508-909-5961 [email protected]

Why you should use a UPS for network hardwarePower outages are a major inconvenience to businesses. Even a few hours without electricity can lead to thousands of dollars in lost productivity and revenue. Fortunately, there’s something businesses like yours can do to reduce the effects of power outages, and that’s using an uninterrupted power supply (UPS) for your computers and networking equipment. Read […]

The post Why you should use a UPS for network hardware appeared first on Complete Technology Resources, Inc..

Why you should use a UPS for network hardware

Power outages are a major inconvenience to businesses. Even a few hours without electricity can lead to thousands of dollars in lost productivity and revenue. Fortunately, there’s something businesses like yours can do to reduce the effects of power outages, and that’s using an uninterrupted power supply (UPS) for your computers and networking equipment. Read on to learn more about the benefits of using a UPS for your network hardware.

UPS for network equipment

Also known as a battery backup, a UPS provides backup power in case of outages. It also protects against power surges, which don’t just damage computers, but also make you lose unsaved work.

Deploying UPS units for Wi-Fi routers and modems allows you to stay connected to the internet when the power goes out unexpectedly. This strategy works particularly well if your employees use laptops, as that means you only need power for your Wi-Fi gear.

UPS-supported modems or routers help you stay online for as long as 90 minutes, which should be enough time to get your bearings before power finally runs out. With a UPS, you will still have a fast, reliable Wi-Fi connection so you can perform your tasks, save important files, and keep serving customers.

Without a UPS, your staff may have to rely on cellular data to do their work, which is not only less reliable than Wi-Fi, but also more expensive. You may even incur additional telecom costs resulting from overreliance on cellular data.

UPS systems vs. generators

Although generators are indispensable for certain businesses, they also require greater upkeep. If you invest in generators, you’ll need to employ an entire team to manage these pieces of high-maintenance equipment. This may not be something that a small- or medium-sized business can afford.

That said, generators can prove useful during extended blackouts, but UPS systems should be enough to keep your business running in the event of an emergency.

What’s more, misusing or mishandling generators can result in fatalities. On the other hand, if you misuse a UPS unit or if it breaks down, the worst that could happen is you lose a day’s work; it’s unlikely that you’ll experience anything life-threatening.

Plug in your network gear now

If your business doesn’t have locations in disaster-prone areas, you probably haven’t given much thought to installing UPS systems for your desktop computers, let alone your modems and routers. But accidents and emergencies are inevitable — and when they happen, you’ll find that having internet access is one of the most important things you need to ensure business continuity.

Think of a UPS as an investment that not just protects your systems from data loss, but also keeps your network equipment functioning in emergency situations.

To learn more about UPS systems and network equipment as well as backup and disaster recovery planning, give our team of IT experts a call today.

Published with permission from TechAdvisory.org. Source.

The post Why you should use a UPS for network hardware appeared first on Complete Technology Resources, Inc..

Read More

Secure your Mac before discarding itWell over half of Americans save account passwords to an application or web browser, and at least as many also store private documents on their computers. That’s fine for people who take active measures to protect their data, but if you give away a computer, you surrender all control over it. That’s why you need […]

The post Secure your Mac before discarding it appeared first on Complete Technology Resources, Inc..

Secure your Mac before discarding it

Well over half of Americans save account passwords to an application or web browser, and at least as many also store private documents on their computers. That’s fine for people who take active measures to protect their data, but if you give away a computer, you surrender all control over it. That’s why you need to follow these steps before selling or donating your Mac.

1. Back up your files

You don’t want the new owner of your Mac to find your private files, so you’ll want to reformat it first. However, you may have files you would like to keep. To save those files, back them up on iCloud or on an external hard drive or another Mac via Time Machine.

Backing up using iCloud

Follow these steps:

  1. Go to icloud.com, then sign in using your Apple ID. Fulfill multifactor authentication requirements if prompted.
  2. Check if your account has sufficient space remaining by clicking Settings > [your account name] > iCloud > Manage Storage. Free up storage space by deleting some files, or purchase more space if you must.
  3. To control what you’ll include in your backup sync, go to Settings > [your account name] > iCloud, then turn the toggle switches on or off for the applications you want or don’t want to sync.
  4. Once you’re happy with your selection, click Back up now.

Backing up using Time Machine

You can port your old files to an external drive or to another Mac. For the first option, follow these steps:

  1. Plug the external drive into your Mac and wait for its icon to appear on the screen.
  2. Go to System Preferences > Time Machine > Select Backup Disk. Select the drive you plugged in, then click Use Disk.
  3. You’ll be asked to erase the disk if it isn’t formatted to support Time Machine and Mac. The backup can proceed once you comply.

To back up your files from one Mac onto another Mac, make sure that both machines are on the same network first, Then, proceed as follows:

  1. On the Mac that’ll serve as the backup destination, click the Apple icon in the upper-left corner of the screen.
  2. Tick the File Sharing box.
  3. Select Options. Select “Share files and folders using SMB” if it isn’t selected already, then click Done.
  4. At the bottom of the Shared Folders list, click Add.
  5. Find and choose the folder you want to utilize for sharing, then click Add.
  6. Control-click the folder’s name, then select Advanced Options.
  7. Click the “Share over” menu, then select SMB.
  8. Choose “Share as a Time Machine backup destination.”
  9. If you want, you can use “Limit backups to” to put a cap on the size of the backup to be created.
  10. Select OK.

2. Sign in to all your accounts on a new computer

Before you can ensure that your personal accounts are inaccessible on the Mac you’re getting rid of, you must be certain that you can access those accounts on another computer. If you need to recover a username or password, your options may be limited if the trusted computer has been wiped clean. Make sure to log in to these accounts on another device before moving forward:

  • Apple ID
  • iCloud
  • iMessage
  • iTunes

It’s also important that you remember account credentials that you’d saved on your web browser. If you use Safari, here are the steps to check all the accounts your browser has saved:

  1. Open Safari.
  2. Select Preferences from the menu directly next to the Apple icon in the upper-left corner of the screen.
  3. Click the Passwords menu.
  4. Comb through the list and confirm that you can access all those accounts on another computer.

3. Sign out of everything

Deleting everything on your hard drive does not automatically mean that all of your personal information will be completely erased. This is because your device may be linked to your Apple accounts, which means that if you’re still signed in on the Mac you’ve given away, the next user may have access to your accounts.

To prevent this from happening, deauthorize as many accounts as possible before formatting the storage disk by doing the following:

  1. Open the Apple Books app, Apple TV app, or Music/iTunes app.
  2. On the top menu bar, select Account > Authorizations > Deauthorize This Computer.
  3. Use your Apple ID to sign in.
  4. Click Deauthorize.

Next, you’ll want to sign out of iCloud. If your machine is on macOS Catalina or later, follow these steps:

  1. Click the Apple icon in the upper-left corner of the screen.
  2. Select System Preferences > Apple ID.
  3. In the sidebar, choose Overview > Sign Out.

If your machine is on MacOS Mojave or earlier:

  1. Click the Apple icon in the upper-left corner of the screen.
  2. Select System Preferences > iCloud > Sign Out.

You’ll also want to sign out of iMessage:

  1. Open the iMessage app, click Messages > Preferences > Accounts.
  2. Select your account in the left sidebar and click the “Sign Out” button.

4. Remove the device from Apple Support

Another thing that people often forget to do is revoke their Apple Support registration (unless they want the new owner of their Mac to receive free assistance from Apple Geniuses). Visit support.apple.com/my-support, sign in with your Apple ID and remove any device you plan to get rid of or no longer own.

5. Do a factory reset

When all your files have been backed up and your accounts are accessible on other devices, you can wipe clean your Mac’s hard drive. To do so, follow these steps:

  1. Enter recovery mode. Apple details separate instructions on how to do so on Intel-based Macs and Apple Silicon-based Macs.
  2. To proceed wiping the hard drive, go to Disk Utility.
  3. Under the Internal heading, choose the Macintosh HD drive and click Erase in the top toolbar. Retain Macintosh HD as its name and set its format to either Mac OS Extended (Journaled) or APFS.
  4. To wipe that drive, click Erase or Erase Volume Group (whichever button is shown), then repeat the process for all the other internal drives, if any. This ensures that all data on the Mac is completely erased and that errors during the reinstall process will be avoided.
  5. Close the Disk Utility window to return to the Recovery screen.
  6. Press Command-Q to shut down the Mac.

From here, you can let the person getting the machine install a clean version of macOS.

All in all, this entire process can take a couple of days. Small businesses can save a lot of time by hiring an IT provider with Apple experts to take care of mundane tasks like wiping an old computer’s hard drive. Give us a call today to learn more about what we do.

Published with permission from TechAdvisory.org. Source.

The post Secure your Mac before discarding it appeared first on Complete Technology Resources, Inc..

Read More

How ready is your business for hurricanes?As hurricanes are a common event in many areas of the United States, business owners must take steps to secure their data. In this blog, we provide steps that will help you quickly recover your data and get back to business following a hurricane. Determine recovery hierarchy Certain parts of your IT system are more […]

The post How ready is your business for hurricanes? appeared first on Complete Technology Resources, Inc..

How ready is your business for hurricanes?

As hurricanes are a common event in many areas of the United States, business owners must take steps to secure their data. In this blog, we provide steps that will help you quickly recover your data and get back to business following a hurricane.

Determine recovery hierarchy

Certain parts of your IT system are more mission-critical than others. Ask yourself which systems and/or data must be recovered in minutes, hours, or days so your business can resume operations quickly

For example, you may find that recovering sensitive customer information and eCommerce systems take priority over recovering your email server. Whatever the case may be, prioritizing your systems ensures that the right ones are recovered quickly after a disaster.

Pay attention to location

First and foremost, your backup site should be in a hurricane-free zone. Ideally, your off-site facility should be located at least 100 miles away from your main location. If this isn’t possible, make sure it is built to withstand wind speeds of 160 miles per hour (as fast as Category 5 storms) and is supported by backup generators and uninterruptible power supplies.

You should also request an upper floor installation or, at the very least, keep critical IT equipment 18 inches off the ground to prevent water damage in case of floods.

Use image-based backups

Unlike fragile tape backups, image-based backups take “snapshots” of your systems, creating a copy of the OS, software, and data stored in them. From there, you can easily boot the virtual image on any device, allowing you to back up and restore critical business systems in seconds.

Take advantage of the cloud

The cloud enables you to host applications and store data in high-availability, geo-redundant servers. This means your backups can be accessed via the internet, allowing authorized users to access critical files from any device. Expert technicians will also watch over and secure your backups, allowing you to enjoy the benefits of enterprise-level backup facilities and IT support.

Back up your data frequently

Back up your data as often as possible, especially during disaster season. If your latest backups were created on September 15th and a storm makes landfall in your area on the 28th, you could lose nearly two weeks of data.

Test your disaster recovery (DR) plan

After setting up your backups, check whether they are restoring your files accurately and on time. Your employees should be drilled on the recovery procedures and their responsibilities during and after a disaster. Your DR team should also be trained on how to failover to the backup site before the storm hits. Finally, providers, contractors, and customers need to be notified about how the hurricane will affect your operations.

As cell towers and internet connections may be affected during a hurricane, make sure your company forums are online and have your employees register with the Red Cross Safe and Well website so you can check their statuses.

It’s nearly impossible to experience disruptions during disasters like Harvey or Irma, but with the right support, you can minimize downtime. If you’re concerned about any natural disasters putting you out of business, call us today. We offer comprehensive business continuity services that every company should have.

Published with permission from TechAdvisory.org. Source.

The post How ready is your business for hurricanes? appeared first on Complete Technology Resources, Inc..

Read More

Tips to keep your business data safeLosing or compromising data can be disastrous for your business. It can lead to reputational damage, costly lawsuits, and termination of contracts, among others. And because threats to data security are always present online, it's important to implement tough security measures that will keep your business data safe 24/7. Here are some tried-and-tested methods to […]

The post Tips to keep your business data safe appeared first on Complete Technology Resources, Inc..

Tips to keep your business data safe

Losing or compromising data can be disastrous for your business. It can lead to reputational damage, costly lawsuits, and termination of contracts, among others. And because threats to data security are always present online, it's important to implement tough security measures that will keep your business data safe 24/7. Here are some tried-and-tested methods to safeguard your corporate data.

Use two-factor authentication

Using a complicated password to secure your system is not an effective way to level up your cybersecurity. That's because having to memorize a difficult password often pushes users to set that same complex password for multiple accounts. And if a hacker gets a hold of a recycled password, there’s a high probability that they could access all your accounts that use that same password.

Two-factor authentication (2FA) adds an extra layer of security to your systems and accounts. 2FA comes in many forms: it can be a biometric verification in the devices that you own or a time-sensitive auto-generated code sent to your mobile phone. This security feature works similarly to how websites would require you to confirm your email address to ensure that you are not a bot.

Encrypt all data

Encryption is an effective obstruction to hackers, since it scrambles and descrambles data every time someone tries to read it. Encryption also causes compatibility issues if the data is not being accessed via a company’s own network systems. While applying encryption can be expensive, it is certainly well worth the money because it protects your data in case it falls into the wrong hands.

Keep systems up to date

Hackers are always upgrading their tools to take advantage of outdated security systems, so companies should keep up to protect their valuable technology resources. Many companies don’t install software updates immediately, and that’s a huge problem. Updates often close existing security loopholes, which is why delayed installation can mean exposing your systems to external attacks. Keep your data safe by installing software updates as soon as they are released.

Back up frequently

Implementing several layers to your security doesn’t ensure that hackers won’t find their way into your systems. This is why you need to back up data frequently, whether it’s on-site, off-site, or by way of cloud backups. In the worst-case scenario where your systems do get infiltrated, you can restore lost data from your backups.

Monitor connectivity

Many businesses have no idea how many of their devices are connected online at a given time, so it’s very hard for them to keep track of which of these should actually be online. Sometimes, a company’s computers and servers are online when they don’t need to be, making these tempting and easy targets for attackers. It’s advisable to configure business servers properly to guarantee that only necessary machines are online and that they’re well-protected at all times.

It’s much more expensive to recover from a data breach than to prevent one. If you’re looking to protect your business IT systems from potential threats, contact us today so we can help.

Published with permission from TechAdvisory.org. Source.

The post Tips to keep your business data safe appeared first on Complete Technology Resources, Inc..

Read More