Blog | Biztek Solutions, Inc.

 

Remote work has been a topic that we, in Biztek Solutions, Inc. have been heavily focused on these past few weeks. As we continue to see the rise of affected individuals, the recommendation for social distancing has now transformed into a command. However, its difficult to transition your workspace and the customs of your office to remotely working & we know the difficulties as a business owner to ensure both productivity and effectivity with the tools you are given. 

The content in the article you will find to be both beneficial and practical.

There are great resources and recommendations to help equip your business for further success broken down by *”smart tools” and “soft skills”

Continue reading

 

He’s probably young & textbook hipster. He last showered when Windows 7 was released. He’s rushed, frazzled and impatient. He fixes one thing and ten other things break. He drinks coffee or Red Bulls. He’s not unfriendly. But he’s not a salesman. You pay him by the hour or maybe you have a monthly contract with him. You need him. He makes sure your systems keep running so your business can keep running.

This is the type of tech that you must ask these 3 questions:

Continue reading

Usually, many people dare to say that anti-virus was the pinnacle of computer security. But based on recent events and the cyber landscape of today, we are living in a generation susceptible to many cyber crimes and campaigns. What role does anti-virus and anti-malware software play in keeping your machine safe? Across the board, experts still recommends using software that protects your personal computer from attack. But modern anti-virus software is not the last word in defending your computer; rather, it’s part of a multi-faceted approach involving some common-sense steps to keep your machine and personal information safe.

Continue reading

By now, most of us are aware of ransomware and what it is.  Hopefully, you don’t have first hand experience of a ransomware infection, but if you do, you know just how bad it is. 

Historically, ransomware has been a tool for cyber criminals to extort money from you to unlock your data.  When a system is infected with ransomware, all of the files get encrypted (locked) so that you can no longer access those files and the bad guys hold the key to unlock those files for a ransom.  If you have a good backup, you can recover your data without paying the bad guys, but if there is no backup or your recovery time to restore from backup will take a long time (days), then you might be forced into paying the ransom to the bad guys to get the keys to your data.

Continue reading

 

You’re hard at work on your computer or device and a message suddenly pops up saying, “a software update is available”. You’re busy, so you click “cancel” instead of “install”, thinking you’ll get to it later, but you never do. Sound familiar?

The truth is it’s easy to skip software updates because they can take up a few minutes of our time, and may not seem that important. But this is a mistake that keeps the door open for hackers to access your private information, putting you at risk for identity theft, loss of money, credit, and more.

Continue reading

 

Here Are Some Tips To Help You Stay In Control of Your Domain.

Image of laptop with screen showing Google.com

We see it far too often.  We begin working with a client and need to access their domain name, and the fun begins.  The domain is registered with one service provider, the primary name server (what routes all internet, web, email traffic on the internet) points to another provider and the website and/or email are hosted somewhere else.  And the worst part is, the client has no idea how or where anything is registered, no account credentials, etc.

Your domain name is extremely valuable and businesses should take management of their domains seriously.  This means understanding, or at least having an idea, of how their domain is setup, but most importantly, have any and all credentials on file to access their domain and any related services such as email and website.

Most web developers want to control everything for a domain in their web hosting control panel.  While there is technically nothing wrong with this, and it may be useful at times, it is not ideal.

Here is what we recommend:

Continue reading

 

 

Office365 has become the common platform for cloud hosted email.  There are several different subscriptions that your company can use that will provide different features and benefits.  Most companies only use a fraction of the available services and features that come with their subscription.

In this article, we are going to present 5 ways to maximize your investment with Office365.

Continue reading

 

One of the most common questions we get asked is “What is a good computer to buy?”  That is a loaded question and varies greatly depending on what the computer will be used for.   Most people also seem to get confused with certain hardware components in terms of what the component does, as well as looking at systems side by side where they seem similar but the price varies greatly.  We have created a guide that will help you choose the right type of computer for your business.

Continue reading