Technology Articles from MPA Networks

HTTPS: Securely Sending Personal And Private Information

December 28th, 2017 by admin

Stylized graphic with a white lock, blue 1s and 0s in a sphere, and 2 computer monitors

Avoid costly data security breaches by training your staff to check for secure connections when handling private information on the Internet. Secure Hyper Text Transfer Protocol, or HTTPS, is a technology legal, healthcare, and financial businesses use...

Read Full Story »

Posted in: Cyber and Data Security

Putting Unused Computers Back to Work

December 28th, 2017 by admin

Black MSI laptop with red highlight coloring, opened and facing the viewer

There are many ways to reuse an old computer. Replacing an old computer that still works is a good feeling.   The device survived the replacement cycle. However, some desktops and laptops have the potential to lead second lives in the workplace. Re-assigning...

Read Full Story »

Posted in: Solutions

Latest Popular Smartphones Significantly Dip in Drop Test Performance

November 22nd, 2017 by admin

iOS device with cracked and broken screen in the bottom left side

After years of improving smartphone glass durability, a shift design is bringing back the perils of dropping the device only to discover the glass has cracked on impact. The newly released iPhone 8 and iPhone X aren’t doing well in drop tests, with screens...

Read Full Story »

Posted in: Hardware and Software

Don't Neglect Surge Protectors in Your Workplace

November 16th, 2017 by admin

Isolated black surge protector strip with 6 outlets

Businesses use surge protectors every day without thinking about them; however, they are an incredibly important piece of technology that can make the difference between a $20.00 and a $2,000.00 equipment replacement. While uncommon, a power surge can...

Read Full Story »

Posted in: Hardware and Software

Problems with Power Loss: Tips for Workplace Computer Battery Backups

November 8th, 2017 by admin

View of the backside of a wooden desk with 2 Apple computers and an Apple laptop, all in gray

It's inevitable: employees working hard on a time-consuming project and then out of nowhere, the lights start to flicker and the power goes out. Suddenly, those workers express their frustration by pulling out their hair because they've just lost hours'...

Read Full Story »

Posted in: Hardware and Software

New Phishing Technique Hijacks Legitimate Conversations

October 24th, 2017 by admin

Hand holding up a clip-art style yellow lock, against a blue field of 1s and 0s

A new spear phishing technique, being used in a hacking campaign called FreeMilk, takes advantage of a Microsoft Office vulnerability in order to hijack existing email conversations to spread malware to high-profile targets. This new technique phishing...

Read Full Story »

Posted in: Cyber and Data Security

Alternative Employee Device Security: Fingerprints, Facial Recognition, and Iris Scans, Oh My!

October 17th, 2017 by admin

Stylized magnifying glass resting on three oversized fingerprints

So far, 2017 has been an eventful year for increasing access to password-alternative smartphone and laptop unlocking techniques. Notably, Samsung added Face unlocking to the Galaxy S8 line and Apple introduced Face ID on the iPhone X. Of particular note,...

Read Full Story »

Posted in: Cyber and Data Security, Hardware and Software

Wireless Charging in the Workplace: iPhone Joins Android

October 10th, 2017 by admin

Hand holding a white iPhone plugged in and charging from empty

Wireless charging in the workplace has the potential to make it easier for your employees keep their arsenal of devices running throughout the day with fewer of those pesky low battery warnings. Until recently, wireless charging hasn't been as good at...

Read Full Story »

Posted in: Hardware and Software

Equifax Breach: What does it teach us about IT security?

October 3rd, 2017 by admin

Highly zoomed icon of a hand-shaped cursor clicking on a link labeled 'Security'

The 2017 Equifax hack is teaching a painful lesson about the necessity of businesses keeping up with software patches for IT security and to avoid catastrophic damage. The hack, which resulted in potentially exposing the financial information necessary...

Read Full Story »

Posted in: Cyber and Data Security

Flash Drives: A Productivity and Security Guide

September 26th, 2017 by admin

Wireless dongle, USB drive, micro SD chip, and 2 SD chips on a field of black

With proper planning, your business can take advantage of USB flash drive technology to increase productivity, while eliminating most of the medium's inherent risk. The USB flash drives likely lying around your business offer excellent opportunities to...

Read Full Story »

Posted in: Cyber and Data Security, Hardware and Software

Screen Mirroring Mini-Guide

September 19th, 2017 by admin

Conference room with dark wood table, black and silver chairs, a speaker phone, and a tv display on the far wall

Setting up your conference room for wireless screen mirroring is the answer to employees sharing in a collective groan when it's time to connect a computer or mobile device to show a presentation. While setting up the conference room television or projector...

Read Full Story »

Posted in: Hardware and Software

The System Is Down: How To Stay Online When Your Service Provider Is Offline

September 12th, 2017 by admin

Stylized icons that indicate free WiFi is available

It's easy to take a functional Internet connection for granted until it's no longer working. When that Internet connection inevitably goes down, your business could be left scrambling to figure out how to keep working until service is restored. The best...

Read Full Story »

Posted in: Solutions, Hardware and Software

3 Lessons SMBs Can Learn From Retailers On Thanksgiving Weekend

September 6th, 2017 by admin

Two monitors with arms reaching out of them, exchanging a gold credit card for purchased items

Online retailers are already working on business strategies for the Thanksgiving, Black Friday, and Cyber Monday online shopping weekend months in advance. These three days are the busiest online shopping days for retailers, bringing in nearly $6 billion...

Read Full Story »

Posted in: Hardware and Software

Adobe Flash: The Rumors of My Death Have Been Greatly Exaggerated...Until 2020

August 29th, 2017 by admin

Finger pressing a pale blue touchscreen of icons against a pixelated background

Adobe Flash, the web content standard the Internet loves to hate, will soon meet its ultimate demise: Adobe will finish phasing out the platform in 2020. Flash, first introduced in the early 2000s, has been on a gradual decline for almost as long as it...

Read Full Story »

Posted in: Hardware and Software

When Windows 10 Support Stops

August 22nd, 2017 by admin

Dark wood desk with a Mac desktop, a gray MacBook Pro, and a white table resting on it

In July of 2017, some Windows 10 users received an error message when trying to install the Creators Update, stating, "Windows 10 is no longer supported on this PC." This first-of-its-kind problem stems from an incompatibility with a handful of Intel's...

Read Full Story »

Posted in: Cyber and Data Security, Hardware and Software

The Internal SMB IT Security Threat: Overconfidence In Cyber Security Preparedness

August 15th, 2017 by admin

Email application displaying '1 New Message' on a smartphone screen

According to a 2017 published study by Advisen and Experian, one of the biggest threats facing small businesses comes from within, such as overconfidence in the organization's ability to protect itself and recover from cyber security attacks. While businesses...

Read Full Story »

Posted in: Cyber and Data Security

Addressing the Unique Ransomware IT Security Issues in Healthcare

August 8th, 2017 by admin

Stethoscope, glasses, and pills resting on a paper ECG readout

Ransomware, a type of malware that holds a computer hostage and tries to force the victim to pay money to recover access, is a nightmare for any business, but the healthcare industry faces the more severe side of a ransomware attack. The healthcare industry...

Read Full Story »

Posted in: Cyber and Data Security, Partners and Industries

Looking at USB/NFC Keys for Extra Account Security

August 1st, 2017 by admin

White security icon spotlighted on a dark field of colorized programming code

Hijacked accounts are an IT security nightmare, so it makes sense for your company to look at new technology for better ways to keep your digital assets safe. While security professionals are working out new ways to look at what account credentials are,...

Read Full Story »

Posted in: Cyber and Data Security, Hardware and Software

Is Your Office Router Secure?

July 25th, 2017 by admin

Netgear ProSafe GS108T router with 4 Ethernet cables plugged into it

In June 2017, WikiLeaks released secret documents that exposed the tools the CIA uses to infiltrate public and private networks through routers. These documents have shined a light on how easy it is for someone to hack a router. This begs the question,...

Read Full Story »

Posted in: Cyber and Data Security, Hardware and Software

Avoiding Hardware Overkill: IT Consulting to the Rescue

July 18th, 2017 by admin

Close up of a circuit board

Spending far too much money on excessively overpowered computer hardware can quickly deplete your company's IT budget, taking funding away from other important expenses. Two exciting products released in June 2017, Apple's new iMac Pro ($4,999) and Intel's...

Read Full Story »

Posted in: Hardware and Software

Flaws in 2-Factor Authentication Methods Could Leave You Vulnerable

July 11th, 2017 by admin

Close up of a businessman holding a Microsoft smartphone in his hands

If your business is using 2-factor authentication, or 2FA, methods to secure your important accounts, you may need to investigate better ways to implement the practice. Security experts widely recommend using 2FA, a system which utilizes a second security...

Read Full Story »

Posted in: Cyber and Data Security, Hardware and Software

Spare Computer Parts: Which Ones To Keep For Disaster Recovery

July 5th, 2017 by admin

Pile of old computer parts in a metal shipping container

It happens in every office eventually: an employee is going about their workday and suddenly their computer or monitor won't turn on. Fortunately, there's gold in those unused desktops and laptops stuck in the storage closet. Aside from the computers...

Read Full Story »

Posted in: Hardware and Software

79% of Businesses Were Hacked in 2016. Was Yours One of Them?

June 27th, 2017 by admin

Stylized graphic of a computer monitor with a pane of glass shattering in front of the screen

Getting caught off-guard in a cyber security attack is a disaster for any business, large or small—and the frequency of attacks is only getting worse. According to the CyberEdge 2017 Cyberthreat Defense Report, hackers successfully compromised...

Read Full Story »

Posted in: Cyber and Data Security

Amazon Alexa in the Workplace: What Could You Do With a Virtual Assistant?

June 20th, 2017 by admin

Graphic of six people-shaped figures with question speech bubbles above them

Amazon Alexa, the voice-based intelligent personal assistant you may have seen an early adopter friend use at home, has surprising business use potential to increase productivity in the workplace. Like Apple's Siri, Google Assistant, and Microsoft's...

Read Full Story »

Posted in: Hardware and Software

Intranets and Small-To-Medium Business Productivity

June 13th, 2017 by admin

Finger touching an array of icons laid out on a pale blue background

Many small-to-medium businesses (SMBs) have taken to hosting their own intranet to increase productivity in the workplace. For those unfamiliar with the term, "intranet" is not a typo, but rather an internal network that behaves like a private Internet....

Read Full Story »

Posted in: Solutions

The Cost of Memory: Trends to Impact Your Upgrade Cycle

June 6th, 2017 by admin

Close up view of a 16Gb G-die DDR3 SDRAM chip K4B1G0846G

Computer memory market trends could play a role in your business’s decision on when to upgrade or replace employee computers. According to PC World, the technology research experts at Gartner predict that prices for both RAM and Solid State Drives (SSDs)...

Read Full Story »

Posted in: Hardware and Software

Android and IOS: Is the Device Just Old, or Is It Obsolete?

May 23rd, 2017 by admin

Relief drawing of a pocket watch with roman numerals I through XII

When trying to determine if a piece of technology is simply old or completely obsolete, keep in mind that there are different criteria for Android and iOS devices than for desktop and laptop computers. An employee stuck using an obsolete device is likely,...

Read Full Story »

Posted in: Hardware and Software

7 Ways VoIP Increases SMB Productivity

May 16th, 2017 by admin

Wireframe graphic of a desktop business telephone

Voice over Internet Protocol (VoIP) solutions can help small and medium businesses  increase productivity by enhancing your communication potential. VoIP isn't just a simple digital upgrade over your existing office analog phone service: It opens the...

Read Full Story »

Posted in: Partners and Industries

Scheduling Security: Take Control of Your OS Updates

May 10th, 2017 by admin

The word 'update' written in chalk on a blackboard, with a red analog clock between the 'p' and 'd' letters

It happens to everyone: You turn your computer back on after you intended to leave the office, or come in early to get a head start on a new project, only to be greeted by a 20-minute operating system (OS) update session. This common workplace frustration...

Read Full Story »

Posted in: Hardware and Software

The Three Copies Rule: Why You Need Two Backups

May 3rd, 2017 by admin

An array of storage media devices, including several USB sticks, laid out on a desk

Anyone who has ever lost years of work due to computer failure will tell you that backing up your devices can save you considerable heartache and frustration. Reliable, redundant, and regular data backups are your business's best strategy for disaster...

Read Full Story »

Posted in: Hardware and Software

Top 5 Security Tips for Email and Social Media Accounts

April 26th, 2017 by admin

White email envelope icon with several red, pink, and gray circles behind it

Email and social media accounts provide a wealth of cyber security challenges for businesses. Hackers often look for exploits in account operations to steal information and seize control—both of which can be extremely damaging and difficult to combat....

Read Full Story »

Posted in: Cyber and Data Security, Partners and Industries

The Dock Returns: Anticipating Trends for Productivity Potential

April 19th, 2017 by admin

Stylized graphic of a desktop monitor, tablet, and smartphone, in black and white

Samsung's March 2017 announcement that its flagship smartphone would support first-party peripheral that makes the device work like a desktop computer could mean big changes for how people look at their productivity devices. While this is not the first...

Read Full Story »

Posted in: Hardware and Software

This Is the End: Microsoft Takes a Hard Stance on Phasing Out Older Windows Versions

April 11th, 2017 by admin

Stylized depiction of Windows 10's start menu on a desktop monitor

If your business hasn't already made the switch from Windows 10's predecessors to a new operating system, it's time to make the initiative a priority. While your IT staff doesn't need to upgrade every computer in your office, it's necessary to make sure...

Read Full Story »

Posted in: Hardware and Software

Avoiding Disaster: Overheating Computers

April 5th, 2017 by admin

Shiny, red fire extinguisher with a yelling cartoon face on the side

If one of your office computers always seems to shut down or slow to a crawl at the busiest of times, you may have a case of overheating on your hands—especially if IT can't find anything wrong on the software level. Performance hiccups might seem like...

Read Full Story »

Posted in: Hardware and Software

Mesh Networking for SMB Offices

March 28th, 2017 by admin

Stylized representation of a wireless radio antenna with radio signals emanating from it

If the sounds of disgruntled employees complaining about poor Wi-Fi connectivity are all too familiar in your SMB, it's time to consider switching to a mesh network. Unlike traditional Wi-Fi networks that use a single point of origin and optional...

Read Full Story »

Posted in: Hardware and Software

The Benefits of Laptop Docks and At-Desk Peripherals

March 21st, 2017 by admin

Overhead view of a computer user typing on a white, detachable Mac keyboard connected to a MacBook laptop

With a little bit of effort, your staff can reap all the benefits of a laptop, and many of the perks of a desktop, with a little bit of planning and some additional hardware. It's a common perception that laptops lead in portability, while desktops specialize...

Read Full Story »

Posted in: Hardware and Software

Mac- and Linux-Based Malware Targets Biomedical Industry

March 14th, 2017 by admin

Skull and crossbones symbol drawn with 1s and 0s

The malware infection, discovered in late January, that's been hiding out on Mac and Linux devices for more than two years doesn't mean the security floodgates are open, but it is a reminder that these devices aren't invincible. Apple is calling this...

Read Full Story »

Posted in: Cyber and Data Security

Network-Attached Storage: Data Backup and Transfer Options for Small Businesses

March 9th, 2017 by admin

File upload icon in 5 colors: gray, green, red, blue, yellow

Network-Attached Storage (NAS) servers are a great asset for small businesses managing data. For the uninitiated, NAS is essentially a streamlined server designed specifically for sharing files between devices. Because of their simplified...

Read Full Story »

Posted in: Hardware and Software

8 Spring Cleaning Tips for Your Office Computers

March 1st, 2017 by admin

Stylized green bucket, with a blue squeegee and a gray dust buster vacuum

When it comes to your office computers, a little bit of spring cleaning goes a long way. Sure, cleaning office computers can seem tedious. But think of it like preventative maintenance on a vehicle: In the best-case scenario, you'll never know all the...

Read Full Story »

Posted in: Hardware and Software

Getting a Clean Start: Managing Windows Startup Programs

February 23rd, 2017 by admin

Stylized depiction of the Windows 8 start menu on a desktop monitor

It's quite common that, over time, Windows systems accumulate a laundry list of programs that load when a user signs in. While generally benign, most of these "startup" programs are unlikely to actually benefit the user—so the computer ends up...

Read Full Story »

Posted in: Hardware and Software

Digital Sticky Notes: A Time-Saver for Your Entire Team

February 15th, 2017 by admin

Stylized depiction of nine sticky notes in various colors

It's a familiar sighting in the workplace: the employee with half a dozen sticky notes attached to their computer monitor. While not the most confidential or elegant solution, these employees are on to something. Fortunately, technology has stepped in...

Read Full Story »

Posted in: Cyber and Data Security

Breathing New Life into Middle-Aged Computers

February 8th, 2017 by admin

Stylized depiction of an old-style CRT monitor

Your employees' computers may not be up to speed anymore after two or three years of use, but in many cases your staff can upgrade or tune up these devices to keep pace with work demands. Upgrades can often be purchased and installed for under $100 a...

Read Full Story »

Posted in: Hardware and Software

Using Snap and Split-Screen Modes for Increased Productivity

February 1st, 2017 by admin

Stylized sliding drawers stacked one atop the other, in blue and gray

Multi-tasking wizards have a secret: Modern operating systems offer a handy technique for managing multiple windows while maximizing available screen space, significantly increasing productivity. Depending on the OS, this feature may be referred to as...

Read Full Story »

Posted in: Hardware and Software

An Expert's Guide to Avoiding Phishing Scams

January 24th, 2017 by admin

White security lock icon spotlighted on a dark field with a background of programming code

Unlike most IT security threats, phishing scams attack the human element instead of the machine element. Phishing scams try to bait a person into exposing confidential information by posing as a legitimate, reputable source, typically by email or phone....

Read Full Story »

Posted in: Cyber and Data Security

Virtual Reality: What does It Mean for Your Business?

January 18th, 2017 by admin

Blue and purple depiction of the concept of consciousness

Depending on your industry, modern virtual reality (VR) devices could offer impressive options to improve productivity. The video game industry, for one, has been a major player in pushing VR technology. Despite a handful of flops like Nintendo’s 1995...

Read Full Story »

Posted in: Hardware and Software

Boost Productivity and Security with Google's Cloud Applications

January 11th, 2017 by admin

Color logo of Google Drive(tm)

For anyone unfamiliar with the Google Applications platform, Google Docs et al. are a Cloud-based spin on mainstay office suite programs that can help your staff work better together. With a zero-dollar price tag (compared with Microsoft Office's...

Read Full Story »

Posted in: Hardware and Software

Looking Forward: Cloud Services Costs and Opportunities

January 5th, 2017 by admin

Blue, green, and orange stylized cloud upload/download icons

If your small-to-medium business (SMB) isn't looking at ways to increase productivity through Cloud services, you could be missing out on exciting opportunities. But while the Cloud offers countless opportunities for business expansion, it can also taking...

Read Full Story »

Posted in: Hardware and Software