Everyone Needs Guest Wifi

Now that you understand the benefits of having a guest Wi-Fi network. It’s really simple to set one up, so here’s a quick guide on how to setup guest wifi.

1 – Access your router’s admin page.

This is so that you can access your router’s settings and configure it to add a guest Wi-Fi network. Simply enter your router’s LAN IP address into the web browser which should start with http:// followed by the IP address. If you didn’t already know, an IP address is a set of four numbers separated by periods. It should look something like:

http://192.168.1.1

Where can you find your router’s LAN IP address?

Some routers may already be labelled with a sticker at the bottom or to the side of it. Alternatively, you can find out by:

On Windows: Run a command prompt box, type the command “ipconfig” which should display some output. Take note if the IP address that displays “default gateway”

Get the IP address of your router

On a Mac: Enter network preferences, and then go to the “Advanced “ button, followed by the TCP/IP tab. Find “Router”, which will display the router’s IP address.

Mac_Network_Preferences

Apple device: head over to settings, go to Wi-Fi, then look for the “i” button to the right of your network name and click it. You should see the IP address under “router”.

Android device: This needs a separate App to view you router’s IP address. We suggest on to use called Fing.

Once you have your router’s IP address, type it into your web browser and access the login page. Simply enter your default admin ID and password (this should be labelled on your router). If unsure, you can contact your ISP (Internet Service Provider) to find out.

2 – Guest Network.

Belkin Router Guest Wifi Settings

Once you’ve successfully logged into you router, you’ll see that you can configure its settings. Look out for a setting or tab worded as “Guest Network” or something similar to it. This can vary from one router to another.  Note: that newer routers support guest networks, but some may not have this feature at all.  Check your router’s packaging or manual to confirm if it has the ability to provide a guest network.

3 – Configure and save. 

Enable your guest network by clicking on “enable”, along with any other preferred settings of your choice, save it, and you’re done!

It’s simple to do, right?

Now you know to set up a guest network so you can overcome the potential pitfalls mentioned in our previous article. Not only is this setup a win-win situation for all, you’ll also have peace of mind with having a secured LAN where nobody can see your private files, data or internet traffic, whilst maintaining a trustworthy relationship with your guests or customers.

For more ways to secure your home or office networks, contact your local IT professionals.

Read More


Everyone Needs Guest Wifi

Providing wifi has become so popular that you’ll find it in just about every establishment. Having a guest wifi is a necessary safeguard for your data. 

You can see this for yourself by simply looking at the available Wi-Fi networks broadcasted and picked up by any device like your smart-phone, tablet or laptop. As Wi-Fi can be easily accessed in many businesses, from coffee shops, to fast foods chains, to airports and public transport, why shouldn’t your business or home offer it too? 

Practical reasons why setting up a guest network is important

Accommodating business needs.

Providing guest wifi for customers or visitors

After all, it’d be very inhospitable to turn down Wi-Fi requests from associates, guests or customers who need access to the Internet. By setting up a guest Wi-Fi network, you can grant them the right to stay productive on their projects, allowing them to access their emails or their files on the cloud, without them having to resort to doing it all on their smart-phone. How many times have you had, or will you be having temporary staff, contractors and visitors on-site, needing Wi-Fi access or at least an internet connection of some sort? After all, it’s impolite to say no to them, right?

Keeping the LAN (Local Area Network) private.

OnsitePCSolution_Update_Security

It’s wise to separate the business’ or home LAN from unauthorized public access. Your LAN will typically hold internal files, folders, display device names and access to the intranet. As the saying goes, it’s best to be safe than sorry. This will tighten up any vulnerability from both accidental and intended malicious activities which could otherwise compromise any part of your business.

Providing a different password.

Password for your wifi

You wouldn’t want to give the same password to just anyone who will be able to note and potentially store it for later use, especially if it’s for any of your own personal business accounts. Besides, some passwords can have a simple format which can make it easy for anyone to guess. It’s time to close that vulnerability!

Setting up a Guest Wi-Fi Network

Now you understand the reasons and the benefits of having a guest Wi-Fi network. It’s really simple to set one up.  Our next guide will walk you through the general steps on how to do it.

For more ways you can protect your privacy, data and business from breaches, contact your local IT professionals.

Read More


How to check if your email account has been stolen

With corporate data theft happening frequently, your email may have been stolen without you even knowing. Here’s how to check if your email has been stolen.

What Exactly is at Risk?

The simple answer is data. The power behind stealing data from a company means that your information can get into the wrong hands for malicious use. One prime example is Adobe, who had a large number of their users’ accounts exposed to the public domain. The interesting thing was that these same accounts were being targeted time and time again with the same user credentials, which puts their other accounts at risk. Other sites that have been compromised are mail.ru, Bitcoin Security Forum, Gmail dump accounts, Yahoo accounts, Sony, Tesco and many more.

Compromised information can include your email address, usernames, credit card details and password hints. People often use the same information on other websites as they would have done on their compromised email account making them, yet again, another easy target.

How to Check if You’ve Been Infiltrated

As much as we take precautions with our passwords, secret questions and the like, one needs to check periodically that their details have not already been accessed by unsolicited activity.

How to check if your email has been stolen

We suggest you check out this free public service, developed by Microsoft professional Troy Hunt, to check if your email or username has been compromised:

https://haveibeenpwned.com

If your email has been compromised, you will be advised on this site that it has been “pwned”.  Being “pwned” is slang for having your email or other personal information stolen. You can also set up notifications in the event of being “pwned” in the future.

What if I have been “pwned”?

We suggest changing your password ASAP. The best practice is to use different passwords on different accounts.  This is especially important for your primary email account, banking, shopping, and whatever else you would consider critical if someone were to steal.  If keeping track of your various passwords is a challenge, there are free and secure password managers out there to help.

You can find a good FAQ and a list of other compromised networks as well.

For more tips on securing your privacy and office network, contact your local IT professionals.

Read More


These are the different levels of backup for your computer or server.

Backups are critical for every home or office computer.  Whether you have servers, PCs or just one laptop, here’s how to pick the right backup software.

If you’ve never experienced losing a picture, document or important client file up to now, consider yourself lucky.  Data loss on computers happen for many reasons.  The hard drive or operating system could crash, the laptop or computer may be stolen or it may just be an accidental deletion or move.  The bottom line is these things are an inevitable part of technology and the better prepared you are with a backup the less down time you will experience.

Let’s review the types of backups and how you can determine which is right for your home or office IT environment.

1. Local file backups

Local backups keep everything onsite

Local backups capture only user files. Programs, software and the Operating System are not backed up.

Local file backups means copying files from your computer to either an external hard drive, or to a computer on your network.  The backups are essentially local to your office or home.

When you should use local backups

Every scenario can benefit from local file backups.  Since the backup is local and nearby, recovering files and information is quick and easy.  Setting up local backups is also very inexpensive as most software that does local backup is free.  It is recommended to have local backups when you don’t have cloud based backups. Prices range from $0 to $50.

Local backup options

2. Cloud backups

Cloud backups capture user files and store them on another company's computer over the internet

Cloud backups only backup files. Programs, software and the Operating System are not backed up.

Cloud based backups keep your data and files backed up on another company’s servers over the internet.  Most major cloud backup providers provide encryption and 2-factor authentication for added security.  With the increase in competition, prices for cloud backup have also dropped dramatically and in some cases can be free. Prices range from $4-$30/month

When you should use cloud backups

If you have a laptop and are constantly moving between different locations, a cloud based backup would be the best choice.  As long as you have an internet connection, your data is being backed up.

Cloud backup options

3. Image backups

Image based backups capture everything on the system.

Image based backups capture files, data as well as programs, software and the Operating System.

Image based backup programs take a snapshot of your entire computer.  The main benefit is if you have catastrophic data loss like theft or a fire in the building, the backup image can be loaded on to another computer and you can continue working without having to wait for a new computer with all of your programs.  Prices range from $250-$4000.

When you should use image backups

It’s best to use image based backups on mission critical computers such as a server that holds all of your client data, or a laptop that has very important files on it.  Image based backup software tends to be more expensive, however the price is worth the avoided business downtime.

Image backup options

So which is the right choice?

At a minimum every individual or business should be running a local or cloud based backup.  The low cost and portability of cloud based backups makes it the obvious choice at a minimum.  However if you have a server in your home or office, it’s important to consider image based backups as a safety net against business downtime.

For more backup solutions or advice on how to protect your business, contact your local IT professionals.

Read More


Free Computer Lab Donated to  Downtown Streets Team

Downtown Streets Team is the first non-profit organization to receive a free donated computer lab from the Onsite PC Solution Computers for Classrooms program.

Downtown_Streets_Team_logo

Downtown Streets Team strives to end homelessness by restoring the dignity and rebuilding the lives of unhoused men and women.  This new computer lab will help team members build up and print resumes, learn computer skills, apply for jobs and help them re-integrate into the work force.

The computer lab was built from donations from the community, local businesses as well as a generous donation of monitors and networking equipment from Weird Stuff Warehouse of San Jose and Avant Optometry of Menlo Park. 

Weird Stuff Warehouse donates monitors and network equipment to Computers for Classrooms

The computers run an open source free software based on Ubuntu Linux with a vast array of uses.

If you have LCD monitors or computers you’d like to donate to the Computers for Classrooms program, fill out this form and we will be in touch shortly.

Read More