Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.

Logo

Blog banner image

Info Advantage Blog

Info Advantage has been serving the Upstate New York area since 1993 , providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses.

Even During a Pandemic, Technology Never Sleeps

security-blue-image

As we see ourselves rolling comfortably through what is often referred to as the “Dog Days of Summer”, we are able take a quick moment and reflect before the fall and winter inevitably arrive.

The year 2020 has been incredibly rough for all of humanity all across the planet Earth. Uncertainties within the health care industry, finances and throughout the workforce, most people have just not been able to catch a break.

Continue reading

Why (and How) SMBs Should Strategically Adopt Technology

b2ap3_large_adopt_technology

There is no question that a small business can benefit from technology, as has been proven time and time again. However, an issue can arise if a business bites off more than it can chew, so to speak, and ultimately creates a spike in costs. A responsible business owner will resist this temptation and prioritize the solutions they need over the ones they want - building profitability and generating capital needed to make other improvements.

In this blog, we’ll examine some of the implementations that can deliver a good return on investment to a small business.

Continue reading

Is Your Cloud Solution Actually a Money Pit?

b2ap3_large_cloud_money_costing_you

The cloud has proven to be an extremely useful tool for the modern business. Not only does it provide anywhere-anytime access to applications, processing, storage, et al; it also delivers those products as a service, allowing you to budget for recurring costs rather than major upfront ones. This provides your organization with functional, supported, and secure computing environments that eliminate a lot of the support costs that traditional computing environments require. It sounds like a perfect scenario for small and large businesses alike, but things aren’t always what they seem, as a lot of cloud users have found that they have incurred several hidden costs by using cloud platforms. Today, we take a look at these hidden costs.

Continue reading

How to Avoid Becoming the Next Data Security Cautionary Tale

b2ap3_large_security_cautionary_tale

Data security isn’t a matter to be taken lightly, as too many businesses have found out the hard way. Unfortunately, there are far too many simple ways to correct common security issues - enough that it’s foolish not to do so. We’ll review a few ways to fix security issues, after discussing one of, if not the, most egregious security failings in modern history.

Continue reading

4 Ways a Managed Service Provider Can Help Your Business

b2ap3_large_msps_help_businesses

How much does your business rely on technology to keep your organization running forward? As business technology becomes more complex, it’s becoming increasingly popular for organizations to have their own internal IT departments to manage and maintain it. Yet, small businesses don’t often have the necessary funds for such a feat. How can your company afford quality IT service? You can start by pursuing managed IT solutions from a managed service provider.

Continue reading

Knowing, and Planning For, Your Organization’s Compliance Burden

b2ap3_large_compliance_burden

Despite what detractors say, regulations are in place for good reason. They typically protect individuals from organizational malfeasance. Many of these regulations are actual laws passed by a governing body and cover the entire spectrum of the issue, not just the data involved. The ones that have data protection regulations written into them mostly deal with the handling and protection of sensitive information. For organizations that work in industries covered by these regulations there are very visible costs that go into compliance. Today, we look at the costs incurred by these organizations as a result of these regulations, and how to ascertain how they affect your business.

Continue reading

A Look at Business Computing Costs: Cloud vs. On Premise

b2ap3_large_onpremise_cloud

Profitability is less the measure of being able to turn a profit, and more the measure of how much profit you can make. For the successful small business, the integration of technology can dictate what kind of annual margins you are looking at. For the new company, however, it can be something even more critical: the difference between setting a course for success, or wallowing in failure. Today we analyze the cost difference between hosting your IT in-house, or choosing to host it in the cloud.

Continue reading

Is Data a Commodity? Maybe Not, but It Is an Asset

b2ap3_large_data-commodity

The late American author Kurt Vonnegut once wrote, “New knowledge is the most valuable commodity on earth. The more truth we have to work with, the richer we become.” Written in the 20th century, it has been put in practice by 21st century businesses. As the Internet has grown, the amount of companies expanded, and the amount of data that those companies collect has grown exponentially, especially now that there is a market for such data.

Continue reading

Image 'Snapshot' Data Backup Might Be the Best Method

Image 'Snapshot' Data Backup Might Be the Best Method

Is your business still using tape as its primary method of data backup? If so, you could be missing out on a more reliable, less time-consuming alternative. Image-based, or “snapshot” backup solutions continue to be the optimal way to guarantee the continuity of your organization’s data infrastructure, and we’ll explain why.

But first, let’s talk about why tape backup isn’t good enough in today’s business environment. Storing data backups on magnetic tape reels has long been a standard procedure, but compared to more modern data backup practices, tape has fallen short of today’s expectations. Tape backups are resource-intensive, and as such, they need to be performed at the end of the workday to avoid slowing down the network. Furthermore, due to how resource-intensive tape backups are, they can only be taken once--meaning that you could potentially lose up to a day’s worth of productivity and accumulated data.

The Difference
Image-based backup is vastly more efficient and more manageable than traditional tape backup. Image-based backup lets your business take a “snapshot” of your organization’s data, which is then sent to several locations either on or off-site for safe, secure storage. These snapshots record data that’s been changed recently rather than take a whole backup like how tape would work; these smaller backup sessions are less resource-intensive and can be performed more frequently during the day--even as often as every 15 minutes.

Perhaps the greatest boon of using an image-based backup system is the fact that it’s automatic and relies less on users to be effective. Your team doesn’t need to set and run the backup at the end of each workday; you can set them to run automatically. Of course, you still have to check the backups and make sure that they work properly, but the fact remains that you have backups taken and ready to go.

When it comes to backup and disaster recovery, your business can’t cut any corners, and doing so could become a problem down the road. Even the slightest disaster like a power outage could lead to major data loss. That’s not to mention other common disasters that could cost your business capital in more ways than just data loss. Hardware failure, floods, and fires could lead to not just data loss, but expensive hardware replacements and damage to your IT budget. The damage caused by the resulting downtime is also a major problem, and one which absolutely cannot be ignored.

Info Advantage can equip your business with a backup and disaster recovery solution that’s specifically designed to work for your organization. Depending on your needs, you can back up your data to several off-site locations, including a secure data center and in the cloud for rapid data recovery. Furthermore, in the event of a disaster, you can restore your backups directly to the BDR device, and it can act as a temporary server while you work out the finer details of replacing your hardware. All in all, it’s the ideal solution for a small business that relies on data to keep operations going.

To learn more, reach out to us at (585) 254-8710.

0 Comments
Continue reading

New ATM Scam is Able to Fool Even Chip Based Cards

Stealing data ATM

If we told you that automated teller machines, or ATMs, were susceptible to hacking attacks, would you believe us? You should; there are a plethora of ways for hackers to infiltrate and steal money from ATMs, with the latest being so dangerous that even the Secret Service has issued warnings about it.

ATMs in Connecticut and Pennsylvania have recently become complicit in identity theft schemes issued by hackers. The machines themselves have been found to be equipped with periscope skimmer devices attached inside, particularly in machines which have openable lids that provide easy access to their inner workings. The device is installed so that it can probe the magnetic strip on the card as the machine reads it. Users might only need to withdraw $20, but they have so much more to lose.

It’s estimated that the device’s battery can last for up to 14 days per charge and that it has enough storage capacity to steal 32,000 card numbers. The one good thing about this device is that it doesn’t seem to collect PIN numbers. Instead, this scam may be part of a preparation for a real heist.

There may not be a PIN collection device on this version of the skimmers, but it’s still a good habit to cover the PIN pad with your free hand while you plug in your code. You never know who could be watching. Scammers are crafty and may have hidden cameras on the device to steal information, or they have hacked into the native camera remotely to spy on you while you input your credentials. Even if you don’t suspect that you’re being watched, it’s always better to err on the side of caution.

What’s worse is that those chip cards that your bank replaced your old cards with probably won’t be of much use, as most ATMs still need magnetic strips in order to accept and process the card as legitimate.

These skimmers can’t usually be identified by sight, as they’re often installed internally to avoid the prying eyes of cautious users. The most practical advice for avoiding ATM scams is to consider the thought process of a criminal who may try to exploit one of these machines. Consider its location--if the ATM is surrounded by people at all times, like those that are found in supermarkets or public places, chances are that it won’t become a target. Now, if it were located in a secluded rural gas station tucked away in the back hallway, it’s more likely that someone would tamper with it. Consider if it’s top-accessible, allowing cybercriminals access to its innards. These are all variables that you should be on the lookout for.

Therefore, it’s recommended that you use only ATMs that are placed in high-traffic areas where there are plenty of witnesses who might notice if someone tampered with the machine. It’s also important to avoid ATMs that are easily accessible; rather, just use one which is embedded into the wall, like the one in your bank’s drive-thru. These are great for multiple reasons: 1) They’re well-lit, 2) They are high-surveillance zones, and 3) Hackers have a hard time getting into them.

If you’re dealing with your business’s finances, it’s probably best that you handle your financial services through the tellers that aren’t automated. Another option is to go about your business online, shielded by the safeguards that Info Advantage can prepare for your organization. To learn more about our cybersecurity services, reach out to us at (585) 254-8710.

0 Comments
Continue reading

Browsers Will Soon Support Fingerprint Sign-Ins

biometric authentication

Just a few years ago, we’d only see fingerprint locks on the movie screens as action stars tried to deftly trick the high-security sensors. But these days, biometric authentication processes can be found on a variety of different devices, including mobile phones, tablets, and laptops. But soon we may be seeing them in our browsers, according to announcements front Google, Microsoft, And Mozilla.

According to a report on WC3 browsers such as Chrome, Microsoft Edge, and Firefox will soon support biometric authentication, including fingerprint scanners, voice and facial recognition without the need of any additional hardware. Here’s a little more about how biometric authentication will work with these popular browsers.

Sign-In Using a Mobile Device

Operating systems such as Windows, and MacOS, Chrome OS and Android are in the process of creating new features to allow users to securely log in using biometric identification. Authentication will be verified using USB, Bluetooth, and NFC devices connected to their mobile devices. This two-step verification method helps keep sign-ins secure.

Better Alternative for Passwords

Passwords can be tricky. Make a password too easy, you’re subject to a hack. Make a password too difficult, and you might have trouble remembering it. Biometric authentication methods make it more difficult for a hacker to break in, while also making it easier for you to sign in.

Spend Money Online Securely

With traditional forms of verification, there’s only one thing keeping a cyber-criminal from stealing your information; your password. With biometric verification, there’s an added layer of security keeping your account from getting broken into. Biometric verification authentication will soon be found on websites where you can purchase goods or services, stream videos, access the cloud, and more.

With technology constantly advancing, it can be easy to be left behind. Missing even just one update could be the difference between a secured network and a vulnerable one. Info Advantage can help you keep up to date on your security updates and ensure your business is safe and running efficiently. Call us today at (585) 254-8710 for more information.

Tags:
0 Comments
Continue reading

Think Frequently Changing Your Password is Secure? Think Again.

You’ve heard it said that it’s a best security practice to routinely change your passwords. The idea here is that, if a password were stolen, then it would lose its value when the user goes to change it. While this sounds like solid logic, new research shows that it may actually be better NOT to change your passwords.

This may be a hard pill to swallow for IT administrators who have always required users to change their passwords every few months or so. However, seeing as this practice could make accounts less secure, it’s worth considering.

The idea behind this theory is that, whenever a user goes to change their password, they’re often rushed or annoyed and end up creating a new password that’s less secure. The Washington Post puts it like this: “Forcing people to keep changing their passwords can result in workers coming up with, well, bad passwords.”

Think about it, how often have you changed your password, only to change it from a complex password to one that’s easier to remember? Or, have you ever kept the same password and just added a number at the end of your new password? This covert move will do little to deter a hacker. Carnegie Mellon University researched this topic and found that users who felt annoyed by having to change their password created new passwords that were 46 percent less secure.

Plus, let’s consider the hypothetical situation of a hacker actually stealing your password. Truth be told, once they’ve gotten a hold of your login credentials, they’ll try to exploit the password as soon as they can. If they’re successful, they’ll pose as you and change the account’s password, thus locking you out of it. In an all-too-common situation like this, the fact that you’re scheduled to change your password at the end of the month won’t change anything.

Additionally, ZDNet points out yet another way that regularly changing passwords can make matters worse: “Regularly changed passwords are more likely to be written down or forgotten.” Basically, having a password written down on a scrap piece of paper is a bad security move because it adds another way for the credentials to be lost or stolen.

Whether you do or don’t ask employees to change their passwords is your prerogative. However, moving forward it would be in everybody’s best interest to focus on additional ways to secure your network, instead of relying solely on passwords. This can be done by implementing multi-factor authentication, which can include SMS messaging, phone calls, emails, and even biometrics with passwords. With additional security measures like these in place, it won’t matter much if a hacker stole your password because they would need additional forms of identification to make it work.

To maximize your company’s network security efforts, contact Info Advantage at (585) 254-8710.

0 Comments
Continue reading

Exploring the Newest Gmail Security and Productivity Features

New Gmail Features

Google released a new version of Gmail last week with some improvements to both their webpage and mobile formats. This new version is the largest Gmail update in recent history, and focuses on adding new security and productivity features for their 1.2 billion users.

Here are some of the newest features available with the new update:

-Easy Attachments: Attachments from an email can now be viewed and downloaded directly from the inbox. This allows you to easily access your attachments without having to scroll through the thread to find them.

-Snooze: This feature allows you to ‘snooze’ messages, allowing you to send away messages away for a later time. After the ‘snooze’ period is up, the email is re-delivered to your inbox.

-Nudge: Google uses their artificial intelligence to inform you about important messages you may have missed. The subject line will show you how many days it’s been since you’ve responded and will prompt you to write a reply.

-Smart Replies for Web: Released last year on their mobile app, Google is now introducing smart replies for their web app as well. This feature will offer users three potential replies based on the content of the email received.

-Mobile High Priority Notifications: Utilizing their powerful AI tools to give you high-priority emails, which will only send you notifications for important emails.

-Google Alerts for Risky Emails: A new security tool; Google’s AI will detect that an email may be risky, warning you from clicking any links if you aren’t certain of the authenticity.

-Confidential mode: This mode will cause emails to ‘self-destruct’ after they have been received, making it more secure for when you have to send private information. It also allows you to send a confidential message, which forbids the recipient from forwarding, copying, downloading, or printing your message.

These new features can be accessed on the current Gmail applications by clicking “Try New Gmail” under the settings options.

0 Comments
Continue reading

Top Reasons To Outsource Your IT to the Pros

Top Reasons To Outsource Your IT to the Pros

How often does your technology experience trouble? If your business is constantly dealing with technical hiccups, your assets that are meant to be a boon to your organization, can quickly become a nuisance that holds you back. How can you take better care of your technology, and use it to usher in a new era of productivity?

First, we might need to explain the nature of break-fix IT services. This is what you normally get when you take your technology to traditional tech support. They’ll take a look at your technology, tell you what’s wrong, and provide their services for a hefty cost. They won’t take measures to help you mitigate your technology problems down the road. After all, their livelihood depends on your technology breaking down, so why should they have your budget’s best interests in mind?

The other type of IT service seeks to do exactly that; managed IT wants to prevent issues from becoming major problems that cause downtime. This enables your business to save money and time by not having to deal with near-constant technology troubles. The idea is to use preventative maintenance in order to detect minor issues, and resolve the overarching cause, before they can escalate into costly problems that could derail your budget.

Some examples of effective managed service offerings include:

  • Server hosting: Your server units are used for the storage and transportation of critical data, so it makes sense to take proper care of them. However, the average small or medium-sized business might not have the staff or skillset necessary to care for or accommodate the physical server component. Businesses will often outsource this responsibility to guarantee the consistent uptime of crucial systems.
  • Network security: Do you know the difference between viruses, malware, trojans, phishing scams, and other online threats? This is one of the many reasons why organizations would rather outsource their network security to cyber security professionals. Managing and maintaining a security solution that includes a firewall, antivirus, spam blocker, and content filter, can be tiring and knowledge-intensive.
  • Remote maintenance and management: Often times, business professionals might be able to effectively use technology, but don’t notice telltale signs of degradation. Many of these signs can be spotted remotely, and the patches can swiftly be administered without a costly on-site appointment.
  • Backup and disaster recovery: Small businesses need to preserve their data at all costs. It’s been proven that businesses that fail to restore their data following a loss incident are likely to go out of business within one year. This is why so many organizations turn to outsourced managed IT services to handle data backup. With Backup and Disaster Recovery (BDR), backups can be taken as often as every fifteen minutes, and data can be rapidly deployed in the event of a data loss incident.

Does your business have trouble managing and maintaining its critical technology assets? With Info Advantage, we try to make it as easy for you as possible. To learn more about any of the above services, and more, reach out to us at (585) 254-8710.

0 Comments
Continue reading

VoIP and SMBs: Creating the Perfect Telecommunications System

io-centers-2673325_1920

Business phones are very different today than the telecommunications systems of the past. Today, many small to mid sized businesses are using internet based technologies such as VoIP (Voice over Internet Protocol) in order to simplify their communication and seamlessly synergize with the rest of their business activities. For those who don't know about how businesses can benefit VoIP systems, we'll help by breaking it down.

Types of Phones

Hardphone

These are the phones in the 'traditional' sense; a desk phone connected directly to your business' IP network. These phones are easy to learn and can be used to call internationally, at a cheaper price than a direct phone line. Many modern hardphone systems have newer technologies such as built-in displays, touch screens, and a variety of other features that are seamlessly integrated into one complete phone system.

Softphone

Softphones are the same basic principle of a hardphone system, without the designated desk phone. With a softphone system, users can use software programs to turn almost any mobile device into a work phone. This includes laptops, PCs, tablets, and smart phones. All you have to do is set up with a headset or a mic and speakers and you will be able to make and take business calls wherever you go.

 

Which is Better?

Just like in most cases, the type of VoIP system that is best for you depends on your business' needs. There are a few questions you will have to ask yourself about your business to determine what is the best system for you.

The first question is whether or not your employees are always on the move and rely on mobile communication. If you have staff that is always on the move, you will likely benefit from a softphone system. That way, your employees can be connected to their work phone no matter where they are. However, if your employees tend to stay in the office at their desk, it may make the most sense to use a hardphone system.

The next questions you need to answer are if you need connectivity to your business line at all times. Since hardphones are a part of the work desk, once you leave the office you will have no access to the business line. However, with a softphone system you can have connectivity 24/7, even when you're not at work.

The final question deals with your total IT budget. If you are a brand new company, or are looking to completely upgrade an antiquated system, then it may be more beneficial to impliment a softphone system. This will allow you to start up your business line right away, without forcing you to dip into your budget to buy all new deskphones. However, many modern work phones have the ability to seamlessly switch over to a VoIP line. In that case, it may make sense for you to use the phones you already have and switch to a hardphone VoIP system.

Interested in learning more about VoIP? Unsure of which VoIP system will benefit you the most? Contact Info Advantage today at (585) 254-8710 to speak with a telecommunications expert who can help answer any questions you may have about VoIP services.

0 Comments
Continue reading

Weak Wi-Fi? Try These Four Steps to Boost your Signal

Weak Wi-Fi? Try These Four Steps to Boost your Signal

Your wireless router is critical to your business’ online infrastructure and provides your team with precious wireless Internet connections throughout the office. You need to ensure that the signal can reach your entire office. Here are some tips to help you figure out where to put your router, and to ensure that its signal is as strong as possible throughout your office.

Put Your Router Out in the Open
Some people don’t like the appearance of routers. They fashion them an eyesore and try to hide them away in cabinets or elsewhere, away from where people can see them. This is often both counterproductive and dangerous, as the device can potentially overheat in a place with poor air circulation. If you store your router in a cabinet, you’re also weakening the signal, which can make it spotty and difficult to use.

Instead, we recommend that you keep your router out in the open, where it can get plenty of air and keep the signal as strong as possible. This is a best practice for your technology, including workstations and servers that generate a lot of heat naturally by functioning properly.

Use a Central Location
While it might be tempting to just put your router in a far corner of your office and forget that it exists, chances are that the other half of your office won’t be receiving a very strong wireless signal. To avoid this, you need to set your router up in a central location where it can broadcast its signal to the entire office. Depending on your office’s setup, you might even need multiple access points to allow each of your employees to access the Internet.

Also of note, you should elevate your router slightly to ensure that the signal isn’t being blocked by furniture that sits on the floor. File cabinets, desks, and other objects, could all get in the way of the wireless signal.

Review Your Bandwidth and Internet Service Agreement
Sometimes the placement of a router won’t have anything to do with your problem, and the issue is with your network connection instead. In this case, the problem would be with your modem or your Internet service agreement limiting your bandwidth and the flow of data. If you’re having wireless problems, and you’re sure it’s not your router, it’s worth looking into the problem on the ISP’s side of things.

Upgrade Your Router
Are you using the same old router that you picked up when you first started your business? If so, there’s a strong chance that your router’s hardware or firmware is outdated. Since you actually have control over your router, you’d do well to investigate the issue before you purchase a new one. It’s recommended that you go with a router that’s capable of supporting both 2.4 GHz and 5.0 GHz bands. This will help you keep your network strong and healthy. Plus, sometimes all it takes to resolve connectivity issues is to upgrade your system’s firmware.

For help optimizing your business’s wireless network, reach out to Info Advantage at (585) 254-8710.

0 Comments
Continue reading

Email Security: Is Your Email Safe?

b2ap3_large_enterprise_mobility_management_400

Email is (and has been) a prime method of communication for businesses of all sizes. With email comes a whole slew of issues that are essentially synonymous with the technology; spam, information overload, phishing, and information privacy. Even Rochester small businesses that only do business locally are at risk of these issues. Personal email accounts are equally at risk. Employing proper precautions and practices whenever communicating via email is very important to prevent the risk of security compromises, monetary loss, and even legality issues.

Spam Inundation

If you've been using email for a while either professionally or personally you have almost certainly gotten email from people you don't know. Most of these emails are blatantly unwanted while others can look 'almost' legit, as if a real person is trying to contact you. Often (and unfortunately) spammers can get your email address when you put it online or use it to register for accounts on sites on the internet. The good news is standard spam protection is getting better these days, and more advanced spam protection is cost effective for businesses that need the extra layer of protection. Spam can cause a lot of harm for a business network if it isn't kept under control - spam can bog down email servers and eat up network bandwidth and plus it drastically slows down employee productivity because they need to sift through it all just to find their real email. If you and your staff are getting more than a few spam emails a day, contact us at (585) 254-8710 and ask about our anti-spam solutions.

Don't Open Attachments from Unsolicited Emails

This has been a golden rule for general email usage for a very long time. If you received an email from a stranger and there is an attachment, don't touch it. If you receive an email from a contact and there is an attachment, but anything is suspicious, don't touch it. This goes the same for links - if the email was unexpected and just seems fishy, it is possible your contact's email may have been compromised. Use your judgment on this, but remember it isn't your contact trying to trick you, they are merely the victim of a similar hoax from one of their contacts. If you have any doubt, simply reply or pick up the phone and ask them about it before continuing.

Keep your Computer Safe

Be sure to keep antivirus definitions up to date, and run scans regularly. Running adware and spyware removal software at regular intervals is important too. Be sure your Windows Updates are up to date as well. For businesses, you'll want to invest in network protection to keep external threats from leaking in. Even for small Rochester businesses, security and threat management is important to keep operations running smoothly and to prevent expensive downtime and data theft.

Don't Rely on Email for Storage

Everyone has done this at least once; you are working on a report or document on one computer and you email it to yourself in order to pull it up on another computer. That's fine as long as you mind your inbox capacity, but you shouldn't rely on email for storing files, not even as a reliable backup. Imagine having to painstakingly pick through all of your email to restore your most important files. It doesn't sound like a good idea now, does it? On top of that, email isn't any less prone to data corruption or loss than any typical storage solution, and unless the server hosting your email is backed up with a reliable solution, it could be here today and gone the next.

Encrypt Sensitive Data

If you send sensitive data to other recipients, you will want to consider email encryption. Some industries require this. Email encryption simply scrambles the message while it is being sent, and depending on what type of encryption, will descramble itself or allow your recipient to log in to a secure location to view the data. Although email encryption services vary, most of them are very cost effected especially when put beside the risks of sensitive data getting leaked and stolen. Give us a call at (585) 254-8710 to learn more about email encryption and what solution is right for your business needs.

0 Comments
Continue reading

5 Different Ways to Store and Save Files

b2ap3_large_enterprise_mobility_management_400

Storing physical files has been an important part of the office infrastructure for a very long time, and for good reason: every organization has some information they have to store. Traditionally, files were stuffed into folders and catalogued in a file cabinet for “easy” access. This is how many offices still look like, but when it was time to move files, it took a lot of work. Now, since many files are stored electronically, there are many shortcuts that you can take to improve the way you move your files.

Click and Drag
If you have your files placed in one location, like on your desktop, you can click and drag your mouse to create an boxed area of effect. Any files within this box can be moved through a simple click and drag function. Select the files you want to move, then drag any one of them to the location to move all that are selected.

Select the Checkboxes
In Windows 10, you have little checkboxes that you can click to select the individual file. If you have several files that you need to move you can click the checkboxes for all of them, then move just one to move them all. This can save you considerable time and effort.

The Click-Shift
You can select files that are horizontal and adjacent to each other by using the Click-Shift method. Basically, you select the file that you want to move, and then hold down the Shift key while selecting the last one you want to move. Anything in between will be selected. All you have to do is click and drag the files to their new location.

Hold Ctrl
When you hold down the Ctrl key, you can click on files that you want to move. Once they’re selected, all you have to do is move them to the appropriate folder.

Select All Files
If you decide that your desktop is much too cluttered, and you need to move everything on it to a new location, the same Select All keyboard shortcut that works in most word processors can be used to select all of your files at once. Just hit Ctrl+A to select all files in your current window, or desktop. Just click and drag them, and you’re all set.

Just remember that some of these keyboard shortcuts also work with Mac OS X. All you have to do is substitute the Ctrl key for the Command key, and they should work in generally the same way.

Fun Fact: You know how Windows is bundled with Solitaire? No, we aren’t assuming that you are playing it at work. Microsoft decided to bundle their OS with Solitaire as a way to get users more accustomed to dragging and double clicking objects with their mouse.

For more great tips and tricks, subscribe to Info Advantage’s blog.

0 Comments
Continue reading

4 Most Common Ways Businesses Lose Data

4 Most Common Ways Businesses Lose Data

Disasters are an unfortunate part of doing business in a technology-heavy workplace environment. You need to expect the worst, but it’s often difficult to predict what types of disasters your organization will have to endure. There are a few universal disasters that you’ll encounter, regardless of where in the world your business operates.

Here are four of the most common ways that your business could lose data, and how disaster recovery thwarts them at every turn.

Natural Disasters
All you have to do is watch the local weather channel to get a glimpse of just how unpredictable and apocalyptic natural disasters can be. One minute the sun could be shining, and the next your business could be assaulted by roaring torrents and flash flood warnings. Or, the earth would quake under your feet and you’d never know until it’s too late to do something about it. An even more common occurrence would be an electrical storm or a power outage, which could threaten to bring down your technology or fry its circuitry. The point is that it’s next to impossible to predict what effect a natural disaster could have on your business, but the fact remains that it’s most certainly nothing good.

Hardware Failures
Another common problem for businesses that rely on technology is the hardware failure. If you have resource-intensive servers that are responsible for the brunt of your network operations, you might already be intimately familiar with the devastating effects of a hardware failure. No technology can last forever, so when an untimely hardware failure claims the lives of your server units or workstations, you’ll need to be prepared.

User Error
In much the same way as hardware failure, user error needs to be expected and planned for. You can’t realistically expect your users to never make mistakes. It’s part of human nature. People might accidentally misplace files or hand over credentials to threatening entities. Regardless of how they do so, user error is one of the primary reasons for data losses and data breaches, so it’s crucial that you prepare for this by educating your team on best practices, and implementing data backup.

Hacking Attacks
You might not expect to become the victim of a hacking attack, but no matter how large your business is, you need to consider yourself a target. As long as you deal with sensitive credentials like credit card numbers, Social Security numbers, and other financial or personally identifiable information, you have something of value to hackers. When a hacker attacks, they can either steal or delete your data, so it’s best to have a backup stored in the event of something like this.

Regardless of how your data is lost, you’ll need a way to recover it. The best way for a SMB is to reach out to Info Advantage. We can equip your business with the dynamic BDR solution you need to keep your organization afloat, even when you think that your business will sink. Our BDR solution features only the best and brightest features for your data infrastructure, including fast and efficient recovery times, multiple backups taken per day, and off-site, cloud-based storage.

With BDR, you’ll know that your data is safely stored, just in case you need it. To learn more, reach out to us at (585) 254-8710.

0 Comments
Continue reading

Simple Security Tips for the Non-Technical

These days the media is constantly reporting on new vulnerabilities and cyber attacks that devastate business. With the influx of cyber criminals with access to debilitating software, business owners are forced to take evasive security actions in order to protect their sensitive data. While a complete and comprehensive security system is ideal, it can often take time to create a fully secured system for your business. Luckily, there are a few non-technical steps any user can take to make sure their information can’t get into the wrong hands.

Cover Up the Webcam

Despite how it sounds, it might not be too crazy to think that someone can spy on you through your computer’s webcam. In fact, there have been actual reports of this happening on several different occasions. Hackers are able to take control of a user’s webcam, often as a way to gain access to personal information, check for signs of a location, and even spy on personal interactions.

Luckily, all it takes to stop a hacker is to cover up the webcam when it is not in use. It can be as easy as covering it up with a piece of thick tape, though you can find cheap and effective webcam covers at technology or hardware stores.

Use a Privacy Shield

There are many professionals who work on-the-go, meaning they’ll have to find a way to take their work with them anywhere. However, using mobile devices while out in public leaves you vulnerable to prying eyes.

If you have to work on sensitive data in public, it may be beneficial to invest in a privacy shield. These are similar to a screen protector, but with an added security feature. Privacy shields will limit the angle of viewable screen, making it so only the user can see the information. Privacy filters are recommended on work devices, but can also be used on personal devices to shield sensitive data.

Switch to a Physical Authentication

These days, many companies are advocating for a two-step authentication when logging into an account. However, there are still ways that hackers can get around these heightened security measures. For example, many two-step authentications use mobile phones to text specialized codes that will unlock an account. If a hacker had access to a user’s mobile phone, either physically or by hijacking it, they can easily get through to the user’s account.

To combat this, users can get an authentication key, such as a USB or Bluetooth. These are physical keys that allow only the user to access the accounts.

For more information on how to secure your information contact Info Advantage at (585) 254-8710 today.

0 Comments
Continue reading

By accepting you will be accessing a service provided by a third-party external to https://www.info-adv.com/