Call: 252 491 8306
It's not about technology, it's about your business.
Is your business using the latest cutting-edge cloud solutions?

Tips to Keep Your Smartphone Running Smoothly

Smart_phoneSmartphones have become integrated into our daily lives; they are often the first thing we pick up in the morning and the last thing we put down. Dependency on smartphones for communication, personal use and for business is at an all-time high. Just like any device, smartphones slow down over time from use and data. Smartphone prices have dropped over the years, but purchasing one is still an investment. Keeping your current running at optimal speed can save you from having to dish out more money for a new phone.  Use these great tips to keep your smartphone running at top speed to keep you connected to the world.

Back up Your Data: Backing up your data often is always your first line of defense with any smartphone.  Accidents happen and phones do eventually stop working properly.  Having a cloud backup of your information will save you from losing valuable information, pictures and video that is attached to your smartphone.  It is possible to connect your phone to a computer to backup data, but this routine is often forgotten.  Backing up to the cloud at least once a week will allow you to keep your data no matter what happens to your phone.

Take Back Your Phone’s Memory: Just like computers, smartphones have memory management issues.  Information gets spaced across smartphone hard drives and causes the smartphone to run slower. Combat this issue by running a memory manager app .  There are many free apps available that will help defrag your smartphone’s hard drive and give you faster speed on your phone.  Research the app to make sure it is reputable before installing onto your phone.

Close Apps: Open apps are major battery users and take a large amount of space on your smartphone.   Too many open apps causes you phone to crash when using particular apps and drains your battery life more quickly than when these apps are closed. Uploading an antivirus app to your phone can help you manage your apps and close any that are draining your phone.

Delete Unnecessary Apps & Clear Cookies from Your Phone: Do you really need that app you downloaded two years ago to get a free appetizer at a restaurant? If you do not use an app on a regular basis delete the app from your phone to free up space for other relevant apps.

Your web browser on your phone works the same as on your computer attaining cookies when online.  Go into your web browser settings and clear the cookies out to help free up space.

If All Else Fails: Reset your phone to the factory settings.  Be sure that your information is backed up before resetting your phone.  This will return your phone to its settings from purchase.

These tips and best practices can help improve your smartphone speed and reliability. Keep your phone for a longer period of time and keep your money in your wallet!

Guide to malware

Avoid Security Breaches in Your Business

secure-informationThe business world and tech world are intertwined into today’s society and rely on each other to function.  The move to digital business has improved transaction speed and overall operation speed for most companies. Although operations are moving at rapid speed, this occurs at a risk.  Security breaches are becoming a daily worry in corporate offices and are not to be taken lightly.  Recent breaches by large corporations such as Target and Michaels’ have shown the extent to which a cyber-attack can affect a business.  Target’s first quarter reports show a significant loss in profit and many are placing the blame on the Thanksgiving security breach.  Although these corporations may be much larger than your business, the risk is still the same. Implement these tips to help prevent a security breach from occurring in your business.

Conduct a Security Audit: The first step that should be taken is a security audit.  It is likely that you do not realize how much sensitive information is lying around in multiple excel sheets, login notepads and in files. Analyzing what is readily available to those in the company and on unsecured servers is critical.  Make sure logins for former employees are shut down and only required logins are kept. These can be used to outside hackers to gain access to your information.

The rule of thumb is to keep only the needed information readily available. If it hasn’t been used in over six months, do you really need it handy?  This is extremely important for ex-clients. Once any business transactions or contracts have been completed, it is recommended that the clients change the passwords and you move the information to a more secure format.  Be sure that you are also following regulations and compliance for your industry when dealing with secure information.  Be sure to follow industry guidelines and either secure the unneeded information or discard.

Implement A Security Policy: Once all documents have been reviewed, setting up a clear and concise security policy is recommended.  This will set the standard for the entire company and leave no questions for employees.  An environment of accountability will be created and employees will likely follow the policy. This will ensure your business will be maintaining and discarding information properly post-audit.  The process will make future audits move faster as well.

Test Your Security Breach Prevention System: What better way to test your system than by trying to hack it yourself? If you have an IT department, ask them to attempt to enter your data systems without any standard information handy.

Have a Breach Response Plan: As hard as you may try to prevent a breach, there is always a risk that can occur. Have a plan in place in case of this event.  Pick designated staff to gain back control of the data, change passwords and inform any employees or clients that need to be in the know. Gaining control back as quickly as possible is critical.

No company wants the negative response and potential profit loss of a security breach. Implementing these suggestions can help bolster your security and prepare your company in case of an attack. Another suggestion is to hire a third party IT company to secure your information. Contact VBL at 252-491-8306 or at to ensure your sensitive information.

Guide to malware

What Internet Connectivity is Best for Your Business?

internet-connectivityThe internet has taken over daily life and the business world. It is hard to imagine a business today that does not rely on the internet for operations.  Over the last two decades, the speed that the internet provides information has been kicked into hyper drive. This has caused connectivity and speed to become major concerns for businesses of all sizes.  Currently, the three most popular internet connections are DSL, cable internet, and fiber connectivity. Not sure which one would be ideal for your business? Check out the advantages and disadvantages to these connections.


DSL stands for Digital Subscriber Line. This means the connectivity runs through your phone lines at the office and connects you to the internet. The line transmits data back and forth through these lines. DSL is faster than dial-up access (remember the crazy noise of the 90’s) and speeds have improved since it was first introduced over 10 years ago. DSL gives you capability to access the internet without tying up your phone line at the office.  DSL runs through your phone company, so you phone and internet bill would be from the same source. There are also different packages and speeds available, allowing you to pick the speed you wish to pay for.

One of the biggest problems with DSL is that if you are far from your phone company’s central DSL hub, you will likely see a slower performance than if it was just around the corner.  This is something that businesses far from city centers need to take into consideration.  The internet service is tied into the phone line; if phone service goes down for any period of time, you will lose connectivity until the phone line is restored.


Cable internet is connected through your television cable lines at the office. There is no connection to phone lines when using cable internet. Cable internet isn’t affected by distance from the provider and it is much faster than DSL or dial-up. Cable internet has the capacity to run servers and cloud access, which DSL would struggle to maintain. The billing would be integrated into your cable bill and gives you one source for questions and concerns. Cable will cost more than DSL, but the quality of the connection is far better than DSL.

One problem with cable is you will usually be sharing one cable connectivity line with others in the area, residential and commercial.  The more people using these lines at once, the slower your internet speeds may be. This can be a serious issue if you are located in a highly populated area. Again, if the cable line goes down for any reason, you will lose internet connectivity until the cable line is restored.


Fiber connections are carried by fiber optic wires to and from your business. Fiber has some of the fastest speeds in the industry and does not have to have a “power” connection like DSL and Cable.  If the phones and cable go out, fiber will keep working. As more and more businesses and homes purchase fiber, the price is steadily decreasing. Its speed, reliability, and continuing cost reduction are very alluring. The most alluring benefits of using fiber is the SLA. SLA (Service Level Agreement) provides a fixed reserved amount of bandwidth which is always available to your business and the guaranteed uptime if any issues occur. Usually downtime is extremely rare and very short-lived.

Fiber usually needs to be installed by a professional, which can accrue another fee for the business. Fiber is also not available in all areas, so it is best to call an IT professional to see if fiber can be installed at your business. There is a significant price jump currently from fiber to cable and DSL, but the overall performance improvement and reliability often outweigh the price.

Each business is different and determining which connectivity would be best for your company can be a challenge. The experts at VBL can discuss what your business needs are and determine which connectivity will be the most efficient and cost effective for your business.

Guide to malware

How Do I know It Is Time for A New Computer?

time-for-a-new-computerComputers are devices that we use nearly every day whether at work or at home. We depend on them to pay bills, find information and to communicate with others.  Technology has advanced computers so they last a much longer time than in the past, but as time passes, a new computer may be the only option.  Not sure if you need to buy a new computer? Here are some inclinations that it may be time to buy a new computer.

Insufficient RAM/Motherboard Space: Random Access Memory (RAM) helps run programs that you use daily and many of the background programs you don’t think about. RAM helps run programs like anti-virus programs, firewalls, anti-spyware, wallpapers, and necessary system processes. This also includes any programs that you add to the computer.  If you are running many programs that take up a lot of RAM, you may need to add more RAM to your Motherboard.

Your motherboard hosts your ram and keeps your computer running. Many computers have space for you to add more RAM to the motherboard.  The problem is there is only so much space to add RAM and larger motherboards.  If there is no space left in your computer to add these items, it may be time to upgrade.

Graphic Card Speed: Graphic cards help your computer play streamed media on your computer.  Graphic card speed will affect the quality and speed that media is played and can cause issues for many. Some graphic cards use on-board RAM memory; if your RAM is overworked running your programs this can affect your speed. If the computer only has issues streaming media, it is likely your graphics card and can be replaced.  If there is a combination of issues including the card, it may be time for an upgrade.

Old Systems on Computer: If you are running older Windows systems such as XP or Vista it is time to upgrade.  Microsoft ended support for XP in April and will no longer send out patches to fix issues.  This leaves your computer in danger to hackers.  Hackers are creating viruses to gain access to your computer and its information. Although Vista is currently supported, it is likely Microsoft will be cancelling support soon.  In addition, if you are running these older systems it is likely that the computer itself is old and many new fixes will be unavailable to you.

Blue Screen of Death: The computer will start the blue screen of death if the operating system sees a problem that could potentially damage the hardware of information on the computer. There are some things that can be done to extend the life of a computer after the blue screen, but it highly recommended that you search for a new computer. Don’t lose your information because of the blue screen!

There are many components that go into the decision of buying a new computer, but VBL Technologies is here to help. Our expert IT department has started a new residential program where we can help you determine what is the best option for you and your PC.  Feel free to contact us at or at 252-491-8306.

Guide to malware

4 Reasons Your Business Needs to Use The Cloud

cloud-computingThe reliance on technology and instant communication is hard to miss in the business world.  Transactions and exchanges are happening at lightning-fast speed all over the world.  With this increase in productivity, storing and saving information for businesses has caused great debate. Saving information on on-site hard drives is dangerous and can leave your business unprotected.  The answer to these issues is cloud-based computing. Wondering why it is so important for your business to switch to the cloud? Here are three reasons you need to integrate your business onto the cloud immediately.

24/7 Protection: It’s a dangerous world for documents and important information. Hackers are constantly trying to gain access to your information and creating new ways to do this. Backing your information up to a server seems the logical answer, unless your server is on-site. On-site servers can be hacked just as easily as keeping your information on computers. Investing in an off-site server gives you the peace of mind that your information is constantly being protected and your data is secure.

Keeping information on-site is also risky because of natural occurrences.  One fire, storm or flood could potentially wipe out all information.  Off-site backups are critical for the safety of your information.

Easier Accessibility:  This is very exciting for employees on the go.  Cloud computing gives your employees the ability to log in on almost any device and access files for work from anywhere with an internet connection. If an employee is sick or the weather does not allow for workers to come into the office, productivity is still an option. Updates to documents occur automatically to the cloud.  This allows group projects to happen even faster.

Manage Access for the Entire Company: Not all employees need access to all information. The administrator of the cloud can easily create drives which only give access to certain files and documents within the drive. For example, accounting may not need access to marketing files. You can easily create an accounting and marketing drive which separates the information and give access to specific employees while keeping the information on the same cloud server.

Lower Operational Costs: Cloud computing does not require expensive hardware or software on site that has to be replaced. As the name alludes to, your information is in the cloud and goes to large, secure off-site servers in which you pay to use.  Instead of having bulky and expensive devices on site you pay a minimal fee to use these off-site servers, saving your business hard-earned dollars in the long run.

Your business can be up and running on the cloud very quickly with a quick evaluation from our expert team .

Guide to malware

Ebay Database Hacked, Users Urged to Change Passwords

ebayEarly today, Ebay released a statement that their database which included names, addresses, phone numbers, birthdates and passwords experienced a hack. Luckily, this did not include credit card information; this information is kept on a separate, secure database.  According to the statement, Ebay does not believe any information has been used, but there is still potential for illegal use.

The hackers were able to reach this sensitive information by first hacking employee logins and then using these to gain your information. This was first discovered two weeks ago, but the actual hack likely occurred in February and March.

VBL highly suggests that you change your account password. Log into your account and
enter your account settings and edit your personal information.  There you can reset your password, which should secure your Ebay account. If you use the same password on more than one site we also recommend that you change the passwords to these logins as well.

We recommend that you have different passwords for your different logins to make it difficult for hackers to gain access to all your information. Be sure to use variety in your passwords; use numbers and symbols within your password. This is another way to make it more difficult for hackers to gain access to your information.  There are password generators online that can create strong passwords for you to use.

If you are concerned about the safety of your accounts please contact us at or at 252-491-8306.  To read the entire statement from Ebay, click here.

improve computer speed with simple tips

5 Things To Look For In A Managed Service Provider

managed-servicesThanks to the growing demand for instant communication in business, managed service providers are becoming increasingly popular. Most businesses know they need help managing their communications systems but are not sure where to start and what to expect when looking for MSP (managed service providers). Making sure that your business is being provided excellent service while maintaining communication systems is a basic requirement, but your MSP should be providing more.  Here are five things to look for in great managed service providers.

Reduced Operation Costs:  The biggest reason businesses choose managed service providers is to reduce operation costs within the company.  Instead of implementing a break-fix system, managed service providers handle precautionary maintenance to insure that your devices last longer and run faster. This reduces the likelihood of device failure and breaks in the future while reducing operational costs.

Improved device enhancement: Many MSPs provide software upgrades within their contract agreement. If a software program within the contract comes out with a new version, your MSP will install the new version.  This will insure you are up to date with the latest technology and enable your company to run at the fastest speeds.

Flexibility Dealing with Multiple Industries: No company is alike, so each managed service provider should recognize this. A company that has a small staff that communicates primarily through phone calls will not need the same services as a large company that focuses on emails and video conference calls.  Finding a managed service provider that is willing to create a plan specific to your business is critical.

Reduce in-house IT load: If your company has an in-house IT employee or an employee who has taken on this role, managed service providers should reduce the amount of maintenance work this person is performing. Any issues can be directed to the MSP and they will quickly resolve the issue. This enables to employee to focus on other IT pursuits for the business or focus on their actual day-to-day activities.

Be sure the MSP can handle the job: Hiring a MSP that is incapable of handling the workload or company growth can be a serious concern.   Be sure to discuss growth and profit goals with your MSP to insure they will be able to continue to manage your business in the future. Having a company that you can have open communication about your IT goals and cost reduction is ideal.

Finding a managed service provider that can integrate all of the tips above will lead your business towards cost reduction, improved communication and overall growth. Our expert team can create a focused plan specific to your company to attain all of these goals for your business. Contact us at or at 252-491-8306.


Tips to Extend the Life of Your Computer

old_pcNo matter if you are a business with many computers or a residential user with only one, finding ways to extend the life of your aging PC is extremely important.  Although the prices of computers have dropped dramatically, it is still a financial inconvenience when a computer has its swan song. But there are ways to extend the life of your computer that are easy to do from the home or office. Here are some great tips on how to extend the life of your old computer.

Keep the furballs away: Unless you use your computer in a vacuum, it is very likely that there is dust, debris and grime in your computer. This is an unavoidable fact for most computers. This debris can cause hardware to overheat and lead to critical portions of the computer to have malfunctions.   How can you stop this from happening? About every 6 months clean your computer completely using canned air.  Be sure to clear vents on laptops and if you know how to take the casing off your desktop, open it up and use the air (but don’t touch any of the components).

Don’t suffocate your computer: We often kick back and relax on our computers while lying on the couch. Although this is relaxing, you may be suffocating your computer. Not allowing cool air into the vents of a computer can also cause parts to overheat and malfunction.  If your workspace is extremely cluttered, try to give your tower some room to breathe as well.

Protect your computer from malware: Having a reliable anti-virus program is absolutely essential today. With hackers constantly trying to gain your personal information and infecting computers with viruses, turning on the computer can be a game of chance without it. Install an anti-virus program that is reliable and runs checks often for any dangerous bugs.

Use a surge protector: Leaving computers unguarded during electrical storms causes many computers to see their last day. The surge of electricity overpowers the components inside the computer rendering it useless.  It is always recommended to unplug computers from electrical outlets during storms, but if the computer must be plugged in, use a surge protector.

Run disc cleanups and disk defragmentation regularly: This will clear your computer of unnecessary and damaged files causing your computer to run more efficiently.  These programs are located in your start menu.  We suggest running these programs at least once a month.

Implement these tips and your computer will live a longer and healthier life! Concerned about the performance of your computer? VBL Technologies is now offering residential service to those in the Outer Banks area. Contact us at 252-491-8306 or at to have your computer serviced quickly.

New Computer Security Risk: The Internet Explorer Bug

Internet-ExplorerThe Department of Homeland Security and Microsoft have announced that Internet Explorer web browser contains a bug which has not yet been resolved.  This is a major announcement as millions use Internet Explorer on a daily basis.  The bug is affecting versions six through ten, making it particularly dangerous since it reaches across all versions, excluding eleven. The Department of Homeland Security is suggesting everyone use a different web browser, such as Google Chrome or Mozilla Firefox, until the threat has been secured.  This is a big blow to Internet Explorer because of its waning popularity and strong competitors like Chrome and Firefox.

The bug allows hackers to skip security protections in Windows giving them access to your computer. The hack is enabled through Adobe Flash. Disabling the flash plugin within Internet Explorer should secure the web browser, but it is still best to use a different browser altogether for now.  Another suggestion is to run Internet Explorer in Enhanced Protect Mode, but this can disable many of the necessities needed to use the browser functionally.

This attack seems to be isolated, but after other recent infections like the Heartbleed bug and Target’s credit card issues, many are on high alert and don’t want to risk taking chances.  If a fix is not found quickly, this will become especially concerning because nearly all PC computers have Internet Explorer installed.

Microsoft usually releases patches for issues on “Patch Tuesdays” which occur on the first Tuesday of the month. May 6th will be the first Tuesday in May, but it is still anyone’s guess as to when a solution will be found for this issue.

This bug is a major concern for anyone still using Windows XP. Microsoft officially ended support for Windows XP at the beginning of April.  The Heartbleed bug and the current Internet Explorer bug can be extremely dangerous to anyone still running this operating system as there will be no patches released for XP.

Concerned about Internet Explorer? If you have questions regarding how this can affect your business and home computers, contact VBL Technologies at or at 252-491-8306 for more information. Safe browsing!

improve computer speed with simple tips

Prevent Cryptolocker Virus Before it Attacks Your Business

After making its debut in September 2013, Cryptolocker has held thousands of computers hostage in order to rake in millions upon millions of dollars in “ransom.” The Cryptolocker virus is one of the largest and most impactful cryptoviruses to hit the digital world. Its end result is often catastrophic. We at VBL Technologies recently helped a client get rid of the Cryptolocker virus, and we thought it would be helpful to inform others of the danger. Here’s what you need to know about the virus, how to prevent it, and what to do if you get it.

What is the Cryptolocker Virus?

CryptolockerThe Cryptolocker Virus is an intricate virus that gets into your computer, encrypts everything in your computer including files and pictures, and essentially holds it hostage for ransom. A message comes up on your computer screen demanding 0.5 bitcoins or about $300 in return for giving you everything back. It is reported that the mastermind behind this virus has netted hundreds of millions of dollars from users wanting their stuff back. An article about Cryptolocker noted a survey of just over 1,500 UK computer users showed that 3.4 percent of them had been infected with Cryptolocker and 41 percent of those infected paid the ransom.

One of the key factors that make this virus so hard to track is the use of bitcoins. When actual money is paid through online payments, it is easy to track. But with bitcoins, the tracking is very difficult – almost impossible.

How Do You Get the Cryptolocker Virus?

The Cryptolocker Virus hides in the attachment of a phishing email. The phishing email usually claims to be from a known company that is sending important information. Some examples include banks confirming a wire transfer or tracking information from a shipping company. Once you open the attachment (never open anything if you are unsure), the virus goes to work.

The attachment appears to be a PDF file because the file name ends with “.pdf”. For most computer users, PDF files from recognizable and trusted senders are OK to open. However, in reality it’s not a PDF document. The sender has used the Windows hidden extension feature to add the characters “.pdf” to end of the file name.

Once you open the attachment and the virus targets the files it’s designed to attack, it encrypts the files by using a public key. The next thing the virus does is make a record of the file in the Windows registry. The records are kept under the name HKEY_CURRENT_USERSoftwareCryptoLockerFiles. But for most average computer users, the file is very hard to find. From there, the prompt comes up that alerts users their files have been encrypted and the “ransom” demand is made.

Users have about four days to make the payment to get their files back. If they pay the demand, decryption begins. The creator of the Cryptolocker Virus says that there is a private key required to decrypt files and that the key will be deleted if the ransom is not received within the set time. If this happens, all the files will be gone forever. This is why you should always back up your files frequently!

What Can You Do to Keep from Getting It?

Unlike most viruses and malware, the Cryptolocker Virus is hard to stop with antivirus and anti-malware programs. One helpful precaution is to establish a blanket email filtering rule that strips out executable attachments and prevents users from returning these emails to their inbox.

The best way to prevent the virus from taking over your computer is to implement a software restriction policy (SRP) on your computer. SRPs allow you to control or prevent the start of certain programs. They also block executable files from hitting specific user-space areas – areas where Cryptolocker goes to launch.

What Happens if Your System Gets Kidnapped by Cryptolocker?

First of all, if you did not request anything from any company, there is no reason to open an email. Do not ever open any attachment unless you know what the attachment is. It is as easy as that. If you do inadvertently open one, do not try to remove it yourself or you can do even more damage. Instead, consult an IT services company like VBL Technologies. We have experience with resolving the Cryptolocker Virus.

Also, know that copycats are rearing their ugly heads now with similar viruses, so be very diligent in looking at each email before you open one. If you are unsure, just delete it.

Our Trusted Partnerships

Want more info?

* indicates required
Copyright © 2015 VBL Technologies. | All Rights Reserved | Privacy Policy