We live in a high speed age which allows us to be more productive than ever, but if anything can throw a wrench in the works it’s a slow PC.

The experience of a slow and sluggish PC is one that everyone is familiar with. And dealing with this frustration never gets easier. In fact, a PC which regularly slows down can have a serious impact on your job productivity. The complexities of the inner workings of a PC mean that identifying the exact cause is difficult. But this doesn’t mean you need to continue struggling.
It’s possible, with relative ease, to employ a number of methods and practices that will help restore your PCs speed.

5 Steps Towards a Faster PC

If you want to start ramping your productivity back up then make sure you look at the following:

  1. Defragment Your Hard Drive: A PC is, essentially, a data storage device. But the data stored on a PC needs to be retrieved every time it’s required. And the more data you store on your PC the more uneven this data distribution is. The end result is fragmented data that becomes increasingly harder to piece together. Naturally, this means that processes take longer to complete. Performing a disk defragmentation will help to reorganize your data and can easily be achieved with the Microsoft Drive Optimizer app.
  2. Browser Add-Ons: Installing add-ons to your web browser can help to maximize your online productivity, but too many can start to slow down your browsing experience. It’s common, however, to install add-ons that soon fall into disuse and no longer serve any purpose. Therefore, if your speed issues are only apparent when you’re using your browser, it may be worth evaluating your active add-ons and disabling any you don’t need.
  3. Start-up Programs: When a PC loads up it will automatically load up a long list of programs that are listed in your System Configuration. The more programs that are listed in System Configuration then the longer your PC will take to load up. Many of these programs, though, are not necessary during the start-up process e.g. a messaging app that you don’t use regularly. To avoid a bloated start-up experience just head into MSConfig and check what’s included in your start-up.
  4. Hard Drive Space: Your hard drive may, for example, have a capacity of 500GB but it’s not recommended to fill it to breaking point. The operating system on your PC needs a certain amount of hard drive space to carry out essential tasks such as creating temporary files. And if this space isn’t available then your PC will struggle to operate correctly. Regularly evaluating what is on your PC and what can be removed is crucial to avoid this.
  5. Malware: Hackers are keen to take control of PCs through the use of resource-heavy malware. Depending on the nature of the malware, such as a DDoS attack, your PCs memory can soon become overloaded and grind to a halt. Accordingly, you need to maintain good security practices to prevent the impact of malware.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


One of the most crucial parts of any IT networks is the cabling system you use. Ethernet cables are fantastic for connectivity, but which should you go for?

Ethernet cables are the most common choice when it comes to network cables and have been in use for 40 years. Using a twisted cable design, an ethernet cable allows two PC devices to be directly connected to each other. This allows data to flow seamlessly and constantly across a network. The world of cables, however, is a complex one. And, to make things even more confusing, there are numerous options available. So, the question is: which ethernet cable do you go for?

It’s difficult to give a precise, one-size-fits-all answer, but we can help narrow down your options. This is why we’ve put together a quick guide to your best ethernet cable options.

What are Your Ethernet Cable Options?

Every organization will have a different set of network needs, but thankfully there will always be a cable solution. The most commonly used ethernet cables used in business are:

• Cat5e: The least expensive option available, Cat5e is suitable for those working on a budget. However, the downside is that Cat5e is also the slowest ethernet cable you can use. While it is capable of transfer speeds of 1 Gbps over a distance of 328 feet, the Cat5e cable falls far behind more modern cables. Nonetheless, it can still boast reduced transmission errors over these distances thanks to a reduction in interference. For a smaller, less intensive IT network, Cat5e remains a viable option.

• Cat6: The most attractive upgrade of Cat6 over Cat5e cables is the speed on offer. Whereas Cat5e is limited to 1 Gbps, Cat6 can bit transmission speeds of up to 10 Gbps. The Cat6 cables also benefit from improved insulation which minimizes any interference to virtually zero. Where Cat6 struggles, though, is with distance. The 10 Gbps speed can only be maintained over distances up to 164 feet. This limitation may exclude it from being used on larger networks, but it can still handle the demands of modern IT.

• Cat6a: Similar to Cat6 cabling, but with improved specifications, Cat6a ethernet cables are a noticeable step up. Yes, the maximum transmission speed may still be 10 Gbps, but Cat6a cables are all about the distance. Capable of maintaining this speed over 328 feet, Cat6a cables can double the transmission distance of a Cat6 cable. Naturally, this makes them a more viable option in larger businesses where devices may need to be connected over long distances.

• Cat7: With thicker, more extensive shielding in place, Cat7 cables offer the most resistance in terms of cross talk and interference. In terms of speed and distance, Cat7 offers similar specs to that of Cat6a (10 Gbps over 328 feet). However, studies have shown that Cat7 can deliver speeds of 40 Gbps over 164 feet. Thanks to the enhanced shielding, Cat7 cables are recommended for use in large organizations and data centres.

Final Thoughts

With a wide range of options available, your organization should be able to find an ethernet cable solution which suits your needs. And the good news is that each category is backwards compatible e.g. you can mix and match Cat7 cables with Cat5. The distance required will, of course, prove to be the most important factor when it comes to choosing cables. Therefore, you need to ensure that you carefully evaluate your needs before purchasing any cables.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


We all use ATMs on a regular basis and are well aware of the need for security when using them. But what happens when the manufacturer gets hacked?
The number of malware attacks and infections in 2020 are, as ever, exceptionally high. With Kaspersky blocking 726,536,269 attacks alone in the first three months it would be surprising if any PC has avoided the attentions of hackers. With a strong set of defenses, however, your PC should have remained safe and secure. But the same cannot be said for NCR Corporation, a manufacturer of ATMs. A lapse in security allowed their network to be breached by a piece of malware known as Lethic.

The fact that a major corporation’s defenses were breached is concerning enough, but what’s most troubling is that it’s located in the personal finance sector. Let’s take a look at what happened and see what we can learn.

How Did Lethic Attack NCR?

A series of computers located in a non-production lab, located outside of the US, owned by NCR have been found to be infected with the Lethic malware. Far from being a new form of malware, Lethic has been out in the digital wild since 2008. You may be wondering how such an old piece of malware can deceive modern defense systems and it’s a good question. To avoid detection, hackers simply alter the code of existing malware to change the structure detected by security systems. It’s a relatively quick method of coding which essentially gives the hacker a new piece of malware.

Lethic has, in the past, generally been used to wage spam campaigns. But it’s capable of much more thanks to its arsenal of trojan tools. These include the ability to download additional malware, data logging and remote access. This is the last thing that any company, especially one involved in ATM manufacturing, wants to leave itself open to. At the moment it’s not clear how Lethic breached NCR, but security firm Prevailion has confirmed that unauthorized data transmissions were detected for over six months. Thankfully, NCR have confirmed that the infected PCs were completely separate from any networks involved in developing ATM software or storing customer details.

Avoiding Malware Attacks

If Lethic had managed to find its way into the operating software for ATMs then NCR would have had a huge disaster on their hands. Nonetheless, all breaches need to be avoided. So, make sure that your organization always follows these best practices:

Install Anti-Malware Software: While these systems can never claim to be effective against 100% of malware, a strong anti-malware app will stop the majority of malware in its tracks. This prevents data loss and network damage quickly and automatically.

Think Before Clicking: Social engineering is a significant factor in deploying malware and this means that emails and the links they contain may not be what they seem. Therefore, always take the time to double check an email to confirm it is genuine.

Always Update: Vulnerabilities in software provide the simplest route into a PC for a hacker. But you can shut off these routes by keeping on top of any software updates/patches. Always install these updates immediately to eliminate any vulnerabilities.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


The sheer range of PCs available makes choosing a new one very difficult. But in business there’s no time to waste, so you need to know what to look for.

Take a look at the spec sheets for two different PCs in the same price range and you’ll notice something: no two specs are the same. One could have an Intel processor whereas the other might have an AMD processor. Likewise, one PC may have an Intel processor with a speed of 2.9GHz while the other PCs Intel processor is measured at 4.1GHz. So, as you can see, choosing a new PC can be a baffling process. And we’ve only scraped the surface of the differences between processors.

Purchasing a new PC needs to be an informed decision, but it doesn’t need to take forever. And our guide on three things to look at when buying a new PC should give you a head start.

Knowing What to Look For

You don’t need to be an IT technician to understand what you need in a PC. The information is freely available and easily understandable. But, to point you in the right direction, we recommend focusing on the following three things:

  • RAM: Random Access Memory, better known as RAM, is a crucial element in the way in which a PC performs. The simplest way to describe RAM is as the working memory of the PC. It’s a temporary space where a PC can store and access data that it is currently using. Accordingly, the more applications you have to run at the same time, the more RAM you need. Choosing a PC, therefore, will rely heavily on the number of data heavy programs you use on a regular basis. If in doubt, overestimate the amount of RAM required. 
  • Processor: The performance of your PC is dependent on the processor located at its core. This doesn’t necessarily mean that faster is better. A high speed processor (4GHz +) is only necessary if the PC is to be used CPU intensive tasks such as 3D rendering and video encoding. If, however, the PC is to be used for simpler tasks such as word processing and database work then it pays to settle for a lower speed processor. The minimum that any business should be investing in is a four-core processor, so don’t go any lower.

Final Thoughts

You will, of course, need to consider countless other aspects when purchasing a PC, but these three starting points will save you a lot of time. It really is a buyer’s market when it comes to choosing a new PC thanks to the level of availability on offer. And, if you purchase the right PC, it will deliver the performance your business needs on a daily basis.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


The importance of installing updates and patches should never be underestimated. However, did you know that even these are not 100% secure?

Microsoft knows a thing or two about computers, but this doesn’t mean they are immune from mistakes and flaws. Accordingly, they regularly release patches and updates to address any vulnerabilities in their software.  A recent investigation, though, has discovered that these updates aren’t quite the safeguard consumers would expect. And, when you consider the amount of applications that Microsoft bundle with their systems, this is a matter of major concern.

Given the number of patches you are prompted to install each and every week, it’s important to understand what has happened on this occasion.

A Vulnerable Patch

The initial vulnerability in question relates to a flaw which was discovered in Windows printing services. Your first thought may be that printers are far from a security risk, but this couldn’t be further from the truth. If a device or application has any form of access to your network then it needs strong defenses. And this is why Microsoft was keen to patch a vulnerability which offered hackers a route into PC networks through print spooler software. This patch was issued in May and Microsoft believed this was the end of the story. But this story was due to run a little longer.

Researchers discovered that the impact of this initial patch could be negated by simply bypassing it. By modifying .SHD files (better known as Shadow), the researchers were able to add them into the spooler folder. This particular type of folder allows commands to be sent between a PC and a printer. Usually this is the preserve of printing documents, but the modified Shadow files allowed the researchers to send all manner of commands. It’s a scenario which had the potential to give hackers full access to a network.

How Can You Defend Against Weak Patches?

The vulnerability in question is no longer in present in systems which have since been updated, but it paints a worrying picture for PC users. If you are unable to rely on patches to give you full protection then what hope do you have?

First of all, you must, no matter what, always install all security patches. They are a crucial aspect of security and are all programmed with an objective of preventing an attack. This printer spooler fiasco demonstrates they are not perfect, but the majority are capable of fulfilling their aims. Nonetheless, being overcautious with IT security is always a good idea. Therefore, make sure you follow these simple steps:

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More