301-571-5040    Get SUPPORT

Washington Works Blog

Tip of the Week: Basic IT Tips for Your Benefit

Tip of the Week: Basic IT Tips for Your Benefit

Look, we get it. All you want is for the technology your business relies on to just… work. While that may not always be possible, there are quite a few things you can do to help prevent issues. For this week’s tip, we’ll go over some basics that will help make your use of your computer much less stressful.

1. We’re Not Kidding When We Say “Turn it Off and On Again.”

Yes, we’re aware that this advice has become the go-to punchline for any jokes at IT’s expense. However, we’re also aware that this is the case because we do offer this advice a lot, and that’s because it works. A surprising amount of issues can be resolved through a simple reboot. You know how refreshing a nap can be for someone? A reboot can work similarly for a computer, as it gets rid of all the extra data that can otherwise bog it down. This is a simplified way of describing the process, of course… the important thing is that you know we aren’t just asking that question to sound smart.

As silly as it admittedly sounds, a quick reboot is effective often enough to make it worthwhile to ask right off the bat.

However, it is important to remember that a reboot requires more than just turning your monitor on and off, or just logging out and in again. You need to actually restart your computer - and not by pressing the physical power button on your device, as this could cause worse problems. Instead, use the Restart option - found in the Start menu, under the Power icon. Furthermore, you also need to remember that locking your computer is a different process entirely, but still should be done whenever you leave your computer unattended. All you have to do is press WINDOWS+L.

2. Don’t Rush Your Computer

Anyone who has sat at a computer and had to wait for a process to complete understands how irritating this wait can be. There’s a real feeling that almost seems like helplessness - so it’s only natural that we have the urge to do one of the few things we can do… click on what we wanted to do, over and over and over and over…

There are a few problems to this approach. First, there’s probably some reason that the computer seems not to be completing its action. Second, your computer isn’t ignoring any of these additional clicks. As a result, if/when your computer makes it past whatever it is that is causing the holdup, it’s going to take all those clicks seriously. You won’t just open one instance of whatever file or program you were trying to access, you’ll open the application however many times you clicked on the shortcut. This will be annoying. Naturally, the same can be said for trying to print something out, or really any other action you were trying to complete. Doing so can even slow your computer down further.

Try to be patient… but, if the problem persists, reach out to IT for assistance.

3. Exercise Password Caution

It’s hard to overstate the importance of your passwords and their impact on your security overall. This means you have to be careful about how you remember them, as well as where and how you input them. Take your Caps Lock key, for instance. It won’t matter if you spell you password correctly if Caps Lock is activated unnecessarily, because it’ll still be wrong.

In terms of your security, you need to also consider the consequences of how you and your team stores your passwords. Let’s say that one of your employees is trying to cover up some corporate espionage. If another employee keeps their passwords written on a sticky note somewhere around their workspace (stuck to their monitor, for instance), that gives the insider threat a great way to pin their activities on someone else. This is why it is so important that every computer is locked when left unattended, as we discussed above, especially if the browser or other applications have their access credentials ‘remembered’ by your device.

If you’re seeking a simpler way to remember all the passwords you need to keep in mind, you’d be better off utilizing a password manager.

4. Talk to IT

Regardless of whether you have an internal IT team or you have a managed services agreement with a provider like Washington Works, you need to make sure you are communicating your issue to them in clear detail - chances are, they’ll assume that you have some kind of computer-related issue if you’re reaching out to them. Make sure you provide as much detail as you can, like what your error message says specifically, or a screenshot of your issue, if possible. This makes their job much easier, which leads to quicker resolution times. Hopefully, it goes without saying that you should remain available to IT to ask any questions of you once you reach out to them.

If your business needs more help with its information technology, don’t hesitate to reach out to us! We can help your operations by providing the IT solutions and services necessary to remain competitive today. Call 301-571-5040 to learn more.

How to Prioritize Your Upcoming Technology Impleme...
How to Adjust Your Business for Collaboration
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, April 18 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Cloud Productivity Privacy Malware Hackers Business Network Security Email Software Hosted Solutions Internet Tech Term IT Support Data Backup Data Data Recovery Computer Google User Tips Efficiency Mobile Devices Innovation Backup Managed IT Services Microsoft Ransomware IT Services Cloud Computing Business Management Hardware Productivity Outsourced IT Workplace Tips Small Business Smartphone Managed IT Services Encryption Business Continuity Managed Service Provider Collaboration Android Paperless Office Remote Monitoring Phishing Office 365 Server Upgrade Social Media Windows 10 Communication Browser Communications Data Management Disaster Recovery Smartphones Save Money Windows 10 Employer-Employee Relationship Bandwidth VoIP Cybersecurity Holiday Government Passwords Scam Apps Antivirus Healthcare BYOD Compliance Unified Threat Management Vulnerability IT Management Work/Life Balance Document Management Facebook Quick Tips Business Technology Saving Money Automation Risk Management Windows Artificial Intelligence Chrome App Wi-Fi Managed Service BDR Infrastructure Tip of the week Information Internet of Things Vendor Management Office Politics Password Blockchain Microsoft Office File Sharing Customer Relationship Management Money Big Data Chromebook VPN Virtual Reality Maintenance Analytics Word Network How To Mobile Device Two-factor Authentication SaaS Applications Hosted Solution Downtime Robot Router Taxes Hacker Professional Services Social Training Recovery Data loss Networking Gmail Management Remote Computing Websites How To Regulations IoT Storage Meetings Website Data Security Proactive Botnet Server Management Bring Your Own Device Automobile Settings Virtual Private Network Remote Monitoring and Management Access Control HIPAA Wireless Alert Machine Learning Employees Health Identity Theft Mobile Device Management Mobile Security Remote Workers Point of Sale Telephone Systems Company Culture Samsung Electronic Medical Records Physical Security Smart Technology Twitter G Suite Tablet Computing Private Cloud Computer Care Tech Support Firewall Patch Management Net Neutrality Backup and Disaster Recovery Unified Threat Management Legal Staff IT Budget Electronic Health Records Distributed Denial of Service IBM High-Speed Internet Finance Language Office Tips Internet Exlporer Tracking Disaster Heating/Cooling Monitoring Comparison Web Server The Internet of Things Virtual Assistant Bookmarks Notifications Error Connectivity Gadgets Budget Time Management Asset Tracking Tech Terms Multi-Factor Security Mirgation Printing Enterprise Content Management Windows 7 MSP Human Error User Error Sports Digital Payment Cyberattacks IT Solutions Managed IT Service Modem IT Consultant Development Authentication Computer Repair Computing Infrastructure Value Uninterrupted Power Supply Servers USB Consulting Virtualization Specifications Cameras Software as a Service Unified Communications Favorites Permissions Users Staffing Network Management OneNote Theft Google Calendar Remote Worker YouTube Permission Search Printer Wearable Technology Cybercrime Managed IT Enterprise Resource Planning Files Upgrades Break Fix Processors Cookies Customer Service Cables Authorization Alerts Administrator Dongle Managed Services Provider Black Friday Law Enforcement Social Networking CCTV Wasting Time Project Management Fraud Star Wars IT Support Touchscreen Employee-Employer Relationship Legislation Chatbots Webcam ROI Spam Google Drive Test Financial Corporate Profile Outlook Mobile Read Only Dark Web Nanotechnology Education Lenovo Wires Licensing Solid State Drive Statistics Service Level Agreement E-Commerce Cortana Cyber Monday Black Market Gadget Motherboard Database Vulnerabilities Conferencing Crowdsourcing Cost Management WiFi Cabling Mouse Emoji Identity Notes Digital Mail Merge Relocation Screen Reader Cleaning VoIP Techology WPA3 RMM SharePoint Travel Procurement WannaCry Shortcut Microsoft Excel Firefox Superfish Zero-Day Threat Cooperation Supercomputer Hard Disk Drive Bluetooth Utility Computing Features Voice over Internet Protocol Geography Instant Messaging Personal Information Hotspot Assessment GPS Augmented Reality PowerPoint Spyware Address Smart Tech Avoiding Downtime Fleet Tracking Operating System Downloads Update IT Technicians Motion Sickness Security Cameras Monitors Managing Stress Help Desk Regulation Fun Safety Marketing CrashOverride Competition Emergency IP Address Hard Drives Transportation Miscellaneous Mobile Office Domains Public Speaking Presentation Printers Lithium-ion battery Hiring/Firing Wireless Technology 5G