Everyone Needs Guest Wifi

Now that you understand the benefits of having a guest Wi-Fi network. It’s really simple to set one up, so here’s a quick guide on how to setup guest wifi.

1 – Access your router’s admin page.

This is so that you can access your router’s settings and configure it to add a guest Wi-Fi network. Simply enter your router’s LAN IP address into the web browser which should start with http:// followed by the IP address. If you didn’t already know, an IP address is a set of four numbers separated by periods. It should look something like:

http://192.168.1.1

Where can you find your router’s LAN IP address?

Some routers may already be labelled with a sticker at the bottom or to the side of it. Alternatively, you can find out by:

On Windows: Run a command prompt box, type the command “ipconfig” which should display some output. Take note if the IP address that displays “default gateway”

Get the IP address of your router

On a Mac: Enter network preferences, and then go to the “Advanced “ button, followed by the TCP/IP tab. Find “Router”, which will display the router’s IP address.

Mac_Network_Preferences

Apple device: head over to settings, go to Wi-Fi, then look for the “i” button to the right of your network name and click it. You should see the IP address under “router”.

Android device: This needs a separate App to view you router’s IP address. We suggest on to use called Fing.

Once you have your router’s IP address, type it into your web browser and access the login page. Simply enter your default admin ID and password (this should be labelled on your router). If unsure, you can contact your ISP (Internet Service Provider) to find out.

2 – Guest Network.

Belkin Router Guest Wifi Settings

Once you’ve successfully logged into you router, you’ll see that you can configure its settings. Look out for a setting or tab worded as “Guest Network” or something similar to it. This can vary from one router to another.  Note: that newer routers support guest networks, but some may not have this feature at all.  Check your router’s packaging or manual to confirm if it has the ability to provide a guest network.

3 – Configure and save. 

Enable your guest network by clicking on “enable”, along with any other preferred settings of your choice, save it, and you’re done!

It’s simple to do, right?

Now you know to set up a guest network so you can overcome the potential pitfalls mentioned in our previous article. Not only is this setup a win-win situation for all, you’ll also have peace of mind with having a secured LAN where nobody can see your private files, data or internet traffic, whilst maintaining a trustworthy relationship with your guests or customers.

For more ways to secure your home or office networks, contact your local IT professionals.

Read More


Everyone Needs Guest Wifi

Providing wifi has become so popular that you’ll find it in just about every establishment. Having a guest wifi is a necessary safeguard for your data. 

You can see this for yourself by simply looking at the available Wi-Fi networks broadcasted and picked up by any device like your smart-phone, tablet or laptop. As Wi-Fi can be easily accessed in many businesses, from coffee shops, to fast foods chains, to airports and public transport, why shouldn’t your business or home offer it too? 

Practical reasons why setting up a guest network is important

Accommodating business needs.

Providing guest wifi for customers or visitors

After all, it’d be very inhospitable to turn down Wi-Fi requests from associates, guests or customers who need access to the Internet. By setting up a guest Wi-Fi network, you can grant them the right to stay productive on their projects, allowing them to access their emails or their files on the cloud, without them having to resort to doing it all on their smart-phone. How many times have you had, or will you be having temporary staff, contractors and visitors on-site, needing Wi-Fi access or at least an internet connection of some sort? After all, it’s impolite to say no to them, right?

Keeping the LAN (Local Area Network) private.

OnsitePCSolution_Update_Security

It’s wise to separate the business’ or home LAN from unauthorized public access. Your LAN will typically hold internal files, folders, display device names and access to the intranet. As the saying goes, it’s best to be safe than sorry. This will tighten up any vulnerability from both accidental and intended malicious activities which could otherwise compromise any part of your business.

Providing a different password.

Password for your wifi

You wouldn’t want to give the same password to just anyone who will be able to note and potentially store it for later use, especially if it’s for any of your own personal business accounts. Besides, some passwords can have a simple format which can make it easy for anyone to guess. It’s time to close that vulnerability!

Setting up a Guest Wi-Fi Network

Now you understand the reasons and the benefits of having a guest Wi-Fi network. It’s really simple to set one up.  Our next guide will walk you through the general steps on how to do it.

For more ways you can protect your privacy, data and business from breaches, contact your local IT professionals.

Read More


Manage Software Licenses

Every business needs to be prepared for audits or system failures. Here are five solutions to help you manage software licenses.

In our previous article, we covered the importance of tracking software licenses.  There’s no straightforward solution. Ultimately, it’s more about being organized and finding a method to manage licenses effectively. There are both free and paid tools available to help manage and track software licensing more efficiently.

Options

X-Formation- A software tracking solution https://www.x-formation.com/

XFormation

You can track, audit and plan your software budgeting. There are three different options to choose from depending on your business needs. You can also test out a trial version before deciding.

License Tracker– Open source Tracking Software http://ltrack.sourceforge.net/

License_Tracker

It is a web based tacker designed to monitor software package usage which is open source.

Kace (Dell) – Hardware Appliance solution http://www.kace.com

KACE

They offer different appliances to fit in with the size of your business. Covers both physical assets and license tracking. It can tell you the number of endpoints out of compliance that may have not updated to a given software baseline.

SysAid- Manages Software Inventory http://www.sysaid.com/asset-management.htm

SysAid

It can assist with keeping track and complying with user agreements. An agent is deployed to help automatically update the software inventory.

White Source- Web browser based solution http://www.whitesourcesoftware.com/

WhiteSource

You can manage your OS libraries thanks to its tracking utilities. The open source version is free.

Final Thoughts

You will need to consider the size of your business in terms of the amount of equipment used that needs software licensing. In some cases, more licenses are used for individual user accounts that may access the same desktop.

Auditing licenses centrally and frequently, especially for any growing businesses, is the way to go to stay organized!

For more ways your business can stay compliant with licenses and software management, contact your local IT professionals.

Read More


Why you need to track software licenses

Can you list all of your licenses? From audits to system failures, tracking software licenses is a crucial part of keeping your business flowing smoothly.

We know how tedious this can be. Managing software is a little more complex than counting the number of physical assets, such as computer desktops and monitors.

Why would your business track software licenses?

BBC-Logo

We’ll use the BBC as a brief case study. They have over 27,000 computers on their network across the UK. As you can imagine, they’ve encountered a huge problem in the past when they needed to run an audit for all of the installed software on their endpoints. They were lost as to what was really being used on all staff computers. For example, a particular software package was purchased for 3,000 desktops; however, they eventually came to realize that only 300 were actually being used!

They found both legal and out of compliance software packages.  They eventually decided to run a weekly audit to keep all of this under control. Prior to this, both hardware and software assets were de-centrally managed by each of their own departments, with no common procedure.

Big impact for small businesses

Users can have all sorts of software installed on their computers which can vary from Microsoft Office, Windows, Quickbooks and so forth. So think about this for a moment. What if your computer crashed today or worse yet, what if an employee reports their laptop stolen or completely kaput, what do you do about it?

You will likely search your storage or server room in desperation to find your previously purchased software.  But wait, where’s the license? Nowadays, most software is available virtually over the cloud. Paper licenses and CDs have been replaced by electronic virtual software!

Cloud_Based_Software

In the event of a computer crashing, there is of course a list of other important considerations regarding why a business needs to keep track of their software licenses.

  • Productivity. If not monitored systematically, it wastes time, resources, making it unproductive for both the business and staff. For instance, staff may need to spend an additional few hours to track software manually. Even then, the tracking may not be 100% accurate!
  • Less surprises. Your business and users can keep in compliance with EULAs, helping you to avoid expired software usage, which would also be outside of software support. In addition to this, it would prevent any disruption made to business operations as they would have fully functional software packages.
  • Understanding the software usage of your company. You can be in control and manage software usage, as well as making better purchasing decisions in regards to the exact amount needed over a given period of time.
  • Meeting budgets. Continuing from the last discussion point and using the BBC example, once you understand the realistic demand for a particular software package, you can save a significant amount and reduce costs from purchasing 3 licenses as opposed to 30.
  • Free up unused licensed keys. Every business knows the daunting task of having to re-purposing equipment or taking some out of service. With this taken into account, it is also important to consider what software may be installed that could be using up licenses or may be making the license key dormant.

Solutions

One piece of software that allows you to track thousands of software licenses on your office computers is called Recover Keys.  Recover Keys allows you to find licenses to your computer Operating System, Office Products and 6500+ other pieces of software installed throughout your systems.

Recover Keys to Track Software Licenses

Aside from digging up licenses, Recover Keys has the following features:

  • Backup activation keys
  • Scan another Windows system or HDD
  • Scan remote network computers
  • Automatic updates

Onsite PC Solution offers software license tracking and management as a part of our managed service plans for your business.  For more information on tracking license and maintaining good IT policy in your office, contact your local IT professionals.

Read More


43 Percent of Companies had a Data Breach Last Year

A recent report from the Ponemon Institute shows 43% of companies had a data breach in the last year. Here’s how you can harden your office security.

The report cites data breaches affecting as many as 20 million people in one incident.  Criminals can use many different avenues into a company’s systems to steal client, proprietary or private information which then gets sold on the black market.  Here are some ways to harden your office security:

Keep an Eye on your Hardware

Data breaches often occur in the form of viruses, trojans or malware being installed on office computers.  These infections give criminals full control of the computer, even if it doesn’t look like it on the surface.  One of the first signs of infections are high hardware usage:

Patches, Updates and Security

When Microsoft releases updates to fix security holes, anyone is able to look at the update and determine exactly which weakness was fixed.  This is why it’s important to keep your system and anti-virus updated and patched:

IT Policy Enforcement

The first line of defense for any office or individual is a proper IT policy.  This means putting in place rules on systems or as policy to office staff on how to manage data to prevent infections and data breaches.  Here are some best practices we recommend:

For more information on managed IT services that can provide 24/7 monitoring, maintenance and IT management to prevent data breaches in your office, contact your local IT professionals.

Read More

1 3 4 5 6 7 18