We are amazed at how difficult it is to find good reliable computer support. Many computer support consultants blame the client for their own mistakes.
From one business owner to another I say Enough is Enough. We believe in the old fashioned qualities of say what you mean and do what you say. Our Microsoft Certified technicians are highly skilled, respectful and professional. Let our business help your business.
Pro-tek Systems delivers proactive maintenance services through our flat-rate IT Support Service. Designed to reduce your costs, increase your profits and mitigate your business risks, we partner with you as your Virtual CIO and IT Department, allowing you to focus on running your business, not your technology.
Our relationship begins with evaluating your current state of technology, including infrastructure, hardware and line-of-business applications and Vendors. We work with you to identify your critical business processes, pain points and vulnerabilities, and perform a threat analysis to determine your business risks. Completing this process allows us to design a Technology Plan that aligns with your long-term business goals.
"I don't hear about too many issues from my employees about their computers and if I do Protek is able to get them fixed."
Here at Protek Systems we are Microsoft certified technicians. We provide IT services in Utah. We have put together this list of ten useful Windows 8 shortcuts to help you use your computer more efficiently. We believe a computer should work for you, not the other way around. These shortcuts will help you use your computer more effectively:
Windows + i. Pulls open the settings pane. From here you can change an app’s settings or permissions. You can also adjust brightness and volume.
Windows + c. This will bring up the harms pane. The harms pane includes settings, share, send, and search.
Windows + h. The sharing pane. Many apps will allow you to share content with your friends. Give it a try by pressing Windows + h.
Windows + x. This pane contains a power user menu. It also has the Control Panel, Command Prompt, and Task Manager.
To close an app manually you can move your mouse to the top of the screen. There you will find a little symbol that looks like a hand. Click on it and drag it to the bottom. This will close an app.
Windows + f. This will bring up the search feature. Using the search feature you can look up a string of text on a page or in an app.
Windows + o. This will lock your screen orientation.
Windows + a. Upon pressing Windows + a you you will switch from an app to your desktop or vice versa. This is a good way to access your desktop quickly.
Windows + q. You don’t have to manually scroll through your apps looking for the one you want. Instead you can simply make a search for it.
Hopefully this list will help you learn more about your computer. If you have any questions feel free to contact us! http://proteksupport.com/contact/The How to Series: Creating a Strong Password
Today’s lesson is on creating a strong password. Protek Systems offers more than just IT services in Utah. We can help you with all aspects of your business. By creating a strong password you will be able to protect your content from outside parties. A good password is hard for others to guess but easy for you to remember. A good password should not be a single word found in the dictionary. It should never ever be the word password. Ever. Not even password1.
Let’s go through the steps and make a strong password together. Like I mentioned before, a single word should never be used. I’ll give you an example of one of my old passwords and we will decompose it to see how it was made. Please do not use this password. It has been published on the Internet and is no longer safe.
Look at that random string of characters. Do you think you would ever guess that? Probably not. It would take a desktop PC about 344 thousand years to crack that password. You would have to read my mind and that isn’t possible. Right? Anyways, back to the password. That is not a random string of characters. That is a song title. I picked a song from a band I like that isn’t very well known.
That password is actually “Cinder and Smoke”, a song by Iron & Wine. Now look at it again and you’ll notice that I substituted numbers for letters whenever I could. The “e’s” became threes and the “i’s” became ones. I threw in an & as opposed to an typing the word and. This is a relatively strong password.
Here are some pretty basic guidelines to a strong password.
1. The longer the password the better. Use phrases as opposed to words. Aim for at least 10 characters.
2. Use a combination of numbers, letters, and symbols. Don’t forget to use capitalization as well.
3. Change your password regularly. I would recommend changing your password at least once a month. Do NOT reuse passwords.
4. Use multiple passwords. Do not use the same password for your email and your bank account. Try having several different passwords at any given time.
5. Avoid the following;
● Any variation of your name
● Dates and places
● The word “password” (I cannot stress this enough. Don’t do it.)
● Names found on your website. If you are an attorney then don’t use the word attorney in your password.
● Make sure you use something familiar. Write your password down.
● Do not give out your password to anyone.
With the following tips you are ready to make your password. For your first password try using a book title. I’ll give you a good trial run and then you can make your real password. Try mixing the “Grapes of Wrath” into a password. After you are done with that pick your favorite book title and make your own strong password. You can test your password strength at https://howsecureismypassword.net/. Try not to enter your exact password into that website. Submit a variation of your password. Change one letter and then see how strong it is.Why You Should Choose Us
It is surprisingly difficult to find good IT support these days. There are so many providers who offer mediocre or even poor services. Protek Solutions offers the best IT services in Utah. We take pride in our customers and their businesses. We understand that it takes more than a monthly check-up and a new monitor on the bosses desk. We are committed to providing our customers with the very best.
Service – We hate being ignored. We know that a problem that interrupts workflow is costly. No matter how small an issue may seem, it can drain the morale and effectivity of your day. We are committed to responding to your calls.
Proactive support – Imagine having an IT guy that actually monitors your systems and makes sure that everything is working how it’s supposed to. Wouldn’t that be nice? It is nice. Try us. We monitor 24 x 7 x 365.
Security – Your information is your livelihood. Technology is used to process information and make it more readily accessible to others. It should not be accessible to everyone. We protect your vital information and your hardware. Your computers are safe with us.
IT Report Cards – We send updates letting you know how your equipment and operations are functioning. This will help you cut out many sudden expenses and tragic technological issues. Microsoft Certified Technicians – We are Microsoft certified. We can help you with Microsoft products. Rest assured that you’re in good hands.
Save Money – We offer all our services at an extremely competitive price. It would be safe to assume that other IT service providers feel intimidated by us. We do more and we do it for less.
With our help your technology will serve you and you won’t have to worry about it. We’ll take care of just about everything. As always we offer on demand support and will help you use your technology to its full potential.Windows 8.1 Preview – Good Reviews
Microsoft’s hands on approach to windows 8 was well received by most users. Now Microsoft hopes to completely blow people away with Windows 8.1. This revamps the old system, fixes key problems with Windows 8 and adds new features.
While maintaining the focus on its touch screen capabilities, Microsoft has improved SkyDrive wherein all documents will automatically be saved to SkyDrive and all file types can now be managed directly from the SkyDrive itself. With the upgrades to the SkyDrive (OCR) users will be able to search for text directly within the SkyDrive camera roll. Additionally SkyDrive will take up 80% less space with its new smart file technology that allows users to save files offline and store information before being used.
With the Windows 8.1, Microsoft has taken personalizing devices to new heights and dimensions. The lock screen on Windows 8 allowed only single photo customization but with Widows 8.1 users will be able to add a slide show of images stored in their PC or SkyDrive. The new “slide to shut down” feature works just like the “slide to lock” feature on touch screen cell phones and is as simple as a single swipe of a finger.
Microsoft has stuck with the tile format for the start screen but upgraded the tile sizes by adding small and large tiles to the existing width and medium setting. The home screen settings can be customized to prevent accidental tile deletion and the new “tattoos” or upgraded backdrops which include an infinite color palette can be used as highlights or for the entire background.
The new Mail app includes a drag and drop option as well as junk mail, flagged messages, favorite contacts and separate inboxes for social networks and newsletters. Windows 8.1 now comes with a Skype app with IM, video and audio capabilities in addition to the Windows Messenger and Facebook apps. Internet Explorer has been upgraded and is not only faster but will allow users to open new tabs which are already open on their other devices. ‘Health and Fitness’ and ‘Food and Drinks’ have been added to the Bing apps and searching for new apps in the Windows store has been made easier with endless scrolling and lists for top free and top paid apps, popular apps and new releases. Windows 8.1 also includes upgrades to Xbox Music and its camera and picture capabilities.
Microsoft has taken into account user complaints with regard to Windows 8 and has attempted to make the necessary upgrades and changes to Windows 8.1 with much success. While Microsoft still believes that the future of their OS system lies in cellular devices, they have designed Windows 8.1 to be more PC friendly and they have made a great improvement on Windows 8 in terms of functionality.
Sources Used: http://mashable.com/2013/09/30/windows-start-button-brief/ http://windows.microsoft.com/en-IN/windows-8/preview http://winsupersite.com/windows-8/windows-81-review?page=3 http://www.pcworld.com/article/2048508/windows-8-1-review-the-great-compromise.html http://reviews.cnet.com/microsoft-windows-8-1/ http://www.pcworld.com/article/2048508/windows-8-1-review-the-great-compromise.html http://winsupersite.com/windows-8/windows-81-review?page=1Google Apps Not HIPPA Compliant
Although Google apps and Gmail have many features that are required for HIPPA, they are still not complaining with the HIPPA regulations. One of the main reasons is that Google does not sign the BAA required by HIPPA. HIPPA demands that data be sent encrypted to protect its privacy and should be viewed or accessed only by authorized personnel who need the data to administer proper medical care. So when using Google apps to send ePHI mails there is always the possibility of breaches and violation of HIPPA.
While there are many companies in the market which offer HIPPA compliant solutions, people still prefer Google apps. They are familiar with Google’s services. The ideal solution to the problem will be to use Protek Systems and the tools they have which provide all the features of Google plus all other features that answer HIPPA compliance. Google Health which came out in 2008 allowed patients to share their medical information online so that it can be accessed by doctors and other medical professionals. This service has since been permanently removed.
Google has never been in the business to ensure encryption even in its paid services although some Google apps do use encryption services like Escrow. There are some services that support TSL and SSL, which satisfies HIPPA by providing transport encryption. There is still the other side of the coin which may not cover all the requirements mainly because they are new or the services are not designed to provide total security. For example, Google docs, which provides cloud-based services, are known for providing security but may fall short when it comes to ePHI information. However, apps such as calendars and contacts do not have any security whatsoever and may not be used for PHI information such as appointments with the doctor.
Another option is to use Protek Systems that provide solutions like the CloudLock Vault, which provide security as specified by HIPPA. Apps which are similar in structure to Google but with more security features need to be in the market. Moreover, other cloud based services ought to be familiar with HIPPA regulations and if not, should clearly indicate to users the consequences of using such apps. Service providers have to be aware of such policies and cater to medical professionals so that they have all the features and top notch security.
Sources Used: http://luxsci.com/blog/gmail-not-hipaa-compliant-email.html http://cumulusglobal.com/cms/hipaa-google-baa http://generalaudittool.com/index.php/google-docs-and-security-meeting-hipaa-requirements/ http://smallbusiness.chron.com/hipaa-compliance-google-docs-31105.html