Carter Tech Blog

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Categories
    Categories Displays a list of categories from this blog.
  • Tags
    Tags Displays a list of tags that have been used in the blog.
  • Bloggers
    Bloggers Search for your favorite blogger from this site.
  • Team Blogs
    Team Blogs Find your favorite team blogs here.
  • Login
    Login Login form
Recent blog posts

Posted by on in Commentary
NSW Fair Trading has issued a warning about SEO servicesThe NSW Office of Fair Trading has issued a warning to businesses about signing up for Search Engine Optimisation (SEO) services without looking into the SEO provider first. Many of these services promise to get you on the first page of Google but often don't deliver - charging hundreds or even thousands of dollars for the service.

Many SEO providers still use archaic methods which worked a few years ago but have little effect today. The algorithms behind search engines have gotten smarter and the old methods simply don't achieve results now - metatags, automated random backlinks and rehashing content. Unfortunately many SEO providers still use these methods that haven't worked since Google's update in 2012.

Today, improving your search rank involves improving your content, ensuring keywords you want to be found under are in text not hidden in images, regularly updating your site and making use of blogs and social media to get your website out there. These are all activities which can be done for just a few hours a week without spending thousands on something which can't realistically guarantee results.
Tagged in: SEO Websites
Hits: 85579
0

Posted by on in How To
Hits: 112893
0

Posted by on in How To
Not so long ago organisations had one of two options for video conferencing with other offices, clients or suppliers - using dedicated video conferencing equipment or using instant messaging applications running on a PC.

Both methods had their advantages and disadvantages - video conferencing equipment was expensive and required a fair amount of space but allowed for good quality calls and supported features like group video calls; while instant messaging was cheap (only needing an Internet connection and webcam) but had poor quality and didn't have features like group video calls.

Today, instant messaging applications like Skype provide advanced features like group calls and provide good video and voice quality. It's hard to now suggest to a SME to spend $5,000 on a dedicated video conferencing system when you can use Skype on a TV for around $1,200.

Any SME needing a video conferencing system can contact us to discuss the best solution for them.


Hits: 66020
0
Every business wants their website to be towards the top of the search listings for the keywords relevant to their business. Being towards the top increases visibility and the chances that a potential customer will visit your website. There are a number of ways in which you can improve your search ranking, but the most effective is to make sure the content on your website is of good-quality and is unique.

Content which is copied from another website will just lower your search ranking as the search engines crawl your site and the site you copied it from will end up with a higher ranking (because someone else is using their content). Why give your competitors an advantage? While it is perfectly fine to look at someone else's website for ideas you should never copy content. You might get ideas on what topics to explore on your site, even rough ideas of layout but these should guide the creation of your own content.

Good quality, original content will not only improve your search ranking but also shows your potential customers that you know your business and know the market. Your website should reflect what your business does, how it does it and why a customer should use your business over someone else's. You want your visitors to come to your site and think "Gee, these guys really know their stuff." Doing so leaves a lasting impression which only helps to cement your business position.

The final advantage of original content is that it avoids legal problems. Material on the Internet is copyrighted and the copying of other's work infringes their copyright in that work. You could potentially end up paying thousands for copying someone else's material in both legal fees and damages. It's just not worth the risk!
Tagged in: SEO
Hits: 87524
0
I have said it literally thousands of times - these days technology is integral to the way we do business. We rely on technology to communicate, find information about products and services, do our bookwork and for our banking. When things fail it can cause significant disruption to your business, particularly if plans aren't in place for dealing with technical failure. This is why it is crucial for information technology to be viewed in light of your overall business strategy.

Many of our new clients come to us after using a computer technician to look after their business' technology. Common complaints new clients have about their former computer technician are that they didn't understand how they operate, they wanted to change how they did their job to suit the computer and they didn't appreciate how important their computer system is to the business.
Hits: 113890
0

Posted by on in Commentary
While the advent of inexpensive external hard drives have made the chore of backing up faster and easier, it has also made some IT people complacent about having proper backup procedures in place.

It's amazing how many times I have walked into a new clients' server room and noticed a trusty external hard drive sitting on top of their server - entrusted with the backing up of their critical data. When asked "Do you have backups kept elsewhere?" I am often met with a blank look or asked why backups should be kept elsewhere.

Would your data be safe if a fire went through your business tomorrow? Are all your backups kept on-site? It's crucial for your backup strategy to include some form of off-site backup - whether it be on a disk someone takes home (no less than once per month) or using an online backup solution. While it is probably more common to have to restore a backup because of system failure or an accidental deletion it is still a possibility that some disaster could affect your business - destroying your premises and any data held there.

Having some form of off-site backup as part of your organisation's backup strategy is critical for every business should the unexpected occur.

Hits: 133099
0

Nearly every business these days relies upon email for both internal and external communication. Email is now commonly used at work, at home and on people's phones. Whether you use webmail, your ISPs email service or your own email system email is more complicated than you might realise.

You may have seen in your incoming email settings on your computer or phone the terms POP and IMAP. These are the protocol (or language) used to communicate with your email server.

Tagged in: Email
Hits: 77057
0

Posted by on in How To
Given the amount of attention in the media on people using other's wireless LANs to access the Internet - leaving the victim with a huge download bill or the Police knocking at their door when someone else uses their Internet to do something illegal it amazes me how complacent some businesses are when it comes to the security of their wireless LAN.

On numerous occasions I have started with a new client and discovered that their last support person/company left their wireless LAN unsecured. The most common reason I am told for this is because "it wouldn't work properly with the key turned on". Instead of fixing whatever caused the network to not work with a security key enabled, they have simply left a gaping big hole in the organisation's network that anyone could exploit.

All the firewalls and security systems in the world won't protect you if your network is open to anyone within wireless range. It's like locking the doors of your car and leaving the window down. Do you really think the thieves are going to jimmy the locks when you have left an alternate way in? Networks are the same.

Not only is having a security key on your wireless LAN important but so is the method of security you use. Having a security key with no encryption is pointless - every piece of information sent over the network can be snooped by someone within range (including the key). Using WEP is a little better, however a WEP-secured network can be hacked in as little as three minutes by someone who knows what they are doing.

To better protect your network, set the security on your wireless access point to WPA2 (or at the absolute minimum WPA). If you have devices which can not use this method of encryption you should check to see if they can be updated or replaced - only if the device is essential to your business and can't be replaced to another that is WPA compatible should you consider downgrading your network encryption to WEP.

After keys and encryption the next layer of security which you can use to enhance your wireless security is to use MAC filtering. Every wireless device has a unique identifier known a Media Access Control (MAC) address. Most access points will allow you to only allow connections from specified MAC addresses (and therefore only devices matching one of those addresses), however this security isn't as valuable as it may appear as MAC addresses can be easily faked but it does provide another layer of security.

No wireless security method is guaranteed to keep the bad guys out, however using WPA2 and MAC filtering will make hacking into your wireless network a little harder. We always suggest that businesses with a wireless network should consider using a system based on 802.1x authenticaation which issues each user with a unique username and password and changes encryption keys on the fly. This provides the best possible security on the network. Keep your eyes out for a new post about why you should use 802.1x soon!
Hits: 12662
0

Every business wants their website towards the top of the search results in Google and other search engines. Being towards the top of the search results allows for your business to be easy to find by potential clients. You may have heard of Search Engine Optimisation (SEO), a process which makes web content more accessible for search engines and searchers.

Many SEO companies will tell you they can get you the #1 position on Google by going with them. These companies are selling false hope as there are no guarantees about where your site will appear in the search rankings. SEO is a science and an art and all you can do is improve your search ranking for your chosen keywords by having a site which is easily indexed by the three major search engines (Google, Bing and Yahoo).

You can improve your search ranking by using keywords that people would search for when looking for a business like yours in your content. Your content should be relevant, unique and concise. Just as your potential customers don't want to see pages of keywords when they click a search result, neither do the search engines - they are looking for content to show searchers.

Tagged in: Online Marketing SEO
Hits: 105770
0

Posted by on in Commentary

Did you know that more security breaches occur on computer systems due to the use of poor passwords than by any other method? A poor password is like leaving your car parked outside the shops unlocked with the keys in the ignition. Why make the job of compromising your system easier?

Common security breaches are caused by either hackers accessing your computer system or from someone inside your organisation accessing something they shouldn't. The risk of these can be reduced by having a good password. A good password is one that is complex but also easy to remember. There is no use having a complex password you can't remember stuck to a sticky note on your monitor (yes, I have seen this before!).

Tagged in: Security
Hits: 17573
0

Posted by on in How To

It's amazing how many businesses don't use their own domain name for their email, instead using a webmail service or their Internet Service Provider's email account. It leaves a far better impression to have an email address like This email address is being protected from spambots. You need JavaScript enabled to view it. than to have This email address is being protected from spambots. You need JavaScript enabled to view it.. An even poorer impression comes from businesses who have addresses like This email address is being protected from spambots. You need JavaScript enabled to view it..

Having your own domain name shows that your business is professional, proud of its brand and wants to be taken seriously. It also allows you to change your ISP without losing your email address.

Your own email address is extremely easy to setup, you purchase a domain name from a registrar and either redirect it to another email address or obtain email hosting. Most registrars will provide email hosting for a small additional fee. Alternatively, if you don't want to setup your own email yourself you can call Carter Tech and we can do it for you!

Tagged in: Email Online Marketing
Hits: 4967
0

Posted by on in Commentary
One of the biggest buzzwords in technology at the moment is "cloud computing". Cloud computing promises to save costs, provide upgrades faster and be easier to manage than a traditional computer system (where files are stored on a file server or your desktop and software is used to access those files).

What is cloud computing?

Despite the hype, cloud computing isn't exactly new. Many of us have been using cloud-based applications for some time without even realising it. If you have ever used webmail like Hotmail, Gmail or Yahoo you have used software in the cloud - your emails are stored on your webmail provider's server and accessible from any internet connected device. Instead of having to have your own IT hardware and software, you can utilise the capacity of others and purchase services to suit your own needs.
Hits: 5015
0

Posted by on in Commentary
Back in February last year, I was fortunate enough to be profiled in the Western Advocate about Carter Tech and my career as a whole. The paper called the philosophy which has guided my work as an IT consultant a "new view of IT" (for those interested in the article, you may read it here).

My philosophy is simple. Technology should support how your business operates without you having to adjust how you work to suit your technology. Your computer system should work for you, not you having to work to suit it. Why then is this rarely the case?

Technology is complicated and despite there being a wide range of products on the market, most IT professionals stick with what they know (or who they have supply contracts with) rather than on what their clients need. This is where Carter Tech is different - we are 100% independent of any vendor and base our solutions on what our clients need. If we need to work with something new, we are happy to learn it, test it and implement it. We see it as part of the service we provide to our clients.

With technology becoming integral to most businesses today it is crucial that technology does not only what it promises but also what you need. There's no use implementing a system which only burdens how you do your work. Our solutions work around you (not you working around it) to make life easier not harder.
Hits: 4414
0