top of page
Local IT fox logo

30 results found with an empty search

  • Windows vs. Apple: Which OS Reigns Supreme in the Business World?

    The choice of operating system (OS) can significantly impact a business's productivity, security, and overall workflow. While both Windows and Apple have their strengths, the optimal choice often depends on the specific needs and goals of an organization. Let's delve into the key factors to consider when deciding between these two popular options. Windows: The Versatile Workhorse Flexibility and Customization:  Windows offers unparalleled flexibility, allowing businesses to tailor their systems to specific needs. From hardware compatibility to software options, Windows provides a vast ecosystem. Cost-Effective:  Generally, Windows devices tend to be more budget-friendly compared to their iOS counterparts, making it a viable choice for businesses with cost constraints. Wide Application Support:  A massive library of software applications is available for Windows, catering to various business functions, from accounting and CRM to design and engineering. Strong Enterprise Management:  Windows provides robust tools for managing large-scale deployments, including group policies, Active Directory, and remote management capabilities. Apple: The Sleek and Secure Option Security:  Apple is renowned for its strong security features, making it an attractive option for businesses handling sensitive data. User Experience:  The intuitive interface and seamless integration across Apple devices create a user-friendly experience that can boost productivity. Mobile Integration:  For businesses heavily reliant on mobile devices, iOS offers a cohesive experience between desktops and smartphones. Brand Image:  In certain industries, using Apple products can convey a premium image and appeal to a specific target audience. Making the Right Choice The decision between Windows and Apple ultimately depends on several factors: Industry and Business Size:  Different industries have varying software requirements. For instance, creative fields might lean towards macOS, while large enterprises often opt for Windows due to its scalability. Budget:  Consider the initial hardware and software costs, as well as ongoing maintenance expenses. Employee Preferences:  While not the sole determining factor, employee familiarity and comfort with an OS can impact productivity. Security Requirements:  If data security is paramount, Apple might be a better choice, but Windows also offers robust security measures. Compatibility:  Ensure that your existing software and hardware are compatible with your chosen OS. In Conclusion Both Windows and Apple have their place in the business world. The key is to carefully evaluate your organization's specific needs and priorities to make an informed decision. It's also worth considering a hybrid approach, combining both platforms to leverage their respective strengths.

  • Tech Support Triumphs: Let's Reboot the Reboot

    Hello my users and friends! Have you ever felt like you're speaking a different language when talking to tech support? You're not alone! A simple instruction like "reboot your computer" can lead to a world of confusion if we're not all on the same page. Take the Windows "fast startup" feature, for example. It's designed to speed up your boot time, but it doesn't clear your system's memory entirely like a traditional reboot. So, when you're troubleshooting an issue and I ask you to reboot, and you simply turn your computer off and on again, we might hit a snag. The problem could persist, leaving both of us scratching our heads. Reboot vs. Fast Startup: Let's Clear the Air Reboot/Restart : This is the full shebang. It shuts everything down, clears your system's memory, and then starts fresh. Think of it like closing all the apps on your phone before powering it off and on. Fast Startup/Shutdown : This is more like a quick nap for your computer. It saves some things to speed up the next startup, but it doesn't clear everything out. Clear Communication: The Key to a Smooth Experience So, how do we avoid these misunderstandings? It's all about communication! On my end:  I'll try my best to give you clear instructions. When I ask you to "reboot," I mean to restart your computer. I'll rarely ask you to "shut the computer off" in a troubleshooting scenario because of fast startup. So, just select the restart option. On your end:  Don't hesitate to ask if you're unsure about anything! A simple question like, "When you say 'reboot', do you mean select shutdown and then restart the computer?" can save us both a lot of time and frustration. Remember, we're in this together! By communicating clearly and patiently, we can turn a potentially frustrating tech support experience into a positive one. And hey, we might even learn a thing or two along the way! Bonus: How do I turn off fast startup?  In Control Panel, under Hardware and Sound, Power Options, System Settings, you should see a check mark under “Shutdown settings” Remove the checkmark if you want to disable this setting. Extra Bonus: Advanced Users ONLY!  This setting can be changed in the Registry. Don’t know what the Registry is? Please don’t mess with it and stop reading now!  However, if you know and you want to make the changes in the Registry here is the relevant information: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Power HiberbootEnabled DWORD 0 = Turn off fast startup 1 = Turn on fast startup

  • The Client Who Waited: A Cautionary Tale of Backups (and Why You Should Test Them)

    The stale smell of burnt coffee hung heavy in the air as Sarah, a small business owner juggling a million tasks, fumbled for the light switch. It wasn't the usual hustle and bustle of a Monday morning. An eerie silence had settled over the office. Then she saw it. The malevolent red light blinking on the server – a sure sign of trouble for any business owner. Her stomach lurched. Without the benefit of an on-site IT person, Sarah knew she was in serious trouble. Years of customer data, financial records, and ongoing projects – all potentially gone. The downtime threatened to cripple Sarah's business. Every minute the server was out meant lost sales, stalled projects, and a growing chorus of frustrated customers. Even with a skeleton staff limping along on offline tasks, the payroll loomed large – another potential loss on top of the mounting pile of problems. The hours ticked by like molasses. Thankfully, Sarah had backups. Or so she thought. The backup, it turned out, was corrupt. The following days were a blur of frantic activity for Sarah. Data recovery specialists were brought in at an exorbitant cost. Thankfully, they were able to salvage most of the critical data, but the damage was done. Sarah's business was down for a week, translating to a significant loss in revenue. The cost of recovery, coupled with lost wages and productivity, put a major dent in her bottom line. This ordeal served as a harsh lesson for Sarah, and businesses like hers, about the importance of backups – and more importantly, testing them. Here's the truth: having a backup is only half the battle. If you haven't tested your restore process, you're gambling with your business's future. Imagine the peace of mind Sarah could have had if a simple one-day test with a reliable IT provider like Local IT had prevented this entire catastrophe. Local IT urges all business owners, especially those without dedicated IT staff, to be proactive. Schedule a test restore of your backups today. It might take a few hours, but it's a miniscule investment compared to the potential losses you could face. Think of it as an insurance policy for your business's data – a policy that could save you a whole lot of money, grief, and burnt coffee in the long run. After all, prevention is always better than cure, especially when it comes to your business's critical data. Local IT is here to help you every step of the way.

  • Cameras for Operations

    This week in Birmingham, Alabama, I attended Hanwha Certification Training. Hanwha is the camera solution we have relied on for years to meet the diverse camera needs of our customers. Even though countless camera solutions are available, Hanwha stands out as the ideal choice for our customers with limited budgets as well as those with enterprise-grade requirements. At the highest end of camera deployment we have a customer with 25 cameras in which 20 plus of the cameras are used for operational reasons only.  This is an industrial environment and is an exciting customer to work with.  They continue to find areas to add cameras to increase productivity in production.  The high quality of the cameras also brings a better quality of work life experience to the employee.  Another example of operational camera use is in the restaurant environment.  Obviously cameras are useful to record slip and fall events and other events that may need to be recorded for liability and insurance purposes.  Cameras are also being used by our restaurant clients for situational awareness for the managers and owners. Cameras in the hostess area allow monitoring of how many customers are lining up in the queue or in the kitchen to see how fast food is moving through the process to get to the hungry customer.  I have countless stories and examples from our restaurant customers about cameras being used to improve food safety training and getting help to problem areas when the staff is overwhelmed.   In my Hanwha training this week, as you may expect, there is a big push to AI integration with cameras.  I don’t what to make this post about understanding good AI development vs “surface level” AI bolt on solutions but it is worth bringing up that Hanwha is doing AI right.  They are doing it all in-house and working on the more complex Machine Learning and artificial neural networks to train their models.  Here are some AI tools that exemplify the capabilities of Hanwha's AI-enabled X and Q series cameras. While these cameras may not be the most affordable option, they are still within the reach of businesses looking to make a significant operational impact. People counting Vehicle counting Queue management Heatmap Object detection Sound identification  Hanwha and Local IT have solutions for businesses, regardless of their current or future camera needs, whether for security or operational purposes. Please share your current or desired uses for cameras, and we can assess your present and future requirements. It's always a good time to evaluate your camera needs, as their importance continues to grow.

  • AI and Social Media: A Dynamic Duo for Business Growth

    Artificial Intelligence (AI) has revolutionized the way businesses interact with their audience. When combined with the power of social media, it becomes a potent tool for growth. Let's explore how to harness this duo effectively while avoiding common pitfalls. Leveraging AI for Social Media Success Content Creation:  AI can generate ideas, write engaging copy, and even create visual content. Tools like ChatGPT can help brainstorm post ideas, while image generators can produce stunning visuals. Audience Analysis:  AI can analyze vast amounts of data to understand your audience better. This includes demographics, interests, and behaviors. Use this information to tailor your content and campaigns. Customer Service:  AI-powered chatbots can handle customer inquiries efficiently, freeing up your team to focus on complex issues. Ad Targeting:  AI can optimize ad campaigns by identifying the most effective audiences and platforms. This leads to higher ROI. Social Listening:  AI can monitor social media conversations for mentions of your brand or industry. This helps you identify opportunities and address potential crises. Best Practices for AI and Social Media Human Touch:  While AI is powerful, it's essential to maintain a human connection. Use AI as a tool to enhance your creativity, not replace it. Data Privacy:  Handle customer data responsibly. Ensure compliance with privacy regulations like GDPR and CCPA. Algorithm Understanding:  Stay updated on social media algorithm changes. AI can help you analyze trends, but human insight is crucial. Experimentation:  Don't be afraid to try new things. AI allows for rapid experimentation, so test different approaches and measure results. Continuous Learning:  The AI landscape is constantly evolving. Stay updated on the latest trends and tools to maintain a competitive edge. Common Mistakes and Misconceptions Overreliance on AI:  AI is a tool, not a magic solution. Human judgment is essential for strategic decision-making. Ignoring Human Element:  People connect with people. Don't let AI overshadow your brand's personality. Neglecting Data Privacy:  Mishandling customer data can lead to severe consequences. Prioritize data protection. Setting Unrealistic Expectations:  AI can improve efficiency, but it won't guarantee overnight success. Fear of Change:  Embracing AI requires adaptability. Be open to new approaches and learning opportunities. By following these best practices and avoiding common pitfalls, you can effectively leverage AI and social media to drive business growth. Remember, the key is to use AI as a complement to human creativity and strategy.

  • Why It's Crucial to Manage Your Public DNS Data

    In the digital landscape, your domain name system (DNS) records serve as the fundamental blueprint of your online presence. While DNS often works quietly behind the scenes, ensuring smooth connectivity and domain resolution, managing your public DNS data is a critical aspect of cybersecurity and domain health that should not be overlooked. In particular, the management of email-related DNS records such as SPF, DKIM, and DMARC is crucial for protecting your domain against misuse and ensuring the integrity of your communications. What is DNS? The Domain Name System (DNS) is essentially the phonebook of the internet. It translates human-readable domain names like example.com  into IP addresses that computers use to identify each other on the network. This translation allows users to access websites without having to memorize complex numerical addresses. DNS records are stored in DNS servers and are publicly accessible, meaning anyone can look up the DNS records for a given domain. This public accessibility makes it all the more important to manage your DNS data carefully. The Importance of Managing Public DNS Data 1. Preventing Unauthorized Access and Attacks Unmanaged or improperly configured DNS records can expose your domain to various types of cyberattacks. Attackers can exploit weaknesses in your DNS setup to perform DNS hijacking, cache poisoning, or spoofing, leading to potential data breaches, unauthorized access, and loss of sensitive information. 2. Enhancing Email Security with SPF, DKIM, and DMARC Email security is a significant concern, as email is a primary vector for phishing and spam attacks. By managing your DNS records to include Sender Policy Framework (SPF), DomainKeys Identified Mail (DKIM), and Domain-based Message Authentication, Reporting & Conformance (DMARC), you can help protect your domain from email spoofing and ensure the authenticity of your communications. SPF (Sender Policy Framework) SPF is a DNS record that specifies which mail servers are authorized to send emails on behalf of your domain. By defining these servers, SPF helps prevent spammers from sending unauthorized emails that appear to come from your domain, reducing the risk of email spoofing and phishing attacks. DKIM (DomainKeys Identified Mail) DKIM adds a digital signature to your email messages, allowing the recipient's mail server to verify that the email was indeed sent by your domain and that it has not been altered during transit. This helps maintain the integrity of your emails and prevents malicious actors from tampering with them. DMARC (Domain-based Message Authentication, Reporting & Conformance) DMARC builds on SPF and DKIM by providing a way to specify how mail servers should handle messages that fail SPF or DKIM checks. It also allows domain owners to receive reports on the validation of their emails. By enforcing a DMARC policy, you can ensure that illegitimate emails are rejected or quarantined, further safeguarding your domain's reputation and reducing the chances of phishing attacks. 3. Maintaining Domain Reputation and Trust Your domain's reputation is vital for maintaining trust with your users and partners. Poorly managed DNS records can lead to your domain being blacklisted, reducing email deliverability and damaging your brand's reputation. Regularly monitoring and updating your DNS records helps ensure that your domain remains secure and trustworthy. 4. Ensuring Service Availability and Performance Proper DNS management can also impact the availability and performance of your online services. Misconfigured or outdated DNS records can lead to service disruptions, affecting your website's uptime and accessibility. By keeping your DNS records up to date, you can avoid potential downtime and ensure a smooth experience for your users. 5. Facilitating Compliance and Reporting Many industries have compliance requirements related to data security and privacy. Managing your DNS data, including email authentication records, can help you meet these compliance standards and provide a clear audit trail for regulatory purposes. Local IT Can Help Manage Your DNS Data Managing DNS data can be complex and time-consuming, especially when you need to ensure that your email security protocols like SPF, DKIM, and DMARC are properly configured and maintained. This is where Local IT comes in. As your dedicated IT provider, Local IT can take on the management tasks for you, ensuring that your DNS data is always up to date, secure, and compliant with the latest industry standards. By partnering with Local IT, you can: Ensure Robust Email Security:  Local IT will set up and manage your SPF, DKIM, and DMARC records to protect your domain from email spoofing and improve the deliverability of your emails. Protect Against DNS Threats : Local IT's expert team will monitor and manage your DNS settings to prevent unauthorized changes and mitigate the risk of DNS-based attacks. Maintain Service Availability: With Local IT's proactive management, you can avoid DNS misconfigurations that could lead to service disruptions and ensure your website and online services remain accessible. Managing your public DNS data is not just a technical necessity; it is a critical component of your overall cybersecurity strategy. By keeping your DNS records well-maintained and implementing robust email authentication protocols like SPF, DKIM, and DMARC, you can protect your domain from malicious activity, maintain your reputation, and ensure the smooth operation of your online services. Don't let your DNS be an overlooked vulnerability—take control of your DNS data today to secure your digital presence. Local IT can help you navigate the complexities of DNS management, providing expert support to keep your domain secure and your services running smoothly. Contact us today to learn how we can take the burden of DNS management off your shoulders, so you can focus on what you do best. By staying vigilant and proactive in managing your DNS data, you can mitigate risks and build a resilient foundation for your online operations. Remember, in the ever-evolving landscape of cybersecurity, managing your DNS is not just about protection—it's about maintaining the trust and reliability that your users expect from your domain.

  • Preparing for the End & Planning Your Transition

    What if you knew the exact date of your death? Yes, I know that isn’t a great idea and certainly does not seem to fit in a technology blog but I promise that there is a tie-in. Not too many of our clients know that I was a funeral director for a decade before my career path took me into technology and system administration. During that time, I assisted with over 2,000 funerals. I dealt with all types of families and with many difficult situations. Some deaths are sudden and take everyone unawares. Others are expected; the result of a long illness or other prolonged situation. Some families pre-planned funeral arrangements, taking the time to account for everything that could be foreseen and making their decisions calmly and rationally. They could also choose to budget for their preferences without the immediacy that an unexpected death can bring on. I could go on to say that pre-planning your funeral is a very good thing for all involved, but I did promise a tie-in to technology. Windows 10 End of Life is Coming Soon! There is a known “end-of-life” date that is rapidly approaching us all. Microsoft has set October 14, 2025 , as the date that Windows 10 will stop receiving technical support and security updates. Unlike in my previous occupation, the end-of-life for Windows 10 will not actually mean that the computer will die. We must still carefully consider what that specific date means and begin to plan accordingly. You might have an easy and streamlined option. Perhaps you have been delaying the notifications from Microsoft suggesting that you upgrade to Windows 11 because of a fear of the unknown. "I know Windows 10, and I am comfortable with it," you might say to yourself. For anyone in this position, consider this...wouldn't it be nice for you to choose the time that you have to face that fear? Anyone in this position is indeed fortunate, and your discomfort will be minimal in comparison to some. Unfortunately, you may not be so lucky as to have a direct-upgrade option. Windows 11 has some additional hardware requirements which means you will have to purchase a new computer for the transition. In the case of your business, this may mean that a large percentage of your hardware needs to be replaced. You should define a transition plan now, enabling you to also budget for the oncoming changes. It is easier for most offices to handle one computer transition at a time than to replace everything all at once. There is another option that some businesses will choose to take, unfortunately. They will let the end-of-life date come and go without taking any action at all. While this is a low-effort option and certainly less expensive in the short term, the consequences could be severe. Depending on their business, there may be compliance requirements that could result in fines for failing to have supported operating systems. The lack of continued security updates will open their systems up to malware, ransomware, and other malicious activities that a fully patched and modern operating system would have helped to prevent. I can attest that the upcoming end-of-life for Windows 10 will be far less traumatic than the other kind that people have to deal with. I can also assure you that planning ahead will make the event easier to handle and is the preferred way to face it. If you're unsure about your options or need assistance with the transition, don't hesitate to contact us. Our team of experts can assess your current setup, provide recommendations, and guide you through the upgrade process.

  • Keeper and Data Organization

    First off, what is Keeper?  Keeper is by far the leading password manager today and the only one Local IT recommends.  Most of the tools we use at Local IT are the tools we recommend to our clients.  The top of that list is Gmail and the suite of applications in Google Workspace. Among the tools we use daily, there’s one indispensable tool that stands out—Keeper. Let’s talk about password security.  It may surprise you that I am rather sanguine about my customers, from receptionist up to CEO, using a paper notebook to store their passwords.  The reason is simple.  I am relatively confident your office desk or drawer is secure from the Chinese or North Korean hacker.  If you store your passwords in a Notepad, Word document or Google Sheet I will be a little more critical.  For this week's blog let’s do away with debating over the requirement for passwords to be secure. Your passwords need to be secure and if you are doing it as described above you are wrong - full stop.  As little as 2 years ago I empathized with my end users that “password managers are hard and we just have to live with it. They are difficult but the right thing to do.” Only two years ago, I commiserated with my end users by saying, "Password managers can be challenging, but we have no choice but to use them. They may be arduous, but they are the responsible course of action." No more. Keeper is a joy to use.  It is simple, integrated, ubiquitous and SHAREABLE.  Why do I shout at you about Keeper being shareable?  There are at least two reasons: There are more and more resources that you need to share with others in your company.  Multi Factor Authentication (MFA) - many of the sites you need your folks to log in to require (or should have) MFA!!   Let’s take these one at a time.   Sharing logins - I know anyone reading this has websites they need to login to that others need to login to as well.  What if that password changes every 90 days?  Whose notebook do you update?  How do you share the password change?  Keeper solves this problem with a shared password folder.  Let’s take on MFA as well.  Whose phone or email do you use to produce that MFA?  Does that go to the boss, the secretary, the bookkeeper or other? Keeper can be your MFA shared to anyone that needs it. I assume you’re already ready to give me a call and get Keeper added to your set of Local IT managed tools, but I have just gotten started.  Keeper has become such an integral part of my team's daily use that I can’t imagine a day without it.  When I am onboarding a new client or setting up a new web portal the team needs to use Keeper for a secure note, sensitive client data, licenses, serial number and much more. At Local IT we have built a culture of naming conventions and data organization.  Keeper is one of the strongest, secure, searchable data repositories I have ever used. I started this blog pointing out that I am not going to berate you about keeping your data secure as much as I am letting you know Keeper removes so much pain related to password sharing with your team and making a dynamic, searchable database of information you need to do your jobs.  Keeper may be the single most important tool for security and productivity.  As an IT Professional I assure you we rarely say security and productivity in the same sentence. Please get with us today!!

  • How Does Cloud Storage Actually Work?

    So, you’ve probably heard the term “cloud storage” thrown around a lot over they years. Some people may think that all  your data is floating around in the sky over your head. While it may travel through the air to reach a cell tower or network hub, it doesn’t get stored there. So what does “cloud storage” really  mean? Well, let’s break it down. Imagine your computer’s hard drive is a small, personal storage closet. Cloud storage is like renting a massive, secure warehouse. Instead of storing your files on your computer, they’re stored on powerful computers called servers in data centers. Think of these data centers as giant, climate-controlled buildings packed with servers....because they are. When you upload a file to the cloud, it's actually being sent to these servers. To make sure your data is safe, it's spread across multiple servers in different locations. It's like having multiple copies of your important documents stored in different cities. Now, when you need to access your files, you're essentially asking the cloud to send them back to your computer. It’s like requesting a specific item from the warehouse. This happens super fast thanks to high-speed internet connections. The big benefits? Well, you can access your files from anywhere with an internet connection. It's like having your entire office with you all the time. Plus, it's a great way to back up your data. And let's face it, running out of space on your computer is a thing of the past with cloud storage. Speaking of your computer, we all know the risk of keeping your files on a laptop that you drag back and forth from home to work. Anything could happen to it, and all your work could be lost. By keeping everything in the cloud, you can easily spin up a new computer and get back to work in the event of hardware failure or accidental coffee spillage. If you're worried about the security of your data in the cloud, don't be. Cloud providers invest heavily in security measures to protect your information. And remember, Local IT can help you choose the right cloud storage solution for your business and ensure it's set up securely. Have questions about cloud storage or need help managing your data? Give us a call! Or check out our previous blog post - Cloud Data Backup: Because Even 'The Cloud' Has Commitment Issues!  - https://www.asklocalit.com/post/data-backup

  • Facebook Business Page Limbo

    This is the story of how I saved a friend's Facebook business page from being lost in Facebook admin purgatory. Last week, a fellow Chamber Diplomat, Just Roger , told me how he had somehow lost admin rights to his business page on Facebook. To keep it brief, he had someone doing social media marketing for him. They had a falling out, and when he tried to take over the page, he accidentally removed his own admin rights. This happened around the end of June, and he had been locked out since early July. With August fast approaching, he was desperate to regain access to post updates. I should mention that he's a musician, and we're in the peak of tourist season, when he books the most gigs. After hearing his story, I felt compelled to help. Back at my office, I began researching his page. As a business owner myself, I already had a Meta Business account that managed my business page. I took a chance and submitted a request to get admin access to his page through my account. He wasn't sure if his former marketing person still had access. I knew if she did, it would alert her to my request. Maybe we'd get lucky and she'd hand over access. I had nothing to lose and no other options. Sure enough, later that evening, I got an email saying my access had been granted! I sent a screenshot to my friend, who was in the middle of a set but still replied with excitement and confusion. “Wha what!?! Did you get access? Duuuude! Thanks so much. Let's talk tomorrow for sure.” The next day, I felt unstoppable. I switched to his profile, navigated to the settings, and found the place to add other admins. I found his personal profile and selected to give him admin rights. Facebook prompted me for my password, which I entered, but nothing happened. I couldn't add him for some reason. I thought maybe it was too soon and I needed to wait 24 hours. I couldn't find anything online to support that theory, so I waited and tried again later. This time, after entering my password, I was asked for a six-digit code sent to my email. I entered it, but nothing happened again. Later that afternoon, he came to my office with his laptop. I noticed his page said it was owned by him but was a Meta Business profile. We couldn't find access to that profile. We figured the former marketing person had set it up but hadn't responded to him. He had a separate Meta Business profile, but that page wasn't listed. We followed the same steps I took from my account and submitted a request for him to get access. After studying Meta Business accounts further, I realized I could invite people to join through my account. I quickly sent him an invite and had him accept it. I selected his business page and gave him full admin control. We logged back into his personal Facebook, and we had done it! He could access his page again. We battled Facebook and won! So remember, always have a second admin on your social media accounts or a good IT person. Be sure to catch one of Just Roger's upcoming performances this August!

  • Remote Work

    On Friday the world was reeling from the CrowdStrike crash. Computer systems were down in organizations of all kinds, causing disruptions of many services, including airlines. And I was flying.  I was set to leave on Friday and return on Monday, and things weren’t looking good. When I arrived at Pensacola airport, I found every parking lot full. Once through security, I found the dreaded Blue Screen Of Death on the big screen over the very first gate. Not to worry, though, I was flying Southwest, and they were unaffected… right? I started feeling skeptical when our intended craft arrived at the gate only moments before I was scheduled to board. My skepticism grew a few minutes later when they announced that the airplane was empty and ready, but they couldn’t locate the crew for our flight; we would begin boarding just as soon as we had someone to fly the plane. This felt like an inauspicious beginning, to say the least, and I was not confident that any part of my trip would go according to plan, but I didn’t need to worry about work; I’m part of a great team and knew I could count on them, but I also carried with me the tools I needed to do much of my work from any internet connection in the world. We all wear several hats at Local IT and our greatest successes come from a small-team approach to problem solving. Thanks to our experience and tools, we accomplish more work for more customers with fewer men than anyone could have expected just a few years ago. Much of our work is physical; we deliver, install and troubleshoot equipment and provide hands-on service. Most of what we do, however, happens from our desks, and thanks to a few critical technologies, that desk can be nearly anywhere. I don’t know if it was the military childhood or Louis L’Amour, but “nearly anywhere” is exactly where I like to go. For this adventure, I joined my brother Charlie and his wife Haley to visit Rocky Mountain National Park, where I caught the world's smallest brook trout, learned the meaning of the term “saddle sore” and experienced the special relief that comes from escaping the summer humidity of home. I loved escaping the screen for those few hours without cell service, confident that as soon as I left the wilderness I could reach  everything - our hosted servers in Google Cloud Platform (GCP), our network equipment using a VPN (I’m really loving WireGuard these days), and my team and documentation using Google Workspace. I could even share Windows desktop apps with my team, because we host them on GCP with Cameyo to publish them like any SaaS cloud app. I got lucky this time - I wanted to see mountains again and Southwest got me there and back again almost on time - but I wouldn’t have made this trip without the tech to keep me connected. One customer’s network equipment was destroyed in a lightning storm Sunday night and I was able to remotely configure replacements in our Alabama office through a VPN before leaving for the airport. Later, I caught up on less urgent tasks in our ticketing software before boarding. If you have questions about how to enable your own wanderlust, or you want to work more effectively from home, or for tips on fly fishing, please reach out. We can help; at least with some of those things.

  • CrowdStrike Outage Sends Ripple Effects Across Global Businesses

    I had a completely different blog post about DNS and how you really need to keep it up to date in mind for today, but then we awoke up to the news of a major technological disruption on July 19, 2024, caused by a faulty software update from cybersecurity firm CrowdStrike.  The outage, which impacted computers running Microsoft Windows, resulted in grounded flights, disrupted banking services, and took media outlets off the air. This incident served as a stark reminder of the interconnectedness and reliance on a few key providers in our digital landscape.   Thankfully, Local IT has had no reports of clients specifically affected by this outage, though it is possible that they still feel the impact because of vendors or other tertiary services that they use. Impact on Businesses Beyond CrowdStrike Users While the outage originated from a CrowdStrike update, its effects extended far beyond its direct customers. The incident highlighted the vulnerability of businesses of all sizes to disruptions in the digital supply chain. Even companies not utilizing CrowdStrike's services experienced the ripple effects of the outage, emphasizing the importance of preparedness and risk mitigation for all businesses. Help me! I am impacted! First, if you are experiencing a blue screen of death (BSOD) today (July 19, 2024) and you are not  a Crowdstrike customer, then this is likely not the cause of your issue; do not follow this advice. If you are a Local IT customer, you are not a Crowdstrike customer. The vendors we use are not specifically immune to this type of disruption; we just aren’t having one today. This fix is not for the faint of heart, but is relatively straightforward. The initial fix provided by Crowdstrike is this: Boot Windows into Safe Mode or the Windows Recovery Environment Navigate to the C:\Windows\System32\drivers\CrowdStrike directory Locate the file matching “C-00000291*.sys”, and delete it. Boot the host Mitigating the Risks: Lessons Learned The CrowdStrike incident offers valuable lessons for businesses to safeguard their operations from similar disruptions: Diversify:  Avoid over-reliance on a single vendor or technology. Explore alternative solutions and distribute critical functions across multiple providers to reduce the impact of potential failures. Test Updates:  Always exercise caution when applying software updates, even from trusted sources. Conduct thorough testing in a controlled environment before deploying updates company-wide, specifically with line-of-business applications and other critical infrastructure. Incident Response:  Develop and regularly review a comprehensive incident response plan outlining steps to take in case of service disruptions. This should include communication protocols, alternative solutions, and escalation procedures. Vendor Communication:  Maintain open lines of communication with your technology vendors. Ensure clear service level agreements (SLAs) and escalation procedures are in place for timely support during outages. Cybersecurity:  Prioritize cybersecurity awareness and implement robust security measures, including employee training, firewalls, antivirus software, and regular data backups. Cloud Services:  Evaluate the risks and benefits of cloud-based services and implement appropriate security measures. Have backup plans in place to ensure business continuity in case of cloud service disruptions. Business Continuity:  Create a comprehensive plan that outlines how your business will continue operating in the face of various disruptions, including technology failures, natural disasters, and cyberattacks. Local IT, LLC: Your Partner in Technology Resilience Navigating the complexities of technology risk mitigation can be overwhelming for small businesses. Local IT can help assess your specific needs, develop tailored solutions, and provide ongoing support to ensure your business is prepared for any eventuality. Don't wait for the next disruption. Contact Local IT today to fortify your business against future technological challenges.

Menu

Home

About

Services

FAQ

Blog

Contact

Remote Support

Client Portal

VoIP Payments

Contact

Support Questions - support@asklocalit.com

Billing Questions - billing@asklocalit.com

Office: 251-974-2428

Toll-Free: 1-833-364-2555

Mailing Address

Local IT at Foley

728 West Laurel Avenue

Foley, AL 36535

Billing Address

PO Box 550

Foley, AL 36536

Contact Us!

Thanks for submitting!

What are you interested in? Required
  • Instagram
  • Facebook
  • LinkedIn
bottom of page