Technology Questions and Misconceptions
Jason Silverglate - SMB Technologist

Technology Questions and Misconceptions

In the IT world, I’ve also heard my fair share of technology misconceptions. The purpose of today’s article is to explore some popular technology questions floating around out there. We have all been taken in, at some point or another, by technology misconceptions. Many intelligent business owners and experienced computer users believe things about technology that simply aren't true. 

Obviously answering these questions won’t immediately reduce technologically-driven complexity. But they are a good place to start. Knowing such technology answers will not only help your business work better but while shopping or doing normal tech stuff, you will have better productivity and insight.  

Here are the answers to the most common technology questions:

ARE APPLE COMPUTERS ARE IMMUNE TO VIRUSES?

The which is better debate between Mac and PC users has been going on for over a decade at this point, and quite frankly it’s about as useful as yelling at the clouds.

In the right situations, though, Apple computers are just as vulnerable to viruses and other malware as their PC counterparts. So why is this myth so commonly believed? There are several theories, but one of the more common reasons may be around the fact that hackers design malware that can scale quickly. Because of this, many viruses are designed to reach commonly used systems. Historically, PCs have vastly outweighed Mac in terms of global users.

While using a Mac has traditionally been considered much easier than a PC, the myth that the Mac operating system is immune to viruses and malware is false. So while you might be able to camouflage yourself in a coffee shop using your Mac, clicking on that suspicious email link from a distant relative requesting to send you a copious amount of cash is still unsafe.


DOES “PRIVATE” BROWSING" MODE KEEP ACTIVITY ANONYMOUS?

Browsers have different versions of this. Chrome uses “Incognito Mode”, other browsers have similarly named modes like InPrivate, Private Browsing and so on. And in fact, these browser features do keep your surfing history private from other individuals that use your computer, but they will not prevent your Internet Service Provider from seeing this information.

For example, say you’re browsing for a specific pair of shoes (while on break, of course) in a private browser mode. You’ll probably notice that custom ads for those specific shoes will still follow you around the internet, Amazon, and even on social media.

Whatever your reason might be for switching your browser mode to private is completely up to you. I’m not here to judge, but I have to clear the air about the level of anonymity these modes actually provide. This information becomes important in the event that your online searches might one day lead to legal action. A good course of action to assume that while you’re at work, your search history and browser history is never going to be truly “private.”


ARE PASSWORD PROTECTED NETWORKS HACKER-PROOF?

I love cybersecurity. I really love helping small and medium-sized businesses improve their existing IT security through a variety of means. While I do encourage strong passwords, if your company uses a hard-wired network, it’s important to be aware that any user can potentially be able to see anything on a computer.

The truth is, however, that most of us are using WiFi to access cloud networks, which makes access for users much easier, but still carries a healthy amount of risk. Therefore, in addition to using cloud networks, it’s important to build in the idea of routine data backup in redundant, off-site data centers. Since many types of ransomware will render a computer useless until a ransom is paid.

If you have all your networks critical data backed up offsite, the recovery process becomes exponentially easier, and much cheaper as well. But honestly, you would be shocked at how many companies with more than 50 employees are still using ‘password’ or ‘12345’ as their network password. This isn’t a great password for anyone, anywhere at any time.


DOES DELETING MEAN IT’S GONE FOREVER?

Many people think that if you delete something from your computer it’s gone. The fact is, when you delete some data from your computer, it may no longer be visible to you ( the user), but it is present on the hard drive. Only the memory space that this data occupied is deleted and reallotted to other data. So, when you plan to sell off your old computer, there are chances that your data is still present on the hard drive, which is pretty much retrievable. So, if you want to completely delete your data from the world, then simply remove the hard drive from the machine, drill holes in it and destroy it!


IS THE LATEST ALWAYS THE GREATEST?

The lines that stack up outside the Apple store on the days when a new iPhone launches might lead you to believe that older versions of the phone may only serve as paperweights. We tend to apply the same logic to our office computers – if it’s not the latest version there’s no use in having your staff use it, right?

Not quite.

It’s natural to want the best technology, but it’s important to remember that the manufacturers depend on us falling for the idea that the newest is always the best. If 90% of the your staff is engaged in standard functions like word processing and email there’s no need to have top of the line processors in every machine. It can be a waste of time (and money) to put too much stock into the specs of your office computers.

An article in The New York Times put it like this:

“The real message here is that while it’s easy to get caught up in the game of latest-and-greatest, you should really pay attention to the features that matter to how you’ll be using your new computer, phone or other device. If you’re looking for a phone that’ll last all day, focus on the battery. If you want a computer you can travel with, battery life and weight may matter more than a powerful processor. But never just buy the biggest and best and assume it’ll fit all of your needs.”


IS MY ANTIVIRUS SOFTWARE THE BEST DEFENSE?

Since a capable antivirus solution—Windows Defender—comes with every new Windows computer, it's likely that there are more computers with antivirus software today than ever before. Cyberattacks haven't ended because of antivirus software; they've only become more insidious. 

A threat can spread around the world before antivirus software makers discover it. For example, the U.S. government claims that the 2017 WannaCry attack—a ransomware attack that struck computers around the world—was a state-sponsored attempt to earn illicit funding for North Korea's nuclear program. It's likely that most of the infected computers had antivirus software. That didn't matter because antivirus software can only protect computers from known threats.

How can you defend your company from an attack that doesn't exist yet? One way is to implement an application whitelisting policy and manually approve the applications that your computers are allowed to run. If a virus can't run, it can't infect a computer. Another way is to augment your in-house antivirus software with a cloud-based security solution that uses machine learning to detect likely threats.


IS BANNING MOBLIE DEVICES IN THE OFFICE A SMART MOVE?

Every new technology presents a potential security risk for businesses. During the personal computing age, offices have banned optical discs, USB drives, digital cameras and smartphones due to the inherent risks of those technologies. Every time your company bans a technology rather than developing a way to embrace it safely, you potentially harm your organization's productivity. Technology for cloud-based administration of mobile devices makes it possible for your organization to create and manage separate work accounts on employees' devices.

With remote device administration, you can control the applications that team members can install and the websites they can visit. You can even delete work-related data remotely if an employee leaves the company. Remote administration doesn't guarantee that a mobile device— intentionally or inadvertently—will never become a security risk, but it does minimize the chance of a breach occurring. Allowing employees to bring their own devices to work can greatly increase productivity because it creates opportunities for remote working.


CAN I COUNT ON MY SOFTWARE VENDORS TO ASSIST ME?

Software vendors are skilled in what their software can do, but they are not be trained to help you solve your business problems. nor are they experts in developing business strategies. However, IT consultants are proactive in managing and problem solving, they are in a better position to assist and troubleshoot if or when something goes wrong. They have the skills to look at your software and business practices, and the expertise to marry the new technology with your business needs. 


ISN'T OUTSOURCING BUSINESS MORE EXPENSIVE THAN HIRING?

This is something I commonly hear from prospective clients. While it’s difficult to make a hard and fast rule that will apply to all businesses, I can say there are far too many misconceptions surrounding outsourcing IT tasks.

Hiring for a business is expensive. There are plenty of fixed costs when you consider salary and benefits but there are also intangibles like the cost to train a new member of an IT team to get up to speed and learn all the nuances of a company’s infrastructure. There are many applications that outsourced IT can handle for small and medium-sized businesses.

At Continuous Networks we have been creating helpful blueprints for better technology for businesses of all sizes since 1997. Whether you need general network monitoring, VoIP implementation, installation of a cloud network, or network security or data backup and recovery solutions – Continuous has vendor-agnostic solutions that can make your staff more productive, and your data more secure.

My advice with regard to hiring a 3rd party provider is to thoroughly understand the contract before you sign anything or let any outsourced provider touch your technology. Generally speaking, a “break-fix” model of IT support can be much more expensive than a contract that provides a flat fee.

You may have formulated a preconceived idea or misconception based on a prior experience with a technology consultant. I have a FREE helpful guide for this on our website that outlines the three most common ways that providers can charge for IT services and discuss the pros and cons of each.

I hope my article will make you a little wiser when you encounter future tales of technology. If you think of other questions, feel free to ask them in the comments section.

George Beard

Treasurer at LookFirst, Inc.

6 年

Can't a very large biz with banks of geothermally -powered private, fragmented data storage and its own cubesat ISP inhouse for streaming to and from fast dual-boot devices with the Linux side hypervising? the Android side, multi-biometric access via randomly rotating P2P VPNs and extreme encryption and no social networking other than 802.11ax provide lawyer/client privacy, Jason?

要查看或添加评论,请登录

Jason Silverglate - SMB Technologist的更多文章

  • Demystifying the Cloud; What it is and why you should care

    Demystifying the Cloud; What it is and why you should care

    THE CLOUD IS HERE TO STAY Phrases like “the cloud is the future of technology," “the cloud is revolutionary,” and “the…

    1 条评论
  • The "INTERNET OF THREATS"- Protecting Small Business Networks.

    The "INTERNET OF THREATS"- Protecting Small Business Networks.

    The IoT Threat Kaspersky Labs reported an estimate of 20 billion IoT devices could exist by 2020. Although IoT isn’t an…

  • Breaking Bad Technology Habits

    Breaking Bad Technology Habits

    Almost everyone has bad habits in real life. While technology should help us break some bad habits, all too often it…

  • Looking Into The Future of Data Security for Your Business

    Looking Into The Future of Data Security for Your Business

    Today, I’m taking a look into Data Security for your business. Specifically, issues that are influencing best practices…

  • Training Your Employees About Cyber Security

    Training Your Employees About Cyber Security

    In our August newsletter, I wrote a little about the importance of training employees on information security best…

  • PROTECTING YOUR BUSINESS FROM TECH SCAMS

    PROTECTING YOUR BUSINESS FROM TECH SCAMS

    As a provider of high-quality IT solutions at Continuous Networks I have been working to help businesses achieve more…

    1 条评论
  • In Case Of (A Data) Emergency, Read This

    In Case Of (A Data) Emergency, Read This

    In a somewhat ironic scenario, many businesses still have those red metal emergency boxes attached to the walls within…

  • Is It Time to Change Your IT Provider?

    Is It Time to Change Your IT Provider?

    If you’re still struggling to overcome ongoing business challenges, perhaps it’s time to try another IT provider who…

  • How The Dark Web IMPACTS Small Businesses

    How The Dark Web IMPACTS Small Businesses

    Beneath the surface of the Internet, there’s a mysterious world known as the Dark Web that has the potential to wreak…

    1 条评论
  • SMEs In Cyber Attack Crosshairs

    SMEs In Cyber Attack Crosshairs

    If you’re in Business, you’re a Target. As a SME, you probably rarely think about the threat of a cyber-attack.

社区洞察

其他会员也浏览了