You see the term “Strategy” and may exclaim “not this again!”. But hold on just a moment. We do not want to scare you into thinking that you need something elaborate and complex to achieve an effective backup and recovery plan. Follow along and in the next 6-7 minutes you will be well on your way to building a backup strategy for your business.
Viewing entries tagged
If you are part of the modern-day breed of small businesses, then it is very likely that your office is predominantly wireless. Wired hardware is giving way to wireless due to its flexibility. Like most startups and small businesses you probably began operations using consumer grade access points that are targeted at home users. When you are starting out, this setup works just fine but the problems start to arise when the number of users gets closer to double digits. The time to upgrade is ideally before you start experiencing network connectivity problems. These are the 5 things you need to know about upgrading office WiFi equipment.
For most small to medium sized businesses, a wireless network has become the order of the day. Running cables throughout the office is not only time consuming but also expensive. A wireless network is cost effective and also a lot less cumbersome to set up. These are the 7 things you need to know about your small business wifi network.
If you’re one of the chosen few who can get your wifi to work well at home, that is one thing. However, when you get ten or more people connecting to a wireless network simultaneously, it can get a little tricky. Whether you have ten people in your office or over one-hundred, the commonality is that the wifi connection in your office is not getting any less important any time soon.
Of all the variety of issues that can plague your computer, network connectivity problem is perhaps the worst. This simple, step by step guide helps you identify and troubleshoot the most common network connectivity problems.
As a small business owner, IT can be a challenge, especially when you have little or no IT expertise. Even though we are surrounded by technology at work and most of your work depends on it, most small businesses do not treat IT as a business priority. Restrictive budgets and lack of expertise often determines if IT gets requisite resources, if at all. However, as the company grows so do the complexities of managing the IT operations grow exponentially. Fortunately, the picture does not have to be grim. A little planning and advance preparation can go a long way in ensuring that your IT becomes your asset rather than a liability. Here we breakdown some typical IT challenges that small to medium business owners face and share the best practices that can make your IT operations manageable.
The world of digital marketing can be a scary one especially if you are new to it. Terms such as SEO, SEM, SERP, Analytics, AdWords, etc. can put you in a tizzy. Of course there are tons of resources available online that can help but you first need to filter through all of them and as a small businesses owner time may not be a luxury you can afford. Moreover, many of the resources are old and not curated so by the time you get to the end of the tutorial, you may find out that it does not work for you anymore.
Community Service & Teamwork with Non-Profits Part II: dev/Mission and Jones IT, a Full Circle Experience
Marcell Urbina, one the newest IT consultants at Jones IT, kick started his IT career with tech training from <dev/Mission>. They are a non-profit that aims to train untapped young adults for careers in technology in order to build wealth and prosperity in our local communities. This is the story of how he was able launch his career in tech with the help of the partnership between <dev/Mission> and Jones IT.
I’m a pretty lucky guy. I have been fortunate enough to have had many opportunities made available to me throughout my life; I just had to grab ‘em and work hard to achieve success. I believe our local San Francisco community holds a wealth of untapped potential. It is overflowing with people who have the desire and the ability to work hard, but may simply need someone to open that first door to get them barreling down the road to success. When it comes to giving back to the community, my primary focus has been through opening those doors.
If haven’t heard the news, Apple’s new Mac OS High Sierra has a huge security flaw that allows full admin access without a password. Basically if you leave your Mac sitting around, someone can simply go into the user security settings and login easily. We’ve got 3 quick and easy steps for you to prevent and fix this issue.
While the summer travel season is long gone, Thanksgiving and the Winter Holidays are fast approaching so there’s no better time to update your travel checklist with these 4 to do’s before and during your trip. Find out how to protect your data on the road.
Booked flights on kayak….check. Lovely apartment on airbnb...check. Bags packed and ready to go...check. That’s it, right? Well, not quite...we at Jones IT have 4 must have items for your preflight checklist before that business trip or journey of a lifetime.
Keyloggers...trojans...session hijackers...Do these worry you? We cover the aforementioned phishing scams along with a couple others you should learn about with tips to avoid falling victim to these attacks. Find out what you can do to protect yourself by reading part 2 of our phishing blog series.
Ever get an email that's too good to be true? An urgent request from your bank for private information? Message from a relative asking to wire some money? Click on link in your inbox you shouldn't have? These everyday examples of phishing & IT security breaches put your company data at risk along with the possibility of identity theft. Here are 5 things you can do prevent phishing from happening to you!
The internet is a vast sea of information, tools, entertainment, news, and more. It is easy to get lost if you do not know exactly what you are looking for. Here are seven handy websites that I have found useful. Hope you will too!
“I’ve been doing this for a long time, but this is the first time I’m seeing mainstream technology have real applications for people with disabilities,” Karen of SFCD explains. She proceeds to show me how she is able to control just about everything in the room, from the fan to the lights, with her voice or the iPad she holds in her hand. The iPad is running several communication applications that allow her to type out simple sentences telling the room what to do. Karen illustrates this by tapping a few buttons on her iPad, causing it to say, “Amazon, turn on the fan.” Sure enough, the fan across the room turns on with a pleasing whir. This is what assistive technology is all about, and it’s pretty incredible.
We are, essentially, technology guinea pigs. We try out apps, network equipment, computers, and more to find the best tools for the job. Here are some of our favorite lesser known apps.
If you use a computer, you need to care about malicious software. Malicious software is any piece of code designed to harm a computer system and it has been around for a very long time. Viruses have only become more sophisticated and costly, but there are many options for protecting yourself and your business from attack.
Computers are a lot like cars. They’re expensive, incredibly useful, and will fall apart without regular maintenance. You wouldn’t go years without checking or changing your oil, or let the weird noise in your car fester without getting it looked at by a professional. But many people don’t look at computers the same way. They will go months without updating, shooing away notifications, and thinking, “I just spent $900 on this, it should just WORK!” Your car performs a lot better with the recommended maintenance and services, and so will your computer. More importantly, your computer will be much less susceptible to attack.
Your device is the portal through which you communicate with friends, family, and the people you work with. Replacing a device is costly, but you can’t put a price on the data you hold in it. Consider how much worse it would be if someone got a hold of the data you can access with that device: bank accounts, passwords, emails, photos, correspondence with friends, and more. This is precisely why security is important.