Brave New Wireless World

It’s a wireless world out there, and it’s getting “wirelesser” every day. Not getting tangled up in wires can make for carefree experiences – as long as you’re not careless about your online presence. That’s especially true as you travel this summer. Here are some safety tips.

First, understand that we are not only living in a wireless world, we’re living in a Bluetooth world. To get it down to very simple terms, Bluetooth enables you to set up a short-distance radio broadcast/reception system, and for most applications, it’s a plug-and-play deal. You pair your mobile device with whatever broadcast system you’ll be using, and you’re good to go.

If you’re flying somewhere this summer, you’ll likely use a combination of Wi-Fi and Bluetooth for your inflight entertainment. Airlines are eliminating the seatback screens and related systems to reduce weight and space requirements. Mobile-device manufacturers are eliminating external ports for the same reasons. As a result, you’ll be likely to watch inflight movies or TV shows from the plane’s Wi-Fi network or watch programming you’ve already downloaded to your device or computer. And, you’re also likely to use Bluetooth headphones or earbuds.

Besides inflight entertainment, Bluetooth systems can be used to connect your phone or tablet to guided tours in museums, parks and other attractions. In addition, many cameras use Bluetooth to upload photo cards to mobile devices or computers.

Because it’s a broadcast system, there are security holes. You can start by trying to make sure your device or computer has Level Four Bluetooth security. That has the strongest authentication protocol, which can help your security. Newer phones, tablets and computers are more like to have this capability. Regardless of the security level, here are a few steps to help you secure your devices:

  • Make them “non-discoverable” when you have them in use. Turn off Bluetooth when you aren’t using the device.
  • Use headphones or earbuds with signal encryption.
  • Download and install all software updates and security patches.
  • Maintain physical control of enabled devices and “unpair” any that are lost or stolen.

Second, more and more of us are using Wi-Fi hotspots to enjoy the many benefits of internet connectivity while we’re on the go. Remember, you’re on unsecured – and untrusted – networks when you use these hotspots, so practice good security. You should especially make sure you and your family members avoid online banking or shopping on these networks, and that includes making online changes to your travel reservations or using a ridesharing app like Uber or Lyft.

Using a cellular network is safer, but make sure you have uploaded all the latest upgrades for your OS and apps and all security patches. Also make sure you have new, strong passwords and change them while you travel.

You might want to couple this with reviewing and/or deactivating any accounts you no longer use. A client recently got an email from Microsoft about an account that might have been compromised. We helped verify it was a legitimate message and traced it back to a free account or something that wound up being based in Turkey. He was able to access it and change the password; no harm, no foul.

However, it does raise the point that security and privacy laws vary among countries, and that you can’t depend on any company or government to guarantee your privacy and security when you’re connected to the internet or a Wi-Fi network.

We can help you make sure you have your security bases covered before you travel domestically or internationally – or even if you’re just going around the corner. Call us – 973-433-6676 – or email us to discuss your travel-security needs.

Replacing Your Hardware

We’re a bunch of collegial competitors in IT support, and in recently sharing some thoughts with an industry fellow, I learned that Toshiba is shutting down its telephone business as part of a global restructuring. It seems that the pending bankruptcy of its Westinghouse Electric nuclear division is having a major financial fallout that’s affecting Toshiba America Information Systems’ (TAIS) Telecommunication Systems Division (TSD).

If you have a Toshiba phone system, as one client does, you need to make plans to secure third-party support or be ready to migrate to whichever company may buy Toshiba’s phone system assets. However, there are many things that any company needs to do whenever any of its technology suppliers goes out of business. Some companies have assets that can be acquired, in which case you can most likely expect factory-level support. Some companies are better than others about helping you stock up on replacement parts and providing final firmware updates and security patches, but we wouldn’t count on it.

As an IT support company, we can help you in a number of ways.

  • We’ll check to make sure you have the most up-to-date firmware and security patches for your hardware system. We can’t emphasize enough the importance of this. Any security hole in your phone system can easily lead to a breach in your entire network. Updates will buy time for any next steps you’ll need to take.
  • We’ll help you evaluate your options. Your best option may be to continue with your system based on its age, its capabilities and the strength of current firmware and security software or the strength of support from another provider. Our two goals are to protect the integrity of your business systems and to help you maximize your investment in your current technology.
  • If migration to another system is your best option, we’ll help you plan a budget and timetable for making your move. As part of the process, we’ll help you evaluate all the available systems that fit your needs to help you fully understand the strengths and weaknesses of each and set ROI goals.

System providers come and go. Always have; always will. But if you keep your eyes and ears open and take a deep breath when you get bad news about one of yours, we can always help you find a solution. And working together, we can find one that meets your cost and capability needs as best as possible. Call us – 973-433-6676 – or email us with any questions about looking for new systems.

Pulling the Plug at BA

An IT contractor for British Airways accidentally pulled the wrong plug as travelers queued up for a holiday weekend. That pulled the plug on travel plans for some 75,000 passengers and cost the airline a reported $128 million. It makes you wonder: Who else is vulnerable to an “oops”? Probably everybody, but we can all reduce our risk exposure with good backup systems.

The contractor’s mistake occurred at BA’s data center, and it caused the airline to cancel flights at London’s two airports, Heathrow and Gatwick. Besides the millions BA will pay for their customers’ inconvenience, there will be an investigation that will draw on company resources. It affected operations throughout the BA empire.

The incident raises two questions?

  1. Why wasn’t that cord clearly marked in some way, shape or form to give anyone a clue that it absolutely had to stay plugged in?
  2. Why wasn’t some sort of backup system available?

To me, the second question gets to some very fundamental issues about how major companies operate in today’s world. One of them is cost-cutting. News reports indicate that BA’s management was under pressure to cut costs and boost profit margins in a highly competitive industry. Well, we’re all in highly competitive situations, and we all want to raise our profit margins because we can’t raise prices – at least not without significant pushback.

But at some point, the large corporations that provide so many services for small businesses and consumers, like us, need to step up their game. They should be taking the steps our clients and customers would demand of us to make sure we serve them as expected. If one of the package delivery services, such as UPS or FedEx – or even the Post Office – has an IT failure that causes one of our deliveries to miss a deadline, the consequences for us will be much greater proportionately than for the big corporation.

Mechanical problems at a specific location can happen, but a data center problem should never happen because there are so many ways to add backups. Here are a few examples of what they can do:

  • Have a battery-powered back-up system in place so that everything in the system can be saved.
  • Have a back-up location that can be immediately and automatically activated so that critical operations continue.
  • Make time to make sure everyone is trained and retrained for all tasks they need to do on the system.
  • Keep your hardware and software up-to-date to make sure you have all performance and security measures installed. One of the things we’ve seen in many IT-related catastrophes, such as WannaCry ransomware, is that large businesses simply don’t bother to invest in technology in order to cut costs. They wind up paying more when something happens.

Let’s take this one step farther. You can be exposed to many of the same risks and can benefit from the same preventive measures in your office and at home. You can buy battery back-up systems and plug in your servers, routers and computers to give you time to save your data. You can use remote storage – the cloud – to save data and apps. You can make sure everyone knows what to do and not do with your system. You can automatically update your systems – especially your operating system and app software – to keep them secure.

Call us – 973-433-6676 – or email us if you have any questions about keeping your home and office systems running in the face of any incidents – manmade or natural. We can also audit your system and give you a plan to stay plugged in.

Apple Speaks…or Listens

Siri’s new voice made a lot of noise at Apple’s Worldwide Developers Conference (WWDC) last week. She’s the lead voice of HomePod, Apple’s home hub that will try to muscle out Google Home and Amazon’s Echo. But as they say, “wait, there’s more.” Apple had a lot more to announce and a lot for Apple fans to look forward to.

HomePod is the biggie. Like its competitors, you can ask questions and get info like news, scores and weather. Apple claims it’s going beyond the others by providing encryption to protect users’ privacy, and a system to sense the size of a room and adjust its acoustics. It’s expected to be available in December and carry a $349 price tag. But it also signifies a move by Apple to making greater use of artificial intelligence (AI), and that will be reflected in some of Apple’s other announcements.

You can look for a new operating system for Apple’s devices, iOS 11, and for Apple Watch, watchOS 4. Siri plays a key role in both. For iOS 11, Siri will be able to do more tasks, speak in a more natural voice and assume a male or female voice. There will be other features available, including a control center for making certain adjustments, a person-to-person payment feature for Apple Pay, GPS features and a “do not disturb” option for voice and text while you’re driving your car. Apple Watch will have a new Siri-focused interface that can personalize notifications based on your behavior at different times of the day, such as traffic updates before you leave for work or home.

The new iOS 11 will add new features to the iPad Pro, which will increase its screen size to 10.5 inches ($649) and a bigger 12.9-in screen model ($799). Both will have 512 GB of storage, and they’ll add productivity features with the new iOS, such as multi-tasking and drag-and-drop images between apps. With a better stylus, it should also read your handwriting.

Macs are getting a new OS, High Sierra, and the machines are getting upgrades, too. New desktops have higher memory capacity and stronger graphics performance. The 21.5-inch iMac starts at $1,099; a 21.5-inch, 4K-capable iMac Retina will cost $1,299; and a 25-inch iMac Retina 5K goes for $1,799. All are available now. In December, you’ll be able to get the new iMac Pro, but it will cost $4,999. For laptops, the MacBook and MacBook Pro have faster processors and solid-state hard drives. The 15″ MacBook Pro is also getting faster graphics. Apple is also cutting the basic price for the MacBook’s 13-inch model by $300. All are available now.

Finally, Apple TV customers will now be able to watch Amazon Video through their set-top boxes.

I’ve always been a big fan of iOS-powered devices and have been developing more of a liking for Apple products. I believe there are many instances where Apple and Windows products can integrate seamlessly and where other devices and systems can come into play. Apple’s announcements have raised my geeky sense of excitement, and I hope they do the same for you.

As always, we’ll be getting our hands on a lot of this new technology as soon as we can, and we’ll be available to help you make informed buying decisions and get everything properly installed and operating. Call us – 973-433-6676 – or email us with your questions and comments. Better yet, leave a comment on our website to share your thoughts and experiences with our Sterling Rose community.

Gigabit Service

For Verizon customers, 1-gigabit service for $70 per month sounds so good. But it may not be the service of your dreams. There’s a lot going on here, so let’s try to sort it out.

First, the initial offer is for new customers only. That shouldn’t surprise any consumers for anything we buy. Businesses routinely offer deep discounts to get new customers in the fold, and it can have one of two effects: 1.) it can upset existing customers and encourage them to churn through all their service providers, and 2.) it can be an attractive sample to get customers addicted to a certain level of service and immune to steep price increases later on.

For new customers looking to sign up, it’s not simply a matter of paying your $70 and getting a fast internet connection. There may be additional fees and required equipment upgrades (we’ll get to those shortly) on top of the initial fee, and there is a lot of confusion about how long you can keep the introductory rate before you get a big price increase. Verizon may be offering 1-gig service to existing customers as you read this newsletter, but we haven’t seen a clear description of prices for various packages as we write it.

Second, do you need that big a pipeline? Most of us don’t. Large online stores that sell lots of things through ecommerce are likely to need it. Businesses that send massive amounts of data through business applications, such as enterprise systems for huge, highly automated manufacturing systems, need it. Big, upscale hotels that offer streaming capability for their guests need it. Smaller businesses that push less data through their applications and home users who stream movies and TV programming probably don’t need it. Netflix, for example, recommends the following download speed in megabits per second (MBPS) per stream for playing TV shows and movies through its service:

  • 0.5 required broadband connection speed
  • 1.5 recommended broadband connection speed
  • 3.0 recommended for SD quality
  • 5.0 recommended for HD quality
  • 25 recommended for Ultra HD quality

Do your own math for what you need.

Third, do you have a wired network in place to use all that speed? Only a wired network can do it, and that’s why we recommend wiring office and commercial space for business. We also recommend it for new residential construction, and we recommend it if you are building a theater in your home for a big Ultra HD system. If you have devices connected to your gateway or router, you’ll get the connection speed. Any devices connected through Wi-Fi will get a slower speed, which can still be adequate based on Netflix’s recommendations.

Fourth, you won’t get gig-per-gig speed from the source. If Netflix recommends 25 MBPS for Ultra HD quality, they’re not pushing it out at 1 gig. The big businesses that need to get their data pushed out at that high a speed take advantage of a limited number of pipelines, and they pay for it.

Finally, how will you match your service to the router and cable boxes from your internet service provider (ISP), whether it’s Verizon or Comcast, and what are you willing to pay? Streaming aside, you can pay a hefty monthly fee for cable boxes capable of delivering programming and recorded shows to multiple TVs in your home. You can reduce your monthly outlay by replacing the cable boxes with a cable card that can work with four or six TVs, depending on the card. You’ll give up On Demand programming and on-screen caller ID (if you have a landline through your provider), but that may better fit your needs.

We can review your internet-connection needs for business or home and help you match equipment options to fit your budget. We can do the installation and setup – or walk you through the process and then use remote technology to help you with the setup. Call us – 973-433-6676 – or email us for an appointment.

Home Router Vulnerability

Your home router is easily your most essential device for connecting businesses and family members to the world. It’s also the most vulnerable opening for hackers. How vulnerable is your router? One good place to look is Port 7547. If it’s closed on your router, it’s safe – for now. If it’s open, you’re vulnerable.

You can test your router by visiting a blog post from Wordfence, which makes a firewall and malware scanner that protects over 2 million WordPress websites. They also monitor attacks on those sites to determine which IPs are attacking them and blocks them in real-time through a blacklist. They recently published a post showing that 6.7 percent of the hacks they see on WordPress sites comes from hacked home routers. Hacking gives them access to workstations, mobile devices, Wi-Fi cameras, Wi-Fi climate control and any other devices that use the home Wi-Fi network. From there, they can implant malware or viruses in your system, which can lead to all sorts of problems.

Hacking through an open Port 7547 is known as the “misfortune cookie,” or MC. ISPs (internet service providers) use the port to manage home routers, and they should configure their network to prevent access by outsiders. But many do not block the port, leaving you vulnerable. By clicking the Scan Me button on the post, you can find out if it’s open or closed.

If it’s closed, your OK for now. You should check back periodically, however, because your ISP could open it for some reason and then forget to re-block it. If it’s open, Wordfence suggests you immediately reboot your router, which may flush out malware. You can also run a virus scan on all computers and devices in your home and update your operating systems. Almost anyone can take these steps.

You may be able to take the more advanced step of upgrading your router firmware, but in most cases, you can’t. In all cases, you can contact your ISP and let them know there’s a security vulnerability in your home router and ask them to help you fix it. You can specifically mention Port 7547.

If you are unable to take all the steps mentioned above, call us immediately at 973-433-6676. We can help you reboot your router and may be able to help you close the port or upgrade the firmware. Just have your router name and model number handy to help us serve you better. If necessary, we can coach you in dealing with your ISP to resolve this important security issue.

If you want to take preventive action on Port 7547 vulnerabilities, call us – 973-433-6676 – or email us to schedule an appointment. Remember, you are your router’s first line of defense.

Death of the Smartphone?

While we all wait for the next versions of iPhones and Galaxies, are they “dead men walking?” Technology changes – fast. Where could the smartphone go?

To use an analogy for most of you, it could go the way of the VCR. That technology is commercially dead, but its function lives on through DVR capabilities, and it’s more robust than ever by allowing you to record multiple programs and play them back on any TV that’s part of your in-home cable setup or any device that’s connected to your TV provider’s app.

The iPhone, the world’s first smartphone, is 10 years old. In dog years, that’s well into senior citizenry. In tech years, it’s older than dirt. In its time, it revolutionized how we interface with the world. Besides being a telephone, it’s a handheld computer and an ever-improving still/video camera that gets better only because engineers in a competitive market find new tweaks.

Smartphones have crossed several major thresholds in the way we live:

  • We can communicate by voice, text message or email with anyone at any time.
  • We can search for and buy almost any product imaginable from any place in the world that has an internet connection (make sure it’s secure).
  • We can buy tickets for a local theater production or an around-the-world trip.
  • With ability to broadcast videos over social media, we have changed forever the ways in which government agencies and businesses deal with us a citizens or customers.

What’s next? We have some glimpses, and here are some thoughts – in no particular order.

  • Wearables: They come in all forms, sizes and shapes, and I could foresee parts of smartphones in all of them. For example, you could have a telephone in a headset or small earpiece, and that could connect to eyeglasses and/or a wristwatch. We have a lot of the individual pieces now, and Bluetooth to connect them. In the short term, we can refine them to make them easy for the masses to use and make them as affordable as a smartphone.
  • Augmented Reality: This can create safety issues while driving or walking, but AR tied to your glasses can replace the smartphone screen. You’ll be able to read documents or view pictures and videos with part of your visual field – and it could be made adjustable depending on where you are and what you’re doing. You might use it for Google Maps walking directions, and maybe your AR glasses could project a heads-up display on your windshield for driving directions.
  • Artificial Intelligence: When combined with a wearable, it might ask you questions based on your activity – like “do you want directions to the supermarket?” – and automatically connect you to an app to get you there. It might ask you if you want to count steps and take your pulse or blood pressure.

Some futurists think our species will become cyborg-like over the years, combining our humanity with biomechanical advances to improve our motor skills. Add in AI, and we could just become “walking smartphones.” Speculation aside, technology always advances to help us do things better and develop new ways of doing things. It’s the way of the world, and it happens faster than we can usually imagine.

As you adapt new technologies for your everyday life, we can help you integrate them across all platforms and help you look at how new developments can affect the way you live, work and play. Always feel free to contact us by phone – 973-433-6676 – or email for assistance or answers to your questions.

Verizon Forcing Email Decision; We Recommend You Exit

Verizon is dripping out the announcement that it will migrate its email business to AOL, which the communications giant acquired in 2015. It’s a rolling process that will take place over the next several months, and everyone will get specific instructions based on your account. Your clock will start ticking when you get an email notification from Verizon, and you’ll have the choice of: 1.) migrating to AOL and keeping your Verizon email address or 2.) exiting to an email provider such as Outlook or Gmail. When you get your email, you’ll have a short time to make your decision. If you don’t choose one option, you’ll lose access to your “verizon.net” account. Here’s why you should take the second option.

Keep in mind that you can make the switch from Verizon now and retain access to your Verizon contacts and messages for six months. If you don’t decide, Verizon will close out your email accounts. If you have copiers, scanners, servers and other equipment that rely on email addresses to function, those devices will stop working after you choose your options or your time runs out.

We think Verizon is leading a move by utility companies – phone and cable carriers – to get out of the email business because it’s too complicated and time-consuming to provide as a free service. Just to get this out of the way, Verizon’s first option, switching to AOL, is less complicated right now. You’ll be able to keep your existing addresses, with “verizon.net,” but you can keep your addresses and log in through AOL’s system from now on. That might be a temporary solution because you can keep all your contacts.

But we don’t like it for the long term. While you may think that you’re getting a lot of spam now through your Verizon filters, we think that will increase with AOL. Spam is more than a nuisance; it’s a way for hackers to get into your system. Although you can catch most hacking attempts with common sense, hackers know that if they throw enough spam at you, one of them will get past even the most vigilant user. We don’t think security is a major concern. AOL tightened up its security after it was hacked in 2014, before Verizon bought it.

However, we think the “utility company” extensions will disappear as those companies get out of the email business. That means you’ll need to make a switch at some point, and it makes sense to do it now, before you add more contacts. Switching now may make particularly good sense for copier and scanning companies and other similar service providers that use email addresses. We’ve had some Verizon email addresses for some services, and we’re moving away because those addresses will disappear at some point.

We recommend switching to an email provider that will be in the business for the long term, such as Outlook or Gmail. You should be able to keep that address for as long as you like. Besides not having to worry about losing the email address, you’ll gain much more flexibility in shopping for a new ISP. We know it’s a hassle to move all your contacts and messages and tell people your new address. It’s also a pain when people don’t update their own contact lists or when autofill puts in an old address. For all those reasons, you might as well start to move away from Verizon/AOL, as well as from any other utility.

The two email services that come to mind are Outlook and Gmail. In listing the option to move away, Verizon tells you to follow the instructions from your new provider. You could also get your own domain and have that hosted through Outlook or another email service provider. You can keep your domain for as long as you like, and because you’ll be hosting it and calling the shots, you can do away with the advertising that seems to be more prevalent and more annoying.

Regardless of which new provider you choose, you’ll need to establish your new email address and set up your mailbox – or mailboxes – before you close out your old one. Then, you can follow the steps to transfer addresses and messages and set up your rules for how you manage messages.

We can help you in two ways:

  1. Choose an email provider: Outlook and Gmail are two that come to mind, but there are many others, and each one has its own strengths and weaknesses, depending on what you need. We can review the ways you access email, such as a computer, phone or tablet, and whether you need integration and/or collaboration tools.
  2. Set up your new account and transfer all the data: This is extremely critical. Although your new service will have instructions and although you’ll be able to find help through online forums, it’s not always easy to get right settings for your new account and then transfer your contacts and messages. It’s also not easy to back up all of contacts and messages. If you don’t have an accessible back-up and you make a mistake in the transfer process, you could need to jump through hoops to get it all done – at the least – or lose everything – your worst-case scenario.

If you have a “verizon.net” email address, call us – 973-433-6676 – or email us as soon as you get a notice to discuss your options (keep your address, keep your address temporarily or switch immediately to a new email service). If you have an April 13 deadline approaching, and you need to have a plan in order now. If you didn’t get an email, you will, and you’ll need to be prepared to make important decisions quickly. It wouldn’t hurt to start planning now. You can spend hours and hours of frustration solving this issue, or you call us to handle your transition without stress.

Cybersecurity Scorecard

Cybersecurity has dominated our conversation for the past year, and a report from SonicWall, which provides security tools worldwide for networks to email and everything in between, shows where we’re making progress and where new threats lie.

First, the good news. In data gathered in the past year from the SonicWall Global Response Intelligent Defense (GRID) Network, the good guys and the bad guys made advances. The most notable of the advances the company found were:

  • The number of new POS (point of sale – mostly credit and debit cards) malware variants decreased by 88 percent since 2015
  • SSL and TLS encrypted traffic increased 34 percent year-over-year
  • Major exploit kits Angler, Nuclear and Neutrino disappeared
  • Unique malware attack attempts dropped to 7.87 billion from 8.19 billion in 2015

On the other hand:

  • Ransomware attacks grew 167x from 2014 to 2016 to an astounding 638 million attacks during the year
  • SSL/TLS encrypted malware was exploited 72 percent more often in 2016 than in 2015
  • Internet of Things (IoT) devices were compromised to launch record-setting DDoS attacks
  • Despite significant efforts by Google to patch vulnerabilities, Android continued to be exploited by cyber criminals

SonicWall notes that the technology to solve many of the new challenges cyber criminals threw at victims in 2016 already exists.  SSL/TLS traffic can be inspected for encrypted malware by NGFWs (next-generation firewalls), which are hardware- or software-based network security systems that detect and block sophisticated attacks by enforcing security policies at various levels. For any type of new advanced threat like ransomware, it’s important to understand that all network-based solutions should block network traffic until a safe verdict is reached before passing that traffic through to the intended recipient.

In 2017, there are two areas that SonicWall joins us in telling you to be particularly on-guard: ransomware and the Internet of Things (IoT).

Companies in the United Kingdom were 3x more likely to suffer ransomware attacks than in the United States, but don’t breathe easy. The US experienced the highest number of ransomware attacks in 2016 because of large volume of business.  While we as individuals and small businesses depend on companies like SonicWall to provide the tools to detect and stop ransomware, we need to follow strict security procedures – all of which should be well-known to us by now:

  • Install updates for all of your software for operating systems and apps. They contain the security patches and bug fixes that shore up the breaches in your systems.
  • Be extremely careful about the emails you open and the links you click.
  • Back up your data continuously to a system that is either not always online or that uses authentication. This will help ensure that you don’t accidentally revert to an encrypted back up if you’re hit.

The IoT has been massively compromised because of poorly designed security systems by device manufacturers. To protect yourself, SonicWall reminds you to make sure your devices are behind next-generation firewalls that scan for IoT-specific malware and that you segregate IoT devices on a separate zone to make sure they don’t affect the rest of your network if they’re compromised. To that, we add that you immediately change user names and passwords – and that you make those passwords strong. Some 70 percent of IoT breaches worldwide are in the US.

More protection was made available for Android mobile phones and devices, but they still remain vulnerable to overlay attacks. SonicWall recommends that companies using Android devices keep the option to “install applications from unknown sources” unchecked and both options to “verify applications” checked. They also recommend you avoid rooting and that you install anti-virus and other mobile security apps – and that you enable “remote wipe” in case your device is stolen or compromised with ransomware.

If you’re interested in a deeper dive and more technical explanations, we invite you to read SonicWall’s whitepaper on cybersecurity.

We can help you with a cybersecurity audit for your office or home and for all mobile devices. Call us – 973-433-6676 – or email us for an appointment.

Tales from the SSD

When should you spend more money for an SSD (solid-state drive) hard drive? We’ve talked about speed and about having electronic components instead of mechanical components. Here are two examples of when an SSD makes sense.

One of our clients, an auto body shop, recently bought a new desktop computer, and complained, after a month, that it was running slowly. We checked for viruses and gave the new computer a clean bill of health, but the performance still wasn’t the client had expected.

As we talked, we learned that the computer was being taxed by the shop’s data needs. The client accesses a huge database that’s used to create estimates for repairs. The process is highly detailed, and the shop’s customers can be highly impatient.

We explored his options, which came down to two: buy a newer, more powerful desktop computer or install an SSD and tweak the settings for better performance. Our client chose the latter solution, and when we turned on the system, the screen came up much faster than it had when the computer was just out of the box. The faster speed has increased the shop’s estimating productivity exponentially, and our client considers it a successful upgrade.

Another client’s mishap led to the discovery that he had an SSD, and that saved his data and apps. He had just brought in his desktop computer for some tweaks a few days earlier, but we never opened up the unit. As he was carrying it up a flight of outdoor metal stairs to get to his second-floor office, he dropped it.

He brought it back, and to our surprise it booted up. When we looked inside, we found a lot of broken components – and we did found a solid-state drive. This was good fortune. Had it been a mechanical hard drive, the fall likely would have damaged it beyond recovery, and all of the data and apps stored on it would have been lost. All of the other broken pieces were repairable, and our client was very happy.

Today, we are selling more desktop computers with SSDs because more clients are finding they can earn a faster ROI, such as our auto body shop. We don’t expect that computers will be dropped or damaged in some other way, but you can always insure your data and apps remain accessible by backing up your hard drive – a separate issue. Having the SSD was a bonus in this case.

If you’re thinking about a new desktop computer, we can help you with a cost-benefit analysis to see which type of hard drive best serves your productivity needs and your budget. We can also help with ROI projections. Just give us a call – 973-433-6676 – or send us an email to talk about it.