• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

How To Protect Your Computers From Electrical Anomalies

March 5, 2018

Chris Myers is a field service technician for Tech Experts.

Many people will recognize these as risks of a power outage that can damage computers, but did you know that there are actually many different types of power anomalies? If the power dips for even a quarter of a second (250 milliseconds), your computer will use up its reserves of power and abruptly shut down after only 17 milliseconds.

Types of electrical anomalies

Sags, also known as brownouts and undervoltage, are temporary decreases of voltage levels. This is a very common problem, making up a majority of the power disruptions your computer will encounter. When a sag happens, computers may not get enough voltage to power all of its components. This can cause unseen data corruption, power loss to fans, and a freezing keyboard or mouse.

Electric companies purposefully induce sags in order to deal with periods of high power demands, such as high usage of air conditioners on a hot day.

Blackouts are when all power is lost. They are typically caused by power grid equipment failure, lightning, ice, car accidents, and natural disasters. When a blackout occurs, all data in your RAM and hard drive caches is lost. If critical system files like the File Allocation Table are damaged, it may render your hard drive inoperable.

A spike, also called an impulse, is a sudden and dramatic increase in voltage usually lasting less than one millisecond. It can be caused by a lightning strike or a large section of network equipment coming online. Spikes can cause catastrophic damage to computers, often overloading power supplies and burning circuit boards.

A surge, also referred to as a transient, is a short period of increased voltage typically lasting between 8 milliseconds and 2.5 seconds. Depending on the voltage, surges can cause damage similar to that of spikes.

Noise refers to both Electro-Magnetic Interference (EMI) and Radio Frequency Interference (RFI). Electrical power is transmitted with sine waves, usually as an alternating current (AC). The usage of many electronic devices in close proximity to each other can alter the pattern of these waves. When this occurs, it can result in overheating, data loss, and distorted audio or video.

Frequency shifts, also known as harmonic distortion, usually happen when lighting equipment shifts the sine wave frequency to something other than the standard 60 Hertz. This can result in the overheating of electrical wiring and power supply errors leading to unscheduled shut downs.

Preventing Damage

Surge protectors are the easiest and most affordable way to provide your equipment with an immediate layer of protection. When buying a surge protector, you want a high amount of joules and low let-through voltage.

Joules are basically how much energy the device can absorb over its lifetime. Let-through voltage is how much voltage is passed on to connected devices when the surge protector is hit with a 6,000-volt surge.

The best surge protectors will even have outlets for phone, TV, and USB cables. All of those cable types can be damaged from power surges. Just make sure you aren’t getting a power strip string only, which is simply an extension of a wall outlet and offers no protection.

For the best protection you will need an uninterruptible power supply (UPS). These power supplies will provide power to your equipment whenever it sags or stops completely. Most small power supplies will keep your computer running for about 10 minutes or just network equipment for about an hour. Having enough time to properly shut down your equipment can mean all the difference when it comes to saving your data and hardware.

Filed Under: Power Protection, Tips Tagged With: electricity, Power Protection

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Five Reasons To Be Wary Of AI

May 19, 2025

Don’t Trust The Cloud Alone: Backup Your Cloud Data

May 19, 2025

Seven New And Tricky Types Of Malware To Watch Out For

May 19, 2025

Are You Leaving Your Office Door Open?

April 14, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Upgrading Viruses VOIP vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.