It’s Official: Your Business NEEDS to Use HTTPS

You may have noticed many business websites now have a green padlock in the address bar next to the letters ‘https’. Until recently, you’d only see that on shopping or banking sites, but it’s now become the expected norm for all business websites – even if you don’t ask people to log in or enter credit cards. Simply put, the ‘s’ in https stands for secure and means any data sent/received by the visitor is encrypted.

Clearly, it’s an essential feature for e-commerce sites, but why have all the info-only websites started using https too?

The New Google Rule

As of July 2018, Google will mark your page as insecure unless you’re using https. It’s a movement they started a few years ago to make the internet a more secure place by default. Since Google pretty much rule the internet search and increasing security is always a good idea, businesses have been gradually switching over. Without https protection, someone with access to your internet connection, whether from digital eavesdropping or hacking, could intercept the information. They could also place malware onto otherwise legitimate sites and infect innocent visitors. That’s why eighty-one of the top 100 sites online have already switched to https and a strong majority of the web is following suit.

The Browser Bar Says It All

In the same way a green padlock in the browser bar indicates a trustworthy site, you can expect non-https sites to be marked with a “not secure” warning. Previously, users had to click an information symbol to actively investigate non-secure sites. The shift to plain sight markers will be most noticeable on Chrome, however it’s expected that other browser developers will follow suit. Visitors may then be alarmed by landing on your site and seeing that the connection isn’t secure.

The fact that you may not be asking them to log in, enter personal details or payment is irrelevant. You may not be asking them to enter anything at all, but perceptions matter. Eventually that warning will be changed to an alarming red as Google declares war on unsecure sites. As the common understanding is that a warning = bad, you may get more visitors bouncing away within seconds or even contacting you to report that your site has a problem.

Boosts for Secure Sites

Google is taking its commitment to safe web browsing further by favoring https. That means the search algorithm is taking your site security into account, preferring to display results that it knows will protect users from hackers. Since https status gets the nod, you may find yourself climbing in the ranking while other businesses scramble to catch up. It really is a win-win situation.

What to Do Next

In an ideal world, your site would have a secret switch on the back-end you could flick over and suddenly be https, but it’s a little more complicated than that. In fact, you may have already noticed some sites experiencing trouble with the migration. When the setup goes wrong, users don’t see your website with a little warning in the corner, they’re blocked by a full page error and offered a return to ‘safety’ (away from your site).

The easiest way to make the move to https is to contact your IT technician or web developer, as they’ll be able to make sure you’re keeping Google happy and rolling in the green.

We can migrate your site to https – call us today at (416) 645-2469

What’s That Weird Noise Coming from Your Computer?

New computers are whisper quiet, seeming to run on pure magic, but after a while computers can start making some pretty weird noises. Clicks, clunks, and about-to-take-off jet noises are the most common, but when should you worry? Your computer has a number of moving parts and even some stationary parts that can make noises. If you’re listening, your computer might be telling you about its current health and how you can help it run smoother, for longer.

When you hear a clicking noise: This could be normal if it’s more like a soft tick. Mechanical hard drives work a bit like a record player with a needle and platter, so you might simply be hearing it spin up and move the needle around. When it starts sounding like a loud click it’s usually the needle hitting the platter too hard or bouncing around. If your hard drive has started making alarming noises, you should bring it in as soon as possible. Just like a record player, scratches that ruin your data are possible, and if ignored for long enough, it doesn’t just skip and have trouble reading the drive, the whole thing can become unusable.

Our technicians can copy the files onto a new drive before it gets to that point, but retrieving data from a destroyed hard drive is rarely achieved without CSI-level expenses. It’s easier and much cheaper to replace the hard drive at the first sign of failure.

When you hear a clunking noise: Unsurprisingly, this one causes certain alarm. Computers aren’t meant to go clunk! It may be a simple matter of a cable having shifted into the path of a fan and getting clipped during the spin. Remember when you pegged a card between your bicycle spokes? It might sound a little like that, skipping every now and then as it’s pushed away and drops back again. If that’s the case, our technicians will quickly secure the cable back where it belongs.

When you hear a jet-engine noise: Most computers and laptops have fans to keep them cool. The fans have to spin to move the air around, and the faster they’re spinning, the more noise they make. We start to worry when the jet-engine noise gets out of hand and it’s not just while you’re playing a resource-intensive game or doing some video editing. Constant jet-engine noise indicates your computer is struggling to cool itself down, perhaps because the fan vents are clogged with dust, your computer is in a poorly ventilated space, or the fan itself is worn. Each fan has ball bearings inside that wear out over time, making extra noise while it does the best it can. Our technicians can replace individual fans quickly and give your system a checkup to make sure nothing else has been affected.

When it’s beep city: Your computer’s friendly beep as you switch it on actually has multiple meanings. It’s not just saying hello. The single beep you normally hear indicates that it’s run a self-test and everything is fine. When your computer is very unwell, you might hear more beeps than usual. This is because each beep combination is a code to technicians, letting us know what’s gone wrong.

Certain beep combinations mean the memory is loose or damaged, others that the video adapter has a problem, etc. If your computer has started beeping differently, let our technicians know so we can decode it and repair the problem for you.

Some noises your computer makes will be normal, others a sign of deeper issues. Even if your computer seems to be operating correctly, a sudden onset of weird noises could mean failure is just around the corner. Taking early action ensures problems don’t escalate, costs are kept low, and your files remain where they belong.

Got some weird noises coming from your computer? Give us a call today at (416) 645-2469

5 Tech Travel Tips You Can Use

5 Tech Travel Tips You Can UseTravelling soon? For most people, this also means making sure your tech is packed and ready for the adventure. Smartphones, ebook readers, tablets, laptops and smart watches are now so light and portable that you’d never think of leaving them behind, plus they can add a ton of value your experience.

Here are a few tips to consider before you hit the road.

1. Backup to the cloud

While you’re jet setting around, relaxing on a beach or hiking your way to freedom, your tech is always going to be exposed to a level of risk. This might range from accidentally leaving your laptop at a cafe to having it stolen from your bag, but either way the problem is the same – your data is now gone. If you’ve backed up your devices to the cloud (eg Evernote, Microsoft OneNote or Google Drive) you’ll be able to access your files easily and securely from anywhere.

Hot tip: Scan or save important documents like itineraries and passports to the cloud.

2. Pack the right cables

Begging random strangers for a loan of their cable isn’t much fun, so remember to bring the exact cables and chargers you’ll need. Most smartphones and tablets use universal plugs like Micro USB, USB C or Apple Lightning, so you can get away with only packing one cable. Many locations now offer powered USB ports but be sure to also pack the right charger as well, it’s a convenience you’ll appreciate. If you’re travelling overseas and the socket is different, remember to pack a plug converter, and depending on your destination, you might even find the voltage is different. It’s a good idea to check whether you also need a voltage converter before you try and charge.

3. Download offline data

It’s no secret that global roaming can give nasty bill shocks. The easy access data you normally use over Wi-Fi or get included in your cell plan has us all accustomed to being connected. While travelling, you might find yourself in a location where data costs a fortune or it’s not available at all. Download any files you might need, including important documents like itineraries and bookings, so that you can access them even without a connection.

4. Update and scan

Just like you’d make sure you’ve got the right vaccinations and travel gear, make sure your tech is ready to travel too. Set aside a few minutes to run updates for your operating systems and apps, as well as your anti-virus. Go one step further and run a manual anti-virus scan too. The last thing you want to deal with one your trip is a cyber attack! While you’re doing your pro-active thing, turn on password protection for all devices so that only you can unlock them.

Hot tip: Use a complex password that is hard for thieves to guess.

5. Mark your territory

Almost exactly the way it sounds, let everyone know this tech belongs to you. Write your cell number on portable devices in case you get separated so whoever finds it can give you a quick call and save the day. Don’t want to use permanent marker on your shiny tech? Grab some sticky labels you can peel off when you get home.

You can also get little Bluetooth tracking tags to stick to your gear, so that if you ever lose something you can chase it down. Similarly, you might like to consider enabling the ‘find my feature on Apple devices. Having this feature switched on also means you can disable your device remotely, an excellent security option if it’s been stolen.

Need help preparing your tech for travel? Give us a call at (416) 645-2469, (905) 667-0441 or email us.

Why Your Business Needs Unified Threat Management

Why Your Business Needs Unified Threat ManagementSounds scary doesn’t it? Almost like a swat team dressed in black is going to swing in and start yelling orders. While just as effective at disabling the bad guys, Unified Threat Management (UTM) is a special kind of IT solution focused on proactive protection. Consider it more like a team of virtual bodyguards that stand at the door between your business and the internet, keeping trouble out while your legitimate traffic can come and go normally.

With the increasing number of connected devices in your business network and the different ways your employees now connect, it’s more important than ever to set up dedicated security systems that give integrated protection. UTM is a series of solutions that work together, simultaneously layering your protection across the board. We’ll cover the four main inclusions here, and exactly what they can do for your business.

Robust Firewall

Put simply, a firewall keeps an eye on all the data coming in and out, looking for anything abnormal. While every home PC comes with a software firewall built in, those ones pale in comparison to what a UTM firewall can do. Remember the team of virtual bodyguards? Imagine the home firewall asking nicely if the data should be doing that, while the UTM slams the data to the ground and demands credentials. It exists to make sure the data entering your network is safe, that it’s not part of a cyber-attack, and that in the rare event your network becomes infected, your servers aren’t being used to attack another business.

Anti-virus Where it Matters

With so much new malware being released daily, it’s easy to fall behind in updates and discover you’ve been infected. Your employees are likely doing their best, but manually scanning each file can be exhausting and time-consuming. Your UTM anti-virus is built into the firewall, ensuring known or suspicious malware is stopped at the door. It doesn’t even make it through to your employees, so the risk is removed. Clearly that’s the best outcome possible and will allow your employees to work at maximum efficiency, while you can run your business with confidence.

Spam Blocking

Most cyber-attacks come via email these days, with either an attachment or a link. Once clicked, the malware is released into the network to wreak havoc. Obviously, your employees are smart enough not to open random attachments/links, so hackers use phishing emails. These are emails that look legitimate and may refer to vendors you use, financial services you have accounts with, or even seem to be from other employees. Your UTM isn’t falling for any of those disguises, it strips down each email and checks it against high-tech legitimacy markers. If it sees anything suspicious, the email is marked as spam and either held for review or bounced away.

Your employees never see the attack, so they can’t accidentally fall for it. While the UTM is monitoring for phishing/fake emails, it’s also culling out the general spam that clogs up inboxes. Employees will no longer have to spend precious minutes each day wading through the junk, and the likelihood of missing an important customer email has greatly dropped.

Content Filtering

In a perfect world, your employees would only access work-related sites and do work-related things online. Content filtering can help you limit the risk they’re bringing into your business via these websites. Your UTM can be set to restrict sites that infect computers, such as adult content, gambling or illegal downloads. It can also be used to restrict access to productivity vampires like Facebook or Pinterest, either during work hours or completely. It’s up to your policies how much you’d like to filter and whether to add any flexibility. Some businesses allow social media during lunch breaks or have special reward hours each week. Simple tweaks like this can increase productivity overnight and give you the security you’re looking for.

You can see how a layered security solution like UTM provides a space for your business to thrive, where systems are secure, employees are able to maintain efficiency, and cyber problems stay outside the doors. The way the layers work together is more effective than a patchwork of separate systems, and a UTM is much easier to configure and maintain.

We can find the right UTM solution for your business. Call us today at (416) 645-2469, (905) 667-0441 or email us!

Should You Let an Amateur Loose on Your Network?

Most of us know a fair amount about computers, even kids are joining circuits and coding programs in schools – but that does that make everyone an IT expert? It’s fair to say almost all workplaces have that employee who can finesse the printer or use shortcuts nobody else knows about. They have skills, absolutely, but they often know just enough to be dangerous to your business.

Hobby IT skills are learned on home computers which are very different to a professional business setup. When something goes wrong on a home computer, there’s no drastic impact if parts need to be replaced, data is lost or it stays down for a week or two. In a business setting, every problem costs time and money, usually creating a domino effect through the entire network. Would you gamble the success of your business with a non-professional who did a quick Google? It’s unlikely you’d let someone be your lawyer purely because they can deliver a stubborn argument, nor would you let someone perform surgery just because it looked easy on TV. Businesses have unique, specialist IT needs that go beyond amateur computer skills and there’s always going to be more at stake.

Designing and implementing a custom backup plan for your business is a particularly interesting area. While most home users skip this part entirely, an IT professional has seen (and recovered) all manner of situations and will use that knowledge to ensure that if the worst happens, your business is covered. This could mean anything from having a complete copy of your drive stored securely in the cloud or drilling down to backup only the most important data. An IT expert is equipped to help you identify the value in each piece of data and implement a plan so robust that if your business is ever hit by disaster or breach, downtime is minimal – along with losses.

If a disaster ever does occur, like fire, flood or theft, would an amateur know what to do? Who to call? These situations are so charged with tension and panic that making the wrong moves can lead to more damage. A professional helps design continuity/disaster plans, which map out exactly what should happen, who should do it and in what order. It takes out the guesswork and minimizes downtime. Perhaps more importantly, the expertly written disaster plan will include a complete risk analysis so that you know in advance where to strengthen your protection. It also includes a business analysis so you know which systems are dependent so you can stop the domino effect, plus know the legal/contractual impacts, financial impacts and so on.

Your IT professional will also help ensure your business is meeting any regulatory requirements. Many businesses are subject to strict data rules set by government bodies, such as FISMA and HIPAA. The regulations change often and demand increasingly more attention to data security, with hefty penalties for businesses that fall behind. Professionals are constantly in the loop around upcoming revisions and how best to comply with little to no disruption to your daily business. Part of ensuring your business is safe means staying on top of software updates and patching multiple computers at the same time.

The best option is to run the updates before employees arrive for the day, and since the process can take a few hours and be quite fiddly, it’s generally not something amateurs will prioritize. Unfortunately, as we’ve seen with recent cyber-attacks, delaying a security update by even a few days can lead to disaster. Engaging an IT professional is a cost-effective solution that keeps your business running, growing and earning.

Let the professionals manage your tech the right way by calling us at (416) 645-2469, (905) 667-0441 or email us.

Fake Invoice Attacks Are on the Rise – Here’s How to Spot (and Beat) Them

Businesses around the world are being struck with a cyber-attack that sends victims a fake invoice that looks real enough to fool to most employees. It’s an old scam that used to see bills faxed or mailed in, but it’s made its way into the digital world and instances are on the rise.

Chances are you’ve already seen some of the less effective attempts, like an email advising your domain is expiring, except it’s not from your host and your domain is nowhere near expiration. These new attacks are more advanced, in that they look completely legitimate and are often from contractors/suppliers you actually use. Logos are correct, spelling and grammar are spot on, and they might even refer to actual work or invoice numbers. The sender name may also be the normal contact you’d associate with that business, or even a co-worker, as cybercriminals are able to effectively ‘spoof’ real accounts and real people. While it’s worrying that they know enough about your business to wear that disguise so well, a successful attack relies on you not knowing what to look for, or even that fakes are a possibility. With that in mind, here are two types of invoice attacks you might receive:

The Payment Redirect

This style of fake invoice either explicitly states payment should be made to a certain account, perhaps with a friendly note about the new details, or includes a payment link direct to the new account. Your accounts payable person believes they’re doing the right thing by resolving the invoice and unwittingly sends company money offshore. The problem usually isn’t discovered until the real invoice from the real supplier comes in or the transaction is flagged in an audit. Due to the nature of international cybercrime, it’s unlikely you’ll be able to recover the funds even if you catch it quickly.

The Malware Click – Rather than go for the immediate cash grab, this style of attack asks your employee to click a link to download the invoice. The email may even look like the ones normally generated by popular accounting tools like Quickbooks or Xero, making the click seem safe. Once your employee has clicked the link, malware is downloaded that can trigger ransomware or data breaches. While an up-to-date anti-virus should block the attack at that stage, it’s not always guaranteed, especially with new and undiscovered malware. If it does get through, the malware quickly embeds itself deep into your systems, often silently lurking until detected or activated.

How to Stay Safe

Awareness is key to ensuring these types of attacks have no impact on your business. As always, keep your anti-virus and spam filters up to date to minimize the risk of the emails getting through in the first place. Then, consider implementing a simple set of procedures regarding payments. These could include verifying account changes with a phone call (to the number you have on record, not the one in the email), double checking invoices against work orders, appointing a single administrator to restrict access to accounts, or even two-factor authorization for payments. Simple pre-emptive checks like hovering the mouse over any links before clicking and quickly making sure it looks right can also help. Like your own business, your contractors and suppliers are extra careful with their invoicing, so if anything looks off – even in the slightest – hold back on payment/clicking until it’s been reviewed. Fake invoices attacks may be increasing, but that doesn’t mean your business will become a statistic, especially now that you know what’s going on and how you can stop them.

We can help increase your security, talk to us today. Call us at (416) 645-2469, (905) 667-0441 or email us.

Why Do Computers Break?

We know computers always break at the worst possible time, but what exactly prompts that failure? It’s easy to think it was something you did since you were using it at the time, but while your online gaming frenzy might cause a temporary crash, normal user actions are rarely the cause of a broken computer.

Physical Damage

Accidents happen, but they don’t always mean you need to buy a new computer. As an electrical item, liquid spills are a big problem. This could be anywhere from a spill on the keyboard, going overboard with the screen cleaning spray or even a flood that reaches the computer. Laptop users need to be especially careful when choosing their work surface, as cafes and kitchen tables often have small puddles left behind. If you’re lucky and the liquid didn’t fry the circuits, ongoing corrosion is still likely, as is stickiness to gum up the internal parts. Similarly, a dropped computer isn’t going to be happy, nor is one that’s been knocked around. Even a light thump of frustration can cause loose cables, disconnections and internal damage.

Age

Computer parts have an expected lifetime, especially moving parts like fans or mechanical hard drives. Some computers can run 24/7 for up to a decade, while others can be barely used but fail within warranty. When age is the issue there are usually early warning signs like extra noise or slowing down, but the actual ‘break’ generally happens when you go to turn the computer on, perhaps after a crash or overnight – either it makes a valiant effort before giving up, or nothing happens at all. Sometimes lasting age is the luck of the draw with how it was manufactured, and quality does play a big part in how long it can keep churning.

Power Surges

We like to think electricity is a constant stream that never varies, but computers are particularly sensitive to both surges (too much electricity) and brownouts (not enough electricity). You might notice the lights dimming or flickering during a brownout, or glowing just a tad too strong during a surge. These variations never last long, and they’re not something you can control unless it’s just your house (it’s worth checking with your neighbors), but they can easily break your computer. A surge protector can guard against mild increases in voltage, but brownouts and strong surges will still cause damage.

Heat

Overheating is a big contributor to premature computer death. Some computer parts run hot and need plenty of cooling to keep them working. You might not feel it from the outside, but internal components can rapidly build up heat that needs to go somewhere. When your airflow vents get blocked with dust or pet hair, the temperature continues to increase until components literally bake themselves to failure. At set temperatures, the computer will automatically switch off to try and cool down, however the more often this happens and the higher the temps, the more likely your computer is to die.

Hard Drive Failure

Your data is stored on a hard drive, and if you’ve got a mechanical hard drive (most people do), it works a bit like a record player with a spinning ‘platter’ and a needle that reads it. Small bumps, liquid, age, surges and overheating can all trigger hard drive failure. Along with making your computer unusable, hard drive failure means your data is also lost. While sudden breakage might leave you surprised, take note of any strange noises or repeated crashes and back up your data in advance.

Like a car, your computer needs to be serviced. We can check your computer both physically and its software to make sure its running right and will keep on working for you. Give us a call at 555-5555.(416) 645-2469, (905) 667-0441 or email us.

3 Internet Habits To Keep Kids Smart and Safe

How can you make the internet a safer place for your children? It’s a common concern as all parents want their kids to be protected and happy whenever they go online. It’s relatively easy to supervise and monitor the very young ones as they stare delightedly at the Disney Jnr site, but the risks increase greatly as kids get older and more independent.

You’ve probably heard the term ‘cyber safety’ before, but safe internet usage goes beyond reminding them not to talk to strangers. With the evolution of the internet and the way it’s now woven seamlessly into our lives, the focus needs to be on ingrained habits. That means ensuring your children have the tools and predefined responses to online events so that no matter what happens, they’re not placing themselves (or your family) at risk. Setting up these habits is easy, and begins with three basic understandings:

Downloads are a no-go

Most kids can’t tell the difference between a legitimate download and a scam/malicious link. It’s not their fault, the online world is full of things that will trick even the most savvy adult. The difference is that kids tend not to take that extra moment to check exactly where that link is pointing, question whether it’s too good to be true, or even read what they’re agreeing to. They want to get back to what they were doing, and if something pops up, their first instinct is to click ‘yes’ – purely so it goes away. Unfortunately, that single ‘yes’ may have just opened the doors to malware and viruses that will ruin their computer. Set a family rule that they need to ask permission for all downloads (and an adult will check it first), and to never click a popup. When you’re called over to give download permission or check a popup, talk through exactly what you’re checking and why. As your child matures, get them involved in this process so their safe habits extend outside the home.

Critical thinking is a must

Most youngsters think the internet is a magical place and can’t imagine their life without it. To them, the internet is on the same level as oxygen! With that acceptance though, comes unwavering trust that the internet would never lie to them, never trick them and never hurt them. While we adults know better, it’s only because we already view the internet with a certain level of distrust. The best way to keep kids safe is to teach them to approach every aspect of the internet with critical thinking. That includes teaching them to question the motives of other people online. Is that person really a kid? What do they really want? Unfortunately, all kids do need to be aware that predators use the internet to target and lure children. Ensure your children tell you immediately if a stranger makes contact. Along with this stranger danger, teach them to identify what marks something as suspicious, and what they should avoid. If they come across anything inappropriate, they should shut down the computer and come straight to you.

The internet is forever

Kids have an overwhelming drive to contribute to the internet, they don’t think twice about recording a video, jumping in a chat room or onto social media. The world really is their playground! But what they don’t understand until they’ve been burned, is that anything they upload, write or say is on the internet forever. Even if they delete it or use a platform where content self-erases, someone can still screenshot and send it right back out. Many cyber-bullying cases are based around this exact type of blow-back. Once your kids know that everything they post is permanent, they’ll be more likely to pause and think.

We can secure your computer and help keep your family safe – give us a call at (416) 645-2469, (905) 667-0441 or email us.

Is Your Home Wi-Fi Keeping Up?

Wi-Fi has forever changed the way we live, work and play. We can surf the internet on the couch or by the pool, look up a recipe in an instant, and even connect our lights to voice control. It’s no wonder it was accepted with open arms, but is your Wi-Fi as good as it needs to be?

10 years after Wi-Fi first made its way into homes with those mysterious rabbit-eared boxes, it’s evolved into a juggernaut of speed and accessibility that we can’t do without. Think about how many wireless devices your home has – the average home has at least 10 devices connected wirelessly to the internet, many have more.

While older devices are typically happy with a slice of slow internet, your newer devices like 4kTVs and media streaming simply can’t function without fast internet. Add in a game console, tablet, a few smartphones and a laptop or two, and your Wi-Fi is suddenly stretched beyond full capacity and struggling to keep up. Yet, most people don’t know how fast their Wi-Fi is, or if it’s working right– they only know how many bars they’ve got. Unfortunately, counting bars can add up to one big headache.

Here’s why relying on your Wi-Fi bar count might be ruining your internet experience:

Bars measure the wrong thing: While it’s great to know you’ve got a ‘strong’ signal, it would be even better if you could have a ‘fast and available’ signal. The internet could actually be down and you’d still have full bars because it’s really only measuring how close to the Wi-Fi router you are. That proximity measure doesn’t take into account how many devices are fighting for the same bandwidth or whether there’s any left for you. We can ensure your Wi-Fi isn’t just available, it’s up to the task.

Wi-Fi goes sideways: While next-door’s Wi-Fi can reach the back of their property, it can also go a similar distance sideways into your house. This extra ‘noise’ can disrupt and slow down your own Wi-Fi. In dense areas, your Wi-Fi is basically getting lost in a swirling field of signals, all using the same channel and frequency. It’s a digital crowd which can seriously slow your speeds. We can fix this by changing your Wi-Fi channel to one with less cross-talk.

Everyone uses the default settings: Most home Wi-Fi uses a 2.4ghz frequency by default. While it makes a plug & play router easy to set up, it does mean you’re not getting the speeds you could be. Switching to the 5ghz frequency means your Wi-Fi is separated from the neighborhood cross-talk. 5ghz is also considerably faster, which is a bonus. We can help you upgrade to a 5Ghz-capable router or switch your existing frequency.

Priority isn’t set: While not Wi-Fi specific, we can also set up “Quality of Service” if your router supports it or supply you with one that does. This allows things like Netflix and Skype calls to always take priority and remain uninterrupted over less important tasks like downloads. You’ll be able to watch movies without those awful buffering jumps and video chat without freezing.

Is your home network not keeping up? Give us a call at (416) 645-2469, (905) 667-0441 or email us and we can improve your internet experience.

Desktop vs Laptop: Which is Right for You?

Laptops have become the go-to choice for most people in the market for a new computer. They’re sleek, portable and heavily advertised. But are they the best choice for your needs? Before you buy your next computer, take a look at these considerations – you may discover you’ve been dreaming of a desktop all along!

How portable do you need it to be?

Hands down, laptops are easier to move around than a desktop. You can pick them up, pop them into a backpack and away you go. That doesn’t mean desktops are bolted to the floor, just that they’re not designed to take on holidays or go with you to the local cafe. With that portability though, comes a trade-off: thin and light means your computer performance takes a hit. The more powerful your laptop, the bigger and heavier it is, and you won’t enjoy lugging that weight around all day. If that’s got you leaning towards an ultra-portable, consider this: The smaller and lighter your laptop is, the weaker it is. In fact, some laptops struggle to run the most basic apps. Fortunately, when you do choose a desktop, cloud technology means your data is mobile, even if your main computer isn’t.

What balance of power and price do you need?

The bottom line here is that a desktop will always give you more power for less money. Their larger cases allow for bigger and better components, with more effective systems to avoid overheating. Even the most powerful laptop is going to be hotter than its desktop equivalent, and much noisier too. If you’re using power-hungry software like games or video editing, we recommend choosing a desktop. The heat control alone is worth it as frequently overheated laptops don’t survive long.

Desired screen size

As laptops are designed to be portable, screen sizes are usually small, around 11-15”. Larger, more powerful laptops often go up to 17”. Desktop monitors however, start at 17” and average at 22”. These larger sizes give you more space to work in, options to tile your applications and multi-task, and even sit back and watch an HD (or even 4K) movie. They also allow for nice big text and images, with a better ability to choose the visual experience that suits your needs. If you’re after a large screen size without the actual desktop computer, all-in-one PCs are a great option with many offering impressive screen quality.

Your working comfort

Many people buy a laptop only to get home and find it’s a pain in the neck – literally! The traditional laptop design means you’re always looking down at the screen which can put a strain on your neck. You can try to raise the screen by placing the laptop on a stand, but then the keyboard is out of easy reach. The smaller keyboards and touchpad designs may also leave you more prone to repetitive strain injuries. Many people end up connecting their laptops to external monitors, keyboards and mice, simply so they can work in comfort. Desktop computers on the other hand, allow you to create the perfect working environment for your needs and even cater for other family members. Monitors are usually height adjustable, keyboards and mice are wireless, and you’re able to place the desktop on the floor out of the way. If you’re on your computer for more than short bursts, your body will appreciate you choosing a desktop.

Are you looking for flexibility?

When you choose a laptop computer, it’s like ordering from a set menu. You get this brand, in this design, with these specifications. Changing out parts for repair or upgrade can be difficult and expensive as there’s not a spare inch of space. Some parts are extremely hard to get to, which can turn a simple swap into a dealbreaker. The extra space inside a desktop gives infinite flexibility for upgrades over time and fast repairs. This means you’re able to easily pop in more powerful components for a fraction of the price and extend the life of your computer by years.

Come talk to us about your next computer and we’ll find the right one for you. Call us now at (416) 645-2469, (905) 667-0441 or email us.