Our Blog: Stuff we think you should know

Tip of the Week: 4 Things IT Wants You to Remember

Tip of the Week: 4 Things IT Wants You to Remember

As a managed service provider, we understand how repetitive some of our advice can be. However, we repeat this advice so often because it works. That's why we're sharing a few tips to help you keep your IT functional, while also giving you a peek into our processes.

1. There’s a Reason to Turn It Off and On Again!

This is probably the biggest IT stereotype there is…but that’s only because a reboot often solves your current issue. Think of a reboot as a power nap for your device. It gives it a chance to “forget” its issues and start fresh, often resolving the issue you’ve encountered. Okay, that’s not the technical explanation, but we don’t want to bore you with that. That’s why we have a tendency to ask if you’ve rebooted your device yet.

This method works often enough, that it is always worth trying.

Keep in mind, a reboot is different than simply logging off, or turning your monitor off and back on. You need to restart your computer by using the option found under Power in your Start Menu. DON’T just press the physical power button on your device - that could lead to even bigger issues. Locking your computer is also a different process, but is one that you should do whenever you leave it unattended by pressing WINDOWS+L.

2. Give Your Computer a Second

We get it…waiting for your computer to complete a process can be frustrating, and so it’s only natural that you have the impulse to do the only thing you really can do - click repeatedly on what you want your computer to do. Before you do so, however, you should keep a few things in mind: first, there’s probably a reason that your computer isn’t completing the action, and that it is still paying attention to those clicks.

This means that should whatever hang-up that is preventing your desired action be overcome, you could find yourself opening fifty versions of the same thing - only slowing your computer down more. This goes for accessing links, activating print commands, and sending emails. If waiting doesn’t get you anywhere, call in IT for assistance.

3. Be Careful with Your Passwords

This is a big one. Your passwords are a critical component to your company’s overall data security. As such, there are some considerations that need to be made, both as you input your passwords and in the way you remember them. For instance, you should always check that your Caps Lock key isn’t inadvertently activated if your password keeps getting rejected (when you KNOW that you’re typing it correctly). More related to your security, you need to consider the ramifications of how you keep your passwords. A sticky note hidden under your keyboard (or worse, stuck to your monitor) with these codes written on them won’t stop anyone from accessing your workstation directly. Furthermore, you also need to be sure to lock your computer like we discussed above if you have your browser remember your passwords. A password manager is a much better option.

4. Communicate with IT

Whether you’re talking to an internal IT employee, or your company leverages managed services from a provider like Haber Group, clear and complete communications are key to resolving any issue effectively. If you’re reaching out to IT, it’s more or less understood that you “have a computer issue.” It is much more helpful to tell them exactly what an error message says, or to send them a screenshot of your exact problem. This helps to resolve your issue much more efficiently.

Furthermore, once you reach out to IT, you should make sure that you remain available to answer any further questions they may have.

Does your business need additional assistance with its IT, beyond what a few tips can offer? Reach out to Haber Group! We provide businesses with the technology services and solutions needed to compete in today’s business environment. To learn more, call 866.625.3560.

A Brief History of Microsoft Word
Does Your Business Have a Sufficient Backup Plan?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, June 17 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Business Email Hackers User Tips Malware Computer Business Computing Microsoft Network Security Google Productivity Hosted Solutions Internet Software Tech Term Data Backup Communication Mobile Devices Efficiency IT Services Small Business Ransomware Workplace Tips Hardware Windows 10 Smartphone Microsoft Office Data Recovery IT Support Android Saving Money Cloud Computing Productivity Browser Business Continuity Managed IT Services Upgrade Social Media Gmail Data Management Facebook Server Users Office 365 Phishing Innovation Internet of Things Managed IT Services Word Mobile Device Windows Data Backup Information Disaster Recovery Smartphones Outsourced IT Windows 10 App Passwords Business Management communications Miscellaneous Remote Monitoring Managed Service Provider Employer-Employee Relationship VoIP Encryption Network Vulnerability Cybersecurity Chrome Artificial Intelligence Content Filtering Applications Money Spam Government Website Big Data Infrastructure BYOD Apps Save Money Apple Virtual Reality Managed Service Office Tips Tip of the week Analytics IT Support Hacker Gadgets Unified Threat Management VPN Virtualization Robot Bandwidth YouTube Printing Automation Education Risk Management Wireless IT Management Maintenance Firewall Employee-Employer Relationship Customer Service Augmented Reality Tablet Data storage WiFi Paperless Office Avoiding Downtime Access Control Display The Internet of Things Settings Antivirus Router Two-factor Authentication Hosted Solution Recovery Hard Disk Drive Monitors Holiday Data Security Mobile Security Data loss Business Technology Operating System Chromebook Virtual Private Network End of Support Search IBM Server Management Bring Your Own Device Computing Touchscreen Google Drive Password Document Management Mouse Vendor Management Mobile Device Management Business Intelligence Administration Customer Relationship Management Telephone Systems Hacking LiFi Wi-Fi Quick Tips Laptop Company Culture Computers Storage Scam Retail Presentation SaaS HIPAA Safety Solid State Drive Office Networking Wireless Technology Outlook Downtime Development Time Management Onboarding Update SharePoint Scary Stories Cables Social Laptops Title II Connectivity Slack Data Breach Licensing IP Address Cybercrime Cabling Continuity Typing Mobility Managed IT Service Modem Firefox Digital Payment Value BDR Servers Smart Office Deep Learning Co-Managed IT Humor Specifications Compliance Charging IoT Knowledge Network Management Digital Signage Downloads IT Technicians Sports Wires Hacks Software as a Service Politics Online Techology Monitoring Budget Hard Disk Drives Collaboration Cooperation Mobile Office Managed IT Solar Cryptocurrency Print Toner Hard Drives Break Fix Cookies Private Cloud Hotspot Professional Services Google Maps Work Content sip Black Friday Regulations Digital Lenovo Messaging How To Microsoft Excel Star Wars Experience Unified Communications Desktop Multi-Factor Security Mirgation Mail Merge Voice over Internet Protocol Entertainment Tech Support Unified Threat Management Spying Solid State Drives User File Sharing Staff Running Cable Disaster Shortcut Bitcoin Shortcuts Network Congestion Refrigeration Computer Care Dark Web Nanotechnology Public Speaking Language USB Statistics Optimization Best Practice Streaming telephony Samsung Cyber Monday Social Networking Virtual Desktop Spyware Superfish Analysis Information Technology Employee-Employer Relationships Identity Theft Blockchain Cost Management Troubleshooting Google Docs Google Calendar Chatbots Buisness Address FinTech iOS Writing Competition Websites IT solutions User Error National Security Printer Wearable Technology Lithium-ion battery Uninterrupted Power Supply Patch Management Windows 8 Security Cameras Training Net Neutrality Screen Reader Automobile Computing Infrastructure Dongle Bluetooth Recycling Business Growth Human Error G Suite Smart Technology Motherboard Google Wallet Students Permissions Assessment Legislation Identity 5G Corporate Profile MSP Current Events Scalability Cortana VoIP PowerPoint Legal Halloween Managing Stress Managed Services Undo FCC Smart Tech Alerts Service Level Agreement eWaste Alt Codes Device Dark Data Marketing Distributed Denial of Service Fun How To Drones Mixed Reality Fraud Internet Exlporer IT service Heating/Cooling LED Application Remote Computing Comparison WannaCry Going Green Migration Social Engineering GPS Unsupported Software Computer Repair IT Consultant Relocation Processors Cameras Windows 7 Meetings Tracking Mobile Data Health Cleaning Domains Alert CCTV Regulation Emoji Webcam Electronic Medical Records Work/Life Balance Error Black Market Point of Sale Mobile Computing Physical Security Travel Law Enforcement Notifications CrashOverride Upgrades Botnet Supercomputer Printers Twitter Updates Motion Sickness Gadget Staffing 3D Printing Personal Information Administrator Crowdsourcing Taxes Machine Learning IT Budget Web Server Emergency