Stay Ahead of the Curve with an IT Lifecycle Plan

All appliances have an effective lifespan. Computers are no different. In some cases, parts physically fail after years of service, in others they simply become too slow and too ineffective to keep doing the job. Hardware failures and IT issues can cost big in productivity losses, urgent fixes, and unintended downtime.

Improving productivity and lowering costs are the primary driving factors in why many modern businesses choose to adopt IT life cycles.

IT Life Cycle

The IT life cycle aims to make IT budgets predictable, manageable, and reduce costs across the department.

This process starts with a thorough plan outlining the demands of the business. By looking at how and where equipment is deployed we can make the most out of the resources throughout the business. The first step is to reduce equipment duplicated and underused within the firm.

With a big picture approach, equipment can be scheduled for upgrade or replacement at predictable intervals based on use. With a plan in place, the focus of the life cycle can shift to resource procurement. As equipment approaches the end of its effective lifespan it can be brought in for replacement, repair, and recycling. Old hardware and components are often reused and recycled in new roles as they are decommissioned from their primary role.

By maintaining as many usable parts as possible we help lower costs of keeping efficient hardware in the front line business environment. This approach helps a huge number of businesses keep modern, up to date hardware in crucial roles where it can serve the biggest impact for the business.

Making the most of resources

Computers in a busy business environment will always need eventual replacement over time. It is important to plan and prepare for this end of service life to limit unplanned downtime, increasing costs and losses in productivity. Doing so helps to plan a regular, predictable IT budget, less prone to sudden financial spikes.

The IT life cycle additionally allows the business to stay on top of software licenses, upgrades and Operating System changes. By cycling old and out of date systems from the network, security vulnerabilities are dramatically reduced and easier to patch.

Additional financial security comes from manufacturer warranties for businesses that adopt the life cycle. As new equipment is purchased into the firm, manufacturer warranties provide guarantees about the handling of defects and hardware issues. This warranty may cover all, or most of the duration of the equipment’s intended life cycle.

The extra coverage provides an extra layer of financial protection from unpredictable IT issues.

In control with information

Tracking the life cycle of your own firm provides invaluable metrics about how equipment use and deployment within your own production environment. Armed with this unique knowledge, better purchasing decisions can be made to equip your business with the tools needed to succeed.

Budgets can be put to better use, getting the important high-value resources to the places in the businesses that need it most. The ones where they will generate the most value for the firm.

A key factor in getting the most from your firms IT is making sure the resources put into the company don’t sit idly on a shelf after purchase. The insight gained from metrics related to the life cycle ensure that management stay fully informed.

A complete picture puts your business back in control of its IT by allowing you to choose the best, most efficient, and most cost-effective time to replace critical IT. Firms can plan replacements and servicing outside of busy periods so they can operate without interruption and know their IT is fully serviced when they need it most.

Planning for the future

With a fully planned, fully prepared life cycle, IT budgets can be planned in detail for years to come. Everything from printers to operating systems can be prepared on a tightly controlled schedule.

Businesses worldwide have adopted IT life cycles as a way to eliminate unwanted surprises, lessen productivity losses, and make the most out of IT budgets. Implementing or redesigning your own IT life cycle can greatly improve the way your business operates.

Talk to us about how you currently do IT today and we’ll see if we can’t make the life cycle work for you. Give us a call on 07 855 2169.

How Losing a Mobile Device Puts Your Entire Business at Risk

Losing a mobile phone or laptop is an experience that everyone dreads. The expense and inconvenience of buying a new device is unpleasant, but only represents a fraction of the damage done when a device is misplaced. The cost of data contained within every device can add up to many times more than the total value of the device itself.

Chances are, you already use automatic login on a large variety of online services. Each of these services are vulnerable to an attacker having possession of your device.

Usernames and passwords – An obvious place for an attacker to start is the likely long list of usernames and passwords saved for future use by your browser. This is often done to save time when logging into sites that you visit often. Almost universally, people opt to save login information so that they don’t have to attempt to remember it every time they return.

In only a short amount of time, a browser is trained to log in to your Facebook, cloud storage, and bank details just by visiting the page using your regular device. These details, called up by the browser, are saved in a single list accessible to anyone with access to the device. For an unscrupulous stranger with a found device, this list represents a goldmine of information. Simply by finding a phone misplaced in public they may gain access to a huge array of services.

The problem can be made many times worse where a single password or a combination of similar passwords have been used across several accounts. In some instances, an attacker need only gain access to a single one and reuse the same stolen credentials across many sites and services.

Email – Email accounts are a key target for attackers looking for access to your personal information. It is a service that many take for granted, logging in once the first time they set up the device and using automatic login every time after. It is a service that also unlocks a great deal more than just private messages. Of course, an attacker having free access to read your personal emails is bad news, but with email access a malicious user can gain access to many of the most commonly used web services online.

Using the “forgotten password” button on many sites triggers a response that emails a password reset link to the email address registered on file. An attacker may use this feature to reset account passwords to one of their choosing. Doing this both grants themselves access to your account and denies you access to rescue it.

Contacts – One of the best features of instant messaging is that your contacts know the messages come from you. When a message is sent from your device to someone you know it displays along with your name, details, and likely a photograph too. This can lead to identity theft, one of the biggest concerns of a lost or stolen device.

With contact information already programmed in an attacker has an opportunity to impersonate you when speaking to anyone in your contacts list. Using your identity, an attacker may attempt to steal yet more details about you and your contacts.

Social Media – Your social media accounts are often the face of your brand. They can be a primary way to reach out and contact customers. They are almost always the first point of contact a client has with your business. They are also extremely vulnerable to being hijacked from a stolen device.

Fraudulent social media access can allow attackers to harvest both client and business data. Even without profiting directly, posting privileges can be used to cause irreversible damage to a business.

Protecting your business – Services, accounts, and entire businesses can be put in great danger by something as simple as misplacing an unsecured mobile phone or laptop computer.

We can help you to stay secure and remain in control even in the face of losing a device. Give us a call on 07 855 2169 and let us help secure your business.

How to Tell if You’ve Been Hacked

Being hacked is the single biggest fear of most computer users. Many believe the first sign of strange behavior or errors on their PC is a sign hackers have taken control. But are hackers really inside your machine, stealing your information? Or should we be on the lookout for more subtle signs? What does being hacked really look like?

There is an important distinction to make between being hacked by a person and being infected with a virus or malware. Virus software and malware are automated processes designed to damage your system, steal your data, or both. There are of course ways that we can defeat these processes, but what if we are instead hacked by an individual?

Logins not working

One of the first steps a hacker might take would be to change the computers passwords. By doing so, not only do they ensure future access to the account, they prevent you from accessing the system to stop them. For the hacker, this is a crucial step that keeps them in control. With this in mind, we always want to make sure to keep on top of our own login details and how often we change them.

Security Emails or SMS’s from online services

Many services track which device and location you logged into your account from last. If your account is accessed from a new device or a different country it might trigger an automated email or SMS to ask if this new login is your own.

If you have logged in using a new computer, tablet, or phone; an email that asks “hey, is this you?” need not be cause for alarm. If you haven’t, it may be time to investigate further. This service is an important part of information security. It may be a key first step to identify someone else gaining access to your account.

Bank accounts missing money or strange transactions

Most commonly today, hackers commit crimes to steal money. The end goal for hackers is typically to profit from their crimes by taking money from people online.

It always pays to keep a regular eye on your financial transactions to make sure you know what money is coming and going from your account.

You may see a large sum missing where hackers have attempted to take as much as they can in a single transaction.

Alternatively small, hard to notice transactions may appear. These often account for small purchases where attackers have tested the details they have to make sure they work.

Sudden loss of cellular connectivity

Network interruption is a symptom that few people expect but occurs commonly when hackers attack. Many banks and online services use a security feature known as Two-factor authentication. To do this they send a short code to your phone or app when you log in. Two-factor authentication is ideal in most cases and a great boost to security.

Hackers can try to work around this by calling your mobile service provider to report your phone as lost or stolen. During this call, they will request your phone number be transferred to a new sim card that they control. When your bank sends its regular two-factor authentication code to the number registered, it goes instead to the hacker who may be able to log in. From your perspective phone service will simply stop working.

Keeping vigilant and maintaining security

These are only some of the modern techniques that hackers can try to use to gain access to your accounts. It pays to be extra vigilant and pay close attention to the signs and signals that indicate you may have been hacked.

If you suspect that you might have been hacked, or would like help to prevent hackers in future, call us on 07 855 2169 and we’ll improve your security.

Is A Slow Network Getting in The Way of Your Business?

Very few things in life are as intensely frustrating as slow network speeds. Whether accessing a shared database, sharing files between computers, or sending a file to print; waiting for transfers can seem to take an eternity. Worse still, these business breaks can keep both clients and staff waiting and get in the way of the productive business day.

Every time you save or retrieve files from another computer or network storage device, file transfers have to be made over the network. Depending on your IT setup files can pour over the network with the ferocity of a fire hose, or trickle between machines as if dripping through a drinking straw. Poor network speeds are often a critical bottleneck that slows down the entire IT system. If a slow, frustrating, and unreliable network sounds like your office setup then there are many available solutions we can use to help.

Often, offices maintain networking hardware that is as old as the premises they are in or the businesses themselves. Components can be left in place long after their suggested expiration date. If it isn’t broken, don’t fix it commonly rules as long as some working connection, however slow, still remains.

Yet, outdated hardware in key areas can often slow the entire system down. Even when the rest of the network is capable of ultra-high speeds, a single bad component can bring the entire network to a crawl. Sometimes if it isn’t broke, it still might not be working to its full potential. Even peripheral devices throughout the network can cause traffic to slow. A badly installed device may become lost from the network or send out an overwhelming number of messages that spoils network traffic. Defense against errors and vulnerabilities is more simple than many think. Often just one or two small upgrades is all that is needed to unlock the full speed potential of the network.

For some businesses adding a dedicated server is an ideal solution that can balance the IT workload. Access to centrally shared resources often benefits the entire organization by eliminating redundancy. A network server is built with efficiency and reliability in mind to keep your business running at full capacity. By pooling resources for everyone to use, work is evenly shared and centrally available to prevent bottlenecks in the system. Reduced network loads, improved efficiency, and faster transfer speeds mean that higher productivity becomes the new normal.

Moving resources outside of the office can work for many businesses too. Where high speed, low-cost internet services are available, moving your work into the cloud can be a highly cost-effective solution. Software packages such as Quickbooks offer finance and accounting packages for operating in the cloud. Similar Suites such as Microsoft Office offers services for creating and sharing documents with cloud resources. Both packages eliminate the need for many of the network operations that we use every day.

For many applications such as Quickbooks huge databases sometimes gigabytes in size are required. It is these types of applications where the advantage of the cloud becomes clear. To use this locally, huge database transfers keep the application up-to-date daily.

These transfers across a local network are time-consuming and clog up vital resources for the firm. Yet, the same application in the cloud requires only a simple web page for each user. Instantly, looking up finances and editing documents becomes as simple as checking your email. With services moved to the cloud purchase cost and maintenance of expensive network hardware are reduced too.

A complete network solution that works to make the most out of all the available resources is unique to every business. Only a tailored solution to address your network needs will increase your productivity.

If your IT is starting to get in the way of your business and your network is running too slow, give us call on 07 855 2169 and we’ll see what we can do.

Why 2-Factor Authentication is Important

You hear about hacks all the time. The news covers major websites who have had data leaks containing your email and password. Computers get infected and capture your login details for bank accounts and credit cards. In the worst cases, identity theft occurs because it is an easy crime to commit with a high reward.

In 2018, the passwords you used to trust to keep the bad guys out of your accounts are not enough anymore. Cyber attackers now use methods such as phishing, pharming, and keylogging to steal your password. Some have the power to test billions of password combinations.

If you’re like the majority of people, you use the same password for several websites. That means anybody who has figured out that password has access to everything you’ve logged into with it. In a time when it is extremely easy to look up what a person named their first pet or high school mascot, security questions aren’t much help.

Consider how a jewelry store operates. They don’t simply keep their valuables locked away with one key. There are alarms ready to be triggered, motion detectors, and sometimes even bars on the windows. Your data is valuable, just like jewelry. You need more than one line of defense to protect it.

In the computer world, your second line of defense (after your username and password combination) is called “2-factor authentication.” Sometimes referred to as multiple-step or multi-factor verification, 2-factor authentication is a way to double check a person’s identity. This can be enabled every time a person logs in or just under certain circumstances. For example, signing in from a new device or different country might trigger 2-factor authentication.

Many of the services you may already use, such as Facebook, Gmail, Xero Accounting, and more, have 2-factor authentication options. If your bank has ever sent you a special code through text or email to enter before logging in, you’ve already used a type of 2-factor authentication. They can also be in the form of a smartphone app or a physical electronic dongle.

2-factor authentication is absolutely crucial for online banking, email, and online shopping such as Amazon or PayPal. It’s also a must-have for cloud storage accounts (like Dropbox or Sync), password managers, communications apps, and productivity apps. This is especially true if you frequently use the same passwords for different websites and apps.

Some may consider 2-factor authentication unnecessary for social networks, but these are actually very important to keep safe. For ease, a lot of websites and apps allow you to sign up through your Facebook or Twitter account. You need to keep these networks safe so that somebody with your password can’t suddenly get into every account you have linked.

The point of using 2-factor authentication is to make hackers’ lives harder and prevent them from getting into your accounts. If they have captured your login username and password, they still need a second device to get in, especially when the computer or phone they are using has never logged into your account before. This makes it significantly more difficult for anybody to breach your account.

Plus, if you receive a notification with a special code to enter for logging in, and you weren’t trying to log into that account, you have a good signal that somebody else was trying to get in. That means it’s time to change that password and be grateful you had 2-factor authentication.

It’s unfortunate that there is currently an abundance of skilled hackers ready to take advantage of those unprepared. Luckily, you can still stop them -even if they have your login information at hand. 2-factor authentication is one of the easiest methods to keep your accounts safe.

Give us a call on 07 855 2169 to help secure your business and accounts.

Is Your Business Ready for Business-Grade Wi-Fi?

In today’s business world, having great Wi-Fi isn’t a luxury -it’s a necessity. Businesses, with their varying needs, have personal requirements for what constitutes great Wi-Fi. For some small businesses, consumer-grade Wi-Fi may be sufficient, but many find that business-grade Wi-Fi is more appropriate. As companies grow, there becomes a tipping point where business-grade is necessary. So how do you know if your business is ready for business-grade Wi-Fi? Ask yourself the following questions to find out.

How many devices use your Wi-Fi?

It used to be that only desktop computers connected to your Wi-Fi, but that is no longer the case. With the rise of portable devices such as smartphones, tablets, and laptops, each person may be using your Wi-Fi from several devices. Consumer-grade hardware is designed for just a few people (like the amount that live in a single household) but can’t manage larger amounts of users and all of their devices. This is especially true for sustained usage. Remember that your employees aren’t the only people who expect to be able to connect to your Wi-Fi. One of the first things visitors typically do is look for a Wi-Fi network to connect their smartphones to.

What is the size and shape of your workspace?

The number of access points you will need for your Wi-Fi is dependent on the amount of physical space that needs to be covered, the shape of the area, wall material, and the number of users/devices. In smaller spaces, consumer-grade Wi-Fi is good enough. Larger, oddly shaped spaces benefit from business-grade. If your building’s walls are made of brick, cinder blocks, or cement, you likely need more access points than buildings made of other materials. Make sure you have a strong connection from all locations. It’s annoying to only be connected to Wi-Fi in certain areas of a building and find yourself in a deadzone a few steps later.

Access points for business-grade Wi-Fi tend to be more powerful and flexible. For example, some business Wi-Fi systems can transfer Wi-Fi devices from a crowded access point to one that is less busy. By doing this, everybody’s fast speed remains. If you foresee your range needing to increase, such as renting out more space, it’s easier to add more access points to business-grade Wi-Fi than consumer-grade. Businesses that anticipate scaling up soon are better off with business-grade Wi-Fi.

Do you want guests to have the same quality Wi-Fi as workers?

In households, where consumer-grade Wi-Fi is prevalent, all users share the Wi-Fi equally. In a home environment, if children are slowing down the internet with Netflix or video games, it’s not a big problem. However, a choked business Wi-Fi can cause a lot of problems. Business-grade Wi-Fi allows you network management. You can assign a designated amount of bandwidth to different users so they’re unable to clog the entire connection. You can allow visitors internet access without giving them unlimited access to the network.

How much does the internet affect your employees’ productivity?

For some companies, workers only use Wi-Fi for a few quick tasks. With these types of businesses, if the internet is slow, it won’t have a big impact on how much work your employees get done. Consumer-grade Wi-Fi might be a good choice. For other companies, there isn’t much people can accomplish if the Wi-Fi isn’t working well. The slower your employees work, the less money you make. Wi-Fi troubles can also lead to frustrated, unhappy workers. If fast internet is essential for people to complete their daily tasks, business-grade Wi-Fi is important.

Strong Wi-Fi is a necessity for all businesses. This is especially true for larger businesses that connect a lot of devices (from both employees and visitors) and have a big work area. Also for those where employee productivity depends on a strong connection. The goal is to keep your business-critical technology running smoothly. Consider carefully whether consumer-grade Wi-Fi or business-grade Wi-Fi is the best choice for your business. When you ask yourself the questions above, the answer should become clear.

Is your business’s Wi-Fi struggling? Give us a call on 07 855 2169 to discuss a solution.

Struggling with Email Overload?

Email has allowed us to send and receive messages more easily than ever before. While this is a good thing, it can lead to problems. You may receive dozens or even hundreds of emails in a day. At this point, it feels like you’re wasting your entire day dealing with those incoming messages. Even worse, it makes it difficult to find important messages in your inbox. You can quickly become overloaded with emails.

So how can we deal with this overload? The first step is to reduce the number of emails you receive overall and there are a few ways to do this.

Restrict who you give you email address to It’s important to think carefully about who you give your email to. For example, if you enter a lot of contests, this often automatically subscribes you to several email campaigns. If you type your email into every popup box asking for it, these add up. Reduce who you give your email to.

 

Unsubscribe

Go through your inbox and unsubscribe to newsletters that you never read. If you haven’t opened one of their emails in months, chances that you’ll start to later are low. Turn off notifications from social networks such as Facebook, Twitter, and Pinterest. If you like emails from these networks, then at least adjust the settings so they email you highlights once a week or month rather than allowing them to spam your inbox several times per day.

Do you need that notification?

If you receive emails that contain information you can find elsewhere, switch those notifications off. For instance, you might run an e-commerce site that sends an email for every sale. If your website already has a record of this, you don’t need it in two places. Make sure not to use your email as a to-do list. When you need to remember to do something, put that on a list elsewhere to clear up your inbox. If this is a hard habit to break, at least make a folder for things you need to do and move emails there and out of your general inbox.

Change your email habits

Change your own email sending habits. If a topic is complex and will require a lot of back and forth conversation, consider discussing it in person or over the phone. Sending fewer emails will reduce how many you receive in return. Remember that you don’t need to respond to every email you receive. A response indicates a willingness to continue to conversation.

Resist the urge to send messages with a single word like “Thanks!” or “Ok” and you’ll notice others will stop sending you similar, unnecessary messages. When sending group emails, you can also remind others not to use “reply all” unless it’s information relevant to the entire group.

Start clearing out

Now you can start emptying out your inbox and getting rid of any old emails you don’t need to keep. Delete old calendar invites, advertisements, or any emails where the problem has already been resolved. Respond to any messages that can be answered within only a few minutes. File everything that is left until you have a completely empty inbox. Archive messages where you don’t need to take an action, but you think might be useful. You can search and find these later if necessary. Put other emails into folders based off of the type of email and the priority level.

From now on, all of this can be automated. You can have receipts automatically go into a receipt folder, calendar invites go into another, etc. A cluttered inbox leads to your mind feeling just as cluttered.. Free up your inbox to free up your mind and create more time in your day-to-day life. Let email overload become something of the past.

If you need help with your emails, give us a call on 07 855 2169.

Should You Repair, Upgrade, or Replace Your Computer?

Like many valuable things we buy, new computers suffer from wear and tear over time. Our computers are particularly vulnerable as we have placed more and more demands on them every year. New machines have got faster, quieter, more reliable, and more capable over time. At the same time our own computers have begun to slow and sometimes even stop performing altogether.

There are many ways to address the problem of a PC which isn’t quite performing up to the task anymore. Whether frustratingly slow or no longer working; we are happy to take a look. When you bring your computer to us we will diagnose the condition and find a solution that works for you. Often times the simplest solution works best. A complex problem sometimes only needs a simple repair to get your home computer up and running like new again. Whether a small replacement part, loose wire, or bad connection; we will find and fix the problem to give your familiar, home machine a new lease of life.

Many computers come to us running slowly, taking a long time to start up, or freezing when trying to load files and programs. Often owners have reached breaking point and become convinced the machine is fit for only the scrap heap. In many cases, the problem can be pinpointed to a bottleneck in the system. A single, seemingly trivial, part can be holding up the entire system. Amazingly, upgrading just that one component can make the whole machine run like new again.

Adding memory can provide extra space for programs to run faster. Adding an updated, faster hard drive can allow files to be retrieved without delay. In both cases, a low-cost single component can provide a cost-effective solution that makes an old machine like new again.

In some cases, computers succumb to more major faults. A critical part, difficult to replace, may stop working altogether. A failure of the motherboard for example, the backbone that all other components connect to can be expensive, if not impossible, to fix. Typically, with the fast-paced and ever-changing nature of computing, a motherboard will only house computer parts that were manufactured around a similar time.

A motherboard is almost certain to be incompatible with components built just a couple of years before or after its own design for example. Occasionally even a motherboard failure can be resolved too. In these cases we strive, whenever possible, to find a replacement board of the same generation that will work alongside existing components. The result is a cost-effective solution that keeps cost down by saving replacement parts.

In cases where a like-for-like replacement motherboard is not available, many parts of the computer may have to be replaced at the same time. Often replacement costs in these cases can get close to, or even exceed the cost of buying a new machine.

We would always give advice where it makes sense financially and practically to consider replacing an old machine. Often, in this respect, a home PC can be considered a little like a car. Sometimes a simple, non-expensive, easy to replace component such as the window wiper can fail. While a crucial part to be used for driving; it would be silly to suggest replacing the vehicle once it has worn out.

A window wiper may be low-cost and simple to replace, but if the engine were to wear down or break the solution may not be quite as simple. Attempting to make a 30-year-old car as fast, safe, and reliable as a brand new model generally doesn’t make any financial or practical sense. Sometimes the best course of action to save money and avoid breakdowns is a more up to date vehicle.

In computing, many of the same rules hold true. The best solution in each case is always tailored personally to fit you and your own computer.

Bring your machine in to us or give us a call us on 07 855 2169 to discuss your computer issues. We’ll keep you informed about your machine and advise on the best course of action to get you up and running as quickly as possible.

5 Ways to Extend Your Phone’s Battery

Today’s phones can help us do more than ever before. In addition to making phone calls, we use them to send messages, post photos on our favorite apps, watch videos, play games, and endless other activities. Since our phones can accomplish so much, we’re on them often. That means we’re draining a lot of phone battery. In our busy lives, we aren’t always near an outlet and don’t always have a phone charger ready. If our phones die, we risk missing out on important notifications and being unable to easily communicate with others. So what strategies can we use to extend our battery life?

Check Apps’ Battery Usage

When it comes to battery usage, not all apps are created equal. While checking your email uses a small amount of power, any apps that use GPS drain a significant amount of your phone’s battery. This is because they are constantly talking to the GPS satellites. Check to see which of your apps are draining your battery most and limit usage.

Turn off Wi-Fi and Bluetooth

If you aren’t on your personal Wi-Fi, it’s always good to connect to the Wi-Fi wherever you are. However, this isn’t always an option. When you’re not connected to a strong Wi-Fi, it’s good to turn both Wi-Fi and Bluetooth off when you aren’t using them. They drain a large amount of data because, even when not connected to anything, they are searching for your home’s Wi-Fi and car’s Bluetooth. That’s how they autoconnect when you are back within their range. Downloading podcasts, videos, and audiobooks at home can save your battery when you’re out because you won’t have to stream these items over Wi-Fi.

Lower your Phone’s Brightness

One of the easiest ways to save battery is to reduce how bright your phone’s screen is. The brighter your screen is, the more phone life it is using up. Most phones adjust the brightness levels based on how light your surroundings are. You can override this and turn the level down to save battery. The more you dim it, the longer your battery will last.

Go on Power Saving Mode

When you put your phone in Power Saving Mode, it stops it from automatically checking to see if there are new emails, powers off your display faster, and reduces screen brightness. It also turns off certain visual effects and some other features take a lot of battery. On some phones, it also makes your apps run a little slower.

Buy a Built-in Battery Case

Some people need to use power-draining features often and have phone-heavy lifestyles. If this is you, it may still be a struggle to keep your battery lasting throughout the day. If all of the other options aren’t sufficient, you can buy a phone case with a built-in battery. This extra battery charges your phone while using it making it last longer throughout the day.

While any of these methods will help you extend your phone’s battery, it’s best to combine a few options. Our phones make our lives much easier, but they can’t do anything for us if they’re dead because we let the battery run out. Even more importantly, we want our phones usable in case of an emergency. Luckily, using these methods will help keep our batteries alive throughout the day. Just remember to charge them again at home.

Are you in need of our services? Contact us now on 07 855 2169.

EBOOK: DIY IT – May Cost More Than You Think

[vc_row][vc_column][vc_cta h2=”” add_button=”bottom” btn_title=”DOWNLOAD” btn_align=”center” btn_i_icon_fontawesome=”fa fa-download” add_icon=”left” i_icon_fontawesome=”fa fa-download” i_color=”mulled_wine” i_background_style=”rounded-less” i_size=”lg” btn_add_icon=”true” i_on_border=”true” btn_link=”url:https%3A%2F%2Fwww.spincotech.co.nz%2Fwp-content%2Fuploads%2F2018%2F11%2Fdiy-it.pdf|||”]Are your initial technology purchases not keeping up with your business? In this free eGuide you can learn:

  • How much the wrong technology costs you
  • What you can do about it

[/vc_cta][/vc_column][/vc_row]

The Best Way to Buy New Computers

You’ve decided to buy a new computer for your business, perhaps even a whole set of computers. You can almost taste the excitement as you think about those sleek new machines and how much faster your employees will be able to do their work. There’s just one thing left to do: actually choose which ones. That’s where it gets tricky. Most people pop out to their local retail store and look at the display models, then get overwhelmed when the salesperson starts throwing words like CPU and RAM around. Unfortunately, that scenario almost always ends up with your business having the wrong computer. Here’s why, and what you should do instead.

Most retail salespeople are minimally trained: Unsurprisingly, salespeople are trained to sell! They may have an interest in computers and they’re certainly great at reading the words on the box to you, but that’s the limit of their expertise. Their goal is to make the sale, earn the commission and go home happy. You are getting the computer your business needs and that 100% suits your purpose isn’t particularly high on their priority list. They’re not equipped to deeply understand the way your business works, nor do they have the time to find out. You’re also more likely to be upsold extras you don’t need but will rapidly drain your budget.

Compatibility can be a problem: While you probably know having both Mac and PC can lead to compatibility issues, did you know even switching brands within your PC network can cause issues? There are so many moving parts to your business network, from printers to routers, laptops to mobile payment processors, that anytime you throw a new computer into the mix you could end up with compatibility problems. Salespeople don’t know what your current setup is at your home or business but may still make recommendations based on assumptions and hopeful guesswork. Even the number and types of ports available on retail computers may cause a problem once you’re setting up.

The last thing you want to do is end up with a collection of wobbly adapter plugs as you attempt to course-correct and make do until it’s time for a do-over. Any time your employees need to go off-book and create workarounds, efficiency is guaranteed to take a dramatic hit. It’s best to skip the drama and get the right computer first time around.

Support could get tricky: Your IT provider will often stick to a handful of vendors to ensure all parts are kept uniform. That way we know which parts will work together, and should something fail, we can usually get replacements quickly. We’ll often have special relationships with parts vendors, and can get special pricing, extended support and upgrades that a salesperson can’t match. Your IT budget goes further with your consultant, and not just on the day of purchase.

By contrast, when you buy computers through your IT provider, you know you’re getting the exact computer your business needs. We know your business inside and out, including your long and short-term goals. From the first time you work with us, we’ll be sure to do our research before making a recommendation. Remember, you want your computers to last 3-4 years of heavy usage, so it’s also a good idea to buy business-grade computers. While the computers at the retail store are equally shiny, they’re rarely as durable as the ones your consultant can supply.

Your IT provider will also be able to set the new computers up, ready to go with the exact software you need. We’ll strip out all the bloatware (unnecessary programs and trials that come pre-installed) and configure your new computers to work perfectly from day 1. Your employees will be able to enjoy their new systems, take full advantage of the productivity boosts you paid for. That means internet working, internal network connected, programs playing nice with each other, and yes, even printing without problems!

We can help with your next purchase – ask us how by calling us on 07 855 2169.

3 Reasons Why All Homes Should Have Office 365

Microsoft Office has been THE office suite for more than a decade, whether it’s for business or students doing their homework. Other applications have come and gone, but it’s expected that most people will be doing their work in Word, Excel or PowerPoint. While you may have an older version of Office that you love, there are three good reasons you should upgrade to Office 365.

It’s more accessible: Office 365 operates in the cloud, which means you can use your Word, Excel, Outlook and other office products from anywhere. This means no more forgotten homework, files you can’t access until you get to work or lost documents. The cloud has them all ready and waiting for you, wherever you are. Save important files to a USB drive or your computer and use the cloud versions as your mobile copy, there really are no restrictions on how flexible Office 365 can be.

Another benefit is that since it’s in the cloud, the barriers between Mac and PC versions have been erased. It runs on both platforms and on any device – iPhones, iPads, Android, tablets and many other smart devices. A hefty allocation of cloud storage comes with it too, in the form of OneDrive, so you can access your documents from any device. Many people have started using their OneDrive to store all of their important data, including photos, media and recipes. You can even share your files with a simple link, and you always have complete control over who sees what.

It’s more affordable: Previously, there was a large upfront cost per computer and you were stuck with that version until you dug deep and upgraded. For people with more than one computer in their home, for example 2 laptops and a desktop, this was a very expensive way to obtain software. Office 365 has no large upfront costs, no matter how many computers or devices you need to install it on. It’s actually a monthly or annual subscription for a small amount, with no contracts. Depending on your location (pricing differs across countries), you can have five Office 365 licenses for a whole year, for less than the cost of your previous version.

It’s always updated: You are always rocking the latest version of Office. You aren’t stuck with the one you paid for years ago, like Office 2007, 2013 or 2016. Office 365 is always the very latest. If you’re still using an older version, you’ll be surprised by how much Office has evolved. Gone are the annoying paperclip helpers, tacky looking clipart and templates and confusing buttons. Everything is intuitive and easy to use, so you no longer need to take classes or tutorials on how to work it. Even the jargon has been stripped out in favor of human-speak so you can get your tasks done faster and finally break up with the undo button. With the latest features, your files also take on a whole new level of professionalism. Plus, any updates, upgrades or patches happen automatically, so whatever Microsoft cooks up to impress you is added to your Office immediately. In the past, when you upgraded your Office version it was quite the drama and often left your files in a mess. Switching to Office 365 is like a breath of fresh air in this regard, as it’s essentially a sign up and go situation. Older files remain intact, your hard drive doesn’t get cluttered, and you’re up and running in minutes.

With Office 365, you’re essentially getting more while spending less. It’s a popular option for good reason. The fact that it’s always available, always the latest version and works anywhere is reason enough to make the switch, particularly if you have students or work-at-home users. The baked-in security features also mean you’re less at risk of cyber-attack, so you can get on with your tasks and let Microsoft deal with the dirty work. It really is a stress-free solution, saving you time and money.

Switch to Office 365 – call us today on 07 855 2169.