Categories
Apple Blog Laptops Leasing

Bring Your Own Device to Work or NOT

TO BYOD OR NOT

cell-phonebyod

 

According to Bob Egan of Forbes, the concept of BYOD (Bring Your Own Device) for business died a natural death nearly two years ago. The concept was however extremely popular when smart phones, iPhones, and Blackberry first came on the scene, primarily because of the convenience it offered for both employers as well as employees. As time passed, the thrill wore off and problems emerged. The question then remained was – Is BYOD good for business? Well the simple answer is “Yes it is.” Egan qualifies his opinion about the death of BYOD by saying “BYOD as we know it is dead”. There is little doubt though, that the phenomenon has changed the way businesses function. Let’s see what has changed and whether BYOD is still a good business practice.

The Good

 

tee-shirt-femme-ilove74-authentique-sep7qu4treSmartphone voicemail%20sent%20via%20email

 

Let’s begin with some stats. One survey by Entrasys shows that BYOD is practiced by 74% companies. IDC 2011 however differs by saying this figure is underestimated by about 50% which means more than 74% companies are using it. Roger Bjork, of Dell Enterprise Mobility Solutions says that employees who are allowed to bring their own device to work put in more hours as compared to those who are not. These figures show that BYOD is definitely good for business. Simply put BYOD facilitates easy access to CRM, knowledge base, database and other resources allowing employees to work from anywhere. Surely it is advantageous for this reason alone.

Another major plus is that your database / knowledge base stays up to date right up to the minute which in turn means you have access to real time data that you can effectively use for lead generation, conversion, and increasing ROI. You can also effectively reduce costs – particularly hardware costs – by allowing employees to use their own hardware devices. BYOD means your employees – and you too – can work even when the office is closed.

Expansion is another area where BYOD will work in your favour. Expanding across time zones is much easier if you just allow those working with you to use their own device instead of insisting that they have one dedicated to your business. With so much in its favour, why did the practice lose steam?

 

The Bad

3d small people - smartphonebyod-security-100437152-primary.idgefuera

 

 

One thing about BYOD is that there is a lot of grey area. Who for example would provide technical support for the devices owned by the employees but used for office work? The employees would naturally look towards their employer which means additional costs for round the clock support. After all if you want them to work round the clock you should too. Another big thing going against BYOD is the fact that data on mobile devices is exposed. Most people leave their private phones lying around carelessly and many of them are not secured by passwords or pins, for the simple reason that they are personal. Loss of personal devices is another big threat when business data is available on personal devices.

Another argument against BYOD is that employees who quit carry sensitive data and information with them. They may still have access to your database unless you ensure their account is deactivated. Even then they may have data and information downloaded on to their device. This is a leak that can easily go unnoticed unless you are alert to the possibility.

Data on personal devices could therefore mean a ticking time bomb for your business. Data exposed in this manner means exposure to breach leading to loss of ROI and additional expenses for recovery. It is for these reasons that

business owners hesitate to adopt the practice of BYOD and why the practice petered out. We at Geex however feel that the advantages far outweigh the risks. After all there are ways to mitigate risks.

The Way to Go

 

byod_infographic  data-security-2012

 

 

So! Like everything else, there is a good and a bad side of BYOD. But the question still remains, how to mitigate the risks? Managed care is the simple answer to that one. At GEEX we can provide you complete BYOD management. Our services will help you mitigate the risk of data loss by defining and implementing protocol. We will provide you a single window service for all types of devices used by your employees. We can ensure secure data transfer through encryption. Enforcing protocol is achieved through monitoring access to corporate resources. Data loss is prevented by techniques such as need based access, automated memory wipe, remote locking, and device tracking. We also help you conduct periodic audits to identify potential leaks and plug them well in time. As your managed care consultant, Geex can help you establish and implement the protocol for all devices that your employees bring with them. Following these guideline, we can guarantee almost 100% security. Well we’re not God so 99%.

Categories
Apple Laptops Leasing Macbook Pro

Flash Storage – The Flip Side

hdd-ssd-2

Will HDD outlive Flash?

HDD (Hard Disk Drives) have held court for decades mainly because of their low price, easy availability, and seemingly unlimited capacity. The main and conceivably the only drawback is its inability to retain data in case of a power outage. For this reason flash storage is gradually displacing HDD. Flash drives on the other hand are portable, use less power, and are not susceptible to high power or magnetic fields. These are some of the reasons why flash storage is gaining the march over HDDs. As with everything though, there is a flip side. We have put together some of the things you should look out for when considering a switch.

Price vs. Performance

Rick Delgado on SmartDataCollective opines that though its high performance lures users to flash storage, there is a price tag – literally. The cost of flash storage is considerably higher than HDD. Solid State Drives come at an estimated price of £60 per TB as compared to 1 penny for HDD. True enough. But we feel the price will issue will resolve itself as the technology becomes more popular and gains advantage of bulk manufacture. So if you are considering a shift, allocate a high budget for hardware. It will surely generate ROI albeit in the long term.

Capacity

Big-small-boxing-gloves

HDDs come cheap with high capacity. The best flash storage devices can barely touch 1 Tetra Byte. Also reports show that flash storage with high storage capacity trades off on performance. This can be a big disadvantage for enterprises that have large volumes of data and high performance requirements. However, research has by no means stopped nor has advancement. As we mentioned (or did we?) earlier that as the technology becomes popular, many issues will be resolved and we hope that new research will find a way for flash storage to store large volumes of data.

Re-usability

The life of a HDD is almost equal to the life of the machine that uses it. Moreover HDDs can be easily replaced at low costs. Flash storage devices on the other hand have limited capacity for reusability. That is to say that you can write and erase to and from flash storage devices only so many times. After that the device must be scrapped and replaced. This means additional hardware costs – definitely a no-no.

Security

security-dog-t-shirt-135-p

Many flash storage devices have no write protection unlike CDs. This means that your data can be accidently overwritten. This is something that no business would like to risk. Security is a major concern for business enterprises big or small. Hence flash storage may not be the storage of choice for most businesses. Once again, at the cost of repetition, we hope this issue will be resolved in the near future.

Portability

Though its small size makes USB flash storage devices highly portable, this very characteristic makes it a great risk for business. Flash devices are small in size and easily lost. The metal tab may be broken or damaged if left exposed – and this is highly probable because the even smaller cover may be lost or misplaced. Losing a flash drive does not only mean losing data; it also means exposing your data to unscrupulous elements who may misuse it or sell it for a profit, not to mention the cost in terms of lost opportunity and the cost of recovering / recreating the data.

The Solution

solution-clipart-solution-hi

There is little doubt that the time is ripe to move on to a more advanced storage system. However flash storage is apparently not the solution of choice because of its many disadvantages. As technology advances however, we would likely see an improvement in this storage method. Data Reduction technology is perhaps the next step towards taking full advantage of flash drives. Look out for our blog on Data Reduction and Alternative Modes of Storage next month.

Inspired by:

http://www.smartdatacollective.com/rick-delgado/281126/reviewing-benefits-and-drawbacks-flash-storage

Categories
Apple Blog Laptops Leasing

Your Network is Your Business – Keep it Secure

Ensuring Complete Network Security

social-network

 

Network security has gone from being static to dynamic within the past decade. Traditionally, security lay at the bottom of the priority list with a few routine tasks associated with it such as backup and clean-up. That is until networking, virtualization and cloud computing came along and changed things. In the earlier scenario, when a security breach occurred, only the computer on which the breach occurred was affected. With more and more devices being connected, the entire network is at risk even if just one device is compromised. Networking and virtualization have also posed some new security risks as has cloud computing. We at Geex make it our business to find out what these risks are and how you can deal with them. Here’s a list of precautions you can take to protect your network.

Virus Scans

virus_scan

The oldest and the most trusted way to avoid virus, worms, and other malware, is to use a security suite. Yes its tiresome when you boot up and your computer makes you wait while it runs the virus scan but remember its not just your computer or node but the entire network that’s at risk. Also remember to keep your security suite up to date so that it can take care of all the new malware that is released almost every day! At Geex we have a practice of monitoring the update of every security suite we install or manage. We also keep track of any new malware that has emerged and its antidote.

SPAM and Phishing Filters

Spam

Although harmless, spam has a high nuisance value when it keeps appearing in your in-box. Phishing on the other hand can be really harmful if it succeeds in extracting personal and sensitive information. Most email service providers have built in filtering for spam and phishing. There are also some commercially available filters that you can use. Stay up-to-date on the latest about these filters and ensure that you are not bothered by Spam and Phishing.

Encryption

1.2.3-EncryptionandSecurity-encryption

Some unscrupulous individuals use a program known as a packet sniffer to cull information from data packets flying across the internet. If your information is encrypted though, the sniffer will be unable to make sense of the information culled. Make sure all information you send out is encrypted. Many sites and service providers have inbuilt software for encryption and decryption. If your data is really sensitive, you can purchase stronger software – or have your own code written – to make the transmission even more secure. We at Geex can help you obtain the software and keep it up to speed.

Mind the Hardware

One much ignored breach is loss of hardware. With more and more people using mobile devices, loss of hardware can lead to a serious breach in the database. Cloud computing complicates things further since many of the devices are logged on to clouds which house business databases. The solution to this problem is not as simple as installing a software – though you may need that too. What is required is a complete security protocol for one and all. We at Geex can study your business and recommend the best protocol for you.

Sign Out and Stay Secure

remember-sign-in-and-sign-out-every-day

“Do you want staff to to remember the password for this site?” Sounds familiar? And we all too often hit yes thinking “What if I forget the password?” But this can be a dangerous practice especially if you are using a shared computer on a network. Never leave a computer signed in. And of course you should never ask your computer to remember your password for you. Change your password frequently. Clear the cache frequently. Check the Delete History box on your browser setting. Phew! That’s a lot to remember right? We can help by establishing the protocol for you.

Pssst! BYOD

This one is really tricky! When employees change jobs, they often carry their mobile device with them. The best thing to do for this is to present your employees with office devices which they leave back when they quit. What happens when you upgrade though? Well back to protocol! Esta     blish a clear protocol for disposing obsolete hardware safely. Make sure all sensitive data is deleted before it leaves your office premises.

 

executive-summary

Summing up ….

In today’s world where people conduct their day to day transactions using their mobiles, security becomes a great concern. However, as the risks increase, the security solutions improve too. We at Geex can help you manage your network ensuring complete security for your data. Just leave your name and number and we’ll tell you how.

Categories
Blog Laptops Leasing

Windows 10 – The Good, The Bad, and The Ugly

Windows 10 Update What to Expect

 

“Windows Updates aren’t always a good thing”, says Sarah Tew of CNET while narrating the story of Teri Goldstein, travel agent from California and her experience with the latest version of Windows. The new update for Windows 10 rolled out on 29th July last year. Many Windows 7 and 8.1 OS users received free updates. The anniversary update is expected on August 2nd this year. Those who have not yet upgraded are being shown the pop up screen informing them that the free upgrade is soon to end. Geex has put together the good, bad, and the ugly about Windows 10 for your convenience.

wintpupd_big

 

Feature Highlights

The anniversary update (2nd August), is expected to improve Cortana, Ink, and windows Hello. The IE browser will be replaced by Edge so if you decide to upgrade you should upgrade your browser too. Edge supports biometrics so you can use your fingers to login.

Cortana and other applications will be more tuned in to the Surface Pen to make your work easier. This means that you can simply write down a note as you would on paper and Cortana will add the reminder for you. Similarly you can use the pen for drawing a route on your Google Map.

Google devices can be unlocked with wearables in the new OS. Other features include pre-loaded Skype apps, better menus, coloured title bars, additional features in the Start menu, messaging via Cortna if you have a Windows 10 phone, and better browsing using Edge. Although Edge extensions are not supported, this is expected to be included in updates in the new future.

What Users Say

Business Discussion

Windows 10 had more than its share of teething troubles. Some claim that the product was launched prematurely without fine tuning. While this claim is disputed, the fact is that the new version of Windows is significantly different from its predecessors. With the new release, Windows OS has moved to the category of service rather than software – at least conceptually so you can expect regular updates. Automatic updates bring on board new features and services. The next one is expected on the anniversary and one may assume there would be several more to come.

Says Matt Egan of PC Advisor, though the fall update had many new features, they were insignificant. Users have been asking whether or not to install the new update but apparently they do not have a choice.

Installation

Of those who have already installed the updates, many are happy and enjoying the new features. Others discovered to their peril, that all was not good and dandy with the updates. Some users complained that the update never ran beyond 44%. This bug was reported and resolved. Apparently you need to free up space – not an easy task considering Windows 10 requires 20 GB to install! Another fault (?) noticed by users is that the installation changes or deletes existing software, most of which is monitoring software. There are those who questioning,  “Is Microsoft removing potential rivals to pave the way for their own offering?” One really quirky thing about Windows 10 is that you have to wait a month before you can install the next update. Naturally people ask why? Some unlucky users simply do not see the update despite waiting the required 31 days! These users have to find a round about way to install the new update. And finally when all is well, the welcome installation dialog box will appear. But wait! Make sure you have taken a complete back up just in case some of the apps or software gets changed or deleted remember?

Do you really need it?

Summary Word Written By Hand

Good Question! As of 29th July 2016, it will no longer be free. It will cost you a good £99.99 for the home version while the professional one is priced at £189.99. That’s one good reason not to install right? Well Microsoft is really pushing for an upgrade with its “Sorry to interrupt…” screen. And why not? There are some great features included in the new OS. Besides older versions like Windows XP and Windows 7 may no longer be supported so you really have no choice.

What you need to know though is when the right time to install is. If you are the type who never installs paid software, then the time is ripe for you to upgrade. What about the problems with installation you ask? Well woes betide if your system crashes like Goldstein’s! We at Geex offer you a way out by planning your upgrade and installing it with care so that your system rem

Categories
Apple Blog Laptops Leasing Macbook Pro News

WWDC 2016 – Expectations and Revelations

WWDC-2016

 

WWDC 2016 – Expectations and Revelations

The World Wide Developers Conference (WWDC) is one of Apple’s most awaited events every year. Held in San Francisco, the 2016 conference was a huge success right from the start. Entry tickets cost 1599 USD and were sold by lottery. As usual the event was preceded by a lot of speculation. Expected were the launch of the new iOS, the new OS X and the new versions of tvOS and watchOS among other things. Read on to find out what emerged …

True to form, Tim Cook and company met most of these expectations, unveiling their latest equipment at Bill Graham Auditorium during the WWDC 2016 event from June 13th to June 17th this year. With thirty million registered members, the event was a huge success. Tickets sold out within a short while after opening. Scholarships were awarded to 350 students. More than a 100 attendees were underage with the youngest being just 9 years old.

News about the Apple Car and Apple Watch 2 was eagerly awaited. Other highlights included Apple Music, iOS 9, and OS X EI Capitan. New MacBook and the much discussed, much awaited, larger than life Apple Television.

The event revealed…

 

cvxcv

watch OS 3

Major improvements were seen in the watchOS 3. A new version of the Apple Watch OS with improved features and promises to overcome some of the glitches and complaints of users which included speed, background updates, a dock to keep your favourite apps, and faster refresh. Another interesting new feature is the ability to swipe between apps just as you do on an iPod. Messages now have built in replies that you can select from or you can install scribble and create your own replies. Activity sharing is one more new feature in the watchOS 3.

 

gdfgdfg

tvOS

For those who are allergic to the Apple TV remote, Apple has introduced a new feature whereby you can use your iPhone as a remote for your Apple TV. You can also use your phone gyroscope for gaming. Siri has gained approval for Apple TV. You can now search for movies and You Tube by categories such as “high school comedies”. Video channel apps have been enhanced for ease of use. Downloading apps on your phone will automatically download them on the big screen too.

MacOS Sierra

OS X is now a thing of the past. MacOS – which is OS X with Siri – is the new Apple OS. This one is named MacOS Sierra. The focus in the new OS is continuity, Siri, and iCloud. Continuity does away with the need to enter a password every time you unlock your Mac. If you are wearing your Apple Watch, your Mac will unlock automatically when you come close. The universal clipboard is another new continuity feature which allows you to copy and paste between your Mac and iPhone. The overall Mac experience has been enhanced with tabs for multiple windows. Siri has been permitted on the mac OS. It will reside on your dock and you can use your voice to operate your Mac. You can do a lot with Siri on your Mac such as pin your results to notification, drag the results into docs, and send messages. Basically it works the same as on your iPhone. Though the full release is expected in the fall, the beta version is immediately available to developers.

Apple Music

Apple Music has been completely redesigned making it easier to use with a host of new features. The use of 3D has been enhanced in the iOS 10. The phone now wakes up merely by raising your hand. Notifications have become interactive. You can even manage them without unlocking your phone. Messaging is also possible without unlocking. There is a much bigger space for music on your lock screen. Access to widgets, music, and the camera is easier.

Siri

Siri is now being offered to developers, which bodes well for app development. Siri has also been linked to WhatsApp as has Slack. Uber and Lyft can also use Siri as can Pinintrest, MapMyRun, Skype, and Runkeeper. Quicktype has become more intelligent offering location and calendar enhancements like auto-fill and pre-fill.

 

siri_pro

Pictures and Photos

Facial recognition has been introduced and you can pin your picture to a map to know where you took the photo. You can also search your picture based on its contents such as mountains, sea-shore and so on. The picture enhancement comes bundled with Memories, a new UI.

Maps

Similar to Google, Apple maps will now suggest alternative routes based on traffic. Information about restaurants close by and turn by turn directions have also been introduced. Apple Maps is also being offered to developers among other things.

printable-treasure-map-for-kids-1

 

News

After a somewhat bumpy beginning, Apple hopes to enhance this feature by dividing it into sections. The topics have been revisited as have the subscriptions. You can now see subscribed content in your app.

Homekit

Like News, Homekit did not have a great start. But the new updates have enhanced this feature. There are now cameras and door locks within Homekit. It has a new name too. It’s now simply called Home. You can personalize it and keep all your accessories linked to it. Scenes, a new feature, allows you to have different scenes for bed time and day time. Siri has been linked to home. The app is available in Control Centre and you can use it on the go. So when you are close to home, it will turn on the lights, heating etc. for you even before you arrive. Voicemail transcription, another new feature transcribes your voice mail so that you can read it instead of listening to it. Spam labelling has been introduced. Links can be played inline and images will pop up from links directly. Emojis have become predictive and three times their size. Words which can be turned to Emojis will be highlighted as you type.

Summing Up…

The biggest thing that emerged, considering that the WWDC is a developers’ conference, is the new iOS 10, the enhanced MacOS, and the fact that Siri has been opened to developers. The new iOS 10 which comes out this fall, has many new features, some useful some not so useful. Same for the MacOS. A preview will be available in the next month. We are waiting for users reactions to the new features and hoping for many more in the next conference.

References

http://www.macworld.co.uk/feature/apple/apple-spaceship-campus-facts-pictures-video-info-video-3489704/

http://www.in.techradar.com/news/computing/apple/WWDC-2016-everything-on-the-gigantic-changes-Apple-announced/articleshow/52156103.cms

 

Categories
Blog Laptops Leasing

The Dreaded Blue Screen of Death!!!!!!

How Managed Care can help you avoid BSoD

 

2012_12_04_72_windows8upg.bVv1018-01-weddingzillas-taming-the-grrom-stressed-man_listressed-shutterstockkeep-calm-and-don-t-break-your-computer

 

If you’ve ever experienced a system crash you’ll understand the frustration that goes with it. BSoD (Blue Screen of Death) so named because of the blue screen displayed when the phenomenon occurs is a system failure of a windows PC when there is a problem with the hardware or software which causes the system to shut down. When a BSoD occurs, you could lose important data that can cost you a pretty penny to recover, not to mention the loss in business because of down time. Read on to find out how you can avoid this disaster.

Run a virus scan

 

Webroot-SecureAnywhere-Antivirus-1Y1U-500x500

A virus in your computer can cause your software to mal-function resulting in a critical error which cannot be resolved by your OS. The only option then is to re-boot which means data in your RAM will be lost. The best thing you can do to avoid such a situation is to ensure there are no viruses in       your computer. This is easily done by running periodic virus scans. If you have managed care for your business, your technician will ensure that your anti-virus software is up to speed and will run scans every time he visits.

 

Install all Windows and other updates

Every device your computer uses such as a mouse keyboard or printer requires software called a driver to use it. Older versions of drivers may not necessarily be compatible with new devices. This can cause problems which older versions of OS may not be capable of resolving, resulting in the dreaded BSoD. Regularly updating your hardware and software will ensure that there is no incompatibility. Upgrade to newer versions of OS as they are released. OS manufacturers usually ensure that newer versions are compatible with new software. This will help you avoid a crash and loss of valuable data.

 

support-11

Uninstall unnecessary applications

We often download applications that we think may be useful but are never actually used. Some applications are downloaded simply while surfing the internet. Consider what happens when you try to run a video. You will usually be offered the latest version of Flash Player for download. Clicking on the download button will download the software which may intrude into your presentations and other media files you may have in your system. If your OS or other media applications are not compatible with the latest version of Flash, your system is likely to crash. Such situations can be avoided by regularly checking for applications that are not frequently used, and uninstalling them from your computer. Your managed care technician will check for unused applications when he visits and let you know which ones may be uninstalled.

 

Disable-Unnecessary-programs

Don’t change settings you don’t understand

Remember the days when you could not paste something you had copied from excel into word? Well now you can and it’s convenient. What we don’t realize is that the two applications have been synched to work with one another and changes to one may affect the other. This is true of many applications running on windows today. Applications often prompt us to change settings and we click yes thinking that it can do no harm even if it does no good. This is a big mistake since settings for one application can affect another in a windows set up. Your managed care technician will suggest the ideal settings for your software based on your requirements.

 

Computer-GeekPC-Help

Make sure you have enough RAM for any applications you install

As you probably know, applications reside on your hard disk and run in the RAM of your computer. Modern applications incorporate more and more user requirements and hence require more space to run. Ensure that your machines have enough RAM to house not only the application itself, but also the data that it will be using. Consider a simple task of writing a blog. At the very least you will have a browser and MS-Word open. That’s a good deal in and of itself. In addition to this you will have the data you typed into word and the data downloaded through your browser. You will also have your OS already residing on the RAM along with any other applications such as virus scan or clean up running in the background. Quite a lot for the RAM to handle don’t you think? So it’s important to have a big RAM if you expect your computer to handle multiple tasks and still stay up to speed. Your managed care technician will let you know when you need to upgrade your RAM so that you do not run into problems.

To Sum Up…

 

You need GEEX ManGEEX ManGEEX Man

Categories
Apple Blog Laptops Leasing Macbook Pro

Ransomware Will Seriously Ruin Your Day!

 

 

dfsxdf   Ransomware 101   fake-ransomware

 

 

What Ransomware is and what it can do to your business?

Alternate Titles: Understanding Ransomware and its business risks

What Cryptoware (Ransomware) can do to your business

Business Risks of Ransomware / Cryptoware

The increasing cases of ransomware threats has made it necessary for business persons to understand what it is and how it might affect their business. Quite simply ransomware is software that takes charge of your data or applications, encrypts them, and then offers you decryption solutions for a fee. That’s the reason its also called cryptoware. The risks? Well here goes…

Introduction

Ransomware is an out an out criminal activity. Its not merely an attempt to steal your data. It’s a blatant kidnapping of your computer and possibly your entire network! Not only is your data encrypted, the criminals – yes it’s a criminal activity – have access to that data and they can use it as they please! One thing to remember though is that they are after money and not the data itself. Often the data may be of no use to them.

The Threat

Cryptoware encrypts your data using code which has a key. The criminals then offer you that key for a specified amount of money or else. They will threaten to make all your data unrecoverable after some time. Your data will then be in their control and they may publish sensitive information that could harm your business. Some of these criminals even pose as law enforcement officials and threaten to prosecute you! As time passes, they’ll increase the amount of ransom and worse harm even your bootstrap software so that your machine crashes. They will warn you that your entire network may become useless unless you purchase the key from them. They will give you deadlines by which you must purchase the key or risk losing your data.

ransomware  ransomwarevbcvb

The Impact

When ransomware targets individual machines, it affects only that one machine but when it targets your business, if even one machine is affected, it can spread quickly over the entire network. This means all data on the server and cloud plugins like

OneDrive, Dropbox and Livedrive is affected. Once a gateway is opened through one computer on a network, the data on the entire network can be encrypted and your business held to ransom.

ghvghvgh

The Consequences

Says Mitchell Berenson of Intermedia, the dilemma for a business affected by ransomware is whether to pay ransom or spend precious hours recovering data from backup – which often is slack because of lack of time in the first place! Whatever you do, you’ll face serious downtime which means lost business. The downtime is anywhere from 2 days to more than 5 days. Imagine all the customers that would turn to competitors in that time, not to mention all your employees being paid for sitting around doing nothing! Add to that the overtime you would pay your IT staff for recovery. And if your backup procedure is slack…

 

Some Hard Facts

Cryptoware is not limited to individuals or SMEs. It can impact big business just as easily. A survey by Intermedia found that 60% of the businesses impacted by Ransomware had 100 or more employees. 25% had more than a thousand employees. The impact began with 2 or more computers and quickly spread to over 20 in 86% of the cases. Quoting Luke Skibba – Gigabitgeek on Twitter, “After shutting down the computer of the affected user and taking her off the network, we determined she had been hit with the CryptoWall ransomware. We had 90 percent of our files be encrypted. This impacted every user in our whole company.”

Don’t Panic

Ransomware is a rapidly growing threat to businesses with even IT firms falling victim. The attacks are expected to increase in complexity. The time to take action is sooner rather than later. As they say, a penny in prevention is worth a pound in solution. Walter Chamberlee, Director (IT) from Signaturefd.com says, “Ransomware attacks are on the rise and are growing in complexity. Without the right protection measures in place, ransomware can be majorly disruptive to a business. In these cases, it’s the user downtime and the hassle for IT that’s far costlier, even if you pay the ransom.” That is not to say these attacks cannot be prevented. Managed antivirus protection can help you avoid an attack. So go for it now before it’s too late.

 

 

Call GEEX today and we can protect you from Ransomware and many other types of virus’s

Categories
Leasing

5 Reasons Why Your Business Should Lease A Computer

If you are a start-up or a medium sized business with a limited budget, you have to make many compromises on the technology and office essentials. If technology is holding your business back then it is best to consider leasing laptops or computers. Here are the reasons why leasing is perfect for your business:

Easily Available Financing
If you plan to take an equipment loan from the bank, you are required to face verification of your financial records for the last 2-3 years and the waiting period will be longer, if any discrepancies are found. Leasing companies are more lenient and understanding. Many reputed computer leasing experts in UK also offer you benefits of quick delivery after the approval of leasing.

Manage Cash Flow
Leasing helps small businesses to take care of their finances and manage cash flow efficiently. There are no down payments involved in leasing, while equipment loans require people to make a payment of up to 25%. There are various short term leases available that will require less capital than required to purchase a new equipment. Also in terms of depreciation, leasing is a feasible option than buying.

Opportunity to Keep in Touch with the Latest Technology
The lease period usually lasts for two to three years – which is the average lifetime before the equipment will require the next upgrade. Many leasing agencies offer benefits of annual upgrades, which means smaller companies can meet the technology competence of their big budget competitors without draining their finances. Leasing also protects these businesses from technological obsolescence that they may have to bear at the end of the lease period. They can upgrade to new equipment to keep in pace with the competition.

Predictable Monthly Investments
Leasing companies allow companies to pay predictable monthly payments which will help them to manage their finances for developing the business. By leasing, businesses can cut down on additional costs that they may incur on software, installation, maintenance and training for employees.

Complete Equipment Support
Leasing agencies allow clients to concentrate on their business and stop worrying about equipment upgrades, warranties, software and hardware related issues and problems by offering full support.

Ideal for technology start-ups as well as established businesses, GEEX allows companies to lease their computers – Apple products, PC/laptops and desktops. By leasing their branded computers such as Apple, Samsung, Sony and HP from GEEX, companies can remain worry free and update themselves with recent technologies. To know more about leasing benefits with GEEX, feel free to contact us at 0121 285 0098.

Categories
Leasing

Why Is Computer Leasing Good For Your Business?

During these testing financial times, many businesses are preferring to lease equipment over buying. As a business owner, if you are unaware of the benefits of leasing equipment for your business, read on to find out how leasing can bring about the much-needed flexibility you need.

When cash flow is irregular, leasing is the right option
Many small businesses struggle to manage cash flow and meet daily expenses. In this environment, equipment leasing becomes the feasible solution. While leasing, you are not required to make any down payment, so it becomes easier to own an equipment without overspending.

Manageable Monthly Expenses
When the business is new, you cannot exactly predict where, and when, expenses may crop up. There might be some new investments, repairs, fix-ups and more. Amidst so much change, it is better to lease an equipment. The reason? Many people believe that predictable monthly cash management is the prime benefit of leasing. Most leasing specialists offer you the benefit of fixed monthly payments and that allows you to create a budget plan and work accordingly.

Leasing helps you to match pace with your big budget competitors
You are small a business organization, but that doesn’t mean that you don’t have to match the competition. Leasing helps you to match pace with your big budget competitors by owning modern and well-equipped computers and other technological equipments at a fraction of the original prices.

Technical support and equipment upgrade
With such rapid technological advances, it becomes difficult for businesses to match pace with the current technological trends. Leasing companies provide equipment upgrade and technical support that allows businesses to stay updated with the current trend. After the expiry of the lease period, you can easily lease the equipment that is newer, cheaper and/or quicker.

You can own the equipment forever
Some leasing companies will allow you to own the equipment after the end of the initial lease period for a fixed price or a fair market price, whichever is applicable. By paying small monthly payments, businesses can have access to newer technology that they cannot afford to buy otherwise.

If you wish to lease, you can always approach the reliable IT support and leasing experts in UK– GEEX. Leasing becomes an easy process with GEEX experts. Exclusive GEEX advantages include – fixed monthly repayments, 3 year warranty and support, upgrade available after 18-24 months and option to own the latest technology.

GEEX can provide managed anti-virus on all our support and leased products. The anti-virus software is continuously monitored to make sure it is up to date and if you do get infected then our support team are notified and they can deal with any infection immediately.

Why not give us a call or email to find out more.
info@localhost / 0121 285 0098