Preparing for the Unexpected

Preparing for the Unexpected

One day last week, after I returned home from work, I sat down on the couch, took off my shoes, turned on my favorite news program on TV, and expected to relax for a while before dinner. Alas! That did not happen. A power outage occurred suddenly, leaving everything in blackness. “Not a problem”, I thought. I have plenty of big candles in the kitchen cupboard.

I groped my way to the kitchen, found the candles, and then started looking for matches. I looked everywhere (in the dark) and couldn’t find a single match anywhere. After bumbling about for the next several minutes, I finally found a flashlight that had workable batteries and sat down to wait it out. I waited a looooong time with a hungry stomach because I also needed a match to light the Sterno under my fondue pot to warm some soup.

Why am I telling you this story? It’s to emphasize that the time to think about possible unexpected issues is to think about “what if’s” before you are caught off guard as I was.

When the weather starts getting wintry again, power outages can happen. The Internet can go down, and computers can crash. When it comes time to reconstruct, without sufficient backup, this process becomes extremely difficult, time-consuming, and expensive.

We’re here to help you with your backup solutions. If you have questions, call us today at 425-672-4806 or email us. You’ll be glad you did!

Marlene

Importance of Updates

Importance of Updates

My daughter was flying in to visit me, and I needed directions to the newly-opened airport in my town. I decided to take a test run a few days before her arrival, so I checked out the address on the Internet and got into my car. I reached into the glove box for my road map and then realized that I had destroyed my road maps when I got my first hand-held GPS unit.

My car is older and does not have GPS installed, so I re-entered my home and got my hand-held GPS. It needed to be re-charged. After the re-charging completed, I again got into my car and proceeded to drive to the airport. The only problem was that my GPS had not been updated and the roads had changed! Of course, I got lost and had to recalculate on my own.

Why am I telling you all this? I want to emphasize how important it is to keep up with updates. Think of all of the things in your business that have been altered by our changing technology. Constant updates (and upgrades) are now needed on POS software, printers, registers, scanners, anti-virus programs, mailing machines, delivery company software, postage, credit card machines—the list goes on and on.

Don’t “get lost” as I did! Make sure that you stay current on all technology that keeps your business healthy, running, and competitive in the marketplace. If you need help, we’re here to answer your questions, give expert advice, and dependable service. Just email us at CCS.

Marlene

Speeding Up Your Computer

Speeding Up Your Computer

Have you noticed recently that your emails are not zipping out rapidly as they once did? Maybe your programs are loading slowly, or documents or pictures take forever to come up. Perhaps your most-used browser just hangs there for a while before doing its job.

It is so annoying when your computer starts slowing down, but it’s useful to know that this will happen, sooner or later, to all computers if some basic steps aren’t taken. There are many reasons why computers slow down, but here are some basic steps that you can take as a starting point to help solve the problem.

Clean out your trash bin. The items you have put there are not removed from your hard drive but kept there so they can be restored if you need them later. Check contents first, then delete those that will not be needed in the future.

Clean out your Temporary Internet Files. If you do a lot of web browsing, information accumulates rapidly here. Close all Internet browsers, open “Internet Options,” then click delete in “Browsing History” section.

Get rid of unneeded programs. Remove all programs that are no longer used, but make sure that you have completely uninstalled them, leaving no application leftovers that will slow down your computer.

Re-organize your desktop. Desktop icons are there to make it easier to navigate your system, but too many files or widgets can clutter your desktop and slow your system. Remove icons that are seldom used.

Keep your computer updated. Hardware, software, and operating system should all be in sync. New updates often have bug fixes that can improve your computer’s speed and performance.

If your business needs to purge files that are no longer needed, we can help you take care of this quickly and safely. Just give us a call at 800/425-672-4806 or email us for professional service that will enhance your business needs. Call today!

Marlene

Tech Support Scams

Tech Support Scams

Lately, I have been receiving lots of pop-up messages on my computer that tell me that something needs to be “fixed” on my computer. The message may say that my computer is running too slow because it has registry errors or someone can “see” my information. Sometimes it tells me that a virus or malware has been detected on my computer. Often, a free “security” scan is offered, or a website is shown that I can access as a way to correct my computer’s “ills.”

The messages usually come from what looks like a legitimate company, complete with the appropriate logo, like Microsoft or Apple. Sometimes free software is offered that I can download, guaranteed to make my computer run faster and better.

Unfortunately, most of these pop-ups are from scammers. They want to convince me that I have computer problems so that they can sell me worthless software, try to enroll me in cheap computer maintenance or warranty programs, or trick me into giving them access to my computer so they can steal sensitive data, like usernames and passwords.

How do I know this? I already have my computer loaded with security protection from trustworthy companies. Some of it is free and some I purchased. I use these software programs regularly to keep my computer safe.

So how do you cope with these malicious pop-ups? Don’t click on messages that look questionable. Never go to an unknown website that is suggested in one of these pop-ups, or call a phone number that claims to be “tech support.” Make sure you are using appropriate, legitimate anti-virus software on a regular basis. And most of all, think before you act when it comes to anything unsolicited that pops up on your computer screen.

If you need help or advice on computer security, we can help you. Our number is 425-672-4806, or you can email us. Be safe, not sorry.

Marlene

PC Cleaners/Registry Cleaners

PC Cleaners/Registry Cleaners

Although I do not advise using these software’s regularly, there are times when they are useful. Over the years I have found that these registry and PC cleaners sometimes cause more harm than good. For example, I have run into systems where these tools are run regularly and have problems installing or re-installing software, some of these programs even boast about cleaning or completely uninstalling software, only to find out it has left the main directory in place preventing the re-installation, or it has left the Windows service installed causing the same thing.

Depending on what you are trying to accomplish with these “cleaning” programs, I have never seen one speed up my PC. The times I do use these cleaning programs is usually after either an infection or failed hardware. But some manual cleaning is always required.

If your PC needs “cleaning” I would recommend using the built-in or downloadable tools from the programs manufacture to clean a program up. Most hard to uninstall software has a “clean up” tool available from the makers to make your uninstallation easier and actually clean your PC.

If you have any support questions or concerns, please contact the CCS Retail Systems support department @800.672.4806 or email us at support

-Bryan

Securing Your Network

Securing Your Network

One of the things that you should do in securing your network, is to limit internet access to only the sites that a particular station needs. For example, a Point-Of-Sale workstation usually only needs to be able to access the internet in order to validate credit and debit transactions. When that is the case, then your firewall should be configured to only let those stations through to the sites they need for authorization.

By limiting the access of those stations to only the card processor site, it prevents users from randomly browsing web sites during slow times. Thus, they cannot be checking their personal email or checking out the latest funny videos. This is not to punish them, but rather to eliminate those common vectors of attack. It prevents those viruses and malware-bearing emails from being read, and their payload potentially being unleashed on your workstations. It also prevents those drive-by downloads from malicious sites, from doing the same.

Obviously, there will be stations that need to access additional sites. However, if these sites can reasonably be limited to just those sites that need to be accessed, they should similarly be limited. It may be possible to limit those stations to only your company email, vendor sites, your store web site, etc. Additionally, those stations should be restricted to use by only those users that need to be accessing the sites that the stations are being allowed access to. Those users should also be trained on what to be aware of when accessing outside sites. In particular, the user or users that are accessing the company email should be trained on how to recognize potential phishing, or other malware, type emails.

Limiting the avenues that expose your network to outside contact, can go a long way towards preventing the network from being compromised. Such limits are often evaluated from the perspective of limiting outside access in. Access restrictions should be evaluated, and restrictions imposed from your network out, as well.

Dave.

Tech Support Scams

Tech Support Scams

Lately, I have been receiving lots of pop-up messages on my computer that tell me that something needs to be “fixed” on my computer. The message may say that my computer is running too slow because it has registry errors or someone can “see” my information. Sometimes it tells me that a virus or malware has been detected on my computer. Often, a free “security” scan is offered, or a website is shown that I can access as a way to correct my computer’s “ills.”

The messages usually come from what looks like a legitimate company, complete with the appropriate logo, like Microsoft or Apple. Sometimes free software is offered that I can download, guaranteed to make my computer run faster and better.

Unfortunately, most of these pop-ups are from scammers. They want to convince me that I have computer problems so that they can sell me worthless software, try to enroll me in cheap computer maintenance or warranty programs, or trick me into giving them access to my computer so they can steal sensitive data, like usernames and passwords.

How do I know this? I already have my computer loaded with security protection from trustworthy companies. Some of it is free and some I purchased. I use these software programs on a regular basis to keep my computer safe.

So how do you cope with these malicious pop-ups? Don’t click on messages that look questionable. Never go to an unknown website that is suggested in one of these pop-ups, or call a phone number that claims to be “tech support.” Make sure you are using appropriate, legitimate anti-virus software on a regular basis. And most of all, think before you act when it comes to anything unsolicited that pops up on your computer screen.

If you need help or advice on computer security, we can help you. Our number is 425-672-4806, or you can email us. Be safe, not sorry.

Marlene

New System Implementation Planning

New System Implementation Planning

Some things that you can do to prevent complications related to new software systems implementation.

1. Verify existing hardware, operating system, and software infrastructure meets or exceeds the minimum requirements for the new software well ahead of time. Update to meet prerequisite beforehand.

2. Read all of the documentation related to the entire data migration process and software implementation process in advance. This allows you to be apprised of any issues that might adversely affect your staff.

3. Plan to have a thorough test migration done well in advance of the intended go-live date.

4. Get proper training on the new software in advance of doing either a test migration or a live migration. Enough time should be allowed between a test data migration and the final go-live date to do testing. Proper testing of both the software and data is critical prior to the final live data migration to get more familiar with the software and proof the software configuration and the integrity of the data migration.

** Testing should include end-users’ replication of normal work processed over several days of live data that was done in their old system. Limited generic test data may not reveal the subtler issues that will be encountered in actual use.

Data migrations can go awry for several reasons, most often these bad situation scenarios can be avoided.

Some examples include …

  • Data Migrations where excessive corrupt historical data is present.

The MIS person for a longtime Counterpoint version 7.5 user did an in-house test migration to the newer NCR Counterpoint software.

This particular company has a long-term policy to never purging history of any kind. At the time of their test, the company MIS person indicated it took him over a month of clean-up work before the migrated data could be considered usable. Further, he indicated that a lot of the corrupt data was related in older history records (and this was especially so with transaction dates). The company had detailed transaction history going back over 30 years. Typically, most retailers only keep around

2 years’ worth of sales history. Unless one has warranty related issues 30+ years of historical data may be excessive.

The migration plan was to start the live upgrade on a future Friday night and be live by the following Monday morning. This approximately 48+ hour time frame would be considered very aggressive even under the best of circumstances. The company required over a month just editing out corruption data from their test conversion. Other issues may arise that make 48 hours to go live difficult to achieve! A less aggressive plan would be a better approach.

  • Trying to use the new software on older hardware and unsupported older operating systems.

This approach can be a recipe for disaster resulting in migration failure with damage to your data.

In one recent example, a business owner copied his current updated software installation onto a really old server that was running an obsolete, unsupported operating system.

The software was failing due to insufficient memory and system resources. Software/operating system conflicts were also corrupting data. When attempting to run file rebuild utilities, and detailed history reports, the performance of the software was made the software functionally unusable. File rebuild operations on the obsolete system took 6 hours instead of less than 4 minutes on the current systems to be used after migration. Reports required similarly took hours rather than minutes as they could have.

  • Indefinite implementation postponement followed by the decision to go live without all of the appropriate parties being adequately coordinated.

A partially complete implementation project was on hold indefinitely. Months later the store was scheduled to go live on a specific date, but this was not communicated adequately to the rest of the migration team. The assumed prerequisite set-up and configuration work required had been not been performed beforehand. This massive amount of work could not be completed with the less than 12 hours prior notice considering it involved a complete redo/reconfiguration of the software and core data before it could be used in any form.

  • Incorrect or incomplete data being provided to tech support people.

Data provided to CCS tech support is imported into a test system for review. If Incorrect or incomplete data is provided it cannot be reviewed and prepared for use properly. On the scheduled go-live date required data may not be found on the system or corrupt data may be missed in the preparation tasks.

Some critical food for thought!

– John

Calling for Support

Calling for Support

Having something go wrong with your system or software is often a stressful problem that costs you time, money, and physical distress. When you need our help, our aim is to give you fast, accurate, and worry-free assistance. We do, however, need a little help from you when you call in for support.

We know that your “hair is on fire”, but it helps us serve you better if you have, at hand, the information we need to get rolling:

  • Your name, and who to contact if a return call is needed.
  • Your company name.
  • Your telephone number and extension, if it is required. Remember that in today’s world, people call from landlines and cell phones, and from many different extension numbers! You may think our tech has your number already, but it may not be the one you’re using now.
  • The location of the store(s) having the problem (many of our customers have multiple stores).
  • A brief explanation of the issue. From this, we can determine who is available and can best handle the problem that you’re encountering. It helps if you can relate what task you were doing when the problem began.

Remember, when speed is essential in getting your problem addressed, it helps to have the necessary information gathered before you call for support!

Marlene

Where’s My Automatic Updates?

Where’re My Automatic Updates?

Over the years I have seen people assume that a software manufacturer, software supplier, or support vendor should be doing something automatically.

Here are some fairly standard examples of things that are most often NOT automatic:

1. Operating System and Security

  • Installation of Windows Security Service Packs – While this can be scheduled for automatic download and installation, by default this is not turned on.
  • Installation of Anti-Virus And Anti-Malware Software Updates

These items may not be configured to auto-download, auto-install, or auto-notify of success or failure. If something in this area is only partially automated, one needs to take care that these processes are not going on while end-users are on the system and using applications that would be affected, especially if a server or workstation reboot was required. As examples:

  • Scheduling windows updates to only download and install in off-hours while users are not logged into servers or workstations.
  • An anti-virus update might be prompting for a computer restart to complete the installation of a specific update. If this isn’t addressed in a timely manner, your systems could be at risk of being compromised.

2. Application Software – Application Software Security Service Packs

  • MS Office Suites
  • Adobe Acrobat Reader
  • Adobe Flash Player
  • Java

There are regular updates for the above applications that should be installed. Failure to do so could result in security holes being present with these applications. While some of these installations can be automated, others cannot be.

3. Application Software Data/Usage issues.

Care should also be taken to make sure that certain updates are not auto-applied especially in situations where there are a lot of customizations.

  • Point of Sale – Sales Tax Rates, which are typically by state, or By Taxing Jurisdictions. The rates should be updated regularly so that the proper sales tax is withheld. While there are some
  • systems that update automatically, some do not.
  • Customers – Taxable Status. If Tax Exempt, the Tax ID number, and expiration dates may need to be updated. Doing this protects you in future tax audit scenarios.
  • Items – Taxable Flags, Item-Based Tax Categories – If tax Flags and item based Tax Categories are not assigned, the result could be incorrect tax amounts being withheld.
  • Payroll – Federal Tax Tables – This includes such things and Social Security and Medicare tax rates, and FUI, 401K Maximums; State Tax Codes – This includes SUI rates; Workers Compensation Rates.

If you have some specific issues or questions, please contact the CCS Retail Systems Support Department.

– John