Little Dog Tech Logo
CALL US
515-422-1995
5946 Ashworth Rd.
West Des Moines, IA 50266
  • Home
  • Remote Support
  • Services
    • Residential Services
    • Business Services
  • Pricing
  • About
  • Reviews
  • Contact Us
  • Blog
  • Partners

5 Benefits of Windows Virtual Desktop for Businesses

January 5, 2021 by Paul Schwegler

The days of doing all our work in the office are gone for most businesses. There are clients to meet, conferences to attend, and roadshows to run. Employees are often on the move, and they want to work fully, wherever they are. Windows Virtual Desktops can help.

Windows Virtual Desktop allows staffers to work off-site with continued access to office workstations. All the business data and programs are accessible through the cloud. Plus, the individual can use a laptop, tablet, or other mobile device. They’ll log in to a virtual desktop that looks the same as the one at work. Let’s consider the many benefits Windows Virtual Desktops offer.

#1 Convenience

Allowing users to access desktops from wherever they are makes it easy to keep working. They can do whatever needs to be done, whenever they have the time to do so. Since virtual desktops mirror the office workstation, users are more efficient. They aren’t having to relearn a task when working remotely or off-site. That file they’re looking for is in the same place it would be if they were sitting at their office desk.

#2 Lower costs

Your business could use software that needs more power than users have on mobile devices. Virtual desktops tap into a powerful cloud-based network, which means your business doesn’t need to invest in the infrastructure to support those apps.

You don’t need to upgrade to multiple computers. The virtual desktop in the cloud will do the necessary work, and it’s easily scalable. This also saves time, as your business doesn’t have the long upgrade time of new infrastructure.

You might also lower business costs by hiring the best talent from wherever it is in the world. Everyone is working from a virtual desktop. So, someone logging in from North America has the same access as another employee in India, for example.

#3 Security

Your business may have policies about applications and devices people can use to do work. You’ve tried to limit risky software downloads and prevent staff from connecting on unsecured devices, except your employees are still going to take the path of least resistance. If they think it’s easier to do their work on an unapproved smartphone, they probably will. They’ll also use that prohibited app if it’s easier to access than the business-approved software.

But you don’t need to worry about this with virtual desktops, as you’re streamlining safe access to approved business applications and business data. With Microsoft, patches and updates come from a company investing heavily in cybersecurity.

#4 Business continuity

If you have moved to remote work in 2020, you probably already recognize the value of the cloud. Having virtual desktops hosted in the cloud provides business continuity. Even if you suffer a natural disaster or other disruption, employees can still get online. They’ll keep on working in a consistent computer environment with Windows Virtual Desktops.

The ability to quickly access necessary data and programs helps the business get running again. Regardless of the situation at one geographical location, users can continue working, even while restoration is in progress at the office.

#5 IT’s job is easier

With virtual desktops, IT doesn’t have to handle as much physical technology, as the system exists in the cloud. Plus, IT no longer has to spend its time clearing an old laptop and reconfiguring it for another employee. Instead, a virtual desktop can be saved and transferred to a new user.

IT experts can turn their attention to more value-adding activities. Freed from tedious, time consuming tasks, they can innovate and contribute revenue-driving ideas.

Of course, you can make it even easier on your in-house IT team by partnering with a managed service provider. Our tech experts can set your business up with virtual desktops. We’re also here to help manage and secure the cloud-based systems. Reach out to us today by calling us at (515)422-1995 to learn more!

Filed Under: Business, Productivity, Security, Tips Tagged With: business, productivity, tips, Windows Virtual Desktop

Share:

Need Home IT Help? Try Residential Managed Services

January 5, 2021 by Paul Schwegler

Maybe you used to be able to troubleshoot your own technology, or had a tech-savvy family member or friend who could help out in a pinch. But now that home computing has become more essential, you may be feeling overwhelmed.

If you’re working from home, and others are doing virtual learning too, you can’t wait for your IT geek buddy to visit. You need your desktop to do your job, and you can’t risk missing a deadline or losing hours of work. Your kids might welcome the excuse to miss a few assignments, but you don’t want them falling behind at school.

With all the technology you’re using today in a regular basis, your home is basically a small business. You want to be able to access the internet from any room and print from anywhere in the house, or to have a cloud backup of all your photos and videos.

So, partner with a managed service provider (MSP) for your residential computers. Many businesses use MSPs for IT help, 24/7 monitoring, improved security, and reporting. Home users can benefit, too.

Advantages of Residential Managed Services

  • A managed service provider helps organize and protect your technology. These IT experts can:
  • network all your devices (printers, routers, laptops, desktops, and more);
  • set up the best internet connectivity option for your home;
  • recommend the best software and hardware to meet your individual needs;
  • put virus protection in place on your devices;
  • monitor your hardware for impending failure;
  • scan your computers for malware and other threats;
  • establish system and storage backups so you have a Plan B;
  • improve your productivity with more efficient solutions and expert advice;
  • keep your systems up to date by handling patches and upgrades;
  • move your computing to the cloud for greater mobility and cost savings;
  • educate you and your family on internet safety and best practices.

Valuing Your Time in Favor of MSPs

The idea of paying for IT assistance can put off home computer users. Before deciding an MSP isn’t for you, consider the value of your time. How many hours do you waste trying to figure out your tech solutions, or searching the Web for the answer to your problem?

With an MSP, if something does go wrong, you have to make only one call to get help. Don’t waste time on hold with your internet service provider only to find its a laptop problem, which means another helpline. An MSP is your one go-to for all your IT needs.

Also consider the value of your personal files, photos, and videos, and the importance of protecting and always being able to access any work you’re doing remotely.

For a small, set monthly fee, you add a human IT expert focused on your needs to your team. You have a lot to think about already. Take technology concerns off your “to do” list by partnering with a local MSP today.

We’ll simplify technology for you, offering a budget-friendly, customized managed services plan. Contact us today at (515)422-1995!

Filed Under: Maintenance, Residential, Tips Tagged With: maintenance, Managed Service Provider, residential

Share:

Disk Encryption Protects Your Personal Computers

December 29, 2020 by Paul Schwegler

Always wanted to feel like a secret agent? Well, here’s your chance! Did you know you can encrypt your hard drive to protect the data on your computer? This is a good way to secure your information, whether at home or on the move with a laptop.

Setting up encryption scrambles your data so that only authorized parties can understand the information. Without the encryption key, anyone trying to read your information would see gibberish.

You’re already using encryption when you visit any “https” website. The lock symbol beside the URL shows that encryption is protecting your connection with the site. You’ll see it when shopping or banking online, and it’s protecting the data in transit.

You can also encrypt the data on your computers.

Password Protection Is Not Enough

Many people at this point have a password for their user account on a home computer or laptop. Some of these passwords are even complicated, although the number-one password people use continues to be “123456” – seriously – followed by “123456789” and “qwerty.”

Regardless of its strength, the logon password doesn’t stop anyone with physical access. You might have your browser remembering usernames and passwords (it’s not a shared computer, right?), and anyone with access can use those pre-populated credentials to access your accounts.

If someone really wants to get to password-protected files on a physical device, they can do so. The attacker might bypass your password by booting your computer up to a new operating system. Or the bad guy might even remove your hard drive and put it into a new computer. All they need is a second computer and a screwdriver!

Full disk encryption protects those files, even if the attacker has physical access and even if your laptop is lost or stolen, your home is burglarized, someone seizes your computers.

Encryption Is Not a Silver Bullet Of course, we need to be clear. Encrypting your hard disk doesn’t make your computer invincible to cyberattackers, although does force them to work a lot harder.

Attackers can also still exploit services running on your computer, such as network file sharing. Plus, encryption doesn’t stop a nefarious agency from spying on your online activity in transit.

Nevertheless, it does beef up your physical security. You can encrypt an external hard drive or your system’s entire hard drive. Then, when you turn the computer on, you’ll need to unlock the disk to boot up your operating system. The computer won’t work until the user supplies the encryption key or passphrase. You can also create multiple unlocking keys if you have several user accounts for that device.

Again, you’re going to want to come up with a strong password. If your key phrase is “password,” (the fourth most common choice in 2019), there’s little point in encryption.

You also don’t want to walk away from your laptop, leaving it open and accessible. You’ll want to set your encryption program to lock again after a certain amount of idle time. Otherwise, you’ll find encryption doesn’t impact your computer’s performance.

Make sure your computers and laptops are always physically secure. With disk encryption, only people you trust can access your data and files.

Ready to set up disk encryption on your home devices? We can help. Contact us today at (515)422-1995!

Filed Under: Residential, Security, Tips Tagged With: encryption, password, residential, security

Share:

Keep Your Firmware Safe and Secure

December 29, 2020 by Paul Schwegler

Most of us can differentiate between hardware and software. But how many know what firmware refers to? More importantly, is your business securing its firmware against security vulnerabilities?

Your business knows it needs to keep its operating systems (OSs) up to date. Installing patches as they are released helps protect your OS and software applications from attack.

Yet firmware can be easily overlooked when setting up cyber protection. You’re opening up Explorer every day, and your business relies on its Excel spreadsheets, but you don’t think about the basic software that runs the hardware as intended – that’s the firmware.

Without firmware, your computer wouldn’t know how to detect its hard drive, and the gears on the business printer wouldn’t spin to pull the paper through the device. There’s firmware in network and sound cards, routers, range extenders, keyboards, and more. Firmware also makes your webcam or surveillance camera work correctly.

The Need to Update Firmware

Cyber-criminals aren’t known for their lazy reliance on just one tactic. Instead, they are constantly finding new ways to exploit business devices and systems, and this includes attacking firmware. Without securing your firmware, you run the risk of bad actors:

  • spying on business activity;
  • stealing business data;
  • taking control of your business computers.

You may think you’re safe because you have antivirus scans in place, but hackers can get around those by embedding their malware in your firmware. In the past, they could guess firmware manufacturers weren’t prioritizing security. That’s changing now that firmware exploits have gained attention.

Manufacturers release firmware updates for at least a few years after initial release. The goal is to ensure the stability of that device your business depends upon.

Find firmware updates online at the manufacturer’s website. You might also look on the device support page. Make it a policy to consistently seek out firmware release updates. That way, the business is up to date with new patches to fix holes or fresh vulnerabilities.

Taking Care of Business Firmware

Too many people aren’t thinking about the firmware threat; it’s a set-it-and-forget-it problem. Once people set up their devices, they don’t think about the possibility of a future compromise.

For example, in last year’s Avast Threat Landscape Report, 60 percent of users had never updated router firmware. Yet router hijackers can inject malicious HTML and gain access to usernames and passwords.

Businesses are growing more reliant on technology, particularly connected technology. (Thank you, Wi-Fi and Internet of Things.) This is also expanding the attack surface available to cyber bad guys. Don’t become complacent. Apply patches when issued to all business connections and technology.

Now you know what firmware is and why it matters, that doesn’t mean you’re any closer to being able to actually update it all. Partner with one of our technicians. We can do an audit of all your firmware and find any holes that need plugging. Give us a call today at (515)422-1995!

Filed Under: Business, Security, Tips Tagged With: business, Firmware, security, updates

Share:

How Microsoft Intune Can Benefit Your Business

December 22, 2020 by Paul Schwegler

The use of mobile devices is becoming standard in business. Smartphones and tablets have taken their place as tools your employees want to use. Whether for communication or collaboration, expect people to have mobile devices at hand. To make this work, your business needs mobile device management, that’s where Microsoft Intune can help.

More work is getting done in the cloud, especially with more people working remotely. Employees want to be able to access the same applications and data they’d get on a desktop or laptop, right there on the device in their hands, wherever they may be.

This presents a security challenge. When all devices connecting to a work environment are on-site, it’s easier to control the connections. The business could put “Bring Your Own Device” (BYOD) policies in place to control:

  • what devices employees use to connect;
  • how much access they have when connecting;
  • what applications they can use on devices connected to the business network.

Still, mobile device management software can benefit your business. You’ll be able to reduce IT workload, improve user experience, enable greater efficiency, and reduce risk.

Cloud-based Mobile Device Management with Intune

Microsoft Intune offers cloud-based mobile device management (MDM). This enterprise security offering combines MDM and mobile application management (MAM).

In a use case, Accenture used Intune’s MDM to enforce mobile device encryption and use of a PIN. MAM helped secure the Microsoft Office suite, without having to control employee devices.

Intune allows users to access critical business data and applications on any mobile device. Intune provides a unified way to securely manage Android, iOS, Windows, and macOS devices.

Further, Intune streamlines and automates deployment, provisioning, policy management, app delivery, and updates. Plus, the globally distributed cloud service architecture is highly scalable.

This helps your IT team support the diverse mobile ecosystem more efficiently. There’s no need to set up each device individually, as the software deploys across all devices at once. IT can track licenses, rollout updates, and get hardware configuration and software installation information, all in one place and without having to buy any added infrastructure. Meanwhile, employees can move between mobile devices and desktops without jeopardizing company security.

Your business might ask employees to enroll any devices they use to access Office 365 data, yet there may still be devices you don’t know about or that your partners are using to access your important data. Intune provides you with precise control. You can specify what data different users can access. You can also say what they can do with the data within Office and other mobile apps.

Boosting Cybersecurity Protection with Intune

Intune’s integration with Azure directory also allows the business to enforce access policies. You might limit access based on user, location, device state, or app sensitivity. Powerful AI and machine learning also helps to proactively protect the business environment. Integrating Intune and Microsoft Defender helps prevent and limit the impact of a security breach.

Your business can review and establish security policy and configuration setting baselines. It’s also easier to meet legal and company cybersecurity requirements. Data protection, encryption, and anti-malware are all done in the admin console.

At the same time, you avoid intruding on users’ personal devices. Contextual controls can distinguish between business and personal use of apps.

Improve cybersecurity resilience and support employee productivity on mobile devices. Intune allows you to track devices, manage policies, ensure updates, and protect data, all from one location.

Intune is included in certain Enterprise Mobility and Security subscriptions. Contact us today at (515)422-1995 to learn more about this solution. Learn how it suits your mobile device management and mobile access management needs.

Filed Under: Business, Productivity, Tips Tagged With: business, Microsoft Intune, Mobile, productivity

Share:

Facing the Five Top Cloud Computing Fears

December 22, 2020 by Paul Schwegler

The public cloud service market is growing. Software, infrastructure, desktop, and other service numbers are all on the rise. Yet some businesses are still holding back from migrating to the cloud. This article addresses common resistance to this highly scalable and cost-effective solution.

#1 Fear of Losing Control

“I want full responsibility for my IT.” Moving to the public cloud means partnering with a vendor. Some of your existing technology can move as is, whereas other tools your people rely on may need replacement or redesign.

One solution is to migrate to a private cloud. This allows you to continue to control the data environment but will be a more costly solution than a public alternative. When partnering with a public cloud service provider, establish clear responsibilities. Ensure you’re both on the same page about who is accountable for what.

#2 Fear of Change

“If it ain’t broke, why fix it,” especially when it comes to business computing, right? Transitioning from one data center to another requires preparation and effort.

Yet the resulting greater flexibility makes the work worthwhile. Cloud migration is appealing because the technology offers, among other things:

  • scalability;
  • increased effectiveness;
  • faster implementation;
  • mobility;
  • disaster recovery.

The cloud allows you to store data, run applications, deliver content, and more – all online. Your business doesn’t have to invest in the hardware or networking tech on-site.

#3 Fear for Data Security

Any downtime for a data breach can cost business revenue and brand reputation, and productivity can suffer, too. And that’s only the beginning. So, you don’t want to move to a solution that expands your vulnerability to attack.

There are two ways to get attacked: digital or physical. Working with a cloud provider, you gain a partner focused on security. They know the mitigations and countermeasures for cloud-computing-specific capabilities. They know the frameworks, architectures, and approaches to best protect against digital attack. Microsoft spends $1 billion annually safeguarding Azure, its cloud offering, from cyber-attack. Can your IT budget compete?

As for physical security, cloud data centers are secure facilities: we’re talking guards with key cards, fenced perimeters, power backups, and server redundancy. They have the works. Your office is probably less secure.

#4 Fear for Interoperability Challenges

We’re always told to play nicely with others, but what if existing business technology doesn’t play well with the cloud? Business leaders may fear they’ll be stuck having to reinvent the wheel.

The good news? There have been great strides in interoperability. Many application programming interfaces are available to help. Cloud providers want your business systems to exchange and use information seamlessly.

#5 Fear of Cost Increases

Before giving in to cost concerns, take stock of your current IT operating budget. The time and money you could save may surprise you. For example, the software provider takes charge of updates, patching, and new capabilities, which alone can increase IT’s productivity in other areas.

The scalability of cloud solutions also counterbalances cost concerns. With cloud technology, you know your tools are always evolving. Plus, you can quickly add or reduce licenses or data storage size as needed, because there’s no waiting for hardware to arrive and be provisioned by an overworked IT team.

Conclusion

With cloud migration you also avoid training employees to support the technology. Plus, you’re not paying to use office space, power, and cooling to house the equipment. The cloud also provides end users with immediate access from almost any device.

The one challenge is migrating to the cloud securely. Give us a call at (515)422-1995 to get you migrated swiftly and ensure you’re using cloud computing safely.

Filed Under: Business, Cloud, Security, Tips Tagged With: business, cloud, Migration, security

Share:

Security or Flexibility: Which Matters More?

December 15, 2020 by Paul Schwegler

Business is all about making tough choices. One such choice is whether to value IT security or business flexibility more. Unfortunately, you can’t have the best of both at once.

While having absolute security or flexibility may sound good, neither is actually for the best. An entirely secure environment is tough on users, a fully flexible IT environment is near impossible to keep safe.

When weighing security and flexibility, you might think of it on a sliding scale: more of one means sacrificing some of the other. If you amp up your security, you can limit business productivity. Your staff may try to get work done and bump up against security constraints. Or you may decide to give your people full flexibility, but you do so at the risk of leaving your business more vulnerable to attack.

Where you want to land on this sliding scale can depend on your industry. A bank protecting funds or a hospital with private patient data would prioritize security. Alternately, a small widgets business might not worry about data security as much.

Still, it’s a tough choice to make. Security company Balabit asked European IT pros to choose between IT security and business flexibility. In general, 71 percent thought security was equally or more important than flexibility. But when asked whether they’d risk security to clinch a major deal, 69 percent were willing to take their chances.

Finding the Right Balance

Leaders have to find the sweet spot between IT security and business flexibility. Striking the right balance is essential to successful security measures and flexibility aims.

One major consideration is the type of data the IT security is protecting. Credit card or health insurance companies are responsible for securing customer information. A university with many networked computers also needs to think about security; otherwise, criminals might target the school’s processors to power their attacks.

The potential impacts of a security breach are also a factor. Cyberattacks can mean business disruption, and lost productivity and business revenue, plus damage to brand reputation and loss of customer loyalty. A business in a highly regulated industry could also face massive fines and legal fees.

Assessing the risk of attack also helps. For example, a company with a billion-dollar idea, or a utility, face greater risk than a tuna packet labeler. Another consideration would be history of suspicious activity: if your business has already suffered an attack, security should be a priority. Likewise, if your industry is a common target for cybercriminals, you can’t take unnecessary chances.

Then, there’s the demand for business flexibility. How much do you need and in what situations? For instance, allowing employees to use their own devices is a convenience for some, but it’s a necessity in other environments.

The ability to control security and flexibility on a situation-by-situation basis can help. In instances where customers’ identifying information is exchanged, security would trump flexibility. But when work teams collaborate globally, business flexibility is the more important aim.

Get MSP Input into This Equation

A managed services provider (MSP) can provide perspective on the best balance. The MSP examines business processes and goals, and determines appetite for risk. Then, it helps set that slider between IT security and business flexibility.

IT experts recognize the need for adaptable security responding to shifting needs. When that big deal comes up, you don’t want to have to deliberately risk security. Ultimately, you’re looking to achieve flexicurity – just the right combination of both. This lets your technology users do their best, while your business remains secure.

Want to balance security and still be business friendly? Contact our experts for a consultation today! Call us (515)422-1995!

Filed Under: Business, Maintenance, Security, Tips Tagged With: business, flexibility, security

Share:

Do More with Microsoft Forms

December 15, 2020 by Paul Schwegler

There are millions of Microsoft 365 users globally. Businesses rely on the software to power email, drive productivity, and connect to colleagues. Forms is another great tool for users of Microsoft 365.

In April 2020, Office 365 became Microsoft 365. The value of the software suite to communication and collaboration remains intact. A Microsoft 365 subscription provides Word, Excel, Outlook, PowerPoint, and other useful applications. Those are the familiar options.

But Microsoft is always evolving its cloud-based services. Microsoft Teams is a chat-based workspace integrating people, content, and tools. There’s also a To-Do application, Flow for managing notifications, and Power Bi Pro analytics. That’s to name just a few.

Another good one to get comfortable with? Microsoft Forms.

Microsoft 365 Forms Makes Data Collection Easier

Microsoft Forms allows your business to create surveys, generate quizzes, conduct polls, and capture data.

This easy-to-use application simplifies form creation: you simply select “New Form” or “New Quiz,” input the form details, add images if you want them, and you’re ready to go. You can click and drag to choose your question types from multiple choice, text, rating, or date options.

Ready-made themes allow you to pick different colors or graphics to personalize your survey. Before you go live, you can also preview and test your survey. You can even share with a colleague to collaborate on the survey design.

It’s that easy. In a few minutes you can create the tool you need to:

  • collect employee input;
  • measure customer satisfaction;
  • poll your team about how they feel about returning back to the office;
  • quiz employees doing virtual learning.

Once you have your finished link, you can paste it into an email, post it on social media, or put it on your website. You can also generate a QR code for mobile device use.

Get Results with Microsoft Forms

OK, you’ve shared your new survey, and the responses are raining down on you! There’s a dashboard for that. You can track the number of responses and average completion time. Plus, you can drill down into particular question data.

For any question, you can display your results in charts or graphs for that PowerPoint.

Since this is part of the Microsoft suite, Forms integrates with Excel, too. You can import the data there to leverage the full power of Excel’s analysis tools.

If you want to get even more advanced, upgrade to Microsoft Dynamics 365 Customer Voice. Formerly Microsoft Forms Pro, this application helps you gather real-time customer feedback.

There are plenty of survey tools available online today. SoGoSurvey, SurveyMonkey, or TypeForm are top examples, but free versions can limit the number of questions or respondents surveyed.

Microsoft Forms integrates with other Microsoft 365 tools in your subscription. For quick intake or call center satisfaction, Forms is an intuitive application. It’s easy to keep in touch with customers and employees.

You can do more with Microsoft 365. We can help. Our IT experts get to know your technology and business needs, then we’ll identify the Microsoft 365 tools that can simplify the work you do. Contact us today at (515)422-1995!

Filed Under: Business, Productivity, Tips Tagged With: business, Microsoft Forms, productivity, Tools

Share:

6 Never Dos for Your Work Computer

December 8, 2020 by Paul Schwegler

Nobody likes to be told what they can’t do. Still, there are certain never dos that you should keep in mind when it comes to your work computer. This article captures the top six things you should avoid doing on your work computer.

#1 Don’t login to personal sites and services

Sure, we’re all guilty of wanting to check our personal email or take a quick peek at social media while at work, but you do not want to login to your personal accounts on a work computer, especially not a shared one!

Browsers that remember our passwords to sites such as Facebook or your bank can be useful. How many different passwords can one human be expected to remember after all? But letting the browser save your personal access credentials risks your security. The next person to use that computer could access your private data.

#2 Don’t allow remote access

Maybe your computer isn’t working the way you want it to: it’s too slow. Something is up with an app. You’re worried you’ve inadvertently downloaded malware onto your work device. Then there’s that friend you have that “knows computers.” With remote support software being so easy to use these days, you figure it’s easier to ask your friend for help. Work doesn’t even need to know.

But would you let that friend walk into the office and start working on your computer? Probably not. Your business has its own people it trusts to do work on its computers. If you were on-site, you’d tell your supervisor, or at least IT, if you had a computer concern. Even when working virtually, you want to do the same thing.

Allowing remote access is both a security and productivity risk. Plus, your computer could be set in a specific way by your company. Your tech-savvy friend isn’t going to know why and how those particular configurations were established.

#3 Don’t store personal data

We’re all in favor of having more than one backup. Still, you don’t want to make your work computer a storage solution for your personal data, because you can’t be sure that other people at work can’t look through your files.

You also run the risk of losing access to that data if the business goes out of business or lays staff off. Employee accounts can be wiped out by businesses when they sever relationships with staff.

#4 Don’t connect personal storage devices

USB or thumb drives are convenient, as such drives help move data around easily. But the drive can be installed in many different computers and networks along the way. Connecting that USB to a work computer could transfer malware.

You really don’t want to connect someone else’s storage device to your work computer. Criminals actually target organizations by leaving infected thumb drives in the parking lot. All they need is one person to pick up the drive and plug it in to a work computer. Trying to reunite the drive with its user didn’t go over so well for that Good Samaritan!

#5 Don’t do your side business or job search

You don’t want to do these on a work computer unless you want to risk getting caught, because your computer activity can be tracked. Some businesses do full-blown screen recording. Others will maintain an overview of sites you visit.

There are different laws in various states and countries regarding employee monitoring, but you are using a work device on a business network. Doing your own side project during work hours on the business computer won’t go over well.

#6 Don’t log on to public Wi-Fi

Don’t log in to business applications or sensitive data connected to public Wi-Fi. There are many risks. You could end up:

  • opening yourself up to “man-in-the-middle” hackers;
  • connecting to a malicious hotspot;
  • transmitting data on an unencrypted network.

These never dos could endanger your personal data, business network, or your very job. Steer clear of these common mistakes made on work computers. Be smart, be safe.

Need help setting up a personal or work computer? We can help. Our IT experts can also install virtual private networks or other tools to protect your work computers. Contact us today at (515)422-1995!

Filed Under: Business, Productivity, Security, Tips Tagged With: business, productivity, security

Share:

Want to Be Anonymous Online? Incognito v. VPN

December 8, 2020 by Paul Schwegler

Maybe you want to be a little mysterious, but more likely you want to protect your privacy when browsing online. You don’t want cybercriminals seeing what you’re doing, or marketers knowing where you go online and what you search for. So, you anonymize your activity using Incognito mode or private browsing. Really though, you want to be using a virtual private network (VPN).

Google Chrome’s Incognito mode helps maintain your privacy when you are online. Other browsers, such as Safari, Firefox, Microsoft Edge, or Internet Explorer, also offer private browsing. When the feature is at work, the browser does not save a record of the websites you visit or what you what you searched for. Plus, it doesn’t save any of your site logins. This means you have to do without the convenience of access credentials auto-populating.

Privacy browsing also disables plugins that may be used to track your internet activity. Still, plugins often serve a purpose while we’re on the internet. So, again, disabling them can disrupt your convenient, efficient browsing experience.

Yet, as cybersecurity concerns rise, recognizing privacy concerns while browsing may not be enough. For one thing, hiding your browser activity is only half the battle. You should also know that:

  • your internet service provider (ISP) may be monitoring the sites you visit;
  • the site you visited could be tracking your ISP address to find out where you logged in from;
  • if you’re not on an encrypted site, a cyber bad guy could potentially read your data.

That’s why many businesses and home computer users who want to preserve their privacy online look to a VPN. We’ll discuss the distinct advantages next.

Online Privacy Advantages with a VPN

With a VPN, you have your own secure and private connection to the internet.

Consider these advantages of having one for your computer, smartphone, or tablet:

  • A VPN encrypts your online activity. That means no third party (company, government, or hacker) can watch your activity as it is transmitted.
  • When you connect, your IP address is masked. The VPN provides you with a new IP address, so you can’t be tracked to your home or business connection.
  • You may be able to access otherwise restricted content. The VPN IP address could appear to be in a country that is allowed access to specific content. So, the website won’t know to block you.

Of course, the VPN provider could be recording your online activity (as an ISP might also do), but the most reputable providers make it a policy not to keep any activity logs for their users.

What Do You Want from Your Anonymity?

When deciding, it comes down to what you want from your anonymity efforts. If you want your browser to not record what you are doing locally, Incognito or another privacy browser will do OK.

If you want a private and secure connection that allows you to enjoy freedom and peace of mind online, the VPN is for you.

Need help securing your online activity? Our experts can help you determine the best approach and implement the right strategy. Find out more. Contact us today at (515)422-1995!

Filed Under: Residential, Security, Tips Tagged With: Incognito Mode, privacy, residential, vpn

Share:

  • 1
  • 2
  • 3
  • …
  • 19
  • Next Page »

Contact Form

Search for Something!

Click to see our BBB Report

FOLLOW US

VISIT US

Privacy Policy

Copyright © 2021 · Little Dog Tech · 5946 Ashworth Rd. , West Des Moines, IA 50266