Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.

Logo

Blog banner image

Info Advantage Blog

Info Advantage has been serving the Upstate New York area since 1993 , providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses.

6 PC Troubleshooting Guidelines that Every User Should Know

keyboard-2711139_1920

When was the last time that you ran into a problem that was easily solvable, simply by restarting your computer or unplugging a device from the wall, then plugging it back in? Often times, simple troubleshooting tactics can be enough to resolve a problem, but more often than not, there are issues that can’t be easily resolved. It’s these ones that hold businesses back, and we’re here to help.

Next time you run into a PC problem that you just can’t wrap your head around, try out these six troubleshooting tips.

 

  • Keep things simple: You’d be surprised by how often some of the most common problems with technology can be resolved by simply restarting it. Reset the hardware or application, check to see if the machine is plugged in properly, shut the machine down, or reboot it. After all, there’s no real reason to go through in-depth troubleshooting practices if the problem can be easily resolved with a restart.
  • If others tried it, try it anyway: Sometimes you’ll be passed a problem that’s been tested by other people within your organization. Thinking it will help you narrow down the problem, they’ll list off what they have or haven’t done. While this might be helpful, you should trust your own judgement - perhaps they didn’t perform a process correctly, or maybe they say that they’ve tried it, but really haven’t. Don’t leave any stone unturned.
  • PEBKAC (user error): This issue, “problem exists between keyboard and chair,” is a common reason why you might be unable to diagnose what the real problem is. ZDNet estimates that about 80 percent of problems are due to user errors, which means that the one at fault might not be technology at all. In these cases, it’s important to accept that you might be wrong and work towards whatever the solution might be.
  • Replicate the issue: In order to best understand a problem, sometimes it’s helpful to try to remake the issue. After all, if you know how a problem starts, you might be able to best learn how to fix it. Ask your end-users how the symptoms showed up, and what they were doing when disaster struck.
  • Fix vs replace: Your IT budget needs to be considered when you’re choosing to either implement new technology, or to fix recurring issues with your old solutions. You need to understand where the fine line between fixing or replacing lies. It makes no sense to purchase new technology if there’s still life left in your current solutions. On the other hand, hardware refreshes can be considered when you’re looking for ways to improve operations and get rid of old technology that’s no longer functional or needed.
  • Seek professional assistance: If you can’t resolve a problem on your own, you need to realize that it’s often more advantageous to seek out professional help, rather than waste valuable time and resources by doing it yourself. Remember, there’s no shame in asking for help when it’s needed. Businesses often do this with their IT, as it can get quite technical and challenging for those who aren’t specifically trained on its best practices. Instead, outsourcing it eliminates this responsibility so that you can focus on your business.

Info Advantage can be your outsourced IT experts. To learn more, reach out to us at (585) 254-8710.

0 Comments
Continue reading

Cloudbleed: The Internet’s Newest Security Bug

Cloudbleed: The Internet’s Newest Security Bug

There are thousands of breaches of information every year, threatening our personal information and sensitive data. On Feb 23rd, news of a brand-new bug known as Cloudbleed dropped. This bug has affected thousands of sites, potentially leaking out the sensitive information of their users, according to a new report by CNET. Here is a quick guide to understanding exactly what Cloudbleed is, and how it may have affected you and your company.

What is Cloudbleed?

Cloudbleed is the name of the newest major security breach bug from an Internet security company known as Cloudflare. The issue arose when users entered their information onto secured “https” sites, such as a login page. Cloudflare’s service is meant to help securely move the information entered into the “https” sites between the user and the servers. Instead of deleting the information after it was used, the Cloudbleed bug caused Cloudflare’s security service to save potentially sensitive data, such as user credentials, photos, video frames, or even server and security information.

Who is affected by Cloudbleed?

There are currently around 3,400 websites believed to have been affected by the Cloudbleed bug, though the actual number could be much higher. The bug is believed to have started back as September, with the height of the problem occurring between February 13th to the 18th. Uber, Fitbit, and OKCupid are the main three that seemed to be directly affected by the bug. According to Cloudflare, the Cloudbleed bug is thought to have leaked information about “one in every 3,3000,000 HTTP requests” made through the service.

What can I Do Now?

As of now, Cloudbleed is no longer an active threat. Cloudflare was able to stop the bug just 44 minutes after it was discovered, and the problem was solved completely in 7 hours. While the impact is minimal and requires no immediate action, there are a few things individual users can do to keep themselves safe from potential data leakage.

It is recommended that you change your password on any account that uses Cloudflare. This includes sites such as OKCupid, Fitbit, and Medium are some of the most popular sites that are known to use Cloudfare’s services. If you are unsure whether or not a site you use was affected, there is now a webpage that tells you whether or not a site is infected

It is also recommended that you use a two-step authentication on any site or service that offers it. This will ensure that no one will be able to access your account, even if they are able to get your user credentials.

-

With thousands of security breaches per year, you can’t afford to wait for security. Contact Info Advantage today at (585) 254-8710 to speak to a technology professional about how to keep your data safe. 

0 Comments
Continue reading