Little Dog Tech Logo
CALL US
515-422-1995
5946 Ashworth Rd.
West Des Moines, IA 50266
  • Home
  • Services
    • Residential Services
    • Business Services
  • Pricing
  • Testimonials
  • About
  • Blog
  • Contact Us
  • Partners
  • Remote Support

Is it Time to Retire That Program? Here’s How to Tell for Sure

July 25, 2018 by Paul Schwegler

Your business has likely been using the same set of applications for some time. Perhaps since the day you started, a long time ago. While you’ve been replacing computers and devices regularly to maintain your competitive advantage, the standard installation has remained largely the same. The programs do the job and everyone knows how to use them, so why upgrade? In some cases, it’s completely fine to keep that legacy program.

However, there are some aspects you should consider:

Support Available

Occasionally, and more frequently with software from smaller developers, the author has moved on from supporting the program. Perhaps they’ve closed the business, sold it, or pivoted directions completely. Either way, they’re no longer interested in helping you get the best from the program. Every time your employees come up against a problem they have nowhere to turn and productivity takes a hit as they try and come up with a workaround. Meanwhile, you run the risk that it could suddenly stop working after a Windows update, begin clashing with other essential software, or even create gaping holes in your security. As you are aware, even the bigger companies like Microsoft stop supporting software after a while, as they have with earlier versions of Windows. Having support available to both assist and protect is a huge asset to your business.

Hardware Compatibility

Imagine picking up a brand-new computer and trying to insert a 5 ¼ floppy disk – that’s the 1980s retro square ones bigger than your hand – it doesn’t matter how effective that program will be, modern technology simply has no idea what to do with it. Thanks to the rapid advancement of computer hardware, you may find a simple component refresh leaves your legacy program completely incompatible. The latest CPU that’s supposed to speed things up suddenly brings your entire business to a standstill, purely because it’s too advanced. Many owners work around this by keeping some older systems running exclusively for that program, but as the classic hardware fails, you may find yourself struggling to find replacement parts or technicians able to install them.

Security Vulnerabilities

Broadly speaking, the longer a program has been around, the longer hackers have had to discover its weaknesses. It could be a flaw in the program itself, or in the operating system that runs it. For example, the application may only run on Windows XP, but Windows XP is one of the earlier versions that Microsoft has stopped supporting. As the older operating systems and programs aren’t being patched, cyber criminals pour more energy into finding flaws they can exploit. It’s open season in their minds, and a free ticket to all your connected systems. It’s how hospitals across the UK found themselves infected with ransomware last year, simply because they were running programs with known weaknesses.

As it’s not always feasible to replace a program immediately, we can help you run it on a virtual machine. That is, running the older operating system or program from within another program. You’ll have increased security, an element of support and a strong backup system while you work to find a replacement program. These types of solutions are very specialized and resource hungry though, so let us know if you need help. The other option is to migrate to a new program that does what you want, and is supported, hardware compatible and secure. If you’ve been running the old program for some time, this may feel quite daunting at first. Before you rule it out, keep in mind you’ll also be gaining the benefits of faster software, more integrated processes and a highly flexible system.

Need to talk through your options? Give us a call at 515-422-1995

Filed Under: Maintenance, Tips Tagged With: legacy software, old programs

Share:

Outsourcing vs Managed IT – What’s the Difference?

July 25, 2018 by Paul Schwegler

Outsourcing has become a dirty word. It implies you’re taking jobs offshore or giving up oversight over a key part of your business. Managed Services is the complete opposite of that, yet it’s often put under the same umbrella, despite being a local solution. Your business already looks for help in various places, hiring consultants, agencies and other contractors, all so that you can focus on hitting your goals. Managed IT is simply another of those specialized services, designed exclusively to help with your technology needs.

A True IT Partner

Our Managed Services team act as consultants dedicated to achieving your business success. We’re able to analyze your technical and strategic needs to tailor solutions specific to your business. We work hand-in-hand with you to design, implement and maintain your tech, keeping you involved at every step of the way. We’ll also keep track of relevant industry news and apply it to your business so you don’t lose your edge. As new software versions are released, we’ll help you make informed decisions about whether to upgrade, stick with current for a little longer, or switch to an alternative. You’ll have a true partner on your team that’s always looking out for your business.

Better Results

Since our Managed IT get to know your business so closely, we’re also able to ensure all your tech support and maintenance is handled quickly, without disruption to your daily running. We have specialists across multiple areas who have seen almost every scenario and know exactly how to solve them. You’ll be able to keep your employees on task while our experienced technicians work through the issue, often remotely so you’re not disrupted at all. Tech help is also available to your staff with rapid turnaround support.

Visible and Accountable

Unlike standard outsourcing where you lose control of certain elements and are left to hope for the best, Managed IT Services are completely transparent. You’ll get reports on the status of your computers or networks, the number of support tickets we’ve answered and exactly what we’ve been doing to keep your business tech up and running. This level of visibility also means you’re able to see IT trends across your business and make strategic decisions to improve productivity and efficiency.

It’s a Local Solution

At one time or another, we’ve all called a support number and found ourselves stuck in a frustration loop with an overseas call center. It’s almost the entire reason outsourcing earned a bad name. Fortunately, our Managed IT is actually a local service, a real-life business near you who employs local people and supports the local economy. Keeping your IT support nearby means you can get the tech assistance you need, with local ethics, customer service standards and even accents that make the process easier.

You Stay Protected and Prepared

Part of any Managed IT service is ensuring your computers, network and digital devices are secure against threat. This means updates are rolled out for you, patches are done, plus all scans, tweaks, backups and system maintenance. Your employees no longer have to worry about making time for (or learning) these tasks, and you don’t have to worry that they’re getting skipped. Very often, this level of proactive support ensures problems are stopped before they occur and your business is able to surge ahead when others fall behind. If anything ever goes wrong, your Managed IT will have prepared disaster recovery and continuity plans so that you’re up and running asap.

It’s Cost-Effective

With Managed IT, you’ll be able to reduce infrastructure costs very quickly as your specialist is able to recommend better, faster solutions such as cloud storage and mobile technology. Instead of replacing hardware and software simply because it’s on the schedule, your Managed IT experts will present multiple cost-saving options and strategies. Very often, these extend to licensing and training too. Productivity gains are made as the tech begins to work with your processes and employees, not against them. Predictable costs are important to every business, which is why Managed IT is the right choice. You’ll know your monthly expenses are capped, and you’ll be able to avoid expensive tech surprises.

If you’re considering Managed IT, reach out to us today.

Filed Under: Maintenance, Tips Tagged With: Managed IT Services

Share:

What’s That Weird Noise Coming from Your Computer?

July 25, 2018 by Paul Schwegler

New computers are whisper quiet, seeming to run on pure magic, but after a while, computers can start making some pretty weird noises. Clicks, clunks, and about-to-take-off jet noises are the most common, but when should you worry? Your computer has a number of moving parts and even some stationary parts that can make noises. If you’re listening, your computer might be telling you about its current health and how you can help it run smoother, for longer.

When you hear a clicking noise: This could be normal if it’s more like a soft tick. Mechanical hard drives work a bit like a record player with a needle and platter, so you might simply be hearing it spin up and move the needle around. When it starts sounding like a loud click it’s usually the needle hitting the platter too hard or bouncing around. If your hard drive has started making alarming noises, you should bring it in as soon as possible. Just like a record player, scratches that ruin your data are possible, and if ignored for long enough, it doesn’t just skip and have trouble reading the drive, the whole thing can become unusable.

Our technicians can copy the files onto a new drive before it gets to that point, but retrieving data from a destroyed hard drive is rarely achieved without CSI-level expenses. It’s easier and much cheaper to replace the hard drive at the first sign of failure.

When you hear a clunking noise: Unsurprisingly, this one causes a certain alarm. Computers aren’t meant to go clunk! It may be a simple matter of a cable having shifted into the path of a fan and getting clipped during the spin. Remember when you pegged a card between your bicycle spokes? It might sound a little like that, skipping every now and then as it’s pushed away and drops back again. If that’s the case, our technicians will quickly secure the cable back where it belongs.

When you hear a jet-engine noise: Most computers and laptops have fans to keep them cool. The fans have to spin to move the air around, and the faster they’re spinning, the more noise they make. We start to worry when the jet-engine noise gets out of hand and it’s not just while you’re playing a resource-intensive game or doing some video editing. Constant jet-engine noise indicates your computer is struggling to cool itself down, perhaps because the fan vents are clogged with dust, your computer is in a poorly ventilated space, or the fan itself is worn. Each fan has ball bearings inside that wear out over time, making extra noise while it does the best it can. Our technicians can replace individual fans quickly and give your system a checkup to make sure nothing else has been affected.

When it’s beep city: Your computer’s friendly beep as you switch it on actually has multiple meanings. It’s not just saying hello. The single beep you normally hear indicates that it’s run a self-test and everything is fine. When your computer is very unwell, you might hear more beeps than usual. This is because each beep combination is a code to technicians, letting us know what’s gone wrong.

Certain beep combinations mean the memory is loose or damaged, others that the video adapter has a problem, etc. If your computer has started beeping differently, let our technicians know so we can decode it and repair the problem for you.

Some noises your computer makes will be normal, others a sign of deeper issues. Even if your computer seems to be operating correctly, a sudden onset of weird noises could mean failure is just around the corner. Taking early action ensures problems don’t escalate, costs are kept low, and your files remain where they belong.

Got some weird noises coming from your computer? Give us a call today at 515-422-1995

Filed Under: Maintenance, Tips Tagged With: beeping, clicking, clunking, loud fans, strange sounds

Share:

6 Clear Reasons to Switch Your Application to Cloud

July 25, 2018 by Paul Schwegler

Has your business embraced the cloud yet? As we move closer to 2019, it’s estimated that approximately 83% of business traffic will involve cloud applications – a trend driven largely by smart decision making. When cloud applications first came out, nobody really understood what the cloud was or how it could help their business, but as the technology improved, so did the secure and flexible solutions available to you. Some of the most common cloud applications are accounting software such as Quickbooks, as well the Microsoft Office 365 package.

Instead of being seen as alternative options, cloud applications are now clearly viewed as the next logical step. Here’s why:

Your data is safer: While it can give you a sense of warm fuzzies to hear your storage drives whirring away, the risks are less appealing. Your servers could crash, drives become corrupted, or a breach could see your data held hostage under a ransomware attack. Of course, there’s always the standard fire/theft/flood scenario to consider too. With cloud applications, your data is safely tucked away in Fort Knox style data centers, complete with robust backup systems in case anything goes wrong. As part of their service guarantees (usually 99.9% uptime), your cloud solution will have technicians on-site whose sole job is to make sure that when you need to use the application, it works. Of course, no one can 100% guarantee that your data will never be lost, but the chances are MUCH greater vs leaving your applications on site.

You’re always updated: Gone are the days of trying to work out compatibility between versions and accidentally corrupting files. Cloud applications are updated automatically on all devices, and unlike when you run an update on a local computer, the process is almost instant. This is because the update is actually running on their end, at the data center. With this advantage, you’re always up to date with the latest features and security patches, no matter how busy you are. This is ESPECIALLY useful in cases of shared database software like Quickbooks.

You’re free to move: One of the best ways to increase efficiency is to remove restrictions around where your employees can do their job. With your new cloud application, they won’t have to wait until they get back into the office to send an invoice, follow up with a customer or even make a record-breaking sale – they can do it wherever, whenever. This flexibility opens up a world of possibility and can literally hand you a competitive edge. All your employees need is an internet-enabled smartphone, tablet, or laptop so you’re even saving money on tech. You can bet we have tons of ideas on how your business can take advantage of this freedom.

Collaboration is easy: Since all the data is held in one place, your employees can collaborate with ease. Nobody gets locked out of files because someone else is using it and changes appear in real-time for multiple users. By having a single version of a file, ideas can flow faster, results become more valuable, and employees enjoy overall satisfaction with a job well done. It may sound like a simple benefit, but we know how frustrating it can be for staff to collaborate without the right tools to support them.

All you need is internet: Considering how fast modern internet speeds are, this is usually a non-issue. It simply needs to be stable and meet a standard speed. If you’re concerned, we can run checks to make sure it will be a smooth transition for you. Because it’s internet-based, the cloud application works with your established network, whether it’s wired, wi-fi or cellular (or a hybrid). Some businesses also choose to have mobile 4G set up in case the internet goes down, that way the connection automatically switches over and downtime are completely avoided.  But please note, you MUST have a correctly sized internet connection for what you are wanting to do. Our technicians can help you determine if you do, and help you find a suitable replacement if necessary.

Size doesn’t matter: Cloud applications are a great option for both big AND small business. Smaller businesses only need to subscribe to single user licenses, while larger businesses enjoy the multi-user license savings. Skipping the cost of per-computer installations and choosing between per-user, per-site or per-use options. We can help you choose the application and cost-saving model that suits your business best.

Talk to us about your cloud options and lock in the advantages today! Call now at 515-422-1995

Filed Under: Cloud, Tips Tagged With: cloud computing, hosted applications

Share:

How to Get the Right Tech for Your New Business

July 25, 2018 by Paul Schwegler

Congratulations on your new business! Start-up costs can easily escalate, and tech is often one of the bigger expenses. It’s not that everything is high priced, but the sheer number of technologies available can overwhelm smart decision making. The latest tech is dangled in front of you with amazing features you didn’t know you needed, and suddenly your budget has gone boom!

Here’s how to get the tech right for your business, without a headache and drama.

1. Check if you actually need it

In a lot of cases, using a cloud application means you can skip the big server purchase, along with the on-site technician to manage it. Many of your business programs will have a cloud option that allows you to get all the benefits without the big expense. Before you make the tech purchase, work out which applications you’ll be running and whether a local installation or cloud access is preferred. As part of this stage, think about how you’d like to use the applications – perhaps remote access is a priority, or perhaps collaboration will underpin your business culture. This level of clarity is often overlooked and the number 1 reason why tech expenses spiral.

2. Get expert advice

It’s easy to ask friends and family what to buy, but there are many more factors to consider than just their personal preference. You trust their opinion, of course, but they may be speaking from a consumer perspective or basing their recommendation on brand loyalty. Every business is different and pairing the correct technology with the business will save you a lot of money in the long run.

3. Buy business grade

Unfortunately, the computers and laptops you see in department stores aren’t up to business standard. They’re designed for home users to perform quick tasks, not run a full 8 hour (or more) workload. Business grade systems have additional features that your business needs, plus longer warranties and better support. Even the attached devices like networking or printers are built to a higher standard, to last longer and perform better. Considering the cyber climate we live in, taking a special interest in the security offered by business-grade technology is a wise decision.

4. Prioritize flexibility

Businesses evolve rapidly during their first few years and the last thing you want to do is go out and buy new tech, playing catch-up with your vision and smushing together an assorted mismatch of devices. Your new technology should be as scalable as your business, which means making purchase decisions based on strategy, not price. Perhaps this means instead of workstations for employees, you only need tablets. Rather than having a fixed point of sale system, you might choose mobile checkout devices so your staff can assist customers on the go. These examples highlight how easy it is to commit to certain tech because it’s ‘what you do’ but later discover you’re locked into a certain way of doing business. Trying to change your processes down the line impacts productivity, efficiency and culture in a big way, so we recommend buying with your future success in mind.

5. Choose an IT partner

During your set up and moving ahead through growth, you’ll need an IT partner who can not only help with your purchase strategy but support you through any tech problems as they arise. That’s the difference between a partner and a supplier, they’re committed to driving long-term business success.

You’ll be able to call on your partner and know they’re immediately up to speed with your business, they know how IT can help leverage your competitive advantage and which critical systems they should focus on. Getting good tech in place shouldn’t be seen as just an expense. It improves productivity and allows you to serve your customers better while enjoying consistent growth.

If you need an IT partner to help your business grow, give us a call at 515-422-1995

Filed Under: Tips

Share:

5 Tech Travel Tips You Can Use

July 25, 2018 by Paul Schwegler

Traveling soon? For most people, this also means making sure your tech is packed and ready for the adventure. Smartphones, ebook readers, tablets, laptops and smartwatches are now so light and portable that you’d never think of leaving them behind, plus they can add a ton of value your experience.

Here are a few tips to consider before you hit the road.

1. Backup to the cloud

While you’re jet-setting around, relaxing on a beach or hiking your way to freedom, your tech is always going to be exposed to a level of risk. This might range from accidentally leaving your laptop at a cafe to having it stolen from your bag, but either way the problem is the same – your data is now gone. If you’ve backed up your devices to the cloud (eg Evernote, Microsoft OneNote or Google Drive) you’ll be able to access your files easily and securely from anywhere.

Hot tip: Scan or save important documents like itineraries and passports to the cloud.

2. Pack the right cables

Begging random strangers for a loan of their cable isn’t much fun, so remember to bring the exact cables and chargers you’ll need. Most smartphones and tablets use universal plugs like Micro USB, USB C or Apple Lightning, so you can get away with only packing one cable. Many locations now offer powered USB ports but be wary of what you plug your device into. It is possible for a hacker to set up a malicious charger that can try to infect your device when plugged in. It is best to bring and use your own chargers.  If you’re traveling overseas and the socket is different, remember to pack a plug converter, and depending on your destination, you might even find the voltage is different. It’s a good idea to check whether you also need a voltage converter before you try and charge.

3. Download offline data

It’s no secret that global roaming can give nasty bill shocks. The easy access data you normally use over Wi-Fi or get included in your cell plan has us all accustomed to being connected. While traveling, you might find yourself in a location where data costs a fortune or it’s not available at all. Download any files you might need, including important documents like itineraries and bookings, and offline maps so that you can access them even without a connection.

4. Update and scan

Just like you’d make sure you’ve got the right vaccinations and travel gear, make sure your tech is ready to travel too. Set aside a few minutes to run updates for your operating systems and apps, as well as your anti-virus. Go one step further and run a manual anti-virus scan too. The last thing you want to deal with one your trip is a cyber attack! While you’re doing your pro-active thing, turn on PIN or password protection for all devices so that only you can unlock them.

Hot tip: Use make sure your devices are encrypted so if you do lose them, the thieves have no access to sensitive data.

5. Mark your territory

Almost exactly the way it sounds, let everyone know this tech belongs to you. Write your cell number on portable devices in case you get separated so whoever finds it can give you a quick call and save the day. Don’t want to use permanent marker on your shiny tech? Grab some sticky labels you can peel off when you get home.

You can also get little Bluetooth tracking tags to stick to your gear, so that if you ever lose something you can chase it down. Similarly, you might like to consider enabling the ‘find my feature on Apple devices. Having this feature switched on also means you can disable your device remotely, an excellent security option if it’s been stolen.

Need help preparing your tech for travel? Give us a call at 515-422-1995

Filed Under: Security, Tips Tagged With: travel security, travel tips

Share:

Should You Pay for a Ransomware Attack?

June 25, 2018 by Paul Schwegler

Getting hit with a ransomware attack is never fun, your files get encrypted by cybercriminals and you’re left having to decide: should we pay to get them back? It’s a scene that’s played out across the world with 70% of businesses saying ‘yes’ in 2016 alone.

Personally, I don’t recommend paying a ransom. It encourages the criminals to keep doing what they are doing. However, as a small business owner, I could definitely see the desire to pay the ransom, get my files back, and make this all go away. I am adamant with all of my clients to have a good offsite backup just as we do. Not all have chosen to go that direction, but hopefully, you do, as it is just a matter of time before it is needed. Now, should you pay the baddies? Here’s what to consider.

Do you trust them?

Besides the fact that they’re criminals holding your data hostage, how confident are you that they’ll send the decryption key? Most attackers demand you send the payment via untraceable cryptocurrency, so you have no recourse if they take it and run. You’re also equally trapped if they decide they asked too little and come back with increasingly higher demands. If they do send the decryption key, be aware they still have access to your systems and can hit you again at any time until your network is disinfected by experts. Businesses don’t exactly want their breach publicized either, so many don’t admit to paying the ransom, whether it went to plan or otherwise.

Can you manage the impact?

Best case scenario, you can wipe the affected drives and restore from a clean backup without paying the ransom. You might even decide the encrypted files aren’t that important and simply let them go, or even wipe a whole laptop or workstation. On the other hand, if your data management comes under any special regulations, like health or legal, you may find the attack has a much wider, more intense impact. The attacker will usually give you a countdown to motivate a payment, with a threat of deletion when it hits zero. If the data isn’t that valuable, or you have confirmed backups, this urgency has no effect.

How much do they want?

Cybercriminals rarely send out global attacks with set amounts, instead, they prefer to customize the ransom based on how much they think you can pay. Large corporations and hospitals are hit with very high demands, while small business demands are more modest. They may be criminals, but they’re smart people who know your financial limits. They’ll also consider how much similar businesses have paid and how quickly, then expect you to follow suit.

Are your backups good?

Many businesses are discovering too late that their backup systems aren’t robust enough to withstand this type of attack. Either they’ve become infected too, they weren’t up-to-date, or they backed up the wrong data. It’s worth doing some quick checks on your backup processes as even if you have to take the system down for a day as you recover, you’re still light years ahead of those without them.

What’s your policy?

More and more often, businesses are adding ransomware to their disaster recovery plans and having predefined actions mapped out. Seemingly simple inclusions like who has final say over the payment decision can stop chaos in its tracks. Employees and management alike can then approach the situation calmly, ready to make the best decisions for the business.

Stay safe in the first place

Ransomware is showing no signs of slowing down. As more businesses keep them funded the cybercriminals are steadily launching new attacks and making it their full-time job. Most attacks come via phishing emails – those emails that trick employees into clicking a link – and they can be extremely convincing. While training helps people spot them, it’s no guarantee. We recommend using business-class spam filters to catch these types of emails before they land in your employee inboxes so that triggering a ransomware attack becomes something that happens to other businesses, not yours.

Filed Under: Backup, Security, Tips Tagged With: Ransomware

Share:

Should You Let an Amateur Loose on Your Network?

June 18, 2018 by Paul Schwegler

Most of us know a fair amount about computers, even kids are joining circuits and coding programs in schools – but that does that make everyone an IT expert? It’s fair to say almost all workplaces have that employee who can finesse the printer or use shortcuts nobody else knows about. They have skills, absolutely, but they often know just enough to be dangerous to your business.

Knowing how to Ctrl+Alt+Del does not an expert make…

Hobby IT skills are learned on home computers which are very different to a professional business setup. When something goes wrong on a home computer, there’s no drastic impact if parts need to be replaced, data is lost or it stays down for a week or two. In a business setting, every problem costs time and money, usually creating a domino effect through the entire network. Would you gamble the success of your business with a non-professional who did a quick Google? It’s unlikely you’d let someone be your lawyer purely because they can deliver a stubborn argument, nor would you let someone perform surgery just because it looked easy on TV. Businesses have unique, specialist IT needs that go beyond amateur computer skills and there’s always going to be more at stake.

We’ve seen some things…

Designing and implementing a custom backup plan for your business is a particularly interesting area. While most home users skip this part entirely, an IT professional has seen (and recovered) all manner of situations and will use that knowledge to ensure that if the worst happens, your business is covered. This could mean anything from having a complete copy of your drive stored securely in the cloud or drilling down to backup only the most important data. An IT expert is equipped to help you identify the value in each piece of data and implement a plan so robust that if your business is ever hit by disaster or breach, downtime is minimal – along with losses.

Plan for the Worst and Hope for the Best…

If a disaster ever does occur, like fire, flood or theft, would an amateur know what to do? Who to call? These situations are so charged with tension and panic that making the wrong moves can lead to more damage. A professional helps design continuity/disaster plans, which map out exactly what should happen, who should do it and in what order. It takes out the guesswork and minimizes downtime. Perhaps more importantly, the expertly written disaster plan will include a complete risk analysis so that you know in advance where to strengthen your protection. It also includes a business analysis so you know which systems are dependent so you can stop the domino effect, plus know the legal/contractual impacts, financial impacts and so on.

Are You Ready For When the Fuzz Shows Up…

Your IT professional will also help ensure your business is meeting any regulatory requirements. Many businesses are subject to strict data rules set by government bodies, such as FISMA and HIPAA. The regulations change often and demand increasingly more attention to data security, with hefty penalties for businesses that fall behind. Professionals are constantly in the loop around upcoming revisions and how best to comply with little to no disruption to your daily business.

Your Software is Not a Sponge, it Should Not Have Holes…

Part of ensuring your business is safe means staying on top of software updates and patching multiple computers at the same time. The best option is to run the updates overnight before employees arrive for the day, and since the process can take a few hours and be quite fiddly, it’s generally not something amateurs will prioritize. Unfortunately, as we’ve seen with recent cyber-attacks, delaying a security update by even a few days can lead to disaster. Engaging an IT professional is a cost-effective solution that keeps your business running, growing and earning.

Filed Under: Tips Tagged With: Computer Management, Network Management

Share:

Shopping for a New Computer?

June 18, 2018 by Paul Schwegler

It’s a decision that comes with equal doses of excitement and overwhelm: getting a new computer! Unlike popping out to the shops for a new toaster, choosing the right computer comes with so many questions, most of which are usually asked in some sort of alien language. Helpful sales people offering RAM as it were a side of fries, measuring CPU speeds in ‘cores’, and listing specs that mean nothing around what you actually want to do.

That’s where we start. Not with tricky language that only makes sense to other computer geeks, we simply find out what you plan to use your computer for, then help you do it. Depending on your needs, we may even be able to provide the computer right there and then. Other times, we’ll offer guidance on what’s in the stores and make sure you’re equipped with all the magic words that get you walking out with what you need, and only what you need (at the perfect price!).

Then comes the real fun.

Once you’ve got that new machine home and out of the box, you’ve inhaled that new tech smell and taken plenty of selfies to remember the moment, the overwhelm can come flying back in. Which cord goes where? It doesn’t work like your old one! Why is it doing that?! How to put programs back on? Does it come with security already loaded? If you’ve had your old computer for a few years, you know you’re in for a bit of inconvenience, no matter how shiny the replacement is. What do you need to do to make the new computers yours?

Move your old files.

One thing most people forget during their new computer bliss-phase is how to get information off your old computer and onto your new one. If you know a thing or two about moving files to a flash drive, then this can be pretty easy as long as you put the files back in the same location. If your old computer is too broken to boot, this can be a real problem. You can either turn the old hard drive into an external drive or copy the data onto a USB stick using a bootable flash drive. This can get kind of hairy if you aren’t a technician, so you may want to leave that up to the professionals.

Set up your email.

Maybe you access your e-mail using a web interface. If so, then you’re done! Simply go to the same website you are used to going to and your e-mail should be there (as long as you remember your login password). However, if you use a local client (Outlook, Thunderbird, Apple Mail), setting up email can cause headaches even for a tech person. Getting the settings perfect can sometimes be more error than success. The most common problem we see is email that can receive, but not send. It’s a frustrating problem, especially when you’re sending important emails. We can set your email up successfully and ensure it both sends and receives, as well as add in any additional accounts you’d like to manage from the same app.

Save your favorites.

All those bookmarks you’ve made and carefully sorted (or not) are important. You may even have different collections of favorites in different browsers and the last thing you want to do is to find those pages again. Most web browsers have an ‘export’ function that can bundle all of your favorites up into a neat little file that can then be transferred to your new computer and restored. If this is above your pay-grade, we can retrieve your old favorites and put them onto your new computer, making your browser experience look and feel exactly as it did before, only faster.

Set up your software.

Quite often these days, software doesn’t come on a CD. While that’s forward thinking and reducing waste, don’t you miss having a disk you could install from and the license key taped to the back? We sure do! If you don’t have your original installation disks (or you never had one), you may be able to download them from the internet, just be careful you are getting it from a reputable site! If you ware having trouble, we can help you re-download your programs and reinstall them as long as you can find your licensing. As technicians, we also tend to go one step beyond and make sure the new software is optimized, updated and working well. While we’re doing that, we make sure your anti-virus is up-to-date and you’re as secure as possible against threats.

Connect extra devices

Sometimes it’s a matter of knowing what cord goes where or getting the right adapter, but sometimes new devices can present software problems. Printers, webcams, game controllers, etc all have unique drivers that need to be installed before they can work properly. Windows 10 is great at picking most of these up automatically, but if they’re not playing nice or your new computer is suddenly missing the correct plug, you may need to go to the manufacturer’s site to get the newest driver or even replace it if it is too old.

Filed Under: Tips Tagged With: new computer

Share:

Why Your Business Needs Unified Threat Management

June 11, 2018 by Paul Schwegler

Sounds scary, doesn’t it? Almost like a swat team dressed in black is going to swing in and start yelling orders. While just as effective at disabling the bad guys, Unified Threat Management (UTM) is a special kind of IT solution focused on proactive protection. Consider it more like a team of virtual bodyguards that stand at the door between your business and the internet, keeping trouble out while your legitimate traffic can come and go normally.

With the increasing number of connected devices in your business network and the different ways your employees now connect, it’s more important than ever to set up dedicated security systems that give integrated protection. UTM is a series of solutions that work together, simultaneously layering your protection across the board. We’ll cover the four main inclusions here, and exactly what they can do for your business.

Robust Firewall

Put simply, a firewall keeps an eye on all the data coming in and out, looking for anything abnormal. While every home PC comes with a software firewall built in, those ones pale in comparison to what a UTM firewall can do. Remember the team of virtual bodyguards? Imagine the home firewall as an aging rent-a-cop with a flimsy baton, while the UTM is an ex-special forces soldier with a 10th-degree black belt in judo and a very large gun. It exists solely to make sure the data entering your network is safe, that it’s not part of a cyber-attack, and that in the rare event your network becomes infected, your servers aren’t being used to attack another business.

Anti-virus Where it Matters

With so much new malware being released daily, it’s easy to fall behind in updates and discover you’ve been infected. Your employees are likely doing their best, but manually scanning each file can be exhausting and time-consuming. Your UTM anti-virus is built into the firewall, ensuring known or suspicious malware is stopped at the door. It’s the first layer of defense that doesn’t allow malware to even make it through to your employees, so the risk is reduced. Clearly that’s the best outcome possible and will allow your employees to work at maximum efficiency, while you can run your business with confidence.

Spam Blocking for On-Premise Mail Servers

Most cyber-attacks come via email these days, with either an attachment or a link. Once clicked, the malware is released into the network to wreak havoc. Obviously, your employees are smart enough not to open random attachments/links, so hackers use phishing emails. These are emails that look legitimate and may refer to vendors you use, financial services you have accounts with, or even seem to be from other employees.

If you have an on-premise mail server, your UTM is going to be able to mitigate these threats. It strips down each email and checks it against high-tech legitimacy markers. If it sees anything suspicious, the email is marked as spam and either held for review or bounced away.

Your employees never see the attack, so they can’t accidentally fall for it. While the UTM is monitoring for phishing/fake emails, it’s also culling out the general spam that clogs up inboxes. Employees will no longer have to spend precious minutes each day wading through the junk, and the likelihood of missing an important customer email has greatly dropped.

Web Content Filtering

In a perfect world, your employees would only access work-related sites and do work-related things online. Content filtering can help you limit the risk they’re bringing into your business via these websites. Your UTM can be set to restrict sites that infect computers, such as adult content, gambling or illegal downloads. It can also be used to restrict access to productivity vampires like Facebook or Pinterest, either during work hours or completely. It’s up to your policies how much you’d like to filter and whether to add any flexibility. Some businesses allow social media during lunch breaks or have special reward hours each week. Simple tweaks like this can increase productivity overnight and give you the security you’re looking for.

You can see how a layered security solution like UTM provides a space for your business to thrive, where systems are secure, employees are able to maintain efficiency, and cyber problems stay outside the doors. The way the layers work together is more effective than a patchwork of separate systems, and a UTM is much easier to configure and maintain.

Filed Under: Security, Tips Tagged With: Gateway Antivirus, Sonicwall, Sophos, UTM, Watchguard

Share:

  • 1
  • 2
  • 3
  • …
  • 6
  • Next Page »

Contact Form

Please fill out the form below to ask us a question.

Click to see our BBB Report

VISIT US

Copyright © 2019 · Little Dog Tech · 5946 Ashworth Rd. , West Des Moines, IA 50266