An hour-long 1080 p video could occupy 10,000 MB (10 GB).

If you regularly download new apps and games, you can quickly fill up your storage space. Purging unused files and apps consistently frees up space.

Considering the cost of laptop storage

More storage can mean a bigger price tag, so you’ll want to balance your storage needs against your budget constraints.

If you can spend freely, go ahead and get more storage. Otherwise, you’ll want to weigh hard disk drive (HDD) and solid-state drive (SSD) upgrades.

HDDs offer more storage for less cost, but slower reading and writing. SSDs can be three to four times as expensive, but you do get greater speed. SSDs are also typically quieter, more durable, and consume less energy.

One option is to buy a laptop with a smaller SSD and get an external HDD to meet both your speed and storage needs. HDDs can be better for data recovery and for storing large amounts of data you’re not accessing often.

Need help making decisions about your laptop purchase or storage needs? Our IT experts have the answers you need. Contact us today at (515)422-1995.

Filed Under: Productivity, Residential, Tips Tagged With: Laptop, residential, storage

Share:

Watch the Little Things in Cybersecurity

March 21, 2023 by Paul Schwegler

Author Richard Carlson tells the world, “Don’t Sweat the Small Stuff” in his popular book. Yet he’s not in the cybersecurity realm. When it comes to protecting your business, you do want to watch the little things. Avoiding small matters could bring big risks.

You’re already keeping an eye on the big things such as ransomware or data breaches, and you’ll also be ensuring have a data backup and disaster recovery plan in place. But don’t overlook the small issues that come up – they can be just as vital to your cybersecurity.

For one thing, don’t undervalue physical security for your business technology. In America, there have been reports recently of attacks on power stations, but these aren’t sophisticated cyber hacks. Attackers with guns are breaching the physical premises and shooting transformers. It goes to show that you focus on preventing cyber threats at the expense of perimeter protection.

This also means reminding employees not to let unknown personnel into the building and telling them to take down those post-it notes on their PCs with their passwords on them.

Allowing your people to work on software that’s past its support date could also be a bigger deal than you think. The “if it ain’t broke, why fix it?” mentality could leave you open to attack. Hackers seek out vulnerabilities tied to outdated systems. They can leverage small openings to wreak havoc on your business.

Small steps can make a big difference

Similarly, don’t fall for the idea that cybersecurity effort needs to be complicated to do the job. There are small steps your business can take to protect itself.

Cyber hygiene is a good starting point. Ensure your people aren’t reusing weak passwords across accounts. Make keeping track of complex passwords easier by using online wallets such as LastPass.

Keep computers updated and software patched. Manufacturers keep up with threats and upgrade their code to address known vulnerabilities. All you need to do is allow the update when it’s offered. It can be an inconvenience, but agreeing to that update can save you a big problem down the road.

Educate employees about using public Wi-Fi networks. They may think they are being productive by logging in while in line at the coffee shop, but that public access point could be putting your systems at risk. One big problem is that an attacker could be set up on that hotspot to intercept sensitive data.

Encrypt data. This helps you protect data wherever it may be, not just on-site. A hacker intercepting that data would still need decryption capabilities to get access.

Multi-factor authentication also helps to protect your business. After all, a criminal could get access to an employee’s username and password from a phishing attack. If you don’t add a second layer (at least) of authentication, they can easily log into your network and do damage.

Need help with cybersecurity issues? We can help you with the big and the small. Contact us today at (515)422-1995.

Filed Under: Business, Security, Tips Tagged With: business, cybersecurity, Protection, tips

Share:

Leave that USB Drive Where You Found It

March 14, 2023 by Paul Schwegler

You come across a thumb drive, or USB drive that you don’t recognize. Maybe you find it in the car park of your building or by the copier in the office. You’re curious or you want to plug it in to identify where to return it. Don’t do it. Risks abound.

Consider this jaw-dropping example. That’s how the Stuxnet malware virus that hit an Iranian nuclear facility got its start. It’s believed employees at the facility plugged in a USB drive they found in the car park.

From there the virus could reach the computers controlling the centrifuges, causing them to spin too fast and become damaged. The attackers couldn’t get in directly, as the computers were on a disconnected network.

Risk of thumb drive attack

Now, you might be thinking, “but I’m not an Iranian nuclear facility.” But that doesn’t prevent cybercriminals from wanting to access your network and systems. USB drives are one more way that bad actors can do so. In fact, one study found that 60 percent of people were likely to connect random thumb drives found near their building. If the business logo was on the drive, the number went up to 90 percent.

USB stands for Universal Serial Bus. Even with cloud computing, we still see these small, portable drives used universally. They are compact and convenient. That also makes them an attractive target for bad actors.

Hackers can pre-program USBs to act maliciously once connected to the network. They might:

  • steal a user’s data;
  • gain access to the user’s keyboard;
  • monitor the user’s screen;
  • encrypt user data in exchange for a ransom;
  • spread infection.

Most of these can happen without the user even knowing it, as the malware runs in the background.

Avoid USB drive attacks

How do you keep your business safe from infected USB drives? First, don’t insert unknown flash drives. Hackers will try to take advantage of human curiosity or their desire to help.

It’s also good to use different flash drives for personal and professional computers. This helps cut the chances that you’ll spread an infection from one to the other.

You might also enable security measures on USB drives, such as fingerprint authentication. This, and keeping computer software and hardware up to date, can cut vulnerabilities. Also, keep your malware and anti-virus protections current, and patch regularly.

Windows users can also disable the Autorun function. This prevents Windows from automatically opening removable media immediately upon insertion.

We’re here to help. Call us at (515)422-1995 to contact our experts if you suspect a security threat or want to update your security posture.

Filed Under: Business, Security, Tips Tagged With: business, Flash Drive, security, tips

Share:

Benefits of a Vertical Monitor

March 7, 2023 by Paul Schwegler

Horizontal is the norm when we’re thinking about televisions or computer monitors. Yet vertical monitors are an option. Consider these advantages of going vertical.

On a horizontal monitor, there is more width than height. The usual 16:9 horizontal monitor is great for watching movies, but when it comes to other processes, there’s a lot of wasted space. If you have a vertical monitor setup, you can enjoy a better viewing experience.

You’ll find it’s easier to scan websites, view search engine results, and read online content or long blocks of code. If you’re big into cryptocurrency, you might enjoy displaying data in an easy-to-read form, plus, you’ll be able to react more quickly.

You can also have a full view of photographs or a project if you’re trying to design something with a vertical layout.

Vertical screens can also reduce eye strain. With this setup you reduce the range of movement, which can save your eyes from getting as tired.

Further, you might be able to save space with a vertical monitor if you have less room on your desk.

A vertical monitor can be appealing if you use two monitors at once. Having dual monitors can increase productivity. You enjoy added viewing space to multitask, browse the Web, watch videos, or games. If you’re working from home, you may also find it easier to collaborate with colleagues with a second screen. When you set up one screen to be vertical, you can benefit from the best of both worlds.

Going vertical is Easy

You don’t have to buy a special monitor to take advantage of a vertical setup. While many screens are only capable of a horizontal display, you may be able to adjust the way it is mounted. You can get a stand or mount that allows you to easily rotate the screen. As long as it is a VESA-compatible monitor, you can easily make the choice of horizontal or vertical. Then, you can change the layout in the operating system’s display settings. Windows, MacOS, and Linux all support vertical screen rotation.

Some monitors have mounts that allow physical rotation, which is a good way to test drive the vertical monitor. That way you can see how it compares to a horizontal layout for your needs. Keep in mind, though, that this repositioning of the monitor will affect your stereo speakers. You’ll need to attach an external pair of speakers to have them work with the new orientation.

Vertical monitors aren’t for everybody; if you game a lot or want to watch movies or do 3D modeling, you might prefer the horizontal screen. Many computer games, for example, are programmed for horizontal play, and opening that game up on a vertical rotation can cut off or compress your visuals.

One other common criticism of vertical screens is that they catch glare from nearby light sources more easily. So, if you don’t want to deal with glare, stick with horizontal.

Our IT experts are here to consult on your computer needs. We can advise you on your screen choices and so much more. Contact us today at (515)422-1995.

Filed Under: Productivity, Residential, Tips Tagged With: Display, Monitor, residential, Vertical

Share:

  • 1
  • 2
  • 3
  • …
  • 35
  • Next Page »

Contact Form

Before submitting your question, you must review and agree to the Little Dog Tech Terms of Service.

Search for Something!

Click to see our BBB Report

FOLLOW US

VISIT US

Privacy Policy

Copyright © 2023 · Little Dog Tech · 5946 Ashworth Rd. , West Des Moines, IA 50266