Computers, etc.

Of course we get and keep the basics in shape:

  • Computers, printers, etc. and their software
  • Switches, routers, wired and wireless networking
  • Internet connection(s) and firewall(s)
  • Backup
  • Ongoing support

And always with top priority for security.

Computers, printers, etc. and their software

You have a collection of various equipment and its software, probably bought at different times from different vendors and probably in various states of repair or disrepair and warranty.

We get a current inventory, check their current condition, and get and keep them up to date. Out of date versions of some of that software might seem innocuous, but unpatched software is a prime means of attack by hackers, even on systems running anti-virus products. We get and keep that software up to date, serving your staff while blocking attempted attacks.

Beyond that, you might run accounting software, or keep per job documentation, or formal logs of contacts with customers, or sales or repair tickets, or… Whether generic like email or industry-specific, we take care of its installation and maintenance, freeing you to concentrate on using it for what your business is about.

Switches, routers, wired and wireless networking

All those devices and software need to talk to other devices and software, some on-premises, and some across the internet. That’s where switches and routers come in. Mysterious to most people, they are often left in default configurations that make them easy prey for criminal hackers around the world. We get them configured so your people and only your people can get to your resources.

Wired networking is great, but you might have spots where it's hard to run wires to or mobile devices that are not easy to plug into your wired network. Substantial break-ins of major retail chains have been enabled by lame wireless security in mall stores that made it easy for criminals to get what they needed to compromise millions of credit cards, costing millions of dollars and not enough top executives their jobs. We configure wireless networking so only those you want in can get in, and for your visitors we configure guest wireless that allows internet access, but no access to any of your internal resources.

Internet connection(s) and firewall(s)

Typical modem/routers supplied by Internet Service Providers (ISPs) such as Comcast and AT&T include some firewall capability. Their support people can manage those, possibly not in your best interest, and many of them are easy for criminals to beat. Some of them also offer Wi-Fi service to anyone within range of your facility, which is said to be internet-only with no access to your local network for outsiders, but do you want to take that chance? Or get lowered internet performance while your modem/router's Wi-Fi is serving nearby freeloaders? A better firewall is usually in order.

We configure your Internet connection(s) and firewall(s) so your trusted personnel can do what they need to do from the office, home, a bagel shop, a customer or vendor site, or wherever they need to be, safely, while blocking the rest of the world. See our article on Security for details.

Backup

You’re backing up your important data, right? To a device in your office? Have you checked the validity of your backups recently? What if you need to recover a valuable document that you shouldn’t have deleted eight months ago? A hack attack can take out your backup device along with your computers as easily as a fire or a theft. 60% of small businesses suffering such an attack are gone within six months.

Ongoing support

You can drive your car 12,000 miles without changing its oil, but you’ll regret it. All 200,000+ of the May 2017 “WannaCry” victims were running outdated software that should have been updated in March 2017 so as not to succumb to that method of attack. Likewise, it was unconscionable negligence of Equifax in deliberately choosing not to update a critical software component that they knew made that trove of sensitive personal information easy pickings. Sure enough, criminals also knew of that component's vulnerability, wondered if Equifax had chosen not to correct it, checked it out, and scored big time.

Getting and keeping software reasonably current is boring and can feel like a waste of time, but is necessary. Our computers can do it for you, and they don’t get bored. Would you like to know that a tire is leaking air before it goes flat? Our computers can keep an eye on yours and let us know when a hard disk drive is about to fail. Or is filling up. Or you might get better performance with more main memory. Etc.

Always with top priority for security

Gone are the days when viruses were written in their bedrooms by teenagers without girlfriends for the sheer joy of vandalism. There’s money to be made in attack software, and you need more than a traditional anti-virus. We deploy a mix of technologies and recommended practices to minimize your risk. See our page on Security.