Category Archives: Security

Computer Network Management and Maintenance

Rent-A-Nerd, Inc.’s co-owners, Charlotte and Darrin Piotrowski, published an article, “Don’t Wait Until It’s Broken,” in the September 2015 issue of Biz New Orleans (and also included in email blast and the Biz New Orleans online issue). In it, they discussed the many reasons why every business should have a computer network management and maintenance contract with a local IT firm, rather than simply calling their computer repair company every time something breaks or isn’t working properly. Here’s the link to the full article. Below is the top ten list of reasons, taken from the article, for contracting with Rent-A-Nerd, Inc. for your business’s computer network management and maintenance. Top 10 benefits of network/computer management and maintenance: 1 – You can truly think of your IT serviceRead Full Article


Prepare Your Business in Case of Disaster

You probably have a plan for your home in the case of a disaster, but what about your business? According to the Insurance Information Institute, as many as 40% of businesses fail after a disaster. There are a number of things that you can do in order to prepare your business in case of disaster (man-made or natural). And, since we are in the midst of hurricane season, now is as good a time as any to do so! You should begin by assessing what types of disasters are most likely to occur to your specific business. This can include fire, flooding, a hurricane, and even criminal activity, depending upon your location, type of business, and other factors. You should select point people who are trained toRead Full Article


Two-Factor Authentication: Security for Your Valuable Data

Two-factor authentication is an extra step that one takes when logging in to various sites and programs. It happens after the username and password have been entered. I know what you’re thinking, passwords are difficult enough. However, many times. in order to make it convenient to remember, we use the same password for nearly all websites (which I would never recommend) or we make simple passwords that are easily guessed, i.e. password, password 123. What two-factor authentication does is add an extra layer of security on top of those passwords, no matter how simple or complex they are, in order to further protect your information online. A quick and easy way to describe two-factor authentication is to think of when you call your bank’s customerRead Full Article


Top Ten Tech Tips

Here are my top ten tech tips (for today!): 1)      When in doubt, REBOOT.   Rebooting, not only computers, but a number of electronic devices, fixes numerous issues. For example: Windows is “running slowly” possibly means that a program may be misbehaving and hogging vital system resources; rebooting the computer can often times resolve that issue.  Another common example is when your “Internet is down;” rebooting your networking equipment (modem and router) can sometimes resolve this issue.  Unplugging your modem/router from power and plugging it back in is a common solution for a number of networking issues. 2)      If you don’t know the sender of an email DO NOT CLICK THE LINKS OR DOWNLOAD ANY ATTACHMENTS!   Bogus emails are one of the number one waysRead Full Article


How did I get this computer virus??

“How’d I get this computer virus?” I think the question I get asked more often than any other is “how did that virus get on my computer?”  And most of the time I have to answer that I don’t know.  This is because tracing the source of an infection is often a very time consuming process.  Sometimes it is obvious, but most of the time it isn’t and can easily take me an hour or more to locate the source.  Most people don’t want to spend the money having me search in vain for the chance that I may figure out what caused the exact infection when I can just get rid of them all and be done with it. That being said, there areRead Full Article


Kevin Lee’s Lifehacker Blog: Four Methods to Create a Secure Password You’ll Actually Remember

NOTE: This blog originally appeared elsewhere, and was repeated on www.Lifehacker.com.  The Nerds thought our readers would benefit from this information.  It is copied in its entirety below. How do you balance the necessity of highly secure passwords with the utility of easily recalling them all? The only secure password is one that you can’t remember, but there are times when you can’t use a password manager and need to rely on your memory. This post originally appeared on the Buffer blog. It’s a question I mull each and every time a security breach happens. When the Heartbleed vulnerability was discovered last spring, the mandate was for everyone to change all their passwords right away. It’s still on my to-do list. I cringe at the thought ofRead Full Article


Computer Repair Versus Network and Computer Maintenance

The average small business spends 6.4% of its revenue on technology.  That may not surprise you, but did you know 80% of the cost comes after the initial purchase?  Clearly, acquiring new technology isn’t nearly as expensive as keeping it performing well.  Shouldn’t your IT systems be an investment for business growth, rather than a drag on profitability? Traditionally, business owners would call a computer repair technician only when there were problems; in other words, a computer–or the entire network of computers–breaks, a technician fixes it until something within the network breaks again.  We now know that it is much less expensive, for many reasons, to simply maintain computer networks on an ongoing basis.  The old way is often called the “break/fix” method, whereas modernRead Full Article


Avoiding Computer Hackers

We all use email as a primary source of communication on a daily basis–for business and personal use. Every day our in-boxes are bombarded with SPAM and advertisements. Some of these emails are legitimate, but some are phishing emails. Phishing emails are designed to steal your password, bank information, credit card information and other personal data from your computer. How can you tell if a message is a scam or legitimate? Here are a few tips to follow in order to avoid having your computer hacked  through these types of emails. Bad spelling and grammar – Hackers are great at coming up with ways to steal, but they aren’t so great at proofreading. If the message contains a misspelled word or poor grammar, it mayRead Full Article