In today’s environment, remote workers have become exceedingly more important. The remote environment is key to keeping your workforce, working over the internet while at home. Whether they are away sick or they are that on-call vital employee, your remote worker can still provide value. So, let them work while out of the office.
Covenant Computing has your remote session needs in check. We will quickly install an easy and light application that can allow remote connections to your workstations. It is easy to connect, and quick to train these remote workers how to work from the comfort and safety of home.
Get your productivity and your workforce back on track. Call us to set up a free consultation and demonstration.
Working in the cloud sounds difficult. It’s not! With the right expert, it can be as easy as contacting us, receiving an email, and clicking on a link. Cloud Computing removes the risk associated with remote workers. We can also connect these virtual computers to your network or active directory domain.
Covenant Computing creates and manages cloud desktop or server environments. Now you have always-on computing that is ready to go when you are. Sleeping or hibernating machines can disconnect from the network. Those are problems of the past.
Cloud (or Virtual) machines are computers that run exactly like your computer-with-a-keyboard. They stay “in the cloud”, can be accessed from anywhere that has an internet connection, and can be modified to meet any challenge. We can also upload your entire workstation to the cloud so it feels like you are working on your own machine.
Many remote computers are too slow and are expensive to upgrade. They also don’t have security, so they threaten your valuable data if they connect to your network. Therefore, cloud computing workstations and servers take that work and keep it in a secure environment, and they do all the computing. They also display the results to your workers like it is working from their own physical computer. Because they do it securely, quickly, and clearly, even slow and virus-laden workstations could have powerful cloud counterparts that will haul any load you throw at it.
Just need to connect a remote worker to an existing workstation? We’ve got that covered too! Contact Covenant Computing for a Free Estimate
In the month of August 2019, NPR verified that officials discovered 22 municipalities had been hit with ransomware. One of the officials stated that the attackers had asked for $2.5 million to unlock the files.
Getting an email that tells you that your computer has been hacked or seeing suspicious activity on your computer is a cause for deep concern. Hollywood and the press has done a great job of raising our levels of concern for this kind of intrusion. There are a few signs of intrusion you can look for, a few things to do if you see signs of intrusion, and a few things you can do right now to prevent it.
Look, I am not poking fun at anyone when I say this, but if your computer is making weird noises, it’s probably trying to tell you something. Weird noises can mean many things, and typically they are not good.
We recently went on a call that we knew there was probably something wrong with the physical network because the client’s inhouse tech support team said so. Level 1 and 2 tech support are in house for this client and they usually do a good job of troubleshooting. This case was no different, so the diagnosis we were given was reliable. In ITIL methodology there are incidents (the thing that happened) and there are problems (the cause of the incident). Confusing the two can lead to headaches.
Hey, have you heard of Prime Day? It’s like Black Friday, only it’s in the middle of July. Sounds exciting, right? Well, get geared up! It’s nearly here, and you won’t believe the range of great deals that are coming up.
As pointed out in Tom’s Guide, a good product review web site, and a great place to go for shopping news:
Last year, Amazon celebrated Prime Day on Tuesday, July 11. The actual deals, however, started two weeks before that date. On June 26, Amazon slashed the price of its $129 Echo down to just $79. At the time, it was the best price we had ever seen for the Echo. The 24-hour deal was the kick-off to Prime Day and a clue of how big a role Alexa would play during Prime Day 2017.
Although Amazon hasn’t declared an official date for Prime Day 2018, we expect it to fall sometime during the week of July 9, possibly Tuesday, July 10. Whatever day they choose, we expect Amazon will offer another Echo deal in late June and then kick off Prime Day deals the nigh before Prime Day is scheduled to begin.
There are spotlight deals: Prime Day Spotlight Deals feature top brands, popular items and deep discounts that last until Amazon stock is gone. These deals have the most inventory and some of the best savings. Find Spotlight Deals through the “Shop All Deals” link on Amazon.com or at www.amazon.com/primeday
There are Lightning Deals: Thousands of Lightning Deals are “watchable” (is that a word?) 24 hours ahead but only run for a limited time with limited quantities. New Lightning Deals will launch as often as every 5 minutes. You’ll see a timer on each deal as well as a status bar showing availability until the deal is claimed. Find these limited-time deals through the “Shop All Deals” link on Amazon.com or at www.amazon.com/primeday
You can shop deals as early as 6pm PT / 9pm ET on the day before and deals are organized into categories. Prime members will be able to find deals faster, so get your prime membership now! The savings you get from these deals could more than pay for the Prime membership.
Prime Day and Prime and Prime Membership are owned solely by Amazon.
Folks, I realize the internet is abuzz with different companies being hacked and alerts about all sorts of data breaches, but this one is not just a some-company-somewhere type of hack you can disregard. Neither is this an oh-no-let-me-call-so-and-so. This one will directly affect many many people over the course of many years. Let me explain.
There is a new ransomware attack called “WannaCry” that has the ability to affect your computer by simply being on the internet. It has affected around 100 different countries and spreads without user intervention, clicking, or performing any action. In other words, if you don’t have the proper security patches and protections in place, you are vulnerable right now without even touching your computer.
How to protect yourself:
As always, the best way to keep yourself protected is to keep your computer up to date. Sure, those constantly recurring patches are annoying, but they are necessary. The quickest and easiest way to protect yourself NOW is to update your computer with the latest Windows security vulnerability patch.
Information for the patch can be found HERE and HERE.
A direct link to the patch to download and run can be found HERE.
How to check for the update:
Settings, Updates, Update History or
Control Panel, Programs and Features, Installed Updates
How do you know if you are infected?
When you try to open a word document, your computer tells you that your file has been encrypted.
What to do if you find yourself infected:
1. Remove the computer from your network.
2. Call your LOCAL computer professional for help recovering from this threat.