isp-email-email

6 Reasons to Replace Your ISP (Bell, Rogers, Cogeco) Email

isp-email-emailWhen you sign up for an internet service, the provider will hook you up with an email address, too. Your internet service provider (ISP) wants to keep you connected to them. But this convenient email address isn’t always the best long-term solution for you.

That “yourname@ispprovider.com” email address may work fine. You use it to keep in touch with your family and friends, you get bills to that address, and you’ve used it to login to your social media and online news and shopping sites.

But relying on your ISP for your email address may not be the best strategy for you. Here are some drawbacks to consider.

#1 If you rely on your @isprovider.com address, you could end up locked in with poor service or high prices. You feel stuck because you can’t take your email address with you if you want to switch providers.

#2 Internet service providers are not in the email business, whereas email providers such as Gmail and Outlook are always working to improve. Your ISP may not have updated its email offerings for a decade.

#3 Most ISPs have very limited storage space for email, which can make your service less reliable and convenient.

#4 Also, ISPs don’t make the same effort to keep your email secure and your inbox spam free. A provider more focused on email services offers more sophisticated filtering. ISP emails usually have primitive spam filtering that is easy to bypass.

#5 With an ISP email, your email is often accessible only on the provider’s mail servers, and you need to be able to access those servers to get to your emails. A cloud-based email provider lets you access your inbox via a Web browser. So, it doesn’t matter where in the world you are; you can still get access.

#6 You might be supporting a local ISP with your business. If that smaller provider goes belly up, however, your email address is gone forever, too.

Making the switch to an email provider

You may feel compelled to remain loyal to your ISP because changing your email address is a headache. Yet migrating to a Web-based email provider on your terms will help.

You’ll have a smoother transition if your ISP allows you to download your current address book.

Fortunately, once you make the switch to a Web/cloud-based email provider, you can move ISPs without it making any difference to your email communications.

You could even pay a small fee to upgrade your email with a custom domain name. Maybe you’ve always wanted to have your email come from @yourlastname.com, because it looks cool. Or, if you have a home business, you could have your email come from @yourbusiness.com. This looks more professional, and you can move the address to any provider, as the domain remains the same.

Whether you’re using an ISP or Web/cloud-based email provider, it’s also a good idea to back up your emails. By downloading and backing up your email, you gain more control and peace of mind.

We can help you find the right email provider for your needs. We’ll help you migrate your email, and we can set up a backup too. Let us help you, call us now at (416) 645-2469 or (905) 667-0441 or email us!

Want to be notified when our next blog is posted, sign up here.

What to Do about Slow Internet in the Home Office

A few months ago we thought working from home would be temporary: a couple of weeks of remote work was going to help corral this coronavirus thing, and we’d get back to usual. Now we know better, and the things we could put up with in the short term loom as bigger challenges. Poor internet connectivity is one of those.

Many home internet connections were fine before. Someone in the family could be streaming Netflix, and another person could be checking email or paying bills – no biggie. Yet the demands on the internet connection have grown exponentially. People still want to do all those things, but students are also connecting to online learning platforms. Employees are logging in to video conferences, too.

Many businesses and their employees have seen the benefits of working from home during the pandemic. However, as remote work becomes a long-term solution, people can’t continue making do with subpar internet connectivity. What can be done?

Improving Internet Connectivity

Internet connections vary widely depending on where you are. You could enjoy blazing fast internet that allows you to upload large files in minutes even while someone else blasts zombies in a multi-player video game. Yet a few streets away, a user lacks the bandwidth to participate in a conference call without connectivity issues.

Home office internet connectivity depends on several factors, one of which is your internet service provider (ISP). Some ISPs simply aren’t as good. They may be cheaper, but they could be overselling their capabilities, which results in slowdowns at night. Higher-priced ISPs are less likely to have this problem. You may gain speed by simply switching to a different provider.

The kind of network connectivity available is also a consideration. Perhaps your network provider’s signal is carried over copper wiring. If that’s the case, the internet signal degrades with distance. Those physically further away from the exchange will have slower internet than someone closer in. Unless you want to move houses, there’s not a lot you can do about this one.

Still, fiber-optic cables are increasingly available in different areas. The ISPs charge more for these connections, but reliability benefits. Fiber loses only 3% of its signal over distances greater than 100 meters, whereas copper can lose up to 94%! At the same time, fiber is more durable and lacks the conductivity issues of copper, which can be vulnerable to power lines, lightning, and signal-scrambling.

Another factor may be the plan you’re on. The ISP may have a 100+ Mbps plan, and you’re only on the 12 Mbps. That was enough before, but you may want to upgrade now that so many devices are connecting to the internet at the same time.

Find out also if your plan is subject to a data cap. Some ISPs set up a data threshold limiting the amount of data you can use in a month or at particular times of the day.

Get Expert Insight into Your Internet

You might also benefit from upgrading your home internet connections. An IT expert can come in and take a look at the hardware you’re using to get online. There could be some quick connectivity gains with an upgraded router or gateway, or moving your wireless access points.

Our IT gurus can also determine whether a Wi-Fi booster or mesh solution would help. In your area, you may have a 4G or 5G wireless option. It’s more expensive but can be another way to get the speed you need.

Point-to-point Wi-Fi might also be an option. If you’re within range of a location providing business-grade internet, it may work to set up a dish on your roof. Of course, geography matters in this case, as you need a line-of-sight connection to the signal source.

Now that work from home is stretching long term, consider how you can upgrade your internet connection at home. Support remote work, student online learning, and other ways you use your bandwidth by getting the best you can. Give us a call at (416) 645-2469 or (905) 667-0441 or email us today!

Want to be notified when our next blog is posted, sign up here.

4 Advantages of Consolidating Your Tech

Technology is the lifeblood of business today, and you likely have a lot of it. But you may have accumulated software and hardware as you grew. Now, you have a hodgepodge of technologies never designed to work together. Consolidation can help.

Large corporations can afford an in-house IT team to keep track of all the hardware and software, but small- to medium-sized businesses often need help. Managing computers and mobile devices, and telephony print and fax systems can be overwhelming. Then, there’s all the software you need to secure, not to mention setting up data recovery in case of a disaster or emergency.

Consolidating your technology offers several benefits to companies of all sizes. A managed service provider can help.

#1 Increased Efficiency

If there’s a problem with your printers, phones, or Internet connection, you call your provider. When many vendors offer each of these services, you make several calls, which means waiting on the phone with a printer tech, phone company, or internet service provider (ISP).

When you connect with customer support, they can address only issues in one area of concern. The ISP isn’t going to know anything about your phone service, and the phone company knows zilch about printers. This disjointedness can waste a lot of time.

With an MSP, you need to make one call only. The support person will know and understand your entire system. They offer input based on how different technology interacts.

#2 Cost Savings

Lacking a holistic view of your technology and its interactions, you can end up wasting money. You might invest in a new feature for voice over IP, duplicating a capability you already have online.

Consolidating your technology with a single provider can also streamline costs. The first thing an MSP will do is to map out how your technology works together. Armed with an understanding of business needs and goals, they’ll make recommendations. You may be able to cut back on services in one area with a simple upgrade in another. Perhaps you’re paying for software licenses you no longer need. Plus, the MSP identifies opportunities for cost savings gained from bundling services.

The MSP typically charges a monthly, consolidated fee. Instead of managing several bills for every technology, you pay a single, consistent fee, which also makes budgeting much easier.

#3 Business Agility

If 2020 has taught us anything, it’s that business needs to be nimble. Yet your ability to react can be slower working with many different vendors. Simplifying your processes can streamline your response times.

An MSP will take a proactive approach to overseeing your technology needs. They want you to avoid disruptions in the first place. Partner with an MSP to keep technology current, security up to date, and systems upgraded. This frees up what IT staff you have on-site to do more business- and revenue-generating work.

#4 Supportive Partner

Individual vendors focus on selling you their particular services or systems. The overall interplay of your technology isn’t their primary concern. Yet ensuring all your technology interacts effectively and efficiently is what the MSP does best.

Working with an MSP you gain a business partner that cares about your success. The MSP’s job is to determine whether:

  • your business could be performing better;
  • your team could be collaborating more;
  • your processes could be more efficient;
  • you have the right answers to cybersecurity risks and issues;
  • your business has the best technological tools to meet its needs.

An MSP offers a single point of contact. That contact will understand your entire setup and how it works together. The MSP will help you make better purchasing decisions. Plus, as a true business partner, an MSP supports your agility and success. Find out more about what we can do for you today! Call us at (416) 645-2469 or (905) 667-0441 or email us!

Want to be notified when our next blog is posted, sign up here.

Invest Now in Your Top Tech Priorities

The global economy is in a slump. But believe it or not, now could be a good time to invest in technology priorities.

You may already have streamlined processes. You had certain technology tools and systems in place to get things done. It all was working fine. Yet 2020 brought many challenges to the way business functions. The technology you relied on in the past may not be the best answer to your current business needs.

You might have been putting off cloud migration, as most work was onsite, or you resisted remote working out of concern that employee productivity would suffer. Perhaps your business didn’t want to secure a “Bring Your Own Device” workplace.

Now, you need to rethink how your employees report for work. You could be facing any of 2020’s familiar challenges such as:

  • a server that could support your teams overburdened by remote workers;
  • a reliance on email document exchange causing difficulties with version control and accountability;
  • not having enough software licenses to accommodate employees working from home;
  • employees lacking the technology to get work done offsite.

Businesses need to act now to address their new technology needs. Keep in mind that many vendors are offering discounted services, plus, you may find it easier to access business loans for tech investments.

Stepping Up Your Tech Game

Some businesses are struggling to keep their doors open. Others are waiting out the current situation to see how things shake out. Then there are those that are rolling the dice and betting on a rebound. Improving the IT environment can be a foundation for future business success.

Plans may have already been in place to invest in a systems or hardware upgrade or migrate to the cloud. Continuing the digital transformation journey, when everyone is adapting already, could make sense. Reduce negative impacts by making the change while employees are working remotely. Downtime may not be as big of a challenge.

Your business may also invest in data backups and disaster recovery solutions. Didn’t have business continuity plans in place? You’ve likely realized their importance now. These plans prepare your business for data breaches, ransomware attacks, power outages, or natural disasters. Contracting for cloud data backup pays off when you can recover quickly and cut damage done.

Starting a partnership with a managed service provider (MSP) is also helpful. An MSP gets to know your business and its systems and needs. They can help find cost savings and identify opportunities for greater efficiencies. They can also offer expert IT advice, manage and track your data backups and cybersecurity, or take on day-to-day tasks, freeing up your IT team for revenue-generating innovation.

If you’re thinking of making a tech investment, contact us today. We’re available to consult on the best solutions for your business needs.

Our experts can put your plans into practice while you focus on your business recovery. Contact us today at (416) 645-2469 or (905) 667-0441 or email us today!

Want to be notified when our next blog is posted, sign up here.

Recovery Test Your Data Backups

Most businesses are aware of the need for data backup. Without it they risk losing important files in the event of a hard drive failure or cyberattack. Yet having a backup in place isn’t enough: it’s important also to test that backup. Ensure that you are able to restore that essential data when you need it.

The many reasons to establish data backups include:

  • protecting against natural or man-made disasters (including hacker or insider attack);
  • ensuring compliance with tax, financial, and other industry standards;
  • preserving relationships with clients;
  • reducing downtime;
  • improving productivity;
  • establishing credibility with customers, investors, and employees.

We recommend backing up in three places. You might have one on a local, on-site computer. You’d also have a backup on a remote device and another in the cloud. The cloud option gives you the most flexibility. It can be accessed from anywhere, regardless of conditions in your particular environment.

Yet while many people know they need backups, too few do recovery tests. The worst time to find out there’s a problem with your backup solution is when you need it the most.

Testing Data Backups

Regular data backups can offer peace of mind, but you’ll really know you are ready to go if you regularly test your ability to recover your system from a backup.

Testing your backup lets you verify the necessary data is available for recovery. Plus, testing helps you learn how to actually implement recovery following a data loss. If a backup test fails, you can take the steps needed to ensure you don’t actually lose valuable information. Otherwise, you’re throwing money at storage space and backup services that are no help, and you’ll find out too late.

Regular monitoring helps you keep track of any software or hardware changes that may have an impact on data backups. Via testing, you might also learn some staff members are storing data somewhere that isn’t being backed up, and you can now intervene with those employees or extend your backup protocols to prevent that data getting lost.

Scheduling data backup tests can also help you to identify a misconfiguration in the backup software or ways in which you’re not adequately addressing your backup needs. For instance, you might not have set up a complete backup in the first place. This might mean you’re backing up the data but not the settings. Most backup software will send error messages if there was an issue backing up. Still, they’re easy for an overworked IT team to miss.

Actively testing backups allows the business to confirm fallback data accuracy and effectiveness. Additionally, you’ll be able to gauge:

  • how long it takes to perform the backup;
  • any issues that arise during recovery;
  • what steps need to be taken to address those problems.

All of this is something you want to consider proactively. Some people say they work best under pressure, but most of us think more clearly and perform better if not in the midst of a data catastrophe.

A managed service provider can help your business with data backup and recovery testing. Our IT experts can monitor for failures and make any changes needed to get the backup running properly again. You’ll be glad you did recovery testing in advance when things run smoother and quicker in the midst of your disaster recovery.

Give us a call at  (416) 645-2469 or (905) 667-0441 or email us to correct your backups, make sure they are working the way you want to, and set up regular backup restore tests.

Want to be notified when our next blog is posted, sign up here.

Keep Your Business Continuity Plans Current

Is there one thing we can count on now with COVID-19? The situation can change in an instant. You may have been confident in your business continuity plans in the past, but the pandemic has shaken us all up. It’s a solid reminder to review our plans to get back to business quickly and seamlessly.

A good business continuity plan ensures maintained operations before and during unexpected disruptions. Generally, decision-makers strategize in advance to ride out:

  • natural disasters
  • man-made disasters
  • national emergencies
  • utility failures
  • sabotage
  • data breaches or cybersecurity attack
  • theft

These could impact a system or network or prevent you accessing your location to get to your computers and important data.

Now, we also know that we should prepare for the effects of an international health pandemic!

Such business-centric planning considers all necessary elements of staying on track. You’ll look at physical premises and staffing, and hardware and software requirements.

Preparing for the Unexpected

A business continuity plan tries to anticipate the worst that could happen. The problem is that we can never know what the next bad thing might be.

You may not ever need to use your plan, but taking a “these things happen to other businesses” point of view could leave you in a serious lurch.

The COVID-19 crisis has also made things real for many businesses. Governments required organizations across industries, regardless of size, to migrate to remote work. Companies with business continuity plans in place responded with greater agility, whereas others were left scrambling.

Now, many countries are beginning to slowly reopen for business. Sure, there are constraints, but the idea is to get the global economy up and running. While you’re adapting, take some time to revise your business continuity plan.

It’s better to get your decision-makers around a table (or in a virtual meeting) now, while things are calmer. Most people think more clearly when not in the midst of a crisis. So, be proactive. Plan now for the worst. You can weigh up options at leisure, pursuing many different what ifs to determine the best plan of attack.

Look back at what worked and what didn’t during the COVID-19-related disruptions. This review can provide real insight into opportunities, and you’ll be even better prepared in the future.

Planning with an MSP Partner

Business continuity plans lay out how the business will move forward amidst disruption. Work with a managed services provider (MSP) to ensure your planning is comprehensive. CPI Networks can help enable remote work, set up data protection, and develop a backup setup.

Give us a call at (416) 645-2469 or (905) 667-0441 or email us today! Put a business continuity plan in place, and be more confident you’re ready for whatever happens next.

Want to be notified when our next blog is posted, sign up here. 

Pros and Cons of All-In-One Computers

Today, business is all about streamlining and finding efficiencies. And that even extends to embracing all-in-one computers. Users get a desktop computer that integrates monitor, processing, and ports in one. Still, there are pros and cons to consider.

Apple iMacs were the first all-in-one computers to gain popularity, but you can now find many different brands of all-in-one desktop. Promising all the computing power you need built into the monitor, these are easy to set up and get running. Their sleek design can also include webcams and speakers as part of the desktop. The user needs only to add a mouse and keyboard.

Furthermore, buying a computer with all its components included can be more cost effective, whereas buying each part separately adds up.

The all-in-one computer is great for an office environment that is low on space. These compact computers with fewer wires and less stuff to connect can look great in open-plan offices. All-in-one computers are also easier to move around flexible, collaborative work areas.

Upgrading all-in-one computers

There are some challenges with all-in-one computers, however. For instance, upgrading may be more difficult. You may be able to upgrade the random access memory (RAM), and replace and repair hard disk drives (HDDs), but otherwise, when you outgrow the computer, you’ll need to replace the entire machine.

You also get what you pay for with an all-in-one computer. If you go with a low- to mid-priced device, you basically get a laptop on a stick. The components used to build that desktop are often the same as you would find in a laptop. So, depending on what your computer needs are, you may want to invest in a higher-priced all-in-one or consider the component parts alternative.

Still, all-in-one computers are a good option for offices that want more flexibility. Of course, laptops are best when you want to be able to move easily between locations, but for agility within the office environment, an all-in-one is a convenient choice.

Buying all-in-one computers also allows users to enjoy business-wide consistency. Users keep traditional functionality but in a neat machine that makes a smaller footprint in their workspaces.

Considering your options for business computers? A managed service provider can help you select the best solution. Our experts learn your needs and recommend a fit for your business budget and processes.

We can also set up the new computers and ensure your system network is secure. Let us focus on IT while you focus on growing your business. Call us today at (416) 645-2469 or (905) 667-0441 or email us today!

Want to be notified when our next blog is posted, sign up here.

Backup Your Apple Computer

There are many moments in life when we would like to travel through time. One common instance is when an important document disappears from our computer screen. Making things worse, we forgot to save it! That’s hours of work lost. Fortunately, Apple users have Time Machine’s built-in backup feature for added protection.

This software automatically backs up apps, music, photos, email, documents, and system files. You can backup to:

  • external storage devices;
  • another Mac set up as a backup destination;
  • network-attached storage (NAS).

It’s simple. Connect your Mac to an external drive, then Open Time Machine to select your backup destination. You can select when backups happen and what gets backed up, and you’ll also have the option of encrypting your backup, which is a good idea.

Time Machine keeps hourly backups for 24 hours, daily backups for a month, and weekly backups for previous months until full. The oldest backups get deleted when space is needed.

All you need to do to restore your original files is turn on and connect the Time Machine backup disk. Then, you can use the timeline on the Time Machine screen to find the items to restore.

We recommend all Mac users set up Time Machine to backup to at least an external drive, and Apple makes it easy to setup this minimum level of backup. With the local device, you’ll have a first line of defense close at hand if you need to recover or restore your computer.

However, this basic backup does limit your options. To amplify your protection, consider these alternatives.

Gaining More Control of Your Backup

Third-party software offers additional layers of protection. You gain detailed control of what is backed up and when, and what happens afterwards (perhaps you’ll want the software to eject the external device or shut down). You can also find software that backups operating systems and settings too. This could prove useful if your Mac gets stolen or damaged. You’ll be able to move to another device and quickly get all your data and applications configured as they were.

Another alternative for enhanced backup is the cloud. Time Machine and third-party software solutions require a local device to hold the backup. But if your computer is stolen, the thief is likely to have taken your backup too. Or, if your laptop is damaged in a flood or fire, the backup is probably also destroyed.

You’re also at risk of ransomware with Time Machine and third-party software. If malicious software compromises a device (yes, Macs are vulnerable too), it’s going to spread to connected or networked devices. So, the USB backup drive or NAS is as susceptible to encryption as the main Mac device.

Cloud backup provides a solution that helps avoid all these issues. Your backup data is stored in a datacenter that the thief, fire, flood, or ransomware can’t touch. Most cloud backup providers boast rigorous security protocols.

Eventually, all hard drives will fail. Backing up important data to one device leaves you at risk of a single point of failure. Cloud backup removes the fear that the one backup drive isn’t going to be working when you need it.

Need help setting up Time Machine, a third-party backup, or configuring your cloud backup? Let our computer experts help! We don’t want anyone to go without the safety and security of a reliable backup.

Contact us at (416) 645-2469 or (905) 667-0441 or email us today!

Want to be notified when our next blog is posted, sign up here.

3 Cyberattackers Putting Business at Risk

Cyberattacks and data breaches happen worldwide, and no one is immune. Your business needs to protect its networks and systems, and secure sensitive data. But how much do you know about the types of cybercriminal out there. This roundup discusses the biggest threats and what they’re after.

Cybercrime Gangs

Online crime is a lucrative industry. Cybergangs go online to offer “crime as a service.” Their targets vary and can be spread out globally. In 2019, one international crime gang stole $100 million from more than 40,000 victims. Culprits were found in the US, Bulgaria, Germany, Georgia, Moldova, and Ukraine. Victims included small businesses, law firms, international corporations, and nonprofits.

Many of these bad guys may have started out in the digital environment, but well-established street gangs are turning their attention to cybercrime too.

Typically well-funded and organized, cybergangs work long-term to mount large-scale attacks. They target banks, law firms, healthcare networks, and other big businesses.

Still, small businesses can be targeted by cybercrime gangs. You could be the first domino to compromise a larger, more lucrative target in your supply chain.

State-based Actors

One nation pays an individual or group to target another country. On the digital battlefield this could mean:

  • tampering with an election;
  • infiltrating another country’s banking system;
  • compromising critical infrastructure;
  • accessing intelligence;
  • creating incidents of international significance;
  • engaging in propaganda, disinformation campaigns;

Australia recently announced a “sophisticated state-based cyberattack” on political and private-sector organizations.

State actors also used cyber techniques to damage Iran’s nuclear program. They left an infected thumb drive in the parking lot. A well-meaning staffer found the USB and plugged it into the facility computers. The virus caused Iran’s fast-spinning centrifuges to go into overdrive.

These attackers are often motivated by nationalism, but this doesn’t mean businesses are safe. A politically motivated cyber actor might target a hotel hosting an international convention or gain access to a government vendor to send false communications.

Lone Wolf

Also known as disorganized crime, this is the online equivalent of a petty thief. Many make their income stealing money from low-hanging targets.

Some Lone Wolves are only interested in proof-of-concept: hacking into businesses and governments to see if it’s possible, without doing any damage once they are inside.

Now that you better understand why your business might be targeted, it’s time to take the necessary steps. We can help solidify your cybersecurity stance. Partner with a managed service provider. Our experts can set up email security, remote access management, anti-malware scanning, and more. Contact us today at (416) 645-2469 or (905) 667-0441 or email us today!

Want to be notified when our next blog is posted, sign up here.

Your Webcam Could Be Spying On You

In the midst of a global lockdown, many of us have been relying on webcams to stay connected. These cameras let us join virtual meetings for work and online hangouts with friends. But bad actors can also use a webcam to spy.

Someone watching through a small laptop or personal computer camera may sound farfetched. And if you don’t make a hat out of tinfoil, aliens will take over your brain, right?

Except, it is true that webcams can be used for spying.

Seeing someone with a piece of tape over their webcam isn’t that unusual. Even Facebook’s founder does it. At conferences now, you might even receive a branded sliding webcam cover as swag.

How Webcam Spying Works

How can someone access your webcam in the first place? Typically, they’ve installed malware. The malicious software allows them to remotely control your computer and view its webcam.

A cybercriminal might access your webcam using spy software, a remote access trojan (RAT). The software spreads through freeware, spam emails, infected attachments, or fake website links.

The software allows the remote user to take control of your computer. They could view your online activity, read messages, or capture screens and keystrokes, and they’ll be able to turn your webcam on to spy on you – without you knowing it.

The webcam light located near the lens will indicate whether camera is currently recording. However, it’s easy to miss and many people don’t understand what the light means.

What to Do About Webcam Spying

Well, there’s that piece of tape, or you might use a Post-It note to cover the camera, but that doesn’t address the bigger issue. Since we’re talking about malware here, the usual rules apply.

  • Don’t trust attachments, even from people you know.
  • Hover over external links to see where they will take you before clicking.
  • Question the credibility of any freeware you might download onto your computer.
  • Install a good antivirus system, especially one that checks emails.
  • Put a good firewall in place to prevent attackers from accessing your computer.
  • Install patches for your operating system, browser, and software to keep security current.

While we’re talking about webcams, keep in mind your smartphone camera and any surveillance cameras need protection too. On your phone, keep your passcode private and make sure antivirus and security patching is up to date. With a surveillance system, always change the default password – you’d be amazed how many people don’t bother to do so – as that’s just making the hackers job easy for them!

Want to be sure you’re not being spied on? Our IT experts can make sure you have a strong firewall in place to monitor network traffic and block suspicious activity. We can also ensure your antivirus and malware security is top-notch.

Don’t find yourself on camera when you’re not ready for your closeup! Give us a call at (416) 645-2469 or (905) 667-0441 or email us today!

Want to be notified when our next blog is posted, sign up here.