There was a time when a basic firewall was enough for small office. Lately it has become more of a challenge. We’ve been seeing Macs with malware on a regular basis in offices large and small. It’s time to get serious about protecting Mac networks. Unified Threat Management (UTM) devices are the next step in protection.
Although we’ve been working primarily with Sonicwall UTMs, I finally got the chance to install a Kerio Control Box. They come fully featured off the shelf and the software is intuitive and a joy to use compared to most routers (UTM devices are advanced routers.) Because the interface was so well designed, I quickly found several problems on our network I hadn’t noticed previously.
Yes we can! If your iMac is a few years old and the drive is failing or full, we can open it up and install a new drive. We can even put in a solid state drive (SSD) if you’d like it to run like a rocket. Either way, this can breathe new life in an older iMac for surprisingly little compared to the cost of a new computer. Add RAM and you’re good to go.
Whether you’re looking for an iMac, Mac Mini, iPad, MacBook Pro or anything Apple, you can use the link above to purchase. The linked image will take you to the Apple Store for business and let Apple know MacLab, a member of the Apple Consultant’s Network, referred you.
If you’d like configuration assistance, don’t hesitate to give us a call. This link is meant for those who know what they want or have spoken to us already.
(If you don’t see an image, use this link.)
There are many stages of drive failure and levels of recovery. The first and simplest is directory damage. There’s a file on the drive that keeps track of the location of all other files. This directory can become confused and mis-represent what is on the drive. It can be repaired for minimum cost if caught soon enough.
Physical damage is more serious. Traditional drives consist of spinning “platters” much like phonograph records. Moving parts wear and break down. We’ll remove the drive from your Mac if necessary and retrieve the data carefully. If it needs to go to the next level, we send it to one of our recovery specialists. We partner with the best data recovery companies in the U.S.. If it’s at all possible to get data back, we can do it.
Of course backing up your data is the best practice and we’d be glad to help you with your own personalized plan. Don’t be caught without a backup.
Do you spend too much time writing email? Here’s something I love about Postbox, my favorite email app for the Mac.
Postbox displays a timer at the bottom corner of a new message showing the length of time you’ve spent. After a pre-defined limit, the time will turn red to let you know you’ve past your goal. The default is 5 minutes, which I find perfect. Of course you can keep on typing and pondering since it is just a guide. The timer is smart and pauses if you click to another message or application.
In the other corner is a word or character count (your choice). People tend to read shorter messages so keeping your email succinct has advantages.
For instructions on how to enable and use Postbox composition goals, use this link.
MacLab has been receiving daily calls and emails from customers who have fallen prey in some degree to browser alert scams. These alerts pop up on your screen and tell you something is terribly wrong with your computer and to call “A Certified Live Technician” or “Apple Support.” The error message may be difficult or seemingly impossible to dismiss. Most importantly, do not call the number. The person on the other end will ask to take remote control of your computer in order to “fix” the problem. Once this unknown person has gained control of your computer, your identity and finances are at risk.
We’ve had customers report that the “tech” opened password files and asked for birthdates. At the same time they are asking the customer to pay to have the computer repaired.
Safari may appear to be stuck and not useable after this, the result of the malware. Until you can get it truly resolved, try Firefox.