Today we rely on technology for not only large tasks, automating smaller tasks can free up precious time. Is your business looking for a partner that offers the right solutions? 

We are here to help you grow a successful future, be sure to let us know how we can help.

Below you will find some frequently asked questions, please click the + to expand.

COMPUTERS

I received an exe, zip or doc file through e-mail, is it safe to open?

All files received through emails are potentially dangerous to open even from people you know. Files such as .exe, .zip and .doc can be even more dangerous, as they can be executable or contain executable to install potentially devastating software on your computer. Always question before opening any attachment.


I received an e-mail with a link in it. Is it safe to click?

Anytime you get an e-mail, even from people you know, you should be looking for signs that it isn't legitimate. The from e-mail address is different then the person's name. If you role your mouse over the link without clicking on it, is the website address in the pop-up the same as what the link says it is? Are you expecting an email from this person? Is the from address something generic, like Admin or administrator?


What is Malware?

Malware is short for "malicious software". Malware can include any software program that has been created to perform an unauthorized and often harmful action on a device.

Examples of malware include:

  • Computer viruses
  • MS Office macro viruses
  • Boot sector viruses
  • Script viruses
  • Keyloggers
  • Password theft
  • Backdoor Trojan viruses
  • Other Trojan viruses
  • Crime-ware
  • Spyware
  • Ransomware

What is Phishing?

Phishing is a very specific type of cyber-crime that is designed to trick you into disclosing valuable information; such as details about your bank account or credit cards. Often, cyber criminals will create a fake website that looks just like a legitimate site; such as a bank’s official website.

The cyber criminal will try to trick you into visiting their fake site, typically by sending you an email that contains a hyperlink to the fake site. When you visit the fake website, it will generally ask you to type in confidential data such as your login, password or PIN.


Why do I need to use randomly generated passwords?

A network is only as strong as its weakest password. So, using any kind of proper name or word will just make it easier for hackers to gain access to your computer, server, bank account, e-mail, et cetera. You may find it hard to remember at first, but after a week or two, you will have it down.


 

NETWORK

WAN vs. LAN

WAN - Wide Area Network

  • A computer network that covers a broad area (e.g., any network whose communications links cross metropolitan, regional, or national boundaries over a long distance). Slower speeds than LAN due to longer distance.

LAN - Local Area Network

  • A computer network covering a small geographic area, like a home, office, school, or group of buildings. LAN's can run at higher speeds than WAN due to their size.

What is a Firewall?

As it's name implies, it is a wall between you and the internet. It looks briefly at the packets going in and out of your local domain, and gives each one a thumbs up or thumbs down verdict. Which help prevent outside intrusion attempts on your system.


Exchange In-house vs On-line

Both options are Microsoft solutions, just one is on your server and the other is on Microsoft's servers. For those that need/want Exchange in-house, we can configure this on a physical or virtual server. It will involve purchasing Exchange Server as well as Client Access Licenses (CALs) for the number of mailboxes you will need. Exchange On-line involves a monthly or annual subscription for the number of mailboxes you will need. You can add or subtract mailboxes as needed. Overall we find that the On-line option is more cost effective.