Welcome to Network Depot's Blog, The Depot Diaries!
Buying new equipment for your business can be a harrowing process. There are so many different aspects to consider that at times it can seem like an overwhelming task- especially if you are purchasing something that is a key component to the infrastructure of your company, like a server.
When you work with an outsourced IT company that has their own procurement department (like Network Depot), this helps to take some of the pressure off, because they are able to recommend the type of equipment that is best suited for your company.
There will be occasions when you purchase equipment through an IT company that you will notice a higher price on these than if you were to go to some place like Best Buy or Micro Center. So the big question is (obviously)- why does it cost so much more? And the follow up question- is it really worth the extra cost?
No one likes to talk about it, but a reality of the business world is that you have to prepare for losing an employee. It's hard not to think of everyone as a work family, especially in smaller companies, but at the end of the day employee turnover is a natural occurrence. Sometimes the employee will choose to leave, other times they will be asked to leave. Either way, it is important to make sure that you have an off-boarding process in place.
First, let's answer the obvious question- Why? Why does it matter whether or not you have a written, specific, off-boarding process for employees?
The answer can be summed up in one word- Security.
Computers seem invincible, indestructible, and infallible...but they're not. The fact is, without proper care, computer equipment can get sick- just like people. So here are some tips that will help keep your computer equipment healthy as long as possible.
1. Get plenty of rest: It is actually important to turn your computer off every so often. This gives it the opportunity to rest, and when you turn it back on, it will likely install all of those updates you kept putting off that required a reboot. A best practice is to reboot your computer once a week. This will minimize the amount of time it takes to install all those updates and help keep your computer running more efficiently.
SLA's (or Service Level Agreements) serve as guidelines when you enter into a support contract with a company. They provide the expectations that you, as the customer, should have when you contact them for service. But at Network Depot, we don't believe in the typical SLA guidelines that most IT support companies use. Instead, we use what we like to call "Common Sense SLA", which is really based off of one very important measurement (the most important, in our opinion)- customer happiness.
To learn more about how Common Sense SLA works, check out this brief, under 2-minute video.
For more details about how SLA response times work, check out this blog post: SLA Response Times- and Why Network Depot Doesn't Have Them.
What do you think about Common Sense SLA vs. regular SLA guidelines? Which one would you prefer? Leave us a comment and let us know!
Over the past few days you have probably heard about this new phishing scam that surfaced, which tricked people into entering their Google login information on a fake Google docs sign-in page. If not, here are a couple great articles from The Huffington Post and Gizmodo that really help explain the scam.
This scam was a tricky one because of how difficult it was to identify. A person would receive an email with the subject line of "Documents". When they opened it up they were given a link to click on which took them to a page to login to their Google Drive account.
Google has recently released a statement saying that they have taken care of this scam and removed the fake pages, but that if users are worried that they may have fallen victim to the scam they should immediately change their password.
The tricky thing about this scam is how much the fake login page looked like the real one. In fact, if you were to put the two side-by-side, it is almost impossible to tell the two of them apart. The scammers were able to do this because they were actually using Google's servers. They signed up on Google, and created a real folder with a document on their Google Drive account. Then, by marking this document as "public", and using the preview feature, they were able to get a URL they could send out in an email.