Little Dog Tech Logo
CALL US
515-422-1995
5946 Ashworth Rd.
West Des Moines, IA 50266
  • Home
  • Remote Support
  • Services
    • Residential Services
    • Business Services
  • Pricing
  • About
  • Reviews
  • Contact Us
  • Blog
  • Partners

How to Get Your Devices to Play Nicely Together: Home Networking Help

March 10, 2020 by Paul Schwegler

Why can’t we all just get along? You’ve probably thought that before. But the sentiment is also one that goes through our heads when we’re trying to set up home networking. When cables and passwords abound, we can’t help but wish it was easier to get all our devices to play nicely together. Here’s help.

Desktop computers. Laptops. Tablets. Network printers. Routers. Modems. Smartphones. Smart speakers. Media players. Gaming systems. Homes today have many, if not all of these. Each has all sorts of features, and they’d be even more useful if they connected to one another. If only it wasn’t so challenging to get all our devices to relay information between each other reliably.

Home networking can bring so many benefits. You might enjoy:

  • accessing emails on all your devices, wherever you are;
  • surfing the Web using your voice;
  • being able to share files, photos, and other media with any other networked device;
  • viewing a baby photo album from your computer on your Smart TV during a Sweet 16 birthday party;
  • printing from your smartphone or other devices, even when not connected to the device via cable, using AirPrint or Google Cloud Print;
  • backing up all computers in the house to a centralized location via the network;
  • securing your activity on all devices at home with a protected Wi-Fi network.

Yep, all that sounds pretty great, but we’re right back where we started. How do we get our devices to do all that?

What Your Home Network Needs

First, take a moment to imagine connecting all the computers and smart devices in your home via cables. Ack! As if you want more cables snaking around your home! You don’t want to feel as if you’re rooming with Medusa.

So, you’ll be looking into a wireless home network to connect your devices to the internet and each other. That means setting up a modem and a router (we’re assuming you already have an internet service provider).

The modem is what connects your network to the internet. The router connects your devices to each other and to the internet through your modem. The router communicates the wireless signal between your devices and the modem. A gateway option combines the modem and router functions in one device.

If your home is spread out over several floors or square feet, or you have to deal with thick walls, you might have difficulties at home with Wi-Fi dead spots. Great! You’ve made all this effort, and it’s still not working! You could try a mesh network. Instead of making one device do all the signaling, a primary router and many smaller satellites (or nodes) relay the signals with equal power.

Securing Your Home Network

When you get your devices connected, you’ll want to secure your home network. Taking these simple steps helps protect your personal information and prevent cyberattacks.

First, change the default passwords on your modem and router, and choose something more complex than “123456,” “password,” or “letmein.”

You’ll also want to set up a guest network if the router supports it. This allows visitors to access the Wi-Fi without you having to share access to your main network.

Also, rename your Wi-Fi network so that it isn’t obvious that it’s your house. For example, if you live at 920 Hassell Place, you wouldn’t name it 920Hassell. Or, if you’re the Wilsons, don’t name it WilsonNetwork. Don’t make it easy for someone trying to target you to identify which network they are trying to hack.

You like using all your devices, but getting them all networked seems like a headache. Still, once you have a home network set up, you’ll wonder why you waited so long. Don’t put off the convenience any longer. We can help you get all your devices playing together nicely and securely. Contact us today at (515)422-1995!

Filed Under: Networking, Residential, Security, Tips Tagged With: network, residential, wi-fi

Share:

Storage Struggles? How to Keep Up with the Data Explosion

January 7, 2020 by Paul Schwegler

The digital boom presents us with brand new problems too. By moving all our files into a digital space, the amount of storage we need to maintain has grown larger and larger just to keep up.

As digital technology has improved, the resolution, clarity, and size of the digital files we create has exploded. Items such as Xrays, which used to be printed on film are now digital files transferred by computer. As a result of the increase in both the number of digital files we use and their ever-growing size, the size of the data we need to store has exploded exponentially.

There are a number of ways in which we can tackle our ever-growing storage problem.

Local server or Network Attached Storage (NAS)

A local server is a machine physically located within your own office or building. These are typically designed to serve many files to multiple clients at one time from locally held storage.

The primary advantage that a local network server has is that all your vital data is available to all users in one central location. This means that employees across the network can access all the resources made available.

These machines can serve files at the speed of the local network, transferring large projects, files, and documents from a central position within the network with ease.

A NAS has many of the same network properties, typically packaged as a smaller profile, low powered computer. A NAS is specifically designed to enable network file sharing in a more compact package. These can be available in units small enough to fit in a cupboard nook and yet still provide staggering storage capacity on only a small amount of power.

Both a local server and NAS device allow for large amounts of storage space to be added to the local network. These units are often expanded with more and more storage over time. As an organization grows over time, so do its data storage requirements.

Cloud Storage

Sometimes the best option for storage is to move your ever-expanding data outside of the business completely. Often, offloading the costs of hardware and IT management can work out to be an intelligent business decision. One that provides freedom and flexibility in your data storage needs.

The major advantage of cloud storage comes from the ability to expand and contract your services as needed without the unnecessary overhead of adding and maintaining new hardware.

By moving storage to the cloud, data can be accessed from anywhere in the world. The flexibility provided by cloud storage allows limitless expansion to any number of devices, locations, and offices. Being able to access data from many locations at a single time can often provide a valuables boost to productivity that can help to speed projects along.

Some of the drawbacks of cloud storage come from factors that may be outside of the control of the business. Not all internet connections are found to be up to the task of handling large amounts of data to and from the cloud. In some cases, the infrastructure is quite simply not in place yet to support it.

IT security regulations can prove to be a barrier to enabling storage in the cloud too. Some regulations either prohibit the feature entirely or enable only certain specific types for use.

The Right Choice for your data

Both cloud and local storage can provide further benefits to enhance your business. Audit logs, central backups, and version control can all be used to secure the way your firm handles data.

Whatever your situation, whether a small NAS can boost your office productivity, a local server can provide the connectivity missing from your firm, or cloud storage can switch on new resources, we can advise on the best choices for your business.

Give us a call at (515)422-1995 to allow us to use our expertise to make the right chose for your data.

Filed Under: Business, Cloud, Tips Tagged With: cloud storage, data, network, server

Share:

Protecting A Business from Internal Threats

January 7, 2020 by Paul Schwegler

When considering IT threats to your business many articles focus on hackers, viruses, and attacks from external threats. These dangers are real, constant, and easily identifiable. In many cases, however, the largest threat to a firm comes from inside the business itself.

People inside the firm often pose the largest single threat to systems and security. These individuals often have trusted access and a detailed working knowledge of the organization from the inside. Employees therefore deserve the largest security consideration when designing a safe business system.

It is important to first distinguish the type of dangerous employee we want to defend against. We’re not talking about an otherwise model employee accidentally opening a malicious email or attachment. Rather, a disgruntled employee seeking to do damage to your business. An employee who may wish to destroy services or steal clients and files from your firm.

Security Policy

Some firms, particularly young businesses, grant employees system-wide permissions from day one. This can make administration appear simple, preventing further IT requests in future. Granting system-wide access is an inherently risky strategy.

Private information relating to the business should be restricted access information. Many types of files need to remain confidential, often as a legal requirement. Human resource files, salary information, and employee documents should be limited to only a select few employees. Yet, businesses often keep confidential information in public places on the network.

Granting system-wide read and write access can appear to save time short term. It is, however, a security policy which only serves to cause security, administration, and potentially legal troubles in the future.

The Principle of Least Privilege

The principle of least privilege is a vital tool, helping you to handle internal IT security. It defines a security policy which ensures staff can access only the resources, systems and data they require to carry out their job.

The policy protects the business from many different types of threat in day-to-day operations. Even where malicious attachments have been opened by accident, the damage is limited only to the work area of a single employee. This results in contained damage, less time needed to restore from backup, and drastically reduced downtime for the firm.

Along with limiting accidental damage, malicious employees looking to destroy or steal data are limited too. With restricted access, an employee with a grudge or profit motivation can only damage or steal from their own area of operation. This helps to ensure that no single employee can damage the entire firm’s operations.

Security Policy In Practice

A member of staff within Human Resources, for example, may have read and write access to the employee database. This will likely include payroll information and sensitive data. This same member of staff would have no need to access sensitive client data, such as sales information, in normal working conditions.

Likewise, a staff member from the sales department should have no need for accessing sensitive HR records.

Using the principle of least privilege, each employee may only have full access to systems that are directly related to their role. Similarly, some systems may be visible to a wider group of staff members even if they can only be edited or removed by one or two people.

In some cases, a security policy may be defined by even finer details than a person’s role within the organization. An HR employee should not be able to edit their own file to change salary information for example. An employee file might only be edited by their superiors in such a case.

Additional parameters can be used to assign privileges to enable the business hierarchy to work within the IT network. Seniority, physical location, and time are all examples of factors that can restrict access to critical systems and secure data.

We can tailor your network to your business, locking down your data to ensure data is only accessed on an “as needed” basis. Call us at (515)422-1995 now.

Filed Under: Business, Security Tagged With: IT threats, network, security

Share:

Is Your Home WiFi Keeping Up

December 4, 2017 by Paul Schwegler

Wi-Fi has forever changed the way we live, work and play. We can surf the internet on the couch or by the pool, look up a recipe in an instant, and even connect our lights to voice control. It’s no wonder it was accepted with open arms, but is your Wi-Fi as good as it needs to be?

15 years after Wi-Fi first made its way into homes with those mysterious rabbit-eared boxes, it’s evolved into a juggernaut of speed and accessibility that we can’t do without. Think about how many wireless devices your home has – the average home has at least 10 devices connected wirelessly to the internet, many have more.

While older devices are typically happy with a small slice of your internet, newer devices like 4kTVs and media streaming simply can’t function without a fast connection. Add in a game console, tablet, a few smartphones and a laptop or two, and your Wi-Fi is suddenly stretched beyond full capacity and struggling to keep up. Yet, most people don’t know how fast their Wi-Fi is, or if it’s working right– they only know how many bars they’ve got. Unfortunately, counting bars can add up to one big headache.

Here’s why your WiFi may be letting you down:

Bars measure the wrong thing: While it’s great to know you’ve got a ‘strong’ signal, it would be even better if you could have a ‘fast and available’ signal. The internet could actually be down and you’d still have full bars because it’s really only measuring how close to the Wi-Fi router you are. That proximity measure doesn’t take into account how many devices are fighting for the same bandwidth or whether there’s any left for you. We can ensure your Wi-Fi isn’t just available, it’s up to the task.

Wi-Fi goes sideways too: While your neighbor’s Wi-Fi can reach the back of their property, it can also go a similar distance sideways into your house. This extra ‘noise’ can disrupt and slow down your own Wi-Fi. In dense areas, your Wi-Fi is basically getting lost in a swirling field of signals, all using the same channel and frequency. It’s a digital crowd which can seriously slow your speeds. We can fix this by changing your Wi-Fi channel to one with less cross-talk.

Everyone uses the default settings: Most home Wi-Fi uses a 2.4ghz frequency by default. While it makes a plug & play router easy to set up, it does mean you’re not getting the speeds you could be. Switching to the 5ghz frequency means your Wi-Fi is separated from the neighborhood cross-talk. The 5ghz band is also considerably faster, which is a bonus but it has its drawbacks too. We can help you upgrade to a newer 5Ghz-capable router that can provide both frequency bands and automatically switch your device to the best one.

Your house is too big: WiFi radios are limited in transmission power by the FCC. As such, even the fanciest most powerful router can only reach so far. Likewise, even if your super-powerful router can broadcast to the edges of your property, your device may not be strong enough to send a signal back. Sometimes people’s solution to this is to purchase another router (setting up two networks which are cumbersome at best), or adding an off-the-shelf repeater (which isn’t a great solution either). Instead of going down that patch of a segmented unstable network, there are systems for sale that actually allow you to have a seamless single network through your home. These types of networks are called ‘Mesh’ networks, and when implemented properly they can GREATLY increase the coverage and performance of your network.

Priority isn’t set: While not Wi-Fi specific, we can also set up “Quality of Service” if your router supports it or supply you with one that does. This allows things like Netflix and Skype calls to always take priority and remain uninterrupted over less important tasks like downloads. You’ll be able to watch movies without those awful buffering jumps and video chat without freezing.

Filed Under: Networking, Tips Tagged With: network, router, wifi, wireless

Share:

Contact Form

Before submitting your question, you must review and agree to the Little Dog Tech Terms of Service.

Search for Something!

Click to see our BBB Report

FOLLOW US

VISIT US

Privacy Policy

Copyright © 2023 · Little Dog Tech · 5946 Ashworth Rd. , West Des Moines, IA 50266