Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.

Logo

Blog banner image

Info Advantage Blog

Info Advantage has been serving the Upstate New York area since 1993 , providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses.

Printer Costs Rising? Try These 4 Tips

Printer Costs Rising? Try These 4 Tips

Outdated printers, the lack of a printing workflow, and an over-reliance on hard copies may be contributing to your rising printing expenditures. With some creative problem-solving and fresh ideas, you could drastically reduce your printing budget. Start by following these four tips.

Replace outdated printers

Depreciated or cheap printers may be still be functional, but they are most likely also taking a huge chunk of your budget than you may realize. Any piece of equipment that is seven years or older will require frequent repairs, and often causes more trouble than it’s worth. Because old printers are most often not under warranty, fixing them is more costly and challenging. It’s also difficult to replace parts for old printers, since manufacturers have likely stopped making them for older models that have been phased out. When you replace outdated equipment with newer, multi-functional printers, you’re investing in hardware that will pay for itself with increases in productivity and efficiency.

Don’t Buy Unnecessary Supplies

A poorly managed printer environment could result in a stockpile of cartridges, toners, and reams of paper. This happens when, for example, an employee uses a printer that’s about to run out of ink and makes an unnecessary request for a new ink or toner. This is more common than you may think, and can definitely take a big chunk out of your budget. By assigning a dedicated printer manager, you can avoid this situation by automating supply replacement. Choose a specific employee to proactively place orders when supplies are about to run out.

Be Strict with Process Workflows

Submitting expense reports, filing reimbursement forms, and other administrative tasks require a proper document workflow to be successful. Without a strict guideline, employees and administrative staff can end up printing unnecessary documents trying to follow their workflow. Automate your company’s document-driven processes to reduce or prevent redundant print jobs that result in stacks of abandoned documents. Not only is it a waste of money and resources, it can also be a security and privacy concern.

Go Green

The best way to save money wasted on printing is to eliminate the use of paper as much as possible. By designing a document management solution, you can reduce paper consumption drastically, which will end up saving you money. It may not be possible to do away with document printing in every department, but those who can do their jobs without printing should be encouraged to do so. Printing lengthy email chains that can be discussed in a meeting is just one example of a wasteful practice that should be avoided.

If you are looking for more ways to save on your printing costs, contact Info Advantage today at (585)254-8710 to talk about how we can save money on your IT budget.

2 Comments
Continue reading

Tricky Touchpad? Try These Tricks!

Tricky Touchpad? Try These Tricks!

Laptop touchpads can be difficult to work with. If you’ve ever been stuck in a frustrating situation where your touchpad isn’t working properly, you know what this feels like. In a worst-case scenario, touchpad problems can cause data loss and a loss of productivity, leading to downtime that directly affects your ability to work properly. If you’re having touchpad problems, try these five troubleshooting tips.

Keep in mind that some touchpads are more prone to difficulties than others. Some devices will have better quality or more calibrated touchpads, and if your device has been bothering you and preventing you from getting work done, reach out to us. We might be able to offer you our assistance.

What’s Your Hand Placement Like?
If you’re having problems with your touchpad, perhaps the way you use it might be an issue. If you’re not careful, it’s easy for your hand to brush against it as you type, which might make the cursor jump around and mess up your document. If you have large hands, you probably know all too well about this problem. If you’re sitting in a strange position, like on a hammock or a couch, you might also experience a similar effect. You can usually fix this problem just by changing your hand placement, but if the problem continues, you might need the attention of a professional.

Can You Remember the Last Time You Cleaned Your Touchpad?
It’s natural for your hands to accumulate particulates that will undoubtedly find their way onto your touchpad. Skin, oil, dirt, and other particles collect on your touchpad, making it difficult to use. Plus, if you consider the fact that keyboards are less sanitary than toilet seats, you really do have a reason to clean it once in a while to ensure proper hygiene and functionality. Wiping your touchpad down can help the touchpad read your finger strokes, and may resolve problems with how it works.

Are You Using Other External Input Devices?
If you’re using an external input device like a wireless mouse, graphics tablet, or a keyboard, you might be experiencing problems with your touchpad. Sometimes, depending on the device, even having a laptop plugged into an electric outlet or a docking station can cause complications with your laptop’s touchpad. Before assuming the worst, try unplugging your external hardware and see if your touchpad returns to normal.

Have You Updated Your Drivers?
If you’re using an older laptop, you might need to update the driver that controls the touchpad interface. Check with your laptop’s manufacturer to see if you’re using the latest drivers. You can do so by visiting the manufacturer’s website, calling their support hotline, or giving Info Advantage a call at (585) 254-8710.

Replace the Touchpad
If these troubleshooting tips don’t help your touchpad return to normal, you may need to replace your touchpad. However, this process shouldn’t be attempted by just anyone. Info Advantage’s professional technicians can handle this job for you, as well as troubleshoot other computer-related issues and annoyances that might be complicating your user experience.

If All Else Fails, Use a Wireless Mouse
If you don’t like your clumsy touchpad, you can avoid using it all together by switching to a wireless mouse. If your laptop supports Bluetooth, there are plenty of options available for your wireless mouse. Even if it doesn’t support Bluetooth, you can just use one that connects via wireless USB, or get a USB Bluetooth adapter.

Are you experiencing annoying touchpad issues? Simply try these troubleshooting tips and see how you fare. For more great tips, be sure to subscribe to Info Advantage’s blog.

 

Tags:
0 Comments
Continue reading

Are All Hackers Bad Guys? A Guide to Different Types of Hackers

Are All Hackers Bad Guys? A Guide to Different Types of Hackers

 

Since the 1950s, the term 'hacker' has been vaguely defined as someone who explores the limits of technology by testing them in as many different ways they can. But by the 1980s, the term ‘hacker’ became associated with users who were caught breaking into government and other private computer systems, leaving the word with a negative reputation. Today, several pioneering ‘hackers’ run multimillion-dollar cyber security consulting businesses aimed to help protect the average technology user from attacks. So what should you call someone who uses their knowledge for good?

“White hat” hackers

Also known as ‘ethical hackers’, or ‘network security specialists’, these hackers are the heroes of the hacker name. Whether it’s selling what they find to hardware and software vendors in “bug bounty” programs, or working as full-time technicians, white hat hackers are just interested in testing technology and protecting users. Linus Torvalds is a great example of a white hat hacker. After years of experimenting with the operating system on his computer, he finally released Linux, a secure open-source operating system.

“Black hat” hackers

Closer to the definition that most people outside the IT world know, black hat hackers aim to create software and other technology campaigns with the purpose of causing damage. These attacks have a variety of different goals; such as financial harm in the form of ransomware to digital vandalism. Albert Gonzalez is one of the most infamous black hat hackers. In 2005, he organized a group of individuals to compromise poorly secured wireless networks and steal information. He is most known for stealing over 90 million credit and debit card numbers from TJ Maxx over the course of two years.

“Gray hat” hackers

A sort of ‘in-between’ of the other categories, a ‘gray hat’ hacker does the majority of their work on the internet. This anonymity affords them opportunities to try their hand at both white hat and black hat hacking. Today, there are quite a few headlines making the rounds describing Marcus Hutchins as a gray hat hacker. Hutchins became an overnight superstar earlier this year when he poked and prodded the WannaCry ransomware until he found a way to stop it. During the day, Hutchins works for the Kryptos Logic cybersecurity firm, but the US government believes he spent his free time creating the Kronos banking malware. He has recently been arrested and was branded as a ‘gray hat’ hacker.

The world of cyber security is far more complicated than the stylized hacking often seen in Hollywood movies. Internet-based warfare is not as simple as good guys vs. bad guys, and it certainly doesn’t only aim for big money targets. If you need a team of experienced professionals to help you tackle the complexities of modern cyber security, call Info Advantage today at (585) 254 – 8710.

 

0 Comments
Continue reading

Three Reasons to Switch to Virtual Servers on Your Next Refresh

Three Reasons to Switch to Virtual Servers on Your Next Refresh

Hardware refreshes are often a time of great turmoil for businesses, particularly because of the cost of new servers and the time it takes to migrate data from one location to another. Thankfully, with the advent of virtualized servers, businesses have a viable alternative to the outright purchase of expensive, new hardware solutions. Instead, a virtual server that’s hosted in the cloud offers not only a more immediate reprieve, but can also significantly reduce costs for your organization in the long run.

Server virtualization is the act of separating the computing resources of the server itself and allocating them within a cloud-like infrastructure, where they can be delegated and managed according to the specific needs of your business. Server virtualization is particularly helpful for organizations that have a limited budget and don’t have the time or resources to manage multiple hardware solutions, as it’s simple to outsource the care of a virtualized server environment to a third party.

Here are three major reasons why virtual servers are your next go-to IT refresh.

Virtual Environments
One of the major boons of using a virtual server is the ability to create multiple computing instances on the same virtual machine. For example, if you have a mission-critical application that only works on a specific operating system, your organization can have a virtual machine dedicated to running it. This prevents the need to purchase an entirely separate server unit just to run one application, and the cost of operation and maintenance along with it.

Save on Operating Costs
Another key benefit of virtualizing your servers in a cloud environment is that you’ll be hosting less hardware on your infrastructure. Servers eat up a ton of electricity, and you need to keep them cool with air conditioning in order to guarantee longevity. This in turn creates higher energy costs that can put unnecessary strain on your budget. With server virtualization, you can consolidate your infrastructure onto one device, rather than spread across multiple servers and network components, significantly cutting down on operational expenses.

Effectively Manage Resources
The convenient part of virtual machines is that you can manage their workloads through a cloud-based dashboard to optimize efficiency. You’ll be able to monitor workloads and adjust them in real time, so as to keep operations moving forward in the best way possible. You can do this remotely, or have a third-party provider do it for you, which is entirely dependant on whether or not you have the IT staff on-hand to handle it.

If you’re considering a hardware refresh for your server infrastructure, be sure to consider virtualization, you might be surprised by how much money and time you can save. To learn more, reach out to Info Advantage at (585) 254-8710.

0 Comments
Continue reading

Think Twice Before Connecting to Public Wi-Fi

Think Twice Before Connecting to Public Wi-Fi

Wireless Internet signals, referred to most commonly as Wi-Fi, are commonplace in every office. Even organizations that don’t often need access to the Internet, like restaurants and coffee shops, have wireless connections available for customers to use. However, just because you can connect to free Wi-Fi, doesn’t necessarily mean that you should.

One of the big problems with free Wi-Fi is that people who use public connections are fully aware of just how dangerous it is; yet, they still want to use it. The Identity Theft Resource Center claims that 78.5 percent of users who connect to free Wi-Fi understand that there are major risks involved, and yet only 26.7 percent use a VPN to keep themselves safe. Thus, free Wi-Fi should be approached with caution. Here are just a few reasons why you need to be careful when accessing public Wi-Fi.

Anyone Can Access It
If the Wi-Fi isn’t protected by a passcode, the network is vulnerable to hacking attacks and other threats. Plus, if the router isn’t configured properly, the passcode doesn’t offer much help. The fact that anyone can access it at their leisure means that there’s virtually nothing stopping hackers from connecting to the router and spying on other users.

It’s worth mentioning that, although we use the term ‘hacker,’ even a mischievous child with a bit of curiosity and the proper know-how could access your files via public Wi-Fi if the connection isn’t secure.

Free Wi-Fi is Highly Used
It’s natural that a free Internet connection will attract attention from people. That said, the more people who connect to a Wi-Fi network, the slower the connection, and the more likely it is to house a hacker. Hackers understand that free Wi-Fi draws plenty of victims, so they’ll use the convenience to find new targets.

Data Isn’t Encrypted
Encryption adds an extra layer of protection to any data that’s sent to and received across an Internet connection. When routers have encryption, hackers have a more difficult time stealing data. Therefore, you should only connect to routers that have encryption, and it’s unlikely that your run-of-the-mill router at your local restaurant has it.

What You Can Do
You may not be able to control who secures their public Wi-Fi routers, but you can take steps to protect yourself if you’re ever in the position where you feel you must use it. Here are three best practices for keeping your devices safe while using a public Wi-Fi network:

  • Only connect to networks that require security codes.
  • Set your phones and devices so that they don’t automatically connect to any new Wi-Fi network.
  • Use a Virtual Private Network (VPN).

To learn more about how you can keep your data safe from prying eyes, reach out to Info Advantage at (585) 254-8710.

0 Comments
Continue reading

3 Major Pain Telecom Pain Points Alleviated by a VoIP System

3 Major Pain Telecom Pain Points Alleviated by a VoIP System

Software-based phone systems are an increasingly popular trend in the workplace. Businesses have found that traditional phone systems, while helpful under certain situations, are somewhat antiquated compared to Voice over Internet Protocol, or VoIP. A VoIP is a great way to save money by eliminating unnecessary costs and improving overall efficiency. So now you may be wondering: is VoIP right for your company?

VoIP uses your organization’s Internet connection to transfer the call from your phone to the call recipient. Typically, VoIP systems use a software client that’s installed on the user’s workstation, laptop, or smartphone, and will works anywhere as long as you have an Internet connection. Many organizations are finding VoIP to be an alternative to the traditional land-locked phone systems issued by telecommunication providers. Here are some of the major benefits of using software-based VoIP phone systems.

Tradition Phones Have No Mobility
One of the major problems with traditional office telephone is that office workers can’t (easily) take their office phone numbers with them when they leave the office. With VoIP, users can install the softphone application on any applicable device, be it a smartphone or a laptop. This makes it easier to stay in touch while on business trips or working remotely. All the user needs is a headset or a microphone.

Traditional Phones Are Complicated
One of the biggest pain points with telecom systems is the struggle that comes from onboarding new employees. When you acquire a larger workforce, you need to add telephones to your communications infrastructure, which can include anything from running new wires around your office, to completely remodeling to accommodate for more space. With VoIP, it’s as simple as adding new users, numbers, and extensions to your software-based phone system. You still have to watch out for bandwidth restrictions, however, due to the fact that your phone system is using your Internet connection.

Traditional Phones Are Costly
Providers tend to bundle together services that your business may not necessarily want or need, which winds up costing your organization more money in the long run. Instead of bundling together undesired services, you can build out a VoIP service that’s specifically designed for your business. VoIP systems can offer great features such as screen sharing, instant messaging, and conference calling. Customers only have to pay for what they want. Regardless, VoIP uses a service which you already pay for--your Internet connection--so that you don’t have to worry about another big expense in your budget.

If your business is rethinking its communications strategy, a VoIP solution from Info Advantage can be just what you need. Every business is different, though, and you need a VoIP solution that’s designed specifically with your organization’s needs in mind. To learn more, reach out to us at (585) 254-8710.

0 Comments
Continue reading

Slow Computer? Upgrade Your RAM

Slow Computer? Upgrade Your RAM

Sometimes when your workstation feels bogged down, a relatively cheap and simple hardware update can make all the difference in performance. Adding more memory can be a game changer for your computer.

There are several factors that contribute to the speed of a PC:

CPU/Processor

The CPU handles all of calculations a computer performs. These days, consumer-class CPUs handle billions and even trillions of instructions per second. Dated processors can greatly influence the actual speed of a computer, but if your PC is fairly new (as in 1 or 2 years old, and possibly older for higher end builds) it's likely not bottlenecking your performance. Today, CPUs are equipped with two, four, or even more cores, which means the CPU can handle more calculations exponentially and consume less electricity.

RAM/Memory

Random Access Memory (RAM) is basically the short-term memory of your computer. When your computer is loading and running applications, they get stored in the RAM. The RAM is much faster than the hard drive, so your computer doesn't need to spin it's wheels looking for specific files and parts of applications. The more RAM you have, the more "stuff" that can be stored in it. The faster your RAM, the faster your computer can sift through the data that gets temporarily pushed into it. Once your RAM is full, your computer will depend on the hard drive to retrieve information, and that's where things get sluggish. Once you stop running a program, it will remove itself from the RAM to free up some space for everything else running.

Hard Drive

The hard drive is the storage device of a computer. For extremely high-end PCs, the hard drive is often the bottleneck. Hard drives, when compared to RAM, are very slow to access and write information. Once your computer needs to rely on your hard drive heavily for RAM, things are going to start getting slowed down. While it's great that your PC can rely on your hard drive in this way for those times it needs some extra memory, it is likely this is the cause of the slowdown. Unfortunately, because hard drives are mechanical and have moving parts, there's limitations to how fast science can make them perform. There are costly solid-state drives, but as a performance-improving factor on a standard workstation, typically solid state drives aren't the cost-effective answer.

There are software factors as well that can affect your PC speed. Malware and Spyware can bog down your system, and after a lot of use, temporary files can bog things down. Before upgrading hardware, you'll want to have a technician run a quick evaluation on your PC - it's possible a little cleanup can make all the difference in the world.

Otherwise, the next step is upgrading the RAM. RAM is usually relatively cheap, even to double or triple your existing RAM with faster, higher performance memory. Often the cost of the new RAM itself will be between $50 and $100, and more than likely less than that, and that's for a substantial increase, but it depends on your PC.

Is your computer running slow? Does it get bogged down by the time you have all of your day-to-day applications open? Contact us at (585) 254-8710 for a quick evaluation to see if a simple, cost-effective upgrade will help you perform your job more effectively.

0 Comments
Continue reading

Facebook Tools Every Business Should Take Advantage Of

Facebook Tools Every Business Should Take Advantage Of

 Since the rise of social media, businesses all around the world are taking to online marketing in order to keep up with competition. As social media progresses, more and more sites are offering new and innovative platforms designed for businesses to increase sales and brand recognition. Here are a few tools that Facebook has created to help business owners get their brand out to their target audience.

Facebook Product Shop

The Facebook Product Shop allows businesses to sell products and services directly from their Facebook page. All it takes is a few clicks, and you can have your business up and running. Facebook allows business owners to choose whether they want to let customers buy directly from Facebook, or if they want customers to be directed to their website in order to check out.

Facebook Ads

Facebook has one of the most innovative and easily customizable advertisement platform set up for business owners who want to get their brands in front of their target audience. Along with their traditional advertisements, which show on their target audiences News Feeds, Facebook has recently added video advertisements that play when potential customers play videos. Facebook has also set up Messenger for business pages, which allows businesses to chat with their target audience, answer questions, or even set up appointments.

Business Audience Insights

Facebook’s Audience Insight is a free tool available to all business pages that will help them understand their audience. The Insights tools include information on a business’s target audience, including geography, purchasing patterns, and other pages that your audience has liked. This gives business owners a better idea of who their target audience is and what they want to see in a product or service.

In order to surpass your competitors, businesses need to not only establish a strong online presence, but also know how to use social media forums such as Facebook to their advantage. If you’re interested in learning more about social media marketing strategy, feel free to contact Info Advantage at (585) 254-8710.

 

Designed by Freepik

0 Comments
Continue reading

How to Find & Track Your Net Worth

How to Find & Track Your Net Worth

When money is tight and you start feeling down about your financial situation, it’s important to keep the big picture in mind. This can be done by reviewing your net worth. Plus, if you go so far as to track your net worth, then you’ll constantly have this big picture before you. This will help you to worry less and allow you to better focus on your goals.

How to Find Out Your Net Worth
Thankfully, your net worth takes more into consideration than just your paycheck. A good definition of net worth is the value of all assets, minus the total of all liabilities. Put another way, net worth is what you own minus what you owe. Generally speaking, this is why your net worth increases over time, due to the fact that you’ll owe less and less on the debts you pay.

When determining your net worth, start by making a thorough list of what you own and what you owe.

What You Own

  • Home (its current value)
  • Other real estate
  • Automobiles and other vehicles like RVs and ATVs (leased vehicles don’t count)
  • Jewelry and collectibles
  • Household items, like furniture, appliances, etc.
  • Retirement accounts, bonds, stocks, mutual funds
  • Cash value of life insurance
  • The balance of checking and savings accounts
  • Cash

What You Owe

  • Home mortgage principal
  • Other mortgage principal
  • Auto loans
  • Student loans
  • Credit card debt
  • Other loans

Once you have all of these items in order, you’ll next plug this information into an online net worth calculator.

How to Track Your Net Worth
Now that you know your net worth, you can use a spreadsheet tool to keep track of its growth--in a similar way to how you keep track of your monthly budget. Here are four ways that tracking your net worth can benefit your financial situation.

  • Financial Progress: We all want to evolve and progress in anything in life, it’s human nature. It's even better when you grow your money and can look back to the month or year previous and see how far you've come.
  • Confidence Builder: For example, if you saved an extra $1,000 in your emergency fund or watch your 401K increase due to a bigger contribution, it will make you feel proud of what you’ve been able to accomplish.
  • Avoid focusing on just assets: If you have 200K in assets but 100K in debt, you’re just lying to yourself. It's important to factor both into the calculation.
  • Loans: Your net worth can be a factor if you plan on applying for a loan in the near future.

In the same way that it’s beneficial to keep track of your personal net worth, there are benefits to keeping track of your company’s assets. The average SMB likely needs more than a calculator and a spreadsheet to do this, which is why there are so many enterprise-level accounting solutions on the market. To learn more about what’s available for your accounting department and how technology can further your company’s goals, give us a call at (585) 254-8710.

P.S. Some businesses struggle to reliably budget out their IT, especially with surprise bills when technology goes down and unexpected updates need to take place. If you are frustrated with the unforeseen nature of your current IT, reach out to Info Advantage to discuss a managed, proactive approach.

0 Comments
Continue reading

Has Your Business Gone Mobile? Be Sure to Account for These 4 Trends

Has Your Business Gone Mobile? Be Sure to Account for These 4 Trends

Mobility is proving to be a major pain point for businesses, especially when it comes to implementing new technology solutions. It’s become crucial to consider how mobility can influence the growth of your business and improve operations, particularly with the cloud gaining ground and mobile devices becoming omnipresent in the workplace. How will your business learn from this influx of mobility?

Here are four ways that mobility trends have infiltrated the enterprise environment, and why your business can (and should) apply them to its own technology strategy. Doing so keeps you one step ahead of the curb on this important industry topic:

  • Security is important: Regardless of what types of devices your business uses, it’s primarily how they access data that you need to be concerned with. Data security is crucial, especially for mobile devices that may be connecting to unsecured Wi-Fi hotspots while out of the office. A virtual private network, or VPN, is a valid choice to mitigate the risk associated with potentially dangerous connections, while a mobile device management solution can allow you to restrict access to sensitive corporate information on a per-user and per-application basis.
  • Increased focus on the cloud: The cloud lets your business store data and applications in an online environment, where they can be accessed from any location with an Internet connection. This makes collaboration and communication much easier, as no matter where your employees are, they can connect to your base of operations and access the resources they need to do their jobs.
  • The convergence of desktop and mobile: Windows 10, Microsoft’s latest operating system, was an attempt by the software giant to create an OS and applications that work on a myriad of different devices, be it a desktop workstation, or a smartphone. This suggests that solutions that work on a universal level can improve the productivity and flexibility of a workplace. After all, you can get more done with a full version of an app built for a smartphone than you would with a watered-down version.
  • Regulation and oversight are critical: Your business needs control of its data if you want to thrive. Mobile devices might have the benefit of flexibility, but you need to ensure that users can be held accountable for their actions - including how and why they use sensitive corporate data. In most cases, it’s important to restrict access to data in order to protect it from those who have no business viewing it.

There’s certainly a lot to consider when implementing mobile technology solutions, but you don’t have to do it alone. Info Advantage can help your team make an educated decision about how to use mobile devices like smartphones, tablets, and laptops, to their advantage. To learn more, reach out to us at (585) 254-8710.

0 Comments
Continue reading

Migrating to the Cloud: 3 Things You'll Want to Consider

Migrating to the Cloud: 3 Things You'll Want to Consider

 The first thing you’ll need to understand about migrating to the cloud is that it’s a much more involved process than simply performing a single software upgrade. Truth be told, properly migrating your data to the cloud involves a lot of prep work, and, as is the case with other kinds of moves like packing up your personal belongings to settle into a new house, the better prepared you are for the move, the smoother the transition will go and the less of a chance that you’ll lose something of value.

ITProPortal provides some insight into what migrating to the cloud properly takes: “It involves a complex infrastructure migration process. Good preparation is the key to success. Those organizing the migration process should ensure that all data is ready for the move and that the company network has the necessary capabilities to interact with the cloud.” This is a major reason why you’ll want a professional assessment of your IT infrastructure before deciding to move to the cloud.

Preparing your network for a move to the cloud involves a few considerations:

Sorting and Labeling Your Files
It’s important to take the time to determine what files are worth saving and moving, and what files aren’t so you’re not wasting time and resources moving and storing old files that your company no longer needs. This can be a time-consuming process, but the work will be worth it in the long run.

Preparing Your Network Infrastructure
Migrating to the cloud comes with demands on a network that may require major adjustments to be made to your IT infrastructure. When migrating to the cloud, there are two major additions to your network you’ll want to consider; setting up a direct Internet breakout in order to distribute traffic across external networks, and multiple firewall instances in order to secure the various Internet connections.

Have a Migration Timetable
Even the best planned move to the cloud can take weeks or even months to complete. Therefore, you’re going to want to present your staff with an accurate timetable so the transition won’t interrupt workflow. One particular thing to plan for is how user settings will be migrated, like profiles, address books, calendars, etc. To help with this, ITProPortal advises: “Instead of moving all their data to the cloud, more and more companies are opting for a hybrid solution. This means that some users and storage locations stay with Exchange on-premises, while the rest move to the cloud.”

With all of your data successfully migrated, you will next want to consider strengthening security, archiving, and data backup in order to fully prepare your organization for the unique challenges of cloud computing. Rest assured, Info Advantage is here to assist you with any challenges your organization faces as you operate within your new cloud environment, as well as to help you through every step of your cloud migration process. Reach out to us at (585) 254-8710 for any IT assistance that you require.

 

0 Comments
Continue reading

Info Advantage is Hiring!

Interesting in joining the Info Advantage team? We currently have a few openings for full-time, salaried IT Technical Consultant and Helpdesk Technition positions available! 

DESCRIPTION 
Info Advantage, a local solutions provider and consulting firm, is seeking to augment our technical team by adding a qualified helpdesk technician to support our expanding client base in a variety of computer networking environments. Valid drivers license and reliable vehicle required. 

Candidate must possess technical skills within the Microsoft networking environment.

Certifications a plus Microsoft(MCSE)/Cisco, VMWare and Citrix. 

OBJECTIVES 
- Self-motivated and well-focused individual with a user-friendly personality. 
- Excellent organizational skills and attention to detail essential. 
- Strong verbal and written communication skills required. 
- Must be able to adapt to use of different computer based systems and software. 
- Education and training that provides the level of knowledge, skill and expertise required. 
- Project management skills a plus. 
- Be a contributing member of the Info Advantage Team 

REQUIREMENTS  
- 2+ Years of Experience or qualified schooling 
- MS Office Suite 
- Troubleshooting hardware/software 
- Windows Administration 
- Understanding of LAN/WAN architecture 
- TCP/IP principles. 
- Firewall/VPN/Internet Appliances 
- Backup & Disaster Recovery 
- Internet and network security 
- Virtualization Solutions 
- Ideal Candidate 

BENEFITS 
Info Advantage is an energetic, young-minded, team oriented technology firm. We live and breathe this stuff and we love working with our clients. We seek the same in all of our employees and offer them the following benefits:

- Fun work environment 
- 401k 
- Paid vacation 
- Sick & Personal Time 
- Vacation Time 
- Paid medical for individual 
- Family medical and dental available 
- Certification tracks and training materials 

Click Here to Apply

Info Advantage Inc is an equal opportunity employer. Please, no third party recruiters or H1-B Visa candidates. No direct calls, we will respond to your resume once submitted. 

We are a small, fun, young-minded company that is customer focused and growth oriented. Come join our team!

0 Comments
Continue reading

Top Four IT Issues Every Business Should Be Aware Of

Regardless of how your business’s administration is set up, you should be aware that anyone in a position of authority must have a basic understanding of how IT, and its related responsibilities, functions for your business. Here are four ways that you can learn more about how IT works within your organization.

Know Who to Contact for Support
As a leader within your organization, you need to lead by example. You should be aware of who to contact within your company for any IT-related issues, and this contact information should be shared with other employees within your organization. By cooperating with IT, your business can improve operations so that you don’t encounter a roadblock when it comes time to upgrade to more recent technology, or perform maintenance on critical hardware and software.

Working with Vendors
Dealing with vendors is part of doing business with technology. Your organization likely has several different vendors for your various hardware and software solutions. Knowing how to communicate with them is key to getting the most from your products. In other words, you should at least be privy to information concerning your organization’s relationship with its vendors.

Basic Security Best Practices
This is a part of business that all of your employees should be familiar with. Data security is one of the most crucial parts of running a business, and your team needs to understand this if you want to ensure maximum security. Examples of basic security best practices include the following:

  • Employees should use long, complex passwords.
  • Employees should use two-factor authentication.
  • Employees should be able to identify potential online scams.

Managing Laptops and Mobile Devices
If your employees bring their own devices (BYOD) to the workplace for use on your company network, you have a responsibility to ensure that they’re following proper protocol. Do you have a BYOD policy? If not, you should consider setting one up. You need to have some sort of oversight in regards to what data is being used and accessed on what devices. The idea is to restrict the flow of data through permissions so that you can know how it’s being used, and to limit its exposure to threats.

This might seem like a lot to take in, but you don’t have anything to worry about. Most of these issues can be resolved simply by having an IT technician on-hand to consult in times of need. If you don’t have an in-house IT department, this might seem like an impossible task. Thankfully, Info Advantage makes it easy for your business to keep your technology functioning properly and running without incident; all thanks to outsourced managed IT services.

Info Advantage can handle the everyday management and maintenance of your IT systems, and act as a consultant, helping you make educated decisions about the future of your technology systems. For more information, give us a call at (585) 254-8710.

Tags:
0 Comments
Continue reading

10 Common Security Mistakes to Keep an Eye On

10 Common Security Mistakes to Keep an Eye On

 

Most companies have to have a workforce, generally one of considerable size. Unfortunately, the more users you have, the more potential risks you run into. Of course, your workforce doesn’t collectively intend to be a security risk, but the digital world is a complicated place, with threats around every corner and malicious programs just waiting for your employed end-users to slip up. Here are ten such honest slip-ups to watch out for:

  1. Clicking on Risky Websites - The web is pretty big, so when an employee has been searching for something and finally manages to find a link, they might not always think about the source. As a result, your network and files could be subject to any number of threats. Be sure to emphasize to your employees that there is such a thing as “too good to be true,” especially on the Internet.
  2. Weak or Personal Passwords - As much as your employees might love their dogs, cars, or a particular date in time, a password is no place to express that love. Also, if they actually use “password” as their password, they are just begging for trouble. Encourage them to use private, randomized strings of numbers and letters as insistently and consistently as possible.
  3. Lax Habits in Mobile Security - You may have the latest versions of spyware and virus blockers on your company desktops, but do your employees have the same on their tablets, phones, and other portable electronics? Without the same security, once they are connected to your network, these devices leave your network wide open for breaches. Be sure your employees aren’t leaving points of access to your network without safeguards by establishing mobile device policies and a BYOD (Bring Your Own Device) policy.
  4. Using Insecure Connections to Access Sensitive Data - Are your employees reviewing company files on their lunch break by using the local fast food franchise’s free Wi-Fi? If they are, it is recommended that
     you put a stop to it; as public Wi-Fi hotspots are prone to have malware lurking about.
  5. Lost or Stolen Unencrypted Tech - So an employee is riding the bus to work, and leaves their company phone behind when they disembark. Without encryption software, that phone is potentially an encyclopedia of company data and information for sale to competitors, as well as a free pass into company files and email. Enforcing encryption policies helps to mitigate this risk.
  6. Shadow IT - An employee decides that they prefer a different program to perform their job-related task and downloads a copy of that program onto their company desktop without the knowledge of the IT department. Besides the question of compatibility with your systems, it spreads your company data into yet another system, but this time you don’t have control over it. Plus, there is always the risk that the download will come with a bonus - vulnerabilities that could allow malware to hitch a free ride into the network. Be vigilant regarding the use of unapproved, personally downloaded applications.
  7. Phishing Calls/Personalized Phishing Emails - One of your HR employees checks their email and finds what looks to be a job application directed specifically to them, using their name, title, and other personal identifiers. They click on the included link, not realizing that the email was actually from a hacker who did a bit of research on Facebook and LinkedIn, and downloads a mess of viruses. Impress upon your employees the importance of private social media accounts and the careful consideration of any linked content from unknown senders. Similarly, make sure your employees can recognize and appropriately handle phishing telephone calls for both live callers and robocalls, and understand the importance of not sharing company information compulsively.
  8. Personal Email Use - The news has presented enough evidence in recent years to prove that using a personal email account for work purposes is never a good idea. Beyond the implicit unprofessionalism of some usernames, personal accounts tend to be more vulnerable to malicious programs than their corporate counterparts are. Encourage your employees to keep work and personal emails separate.
  9. Leaving Workstations Unattended - As unfortunate as it is, not all employees will be completely on the up-and-up. Some will attempt to view information they aren’t cleared to access, often for purposes of corporate espionage. This task becomes remarkably easy when a workstation is left unattended while still active. The fix is relatively easy to establish; just remind employees to log off of their desktop (or at least lock it) before they leave their post, and enforce it appropriately.
  10. Using Random Memory Devices - It makes no sense to carefully craft your system defenses if your employees are going to find a random USB drive lying on the street and plug it into their workstation, subjecting your network and files to whatever malware might happen to be on the device’s storage.

While human error is impossible to avoid entirely, you can minimize your risk of a security breach by implementing these policies for your workforce and educating them on best practices. For more information about industry best practices when dealing with company data, give Info Advantage a call at (585) 254-8710.

 

0 Comments
Continue reading

Moving Your Office? Make Sure Your Tech Can Handle It First

Moving your office is a difficult task. Moving furniture, personal objects, and technology can be a hassle that you don’t even want to think about. There’s nothing easy about moving your office’s technology to a new location, and we’re not going to let you do it alone!

For reference, let’s examine the technology that you’re currently using in your office. You probably have plenty of workstations; one for each employee, and some spares just in case something happens. These workstations need to be connected to your business’s network so that users can access mission-critical software, crucial information systems, and other important resources. A cabling infrastructure can quickly grow uncontrollable, especially if you’re not practicing proper cabling procedures.

Another problem that often comes up is the task of equipping your team with the right communications solutions. Setting up phone lines for each of your employees can be challenging, and you often need to consult both your budget and your organization’s floor plans in order to adjust for growth. There’s no better time to plan for the future and ensure that you can add or remove phone users as needed, than when you move to a new building.

Then, there’s the topic that you might not even want to think about; moving your physical files. Lugging around heavy and unwieldy filing cabinets can be a pain in the neck. You should be asking yourself if you’re willing to forsake physical file storage in favor of a digital file storage format. You also need to consider which files you absolutely need to keep, and which ones you can do without. It’s imperative that you perform a full assessment of your business’s current assets, paper or otherwise, and ensure that you take only what you need. Doing so can lessen the burden of moving your office. Be certain to shred any outdated files that contain sensitive information before disposing of them.

Info Advantage can assist your business with solutions specifically designed to increase mobility and communications in the workplace; many of which can make your move easier and improve operations.

  • Voice over Internet Protocol (VoIP): With VoIP, your business can take advantage of telephony communication from anywhere with an Internet connection. Since the only connection you need is your network, you can avoid the complex cabling required for landline telephone systems. You just need to keep a close eye on your network resources and ensure that your bandwidth is enough to handle the quantity of calls. Info Advantage can assist you with both a network assessment and the implementation of your chosen VoIP system.
  • The cloud and virtualization: Delegating information to your entire workforce can be challenging, but with cloud computing, it’s as simple as providing access to the Internet. Your employees can access software, data, and other important information through the cloud, all wirelessly without the need for intensive cabling. As long as your team has an Internet connection, they can use WiFi to connect to the cloud and access critical information. This allows for anytime, anywhere access.
  • Electronic records storage: If your organization is having trouble with file storage, Info Advantage can equip your business with a solution that’s designed to help you eliminate unnecessary physical file storage systems in the office. Instead, you can store your files in a digital, compliant space, that’s optimized for your file’s security. Since your files will be stored digitally and protected with data backup and such, you’ll be able to quickly get back up to speed without the frustration of digging through bulky filing cabinets.

Moving your office is a great reason to start fresh with your technology solutions. To get started, give Info Advantage a call at (585) 254-8710.

0 Comments
Continue reading

Job Automation: Robots Aren't Taking Over Quite Yet

Job Automation: Robots Aren't Taking Over Quite Yet

 

Companies are always looking to improve their operations by eliminating unnecessary costs. It’s a part of business, no matter how you look at it. However, as automation technologies grow more advanced, some of the more mundane (and even some professional) positions are at risk of getting replaced by cheaper, more efficient robotic systems.

We see this all the time in certain industries like manufacturing and retail, where there’s no longer a need for specific positions due to autonomous systems taking their place. While this trend is capable of increasing these organizations’ bottom lines, it simultaneously puts people out of work. Surprisingly, the quality of work by automated systems could be largely variable and unpredictable. So, until the details get sorted out, it’s likely that automated systems will have to be babysat, with humans jumping in to save the day should something go wrong.

This presents another possibility; rather than replacing workers, automated technology could be used to augment their capabilities. For example, there are writing programs that are capable of putting together articles much faster than the way the human mind can. However, these articles are often devoid of emotion and can’t connect on the same level as a human author can. So, for now, there are certain jobs that automation can’t touch, but how long will it take for automation technology to catch up?

Please keep in mind that we’re not insinuating that technological advancement is bad; we’re just trying to raise awareness for how it affects the worldwide economy and job market. It doesn’t matter if a specific technology can eliminate work for manufacturers and businesses if it puts hundreds of thousands of people out of work.

Yet, in many cases, technological advancement can be exceptionally beneficial. Consider, for a moment, how outsourcing can help your business. When you outsource to a third party, you’re essentially receiving a good or service from someone else. You’re purchasing their professional skills for the good of your business. So, in a manner of speaking, you’re augmenting your business’ IT with a valuable automated service in the form of our talented technology professionals.

At Info Advantage, we aren’t looking to replace your internal IT department. Rather, we want to work with them and help your business achieve its greatest potential. Regardless of your current IT’s role in management and maintenance, we can pick up the slack where they fall short. We’re firm believers in working together for the betterment of our clients. If your internal staff doesn’t have the time or skill necessary to perform regular IT maintenance, Info Advantage can step in and handle this responsibility for you. If the opposite is true, and your team doesn’t have time to implement new innovative solutions, we can perform this role for you.

Ultimately, our professional IT technicians are more potent and valuable than any robotic IT system can be. To learn more about co-managed IT, give us a call at (585) 254-8710.

 

0 Comments
Continue reading

A Beginners Guide to Cloud Computing

A Beginners Guide to Cloud Computing

 

The cloud has embedded itself in the way that modern businesses manage their technology. By providing a way to access important data and applications on a whim, the cloud has made it easier than ever to stay productive both in and out of the office.

The Different Types of Cloud Computing
Implementing the cloud into your current business model is easier said than done. In order to get the best return on investment for your cloud technology, you need to take your various options into account. We’ve outlined some basic information about the various types of cloud computing your business should know about.

  • Public cloud: The public cloud is a solution that’s designed to maximize efficiency for the user. The management and maintenance of the public cloud is handled by the provider. This is great for businesses that want a hands-off cloud experience at the expense of control over data.
  • Private cloud: The private cloud is often hosted either in-house or by an outsourced IT provider. As such, they require proper management and maintenance to ensure functionality. The private cloud is preferred by companies that want to maximize data security and want the most control over their data.
  • Hybrid cloud: The hybrid cloud is a solid middle-ground for those who don’t want to give up data security for operational efficiency.

Variables to Consider
In order to make the most educated decision you can, we recommend taking the following variables into account when choosing your cloud solution.

  • Security: Businesses that want to maximize data security will appreciate the private cloud. The private cloud allows for additional security measures, like secondary hardware-based security solutions, that can maximize the security of your data.
  • Data control: If you don’t want that much control over your data, the public cloud is a good choice. However, users who want to maximize access control and role-based user access will want to invest in a private or hybrid cloud.
  • Management responsibility: Just like other computing hardware and software, a cloud solution requires a certain expertise that should be administered by a qualified IT technician. If you don’t want this responsibility, the public cloud is for you; though it should be mentioned that a hybrid cloud allows your business to take advantage of the many benefits of both private and public clouds.

Info Advantage can help your business integrate and adjust to a new cloud computing solution. We can assist and consult your team through each and every step of the cloud adoption process. To learn more, give us a call at (585) 254-8710.

 

1 Comment
Continue reading

Why a Disaster Recovery Plan is Vital to Your Business

When you mention the term 'disaster recovery,' most people think about the big ground-shattering events like earthquakes, fires, floods, tropical storms, etc. While these natural events are certainly disasters and devastating in their own right, smaller things can constitute as a disaster for your business, and they aren't seasonal.


To Info Advantage, a disaster is anything that involves a major loss of data or major downtime. When one of our clients experience a server malfunction that leaves most employees sitting idle unable to work, that is a disaster.

The Cost of a Disaster

Downtime is a very terrible expense to not try to avoid. Try this simple formula for yourself:

Number of Employees Affected by an IT Outage X Average Employee Hourly Cost (NOT WAGES)
+ Average Company Hourly Income X Percentage of Income Lost Due to the IT Outage

This simple formula will tell you about how expensive every hour of downtime is for your company. The hardest value in the formula is understanding the percentage of income lost. Not all companies might have a figure, but you will want to consider it as you do the math. This doesn't include the cost of repair, consultation, parts, or any of the remediation required to get things back up and running.

What Brings Disaster?

Disaster can strike from any direction. Hard drives can go, data can be corrupted, hardware can fail, and networks can go down, and systems can become infected with viruses and malware. User error can cause disaster, as well as theft and other malevolent activity. While companies should take precautions to safeguard themselves against threats both external and internal, and managed maintenance can prevent a lot of foreboding issues, having a solid disaster recovery plan can mean faster turnaround when there is devastating downtime.

Employing a disaster recovery plan starts with the data - your most important IT asset. Computers can be replaced, hardware can be repurchased and software can be reinstalled. Your data is the culmination of countless hours of work by all of your employees ever. It's no wonder why most businesses that suffer a major data loss go out of business within the first year. You can lose your credibility, and things go into disarray. Data needs to be backed up.

Your backed-up data should be archived regularly offsite. Most importantly, your backup solution needs to be easy to test, and tested regularly. You don't want to find out your backups are corrupted when it is too late.

The time to put together your company's disaster recovery solution is now. Contact Info Advantage at (585) 254-8710 to talk about solutions for safeguarding your data and your business in the event of a disaster, large or small.

 

0 Comments
Continue reading

3 Methods to Extend the Life of Your Laptop Battery

3 Methods to Extend the Life of Your Laptop Battery

If you’re constantly on the go, you are going to need a laptop that can keep up with your busy schedule. Many business professionals find themselves in need mobile computing to accommodate with busy travel; to check their emails, go over notes, or even finish up sales presentations. However, laptop batteries can only last so long without needing a charge, and that isn’t always a readily available option. Here are some times on how to extend your laptop’s battery life so you don’t have to worry whether or not it’s going to run out while you’re out doing business.

Adjust your Display and System Settings

There are a multitude of display and system settings that can be adjusted to lengthen the life of your laptop’s battery. For example, you can reduce the display brightness, turn off the screensaver, and set the laptop to hibernate rather than just go to sleep. Hibernation mode will make sure that the computer is not consuming any power while it is not in use. You can also turn off the WiFi or Bluetooth setting when not in use to give yourself a few more minutes of battery life.

Check Your Power Settings

Today, many laptops come equipped with an option of power settings to help optimize the laptop’s life and performance. In Windows, the Power Plan setting allows you to choose between standard settings or customized plans. MacOS systems use what’s known as “Energy Saver,” which will automatically adjust display or other system controls.

Don’t Overload Your Laptop

When you’re in a rush, it can be easy to leave up multiple tabs and applications for easy use. However, the time you save not closing out your apps will cost you in battery life. Having too many tabs open on your laptop’s browser can drain its power and slow down your productivity. Make sure you close all browser tabs and applications after you’re finished using them to save yourself more battery time.

Need an on-the-go laptop, but aren’t sure what features and specifications you want included? Contact the Info Advantage technology specialists at (585) 254-8710 today to talk about which model would be best for you and your business.

 

1 Comment
Continue reading

3 Steps to Keeping Your Servers Maintained Properly

3 Steps to Keeping Your Servers Maintained Properly

Servers are the backbone of many businesses, as it is responsible for the communication and the exchanging of data. Since there is so much relying on servers to run properly, it is imperative to keep them well-maintained to ensure that business will not be interrupted. Here are a few steps businesses can follow to make sure your servers will continue to run without any issues.

Backup Your Data

Regular back up is the first and arguably the most important step of server maintenance. In the case of disaster, such as server failure or a cyber-attack, backup can be used in order to restore your data with little to no downtime needed. Experts suggest that you do multiple backups, making sure to keep at least one outside of your business or network. One of the easiest and safest ways to keep your data backup safe is to use a cloud service, which can be maintained and connected to from anywhere that you can connect to the web. Along with data, it’s also recommended to backup any device drivers, along with the network configuration. This will make it much easier to restore your server in case of failure.

The Right Environment

If you have physical servers, you’re going to need to make sure you have the right environment. Your servers should be in a separate, air-conditioned room. This will ensure that they do not overheat, and that the noise won’t disrupt your employees. It’s suggested to clean the servers, and all of the removable media drives, on a regular basis. Keeping them clear of dust will help keep your servers running at their best condition and running properly.

 

Keep Everything Updated

An upgrade or patch may be the one thing that keeps your severs safe from malicious attacks. Make sure to keep a careful eye on any new updates, and make sure that everything is up-to-date. In addition to upgrades, make sure you keep all of the other systems that keep your server running smoothly. Experts suggest that businesses should check their security systems, server utilization, and user accounts frequently to make sure there aren’t any issues. In addition, it’s recommended to change any passwords you may use every 6 to 12 months.

Having trouble keeping your servers maintained properly? Call Info Advantage at (585) 254-8710 today to talk to a specialist about the best solution for your business.

0 Comments
Continue reading