We hope our blog will help you with your IT questions


  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Categories
    Categories Displays a list of categories from this blog.
  • Tags
    Tags Displays a list of tags that have been used in the blog.
  • Bloggers
    Bloggers Search for your favorite blogger from this site.


Most people in business take for granted that when they turn on their information systems, things just work. It is important to understand that this investment in business support needs to be protected. Before Dolce Vita contracts with a client one of our first tasks is to send the client a brief questionnaire which asks a few important questions about the client. We then meet onsite with the client and review their existing infrastructure. What we find varies, but we often see infrastructure issues which are a root cause of reliability problems. We’ll discuss a few of the most important here. 

Environmental Issues 

Temperature and Humidity – it may not be obvious but servers and computer hardware including routers, switches, printers, perform best and last the longest if they are operated in conditions which are between 60-75 degF and humidity which is in the 30-60% range. In other words, if it is uncomfortable for users it will be harmful to the hardware. And it is important to note that these temperature ranges are 24/7…so offices which adjust their thermostats to 80 degF during nights and weekends can expect to see much lower equipment lifespans. Assume that if the office is 80 degF overnight, that workstations will have internal temps of 110 degF+. Higher temps lead to warping and circuit damage over time. Low humidities of less than 15-20% will lead to static discharge, so server rooms need to have their humidity controlled. 

It is also reasonable to ensure that all workstations, servers, and battery backups are supported off the floor at least 1-2 inches. If a hot water heater or even a toilet fill line leak over a weekend, having all electrical components above damp carpet will avoid numerous issues, even outside of safety considerations. Servers and their battery backups should always be in appropriate racks with electrical and network cabling off the floor and properly secured. 


We take for granted that power will be available…however one of the significant infrastructure issues we see is related to improper protection from dirty power. Dirty power entails not only surges but “brown-outs” in which circuit amperage drops below standards. This is damaging to electronic components over time. 

Servers – any servers should be connected to rack-mounted battery backup which is capable of performing an automated shutdown of servers in the event a power outage is long enough to deplete battery power to a specified point. 

Workstations and all networking equipment – any workstations, switches, routers, wireless access points should be connected to the battery side of battery backups. We commonly find that users connect their workstations to surge-only outlets on their battery backup unit, or that they connect floor heaters, fans, printers to their battery backups. This will overload the battery backup and will cause damage to components. 

Printers – Laser printers will typically have problems if they are connected to a battery backup. In most cases they should be connected to an appropriate surge suppressor. 

It is never a good idea to “daisy-chain” battery backups or surge protectors. Appropriate practice is to ensure that electrical systems are sized appropriately, with appropriate breaker capacities and appropriate numbers of circuits. 


Another “feature” which we periodically see when doing a site survey for a new account is a creative effort to supply a number of network ports from a single network cable. This is periodically seen in older offices which refuse to appropriately upgrade infrastructure in order support growth. It is seen in situations where a single cable feeds to a particular user work area. And found stuffed behind or next to a desk or a chair is a small network switch which feeds to three other workstations, two printers, and a wireless access point. And of course the small switch is not connected to a battery backup. 

This situation creates problems because each time the small switch sees a power fluctuation it resets the connections for all devices connected to it thereby briefly dropping the network connection. In addition the small switch can create major network issues due to its limited ability to properly handle network traffic in a larger environment. 

We recommend for new offices that they build in additional cable plant which tries to account for potential growth as well as additional devices such as printers, scanners, and wireless systems. It costs roughly 25% as much to install cabling during new construction or renovations as it does to later disrupt users, move furniture, etc. Why not do it now instead of save a few bucks now and pay four times as much in 2-5 years? 

If you are planning a relocation, new construction, or renovation call Dolce Vita today at 404-822-7912. We will assist with planning your infrastructure and can make your IT more reliable, more cost effective, and more profitable for your business.


Continue reading
Hits: 86

Posted by on in Information Security

Most of us have dozens of credentials which we use unconsciously…to log into our business network, to check Facebook, payroll, accounting, encrypted email, Dropbox…the list seems endless. But we log in so automatically that we tend to forget what those credentials are protecting. 


Access credentials are a critically important piece of information infrastructure, and in many cases they are one of the ONLY things which separate our critical data from the Internet (and unwanted access by third parties). So let’s play a little game…we’ll ask you for a list of the things you would do with credentials IF YOU ABSOLUTELY WANTED SOMEONE ELSE TO GAIN ACCESS TO YOUR SENSITIVE INFORMATION. 

  • Use a simple password such as password123 
  • Use a short password 
  • Never change your password 
  • Use a password with your name, a child’s name, your address, or your phone number 
  • Place your password on a sticky note and tape it to your monitor, or to be really secure, tape it under your keyboard 
  • Use the same password for Facebook and your accounting, payroll, or tax accounts…or for that matter use the same password for 30 or 40 different accounts 
  • Keep your password in a note on your phone (which is probably not encrypted, nor is it set with a passcode) 


You get the point. So let’s start to fix this… 

  • Assemble a written list of all your credentials – it will need to go in your safe between uses 
  • Mark the credentials which are business critical…these are the ones that if a malicious outsider carefully used them, they could make your life miserable. Think accounting, banking, payroll, taxes, sensitive cloud storage, backups, etc. Make sure that these are changed at least 2-3 times per year, minimum. Make sure that they are changed in the event of any significant staffing change 
  • Try the habit of using a passphrase which is complex, i.e. upper case, lower case, numbers, and special characters, and which is strong (over 8 characters) 



If I love my dog:  iL0V3MyD0G 

If I hunt:  iLiKe2BL@$TPeskyW@bb1t$ 


The key is to use multiple words, associate them with something important to you (to make it easy to remember), and substitute special characters or change letter case in a consistent way (consonants can be caps, vowels lower-case for example). 

  • For unimportant accounts such as Instagram or Facebook usually credentials are not as big an issue 
  • Change your passwords on a regular basis 
  • Remember to NOT use consistent credentials for important accounts. If your Facebook account is the same as your payroll account, if FB is compromised, so are you. 
  • Protect your credentials list carefully, ensure that others cannot access it electronically.
Continue reading
Hits: 231



When Dolce Vita initially engages with a potential new client, we take a hard look along with the management team on the different data repositories the business has in play. This breakdown varies depending upon the business vertical, but some categories are consistent regardless of the type or the size of business: 


- Accounting data 

- Public facing website 

- Email 

- HR 


With reference to email, when dealing with rapidly growing or relatively new businesses, it is common to see them with POP3 email hosted by Cox, or GoDaddy, or other low-cost providers. This can be a solution in cases where there is no need to recover email or when cost is the only item of concern. 


But every client we work with typically wants to improve collaboration, and this means email systems which allow for exceptionally easy sharing of calendars and tasks. We typically lean hard on Hosted Exchange to satisfy these requirements because it offers 99.999% uptime at minimal cost, provides all of the same functionality as on-premise Exchange with fewer maintenance headaches and less downtime.


Clients without IT staff like the ease of use and the painless migration from their current email system, regardless of whether it is on-premise Exchange or POP3 email. They also like the built-in functionality such as anti-SPAM and exceptional security features like anti-phishing which are available for protecting email flow before it arrives on the client site. 


Other features such as backup, archiving, and encrypted email are configured by Dolce Vita, so for environments where security and availability are important, Hosted Exchange is a convenient and cost-effective solution. 

Continue reading
Hits: 277

Startups and small business owners often find themselves frustrated when they try to implement their own technology solutions. Larger firms sometimes face problems their in-house staff isn’t sure how to handle. In many situations, it’s beneficial to hire an IT consulting firm and turn technology worries over to an experienced professional.


Receive Critical Insights


When you work with a professional IT consulting company, you have an impartial resource available to evaluate how your infrastructure is currently set up, evaluate chronic issues and recommend approaches to improve usability and reliability. You’re no longer in danger of missing the technological forest for the trees.


Your business receives professional services and advice. As technologies emerge, your chosen expert can help integrate them into existing solutions. Experienced professionals can often predict future business technology trends and help you position yourself to use change to grow with the pace of technological demands.


Save Money


Hiring an in-house solution costs money, and you may not hire someone with the extensive experience a consultant offers. IT consulting companies deal with a wide variety of environments, and have experience with an array of solutions most in-house hires never deal with. 


Consultants also save your organization because you only pay for your services as you need them. One month you might need licensing upgrades and training on new systems, and the next two months you might not need anything at all. You only receive a bill when you require services.


Free Your Time


Properly utilized consultants manage routine infrastructure tasks. If you currently handle your own technology needs, you are free to focus on your business. If you employ IT staff members, they can work on high-leverage business situations, versus troubleshooting singular issues. 


Improve Data Security


Your business keeps data on your clients, your employees, your finances and more. You’re a target for cyber criminals who would steal that data. IT experts can help you analyze where your business is at risk and develop a plan for keeping data safe.


Dolce Vita IT Solutions provides systems management, data recovery, strategic consulting and more. Contact us to find out more about receiving professional services for your business.






Continue reading
Hits: 340

Ransomware has grown exponentially during 2017, and the trend seems likely to continue in 2018 as well. There are few options available once a ransomware virus has taken over your system. The time to act against ransomware is now. It is important to protect yourself before your system is affected.


Alarming Numbers and Trends 

Ransomware attacks on business increased 36 percent in 2017, with small businesses presenting the biggest targets. Keep in mind this is a 300 percent increase over 2015. Some of the most concerning trends in ransomware attacks were attacks on healthcare related organizations being the fastest growing targets, and that mobile devices are showing signs of being the next channel that attackers zero in on. The odds that your system will be hit with a ransomware attack at some point is almost certain. 


Responding to an Attack 

Once your system is hit, your options for responding are limited, and many Americans simply pay the ransom. Just like cooperating any blackmailer, however, paying the ransom makes it more likely that you will be targeted again in the future. In some cases, it may be possible to decrypt a system that’s been hit by a ransomware attack, but even in cases where the decryption is known, you may still lose some data. The best hope for recovering from a ransomware attack is to have a quality backup system in place beforehand. 


Take Action Now

Most ransomware attacks are not brand-new threats. Hackers recycle old attacks hoping to catch systems that have not updated their software with the latest security patches. Close the known vulnerabilities in your system by staying on top of software updates and keeping your system current.


Emphasize the importance of not opening suspicious emails. Infected emails remain the number one gateway to your system. Make regular reminders a part of life to avoid those emails and forward anything remotely suspicious to the IT department.


Have a backup system in place to recover data from before the infection occurred. Once your system is compromised, having a backup is the only good option for recovery.


By being proactive, your system may weather the crisis of a ransomware attack. The odds are you will take action against ransomware. The only question is whether this action will take place before or after an attack.

Continue reading
Hits: 392