What Makes ETS IT Solutions Different?
We focus solely on Long Island small business and use a combination of IT best practices. ETS IT Solutions is a top choice for your IT support needs because our employees are highly skilled and friendly professionals. Our years of experience helping various types of business will ensure your onboarding process is seamless.
How Long Of A Response Time Should My Business Expect?
We typically will have a member of our team working on any critical IT issues within 60 mins from when the request gets made. If the problem is more complex, an escalation within 120 minutes.
How Easy Will It Be To Switch My Business IT Support?
It will be smooth process. Our experienced transition team has created simple to understand procedures that has helped companies throughout Long Island to this and the entire processes takes from 2 – 6 weeks depending on the size of your organization.
Will you support us 24/7?
Our team is accessible and eager to help you, even outside of normal business hours
Do You Include Any Software As Part Of The Package
Yes, ETS IT Solutions offers various tools for deploying on your IT needs. We offer antivirus solutions, password manager, Microsoft Intuit, business email suite, and the list is growing with each month.
How Is Your Security?
We maintain a healthy level of Cyber Security as standard, but will work with you to produce a customized security plan to meet your business requirements. We vigorously keep up with modern best practices to ensure nothing in your networks is vulnerable to cyber threats.
FAQ For Working From Home Offices
Should I Go With New Or Refurbished Computer For My Office?
Going with refurbished computers for an office can be cost efficient but run the price of being subpar hardware. New computers are consistently using groundbreaking tech in every upcoming generation release.
How Many Screens Should My Front Office Desk Have?
The ideal number of monitors for a workstation is three, but most desks can only support two standard sized monitors. If you only are using one monitor, here are some tips on how to ergonomically position it.
- Place the monitor directly in front of you.
- Ensure the monitor is at arm’s length from you (18-28 inches).
- Position the top usable line of the monitor at a height where your neck is straight.
- Place the monitor at eye height for people who do not wear glasses or contacts or those who have single prescription lenses, and below eye height for people who wear bi-focals, tri-focals or progressive lenses
What Activities Should You Avoid Doing On Your Work Computer?
Nobody wants to be told what they can’t do. Still, there are certain never do’s that you should have in mind for your work computer. Below explains the top things you should avert doing on your work computer.
-
Do NOT Store Personal Data
-
Do NOT Connect Personal Devices
-
Do NOT Conduct Side Business or Job Searching
-
Do NOT Long On To Public Wi-Fi (Without VPN)
-
Do NOT Login To Personal Service, Sites, or Social Media Accounts
-
Revoke Remote Access
-
Switch To A Simpler File Naming System
Why Do I Need To Update My Computers Firmware?
Firmware can distinguish between your webcam being a virtual way to communicate with friends or an unmarked surveillance camera by a faceless state apparatus, if not configured correctly.
- Most of us can understand the difference between hardware and software, but how many know what firmware refers to? Without firmware, your devices wouldn’t know how to detect their hard drives, and the parts on the business printer wouldn’t spin to pull the paper through the device. There’s firmware in network and routers, range extenders, keyboards, sound cards, routers, range extenders, keyboards, and more.
Cybercriminals count not only on a single tactic. Instead, they are constantly integrating new ploys to exploit organization systems, devices, and this includes attacking firmware. Without securing your firmware, you run the chance of encountering suspicious people:
- spying on field activity;
- stealing work data;
- seizing control of your business computers.
What Is The Difference Between Wi-Fi Signals (2.4 Ghz VS 5.0 Ghz)
The latest routers offer both the older 2.4 GHz and the faster 5 GHz frequency, which has less interference. Since 5 GHz isn’t as common, you’re less likely to compete with neighbors for Wi-Fi signals.
- 2.4 Ghz best for long distance, low bandwidth use (Cellphone).
- 5.0 Ghz best for high bandwidth demand (Video Conferencing).
Why Should I Never Use Free Email For Business?
Imagine if banks used free email accounts – you’d never feel comfortable giving them your personal details, let alone any money. How people perceive your business makes your business and using a free email address will look unprofessional. Without that expert touch, you’ll appear temporary and fly-by-night. It puts your credibility into question and sends the message you’re not serious about doing business – or worse – that you’re prepared to cut corners.
Wi-Fi Extenders vs Wi-Fi Access Points
Modern office spaces will have fewer connectivity issues in using Wi-Fi Access Point because they actually support 3X the amount of devices while increase increasing the amount of capacity connection compared with range extenders. They can also get installed anywhere with ethernet cable because they power modern devices over the ethernet connection. The security features in Wi-Fi extenders and access points are different too. Such as limited guests access to grant visitors with internet that is not a network risk and select point access for must-secure devices.
- Access points are devices that set up a wireless local area network, or WLAN, usually in a large workspace like office buildings. An access point hooks up with a wired router, switch, or hub via a Wi-Fi signal or Ethernet cable, and projects and within a designated range.
- Range extenders expands the reach of an existing Wi-Fi network. Since range extenders wirelessly linkup to Wi-Fi routers, we must place them in an area with strong Wi-Fi signal, not in the location of the actual dead spot.
How Is My Cloud Storage Tracked?
In fact, when you use a cloud sync app like Dropbox, they’re sending your data to one of these locations. While the sync services have a constant back-and-forth connection between the storage center and your folder, and as explained here aren’t good for backup, you have another option.
- Your backed up data is secure against disaster, and always available to you. However, because it relies on you/your employee to handle the backup plan and manually take care of the uploads, this is a high-risk solution.
- Your backed up data is protected against disaster, and always available to you. However, because it relies on you/your employee to handle the backup plan and manually take care of the uploads, this is a high-risk solution. Unless your employee is scouring your network each day/week/month for changes to files and uploading them with fervent dedication, chances are this plan won’t work. We recommend an automated or outsourced solution so you can get on with business AND be protected.
How Is My Cloud Storage ACTUALLY Stored?
Good question. And it’s why the term ‘cloud’ causes so much confusion. The data absolutely must be physically stored somewhere. Companies who offer cloud storage have enormous warehouses committed to holding servers whose sole job is to send and receive data all day. And by enormous, we are talking about HUGE.
You could actually get lost walking the rows of servers, just box after box for what seems like forever. The biggest server farms or ‘cloud campuses’ are still growing, but to give you an understanding: they can be upwards of 1million square feet. It’s big business, literally.
What Is The Rule Of Three In Backing Up Data?
We recommend keeping one copy on the computer/device, another on an external drive, and a third copy as a last resort tucked safely away in the cloud.
The cloud backup can be fully automated so you don’t even need to worry about remembering to do it. If the day comes that you need your data back, it’s ready and waiting in perfect condition. Cloud technology also means your data is far away from any potential fire or flood, it’s secure and with the right provider, guaranteed against loss.
FAQ About Cyber Security & Threats
Do I Really Need To Pay For Antivirus Security Software?
Using free or paid software eliminates not only compromised files but also maintains a database of known and reported malware. Higher end antivirus tools also monitor web browsing or monitor email clients. Using antivirus blocks you from loading up a harmful website and detects suspicious emails by flagging them.
Using a robust single solution over two fewer ones is recommended, Some features to look out for are prevention, detection, clean UI, and responsive customers service. On threats; Spam now contains malware! Hackers are now sending cleverly disguised emails to your business. After being clicked by an employee, it infects your computer network system (virus) or strips your private data (phishing). The malware can then flow across the entire computer network and beyond, including to your clients and vendors.
The case that your employees must halt and inspect every single link and attachment adds hours of lost productivity. Every once in a while there is spam that is so convincing, only an expert would be able to visibly identify it. Employees are likely to miss an important email, either not noticing it appear at the same time as a spam attack or becoming overcome with the large number of emails.
Ways To Stay Safe From Scams On Social Media Like Twitter & Facebook?
-
Stay Clear Of Freebies, Survey, and Personality Quizs
-
Overview The Sharing Permissions On Your Social Media Profile
-
Avoid Giving Out Unnecessary Personal Information
-
Don’t Friend Strangers
-
If It Looks Weird, Do NOT Click It!
What Are Signs Of Computer Virus How To Properly Diagnose?
-
Unusual error messages With Odd Pop-ups
-
Not Downloading Softwares Updates When There Are Important Rollouts Of Updates
-
Suddenly deactivated Malware Protection / Anti-virus Software
-
Lost To Access Of Computers Control Panel & or Other Tools
-
Sent Messages From Your Social Media Accounts That You Never Sent
-
Web Browser Is Changing Your Default Settings Like Preferred Search Engine (Adware)
-
Overall Computer Performance Is Sluggish
-
Computer Desktop Is Filled With Unknown Icons Linking To Unknown Destinations
-
Computer Activity Is Connected To The Internet… Constantly
Making A Recovery Plan Beforehand Helps. Planning can make responding to these nefarious actors less stressful. Organize documents that explain how to disconnect infected computers from the network as soon as possible. Second, power down any machines that share the same network and could be vulnerable to avoid spreading contagion. You should also in advance bring-up whether your business will pay any ransom.
What Can You Do to Protect Client And Customer Data?
Require employees to record lost and stolen devices, and make sure every individual at your office is maintaining strong passwords. Also, please do NOT let employees keep their password on a Post-It note stuck to their desktop! OK, so you now how you need to protect your client data. The question is, why do you do it?
#1 Keep software up to date
Regularly managing your software is a strong security measure. The latest updates often add new code to address known security threats. If you can’t or don’t keep your software current, at least take it offline.
#2 Ramp up network security
Firewalls, antivirus software, and intrusion prevention systems should address every network layer. Encrypt any stored or distributed electronic files and documents, both at rest and while in transit.
#3 Limit access to data
Not everyone in your business has the same demands for data access. Limit information access to an as-needed basis. Establish who has what responsibilities and the information they need to access, then assign access privileges based on their role.
#4 Educate employees
Everyone working at your business needs to understand the value of your client’s data. You can’t expect someone to avoid phishing scams and other social engineering tactics if they don’t understand the danger.
What Are Ways Ransomware Worms Into A Network?
It’s NOT those no-name USB drives floating around from anonymous sources. That’s so passée, and cyber criminals operate more adequately today. Websites and Email when compromises are the most prevalent tool used in ransomware attacks websites and email.
-
All Hackers Need Is One Click From An Email
-
Replicating (Spoofing) Official Webpages Like Banks & Government Sites
-
Using Public Profiles To Impersonate Someone (Phishing)
Why Should I Never Use Free Email For Business?
Imagine if banks used free email accounts – you’d never feel comfortable giving them your personal details, let alone any money. How people perceive your business makes your business and using a free email address will look unprofessional. Without that expert touch, you’ll appear temporary and fly-by-night. It puts your credibility into question and sends the message you’re not serious about doing business – or worse – that you’re prepared to cut corners.
How Is My Cloud Storage Tracked?
In fact, when you use a cloud sync app like Dropbox, they’re sending your data to one of these locations. While the sync services have a constant back-and-forth connection between the storage center and your folder, and as explained here aren’t good for backup, you have another option.
- Your backed up data is secure against disaster, and always available to you. However, because it relies on you/your employee to handle the backup plan and manually take care of the uploads, this is a high-risk solution.
- Your backed up data is protected against disaster, and always available to you. However, because it relies on you/your employee to handle the backup plan and manually take care of the uploads, this is a high-risk solution. Unless your employee is scouring your network each day/week/month for changes to files and uploading them with fervent dedication, chances are this plan won’t work. We recommend an automated or outsourced solution so you can get on with business AND be protected.
How To Identify A Phishing Email (5 STEPS)
These five signs quickly spot the red flags and put phishing emails where they belong:
- Poor Spelling and Grammar
- An Offer That Is Too Good To Be True
- Random Inquiry From A Stranger Who Knows A Little Too Much About You
- The URL or Email Address Is Not Entirely Correct or Looks Suspicious
- Being Asked For Personal, Financial, Or Business Details
FAQ About Managed Service Providers
What Are Ways Different Company Departments Prevent Data Silos?
Each department has its own goals, so it gathers and keeps data for its own purposes, and it does this using various tools. One area of a hospital might use spreadsheets, another booking software, and yet another has a cloud-based patient management platform. Each deals with data differently. So, how does technology break down the silos within organizations? Here are five strategies that can help.
-
Adopt the collaborative culture mindset
-
Clean Your Data (Keep Only Valuable Data)
-
Use Integration Software To Automatically Update The Network
-
Setup A Centralized Data Hub
-
Choose Applications That Fully Integrate
Managed IT VS In-House IT Services
Managed IT is our solution which gives you that team of specialist technicians and network experts, without the ‘quick, look busy’ element – and at a fraction of the cost. Naturally, you’d rather see your IT budget working to support your growth and kept as low as possible. For SMEs who are looking for the best of both worlds, we recommend Managed IT services.
Availability
Managed IT is very different as we expect problems after hours and have support technicians ready. We know that every minute of downtime is affecting your revenue, plus your business reputation, so we prioritize getting your systems up and running ASAP. Your in-house technician won’t appreciate being woken at 1am and called in for emergency repairs. It’s more likely that they won’t answer the call (or hear it), or if they do, expect some hefty contract renegotiation come 9am.
Total cost
One thing that may have attracted you to having an in-house technician is the cost. But while you may pay them a lower hourly rate, there are extra costs like hiring, training, ongoing training, healthcare and retirement. By learning your systems, monitoring hardware activity, and looking after your IT on an ongoing basis, we are able to establish regular parameters for what to expect and what problems look out for in your specific systems.
Continuation of Training
Putting aside the fact your technician will often spend entire weeks away upgrading their skills and leaving you scrambling for support while they’re gone, those training costs quickly add up.
Different Goals
For most employees, a higher wage is the goal, and many will job-hop to achieve that. A salaried tech may look for the first opportunity to leave and get paid more, often leveraging all the training you’ve just provided. We work closely with you to provide the very best support and protect you from costly disasters, taking preemptive action to keep you safe and operational. There’s no doubt Managed IT is a better decision than hiring an in-house technician, and we’d be delighted to prove it to you.
Can My Business Is Too Small To Be A Target Of Cyber Crime?
The 2020 DBIR report from Verizon found that 43% of all cyber crime attacks target small businesses. Since The Beginning Of 2020, The US FBI Reported A 300% Increases In Reported Cyber Crimes. Cyber security fundamentals Learn more about and ways to implement them with these 11 essentials to know.
How Does Manage IT Secure My Business Against Cyber Attacks?
Using a managed IT service is a synonym for peace of mind for the less technical savvy. It’s also an added layer of security for those who are because technicians actively monitor your systems and order to catch issues before they occur. Managed IT services can also repair problems on the fly, and will ensure your business is always connected and secure as possible. Local Managed IT Services also offer expert business consulting around the best practices, which solutions will help you scale rapidly, and what technologies are obsolete. All for one predictable, fixed price each month. It gets better:
How Can Managed IT Help Increase Business Sucess?
When we get a call out, we’re happy to go out (or log in remotely) to fix what’s broken. We enjoy getting our customers back up and running quickly. Who said saving the day is only for superheroes, right?
Still, as much as we get a boost out of being the hero, we’d rather our clients’ systems didn’t go down. How can we make that happen? By adding you to our managed services client roster.
Fixing things when they break is reactive, whereas managed services are more proactive. It involves:
- Ongoing monitoring;
- Handling system patches;
- Managing software updates, virus scans, and keeping malware current;
- Checking hard drive health to help catch issues in advance;
- Tuning up your technology;
- Setting up new devices, printers, networks, and systems.
What is IT Project Management?
IT Project Management is the position of an engineer who oversees a project, depending on the project’s complexity this may include current technical staff or third party staff, ETS IT Solutions provide full turnkey start to end management when exploring the possibility of upgrading, downgrading, or moving. When hiring ETS IT Solutions for a project, your office will leverage the benefit of using equipment and expertise to assist with your goal.
What Is Considered A Project?
A project can be anything that requires careful planning and a budget, some examples of popular office projects are:
- Wi-Fi Installations
- Server Implementation
- Network Upgrades
- Security Implementations
How Much Does It Cost To Hire A Project Manager?
Projects can range from a simple engineer to a full team of professionals. ETS IT Solutions caters to small businesses so we understand flexibility, scalability, and the importance of using alternative avenues to reach an expected outcome.
How Are Projects Managed?
We follow five main phases throughout the project’s life cycle.
Project Initiation – Requires a meeting to discuss project goals, expectations, and budget. The designated project manager is assigned to the project and will review the project contract.
Project Planning – The project manager assembles and assigns team members to plan out all necessary steps to reach a successful conclusion. The team will run simulations in a test lab without interrupting current production and standby for approval on hardware purchases.
Project Execution – Once the project plan is thoroughly created, the team will schedule an execution date to install, configure, and implement.
Project Monitoring and Control – As the project is being executed by the project team, the project manager monitors and controls time, cost, scope, quality, risk, and any related factors of the project. This phase is an ongoing process to confirm the project properly meets expectations.
Closing – The final phase of the project ensures all work has been properly completed and approved. The project team will transfer ownership and provide all related documentation to operations.
We follow five main phases throughout the project’s life cycle.
Project Initiation – Requires a meeting to discuss project goals, expectations, and budget. The designated project manager is assigned to the project and will review the project contract.
Project Planning – The project manager assembles and assigns team members to plan out all necessary steps to reach a successful conclusion. The team will run simulations in a test lab without interrupting current production and standby for approval on hardware purchases.
Project Execution – Once the project plan is thoroughly created, the team will schedule an execution date to install, configure, and implement.
Project Monitoring and Control – As the project is being executed by the project team, the project manager monitors and controls time, cost, scope, quality, risk, and any related factors of the project. This phase is an ongoing process to confirm the project properly meets expectations.
Closing – The final phase of the project ensures all work has been properly completed and approved. The project team will transfer ownership and provide all related documentation to operations.
Why Should I Upgrade Cybersecurity For Small Business?
Think of the risk this way: you wouldn’t install a steel door and assign guards at both the front and back entrances, then leave a side window open. Of course, an open window is something you can detect from across a room, but misconfiguration are more difficult to detect. A vulnerability scan helps detect insecurities in your systems and software.
- Sometimes a file share is configured incorrectly: you think the connection shares to one person, but it’s 100% open to the public.
An automated scan proactively identifies network, application, and security vulnerabilities. This process aims to find any points of entry. A scan also predicts the effectiveness of any countermeasures you may have in place.
FAQ About VoIP Phone Services
What Are The Top 3 Things To Look For In A VoIP System?
-
Adaptive Service Provider: They should always improve their service with options and can shift to what the market requires.
-
Support: While 24/7 support is not a must have, helpful customer service is essential.
-
Moderate Amounts Of Down Time: A reliable VoIP service is essential and should communicate whenever they go offline.
Why Is VoIP Better At Business Security Compared To Traditional Landlines?
Most business owners consider their phone system security a given, but the operations can only be as secure as those who implement it. On-site systems are more at risk because of human error.
- For example, self-hosted VoIP systems require monitor displays to be installed for on-the-fly configuration updates that help protect against malicious attacks.
Why VoIP Has More Security Features than Regular Phone Lines?
Some people believe that VoIP is insecure because it travels over the Internet. Whereas regular phone calls have their own network. But again, enterprises have quite a few options with securing VoIP calls. End-to-end encryption, passwords changes at regular intervals, securing the endpoints (computers, SIP phones etc.) are stuff to try so things you can do at your end. Safe computing practices can also protect your phone system.
For instance, you can segregate VoIP calls from the rest of your business network through VLANs. That means VoIP calls don’t come into contact with regular data packets. That makes it easier to isolate problems and find out if someone has hacked into your network. That also means hackers cannot compromise the phones by breaking into other related systems.
Certain companies go to the level of extent, separating physical network for their phone calls. That way you have full authority over security. What takes place on one network will not have to affect all other networks. These are all options you don’t get with regular phone calls.
VoIP Verses | On-Premises Services V.S. Hosted PBC
Implemented through a Private Branch Exchange. (On-Premise Hosting & Cloud-based Hosting) These two types of VoIP systems have their disadvantages and benefits.
- On-premise services require actual hardware that is usually setup in the server room. Calls get through using a Lan Connection via IP Phones connecting with a PBX (IP-PBX-Server).
- Hosted PBX (Cloud-based) are third-party companies that carry the load of the hardware installation and the systems maintenance. This is the most convenient way to implement VoIP
Most business owners think they set everything upright out of the box, but the system can only be as secure as those who implement it. On-site systems are more at risk because of human error.
- For example, self-hosted VoIP systems require monitor displays installed for on-the-fly configuration updates that help protect against malicious attacks.
Comparing VoIP Systems [Grandstream Vs Yealink]
These two brands use their acquisitions and partnerships to complement their product assortment and interoperability while maximizing affordability.
- Yealink is a Chinese owned communications equipment company that designs conference phones and IP phones targeted at improving communication for businesses.
- Grandstream is an American owned communications equipment company who are most known for their desk and video conferencing phones over all other solutions.
Find Out Which is VoIP Brand Is Best For You?
How Are VoIP Services More Secure Than The Traditional Landline?
Implemented through a Private Branch Exchange. (On-Premise Hosting & Cloud-based Hosting) These two types of VoIP systems have their disadvantages and benefits.
- On-premise services require actual hardware that is usually setup in the server room. Calls get through using a Lan Connection via IP Phones connecting with a PBX (IP-PBX-Server).
- Hosted PBX (Cloud-based) are third-party companies that carry the load of the hardware installation and the systems maintenance. This is the most convenient way to implement VoIP services into your business.
Find Out Which is Type Of VoIP System Is Best For You?
Got a question?
No problem.
We are here to help! If you’re interested in our services or just want to get to know use, click the button below to securely message ETS IT Solutions Inc.