Author Archives for Gavin Mish

Budgeting for your IT Needs – Outsourcing your IT Department

September 13, 2016 8:00 am Published by Comments Off on Budgeting for your IT Needs – Outsourcing your IT Department

  Recent research shows that small and medium sized businesses are struggling to find affordable IT staff with the breadth and depth of experience needed to maintain successful and efficiently working computer systems. Budgeting, therefore, has become a question that we hear all-too-often here at M&H Consulting. Often the question revolves around the problem of finding IT experience that can...


Finding the Root Cause of an IT Problem

September 8, 2016 8:00 am Published by Comments Off on Finding the Root Cause of an IT Problem

Do you ever think you have gotten rid of a computer virus just to find your computer acting the same way as it did when you had the virus? We have all been there. The reason why this happens is usually because you have actually taken care of the symptoms rather than the actual root cause. Because this is such...


How Long Should Your Business Tech Last?

September 6, 2016 8:00 am Published by Comments Off on How Long Should Your Business Tech Last?

  With almost 28 million small businesses in the U.S. currently, these companies are the heart and soul of our economy. One major expense that small businesses need to assess regularly is the cost of the technology to run a successful business. Part of this is knowing when the technology has been outdated or has hit the end of its...


Why your Website May Need a New Design

September 1, 2016 8:00 am Published by Comments Off on Why your Website May Need a New Design

Often, we try to visit a website and find ourselves constantly refreshing the site or waiting a much longer period of time than necessary to upload a page. When this happened, we frequently tend to blame the issue on the computer or Internet network when the issue really lies on the website itself. We have put together some points to...


Protecting Systems from Terminated Employees

August 31, 2016 8:00 am Published by Comments Off on Protecting Systems from Terminated Employees

According to studies, about two-thirds of past employees are still able to access their past employer’s system. How could this be? Well, it seems that many times, when employers terminate or an employee leaves the company, employer’s don’t always think about the many data they have access to and don’t think to involve their IT department in their termination process....


Extending your Wireless Network

August 30, 2016 8:00 am Published by Comments Off on Extending your Wireless Network

We’ve guided you towards the right steps in moving or expanding your network. Now, today we’ll help you in extending your network when its wireless and you need a wider range of wifi. Before we get into the different ways to extend a wireless network, you need to take into consideration the following: your network needs to be placed in...


What is Antispyware?

August 25, 2016 1:19 pm Published by Comments Off on What is Antispyware?

In order to fully understand what anti-spyware is, you must understand what spyware is and does. As we have mentioned before, spyware is a type of malware that can monitor your computer by either tracking the web pages you visit or everything you could be navigating to in order to collect any information available. In order to fully protect your...


Internet Security Myths (Part 2)

August 23, 2016 8:00 am Published by Comments Off on Internet Security Myths (Part 2)

Welcome to the second part of our ‘Internet Security Myths’ series where we highlight myths that have been used to justify why we don’t really need to take further security precautions. Now, let’s continue with the myths… 1.“I don’t need a security system because I don’t access unsafe websites.” It’s true that many websites, emails, and pop-up ads can navigate...


Internet Security Myths (Part 1)

August 18, 2016 8:00 am Published by Comments Off on Internet Security Myths (Part 1)

Many myths have developed over time about Internet security that has been used to justify why we shouldn’t take greater precaution when it comes to security protection. Today, we will be highlighting some of those myths in our two-part series of ‘Internet Security Myths.’ In case you thought this could be irrelevant to you because you’re not “important enough” to...


What’s New with Ransomware?

August 16, 2016 8:00 am Published by Comments Off on What’s New with Ransomware?

Ransomware is a type of malicious software designed to block access to a computer system until a sum of money is paid. It is an access-denial type of attack that prevents legitimate users from accessing files[2] since it is intractable to decrypt the files without the decryption key. The use of ransomware scams has grown internationally. Security software vendor McAfee...


Worst Case Scenarios of Backup Disasters

August 11, 2016 8:03 am Published by Comments Off on Worst Case Scenarios of Backup Disasters

Prepare for the worst, hope for the best.   It is not what business leaders ever want to think about but it is a topic they must consider – worst case scenarios of backup disasters! What do we mean by worst case scenarios? Unfortunately, there is a long list of things that could go wrong and could jeopardize your technology...


Protecting your Technology While on Vacation

August 9, 2016 8:00 am Published by Comments Off on Protecting your Technology While on Vacation

Vacation! You have been waiting all year to kick back, relax and step out of the rat race for a while. You may have travel plans and are finally getting to visit the places you have only dreamed of all year. The last thing on your mind is protecting your technology. While we don’t want to ruin your blissfully happy...