I.T. Deidre Frith I.T. Deidre Frith

2 TIPS FOR IT HURRICANE PREP

Don’t wait for a Hurricane to hit our area to begin to prepare for Hurricane Season. Here are our TOP TWO TIPS to begin prep work for Hurricane Season.

Hurricane season is quickly approaching as we watch Tropical Storm Barry move into the coast. Start preparing your business now, instead of waiting until the last minute.source: ABC13 Houston

Hurricane season is quickly approaching as we watch Tropical Storm Barry move into the coast. Start preparing your business now, instead of waiting until the last minute.

source: ABC13 Houston

TOP TWO TIPS FOR HURRICANE SEASON PREP FOR YOUR INFORMATION TECHNOLOGY

Don’t wait for a Hurricane to hit our area to begin to prepare for Hurricane Season. Here are our TOP TWO TIPS to begin prep work for Hurricane Season:

  1. BACKUP TO A HYBRID-CLOUD

There are several different ways to create a backup, but we suggest a hybrid-cloud image-based backup that can be used to restore data and applications even if your server is destroyed, and that can restore data from different points in time.

RealTime provides Hybrid-Cloud backups for our clients. The above diagram explains the concept of a Hybrid cloud model for backing up your data.Source: KPMG International, 2016.

RealTime provides Hybrid-Cloud backups for our clients. The above diagram explains the concept of a Hybrid cloud model for backing up your data.

Source: KPMG International, 2016.

2. GO OLD SCHOOL

This is what telephones looked like before they were referred to as “landlines”.

This is what telephones looked like before they were referred to as “landlines”.

Use your printer the way you did in the 1990s! Print out a copy of all of your important emergency contacts and have them ready with your hurricane supplies. You never know if you will be able to access your phone or computer, but perhaps you can find a landline somewhere to use in a dire situation.

If you don’t have a Backup plan, contact us today to get your business backup going. Our IT experts can handle all of the details of protecting your business during Hurricane Season and year round. It’s always good to have a plan. We are the planning experts.

Contact us now.




Read More
I.T. Deidre Frith I.T. Deidre Frith

How to Clean Out the Cruft

Software cruft are basically “digital dust bunnies.” You know, those duplicate files, forgotten downloads, abandoned files from apps you deleted, and so on. They’re slowing you down big time. Getting the cruft out may sound daunting, but it is actually easy to do. Apple, Microsoft and Google have all joined the anti-cruft global crusade and  have added cruft-removal tools to their operating systems. You just need to remind yourself to use them.

Software cruft are basically “digital dust bunnies.” You know, those duplicate files, forgotten downloads, abandoned files from apps you deleted, and so on. They’re slowing you down big time. Getting the cruft out may sound daunting, but it is actually easy to do. Apple, Microsoft and Google have all joined the anti-cruft global crusade and  have added cruft-removal tools to their operating systems. You just need to remind yourself to use them.

Windows 10: From the Start menu, open Settings, System and then Storage. If you click “Free up space now,” Windows displays a list of cruft categories that it’s safe to delete, and shows how many gigabytes you’ll reclaim.

00sl-datacleanse2-jumbo.jpg
  • Here, you can also turn on Storage Sense, which prevents cruft from accumulating in the first place. (Click “Change how we free up space automatically” to adjust the frequency of the deletions.)

Windows 10 offers a simple way to reclaim disk space from orphaned files.


Mac: Apple’s cruft cruncher can reclaim huge swaths of space. (It’s available on macOS High Sierra and later.) To see it, from the Apple menu, choose About This Mac; click Storage; and then Manage.

00sl-datacleanse3-jumbo.jpg

Here, you’ll see options like “Automatically remove watched iTunes movies and TV shows” and “Download only recent attachments” (in the Mail app). Click Review Files to see a sortable list of everything on your drive, which makes it easy to spot duplicates, or your biggest and oldest files, and delete them.

The Mac, too, suggests ways to pinpoint abandoned and gigantic files for deletion.


00sl-datacleanse4-superJumbo.jpg
  • Android: Beginning with the Oreo version of Android, Google has made it fantastically easy to clean out junk files from your phone: Tap Settings, Storage & Memory, and then “Free Up Space.” The resulting list includes downloaded files, photos and videos that you’ve already backed up, and apps you haven’t used in some time. You can delete them by category or individually.

When your Android phone is feeling stuffed, open Settings to lighten its load.


00sl-datacleanse5-superJumbo.jpg
  • iOS: On the iPhone or iPad, tap Settings, General, and then iPhone Storage. You’re now facing iOS’s cruft-removal options: Offload Unused Apps, Review iTunes Videos (enormous TV and movie files), plus an app-by-app listing of space gobblers. Music, Photos, Podcasts and TV usually top the list.

    To delete the individual songs, videos, photos and other files that are eating up your space, you still have to open the corresponding app. But at least now you know where to begin.

The iPhone and iPad make it easy to see which big and underused apps are junking up your storage.




*Information courtesy of https://www.nytimes.com/2019/02/01/smarter-living/how-to-do-a-data-cleanse.html



Read More
I.T. Deidre Frith I.T. Deidre Frith

Breakup with your password...it's cheating on you.

You have to face facts that your password is easy! Literally. And you have no idea who has been running around with your password over the last year and a half. Take this opportunity to make a change - now that you know the truth - and secure yourself a much better password. And don’t worry about the old password; it has cheated (at least) once, and it will cheat again.

realtime blog .jpg

You love your password.

You use it on every platform you can imagine: Your email, online banking and even Facebook! You are so happy every time you think about your password, you can never imagine changing it.

But what you don’t realize is, while you are caught up in those tingly feelings of love, and that false sense of security that you can always rely on your password to work, your password has been cheating on you.

You have to face facts that your password is easy! Literally. And you have no idea who has been running around with your password over the last year and a half. Take this opportunity to make a change - now that you know the truth - and secure yourself a much better password. And don’t worry about the old password; it has cheated once, and it will cheat again. (You’ve got 99 problems, but your password’s not one of them).

broken heart.png

 How to break up and move on to something better: 

Breakups are tough, but I guarantee you that once you see there are better passwords out there (that are tough and have your best interest at heart) you will get over the breakup quickly. 

  1. It’s Complicated.

    A good password is one that is complex and something you can remember. Finding that sweet spot can be hard sometimes, but I promise it’s necessary. Try using a passphrase. A passphrase is a combination of words used to create a sentence that generates complex, long passwords that are easy to memorize. 
    For example: Che@t=r (i.e. Cheater…see how easy?) 



  2. It’s not for life.

    Don’t grow too attached to your new passwords – you’ll be breaking up frequently. So, how often should you change your password? We recommend at least every six months, if not more. Mix it up, don’t give your password time to cheat on you again. 



  3. Adopt long passphrases.

    Size does matter. We recommend you use at least 16 characters for your password. Once you hit the 12 – 16 range, you make it WAY harder for cyber criminals to use brute force or guess your password. 
    For example: myV@lentin3 does little for protection compared to a passphrase like hewill%cheaton*yout00. 



  4. Don’t ever take that password back.

    If your password cheated on you once, don’t give it another chance to do it to you again! A new, long passphrase is exactly what you need! Meaning, do not reuse old passwords because they’re comfortable. There’s a reason they’re in your past. Leave them there. 

Make online security a lifetime love affair to protect yourself. You are worth it!


WHO WE ARE:

RealTime provides real I.T. solutions to businesses. If you need more information on ways that we can help your business, contact us now or continuing reading here.

Read More
I.T., Blog Deidre Frith I.T., Blog Deidre Frith

Play Hard To Get With Strangers

Cyber criminals cast wide nets with phishing tactics, hoping to drag in victims.

October is Cyber Security Awareness Month

If you receive a suspicious email that appears to be from someone you know, reach out to that person directly on a separate secure platform.

If you receive a suspicious email that appears to be from someone you know, reach out to that person directly on a separate secure platform.

Phishing

Play hard to get with strangers.

Cyber criminals cast wide nets with phishing tactics, hoping to drag in victims. Seemingly real emails from known institutions or personal contacts may ask for financial or personal information.

Cyber criminals will often offer a financial reward, threaten you if you don’t engage, or claim that someone is in need of help. Don’t fall for it! Keep your personal information as private as possible. If they have key details from your life—your job title, multiple email addresses, full name, and more that you may have published online somewhere—they can attempt a direct spear-phishing attack on you. Cyber criminals can also use social engineering with these details to try to manipulate you into skipping normal security protocols.

If you’re unsure who an email is from—even if the details appear accurate—do not respond, and do not click on any links or attachments found in that email. Always avoid sending sensitive information via email.

If you receive a suspicious email that appears to be from someone you know, reach out to that person directly on a separate secure platform. If the email comes from an organization but still looks ‘phishy,’ reach out to them via customer service to verify the communication.

*This information is courtesy of the Department of Homeland Security as part of the 2018 National Cybersecurity Awareness Month.

Read More