How Many Good Battery Habits Do You Really Have?

Batteries are rarely talked about – until they’re drained – then we’ll tell everyone as we beg desperately for a charger, hoping to get enough juice to last the day. The truth is, they’re a miracle of engineering that gets taken for granted when full and cursed when flat. If it feels like your battery is running out faster, you might be right.

How Many Good Battery Habits Do You Really Have?But it’s not because of ‘battery memory’ and needing to be cycled (that’s an older battery type called NiMh), it’s because the modern LITHIUM-ION batteries in phones and laptops just simply wear out over time. Fortunately, extending your battery life is easier than you think! Which of the following GOOD battery habits do you have?

  1. Charge whenever you can: Lithium-ion batteries don’t like being charged all the way up and then drained all the way down. No wonder, it even sounds exhausting. Give them a little charge here and there, and they’ll be happy.
  2. Leave your laptop plugged in all the time: You can’t over-charge the battery, it will just sit there waiting to be used. The laptop also helps out by cutting the flow of power when the battery registers as fully charged.
  3. Watch for overheating: If you can, remove your laptop battery while charging, because while it won’t overcharge, it may overheat. You might also consider removing the battery if you’re using your laptop plugged in all the time. Sure, you might lose data if there’s a power outage, but overheating is a far more common occurrence and it’s been proven to degrade battery life considerably. Check your vents are clear with good airflow, and if necessary, help it out with a cooling laptop stand.
  4. Leave your phone plugged in all night: Just like your laptop, your charger knows to stop when the battery is full. Those chargers do generate heat though, so make sure you have enough airflow around both charger and phone, and never sleep with it under your pillow.
  5. Charge batteries before storing: If you’re blessed with backup batteries, make sure to give them a half charge before storing. They’ll naturally discharge and age over time, so this gives them a fighting chance to still be viable when you need them.
  6. Keep your cool: We know to avoid water with our phones, but we’re less careful about exposing it to heat. This includes leaving it in your car all day, placing it on top of your PC, or even in a sunny spot by the window. Wireless and rapid chargers can also be an issue, as the amount of heat they generate will affect your battery.

How did you go? Is keeping your lithium-ion battery happy easier than you thought? Your battery will wear out over time, but you can push that day a few years into the future if you remember to keep it charged and keep it cool.

Having battery issues? We can help! Call us at (416) 645-2469,  (905) 667-0441 or email us.

Cyber Security: 4 Ways to Travel Safe For Business

Cyber Security: 4 Ways to Travel Safe For BusinessWorking from anywhere is now as simple as accessing the internet on your device. Managers, owners, and employees are all embracing the flexibility of working while traveling, making it the new global norm. But while you were in the office, you were protected by professionally designed firewalls, security infrastructure, and robust software. As soon as you step away from the building, those protections disappear, leaving your device and the data inside at great risk.

Cyber attackers love to collect any data they can obtain, often preferring to hack first, assess value later. It doesn’t help that almost all data can be sold, including your personal details, those of your clients and suppliers, as well as your proprietary business data. These days, the information stored on your device is usually worth much more than the device itself.

Here are 3 ways a hacker will attack:

Flaunting Opportunity: Whether your employee left their laptop at a café or a thief stole the phone from their pocket, the outcome is the same – that device is gone. Hackers will take advantage of any opportunity to gain access to a device, including taking them from hotel rooms and even asking to ‘borrow’ them for a few minutes to install spyware, before handing it back.

Spoofing a Wi-Fi Hotspot: We’ve all come to expect free Wi-Fi networks wherever we go. Hackers will take advantage of this trust to create their own free, unsecure network, just waiting for a traveler to check a quick email.

Intercepting an Unsecure Network: Hackers don’t need to own the Wi-Fi network to steal content from it. Data traveling across an unsecure network is visible and available to anyone with the right software.

It’s okay, you don’t need to lock all employees inside the building or cancel all travel plans. Taking these four precautions will increase cyber safety and help protect your business data while on the go.

  1. Make a backup before you travel: In the event your device is lost or damaged, you’ll be able to replace the device with a new one and quickly restore all the data from a backup, all with minimal downtime.
  2. Don’t use public Wi-Fi: Wait until you have access to a secure network before going online – even just to check email.
  3. Use passwords and encryption: At a minimum, make sure you have a password on your device, or even better, have full drive encryption. That way, even if your data storage is removed from the device, the contents are inaccessible.
  4. Act fast after loss: If your device is lost or stolen, immediately notify the appropriate people. This might include your IT provider so they can change passwords, your bank so they can lock down accounts, and any staff who need to be aware of the breach so they aren’t tricked into allowing further breaches.

Need help with mobile cyber security? Call us at (416) 645-2469, (905) 667-0441 or email us.

Welcome to the ‘Internet of Things’

ALERT: Your Antivirus May Be Letting You DownYou arrive at home and the door unlocks because it knows who you are, sensing the key in your pocket. The lights switch themselves on and your favorite music begins to stream gently through the living area. It’s already the perfect temperature, and as you head for the fridge, you notice an alert on the screen congratulating you on meeting your exercise goal today and suggesting a tasty snack.

Okay, it sounds like a scene from a movie, but it’s actually reality today thanks to the Internet of Things (IoT). Almost anything that can be turned on or off is now able to be connected to the internet. An entire industry has popped up to help users create a custom experience designed around their unique needs. Electronic locks, lights, healthcare wearables and household appliances are just the beginning. IoT goes beyond devices you can use to surf the web – it’s a global revolution.

Adapters can transform even the most random appliance into a connected gadget, as well as add new layers of functionality. Cloud software is creating piggy-back connections, resulting in not just a new experience, but a new way of interacting with the data produced. It may all seem impossibly futuristic, but IoT is less about technology and more about enhancing relationships between people-people, people-things and things-things.

Millions of people are wearing a Fitbit or Jawbone to track steps and calories, while others are letting their fridge order groceries! The practical applications are almost endless, commonly including: GPS trackers on pets, home security via webcam, patient monitoring of blood pressure/heart rate, weather monitoring, and remote power points. No more worrying all day if you left the iron on, just push a button on your phone and know for sure it’s turned off.

Of course, with all this connectivity comes risks. While the idea of having your toaster hacked is a bit mind-boggling, technology connected to the internet is open to exploitation. The webcam that allows you to monitor your pets may also allow other people to glimpse inside your home, but only if it’s not secured properly. Unfortunately, it only takes one small gap for a cyber-attack to get through, and once in, all connected devices are at risk.

Having your lights taken over by a far-away prankster may seem like a small risk, but gaps allow them into your computers, phones and tablets too. That’s the part the movies skip over – the networking protections that exist in the background, shielding against attacks.

Taking the time to properly secure your IoT device is essential to making sure you get the whole, happy future-tech experience. We’re big fans of IoT and can’t wait to see what comes next!

Got an IoT device? Give us a call at (416) 645-2469, (905) 667-0441 or email us to help you set it up securely.

ALERT: Your Antivirus May Be Letting You Down

ALERT: Your Antivirus May Be Letting You DownThe best way to avoid a computer virus is by using common sense, but that doesn’t mean you’ll be safe from attack. Even the most careful user can find themselves infected in an instant and spreading the virus faster than a sneeze in flu season. It’s why antivirus software is still the first package we install on all systems – because you never know when you’ll be attacked. But should you choose free or paid antivirus?

Advertising: Much like a free app making its fortune with in-app purchases, the free antivirus software will push for payment. Expect popup boxes pestering you to sign up to the paid version at least daily. Some free options will also try to change your browser home page and default search engine, an inconvenience you may be stuck with. Paid options are more respectful and largely invisible unless they’ve detected a problem.

Effectiveness: It’s fair to expect your antivirus to detect malware, and testing showed that in a head-to-head battle free and paid are about equal at catching known infections. And therein lies the kicker: generally speaking, free antivirus needs to have recorded a virus to its library before it can detect it. Paid antivirus is more likely to identify and stop a new virus. It essentially bases the detection on suspicious behavior, source and attributes, a far more effective method of detection.

Features: Free antivirus options are usually created from the paid version, taking out everything except the bare minimum. In your paid version, you can expect advanced features like spam filters, firewalls, parental controls and secure web browsing. Some paid antivirus will also update your other software packages, forming a more secure protection against attacks. For example, you might view a malicious image file that takes advantage of an exploit in your PDF software. Unfortunately, hackers have advanced beyond simple tactics and it’s not just about avoiding email attachments anymore.

Support: Free antivirus options are the most popular choice because they’re… free. Obviously. This also means there’s generally no support available. If there’s a problem or conflict with another program, you may find yourself without protection until it can be resolved. Paid antivirus options usually include telephone support, ready to help with problems ranging from installation to system diagnostics.

Ease of use: Depending on what you use your computer for, this may be an important concern. Free antivirus options are easy to install and use, but are very limited in their flexibility. They come as-is, meaning you can’t pick and choose what it monitors or how it reacts. For example, users occasionally find it necessary to disable ALL protections in order to install a network game. Paid versions are more likely to allow you to adapt the way it runs, switching features on and off as required.

Free antivirus is fine for very basic protection, those on a budget or those with an older PC. In these cases, something is always better than nothing. But we generally recommend you go with a paid antivirus to defend you from the new attacks that are released daily, and to ensure you’ve got solid protection that will make a real difference to your digital safety.

Talk to us (416) 645-2469, (905) 667-0441 or email us about upgrading to a paid antivirus or even better a Managed Antivirus.

5 Undeniable Reasons Your Business Is Ready for a Professional Network

Way to go! Your business has grown at lightning speeds and you’ve been adding new workers and computers along the way. Now that you’re sure everything is on track to succeed, it’s time to level up your network to a robust, scalable setup.

5 Undeniable Reasons Your Business Is Ready for a Professional NetworkWhy? Here are the top 5 reasons to call in the networking professionals today:


Speed: They say time is money, but time spent waiting for a large file to transfer person-to-person or across a bottle-necked system is torture. As a small business this lost time was negligible, but as your business has grown, so has transfer time. While it may only be 5 minutes a day to start, with roughly 260 work days in a year, that 5 minutes a day turns into 21 hours. It all adds up. Unfortunately, the impact of this lost time reaches well beyond the time taken to pass a flash drive around the office or queue up downloads from the internet – it’s a break in workflow and concentration that can almost double the time off-task. 

Efficiency: Almost every business requires employees to share digital files. Until now, you may have gotten by with a simple setup and minimal security, but as your workforce has grown, so has your network load. Each computer, storage drive and device adds further burdens onto your network, resulting in a slower transfer, errors, time off task, and even faster hardware failure. A professional network design will give your employees a central file storage location, with the added benefit of auto-saving and backups. No more losing hours of valuable effort or surprise file corruptions, just a scalable, secure server with smooth and efficient transfers.

Collaboration: Employees often need to work together on the same documents. Previously, this required them to take turns, waiting until someone else was finished before the file was available. With a modern network setup, collaboration becomes an organic, profitable way to work. Employees don’t even need to be in the same physical location, opening up opportunities for remote collaboration.

Confidentiality: Every business needs to keep a few secrets. Whether they’re trade secrets or accounting data, you have complete control over who sees what.  Your network professional will be able to establish a setup that meets your business’ unique confidentiality needs. Perhaps you’ll have the CEO able to see everything, sales staff can only see sales data, and accounting can only see accounts. Set your access controls based on name, department, role or go further and require passwords for certain folders.

Flexibility: Expand your connection flexibility with wireless networking for employees who are required to roam within the building, Virtual Private Networks (VPNs) for those working at home, or even docking ports for those who switch between locations. A professional network setup will always support the way your business works, both now and as you continue to grow.

Your business’ ability to securely share, store and transfer files will be one of the key contributors to continued growth. The speed, efficiency and flexibility you build into your processes now will save you time, money, and a whole lot of frustration. It’s time to celebrate how far your business has come by looking to the future, with a robust, scalable network that supports your vision.

Give us a call at (416) 645-2469, (905) 667-0441 or email us to discuss your new network.

Internet Lingo 101: Cheat Sheet for Beginners

Internet Lingo 101: Cheat Sheet for BeginnersThe Internet is growing and evolving so fast even the dictionary has trouble keeping up. Here are 12 suddenly common terms that are helpful to know.

Browser

A browser is a free piece of software that lets you view web pages, videos and other online content. It’s a core requirement of going online, as it converts the computer languages HTML, Javascript and XML into human-readable form.

The most popular browsers in 2017 are Google Chrome, Safari, Firefox and Microsoft Edge*. (*Internet Explorer has been superseded and is no longer recommended due to security concerns)

Email

Electronic Mail (formerly spelled with a hyphen: ‘e-mail’) is typed messages sent from one person/business to another via the Internet. It’s delivered almost instantly and then waits patiently for the recipient to open and read it.

You’ll need a webmail service (e.g. Gmail) or installed software (e.g. Outlook) to read, write and send, but you can also set your smartphone up for this. Most emails are in the form of letters, newsletters or catalogs, often with a more casual tone. Email can include text, links to the internet and images, but not video/sound.

Encryption

Before important data is sent over the internet, it’s scrambled to turn it into gibberish that means nothing to anybody who might intercept it. Unless there’s been a massive security breach, only the sender and intended recipient will have the decryption key to turn it back into readable data.

You don’t have to encrypt your own data as it happens automatically. Your email provider and important places like banks and online stores have digital security systems that take care of the encryption/decryption for you.

Firewall

A firewall is a security measure designed to act like a door bouncer to your network. When an unauthorized user attempts to gain entry, the firewall blocks their path until it’s checked them out thoroughly. If there’s anything suspicious, the firewall refuses to let them in.

HTTP and HTTPS

These are acronyms for the rules of how data is transmitted to your computer screen. The actual mechanics are incredibly complicated, but the terms have one very important distinction:

HyperText Transfer Protocol (HTTP) means the images, text and links should appear in your browser.

HyperText Transfer Protocol Secured (HTTPS) means the page has an added layer of security to hide your personal information from hackers. Data sent through pages with this prefix is securely encrypted before transmission.

IP Address

Every device that accesses the Internet is assigned a unique IP address to identify itself. It’s used to make sure when you request a page or document, it’s sent to you – and not someone in Alaska. Your IP will look something like ‘202.9.64.55’ and may be referred to as fixed or dynamic.

ISP

Your Internet Service Provider (ISP) is the company that allows you to connect to the Internet. They’ll also offer extra services like email or web hosting. It’s impossible to bypass the ISP level and connect directly to the Internet.

Malware

A broad term to describe viruses and malicious software from hackers. Malware can manipulate you into paying money, take control of your computer, steal your private details or break your computer in some way. Instead of listing each specific threat, you’ll commonly see them lumped together under ‘malware’.

Router

The traffic system for your network, connecting computers and devices within the home and acting as a defensive gateway to the Internet. These hardware devices can be wired or wireless, and allow you to share one Internet connection amongst all the computers/devices in your home.

Social Media

A broad term to describe all the websites and applications that let you share and interact with others online. To fit this umbrella, the site needs to allow user profiles, live updates and the ability to add friends/followers.

The most common social media applications are Facebook and Twitter.

Spam and Filtering

Any unsolicited messages sent over the Internet, usually in bulk, are called spam. Usually, it’s electronic junk mail, but it’s also a technique hackers use to trick people into clicking links to their malware.

Email applications are reasonably good at identifying spam and should shift it automatically to a spam folder before you see it. Occasionally, the filters get it wrong and you may find a relevant email needs to be dragged back to your inbox.

URL

Each website has a unique address on the web known as a URL (Uniform Resource Locator). URLs commonly end in .com but can also end in a country specific extension like .com.au or .fr, or more recently, in new and exciting extensions such as .xyz or .me

Windows Vista End-of-Life: What This Means For You

Windows Vista End-of-Life: What This Means For YouThe countdown is on for Windows Vista users. On 11th April 2017, Microsoft will cease all support and security patching, just like they did with previous Windows versions. Naturally, you’re rather attached to your current operating system and not exactly leaping for joy at this news!

Unfortunately, the longer your computer goes without an upgrade, the higher the chance of a complete system breach. While you’re watching the count-down and thinking about scheduling an upgrade sometime soon, cyber-criminals are making plans of their own. As time progresses, they’ll actively target out-of-date systems and search for vulnerabilities.

Even the most stalwart Vista user must finally upgrade, as continuing to use it will expose your computer to some pretty confronting risks, including:

Security risks: While Microsoft may have patched the gaps exploited during the Vista lifetime, there are many more just waiting to be discovered. It gets worse: your antivirus program is unlikely to intercept these attacks. Hackers are extremely fast to exploit newly-discovered vulnerabilities and without Microsoft working just as fast to close them, the risk increases exponentially every time you turn the computer on.

Compliance risks: For business users, this is a big one. Many businesses are subject to conditions that require them to run an operating system that’s regularly patched. For those working with sensitive, legal or private data, this is even more important. Continuing to use an unsupported OS places not just the system security at risk, but also the entire business.

Software incompatibility: New applications are created exclusively for current operating systems. This means you can’t upgrade past the software you now have, and will soon be phased out of new updates and options across all application types.

No support: Vista mainstream support was stopped back in 2012 but there were always avenues if you were really stuck with something. A quick Google search, an expert on call or even sympathetic support staff at Microsoft helpdesk willing to bend the rules; as of 11 April though, that all stops. The only support available will be outdated pieces you can locate with Google, solutions which may send you in circles with no resolution.

Windows Vista End-of-Life: What This Means For You

The solution is quite simple: upgrade your computers to Windows 10 well before the April 11 deadline.

Windows 10 is the latest release and will give your upgrade investment the most value over time, as well as the best security Windows users have ever seen. Vista will continue to work after April 11, but every day you use it puts your system at increasingly higher levels of risk.

Get in contact by calling us at  (416) 645-2469, (905) 667-0441 or email us to upgrade your Windows.

Should You Buy A Consumer or Business PC?

Before buying a computer for work, it’s important to consider whether your best bet is to get a consumer model or one built specifically for business use.

You’ve probably seen business computers with the same brand name that you have at home, but that’s where the similarities end. Investing in the right system now will pay off long term, saving you time, money and a whole lot of frustration. Here’s what you need to know to make the best choice for your business and budget.

Should You Buy A Consumer or Business PC?Business-class Features

When you invest in a computer, you want certain inclusions built-in and ready to go. For a business, those include features that will make your network more secure and staff more productive. For example, fingerprint readers, remote desktop software and data encryption tools. The operating system that comes pre-installed on a business-class computer will also have features the consumer options don’t, including the ability to join corporate networks. Computers designed for home use come with Windows Home or Starter editions, which may require hours of expert assistance to link into a secure business network.

Usage Requirements

Work out how often you’ll be using the computer for business. If the computer is mostly for home use and only occasionally for work, then a consumer PC with the appropriate work software and settings will be fine. On the other hand, a computer that is mostly for business use should be a business-class computer, not just for security but also build quality reasons.

Durability and Reliability

It’s probably no surprise that consumer PCs don’t have the same build quality as business ones. In fact, consumer models only have an expected lifespan of around 2 years. They just aren’t built to last. Business-class computers are built to last several years, with higher quality components and rigorous testing at every level. Most parts (if not all) are name-brand with an emphasis on reliability and long term durability.

Warranty and Service

Unfortunately, when a consumer PC fails, the burden is on the owner to send it away for repairs. The terms of the warranty will usually state that any other attempt to repair it will void the warranty. Repairs can then take weeks and often involve a frustrating process of paperwork and following up. Contrast that with what happens when a business computer needs service – the technicians will come to you and fix it on the spot, often within hours. Business users enjoy a professional experience with priority status and a dedicated support line, all designed to reduce down-time and get you operational, faster.

Talk to us today at (416) 645-2469, (905) 667-0441 or email us about choosing the right computer for your needs.

5 Ways to Love Your Laptop (and Make It Last Longer)

Laptop computers are one of the most fragile pieces of tech you’ll ever buy, but they also receive the roughest treatment. Extend your laptop’s life with these five easy tips.

Avoid sharp movements during use: While some newer laptops have an SSD drive with no moving parts, many laptops still have mechanical drives which work a bit like a record player. It has a head which is like a record player needle, and a data storage platter like a record. The head hovers just microns over the surface of the spinning disk and a knock can cause them to collide. Just like a deep scratch on a record, whatever data was on that section will be corrupted and lost. Make sure you always power down the laptop before moving it or packing it away.

5 Ways to Love Your Laptop (and Make It Last Longer)Keep it cool: Your laptop has 2 sure ways of telling you when it’s too hot – the fan and auto-shut off. Each component in your laptop is generating heat, and the harder it’s working, the more heat each creates. The fan runs to blow that heat out the vent and keep the components cool enough to continue operating. Because there’s no clear temperature indicator, your fan volume is the best guide to monitoring laptop heat. While the laptop is working hard (and getting hot), the fan will spin faster and louder. It’s not uncommon for it to sound like a hair dryer at times! Help it out by keeping your fan vent clear of books, blankets, and other blockages.

Respect the cords: Inside those robust looking power cords are a bunch of delicate wires, begging you to be gentle. You’d think they should be able to take a beating, get bent, twisted and run over with chair wheels, but unfortunately not. Keep cords clear of sharp or flat-edged items, and when wrapping for transport try to mimic how it came out of the box. Wrap the cord gently around itself or the power adapter and secure with Velcro or similar.

Carry it in padded style: Look for a bag that not only fits your laptop but also provides padding. Your system will endure countless bumps and bangs as the bag is moved around, even with careful use. Ideally your bag has bottom, side AND top padding, as well as a waterproof outer. If backpacks aren’t your style, look for padded or hard-shelled sleeves.

Back it up: Laptops give us fantastic mobility but as mentioned above they’re quite fragile. While a backup won’t make your laptop components last longer, it will make minor repairs that much easier. You’re more likely to take it in for a service if your data is accessible elsewhere, and of course, in the event of accident or theft, you’re fully prepared. Consider an off-site backup for additional protection, so no matter what happens with your laptop you still have your important files.

Call us at (416) 645-2469, (905) 667-0441 or email us to give your laptop a life-extending service.

How to Make Computer Issues A Thing of the Past

How to Make Computer Issues A Thing of the PastWe repair many computers and laptops each week, but unfortunately this is often ‘closing the barn door after the horse has bolted’. Computers have a habit of dying at the worst possible time – like when an important project is due tomorrow, or before you copy family photos to a backup. We’ve combined our repair services with preventative measures to ensure this doesn’t happen to you. Our managed IT services can remotely take care of all the computers in your business, protecting you against both threats and system failure.

Anti-virus always up-to-date: While many businesses have anti-virus software installed, they don’t often have the latest virus and threat definitions. These systems are at risk every minute they spend online, as the anti-virus simply will not pick up and stop an unknown threat.

New viruses and hacking threats arise every day, and there are entire companies dedicated to creating anti-virus updates to catch them. We can make sure your anti-virus definitions are always up-to-date, keeping your computer secure against even the newest viruses.

Software patches: Hackers like to spend their time figuring out new ways to break into computer systems. Software companies like Microsoft and Apple release regular patches to close these security holes. The patches are supposed to be applied automatically, but we often find that isn’t the case – patches didn’t download, were canceled or produced an error. Our services involve remotely checking that each patch has been applied successfully, and troubleshooting if required. As an added advantage, any time new features are packaged into an update, you’ll find them already installed for you.

Early failure detection: Some parts in your computer send out alarm bells when they’re about to die. Unfortunately, they’re not literal alarm bells (that would be too convenient), but information in the background that needs to be interpreted or manually checked. We can monitor these and advise repairs as required.

Data protection: Hard drives which store your information do eventually wear out, but they’re one of the parts that send out early failure warnings. We can monitor this and give you ample warning so that you have time to back up your important files. When it’s time, we’ll work with you to arrange drive replacement, making sure to either clone or re-install your operating system, whichever suits your needs best.

Tune-ups: Even the most cared for computer will slow down over time. Hard drives become cluttered, operating systems corrupt and ghosts of uninstalled programs still remain. We can remotely schedule and run a regular maintenance routine that will keep your system running in top condition and lightning speeds.

Our managed IT service happens entirely behind the scenes, so there is no disruption to your experience. You simply enjoy the benefits of having your own IT specialist team at one flat, low cost. You and your family continue to use your computer/s as normal, the only difference is problems are fixed BEFORE they happen and your system has the very best security against threats.

Give us a call at (416) 645-2469, (905) 667-0441 or email us and start with managed IT services today.