Tech Support: 7 Deadly Signs You Should Never Ignore
We have all done it, we all ignore some very blatant signs that something is wrong with our computers deferring the call for tech support. We will let it go or find a workaround to push off having to deal with the problem as long as possible. Unfortunately, that often means we put it off until something really bad occurs and we are thrust into a very costly or even devastating situation.
To avoid the risk of a serious emergency for your business, watch for these signs indicating your technology may be in need of professional tech support:
- Regular pop up messages;
- This often includes critical issue like renewing your security software or installing important updates for your operating system or applications, if they not being completed you are vulnerable to security attacks.
- One or more systems are running unusually slow;
- This can be a sign of hardware starting to fail or software corruption.
- Your system regularly freezes up and forces a reboot for no apparent reason;
- You may have a hard drive on the brink of complete failure and the potential for loss of important data if not addressed immediately.
- You face the “Blue screen of Death” or a blank black screen;
- This generally happens with older systems, when disk sectors are failing they can often have difficulty loading the operating system, while it may work when you reboot it is a sign that all is not right and a future catastrophic disk failure maybe round the corner.
- An application closes without warning;
- When a business application closes without warning it could mean you don’t have the latest version of the application or that your operating system is not compatible with the version you are using.
- Your system is making noises;
- Like any electronic device, computers need to be properly maintained and regularly cleaned. Any unusual noise should be looked at right away and can be as simple as a dirty fan or as critical as a failing hard drive.
- Blinking or flashing screens;
- If you experience screen resets in the middle of using applications it may mean your video card or graphics chip is failing and is a clear warning sign that it will fail permanently in the future.
Computers and software are likely one of the most expensive and important assets in your office. Your business cannot run without them. It is critical that you make sure that they are properly maintained and that problems are addressed quickly by a professional tech support.
If any of the seven deadly situations listed above sound like your business or home, you need to call your local Computer Troubleshooter professional tech support right away. They will come to your office and work with you to assess the problems and determine the proper course of action that meet your needs and budget. Remember, even small issues can be a sign of a much bigger problem, so don’t put it off!
Microsoft Internet Explorer has been at the heart of the Windows Operating system as the default browser on most computers since the rise of the internet. With 11 versions since it made its debut on August 16, 1995 it has evolved with the internet.
Microsoft are keen to migrate everyone to the latest version of Internet Explorer 11 and have announced as at mid-January 2016 they will only push security updates and bug fixes to Internet Explorer 11 users currently running Windows 7, 8.1 and 10.
Those utilizing legacy versions of Microsoft’s Internet Explorer (8, 9, & 10) could be exposing themselves to malware and cyber-attacks that not only demolish your computer, but can lead to a slew of other hazards like identity theft.
To ensure security and an agile browsing experience, Microsoft Support highly recommends that users upgrade to Internet Explorer 11.
What’s new with Microsoft Internet Explorer 11?
If you are currently running on a legacy version of the popular web browser and are uncertain as to why you should upgrade, here’s what you can look forward to in Internet Explorer 11.
- Elite web browsing. Even if network speeds are slow, new support enables Internet Explorer 11 preview to have the fastest browsing ever. It also allows network requests to be formulated so information is received at lightning speeds.
- Streamlined navigation. Updates to how information is gathered helps search results feel instant.
- 2D and 3D capabilities. For gaming and other interactive content, Internet Explorer 11 is equipped with the latest Web Graphics Library standards. Internet Explorer 11 also maintains superior security, dependability, and performance.
- Excellent for all screens. No matter the size of the monitor or tablet you have, Internet Explorer 11 supports gyroscope input and display orientation lock. For the extra large screens, Internet Explorer 11 also has side-by-side browsing, multi-monitor support, and high pixels per inch (PPI) scaling.
- Superior compatibility. Internet Explorer 11 enhances compatibility with web standards, and real-time websites. Support has been fully integrated for popular web standards and improvements that forbid older websites from displaying incorrectly.
- Impenetrable Security. Internet Explorer 11 raised the bar on security to defend you, and your devices. Previous versions blocked 85% of malware, but IE 11 now has a 99% block rate.
What are the alternatives to Microsoft Internet Explorer?
On March 17, 2015, Microsoft announced that Microsoft Edge will replace Internet Explorer as the default browser on its Windows 10 devices and will work in tandem with Office 365 products. This effectively makes Internet Explorer 11 the last release, so maybe you might like to try something new & choose other browser providers as your default browser, here are a few alternative you might consider;
- Google Chrome is a freeware web browser developed by Google. It is estimated that Google Chrome has a 58% worldwide usage share of web browsers as a desktop browser. It is also the most popular browser for smartphones, and combined across all platforms at about 45%. It can easily be loaded onto Windows, Mac, Linux, Android, IPhone & iPad. Generally, it is believed that if your use Google as your home page that it runs better with Chrome.
- Mozilla Firefox (or simply Firefox) is a free and open-source web browser. Firefox It can easily be loaded onto Windows, Mac, Linux, Android, IPhone & iPad. It is preferred by many geeks and developers not only due to it open source coding heritage, but it is generally regarded as a low resource hungry alternative.
- Maxthon is deceptively powerful &, stuffed with lots of little features that you would never discover unless you knew they were there. There’s also an option to put the browser in split-screen mode. The browser comes with AdBlock Plus pre-installed, so you’re unlikely to ever be troubled by bothersome pop-up ads or auto playing videos. Maxthon’s trying to position itself as the “cloud browser”, with the option to share bookmarks, password and history from device to device – it has browsers for Windows, Mac, Android, iOS, Windows Phone and Linux. For those who don’t trust big corporations such as Google and Microsoft with such data, it’s another good option.
- The Tor Browser has a simple purpose: to prevent others from tracing your internet activity. It reroutes your internet traffic around a host of volunteer relays across the world, making it incredibly difficult – if not impossible – for anyone to trace the sites you visit back to your individual IP address. It is a derivative of the Mozilla Firefox open-source web browser and works on most devices and can be contained on a USB for complete anonymity. Why might you want to hide your location or identity? Of course, there are all manner of reasons, but there are some pretty strong legitimate ones too, such as whistleblowing from inside an organisation, to avoid having your browsing activity traced by an employer, or to post with complete anonymity on a forum or message board.
You should upgrade your version to Internet Explorer 11:
- How to upgrade to Windows 11. Generally, this upgrade will happen through automatic updates in Windows. However, if automatic updates are turned off, you will need to go to Control panel > Windows update > check for updates.
- How to know what version of IE you’re on. Open browser > click the Tools icon in the upper right > click on, About IE.
If you decide on a different browser:
- Simply search for the browser online then Download the software onto your device, generally once it is downloaded it will ask if you wish it to be become your default browser: Tick or click yes. The next time you access a link to the internet it will use the new browser.
- If this doesn’t happen Open your control panel & check your settings under Internet Options
.Do you need help with your internet browser?
Computer Troubleshooters can help resolve many issues in accessing the internet and fixing the settings and software on your computers. We can also provide recommendations on internet security & network setups to help you get the best performance to reduce the risk of a security breach. Call your local Computer Troubleshooters office today for help and advice or use our locator to find your nearest Computer Troubleshooters location.
The Cryptolocker family of ransomware viruses and look-alikes (CTB Locker, Cryptowall, Torrent Locker, Locker, Locky etc.) are now well known as one of the major causes of data corruption and data loss across the world. Cryptolocker doesn’t discriminate, from the single user to the largest corporate network, it can invade and lock down all data inside the network. Once your data is encrypted you are in big trouble! Data retrieval & Cryptolocker removal is a big deal.
Recently new variants have appeared that are essentially the same Trojan, but are much more effective in preventing Cryptolocker removal & data retrieval. Cryptolocker is propagated via infected email attachments, and via abotnet; when activated, the malware encrypts certain types of files stored on local and mounted network drives using RSA public key cryptography.
The payload hides within an attachment or a link to a website. Once a user opens the attachment or the website link, the virus is activated and promptly goes about encrypting your files (both on the infected machine and on any additional network shares it can find).
Once the encryption process is complete a message, pops up on your screen delivering both the bad news and a ransom demand. Extortion of your hard earned money has begun. Because of the high level of encryption used by the virus, the only way to get your data back is either to pay the ransom or recover your files from last night’s backup. In addition, many extorted business owners have reported that the payment of the ransom does not always get their data back.
How to prevent a Cryptolocker infection?
Prevention – don’t open or click on unsolicited emails
- Educate everyone on the risk of opening email attachments that they shouldn’t. They may receive an email that they weren’t expecting or something may look wrong about it. These emails can also come from a spoofed account that may look legitimate or even appear to be from someone you know. The bottom line is to always be careful when opening email attachments.
- Well known examples include emails from Banks, Police, Postal Services & Government agencies – remember if in doubt don’t open or click
How do you mitigate Cryptolocker risk?
Our Number 1 Tip – Always keep a non-networked copy of a backup of your data by rotating storage media – external hard drives or USB or use a non-synced cloud backup resource.
- Regularly backup important data. Keep it within unconnected storage & rotate storage media.
- Always ensure your operating system and security software is fully updated.
- Consider purchase of a specialist anti cryptolocker tool.
- Consider moving more of your data into cloud storage (not OneDrive or synced storage)
- Block all .exe and .zip attachments at your email gateway.
What to do if you have Cryptolocker?
If you get a Cryptolocker pop up message on your screen it will generally say that all your files have been locked & encrypted, this means the execute file is in progress or finished the encryption. Before you consider Cryptolocker removal you must immediately do the following to minimise impact on your machine and network (it can spread to others on your network)
- If one of your computers gets infected, then immediately disconnect it from the network & shut down the infected machine. You should also shut down all other devices on your network.
- If you have been compromised then immediately change all of your organisation’s network and on-line passwords.
- Disconnect all backups on your network including other non-infected devices.
- Removal all LAN & device connections.
- Call an expert to get professional advice on next steps
Once you have isolated your machine & network, a professional such as Computer Troubleshooters, can do an evaluation of your next steps – checking backups, assess other devices, extent of infection, & the best method of data retrieval.
Once this is done we can determine if we can do a data restoration & Cryptolocker removal – it is a complex process, and in some cases if a backup has not be done properly or the steps above have not been followed it can be a compromise solution, or worse case you may need to pay the ransom. Even if you pay the ransom the Trojan still needs to be removed otherwise it can be reactivated,
Prevention is Key
With this type of threat it is better to “think when, not if”, as the human element eliminates even the best planning. Thinking now about business continuity may save considerable time, expense, and disruption.
Computer Troubleshooters can do an assessment of your business’ computer network. We can also provide recommendations for establishing a strategic approach to cyber security and assist you with a variety of solutions to reduce the risk of a security breach. We strongly encourage you to prepare your business for the threat of a cyber security crime, call your local Computer Troubleshooters office today for help and advice.
Microsoft have announced that all Microsoft Office 365 tenants with less than 150 users will have Yammer automatically turned on in their Office 365 tenant. So along with your standard suite of Microsoft Office products (Outlook, Word, PowerPoint, & Excel) you will increasingly see Yammer icons appearing on your screens. So what is Yammer and how can it be used?
Yammer is an enterprise grade Social Networking platform for businesses, and works similarly to Facebook in allowing online conversations between single users and groups. Yammer can be setup so everyone across your business can access from multiple devices (PC, Mac, iPhone, Smartphones & Tablets) and communicate instantly with groups or other users, this leverages the increasingly integrative cloud capabilities within the core Office 365 product range, cloud applications such as Yammer are fully included in most subscriptions.
Why use Yammer?
Yammer is an integrated communications tool with instant messaging, message posting, group discussions & collaboration that allows security, permissions, & licences. It is controlled by the central admin panel for Office 365, which means you determine who in your organization can use the platform and which groups they can be a member. Unlike Facebook which is a public domain application, Yammer is run as an enterprise grade platform covered by the Office 365 Trust Center with significant privacy & security advantages over public applications.
Yammer is following the huge social shift in communication to online, particularly in the younger generation who have become digital natives with social networking as their preferred method of sharing & nonverbal communication. Many see the Yammer social network for businesses as a way to get work done smarter and faster designed for a generation addicted to social networking. Microsoft say it is a way of “bringing teams together” in a single communication hub reducing email trails, encouraging real time collaboration & feedback.
Users with a license that includes Yammer can start accessing Yammer from Office 365 via the Yammer tile in the Office 365 app launcher or start a Yammer conversation from other Office 365 apps. Existing Yammer users, who are also Office 365 users, can start signing in with their Office 365 credentials, unifying their sign-in experiences
How does Yammer work?
Assuming you have Office 365 you, or your administrator should be able to setup Yammer for your business reasonably easily.
- User Profiles – The Profile is the starting point for each user with settings for basic personal details, contact information, organisational information, password management, and notification settings.
- Groups – Groups can be set up internally for employees to share information, set by the group administrator this could be by department, by project, or all company. Users can be invited to join multiple groups & new groups can set setup reasonably easily
- Internal Networks – Yammer can be set up for both internal & external network communication. The internal (or Verified) network is the main domain that each email is setup against, if all employees have the same domain they can access the full range of Yammer services between internal users.
- External Networks -Yammer allows you to also join external networks that have members outside your organisation (different domain names), they can either be public or privately invited (you request to join), there is a great search function that allows you find external networks which you may like to join (e.g. industry groups or subject support groups)
- Notifications – in settings you can change the notification settings for each group or network, so for an internal group you may wish to see every contribution as it is made and get an daily email summary, while for an external industry network you may wish to get a daily summary as the end of each day. These can be changed by the individual user and generally depends on the traffic & importance the group or network to the user.
Once your User Profiles, Networks, and Groups have been setup it is time to use the application for communication;
- Inbox – just like email or on Facebook the inbox shows all activity or posts to have occurred in your internal groups or networks in a conversational flow with images and comments.
- External Networks – you need to change into an external network to check activity or make a post.
- Online Now – Yammer has a presence function to identify when other people on your internal network are online and able to chat (each profile online shows a green dot).
- Update, Poll or Praise – these are types of comments anyone can make to the group to engage members or participate in conversations.
- Files – Yammer allows files to be uploaded and shared across groups, versions maintained, and stored.
- Search – The search function in Yammer is powerful using both #hashtags and conversational search it allows users to search group history of conversations, files, & topics, ultimately building a knowledge base within each group.
- Icons – once you have Yammer working you will have Yammer icon on your PC Taskbar that shows when you have a message in your group.
- Apps – there are number of Apps that facilitate Yammer on smartphones, iPhone, & Tablets – they all provide notification & user access for contributing on the go. There is an App store for other apps to facilitate specific areas such as awards, suggestion boxes, and milestone reminders for projects.
Do you want to know more about Yammer?
Yammer maybe a great addition for your business & with no additional licence cost as part of many Office 365 subscriptions. Office 365 is increasing the preferred IT platform option for most businesses, we can help with the user setup, data migration, & ongoing administration of the your Office 365 environment, as well as making sure you get the most from the other value added Office 365 services such as OneDrive, Skype for Business, & SharePoint.
Computer Troubleshooters can help you setup Yammer as part of your Office 365 solution and ensure you understand the limitations and recommendations we have around the implementation of these services. Call Computer Troubleshooters today to see how we can get you started with Office 365 and at the same time get you started with Yammer.
Reducing business costs is a “no brainer” win for most businesses, you get the upside directly into your net profit without investing more capital & the gains are ongoing. So in your business, where are the best areas to look for cost savings?
The hierarchy of costs in most business are;
- Cost of Goods – cost of goods sold, distribution costs, inventory holdings and losses.
- Payroll – staff wages, superannuation, annual leave, long service leave, workers compensation,
- Overheads – rent on premises, travel, insurance, car, utilities, telecoms, broadband, & IT systems.
- Marketing – advertising & promotion, printing, postage, web marketing, agency & creative costs.
- Transactional Costs – banks charges, credit card charges, freight.
- Outsource – accountant, lawyer, cleaning, specialist support services.
How to finding cost savings in your business?
While every business is different, as a business owner you can employ the same strategies as large corporates or cost analysis teams use to find cost savings:
- Request Quotes – from existing & alternative suppliers.
- Reduce Investment – seek alternatives to investing in new infrastructure or assets.
- Operations – is there a better or new way to operate to achieve your operations goals?
- Review Business Practices – does your current staff structure match your current requirement?
- Support – internal staff versus external outsourcing.
When performing this task to finding cost reductions, quite often the answers are not available internally. Often external suppliers & outsourcing companies can tell you about alternatives and what competitors have done that might deliver savings to your business.
In our business we call this an “IT assessment”, where we go into a company and look at their current IT setups, review their business practices, assess their operational goals, and then give recommendations.
How to find ICT cost savings in your business?
We recommend the same approach as the generic saving strategies above: here are some examples of how these types of saving can be achieved;
Telephones & mobiles
- Ask you existing supplier for a current contract, approach alternative telco for quotes on mobiles, landlines & broadband; this should be done every 2 years as plans change often, particularly with data allowances growing. Remember to approach the SMB focused channels as they generally have cheaper plans to retail shops.
- Introducing a BYOD (Bring Your Own Device) policy for your business, providing only calls and data to employees this saves contracting phones and tracking devices while the employee get to use their favourite device (iPhone or Android) without you footing the bill.
- VOIP (Voice over broadband) developments have meant that roaming between office, home, travelling, or even overseas can be seamless to the caller – this means your phone number can follow you around and have integrated messaging with email & SMS.
- Businesses can reduce investment by not investing in a physical PABX, but using a hosted PABX which is VoIP enabled. Charges are typically by the seat by the month but with cheaper calls and full PABX capabilities.
- Office 365 includes features such as Skype for Business & Yammer (an internal social media platform) that allows teleconferencing, cheap external calls, internal messaging, and profile tracking that could reduce your external communication & travel costs.
- If you have an external supplier for IT support ask them for a new contract and at the same time seek an IT assessment from another supplier. The key is to compare similar service levels and requirements, at the very least you can be assured you are getting value.
- If you have internal staff managing your IT then you need to compare costs against the outsourced alternatives. Requesting an IT assessment from an external IT support supplier will be enable you to compare costs, remembering internal staff carry at least a 30% overhead component above their wage cost. Internal staff are often not aware of alternatives or may have a vested interest in not recommending substantial changes to IT support & systems.
- The development of Cloud Computing has meant that many SMB’s can change business practices & IT structures by shedding internal IT staff, reducing internal IT infrastructure, and outsourcing the remaining support requirements with savings of up to 50% of costs.
- Switching from internal infrastructure to hosted infrastructure, such as Office 365, can save you on the substantial initial capital investment for hardware & licences. It can also provide flexibility for future growth/decline, plus you save on running costs for rent, air conditioning, electricity, and on premise support that is a necessary part of having an on-premise infrastructure.
- Cloud hosted systems such as Microsoft Office 365 offer great flexibility & save time for staff to access email and data while not in the office (in fact it can be accessed from anywhere around the world), & from multiple devices. This can only be delivered securely by the centralised Office 365 portal developed for remote management & administration of business accounts.
- We often find that some companies just use their main business application vendors support desk for general IT support. This can be a very expensive approach to IT support – we recommend splitting applications vendor support from the general IT on premise & user support, this can again save up to 50% of the general IT support costs.
Reducing business costs is great way to improve your businesses bottom line, but it does require a focus on seeking alternatives to current operations and structures.
Call us for an IT Assessment to help find cost savings & reduce your IT costs?
So there are few ways you can drive more savings from your ICT. Ultimately for business we recommend giving us call so we can make a time to discuss your needs and put together recommendations on how we could help your business save ICT costs.
Let the experts at Computer Troubleshooters work with you to assess your IT needs and develop a customized plan for your business to reduce your costs. Give your local Computer Troubleshooters office a call and one of our computer professionals will be happy to help you
Microsoft Office 365 continues to dominate the space for a small business suite of office applications. As a cloud hybrid licence it offers the scale benefits of corporate grade email & the Microsoft office suite, without the upfront capital requirements of a Small Business Server environment. According to Microsoft, Office 365 Setup, Migration & Support can be taken on by the technically literate person without the specialist knowledge required for a server implementation.
So can Office 365 Setup, Migration & Support actually be undertaken as a DIY project in a Small Business with limited IT knowledge & experience?
A typical Small Business IT Environment
As someone who is not a technical expert, but who is technically literate I embarked on testing this DIY theory for myself. My partner has a small rapidly growing business with four staff, and they were looking to avail themselves of all the benefits that Office 365 can offer.
The business is run from multiple offices (mostly home offices). Increasingly the business needs access to data and email services on the go from multiple devices such as laptops and iPhones. With a cloud hosted application database system, and Xero as their main financial and CRM system they have been on their way to the cloud for some time. They already use the basic Microsoft Office 365 products such as Outlook, PowerPoint, Excel, & Word on a continual basis and would like to share files between all the staff as they have clients who interact regularly with different staff and orders. Increasingly this has meant sending files to each other, and as the business is growing they have also found they need to cover for each other when staff are away or unavailable.
Their current IT environment has meant they often have trouble letting clients know when they are away or travelling, and often they have trouble identifying the latest version of files to use as the business has become more complicated. The existing laptops were due for upgrading being over 3 years old, and they were increasing worried that if they lost or damaged a laptop that all the information, files, setting and knowledge would also be lost. As the owners of the business they had their own phones but didn’t want to provide iPhones to the employees. Additionally every time they travelled (particularly overseas) or were on holiday they had issues sending emails.
Office 365 is the answer?
In the past the solution would have been to install a Microsoft Small Business Server to the local network. These servers had exchange email, shared calendar and contacts, file sharing and remote access capabilities. Small Business servers were expensive in terms of initial hardware, licensing and implementation costs, and on an ongoing basis, IT support, maintenance and power consumption also weighed heavily. Additionally, considerations needed to be made for physical space and air conditioning, wiring/cabling etc.
Nowadays Microsoft Office 365 is the answer, with all these functions, but without the large capital expenditure expenses or the need to setup locally. Of course, now you pay a monthly subscription to Microsoft to provide the back end hardware, software and infrastructure in their Australian data centre.
Office 365 Setup
Office 365 can be setup through a number of channels in Australia and New Zealand. Options include direct with Microsoft or through authorised Cloud Service Partners like Computer Troubleshooters who are typically used to provide implement and support Microsoft hosted services.
Licences – You need to learn & understand the licencing structure to determine which plan is right for each of the users. Bear in mind that you can have different users on different plans depending on their usage. So you might have one user who users all the Office products, and some who just need email.
Subscriptions – You need to buy & provision the Office 365 licences, this is generally transacted over the web but you need to be careful if you are buying a by the month or annual plans (general the annual plans have a small discount). You may also be asked to buy an annual licence, but pay monthly.
Administration – Once your domain has been setup with Office 365 it is relatively simple to set up each user in your admin account. The admin account is the central hub of Office 365 that sits over the top of each of your user accounts & allows you to do all the configuration at a domain level. This includes password, collaboration, profile & user management that is the heart of servers.
DNS Management – You need to change your DNS settings with your domain provider. Office 365 provide you with the DNS setting changes that you need to put into your current domain providers portal to direct emails to the Office 365 host. In my case this took a couple of hours before the change was done by the provider.
Download & Profiles – Once each user is setup by the admin & the DNS change is made, the users can then setup their account of their own hardware just by downloading the software direct from the Office 365 hosting site. They can setup a new profile for Office 365 or integrate Office 365 into the existing profile, this is probably one of the most confusing areas that can take some time to resolve. This software can be downloaded by the user to a maximum of 5 of the user’s devices (PC, Macs, smartphones or tablets). Usernames and passwords associated with each user will of course be needed for the download.
Office 365 Migration
The migration of existing data, files and setting will depend on the current IT environment
- A server to Office 365 migration requires movement of all data & user profiles to Office 365, these need to match correctly with passwords and user profiles for a smooth transition. The data migration will depend on each user’s data size, but typically the migration of a large mailbox may take a few hours. The big difficulty is that in the interim, emails may be lost or not received.
- A pop email migration is fairly simple, as the data is on the user’s laptop, so that the data can be simply held on the same machine and the office 365 profile directed to the exiting email store.
- Files will depend on where they are currently stored, but can be moved to OneDrive or SharePoint once the account profiles are setup.
Overall migration is really a factor of how much data is being migrated and where it is currently stored, remembering that with Office 365 you are effectively transferring the data store to a data centre so it needs to transferred via your internet to seed your account. Just be aware that you need to understand your broadband data allowance and the effect on data speeds that you may encounter during the migration.
Office 365 Support
If something goes wrong support is a major issue – understanding the role Microsoft support plays in helping with office 365 deployments should you encounter an issue you don’t understand. SLA Critical & Urgent incidents where they are responsible is fairly prompt, calls are answered within one hour and update provided very 2 and 24 hours respectively. However, issues raised as important or advisory are updated every 72 hours or as decided by Microsoft. So experiencing an issue during migration it will be difficult to get prompt Microsoft support.
Office 365 – My DIY Experience
My experience in getting Office 365 fully functional is fairly positive I managed to get all 4 users setup over 2 days & get all the niggling issues sorted over the following days. Although I later discovered that by default Office 365 was rejecting the forms from their WordPress website for over 2 weeks. The disruption to the business was minimal although getting non-technical users setup with both laptops and mobiles was difficult to the extent they all needed to visit the office to get setup. The time did include formatting 2 new laptops and setting them up. We did lose emails in cutting over for a few hours.
The end result is that I estimate I took me around 6 hours per user to get everything working 100%. When I sent this information out to the Computer Troubleshooters group they laughed. In general, they charge for about 2 hours labour and have tools that automate much of what I did manually. Some tools they use do the migration before the cutover, so that when a user sets up their profile the data and setting have been pre-provisioned, so no business interruption in encountered and they can do the migration at night over weeks so there are no data slowdowns during business hours.
Office 365 – My Recommendation
My experience suggested it takes about 6 hours per user to manually setup, migrate and then tweak Office 365 for a small group. That said I do work in IT Marketing and have used Office 365 in my business for some time so I did start with an advantage. If you are not good with IT, I would definitely get an expert to do it.
The bottom line is most business people earn more in 6 hours than they would paying an IT expert 2 hours in labour, & that is not taking into account the niggling WordPress issue that was solved by the Computer Troubleshooters guys.
So if you are thinking of setting up & migrating to Office 365, at a minimum I would get a quote from an IT expert to see if the trade-off is worthwhile. Most expert Office 365 guys will give you a quote to compare. Even if you try yourself and get stuck you have a good idea for the alternative should you need help in a hurry.
Office 365 – Office 365 Setup, Migration & Support outsourced
Computer Troubleshooters can provide professional IT services to your business to provision and administer Office 365 environments as needed. Office 365 purchased through a Cloud Service Provider like Computer Troubleshooters is at no additional cost to purchasing through Microsoft.
Let the experts at Computer Troubleshooters work with you to assess your IT needs and develop a customized plan for your business. Computer Troubleshooters can manage your IT services and you can manage your business. Give your local Computer Troubleshooters office a call and one of our computer professionals will be happy to help you.