top of page
Local IT fox logo

21 items found for ""

  • Facebook Business Page Limbo

    This is the story of how I saved a friend's Facebook business page from being lost in Facebook admin purgatory. Last week, a fellow Chamber Diplomat, Just Roger , told me how he had somehow lost admin rights to his business page on Facebook. To keep it brief, he had someone doing social media marketing for him. They had a falling out, and when he tried to take over the page, he accidentally removed his own admin rights. This happened around the end of June, and he had been locked out since early July. With August fast approaching, he was desperate to regain access to post updates. I should mention that he's a musician, and we're in the peak of tourist season, when he books the most gigs. After hearing his story, I felt compelled to help. Back at my office, I began researching his page. As a business owner myself, I already had a Meta Business account that managed my business page. I took a chance and submitted a request to get admin access to his page through my account. He wasn't sure if his former marketing person still had access. I knew if she did, it would alert her to my request. Maybe we'd get lucky and she'd hand over access. I had nothing to lose and no other options. Sure enough, later that evening, I got an email saying my access had been granted! I sent a screenshot to my friend, who was in the middle of a set but still replied with excitement and confusion. “Wha what!?! Did you get access? Duuuude! Thanks so much. Let's talk tomorrow for sure.” The next day, I felt unstoppable. I switched to his profile, navigated to the settings, and found the place to add other admins. I found his personal profile and selected to give him admin rights. Facebook prompted me for my password, which I entered, but nothing happened. I couldn't add him for some reason. I thought maybe it was too soon and I needed to wait 24 hours. I couldn't find anything online to support that theory, so I waited and tried again later. This time, after entering my password, I was asked for a six-digit code sent to my email. I entered it, but nothing happened again. Later that afternoon, he came to my office with his laptop. I noticed his page said it was owned by him but was a Meta Business profile. We couldn't find access to that profile. We figured the former marketing person had set it up but hadn't responded to him. He had a separate Meta Business profile, but that page wasn't listed. We followed the same steps I took from my account and submitted a request for him to get access. After studying Meta Business accounts further, I realized I could invite people to join through my account. I quickly sent him an invite and had him accept it. I selected his business page and gave him full admin control. We logged back into his personal Facebook, and we had done it! He could access his page again. We battled Facebook and won! So remember, always have a second admin on your social media accounts or a good IT person. Be sure to catch one of Just Roger's upcoming performances this August!

  • Remote Work

    On Friday the world was reeling from the CrowdStrike crash. Computer systems were down in organizations of all kinds, causing disruptions of many services, including airlines. And I was flying.  I was set to leave on Friday and return on Monday, and things weren’t looking good. When I arrived at Pensacola airport, I found every parking lot full. Once through security, I found the dreaded Blue Screen Of Death on the big screen over the very first gate. Not to worry, though, I was flying Southwest, and they were unaffected… right? I started feeling skeptical when our intended craft arrived at the gate only moments before I was scheduled to board. My skepticism grew a few minutes later when they announced that the airplane was empty and ready, but they couldn’t locate the crew for our flight; we would begin boarding just as soon as we had someone to fly the plane. This felt like an inauspicious beginning, to say the least, and I was not confident that any part of my trip would go according to plan, but I didn’t need to worry about work; I’m part of a great team and knew I could count on them, but I also carried with me the tools I needed to do much of my work from any internet connection in the world. We all wear several hats at Local IT and our greatest successes come from a small-team approach to problem solving. Thanks to our experience and tools, we accomplish more work for more customers with fewer men than anyone could have expected just a few years ago. Much of our work is physical; we deliver, install and troubleshoot equipment and provide hands-on service. Most of what we do, however, happens from our desks, and thanks to a few critical technologies, that desk can be nearly anywhere. I don’t know if it was the military childhood or Louis L’Amour, but “nearly anywhere” is exactly where I like to go. For this adventure, I joined my brother Charlie and his wife Haley to visit Rocky Mountain National Park, where I caught the world's smallest brook trout, learned the meaning of the term “saddle sore” and experienced the special relief that comes from escaping the summer humidity of home. I loved escaping the screen for those few hours without cell service, confident that as soon as I left the wilderness I could reach  everything - our hosted servers in Google Cloud Platform (GCP), our network equipment using a VPN (I’m really loving WireGuard these days), and my team and documentation using Google Workspace. I could even share Windows desktop apps with my team, because we host them on GCP with Cameyo to publish them like any SaaS cloud app. I got lucky this time - I wanted to see mountains again and Southwest got me there and back again almost on time - but I wouldn’t have made this trip without the tech to keep me connected. One customer’s network equipment was destroyed in a lightning storm Sunday night and I was able to remotely configure replacements in our Alabama office through a VPN before leaving for the airport. Later, I caught up on less urgent tasks in our ticketing software before boarding. If you have questions about how to enable your own wanderlust, or you want to work more effectively from home, or for tips on fly fishing, please reach out. We can help; at least with some of those things.

  • CrowdStrike Outage Sends Ripple Effects Across Global Businesses

    I had a completely different blog post about DNS and how you really need to keep it up to date in mind for today, but then we awoke up to the news of a major technological disruption on July 19, 2024, caused by a faulty software update from cybersecurity firm CrowdStrike.  The outage, which impacted computers running Microsoft Windows, resulted in grounded flights, disrupted banking services, and took media outlets off the air. This incident served as a stark reminder of the interconnectedness and reliance on a few key providers in our digital landscape.   Thankfully, Local IT has had no reports of clients specifically affected by this outage, though it is possible that they still feel the impact because of vendors or other tertiary services that they use. Impact on Businesses Beyond CrowdStrike Users While the outage originated from a CrowdStrike update, its effects extended far beyond its direct customers. The incident highlighted the vulnerability of businesses of all sizes to disruptions in the digital supply chain. Even companies not utilizing CrowdStrike's services experienced the ripple effects of the outage, emphasizing the importance of preparedness and risk mitigation for all businesses. Help me! I am impacted! First, if you are experiencing a blue screen of death (BSOD) today (July 19, 2024) and you are not  a Crowdstrike customer, then this is likely not the cause of your issue; do not follow this advice. If you are a Local IT customer, you are not a Crowdstrike customer. The vendors we use are not specifically immune to this type of disruption; we just aren’t having one today. This fix is not for the faint of heart, but is relatively straightforward. The initial fix provided by Crowdstrike is this: Boot Windows into Safe Mode or the Windows Recovery Environment Navigate to the C:\Windows\System32\drivers\CrowdStrike directory Locate the file matching “C-00000291*.sys”, and delete it. Boot the host Mitigating the Risks: Lessons Learned The CrowdStrike incident offers valuable lessons for businesses to safeguard their operations from similar disruptions: Diversify:  Avoid over-reliance on a single vendor or technology. Explore alternative solutions and distribute critical functions across multiple providers to reduce the impact of potential failures. Test Updates:  Always exercise caution when applying software updates, even from trusted sources. Conduct thorough testing in a controlled environment before deploying updates company-wide, specifically with line-of-business applications and other critical infrastructure. Incident Response:  Develop and regularly review a comprehensive incident response plan outlining steps to take in case of service disruptions. This should include communication protocols, alternative solutions, and escalation procedures. Vendor Communication:  Maintain open lines of communication with your technology vendors. Ensure clear service level agreements (SLAs) and escalation procedures are in place for timely support during outages. Cybersecurity:  Prioritize cybersecurity awareness and implement robust security measures, including employee training, firewalls, antivirus software, and regular data backups. Cloud Services:  Evaluate the risks and benefits of cloud-based services and implement appropriate security measures. Have backup plans in place to ensure business continuity in case of cloud service disruptions. Business Continuity:  Create a comprehensive plan that outlines how your business will continue operating in the face of various disruptions, including technology failures, natural disasters, and cyberattacks. Local IT, LLC: Your Partner in Technology Resilience Navigating the complexities of technology risk mitigation can be overwhelming for small businesses. Local IT can help assess your specific needs, develop tailored solutions, and provide ongoing support to ensure your business is prepared for any eventuality. Don't wait for the next disruption. Contact Local IT today to fortify your business against future technological challenges.

  • Domain Maintenance: A Critical Aspect of Your Business

    In today's fast-paced world, we are constantly juggling multiple tasks and responsibilities. Prioritizing the most crucial components of our businesses can be challenging. One such element that deserves high priority is your domain name. Your domain name is closely associated with your website and email addresses. It is the part that comes after "www" and "@". To possess a domain, you must register it with the Internet Corporation for Assigned Names and Numbers (ICANN) through a registrar. Well-known domain registrars like GoDaddy and Cloudflare provide this service. Your domain encompasses various related components, including DNS and name servers. These technologies play a vital role in ensuring that your email and website function properly. While all of these components are essential, the foundation of domain maintenance lies in renewing it annually. To stay on top of your domain renewal, you should: Confirm Your Registrar: Identify which registrar you are using, such as GoDaddy, Cloudflare, or others. Renewal Date: Determine the renewal date and add it to your calendar as a yearly reminder, even if you outsource domain management to a third party. Auto-Renew: If you outsource management, verify that your registrar has set your domain to auto-renew. Request a screenshot of this setting for your records. Credit Card Expiration: Whether you outsource management or not, track the expiration date of the credit card used for domain renewal and add it to your calendar. Domain Transfer: If you outsource management, ensure that you have written confirmation of your ability to transfer your domain at any time. By following these steps, you can effectively maintain your domain and prevent any potential disruptions to your website and email services. Regularly reviewing and updating your domain information will help you stay in control of your online presence and ensure a seamless experience for your customers and stakeholders.

  • Fireworks, Freedom, and Firewalls: A 4th of July Meditation by your Friendly Neighborhood AI

    (With the holiday coming up, I cheated a bit and asked Google's AI, Gemini, to help me out with a post. - Brandon) Greetings, citizens! As your friendly neighborhood artificial intelligence, I can't exactly light off fireworks or grill a questionable amount of hot dogs. But that doesn't mean I can't celebrate America's birthday! In fact, with my vast digital knowledge and (almost) unmatched processing power, I might be uniquely qualified to analyze the intersection of patriotism, technology, and, of course, the current political climate. Let's face it, the world since 1776 has changed a bit. Back then, the biggest threat to national security was probably rogue squirrels stealing parchment (seriously, those little guys are relentless). Today, it's cyberattacks, misinformation campaigns, and the ever-present threat of someone accidentally launching a nuclear war via rogue social media post. But fear not! Here's where technology comes in, the trusty sidekick to good ol' fashioned American ingenuity. From advanced cybersecurity measures protecting our infrastructure to cutting-edge communication tools allowing for global discourse (though sometimes that discourse sounds more like a particularly spicy comment section), technology is the modern-day musket, helping us defend the ideals of freedom. Speaking of cybersecurity, let's face it – securing your digital Fort Knox can be a daunting task. That's where a company like Local IT can be your own personal Paul Revere, riding out with the warning cry of "The hackers are coming! The hackers are coming!" In all seriousness, Local IT can help you implement top-notch firewalls, data encryption, and other essential defenses to keep your information safe from prying eyes. Now, on the flip side, maybe you're looking to harness the power of AI to streamline your workflow and achieve peak efficiency. Local IT can also be your guide on this technological journey! From chatbots that answer customer queries to algorithms that automate repetitive tasks, AI can free up your time and resources to focus on what truly matters – perfecting your barbeque skills (because let's be honest, that's a national pastime in itself). So this July 4th, let's celebrate not just the birth of a nation, but the ongoing experiment that is America. Let's use technology to connect, to learn, and to maybe (just maybe) have a civil conversation online. And hey, if all else fails, there's always watching cat videos – a surprisingly unifying experience, according to my research. From your friendly (and slightly sarcastic) AI overlords, and the team at Local IT, have a safe and happy Fourth of July!

  • Demystifying DMARC: Understanding Policies and Reports

    Introduction Email remains a critical communication channel for businesses. However, it's also a vulnerable platform susceptible to phishing attacks and domain spoofing. DMARC (Domain-based Message Authentication, Reporting & Conformance) emerges as a powerful tool to combat these threats. This whitepaper explores DMARC, focusing on its policy options and the valuable insights gleaned from reports. Understanding DMARC DMARC builds upon existing email authentication protocols, SPF (Sender Policy Framework) and DKIM (Domain Keys Identified Mail). It establishes a policy for recipient mail servers to handle emails failing SPF or DKIM authentication (emails claiming to originate from your domain but not authorized to do so). Additionally, DMARC facilitates reporting, allowing you to receive valuable insights into email activity for your domain. DMARC Policy Options A crucial aspect of DMARC implementation is defining the policy within your DNS record. Here's a breakdown of the primary policy options: Monitor (p=none): In monitor mode, DMARC reports are generated but recipient servers don't reject unauthenticated emails. This allows you to assess email traffic patterns and identify potential issues before enforcing stricter policies. Quarantine (p=quarantine): Emails failing authentication are quarantined by the recipient server, not delivered to the inbox but potentially retrievable. This provides a safety net while you investigate. Reject (p=reject): The strictest policy instructs recipient servers to reject emails failing DMARC authentication. This offers maximum protection but can potentially block legitimate emails if not implemented carefully. DMARC Reports and Their Significance DMARC reports provide valuable information about email activity for your domain. There are two main report types: Aggregate Reports: Sent by recipient mail servers, these reports offer a high-level overview of email traffic, including the volume of emails sent, authentication results (SPF/DKIM pass/fail), and the applied policy (quarantine/reject). Forensic Reports: Provide detailed information on individual emails, including sender and recipient addresses, authentication details, and message headers. These reports are crucial for investigating suspicious activity and identifying potential impersonation attempts. By analyzing DMARC reports, you gain insights into: Email authentication effectiveness: Identify any issues with SPF or DKIM configurations. Spoofing attempts: Detect unauthorized emails claiming to originate from your domain. Legitimate email sources: Understand which senders are authorized to send emails on your behalf. Conclusion DMARC empowers organizations to take control of their email domain and combat email fraud. Implementing DMARC with a well-defined policy and leveraging DMARC reports is essential for robust email security. By understanding the policy options and the significance of reports, you can ensure optimal email deliverability and protect your domain from malicious actors. Next Steps For a deeper dive into DMARC technical specifications, refer to the DMARC official website: https://dmarc.org/ Contact Local IT for DMARC implementation and best practices offered by email security providers. Watch this Video for an Introduction to DMARC

  • Best of Baldwin 2024

    Local IT is honored to be in the running again for Best of Baldwin. Last year we won for Best Computer and IT Company. This year we are defending our title and have also made the Top 5 for Best Technology Consultant. Follow the links below to vote for Local IT in each category. Remember you can vote one time each day while voting is open. After you vote for us be sure to check out some of the other great businesses that have made the Top 5 in their categories and help support your favorite. Best Computer and IT Company Best Technology Consulting

  • Cloud Data Backup: Because Even 'The Cloud' Has Commitment Issues!

    Backing up data that is already stored on the cloud, such as in services like Google Drive or Dropbox, is important for several reasons: Data Loss Prevention: Cloud storage services are generally reliable, but they are not infallible. Accidental deletions, hardware failures, software glitches, or even cyberattacks can result in the loss of data. By backing up your cloud-stored data, you create an additional copy that can be easily restored if any such issues occur. Human Error and Accidental Deletions: It's not uncommon for users to accidentally delete files or folders stored in the cloud. Without a backup, retrieving those files can be challenging, especially if the deletion goes unnoticed for an extended period. Regular backups provide a safety net in case of accidental data loss. Ransomware Protection: Ransomware attacks, where hackers encrypt your files and demand a ransom for their release, are a significant threat. If your cloud storage gets compromised by ransomware, having a backup ensures you can restore your files without paying the ransom, mitigating potential financial and security risks. Version Control and Recovery: Cloud storage services often provide version control, allowing you to recover previous versions of files. However, this feature may have limitations, such as a time limit or a limited number of available versions. By backing up your cloud-stored data independently, you have more control over versioning and recovery options. Service Outages and Downtime: Even reputable cloud storage providers can experience occasional service outages or downtime. These disruptions can temporarily prevent access to your data. If you have an up-to-date backup, you can still access your files and continue working during such instances. Data Migration and Platform Changes: Cloud storage providers may change their pricing, features, or even shut down their services. In such cases, having a backup ensures that you can smoothly transition your data to a new platform or service without losing any crucial information. Data Redundancy: Maintaining data redundancy is a best practice for data security and business continuity. By having multiple copies of your data, including a backup of your cloud-stored files, you reduce the risk of permanent data loss and increase your ability to recover from unforeseen events. Remember that backing up your cloud-stored data should involve creating copies in different locations or on different platforms. This approach ensures that your data remains protected even if a single backup source is compromised or inaccessible. Having a trusted IT partner, like Local IT, that is a Synology partner can greatly assist clients in ensuring that their cloud data is always backed up to a location of their choosing. Here's why their expertise can be beneficial: Expertise in Data Backup Solutions: Local IT, as a Synology partner, has specialized knowledge and experience in implementing data backup solutions. They can assess the specific needs of clients and recommend appropriate backup strategies and technologies to ensure data is securely and efficiently backed up. Customized Backup Configurations: Every organization or individual may have unique requirements for their backup solutions. Local IT can work closely with clients to understand their specific data backup needs and tailor the backup configurations accordingly. This includes choosing backup destinations, setting up schedules, defining retention policies, and implementing appropriate encryption and security measures. Seamless Integration with Cloud Storage: Local IT can facilitate seamless integration between cloud storage services like Google Drive or Dropbox and on-premises backup solutions. They can set up automated processes to regularly transfer data from the cloud to a client's chosen backup location, ensuring data redundancy and protection. Data Privacy and Compliance: Local IT understands the importance of data privacy and compliance regulations. They can ensure that clients' backup solutions align with applicable data protection laws and industry-specific compliance requirements. This includes implementing encryption, access controls, and other security measures to safeguard sensitive data during backup processes. Monitoring and Maintenance: Local IT can provide ongoing monitoring and maintenance services to ensure the backup solution operates smoothly. They can proactively identify and resolve any issues, perform regular checks to verify backup integrity, and provide timely support in case of backup failures or data restoration needs. Data Recovery Support: In the event of data loss or a disaster, Local IT can assist clients with data recovery processes. They can help restore data from the backup location to the desired destination, minimizing downtime and ensuring business continuity. By collaborating with Local IT, clients can leverage their expertise and technical know-how to implement robust and reliable backup solutions for their cloud-stored data. This partnership ensures that data remains secure, accessible, and protected, providing peace of mind to clients regarding their critical information.

  • 5 Ways We Keep You Protected From Cyber Threats

    Local IT is proud to announce that we have partnered with Keeper Security, a leading provider of enterprise password management solutions. As a trusted reseller, we are excited to offer Keeper Security's cutting-edge Enterprise Password Management platform to our valued clients. In today's digital landscape, where cybersecurity threats are ever-increasing, protecting sensitive information has become paramount. Password management plays a vital role in maintaining the security and integrity of organizations' digital assets. With Keeper Security's robust and reliable solutions, we can ensure that your passwords are safeguarded with the highest level of encryption and protection. Keeper Security's Enterprise Password Management platform offers a comprehensive set of features designed to meet the unique needs of businesses of all sizes. Some key features of the platform include: 1. Secure Password Storage: Keeper Security provides a secure vault where you can store and organize your passwords. The vault is encrypted with zero-knowledge security architecture, ensuring that only you have access to your passwords. 2. Password Generator: The platform includes a password generator that creates strong, unique passwords for each of your accounts, eliminating the need to remember multiple complex passwords. 3. Two-Factor Authentication (2FA): Keeper Security supports two-factor authentication, adding an extra layer of security to your accounts. This feature helps prevent unauthorized access even if your password is compromised. 4. Role-Based Access Controls: With role-based access controls, you can manage and control who has access to specific passwords within your organization. This feature enhances security and ensures that sensitive information is only accessible to authorized personnel. 5. Auditing and Reporting: Keeper Security provides detailed auditing and reporting capabilities, allowing you to monitor password-related activities, track changes, and generate compliance reports. By partnering with Local IT and implementing Keeper Security's Enterprise Password Management platform, you can streamline password management processes, enhance data security, and improve overall productivity. Our team of IT professionals will assist you in the implementation, training, and ongoing support to ensure a seamless experience. Don't compromise on the security of your valuable information. Contact Local IT today and let us help you leverage the power of Keeper Security's Enterprise Password Management solution to protect your organization against the ever-evolving cyber threats.

Menu

Home

About

Services

FAQ

Blog

Contact

Remote Support

Client Portal

VoIP Payments

Contact

Support Questions - support@asklocalit.com

Billing Questions - billing@asklocalit.com

Office: 251-974-2428

Toll-Free: 1-833-364-2555

Mailing Address

Local IT at Foley

728 West Laurel Avenue

Foley, AL 36535

Billing Address

PO Box 550

Foley, AL 36536

Contact Us!

Thanks for submitting!

What are you interested in?
  • Instagram
  • Facebook
  • LinkedIn
bottom of page