Yellowstone Computing
(715)-669-6136
  • Home
  • Services
  • Support
  • Contact
  • Blog
  • About
  • Reviews
  • Repairs

Trades Should Add Technology to Their Tool Belts

3/28/2020

 
Picture
There are many hands-on trades that haven’t traditionally needed technology. Yet modern tech tools help the plumber, carpenter, welder, or other trade improve productivity and competitiveness.
There are certain common tasks tradespeople face daily:
  • scheduling appointments with clients, suppliers, or inspectors;
  • tracking project deadlines and budgets;
  • communicating with project managers, customers, trades, office administrators;
  • paying employee salaries;
  • invoicing and tracking payables, receivables.
These can all be done with pen and paper, sticky notes, and forms in triplicate, but technology cuts the time spent and lets you focus instead on increasing your bottom line.

The Difference Technology Tools Make
Most of us carry small, powerful computers around in our pockets every day, whether it’s a smartphone or a tablet. Internet-connected devices give tradespeople access to tools to enhance productivity.
Let’s start with scheduling apps, as tradespeople are often on the move throughout the day. Signing up for a scheduling tool (e.g. Doodle) makes it easier to set appointments, and you aren't involved in the booking process. Customers simply go to your website or link to the app and choose an available time that works best for them. You can even set it up to ensure you have buffers between appointments or prevent someone from scheduling a new, big project to start at the end of your day.
Integrating the scheduling app with your website helps customers reach you. Also, connecting to a shared cloud calendar can help your team work together better. Everyone invited into the calendar can see who is out on a call, and where.
You can make changes to a cloud-based calendar on any connected device. Others will see the alterations in real-time. This helps you avoid scheduling conflicts. You can set a follow-up meeting with an inspector while you’re out in the field. The office secretary sees your availability in real-time to set up a new customer visit.

Your Trade Office On the Move
With cloud-based office software also available online, you can get more done out of the office. You don’t have to make a trip back to the office to enter your invoice slips and make photocopies of receipts. Instead, take pictures on your phone or tablet, and attach them to the project file in the cloud, or invoice directly from a secure cloud-based processing site. You won’t have to worry about any paperwork getting lost in the back of a truck or bottom of a toolbox.
The Microsoft Office suite, Google Docs, and cloud storage are available from iOS and Android devices. This lets you monitor project timelines, view budgets, and track invoices and payments in the field. Cloud-based accounting packages let you see cashflow or outstanding balances and pay contractors or suppliers on the spot.
Cloud-based software also gives every employee access to business tools in the office. With a virtual desktop, they can collaborate easily (out on a job or in the office) and make changes in real-time. For instance, a contractor could access software to edit a building plan, then actually see the new design in 3D modelling software.
The great news is that technology is ever more accessible and easy to use. Embracing modern digital tools can improve customer service and trade business efficiency.

Your skill set may not extend to technology, but that’s where we come in. We can help you find the right technology for your business needs. Contact us at 715-255-0325 today!

You’re Never Too Small to Outsource

3/28/2020

 
Picture
Small business owners are proud of getting everything done with few people. Every team member wears many hats. They are part of a family, devoted to the firm’s success. But that doesn’t make them qualified to handle IT. Really, you’re never too small to outsource your technology needs.
​
A small business may only have a few computers for its handful of employees. Having an in-house person dedicated to IT support would be overkill. But just because the technology is working fine today doesn’t mean your IT is performing at its best. That’s why it can be beneficial to outsource IT.
Having someone who knows technology working for your team can pay huge dividends. Your outsourcing partner will add value by:
·        helping you avoid bad tech purchases or buying software you don’t need;
·        identifying where you can be more efficient with tools you already have, which can save money;
·        providing knowledgeable support and IT help;
·        learning business needs and making recommendations about the best IT for your goals;
·        protecting your business technology and ensuring computers are up to date with security patches.

Small Business Breaches
Cybercriminals don’t care about business size. In fact, according to Accenture, 43% of cyberattacks were aimed at small businesses, and only 14% of the SMBs were prepared for defending their networks and sensitive data.
In fact, a small business can be a particularly appealing target. Hackers will exploit a small business as part of a campaign to attack a larger business. They know the SMB is less likely to have the same level of security as the bigger target in their sights.
Accenture’s 2019 study found that more than half of all small businesses had suffered a breach in the last year. These attacks can be crippling for SMBs. According to insurance carrier Hiscox, the average cyberattack costs a business $200,000. That figure can be a killer blow for a small business. Some 60% of SMBs hacked go out of business within six months of the attack. Even if they can survive the financial hit, damage to brand reputation and customer goodwill is devastating.

Advantages of Outsourcing
You may not have a clear picture of your cybersecurity status right now, but by working with a managed services provider (MSP) you’ll get one. Your partner will conduct an informal audit of your current technology and learn your short- and long-term goals.
Your small business, for instance, may not have a data protection procedure. You might be thinking you don’t have a lot to backup and store. But the quantity may not be the primary concern. Can you recover if your business loses an email chain it was keeping for legal or compliance reasons? What would happen if the computer holding your accounting database died? An MSP can identify where tech changes can better ensure business continuity.
When you outsource, your partner will also inventory all your tech assets. They’ll need to know everything about your infrastructure and your business’s technology capabilities. Your current team may recognize the importance of securing the business’s intellectual property, but are they also protecting customer data and employee records? Your business needs to be intentional about confidentiality, availability, and safety. An MSP can help.
The cost of outsourcing is often a stumbling block for the budget-conscious SMB. Managed IT services can often lower costs for clients by streamlining processes, managing vendor relationships, and ensuring that the business technology is best suited to current needs. And you'll pay a fixed regular fee for a technology team member who will help you avoid big, costly tech surprises.
No business is too small to outsource IT. Having access to a full-time IT professional via a managed service provider can improve your operations, enhance productivity, and lower cybersecurity risk.

Our Response to Current Events

3/17/2020

 
Picture
In order to protect our customers while continuing to provide the highest levels of customer service, Yellowstone Computing is taking the following precautions:

1. Customers needing to drop off their devices are encouraged to use our online ticketing system on our Repairs page prior to bringing devices in for service. Pick up and drop off hours will be Tuesday and Thursday from 9am to 5pm.
​
2. All devices brought in for service will be disinfected.  

3. Onsite service calls will be restricted to businesses.

4. Remote service calls are encouraged; we can fix many computer issues remotely via the Internet, please visit our Support Page for instructions.

Please note that repair times may be impacted, we apologize for any inconvenience this may cause. We greatly appreciate your patience and patronage during this time. 

Don’t Get Hooked By a Whaling Attack

3/14/2020

 
Picture
The executives of your company are the big fish in your sea. Yet cybercriminals think of them as whales. In fact, whaling is a new cybersecurity threat targeting the C-suite level.

You’ve likely heard of phishing attacks. Phishers use scam emails or spoofed websites to obtain user credentials or financial information. This might be an email that looks like it is from your bank asking you to log in and update your details, or a supposed tax alert needing immediate action.
A vishing attack is another fraudulent attempt to steal protected data, but the cybercriminals are going to use the phone to make contact. They might pretend to be a vendor needing to confirm account details for bill payment. There’s also spear phishing. In these cases, the attackers do their homework first and target a specific company. They scour directories and employee social media to gather information to gain credibility. Now, there are whaling attacks, too. The high-value target is a senior-level employee. The fraudster typically also impersonates one of the target’s C-suite counterparts.

What You Need to Know About Whaling
A whaling attack uses the same methods as phishing but focuses on top-level targets. The goal is to get “whales” to reveal sensitive information or transfer money to fraudsters’ accounts.
Whale attacks are intentional. Phishing can see attackers baiting hundreds of hooks to get nibbles. In whaling, information gathered in advance adds credibility to the social engineering. The target has higher value, so it’s worth their time to appear knowledgeable and make a request to and from someone important.
The sender’s email address will look convincing (e.g. from smithj@companyx.co instead of smithj@companyx.com). The messages will have corporate logos and legitimate links to the company site. Because humans want to help, the communications typically involve an urgent matter.
Whaling attacks are on the rise. In 2016, Snapchat admitted compromising employee data after receiving an email, seemingly from its CEO, asking for payroll information.
In another high-profile example, Mattel nearly transferred $3 million to a Chinese account. Company policy required two signatures, but the attackers (taking advantage of a recent shakeup) faked the new CEO’s signature. The second executive went ahead and added a signature. The only thing that saved the company was that it was a Chinese bank holiday.

Protecting Against Whale Attacks
As with phishing or vishing, the primary way to protect against whaling attacks is to question everything. Train your key staff members to guard what they share on social media. Encourage them to question any unsolicited request. If they weren’t expecting an attachment or link, they should follow up. If a request is unusual, they should trust their spidey-sense and proceed with caution.
It’s also a good idea to develop a policy for handling requests for money or personal information. By requiring that two people must always weigh in, you're more likely to catch a scam before it’s too late.
Also, train all your employees to look carefully at email addresses and sender names. They should also know to hover over links (without clicking on them) to reveal the full URL.
Security awareness is crucial. It’s also a good idea to test your employees with mock phishing emails.

What’s Causing Your Bandwidth Woes?

3/9/2020

 
Picture
Every time employees send or receive data online, they need bandwidth. Like time and money, bandwidth is a scarce resource in many offices. After all, computers and digital devices rely on bandwidth to complete tasks online. Bandwidth is the amount of information that can be sent or received per second. This might be measured in Kbps (thousands of bits per second) or Mbps (millions of bits per second). Many people think having a higher bandwidth will mean a faster user experience. In fact, it’s only one factor that affects response time. Bandwidth is actually about capacity more than speed.

Eight bits of information is one byte. A byte is the amount of memory it takes to store one character, such as the letter "Q."

You can’t drive fast on a one-lane road when there’s a lot of traffic. You also can’t navigate the information highway as quickly in online congestion. If you’re the only one in the office late at night, you’ll have no trouble trying to stream an online webinar, but you might struggle to stream the same webinar when the sales department is on a video conference call and your advertising department is sending a graphic-heavy email.

What Is Using Bandwidth?
There is greater demand on bandwidth every day. Your business migrated to cloud services for greater mobility and online consistency but sharing information in real time requires bandwidth usage to synchronize data.
Backing up to the cloud provides businesses with greater peace of mind, yet it can be a headache if that backup is happening right when you want to get on a video chat with a client – your connection can suffer. You’ll be that person who keeps dropping in and out of that important meeting!
When you’re using an online meeting tool (audio or video), you can also slow things down for others.
Even email needs bandwidth to send and receive data. The bigger the files (e.g. images or spreadsheets?), the more bandwidth activity. Uploading a few PDFs can take up 20–40Mb of the total, which can choke a network with limited upload capacity.
All those personal devices your people are bringing to work can make a difference, too. Smartphones will often start backing up to the cloud when they are on a Wi-Fi network.

Bandwidth Usage Solutions
Often, there is no option for greater bandwidth because the infrastructure where you’re located won’t support greater bandwidth. You’re already getting the most capacity your provider can offer.
Still, there are ways to better manage bandwidth:
  • Switch to a business-grade router or a Unified Threat Management (UTM) appliance. These allow you to identify and manage bandwidth usage better. They also add security (firewalls, filtering) to your network connection.
  • Set up Quality of Service (QoS) to rank the activities your business values more (e.g. configuring video conferencing to take data preference ahead of file downloads).
  • Block some devices entirely, such as employee phones backing up to the cloud.
  • Schedule some activities for a more convenient time (e.g. set your system backups to happen in the middle of the night, fewer people are likely to be trying to do things online).

Want to regain control of your internet capacity? A managed services provider can monitor traffic and usage, and help you set up a solution for smarter bandwidth usage. Improve productivity and give employees something to smile about (other than a cat riding a vacuum cleaner on Facebook) with better bandwidth management.

How to Recognize and Avoid Phishing Scams

3/2/2020

 
Picture
Far from a relaxing day dockside or on the boat, phishing is an effective means of stealing a person's information. The FTC has a good article on how to recognize and avoid phishing attempts. Click the button below for the full article. 

Scammers use email or text messages to trick you into giving them your personal information. They may try to steal your passwords, account numbers, or Social Security numbers. If they get that information, they could gain access to your email, bank, or other accounts. Scammers launch thousands of phishing attacks like these every day — and they’re often successful. The FBI’s Internet Crime Complaint Center reported that people lost $30 million to phishing schemes in one year. But there are several things you can do to protect yourself against phishing attacks. 
Read More
​

The Advantages of Ad Blocking

3/2/2020

 
Picture
Unless you’re in the advertising business, you probably try to avoid ads. You pay extra to stream ad-free content online. You leave the room if you are actually watching live TV shows with ads. You filter spam out of your inbox. You immediately click out of ads on the Web pages you visit. But are you actively blocking online ads? You should be. They are more than an annoyance. They could be a security risk.
Cybercriminals are smart and savvy crooks. They don't advertise what they are doing, and it's not that easy to spot, but they do buy legitimate ad space to lure users to malicious sites.
Malvertising uses legitimate online advertising networks to target you with malicious code. Sites you know and trust that use legitimate ad networks can end up serving up the malicious ads. Cybercriminals have run ads on the New York Times, Spotify, and the London Stock Exchange redirecting to malicious websites.
Adware is another risk. Packaged with legitimate software, adware runs on your computer without your knowledge. It displays unwanted advertising, redirects search requests to ad websites, and mines your data.
The cybercriminal wants to steal your ID, or your financial and contact data, or to encrypt your information, spy on, or hijack your computer.
They can do this with exciting ads ($9 iPads?!) or alerts (often warning about infections) to get you to click. But they can also take a drive-by download approach. In these cases, you don’t even need to click on anything. You load the web page hosting the ad (or malicious pop-up window). You’re directed to a page that finds browser or software security vulnerabilities to access your machine.

Protecting Against Malvertising
Keep your software up to date and run antivirus checks to protect against downloads and malicious code. Avoiding Adobe Flash and Java helps too, as they are commonly exploited by malvertisers.
Cybercriminals mostly target Windows users, because the huge user base gives them the best return on investment. But Macs are just as vulnerable to malvertising attacks. — MalwareBytes
Installing an ad blocker plugin prevents the ad loading in the first place. These take away the annoyance of ads and help you avoid falling victim to a malicious attack hidden in an ad.
At the same time, you will enjoy cleaner Web browsing, and you won’t have to worry about distracting ads flashing at you while you read.
Your pages will also load faster. The ads often run a lot of code on top of the website code your computer needs to read and load. The images or video, for instance, can make a difference to data usage. So, the less you have to load, the faster you’ll get to the content you wanted. This can also help to preserve the battery life of your mobile devices!
There are some other considerations, though. For one, not all adblocker plugins can be trusted. Some will mine your data and sell it to advertisers, which is exactly what you don’t want to happen.
Also, some websites won’t load correctly without the ad code. You can turn off ads on a site-by-site basis. After all, some free sites that you frequent might rely on ad revenue, so there may be sites you trust that you want to support by turning off your ad blocker just for those sites.
Always think before you click. Updating browsers and plugins and installing ad blockers can also help.

    Yellowstone Computing

    To read about us, click here!

    Archives

    December 2021
    September 2021
    August 2021
    May 2021
    April 2021
    March 2021
    February 2021
    January 2021
    December 2020
    November 2020
    October 2020
    September 2020
    August 2020
    July 2020
    June 2020
    May 2020
    April 2020
    March 2020
    February 2020
    January 2020
    December 2019
    November 2019
    October 2019
    September 2019
    August 2019
    July 2019
    June 2019
    May 2019
    April 2019
    March 2019
    February 2019
    January 2019
    December 2018
    November 2018
    October 2018
    September 2018
    August 2018
    July 2018
    June 2018
    May 2018
    April 2018
    March 2018
    February 2018
    January 2018
    December 2017
    November 2017
    October 2017
    September 2017
    August 2017
    July 2017
    June 2017
    May 2017
    April 2017
    March 2017
    February 2017
    January 2017
    November 2016
    October 2016
    December 2015
    September 2015
    July 2015
    May 2015
    April 2015
    March 2015
    February 2015
    January 2015
    December 2014
    November 2014
    October 2014
    September 2014
    August 2014
    July 2014
    June 2014
    May 2014
    April 2014

    Categories

    All

    RSS Feed

Visit Us!

What Our Clients Are Saying

Joe is really in tune with what our business needs are... what a great guy with amazing skills... - Grassland Veterinary Service

Yellowstone Computing goes above and beyond for their customers! Joe is very knowledgeable and will go the extra mile to make sure his customers not only get what they asked for but also makes sure they are taken care of for many years to come! Between the great business services they provide and their involvement in the Thorp Chamber I'd highly recommend doing business with Yellowstone Computing! Whether you are an individual looking for computer or other technology help or a large employer who needs to either supplement your current IT support or completely outsource it Yellowstone Computing should be one of your first calls! - Justin Z.