Sometimes that second-hand PC, tablet, laptop or server, can seem an irresistible bargain.
Let’s be clear, sometimes buying IT equipment second-hand can be extremely cost-effective. Of course, just as when you’re purchasing anything else that is pre-used, you need to be sure it is in great condition or you run the risk of buying yourself trouble. Read More
“If you have reason to believe that you have an IT virus or that your system is being ‘hacked’, you need to take fast and effective action to protect your interests. A list of recommendations is given below but always contact an expert asap. “ Read More
Leaving aside the horrific thought of an electromagnetic pulse (EMP) from a nuclear explosion, your IT infrastructure probably isn’t massively at risk of total devastation due to electromagnetic radiation.
Even so, many IT system components can be very vulnerable to a number of different forms of what we can crudely here call ‘interference’. Read More
“Just like any other activity involving focusing on something close to your eyes for extended periods of time, working on a computer screen can in some cases lead to eye strain. Here are a few tips that may help to reduce the severity or avoid it altogether. “
One of the oldest and most debated topics in health and safety relating to Information Technology is that of eye strain. Read More
Professional and personal identity theft is a growing problem.
Here are a few top tips from Server Sentry as to how to go about helping to avoid it.
When you are purchasing Information Technology equipment, if it is new it will normally come with some sort of manufacturer’s and/or retailer’s limited period warranty.
There is though a fair chance that you may find yourself on the receiving end of attempts to sell you one sort of extended warranty or another. Read More
True, New Year’s resolutions are easily made and equally easily broken.
Yet here at Server Sentry we make no bones about the fact that we believe many companies underestimate just how exposed to fraud and malicious activities their Information Technology infrastructure really is. There are two ways you can learn that lesson – one being to do something in advance or the second waiting until you have been the victim of such a problem and then to do something about it. Read More
You might be surprised if not shocked to discover just who has access to your IT equipment when you are not around.
It’s a strange thing but many companies have very strict policies about which of their employees can actually touch some of their key systems. That certainly involves who can use on-site file servers and so on.
The objectives there are usually twofold.