Category Archives: Data Storage and Recovery

IT Managed Service for SMBs

 Understanding Managed IT Services and How They Benefit SMBs   No doubt you’ve heard, or you’ve at least read about, the benefits of managed services as it relates to maintaining your technology. Managed services refer to clearly defined outsourced IT services delivered to you at predictable costs. You know the exact IT services you’ll be getting and what you’ll pay for them. There is no surprise sky-high bill for services rendered.    How Managed Service Providers Work   Managed service providers (MSPs) use remote monitoring and management tools to keep an eye on the performance and overall health of the IT infrastructure that powers your business operations. Your MSP should provide 24/7 remote monitoring, which will alert them to any issue with your servers, devices, hardwareRead Full Article


Managed IT Services for Your Business

We understand that business owners aren’t always sure that managed IT services are right for their business. So, they rely on calling their “computer guy” only when things go wrong. We’ve provided some questions to consider so that you can better understand why managed IT services provide a much more stable and secure computer network for businesses of all sizes. Plainly put, you can save money and still get top level IT services from a managed services provider such as Rent-A-Nerd, Inc.    Is my business large enough to even consider managed services?   The truth is, any company, regardless of its size or the number of people employed, will run more efficiently if its technology is monitored, maintained, and managed properly. These are facets ofRead Full Article


Breaking News: Downtime Kills Small Businesses

Downtime is bad news for any business whether big or small. A recent two-hour New York Times’ downtime occurrence sent Twitter ablaze and their stock price plummeting. Google going down for one to five hours resulted in lost revenue up to $500,000 and decreased overall web traffic by 40%. While the hourly cost of downtime for a small-to-medium sized business won’t be nearly as large as that astronomical Google figure, downtime is often more detrimental to smaller companies. Smaller enterprises are more susceptible to downtime and are neither large nor profitable enough to sustain its short and long-term effects. Downtime Leads to Unhappy/Unproductive Employees   Even the happiest of employees become dissatisfied when they can’t perform basic day-to-day job functions or properly service customers or clients. While someRead Full Article


Business Continuity: What Every Business Owner Should Know

Technology is full of difficult jargon. To further complicate things, certain terms are often used in a different context between one publication or service provider and the next. An example of this is the usage of backup, disaster recovery, and business continuity. These terms are commonly used interchangeably, often resulting in confusion. In an effort to alleviate some of this confusion, let’s describe each physical process. You will see an overlay among all three, although they are each different processes. Backup – In IT lingo, the most basic description of backup is the process by which your data, as in files or programs, is copied from its original location to another. The purpose of this is to ensure that the original files or programs are retrievableRead Full Article


Business Continuity for SMBs

 8 Cold Hard Truths for SMBs Not Worried About Disaster Recovery and Business Continuity   The foundation of any successful business continuity solution is the ability to retrieve data from any point in time from anywhere. When the topic of data recovery and business continuity comes up, many decision makers at smaller businesses and organizations think that they cannot afford to put enterprise-level protections into place.   Further, so many people think bad things only happen to other people. Just because we hear about a fatal car accident on the morning news, doesn’t mean we fixate on that news when we ourselves get into a car and drive to work. So no matter how many times the owner or executive of a small to midsize businessRead Full Article


Data Loss Tech Tips

Small business owners are often worried about data loss. Rightly so, because data loss has the potential to wipe out a business. We have identified the most common forms of data loss so you can see how they fit into your business and assess the risks related to each of these pitfalls.   1. Human Error – Human error – by way of unintentional data deletion, modification, and overwrites – has become much more prevalent in recent years. Much of this is the result of improperly managed virtualization technology. While virtualization and cloud computing have enabled improved business continuity planning for many businesses and organizations, humans must still instruct this technology how to perform. The complexity of these systems often presents a learning curve that canRead Full Article


The Benefits of an IT Managed Service Provider

Managed Service Providers (MSPs)  are often recommended as a cost effective IT solution for small and mid-sized businesses. For a minimal monthly fee, MSPs provide a reasonably priced solution to the complex technology pains needs of businesses. Here’s a look at the various benefits an MSP can offer your business: Freed-Up Resources and a Renewed Emphasis on Core Business – Both business owners and internal IT staff would much rather focus on revenue enhancing tasks like product development or the creation of cutting-edge applications/services. This is one reason routine monitoring and maintenance tasks are often neglected by an internal IT person or team, which always proves to be detrimental much later. Often perceived as a “threat” to an internal IT person or staff, MSPs can insteadRead Full Article


Business Continuity Versus Traditional Backup

Do you know the difference between business continuity and traditional forms of data backup? How important is it to you that your business does not lose valuable downtime and is able to be back up and running as soon as possible? If this is vital to you, then you should have a very solid business continuity plan in place. In the meantime, here are some tips to help you improve your backup plan as you phase to a more solid business continuity plan. Think Quicker Recovery Time, Not Quicker Backup – While incremental backups are much faster than executing a full backup, they also prolong recovery time. In the event of data loss, a full restore will require loading the most recent full backup and then eachRead Full Article


The Benefits of a Managed Service Provider

The benefits of partnering with a managed service provider (MSP), such as Rent-A-Nerd, Inc., are significant. The bottom line is that it is a cost-effective way to ensure that all of your business’s IT needs are met and kept up-to-date. Experienced MSPs have access to the newest tools that reduce costs by automating many routine in-house labor intensive processes. Break-fix is labor intensive (and a very outdated model), and labor is one of the most expensive operating costs within your IT infrastructure. The new innovative tools that can be provided by MSPs generate real productivity increases and mitigate the risk of network failure, downtime, and data loss from human error and disasters.   MSPs deliver a trusted foundation for your team and your clients. SomeRead Full Article


Cybersecurity: Is your Business Safe from Virtual Threats?

Did you know that 50% of small business owners think their businesses are too small to be targeted by the thieves of the virtual world? Thus, they do not believe that cybersecurity is a business concern. Contrary to popular belief, 72% of hacker attacks happen to smaller firms – firms with fewer than 100 employees! So how prepared is your SMB? Here’s a checklist to help you find out how vulnerable you are to these attacks.   1. Do you have Antivirus protection? An antivirus software program can help protect you from threats that originate from emails such as malware and virus attacks. However, the most striking fact is that 61% of small businesses don’t install any antivirus software. If you are one of them,Read Full Article


Five Things You Should Do Right Now to Preserve Your Network and Systems

What are you doing to protect one of your most valuable assets — your computer network and its systems? Here are five things you should start doing right now: 1. Back Up Files Every Day – As catastrophic as data loss is, the number of businesses that still are not backing up their computer network is unbelievable. According to the Symantec Small to Medium Size Businesses (SMB) data, only 23% of small to mid-sized businesses (SMBs) are backing up their data on a daily basis and fewer than 50% are backing up data weekly. Any number of events can result in data loss, so the importance of frequently backing up your computer network cannot be overstated. 2. Ensure Backup Procedures Are Checked Regularly – Many times businessRead Full Article


Data Loss Can Cause Your Law Firm to Shut Down

Small and medium sized businesses (MSPs), including law firms, rely more than ever on IT systems to efficiently run their business, support customers, and optimize productivity. These systems house sensitive digital data ranging from employee and customer information, to internal emails, documents, financial records, sales orders, and transaction histories. This is in addition to applications and programs critical to daily business functions and customer service. Preventing data loss is therefore an incredibly important function that your tech firm must be able to provide. While corporate-level data losses and insider theft, when they happen to Fortune 500 companies, are well publicized, many smaller businesses have also become casualties of data loss and theft. Following a significant data loss, it is estimated that a small-to-medium sized businessRead Full Article


Can You Really Afford Not to Have a Backup Plan?

 According to Symantec SMB, 50% of SMBs (small and medium businesses) admit to having no backup and disaster recovery plan in place. 41% of those surveyed confessed that they had never even given much thought to implementing a disaster recovery or business continuity plan. If you are one of them, then you really need to think about whether you can afford the status quo. Answering these questions will help you decide if you can really not afford to have a backup plan: 1. How often is employee productivity and customer accessibility or service stalled each day from a downed network or system?   2. How much downtime can your business truly afford and what kind of backup or recovery solutions are in effect when systemsRead Full Article


Computer Network Management and Maintenance

Rent-A-Nerd, Inc.’s co-owners, Charlotte and Darrin Piotrowski, published an article, “Don’t Wait Until It’s Broken,” in the September 2015 issue of Biz New Orleans (and also included in email blast and the Biz New Orleans online issue). In it, they discussed the many reasons why every business should have a computer network management and maintenance contract with a local IT firm, rather than simply calling their computer repair company every time something breaks or isn’t working properly. Here’s the link to the full article. Below is the top ten list of reasons, taken from the article, for contracting with Rent-A-Nerd, Inc. for your business’s computer network management and maintenance. Top 10 benefits of network/computer management and maintenance: 1 – You can truly think of your IT serviceRead Full Article


Prepare Your Business in Case of Disaster

You probably have a plan for your home in the case of a disaster, but what about your business? According to the Insurance Information Institute, as many as 40% of businesses fail after a disaster. There are a number of things that you can do in order to prepare your business in case of disaster (man-made or natural). And, since we are in the midst of hurricane season, now is as good a time as any to do so! You should begin by assessing what types of disasters are most likely to occur to your specific business. This can include fire, flooding, a hurricane, and even criminal activity, depending upon your location, type of business, and other factors. You should select point people who are trained toRead Full Article


Two-Factor Authentication: Security for Your Valuable Data

Two-factor authentication is an extra step that one takes when logging in to various sites and programs. It happens after the username and password have been entered. I know what you’re thinking, passwords are difficult enough. However, many times. in order to make it convenient to remember, we use the same password for nearly all websites (which I would never recommend) or we make simple passwords that are easily guessed, i.e. password, password 123. What two-factor authentication does is add an extra layer of security on top of those passwords, no matter how simple or complex they are, in order to further protect your information online. A quick and easy way to describe two-factor authentication is to think of when you call your bank’s customerRead Full Article


The Right Business Email Address

No matter if your business is fewer than ten employees or more than a 1,000, email is key in your communications with clients, vendors, staff, and other businesses. Often I find that a business’s emails are hosted by its Internet Service Provider or ISP, such as ATT, Cox, Comcast, etc. Without a better understanding of the benefits of a custom domain-hosted email, clients can potentially get lost. Therefore, it is so important that you have the right business email address. Business cards are exchanged on daily basis. A very basic card may include name, address, phone number, and email. An email address such as johndoe@cox.net or @att.com projects a different level of professionalism than a card reading johndoe@XYZcompany.com. Do you want your email to say, “We areRead Full Article


Top Ten Tech Tips

Here are my top ten tech tips (for today!): 1)      When in doubt, REBOOT.   Rebooting, not only computers, but a number of electronic devices, fixes numerous issues. For example: Windows is “running slowly” possibly means that a program may be misbehaving and hogging vital system resources; rebooting the computer can often times resolve that issue.  Another common example is when your “Internet is down;” rebooting your networking equipment (modem and router) can sometimes resolve this issue.  Unplugging your modem/router from power and plugging it back in is a common solution for a number of networking issues. 2)      If you don’t know the sender of an email DO NOT CLICK THE LINKS OR DOWNLOAD ANY ATTACHMENTS!   Bogus emails are one of the number one waysRead Full Article


Computer Repair Versus Network and Computer Maintenance

The average small business spends 6.4% of its revenue on technology.  That may not surprise you, but did you know 80% of the cost comes after the initial purchase?  Clearly, acquiring new technology isn’t nearly as expensive as keeping it performing well.  Shouldn’t your IT systems be an investment for business growth, rather than a drag on profitability? Traditionally, business owners would call a computer repair technician only when there were problems; in other words, a computer–or the entire network of computers–breaks, a technician fixes it until something within the network breaks again.  We now know that it is much less expensive, for many reasons, to simply maintain computer networks on an ongoing basis.  The old way is often called the “break/fix” method, whereas modernRead Full Article


Avoiding Computer Hackers

We all use email as a primary source of communication on a daily basis–for business and personal use. Every day our in-boxes are bombarded with SPAM and advertisements. Some of these emails are legitimate, but some are phishing emails. Phishing emails are designed to steal your password, bank information, credit card information and other personal data from your computer. How can you tell if a message is a scam or legitimate? Here are a few tips to follow in order to avoid having your computer hacked  through these types of emails. Bad spelling and grammar – Hackers are great at coming up with ways to steal, but they aren’t so great at proofreading. If the message contains a misspelled word or poor grammar, it mayRead Full Article