One of the most crucial parts of any IT networks is the cabling system you use. Ethernet cables are fantastic for connectivity, but which should you go for?

Ethernet cables are the most common choice when it comes to network cables and have been in use for 40 years. Using a twisted cable design, an ethernet cable allows two PC devices to be directly connected to each other. This allows data to flow seamlessly and constantly across a network. The world of cables, however, is a complex one. And, to make things even more confusing, there are numerous options available. So, the question is: which ethernet cable do you go for?

It’s difficult to give a precise, one-size-fits-all answer, but we can help narrow down your options. This is why we’ve put together a quick guide to your best ethernet cable options.

What are Your Ethernet Cable Options?

Every organization will have a different set of network needs, but thankfully there will always be a cable solution. The most commonly used ethernet cables used in business are:

• Cat5e: The least expensive option available, Cat5e is suitable for those working on a budget. However, the downside is that Cat5e is also the slowest ethernet cable you can use. While it is capable of transfer speeds of 1 Gbps over a distance of 328 feet, the Cat5e cable falls far behind more modern cables. Nonetheless, it can still boast reduced transmission errors over these distances thanks to a reduction in interference. For a smaller, less intensive IT network, Cat5e remains a viable option.

• Cat6: The most attractive upgrade of Cat6 over Cat5e cables is the speed on offer. Whereas Cat5e is limited to 1 Gbps, Cat6 can bit transmission speeds of up to 10 Gbps. The Cat6 cables also benefit from improved insulation which minimizes any interference to virtually zero. Where Cat6 struggles, though, is with distance. The 10 Gbps speed can only be maintained over distances up to 164 feet. This limitation may exclude it from being used on larger networks, but it can still handle the demands of modern IT.

• Cat6a: Similar to Cat6 cabling, but with improved specifications, Cat6a ethernet cables are a noticeable step up. Yes, the maximum transmission speed may still be 10 Gbps, but Cat6a cables are all about the distance. Capable of maintaining this speed over 328 feet, Cat6a cables can double the transmission distance of a Cat6 cable. Naturally, this makes them a more viable option in larger businesses where devices may need to be connected over long distances.

• Cat7: With thicker, more extensive shielding in place, Cat7 cables offer the most resistance in terms of cross talk and interference. In terms of speed and distance, Cat7 offers similar specs to that of Cat6a (10 Gbps over 328 feet). However, studies have shown that Cat7 can deliver speeds of 40 Gbps over 164 feet. Thanks to the enhanced shielding, Cat7 cables are recommended for use in large organizations and data centres.

Final Thoughts

With a wide range of options available, your organization should be able to find an ethernet cable solution which suits your needs. And the good news is that each category is backwards compatible e.g. you can mix and match Cat7 cables with Cat5. The distance required will, of course, prove to be the most important factor when it comes to choosing cables. Therefore, you need to ensure that you carefully evaluate your needs before purchasing any cables.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


Millions of workers are now self-isolating and that means working from home for many people. But how do you make sure that your PC at home is healthy?

The luxury of working from an office is that the equipment there is regularly maintained and fairly new. However, when you have to work from home you will soon realize that your own equipment isn’t in the same shape. We’re all guilty of being a little lazy when we get home and IT maintenance certainly isn’t at the top of most people’s lists. But a little effort goes a long way when it comes to maintaining a PC.

And, best of all, you don’t need to be a fully trained IT technician to carry out a home checkup. In fact, it’s quick and easy as we’re about to show you.

 

How to Maintain Your PC with a Home Checkup

Working from home on your own PC is convenient, but it also puts you and your organization at risk. Therefore, make sure you maximize your productivity and safety by carrying out the following:

  • Install all Updates: We have a habit of ignoring PC updates at home as they get in the way of loading up Netflix. However, it’s important that complacency doesn’t creep into your IT activities at home. You need to make sure that all your software is up to date with the latest patches and firmware. Not only will this ensure that your software is secure, but it will enhance the functionality of your software. Most software will have an auto-update feature, so it’s crucial that this is activated. 
  • Check Your Router: The internet is vital when it comes to remote working. Without an internet connection you won’t be able to connect to your organization’s network. And this will leave you without any of the resources you need. So, it’s essential that your router is working and secure. A good connection is paramount, so you may need to adjust your router position to maximize the signal. And, to safeguard the security of your router, remove any default passwords and create something unique. 
  • Use Security Software: If you haven’t already got security software in place then this needs to be made a priority. It will protect your PC and, if you’re working remotely, strengthen the security of any connections to your business. There are a wide range of options when it comes to security software, so it can be daunting choosing one. It’s recommended that you stick to the industry leaders, so make a beeline to software developed by Kaspersky, McAfee and AVG. And you can rest assured that they provide plenty of free software.

Final Thoughts

The challenges of working from home are likely to be new for many employees. Thankfully, advances in technology mean that this is easier than ever. But you need to make sure that your PC at home is in excellent shape. It is, after all, your most valuable tool when it comes to working remotely. So, to guarantee a PC that is firing on all cylinders, you need to take note of the tips above.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


Advances in technology have created an environment where clocking in at the office is no longer required. But remote working is not without security risks.

Remote working is on the rise with many organizations offering this option to their employees. The benefits of remote working are numerous and apply to both employers and employees. But, away from the relative security of the office, remote working poses a number of security risks. Therefore, it’s crucial that your business finds a healthy balance. You need to develop a remote working environment which not only provides flexibility, but is also secure.

Achieving this combination is relatively easy. You just need to know how. And, thankfully, we’re going to show you how.

Keeping Remote Workers Safe

Remote workers are, to a certain degree, a law unto themselves. After all, working from a remote location means that immediate monitoring is next to impossible. So, you need to invest a certain level of trust. But we’re living in an age where cyber-attacks are reaching record highs. And this is why you need to help protect your employees in the following ways:

  • Security Training: Your employees are your main defense against security attacks, so they need the correct training to remain safe. And this applies to remote workers more than any other employee. Regular training on security protocols and updates on contemporary threats need to be put in place. 
  • Use Two-Factor Authentication: One of the surest ways to secure your remote workers is by putting two-factor authentication in place. This is a security procedure by which users have to provide additional information alongside a username and password. This can take the form of a PIN number sent to a mobile device or a secret question. It only takes seconds to pass two-factor authentication, but the enhanced security it provides is priceless. 
  • Monitor Devices Closely: It’s important to keep a regular eye on any company issued devices that are used remotely. For one thing, you need to make sure that your employees are working as they should be. But, when it comes to security, you should make sure you are analyzing their usage e.g. visiting malicious websites and connecting external devices such as USB drives. 
  • Implement a VPN: A virtual private network (VPN) is essential for remote workers. It’s difficult to guarantee that remote connections are fully secure, but a VPN solves this problem. Using multiple layers of encryption, a VPN protects any data being transmitted or received by remote workers. Therefore, data such as financial records and customer details will be secured from any external forces. 
  • Use Strong Passwords: This may sound simple, but a weak password is easier to crack than a complex one. However, this advice is ignored more often than you would think. So, you need to remind your employees of the importance of password security. And you need to prompt them to regularly change their passwords. Thankfully, creating strong and unique passwords is easy once you learn the basics. 

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


We’ve all had to boot into safe mode on our PCs at some point and you would assume it’s a safe environment. But the Snatch malware is proving otherwise.

Safe mode is a configuration mode that you can request your PC to boot into at startup. In safe mode, your PC will only execute essential applications. The functions of your PC will be limited, but it’s the perfect environment for fixing problems and removing various forms of malware. But it appears that Snatch is a brand of malware which can thrive in safe mode.

Snatch is a multi-factor threat which can cause real damage to your business, so it’s a slice of malware that you need to be protecting yourself against. To give you a head start, we’ve put together a quick lowdown on Snatch.

What is Snatch?

Snatch is a newly discovered malware variant which contains two key threats: a ransomware function and the ability to log and steal user data. It’s not the first piece of malware to come loaded with these threats, but its infection strategies are unique. Using brute force attacks, Snatch is targeting the PCs of various organizations. So far, this sounds far from unusual as brute force attacks are a fairly conventional form of hacking. But Snatch has a unique strategy.

Following the initial infection, Snatch forces the PC to reboot. And it’s at this point that Snatch informs the PC to boot into safe mode. It’s believed that this unusual, yet clever, step is initiated in order to avoid anti-virus software which is often disabled in safe mode. From here it can execute its malicious payload. Snatch will then begin encrypting files and demanding ransoms that have been as high as $35,000. There is also evidence that surveillance threats are present in Snatch, so data harvesting is likely to start once the infection is unleashed.

Protecting Yourself from Snatch

The Snatch malware has the capability to cause extensive damage to your organization in terms of both finances and credibility. It’s also disturbingly efficient as it deletes any volume shadow copies of the files it encrypts. By deleting these volume shadow copies, Snatch is ensuring that it’s impossible to restore the encrypted files. Therefore, it’s crucial that you protect your PCs from Snatch by:

  • Practice Good IT Security: The backbone of any secure network is based upon the actions of those using it. And this is why it’s important that all your users understand the basics of IT security. By embracing these practices it’s possible to keep your PCs protected from the majority of majority of malware.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


A business router can help support your entire workforce and customer base, so keeping it secure is crucial. But how do you make sure it’s extra safe?

Small to medium businesses need computer networks to stay connected. They can be used to share resources, engage with customers and store valuable data. And a business router represents one of the simplest and most effective ways to achieve this. But the benefits associated with routers are also highly attractive to hackers. Therefore, keeping ahead of these hackers and securing your router should be a paramount concern.

The good news is that protecting your router isn’t rocket science. And, to help you get started, we’re going to show you the best security settings for a business router.

The Best Settings for Staying Secure

There are many ways to secure your router with some being simple and some being considerably more complex. Thankfully, to protect you from any technical headaches, we’re going to look at the simplest, but most effective settings:

  • Use Unique Passwords: Most routers come with a default password and this poses a major security risk to your router. If an external party discovers the model of router your organization is using then they are one step closer to cracking your password. But it doesn’t have to be this dangerous. Instead, you can set a unique password which is close to impossible to crack. 
  • Change Your Network Name: It’s common for routers to use a default network name such as NetgearWiFi and, while this may seem of little significance, it’s yet another way in which hackers can gather details about your router. So, for example, if a vulnerability emerges that affects Netgear routers then a hacker would know how to strike your router. To reduce this risk you should change your network name to something that contains no identifying data. 
  • Analyze Event Logs: By switching on the ‘event logging’ feature within your router you can start analyzing any changes that are made to your router. Logs are routinely saved which will highlight any unusual configuration changes or activity going through your router. And, with this data to hand, you can get a clearer idea of whether any unauthorized access to your router has taken place. 
  • Limit Access: There are going to be very few people who need to access your business router. After all, the majority of your staff will be able to complete their daily IT tasks without needing access. And the less people that have access the better. The only people who need direct access should be your in-house IT team, so make sure that your router is correctly configured to facilitate this.

Final Thoughts

There are a number of ways that you can protect your business router and, as you can see, they are simple, but effective techniques. Even the smallest level of protection is enough to deter hackers, so if you can implement these methods then you should find that your router is safer than ever.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More