How to Share a Printer through the Network

When considering IT equipment for your business or office needs you will find that a printer is one of the most expensive pieces. Several items that are to be considered include the toner, ink, paper, imaging drums and more. When a user only needs to access a printer occasionally a considerable option would be to share the printer through the network.

So how do you share a printer through the network?

First, you will need to navigate to the Printers and Scanners settings. You can find this by going into the Control Panel to Settings and by selecting Printers & Scanners in the Devices menu sidebar. Another way of navigating to that menu is by navigating to Start > Settings > Devices > Printers and Scanners.

From here you can select the Printer. In this example we will be using the Brother HL-2280DW Printer. Select this printer and go to Manage. From this menu you will select Printer Properties.

From here it will open a Printer Properties window displaying information about your printer, along with other features such as sharing, color management, etc. To share the printer, you must navigate to the Sharing Tab.

Make sure Share this printer is checkmarked and Apply the changes. And there you have It! You can now use that shared printer across the network.

For more information please about how to configure a shared printer through your network please contact Kitsap Networking Services.

Choosing the Right Browser for your Device

With so many browsers how can you decide which internet browser is right for your business? In most cases the best method of deciding would be each internet browser and determine which features are most important for you and your business. Some things to consider when choosing a browser include:

Will it be compatible with my device? While most browsers offer a wide array of compatibility across multiple platforms, like Mac OS and Windows, some are restricted. Browsers like Safari and Internet Explorer are primarily restricted to their base operating system and do not support other operating systems. Meanwhile, browsers like Chrome and Firefox are offered on multiple operating system platforms along with support.

What are some notable internet browsers?

Chrome
Chrome offers many innovative features, plug-ins, along with a sleek design that integrates many Google products like Gmail and Google Drive. Its sandbox design also helps to alleviate the possible hazard of malware infections and allows you to close slow or frozen pages without shutting down the whole internet browser.

Firefox
Firefox scores some serious points when it comes to flexibility and support for extensions. It also makes of system resources meticulously even with many tabs open. Being that is an open source free program it features you with a higher amount of privacy in comparison to other browsers.

Opera
While Opera is one of the oldest web browsers it is based on a Google Chromium system which works on various platforms. Like Chrome, it features many extensions and delivers quick browsing speeds comparable to other top browsers. However, being that it is often overlooked, many websites do not offer compatibility with Opera.

So, there you have it! Some of the best browsers determined by Kitsap Networking Services Team. Let us know if you have a favorite browser that we did not mention, or there are any features in a browser that sets it apart from the rest.

For any questions about internet browsers please contact Kitsap Networking Services.

How to Choose a New Computer

computer replacement 2

Is your computer out of date? Taking its time to logon, slowly loading a website, or an application? Or maybe you are new to computers and would like to join the digital age. It could be time for a new computer!

Although such a daunting task can be complicated and is often confusing with so many options. So how do you decide in a wide array of choices? This guide will assist you through the process.

Step 1: Desktop vs. Laptop

Deciding between a laptop or a desktop computer. If you like being mobile and on the go then a laptop may be more suitable to your needs.  Although a stationary device allows you with the ability to swap old hardware, increased performance and a significantly lower cost.

Step 2: Usage

What will you be using your computer for? Are you using this computer for basic office work? Maybe an intense gamer who likes to stay at the cutting edge? Choosing the right type of computer may depend upon the intended use of your computer.

Step 3: Budget

How much can you afford? While price may be relative to everyone, a perk of building your own computer is being able to budget each part effectively to your own liking. You get exactly what you want for what you can afford. There is also always the option of buying a pre-built computer or a laptop. In which case¸ determining a budget provides you with a practical idea of what kind of computer to purchase.

These are just some of the steps the determine your new computer purchase. It is also important that when you purchase a new computer to create an effective backup. MSP offers the ability to back up at lightning speeds with high availability. In the case you do happen to lose your data, MSP backups are able to retrieve it and have your computer up and running in minutes!

For more tips and tricks on upgrading a computer or questions about our MSP backup service please contact Kitsap Networking Services.

Are you disposing of your devices properly?

We talk about safely disposing of data on hard drives all the time. However, computers aren’t the only things with hard drives. Printers and fax machines need to be wiped clean before being disposed of.

Printers and fax machines must have their hard drives completely wiped clean before being disposed of. These machines often keep copies of the last documents they printed or faxed in their memory. If you do not wipe their memory before disposing of them, you may put sensitive or confidential data at risk. Simply deleting the hard drive is not always enough because remnants of the data may be left behind. At Kitsap Networking we have a server that is loaded with software to properly destroy data on these types of drives before they get recycled.

For any questions about data disposal please contact Kitsap Networking Services.

Are your devices set to download and install updates automatically?

New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

Home computers, laptops, tablets, smart phones, and other personal devices can be vulnerable to the latest threats if they are not frequently updated. Set your computers and devices to automatically download and install operating system updates as they are released. This will ensure that even new threats will not be a risk.

The MSP software we use to track client’s assets has a built-in patch-management suite that downloads and installs updates on a designated schedule. This ensures that your devices stay up to date and protected.

For more information about how to configure your devices to download and install updates automatically please contact Kitsap Networking Services.

How Office 365’s reporting functions can benefit your organization!

How Office 365’s reporting functions can benefit your organization!

Your organization might have Office 365- but chances are you aren’t utilizing all the resources that Microsoft provides! One of the ways you can have a big impact on your organization is through reporting on Office 365 usage.

What kinds of reports are available?

Active Users

Email apps usage

Office 365 groups

OneDrive for Business user activity

OneDrive for Business usage

SharePoint site usage

SharePoint activity

Skype for Business Online activity

Skype for Business Online conference organized activity

Skype for Business Online conference participant activity

Skype for Business Online peer-to-peer activity

Skype for Business clients used

Yammer activity

Yammer device usage

That’s a lot of different reports! Obviously, you’re not going to want to produce regular reports on all these services.

If your organization has simply chosen not to use Yammer, you won’t need to spend time downloading Yammer usage reports. On the other hand, if you’re trying to increase organizational communication, you will want to investigate usage of all your tools for communication—including Email, Yammer, but also Skype for Business activity, too.

Another real-world example can be seen with license reports. With this you can discover how your licenses are being used, by who and what for. You might discover that some of the licenses you are paying for are not even being used.

Proper use of reporting in Office 365 can work provide an abundance of useful data for your organization. For more tips and tricks on reporting in Office 365 please contact Kitsap Networking Services.

Use different passwords for different accounts!

Using the same password for multiple accounts could expose all your accounts following a single security breach. Be sure to use complex and unique passwords for each account.

If you use the same password for multiple accounts, you increase your overall risk. The breach of a single account could potentially lead to the breach of all your accounts, because when a hacker knows your username (or email) and password on one service, he or she will try the same login information on other services.

Instead, use unique passwords for every account you have and change them often. Email addresses, personal banking, web services, mobile devices, and work computers should all have separate passwords.

Protect Yourself from Phishing Scams

What are Phishing scams?

Phishing scams are typically fraudulent email messages appearing to come from legitimate enterprises (e.g., your university, your Internet service provider, your bank). These messages usually direct you to a spoofed website or otherwise get you to divulge private information (e.g., passphrase, credit card, or other account updates). The perpetrators then use this private information to commit identity theft.

What Can I Do?

Be cautious about all communications you receive. If it appears to be a phishing communication, do not respond. Delete it.

Do not click on any links listed in the email message, and do not open any attachments contained in a suspicious email.

Do not enter personal information in a pop-up screen. Legitimate companies, agencies, and organizations don’t ask for personal information via pop-up screens.

 

Transmitting Confidential or Sensitive Information over Email May Expose Data to Risk.

The transmission of confidential, private, sensitive, proprietary, or valuable information through email or IM may represent a significant security risk. Email and IM channels may not be encrypted, allowing anyone to intercept or view this information. If you need to send sensitive data for business reasons, contact Kitsap Networking Services to find out more about transferring data or sending encrypted data.

Safely Dispose of Old Computers

It’s important to erase all personal information from old computers before disposing of them

Simply reformatting a hard drive or reinstalling the operating system does not guarantee the old data is unreadable. You must physically destroy the hard drive or use a special “wipe” program. At Kitsap Networking we use government compliant data destruction software to permanently destroy all the data on each drive.

Contact Kitsap Networking Services for more information and pricing for data wipes.