About Mary Hester

Ms. Hester is the CEO of LAN Systems, which provides IT solutions in the Greater Metro Atlanta Area. You can contact Mary at mary@lansystems.com">

Is your website mobile-friendly?

If you own or manage a website, you have probably heard about mobile-friendly options and the risk of mobilegeddon.  On April 21st, Google changed how they will rank mobile websites in search results.  It does not apply to all searches, only those on mobile devices. Especially for those that rely on Search Engine Optimization (SEO) to rank in Google searches, it can be unsettling to hear that Google is changing the rules.  Depending upon your platform, the addition of mobile-friendly format can be difficult or easy. We use Wordpress for our site and have been using WPtouch for our mobile theme settings.  Here is Google's further explanation from their Webmaster Blog. This update: Affects only search rankings on mobile devices Affects search results in all languages globally Applies to individual pages, not entire websites To find out if your site is mobile-friendly (from … [Read more...]

Creating an Auto Reply in Outlook 2013

If you are going to be away from email, it is good policy to create an auto reply.  This will let your colleagues and clients know what to do while you are away.  It is simple to create and you can customize as needed. We have included a sample out-of-office reply that is short and sweet.  Important tip:  Don't forget to turn off when you return! 1. Open Outlook 2. Click the file tab and then select Automatic Replies   3. Check the send automatic replies box and word your reply in the given space below for contacts inside your organization.   4. Next, click the only send during this time box and input the dates you wish to use. 5. Select the Outside My Organization tab and create your reply to outside contacts. Here is Sample Template for Out of Office Message Thank you for your eMail!  I will be out of the office [Start Date] through [End … [Read more...]

Microsoft Office 365 Trust Center

Concerned about data security, availability and ownership in the Cloud? If you are asking, then you are a savvy Cloud user.  You deserve to have your questions answered to your satisfaction in simple, easy-to-understand terms.  Below is a summary from the Office 365 Trust Center.  If any item needs clarification, let us know and we will personally get you an answer!   In simple terms, with Office 365, it's your data. You own it. You control it. And it is yours to take with you if you decide to leave the service. The core tenets of Microsoft's approach to earning and maintaining your trust are:  Built-in security Service-level security through defense-in-depth Customer controls within the service Security hardening and operational best practices Privacy by design Your data is not used for advertising You have extensive privacy controls You can take your … [Read more...]

Earth Day Celebration

The Southwest Gwinnett Chamber and the City of Berkeley Lake are joining with LAN Systems for this year's - Earth Day Celebration! Join us on Wednesday, April 22nd 11-2 for our Green IT Recycling Event and Celebration 4711 Peachtree Industrial Blvd Berkeley Lake, GA 30092** You are cordially invited to our cookout in celebration of the Earth. We will be grillin' hotdogs and brats. Naja Elieva will be here to amaze us with palm readings and technology fortunes - if you dare! Bring your electronics to recycle.  We will have bins and hard drive shredding available at no charge, but TVs have a $10 fee. Bring something to recycle and we'll give you a stylish, insulated, re-usable grocery bag! Proceeds from recycled equipment this year will be donated to Georgia Firefighters Burn Foundation. One of the highest rated charities in Georgia, the GFBF was founded in 1982 to … [Read more...]

Update on Crypto Threats

Whether CryptoLocker, CryptoDefense, CryptoWall or another Crypto-Threat, they encrypt your files and demand a ransom to unencrypt. As each new Crypto-Threats attack is released, it has new characteristics to avoid detection and cause more damage.  For instance, the type of files that it encrypts has grown and the ransom demands have become more sophisticated.  Early versions had an expiration date beyond which you could not retrieve your files.  Newer versions raise the ransom as time goes by and there have even been reports of victims negotiating payment with the cyber criminals. As the extortion becomes bolder, victims are hit harder and have to pay more.  Bitcoin has become the ransom payment currency of choice causing speculation that this could damage the Bitcoin brand. The attacks hit the US hardest even though ransom payment had greatly declined. As Crypto-Threats have … [Read more...]