Managed IT Services, Disaster Recovery, Cyber Security, Data Backup Solutions - Springboro, Dayton, Miamisburgh, Centerville, Kettering & Surrounding Areas | Layer 2 Computers, LLC
937-660-4899
  • Home
  • About
    • About
    • Events
    • Employment Application
    • Testimonials
    • Staff
  • Remote Help
  • Services
    • Services >
      • Worry Free PC - Best
      • Virus Free PC - Better
      • Backup
    • Custom Computers
    • Better Wifi
    • Computer Repair
    • Virus Removal
    • Data Recovery
  • Your Home
  • Your Business
  • Contact Us
  • Our Blog
  • 1x1
  • Free Cyber Security Self-Assessment

Repairing Your Computer Quicker for Less

7/29/2019

0 Comments

 
Picture
Have you started to notice your computer's quirks,flaws, and problems growing more severe and more frequent over recent months?  These issues can irritate you daily, stop you from doing critical tasks, and even put your data in danger.  It may be time for a brief service check or repair to get back on track.

When booking your PC in for either an onsite or remote service, you can help your technician get straight to the root of the problem.  A few simple notes is all it takes.  Technicians have a wide range of tools and years of experience to bring an ageing machine back to health. Even with tools and help, without a clear description of the problem, troubleshooting is far more time consuming and expensive.  The best doctors in the world couldn't diagnose a medical condition without a clear explanation of the symptoms.  With just a few simple steps, you can save time and money while ensuring your computer gets every problem fixed.

Take Note of the Problem Every Time It Happens
Some computer problems only crop up every now and again.  A machine might freeze suddenly, or shut down unexpectedly.  Intermittent issues can be frustrating and seemingly impossible to solve, but these occurrences may not be entirely random.  When these events happen, you can help to resolve your issues by jotting down what you were doing and the programs running at the time they happen.  Information about what you clicked on last, or settings you recently changed can reveal unexpected links to the computer's behavior.  Detailed notes help technicians to reproduce the problem and see the crash or error for themselves.  This can lead to faster fixes, more lasting solutions, and less time spend diagnosing problems in the dark.  Simple notes scribbled down on a piece of paper or smartphone app can save you a surprising amount of money.

Keep an Eye on the Environment as Well as the Computer
It's not just things within the computer we need to note down.  External factors can play a significant role in how machines operate.  Hot and humid days have been known to limit cooling on devices already suffering from heat issues.  Even the time of day can raise different computer related issues.  There have been occasions where users have reported problems connecting to the internet around lunchtime every day.  A seemingly strange coincidence with no apparent cause, until technicians dig a little deeper.  Wi-Fi, which relies on radio waves to send and receive data, uses a frequency of 2.4ghz to communicate with devices.  By coincidence, the same frequency is used in concentrated form inside of a microwave to heat food and beverages.  Microwaves, particularly when poorly positioned, or faulty, can cause Wi-Fi issues that disrupt communications every time they are used. Problems that come and go, seemingly randomly, have such a strange link to the computer's environment that they can be very difficult to diagnose.

Take the Right Hardware at the Right Time
Bringing your computer in for repair, whatever the issue, is as simple as picking up the box itself.  We don't need the peripherals such as the mouse, screen, or keyboard unless those are the things causing the issue.  Bringing in a laptop is as simple as carrying it to us, along with the charger.  If you have concerns about how to safely transport your computer, give us a call first and we can advise you what to bring and how best to pack it. 

When deciding when to come in, sooner is always better than later.  Computer issues often get worse over time.  Vents gather more and more dust, fans run slower and slower.  Heat issues drastically lower the lifespan of a machine as time goes on.  A machine that gets less and less stable over time puts your programs and your critical data at risk.  Updates applied over a shaky foundation can cause any number of software issues.  With data, there's often zero warning before it's gone.

Can you afford to delay?

Give us a call at 937-660-4899 to book an appointment and give your computer a clean bill of health.
0 Comments

MSP Facts: Common Managed Service Myths — Busted

7/25/2019

0 Comments

 
Picture
Managed Service Providers (MSPs) are not stuff of legend like unicorns. Yet there are many common myths around managed services. These can cloud the understanding of a MSP’s true value. Consider the facts to decide whether partnering with a third-party IT vendor is right for you.
 
Myth #1: MSPs don’t understand our business.
Not every MSP will understand your business, that’s correct. But not every MSP is the same. The right MSP examines your existing infrastructure and workflow. They'll also meet with your team to understand their needs. Hiring a MSP adds IT experts who can make specific technology recommendations. Meanwhile, your in-house IT team can focus on driving growth.
 
Myth #2: Outsourcing to a MSP is too costly.
Take a look at your IT budget today. Internal IT costs are typically high and often unpredictable. Managed services help you stay on top of your IT costs. Your business pays a simple, manageable monthly or quarterly fee. This makes IT operating expenses easier to budget.
MSPs also provide long-term cost savings by:
  • Reducing applications downtime
  • Cutting costs of IT infrastructure
  • Improving IT team productivity
  • Implementing greater security to avoid costly cyber attacks
 
Myth #3: Only enterprise-sized businesses can use MSPs.
One common misconception is that only big corporations hire outsourced managed service professionals. In fact, small- to medium-sized businesses can benefit more from working with a MSP. After all, large businesses tend to have a dedicated IT to secure data and maintain its systems. Smaller companies have more difficulty competing for IT talent.  Outsourcing gives any business access to skilled IT specialists. They are specialists in securing data, managing networks, and user access. You get top talent and best practices, without having to add employees to your roster.  “Recent market studies show that, when properly executed, managed services for IT can reduce in-house IT costs by upwards of 40 percent while simultaneously facilitating a 50 to 60 percent increase in IT efficiencies.” — Cisco
 
Myth #4: You lose control of your business.
Only if you hand it over to the MSP or don’t effectively manage your partnership with your provider. You should hire an MSP with an understanding of what level of control you want to retain. Lay out the relationship in a Service Level Agreement. This document should outline expectations, roles and responsibilities, and scope of services.  Before hiring a MSP, look at client testimonials. Have others found the MSP works with businesses to only do what needs done? Ask prospective MSPs how they will keep you up-to-date about the work they do. Also, identify someone on your team to actively manage that MSP relationship. 
 
Myth #5: You only use an MSP for security backup.
Sure, backup and disaster recovery, are the primary service outsourced to MSPs. But that is not the only reason businesses turn to managed services. Other common managed services include archiving, networking, application management, and support services.  The MSP does the work your IT team finds tedious and your general employees care little about (but rely upon). Outsource monitoring and maintaining backend technology and routine, recurring tasks. You gain high quality, consistent IT support, and you improve the morale of your overworked, team along the way.  Business today relies on its technology to be successful. Big or small, your business can benefit. Free up internal IT staff to focus on more value-adding initiatives. Take advantage of a MSP's expert help and powerful new technology. 
 
Ready to outsource IT? Give us a call at 937-660-4899.
0 Comments

Four ways to tell you have been hacked!

7/25/2019

0 Comments

 
0 Comments

What is currently the biggest threat to your business?

7/22/2019

0 Comments

 
0 Comments

Is Your Physical Security as Good As Your Cybersecurity?

7/18/2019

0 Comments

 
Picture
Headlines are often made by businesses that have been hacked by "elite" cybercriminals.  These events sound high tech, sophisticated, and interesting but the truth is it's almost always an amateur attacker chancing their luck with an unpatched security hole or bad password.  Physical break-ins affect businesses far more commonly and cause much more damage, but get talked about far less. 

Similar to technology hacks, most physical security threats come from criminals that chance their luck on businesses that look poorly secured.  On a rare occasion, they may strike a business owner that has forgot to lock up or failed to set the security alarm.  By breaking in, these criminals exploit poor physical security to cause damage and steal valuables.  Typically, by destroying or taking critical assets, a criminal may make a few hundred in profit while the total damage done to the business is counted in the tens of thousands.  While most IT security packages act automatically and always remain on, physical security needs to be made a daily habit and require periodic updates.

Threats Starting from Within
Every business should have secure locks protecting their doors.  Many use an alarm system to add protection to valuable assets.  However, there are common threats that neither of these protect you from.  How would your business be protected if the attack came from within? 

A disgruntled employee, or even a former employee, can do an enormous amount of damage to a business.  Attacking their own business, an employee can likely do more damage during the day than a criminal could breaking-in overnight.  Misplaced trust in the wrong individual can result in devastating consequences.

Employees typically have access to one of your business's most valuable assets: data.  A criminal may steal computer hardware to sell for quick cash because most don't fully understand the value of the data stored on it.  
The value of the data in a business machine can easily exceed the cost of the hardware one hundred times over.

Physical Security Heists
For criminals who do understand the value of data; physical security can be the weakest spot in a business’s armor.  In 2013, media streaming service Vudu suffered a break in where criminals stole server hardware to obtain credit card information.  The best security packages in the world are completely ineffective if the keys are left in the door and physical hardware is easy to remove.  This challenge of securing your data can be made even more difficult when using a location that must remain open to the public.

Securing Your Data with Good Security Practices
Keeping your customer data safe is one of the most significant responsibilities small business owners take on.  It requires a duty to employ the best possible security practices to keep your customers safe.  For a customer to have the trust to use your business over the competition, they have to see their concerns put to rest. 
  • Locking down data access for employees so they can only view and edit what is strictly needed, protects both customers and the business against many kinds of damage; both accidental and malicious. 
  • Limiting device access, such as disabling USB ports to thumb drives or storage devices, helps to prevent data being copied and carried offsite.
  • Physically locking down a server where it sits is one of the best deterrents available to prevent against theft.  Locked server racks are an excellent piece of physical security that work on top of the building security already in place.
Make sure your business is up to the task of securing its data. Give us a call at 937-660-4899 to audit both your digital and physical security.
0 Comments

5 Tech Travel Tips You Can Use

7/17/2019

0 Comments

 
Picture
Traveling soon? For most people, this also means making sure your tech is packed and ready for the adventure. Smartphones, ebook readers, tablets, laptops and smart watches are now so light and portable that you’d never think of leaving them behind, plus they can add a ton of value your experience. I just spent about 2 weeks out of town for work and vacation. Here are a few tips to consider before you hit the road.

1.  Backup to the cloud
While you’re jet setting around, relaxing on a beach or hiking your way to freedom, your tech is always going to be exposed to a level of risk. This might range from accidentally leaving your laptop at a cafe to having it stolen from your bag, but either way the problem is the same - your data is now gone. If you’ve backed up your devices to the cloud (like our backup service) you’ll be able to access your files easily and securely from anywhere.
Hot tip: Scan or save important documents like itineraries and passports to the cloud.
​
2. Pack the right cables
Begging random strangers for a loan of their cable isn’t much fun, so remember to bring the exact cables and chargers you’ll need. Most smartphones and tablets use universal plugs like Micro USB, USB C or Apple Lightning, so you can get away with only packing one cable. Many locations now offer powered USB ports but be sure to also pack the right charger as well, it’s a convenience you’ll appreciate. If you’re traveling overseas and the socket is different, remember to pack a plug converter, and depending on your destination, you might even find the voltage is different. It’s a good idea to check whether you also need a voltage converter before you try and charge.

3. Download offline data
It’s no secret that global roaming can give nasty bill shocks. The easy access data you normally use over Wi-Fi or get included in your cell plan has us all accustomed to being connected. While traveling, you might find yourself in a location where data costs a fortune or it’s not available at all. I know I have done that before :( Download any files you might need, including important documents like itineraries and bookings, so that you can access them even without a connection.

4. Update and scan
Just like you’d make sure you’ve got the right vaccinations and travel gear, make sure your tech is ready to travel too. Set aside a few minutes to run updates for your operating systems and apps, as well as your anti-virus. Go one step further and run a manual anti-virus scan too. The last thing you want to deal with one your trip is a cyber attack!  While you’re doing your pro-active thing, turn on password protection for all devices so that only you can unlock them.
Hot tip: Use a complex password that is hard for thieves to guess. If you need help we can always do a remote session anywhere in the world!

5. Mark your territory
Almost exactly the way it sounds, let everyone know this tech belongs to you. Write your cell number on portable devices in case you get separated so whoever finds it can give you a quick call and save the day.  Don’t want to use permanent marker on your shiny tech? Grab some sticky labels you can peel off when you get home.
You can also get little Bluetooth tracking tags to stick to your gear, so that if you ever lose something you can chase it down. Similarly, you might like to consider enabling the ‘find my feature on Apple devices. Having this feature switched on also means you can disable your device remotely, an excellent security option if it’s been stolen.

Need help preparing your tech for travel? Give us a call at 937-660-4899 or contact us here. 
0 Comments

Why do hackers target your business?

7/15/2019

0 Comments

 
Why in the heck would hackers target your business? Well, sadly most businesses are very easy targets for hackers to get in to and the financial reward can be huge for them. Hackers target businesses like your own for the following reasons:

Extortion: Hackers use ransomware or other ways to lock you out of your own files and systems. They then demand payment in order to unlock everything.

Targeting your clients: Hackers will hack you to get to your clients. All they have to do is steal your client email lists or other records to act like you to them.

Business finances: Once hackers get into your network they can easily find out how to get into your bank then transfer large sums of money to themselves.
​
Social Engineering: Hackers can use publicly available information along with information they find on the inside of your computers to target you or companies/people you work with.
0 Comments
<<Previous

    David Trifiro

    David is the managing member and main technology expert at Layer 2 Computers. Read More

    View my profile on LinkedIn

    Enter your email address to get our blog posts directly in your inbox:

    Delivered by FeedBurner

    Categories

    All
    Business
    Check Up
    Chrome
    Internet
    Office
    Ram
    Save Money
    Security
    Speed Up
    Tablets
    Tip

    Archives

    December 2019
    November 2019
    October 2019
    September 2019
    August 2019
    July 2019
    June 2019
    May 2019
    April 2019
    March 2019
    February 2019
    January 2019
    December 2018
    November 2018
    October 2018
    September 2018
    August 2018
    July 2018
    June 2018
    May 2018
    April 2018
    March 2018
    February 2018
    January 2018
    December 2017
    November 2017
    October 2017
    September 2017
    August 2017
    July 2017
    June 2017
    May 2017
    April 2017
    March 2017
    February 2017
    January 2017
    December 2016
    November 2016
    October 2016
    September 2016
    August 2016
    July 2016
    January 2016
    December 2015
    April 2015
    February 2015
    September 2014
    June 2014
    February 2014
    January 2014
    December 2013
    November 2013
    October 2013
    August 2013
    July 2013
    June 2013

    RSS Feed

  • Home
  • Remote Help
  • Services
  • Your Home
  • Your Business
  • Contact Us
  • Our Blog
Services Include: Virus Removal, Networking, Wireless Troubleshooting, Hardware Troubleshooting, Printer Troubleshooting, Small Business Servers, Cloud Services, Computer Tune-Ups, and more!
Area of Service: Springboro, Franklin, Miamisburgh, Centerville, Beavercreek, Middletown, Lebanon, Dayton, Kettering, Carlisle, Clearcreak Township, Waynesville,  Washington Township, and more!
Layer 2 Computers
Privacy Policy * Website by Layer 2 Computers, LLC * 937-660-4899 * Admin * Make a Payment Online