alt tag

IT Disaster Recovery Posts


The Three Copies Rule: Why You Need Two Backups

Wednesday, May 3rd, 2017

usb-932180_640

Anyone who has ever lost years of work due to computer failure will tell you that backing up your devices can save you considerable heartache and frustration. Reliable, redundant, and regular data backups are your business’s best strategy for disaster recovery—but two copies of your data may not be enough.

IT pros across the world have developed the “3-2-1” backup philosophy to maximize your restoration capacity following a data disaster.

The “3-2-1” Concept

The “3-2-1” approach is simple:

  1. Store three copies of your data.
  2. Utilize multiple storage formats.
  3. Keep one copy off-location.

TrendLabs says that having two backups of your data (meaning three copies total) is all about redundancy. IT professionals have nightmares about experiencing computer or server failure and preparing to restore the backup, only to find that the backup has failed as well. Your business can prevent this situation only by keeping two backup copies of all your important data.

We can’t stress often enough that three copies means three separate devices. Backing up data to a second hard drive in the same computer, or a connected SD card, does not count. This will only protect your data in the event that one of the hard drives breaks.

Some useful backup devices include:

  • External hard drives
  • NAS
  • Cloud storage
  • DVD/Blu-Ray discs
  • Flash drives
  • SD cards

Two Formats: Diversify Storage Media

Using different types of storage for backup improves reliability: It not only diversifies the factors that could cause the backup to fail, but also acts as an extra layer of protection. For example, if both backups are on external hard drives and exposed to a large magnet, both would be destroyed. However, a second copy stored on optical media or a flash drive would survive.

The two backup locations could include a backup external hard drive and cloud storage, or a DVD archive and an onsite NAS server. According to PC & Tech Authority, NAS servers are a great backup option for offices with several networked computers. We’ve discussed storage format longevity in previous blog posts if you need help deciding which one is right for you.

Keep at Least One Copy Offsite for “Catastrophe Recovery”

Catastrophe recovery is another way to describe a worst-case disaster recovery scenario: for instance, the hard drive didn’t fail, but a flood leveled your office, or someone stole both the computer and the backup in a burglary. In order to prevent an outright catastrophe, it’s not safe to keep every copy of your important data under the same roof.

This means, of course, that one of your backup copies should be stored in a secondary locationthe farther the better. The offsite backup could be, for example, a cloud backup, or an external hard drive stored in a bank deposit box. When working with a non-cloud, off-site solution, it helps to swap out two storage devices on a weekly basis.

If your company is looking to streamline its disaster recovery practices with IT Managed Services, contact the experts at MPA Networks today.

The Dock Returns: Anticipating Trends for Productivity Potential

Wednesday, April 19th, 2017

tablet-313002_640

Samsung’s March 2017 announcement that its flagship smartphone would support first-party peripheral that makes the device work like a desktop computer could mean big changes for how people look at their productivity devices.

While this is not the first attempt to treat a smartphone as a computer substitute, it is the first time a market shipment leader put its weight behind the concept.

Business and IT professionals should watch these trends closely, because new ways of looking at existing technological mainstays may offer incredible opportunities to increase productivity.

A Note on Convergence

Samsung’s dock is another indication that the smartphone, tablet, laptop, and desktop device classes are gravitating towards convergence. Tablets and smartphones overlap each other in use and functionality: In many cases, you would not be able to tell the difference between a large smartphone and a small tablet outside of the ability to make phone calls.

Galaxy S8 Dex Dock

The Samsung Dex allows any Galaxy S8 user to connect the device to a charging dock that augments the smartphone with a desktop monitor over HDMI and USB peripherals. When connected to the dock, the Galaxy S8 display switches to a more computer-esque interface, making the phone function like a “fake desktop.” This is excellent for business continuity for three reasons:

  1. Employees can take a highly portable device with them anywhere they go, which can be plugged into a dock when available to function as a primary productivity device. It’s easier to carry a phone around than a laptop.
  2. Employees will no longer need to use a dedicated workstation. This means employees can easily relocate their main device.
  3. Sharing a desk workstation will be much simpler. Instead of requiring a centralized server and individual login credentials, employees can simply plug in their mobile device.

Similar third-party devices exist for laptop augmentation, such as the Mirabook, which works for both Android and Windows 10 devices. If these docks add support for multiple devices including multiple operating systems, this platform could be incredibly useful for businesses.

The Motorola Atrix Legacy

Businesses have been working on expanding smartphone capabilities to emulate what a traditional computer can do almost as long as the smartphone and tablet device classes have been popular. The Motorola Atrix, released in late 2011, is the first well-known example of turning a smartphone into a netbook. However, earlier takes on the convergence concept didn’t perform well because of high costs ($300-$500 for the Atrix compared to $150 for the Dex) and missing functionality.

Nintendo Switch Dock

The Nintendo Switch, released in March 2017, is a tablet-like device that connects to a dock to work like a traditional console on a TV. With the system selling well, the Switch will serve as the first tablet-like device millions of people have in their homes that works with a dock. “Living room infiltration” can make the public more comfortable with the dock concept, which could lead more people to try docks with other devices. The Nintendo Switch could do for docks what the Playstation 2 did for DVD video.

Even without the dock, the tablet and smartphone industry is pushing towards convergence. For example, Apple is selling the iPad Pro as a laptop replacement device with reasonable success. However, backup and disaster recovery will be more important than ever with docks—mostly because smartphones are easier to break and to lose than desktop computers.

Our IT consulting experts at MPA Networks are ready to help your business look into technology opportunities like the Dex dock. Contact us today.

Avoiding Disaster: Overheating Computers

Wednesday, April 5th, 2017

funny-pictures-676672_640

If one of your office computers always seems to shut down or slow to a crawl at the busiest of times, you may have a case of overheating on your hands—especially if IT can’t find anything wrong on the software level. Performance hiccups might seem like a mere nuisance, but overheating shortens the lifespan of a computerModern computers are designed to protect themselves from dangerous temperatures, but they can’t prevent all long-term damage.

You can increase productivity and avoid disaster recovery situations in your workplace by making sure your computers are operating at safe temperatures.

The Symptoms

An overheating computer will exhibit one or more of the following symptoms:

How to View Temperatures

The easiest way to tell if a computer is overheating is to take its temperature via software. Your staff can install monitoring programs like CPUID’s HWMonitor or Almico’s SpeedFan for Windows devices, or enable CPU temp viewing on a Mac to get active temperature readings.

These programs show current operating temps and indicate overheating with red colored text, a fire icon, or a warning. Have employees keep an eye on the monitor program during normal work: If the test identifies a heating problem, it’s time to resolve the cause.

Ambient Temperature

Ambient temperatures, or the temperature of the room the computer is in, boost the base temperature of computers and cause parts to run hotter than usual. These problems could simply be the result of the room lacking climate control, or other nearby devices blowing hot air in the direction of the computer.

This is one of the reasons that server rooms feature extra cooling. Either reduce the environmental temperature, or move the computer to a cooler area.

Insufficient Fan Cooling or Blockage

Problems with the computer’s built-in cooling system can lead to overheating during regular use. In some instances, cooling fans can wear out over time.

With desktop computers, the system may have been designed with fans powerful enough to push adequate air through the case. This can usually be resolved by adding new fans or swapping in larger fans to move airflow in the front of the desktop case and out the back. On the outside, physical objects within 6 inches of the fan vents can hurt airflow. On the inside, loose cables and new components can restrict airflow.

Dust Buildup

Dust buildup can restrict airflow and cause a computer’s temperature to increase. While dust alone won’t typically break a computer, it can amplify other problems associated with overheating. We’ve talked extensively in the past about how dust buildup can cause crashes. Laptops generally do not have this problem as they don’t move as much air.

Failing Thermal Paste

Computer CPUs use a compound called thermal paste or thermal grease to help transfer heat to the cooling system. It’s possible for this material to wear down over time, which makes it far easier for a computer to overheat.

The solution is to disassemble the computer and replace the compound, but the process requires substantial expertise (especially with laptops) and can break the computer if done incorrectly. If this is the problem, it’s best to defer to the experts.

If your business is looking to keep its computers and network infrastructure running for maximum productivity, contact the IT managed services experts at MPA Networks today.

Network-Attached Storage: Data Backup and Transfer Options for Small Businesses

Thursday, March 9th, 2017

upload-2013228_640

Network-Attached Storage (NAS) servers are a great asset for small businesses managing data. For the uninitiated, NAS is essentially a streamlined server designed specifically for sharing files between devices.

Because of their simplified nature, NAS devices are typically easier to use and substantially more cost-effective than full-fledged servers.

While most NAS solutions are space-efficient standalone server boxes, some higher-end routers can also be used as NAS devices by attaching an external hard drive. If your office is looking to increase productivity and improve disaster recovery, NAS may be worth its weight in gold.

Easy-to-Use Data Storage

NAS devices work as an inexpensive, easy-to-use data storage option for your business. These devices are so simple to configure that your office doesn’t even need to have a local IT staff to use them. Once configured, accessing the storage can be as simple as using Explorer or Finder as you would with any internal storage device.

Practical Backup and Recovery

In their most practical form, NAS devices can be used as a backup and disaster recovery option for office computers. This way, if a computer hard drive fails or a laptop gets destroyed, your staff can recover recent versions of important documents and files.

However, NAS does not replace the need for Cloud or off-site backups for vital information. An office fire, for example, would wipe out desktop computers and the NAS. Combining both NAS and Cloud backup processes gives your business the best level of protection from data loss.

Faster Information Sharing

NAS is also a viable business continuity option as it does not require Internet connectivity to work. Employees who use multiple devices, such as a laptop, desktop, and tablet, can use the NAS to access the same files from any deviceThese data servers are also excellent for employees collaborating on the same files; gone is the need to use email or Cloud storage to sync or send updates.

Cost-Effective Hardware Comes at a Price

NAS devices aren’t as sophisticated as traditional servers. Designed only to focus on sending and receiving data, they offer substantially less processing power. You won’t be able to use a NAS device to run an email server, for example, or to run any server-based applications. For these, you’ll need to look into server management solutions.

Because of this trade-off, however, NAS devices cost a fraction of the price of a dedicated server. Moreover, your business doesn’t need to worry about wasting money buying too much or too little storage because you can install additional hard drives in the NAS device as needed.

Security Issues

As mentioned above, NAS servers should not be used as a replacement for an off-site, Cloud-based backup. IT professionals often recommend storing important data in at least three locations: two “on-site,” which includes the computer and the NAS, and one “off-site,” like a Cloud service. Additionally, if your business is using NAS storage, you’ll want to make sure it is only visible to authorized individuals. Security in this case could include something as simple as password-protecting the Wi-Fi.

Use our wealth of knowledge at MPA Networks to your advantage to meet your business’s server and storage needs. Contact us today.

8 Spring Cleaning Tips for Your Office Computers

Wednesday, March 1st, 2017

bucket-303265_640

When it comes to your office computers, a little bit of spring cleaning goes a long way. Sure, cleaning office computers can seem tedious. But think of it like preventative maintenance on a vehicle: In the best-case scenario, you’ll never know all the breakdowns you avoided.

Keeping your office computers clean and healthy minimizes your risk of downtime and increases productivity.

Here are 8 tips for your next round of spring cleaning:

1. Update All Software

Run updates and patches for the operating system, commonly used programs, and security software on every system. Program and operating system updates don’t just add features; they’re loaded with security updates that keep your devices safe. Most problems with computer security exploits stem from outdated software that allows hackers to break through established breaches that the developer already closed, so running updates and patches is your best line of defense.

2. Run a Full Anti-Virus Scan

After updating all the software on the computer, run a full anti-virus scan to catch any malicious software hanging out on the device. Active anti-virus protection does a good job of safeguarding the system against infections, but sometimes malware slips through the cracks.

3. Run a Full Anti-Malware Scan

Anti-virus programs go after specific, high-risk malware infections, meaning lower-level malware can still find its way onto your computers. Anti-malware programs including Malwarebytes and Spybot are better equipped to identify and remove malware that the anti-virus misses.

4. Defragment the HDD

Older PCs with traditional Hard Disk Drives (HDDs) may experience load time improvements from an annual drive defragmentation. However, newer Windows systems—and all currently supported Mac OS versions—handle this process in the background, so you don’t need to worry about it. If the computer is running a Solid State Drive (SSD), do not bother with the defragmentation process.

5. Remove Unnecessary Launch Programs

It may seem like every program installed on your computer wants to launch itself at startup—even those you rarely use. Removing unnecessary programs from the system startup can help improve performance and reduce login times. Windows 10 features a handy “Startup” tab on the Task Manager that lets users quickly toggle which programs launch with the system.

6. Check and Create Restore Points

Restore points can be a major time saver in returning a compromised computer to full operation. Restore points reverse most of the damage caused by malware and bad configurations, all with minimal effort. Check whether the computer is already using them, and create one if it isn’t.

7. Run a Full Backup

Backups are like restore points for when very bad things happen to a computer. It’s best practice to make at least two backups of a given computer’s files, and store them in different physical locations. This ensures that in the event of catastrophic loss, all the data saved on the computer up until the backup point is preserved. Mashable recommends verifying if automated backup services like Time Machine and Windows Backup and Restore are actually working.

8. Bust Dust on Desktops

This part of the spring cleaning process is literal. As we’ve previously discussed, excessive dust inside a computer obstructs airflow, which can cause crashes due to overheating and even damage components. CNET has a helpful guide on how to go about the dustbusting process.

A little spring cleaning makes for a more efficient office and stronger disaster recovery. The expert desktop support and management staff at MPA Networks is ready to help your workplace in San Mateo, San Francisco, the South Bay, and other Bay Area cities implement better practices. Contact us today for more information.

Looking Forward: Cloud Services Costs and Opportunities

Thursday, January 5th, 2017

download-1745473_640

If your small-to-medium business (SMB) isn’t looking at ways to increase productivity through Cloud services, you could be missing out on exciting opportunities. But while the Cloud offers countless opportunities for business expansion, it can also taking up an ever-increasing share of your company’s IT budget. Overall IT budgets may not be growing, but Cloud expenses are; industry shifts indicate a gradual move towards increased dependency on Cloud platforms to run business operations even among small businesses.

Your business should be aware of these shifts, as they could have a direct impact on how your company’s IT budget is allocated in the future. Read on to find out more. 

The Cloud’s Share of IT Budget

According to a 451 Research study, the typical business spent around 28 percent of its IT budget on Cloud services in 2016, which could increase to a projected 34 percent in 2017.

The study argues that the budget adjustment will stem from an increased reliance on external hosting infrastructure, application platforms, online IT security, and SaaS management programs.

While this report implies a budget increase in one area, businesses will be able to recoup part of the cost with a decreased reliance on internal infrastructure like local servers. Additionally, Cloud platforms do a lot of the heavy lifting, so your business will be less dependent on powerful, expensive computers.

The State of IT and Cloud Expenses

Gartner reported that businesses worldwide spent $2.69 trillion on IT services in 2015With IT expenses remaining mostly flat across 2016, that puts total enterprise Cloud service expenses around $750 million annually. The Cloud is a big deal in the business world: in 2016, upwards of 41 percent of enterprise workloads ran in the Cloud, and that number could grow to 60 percent by the end of 2018.

Why Use the Cloud for SMBs?

Simply put, the Cloud offers businesses incredible versatility, flexibility, and agility that’s not available with on-site servers. One of the Cloud’s key advantages is that it can enable a business to become significantly less dependent, if not completely independent, on local servers. Moreover, Cloud servers can scale for extra processing power to handle work in web applications, web hosting, and SaaS platforms that wouldn’t be available if the business had to rely entirely on in-house servers. Finally, the Cloud allows employees easier access to work platforms regardless of their physical location, making collaboration, disaster recovery, security, and data backup much simpler.

Common Cloud Services to Explore

Here’s a list of Cloud services worth exploring for all SMBs:

  • Content Management Systems
  • Customer Relationship Management Systems
  • Data Backup and Archiving
  • Point-of-Sale Platforms
  • Time Clock Systems
  • Productivity/Web Applications

 If your business is trying to decide whether to expand its IT infrastructure into the Cloud or simply maintain current costs via IT consulting, contact the experts at MPA Networks today.

Antivirus Software: When One Is Better Than Two

Wednesday, December 7th, 2016

antivirus-1349649_640

If your company’s antivirus software is letting you down, you should think twice before installing a second one on a computer: It may actually make things worse.

Multiple antivirus programs working in conjunction on the same device is not a case of “the sum is greater than the parts” but rather “less is more.”

With many viable free solutions like AVG, Avast, and Avira, it can be very tempting to install backup for a paid option. However, the interaction between multiple antivirus programs leads at best to, essentially, nothing. At worst, it will be detrimental to system performance, stability, and security.

Stepping on Toes

The primary reason that running simultaneous antivirus programs on the same device is a bad idea is that the two programs will confuse one another for malware infections and try to eliminate each other. According to PC World, the antivirus scan conflicts can spill out and cause other programs to fail, while making the operating system less stable. Computer users may immediately notice general slowdown and shorter battery life after installing a second antivirus program.

Users may also be plagued with continuous “false alarm” messages after threats have been removed because the act of one antivirus program removing an infection will be seen by the other as a malware action. Therefore, if you’re installing a new antivirus program on a computer, you’ll need to remove the old one first. This includes removing Windows Defender.

Anti-Malware Scanning Software: Antivirus Backup Exists

Backup exists, but it’s not found in additional antivirus programs. Instead, your business can utilize additional programs commonly referred to as “anti-malware” that are specifically designed to catch infections antivirus software misses for improved protection.

The term “antivirus” is a bit misleading because the programs actually protect computers from a wide range of software-based threats on top of viruses including Trojans, rootkits, worms, and ransomware. Antivirus refers to a software security program that runs in the background at all times as an active form of protection. Anti-malware programs including Malwarebytes, SuperAntiSpyware, and Spybot work through “On Demand” scans, meaning they can be used periodically to clean malware infections.

The Recovery Clause

In disaster recovery situations, your IT staff may need to install a different antivirus program to combat a malware infection that the currently installed software can’t remove. In this situation, the old software will need to be disabled or uninstalled before the new program can get to work.

If you’re looking for better digital security options for your office, contact MPA networks today. Use our experience in IT consulting to your advantage for assistance in both preventing and reducing downtime over malware threats.

The Benefits of Backups

Wednesday, November 16th, 2016

data-key-571156_640

Even seasoned IT pros have made the mistake of not backing up a device—and panicked after losing countless important files because the device failed. We may know better, yes, but that doesn’t mean we’re perfect.

On the flip side, we’ve all breathed a sigh of relief when a recent backup of our computer or smartphone rescued valuable files after a crash. With employees at businesses large and small using more devices than ever, vulnerability is just as high as the stakes.

It’s never too late (or too early) to implement a reliable backup system—so what are you waiting for?

How Often?

This is a question we hear a lot when it comes to backups. The answer, as ambiguous as it sounds, is “right now.” In an ideal world, your business would configure its employee devices to back up on a daily or weekly basis; but, of course, the more often your business can back up data, the better. And while it’s common for smartphones to Cloud-sync whenever they’re connected to Wi-Fi, it’s worth checking your settings right away.

Minimize Data Loss

Regular data backups are an excellent tool for disaster recovery. In the event that a computer’s hard drive is not recoverable, the ability to restore the machine based on a recent backup significantly decreases the amount of data lost in the process. For example, if the hard drive fails on Tuesday morning and the last backup was on Friday afternoon, the employee will lose at most a day’s worth of work from the incident.

Decrease Recovery Downtime

Backups get your employees back to work faster after a disaster. For obvious reasons, it’s easier to recover a computer to a backup point than to start from scratch, and for some problems, restoration can be even more efficient than repairs.

Removing an infection, decrypting data, and recovering a computer that’s been infected with ransomware, for instance, can take days. But if the computer has undergone a recent backup, restoration may take mere hours.

Old File Version Recovery

Every so often an office has to deal with an employee accidentally making a change to a shared file that can’t be fixed. Regular backups are like freezing a moment in time for your business where you can always go back and recover what was lost.

Embrace the Cloud

Take advantage of Cloud storage solutions for a range of benefits—especially business continuity. With the Cloud, employees can, in many cases, share and access their work from any device. If an employee is on a business trip and needs to update or reference a file stored on their office desktop computer, they can access the information through the Cloud platform.

If your business is looking to improve its data backup practices for a more reliable digital ecosystem, contact the experts at MPA Networks today. MPA’s IT Managed Services offerings can help your company implement a backup system that minimizes downtime and protects your data for both peace of mind and pace of business.

A Primer on Common, Helpful Device Adapters

Friday, November 11th, 2016

iphone-1680359_640

In September 2016, Apple announced that the iPhone 7 will not feature a 3.5mm jack—meaning anyone who wants to use standard headphones (or the credit-card scanning Square Reader) will need an adapter.

Only time will tell if removing the century-old socket ends up being a step forward or a huge inconvenience. What we do know is that adapters have a long history of facilitating changing connectivity standards and fostering compatibility between devices.

A working knowledge of the kinds of adapters available in the market can help increase your business’s productivity, not to mention help you and your employees bounce back from disaster recovery situations.

Hypothetical Scenarios

Adapters can save your business substantial time and inconvenience in a pinch. For example, if an employee’s laptop screen stops working, they have the option of connecting the laptop to an external monitor. However, there’s a high probability that the two machines do not share a common connection standard: The monitor may support HDMI and DVI, but the laptop only exports over VGA or DisplayPort. Having the right adapter on hand can get your team back up and running in no time.

Alternatively, if a desktop computer’s Wi-Fi card stops functioning, you can try hooking up an external USB wireless adapter to the device. Problem solved! No matter what the connectivity challenge, adapters can usually come to the rescue.

Here’s a rundown on useful peripheral, display, and network adapters you may want to store in the office:

Peripheral Connectors

  • USB-to-SD: These adapters plug into a USB port and add full-size SD Card compatibility to computers and many smartphones.
  • USB-to-Bluetooth: While Bluetooth connectivity is assured on smartphones, it isn’t on computers. Computers can add compatibility with devices like Bluetooth earphones, headphones, mice, and keyboards via this adapter.
  • Thunderbolt-to-USB/Firewire: This adapter allows a new Mac to work with older USB and Firewire devices like external hard drives and digital cameras.
  • Lightning/USB to 3.5mm: These adapters are available for both phones and computers to maintain compatibility with peripherals like headphones, microphones, and credit card readers.

Display Connectors

  • DVI-to-VGA: These adapters allow computers to connect to monitors and TVs that use the older VGA standard. These can be very helpful when connecting a laptop to a larger screen in the office presentation room. VGA-to-DVI adapters exist as well, but can be expensive.
  • HDMI-to-DVI: These adapters allow computers and monitors with only one type of port to work with each other. Note that HDMI audio will not work over DVI.
  • DisplayPort-to-HDMI/DVI: These adapters allow DisplayPort-equipped computers to work with the more commonly supported HDMI and DVI standards on monitors.

Network Adapters

  • USB-to-/Wi-Fi: These adapters are helpful for adding wireless support to desktop computers without needing to open and install a Wi-Fi card adapter. They’re also helpful for upgrading laptops that use an older wireless standard to a newer one, and can replace broken internal adapters.

Like adapters, managed service providers excel at keeping your business going nonstop and helping to ease technical transitions. Contact MPA Networks today if your business is looking to improve its disaster recovery practices.

Water-Resistant Smartphones Are Here: What You Need to Know

Tuesday, September 13th, 2016

apple-iphone-151237_640

Water-resistance probably isn’t on the feature checklist for your employee smartphones—but judging by how many of these devices meet an untimely end via liquid damage, it should be.

It probably doesn’t come as a surprise that dropping the device is the number one cause of smartphone damage at 30 percent; however, liquid damage makes up a substantial 18 percent.

Your business can purchase a range of affordable fitted bumpers, cases, and screen protectors as a line of defense, but waterproof cases like this one are much more expensive and bulky.

It’s “Water-Resistant,” Not “Waterproof”

First and foremost, keep in mind that water-resistant smartphones are not waterproof. If you throw the phone in the ocean or a 12-foot-deep wave pool and leave it there for a few hours, it’s going to break. These devices are built to survive the accidental drop in the bathtub or dinner table spill. Water-resistant devices also have different performance ratings. For example, the Samsung Galaxy S7 can survive being submerged under five feet of water for half an hour.

Why Go Water-resistant?

Water-resistant smartphones can help increase productivity by allowing employees more free use of their devices by lessening water-resistant concerns. For example, an employee with a water-resistant phone will have no qualms about answering a call in the rain. Many smartphones also suffer water damage from sweat seeping in during a workout—not a problem with water-resistant devices. Additionally, a versatile phone can help reduce downtime, data loss, and replacement costs when it continues to function even after being dropped in a pool, submerged in spilled beer, or soaked in a bag in the rain.

Current and Upcoming Models

The water-resistant phone is not an especially new concept; the Sony Xperia Z released in early 2013 is considered the first slim-designed water-resistant smartphone. As of mid-2016, CNET recommends the following water-resistant phones:

  • Samsung Galaxy S7 (Edge and Active)
  • Sony Xperia X Performance
  • Motorola Moto G4

While the iPhone 6S doesn’t have a “water-resistant” designation, Engadget reports that the device holds up surprisingly well against liquid damage, even when being submerged. CNN found that while a dunk test still broke the iPhone 6S, it held up for much longer than the iPhone 5. Additionally, ZDNet reports that the iPhone 6S can alert the user if the lightning port is wet, which hints at future water-resistance.

Your business’s smartphone needs can vary, and depending on partnerships, you may be limited to specific devices on a single carrier. IT consulting services can help find the right water-resistant phones for your staff’s needs. Contact us today for more information on how you can keep the rain from coming down on your smartphone parade.