Our Blog: Stuff we think you should know

Tip of the Week: 4 Things IT Wants You to Remember

Tip of the Week: 4 Things IT Wants You to Remember

As a managed service provider, we understand how repetitive some of our advice can be. However, we repeat this advice so often because it works. That's why we're sharing a few tips to help you keep your IT functional, while also giving you a peek into our processes.

1. There’s a Reason to Turn It Off and On Again!

This is probably the biggest IT stereotype there is…but that’s only because a reboot often solves your current issue. Think of a reboot as a power nap for your device. It gives it a chance to “forget” its issues and start fresh, often resolving the issue you’ve encountered. Okay, that’s not the technical explanation, but we don’t want to bore you with that. That’s why we have a tendency to ask if you’ve rebooted your device yet.

This method works often enough, that it is always worth trying.

Keep in mind, a reboot is different than simply logging off, or turning your monitor off and back on. You need to restart your computer by using the option found under Power in your Start Menu. DON’T just press the physical power button on your device - that could lead to even bigger issues. Locking your computer is also a different process, but is one that you should do whenever you leave it unattended by pressing WINDOWS+L.

2. Give Your Computer a Second

We get it…waiting for your computer to complete a process can be frustrating, and so it’s only natural that you have the impulse to do the only thing you really can do - click repeatedly on what you want your computer to do. Before you do so, however, you should keep a few things in mind: first, there’s probably a reason that your computer isn’t completing the action, and that it is still paying attention to those clicks.

This means that should whatever hang-up that is preventing your desired action be overcome, you could find yourself opening fifty versions of the same thing - only slowing your computer down more. This goes for accessing links, activating print commands, and sending emails. If waiting doesn’t get you anywhere, call in IT for assistance.

3. Be Careful with Your Passwords

This is a big one. Your passwords are a critical component to your company’s overall data security. As such, there are some considerations that need to be made, both as you input your passwords and in the way you remember them. For instance, you should always check that your Caps Lock key isn’t inadvertently activated if your password keeps getting rejected (when you KNOW that you’re typing it correctly). More related to your security, you need to consider the ramifications of how you keep your passwords. A sticky note hidden under your keyboard (or worse, stuck to your monitor) with these codes written on them won’t stop anyone from accessing your workstation directly. Furthermore, you also need to be sure to lock your computer like we discussed above if you have your browser remember your passwords. A password manager is a much better option.

4. Communicate with IT

Whether you’re talking to an internal IT employee, or your company leverages managed services from a provider like Haber Group, clear and complete communications are key to resolving any issue effectively. If you’re reaching out to IT, it’s more or less understood that you “have a computer issue.” It is much more helpful to tell them exactly what an error message says, or to send them a screenshot of your exact problem. This helps to resolve your issue much more efficiently.

Furthermore, once you reach out to IT, you should make sure that you remain available to answer any further questions they may have.

Does your business need additional assistance with its IT, beyond what a few tips can offer? Reach out to Haber Group! We provide businesses with the technology services and solutions needed to compete in today’s business environment. To learn more, call 866.625.3560.

A Brief History of Microsoft Word
Does Your Business Have a Sufficient Backup Plan?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, April 25 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Privacy Business Hackers Malware User Tips Microsoft Computer Business Computing Productivity Internet Hosted Solutions Google Network Security Software Tech Term Communication Mobile Devices Efficiency IT Services Hardware Data Small Business Backup Workplace Tips Windows 10 Smartphone Ransomware Android IT Support Productivity Microsoft Office Saving Money Cloud Computing Data Management Browser Business Continuity Data Recovery Managed IT Services Managed IT Services Word Innovation Windows Gmail Data Backup Facebook Office 365 Server Users Upgrade Internet of Things Social Media Outsourced IT App Windows 10 Passwords Disaster Recovery Smartphones Phishing Managed Service Provider VoIP Employer-Employee Relationship Mobile Device Encryption Network Chrome Vulnerability Cybersecurity Artificial Intelligence communications Business Management Remote Monitoring Save Money Office Tips Apple Managed Service Hacker Tip of the week Analytics IT Support Content Filtering Information Big Data Government Money Applications Miscellaneous Spam Website BYOD Infrastructure IT Management Maintenance Customer Service Firewall Virtual Reality Employee-Employer Relationship Settings Tablet Data storage Paperless Office WiFi Display Two-factor Authentication Avoiding Downtime Access Control The Internet of Things Antivirus Bandwidth Router Virtualization YouTube Robot Education Printing Automation Risk Management Wireless Administration Computing Mobile Device Management Server Management Password Customer Relationship Management Document Management Apps Touchscreen Google Drive Mouse Vendor Management Wi-Fi Hacking Laptop Business Intelligence Telephone Systems LiFi Augmented Reality Computers Quick Tips Scam Safety Company Culture Storage Retail Presentation SaaS Downtime Solid State Drive Hosted Solution Office Networking HIPAA Gadgets Wireless Technology Outlook Hard Disk Drive VPN Monitors Holiday Unified Threat Management Recovery Development Data Security Search Data loss Business Technology Virtual Private Network Mobile Security IBM Operating System Chromebook End of Support Monitoring Digital Lenovo How To Cooperation Running Cable Solar Print Toner Google Maps Bring Your Own Device sip Break Fix Cookies Mail Merge Hotspot Professional Services Tech Support Work Content Black Friday Regulations Virtual Desktop Messaging Network Congestion Microsoft Excel Star Wars Computer Care Refrigeration Desktop Unified Threat Management Multi-Factor Security Mirgation File Sharing Buisness User Voice over Internet Protocol Entertainment Disaster Shortcut Bitcoin Samsung IT solutions Spying Spyware Superfish Information Technology Staff Lithium-ion battery Public Speaking Shortcuts Statistics Best Practice telephony Dark Web Nanotechnology Employee-Employer Relationships Address Writing Language USB Websites Identity Theft Competition Optimization Streaming Google Docs Cyber Monday Social Networking Analysis Windows 8 Blockchain Cost Management Training Troubleshooting User Error Google Calendar Chatbots 5G FinTech iOS Uninterrupted Power Supply Patch Management G Suite Cortana Google Wallet Printer Wearable Technology Automobile Halloween Security Cameras Bluetooth Business Growth Net Neutrality Screen Reader Students Corporate Profile Current Events Computing Infrastructure Dongle Recycling Human Error Smart Technology Motherboard Fun Permissions Assessment Undo VoIP Legal Legislation Identity MSP Scalability Smart Tech Marketing PowerPoint How To Drones Scary Stories Managing Stress Managed Services Alt Codes Dark Data FCC Application WannaCry Going Green Social Engineering Alerts Service Level Agreement IP Address Cybercrime eWaste Device IT service Heating/Cooling Distributed Denial of Service Remote Computing Social Fraud Internet Exlporer LED Time Management Comparison Update Migration Title II Connectivity Knowledge Onboarding Firefox SharePoint Sports Cables Laptops Cabling Typing Slack Licensing Mobile Office Digital Payment Continuity Mobility BDR Servers Deep Learning Humor Managed IT Service Modem Hacks Value Politics Smart Office Co-Managed IT Network Management Specifications Compliance Charging Online IoT Experience Unified Communications Hard Drives Digital Signage Techology Budget Downloads IT Technicians Collaboration Wires Software as a Service Managed IT Cryptocurrency Alert CCTV Private Cloud Domains Emoji Webcam Regulation Work/Life Balance Electronic Medical Records Error Mobile Computing Black Market Point of Sale Law Enforcement Physical Security Travel Notifications CrashOverride Upgrades Botnet Supercomputer Twitter Gadget Staffing Printers Motion Sickness Crowdsourcing Taxes 3D Printing Personal Information Administrator Emergency Machine Learning IT Budget Web Server GPS IT Consultant Unsupported Software Computer Repair Cameras Relocation Processors Tracking Meetings Windows 7 Cleaning Mobile Data Health