Blog Layout

5 Nifty uses for your old computers

Apogee Compliance Group • Feb 05, 2020

Recent Posts

By Apogee Compliance Group 01 Jul, 2020
The question of monitoring your employees’ computers is a tricky one. Some say such a practice is unethical. But it can also be a way to prevent data breaches. Find out the pros and cons of monitoring your employees’ online behavior by reading this blog. And should you decide your business needs employee monitoring, we […]
By Apogee Compliance Group 26 Jun, 2020
Advances in IT have transformed paper medical records into digital files that can easily be accessed and stored. Sadly, this development has also resulted in sensitive healthcare data, or personal health information (PHI), becoming a bigger target for hackers. Because of this, healthcare providers must remain vigilant against all forms of cyberattacks. From financial information […]
By Apogee Compliance Group 24 Jun, 2020
Cutting costs is great for business, but only if doing so does not result in lower-quality products or services. You can achieve this kind of compromise in your IT system, too. Instead of investing in expensive computer hardware, you can opt for affordable but powerful thin and zero clients. What are thin and zero clients? […]
By Apogee Compliance Group 17 Jun, 2020
Most people don’t question the padlock icon that sometimes appears in their web browser’s address bar. If you’re one of those who didn’t know, it’s a security feature that authenticates websites and protects the information users submit to them. Another indicator you’re in a secure site is the HTTP before the site’s URL. But why […]
By Apogee Compliance Group 15 Jun, 2020
IT services are more critical than ever before, proving their value in the face of a health crisis and the abrupt shift to remote working. Here are some ways managed IT services providers (MSPs) are helping small companies leverage technology to support their remote teams and go about business as usual. Providing infrastructure and service […]
By Apogee Compliance Group 10 Jun, 2020
If you have an Android device, be careful! An exceptionally dangerous Android malware known as DEFENSOR ID is currently making the rounds in the Google Play Store. The malware exploits the Accessibility Services in an Android device to evade detection by traditional security measures. This threat can put your data and business in jeopardy, so […]
By Apogee Compliance Group 03 Jun, 2020
Residential Wi-Fi connections are slower and less reliable than enterprise-grade ones. But now that more people have shifted to remote work, having a fast and stable wireless connection at home is more important than ever. What can you do to ensure you don’t suffer dropped Wi-Fi signals while you’re in a videoconference or finishing up […]
By Apogee Compliance Group 27 May, 2020
With the COVID-19 pandemic, many business owners are cutting costs and jeopardizing their organization’s efficiency as a result. If you want to avoid this outcome, you should invest in cloud technology. The cloud will not just help you save money, but it will also help your business run more efficiently. Ensuring continuity and efficiency with […]
By Apogee Compliance Group 25 May, 2020
Many small- to medium-sized business (SMB) owners never expect a major crisis to hit their company and are often caught flat-footed when it does. Such events can cause downtime, which can lead to lost revenue and reduced profits. In addition, SMBs that fail to recover quickly from disruption face the risk of losing their customers […]
By Apogee Compliance Group 20 May, 2020
When it comes to cybersecurity, you probably think of protecting computers, apps, or online databases first and printers last. Precisely because they’re overlooked in, printers can be exploited by hackers and used as a gateway to infiltrate your systems. Secure your networks against intruders by following these steps. What makes business printers vulnerable to cyberattacks? […]
5 Nifty uses for your old computers

Don’t be so quick to dump that old computer! Despite being slow and clunky, your old desktop or laptop may still add value to your business. There are many uses for old PC hardware, and here are five of them.

Make a NAS server

Network-attached storage (NAS) is a server for your small business network that lets you store files that need to be shared with all the computers on the network. If your old PC has at least 8 GB of RAM, you can use it as your own NAS.

Simply download FreeNAS, a software accessible on Windows, MacOS, or Linux, that enables you to create a shared backup of your computers. FreeNAS has access permissions and allows you to stream media to a mobile operating system (OS), like iOS and Android.

But if you’d rather convert your PC into a private cloud for remote access and data backup, Tonido is a great alternative. This free private cloud server turns your computer into a storage website, letting you access files from anywhere on any device. Tonido offers up to 2 GB of file syncing across computers, and there are even Tonido apps for iOS and Android.

Secure your online privacy

Install The Amnesic Incognito Live System (TAILS) on your old computer and enjoy your very own dedicated privacy PC.

TAILS routes all your internet traffic and requests through TOR Project, a software that makes it difficult for anyone to track you online. All of this Linux-based software’s integrated applications like web browsers, Office suite, and email software are preconfigured for robust security and privacy protection.

Activate kiosk mode

In Windows 10, enabling Assigned Access “kiosk mode” ensures that only one app is allowed to run in the system. To activate this mode, open Settings and go to Accounts > Family & other users, then click on the Set up assigned access option. From there, you can choose which app the system can access.

For example, if you want a dedicated audio and video conferencing system, you can choose to give assigned access to Skype or other online communication apps. This mode is also perfect for setting up a public information desk for walk-in customers or a dedicated point-of-sale system for cashiers.

Create a guest computer

When you have to accommodate for consultants and temporary staff, it may be worth setting up a bare-bones guest computer. First, reformat your PC and reinstall the latest Windows or Mac operating system. Then, install security updates and set up guest restrictions to prevent unauthorized access to critical systems. Ideally, temporary staff should only be able to use guest computers for things like email, web browsing, and standard productivity software.

Salvage PC parts

If your old computer can’t be transformed into a NAS server or service kiosk, consider reusing certain hardware components. For instance, you can reuse RAM sticks for another computer, repurpose hard disk drives as external hard drives, and set up a second display with an old monitor.

Reselling hardware components like motherboards and video cards is also a good idea if you’re saving up for a new PC. Finally, keep your cables. Many USB adaptors, ethernet cables, and AUX cords are compatible with a wide array of electronics.

We’re always on the lookout for ways to help our clients make the most out of their technology investments. Want to know more about how to utilize hardware to your business’s advantage? Give us a call.

By Apogee Compliance Group 01 Jul, 2020
The question of monitoring your employees’ computers is a tricky one. Some say such a practice is unethical. But it can also be a way to prevent data breaches. Find out the pros and cons of monitoring your employees’ online behavior by reading this blog. And should you decide your business needs employee monitoring, we […]
By Apogee Compliance Group 26 Jun, 2020
Advances in IT have transformed paper medical records into digital files that can easily be accessed and stored. Sadly, this development has also resulted in sensitive healthcare data, or personal health information (PHI), becoming a bigger target for hackers. Because of this, healthcare providers must remain vigilant against all forms of cyberattacks. From financial information […]
By Apogee Compliance Group 24 Jun, 2020
Cutting costs is great for business, but only if doing so does not result in lower-quality products or services. You can achieve this kind of compromise in your IT system, too. Instead of investing in expensive computer hardware, you can opt for affordable but powerful thin and zero clients. What are thin and zero clients? […]
By Apogee Compliance Group 17 Jun, 2020
Most people don’t question the padlock icon that sometimes appears in their web browser’s address bar. If you’re one of those who didn’t know, it’s a security feature that authenticates websites and protects the information users submit to them. Another indicator you’re in a secure site is the HTTP before the site’s URL. But why […]
By Apogee Compliance Group 15 Jun, 2020
IT services are more critical than ever before, proving their value in the face of a health crisis and the abrupt shift to remote working. Here are some ways managed IT services providers (MSPs) are helping small companies leverage technology to support their remote teams and go about business as usual. Providing infrastructure and service […]
By Apogee Compliance Group 10 Jun, 2020
If you have an Android device, be careful! An exceptionally dangerous Android malware known as DEFENSOR ID is currently making the rounds in the Google Play Store. The malware exploits the Accessibility Services in an Android device to evade detection by traditional security measures. This threat can put your data and business in jeopardy, so […]
By Apogee Compliance Group 03 Jun, 2020
Residential Wi-Fi connections are slower and less reliable than enterprise-grade ones. But now that more people have shifted to remote work, having a fast and stable wireless connection at home is more important than ever. What can you do to ensure you don’t suffer dropped Wi-Fi signals while you’re in a videoconference or finishing up […]
By Apogee Compliance Group 27 May, 2020
With the COVID-19 pandemic, many business owners are cutting costs and jeopardizing their organization’s efficiency as a result. If you want to avoid this outcome, you should invest in cloud technology. The cloud will not just help you save money, but it will also help your business run more efficiently. Ensuring continuity and efficiency with […]
By Apogee Compliance Group 25 May, 2020
Many small- to medium-sized business (SMB) owners never expect a major crisis to hit their company and are often caught flat-footed when it does. Such events can cause downtime, which can lead to lost revenue and reduced profits. In addition, SMBs that fail to recover quickly from disruption face the risk of losing their customers […]
By Apogee Compliance Group 20 May, 2020
When it comes to cybersecurity, you probably think of protecting computers, apps, or online databases first and printers last. Precisely because they’re overlooked in, printers can be exploited by hackers and used as a gateway to infiltrate your systems. Secure your networks against intruders by following these steps. What makes business printers vulnerable to cyberattacks? […]
More Posts
Share by: