Take a Rest, We Got IT: What Your IT Team Does When You’re On Vacation

cup of coffee with milk being added

It’s 8:44 AM.

You wanted to sleep in later, of course, but it was still nice to not wake up to the sound of your phone alarm buzzing. You go to the kitchen and make some coffee, then sit down on your couch, enjoying the quiet. You just breathe.

Of course, cancelling the big vacation was a bummer, but you needed the time off. But as your head clears, a worry crosses your mind. Will everything be OK without you? You grab your phone, hover your thumb over your email.

Then you stop. You can relax. You’ve got a good team. You trust them. And you also know that even while you’re taking your much deserved rest, your information technology partner – your IT team – is still hard at work, keeping your network and infrastructure running so your business can keep doing business. So pour yourself a refill of coffee, and get comfortable, while we take a look at what your IT team does while you are on vacation.

They’ll Maintain Your Operating System

inflatable pink flamingo in poolOne of the key things your IT team does while you’re out: maintaining your operating system. Ensuring network connectivity, monitoring and adding bandwidth as needed, optimizing your data backup solutions, providing necessary system updates to ensure your customers have the best possible user experience, your IT team does it all.

More importantly, they monitor your system 24/7, so they can catch any potential issues before they arise and cause problems. That means no disruptions to your business, no inconveniences for your customers, and no panicked phone calls from the office while you’re taking it easy.

They’ll Connect You to the Cloud

man lounging with laptop computerOf course, you may not be able to help yourself: you go to work everyday, and even when you’re off, there’s one or two things you need to take care of yourself. Fortunately, with the right IT team working behind the scenes for you, it’s easy and seamless, all thanks to the cloud.

Your IT team will set up cloud networking and data storage solutions for your system. That means your whole network can be accessed from anywhere, and you can log on from anywhere you can connect to the internet, be it your couch or the pool or anywhere. Furthermore, your IT team will monitor your cloud network, keeping an eye out for any possible disruptions, so you have one less thing to be concerned about.

They’ll Keep Your Network Secure

Speaking of concerns, don’t let any worries about security wake you from your mid-day vacation nap. Your IT team is working hard to keep your network and data secure, whether you’re connected to the cloud or on a private network.

The team will get your system set with the best protections and defenses, with a fully customized firewall to protect you from network breaches, viruses, and phishing attempts. Their regular inspections will locate and correct any vulnerabilities in your system, and the team keep an eye out for any irregularities, ready to spring into action if anything goes wrong.

And if you go a little too deep into vacation mode and forget your passwords while you’re out? Your IT team can help you get logged back in, too.

 

woman floating on inflatable pink flamingo

Don’t Worry: Beacon Has Got IT

So to really rest and make the most of your time off, it’s clear that a trusted IT partner is a must: you need Beacon IT Services (BITS).  We’ve been helping our clients manage their networks, protect their data, and keep their businesses running day and night through spring, summer, fall, and winter for more than 20 years (and lots and lots of vacations).

Contact us today to discuss what we can do for you, or request a free audit.

The History and Evolution of Managed IT Services

History: we’ve lived through it, and more is being made every day. And while what’s happening in IT services may not seem quite as dramatic as what’s happening in the rest of the world, there’s no doubt that the industry is rapidly evolving in ways that will change how IT business is done going forward.

And it’s not just that the way IT services are handled: it’s in the increasing need for every business to have a robust online presence, and with that, the need for trusted managed IT service providers. So how did we get here? As always, to get a sense of where we are going, it’s worthwhile to take a look back.

From “Break / Fix” To Managed Services 

For a long time, the dominant model for IT services was “Break / Fix.” A business would have their system set up, then when something went wrong, they’d call up an IT team to come fix it. Sure, that meant lots of downtime while they waited for the team to address the issue and big bills to fix major problems. But at the time, companies either weren’t relying as heavily on technology in their day to day business, or least they didn’t believe that they did.

As times changed and technology advanced, it became clear to many companies that technology was absolutely essential to their operation. The long down times and significant work (and income) reductions that came with the “break / fix” model were simply unacceptable. Still, it wasn’t feasible or practical for many companies – especially small businesses – to have their own full-time IT expert. So managed IT services were born.

In the managed IT services model, companies contracted with outside team of IT experts to monitor their technology and fix any issues that arise as soon as possible. This meant that companies no longer had to worry about crashing systems or email being down, but could also leverage more sophisticated and complex technology. The IT team would even update a company’s technology and systems to be up-to-date.

A New World of IT

Today, more business than ever is conducted online. Cloud computing gives companies access to levels of data storage and online collaboration that would have been unthinkable (or at least unaffordable) just ten years ago.

And with so much more happening in that cloud space rather than on hard drives, cyber security is even more essential as well. Fortunately, managed IT services can also put systems in place (like multi-factor authentication) to prevent data from being stolen, exploited, or tampered with.

So it’s no surprise that companies are increasing the resources they give to IT: data shows that 44% of businesses plan to increase their tech spending this year.

And more changes are in store.

Soon, 5G technology will likely transform the digital landscape again, increasing the speed and capacity of online systems while decreasing latency (the time it takes for data to travel between devices and cellular towers- practically, the delay between your action and a site’s response). Soon, people from across the world will be able to collaborate together as though they are in the same room.

The power of 5G technology, along with other revolutionary innovations like the Internet of Things (IOT), could change everything about the way we do business and live our lives. It goes without saying the “break / fix” model wouldn’t fly in this new world. Every business that wants to stay competitive will need a trusted IT team of experts to manage their technology and ensure their cyber security.

And a business that doesn’t adapt to this new world of IT? Well, they’re history.

Take Control of Your Future

Fortunately, a trustworthy IT partner isn’t hard to find. In fact, you’ve got one right here: Beacon IT Services (BITS). We’ve been helping our clients manage their IT since 1998: we’ve been there through IT’s history and evolution, and we can help you ready your business for the future.

Contact us today to discuss your managed IT needs, or request a free audit. Your future begins today.

By | 2020-06-25T11:49:34+00:00 June 25th, 2020|System Administration, Computer Related, 5G, IT Services|

Windows 7 End of Life: Managing the OS transition

Windows 7 logoFirst, let us begin by paying our respects to a hard-working piece of software. The Windows 7 operating system first became available to consumers in October 2009. Since that time, the OS has supported millions of business and personal computers, offering Microsoft users an alternative to the less-popular and more-problematic Windows Vista.

But, every beginning must have an end. And, that end came to pass just recently. On January 14, 2020, Microsoft ended its standard support of Windows 7, opting instead to focus its service around the next generation OS – Windows 10.

What does that mean for users who still rely on Windows 7? Let’s find out.

Impact of Windows 7 End of Life

Microsoft has been notifying users of the Windows 7 expiration date for a while. But, that doesn’t mean everyone has taken notice. And, even if they have, not everyone has taken steps to upgrade their operating system in time.

That’s not completely surprising. For a business, an OS upgrade requires effort and planning to service every single workstation. There’s both an expense and a potentially significant time commitment. So, it’s completely understandable if some small or medium-size business owners have pushed the task down their priority list.

After all, it’s not like your computers will just suddenly stop working.

That said, delaying an upgrade can have significant consequences. Consider the fact that in the modern age cyber security threats are growing at an increasingly alarming rate. Even with the latest security tools, there’s no guarantee that you’ll escape someone’s attempt to penetrate your network and hijack your data.

Chances of repelling an attack are even lower when you’re using out-of-date or unsupported software. Cyber criminals are not dumb – they tend to go after the easiest targets. And, post-January 14, 2020, that includes users of the Windows 7 operating system.

If You’re Sticking with Windows 7…

woman thinking in front of a laptopDespite the warnings, some of you may decide the push your luck and continue on with Windows 7. The good news is, you’re not out there entirely on your own. You can still purchase extended support from Microsoft.

However, that support is going to cost you. And, that cost is going to more than double the following year. Microsoft is consciously implementing an aggressive cost structure for Windows 7 extended support in order to motivate customers to ditch the old system and upgrade. Eventually, though, that support is going to end, too.

So, while you’re mulling your upgrade options, here are few suggestions for keeping your business network protected:

Update to the latest Windows 7 service pack

If you’re going to run unsupported software, you might as well have the latest version with the latest security patches. That should keep you in relatively good shape for the very immediate future.

Encrypt your internet traffic

This requires purchasing a VPN (virtual private network) service. What is a VPN? Simply put, a VPN connects your network traffic to another secure server somewhere else in the world, and routes your traffic using that server’s internet connection. Here’s a good article that goes into more detail.

Delete unknown/unused software

You really should do this anyway. But, it’s even more important if you already have an existing weak link. Removing unknown or unused software limits the potential avenues of attack for intruders.

Activate two-factor authentication

Again, something to consider as a best practice. Two-factor authentication requires users to go through two stages of secure entry into a network, database or application. This doesn’t have to be two passwords. There are a number of authenticating factors. You can learn more about them here.

cyber securityUse a password manager

Most users create passwords they can easily remember. In many cases, these passwords are easier to crack for hackers using sophisticated password-cracking scripts. A password manager can help mitigate this problem. Not only will it track all of your login information, it will also generate passwords that are harder to crack.

Educate yourself and your employees about ransomware

Knowledge is key to success, right? The more educated you are about common cyber attack tactics, the more securely you can operate your business. But, you’re also only as strong as your weakest link. That means that your employees have to know as much about cyber security as you do.

Beacon Knows Operating Systems

Whether you’re considering an OS update, or you’re hanging on with Windows 7 for a little while longer, Beacon can help you keep your business infrastructure secure and operating at peak potential. For help assessing your network security, request an audit from our dependable team of IT professionals.

By | 2020-09-22T12:27:02+00:00 January 30th, 2020|Computer Related, IT Services|

The Scary Interwebs: Top Cyber Security Threats in 2019

Big plans for Halloween this year?

The October 31st holiday is an annual pilgrimage to the Altar of the Sweet Tooth for the kids. For adults, on the other hand, the celebration is closer to a fetishization of all things horrifyingly scary.

If you’re a small business owner, or an executive tasked with keeping your company’s digital infrastructure and business data safe, however, you might be forgiven for wanting to skip the terror-fest this year. Why? Because the number and variety of cyber threats just keeps increasing exponentially, year after year, making every day Halloween.

A few obligatory frightful statistics to ponder:

  • A hacker attack on an internet-connected computer or device occurs every 39 seconds.
  • Depending on who you ask, anywhere between 43% and 50% of cyber attacks target small businesses specifically. Oh, and small business typically invest less than $500 on cyber security.
  • Despite the prevalence of cyber crimes and the attention they receive, only about 10% are actually reported – meaning that the statistics above and below may represent the low end of the possible threat spectrum.
  • Some off-the-shelf hacking tool kits are available for purchase for as little as $1.
  • Roughly three out of four organizations lack even a basic cyber security incident response plan.
  • A data breach can often go nearly six months before being detected – and this is true for your financial institutions (Capital One), credit monitoring agencies (Equifax) and even the big boys in tech (Facebook).

What new and potentially devastating cyber threat trends emerged in 2019? Let’s take a look.

Cloud Computing Infrastructure Exploitation

Over the last several years, cloud data storage has become big business, and a popular method of managing your company data. However, non-secure sign-up processes, ease of use and low costs make cloud providers targets for all sorts of nefarious actors.

“Hackers have been found using cloud services to mask their identities while carrying out attacks. We have seen hackers exploiting and abusing popular cloud-based services such as Google Cloud Platform, Microsoft Azure, Asus Cloud, Google Drive, Dropbox, and others to fool their victims. Hackers may use these services to spread malicious code or distribute macro-laden documents and spreadsheets or use them as command and control servers. Hackers were also found using cheap cloud services to host their entire DDoS and brute force infrastructure, and then targeting users and other cloud providers.” – TechGenix

Mobile Fraud

As more and more financial transactions are being initiated on mobile devices, cybercriminals have shifted their exploits to the apps supporting e-commerce.

“Today, mobile fraud is outpacing web fraud. More than 60% of fraud originates from mobile devices. It used to be mobile browsers that were fraud heavy, but now 80% of mobile fraud comes from mobile apps.” – RSA White Paper

Blockchain Privacy Poisoning

Just last year, blockchain technology was being hailed as the most secure method of encryption. How quickly things change.

Hackers have found a way to turn legislation aimed at protecting online consumers – GDPR – into an exploitation through what’s now being called “privacy poisoning.”

“The term […] refers to the insertion of personal data into a public blockchain, thereby making that blockchain non-compliant under the European General Data Protection Regulation (GDPR). According to the GDPR, all individuals have ‘the right to be forgotten,’ so you can immediately see why blockchain technology represents such a problem: by their very nature, blockchains are meant to be completely unchangeable and immutable. So this naturally creates a paradox for organizations: you have personal data ‘on chain’ that cannot be altered, and you simultaneously have the right of individuals to change, alter or delete their data at any time. Personal information cannot be deleted without compromising the chain.” – CPO Magazine

Software Supply Chain Attacks

Not only are hackers targeting cloud networks and mobile banking apps, they’re also going after the source code via software supply chain attacks.

“Attackers hunt for unsecure network protocols, unprotected server infrastructures, and unsafe coding practices. They break in, change source codes, and hide malware in build and update processes.

Because software is built and released by trusted vendors, these apps and updates are signed and certified. In software supply chain attacks, vendors are likely unaware that their apps or updates are infected with malicious code when they’re released to the public. The malicious code then runs with the same trust and permissions as the app.” – Microsoft 

DDoS

Distributed denial of service (DDoS) attacks – flooding a targeted website with an overwhelming amount of traffic – are nothing new. In fact, it’s one of the oldest methods of carrying out cyber warfare.

DDoS attacks were on the decline as recently as 2018. But that trend appears to be over, as Kaspersky Lab notes:

“Last year the number of DDoS attacks was constantly falling, leading Kaspersky Lab experts to assume that cybercriminals who had been conducting DDoS attacks for financial gain had shifted their attention to other sources of income (such as crypto-mining). However, statistics for Q1 2019 contradict this trend and show that the number of DDoS attacks blocked by Kaspersky DDoS Protection has actually grown by a staggering 84%, when compared to Q4 2018. This figure could indicate that such attacks were still in demand, despite being inaccessible when popular DDoS marketplaces were taken down. Once new DDoS-for-Hire websites launched, the number of attacks grew exponentially as a result.”

Beacon Knows Cyber Security

Want to make sure your business is protected from the latest hacker exploits? Beacon is here to help. Give us a call today.

By | 2020-09-22T12:27:02+00:00 October 24th, 2019|Computer Related, IT Services|

Client Spotlight: Graham Personnel Services

How do BITS customers really feel about the job we do for them? We’re sure that almost every business asks itself a variation of the same question. After all, being successful is all about maintaining relationships.

Here, at BITS, we really wanted to know the answer. So, we decided to take the radical step of, you know, actually talking to our clients about how our services impact them.

Inaugural Client Spotlight

This month, we had the pleasure of speaking with Dace Hennessee, General Manager of Graham Personnel Services. Dace was extremely welcoming and forthcoming about his company’s reliance on the IT expertise provided by BITS.

So, what stands out about BITS services to Dace?

“Beacon is a local company. Graham Personnel is a local company. I think that’s a good match. We like to support locally owned Triad companies.”

That answer is more than just a preference for doing business with a neighbor, however. It’s about quality and reliability. And, knowing that if the owner’s computer is experiencing an issue, it will be fixed as fast as humanly possible. (In this case, we did our thing and it was back to normal within the hour.)

In managed IT services, the speed with which a glitch is resolved can mean a difference of thousands of dollars. After all, if his computers are down, Dace isn’t placing too many people on work assignments.

And that can be a major concern if, let’s say, you’re moving your entire operation to a new location.

“The Move” 

One of the biggest projects BITS managed for Graham Personnel Services was transitioning the company’s IT infrastructure to new offices on Gallimore Diary Road. In addition to it’s 30+ employees, GPS also houses multiple classrooms with dozens of computer stations where applicants are screened for various skills.

“Two years ago, we switched everything from one location to another location. I think we were down for 30 minutes,” says Dace. “We were up and functional by 8:30 [a.m.]”

The BITS team handled all the planning, logistics and execution for the job, seamlessly transitioning employee work stations, classroom computers, company servers and presentation equipment to their new homes.

“A lot of that was planning. It was getting involved early,” observes Kevin Lackey, BITS Account Executive who was involved in the project. “Having that vision on the front side, knowing what the expectation was, and being involved so early really helped us. Because we knew: this is what he’s asking.”

What Else Does BITS do for GPS?

In addition to helping with the occasional monumental move, BITS provides all end-user support for GPS’ employee work stations. In plain language, we are Graham Personnel’s external IT team. Everything from managing software updates to helping recover lost passwords is managed by the BITS help desk.

We also help Dace keep an eye on equipment performance, recommending updates when necessary and managing the procurement process.

Last, but definitely not least, BITS also manages firewall and backup functions for the GPS website, keeping digital assets secure and functioning at 100%.

About Graham Personnel Services

Graham Personnel Services has a 50-year history of successfully placing job seekers in the Triad area with businesses, large or small, in the distribution, manufacturing, professional and healthcare sectors. Over the years, the company has developed expertise and earned recognition in helping Fortune 500 companies and small businesses in Greensboro and the surrounding communities fulfill their staffing needs.

During any given week, there are anywhere between 700 and 1,200 associates placed on assignments with Graham Personnel clients. The firm takes pride in its commitment to customer satisfaction and strives to be the local leader in recruiting.

Client Profile

Name: Graham Personnel Services

Size: 30+ employees

Industry: Staffing

Location: Greensboro, NC

BITS Services: end-user support (managed IT), firewall, backup

By | 2020-09-22T12:27:03+00:00 June 25th, 2019|System Administration, Computer Related, IT Services|

Employee Security Training: Your IT New Year Resolution

Happy New Year! What are you looking to do better in 2019?

The turn of the calendar tends to bring with it thoughts of personal growth and improvement.  But, for many business owners – their identity being tied directly to their enterprises – New Year’s resolutions often translate to things they can do better for their companies.

So, let’s restate the above question: What are you looking to do better for your business in 2019?

If you’re open to it, allow us to offer a suggestion: if you haven’t made cyber security a part of your company culture, make cyber security training for your employees a priority this year. Why? Because you’ll be shoring up the weakest part of your network defenses.

The Case for Initiating Security Training for Your Employees

It’s not a secret that employees are the weakest link in any organization’s security efforts. That doesn’t mean that your staff is going out of their way to jeopardize your network. They’re just either unaware of which actions leave the company vulnerable, unsure of what to do if they do encounter a potentially threatening situation, or simply don’t assign a great deal of importance to security concerns (this is sometimes called the “it’s the IT guy’s problem” syndrome).

In most cases, though, you really can’t blame the rank-and-file. Think about this:

  • 65% of companies have over 500 employees who are never prompted to change their passwords
  • 52% of business leaders don’t know what to do if cyber security is breached
  • 45% of employees don’t receive cyber security training at all
  • Microsoft Office applications (Word, Excel, etc) account for 38% of malicious file extensions
  • 91% of cyber attacks begin with a phishing email

What are these statistics telling us? First, that workers are routinely targeted – and via the communication methods (email) and business applications they rely on the most (Microsoft Office). Secondly, if/when things go wrong, management typically doesn’t empower employees to help in warding off the threats, and often has no plan of action.

Let’s take a look at a few more statistics:

  • cyber crime is expected to cause $6 trillion in damages by 2021
  • 61% of breach victims in 2017 were companies with less than 1,000 employees
  • average cost of malware attack is $2.4 million

If you’re a small business, a multi-million dollar mistake is hard to recover from. Encouraging your team to become more discerning digital users and an active part of your data security efforts is, simply put, the smart move. The best way to do that is with an active cyber security training program.

What Does Security Training Entail?

Education can cure a lot of ills. This is absolutely the case with cyber security concerns. But before you can teach, you much know where your subjects stand.

As such, the first part of training focuses on identifying what your trainees know and don’t know. At Beacon, we initiate our cyber security training program with real-world examples of cyber exploits. This is accomplished with a computerized test, where employees are asked to complete a few simple tasks, such as opening an email with an attachment.

The test serves two purposes. First, it exposes people to real life attack methods that they are likely to encounter. Secondly, it identifies the types of exploits to which your team is most vulnerable.

Once you know which types of tricks are most likely to work on your team members, you can arm them with the skills to shore up their vulnerabilities. That’s the second part of the training – teaching how to recognize when something is amiss and how to counter a suspected attack.

The training portion should be tailored to each employee, based on the results of their assessments. Focus on what they don’t know. You don’t want to waste anybody’s time going over concepts they already know well. Your team is more likely to retain information they find valuable and/or interesting – so, teaching them stuff they know is counterproductive. Each employee’s training should cover the exploits they did not handle well during the assessment.

At the end of training, be sure to remind your team of how valuable their contributions to network security are.

Beacon Knows Security Training

Want some professional help with your employee security training? BITS is here to help. We’re more than happy to get your team up to speed on the latest cyber threats.

By | 2020-09-22T12:27:04+00:00 January 28th, 2019|Computer Related, BITS News, IT Services|

What is Blockchain… And So What?

Let’s be honest… blockchain is a confusing concept. Even for people who understand exactly how blockchain technology works, providing an easy to understand explanation is challenging.

There are a couple of reasons for this. First, blockchain is relatively new tech, and new tech always takes a little while to sink into the public consciousness. We didn’t really know what the internet was for, or how transformative of a force it could be, back in the 90s. Mostly, because we didn’t understand how it could be applied.

Secondly, the technology itself – blockchain – is closely associated with its application – a cryptocurrency called Bitcoin. But they are not the same thing. The sometimes-negative association with Bitcoin specifically, or cryptocurrencies generally, tends to muddy the waters for many.

Before we confuse you further and tell you more about what blockchain isn’t, let’s outline what it actually is. There are three important elements of blockchain technology:

  1. large, peer-to-peer network of computers dedicated to processing and recording digital activity
  2. decentralized database of all recorded activity called a Distributed Ledger (there are several key aspects to this, including “decentralized” and “all recorded activity”)
  3. encryption

It’s definitely more complicated than that. There’s a lot that’s packed into the application of these three concepts. But, boiled down, blockchain combines these elements to provide a secure platform that allows any two parties to engage on the web without the need for a third-party authenticator. Blockchain cuts out the need for a middleman in any digital interaction (including financial transactions) by providing a peer-to-peer network that’s safe, trusted and transparent.

The first intended application of blockchain technology – Bitcoin – was financial in nature. The creator/creators set out to develop an entirely new currency – one that is not reliant on or backed by any government. But, it’s the system that was developed to enable a digitally-based currency that may be end up being much more transformative.

“The blockchain is an incorruptible digital ledger of economic transactions that can be programmed to record not just financial transactions but virtually everything of value,” say Don and Alex Tapscott, authors of the 2016 book Blockchain Revolution.

If it sounds like there could be thousands of applications for blockchain technology, you (and a few dozen million people) are probably on to something.

Blockchain Application in IT & Data Security

So, can blockchain disrupt the IT and data security industries? It sure seems to have the potential to do so. In fact, it may already be doing so.

The following attributes and capabilities make the blockchain particularly appealing to data security professionals:

  • Decentralized and unhackable
  • Encryption and validation
  • Public or private

The data that’s stored on a blockchain doesn’t reside on any one computer (or, node) – it is distributed across all the nodes on a blockchain network. Once a record is added to a blockchain database, it is encrypted and cannot be accessed or altered unless the user provides the correct access key. This makes a blockchain pretty much impervious to hacking.

Because there’s no centralized location for the data, hackers would need to gain access to more than 50% of the network nodes in order to access or overwrite a saved record. Depending on the size of the network, that proposition falls somewhere between extremely unlikely to darn-near impossible.

Further, while blockchain was initially created to enable anonymity in a very public setting, a private blockchain network that restricts access to just a few users can easily be created.

All of this means that blockchain technology is highly amenable to the data security needs of businesses, large and small.

Beacon Knows Data Security

Not sure if you’re doing enough to protect your sensitive business data? BITS can help. A free audit of your network by our security experts can help put your mind at ease. Request one today.

For a deeper understanding of blockchain technology, check out additional information here, here and here.

By | 2018-11-29T09:21:50+00:00 November 27th, 2018|Computer Related, IT Services|

How Often Should Your Company Replace Its Computers

To say technology is a critical component in any small business today would be an understatement. However, there is an age-old question, “When should my company update its computer systems?” We all know the struggles we face using a computer that just isn’t quite up to snuff. We are all painfully aware of the early warning signs when a computer is on its way out. There is trouble running our favorite web browser, web pages load a bit slower and excel documents freeze up and crash altogether. We understand that as a small business you need to strike a balance between productivity while maintaining a budget. So, how can you tell when your company should look into replacing its computers?

First, let’s take a glance at the average lifespan of a computer.

It is important to draw a distinction between Business PCs and Consumer PCs. Consumer computers are built to be specifically priced for consumer outlets and use. The inner workings that make up the Consumer PCs are usually purchased from the lowest priced supplier with little to no emphasis on quality or reliability. Cheaper components cause instability, reliability concerns, and overall poor performance. Depending on the strain and demands on your Consumer grade PCs you can expect roughly a 2-3 year life expectancy.

Key takeaway: If your company is using Consumer grade PCs then you can expect around a 2-3 year life expectancy with a 1-year warranty on average.

Now let’s talk about Business Class. In general, these Business Class PCs are built to order. However, there are pre-built models that make use of common configurations. These types of computers have reliable components that are built to perform better and handle common business tasks. In addition, these types of computers have a more extensive warranty that ensures parts are quickly and easily replaced.

Key takeaway: Business class computers also outperform Consumer PCs and have a longer life expectancy. These computers have an average life span of 3-5 years with a much longer warranty on average.

Depending on the class of computer your company has will determine when you will need to replace your computers.

Early Warning Signs a Computer Is Failing

• Performance tapers off as new software or apps are added – all functions begin to slow down

• Issues with updating or installing the latest operating system

• Trouble or issues with running needed software apps

Generally, as computers age and as new software is installed on the systems it will gradually require more resources to run it properly. This will begin to have an impact on overall PC performance and slow down other various functions as well.

So to bring it around when do you purchase new computers for your company? If you have Business Class PCs you will want to replace them every 3 – 5 years as a rule of thumb. Additionally, we recommend reviewing program requirements to balance both productivity and costs. At a minimum when it comes to purchasing a new Business Class PC we recommend these basic specs:

• Intel i5

• 8G Ram

• Solid State hybrid or Solid State Drive

The Bottom Line When It Comes To Replacing Computers

Whether hardware failure or software obsolescence, eventually you will have to replace your company’s computers. Computer upgrades and improvements mean people in your company will spend less time doing more mundane tasks and more time on important activities. If your computer systems are currently 5 years or older it’s time for an upgrade.

By | 2017-05-30T10:59:59+00:00 April 4th, 2017|Computer Related|

BITS Blog – A Technical Blog for the Non-Technical

Welcome to the Beacon IT Services (BITS) blog.  My name is Ryan Bowles, Account Executive for BITS. This blog is intended to be a resource for small/medium sized businesses to help better take control of their IT.  You will notice that my title does not include any words like Network, Systems, Engineer, or Administrator (even though we have plenty of people here that do!). Although I do consider myself an IT Professional, my expertise comes from understanding how IT relates to a business and what can be done to ensure that technology is an asset to a business and not a burden.  This blog won’t be about speeds, feeds, and technical specs (although we will sprinkle in some technical “how to” blogs by the above mentioned specialists from time to time).  Rather, the majority of posts here will be directed towards the small business owners and managers. The goal being to help you better understand technology and how it relates to your business by answering questions that most companies have (or should have) about what to do with their IT.  Ever wonder when you should upgrade your PCs? How about determining if you should replace your old server or move to the cloud?  What is a firewall and do I need one?  These are the types of questions I will be helping to answer.  So as we move forward please share this post and continue to check back to catch up on all the Tips, Tricks, and How To’s of small business technology.

BITS is an IT services company located in Greensboro NC, dedicated to helping our clients improve business productivity.  We do this by offering a range of IT services, leveraging a team of experts to proactively manage our clients IT and ensure that technology is a consistent and reliable asset to their business.

 

By | 2017-03-21T13:43:56+00:00 February 29th, 2016|Computer Related, BITS News, IT Services|

3 reasons to give Microsoft’s newest browser more than just a second look…

EdgeIf you’re one of the many people that’s already made the switch to Windows 10, you’ve probably already gotten over your initial curiosity of Microsoft’s newest operating system. You might have even double clicked on the iconic blue E, surfed the web for a bit and then went back to your browser of choice. But what most people haven’t noticed is that blue e may not stand for Internet Explorer. It could be Microsoft’s new browser, Edge. It definitely deserves a second look and here are the 3 reasons why…

1. It will have Extensions

Although delayed from its original release in November, this overdue feature will help close the gap with Chrome and Firefox. It is definitely something to look forward to in 2016.

2. It’s fast

Compared to versions of IE, Edge is unrecognizable. And although back and forth testing with chrome hasn’t yielded a final winner just yet, the fact that a Microsoft browser is even in the running for the top spot is enough to make you do a double take.

3. It’s clean

Internet Explorer has been known for its clutter from the tool bar to seemingly every available option staring you in the face. Edge has changed all that with a clean but functional toolbar that hides all the controls and settings that distracted you from what’s most important, the page itself.

There are many more exciting features built into Edge such as Cortana, an integrated digital assistant, Reading List and Reading View which lets you read articles without the distractions of ads. It also features Tab Preview which drops down a small preview window of the tab when the mouse cursor is hovered over it.

It’s always exciting to see a software company like Microsoft listening to its customers and with its new Browser. It’s off to a great start with the updates coming in 2016 and should make the choice of a preferred browser that much harder.

 

By | 2017-03-21T13:46:43+00:00 February 3rd, 2016|Computer Related|