Latest Posts

  1. Server Costs for Small Business: Calculating the Full Cost of Supporting Your Network

    Small Business Server Cost

    Your server is the control center of your business. Choosing the right equipment to support your needs is essential to your business’s success. Security threats to Internet-connected servers should be taken seriously and prevented whenever possible. Depending on your needs, there are many options to choose from ranging in price from hundreds to many thousands of dollars to purchase the server hardware. It is wise to spend some time doing research to determine what your server cost could be. Additionally, you will have to factor in costs for software and ongoing maintenance. Below, we will highlight some server security threats as well as break down factors to consider when selecting your server equipment and the associated costs of maintenance and support so that you can find what’s right for your business.

    Server Threats to Protect Against

    One concern is malware, including viruses and ransomware, infecting a server can lead to data loss, data theft, loss of productivity, and the spreading of malware to your workstations. The two most common ways that networks get infected with malware are users opening malicious email attachments and running outdated software that accesses the Internet – most commonly, a web browser or email client. Emails with malicious attachments and web links can appear to come from family, friends and colleagues whose computers have been infected. These emails will usually take the form of a legitimate email you would receive in the normal course of doing business. Unpatched security vulnerabilities can be exploited to infect your computer by malicious websites.  Outdated antivirus software will offer little or no protection from these constantly evolving threats.

    Another concern is vulnerable software running on the server itself. Most commonly, vulnerable web server software or a poorly built website can inadvertently leave your data exposed. Password protected areas of a website are susceptible to Brute Force attacks where the hacker guesses your password using specialized software. Servers which handle email for your business can also be exploited.  An incorrectly configured email server can allow spammers to use your server to send junk email causing your legitimate emails to be blocked by recipients because of the unwanted messages sent by spammers.

    Pick the Right Server for Your Needs and Budget

    When selecting server equipment for your business, extensive research is necessary to determine what kind of equipment your business will need in order to function the way you need it to. In fact, buying a server is a lot like buying a car – you will have to ask yourself many questions to determine the right kind of vehicle for your needs. Here are some questions to consider when doing your research for buying a server that will meet your business’s needs within the server price range you were aiming for. Without a doubt, your answers to these questions will have a direct impact on the price point for the server equipment.

    • What will the server be used for? How much capacity do you need? Disk space, CPU power and RAM need to be considered. Servers can fill many roles: file server, printer server, mail server, web server, remote access server, VPN (virtual private network) server, etc. Deciding on your server’s role will help you determine the answers to these questions.
    • How many people will need to be able to access the server? The number of users that will be utilizing your server as well as the number of roles your server will fill, needs to be considered as part of your capacity planning.
    • What environment will the server be installed in? Will the server be installed at a data center or in a dedicated server room? In that case, a rack-mount server would be appropriate. On the other hand, a server in a smaller office environment, might share the same form as a workstation (i.e., floor standing).
    • How “bullet-proof”, or robust, do you want/need your server to be? Entry-level servers are very similar to the workstation you may have at your desk with the difference being the operating system they run. Mid-grade and above servers differ in that they feature things like multiple redundant power supplies, redundant cooling, remote management capabilities (see below), multiple network interfaces, multiple CPU sockets, hot swappable storage, the ability to have many storage disks, hardware, RAID, etc. These features will allow your server to keep running even if one of these components should fail. This is essential to keeping your business unaffected by a failure.
    • Do you need to be able to remotely manage the server? Having the ability to power your server on or off from another site offers a lot of other options for the person who will manage your server. These capabilities are not typical on entry-level servers.
    • Have you considered a back-up plan? Another concern might be data loss as a result of user error, natural disaster, theft, fire or some other unexpected event. How would you recover from one of these? Accidents happen. Backing up to tape, disc or cloud are the three most common methods. Each of these has its own pros and cons – Disc-based back-up is the fastest but depending on the amount of data, it can be cumbersome and typically, back-ups remain on site. Tape-based back-up is slower but the use of tape cartridges makes, it more portable and easier to take off-site. Cloud-based back-up is the slowest from a back-up and recovery standpoint due to its reliance on moving data over the Internet. However, it’s completely off-site at all times which can be advantageous and possibly, the safest approach.

    Server Maintenance and Support Expense

    There are several long-term considerations when choosing a server for your business. Again, the server cost will be directly influenced by the choices made.

    • Hardware maintenance – Read the maintenance agreement options from the server manufacturer thoroughly. How long does the warranty last? How much time will it take to have something repaired or replaced? Response time is something you need to consider.
    • Software maintenance – Keeping software up to date and figuring out who will install these updates also needs to be considered. Additionally, there may be day to day software maintenance requirements.
    • Product life cycle – Once a given generation has been on the market for 4 or 5 years, it will be replaced by the next. When purchasing new equipment, you may want to consider when the generation you are purchasing was introduced since you may not have the full life cycle ahead of you. The hardware and software will likely need to be replaced if you expect to continue to receive support for these.

    Server cost depends largely on the size and needs of your business. Servers process and store your data as well as run your applications, so you will want to view them as an investment in your company’s success.  You need to understand the total cost of ownership – what you are paying to purchase, operate, maintain and upgrade. Only then will you be able to make the right choice for your business.

    For more information about server costs for your small business, contact Geeks on site today.

  2. Securing Your Small Business Network: Choosing the Right Router and Firewall

    Best Small Business Router

    Whether you run a small business or a large corporation, network security is critical to keeping the company running. Hackers can cost companies millions of dollars each year and their attack methods are evolving faster than ever. We recommend you plan ahead when choosing your small business router and firewall. As attackers spread and utilize new techniques to access a broader range of computers and devices, no small business is safe without the proper security in place.

    How Firewalls and Routers Protect Your Data

    A router links all computers in an organization together and a firewall declines access to the company network for any unauthorized users who may be trying to steal or compromise your company’s confidential files. This being said, it is equally important to have strong security practices in place for authorized users, such as two-step authentication and having users create strong passwords, updating them bimonthly.

    A properly maintained firewall network for a small business prevents internal and external security breaches. It also monitors what is sent out, blocks unwanted incoming traffic and malicious attacks from malware or viruses, as well as blocks potentially inappropriate websites.

    Types of Data Hackers Seek: What do they want with your data?

    Hackers seek out private information from medical and healthcare organizations, government and military groups, educational institutions and businesses of all sizes.

    The types of data they are looking to find include confidential personal information (social security numbers, full names, home addresses, birth dates, etc.), personal and business emails, industry-specific data on clients, financial data (credit/debit card numbers, authorization codes, etc.) and the list continues.

    In 2015, there were more than 177,866,236 personal records exposed through 780 data security breaches, according to the ITRC Data Breach Reports, to give you an idea of how prevalent this problem has become.

    Hacks occur in every single state in the United States, and the following entities were hit hard in 2015:

    • Businesses: 40% of the data breaches in 2015 with 312 breaches.
    • Educational Institutions: 4% of data breaches in 2015 with 58 breaches.
    • Medical/Healthcare Entities:4% of data breaches in 2015 with 276 breaches.
    • Government/Military Groups:1% of data breaches in 2015 with 63 breaches.

    In 2016, the problem only worsened, and already in 2017 there have been several high profile cyber-attacks, including the IRS twice. In the first attack on the IRS, over 400,000 social security numbers were stolen. In the second attack, student taxpayers’ personal information was stolen.

    It is important to note that small businesses are just as open to these cyber threats as high profile organizations and both need to protect their data by setting up the best router and firewall possible. Whether you host confidential customer information, financial data, medical records or an email database, your data is not safe unless you take the appropriate measures to ensure security.

    The Costs of Being Hacked

    These days, the odds of a cyber-attack on your company are high. Studies show that the average global cost of a data breach is a little less than four million dollars.

    Below is a breakdown of the costs of data breaches by country/region in 2017:

    • United States – over $7 million (highest risk, highest cost)
    • The Middle East – a little under $5 million
    • Canada – over $4 million on average

    The sooner you secure your data, the better.

    Selecting a small business router and properly setting up the firewall for a small business are critical to protecting your company from being hacked. While researching different routers and firewalls for your small business, there a few things you should consider including, what they will be used for, the environment they will be installed in, as well as the price you are aiming for. These factors will greatly depend on the size and the needs of your growing business.

    Geeks on Site can help secure your company’s data with our firewall configuration support. If you need assistance setting up the system or have questions, our qualified technicians can help you through every step of the process. Don’t give hackers a chance to access your confidential information; protect your company today and let Geeks on Site help you with the process.

  3. Printer Problems: Why Your Printer Won’t Print

    Printer Problems: Why Your Printer Won't Print

    It’s safe to say that nearly everyone who has ever used a printer has experienced that moment when it fails – and it’s always at the worst possible moment. “My printer won’t print” is a common issue when people call Geeks on Site.

    Our Geeks are called on daily to assist with the common problems customers experience with their printers. First, we always ask them to check to make sure the printer is on and that the cable has not come loose. After all, it doesn’t hurt to check and eliminate that as one of the possible causes for your printer woes.

    Next, we check to make sure that the printer is installed on the computer using the right driver for that printer. Often, the printer driver can become corrupted and may need to be reinstalled.

    Here at Geeks on Site, we can help you diagnose the nature of your printer problems and get you back to work printing your important documents, presentations, and school assignments.

    Geeks on Site Can Help

    Geeks on Site has a team of highly skilled computer technician professionals who are able to provide you with IT services on your terms –  whether you need a one-time fix or on-going services. We’re here for you.

    All you need to do is call us at 1-888-360-GEEK (4335), and tell us about your needs. We can come to your home or office, or our technicians can access your PC  with our mouse and keyboard. The Internet allows us to interact with your computer as if we were sitting right in front of it! You don’t need to be present while we work. Once we’re connected you’re free to go about your day, or you can watch the technician work on your system and ask him questions via chat. Give us a call right now, we’re here 24/7 at 1-888-360-GEEK (4335).

  4. Remote Technical Support: How It Works and How to Spot a Reputable Company

    Remote Technical Support: How It Works and How to Spot a Reputable Company

    When choosing a company to provide remote technical support, it’s important to do your homework. A remote technology support company should be available to handle your IT issues promptly, with the ability to troubleshoot and repair your equipment from a distance both by phone and by tapping into your equipment. In addition, they should offer you the flexibility of being able to work at your site should you require it.

    When you contact a remote tech support company, they will then ask you to visit a website where you will grant the business permission to access your computer remotely. This usually requires special software that you’ll be prompted to download after granting permission. As the computer owner, you will be able to view the tech’s activities by watching your computer screen. Usually, the tech will run simple diagnostics to see where your issue may exist and will also attempt to troubleshoot to find a way to fix it.

    Spotting Reputable Support

    During your search – and on a daily basis – rely on reputable remote tech support companies that service customers nationwide. These companies have a reputable background as well as a well-established customer service teams that offer quality service that distinguishes them from the rest.

    Word-of-mouth references are a recommended place to start looking for the right remote technology support company.

    Also, make sure candidates have the right credentials for the job – especially the appropriate certifications. These include Microsoft Certified Technology Specialist (MCTS) and Microsoft Certified IT Professional (MCITP). For networking, look for CompTIA Network+ or A+ accreditation. An Apple Certified Support Professional (ACSP) would likely work for Mac shops with complex needs, such as multiple departments.

    They also need to be able to explain tech issues to you in simple terms and be fluent in the languages you speak.

    On the other hand, a reputable remote tech support company won’t do these 4 things to get your attention:

    • Pop-up ads
    • Random phone calls to your house
    • Spam email
    • Websites indicating a virus

    Geeks on Site Can Help

    A FFTU (flat fee tune up) costs $149 and allows us to work on your computer remotely, via the Internet, for as long as we need to, to fix your computer problem.

    A FFTU includes:
    • Adware/Spyware clean up
    • Software Updates
    • Virus protection verification
    • Temporary files cleanup
    • Hard drive defragmentation
    • Startup optimization
    • Virus scan and removal

    Subscription

    If you liked our FFTU service and would like to have us service your computer at any time in the future, you can enroll in our Geeks For Life subscription service. For only $24.95 a month, you can request a FFTU for your enrolled computer at any time. Our subscription service includes, but is not limited to:

    • Unlimited Tune Ups
    • Virus Protection
    • Virus Removal
    • Spam Protection
    • Start Up problems
    • Blue Screens
    • Hackers
    • Software problems

    The $24.95 payments cover you for 30 days, but you can cancel anytime.

    Geeks on Site would love the chance to speak to you regarding our remote technical support. We are confident we can help you solve any issues you may be having. Call us, 24/7 at 1-888-360-GEEK (4335).

  5. Troubleshooting Your Internet Connection: Why You Can’t Connect to the Internet

    TROUBLESHOOTING YOUR INTERNET CONNECTION - WHY YOU CAN’T CONNECT TO THE INTERNET

    In today’s high-tech world, it is hard to imagine getting through the day without using the Internet. Not being able to connect to the Internet is a common problem we receive calls about here at Geeks on Site. Unfortunately, there are many reasons why you might be experiencing problems with your Internet connectivity. Here are some quick tips on what to test.

    • Check your connectivity among devices – Before you begin checking your Internet connection, make certain that the connectivity problem you are experiencing is not actually a device problem.
    • Check that your devices are configured properly – If one or some of your devices are not connecting, make certain that they are properly configured to connect to the Internet via Wi-Fi or whatever other system you use.
    • Check your power source – If there is no connectivity at all among your devices, check your router’s LED status indicators. If you don’t see lights, the router may be unplugged or powered down. Try disconnecting the power cord and reconnecting it after a few minutes. If the power switch is in the on position and the router still isn’t working, you may have a failed power adapter, a faulty power strip or a burnt-out router. If you have cable or DSL, check that your modem is receiving power.
    • Check your cable connectivity – The main cable, which is typically located on the side of your house (and may or may not be within an enclosure), could be compromised. If a cable looks as though it is damaged, replace it.
    • Check your modem and router – Make sure that both your modem and router are functioning properly. First, check that your modem’s power LED is lit and check your Link or online LED along with all activity LEDs. If there is no power or LED activity, turn your modem and router off for a few minutes before restarting. When the modem comes back on, restart the router. If the router’s LED power is on, check the Internet or WAN indicator. This will likely be a green flashing light. Check if your Ethernet ports are flashing. If not, turn the router off and unplug and reconnect each cable – then try rebooting the router.
    • Change the router channel – All routers use one of 14 frequencies, with most of them overlapping except for channels 1, 6, and 11 – which are most frequently used. If your Wi-Fi is the problem, you may have channel interference. Try changing the Wi-Fi channel using the router management console.

    Are you still having trouble with your Internet connection? Have no fear, our Geeks are standing by to provide on-site computer repair or remote support to help you diagnose the source of your connectivity problems. Call us today at (888) 360-4335. We are available for support 24/7.

  6. Computer Doesn’t Boot? Common Computer Errors During Startup Process and What They Mean

    Common Computer Errors During Startup Process and What They Mean

    Here at Geeks on Site, we receive thousands of calls each year from customers whose computers won’t boot or who receive error messages during the startup process. There are literally thousands of messages that could appear when you have this problem so it’s difficult to consider them all. However, there are several common ones that seem to occur often.

    Commn Computer Error Messages

    Common Error Messages

    To help, our Geeks have compiled a list of the most common error messages you might see when your computer stops working during startup.

    • Although this may be difficult to appreciate at the time, you’re in the best position to solve a computer startup issue if you can see an error message because the message provides you with a place to begin troubleshooting.

    First, check your power supply to make sure that you are using the correct one and that the plug is working. Also, check the battery if it is a laptop, as well as its charger. In PCs, check for a blown fuse, which is a common problem, and make sure that the power button is properly connected and working.

    Next, make sure that the problem isn’t something as simple as you having misspelled a DLL file or having written down the wrong characters in a STOP code.

    • If you see a “BOOTMGR is missing” message, which is the most common BOOTMGR message, try pressing Ctrl+Alt+Delete to restart. Usually, BOOTMGR errors include corrupt and misconfigured files, hard drive and operating system upgrade issues, corrupt hard drive sectors, an outdated BIOS, and damaged or loose hard drive interface cables. You also may see a BOOTMGR message if your computer is attempting to start from a hard drive or flash drive that is not properly configured.
    • You may also encounter a “missing or corruptdll” error. This means the file has likely been deleted or moved from its intended location. It could also mean there is a damaged or missing boot.ini file or a physically damaged hard drive.
    • You may also see a “NTLDR is missing” message. You will likely see this message very soon after you first start your computer and just after thePower On Self-Test (POST) is complete. There are a number of reasons why this happens, however the most common one is that your computer is trying to start from a hard drive or flash drive that is not properly configured to be booted from. Other possible causes include corrupt and misconfigured files, hard drive and operating system upgrade issues, corrupt hard drive sectors, an outdated BIOS, and damaged or loose IDE cables.

    If you find you are still having trouble diagnosing the problem yourself, give Geeks on Site a call. We can run a full diagnostic test, identify the source of the error, and help you fix it so it is up and running like new. Give us a call right now, we’re here 24/7 to assist you at (888) 360-4335.

  7. How Does Remote Tech Support work? And How Do I Spot a Reputable Remote Tech Support Company?

    How remote tech support works and how to spot a reputable remote tech support company

    How Does Remote Tech Support Work?

    We’ve all heard about remote tech support numerous times, either from telemarketers or online ads from companies providing those types of services but do we actually know what remote tech support is?

    Remote tech support is based on remote support tools, which are software and IT tools that allow an IT technician to remotely connect to a computer from wherever they may be located. In the simplest of terms, what remote tech support means is that a service provider assigns a certified technician to a customer located in a different place as the provider. Furthermore, this means is that the customer can be located anywhere in the world, and as long as they have an internet connection, a remote tech support agent will be able to help!

    Once the customer has contacted a provider of remote tech support services, like Geeks on Site, a technician will be assigned to them and the customer will pay fixed price for an unlimited time connection unless you already have a monthly subscription plan, such as the ones Geeks on site offers! You will be asked to download a safe and widely used software, which will ask for you permissions, and then will give complete access to the assigned technician. From this point, the certified technician will be able to visualize your computer through his screen as if it were his own, allowing him to control the computer remotely so that he may be able to identify the problem and find a solution for it right away. A customer service agent will be available to communicate any questions or additional projects you would like to share with the remote tech support technician. You will also have the ability to speak to the certified technician via a chat on your shared screen.

    With all that said, what can a remote tech support technician do for you? He can do anything an onsite technician can, unless it’s a hardware issue. Services a remote tech support technician can do are:

    • Adware/Spyware clean up
    • Updates
    • Virus protection verification
    • Temporary files cleanup
    • Hard drive defragmentation
    • Startup optimization
    • Virus scan

    All in real time.

    Reputable Remote Tech Support Companies

    There are reputable remote tech support companies that service customers nationwide. These companies have a reputable background as well as a well-established customer service teams that offer quality service that distinguishes them from the rest.

    So how do we spot a reputable remote tech support company?

    These are some things a reputable remote tech support company won’t do to get your attention:

    • Pop-up ads
    • Random phone calls to your house
    • Spam email
    • Websites indicating a virus

    So what should we look for in a remote tech support company?

    Flexibility – Your remote tech support contact should be at your own pace and consider your network and pay special attention to your data security and backup.

    Subscriptions – Ideally, the remote tech support company you select should help beyond your immediate needs. Look for a reputable company with a subscription plan that takes your budget into account. A monthly subscription is a great idea.

    User Friendly – A remote tech support service provider should translate geek language and into an average consumer friendly language that anyone can understand.

    Up-to-date Technicians – Savvy remote tech support technicians keep up with tech-industry news to know how and when products are updated and evolve. You should assess their knowledge by asking them questions that could help your overall understanding of the current technology scene.

    Credentials – Certifications that matter include Microsoft Certified Technology Specialist (MCTS) and Microsoft Certified IT Professional (MCITP). For networking, look for CompTIA Network+ or A+ accreditation. An Apple Certified Support Professional (ACSP).

    Experience – Always look for a company that has a considerable amount of years of experience that can vouch for their services.

    Reviews – If you are still having doubts, a good choice for a 3rd opinion are reputable sites that showcase reviews, such as Angie’s list. You’ll be able to view their reputation and comments from previous customers knowing that the review is genuine.

    Reputable remote tech support companies do exist, and Geeks on Site is one of them!

    If you ever need to have a remote tech support technician look into your computer make sure to contact us or give us a call right now, 1-888-360-GEEK(4335), we’re here 24/7.

  8. The Petya Virus: What You Need to Know About It and How You Can Protect Yourself

    Computer virus protection for the Petya virus

    The Petya virus has been a trending topic for the past few weeks amongst cyber-crime agencies around the world. The Petya virus has been responsible for an extraordinary number of cyber-attacks spreading all over Europe, the Middle East and the U.S. at an alarming rate. The headcount of affected computers by June 28th was of approximately 230,000 in over 150 countries. In as little as 5 hours from its launch, it had already received almost $7,000.00 in digital currency. This virus has not only targeted ordinary PC users, it has also targeted large enterprises such as: Rosneft, Heritage Valley Health System, Merck, Mondelez, WPP, DLA Piper amongst many others.

    Are you safe from this computer virus?

    There are few known measures regarding the prevention of this computer virus, and one of them is the Avira antivirus. Avira has tested and proven effective as a last line of defense against the Petya virus.

    Aside from using award-winning security software, such as Avira, computer experts suggest keeping all applications and programs up-to-date.

    If you do not have anti-virus protection, don’t think twice about it, contact Geeks on Site.

    What type of computer virus is Petya?

    This malicious software is also known as a “Ransomware”. To those who are not familiar with this type of computer virus, a ransomware is malicious software that holds your computer for a ransom, blocks all access to it (or specifically to its data), and once that ransom has been paid the computer and all its files will be released.

    How does the Petya virus function?

    What the Petya virus does, is it encrypts the computer hard drive’s master file table; it also renders the master reboot record inoperable. This restricts any type of access to your system. It holds hostage computer information such as, file names, size and location on the physical disk. After the mentioned files are encrypted, the computer virus then proceeds to ask for a ransom in order to release files; in this case the most popular ransom is a type of crypto currency (Bitcoin) since it cannot be traced back to its owner or receiver. The victims of this virus are put in an extremely hard situation if they do not have a backup of their files. They either have to pay $300.00 or lose their files forever.

    Where did this computer virus come from?

    It is believed that it originated in Ukraine. The 1st known source was a tax accounting software firm called MeDoc. Microsoft and numerous security researchers mentioned that MeDocs security could have been breached and the virus spread via additional updates.

    How does it spread?

    The Petya virus is like a worm, or better explained, it can self-propagate. The way it spreads is by targeting lists of computers using 2 known methods:

    • IP address and credential gathering:

      Petya builds lists of available computers in network to infect through IP addresses. This usually includes addresses on the Local Area Network (LAN) with remote IPs that are not protected. LAN addresses are a preferred pathway, since they tend to be easier to infect.

      After the list has been built with the initial targeted addresses, what this computer virus does, is it builds a secondary list with usernames and passwords available to use while further infecting these PCs.

    • Lateral Movement:

      As for the 2nd method of spreading this virus, Petya uses something called lateral movement. Lateral movement has 2 variations:

      1. Execution across network shares: This tricky software attempts to spread by copying itself using the stolen credentials from a computer.

      2. SMB exploits: The malware attempts to spread using variations of the EternalBlue and EternalRomance exploits.

    Good news! Avira’s renowned testing laboratory has developed security strength that both detects and blocks these three variations of the Petya virus that are infecting computers both via LAN connections and the Internet.

    For optimal protection, Geeks on Site recommends the Avira & Hitman Pro Combo which not only protects against the Petya virus, but they also run behavioral scans, provides additional threat protection via scan cloud, removes malware, and protects against exploit/susceptible applications. This security package also prevents the high risk of software crashes, slow startup processes and unwanted system errors. Keep your PC protected from the Petya computer virus and future viruses a like with the help of Geeks on Site. Questions? Give us a call right now, 800-672-0685, we’re here 24/7.

  9. Gadgets for Dad: Geeks on Site Top Picks for Father’s Day 2017

    Gadgets for Dad - Top Picks for Father’s Day 2017

    Not sure what to get your dad for Father’s Day? We have lots of top picks for Dad this year – and prices that work for every budget.

    Our top gift ideas for Father’s Day include everything from computer hardware and software to technical support packages designed to make sure your Dad gets the most out of his new gadgets.

    Software

    Avira and Hitman Pro Combo Avira & Hitman Pro Combo
    Give dad the powerful combination of antivirus protection and PC performance booster. The Avira & Hitman Pro Combo runs behavioral scans, provides additional threat protection via scan cloud, removes malware, and protects exploit/susceptible applications. It also prevents the high risk of software crashes, slow startup process and unwanted system errors.
    $69.99

    Printers

    HP Envy 4500 HP Envy 4500
    Dad will be the envy of the neighborhood if you get him the HP Envy 4500. It’s ISO speed goes up to 8.8 ppm for printing in black and up to 5.2 ppm when printing in color. The Envy’s standard connectivity is HI-Speed USB 2 and Wi-Fi 802.11n.
    $179.78
    Epson WorkForce WF 3620 Epson Workforce WF 3620
    The Epson is another excellent choice for any father. It has speeds of 19 ISO ppm for printing in black and 10 ISO ppm for printing in color. In addition, the Workforce can do automatic two-sided printing, copying, scanning and has fax capabilities.
    $214.83

    Tablets

    Samsung Galaxy Tab 4 Samsung Galaxy Tab 4- Apple Tablet
    The latest in tablet technology is always an exciting gift. This Android tablet has a SnapDragon Quad Core processor, 1.5 GB RAM, and a 16GB flash drive. If you run out of memory, no worries, this tablet has expandable memory
    $379.98
    Apple iPad Air Apple iPad Air
    We are certain this iPad will make any father happy. This space grey beauty has an A7 Chip 64bit processor, 1 GB RAM, 16GB Flash Drive, and IOS 7.
    $449.99

    Laptops

    Toshiba Radius 2016 Newest Edition Toshiba Radius 2016 Newest Edition
    In terms of value, it’s hard to beat the Radius. It has an Intel Core i3 processor, 4GB RAM, and 500GB 5400 RPM. This Toshiba comes in Satin Gold and is equipped with Windows 10 and a 6 in 1 Media Card Reader
    $551.84
    Microsoft Surface 3 Tablet Microsoft Surface 3
    The Surface 3 laptop would also be a special gift for Dad. It has an Intel Atom Quad Core processor, 4GB RAM, and 128GB Flash Memory. It comes in black, has DVD+RW capability and is equipped with Windows 10.
    $695.99

    Desktops

    Acer Aspire AZ1 622 Acer Aspire AZ1-622
    The Acer Aspire AZ1-622 has an impressive Intel Celeron N3150 processor, 4GB RAM, and 500 GB 5400 RPM. It comes in black, has DVD+RW capability and is equipped with Windows 10.
    $599.99
    Dell Inspiron i3459-1525 Dell Inspiron i3459-1525
    Even the father who has everything will appreciate the Dell Inspiron i3459-1525. It comes in black, has an Intel Core i3 6th Gen processor, 8GB RAM, 500 GB 5400 RPM, DVD+RW capability and is equipped with Windows 10.
    $789.99

    Service

    Onsite Tech Service Onsite Tech Service
    The ultimate gift for Dad is Onsite Tech Service whenever he needs it for a value-added price. Geeks on Site will send a friendly certificated technician to his home or office to provide support for any computer problem.Geeks on Site is a team of highly skilled computer technician professionals who are able to provide him with IT services on his terms – whether it’s a one-time fix or on-going services. We’re here for him 24/7, and with one quick phone call, on site computer support will have someone dispatched to Dad within 24 hours.
    Standard – $99/hr
    4 Hour Block – $74/hr

    Should you need any help in making the best gift selection for dear ol’ Dad, feel free to give Geeks on Site a call at 888-360-4335. We’re here 24/7 to provide the best support possible and we’d love to wish all the dads a very Happy Father’s Day!

  10. This Mother’s Day, Geeks on Site Celebrates the Mother of All Computer Parts: The Motherboard

    motherboard

    There’s a very good reason that a computer’s central communications backbone connectivity point is called a motherboard: Mothers are considered the heart of every family, which is why we are celebrating them – and the heart of every computer – this month.

    The motherboard is the point through which all of a computer’s components and external peripherals connect so when something goes wrong, it’s essential that the problem is diagnosed and remedied quickly. The problem is that figuring out the reasons why a motherboard is failing can be difficult to diagnose because you have to rule out every piece of hardware connected to it as the cause of whatever problem you are experiencing.

    Symptoms of a failed motherboard include:

    • Motherboard doesn’t Power on Self-Test
    • Leaking or bulging capacitors
    • Your computer doesn’t recognize flash drives or your monitor shows unusual lines
    • Slow boot up
    • Burning smell or burn marks on the motherboard
    • Peripherals stop and start working – or motherboard doesn’t recognize plugged in peripherals

    If you are skilled in trouble shooting computer problems, here are a few areas to check out:

    • Be certain that your power supply isn’t failing by making sure its voltages are operating in line with their rated output.
    • Take a look at the hard drive operation if your files take a long time to transfer, if it takes a long time to boot and if hearing noises while booting, your problem/problems may be related to your hard drive.
    • Check that the video function is operating properly. If not, your video card might be the source of the issue.
    • Run a diagnostic tool, such as Memtest86 or Memtest86+ to check that memory is not failing.
    • Finally, it’s possible (although rare) that your processor (CPU) could be the source of your system’s issues. This can be checked by downloading and running the Intel Processor Diagnostic Tool (if you have an Intel Processor).

    If you have tried these steps, or are unsure about how to go about them to diagnose any potential motherboard issues, it’s likely time to call a professional.

    motherboard infographic

    Geeks on Site Can Help

    Geeks on Site is ready to diagnose any motherboard issues 24 hours a day, 7 days a week. We’re a team of computer technician professionals who are able to connect to your computer, find the issue and fix it for you.

    All you need to do is call us at 1-866-865-6077 and tell us your computer problem. Our technicians will guide you through a series of steps that will allow our technician to access your desktop with our mouse and keyboard. This Internet technology allows interacting with your computer as if we were sitting right in front of it! You don’t need to be present while we work. Once we’re connected, you’re free to go about your day or you can watch the technician work on your system and ask him questions via chat.

    FFTU (flat fee tune up)

    A FFTU costs $149 and allows us to work on your computer remotely, via the Internet, for as long as we need to, to fix your computer problem. A FFTU includes:

    • Adware/Spyware clean up
    • Software updates
    • Virus protection verification
    • Temporary files cleanup
    • Hard drive defragmentation
    • Startup optimization
    • Virus scan and removal

    Geeks for Life Subscription

    If you liked our FFTU service and would like to have us service your computer at any time in the future, you can enroll in our Geeks for Life subscription service. For only $24.95 a month, you can request a FFTU for your enrolled computer at any time during a 30-day period; you can cancel at any time. Our subscription service includes, but is not limited to:

    • Unlimited tune ups
    • Virus protection
    • Virus removal
    • Spam protection
    • Startup problems
    • Blue screens
    • Hackers
    • Software issues

    On site Visits

    We also dispatch our experienced crews to various parts of the country. With one quick phone call, on site computer support will have someone at your home or place of business within 24 hours and provide numerous resources to keep your system safe. Call us to see if your site is within the radius of one of our technician’s service areas. By inputting your zip code into our system, we are able to locate our technicians nearest to you.

    For an onsite visit, you have two options for payment. Our Standard Hourly Rate of $99/hour or our discounted hourly rate of $74/hour if you purchase a 4 Hour Block.

    Questions?
    Give us a call right now, we’re here 24/7.