Small Companies Can Benefit From Redundant Power And Internet

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

As a small business owner, you may not have given much thought to the importance of redundant power and Internet connections. After all, you have bills to pay, customers to serve, and employees to manage.

However, if you rely on technology to run your business, it’s crucial to understand why having backup systems in place is so essential.

As we’ve seen recently, power outages can happen at any time, and they can have devastating effects on your business. Not only can they interrupt your operations and cause costly downtime, but they can also damage your equipment and lead to data loss.

That’s why it’s crucial to have a backup power source in place, such as a generator or uninterruptible power supply (UPS).

A generator is an excellent option for businesses that need to keep critical systems running during a power outage. It can provide continuous power for hours, or even days, depending on the size and capacity of the unit. A UPS, on the other hand, is a device that provides backup power for a short period, usually a few minutes, to allow for a graceful shutdown of your systems.

Regardless of which backup power option you choose, it’s essential to test it regularly to ensure it’s working correctly. You don’t want to wait until a power outage occurs to find out that your backup power system is faulty or not powerful enough to handle your business’s needs. [Read more…]

What’s The Difference Between Internet, Intranet, & Extranet?

The terms intranet, Internet, and extranet are often used interchangeably; however, there are some important differences between them. To better understand these differences, it is useful to look at the prefixes.

The prefix intra means within, inter means between, and extra means beyond. So how does this translate to online-based networks?

Basically, the Internet is an open entity that anyone in the world can access. It is open to everyone who has a working computer or device and appropriate Internet access.

An intranet is a private network that is typically limited to authorized users.

For example, most major organizations operate some form of intranet that only employees of the business can access and use. Intranets are usually employed to support a corporate culture and objectives and provide a platform on which employees can share information, communicate, collaborate, and network.

They are generally faster than the Internet because the information is stored on local network servers as opposed to being accessed from data centers throughout the world.

An extranet combines some elements of both the Internet and intranet. It is open to people both within and outside an organization; however, only people who have pre-arranged authorization can access it. An extranet is a restricted network that some, but not all, members of the public can access. A company may develop an extranet to create a mechanism by which it can connect with suppliers, customers, and other external agencies without making the content visible to the general public.

Wi-Fi 6: The Next-Generation Wireless Standard

Frank DeLuca is a field technician for Tech Experts.

Wi-Fi 6 (also known as 802.11ax) is the next-generation wireless standard that is faster than the current king, 802.11ac.

More than speed, it will provide better performance in congested areas, from stadiums to your own device-packed home. Fortunately, it’s coming soon, slotted for a 2019 release.

Wi-Fi will now have version numbers as well. Doing away with those confusing Wi-Fi standard names like “802.11ac,” Wi-Fi names will be replaced with user-friendly names like “Wi-Fi 5” and “Wi-Fi 6.”

Faster Wi-Fi
As usual, the latest Wi-Fi standard offers faster data transfer speeds. If you’re using a Wi-Fi router with a single device, maximum potential speeds should be up to 40% higher with Wi-Fi 6 compared to Wi-Fi 5.

Wi-Fi 6 accomplishes this through more efficient data encoding, resulting in higher throughput. Mainly, more data is packed into the same radio waves. The chips that encode and decode these signals keep getting more powerful and can handle the extra work.

This new standard even increases speeds on 2.4GHz networks. While the industry has shifted to 5GHz for less interference, 2.4GHz is still better at penetrating solid objects. And there shouldn’t be as much interference for 2.4GHz as old cordless telephones and wireless baby monitors are retired.

Longer Battery Life
A new “target wake time” (TWT) feature means your smartphone, laptop, and other Wi-Fi-enabled devices should have longer battery life, too.

When the access point is talking to a device (like your smartphone), it can tell the device exactly when to put its Wi-Fi radio to sleep and exactly when to wake it up to receive the next transmission.

This will conserve power, as it means the Wi-Fi radio can spend more time in sleep mode. And that means longer battery life.

This will also help with low-power “Internet of Things” devices that connect via Wi-Fi.

Better Performance in Crowded Areas
Wi-Fi tends to get bogged down when you are in a crowded place with many Wi-Fi enabled devices fighting to receive and send data. Picture a busy stadium, airport, hotel, mall, or even a crowded office with everyone connected to Wi-Fi.

The new Wi-Fi 6, also known as 802.11ax, incorporates many new technologies to help with this.

Wi-Fi 6 can now divide a wireless channel into a large number of subchannels. Each of these subchannels can carry data intended for a different device.

This is achieved through something called Orthogonal Frequency Division Multiple Access, or OFDMA. The Wi-Fi access point can talk to more devices at once.

The new standard also has improved MIMO, or Multiple In/Multiple Out.

This involves multiple antennas, which let the access point talk to multiple devices at once.

With Wi-Fi 5, the access point could talk to devices at the same time, but those devices couldn’t respond at the same time. Wi-Fi 6 has an improved version of multi-user, or MU-MIMO, that lets devices respond to the wireless access point at the same time.

This wouldn’t just apply to busy public places, but also at home if you have many devices connected to Wi-Fi or if you live in a dense apartment complex.

Internet Speed Loss: Get What You Pay For

Jason Cooley is Support Services Manager for Tech Experts.

Long gone are the days where you accepted the speed that your dial-up connection allowed.

I remember when 56k modems were exciting. I can easily recall my first cable Internet connection. It was a lightning fast 3mbps (megabytes per second, in case you were wondering).

With gigs and megs, people talk about data and speeds sometimes as if they are interchangeable. They aren’t. Let’s get that clarification out of the way.

Thanks largely to cell phone data plans, people think in terms of how many gigs they have. What that means is that you can transmit a certain amount of data during your monthly cycle, such as 10 gigs.

The megabytes per second phrase is used to describe the rate at which data transfers. This is your Internet speed.

So now that we know what we are talking about, let’s talk speeds and how to maximize them.

As I mentioned before, I remember getting a 3mbps connection. It was lightning fast compared to the dial-up connections that had been the standard.

As times change and technology becomes more demanding, old connection speeds just won’t cut it. Web pages become more complex and the amount of data transferred goes up as well.

In order to have the same type of experience and to avoid long loading times, expectations for higher Internet speeds continue to grow.

My home 25mbps connection came and went; now, I have speeds up to 150mbps. There are speeds much higher available, but before you go paying for more speed than you need, make sure you are getting what you pay for.

Running Internet speed tests is a good place to start. You can use a website, like speedtest.net, to check your upload and download speed, as well as ping.

Ping is used to measure latency, or what you may classify as lag. Ping is typically measured in milliseconds and is the measured response time after sending out a request on the Internet.

The download speed is the number typically advertised and the number that is most important to your connection. So you pay for 150mbps. You run a speed test over Wi-Fi and you are only getting 80mbps. What could be the cause?

First, the best way to test your speed would be over an Ethernet cable directly connected to your modem or router. Check your speed over a wired connection to rule out any loss caused by the modem.

If you are experiencing lower than expected speeds while wired to your modem, you may need to contact your service provider. If you are getting the correct speeds while wired, there are a few possible causes.

The most likely culprits of speed loss are the devices between your modem and computer or other device. Wi-Fi and regular routers, especially those that are a little older, often have a maximum speed set at 100mbps. You may even see 10/100 on the router, indicating its 100mbps speed.

Having one of these devices is going to cost you one-third of your potential speed whether you are wired in or not.

Having quality devices to distribute your connection is as important to speed quality as the connection itself.

There are many other factors that can contribute to speed loss. Too many Wi-Fi networks in close proximity can even cause interference. While the possible causes of speed loss can vary, one thing that does not change is that you want to get what you pay for.

Browsing The Internet In Safety

Evan Schendel is a help desk specialist for Tech Experts.

Browsing the Internet safely comes with many hurdles. Not all of them are obvious, however. These hurdles are numerous and potentially dangerous, but with the proper knowledge and mindfulness, they can be avoided quite easily.

Viruses and Spyware

The Internet is a minefield of harmful applications and criminals trying to take anything they can, but these attempts can be counteracted.

A user must always watch out for suspicious links or websites. Some websites, though legitimate-looking enough, may be spoofed or fake, hiding malicious code or something equally devious.

Hints to these websites being fake can lie in any aspect of the page, but most commonly, it is a slightly different URL or domain name, typically off by only a letter or two.

The viruses dwelling in pop-ups usually attempt to scare users into clicking their product and downloading the malware or spyware-stuffed application linked in the pop-up.

Spyware can not only steal information input while loaded onto a system, but also slows the system to a crawl and tends to be easy to pick up. Simply navigating to a poisoned web page or opening a suspicious e-mail can infect a workstation with spyware.

The real dangers lie in file-sharing sites, where any file could be dangerous. When downloading any application, evaluate it carefully and make fully sure that not only the site is legitimate, but also that the application is safe too.

Preventative measures do exist, and any workstation should have an anti-virus and anti-spyware application installed and running to prevent most malicious applications from doing any serious damage.

Phishing and Scams

Viruses aren’t the only dangers that come with browsing the Internet. Many scams plague the Internet, preying on people uneducated about their existences.

Older scams were typically through e-mail, with scammers posing as long-lost relatives or people who could offer the victim a large sum of money, but only if they helped them out with a fraction of what they claimed they could pay the victim.

While it seems silly that these scams could work, many fall prey to the empathetic connection one might have when speaking a person in apparent need. These scams, while still common, occur less and less while newer and more sophisticated traps are being developed.

Phishing attempts also come in a method previously discussed – pop-ups. These can have dangerous-looking warnings, alerting you that your machine is infected with a petrifying number of viruses and scaring the user into clicking their links or graphics.

These links or graphics can lead down a dangerous path, including giving the scammers your credit card information or worse.

In the event a pop-up like this occurs, do not panic or give in.

If it is a pop-up, close the window and make certain you click nothing else on the page. If it is a re-direct to a suspicious page, close that as well, and immediately scan the system for any viruses or spyware just to be safe.

No computer is untouchable, but best practices and well-implemented safety measures can make a computer system much more secure, letting you browse the Internet without fear.

In addition to anti-virus programs, constant system updates and application patches can keep any potentially dangerous backdoors or vulnerabilities covered and safe.

With all of this information kept in mind, falling prey to viruses, spyware, and scams will be far less likely and sites will seem much safer.

Is It Time You Had A Failover ISP?

Jason Cooley is Support Services Manager for Tech Experts.

So, you may want to ask – what is a failover ISP? Let’s not over complicate it: it is exactly what it sounds like. A failover ISP is a backup Internet connection through a secondary Internet service provider.

This means paying two monthly bills, for two Internet connections. Strong selling point? Probably not for most people. So what is the appeal? Is it something that will be that useful? First, we would need to know a few things.

How much of your business relies on the Internet? Sure, a quick 10 minute outage is an inconvenience, but most businesses will survive, albeit with different levels of comfort and success.

What happens if there is an extended outage? Can you operate an entire day without an Internet connection? How much money would you lose from being offline for an entire business day?

While the answers to these questions will vary, the fact is there are a growing number of daily business operations that utilize an Internet connection.

VoIP phones? No Internet, no phones. Credit card processing? Unless you use an analog telephone line, that’s out too. Rely on email?

Your phone may be capable, but is that something you want to be stuck doing for an extended period? The fact is, more and more, we really on a stable Internet connection.

What impact does lost time have on your daily operation? While I touched on some of the basics here, think about how you could function without a connection. For some people, it just isn’t possible.

If you are a financial institution that utilizes an offsite financial database, you rely on a connection to service your customers. If you are an insurance company that sends and receives quote information over the Internet and take payments through online processing, you can’t operate.

If you have an office with all VoIP phones and every employee utilizes online tools and services, you can’t operate. Or maybe you are a healthcare provider that needs a connection for patient insurance?

You will have to make some choices about losing a day if any of these apply to you. This is a reality and, in some cases, a gamble.

This just isn’t something we need right now.

Understandable for a lot of businesses out there. There are different needs for different business types.

Restaurants, for instance, probably couldn’t accept credit or debit cards if they lost connection. During a temporary outage, you can relay to your customers that you can only accept cash.

If you have a few users and work from a laptop, you can tether your mobile connection. Whatever the case, it isn’t something everyone needs.

Isn’t it just wasted money if my connection never drops out? Not necessarily. With some good IT work, you can route different Internet traffic through your two ISPs.

Consider it like load-balancing. You can also have it set up that if one of your two networks drop, the other one connects automatically. Again, lots of options are available to you.

Think you need a failover ISP?

There are places where you may not have the option of multiple providers, but in most business areas, there are different options available.

So what happens if you do have a second connection? How do you connect to your backup? Is it automatic?

Your IT department or managed service provider, like Tech Experts, can set that up for you. There are many options depending on your specific setup, but being covered against Internet service outages is universal.

Easy And Common Steps To Resolve Internet Issues

Luke Gruden is a help desk technician for Tech Experts.

The Internet is key in almost all that we do on computers. A computer without Internet would have limited use — not only because of the browser, but because many programs require the connection to function.

That’s why when we are right in middle of working and we lose Internet, we can get very frustrated very quickly. Luckily, there are a few things you can try to potentially restore your Internet with minimal time and effort.

Calling your Internet service provider or your IT techs can result in an issue taking longer to resolve as someone may have to drive out to your business or you have to wait for the next available phone representative. Why wait when, most likely, you can fix your own Internet in about 15 minutes or less with minimal experience?

However, before we talk about how to bring back the Internet, we must talk about terminology and devices.

The first device that handles your Internet from the outside of your building is the Internet modem. Your modem usually has your Internet provider’s logo on it and is plugged in by a cord going outside (usually through a wall). You also need to know what a router is. A router plugs into all the computers with either wired or wireless connections. Sometimes, the modem is also a router when it’s a two-in-one device.

Finally, you should know what a firewall device is. Firewalls are usually a box that is plugged in between the router and modem, protecting your network. That said, not every business has a firewall.

Now that you have the basic terminology, we can potentially fix the Internet. First of all, if you lose your connection to the Internet, try a reboot of your workstation.

If the reboot does not work, see if anyone else has Internet. If it is just you that’s lost connection, try to see if you can push your Internet wire (Ethernet cable) into your computer. Sometimes, the connection can become loose and that’s all there is to the problem.

If you are using a wireless connection, turn off your Wi-Fi with a button on your computer and turn it back on. If your Internet is not back, you might have to contact your IT. If no one has Internet, take a look at the modem. The modem usually has lights showing the status of the Internet connection. If it shows that there is no Internet, try to unplug the power from it and wait 15 seconds and plug it back in.

The modem will take time, potentially 10 or 15 minutes, but you will see if the Internet connection comes back. If the modem does have Internet, try to unplug the firewall (if you have one), then plug it back in after 15 seconds. If the Internet still is out after 15 minutes, try to do the same thing with the router by unplugging and plugging the power back in. If the Internet is still out for everyone, you probably have to call your Internet service provider as there could be an outage in the area. Most of the time when the Internet goes out, following these steps can likely bring back the Internet connection. This is especially true if you are at home.

Hopefully, following these steps can resolve your lost Internet connection. Sometimes, your equipment essentially needs a restart to get things back into working order. Should you need further help, we at Tech Experts have you covered!

Which Is Better – Ethernet Or Wi-Fi?

Luke Gruden is a help desk technician for Tech Experts.

To physically plug in your computer to the Internet or to use the air waves to connect to the net — more popularly recognized as Wi-Fi — is a good question to ask with many good answers, but it comes down to what you need out of your Internet connection.

An Ethernet connection is a wired connection from one network device (like your computer) to another network device. This wired connection is usually made of copper with some form of shielding.

Some Ethernet wires are even designed to take harsh weather conditions. Ethernet connections come in many different sizes and can be cut and made into any length you want, with 329 feet usually being the limit of a single long Ethernet cord.

A Wi-Fi connection is where one network device connects with another network device by sending wireless signals.

The distance that a Wi-Fi signal can travel is based on the strength of the signal, type of signal, and the objects and walls between both Wi-Fi devices. There are different type of wireless signals like N signal, G signals, and AC signals which can have a large impact on distance and quality of signal.

The benefits of using Wi-Fi are that you don’t have wires restricting where you can place your computer. This is especially useful if you need to move to different locations in a home or office without losing your Internet connection.

Wi-Fi is easy to share with others as you don’t need an Ethernet cord for each device that wants access. Your router can still have a limit of how many connections can connect, however.

The disadvantages of using Wi-Fi are that it can be very unsecure and have performance issues with maintaining speed or connections.

Public Wi-Fi connections can be compromised or falsified, causing everyone using the signal to have their data stolen. I avoid using public Wi-Fi signals as it can cost me all my credentials for websites I use. The benefits of using an Ethernet connection is that it is the most consistent and fastest connection you can have with another network device, providing consistent speed.

Ethernet connections are physical and can easily keep track of who is connected to the network and where. Ethernet speeds do not slow down with distance or obstacles. If you can plug an Ethernet cord in, the speed difference between a long cord and a small cord is negligible.

The disadvantages of using Ethernet cords is that if the cord is cut or damage, you most likely need to replace the whole Ethernet wire.

It can be tricky to conceal Ethernet wiring and require holes to be drilled throughout the building. You usually cannot move Ethernet wires along with you if you are using a laptop.

What it really comes down to between using Wi-Fi and Ethernet is if you favor security and speed or if you favor convenience and sharing.

If you need a secure environment with fast Internet speeds, you want to use a wired gigabit Ethernet connection.

If you need many strangers, family, or friends to connect easily and you need access in many rooms without hassle, you want to use a Wi-Fi connection.

Choose what is best for your business or home; if you have any questions, reach us at (734) 457-5000 and we can help you narrow down your choices.

Why It’s Important To Change Your Router’s Default Log-in

Mike Simonelli is a network technician for Tech Experts.

It’s a pretty common scenario: a small business wishes to add Wi-Fi to its existing network infrastructure. A quick trip to the nearest big-box store reveals several Wi-Fi capable routers or access points to choose from. Grabbing up the mid-priced model, the business owner heads back to the shop and uses the included Ethernet cable to plug the new device into an existing switch and, just like that, instant Wi-Fi.

There are a couple of concerns regarding the above scenario that the savvy business owner should be having. The first and most obvious: “I plugged it in and now everyone with a laptop has unrestricted access to my network.” How do you control who can connect to your Wi-Fi?

The answer is to enable a wireless security protocol on the router or access point. WEP is an acronym for Wired Equivalent Privacy (or Wireless Encryption Protocol) and it was designed to provide the same level of security as that of a hard-wired Ethernet connection.

Because wireless networks broadcast messages using radio waves, they are subject to eavesdropping. WEP provides security by encrypting the data to protect it as it is transmitted from one point to another. Almost all wireless devices will support WEP and instructions for enabling it on a particular device should be readily found in the documentation.

Enabling WEP will keep people without the correct password off your Wi-Fi and also prevent unauthorized eavesdropping of network traffic.

Another often overlooked concern is changing the default credentials that are needed to login and administer the new wireless device.

I can’t tell you how many times that I’ve connected to a wireless network and browsed to the default gateway I was assigned (normally something like http://192.168.0.1) and typed in “admin” and “password” on the login form that is presented and gained access to the router’s configuration.

The username “Admin” and the password “password” are typically the default credentials as they come pre-configured on Linksys routers, as well as some other brands.

If these credentials work, then potentially anyone can have unrestricted access to your router’s configuration. At this point, no wireless security protocol such as WEP will protect you since it can simply be turned off in the router’s administration interface.

Worse yet, an intruder can set his/her own password and change the admin password to something else. Once this happens, usually the only way to regain access to your own Wi-Fi network is to factory reset the device, which removes all of your configurations.

The bottom line – never leave a wireless device at its default settings when you connect it to your network. By taking the time to follow these simple guidelines, you will make your wireless device a worthwhile addition to your infrastructure, as well as making your network that much more secure.

If you have any questions during your router set-up or if you’d like to find out how to increase your office’s security using your current router, give Tech Experts a call at (734) 457-5000, or email support@mytechexperts.com. We’d be happy to help.

Do You Have Internet Privacy At Work?

Luke Gruden is a help desk technician for Tech Experts.

Sometimes, when there’s a break or the work day is slow, it can be tempting to check on a couple different websites. In doing this, would anyone know what websites were visited? Other than the people around, who else would know what sites might have been visited? It may come at a surprise that there could be many different people later on – or even immediately – that find out about the websites that were visited.

It is common for workplaces to have a firewall that prevents certain websites from being visited. Along with blocking certain websites, firewalls usually keep track of all the different websites that have been visited and by who.

Any time a website is visited that has been blacklisted (blocked), this usually triggers an alert to the IT department or management, so they can look over who tried to connect to a blacklisted site. From there, if IT or management feel it is necessary, they could look over the entire history of websites that were visited by a user or a group of users.

Now, let’s say for some odd reason that the business does not have a firewall or other device that keeps records of websites visited – could websites that were visited still be discovered?

Well, the computer someone uses also keeps records of websites that they have been visiting, which can be accessed by IT.

Some clever users might be able to remove their footprints from their workstation computer, but they may not have access to something like that.

There is another way that websites visited from a workplace can be tracked without a firewall or looking into the computer files.

If the websites visited warrant any legal action or an investigation is happening at the company, the ISP (Internet Service Provider) can release any and all records of websites visited and exact information of what was done. There is no way to get around this as you need an ISP to use the internet.

There are even more ways to find out what websites are being visited than what was mentioned here. In short, if someone at the office is using the work Internet, it is more than possible that every website visited is being kept track of in one way or another.

If you follow the rules of your workplace and visit only the type of websites allowed by the work place, you shouldn’t have much to worry about. As a rule of thumb, you should only visit sites and do things that you don’t mind the public or workplace knowing about. If you ever see “NSFW” (Not Safe for Work), do not visit or have anything to do with it while on the work Internet.

Only surf the Internet when you are allowed to surf the internet. Don’t visit websites or open emails where the main site or email sender is unknown. With these tips in mind and a better awareness of how a person can be tracked on a business network, you can make better choices while on the company’s Internet.