Quality Computers

All Professionals No Geeks

CALL US
478-474-0861
2940 Riverside Drive
Macon, GA 31204
  • Home
  • Retail Store
  • Services
  • Blog
  • Contact
  • About
  • Testimonials
  • Free Diagnostic

5 Best Practices for Buying Technology for Employees

March 30, 2020 by Quality Computer's Staff

Buying technology for personal use can be exciting once you get past the price tag. Yet there are many factors to consider when investing in technology for employee use.

There are many digital tools available to improve the day-to-day way people do their jobs. Providing the right tech can increase productivity, streamline processes, and improve employee engagement. Yet determining which solutions are smartest for your team takes work.

Investing in a technology that doesn’t suit the needs of your staff can hurt your business:

  • Learning a new technology takes time away from other mission-critical tasks.
  • Employees resent the change when the tech further complicates their day.
  • Staff feel unheard and disrespected when asked to use digital tools that don’t help.
  • Disgruntled employees disengage, which hurts customer experience.
  • Employees look for an easier way to do their work and may change work environments as an answer.

Best practices for buying employee technology

Providing the best technological tools supports a more productive, energized, and motivated workforce. These best practices help bridge the gap between IT ambition and actual employee experience.

Know how work gets done

Many decision makers think they know how work is done, but they haven’t actually been in the trenches in years. Looking at the metrics to analyze process efficiency isn’t enough. Purchasing officers need to understand the employee’s daily journey. They need a good answer to the question “how is this technology going to make my work experience better?”

Understand the IT environment

Just as technology is evolving, the work environment is adapting too. Before buying employee technology, determine where people are working most. Are they in the office or remote? Do they sit all day at a desk or need to be on the move? Are they customer-facing? Or do they need more collaborative tools with internal teams?

Don’t make any IT purchases without weighing up whether the technology can handle the use it’s going to get. If someone is going to need access to the technology on a shop floor, a brand-new desktop is going to be a bust, whereas an employee who travels all the time for work is going to prefer a rugged but lightweight laptop.

Aim for uniformity

Bringing a shiny new Apple computer into a PC environment can be problematic. Loyalty to one manufacturer or software can help people embrace new tools quicker. Additionally, it makes buying parts and warranty much easier. You’re also more likely to be able to take advantage of product integrations and interoperability.

Develop consistent relationships

If you’re buying a lot of technology at one time you may be eligible for volume pricing. Plus, if you’re returning again to a supplier you’ve worked with in the past, you could ask about a loyalty bonus.

Working with a managed service provider to find the right tech solutions is also useful. Their supplier relationships can lead to volume discounts, better-than-retail pricing, and improved warranties.

Seek employee input

New technology introduces change into the work environment, but people don’t love change, especially if they feel a new system or software is being pushed upon them. It will help to ask staff what tools or technology they want. Often they already know!

Technology is an essential part of how people experience work. It’s easy to get seduced by a bright, shiny new device or promising feature. Instead, make decisions based on whether the technology can do what you need it to do and whether it’s going to make the employees’ work environment better or worse.

Need help making decisions about the right technology for your teams? We can help. Contact our experts today at 478-474-0861

Filed Under: Uncategorized Tagged With: #nocontract, #qualitycomputers, new computer, new laptop, QualityCareSuite, remote support, service, small business

Share:

Facebook is for Sharing, Not Storing

February 17, 2020 by Quality Computer's Staff

When was the last time you held an actual photo album or actual prints of photographs in your hands? Maybe you look back at older photographs only when Facebook’s TimeHop app reminds you of a pic from five years ago. If so, you may be risking your visual history.

Facebook is a great way to share photos with friends and family around the world. You get to enjoy their comments and the affirmation of their likes. But using Facebook as storage for your photos is not a good plan. Here’s why.

Some people treat Facebook as their photo album archive. They delete the originals from their devices or digital camera when they need more space. But Facebook compresses images for faster download. It satisfies impatient social media users, which means photo quality suffers. If you wanted to print those photos in the future, they wouldn’t look as good as the originals.

That’s not the only drawback. When you trust Facebook with all your photos, you’re letting a company control your visual archive. It’s hard to imagine, given Facebook’s reach today, but what happens to your photos if the company goes defunct? We don’t know. The people who were keeping their photos on Myspace in 2006 might have an idea.

The younger crowd is already moving onto other social platforms. Plus, Facebook’s growth rate in North America and Europe is slowing. Those daily active users are the primary source of revenue. So, you know Mark Zuckerberg is in some meetings about that.

Even if Facebook continues as the business behemoth it is today, we don’t know what policy changes it might make. It could change its terms of service whenever it wanted (if you even read those in the first place). Users have no guarantee for how long Facebook will store their images or any type of content.

Keep in mind also that many of the photos showing up in your timeline are actually taken by friends. Facebook provides an entire album of other people’s photos when they’ve tagged you, but if they decided to untag you or remove it, that photo would be gone.

Finally, there’s also the risk of your account getting shut down or hacked. You’ve probably had friends warn you not to accept any new friend requests from them because they’ve been compromised. You wouldn’t want a thief to steal all your photo albums. Similarly, you don’t want a cybercriminal to gain access to all your images.

Our Recommendation

Just as with data, we recommend you have a “3-2-1” backup system for your digital photographs. This means having three copies of the photos you care about. You don’t need to back up the blurry ones if you don’t want to.

You might keep one copy on the original device, but you’d have two other copies of the high-quality, uncompressed, original image as well. One might be kept on an external storage device such as a USB thumb drive, and the other you could upload to cloud storage.

The cloud backup gives you access to the photos from any device in any location. So, if a flood, hurricane, or fire devastates your home, and you lose your device and the USB thumb drive, you still have a backup. Your Facebook photos and videos are just there to be shared with friends and family.

Not sure where or how to safely store your photos and videos? We can help! Our experts may even become new Facebook friends. Then we can all like each other’s photos with the peace of mind that the original photos aren’t going anywhere.

Filed Under: Newsletter, Uncategorized Tagged With: #bestservice, #qualitycomputers, consumer, data loss, online safety, service

Share:

6 Target Areas to Reduce IT Costs

February 10, 2020 by Quality Computer's Staff

Your business is always looking to reduce costs. Looking at the information technology budget line items is headache inducing. So much money spent in one area, and there’s so little you can do about it! But is that really true? IT expenses may not be as fixed as you think. Take a look at these target areas where you might reduce costs.

#1 Software

Your business likely pays to license software such as Microsoft Office 365 or Adobe Photoshop. Reviewing these software agreements, you can often find cost savings:

  • You may be able to renegotiate a subscription if the provider wants to move you onto to a new offering.
  • You may find that you are paying for software that your employees are no longer using much. Maybe you can reduce or remove it.
  • Perhaps the pricing has changed, and there are now better plan options available.
  • There may be an open-source software alternative to save acquisition and maintenance costs.

#2 Hardware

Your current hardware may be underused, need refreshing, or have lost productivity. Look for opportunities to run applications on less expensive devices, or link together several computers to replace expensive server equipment. Standardizing platforms can also significantly reduce IT costs while providing consistency.

#3 Cloud Computing

One way to cut IT infrastructure costs is to move to the cloud. You may be able to run software on the cloud for a fraction of the cost. Moving data backup to the cloud to replace an on-premises server can also cut costs, not to mention the utility savings from not having to power the replaced components.

Even if you’re already in the cloud, you can explore whether you are on the best available plan for you and consider:

  • Are you paying for more storage or resources than you need?
  • Are you taking full advantage of mobility and scalability features?
  • Are you duplicating on-premise and cloud-based services?

#4 Internet Services

Your employees need to be online; you’re not going to cut out internet services. However, you may be able to control costs:

Should you buy modems or routers instead of renting them from your provider?

  • Consider the internet speed in your plan. Do you need that level of service?
  • Is slow internet speed costing your company money when, in fact, you’ll be more efficient with an upgrade?
  • Are you able to bundle services to find cost savings?
  • Are you in a position to renegotiate your plan?

#5 IT Staff and Services

Avoid infrastructure costs and the hiring expenses of onsite IT staff by outsourcing. Often your business can pay a set monthly fee or go on a pay-per-use model to gain services such as:

  • IT help desk support
  • security
  • disaster recovery
  • backup

#6 Utilities

Don’t overlook the costs involved in powering your IT components. Review your utility bills to identify trends. Can you save money by turning off equipment? Is there a better plan available with a competing service? Should you renegotiate the terms of your existing plan?

Time for a Technology Audit

Ultimately, the best way to identify specific areas to cut your IT budget is a technology audit.

Your IT needs are always changing, and the technology evolves, too. Many businesses add expensive components or systems with “room to grow.” New tools get added on as needs arise. Your use of certain technologies may expand or shrink.

An IT expert can provide an overview of all the software and services you use, and of bills related to your IT budget to find areas to streamline or cut altogether. It may seem counterintuitive to pay money in an attempt to save money. However, an outsider’s perspective can provide fresh insight into the “way things have always been done” and help you see new opportunities for consolidation.

We can help you meet your budget goals. Contact us today at 478-474-0861!

Filed Under: Newsletter, Uncategorized Tagged With: #bestservice, #computerrepair, #nocontract, #qualitycomputers, cloud, computer repair, consumer, new computer, new laptop, QualityCareSuite, remote support, service, small business

Share:

Why You Need Professional Virus Removal

February 3, 2020 by Quality Computer's Staff

“Your computer has a virus.” Such a dreaded five words! We don’t want to come down with a human virus; we’ll feel awful and miss work. But when a virus hits our computer, we could lose valuable information or be vulnerable to attack. Chicken soup won’t cut it.

Perhaps you have an antivirus product installed on your computer. This computer software is intended to prevent, detect, and remove viruses. Antivirus tools are designed to keep infections out. They can also delete any viruses that may already be on the computer when the software is installed.

The software provides protection by tracking malicious code and other computer threats via:

  • classifying the actions the file or code drives (as malicious or OK);
  • inspecting file signatures for matches to an existing signature in its virus dictionary;
  • scanning for rootkits that can change how your operating system functions.

However, antivirus software isn’t that good at cleaning up. When it detects a malicious file, it will delete it. But what if the virus spread before discovery? If the infection spreads before virus deletion, it can do all sorts of damage.

Think of it this way: you have a cyst on your knee. Doctors decide it is pre-cancerous and operate to remove the cyst before it spreads. But, that’s all they do. They have seen the cyst. They go for the cyst. However, they don’t notice the cancer that’s in your shin or femur, because they were only working on the cyst. The rest of your leg remains unhealthy, and you don’t even know it!

Getting a Second Opinion on Viruses

If the antivirus software is your primary physician, a computer professional is the specialist you go to for an expert second opinion. For one thing, antivirus products don’t always remove all the malicious files. Many viruses start as one thing but can mutate into several different strains. The antivirus software may not be programmed to identify all of the virus variants. A professional actively looks for undetected strains on your computer.

Viruses are always evolving. A recent strain of malware, SquirtDanger, let hackers take computer screenshots, capture passwords, download files, and empty out cryptocurrency wallets.

Some viruses can change the settings of your computer. For instance, a common virus changes your computer’s DNS, which is like a bit like the Yellow Pages for the internet. On a virus-free computer, when you type in “Google.com”, your browser goes to Google’s servers located at the IP address “216.58.203.100.” However, an infection can make Google.com on your computer go to a different address. Perhaps a server address cybercriminals use to capture your personal data. It still looks to you like Google, but it’s no longer safe. These settings can still remain after the infection is long gone.

Viruses can also leave behind browser toolbars, extensions, and other nasties designed to spy on your Web browsing habits. If you’re consistently redirected to unwanted sites, or seeing unwanted pop-up advertisements, it’s likely your computer’s infected with a browser hijacker.

Ultimately, if you detect a virus on your computer, check with a professional. Don’t trust that your antivirus software is going to do the same, thorough job an expert can offer. Sometimes your computer isn’t fully safe until the operating system is reinstalled, but you can’t know that until someone can go in and see what the virus did and what remnants are still there, lurking.

Cybercriminals are growing more sophisticated and better able to design viruses that disguise their tracks. Avoid being an unwitting victim. A computer security expert can diagnosis when your computer gets a virus, or determine if there are strains on your device you don’t know about. Let a security expert protect your computer from harm today! Call us at 478-474-0861.

Filed Under: Newsletter, Uncategorized Tagged With: #bestservice, #computerrepair, #nocontract, #qualitycomputers, computer repair, consumer, Hacker, msp, online safety, QualityCareSuite, remote support, small business

Share:

How to Destroy Data Properly

December 30, 2019 by Quality Computer's Staff

How to Destroy Data Properly

When we accidentally delete something, it feels like the end of the world. If a client file or new presentation is deleted, you may have to start again. Oh no! Yet deleting files is not as permanent as you may think. When it comes to destroying data properly, you’ll want to take a more thorough approach.

Deleting items, or “trashing” them, doesn’t permanently remove them from computer memory. While the data is still stored on your device’s hard disk, it’s possible someone could restore that deleted data.

Data does reach a point at which it’s no longer useful, and you are no longer required to maintain it. Nevertheless, it may still be valuable to cybercriminals. Bad actors can use names, addresses, credit card numbers, banking accounts, or health data. You need a policy to destroy paper records, magnetic media, hard drives, and any storage media.

Your obligation to protect customer and staff information extends to properly destroying all identifying data. Installing a new operating system isn’t going to do it. Encryption doesn’t do the job if the cybercriminal can figure out the password.

Some industries require you to prove you have correctly destroyed all data. Even if you have no compliance standards to meet, carefully dispose of any computer-related device. Whenever you are recycling, discarding, or donating an old computer, disk drive, USB stick, or mobile device, make sure the data is already properly deleted or destroyed. Otherwise, criminals could get their hands on confidential business information.

Fully, Safely Destroying Your Data

So, what do we mean by “properly” destroyed? You know about shredding paper documents. You can actually do the same with some devices. You might send the computer or device to a company with a mega-shredder. When compliance matters, keep a record of the chain of custody of the data throughout the process.

Overwriting the data, often called zeroing, is another solution. No data is properly deleted until it’s written over – that’s where the information is hidden under layers of nonsensical data and cannot be retrieved through disk or file recovery utilities. Think of this as writing three new books over the top of the pages of an erased book rather than just ripping the pages out.

With magnetic devices, you can neutralize the magnetism (degaussing) to break down the data. This scrambles up the data beyond recovery. A strong degausser will turn the device into a shiny metallic paper weight. An ultraviolet erase could be necessary for some erasable programmable memory. You might also need to perform a full chip erase.

If you’re really committed to destroying data, physically destroy the device. There’s the shredding solution, or you might actually pay to have the device smelted or pulverized.

Other Components to Destroy with Data

Don’t forget proper disposal of printers, too. Run several pages of unimportant information (maybe a font test) before destroying a laser printer. With an impact printer (if you still have one!), you’d want to destroy all ribbons, too.

One last element you might think about? Business monitors. You’ve probably seen a computer screen with information burned onto it. Before donating or recycling a monitor, inspect the screen surface and destroy the cathode ray tube.

Now, that’s what we call being thorough about properly destroying data. Need help with proper disposal of computer data or equipment?

We can help. Contact our experts today at 478-474-0861!

Filed Under: Uncategorized Tagged With: #bestservice, #qualitycomputers, bad hard drive, computer repair, consumer, data loss, data recovery, Hacker, service, small business

Share:

Is Your Home Wi-Fi Keeping Up?

December 23, 2019 by Quality Computer's Staff

Wi-Fi has forever changed the way we live, work and play. We can surf the internet on the couch or by the pool, look up a recipe in an instant, and even connect our lights to voice control. It’s no wonder it was accepted with open arms, but is your Wi-Fi as good as it needs to be?

10 years after Wi-Fi first made its way into homes with those mysterious rabbit-eared boxes, it’s evolved into a juggernaut of speed and accessibility that we can’t do without. Think about how many wireless devices your home has – the average home has at least 10 devices connected wirelessly to the internet, many have more.

While older devices are typically happy with a slice of slow internet, your newer devices like 4kTVs and media streaming simply can’t function without fast internet. Add in a game console, tablet, a few smartphones and a laptop or two, and your Wi-Fi is suddenly stretched beyond full capacity and struggling to keep up. Yet, most people don’t know how fast their Wi-Fi is, or if it’s working right– they only know how many bars they’ve got. Unfortunately, counting bars can add up to one big headache.

Here’s why relying on your Wi-Fi bar count might be ruining your internet experience:

Bars measure the wrong thing: While it’s great to know you’ve got a ‘strong’ signal, it would be even better if you could have a ‘fast and available’ signal. The internet could actually be down and you’d still have full bars because it’s really only measuring how close to the Wi-Fi router you are. That proximity measure doesn’t take into account how many devices are fighting for the same bandwidth or whether there’s any left for you. We can ensure your Wi-Fi isn’t just available, it’s up to the task.

Wi-Fi goes sideways: While next-door’s Wi-Fi can reach the back of their property, it can also go a similar distance sideways into your house. This extra ‘noise’ can disrupt and slow down your own Wi-Fi. In dense areas, your Wi-Fi is basically getting lost in a swirling field of signals, all using the same channel and frequency. It’s a digital crowd which can seriously slow your speeds. We can fix this by changing your Wi-Fi channel to one with less cross-talk.

Everyone uses the default settings: Most home Wi-Fi uses a 2.4ghz frequency by default. While it makes a plug & play router easy to set up, it does mean you’re not getting the speeds you could be. Switching to the 5ghz frequency means your Wi-Fi is separated from the neighborhood cross-talk. 5ghz is also considerably faster, which is a bonus. We can help you upgrade to a 5Ghz-capable router or switch your existing frequency.

Priority isn’t set: While not Wi-Fi specific, we can also set up “Quality of Service” if your router supports it or supply you with one that does. This allows things like Netflix and Skype calls to always take priority and remain uninterrupted over less important tasks like downloads. You’ll be able to watch movies without those awful buffering jumps and video chat without freezing.

Is your home network not keeping up? Give us a call at 478-474-0861 and we can improve your internet experience.

Filed Under: Uncategorized Tagged With: #bestservice, #nocontract, #qualitycomputers, cloud, consumer, sale, service, small business

Share:

Locking Up Cybersecurity with a Managed Services Provider

November 11, 2019 by Quality Computer's Staff

Cybercrime is not the most costly of illegal activities. That dubious distinction goes to government corruption, followed by drug trafficking. Cybercrime comes in third. Yet cybercrime does take the top spot when it comes to numbers of victims. A managed services provider can help.

Cybercrime has hundreds of millions of victims. Two-thirds of people online have experienced personal information theft or compromise. A 2018 McAfee Security study suggested that represents more than 2 billion individuals!

If any of those people works at your business, it could mean trouble for your security, too. Why? People tend to think they have too many passwords to remember. So, they use the same login information again and again. That means a criminal could leverage employee data to access business systems, too.

Cybercrime is a global problem for both individuals and businesses. The bad actors, after all, can make big bucks from their crime with low risk of discovery. The global cost of cybercrime is an estimated $600 billion a year. And no one and no business is immune.

More people are going online. Businesses are becoming more reliant on digital transactions. Cybercriminals are quickly adapting. They’re motivated, but are you?

Securing Your Business with an MSP

It’s safe to say your Information Technology team has a lot to do. Everyone at your office is working hard, but is cybersecurity getting the attention it deserves? Ultimately, there is no better way to keep your systems secure than with managed services.

A managed services provider (MSP) helps your business stay ahead of security threats. Finding out about risks or vulnerabilities after the fact is no good. That’s like closing the barn door after the prize stallion has already bolted.

An in-house cybersecurity team providing 24/7 protection isn’t workable for most businesses. It’s cost prohibitive for most small and mid-sized businesses.

Working with an MSP is a more affordable alternative. You avoid investing in the latest technology and building up an on-premises infrastructure. Instead, you pay a consistent fee for the MSP to handle technology patching, monitoring, and assessments.

The MSP uses well-tested, leading-edge tech to stay on top of cybersecurity threats. This strategic partner can:

  • set up security on your infrastructure;
  • oversee your company’s security systems;
  • ensure regulatory compliance;
  • track threats 24/7;
  • maintain strong data protection.

An internal IT team oversees many areas, but the MSP focuses on continuous monitoring. It keeps up to date on the global threat landscape and any industry vulnerabilities.

Still not convinced that paying an MSP is worth it? The average cost of a lost or stolen record was $148 per record in 2018. You might view working with an MSP as paying for insurance. With ongoing monitoring an MSP helps your business avoid security breaches. And their devastating costs (including to productivity, compliance, revenues, and brand reputation).

This extension of your security staff helps maximize resource efficiency. And their day-to-day focus is on reducing risk and minimizing damage from cyberthreats. With an MSP you add dedicated security experts to your team. Secure your technology while gaining advanced threat intelligence and customized security strategies.

A managed services provider identifies vulnerabilities and secures your business environment. Stay ahead of cybersecurity threats with an MSP. Find out more today!

Call us at 478-474-0861

Filed Under: Uncategorized Tagged With: #bestservice, #computerrepair, #nocontract, computer repair, QualityCareSuite, recover data, remote support, service

Share:

Are You Sick of Ongoing IT Issues?

September 23, 2019 by Quality Computer's Staff

Like a persistent cough or muscle strain that won’t go away, many IT issues prove ongoing. Every time they come back you think about getting an expert’s opinion. Then, the cough fades, you can walk freely again, or your computers are back up and running. You keep on going. Until the next time. If you’re sick of ongoing issues with your IT, look to a Managed Service Provider (MSP) for help.

There are many IT ailments that can negatively impact your ability to do work. Let’s consider some of the particularly common ones, and why an MSP is the right prescription.

#1 Network and Internet issues.

Business is done online these days. Not being able to connect to the network and slow connections are frustrating. Without the Internet, how can you do your job? You can’t even check and send emails! Let alone access team documents or enter data into cloud-based accounting software. A lagging network also slows down application and data loading time. It may only be a few moments of thumb twiddling. But add that up over several times a day and multiple by employees. You’re looking at a decrease in productivity that adds up.

An MSP has the know-how to survey the IT environment for what’s causing these frustrations. When there’s a problem, they’re at the ready to resolve it and help improve reliability.

#2 Repeated malware infections.

This can mean a couple of things. First, you don’t have effective system and application protections in place. These attacks shouldn’t be able to make it through the door in the first place. With the right firewalls, anti-spam, and protections, you should be able to keep your system on lock down. You don’t have to do this yourself. Your internal IT team has a lot to manage and monitor. Gain expert backup with an MSP reviewing your security protocols to keep the bad guys at bay.

Secondly, educate employees about the dangers of social engineering. Don’t let them keep falling for the pretexts and downloading malicious files. Also, ensure passwords are strong enough to avoid adding another point of entry.

#3 Printing problems.

Many businesses are printing less today, but we’re not done with hard copies entirely. So, when a printer starts whirring, spinning endlessly, or can’t connect, efficiency halts. Know that printers sold at big box stores are consumer grade quality. Avoid printer frustrations with solid business-class printers (which your MSP can identify).

#4 Application overload.

Maybe some of your employees prefer Dropbox. Others rely on their free Gmail accounts. This hodgepodge of options can cause chaos. Staff have difficulty remembering the passwords to all of the accounts they need. So, they simplify, and that makes their accounts more hackable.

Upgrading to business-grade versions of important applications is easier with an MSP. They’ll help identify the software that best addresses your business needs.

#5 Aging technology.

You’ve had your current computers for ages. They are slower than you’d like, but you don’t have the time to look for something else. Plus, you can’t imagine having to learn something new. You’re too busy. But aging tech is more likely to fail, which could prove catastrophic if you don’t have the right systems backup.

MSPs know IT. Based on your individual business needs, they can suggest a plan of attack to update the IT and keep it secure. They can also provide backup strategies to prepare for the worst and recover quickly.

Basically, a managed service provider has your back when it comes to IT. Work with experts who focus on technology day in and day out. You’ll typically save money and gain time to spend innovating in your field.

Gain a competitive advantage with the support of an MSP. Give us a call at 478-474-0861 today!

Filed Under: Uncategorized Tagged With: #bestservice, #nocontract, #qualitycomputers, cloud, computer repair, consumer, Hacker, online safety, QualityCareSuite, remote support, small business

Share:

Do Macs Get Viruses?

August 27, 2019 by Quality Computer's Staff

Many Apple owners believe their Macintosh computers are immune to viruses. Apple itself has run ad campaigns promising its computers “don’t get viruses”. And those who have owned a Mac for years, decades even, are particularly prone to believing. After all, nothing’s happened to them yet. Regrettably, Macs do get viruses, and the threat is growing.

For a long time the argument was that cybercriminals didn’t bother to develop Mac viruses. There weren’t enough users to justify the effort. Instead, they’d focus on the lower hanging fruit – PCs running Windows.

Yet Apple’s market share is on the rise, and it’s increasingly common to see Macs in the workplace, especially in creative industries. Plus, there’s a widespread assumption that Mac users are a smart target as they are likely to be better off. So, while Macs remain harder to infect (installing most software requires a password), there’s often a greater payoff.

The research reflects the reality. In 2017, for instance, the iPhone OS and Mac OS X placed #3 and #6 in CVE Details’ top 50 ranked by total number of distinct vulnerabilities. Apple TV and Safari also made the list at #17 and #18, respectively. In 2017, Malwarebytes also reported it “saw more Mac malware in 2017 than in any previous year”. By the end of 2017, the cybersecurity firm had counted 270% more unique threats on the Mac platform than in 2016.

Finding Apple’s Weak Spots

It’s obvious then that bad actors are no longer steering clear. They are actively looking for ways to exploit Macs.

A common approach is to use Trojans. Named after a gift wooden horse that hid an army, Trojans look like something you would want to install. So, Mac users happily enter their passwords to download that application and open the gates to the cybercriminal.

In 2011, for instance, a Trojan called “Mac Defender” took advantage of people’s desire to protect their computers. The fake program appeared to be anti-virus software. Once the users installed it, they’d get an onslaught of pop-up ads encouraging them to buy more fake software.

Trojans get through the gates because you let your guard down. You are taken in by that supposed note from a long-lost friend. You think you want to see that pic of that famous celebrity. All it takes to stop this type of attack is suspicion of everything you might install or download.

A business would want to educate its employees about the importance of:

  • clicking on emails with care;
  • validating the source of any files they plan to open;
  • checking a website’s URL (being especially wary of those with less common endings such as .cc or .co);
  • questioning any promises of Ray-Ban sunglasses for 90% off or the latest iPhone for $29.99.

A new threat comes from within the Mac App Store, according to Thomas Reed, a Mac security researcher. When a user tries to install an app on a Mac, a Mac OS program called Gatekeeper checks the file’s code signature. The signature helps certify the app is valid. However, Reed found that cybercriminals could buy a legitimate certificate from Apple, or steal one and trick users. Users would install masked malware that could infect legitimate programs and evade detection.

Key Takeaway

Apple is always working to protect its users from malware. It has measures in place, and user caution can make a big difference, too. Still, it’s not true that Macs are completely safe.

Find out what you can do to protect your Macs and guard against threats. Partner with a managed services provider to gauge your security levels.

Call us today at 478-474-0861!

Filed Under: Uncategorized Tagged With: #bestservice, #computerrepair, #nocontract, consumer, Hacker, msp, QualityCareSuite, remote support, scam, small business

Share:

SSD: Make Your Old Computer Your New Computer

July 22, 2019 by Quality Computer's Staff

The solid-state drive (SSD) has swiftly become the go-to upgrade to breathe new life into an ageing computer, and for good reason too. An SSD swiftly brings an old laptop or desktop up to date with modern machines in just a single step.

The price of solid-state memory has fallen dramatically in recent years. As costs have dropped, the popularity of the technology has increased exponentially. At one time an SSD was a rare treat for serious PC enthusiasts, now it’s cheaper and more readily available than ever. No other single solution is as cost-effective, quick to swap, and impressively effective as swapping out an old hard drive in favor of the faster and more modern SSD.

Out with The Old

The hard disk drive (HDD) is a technology that dates back as far as the 1950s. They became the default solution all PCs would use for decades to come. Most old laptop and desktop machines still contain their original, worn hard drives they left the factory with.

The HDD was a mostly mechanical device. Inside a solid outer casing was a series of spinning disks arranged in a delicate stack known as a platter. Each disk could read and save data using a tiny needle moving across the disk’s surface.

The technology looked and worked much like a miniature record player. Like a record player, widely in use at the time that hard drives were developed, the hard drive had some serious drawbacks in their use.

The series of tiny disks and needles that made up the HDD were incredibly fragile. Vulnerable to dust or movement, computers commonly succumbed to hard drive failures that rendered the machine and its stored data unusable. Occasionally, simply moving a laptop while reading or writing data can damage a hard drive’s spinning disk.

In with The New

The primary reason to switch to a more modern SSD, on top of their impressive durability, is the incredible increase in speed. The SSD has no moving parts at all, working more like a digital camera memory card than a vinyl record player.

An SSD simply makes the process of retrieving and saving data to storage many times faster. Eliminating the mechanical component, removing the need to move a physical disk, and not needing to physically pick up the data means a much faster and smoother operation.

Computer startup, where the operating system loads all its data from storage, can take as little as one-quarter of the time of a comparable HDD. Additionally, loading regular applications and data from an SSD takes a fraction of time of an HDD.

An SSD completely breathes new life into an old machine. Computers with an SSD replacement for the hard drive feel like using an entirely new machine for a fraction of the cost.

Replacing the main mechanical component additionally eliminates wear and tear working to break down your machine. While an HDD slows over time, degrades, and can eventually suffer mechanical failure; an SSD remains as durable as the day it was purchased.

Ideal Laptop Upgrade

In a laptop setting, the SSD makes complete sense. They require less power than older hard drives, making the most of your battery charge.

In addition, not needing a large disk platter, mechanical parts, or protective outer case means they are about half the weight of a mechanical drive. Making an old machine lightweight brings it another step closer to a modern machine.

They run almost silently too. The familiar click-clack of the hard drive inside a laptop is a thing of the past. Many users comment on the noise their laptop used to make starting up and loading programs. Noisy laptops are a tech throwback we’re happy to leave behind.

For many who feel like their old laptop or desktop is showing its age, the prohibitive cost of purchasing a whole new machine keeps them invested in their old one. A simple, fast SSD upgrade can make your old machine new again at a much smaller price. If swapping long startups, and slow load times sounds right for you, consider upgrading to an SSD. You won’t look back.

Give us a call at 478-474-0861, and we can give your machine a new lease on life.

Filed Under: Newsletter, Uncategorized Tagged With: consumer, repair, service, small business

Share:

  • 1
  • 2
  • 3
  • Next Page »

VISIT US

Recent Posts

  • How to Stay Focused Working from Home
  • “So Slow!” Is it your Computer or your Internet Connection?
  • Is Your Tech Partner a Team Player?
  • 5 Best Practices for Buying Technology for Employees
  • How to Get Your Devices to Play Nicely Together: Home Networking Help

Recent Comments

    Archives

    • April 2020
    • March 2020
    • February 2020
    • January 2020
    • December 2019
    • November 2019
    • October 2019
    • September 2019
    • August 2019
    • July 2019
    • June 2019
    • May 2019
    • April 2019
    • February 2019
    • August 2018

    FOLLOW US

    Recent Posts

    • How to Stay Focused Working from Home April 28, 2020
    • “So Slow!” Is it your Computer or your Internet Connection? April 13, 2020
    • Is Your Tech Partner a Team Player? April 6, 2020
    • 5 Best Practices for Buying Technology for Employees March 30, 2020
    • How to Get Your Devices to Play Nicely Together: Home Networking Help March 23, 2020

    Tags

    #bestservice #computerrepair #coronavirus #covid19 #IT #nocontract #qualitycomputers #remoteworkforce #remoteworking backup bad hard drive cloud computer repair consumer data loss data recovery email Hacker msp new computer new laptop online safety QualityCareSuite recover data remote support repair sale scam service small business Webcam

    Copyright © 2021 · Quality Computers · 2940 Riverside Drive, Macon, GA 31204