Category: Hardware

Setting up your new laptop with Windows 10

First things first, what should you do with your brand new laptop? You go through the Windows 10 setup, and you’re all done, right? Not really. Your notebook isn’t ready — until you do some tweaking. Let’s get the ball rolling.

#1 Check for updates

Your new laptop should check for updates automatically, but you can also check manually. Just click the gear icon above the Start button to go to the Settings, choose Update & Security > Windows Update and then click the Check for updates button. (Or, just type “updates” into the search box and click Check for updates.)

#2 System restore

If something goes wrong with your laptop, you can save a lot of time and hassle if you have a “restore point,” which is like a backup of your entire operating system. To set up a restore point, search for “restore” from the taskbar and click Create a restore point. You’ll be taken to the System Protection tab of the System Properties window.

From there you can choose what you want to be included in the back and then click the Configure button. Select the radio dial to Turn on system protection if it’s not already on. And then you can choose how much disk space to reserve, usually no more than 2 or 3 percent.

#3 Power plan

If you want to prolong your laptop’s battery life, one of the best things you can do is switch the Power Saver, High Performance, and Balanced power plans based on your needs. To choose a plan, right click the battery icon in the lower-right corner of your screen and click Power settings. Next, click Additional power settings to select a power plan.

#4 App installation tolerance level

To restrict which apps can be installed on your laptop, you can disallow anything that isn’t in the Windows Store. Go to Settings > Apps > Apps & features and you can choose whether to permit installations from only the Windows Store, any app installations (with a warning), or unrestricted app installations.

#5 Remove bloatware

Vendors package new laptops with lots of trial apps, which are mostly unnecessary and unwanted software called bloatware.

Windows 10 offers an easy way to see which apps are installed on your new laptop and a quick way to uninstall those you don’t want. Head to Settings > Apps > Apps & features and peruse the list. If you don’t want an app and are 100% certain your computer doesn’t need it, click the Uninstall button.

#6 Anti-ransomware

Ransomware is a form of malicious software (or malware) that makes all your data inaccessible until you pay a fee to hackers.

To combat it, type ‘Windows Defender Security Center’ into the search bar at the bottom of your screen, click it and go to Virus & threat protection > Virus & threat protection settings. Here, you’ll be able to enable a new option called Controlled folder access, which protects you against ransomware attacks. By default, the Desktop, Documents, Music, Pictures, and Videos folders are protected, but you can add others too.

Do you know what settings to change and update to optimize your laptop? This article barely scratches the surface of Window 10’s security and efficiency settings. Call us today for quick chat with one of our Microsoft experts about taking yours to the next level.

Published with permission from TechAdvisory.org. Source.

How to prevent your laptop from overheating

Laptops may be more affordable than ever, but we’re also using them for more advanced tasks than ever. This means you run the risk of overheating your laptop and causing long-term damage. Here’s how to avoid that.

Causes of overheating

Laptops create heat during their normal operation. That’s why they’re designed with internal fans that blow out hot air and suck in cooler air. When your laptop keeps shutting down or suffers serious slowdowns, chances are it’s overheating.

One of the most common causes of overheating is when the fan doesn’t operate normally. This may be due to dust and grime clogging up the fan, preventing it from rotating properly. It’s also possible that the air vents are being blocked, preventing air from flowing into the laptop.

Another thing to consider is the age of your laptop’s battery, which relies on lithium to store electricity. This chemical naturally decays over time, no matter how carefully you use it. The older the battery, the less efficient it is and the more heat it generates.

Software use can also contribute to overheating. Too many apps and programs running in the background can overwork your laptop.

What to do if it’s overheating

The first thing you should do is check your hardware. Turn your laptop off and inspect the vents and your fan for any dirt, grime, or other possible causes of blockage. Also check whether the fan itself is not physically dented, which can slow down its rotation.

Sometimes overheating is simply caused by bad habits. Do you use your laptops in bed or on the carpet? Do you use pillows as padding? Uneven or soft surfaces often block the air vents, leading to overheating. Always place your laptop on a hard, even surface.

Aside from the hardware, check your software. Are there a lot of apps and programs that start automatically when you switch on your laptop? If yes, then you may need to limit them.

Keeping it cool

To prevent your laptop from overheating, always make sure that there’s adequate airflow for your laptop. Better yet, invest in a cooling pad. These pads lift your laptop and add more fans to facilitate better airflow.

Limit the number of programs that run when you start your laptop. Change your settings to “power save.” And shut down your laptop whenever you’re not using it.

It’s easy to take laptops for granted because they’re billed as plug-and-play devices. However, with a little extra care and attention, your devices will last much longer. If you want to prolong the lifetime of your IT hardware, call our experts today.

Published with permission from TechAdvisory.org. Source.

Tips for optimizing your mobile hotspot

Did you know you can keep your laptop connected to the Internet in areas without a Wi-Fi connection? All it takes is a portable, low-cost 4G router to make a private wireless network for their devices. These tiny devices are a great investment for employees working from the road, and we’ve got some tips on how to use them.

A mobile hotspot usually provides faster Internet connection and better security compared with public Wi-Fi. But if this kind of mobile networking is not utilized well, it will accumulate expensive data charges. The following tricks will maximize the efficiency of mobile hotspots while lowering their data usage.

Place the router in a strategic spot
For your equipment to offer optimal coverage, put it in an area where it can best broadcast signals. The goal here is to cover as many devices as possible, so you want to carefully plan where the router is placed. Wireless signals reach only up to 100 feet indoors and 300 feet outdoors. The signals can pass through floors, walls and ceilings, but fewer obstructions will result in better transmission.

Less Wi-Fi range for longer battery life
If your settings allow, tweak your mobile wireless network for low-power, shorter Wi-Fi. Users must move closer to the hotspot for better Internet connection, but the router’s battery will thank you for it.

Check for LTE coverage
It’s a good idea to research the area you will use the portable router in. There are locations that do not support cellular 4G/LTE, which means you will still have Internet, but at slower speeds.

Watch out for background apps!
Laptops, tablets, and smartphones may be running applications in the background that are using up Internet bandwidth. The most common examples of these apps are location-based services, social media and email. Minimize the amount of data you use by disabling background apps you don’t need.

Avoid multimedia usage
Loading an email or text on a webpage with your mobile device will consume minimal amounts of data. Streaming videos or music will require more bandwidth, using up more data. Try to avoid using multimedia so your battery and data plan lasts longer.

Mobile hotspots let users remotely connect to the Internet without being dependent on possibly unsafe public Wi-Fi networks. With the ability to connect multiple devices to a single hotspot, these devices are an easy way to increase productivity.

We specialize in hardware solutions that improve your bottom line. Call us today for advice tailored to your business and its industry.

Published with permission from TechAdvisory.org. Source.

4 ways to speed up mobile charging

Whether you use an iPhone or a Xiaomi, your mobile will sooner or later run out of battery. When this happens, you want it to be charged to 100% quickly, but not everyone knows how to do it. Read on to learn four ways about how you can charge your mobile faster.

#1. Optimize your phone accessories

One reason why your phone charges slowly is because of poor-quality accessories — such as cables, adapters, and weak sources of electricity.

Cables and adapters

Unless you were careful to take great care of your phone cable and adapter, they might be the reason why your phone is charging so slowly. If you think this could be the problem, we recommend that you change them immediately. After doing so, make sure to use and store your new cable and adapter properly to keep them in tip-top shape.

Charging Source

Did you know that your phone will charge faster if you connect it to a higher amperage charging source? Although mobile phones charge at only 5 volts, depending on the charger you use, you can get amperage from as low as 500mA (milliamps) to as high as 2,100mA. Therefore, it is recommended to forgo charging your mobile device through a computer port (uses 500mA or 900mA) and use a wall charger (ranges from 500-2,100mA) instead.

#2. Clean your phone’s charging port

Another reason why you may experience slower charging time is because of a corroded or obstructed port. If the problem is because of obstruction, get a flashlight, magnifying glass, toothpick, and small brush to completely remove any debris. However, you should be very careful when doing this because the port is very fragile.

We recommend you enlist a professional’s help to clean your port if you’re worried about damaging it or if the problem is due to corrosion.

#3. Background apps

When was the last time you sorted out your phone’s background apps? If you don’t remember, then it’s time to do it! Apps that are opened and left running in the background not only drain your phone’s battery, but also affect your phone’s charging speed. Select “Battery” in your phone’s Settings to find out which apps are using up your phone’s power, and delete them if necessary.

#4. Using your phone while charging

Do you browse the internet while your phone is charging? If yes, then you should stop doing it. Feature-rich apps like WhatsApp and Facebook have been listed as two of the top ten battery draining apps by AVG, which means you may be slowing down your phone’s charging speed when you use them while it charges.

Every successful business needs high-performance mobile phones, but this is only possible if their batteries are juiced. If you want more information about how to speed up charging your phone, contact our experts today.

Published with permission from TechAdvisory.org. Source.

4 reasons for slow mobile internet speeds

Have you ever gotten frustrated with your phone because the browser took more than five minutes to load? Before you start blaming your old phone, check out these four reasons that might be the cause of sluggish internet connection.

Router location

One simple yet overlooked reason why your WiFi-connected phone may be experiencing internet lag is because of your router’s location. Although WiFi has a range of up to 230 feet, the farther away you are from the router, the weaker the WiFi signal. Large objects like doors and walls situated in between you and the router can also weaken the WiFi signal.

It is recommended to place your router in a central location, preferably away from concrete and masonry walls or other big objects like a chimney. As the router signal radiates from all four sides, blocking any side with big objects will impact your WiFi’s signal quality and as a result your phone’s internet speed.

WiFi Noise

Did you know that home electronic appliances emit wireless signals at a frequency similar to your router’s (2.4 GHz)? So before deciding on your router’s location, determine whether there are any wireless devices nearby, as they emit signals that can interfere with your router’s signal. For example, even if the ideal location for your router is at the center of your house, you shouldn’t place it there if there’s a cordless phone nearby.

You can also set your router on a 5.0-GHz band, as this frequency is less prone to interference from other appliances. But before you start tuning it, make sure your phone supports 5.0 GHz; otherwise, it won’t be able to connect to the router.

Slow Network

Another reason for your phone’s slow internet is because of fluctuating network speed. Ask yourself these two questions to know the exact cause of this problem:
How many people are connecting to the router?
What are they doing over the internet?

You should increase your router’s internet bandwidth speed if you discover you have many users and all of them are either streaming movies, or downloading computer games or software updates. This will allow every phone to enjoy faster internet speed.

If you’re outdoors, and you’re connected to a public WiFi, consider using your mobile data instead. You won’t have to share your internet when you use mobile data, enabling you to experience faster connectivity at all times as long as you have a high-speed data plan.

Too much cache

Last, you should check your phone’s cache if fixing your router, network, and positioning doesn’t improve your phone’s internet speed. Cache is a component in your phone that saves data from earlier searches in order to increase the speed of similar searches in the future. Although your phone becomes more efficient for that particular search, it also makes your phone much slower when you do other things that require the internet.

You can clear out your cache manually or use a cache cleaner app to thoroughly get rid of useless cache and optimize your phone’s internet speed. If you decide to download a cache cleaner app, make sure that it is reputable and trustworthy so you don’t accidentally download a malware-infiltrated app instead.

There are more reasons to your phone’s lagging internet speed. If your business relies heavily on fast mobile internet speed and you’re unable to fix the sluggish connection, call our experts today. We’re always ready to help you.

Published with permission from TechAdvisory.org. Source.

How to make Alexa your office assistant

Amazon’s Alexa has come a long way from performing basic functions like setting alarms, streaming music, and providing weather updates, to an all-around office assistant superstar. As Amazon continues to develop Alexa, businesses can expect to see her become more relevant in an office setting.

Create and manage to-do and shopping lists
You have meetings to attend and deadlines to meet. Alexa has a straightforward To-do List feature that helps you stay on top of all your tasks. It’s ideal for busy professionals who prefer a no-frills checklist that allows them to simply view completed items, or to edit or delete items on the list.

You can also seamlessly sync third-party applications like Any.do and Todoist, which offer more features for organizing tasks, adding subtasks and folders, creating reminders, setting due dates, attaching files, and prioritizing items.

To connect to a third-party app:

  • Go to alexa.amazon.com or access the Alexa app
  • Go to Settings > List, click Get Skill
  • Click Enable
  • Log in to authorize the app

Alexa also has a default Shopping List that works exactly like the To-do List. It lets you add or delete items that can be browsed in the Amazon store and searched for in Bing.

Reorder office supplies

Ordering supplies on an Amazon smart home device is especially convenient because you would have already set up an Amazon account. When voice shopping with Alexa, you can either add items to your Amazon cart (“Alexa, add toner to my cart”) or directly order a single item (“Alexa, reorder toner”) without having to lift a finger.

When you place an order, Alexa checks product availability, walks you through Amazon search results, and asks you to confirm or cancel the order. Voice shopping is enabled by default, but it can be disabled in Settings > Voice Purchasing in the Alexa app.

Sync your calendars
One of the best ways to maximize Alexa in the office is to sync it up with your calendars. You can view scheduled appointments, set meetings, or have Alexa read the day’s entries with simple commands like “Alexa, what time is my next meeting?” or “Alexa, when is the company barbecue?”.

To add a calendar:

  • Go to alexa.amazon.com or access the Alexa app
  • Click Settings > Calendar
  • Select a calendar from the available platforms: Google (Gmail and G Suite), Apple (iCloud), or Microsoft (Office 365 or Outlook)
  • Log in to your account

Set a timer
A Pomodoro timer is a productivity enhancement tool that works by prescribing ideal work intervals and breaks. For example, you can set a timer that reminds you to take a 15-minute break for every hour worked, and setting this up in Alexa is easy.

To set a single timer:

  • Say “Alexa, set a work timer for 60 minutes.”
  • After the work timer finishes, say “Alexa, set a break time for 15 minutes.”

To set several timers at once, say:

  • “Alexa, create a work timer for 60 minutes.”
  • “Alexa, create a break timer for 15 minutes.”

The commands we’ve included here work for simple instructions, but you can modify them and use tons of other Alexa commands to suit your purpose. If you need recommendations on how you can work smarter with AI and other productivity tools, get in touch with us today.

Published with permission from TechAdvisory.org. Source.

Are hackers using your PC to mine Bitcoin?

Cryptocurrencies like Bitcoin and Monero are so popular because they’re secure and potentially worth thousands of dollars. But investors and consumers aren’t the only ones interested in them. Hackers are using malicious tactics to steal cryptocurrency, and they’re doing it with something called cryptojacking.

Hijacked hardware
Cryptojacking secretly uses your computer to calculate complex mathematical problems to generate cryptocurrency. They get inside by using phishing emails to lure victims into clicking on a link, which then runs malicious cryptomining programs on the computer. Any cryptocurrency produced then gets delivered to the hacker’s private server.

But hackers have developed an even more insidious tactic. By infecting websites with ads and plugins that run cryptojacking code, any visitor who loads the web page instantly gets infected with the malware, sending their computer’s processor into overdrive trying to generate cryptocurrency.

Unlike most malware, cryptojacking software won’t compromise your data. But it will hijack your hardware’s processing power, decreasing performance while increasing your power and cooling bills. So instead of paying for the computing power themselves, hackers can simply use thousands of compromised computers.

Surge in cryptojacking
It’s difficult to tell how much hackers are making with cryptojacking, but there’s a good chance that this type of attack will be as popular as ransomware was in 2017. In fact, for as little as $30, anyone can purchase a cryptojacking kit from the dark web to force other computers to generate Bitcoin or Monero for them.

According to several reports, even sites like The Pirate Bay, Openload, and OnlineVideoConverter are allegedly using cryptojacking exploits to diversify their revenue streams.

The biggest reason why this is becoming so popular is because it’s a low-risk, high-reward scheme. Instead of extorting money directly from the victim, hackers can secretly generate digital currencies without the victim knowing.

If it is detected, it’s also very hard to track down who initiated the attack. And since nothing was actually “stolen” (other than a portion of computing power), victims have little incentive to apprehend the culprit.

Prevention and response
To avoid cryptojacking, you need to incorporate it into your monthly security training sessions. Teach your employees to practice extra caution with unsolicited emails and suspicious links. Using ad-blocker or anti-cryptomining extensions on web browsers is also a great way to stay protected.

Beyond prevention, use network monitoring solutions to detect any unusual behavior with your computers. For example, if you notice a significant number of PCs running slower than usual, you should assume that cryptojacking is taking place.

If you’ve confirmed that it is, advise your staff to close browser tabs and update browser extensions as soon as possible.

Cryptojacking may seem less threatening than some malware we’ve discussed in the past, but it can incur real power, cooling, and performance costs to your business when several systems are compromised. To make sure you don’t end up enriching any hackers, call us today. We offer hardware solutions and cybersecurity tips to keep your business safe and sound.

Published with permission from TechAdvisory.org. Source.

5 things to do to your new laptop

Getting a new laptop can be very exciting. It guarantees a more seamless user experience with faster speed, more memory, and better battery life. But it’s all for naught if you don’t take certain preventive steps before using your new machine. Discover five things you should do before you start exploring your new toy.

1. Update your laptop’s operating system

One of the first things you should do before using your laptop is upgrade its operating system. Assuming you did not purchase the laptop right when it was released, your laptop will still be running an older operating system. With important patches and fixes released in each new update, it is recommended that you install the latest one to ensure your laptop is free of any vulnerabilities.

2. Remove bloatware

Opening your laptop for the first time, you might notice that there are already several preloaded software in the system — some of which you will probably never use. These are known as bloatware.

These apps take up a lot of your valuable drive space, so consider getting rid of them. The easiest way to do this is by downloading a bulk uninstaller, which allows you to check all the bloatware apps you don’t want and remove them in one fell swoop.

3. Install protection software

It’s no secret that the world we live in is unsafe. And with so much confidential information nowadays becoming digitalized, it is necessary to protect yourself against losing important data from your computer. The solution to this is very simple. By installing antivirus software that can automatically — or manually — scan your computer at a scheduled time, potential attacks can be thwarted before they become more serious.

Not only is your laptop’s data vulnerable to cyberattacks, there is always a chance your laptop can get lost or stolen. While there are preventive steps you can take — such as being mindful while using your laptop in public places — another solution would be to install anti-theft software. Security features such as “Find My Device” for Windows 10 and “Prey” for other operating systems can help you locate your device if it’s ever stolen or misplaced.

4. Optimize your power settings

One of the most frequent problems that laptop users have is that their batteries run out of juice too fast. However, you can actually extend the battery life by making a few tweaks to your power settings.

Reduce your display brightness, but not so much that it causes eye and mental fatigue
Use the Sleep or Hibernate mode for your operating system

5. Set up a backup plan

Imagine spending months working on an important project and suddenly finding it nonexistent the next day just because your laptop crashed. Deadlines will be missed. Profit margins will decrease. Customers will leave unhappy. And if worse comes to worst, you’ll be out of business.

Why add more unnecessary stress if you can prevent it from happening in the first place? By setting up an automatic backup system, you can regularly save all your important files; that way, you’d still have access to the data anytime were anything to happen to the original file.

You can also store all your important documents in the cloud, which ensures access whenever you need, even if your laptop crashed or got stolen.

Getting a new laptop can be fun, but the joy might be short-lived if you don’t set up any preventive measures from the start. Call us for information on how we can help you secure your company’s laptop today.

Published with permission from TechAdvisory.org. Source.

Data safety: The non-technical way

Keeping up with advancements in technology as a business owner is tough, especially when those advancements relate to information security. However, it doesn’t have to be. Here are a few physical security tips you can implement to protect your data before calling us!

Cover up your webcam

There must be some credibility to doing this if Facebook founder, Mark Zuckerberg, former FBI director, James Comey, and NSA whistleblower Edward Snowden all believe their webcams could be compromised. This is not just another paranoid celebrity reaction to ruthless paparazzi, there’s a genuine reason behind it. Kindly take a moment to consider the following scenario: hackers using your webcam to spy on you.

Though it might sound unrealistic, this actually happened on several occasions. Sometimes for purely voyeuristic reasons and sometimes what appeared to be espionage. This is a very real threat with disturbing repercussions. Hackers aim to gain personal information based on your surroundings, deduce your location, as well as spy on the people you’re with, ultimately using this information to hold you ransom, threatening to broadcast your most intimate and vulnerable moments if you don’t pay up.

Fortunately, guarding yourself against such danger is really easy and some painter’s tape over your webcam should do the trick. If you’re not confident about regular tape, you can purchase a cheap webcam cover online or at any hardware store.

Purchase a privacy shield

Think of privacy guards as those iPhone scratch protectors, but with an anti-snooping feature. These are thin covers you put on your computer, laptop or smartphone screen to limit viewing angles. Once installed, anyone trying to look at your screen from anywhere — except straight-on — sees nothing. Privacy filters are commonly used to protect work devices, particularly which display or contain critical files with sensitive data or confidential information. However, less sensitive, personal devices are still vulnerable to ‘shoulder surfing’ — the act of peeking at someone else’s screen, with or without ill intent, which is why we recommend using these protectors on all your devices.

Use a physical authentication key

Requiring more than one set of credentials to access sensitive resources is common sense, and has become standard practice for established online services. With something called two-factor authentication in place, you gain access to your account only after you’ve entered the authentication code, which the website sends to your smartphone once you’ve entered your account credentials. Until recently, two-factor authentication relied mostly on text messages that were sent to mobile phones. But professionals have now realised that phones can be hijacked to redirect text messages.

Moreover, authentication codes can be stolen, or users can be tricked into entering these codes via a convincing phishing website. If you’re looking for authentication services that cannot be hijacked, stolen or lost, your best bet is a USB or Bluetooth key you can carry on your keychain. This means nobody — not even you — will be able to access your account without the physical key. Ultimate security at your fingertips.

If you need help setting up two-factor authentication, or any IT security services, contact our experts and experience true peace of mind as we fortify your data to no end.

Published with permission from TechAdvisory.org. Source.

IT hardware checklist for SMBs

As a business owner, you don’t want to start the new year faced with last year’s hardware problems. And although you can’t leave every issue behind, you can start implementing policies to avoid some of the most common hardware issues you’ve previously encountered. Here’s a checklist to get you started.

✓ Clean up your computer components
Wipe your monitor with a clean, static-free fabric; remove excess dirt from your mouse’s exterior; and tidy up your keyboard with compressed air. Don’t forget your computer tower! Dust build-up can block your computer’s air vent and affect its performance. Ensure that your workstation is getting adequate ventilation and isn’t directly exposed to sunlight and other heat sources.

✓ Manage your cables
If you’re not giving your computers’ cables the attention they deserve, now’s a good time to do so. Other than wiping the thick coat of dust on computers’ cables, consider using cable management solutions that unclutter and untangle messy wires. These don’t just organize and secure your cables, they also help ensure your PCs run quieter and are less prone to overheating as a result of blocked air vents.

Planning to relocate or upgrade in the near future? Organizing your computers’ cables now makes future relocation and upgrading processes much easier.

✓ Review and update your inventory
Keeping an inventory of all your hardware helps you manage hardware lifecycles and purchases, identify items that are near their end of life, and ensure you avoid duplicate purchases of items already in-stock.

Your inventory list should include all owned and leased devices: PCs and laptops, printers and scanners, tablets and smartphones, and modems and other network hardware. Update all your assets’ serial numbers and keep track of their respective users and location.

✓ Printer maintenance
Clean the interiors and exteriors of your printers, including paper trays, which are sure to have accumulated dirt from years of use. You should also repair and/or replace parts and accessories such as printheads and cartridges that are no longer in good condition. Should you decide to do a complete printer maintenance, check for the latest software updates for your printers and install them immediately.

✓ Implement a hardware policy
This is also a good time to create a technology guideline that your employees can follow to ensure they work efficiently. These guidelines reduce the need to spend on unnecessary repairs, keeping the succeeding year’s checklist shorter. With clear instructions on the proper use, replacement, and storage of your hardware and devices, you’ll be better able to manage your hardware for years to come.

With a more organized IT hardware inventory, you have one less thing to worry about. Want to get more in-depth hardware management recommendations? Call our experts today.

Published with permission from TechAdvisory.org. Source.