Author: rory-admin

  • Need a new work laptop? Here are five features to focus on

    Need a new work laptop? Here are five features to focus on

    Selecting a new work device is a personal choice, there are factors a lot of buyers focus on. Sizing, screen type, track pad feel or material, keyboard type. All of these peripheral factors that go into choosing the perfect laptop to complete your work on.

    We want to dig specifically into what you should consider when it comes to the specs of your work laptop. What you do and how you do it will greatly affect whether a laptop is the right choice for you, from smaller footprint lower cost models that work perfectly for light duty to robust, graphic and memory intense models that can handle high use scenarios such as graphic design or multi-tasking.

    Here are the five things we consider most important when it comes to the use of your laptop for work.

    1. Battery Life. Battery life may not be as important if you intend to dock your computer at a desk and leave it there primarily. If you need your laptop on the go, however battery life is hugely important and what’s available varies widely. One thing to remember is that higher specs usually correlate to less battery life, so if your job is light duty but on the go it may be better to look for a lighter, less powerful laptop.
    2. RAM/Memory. No matter what we recommend at least 16 GBs in your laptop (or the ability to upgrade). This is because Windows itself uses quite a bit of memory, so if you opt for less memory in your work laptop you may find it struggles to keep up. 8 GBs might be okay for very, very light usage but for heavy users 16 or 32 GBs is preferable.
    3. Storage. Again, because Windows does use up some of the storage available for its installation we want to look for more capacity if possible. For light users 500 GBs is fine, but for most users we would recommend at least 1 TB.
    4. Video Card. When you think video cards you might think gaming, but a good video card is also used by your computer for certain processes, especially graphically intense one. If video editing or graphic design is part of your workflow, we suggest looking for a work laptop with a better video card even if it’s a laptop that’s marketing is aimed at gamers. As a bonus these laptops will usually have a better quality screen as well.
    5. CPU. We can’t overlook the CPU quality In the laptop buying process. More CPU power means more capacity to run programs or have a lot of tabs open in your browser.

    Of course, if you’re buying for many users within your organization, it can be difficult to customize your buying to specific users. At Valley Techlogic we’re able to make recommendations for laptops that will meet the needs of your workforce while also keeping budget in mind.

    Through Valley Techlogic’s procurement services we can help you buy new equipment for your office through our vendors with more choices than are usually offered through their brick-and-mortar presence. We have relationships with Dell, Lenovo, HP and more that we can use to your advantage.

    Valley Techlogic also offers installation services if you need help setting up your new equipment and getting it ready for your employees.

    Learn more about our procurement services today by clicking the banner below to get started, or click here to schedule a consultation.

    Looking for more to read? We suggest these other articles from our site.

    This article was powered by Valley Techlogic, an IT service provider in Atwater, CA. You can find more information at https://www.valleytechlogic.com/ or on Facebook at https://www.facebook.com/valleytechlogic/ . Follow us on Twitter at https://x.com/valleytechlogic.

  • AWS vs Azure, what is your best option when choosing a cloud platform?

    AWS vs Azure, what is your best option when choosing a cloud platform?

    We’ve had articles in the past about why you should consider making the move from on-premises to the cloud, but we’ve never specifically addressed which provider you should consider when making this move.

    For many, AWS (Amazon Web Services) and Azure are the main players that they look to when making the jump the cloud. Brand recognition is obviously there for both choices, as well as a history of impeccable uptime. Uptime is a very important factor, obviously you want your data to be available when and how you need it, but there are more things to consider.

    First, let’s look at the players. AWS has been around since 2006 and offers a “pay as you go” model, which means you pay only for the data you actually use. Many of us are familiar with the webstore Amazon, and you’d probably be surprised to learn AWS is a much bigger venture for Amazon, with 74% of their profit coming from AWS.

    Azure was launched in 2010 and is also pay as you go. However, how they differ is that Azure actually lets users access their data through a virtual machine on a Virtual Hard Desk (VHD). This means their interface is slightly more user friendly from the start. For a similar interface in AWS you must rent an EC2 (their version of a virtual machine). EC2 is more customizable but Azures Virtual Machine may more easily work with existing Cloud computing tools.

    Both are similar in that they offer scalable storage solutions; however, their object size restrictions vary slightly, with AWS having a 5 TB object size limit and Azure having a 4.75 TB limit. For most of our customers this would be a very negligible difference, however.

    Both do an excellent job of securing your data, in AWS you customize your security settings on setup. With Azure, they use Microsoft’s Cloud Defender services which are similar to the Windows Defender services you probably already utilize.

    AWS has a dashboard that may be easier to use if it’s your first-time using cloud services when it comes to looking for documentation on how to use the service. Where Azure has them beat though is that Azure keeps all of your user account and information in one place. So, depending on which kind of information you’re looking for, you may prefer one over the other.

    If customizing your cloud experience via code is something you’re after, you probably want to stick with AWS. Through their SageMaker system you can utilize their artificial intelligence (AI) tools to develop a very specific and unique experience when it comes to tracking data, making modifications, and applying updates.

    Azure on the other hand has opted for a “Codeless” interface, even someone with zero coding knowledge can drag and drop pieces to customize their cloud’s AI interface.

    Of course, from a base level you can look at what operating system these are compatible with. AWS is more compatible with Linux while Azure offers compatibility through .net with Linux, Windows and MacOS.

    In a nutshell, these two cloud behemoths are more alike than different but there are some factors that depending on your particular business sector or goals may lead you to shift one way or the other. We also want to spend a moment addressing a pricing breakdown for both AWS and Azure. You can see their pricing models in the chart below. We also want to note that both provide a free introductory period so you can test their services before committing to a plan.

    Are you considering a move to the cloud and aren’t sure which provider to go with, or even how to make it happen? Valley Techlogic can help. We’re experts in cloud computing and have managed many customer cloud migrations. Reach out today to schedule a free consultation.

    Looking for more to read? We suggest these other articles from our site.

    This article was powered by Valley Techlogic, an IT service provider in Atwater, CA. You can find more information at https://www.valleytechlogic.com/ or on Facebook at https://www.facebook.com/valleytechlogic/ . Follow us on Twitter at https://x.com/valleytechlogic.

  • Security Camera Buying Guide for Businesses in 2023

    Security Camera Buying Guide for Businesses in 2023

    We may be alone here, but it seems like the interest in security cameras has climbed over the past year. Perhaps it’s because the technology has vastly improved over the last decade and our clients are ready to swap out slower, inefficient models that capture lackluster video at and are expensive to maintain for newer models that capture crisp clear video and have increased features to make reviewing that video much, much easier.

    If you were unaware, the grainy surveillance footage you’re used to seeing is quickly becoming a thing of the past. If you’re a fan of crime dramas, you may have seen the police officers in those show ask to have a video unrealistically “enhanced” to show the suspects on screen from original footage that starts out barely visible. Now, that sort of technology is in some cases a reality.

    Instead of starting with grainy footage, the cameras we have available for our customers have clear easy to view footage of a wider area than you would have been able to get in the past (meaning less cameras to buy to cover the same square footage). These cameras are also backed by software enhancements that enable you to search through the footage to find a specific time, an object such as a license plate, or even specific people.

    You can learn more about the AVA powered camera systems we offer here. The best thing about the AVA solution is it can pair with your existing cameras, allowing you access to many of these benefits without buying new cameras.

    That brings us to the pros and cons of buying a new camera system for your business:

    • Pro: Enhanced Features, obviously we just spent some time going over the features you’ll stand to gain from a new camera system. Another feature you may not have considered is reduced storage costs; many camera systems now store data in the cloud meaning you will not have to pay for onsite storage (which can add up if you tend to save your footage for a while).
    • Con: Cost, obviously the cost of a new camera system can be quite expensive, but perhaps less than you may think. As technology has grown and cameras have become more ubiquitous, the costs have also dropped.
    • Pro: More Options to Fit More Spaces, if you have old school bullet style cameras only you may be surprised at the range of options and styles available now. We still recommend the bullet style for outdoor use as it’s very obvious that a camera is in place to potential intruders, but for in office use a more discreet camera might make more sense (and you can look at our chart on camera styles below).
    • Con: Installation, going through the installation of any kind of equipment can bring up unforeseen issues. Problems with wiring or getting the placement exactly right for the location it’s being placed. There is of course the expense of the installation too, which in some cases can rival the cost of the cameras themselves. Every situation is different and it’s best to have your specific setup reviewed by a technician to get a clear estimate.
    • Pro: Better Able to Work in a Variety of Conditions, older cameras often didn’t handle interference or poor lighting very well. Today’s cameras can adjust for poor lighting or poor visibility and some cameras even offer night vision for poorly lit areas of your building.
    • Con: Software Costs, of course for AI or software backed cameras you will encounter a software cost for utilizing those features. We feel it’s more than worth it considering how much more useful your cameras will be for your business and should be considered part of the cost of maintaining your security in your business.
    • Pro: More Integrations, as our AVA page illustrates, many of today’s camera systems also integrate with sensors that can monitor for odors or liquids, and even specific sounds (such as screaming or a gunshot).
    • Con: There really aren’t any additional cons outside of the expense and going through the installation process, once your new camera system is in place you will wonder how you ever got by without it.

    Here is a brief overview of the types of cameras that are now available on the market:

    While we recommend the AVA solution the most for our clients, we have camera system options for businesses of all shapes and sizes. We would be more than happy to provide a custom estimate for your business, reach out today to schedule a walkthrough with one of our security camera experts.

    Looking for more to read? We suggest these other articles from our site.

    This article was powered by Valley Techlogic, an IT service provider in Atwater, CA. You can find more information at https://www.valleytechlogic.com/ or on Facebook at https://www.facebook.com/valleytechlogic/ . Follow us on Twitter at https://x.com/valleytechlogic.

  • Refurbished versus new, what are your options when it comes to on-premises servers?

    Refurbished versus new, what are your options when it comes to on-premises servers?

    There’s no debate, when it comes to buying an on-premises server for your office it’s a big decision where cost is absolutely a major factor. The word “refurbished” sometimes causes our clients to recoil, we’ve all had bad experiences purchasing refurbished electronics that were DOA (dead on arrival) or perhaps were cosmetically or functionally dubious.

    With servers it’s a little different. Typically, what we see from servers is that one was sent back to the retailer very early on into its life span. Sometimes it’s because the configuration just wasn’t right for the purchaser or because they come from a sector that has very rigorous standards for server replacement (some sectors look to replace servers every 3 years). These servers will still have a lot of life left in them and the big server manufacturers (Dell, IBM, HP etc) will reset them, add some new components, and bring them back up to practically like new conditions.

    If you have a very specific goal in mind for your on-premises server and know you need the latest and greatest hardware components to meet that goal, then we definitely recommend purchasing new. If your goal is to replace an existing aging server or your needs for capacity are more minimal, refurbished is a great option.

    Here are three pluses when buying a new server.

    1. Warranty – New servers will have the longest warranty available; we typically see 5 years being the standard.
    2. Customizable – When you buy a new server you get to customize the hardware and storage, with a refurbished server you’re purchasing what the manufacturer has available.
    3. Modern Features – A new server will have all the latest features, have the highest performance, and be compatible with modern software.

    There also pluses when considering refurbished:

    1. Cost Saving – Of course, the first plus is the cost saving benefits. We often find a refurbished server is substantially less than a new server. You could save as much as 80% compared to buying a new server.
    2. Still Effective – A refurbished server will still be almost as effective as a new server, and for many of our clients there is no noticeable difference between new and refurbished for their use case.
    3. Still Includes a Warranty – While it won’t come with a manufacturer’s warranty, Valley Techlogic offers a 1-year warranty for clients who purchase a refurbished server through us.

    Of course, there are things to consider when doing a server upgrade in general. Here is a chart with the benefits you will receive when replacing an aging on-premises server:

    Another thing to consider is if your current server is compatible with your existing line of office software a refurbished server may be more compatible, sometimes being on the bleeding edge of technology can have its downsides especially when it comes to legacy software.

    You also want to keep in mind that lead times will vary as well, refurbished servers are often more available while a server customized for your business could take longer to get. If your current server is on it’s last leg or has even died, refurbished may not be your best option but your only option.

    There are a lot of things to consider when it comes to buying a server, and Valley Techlogic can help. We not only offer in-house procurement services we also can do an assessment of your specific situation and offer the best buying advice for your business. Reach out today to learn more.

    Looking for more to read? We suggest these other articles from our site.

    This article was powered by Valley Techlogic, an IT service provider in Atwater, CA. You can find more information at https://www.valleytechlogic.com/ or on Facebook at https://www.facebook.com/valleytechlogic/ . Follow us on Twitter at https://x.com/valleytechlogic.

  • RAID Arrays Explained, What is it and do you need one?

    RAID Arrays Explained, What is it and do you need one?

    RAID arrays or Redundant Array of Independent Disks is a type of storage configuration where your data is saved across multiple hard drives or SSDs. There are a number of benefits to doing this including increased performance and data redundancy. Because your data is saved across multiple drives you have better protection in the event of a drive failure.

    Basically, if one of the drives in your RAID array fails your drives will then go into “rebuild mode” which will allow the remaining drives to recover the data, the failed drive can then be replaced with little downtime for you. A RAID array is not always necessary, we wouldn’t suggest one for regular employee use for example as SSDs are very reliable (especially compared to hard drives with mechanical parts that can fail). You also have the option of cloud storage for devices that don’t have much data to save on a daily basis.

    However, for servers or other systems where data protection is critical, a RAID array is a necessary option to keep that data intact. They are also beneficial for systems that work with very large files as the computer can pull pieces of the file in unison and load them much quicker than a single drive. There are many different configurations for RAID arrays such as:

    1. RAID 0: In the world of data two is one and one is zero, and such is the case with RAID arrays. The first RAID array configuration involves breaking up your data into “stripes” across one or more drives, however it does not provide redundancy like other RAID arrays do. If a drive fails under RAID 0 the data is lost. However, it does improve speeds and can allow you to gain more space on your drives.
    2. RAID 1 provides an exact mirror of your data across multiple drives, which does allow for data redundancy. In the case of a drive failure as long as one drive is functional you will still have access to your data. The pitfall to this is your data storage can only be as big as the largest drive in the array, so if you have a 1 TB drive paired with a 4 TB drive only 1 TB would be usable. This RAID array type also doesn’t really provide a system performance boost, it’s purely a data redundancy setup.
    3. RAID 5 provides good redundancy coverage and improves performance. A RAID 5 array consists of 3 or more drives, this RAID array type splits your data consistently across the board and improves your system performance at the same time. However, for most clients we would suggest the next setup.
    4. RAID 10 combines two RAID 1 arrays with two RAID 0 arrays to provide both greatly improving performance (that falls in line with the RAID 0 benefit) and greatly increasing redundancy (as you get with a traditional RAID 1 set up) for not much more than you would spend to have a RAID 5 installed. For systems that run software in addition to storing data this is the setup we highly recommend.

    Here are some other benefits of having a RAID 10 setup for your server or systems where data is a high priority:

    RAID 10 Benefits ExplainedThere are still other questions that need to be answered beyond just RAID type, like what drive capacity should you be looking for? Would a HDD (Hard Drive Disk) work in this case to have more inexpensive but higher capacity or should you be looking for SDDs (Solid State Drives)?

    These are questions that can be answered by our professional sales team, they’re experts in technical equipment procurement and can help make suggestions and offer buying advice specifically tailored to your business. Learn more today by scheduling a consultation with our sales manager.

    Looking for more to read? We suggest these other articles from our site.

    This article was powered by Valley Techlogic, an IT service provider in Atwater, CA. You can find more information at https://www.valleytechlogic.com/ or on Facebook at https://www.facebook.com/valleytechlogic/ . Follow us on Twitter at https://x.com/valleytechlogic.

  • Patch Management 101 – From Neglected to Automated; 5 Tips for Managing Patching in your Business

    Patch Management 101 – From Neglected to Automated; 5 Tips for Managing Patching in your Business

    If we asked a new client what they had in place for patching most of them would answer in one of two ways. Either they’re “pretty sure” patching is happening regularly, or they know patches have mostly been ignored for quite some time.

    Regardless of how they answered, the outcome is usually the same. We usually inherit managing systems that are way behind on patches. That’s because patching doesn’t start out being an automated easy process for most businesses, there is some effort required to get into a good patching process established.

    If patching is left up to employees for their devices, it’s typical for the “Remind Me Later” to become the permanent option when it comes to patching. Depending on their level within your company this can either be a bad idea to very risky (though any device can act as a threat vector when it’s connected to your network). If a device that has admin level access is unpatched and it’s basically handing the keys to your kingdom over to bad actors.

    That’s because many patches are released specifically to address an active security concern. While functionality and quality of life improvements are also addressed via patching, active security concern patches can be released with little notice and should not be ignored.

    We’re also aware many users have a negative association with patching, especially if they’ve installed patches in the past and encountered bugs or issues. While these patches can be rolled back, it may not be simple to do so especially if your machine hasn’t been set up that way.

    There’s also patches for IoT (Internet of Things) and peripheral devices that aren’t as simple as clicking “Update Now”. Many times, patching these devices involves going to the companies website, downloading the patch, and manually installing it. With routers in particular patches are typically released to address a very serious security threat. We reported on a series of Netgear routers which when unpatched could easily be taken over by an intruder.

    Now that we’ve established why patching is important, here are five ways to make it more manageable:

    1. Create an Inventory of Devices Within Your Business: To manage consistent patching across the board you first need to know what you have. It’s a good idea to keep an inventory of all your devices (even peripherals or handheld devices like tablets).
    2. Create Consistency for Work Devices: For devices you or your employees work on, like laptops and desktops, it’s a good idea to try and maintain consistency. Meaning if you’re applying a patch to one of them you should apply it to all of them. That way it’s not a mishmash of various updates across your business. This will also make it much easier to troubleshoot any issues.
    3. Make Sure They’re Running the Latest OS (Operating System) Too: For Windows devices, it’s also important to keep them up to date with the latest OS version. Windows will discontinue patches for operating systems that have reached end-of-life. This doesn’t mean they no longer require patching; in fact, these devices are often targeted by hackers specifically because they can no longer be maintained.
    4. Also, for Windows Devices Have a Group Policy for Patching: This is an advanced tip, but you or your current IT provider can setup a group policy to make sure patches are occurring on a schedule for Windows devices.
    5. Work With a Professional to Create a Patching Plan: Patching is part of ongoing maintenance, and it can be difficult to address it on your own. At Valley Techlogic patching management is provided under every monthly service plan with us.

    Here is a mini report on how Valley Techlogic addresses patching management (as well as other routine maintenance items):

    Interested in learning more? Schedule a consultation with us today.

    Looking for more to read? We suggest these other articles from our site.

    This article was powered by Valley Techlogic, an IT service provider in Atwater, CA. You can find more information at https://www.valleytechlogic.com/ or on Facebook at https://www.facebook.com/valleytechlogic/ . Follow us on Twitter at https://x.com/valleytechlogic.

  • Western Digital suffers a ransomware attack, with hackers requesting an 8 figure sum and leaking image from internal meeting

    Western Digital suffers a ransomware attack, with hackers requesting an 8 figure sum and leaking image from internal meeting

    Western Digital is a well-known name in the data production and storage industry. Established in 1970, they were one of the original players in the process of making semiconductors and they have a storied history that began with calculator chips, included a bankruptcy as well as being at the forefront of floppy disc creation in the 1980’s to eventually the hard drives they became known for in the 1990’s. Chances are good you have had a Western Digital drive in one of your devices (you may even have one now).

    Despite being leaders in the digital storage industry, they’ve unfortunately proven no one is immune when it comes to ransomware attacks. While this story emerged mid-April (and the attack occurred March 26) we have an update as the hacker group “BlackCat” taunts Western Digital by leaking an internal video conference on the topic just this week. They leaked an image from the meeting on social media coyly dubbing the people included “the finest threat hunters Western Digital has to offer”. A clear mockery of their attempts to remediate the threat thus far.

    The hacker group is clearly trying to up the ante to get the company to fork over the ransom they’ve requested, a sum reportedly coming in at an eye watering 8 figures. For context a typical ransomware payment paid out by a business in Quarter 1 of 2022 was $228, 125. For individuals payouts hover around $6000. In a nutshell, ransomware is a lucrative business for those with unscrupulous motives.

    To make matters worse, it’s been reported that the group BlackCat has access to multiple Western Digital systems. Meaning this attack was well orchestrated and highly effective at not only making their data vulnerable but creating a disruption to all parts of their business. Western Digital has reported requested the services of outside security and forensic experts to try and recover what they can but needless to say this is an expensive lesson for their business both in money and time lost as well as their reputation in the technical industry.

    You would think being a leader in data storage that their backup recovery process would be flawless, unfortunately when hackers gain domain level access even the best laid plans for your data can go out the window. That’s why Valley Techlogic offers a multi-pronged approach to backups.

    Many clients like the idea that all their data is at their fingertips within their on-premises server. The server itself serves as a physical reminder that their data is ready and available when they need it.

    Unfortunately, having your data all in one place is not a good idea. Other than ransomware attacks such as this, it also leaves your business vulnerable if your server fails for whatever reason. We’ve seen it before; many clients aren’t expecting their servers to just give out or for something like a fire or other disaster to affect them and when it happens, they’re left scrambling. The process to recover from scratch is not always guaranteed and even if a recovery is possible, it can take as long as 3 months to get back mostly to where you were. Generally, a 100% recovery is not possible in these instances.

    That’s why at Valley Techlogic our backup solution TechVault is available and used by each of our clients. We have this chart on the benefits of our TechVault solution.

    You can also learn more about it by visiting here. If the Western Digital breach has left you concerned for the safety of your data, or you would just like more information on our backup solution you can request a consultation with our expert sales staff here.

    Looking for more to read? We suggest these other articles from our site.

    This article was powered by Valley Techlogic, an IT service provider in Atwater, CA. You can find more information at https://www.valleytechlogic.com/ or on Facebook at https://www.facebook.com/valleytechlogic/ . Follow us on Twitter at https://x.com/valleytechlogic.

  • When a data breach leads to jail time for an ex-CEO, and why you should take data security seriously in 2023

    When a data breach leads to jail time for an ex-CEO, and why you should take data security seriously in 2023

    We’ve seen plenty of examples of extreme monetary penalties occurring from data breaches, but this is the first we’ve seen of anyone actually being jailed for one.

    Vastaamo was a Finnish psychotherapy provider that was founded in 2008. While it was a sub-contractor under the government, Vastaamo like many healthcare related businesses was the subject of data breach attempts, with two additional successful attempts occurring  in 2018 and 2019. These attempts failed to be reported by the company.

    The ex-CEO Ville Tapio did report the 2020 breach to authorities, after all of their patient data was stolen by the cyber criminals. These criminals asked for €450,000 (about $.0.5 million in US dollars at the time of writing) and when that was unsuccessful, they then demanded €200 from each patient of the clinic for which they had records on. They warned this fee would increase to €500 each if the clinic did not pay within 24 hours.

    They warned the patients that after 48 hours with no payment they would be doxxed. Doxxing is when your private details are leaked online (this can include your payment information but also things like your address). In this case they were even willing to leak client session records and notes. They leaked the details of 300 patients which included politicians and police office. A 10 GB file containing the patient notes for over 2000 patients was also found on the dark web following the hack.

    While the clinic, Vastaamo, was a victim in this case authorities still looked at the overall picture when making the decision to charge ex-CEO Ville Tapio, including the previous breaches and the fact that he had insider knowledge of the company’s cybersecurity coverage (or lack thereof). He was charged with a 3-month suspended sentence and the company itself had to file bankruptcy and eventually went under.

    The severity of the breach and the companies lack of accountability when it came to cybersecurity protections made them run afoul of the GDPR (General Data Protection Regulation) which are Europe’s regulations on data protection and privacy for its citizens.

    If you’re a US based company owner it’s not a good idea to think “Well nothing like this could happen here”. California recently passed the CCPA (California Consumer Privacy Act) which allows customers more say so over the data your business collects on them. If your business has contracts with the DoD (Department of Defense) you’re probably already seeing stricter restrictions and regulations for how your business must be cybersecurity compliant to keep doing business with the government via CMMC (Cybersecurity Maturity Model Certification). HIPAA is old news for medical practitioners, but we still find many that are not compliant with the regulations.

    Suffice to say there can be blowback that extends beyond financial penalties and injuries to your business’s reputation. Small steps in protecting the data within your business can make a huge difference in the outcome you have (whether it be avoiding an attack altogether or making for an easier recovery).

    If you need creating or developing a more robust cybersecurity gameplan, Valley Techlogic is the one you’re looking for. Cybersecurity is our number one concern, and we take implementing cyber prevention measures for our clients very seriously. If you would like a consultation to learn more just visit here to get started.

    Looking for more to read? We suggest these other articles from our site.

    This article was powered by Valley Techlogic, an IT service provider in Atwater, CA. You can find more information at https://www.valleytechlogic.com/ or on Facebook at https://www.facebook.com/valleytechlogic/ . Follow us on Twitter at https://x.com/valleytechlogic.

  • 5 USB flash drive safety and usage tips, also our 3 recommended drives for 2023

    5 USB flash drive safety and usage tips, also our 3 recommended drives for 2023

    USB flash drives (also known as thumb drives or memory sticks) have grown a lot in the last few years, what was once a handy tool for transporting small files but couldn’t compete with the capacity of CD disks or traditional drives is now available in sizes up to 1 terabyte which makes them a competitive product for even backup purposes.

    While they may have fallen in favor due to cloud services becoming more ubiquitous, many are looking for more tangible ways to backup important files and take them on the go.

    Many users also worry about the safety of these devices. This is because they’re a common vector for drop attacks, which is where a USB drive is left in a conspicuous location for someone to find and try to use not knowing it contains a virus or trojan horse.

    They also can be insecure if left on a desk or somewhere in public. Luckily, there are even options now that offer 2 factor authentication, biometric verification, and encryption. This means even if your flash drive fell into the wrong hands, it would be useless to the thief. You should also be wary of where you plug your flash drive into as the data path is a two way street.

    Here are 5 more safely and usage tips for utilizing a USB flash drive:

    1. Have separate flash drives for work and home. This will reduce the risk of cross-contamination if one of your devices is compromised, it will also make it easier to organize your files.
    2. Be careful where you purchase your flash drives from. There are irreputable sellers online selling fake drives that don’t contain the amount of storage they’re supposed to, or worse they could be infected with malware. Always buy from a reputable source.
    3. Don’t purchase any drives that require software for use. This is unnecessary and again opens up your device to being compromised with malware. USB drives should be “plug and play”.
    4. Think about the physical size of the drive you’re buying. It needs to be able to fit into the device you’re trying to plug it into, and a bulky USB drive may not be compatible with all devices.
    5. Be aware of the lifespan for the device you’re buying. USB flash drives (also solid-state drives and hard drives) have a certain number of write/erase cycles. Longer is better but if you plan to just keep a static backup on it you can get away with a lower number. Typical USB flash drives have 10,000 to 100,000 write/erase cycles.

    If we’ve piqued your interest in USB flash drives, you still might not be sure where or what to buy. There are thousands upon thousands of options but here are three options we can recommend. We have one that fits the bill as a budget friendly option for general use, one that has a slim sturdy form factor, and one that meets the requirements if security is a concern.

    Security conscious.
    Slim form factor.
    Budget friendly.

     

     

     

     

     

     

     

     

     

    All of the options we have selected have USB 3.0 speeds, while this is changing all the time this is the minimum we recommend as of writing. You also want to be aware of what kind of connector you’re looking for. USB-A is the most common but there are options for USB-C, MicroUSB and Lightning connectors on the market. You can also use an adaptor if needed.

    If you need hardware buying advice for your business, including the topic of digital storage, Valley Techlogic is happy to help. We can help you select the best option and offer advice on how to secure it. You can learn more about procurement assistance through Valley Techlogic here or schedule a meeting to find out more about our services.

    Looking for more to read? We suggest these other articles from our site.

    This article was powered by Valley Techlogic, an IT service provider in Atwater, CA. You can find more information at https://www.valleytechlogic.com/ or on Facebook at https://www.facebook.com/valleytechlogic/ . Follow us on Twitter at https://x.com/valleytechlogic.