Home
About
Contact Us

Home>blog
Fri, 31 Aug 2018/

Things to consider when buying a new computer

Tech items like computers are likely to be among the most popular gifts for your loved ones. But there are so many different computers out there that finding the perfect one can be difficult. We’ve outlined some tips that will help you understand more about computer parts and how to make the right choice. Desktop or Laptop? This depends on your working style and environment. The rule is quite simple: if you rarely work out of the office, get a desktop PC. If you need to work at home, on the go, or at client meetings, then go for a laptop. It’s worth noting that desktops are generally cheaper than laptops at similar specifications, have a longer usage life, and make for easier changing or upgrading of components. Laptops, on the other hand, are very portable due to their compact size, they consume less energy, and they offer a more flexible user experience. Processor If you want a computer that loads programs in a flash, completes tasks almost instantly, and runs smoothly at all times, then we recommend you invest in the strongest processors available. The performance of a processor is determined by its number of cores and speed, so the bigger the number, the better. These days, most users go for the latest octa-core processors, specifically if your tasks involve rendering high-definition images, animations, graphics, and analysis. For optimum results, get a processor with the higher number of cores. RAM Random Access Memory (RAM) allows your computer to perform multiple tasks at once without a hitch. Just like processors, the amount of RAM your computer has will determine how fast it will run when you work on several programs simultaneously. Nowadays, standard computers come with at least of 4GB of RAM, with 8GB being ideal for most users -- to navigate smoothly between tasks such as email browsing, Internet surfing, and working on word processing documents and spreadsheets. Hard Drive The bigger the hard drive, the more space you have to store files. If you plan on using your computer with no peripherals, you’ll want to choose a computer that offers the biggest hard drive. But remember that you can always purchase an external hard drive to transfer or store files if your current hard drive is running out of space. Another thing to consider in a hard drive is its spin speed. The average speed for a desktop hard drive is 7200rpm. The faster your hard drive disk spins, the quicker the transfer of data to and from it. And one of the fastest these days are solid-state hybrid drives (SSHDs), which combines solid-state drives and HDDs for seamless data access. Operating Systems Picking an operating system is a big decision when it comes to choosing a new computer. You’ll probably want to stick with an operating system you’re already familiar with, since it can take some time to adapt yourself to a new OS. Here are some of the popular options available on the market: Windows 10 Mac OS X Linux Ubuntu Most people will just go for either Windows or Mac OS, because the complexity of Linux and Ubuntu mean they are are not popular among everyday users. Want more hardware tips and tricks? Get in touch with Multi IT's technology experts on 011 435 0450 today.
VIEW MORE
Mon, 03 Sep 2018/

IT policies to protect your business

Employees are one of your biggest security holes. There is no foolproof prevention method for human error, which is why employee mistakes are one of the most common causes of a security breach. To reduce potential risks, we’ve suggested a few IT policies you should implement to protect your business. Interne In today’s business world, employees spend a lot of time on the internet. To ensure they’re not putting your business at risk, you need a clear set of web policies. This must limit internet use for business purposes only, prohibit unauthorized downloads, and restrict access to personal emails on company devices. You can also include recommended browsing practices and policies for using business devices on public wifi. Email Just like the Internet policy mentioned above, company email accounts should only be utilized for business use. That means your employees should never use it to send personal files, forward links, or perform any type of business-related activities outside their specific job role. Additionally, consider implementing a standard email signature for all employees. This not only creates brand cohesion on all outgoing emails, but also makes it easy to identify messages from other employees, thus preventing spear phishing. Passwords We’ve all heard the importance of a strong password time and time again. And this same principle should also apply to your employees. The reason is rather simple. Many employees will create the easiest to crack passwords for their business accounts. After all, if your organization gets hacked, it’s not their money or business at stake. So to encourage employees to create strong passwords, your policy should instruct them to include special characters, uppercase and lowercase letters, and numbers in their passwords. Data Whether or not you allow your employees to conduct work on their own devices, such as a smartphone or tablet, it is important to have a bring your own device (BYOD) policy. If your employees aren’t aware of your stance on BYOD, some are sure to assume they can conduct work-related tasks on their personal laptop or tablet. So have a BYOD policy and put it in the employee handbook. In addition to this, make sure to explain that data on any workstation is business property. This means employees aren’t allowed to remove or copy it without your authorization. We hope these four policies shed some light on the industry’s best security practices. If you’d like more tips or are interested in a security audit of your business, give Multi IT a call on 011 435 0450.
VIEW MORE
Tue, 04 Sep 2018/

Security tips for Office 365 migration

Making the decision to migrate from an on-site system to a cloud-based Office 365 is easy, but the migration process itself presents numerous security challenges. By covering these essentials, you’ll minimize security breaches and ensure you can enjoy the benefits of Office 365. Identify your company’s sensitive data… Most files housed within your servers contain sensitive commercial and personal data that must be properly identified and protected. Do this by conducting a security audit before you undertake your migration. Your audit should identify the types of data stored in the various parts of your company network, including which specific information needs extra safeguarding. Be sure to consider everything from trade secrets and contract details to the personal information of your clients. …and then restrict access to it Once you’ve worked out where your most precious data lies, you can check who currently has access to it and whether their access is appropriate. After all, it’s not necessary for everyone to be able to get at all the data your company owns. Ensure that each of your employees has access only to the data that’s necessary for them to perform their duties. The great thing about Office 365 is it lets you conveniently set different levels of permissions based on user roles. Watch out for insider threats It’s wise to consider everyone in your organization when it comes to auditing data access permissions – and that includes system administrators who may have master access to every element of your network infrastructure. A rogue administrator is the stuff of nightmares, since their elevated position gives them much greater leeway to siphon off valuable data without being noticed – or even to allow others to conduct questionable business and bypass the usual built-in security precautions. You can mitigate this risk by monitoring your administrators’ data usage and activities. Use machine learning to foresee security breaches Every action performed by your staff within Office 365 is automatically logged, and with relative ease you can create detailed activity reports. But the sheer number of events taking place within Office 365 in the course of your business’s normal operations means that even attempting to identify questionable behavior will be akin to finding a needle in a haystack. That’s not to say it’s unwise to be on the lookout for anomalies in normal usage – the export of unexplainably large volumes of data, for instance, could suggest that a member of your team is leaking intelligence to a competitor, or that they’re about to jump ship and take your trade secrets with them. To make things easier, machine learning technologies can identify potential breaches before they happen by analyzing large swathes of data in seconds. Graph API is incorporated into Office 365, and allows for the integration of machine learning tools into your security environment to achieve just that. The same tools can also help you avoid being caught unawares by hackers, by identifying system login attempts from locations that are out of the ordinary. By following these tips, you’ll be able to enjoy the powerful collaborative features of Office 365 while ensuring the robust security your business demands. To find out more about how we at Multi IT can help your Office 365 migration run smoothly, just give us a call on 011 435 0450.
VIEW MORE
Wed, 05 Sep 2018/

Top 4 benefits of web monitoring

Although the occasional three-minute YouTube video never hurts anyone, wasting hours of your working day on these websites reduces productivity. When it comes to increasing employee productivity, keeping a close eye on their internet behavior reaps various benefits. Time-saving measures Internet monitoring software saves employees from visiting entertainment, gaming, or online shopping sites by restricting access to them. Internet monitoring software doesn't necessarily block access to social media sites, but it lets your employees know that you’re monitoring their internet activity. This is aimed at discouraging them from taking prolonged visits to their Facebook, Twitter or Instagram page. Avoid harmful websites The internet hosts plenty of unsavory links and websites. Employees who haphazardly click phishing links or access malware-ridden pornography sites can put your business at risk. Working with infected machines can slow down the entire system and, in some cases, completely halt operations. By using internet monitoring tools, you can restrict access to dangerous websites and identify reckless employees who access them and remove their internet privileges, if necessary. Control bandwidth usage Even while using the internet for the right purposes, bandwidth can be used up quickly. Internet monitoring gives you up-to-the-minute reports on staff’s bandwidth usage. Once you have a clear understanding of your company’s overall bandwidth usage, you can better control internet expenditure. Ultimately, this feature allows you to prioritize bandwidth for critical business applications and reduce bandwidth for less necessary websites. Increase productivity on the internet Internet monitoring software may be a powerful tool, but it should be used responsibly. As a business owner, you need to walk a fine line between over-surveillance and under-surveillance. What you should do is establish a clear internet policy, which should explicitly define the disciplinary measures to be dispensed on anybody who goes against the company’s internet policy. You should also deal with time-wasting employees on a case-by-case basis because it’s unreasonable to remove everyone’s Facebook privileges because one or two abused theirs. Employee productivity can be difficult to achieve, especially with the proliferation of the so-called “procrastination software.” But with web monitoring software, you can truly get your business — and your employees — back on track. Looking for more ways to increase business productivity with technology? Give Multi IT a call on 011 435 0450. We’ll be happy to make suggestions.
VIEW MORE
Thu, 06 Sep 2018/

Work productively with Chrome extensions

Well over half of all surveyed internet users utilize Google’s Chrome web browser, and it’s not difficult to see why. The ability to customize your browser via third party apps, extensions, and more makes web surfing a truly personalized experience. Keep on reading to discover the most practical Chrome extensions to enhance productivity. Taco The first on our list is the Taco Chrome extension that focuses on integration to boost productivity. It works by replacing Chrome’s ‘new tab’ page with a customizable framework for all of your third-party services. With various templates and layouts, you can organize and combine tasks and notes from over 40 services including Evernote, Google, Salesforce, Trello, and more. Any time you’re about to start a new project, simply open a new tab to search for the app you need. But before you hit that ‘Google Search’ button, drag the task item into your ‘doing’ lane and off you go. Once you’re done with work and need to check on the status of your home team’s game, simply open a new tab, move the task to your finished lane, and check the score. Strict Workflow Strict Workflow is based on the renowned Pomodoro productivity approach. It’s a time management technique that lets you focus on your task at hand and eliminates any distraction by having you block non-work related websites during your 25 minute work time and unblock it on your appointed 5-minute break. OneTab A lot of us open tabs as notes, reminders, and things to check again some time in the distant future, which is why you’ll love OneTab. It’s ideal for work days when you find a stack of tabs sandwiched along the top of your screen, which can cripple your available memory. This Chrome extension allows you to condense all of your open tabs into one page that lists each of them for easy access when you’re ready to return to them. JustRead When it’s time to slow down your browsing and read the most recent election article or a recipe you want to try, the page is often cluttered with social sharing buttons, advertisements and stock photos. With the JustRead Chrome extension, all of this gets cleared away with the press of a button, leaving you with a clean, text-only page. These are just some of our favorite Chrome extensions. If you’d like more suggestions or support for anything Google related, we’re here for you -- don’t hesitate to call Multi IT on 011 435 0450.
VIEW MORE
Fri, 07 Sep 2018/

Are you sufficiently cooling your servers?

In this day and age, almost every business employs some type of server management. If yours is hosted locally, temperature control could mean the difference between running smoothly and running into the ground. Understanding how to properly cool your servers prevents data loss and ensures the longevity of your hardware’s life. How does temperature affect my servers? High temperatures in server hardware can result in different types of damage. A server that completely crashes for any reason results in costly data loss and service interruptions, but the unbiased advisory organization Uptime Institute warns that overheating that doesn’t always result in total failure. Every 18 degrees higher than 70 degrees Fahrenheit, hardware reliability decreases by 50%. This decrease in reliability can be just as, if not more, expensive for your hardware budget in the long run. Cooling methods can’t just be implemented and forgotten; they must be closely monitored to ensure the health of your server hardware in the short and long term. Options for temperature management range from simple low-budget solutions to expensive outsourced alternatives. Determining your server management budget will greatly depend on what types of methods you intend to implement at your SMB. Cooling methods Which system you use to cool your server largely depends on how much power your hardware is using. The more watts a computer needs to operate, the harder it’s working. This number will determine the scope of your temperature management needs. For example, PCWorld says passive temperature control is adequate for any equipment operating at less than 400 watts. This includes simple solutions like positioning your server away from walls, low ceilings, cable clusters, and anything else that can block hot air from dissipating naturally. For computers using between 400 and 2,000 watts, strategic ventilation becomes a necessity. Adding passive ventilation is viable up to 700 watts, but fan-assisted ventilation will be required above that and up to 2,000 watts. With the increased power consumption, temperatures will rise, and air movement needs to be more closely managed. At this stage, simple vent and oscillating fans will suffice. Anything higher than 2,000 watts needs dedicated cooling solutions. This means air-cooled units to actively reduce server room temperature. Depending on the size and arrangement of the space, a simple self-contained unit may be enough to reduce temperatures to acceptable ranges. But if you’re not sure, you should schedule a consultation with a vendor to consider more drastic cooling and monitoring methods. Keeping your servers running at ideal temperatures means smoother data operations, lower hardware budgets, and one less thing to worry about at your SMB. As your business continues to grow and develop, keep close tabs on increasing server loads — it could save you from devastating data loss. If you need more detailed advice about server management, or have any other questions about your hardware setup, contact Multi IT on 011 435 0450 today.
VIEW MORE