Brain Trust Technologies LLC
TOLL FREE: (877) 288-5527
  • Home
  • Why Brain Trust
    • Partners & Certifications
    • Affiliations
  • Services & Solutions
    • Managed Services
    • Hosted Solutions
      • Business Solutions
    • Hardware & Software Sales
    • Professional Services
    • Business Continuity
  • Blog
  • Resources
    • White Papers
    • Brain Trust Reports
    • Case Studies
    • Newsletter Archive
  • About Us
    • Referral Program
    • Contact Us
  • Support

How to minimize WiFi hiccups

September 26, 2017 admin Hardware 2017september26hardware_c, internet connection, office wifi, router, wifi fixes, wifi issues, wifi speed

Today, you simply can’t survive without a WiFi connection. Businesses need fast, secure, and reliable internet to get work done and satisfy customers. But what do you do when experience WiFi issues? These fixes ought to do the trick!

Range constraints

WiFi works via radio waves which are broadcast to all possible areas from a central hub, usually a piece of hardware known as a router. In order to avoid a weak signal in your office, make sure:

  • Your router is placed in a centralized location and not tucked away in the farthest corner of your facility.
  • Your WiFi antennae are either in a fully horizontal or vertical position for optimal signal distribution.

Note that WiFi range constraints can also occur from interference, so if your office is situated in a highly populated area, try changing your router’s channel.

Slow speed

Despite having high-speed or fiber optic internet, slow load times can still occur for a number of reasons. To eliminate this, try the following:

  • Make sure your router is located in the same room as your endpoints.
  • Have more routers to better accommodate a high number of connected devices.
  • Close bandwidth-intensive applications such as Skype, Dropbox, YouTube, and Facebook.
  • Disable your router’s power-saving mode.
  • Create a new router channel to avoid network bottlenecks.

Connection issues

We understand how frustrating it can be when the WiFi network shows up on your device but you just can’t seem to get it to connect. Before you give up, these solutions might help:

  • Determine whether your WiFi connection is the problem or if your internet is down by plugging in your laptop directly into the router via an Ethernet cable. If you get a connection, then your WiFi is the culprit.
  • Reset your router with a paperclip or a pen and hold down that tiny button for about 30 seconds.
  • Try rebooting your device.

Unstable connection

Random drops in WiFi connection can happen from time to time. If this has become a constant nuisance in your office, try the following quick fixes:

  • Move your router to a different spot or even a different room.
  • Avoid having multiple routers in the same location as they can confuse your device.

Network not found

Glitches in the router can result in your WiFi network not appearing at all. Two solutions that can resolve the problem are:

  • Disconnecting the router from the power source and waiting at least 30 seconds before reconnecting it.
  • Checking to see how old your router is; if it’s over three years old, you’re probably due for a replacement.

When you  experience WiFi issues, these tips will help you avoid serious downtime.  But if you’d rather have a dedicated technology provider take care of your hardware needs, give us a call and we’ll be happy to help.

Published with permission from TechAdvisory.org. Source.

Office 365 users face new phishing scam

September 15, 2017 admin Security 2017september15security_c, microsoft, multi-factor authentication, office 365, spear phishing

With the popularity of Office 365, hackers are trying to find new ways to exploit its users, and they’ve come up with a new idea: a credential-harvesting campaign that uses personalized spear-phishing mails as a tool. If you’re an Office 365 user and don’t want your account compromised, read on.

What makes it different from other scams?

The new threat comes in the form of spear phishing, an old familiar method in which hackers send emails that purport to be from trusted sources and dupe you into disclosing sensitive information. In this particular attack, the email messages are admirably well-crafted, making them even harder to spot.

The emails are also rid of the usual telltale signs such as misspelled words, suspicious attachments, and dubious requests. You might have to recalibrate what you know about phishing scams, because this new threat ticks all the boxes that make it look legitimate.

How does it work?

The hackers behind the attack craft personalized messages, pretending to be from trusted sources, such as your colleagues or Microsoft itself, and send them to your inbox. The messages could contain a link or a PDF file that leads to a legitimate-looking landing page. Upon clicking the link, the user will be prompted to enter his or her credentials, which the hacker will use to launch attacks within the organization.

Once they gain control of your account, they might set up new forwarding rules to monitor your communication patterns, which will be useful for their future attacks. They might even use your account to send further phishing emails to your co-workers to collect more sensitive information.

As for the phishing emails with PDF attachments, there will be instructions to fill in username and password to view the document. And once you do, your account is no longer yours.

Another way they can get your credentials is by sending an invoice that requires you to log on to a web portal to view the file. Attackers can also use this technique to trick you into performing a certain action, such as forwarding sensitive information or paying an invoice.

What can you do to stay protected?

Your first line of defense is multi-factor authentication, whereby you use a password and another authentication method — like an SMS code — to secure your account. This function is already included in Office 365 and here’s a step-by-step guide on how to activate it.

The second line of defense is training yourself and your employees to spot common phishing techniques. In particular, verify the accuracy of the wording and the sensibility of the requests in the messages.

For good measure, your organization can also install an email-validation system which is designed to detect and prevent email spoofing, such as the Domain-based Message Authentication, Reporting and Conformance (DMARC).

Identifying phishing emails and planning and implementing a robust defense system are ways to protect you and your organization against the new Office 365 threat. For tips on how to spot this type of scam and how to plan thorough security practices, contact our experts today.

Published with permission from TechAdvisory.org. Source.

6 ways to flood-proof your business IT

September 13, 2017 admin Business 2017september13business_c, backup, business continuity, cloud, disaster recovery, flood, hurricane, image-based backup

Hurricanes Harvey and Irma have already caused billions of dollars in damages, but hurricane season is far from over. Experts are predicting that there will be five more major tropical storms through October, and if they present risks to your business, it’s time to establish a watertight disaster recovery (DR) plan. Here are a few things you need to consider.

Pay attention to location
First and foremost, your backup site should be in a hurricane-free zone. Ideally, your offsite facility should be located at least 100 miles away from your main location. If this isn’t possible, make sure it is built to withstand wind speeds of 160 mph (as fast as Category 5 storms), and is supported by backup generators and uninterruptible power supplies.

You should also request an upper floor installation or, at the very least, keep critical IT equipment 18 inches off the ground to prevent water damage.

Determine recovery hierarchy
Certain parts of your IT are more mission-critical than others. Ask yourself which systems or data must be recovered in minutes, hours, or days to get your business back to running efficiently.

For example, you may find that recovering sensitive customer information and e-commerce systems take priority over recovering your email server. Whatever the case may be, prioritizing your systems ensures that the right ones are recovered quickly after a disaster.

Use image-based backups
Unlike fragile tape backups, image-based backups take “snapshots” of your systems, creating a copy of the OS, software, and data stored in it. From here, you can easily boot the virtual image on any device, allowing you to back up and restore critical business systems in seconds.

Take advantage of the cloud
The cloud allows you to host applications and store data in high-availability, geo-redundant servers. This means your backups can be accessed via the internet, allowing authorized users to access critical files from any device. Expert technicians will also watch over and secure your backups, allowing you to enjoy the benefits of enterprise-level backup facilities and IT support.

Back up your data frequently
Back up your data often, especially during disaster season. If your latest backups were created on the 15th of September and the next storm, Hurricane Jose, makes landfall on the 28th, you could lose nearly two weeks of data.

Get in the habit of replicating your files at the end of each day, which should be easy if you’ve opted for image-based backups.

Test your DR plan
After setting up your backups, check whether they are restoring your files accurately and on time. Your employees should be drilled on the recovery procedures and their responsibilities during and after disaster strikes. Your DR team should also be trained on how to failover to the backup site before the storm hits. Finally, providers, contractors, and customers need to be notified about how the hurricane will affect your operations.

As cell towers and internet connections may be affected during this time, make sure your company forums are online and have your employees register with the Red Cross Safe and Well website so you can check their statuses.

It’s nearly impossible to experience little-to-no disruptions during disasters like Harvey or Irma, but with the right support, you can minimize downtime. If you’re concerned about any natural disasters putting you out of business, call us today. We offer comprehensive business continuity services that every company must have.

Published with permission from TechAdvisory.org. Source.

«‹ 18 19 20 21›»
Brain Trust Technologies LLC

6749 S. Westnedge Ave
Suite K, #128
Portage, MI 49002-3556

Southwest Michigan: (269) 290-7137
St. Louis: (314) 558-0623
Toll Free: (877) 288-5527

SMS Terms of Service | SMS Privacy Policy

© 2025 Brain Trust Technologies, LLC. All Rights Reserved