Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.

Logo

Blog banner image

Info Advantage Blog

Info Advantage has been serving the Upstate New York area since 1993 , providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses.

How Rugged Are You? A Guide to Rugged Laptops

How Rugged Are You? A Guide to Rugged Laptops

Face it, your laptop isn’t indestructible. There are only so many times you can throw your laptop in a cramped bag or have it drop from your hands before you see some damage. While many laptops can be saved with something as simple as a sturdy case, many modern professionals work in conditions that make it very difficult to protect the technological equipment needed for businesses to run smoothly. That is why many manufacturers are creating lines of ‘rugged laptops,’ which can withstand even the harshest of work conditions.

What Are Rugged Laptops?

A “rugged’’ laptop is a PC that has been designed to withstand very harsh environments and conditions, such as heavy traveling or factory work. These laptops are built to withstand just about anything, including drops, spills, extreme temperatures, and much more. There are a variety of different types of rugged laptops, each built for a specific purpose. Many rugged laptop vendors offer an assortment of rugged laptops that are classified into three ‘levels’ of ruggedness; semi-rugged, fully-rugged, and ultra-rugged. Semi-rugged laptops are typically enhanced versions of commercialized laptops with more protection, where an ultra-rugged laptop is built from the inside-out to resist even the harshest environments.

What Classifies a Laptop as Rugged?

Most rugged PC manufacturers use the MIL-STD-810 environmental durability standards to test how rugged their laptops are. The MIL-STD-810 was originally created in the 1960s by the US Department of Defense as a guideline for designing military-grade technology that can be used in high combat areas. The standard provides a variety of different test methods which can be used to ensure equipment is suitable enough to be used on the field of combat. This includes tests for temperature, vibration, impact, water resistance, altitude, sand or dust, and more. Manufacturers are also known to reference the Ingress Protection Code, which classifies the degrees of sealing protection of electrical equipment, and the NEMA classification, which describes different electrical enclosures and how they hold up in different environments.

Who Should Be Using Rugged Laptops?

While rugged laptops are typically designed for people who work in extreme conditions, just about any business professional can find value in a rugged laptop. While you may not be using your laptop underground or at sea, your personal computer may be taking on more damage than you think. Laptops are often shoved in bags or airplane compartments, or left in places they could potentially get damage, such as a bathroom or kitchen. Therefore, just about anyone who takes their business on-the-go can find benefits from ruggedized laptops.

 

If you’re interested in a more rugged laptop but don’t know what level of protection you need? Contact the technology experts at Info Advantage today at (585) 254-8710 to talk about what technology solutions will best fit your business.

[Photo: DoD]

0 Comments
Continue reading

Cloudbleed: The Internet’s Newest Security Bug

Cloudbleed: The Internet’s Newest Security Bug

There are thousands of breaches of information every year, threatening our personal information and sensitive data. On Feb 23rd, news of a brand-new bug known as Cloudbleed dropped. This bug has affected thousands of sites, potentially leaking out the sensitive information of their users, according to a new report by CNET. Here is a quick guide to understanding exactly what Cloudbleed is, and how it may have affected you and your company.

What is Cloudbleed?

Cloudbleed is the name of the newest major security breach bug from an Internet security company known as Cloudflare. The issue arose when users entered their information onto secured “https” sites, such as a login page. Cloudflare’s service is meant to help securely move the information entered into the “https” sites between the user and the servers. Instead of deleting the information after it was used, the Cloudbleed bug caused Cloudflare’s security service to save potentially sensitive data, such as user credentials, photos, video frames, or even server and security information.

Who is affected by Cloudbleed?

There are currently around 3,400 websites believed to have been affected by the Cloudbleed bug, though the actual number could be much higher. The bug is believed to have started back as September, with the height of the problem occurring between February 13th to the 18th. Uber, Fitbit, and OKCupid are the main three that seemed to be directly affected by the bug. According to Cloudflare, the Cloudbleed bug is thought to have leaked information about “one in every 3,3000,000 HTTP requests” made through the service.

What can I Do Now?

As of now, Cloudbleed is no longer an active threat. Cloudflare was able to stop the bug just 44 minutes after it was discovered, and the problem was solved completely in 7 hours. While the impact is minimal and requires no immediate action, there are a few things individual users can do to keep themselves safe from potential data leakage.

It is recommended that you change your password on any account that uses Cloudflare. This includes sites such as OKCupid, Fitbit, and Medium are some of the most popular sites that are known to use Cloudfare’s services. If you are unsure whether or not a site you use was affected, there is now a webpage that tells you whether or not a site is infected

It is also recommended that you use a two-step authentication on any site or service that offers it. This will ensure that no one will be able to access your account, even if they are able to get your user credentials.

-

With thousands of security breaches per year, you can’t afford to wait for security. Contact Info Advantage today at (585) 254-8710 to speak to a technology professional about how to keep your data safe. 

0 Comments
Continue reading