Get Started Today!  217-475-0226

Decatur Computers Inc. Blog

Decatur Computers Inc. has been serving the Decatur area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Are You Guilty of These Computer Goofs?

Are You Guilty of These Computer Goofs?

Everyone makes mistakes. This is especially true when it comes to the technology that is used by your organization every single day. For this week’s tip, here are some things to avoid when using your computer.

Not Reading Terms
It’s something we’re all guilty of--reflexively clicking ‘Okay’ or ‘Next’ when confronted by a wall of text. However, not reading the terms and conditions of whatever it is you are trying to do (usually downloading and installing software) can potentially put you at risk. These options often include consent to have bloatware and other unpleasant programs installed on your system. Before you click through, make sure you are aware of what each prompt is having you agree to--or better yet, have your IT professional handle any installations.

Not Updating
There is an arms race being waged between software developers and hackers behind the scenes of your computer. Hackers are always seeking out vulnerabilities and weak points in the programs that you have installed. Likewise, developers are also constantly at work, patching and removing the threats caused by those vulnerabilities. If you aren’t regularly updating your solutions, you aren’t receiving the improved protections that these updates deliver, leaving you vulnerable to threats.

Not Using Surge Protection or Uninterruptible Power Supplies
Electricity is a fickle thing. The right amount will power your computer and allow you to use it, while too much can cause a damaging surge that will ruin many of a modern computer’s components. Lightning strikes hitting nearby power lines are notorious for causing these power surges. A good means of protecting your computer is to--rather than plugging it directly into the wall--power it through a surge protector. Better yet, use an Uninterruptible Power Supply, or UPS, to protect your devices. Not only do they also protect against surges, they can maintain your system briefly after a power outage so that you can avoid data loss.

Not Keeping a Backup
This is a subject that we will never stop impressing the importance of--whether or not you have a backup system in place can make or break your business. While it is always tempting to assume “Nothing like that could ever happen to me,” fires, natural disasters, and old-fashioned user error don’t discriminate. Your data’s best insurance is a comprehensive data backup. This backup should meet a few requirements, the first of which being that it is not the only copy of your data, and secondly, that these multiple copies are not stored in the same place. Ideally, your backup would be stored in the cloud, where it could be accessed once you were ready to do so.

Yes, we all make mistakes. Decatur Computers Inc. is here to help you avoid making too many with your IT. For help with recovering when mistakes are made, call us at 217-475-0226 for more information.

How to Get the Most Out of Your Security Budget
Are These 3 Challenges Holding Your Patch Implemen...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, June 24 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Privacy Technology Network Security IT Support Business Computing Hackers Tech Term Android Cybersecurity Smartphone Business Management Malware User Tips Internet Google Email Small Business Managed IT Services Ransomware Software Backup Innovation Productivity Data Recovery Windows 10 Artificial Intelligence Data Cloud Cybercrime IT Management Business Phishing Communications Cost Management Data Backup Efficiency Business Technology Blockchain App Patch Management Hardware Network IT Services Computer Gadgets Outsourced IT Data Security Encryption Antivirus Hard Drive Mobile Device Management Managed IT Services Update Saving Money Collaboration Data Protection BDR Scam Websites Laptop Gmail Alert Vulnerabilities Automation Smartphones Apps Bandwidth Tech Terms Business Continuity Holiday Project Management Access Control SaaS Money Search Social Media Windows Data loss Hacking Save Money VPN Touchscreen Mobile Device Server Operating System Microsoft Data Breach Office 365 Start Menu Law Enforcement Passwords Facebook Maintenance Remote Monitoring Browser Applications Microsoft Office Spam Word Internet of Things Data Management Document Management Digital Bitcoin Disaster Recovery Social Engineering Worker Google Docs Database Access Multi-factor Authentication Network Management Equifax Robot Business Mangement Nanotechnology Mobile Technology Unified Communications Excel Cloud Computing Budget Samsung Redundancy Tactics Spyware Device security Service Level Agreement Startup History Unified Threat Management Knowledge Software as a Service Tablet Augmented Reality SharePoint Printing Going Green Tip of the week Addiction Analytics Website Computing Infrastructure IBM Government Automobile Screen Reader How to Virtual Reality Distributed Denial of Service Hosted Solutions Download Comparison Machine Learning Google Drive Legislation Networking Best Practice Legal Virus Communication Company Culture Freedom of Information Employer-Employee Relationship Upload Cortana Managed Service Provider Big Data HTML Telephony Virtualization Business Cards Unsupported Software Google Maps Downloads Conferencing YouTube Identity Theft News Trends Virtual Assistant Emergency VoIP Apple VoIp Chromebook Settings Desktop Fake News Gamification Vulnerability Devices Emails Downtime Upgrades Audit Mobility Backup and Disaster Recovery Administration Hard Drive Disposal DDoS Compliance Time Management Bluetooth Corporate Profile Piracy Specifications Managed IT Microsoft Excel Running Cable Content email scam Solid State Drive WiFi Password Regulations Wireless Headphones Software License Television Telephone Systems Computer Care Google Calendar IT Support Printer Mobile Security Cryptocurrency Cabling Mobile Devices Wireless Accountants Unified Threat Management Cleaning Mouse Consultant Outlook Paperless Office Two-factor Authentication Training eWaste Uninterrupted Power Supply Disaster Vendor Mangement Computers Information Technology Multi-Factor Security Office Users Office Tips Managing Stress Windows 10 Twitter CrashOverride Marketing BYOD

Latest Blog

IT support is one of the most important parts of any modern business simply because it’s just not feasible to run a business without any form of technology at its core. For example, most businesses rely on email and other forms of communication, whereas stores might require ...

Latest News

Decatur Computers Inc. is proud to announce the launch of our new website at http://www.decaturcomputers.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.