Custom Networks, Servers, and Workstations
"Connecting It All Together!"
Computer House
Computer House
index009012.gif
Custom Networks, Servers, and Workstations
"Connecting It All Together!"
Whenever we surf websites, use e-mail, or connect through the internet for virtually any reason, we are at risk for one or all of the following threats:


Just a few years ago, we all used modems to access such things as BBS', CompuServe, Prodigy, etc. We only connected when we needed to, and usually for short periods of time, mainly because the connections were so slow, it wasn’t worth the time. We downloaded shareware, sent e-mails to servers, where they sat till someone dialed in to collect their mail, and played slow on-line games. Now, with high speed DSL, Cable, T1 Lines, and Satellite, we use the internet more then ever. For most businesses, that can be nearly every day.

To protect ourselves from the bad guys, we need to install and use products that help us to surf and access information on the super-highway safely and securely. We also, want to have that peace of mind that our data and information is kept safe. Here are some of our suggestions:


Most of us don't ever think about these threats until it’s too late. But by then, the damage may be done. Your data may be lost or even worse, duplicated by an unauthorized person or persons. It’s real, and you’ve heard it on the News.

Also, I like to take the following additional steps, to help keep my system safe and secured:

The Computer Gal ~
index009010.gif index001003.gif index001005.gif index001001.gif index002012.gif
Just think for a moment, if you had to decide between your computer equipment or your company’s data, which one would it be?...... are you thinking?.........

Well for us, here at Computer House, its hands down, our data.

PCs can be replace for usually a fraction of what it would cost to re-create years worth of lost or damaged company data files and information. In some cases, data re-creation is impossible, due to lack of physical data available to us.

There is a cost effective way to protect yourselves form corruption, lost, or stolen data files.

BACKUP BACKUP BACKUP!

In real-estate, its location location location. Well, in data centers all across America, its backup backup backup.

Lost data can be the result of any or all of the below:

  1. Natural disasters
  2. Theft
  3. Man made disasters
  4. Virus attacks
  5. Spyware and Malware attacks
  6. Hardware failure
  7. Electrical issues
8. And many more...

Most companies use some kind of "rotation" backup system. Meaning, they use more then one media and alternate between them. In addition, removing at least one or more copies from the main building to a safe location, is highly recommended.
PC PM MAINTENANCE
DATA BACKUPS
VIRUSES AND SPYWARE
BATTERY BACKUP UNITS
What if during the middle of an important document, someone accidentally, pulled your PC’s power cable from the wall, and you lost hours of work. Or worse yet, the circuit breaker that supported your company’s main server, blew, and right in the middle of a large database update? Well, for most of us, it would not be good, to say the least.

There are many kinds of power disruptions and causes that may lead to your computer equipment locking up or shutting down unannounced:’

o Weather storms
o Downed power poles due to automobile accidents
o Power company maintenance
o Nearby high level power demand
o Power surges and sags
o Brown outs or black outs
o Building construction
o Floods, etc

So, its important to protect your computer equipment, and thereby your data as well.

Install at least a surge protector on all your computers and computer related equipment. Or, install a battery backup unit with surge protection, to protect against low or high voltages.

When the voltage gets too high or low, the battery will automatically switch you over from wall power to battery power. This allows you a short period of time to save all your work and shut down your workstations and servers.

If you need to continue to work in the dark, then install enough battery backup power to extend your “run time” to the time you need to finish your work.

We currently sell and install products made by APC. We have found them to be reliable and well built.

For servers, we recommend using the APC Smart line of products. Most Smart units also have the added feature of being able to shut down most servers automatically. Some additional software may be required for your configuration.

** Also, batteries need replacing, so check the instructions for details.
SECURITY HARDWARE AND SOFTWARE
More and more of us are being attacked by “bad guys”, and it appears to be getting worse each year.

In addition to installing, maintaining, and scanning our systems for Viruses, Malware, and Spyware, we need to also install at least software based firewall protection.

Firewalls are hardware and/or software that attempts to stop unauthorized people from gaining access to your computer and/or servers. Most come from the factory with basic protection, but should be programmed by an expert to properly protect your from most outside threats.

In addition to software based firewalls, hardware based firewalls, have the added advantages of being hard to crack by hackers and can offer a higher level of protection by not relying on the host PC for it processing power.

Software firewalls rang in price from $0 to $100, where hardware firewalls can range from $50 to $10,000.

For most corporate businesses we highly recommend using both hardware and software based firewalls, and to have a professional assist you in programming them.

Keep in mind however, that bad guys can have cracked into some pretty high security systems, so if they want to, they can most likely crack your office’s security protection as well. But, not doing anything is like leaving your doors unlocked at night.

COMPUTER UPGRADES
SOFTWARE LICENSING
NEW TYPES OF VIRUSES
Most small to medium size companies use computers. Unless you only use one computer and use it less then two hours a week, you most likely will need to have it repaired at some point. If you connect to the internet, the likelihood will triple.

Viruses, spyware, power surges, accidents, manufacturer malfunctions, and normal ware and tear will cause your need for an IT professional at least several times a year. Very much like your automobile, equipment with internal moving parts, heat, vibration, and electronics all take their toll on the life expectancy of your car and computer. Each will need repairs and servicing to run properly and extend their usefulness.

There are two approaches to car and computer repairs and service:

Option-1: If it ain’t broke don't fix it.

Option-2: Proper servicing will reduce the likelihood of failure.

To determine what option is best for you and your business, consider the following:

If you use computers in the operation of your business, consider unplugging them for an hour, or a day, or even a week. Will you be able to run your business just as efficient without the use of your computers?

If the answer is "yes", then you can use "Option-1".

If the answer is "no", then you may want to consider the following.

After a failed computer has been repaired, the following additional services may be required as well.

PC Preventative Maintenance is not much different than having your teeth cleaned every six months or having your car's oil changed. It helps catch malfunctions before they get too bad, and helps lengthen the life expectancy of your equipment.

If an average IT company charges between $75 and $150 per hour, and the average repair for a computer that has not been serviced in a while is 3 to 5 hours, then you could easily spend approximately $225 to $750, just for a standard computer. If your company uses three to fifteen computers, and uses them between five and eight hours a day; this amount could be higher. If your company uses a server, these costs could even be much higher.

Factor in, that not only will you pay for a replacement computer or repair, but your computer will be none operational during the repair.

Preventative Maintenance may allow you to reduce your changes of "down time", data loss, and hardware repair costs.

Contact Computer House for an estimate on having your company computers and servers maintained by an IT professional.
Just two quick suggestions:

(1) If you want to speed up your non-gaming computer: Add more RAM Memory.

(2) If you want to speed up your gaming computer: Add more RAM Memory and a faster Video Card.
Just one quick tip:

(1) Do Not Pirate Software.
(Below is an email message we recently sent out to most of our customers, regarding the new ways you can get infected with viruses.)

3/9/2009

Ref: Virus, Spyware, and Malware infections.

To our customers and friends of Computer House. Here's a brief Q&A regarding the infection and prevention of viruses, spyware, and malware.

Q: How can you get infected with a virus or spyware program even when firewalls and anti-virus software is installed on your computer?

A: Here are several ways:

(1) When a user opens a website, and clicks on items on that page, the firewall and anti-virus software can not distinguish between legitimate actions by a user and actions that are misleading by the website designer. For example, if a user clicks on a button to advance to the next webpage, it could actually be a hidden request to download spyware onto your computer.

(2) Warnings that appear on your PC's desktop, can themselves be hidden requests to download viruses and spyware into your computer, when clicked.

(3) Viruses that are released into the public need anywhere from 5 to 30 days to be detectable and removable by anti-virus programs.

1st. Viruses are released into public.
2nd. Enough infections need to be reported to anti-virus companies.
3rd. Virus detection code needs to be written and updated to anti-virus apps.
4th. Virus removal code needs to be written and updated to anti-virus apps.
5th. Customers need to scan and remove detectable infections often

This all takes time, and in the meanwhile, you are open for infection and damage by those undetectable viruses.

Conclusion:
It's therefore very important that, users stick to websites and activities that they know are safe.

In addition, we recommend that corporate users, stick to work related activities and avoid unnecessary behavior. i.e.:


We hope you've found this information helpful.
o DATA BACKUPS
o VIRUSES AND SPYWARE
o BATTERY BACKUP UNITS
o SECURITY HARDWARE AND SOFTWARE
o NEW TYPES OF VIRUSES
o PC PM MAINTENANCE
o COMPUTER UPGRADES
o SOFTWARE LICENSING
Computer House
* Please note, any information or suggestions provided are provided as information only it is up to you whether or not you use any of the above text and you are responsible for any action taken or not taken.