Home » Blog » Archives for Keith Herstek

Author: Keith Herstek

Professional Businesses Deserve Professional Setup

Watching a business grow is as satisfying as it is rewarding. Whether opening a new office, starting a new department, or bringing in a new employee; it’s a positive step in the right direction. Upward growth often requires new office tech and IT changes to bring new staff fully online.

At a minimum, a new computer will be needed for employees to get started quickly and hit the ground running. New staff or an entire department may require a server, printer, or additional networking hardware to cope with extra demand.

A tech smart business should give careful consideration to how it sources and sets up its hardware and software. It can be tempting to pick a simple solution off the shelf from the nearest retailer.

Modern manufacturers often make it easy to get set up with a new device straight out the box. Using default settings and a simple setup means a laptop or tablet can be just plugged in and it’s ready to go, right?

Unfortunately, setting up technology to create safe, secure, and reliable business services requires a little more detail.

Setting Up Tech For Business

The hardware you have is at least as important as the hardware you buy. It’s important to ensure new tech on the network is compatible with your existing business systems. Adding the wrong solutions to accommodate new employees can slow down the system for everyone.

Many firms talk themselves into buying the most expensive, or heavily marketed system on the market. Buyers often feel confident that the high price tag and slick design means it’s guaranteed to work with anything you put to it. We wish that were always the case.

Without an eye for fine detail and good IT knowledge, combining certain solutions can cause a significant network slowdown or even fail to work together at all.

Consistency Is Key

It can seem easy, and tempting, to buy technology based on offers and deals around at the time you need it. Some companies do this to save money short term, building their systems using a mixture of hardware from various vendors and manufacturers. When thinking long term, this approach might not get you the great deal that you think.

Mixing suppliers alone can make it difficult to track where components came from in the coming months and years. Warranties, service agreements, and support can become hard to track down when parts fail and hardware dies. Money spent securing your business against failure is completely wasted if you can’t find the right paperwork at the right time.

Sourcing replacement parts and supported peripherals can be made more difficult when components are mixed too.

Planning ahead and purchasing identical hardware can make swapping components fast and straightforward. When systems are consistent, both parts and knowledge can be shared throughout the entire business. A smart decision today can eliminate costs, time, and headaches further down the road.

Unexpected issues appearing at the last minute can have large consequences on workload and deadlines. Sharing everything from chargers to memory can help to reduce and mitigate IT risks. Consistent hardware, swappable components, and even considering a supply of spares can take care of many potential headaches.

Smooth Onboarding

In business, first impressions are critically important. Whether setting up a new office or getting an employee ready to start, a professional attitude goes a long way. Good IT that’s ready to work sets a professional tone to carry your business forward.

IT that supports and enhances operations is infinitely better than IT that gets in the way. Using consistent and well-known solutions in the right way avoids wasting time, maintains performance, and reduces costs where it matters.

Our goal is to ensure your hardware meets your business needs. A professional setup ensures your IT is consistently improved while you watch your business flourish and grow.

Give us a call at 570-779-4018 for a professional setup to make sure nothing stands in the way of growing your business.

Invest Well in Your IT Security

“If it ain’t broke, don’t fix it” is a common and useful rule for many business owners. It serves to protect your business against unnecessary costs and unneeded downtime. While protecting your business against many types of danger, it poses an outright threat when it comes to IT security.

Security threats to your firm move so fast that your IT should be working twice as hard as your company just to keep up. Every day, hundreds of thousands of new malware threats are released. Falling even hours behind means any one of these attacks can threaten your business.

The single most dangerous thing IT security can do is stand still. Keeping up with the latest advice, technology, and updates the security industry offers is vital to keep your business safe. This makes up much of the unseen job of IT professionals. Hackers never stop looking for new ways into your system, which means your security can’t stop looking for ways to keep them out.

Modern Systems for Modern Business

One of the most common security threats a business opens itself to is using an outdated operating system or software package. Many firms are scared to upgrade, update, or renew their IT over fears of breaking legacy systems. Many rely heavily on old software and are afraid to make a large change themselves. Some businesses today still run machines on Windows XP, an operating system first released back in 2001.

Old operating systems stop receiving security updates and patches that protect against newly released attacks. These systems become very vulnerable, presenting a large target for knowledgeable hackers. This happens many years after newer versions have been released, giving knowing IT firms a chance to migrate safely.

Hackers are always on the lookout for businesses that run IT equipment outside of its suggested service life. A server, desktop computer, or peripheral is a golden opportunity for criminals to enter and threaten a business.

Hackers purchase their attacks on the dark web, safe in the knowledge that old systems won’t be patched. These attacks can then be used to attack unguarded firms to steal or compromise vital company data.

An unpatched old machine is like a valuable security door left propped open overnight, a golden opportunity for thieves.

Smart Budgets

Budgeting for business is a difficult task. We aim to make the most of everything we spend and reduce spending as much as we can. IT security can easily fall very far down the list of priorities.

IT can seem like an easy way to cut costs. It’s a department that the customer doesn’t always benefit from directly, and when it’s working well, it might not be on the radar at all. Despite working largely behind the scenes, successful IT is one of the critical components of every highly successful firm. Good IT can be the binding glue that holds the company together.

Even businesses far removed from the IT world typically uses payment machines, ordering systems, and inventory. Even restaurants and retail stores rely on computers to operate. Downtime for any critical system can be a complete disaster. A business can be unable to trade, and costs can mount up fast.

When vital IT components are used by the customer, a sales website, or an automated booking system for example, the problem can multiply tenfold.

Keep On Top Of The Essentials

Good IT isn’t built on high peaks and deep troughs in the yearly budget. The kind of IT that makes your business and helps it to grow is built by smart financing and careful planning. Great technicians are what makes excellent IT.

Maintaining steady updates, keeping pace with the latest security, and building your IT as you build your business keeps you in the driving seat when it matters most.

When IT is planned and issues are solved before they appear, security becomes cheaper, easier, and many times more effective. System upgrades can be planned out months, if not years in advance so you are never caught unaware.

Don’t let your IT be broken before you take steps to fix it. Move ahead of the curve and give us a call at 570-779-4018 so you don’t have to find out what your business looks like without IT.

Make IT Problems Last Year’s Problems

Around the world, the new year is a time for celebration. It’s a time to reflect and a time we typically resolve to make the most of coming 12 months. We do this by leaving last year’s problems precisely where they belong, in the past year.

Many manage to adopt this approach in their personal lives, but it pays enormous dividends to apply it to our businesses too.

Cleaning up open issues from previous years gives you and your team free reign to make the next year a record-breaking success with nothing to hold you back. Intermittent IT problems, network slowdowns, printing issues, and unavailable resources can all be left in the past.

Starting the year off with a clean IT slate simply leaves you to handle the business areas which you do best.

Set Your Network Straight

If your only relationship with IT last year involved calls to fix broken systems then it is time to have your IT fixed up for good. Break-fix relationships can add stress to both your company and your IT provider.

While getting up and running fast and fixing breaks to get back on track is a clear priority, more can be done to ensure breaks don’t happen and downtime is avoided. Repeated break-fix call outs waste large amounts of time to troubleshoot, diagnose, and patch an unfamiliar system every time it has an issue.

Using IT to set you up right means using knowledge and experience gained over time to right the ship and keep the whole system working together.

The same experience configuring your network top to bottom can be called on again to update or change it as requirements and projects shift. With a complete system picture, less time can be spent on troubleshooting, and more can be allocated to just getting work done.

Sports Car IT

IT with long-standing issues and bugs, ones that staff have gotten accustomed to working around, can be like running an old vehicle. It’s often more expensive to maintain an old car than purchase something more modern requiring less maintenance. An old car requires more parts, becomes less efficient, uses more oil, and is more likely to suffer breakdowns too. The same is true of old IT.

The cost over time of a well-configured system can often be the same or even less than fixing broken issues on the old one. The difference is a dramatic difference in downtime and lost productivity. Better IT means getting where you need to be, faster.

Your Staff Deserve IT

Nothing distracts employees from a task more than unexpected downtime or systems failures. Whether getting crucial documents Friday afternoon, or attempting to settle into work Monday morning; bad IT is frustrating, disheartening, and time-consuming.

One of the hardest but most rewarding elements to cultivate in a company is good staff morale. When you have it, productivity goes up, turnover goes down, and the business environment is vastly improved for everyone. When you don’t have it, the workday is that much tougher for everyone.

Workflow issues are well known to be one of the top contributors to poor morale. Slow machines, unavailable printing, and interruptions cause more knock-on issues than just the IT department can fix. Good employees need and deserve the right tools for the job.

A Better Way to Operate

Use the new year as a golden opportunity for a fresh start on your IT. An assessment of your system by IT professionals will diagnose issues and give you a complete guide to get back on track. Whether caused by a configuration error, bad devices, or something else; we’ll track down the causes and leave them to be forgotten about.

There’s never a better time to establish a managed IT services relationship. Contracting professional services can put an end to system bottlenecks, configure your system right, and advise on the best course to take into the new year.

The most important decision you can take into the year ahead is to stop addressing IT issues as they happen. Take charge of your IT and fix the underlying causes holding you up.

Give us a call today at 570-779-4018 to start a service relationship that will see your business take off into a very happy new year.

What Hackers Target In Small Businesses

Hackers today have many ways to attack small businesses and business owners. Many attempt to use technology to send malware, viruses, or phishing attacks; or use information to con owners and employees into handing over more information than they should.

One or more of these techniques can be combined with gaining physical access to steal from vulnerable firms. Identifying precisely how criminals target businesses and what they deem most valuable can help to protect from the most devastating attacks out there.

Remaining vigilant and informed is one of the most vital things you can do as a business owner to protect your assets and reputation.

Extortion

Different types of attacks tend to rise and fall in popularity. Fifteen years ago, computer worms were the most common attack that businesses faced. Security software wasn’t as advanced or as widely used at it is today. Computer worms were, at the time, an exceptionally low-cost and efficient way to inflict the maximum amount of damage for minimum cost.

Today ransomware has seen an unfortunate boom in popularity. This technology aims to encrypt the target’s files on their personal computer. This technique denies the victim access and charges a large fee in exchange for the key to retrieve the victim’s own data.

The attack has worked so often because it requires minimal effort and can be used again and again. Many businesses have no option but to pay because the data is worth far more than the ransom demand the hackers have made.

The best defense against ransomware attacks, in addition to strong online security, is an up-to-date offsite backup — one that is tested to work reliably.

Targeting Customer Records

One of the most important things for your firm to take care of is your customer data records. Records which include names, dates of birth, and other personally identifying details. These details are extremely valuable to hackers or criminals who, either use them personally or sell them on to someone who will.

Many regions have strict laws and guidelines about how this information must be stored, accessed and protected. Failing to follow these can result in severe penalties that could devastate any company.

Targeting Financial Information

Like personal information, a small business must take extreme care when storing customer financial information. Sensitive details such as credit card or banking information are a key target for hackers looking to steal money fast.

The impact on your business reputation following a breach of financial data will be severe and devastating. Even a simple mistake can require years of advertising and great PR to repair. Many firms have failed to recover after losing the trust of their customers.

Social Engineering

Most firms today run good IT security packages to protect against online attacks and other forms of malware. Attackers often know to take their methods offline to achieve the best results.

Whether posing as a supplier, customer, or interested party; attackers can seek to gain information that you may be less than willing to hand over to a stranger. Small businesses can often be used to gather information on vendors and suppliers they do business with in order to attack them too.

Be particularly cautious of the information you provide when discussing business with individuals you haven’t spoken to before.

Keeping Small Business Safe

Each of these targets and attacks are just some of the most popular and hard-hitting attacks out there now. The list is forever changing, and the methods we use to protect against them always needs to change too.

Some can be defended against with great security, backups, and software. Others, such as social engineering, need you and your staff to stay up-to-date and remain vigilant about the major attacks affecting small business today.

If you need help tightening your businesses security, give us a call at 570-779-4018.

Tech New Year 2019

Preparing Your Business Tech to Start the New Year

The start of a new year is a challenging time for businesses. It can be a good time to reflect on the wins and losses of the previous twelve months. It’s also an excellent time to take stock and evaluate what your business needs to go forward.

IT demands move at a staggering speed, meaning last year’s tech may not fit next year’s needs.

The new year can bring major change to both the business and the environment it operates in. Regulations, contract terms, and seasonal spending habits mean that adaptations have to be made for continued growth.

A smart business knows how and where to incorporate flexibility to win more business and adapt to a new environment. As we move into the new year, there are fundamental questions we should ask about our IT to ensure we are ready to tackle the next twelve months too.

Is Your Hardware Still Up to The Task?

Businesses are often challenged by their client’s demand for files that seem to continually increase in size and resolution. The storage needed to handle, use, and archive these enormous files appears to grow at a near exponential rate.

Every device today is capable of capturing more data at a higher resolution than ever before. Huge data needs have become the new standard.

The expectation of bigger and bigger data is only set to continue as we progress into another new year. Many clients expect, or demand, exceptional quality from professional services and with a fast turnaround time too.

These competing demands put as much strain on network hardware and computing power as they do physical storage. One of the most important things a business can do when reviewing IT demands is to ensure there are no bottlenecks in the productivity pipeline.

Is Your Backup Reliable and Ready?

Almost every business in the modern day has learned enough to put a backup in place. Whether simply transferring files manually to USB storage, copying documents over to a local server, or saving media to the cloud. However, not every business is testing their backups. Fewer still are testing them reliably.

A backup is only as good as what we know can be reliably restored from it. Cases have emerged where big-name firms had famously believed they were backing up successfully for months or years, only to find out their backup was failing when they really needed it.

Whether impacted by missing assets, unable to transfer files, or affected by corrupt data, an untested backup may be as useful as not having any backup at all. A critical goal for the safety and reliability of any business should be to have dependable backups that are tested at regular intervals.

Is Your Compliance Still Up to Date?

Nearly every business in the world has compliance and regulations standards it must adhere to if it is to keep its position in the marketplace. These may be industry specific such as medical or automotive certifications, or regional protections such as data protection regulations.

Requirements for each of these areas change regularly. It is up to each firm to keep on top of both changes to rules and changes to the firm which may impact them.

Changing IT can often impact certifications in a big way. Many feature rules which affect storage, processing, or altering the way in which data is used; it’s essential to check your usage against strict requirements relevant to your business.

While time-consuming and difficult, these checks require a strong knowledge of both the rules and your IT system. The penalties for failure can be severe and crippling. It is a critical area of the firm you can’t afford to get wrong.

If you are looking to boost your business in the new year, check up on your systems and technology, or dust up your certifications to the latest standard: there’s never a better time than now.

Give us a call at 570-779-4018 to get your new year off to a flying start.

Christmas devices

Buying Tech in Time for Christmas

Christmas time is back with us again. The latest devices and gadgets are hitting store shelves just in time to keep up with the rush. Magazines, television, and the web are brimming with advertisements and reviews of the latest tech your money can buy.

Before you rush out to buy the gadgets you’ve been waiting all year for, consider a few important questions before parting with your hard-earned cash.

Does This Technology Do What I need?

First, you must ask what problem you are trying to solve with a new piece of tech. The most important thing to consider is how adopting your new device will improve on what you had before.

In some cases, a sleek new gadget or device for fun is good too.

When you’ve answered this question, you should consider whether there is other tech or competing devices out there that can perform even better.

Should I Become an Early Adopter?

Early adopters are people that anticipate the release of new tech, wait in line on release day, and pride themselves on having the latest gadgets to hit the shelves. If you recognize yourself in this description you are likely to snap up the latest devices the day they are released. This eager anticipation, however, is not always the way to get the best deals or the best gadgets.

Companies often rely on new product hype to give sales an early boost. Waiting for the marketing and hype to subside, even a little, can save you a lot of money.

After initial sales fall, companies often mark down their prices to keep their devices attractive and sales high. When newer, faster, sleeker devices hit the market, companies cut prices to maintain strong sales figures. For the budget smart consumer this is an opportunity for a bargain. A device good enough to buy on launch day is well worth waiting for.

Have I checked The Reviews?

We are fortunate enough to have access to seemingly unlimited amounts of information at our fingertips. Often weeks before a product is released, reviews are available across the web.

One of the best things you can do when considering a new device, particularly a high-cost purchase, is to watch and read a wide variety of product reviews. It pays to be cautious of reviews that are particularly glowing, or too downbeat. Keep an eye out for middle of the road reviews that fairly weigh the pros and cons of each device.

Have I Found the Best Deal?

There are many ways to keep an eye out to make sure you get the best deal on your device. If you can, monitor prices over time to see how they rise and fall to find the best time to purchase.

When purchasing online, many sites include a box to add a coupon code when you are ready to buy. It sometimes pays to jump over to Google and search the website name and ‘coupon’ or ‘voucher’ to find out if there are any good deals on.

A quick search can save you as much as 10, 15, or 20 per cent on some purchases. Sometimes companies send out offers to appeal to groups they want to market to. A companies Facebook page may get different offers or vouchers than its Twitter followers or newsletter for example.

It can pay to search around for offers and vouchers to get money off before you checkout. Five minutes work can save huge amounts of cash.

Purchase in Confidence

If you have asked yourself these questions, done all your research, and found the answers you’re looking for then you may well be ready to buy.

You can do so with the confidence that you’ve done all your homework and you’re getting the best deal and gadget for your money.

hacked email

Marriott Hotels Exposed 500 Million Customer Records. Make Sure Your Business Doesn’t Suffer the Same Fate.

Up to 500 million travelers could be compromised as hotel chain Marriott International have announced a security breach in their guest database. Analysts recently alerted the firm to a vulnerability that has granted hackers access to the hotel chain’s systems since 2014.

The firm announced their Starwood Preferred Guest (SPG) loyalty program was compromised for an extended period which left customers vulnerable. The exploit exposed critical guest information which included names, addresses, passport numbers, and dates of birth. Marriott also announced an unknown number of customers had encrypted credit card details stolen in the attack.

If you have been a member of Marriott’s Preferred Guest Program or a customer of Marriott hotels in the past, you should take steps today to ensure your data security. By doing so, you can protect your finances, prevent identity theft, and defend your data from attackers looking to exploit an opportunity.

Secure Your Data

Changing your Marriott password should, of course, be the first step to protecting your accounts. Even more importantly, sites where that same password may have been reused should be updated with new credentials too. Hackers commonly try details stolen from one site to access popular services and pages. We encourage everyone to use a password manager to store their details for safe use in the future. A good password manager enables unique, random, and strong passwords to be used with ease for every single website.

While we can’t stop hacks on systems outside of our control; we can defend our other accounts from being accessed by criminals.

With secure password management, attacks on your business services or related accounts from a single hack are made impossible.

Performing Damage Control

The damage to the Marriott International brand following news of the leak will be undoubtedly huge. At a minimum, they have lost the trust of their customers worldwide. Asking customers to leave their personal and financial details again to pay for goods and services will be no small feat.

News of the hack made front page news as it broke, further damaging the firm’s reputation among potential future customers too. As a result of a simple security attack, Marriott International will be forced into damage limitation to keep customers returning to the brand. This is why business security matters to us; when done right it’s cheaper by far.

The total cost of this latest attack won’t be known for years to come. The firm is vulnerable to lawsuits worldwide, in some cases liable for financial losses, and required to purchase identity monitoring and security services for affected customers. Business owners can learn from Marriott’s costly lesson.

Stopping an Attack in its Tracks

Marriott’s security breach was recently discovered, hitting the headlines just this week, but the firm admitted unauthorized access took place since 2014. This means the firm had a security hole for four years that they were unable to detect or patch.

For a firm of any size, this should be unacceptable. As business owners, we shouldn’t accept security vulnerabilities that leave our records, finances, or services open to hackers. As customers, we shouldn’t accept our data being treated so carelessly. The recent Marriott hack underlines the need for businesses to maintain constant network monitoring, regular security updates, and a lockdown on data access.

Protect Your Business and your Customers – Any business can find their systems vulnerable to attack at some point. Whether waiting for updates, a newly released zero-day hack, or malicious employee; responsible firms take steps to limit their liability.

As a rule, staff accounts should be locked to only the systems the regularly need to access. Similarly, customer data should only be open on an as-needed basis when a legitimate requirement exists. These steps, alongside systems and data monitoring, prevent a small-scale attack resulting in an enormous data breach. Strong security enables customers to place and maintain their trust in a brand they can keep coming back to again and again.

If your business could use a security update to protect against a Marriott style attack in the future, give us a call today at 570-779-4018.

zero day business

Protect Your Firm Against Zero-Day Attacks

Protecting your business against the latest IT threats should always be a top priority. Updating antivirus and patching your operating system is a great way to start. What happens, however, when a threat appears at your door before security firms have had a chance to catch it?

A security threat that exploits a previously undiscovered vulnerability in the computer is known as a zero-day threat. The name “zero-day” is designed to imply how long since the vulnerability was discovered. The term also indicates that system developers have had zero days to fix it.

A newly discovered attack might be packaged into a computer virus or worm. This will allow it to spread far and wide while inflicting the maximum amount of damage possible. When spread successfully, a new exploit has the potential to reach hundreds of thousands of computers before an operating system or anti-virus update can even be issued.

There are a number of ways we can protect your business or lessen the damage from a zero-day attack.

Preventative security

The number one way to mitigate the damage from any attack to your system is to prevent it from happening in the first place. Maintaining a good firewall and up-to-date antivirus is the best step you can take to ensure the security of your system.

A firewall, monitoring traffic in and out of your network, reduces unauthorized entry over the network. Even without knowing the exact nature of the attack, suspicious activity traveling in and out of the system can be stopped.

The same is true of modern Antivirus. Even when it can not identify the specific zero-day threat from its virus database; it can often identify malicious intent from learned behavior in the system.

A Locked Down Network

Should a zero-day threat make it into your network, our next goal should be to limit its effects. By restricting user access to only essential files and systems we can limit the damage done to the smallest number of systems. Good security policy dictates that each account should only have full access to the systems needed to complete the user’s job. For example, users from the accounts department shouldn’t have access to sales department databases.

In this way, the damage of a single compromised account is limited to only the network area it operates in. Such limited impact should be easy to control and can be reversed with regular backups.

Good Data backup

Whether your entire network has been exploited or only a small area has been affected; good data backups are your protection against major lasting damage. Having a good backup means having the procedures in place to both create regular backup copies and make sure they can be restored at a later date.

Reliable and well-tested backups are worth their weight in gold. Knowing your data is safe and your system can be recovered is peace of mind against even the most highly destructive zero-day attacks.

Intrusion Protection

While the precise methods of a zero-day exploit can’t be known in advance, a network intrusion protection system (NIPS) can monitor the firms’ network for unusual activity.

The advantage of NIPS over a traditional antivirus only system is it does not rely on checking software against a known database of threats. This means it does not need updates or patches to learn about the latest attacks. NIPS works by monitoring the day-to-day patterns of network activity across the network.

When traffic or events far out of the ordinary are detected action can be taken to alert system administrators and lock down the firewall. Devices such as USB drives and mobile devices can all introduce threats to the network. They can often make it past the firewall because they are physically introduced to the system.

NIPS protects against threats introduced to the network from both external and internal sources.

Full Cover Protection

Used in combination these techniques can prevent, protect, and mitigate against the kinds of threats that even the top security firms haven’t patched yet. We think it’s important to keep your firm secure whatever it might come up against in the future.

If you could use help protect your business against online threats, give us a call today at 570-779-4018.

dual monitor

Increase Your Productivity with Dual Monitors

Conventional wisdom states that cluttered workspaces lead to a disorganized mind. Mess prevents productivity and begins to hamper professionalism. Shouldn’t that apply to the computer desktop too?

The simplest way to clean and organize your digital desktop is to add more space. Just adding a second screen doubles the available room and makes organization a breeze.

Getting work done with a single-monitor setup is a balance of poor compromises. There never seems to be enough space and the little space available is full of clutter and mess. Switching between windows or tabs wastes time and distracts from work to be done. Stacking windows together, side-by-side, or top and bottom wastes valuable screen real estate. The resulting clutter of windows makes it hard to focus on what is important.

While most tasks can be tackled feasibly with a single monitor; two makes the same tasks faster, simpler, and much more enjoyable.

Two Monitors, Many Uses

Data entry with two monitors is far easier than data entry with one. Having source data on one screen, laid out in large type, and the destination on another makes the job a breeze. By eliminating the need to scroll tiny windows or switch tabs, forget and repeat; the same job can be done in a fraction of the time.

Graphic design, image manipulation, and editing are key areas that make the most of a dual screen setup.

Stacking one image on each screen allows you to make quick comparisons to make sure your work is going in the right direction. Organizing your editing space is made simple too. Stacking your tools, menus, and options on one monitor with your image maximized on the other helps to stay focused and finish the task.

Beyond Just Two

Having more than a single screen helps you to track tasks you need to keep on the back burner. A team chat window to keep on top of collaboration, status updates for business-critical services, or the latest stock price. These windows and dialogues can remain open and serving updates on a secondary screen while you keep your work focused on your first.

It is not uncommon for stock traders or financial analysts to maintain 6 or more screens running from a single computer. Many uses this to track various stocks or indices so they don’t miss a beat.

Setup How You Like It

Multiple monitors can be arranged in almost any practical configuration imaginable. While traditionally positioned in landscape orientation, second, third, or fourth monitors are often rotated 90 degrees to portrait orientation.

This setup is used often by software engineers, editors, and users reviewing large amounts of text. The lengthwise orientation allows multiple pages to be read from the screen at any one time.

Multi-screen setups, no matter how they are arranged, behave the same as if all the monitors were just a single screen. Mouse input moves from one monitor to another as if there was no difference between them. From the user’s perspective, there is no difference to how they interact at all.

A Boost to Productivity

There is a scientific advantage to multi-monitor setups too. A survey by Jon Peddie research found that adding an extra monitor boosted a user’s output by as much as 20 to 30 percent.

A productivity advantage of even 10 percent is prized and very hard to come by in the business world. Receiving a productivity reward of over 20 percent for just the cost of adding a second monitor is something few firms can afford to pass up.

The satisfaction of de-cluttering your digital desktop and keeping your focus in the zone is worth it alone.

Give us a call at 570-779-4018 if you would like us to boost your setup by adding a second monitor.