Sunday, July 5, 2015

All things must come to an end . . . Even Windows Server 2003

All things end . . .

Some things seem to last forever.  The Rolling Stones, root canals, the wedding you wish you weren't attending, your first 5K, and the "opening band". 

Other things end too quickly.  Summer Vacations, a good nap, Almond Joy cupcakes and Venti lattes.

But, like the Roman Empire, K-swiss canvas shoes and the Mars bar, everything must eventually come to an end.



Such is the case with the established reign of Windows Server 2003 in the workplace.  On
July 14th, the entrenched on-premise operating systems will drop out of extended support by Microsoft.  

What does that mean exactly? 
Well, it means that Microsoft will not provide support or security updates for any version of Windows Server 2003.  This is essentially a death sentence for servers running 2003, because any new security vulnerabilities will, from July 14th, go unfixed by Microsoft.

For 15 years, many businesses have built their critical infrastructure on Server 2003. And believe it or not, a survey done in March of 2015 showed that 61% of businesses still use Server 2003!  This represents a massive opportunity for IT companies as the "Great Migration" takes place in the coming months, and a massive challenge to businesses that didn't see this coming early enough to craft their plan.

So what should you do if you find yourself to be one of the businesses that relies on this reliable but aged operating system? 

DON'T PANIC!  

We're here to help.


  1. Scope it out
  2. Get some help
  3. Make a Plan


Scope it out:
First, the IT industry has changed beyond recognition since Server 2003 became popular and gained its foothold.  That means that right now, you have some choices to make. Your migrated infrastructure will likely look very different than the one you've had for the last 10+ years.

There are many cloud options that could change (for the better) the way you store and access your data.  You will be considering virtual servers, cloud storage, online backup systems, virtual desktop and many other factors before you decide on the final migration strategy.

But cloud isn't the best solution for everyone. The best thing for your business may be to keep your systems on site and deploy Windows Server 2012 to new or virtualized hardware.  How do you decide? Read on . . .

Get some help:
You wont be able to navigate the available options without a good consulting partner or your IT department.  Talk to someone who will take the time to learn about your business and select the course that is best for you, leading to higher productivity, lower costs, and overall better return on investment.


Make a Plan:
Regardless of which direction in which you decide to head, start making your migration plan.  This plan will include where your data is stored, how it is accessed by your users, how it is secured and backed up, and disaster recovery procedures.


In conclusion . . .

All of this may seem confusing.  Seek out help from your local IT professional, or if you want to talk to us contact us via dm @availabletech or http://available-tech.net.

So yes, change is inevitable.  However, in many cases, like VHS tapes and encyclopedias, you will find that the new way of doing things is better for you and your business. 

Sunday, June 7, 2015

IT Security - Quick and Dirty Password Security


Quick and Dirty Password Security: Best Practices for Strong Passwords
 
 

Sometimes I feel like Noah.  I preach network and password security all day every day, and most of the time people don't believe a breach could really happen to them.  They are warned that rain is coming, but no one believes it until they hear thunder and start getting soaked.

I am a certified Payment Card Industry Professional, as well as an Apple Certified Support Professional and a CompTIA S+ certified security advisor. I work with small businesses and CEOs spend a lot of time talking to clients about security. We get calls from business owners and entrepreneurs on a daily basis with reports of being hacked, or having accounts compromised.  From business loans taken out fraudulently to faked documents that caused vendors to make payments to fraudulent offshore accounts, we have seen just about every variation of hack out there.  However, there are new trends in hacking of which to take notice, and I wanted to take a few minutes to answer the most common password-related questions we hear.

With the recent reports of public figures being hacked and their digital assets being sold on the black market, I have seen a lot of advice from folks as to how long your passwords should be, how often they should be changed, and whether or not to use a password manager.  This is all a bit confusing, and I feel that many users are receiving advice that may not necessarily be incorrect, but doesn't quite inform the user well enough to be able to decide for themselves and understand the reasons behind the suggestions.

So for this article I would like to give you real password and security best practices based on the leaders in the industry and the rules for compliance and safety generally observed in secure environments.

I advise clients based on principles that the leaders in the IT security industry have created to facilitate secure networks. The cues for our field are based on "compliance" requirements, usually HIPAA (Health Insurance Portability and Accountability Act) and PCIC (Payment Card Industry Council) which have been determined to be most secure.  I say this so readers know that what we outline below isn't an opinion, but is based on the rules companies are required to follow in order to be considered secure. 

Ok, with the boring stuff over,  let's talk security!


What makes a good password?
  • The standard for PCI is AT LEAST 7 characters long. 

  • The password should contain 4 types of characters; uppercase, lowercase, punctuation, and numbers.

  • The password SHOULD NOT contain a dictionary word.  If it contains a word found in the dictionary, even when combined with numbers or punctuation, the time taken to crack the password is drastically reduced.

  • DO NOT repeat passwords you have used in the past. In general, do not repeat any of the last 6 passwords you have used. 

  • You should change your password every 30 days. Now, this is the standard, and I am often asked "Does anyone actually do that?" The answer is yes, but most settle around changing the password every 90 days.  It's up to each user to determine the level of acceptable risk.

  • Whatever system you are connecting to (social media, server, service, etc) should lock the user out after 5 attempts.  Many services do not comply with this yet, but we are starting to see a shift to better lockout policies.

  • Each service such as Facebook, Dropbox, iCloud, etc should have a unique password.  This means no using the same password for everything you sign into!

  • You should not allow your device or browser to "keep you logged in"

  • ALWAYS use two-factor authentication if it is available. Two-factor authentication is logging in with more than one challenge, such as, one password dialogue followed by a security question.  This type of authentication is exponentially more secure.
In addition, contrary to many opinions, a password CAN be too long.  If the password is so long that you can't remember it, it is not a good password.  A secure password should only exist only in your head. If you have to write it down, it is a bad password.

An executive once told me that his password was impossible to hack. 24 characters long, 4 types of characters, unbreakable. I took a quick look at his desk calendar and saw a 24 digit string with 4 types of characters. I asked "Is that your password?"  He grinned and admitted it was.

Any stored or written password is a bad password.


What about password managers?

This is a topic that invites many different opinions.

A password manager program is an app which encrypts and stores all your individual passwords in a digital lockbox protected by a single password or two-factor master password.

Some people, including IT security experts and CIOs, swear by password manager programs, and others would never consider using one. So with opinions so firmly divided, let's look at the reasoning.

Many well respected IT leaders say that there is "no viable reason" not to trust a password manager application.  Many apps use two-factor authentication for the master password to access other stored passwords.  This is great, but for every person in the industry that advises the use of password managers, there are at least as many professionals who can't make that recommendation.

Regardless of encryption used, or multiple factors protecting the password program master password, there is still a single password protecting the rest of your passwords.

Think of it like this: if your kids are in your house and danger is outside, would you rather have a different key for each room in the house, or two keys for the front door with all other doors unlocked?  To many security professionals, password managers represent exposure to unnecessary risk.

In general, the prevalent opinion is that storing or saving a password in a password manager program is the same as writing it down. Written passwords are considered insecure, so most IT professionals will not consider password managers as an option.

Let's go to compliance standards for the tiebreaker.

Based on PCI and HIPAA compliance standards, password managers are not allowed.

I asked my two boys, 15 and 13, which they would rather have: 5 treasure chests locked with a key for each, or one chest containing the loot from all the others, with that chest being locked with 2 keys. The youngest said, "It sounds like with one chest we are saving the thieves a lot of work. It's easier to find 2 keys than 5."  This makes sense to me, and that's one of the reasons why I don't recommend password managers to any of our clients.


Please feel free to shoot any security related questions to @availabletech on twitter and pick up my Small Business Security book next month from Amazon or http://available-tech.net.






Friday, May 29, 2015

Entrepreneurs: How to be the Leader of You


Be The Leader of YOU



In a small business, YOU may be the only representative of your company that your contacts ever see. (YOU may be the only one there is!) You may not have a staff to inspire and lead, but YOU are always the leader of you.  

As a business owner or freelancer, you have lots of challenges.  But when YOU are prioritizing, these should be at the top of our list:

  • Keeping yourself motivated
  • Maximizing every client interaction, every networking opportunity, every conversation and closed deal to make them PROFITABLE, not just PRODUCTIVE


So what are the most impactful ways YOU can maximize YOUR business behaviors to build a following and not only satisfy your clients, but recruit them to actively bring you more business?


Walk the Walk, Talk the Talk:

YOU may be the only person in your organization, but you can still be a leader . . . a leader of YOU!

Deliver the goods: There’s no one to pass the buck to, so YOU must deliver!

Stop listening to yourself. Start talking to yourself.  Plenty of meetings have ended with my inner self saying "They aren't the ideal client. Don't bother following up with them." or "Take it easy this afternoon. Don't make that new client contact. It can wait."  That's when you say "self, shut up!" Carry through with the behaviors you have identified as necessary to make or break your success.

Constantly improve:  Are you better at your job today than you were a month ago?  If not, you may be stagnating.


Treat Yourself Like a Brand:

Big companies develop loyalty and brand recognition by strategically promoting the features and benefits of the brand. Since you are the brand, promote yourself!

Ask yourself:

What sets YOU apart from competitors or colleagues?  Not what sets your product or company apart, but what sets YOU apart?

What have YOU done lately that is outstanding? Personal service? Extra mile? Unique product or delivery? Nothing? Then ask yourself why.

Would you want to be your own customer?  Put yourself in the shoes of your most recent client.  Would YOU give yourself repeat business?

What would you like to be known for? I like to think of it this way:  What habit, or unique character aspect would you like to be Famous for?  Do something well enough that, if the world knew, YOU would be on the news tonight.


Be Selfish!

You may have noticed that in this post I have emphasized "YOU." That's exactly what I want YOU to do!

Develop your skills - Personal development is important. Read books, meet with other business people, find a mentor.  Work on yourself every day. Assess and adjust to what you find.

Focus on YOU! talk about you, establish yourself as an expert in your field through a youtube channel or blog. Become a guest blogger for an industry publication or group, write a whitepaper. Teach a class or do a local radio show.  Tell people what you know.

Promote yourself – network more and do it on purpose.  Find a local peer networking group that is serious and selective about membership, like I Got a Lead For You.  It will be the best money and time you spend for your business.

Speak with authority – Be powerful in speech and actions. If you get a chance to tell others about what YOU do, don't hold back.  Let them see your passion and make them feel how sincere you are in the belief that there is no one better at this than YOU.   And if you don't believe it, don't say it.


Finally, start focusing on YOU with this exercise:

Write your best feature / benefits in 25 words or less. Read it out loud. Ask others to read it and see if they agree. Have someone else write it for YOU.  Do this every few months to take your motivational pulse.

Start the focus on YOU today. Let me know how it goes @availabletech. If I don't get back with  you right away, its because I am busy working on ME!

Saturday, February 14, 2015

Small Business Technology Concerns for 2015. What Should you be doing this year?

Available Technology Inc consults with clients, provide hardware and software, and delivering support so our clients can reach the specific goals they have set for themselves and their businesses.

I am a small business owner and I work primarily with small business owners. Every day my team of technology professionals talks to entrepreneurs about technology and how it relates to their businesses.  We spend most of our time addressing the concerns and questions of business men and women who have no idea what they can or should be doing with the technology direction in their business. It's my job to help them make those decisions.

We have many clients, and each year we look back at each client’s history and assess new trends, new products and new services that we feel would help clients have better control over your environment, gain more productivity, or allow us to provide better service.  In 2015 there are several new developments of which every small business owner should be uniquely aware.  Here are the top technical concerns and opportunities of our clients for 2015.
 
-------------------------------------

Firewall Security
 
Security is a major concern for small businesses this year.  Once upon a time, a small company could stay "under the radar" and feel reasonably confident that they would not be a hacking target.  With recent breaches, however, we have seen that hackers have changed tactics to attempting to breach smaller companies in order to access larger companies through the less secure networks of smaller businesses. 
 
These new threats have caused us to raise the bar on our minimum security recommendations to include a business class firewall that provides active intrusion detection and prevention.  Active Intrusion Detection, a requirement for HIPAA and PCI compliance, allows the firewall to monitor all traffic coming into or going out of your network.  It identifies traffic that looks malicious, and notifies your IT personnel as well as actively blocks the attacker from continued attempts to cause mischief
 
If you have a router that is off-the-shelf, then you do not have the minimum recommended security level for businesses.   No matter your size or revenue, a business class firewall is the best baseline for network security.

 

Workstation Real-time monitoring and asset tracking
 
Downtime continues to be less tolerable with every year that passes. Small business owners demand, and can expect, nearly 100% uptime if certain systems and measures are in place.  One of these measures is real-time monitoring.
 
For years, we have provided real-time monitoring for servers.  If certain key parameters go out of spec (temperatures run too high, hard drive failures are imminent, antivirus fails to load or update) your IT team is notified immediately.
 
But now, the same type of proactive service is becoming standard on every computer and device in the modern office.  Business owners want each user to have the benefits of real-time monitoring and proactive error correction that come from having an IT professional with their finger on the pulse of each piece of important computer hardware.
 
 

PCI Compliance
 
If you take credit cards in your business, your merchant services provider will probably be sending you a Self-Assessment Questionnaire (SAQ.)  Starting in June of this year, several IT security recommendations that were suggestions in previous years will become mandatory.  Non-compliance will result in additional fees from your merchant services provider or bank. 
 
Make sure you have an acceptable level of IT security precautions in place before you receive the questionnaire!   Available Technology is certified to facilitate secure environments by the Payment Card Industry Security Standards Council.  We can come in and do an audit of or business to provide recommendations for passing your self-assessment the first time.  Providing the hardware, software and training you need to be secure is also part of our service.  We also provide SAQs that are pre-filled out and can be put on file for when you need them.

 

Windows XP Migration
 
Windows XP has been out of support with Microsoft for over a year now, although we still have many clients who still have at least one XP machine in their company.  If you are still on Windows XP in your office, it's time to migrate over to a faster and more reliable operating system.  With every day that passes, XP is becoming less secure.  You'll get better security, time saving features and greater compatibility with newer systems.  Make the jump to newer technology now, before a problem arises.

 

Mobile Device Management
 
This is one of the most important and relevant concerns for smaller businesses.  While big business has been forced by users to allow "BYOD" (Bring Your Own Device) access to their networks and data, smaller businesses are increasingly seeing the need to make all types of devices, whether they are mobile or stationary, fit seamlessly into their corporate infrastructure. 

With more businesses deploying mobile devices, it has become important to have a system in place for controlling and securing those devices.  We implement mobile device management systems which allow for password and access control, antivirus enforcement, remote location and remote wipe / lock for just about any phone, tablet or mobile computer.


Microsoft Office refresh

Still running Office 2007 or 2010? Consider upgrading to Office 365 or Office 2013.  There are major changes going on in the software industry right now, and we can help you navigate those changes and choose the licensing model that works best for your business and your budget.


Cloud Integration:

Over 70% of small businesses use some sort of cloud service in their business infrastructure.  It's hard for business owners, without the aid of a CIO, to decide which is the right direction to make a commitment to.  Google Docs, Office 365, Dropbox and many other solutions have advantages and disadvantages that many businesses realize only after committing to a product and migrating data.  And the truth is, a cloud solution IS NOT right for the majority of businesses.  Talk to a professional integrator like Available Technology Inc before forging ahead with a cloud integration plan.


Apple Integration

Apple is gaining market share in certain markets, and employees want to use iphones and Macbooks on your network to access your company files.   Apple devices have a whole different set of security and usage concerns than Windows based systems do, so it is critical to know how to keep your data safe while allowing access to this new breed of devices.

------------------------------------------------------
While 2014 was referred to as "The Year of the Cloud", 2015 will be characterized by a return to ground level security changes for smaller businesses as they find themselves needing to be as secure as much larger enterprises.  With businesses allowing users to work from remote locations and fast internet access nearly everywhere, mobility will be a major trend this year.  Newer types of devices, like Macs and Chromebooks, will of necessity be allowed to connect to corporate data that they never had access in the past.

2015 will be a fantastic year, full of changes and improvements to small business IT.  Make sure you are embracing the change and not hiding from it!  It is this constant climate of change that gives you opportunities to increase profitability and address old concerns in exciting new ways.  If you need help, please contact us at http://www.available-tech.net.

 
 

 

Upgrade in a Tough Economy? Part 1 - Ideas to maximize productivity when business is slow. Available Technology Inc

Upgrade in a Tough Economy? Part 1 - Ideas to maximize productivity when business is slow.


"Go get something else." That's what my friend Kristen said to me as stepped up to the register. For a second or two, I was confused. Was I not allowed to purchase this item? Was I ,in fact, finally blacklisted at the Gap for some gross fashion infraction? After searching my memory banks for an appropriately witty retort to this unexpected comment, the most eloquent response I could muster was . . . "huh?"


Kristen then explained to me that if I spent $5 more, I would get $25 off my purchase. I mopped my brow, sighed with relief, and then, of course, I went and grabbed a pair of socks.


We hear this so often that we don't even notice it anymore. Buy an electronics item and you will be asked to add on the extended service plan. Super-size, Biggie-size, or Bucket-size your order for a few cents more. We instantly size up the value proposition, and determine whether the investment will yield an acceptable ROI for the purchase price paid. Well, maybe you don't think quite that far into it, unless you happen to be a financial analyst or a college economics professor.


But the premise is the same. In some cases, it really does make sense to spend a little more to receive a significant benefit. That money spent might give you piece of mind, a longer lasting product, or just more fries, but if you perceive the value you are receiving as more significant than the cash you are letting go of, then it makes sense.


Apply this concept to your computer. Between home and work, adult Americans use their computers approximately 8.4 hours per day. If you were able to increase productivity by 10%, either by speeding up or replacing your equipment or by learning more efficient use of your software programs, each adult could save nearly an hour per day. That means going home an hour earlier, adding one extra hour of productivity to your day, increasing employee output, decreasing overtime expenses, and improving morale.



There are many inexpensive or free steps you can take that will give you a real and significant increase in productivity from your current technology. This is part 1 of a 2 part series on taking small steps to gain big increases in computer peformance. Next month we look at software, but here are some hardware ideas that will make your computer use more fulfilling (or less painful) both at home and at work.


Don't get me wrong: if your computer is too old and slow, you're going to have to replace it. But if your equipment is only a couple of years old, there are plenty of things you can do to help it along.

----------------------------------------------------------------------

- Add Memory

The single most impactful action you can take is to add more memory to your computer. Study after study has been done, and this has been proven without exception. Want to be more productive and speed up your computer? Add More RAM !!



RAM, or Random Access Memory, is like desk space, while hard drive storage, what some people refer to as memory, is more like a filing cabinet. When you buy a new program and install it, the files get copied into the "filing cabinet" or hard drive storage. The bigger your hard drive, or filing cabinet, the more programs, music and pictures you can store. When you double-click the icon and start the program, it loads into RAM and operates there pretty much the whole time you use the program until you close it.



Starting a program is like opening a folder and placing it on your desk. you have a limited amount of desk space, and once the desk is full, you have to start putting things away so you can open new items. This extra activity slows you down, as the data is SWAPPED or PAGED into and out of RAM to a special area of the hard disk called the "paging file." This area of hard drive space emulates RAM, and allows program data to be taken from memory temporarily so other programs can take advantage of the RAM while the paged application is not needed.



For Windows XP you should have a minimum of 2 Gigabyte of RAM, and for Windows Vista, you need at least 4 Gigabytes. If you have less than this, you are wasting computer performance.



Memory upgrades can cost from $35 to $100, but at twice this cost it would be still worth the upgrade.



To find out how much ram you currently have, open Windows and go to the control panel. Find and open "System" and the amount of RAM should be listed. This area also lists processor speed, both rated and actual, which we will talk about later.



- Swap Bad Disk Performance for Good

Speaking of swap files, the wrong sized swap file can rob your system of performance and bring you to a crawl.


The formula should be the amount of ram you have installed, times 1.5. So, if you have 1GB total RAM, your swap file should be 1.5GB in size.


To check this, go to the control panel, then System, then Advanced. Then choose Settings under the Performance section and click Advanced and Change under Virtual Memory.


The maximum size should be 1.5 times your RAM. If not, set it to system managed size or type in the desired maximum size.



- Defrag your Hard Drive

The term "fragmentation" stirs up images of hand grenades or cracks on a parched desert floor. Although there are no physical fragments on the disk surface, those images aren't very far from what actually happens to your hard drive over time.


Fragmentation concerns the way files, from programs and data, are laid down on the hard disk.


As you open programs and read and write data onto the hard disk, that data doesn't always get put back in the same place. Back to the filing cabinet analogy . . . it's like taking the pages out of a file folder and distributing them among all the other folders in the cabinet. So to open the entire file, your hard drive has to go back and forth across the disk platters until it gathers all of the parts of the files you need before it can begin.When you hard disk becomes fragmented it makes the hard disk work harder.



Luckily, Windows comes with a built in defragmenter. If you have Windows 7 or Higher, defragmentation happens automatically.

On a Mac, files are written to the drive in a different way, and they almost never need defragging.

Using an SSD? Defragmentation isn't necessary.



- Watch Your Hard Disk Space

A full drive can cause major slowdowns. Keep at least 10% of the drive's total capacity free. Empty your recycle bin, uninstall unnecessary programs, and move Johnny's 50GB of music onto an external drive to keep your drive humming along.



You can also use great programs like CCleaner to remove temporary files an folders.



- Install Multiple Monitors (or just get a bigger one)

This is one of my favorite upgrades because everyone that does it has a great testimonial about how their computing lives have changed since the addition of the second monitor.



Researchers at the University of Utah tested how quickly people performed tasks like editing a document and copying numbers between spreadsheets while using different computer configurations: one with an 18-inch monitor, one with a 24-inch monitor and with two 20-inch monitors. Their finding: People using the 24-inch screen completed the tasks 52% faster than people who used the 18-inch monitor; people who used the two 20-inch monitors were 44% faster than those with the 18-inch ones.



This study says that if you frequently compare spreadsheets or copy info from one application to another, then you could save up to 2 hours per day by avoiding task switching or "minimize / maximixe" to see the screens.



To add a new screen you need a second video card, which is inexpensive, and, of course, a new screen. LCD prices have plummeted, so even getting a new widescreen 19" or 20" display will cost less that $200. That investment is definitely worth a gain of up to 2 hours per day.



- Dump Your Bloated Antivirus

Many of the most popular antivirus programs, the ones that always receive the highest ratings when compared to other AV programs tax your system with a major performance hit. These applications are great at catching malignant programs and viruses, but this comes at a cost; if you have one of these programs, removing it will reclaim 15% of system performance.



Is there an Antivirus that is both good and fast? Yes. It's called ESET and we have been recommending and supporting it for all of our clients for the last 8 years. It's $39 per year per user and is nimble enough that it won't slow your system down.



Want to know the names of those slow antivirus programs? Contact me and I'll fill you in!



- Streamline Your Startup

Go to start, then "run" or in Vista type in "msconfig" in the search bar and press enter. This brings up the System Configuration Utility. under the startup tab, look at all the programs that are starting when the computer comes on. I gurantee there will be at least 20% that can be removed. Not sure what to remove from this list? Give us a call!



- Scan Your Drive for Errors

Run Scandisk or Check Disk to check your hard drive for errors

Scandisk is a Windows utility which you can use to scan your hard disk for errors caused by improper shut-downs, viruses, and other problems. It can also clean your hard drive of the miscellaneous errors caused by software conflicts. Using Scandisk will help you check the integrity of a computer hard drive drive to help prevent issues with your computer data. It can also help isolate and correct errors that slow down your computer.



How to run Scandisk:

Close all applications and programs and turn off your screensaver

Click Start  then Run . type in: scandisk

You will have an option of choosing a "standard" or a "thorough" scandisk.

If you have never done a scandisk before, choose the "thorough" option.

Be prepared to wait... this may take awhile!



- Turn off the Sidebar

The sidebar is a cool feature of Vista, but if you don't use its applets, you can save some resources by disabling it. First, right-click it and select Properties. Next, deselect the check box to start the sidebar when Windows starts. Then, close the sidebar by right-clicking it and selecting Close.



- Get Trained

Invest in training for yourself or your employees to maximize the efficiency of the time they spend in front of their workstations. Even after only 2 hours of instruction on an office application, studies have shown that employees experience an average of 20% higher output, and 68% of those trained said they felt more positive about their work and more confident with the application. Tips learned in training WILL save your business money.



In addition, there are plenty of good books you can pick up at Barnes and Noble or Amazon to help you with whatever specific application you need assistance with. My favorite series is the "Teach Yourself Visually" series of books. they allow a user to view pictures of what their screen should looklike while they perform the desired function. I try to give one of these away with every new PC we sell.



- Replace it!

If you try the above tips and still find yourself waiting for your computer to catch up with you, then it's probably time to replace it. The good news is that PC prices are continually falling while software requirements are staying basically the same. This means that a middle-of-the-road computer will perform fine for most users, unless you have specific needs such as advanced photo or video editing or AutoCAD or high-end gaming.



Upgrading to a new PC provides you with a more secure, more energy efficient, faster and more reliable computer. PCs over 1 year old are 50% more likely to experience a major system failure. This triples for systems over 2 years in age. Older software is more susceptible to viruses and other malignant software.



A Special Note for Businesses -



"Good Enough" - If that's how you characterize the oldest computers deployed throughout your infrastructure, those systems may be costing more than you think. When you factor in security risks, high maintenance costs and reduced productivity, refreshing your aging PC base will actually save you time and money.


Even in times of tight budgets, replacing your desktop PCs every three years can simplify management, reduce security risk, and meet business demands for increased productivity. It's a sound investment that pays immediate-and potentially significant-dividends across your home or business.

-----------------------------------------------------------------------

They say that during an economic slump, the companies that find ways to cut costs, while increasing or maintaining advertising and investing in technology that positively impacts their businesses come out of a recession with up to 150% of the business they had going in. Now is probably not the time to put in that indoor pool or bowling alley, but improving your technology infrastructure can't do anything but help in the short and long runs.



Free is good, but in almost all cases, you do get what you pay for. Spending a little on technology can make a big difference in the quality of your computer time and the productivity of your business.



Investing in technology isn't quite like "Super-Sizing" your productivity, but when you get to see companies benefit dramatically from it every day like we do, it makes us think it's not far off.


-----------------------------------------------------------------------

For information on any of the information in this month's newsletter, please call Available Technology at 864.232.1234  or visit http://www.available-tech.net