We were thrilled to join Brett and Carol from Circle270Media on their podcast "Looking Forward Our Way" discussing the topic: "Age Doesn't Limit Tech Savvy Experiences"
Nice Guy Technology's younger members fielded many of the questions to provide their take on technology as it relates to the more mature user.
Questions hone in on how we can ensure that our family, friends, and colleagues who are not as adept at technology can use it and maintain a safe computing environment.
You can check out the episode here: https://lookingforwardourway.com/age-doesnt-limit-tech-savvy-experiences/
As always, if you have any questions, please contact us at (614) 233-1648.
When we think of myths we usually think of stories that seem possible but you never know if it’s true or not. Sometimes myths are harmless, but when it comes to business IT myths, not knowing the truth is damaging. Let’s look at some of these myths in more detail and find the truth.
Myth 1: Apple computers can’t get viruses.
While there are fewer malware programs written that target Macs, they are just as vulnerable to viruses as their Windows counterparts. Whether you use a Mac or Windows computer, you want to first, Run a solid, business grade antivirus/anti-malware product, second, You want to protect against human error by educating employees about the dangers of downloading applications and clicking links in phishing emails.
Finally, Put security measures in place to prevent physical theft or loss. Make sure your Mac is password-protected, backed up, kept in a safe place, and set up with Find My Mac.
Myth 2: One backup is enough.
Having one backup is a great start, however, we recommend taking a hybrid approach to backing up your data. This means having both a local and cloud-based backup. The local backup is important to have because it’s quick and easy to restore from. The cloud-based backup would be crucial to getting your business back up and running if your local backup was destroyed.
Myth 3: Antivirus software completely prevents infection.
Antivirus software is valuable, yes, and your business should consistently upgrade its antivirus software. But no antivirus is going to protect your business from every threat.
Security programs do their best to keep up with new threats and vulnerabilities, but infections can spread across the internet quickly. Plus, bad guys are getting better at making threats that evade current antivirus software. As a result, make antivirus software only one piece of your cybersecurity plan.
Myth 4: Cybercriminals only target enterprises.
Attacks on big brands are the ones that get noticed, but nearly half of all cyberattacks hit small businesses. The criminals know that small businesses are less likely to have proper protection in place.
Myth 5: It’s OK to wait until the computer fails to replace it.
You can wait, but it’s not going to be the best thing for your business. Long before a computer fails it could be slowing you down. Older PCs disrupt productivity and reduce employee satisfaction.
As the computer ages, things go wrong, it costs you time and money. Outdated technology also leaves your business vulnerable to cyberattack.
Myth 6: IT outsourcing is not effective for small businesses.
Maybe you think your IT systems are too small to need ongoing maintenance or monitoring, or (Myth 4) that you’re not at risk. IT systems of any size need ongoing, consistent attention, and outsourcing can give you back the time needed to focus on running your business.
A managed IT service provider can monitor hardware and backups, streamline systems for speed, and keep security current. An MSP can also manage firewalls, and identify and protect against threats. Partner with us for business IT support. We’re here to help!
You can’t expect to remember all your unique passwords. Yet the days of writing them down on Post-it notes are over. Here’s where password managers come in.
Password managers generate, manage, and store many different passwords. So instead of having to remember all your login information, the password manager stores and auto fills that for you. Many password managers have apps you can use on mobile devices. This gives you the advantage of convenience not only on your desktop computer but also on the go.
More Benefits of Password Managers
Some password managers offer added security benefits, as well. They might:
· warn you of weak password and login credentials;
· remind you to change your passwords;
· notify you if your passwords may have been compromised in a breach;
· advise you against repeating access credentials if you’re about to do so.
Another advantage is that you can conveniently share passwords with others. Maybe you want to allow a work colleague access to applications you’re using remotely. A managed password sharing feature can allow them to see selected passwords. You can choose what information is shown so important details stay private. Also, when you change your credentials, the password will change on their end, too.
You can also use a password manager to secure other important information such as credit card numbers or other personally identifying information. Keeping that kind of data in an unencrypted note on your desktop or mobile device is unsafe, but you can take advantage of password manager encryption to safely store those precious details.
Secure your passwords with a manager
Contact our IT experts today to find out more about password management. We can help you find and implement the best solution for your needs. We’re here to help!
Are you still using Office 2010? It may have served you well over the past decade, but this software reached its end of life in 2020. It’s time to upgrade. Here’s why and what to consider.
Software has a typical life span, after which the manufacturer turns its resources to supporting a more recent release. Support for Office 2010 ended on October 13, 2020. Microsoft no longer provides tech support, or bug or security fixes. That means there’s no protection from harmful viruses, spyware, or other malicious software. The software won’t be updated, and there’s no more phone or chat support if you run into trouble.
Cybercriminals know that Office 2010 users are on their own. They’re on the lookout for businesses relying on this legacy software. Without updates, you risk opening a document designed to leverage an unpatched exploit.
What can you do?
Move your business computers to one of the more modern Microsoft software offerings. You can choose to upgrade to the latest version of Office as a one-time purchase, or buy a Microsoft 365 subscription to the latest features, security updates, and other improvements.
The currently available version of Office, Office 2021, is available for PC or Mac. You can install Office only on one device, and you’ll get support and fixes during its lifecycle period only. New features aren’t offered.
Before deciding to go with Office 2021, consider Microsoft 365 (MS 365). MS 365 gives you access to Office’s cloud-connected features across devices, plus, 1 TB of OneDrive storage, Office mobile apps, Skype minutes, and access to support.
As new MS 365 features become available, all subscribers get access on a monthly basis. With a business account, the administrator can control when you are able to see them.
Is MS 365 for Us?
You may want to keep everything on-premises for compliance or regulatory reasons, or perhaps you feel better with everything where you can see it. You can upgrade to Microsoft 365 and use offline versions of their software.
Still, for many, MS 365 appeals because it’s on the cloud, or both on-premises and in the cloud. Employees can use familiar tools such as Word or Excel installed on desktops, then save files to the cloud. This makes work available anywhere, from mobile phones, tablets, laptops, and other devices.
Microsoft 365 also adds in Teams. Enjoy video conferencing, screen sharing, group chat, calling and Teams collaboration software.
Then, you always have the latest version of Office, Exchange, SharePoint, and Skype. Your subscription sets you up with the latest version without the need for a major migration.
MS 365 comes in several different business packages. The Basic version provides free Web and Mobile only, along with Exchange, OneDrive, SharePoint, and Teams. If you don’t need those four services, save money using the free, web-only Office 365 Online version.
Ignoring Office 2010's end date could be costly. Don’t risk a disaster. Upgrade your old-school Office software today.
If upgrading seems overwhelming, our IT experts can take it on. A managed service provider can suggest the best software for your business needs and set it up, too. Let us help! Call us now at (614) 233-1648.
Ever met someone that was happy their computer stopped working? Neither have we. When your technology fails, you need it fixed fast. Yet, depending on the problem, it could take hours or possibly days. However, just a little maintenance and preparation could keep the downtime to a minimum, or even prevent it from happening at all.
What do I mean by this? Let’s compare the traditional break-fix model of dealing with technology issues to a more proactive approach called managed services.
The break-fix model is short-term solution and just like it sounds. When something breaks, you try to get it fixed. And it since things always break at the absolute worst time, you’re usually trying to get it fixed as soon as possible.
If you happen to have someone you regularly turn to for tech issues, then hopefully they have the time in their schedule to help you with your emergency. If not, you either have to wait or find someone else that can help you now.
If you don't have someone you've used before, you'll need to ask around, look at reviews, find someone with expertise with your apps, services, or network. Then, you'll probably need to make several calls until you find someone that can come out now.
Then you have the issue of trusting someone new with your computer, server, network, and passwords. A business has good reason to be wary of giving that kind of access to someone they are hiring on a one-off basis.
The break-fix model can definitely get messy.
On the other hand, the managed services model is a long-term solution. When you work with a managed service provider (MSP), they get to know your setup and your business needs. They monitor your computers and network so they can resolve small problems before they become bigger issues. They also help protect you from threats to your technology like malware, hardware failure, equipment theft, and even natural disasters. And in the event a disaster strikes, they have the plan and resources to get you up and running as quickly as possible.
The managed service provider will also have the advantage of already knowing your business systems and how you use technology. As a trusted advisor already supporting your business, they can find and resolve problems more quickly. They don’t have to learn your IT setup from scratch, especially if they were the ones that set it up in the first place!
Your managed services partner can also take precautionary measures when they know you’re coming up on your busy season. Alternatively, they'll know when your business slows down, so they can schedule any time-consuming updates or system upgrades when it’s more convenient.
Working with a managed services provider has benefits beyond dealing with downtime issues, too. They are partner invested in your business success. They can offer valuable input to improve your productivity and streamline your business processes. They can help you budget for necessary upgrades and help you plan as your technology needs change.
As you can see, there are many benefits to working with a managed services provider beyond just when things go wrong. Don’t wait for a downtime disaster to seek out someone to get you back in business. Instead, partner with a managed services provider to avoid those problems in the first place. As always, if you have any questions or would like more information, we’re here to help!
Data is everywhere. It’s on your computers, in the cloud and even on your phone. Email, payment methods, years of records, personal client information, licenses to software. Your business needs all of this to function, but it could all go away in an instant. It could be lost in a fire, flood, theft, even ransomware. How do you prevent this type of disaster? Well, you can’t stop it but you can be ready for it.
When it comes to your business, preparation is key. The best way to prepare for the inevitable is to have a Business Continuity and Disaster Recovery Plan (or BCDR).
While there are many facets of having this kind of plan, one of the best pieces of advice we can give you is to back up your data!
When the unexpected occurs, whether it be a natural disaster, virus or any other threat, it would be impossible to remember or recreate all your electronic files. How long would your business be down? How much money would you lose? However, if you have a good backup, you can recover.
We recommend taking a hybrid approach to backing up your data. This means having both a local and cloud-based backup. The local backup is important to have because it’s quick and easy to restore from. The cloud-based backup would be crucial to getting your business back up and running if your local backup was destroyed. This gives your business the best chance of recovery when disaster strikes.
If you’d like to learn more about backing up your data or creating a Business Continuity and Disaster Recovery Plan, we’re here to help!
A new year means a fresh start and the chance to get your business’s security in check. Whether you have 6 employees or 600, every business is vulnerable to a cyber-attack. Don’t risk losing time and money to a data breach or ransomware. Instead:
· Use a business grade antivirus product.
· Secure your email.
· Put a disaster recovery plan in place.
· Backup data in more than one place.
· Educate employees about cyber safety.
· Prohibit third-party apps on work devices.
· Set devices to notify remote workers when they may be connecting to unsafe networks.
Technology and security are areas where you don’t want to cut corners. Check with your IT department to make sure you’re implementing these security measures. We want your business to stay safe and protected this year.
As always, if you have any questions or would like more information, we’re here to help!
It’s inevitable that we’ll retire old devices to upgrade to the latest and greatest. A new laptop, desktop, or phone is exciting. Yet, before you get too distracted by your shiny, new device, take the time to safely retire the old one.
When buying the new device you may take trade-in value. Otherwise, you may let that old iPad sit in your drawer for another couple of years. Either way, it’s important to take some key steps to protect the data on that old device before moving on.
Back up the old device
Most devices today have a backup feature installed. Be sure to use it before you retire an old smartphone or tablet. This ensures you’ll have continued access to your photos, texts, and contacts. Settings and apps are typically automatically backed up for download to a new device.
When retiring a computer or storage device, backups protect against critical information loss. You may also need evidence of device decommissioning to meet regulatory requirements.
Reconfigure your 2FA
Two-factor authentication (2FA) protects you in case someone gains access to your password. Typically, this is an email or text notification sent to your phone. You might also have a 2FA code generator on your phone to strengthen your security. Either way, you’ll need to set up a fresh 2FA app on the new device or you risk getting locked out of all your accounts.
Wipe the old device
Whether you decide to sell the device or not, you still want to secure your data by wiping that device clean. Deleting a file is not enough. Even if you go to the recycling or trash bin of the device and delete the item “permanently,” that’s not enough. Reinstalling the operating system is not enough either.
You need to actually overwrite the data so that it cannot be recovered. Otherwise, hackers will use software to search the drive for sensitive information.
Know where your old devices are
Don’t get sloppy with your old devices. You could leave a treasure trove of data available if that device gets lost or stolen. You’re less likely to notice the device is gone if you put it up on that shelf in the office supply closet. So, be sure to put any old devices, already wiped, in a safe place.
Consider destroying your hard drives
When it comes to securing old hard drives, many businesses will actually destroy them. This means literally breaking them down so that data is almost impossible to recover. Destroying the hard drive renders the hardware completely unusable or repairable.
Let a pro help
When you’re upgrading to new devices, get an IT expert to help. We can migrate all your necessary information to the new device and securely destroy data on the old one. Contact us today at 614-233-1648! We’re here to help!
If a website is mobile friendly, it has a responsive design. That means it knows what device you’re using and changes depending on the screen size. Mobile-friendly sites are quick to load and less complicated. They prominently display the contact information and business hours and buttons are large and easy to tap.
Over half of all website traffic is from mobile devices so you want to give your visitors a nice and easy experience! To do that you need to design around the way people use their phones. People use their mobile devices more frequently but for shorter intervals so pages and graphics need to load quickly. They want answers now and don’t have time to sift through tons of text.
Google prefers mobile-friendly websites so they rank higher in search results.
Curious if your current website is mobile-friendly? Use this link for a tool that you can use to check your site simply by entering your URL.
If your site isn’t mobile-friendly or just needs a refresh, contact your web designer or give us a call here at Nice Guy Technology. You might be surprised at how easy and affordable it is to give your old site new life!
Zoom Fatigue is real and researchers from Stanford have released the first ever peer-reviewed study that backs this claim. Here are four issues and their solutions to help you battle zoom fatigue.
1. Close-up eye contact is intense
So, in a regular face-to-face meeting people are usually looking around the room, taking notes, looking at the speaker and occasionally making eye contact with each other. In that face-to-face meeting you don’t see a bunch of floating heads 12” from your own. In a Zoom meeting, you get exactly that, and it tricks our brains into thinking we’re in an extremely tense situation. Everyone is constantly staring at the screen which is drastically increasing eye contact. In this Zoom situation, everything feels much more intense than a meeting where you’re sitting around a conference table.
Solution: You can take Zoom out of full-screen mode or reduce the size of the app window. This makes faces appear smaller on screen and less intense. Another quick solution is to sit a little further away from your screen.
2. Seeing your own face all the time is exhausting
There's a big difference between glancing in the mirror a few times a day and having one held up to your face as you talk to other people.
Studies have shown that seeing yourself in a mirror can cause negative emotions. So, when you’re on back-to-back video calls, and you’re constantly forced to look at your own reflection, it can cause us to be more critical of ourselves.
Solution: You can hide yourself from view in the chat window to take a little break but also try to be easier on yourself. You look good!
3. Sitting still and talking is unnatural
In a normal meeting you may be sitting down, but you’re still able to move around a little and get comfortable. You may even be able to get up and walk around. There’s something different about having to sit in an unnatural way with your head fitting in a little square on the screen. There’s even growing research that says when people are moving, they’re thinking better.
Solution: Place more space between you and the camera. If you’re using a laptop, you can get an external keyboard to help you sit back further. Consider turning off your camera now and again to allow you to move around a little.
4. Thinking way too hard
When we talk to someone in person, non-verbal communication plays a huge part. We don’t really think about it. On a video call you’re focused on making sure your head is in the middle of the frame, how others are interpreting your facial expressions, are you doing a big enough head nod or thumbs up? All these things together are extremely taxing on our brains.
Solution: Take an “audio only” break. Turn off the camera, move your body away from the screen and take a break from having to focus so hard on your non-verbal communication.
Videoconferencing isn’t new and won’t be going away any time soon. Zoom, Teams and other similar software help us collaborate and keep the work flowing even when we can’t be physically together. As in all things, moderation is key. Sometimes you just need a break. We hope these tips help reduce your stress so you can stay happy and productive. If you have tech questions, we’re here to help!