Welcome to Systech Systems and Services

Systech is an IT and networking company serving small and medium sized clients. We understand the importance of bridging business needs with technology solutions at an affordable cost while maintaining professional integrity. In the world of IT, discover how Systech is the one local source for all your technology needs.

Systech offers many different services that fit your business needs. Click any of the following to learn more...



Affordable network preventive maintenance program


Network Services

Review, configure, install, and support


Cloud Services

Web hosting, email, and data backups


Web Design

Expert, informative custom designs



Hardware and software products to meet your business needs


Office Relocation

Pre- and post-move assistance for networking infrastructure

Fact or Fiction

Having three different types of antivirus software gives me three times the protection.

True       False

False.   This will likely slow down your system. Antivirus programs run in the background on your computer. Malware also runs primarily in the background. Often one antivirus program will detect another antivirus program and attempt to disable it, not knowing it is legitimate software. It is most effective and efficient to install and run only one antivirus program.

Having antivirus software on my system means I am safe from getting a virus.

True       False

False.   Antivirus software must detect both old and new malware. For malware that has been found and identified, a signature code is used for future detections. For new malware, the antivirus program must rely on key characteristic monitoring to detect and shutdown new infections. This “in the wild” method of detection is not perfect and new or re-written malware may get by even with the most up-to-date antivirus.

It's always obvious when a computer is infected with a virus.

True       False

False.   There are many different types of malware infections that stealthily run on systems. Keyloggers, rootkits, and Trojan Horses will typically run undetected by the average user. Unfortunately, in the background, these infections are stealing passwords and account information, tracking your internet activity, and sending out spam from your PC. Running periodic, in-depth, full-system virus scans will help to detect and shutdown many malware infections.

Web sites can encrypt your information during transfer so only the intended viewer can read it.

True       False

True.   When you look at an address bar, most websites will begin with “http:”. “http:” is the standard for most websites, however more and more websites are adopting “https:” because this allows for secure data transmissions between you and the web host. This means whenever you send information to a website that has “https:”, the data is being encrypted and no one can eavesdrop on what you are doing. This is an extremely important feature to have when using public Wi-Fi.

Apple products are immune to viruses.

True       False

False.   Apple’s OS X is susceptible to viruses just like any other operating system. While Apple has claimed immunity for quite a long period of time, users have been seeing their fair share of vulnerability. In April of 2012, more than 600,000 Apple computer owners were affected by a trojan virus outbreak. You can read more about this malware attack by clicking on the following link: https://www.businessweek.com/articles/2012-04-12/apple-delays-hackers-play

Some computer problems can be solved by restarting your computer.

True       False

True.   If your computer ever experiences random program crashes or a drop in performance, the first thing you should do is simply reboot you computer. Although a reboot won't fix everything, it can be the solution to many smaller problems. The reason a reboot works is that it resets everything on your computer to a clean “boot-up” state. Sometimes an application won't close properly, and can “clog” system memory. A reboot wipes all the temporary files and cache that were in use and many times this is all that is needed to get your computer running smoothly again. Next time you experience a problem, simply reboot your computer, but if the problem persists consider calling Systech for help.

Some of the most effective antivirus software is free.

True       False

True.   There are a variety of free antivirus programs available for any computer user. For those who may not want to purchase antivirus, Systech can help you figure out the one that suits you best. Malwarebytes Anti-Malware is a free tool that can help clean up viruses such as trojans, rootkits and other miscellaneous malware. This is a great tool that we highly recommend for cleaning up infections. This tool does not continuously monitor & scan your system, but they offer a paid version that will actively run. Free antivirus programs such as Avast and Avira are great at preventing future attacks and provide ongoing protection for your system.

Information on a hard drive can always be recovered.

True       False

False.   Although Systech strives to recover a majority of data from failing hard drives, all failures are not alike. Depending on the failure mechanism, there is always a chance that the data is unrecoverable. If you have mission critical data or personal information such as pictures and videos, take the time to back it up to another hard drive or a USB flash drive.

The more complicated my password the stronger it is. (long password versus short but complicated password).

True       False

False.   In today’s world, passwords can be cracked in seconds. Whether it’s long and uncomplicated or short and complicated, chances are that your password is not safe. The best practice is to combine the two by making your password lengthy and complex. A typical mixed 8-character password would take no more than 10 hours to crack. If you were to add any two more characters, you would increase the time it takes to crack by 5+ years.
Don’t believe us? Test it yourself: https://howsecureismypassword.net

Re-using a strong password is a good idea.

True       False

Mostly True.   Although instead of stating that it is a good idea, let’s just say it isn’t an awful idea. If you have formulated a nice and strong password, it’s okay to reuse it. At Systech, we would recommend against anyone using the same password for all of their different log in accounts, but if you happen to use one a couple of times, so long as it’s complex, then you shouldn’t have to worry. Changing your password every year or two, is strongly recommended, even if it is only one of the characters. Do you have 10 or more passwords to remember? Try a password manager application such KeePass, LastPass, or RoboForm.

Tablets are perfect for on the go type businesses.

True       False

True.   Today’s tablets have capable performance and enough battery life to support business on the go. Major suppliers such as Microsoft, Lenovo, HP, and Dell have released powerful tablets and tablet hybrids that give the business user mobility and responsiveness that is equivalent to many laptops. The biggest tradeoff is performance and screen size. However, Microsoft appears to be leading the pack with its SurfacePro series of laptops (but that performance also comes at a price).

A second computer monitor can increase work productivity.

True       False

Mixed.   Although there have been studies that show upwards of a 50% productivity boost by adding a second monitor, many people cry foul at the studies because almost all of them were funded by big computer corporations. As such, many tech specialists claim these studies are not definitive proof for this myth of productivity. Despite this, there can be a definite perk to adding an extra monitor to your station; it just might not be the right solution for everyone. If you constantly find yourself being frustrated at having to navigate through several windows at the same time, needing to program and troubleshoot at the same time, or even reading and writing data, a second monitor may be what you need.

Consumer and business class products are similar enough.

True       False

False.   There are quite a few distinctions between consumer and business class systems. These distinctions include life expectancy, consistency in components, quality of construction, base operating system, “bloatware”, as well as warranty length and coverage.

One infected computer will not affect the server/network that it is on.

True       False

False on at least two fronts.   (1) There are some malicious programs that will propagate to other devices found on the same network by employing the user’s credentials. This is especially dangerous if the user possesses higher level or administrative rights. (2) Malware can seriously degrade system performance by transmitting spam or acting as a zombie to relay information to other networks. This can affect both the infected system and the entire home or business network.

Having multiple programs open at the same time will not affect my system’s performance because only the active program is running.

True       False

False.   Anything that you have open will take up part of the computer's processing power and memory. If you have a web browser minimized, it will still take away from the total performance of your system. An easy way to see this is to open up Task Manager and under the processes tab look at the memory column. If you ever feel like your computer is slowing down on you, take a look at how many applications you have opened - too many will slow your system down. (Warning, do not try to end any of the processes in the process window. Many of these are needed to keep your computer running. If you want to close a program, do it under the application tab.)

Keeping my laptop on the AC power will not hurt my battery.

True       False

True.   Today's batteries are lithium based, and not prone to “battery memory” effect. Prolonged charging will not harm the battery. If the battery is not used in months though, damage may be probable, but such situations should be avoided. It is extremely important, however, to match the correct battery charger with your system. Some basic tips: 1) Occasionally run your tablet or laptop on battery to allow for a discharge/recharge cycle to occur, 2) At least once a month, allow your device to run on battery and discharge to less than 15%, then start a recharge cycle, 3) Do not expose your tablet or laptop to high temperature conditions, such as leaving it in your car during the summer heat.

Cybercrime is mainly committed by individuals and hackers.

True       False

False.   Cybercrime has become big businesses, and as such has drawn the attention of organized crime circles. With more business and personal data stored in the cloud and on business networks, people and organizations are increasingly being drawn to the gold rush of potential profit from cybercrime.

Hackers are more likely to target big business over individual computers.

True       False

False.   A personal computer is in as much danger of being attacked as are big businesses'. While corporations may contain big profits, they are generally more secure from intrusion. A personal computer may have just the bare minimum level of protection, and as such is more easily infiltrated by malware or hackers. With online shopping and banking becoming more mainstream, your own personal computer has become a bigger revenue source to criminals.

My computer needs to be powered off every time I am done with it.

True       False

False.   Your computer does not need to be shut off every time you are finished. In fact many systems can run for weeks, if not longer without ever being powered down. There are, however, plenty of good reasons to shut down a computer. By powering off you can save money on your electric bill, especially if the computer is not set to go into hibernation. Also, by shutting down, you will clear away all temporary memory files and cache, giving your computer a clean start on the next boot-up.

Adding more memory, also known as RAM, helps boost a computer's speed.

True       False

False.   A small business server provides numerous efficiencies for the business and its employees. With a standard domain and set of user accounts, a server will allow only authenticated access to its resources. For example, a “public” folder can be used by all employees to share common information. A “personnel” folder can have restrictions limiting access to management only. In addition, a central server can be configured to allow employees to securely access computers inside the office from home or other remote locations. Finally, a server can be a central repository of critical business information that can easily be backed up to a local storage device or the cloud.

A small business does not need the capabilities of a local file server.

True       False

False.   This will likely slow down your system. Antivirus programs run in the background on your computer. Malware also runs primarily in the background. Often one antivirus program will detect another antivirus program and attempt to disable it, not knowing it is legitimate software. It is most effective and efficient to install and run only one antivirus program.

I already have antivirus software. I don't need a malware scanning application.

True       False

False.   Unfortunately antivirus software is not perfect. It is possible to have a malicious program running undetected in the background. Newer malware may not be easily found. This is where a malware scanner can be helpful. Scanners are a good compliment to your antivirus software. Programs such as Malwarebytes are kept up to date with the latest infection signatures and by running periodic system scans, threats can be detected and quarantined. This will give you a one-two punch against infections..

It is possible to 'send' a very large file over the internet without the use of email.

True       False

True.   Most email clients won't let you send an email that is larger than 25MB. Luckily there are a few options around this. Web solutions, such as Dropbox and Sharefile provide various levels of file transfer for both home users and businesses.

Lack of an online presence won't affect my company that much.

True       False

False.   Word of mouth will always be a business’ best source of new business. However, as businesses become more regional, national, or international, having a strong online presence and good reputation is critical. More and more customers looking for goods and services through internet searches rely upon consumer reviews and informative websites. Today consumers can search for the best deal or service from their living rooms, and if you do not have a solid online presence, you are missing out on a large and growing percentage of the market. Even if you do not want to invest in a business website, there are plenty of other social media options you can use to increase your presence online, such as Facebook, LinkedIn, and Twitter, along with online review sites like yellowpages.com and Yelp. These services are free and popular.

An Intel 3.2GHz processor will have better performance than an Intel 2.6GHz processor.

True       False

False.   Surprised? It all depends on the type of processor and number of cores. A two-core Celeron processor running at 3.2GHz will have lower performance benchmarks than a quad-core Xeon processor running at 2.6GHz. In your search for your next system, do not be fooled by processor speeds alone. Comparing processor families and checking benchmarks will help you select a strong performing system

Bits and Bytes are interchangeable terms to describe technology.

True       False

False.   Bits and bytes are both popular terms used in computer language, but be careful, contrary to what many people believe they do not mean the same thing. A bit is a single numeric value such as '1' or '0', while a byte is a sequence of 8 bits. This also transfers over to how we refer to data. 1GB is not the same as 1Gb. The capital “B” represents byte while the lowercase “b” represents bit. Beware the next time you are looking over data size or even data speed as a few companies out there may try to trick unsuspecting customers into paying more for less by using Gb

Experts say the healthiest way to view a computer monitor is by looking down at it.

True       False

False.   The healthiest way to view a computer monitor is by keeping it in the center of your desk and having it at arm’s length from where you sit in your chair. It is also best to have the top of your computer screen level with your eyes. If you want to go the extra mile, convert your desk into a “standing” desk. Studies have shown that prolonged times of sitting is bad for your health. One way to avoid this is to get rid of your chair and to stand at an elevated workstation during your workday.

Healthy computer work requires multiple rest periods during the day.

True       False

True.   A simple 5-minute break to stand up and walk around every hour or so will greatly decrease the chances of strain on your body. There are numerous injuries you may sustain as a result from a job that requires constant work at a computer. These include injuries to the eyes, wrists, arms, shoulders, neck, back and legs.

Eye muscles get tired if you stare at a computer screen for too long. If your monitor is near a window, your eyes will get fatigued trying to adjust to the difference between brighter outside light levels and the monitor's glow. Computer work will also slow down your blinking rate, so eyes can dry out quicker. Make sure your display is at eye level. If you are looking up or down at your monitor for long periods of time, you will not only strain your eyes, but you will strain your neck as well. This also applies to your keyboard and mouse. Simple ergonomics will teach you some basic techniques to fit the task to the individual rather than expecting the individual to conform to the task. Learning to adapt working conditions to suit the worker will relieve much of the physical stress your body takes in.

The first PC virus was released in order to protect a program from being illegally copied.

True       False

True.   In January, 1986, 2 brothers in Pakistan wrote a small program as a way to protect a software product that they were selling. They had found that the software was being pirated (illegally copied) and added additional software to render the user’s system inoperable if the software was not legitimately purchased. The “Brain” virus soon spread from Pakistan to Europe and the United States. What was most surprising was that it could only be passed to other PC’s by a 5.25” floppy disk. The “virus” included the brother’s names, address, and phone number so they could be contacted for the “vaccination”. Read more: https://mentalfloss.com/article/12462/going-viral-how-two-pakistani-brothers-created-first-pc-virus

As long as you don't download anything suspicious, you will not get a virus.

True       False

False.   Infections can occur by simply visiting a compromised web site. Often the infection will come through an Exploit Kit that uses known or unpublished security holes in your browser or its plugins. It is good practice to keep your browser up to date and only use plugins that you need (disable all unneeded plugins).

Only “risky” websites can give my computer a virus.

True       False

False.   Web sites with poor password security or platform vulnerabilities can have malicious code injected into them. Additionally, malicious advertisements can run on reputable web sites which will often create pop-up windows that will either allow malicious code to download or provide a link to fake web site which may have a hidden or altered address bar. Users must be vigilant in their web browsing. Anything that looks out of the ordinary, should be suspect and simply exit the web page. One safe way to quickly exit a questionable window is to use Alt+F4.

The term screensaver got its name because it prevented an image on the computer screen from being burned onto the screen.

True       False

True.   Back before LCD monitors were in use, we had CRT (cathode ray tube) and plasma monitors. If a CRT or plasma screen were to be exposed to static or stationary image over a long period of time, a phosphor burn would occur. A phosphor burn would permanently leave a shadow of the image on the screen. In order to prevent this from happening screen savers were put into use. By having something move across the screen, phosphorus burns were able to be avoided. Nowadays screensavers are used more for entertainment than any preventive purpose.

Deleting files from my computer removes all the data from the hard drive.

True       False

False.   When a file is deleted from your computer, the Operating System simply removes the pointer to that file which will allow the space to eventually be overwritten by new data. Until the data gets overwritten, it is still recoverable. If you are disposing of a computer, you’ll want to either format the hard drive (we recommend full formats and done at least 3 times), crush it, drill holes through it, or use a special program that will clean the data.

Free downloads are “free”.

True       False

Mixed.   While many software companies offer “free” downloads of their products, many of these are trial versions or stripped down from the paid versions. In most cases, this software is legitimate and useful. Unfortunately, if you don’t know the source of your software or try to download licensed software through “free” or alternative web sites, you risk infections and bloatware on your computer. Even some well-known freeware download sites inject additional junk software into the download. Stick with official providers web sites and closely review what is being installed on your system.