Get A Quote

[contact-form-7 404 "Not Found"]

Tag Archives: safety

What About Cabling?

Posted on October 02nd, 2013 by Emily

How much difference can the cabling you have make to your network? Read on, you may be surprised!


We don’t often hear this come up as a point of discussion when people are installing or upgrading their networks, but it’s actually quite important.

If you’re getting a new network installed, you should always choose a specialist when it comes to cabling your workplace. For your network to work at full capacity, you’ll need good quality cabling, which is installed correctly, without cutting corners.

If your cabling is of poor quality, it can affect the quality of signal sent along it, which in turn can affect the speed and reliability of your network. Having the best hardware in the world won’t help if your cabling is subpar or incorrectly installed. Poorly shielded or badly situated cabling can mean the difference between a network that runs smoothly, and one that makes you feel like tearing your hair out!

Ideally, total cabling to each machine should equal no more than 100 metres. If it’s longer than this, general research says you’ll begin to see a drop in performance from your network. Cabling with low-quality impure copper cores can also cause signal degradation, which will show itself as errors, lost packets and slower speeds. Cabling should be as flat as possible, as bending it too much can affect its performance.

Each cable should also be of similar quality – it’s not really useful having your building cabled up with top-of-the-range, super quality cable if you then go and use a low quality patch cable to connect your computer to the network. Mixing different qualities of cable can also cause even more interference in the signal.

Your network cabling should ideally not be near any kind of power cabling or pass close to large devices, as this can result in electromagnetic interference and cause problems with data transmission across the network. It should also not be near any water sources or pipes, as this could cause condensation to form inside the cable which in turn causes the cable to fail.

Finally, one point to remember is that cabling doesn’t last forever! Cables can stretch, warp, break, twist or otherwise wear out just like other equipment. Your network will need re-cabling eventually, and while it may not seem like a top priority, if you’re experiencing problems or considering upgrading or replacing your network hardware, you may want to get your cabling professionally tested to make sure it meets the standards required for smooth performance!


If you’d like any more information on cabling, cable testing, networking or anything else IT-related, don’t hesitate to get in contact with us, we’ll be happy to help!

Call us on 0845 234 0580 or email us at

facebookicon twittericon


Posted in: It 4 business, Tips n Tricks Tagged , , , , , , , , ,
office chair

Ergonomics - Laptops, Tablets and Smartphones

Posted on August 23rd, 2013 by Emily


In the last of our blog posts this week, we’ll discover how you can make mobile computing more comfortable.


Our use of IT is changing drastically. In 2012, almost 25% of all computers sold were tablets or slates. However, ergonomics still need to be considered when using these devices, and often are not. Many people spend hours a day with their necks at about a 45 degree angle, staring into a mobile or tablet screen, or slouched over a laptop.
Excessive use of laptops, tablets and smartphones without consideration for ergonomics can cause RSI, back, neck and shoulder problems. Luckily, though there are some things you can do to make your use of mobile IT far more comfortable.

  • Laptops

Where possible, it is advised that you use a laptop on a desk or other flat surface where you can be seated correctly. Laptop supports or laptop trays are also another option, and allow you to use your laptop from an armchair or similar relaxed seated position. It’s advised that you make sure there’s adequate support for your arms while using laptops, and that your arms and hands are as close to the neutral position as possible when typing.
It is not advisable to use a laptop directly on your lap or in any other way that can block the air vents, such as on a cushion. Doing so can lead to heat injury to you or damage to the laptop from overheating.

  • Tablets and Smartphones

Useful for working, browsing, emailing, and for many other tasks while away from the desk, tablets and smartphones have seen massive success and increasing sales in recent years. Stands for tablets are available, but as with other portable devices, the general advice is to take regular breaks, stop if there is any pain, and to use them at a comfortable angle to your body, for example as you would hold a book. If you need to use them for extended periods, find a sitting position that is comfortable for your whole body, and does not cause stress to any joints, muscles, bones or tendons.
There are support cushions made from memory foam, and other devices that are designed to provide a comfortable reading position that may be helpful when using tablets and smartphones.

One last piece of advice from those with experience – never hold a phone to your ear using your shoulder! Doing so can cause serious neck pain.

We hope that our foray into the world of ergonomics has been enlightening for you. We think you’ll agree that some of the statistics are astonishing, especially when it comes to lost work hour and lost productivity! If you need any further advice, feel free to contact us and we’ll see what we can do to help, or put you in contact with a specialist advisor.


At Geek Guru, we like to make our clients’ lives as pain-free as possible – At least when it comes to IT! If another computer headache is the last thing you need, get in touch with us.

For IT advice or information, or to see what we could do for your business, give us a call on 0845 234 0580 or email us at

facebookicon twittericon


Posted in: It 4 business Tagged , , , , , , , , , , , , , ,
office chair

Ergonomics - Desktop PCs

Posted on August 21st, 2013 by Emily


In Monday’s blog, we covered the basics of office ergonomics, and the impact it can have on concentration and productivity. Today we’ll continue with a little more specific information for desktop PC users.


A high percentage of jobs now will involve use of a computer or other IT equipment, but not everyone knows how to sit correctly to avoid cramps, strains, aches, stiffness and other more long term problems. Ergonomic equipment is something we get asked about quite frequently, and we’ll cover some of the products you can get later in the article, but we’ll start off with some tips that can help you make the most of the furniture and accessories you already have.

Here’s a few pointers that could make your day a little bit more comfortable:

  • Sit in your chair properly! This might sound silly, but many people actually sit on the edge of their chair, and their back is unsupported by the backrest. Push yourself as far back into your chair as you can.
  • Don’t let your feet dangle. If sitting back in your chair means your feet are not touching the floor, don’t use the base of the chair as a footrest, as this can cause lower back, hip and knee problems. Instead, get a footrest and rest your feet at the correct angle in front of you comfortably.
  • Adjust your chair height. You should not have to reach up or down to your keyboard, as this puts unnecessary stress on the wrists, arms, shoulders and back. If your chair has armrests, adjust the height of it so that you can comfortably rest your elbows on them.
  • Set your chair back to a comfortable level. It should be between 100 and 110 degrees to correctly support your back and avoid pain. Try to avoid having it set too far back.
  • Adjust your monitor height and position. The top portion of your screen should be at eye level, and the monitor should be directly in front of you. Having to look up or down or turn your head constantly to view a screen can cause neck problems and headaches.
  • Position your keyboard and mouse correctly. Your keyboard should not be so far away from you that you have to reach to type. It should be close enough to comfortably type with relaxed arms. Bring the mouse in as close as possible so you are not forced to reach across the desk to navigate. Having your equipment too far away can cause stress to the wrists, arms, shoulders, and back. Make sure your equipment is centred to your body so that you don’t have to twist in order to type or use the mouse.
  • Use a wrist rest. These are designed to be used when not typing, make use of them and save the strain on your arms, wrists and hands.
  • Take frequent breaks. Get up, walk around, stretch out or follow some of the exercises detailed in this helpful set of printable postcards provided by the CSP.

If you experience pain while using a computer, stop and take a break. If the pain continues, consult a doctor or physiotherapist.

If you would like to read in more depth about how to sit correctly at a computer, a full guide can be found at:


Sometimes, if certain muscles are weak, there is an underlying injury, the person has a disability, or sitting at a computer is painful for any other reason such as bad posture, some extra help may be needed in order to make computer use safe and comfortable.

There are various things you can buy to support areas of the body while sitting at a desk. Here’s a few of the most popular:

Generally inexpensive, these allow for free airflow around your back while supporting the lumbar region of your back.

These make it difficult to slouch and so promote good posture. Keeping yourself centred on the ball also strengthens your core muscles. There’s one of these in our offices, it looks strange but apparently works quite well!

These look strange and uncomfortable but can help quite a bit with back problems for some people. They aren’t suited for everyone (especially those with bad knees), but those with problems in the coccyx or tailbone area have been known to benefit from these as they spread the weight over the buttocks and the knees.

Surprisingly uncommon given how cheap and easy to obtain they are, wrist rests come in many forms and can really help to take the strain off your wrists, arms, hands and shoulders when you are not typing. They help to prevent RSI because encouraging you to type with your wrists and hands in the correct neutral position, and giving you somewhere soft to rest your hands while not typing, instead of on a hard desk or keyboard edge. You can also get mouse pad versions of these.

Very useful for avoiding lumbar pain due to stress on the lower back muscles, and pain in the knees or ankles from keeping your legs crossed or hanging for an extended period. Foot rests encourage correct, flat positioning of the feet at a comfortable angle.

The humble cushion! Preferably made of firm foam or memory foam, these can be underestimated. They can be used wherever you feel you need support. Make sure to choose the right size and shape for your needs.


In Friday’s Blog, we’ll be taking a look at the ergonomics of mobile computing, and how you can make yourself more comfortable while using your laptop, tablet or smartphone.

For IT advice or information, or to see what we could do for your business, give us a call on 0845 234 0580 or email us at

facebookicon twittericon


Posted in: It 4 business Tagged , , , , , , , , , , ,

office chair

Ergonomics - Are You Sitting Comfortably?

Posted on August 19th, 2013 by Emily


Many people who use IT for prolonged periods for work or leisure will, at some point, suffer from some kind of musculoskeletal problem, caused by lack of consideration for ergonomics and posture, either at their workplace or at home.


At the Geek Guru offices, we’ve experienced these problems just like anyone else, and we’ve had the opportunity to try out some devices and methods of solving them. While we don’t sell them, it is something that we find our clients ask about fairly frequently. We find ourselves recommending ideas, methods and products that might help them. So, we thought, why not put together some information about the causes, effects and solutions we’ve found based on our experiences and knowledge? We’re not healthcare professionals, but we do have quite a bit of experience of what it’s like to sit at a computer for a long time!

It’s something that a lot of people may not think about, but good ergonomics is something that can have a drastically positive impact on mood, focus, performance and productivity.

There’s a whole spectrum of musculoskeletal problems that can arise from poor ergonomics coupled with prolonged use of IT equipment.

All IT usage should be considered when it comes to ergonomics and health. Using a laptop or mobile device makes you just as susceptible to these problems as someone else, if not more so sometimes, as people have a tendency to slouch over a laptop or spend large amounts of time with their heads held looking down at a mobile or tablet screen – which is a lot of people when you consider that tablets and slates accounted for almost a quarter of computer sales in 2012.

Back, neck and shoulder problems are some of the most commonly reported problems, followed by arm and hand problems. RSI (or repetitive strain injury) is more common than many people realise, and is costing employers more than £20 billion in lost work time every year.

Here’s a few statistics to put this in perspective:

  • 55% of UK work-related illnesses are musculoskeletal disorders.
  • 4.7 Million work days are lost each year due to RSI-related problems.
  • More than 448,000 British workers surer from RSI.
  • 1 in 3 regular computer users may have symptoms of RSI.
  • 6 people leave their jobs each day due to a musculoskeletal disorder.


Of course, there are many products you can buy to improve your posture or reduce pressure on certain areas of your body, but there are many simple steps that you can take to make your workplace more comfortable.

This set of printable postcards from the Chartered Society of Physiotherapy is a good place to start for an instant improvement. It includes a set of exercises you can use in order to stretch out aching muscles or joints.


If this has piqued your interest, check out the rest of our posts this week where we’ll be going into a bit more depth on ergonomics for desktop and mobile computing, and explaining some of the things you can do to make yourself and your colleagues or employees more comfortable at work.

For IT advice or information, or to see what we could do for your business, give us a call on 0845 234 0580 or email us at

facebookicon twittericon


Posted in: It 4 business Tagged , , , , , , , , , ,

Geek Guru Shield

IT Essentials - Malware Emergency?

Posted on August 12th, 2013 by Emily


Last week we covered anti-malware options for businesses and individuals – but what can you do if you think there’s a problem, and your computer doesn’t have anti-malware software?


The software we recommend is MalwareBytes anti-malware, and Microsoft’s Malicious Software Removal Tool. For home users, MalwareBytes is free, and very efficient at quarantining and removing threats. It’s important to remember that the free version of this software does not provide any real-time protection and will not stop your machine becoming infected, but it is useful if you suspect there is a problem. Microsoft Malicious Software Removal tool is freely available to all owners of a genuine copy of Windows.

Network administrators can purchase a business version of Malware Bytes for use in an office setting, which is specially built for their business size.

If you suspect there’s a problem with some of your equipment but are not comfortable with running software like MalwareBytes or are unsure of what to do, we recommend that you contact an IT professional or Network Administrator as soon as possible.

The most important thing is that you DO NOT turn off or restart your computer. Doing so could cause further damage.

If you are unsure of any of the steps in the following list, we recommend that you consult an IT professional who can help you out.

When you’ve downloaded MalwareBytes and the Microsoft Malicious Software Removal Tool, you can use these steps to help you remove malicious software from your computer:

  • Disconnect your computer from any networks. Remove the Ethernet cable or turn off/unplug the wireless adapter.
  • Disable System Restore.
  • Run MalwareBytes, choosing a quick scan.
  • Run the Microsoft Malicious Software Removal Tool (MMSRT).
  • Quarantine or remove any threats as suggested by these tools.
  • Restart your computer in safe mode.
  • Repeat the scan with Malware Bytes and MMSRT.
  • Follow any instructions given by these tools, and repeat scans/restart as necessary.
  • Ensure all program patches and security updates are applied, e.g. Windows Update.


Please remember that this information is provided only as a suggestion, and that Geek Guru cannot be held responsible for any damage caused by attempts to follow these instructions. If you are unsure of anything at all, we recommend leaving the work to an IT professional.


If you’d like more information on protecting your computer from malicious software, want to know what Geek Guru could do for your business, or if you want to chat to us about anything technical, drop us a line and we’ll do what we can to help.

Call us on 0845 234 0580 or email us at


Posted in: It 4 business Tagged , , , , , , , , ,
Geek Guru Shield

Anti-Malware for Businesses - Malware Solutions

Posted on August 09th, 2013 by Emily


In the final post of this week, we discuss options for individuals and businesses alike to protect themselves from and fight back against malware infection.


If you’ve done some looking around online for anti-malware suites, you’ve probably come across several names. Symantec’s Norton, Kaspersky, McAfee, AVG, Avast, Avira, Comodo… and so on. The list is seemingly endless. Some of them are free, some of them are not. We’ve tried many different anti-malware, antivirus or internet security suites in our time as IT professionals, and it’s difficult to really select an all-time best software suite or manufacturer. Software suites can add, remove or change functionality between iterations, so it really depends on what all the companies are offering users in their software, which changes from year to year.

One thing we are certain of though, is that if you are an individual with a windows machine, currently without anti-malware software, or aren’t sure which one to get, you should take full advantage of Microsoft Security Essentials. This is a free offering from Microsoft that is available to all users of a genuine Windows operating system. For users of Windows 8, you will find that it comes pre-installed. For Windows 7 users and below (down to Windows XP SP 3), you need to download this software and install it separately. It’s a lightweight, user friendly program that integrates well with windows – as you’d expect it to, being from the same manufacturer as the operating system. It downloads and installs it updates daily, so you don’t need to worry about doing that manually. It’s a great free, basic package for Windows users that isn’t a huge system resource hog, and doesn’t get in the way.


Business user? Geek Guru are on hand to help!

If you’re running a business machine or a business network, however, you may want something a little more robust, and perhaps something that can be managed centrally or even remotely. The biggest danger to business networks is usually outdated software or outdated definitions (malware scanners use these definitions to determine if you have an infection or not, or if something is a risk, and they need to be updated regularly.)

At the moment, we’re recommending Kaspersky, as this suite is very robust, provides excellent value for money, and can be managed entirely by us using our managed services platform, Kaseya. This means you don’t need to lift a finger to keep your network protected and updated – we can do it all for you directly. We’ll know if there’s a potential threat, and we can easily manage any problems that arise or quarantine any suspicious files for you.

If you prefer to manage your own network, Kaspersky still has a great set of centralized controls, so you can manage your entire network from one machine, push down software and definition updates, and everything else you’d expect.

Individual users shouldn’t feel left out either, as Kaspersky offer a single user edition, which we can also help to install and support if necessary.

If necessary, there is software support from Kaspersky for Android devices and Mac computers also, so these devices need not be a security risk for your business.

If you take a look and decide that the price plans or features you see don’t suit you or your business, we have a few other suites we can offer and advise on, so you’re not restricted to one choice.

All anti-malware software performs an installation scan, and notifies you of any potential threats on your system or network on installation. If you’re worried about a malware infection, we can also offer advice on how to clean up your system and restore it to working order, as well as how to stop it getting re-infected.


If you’d like to know more about malware, anti-malware suites, if you have any questions or concerns, or just want to have a chat about getting a potential new device, we’re always happy to answer any questions you have about anything IT related!

Just give us a bell on 0845 234 0580 or drop us a line at



Posted in: It 4 business Tagged , , , , , , , , , ,
Geek Guru Shield

Anti-Malware for Businesses – Impact of Malware

Posted on August 07th, 2013 by Emily


We hear about the potential threats of malware all the time, but what could an infection mean for your business in real terms?


Many of us have been there. We clicked “Yes” to something we should’ve clicked “No” on while clicking through a program installer, and installed something we didn’t want, like a Browser Toolbar (Commonly known as BHOs or Browser Helper Objects). Or perhaps we’ve installed something based on its claims, because it looked useful. On the surface these software programs claim to be helpful, but really inside most of them are there for one purpose – to make money. How they do this can vary, many of them will install some kind of spyware and change some browser preferences, like your default search engine, making it use their own. The changes made in a few seconds by a piece of rogue spyware or adware can take hours to put right by hand.

Unfortunately, user data is a very, very profitable commodity. These “tools” can store and send data about your computer and browsing habits, your searches, how long you spend on specific sites, even the links you click on. This data can be used by companies who then target you with spam mail or advertisements based on what they learn from you. Spyware collects the data, Adware displays the advertisements that come from it. As well as being something of an invasion of privacy, and causing unwanted popups, advertisements or spam mail, spyware and adware can cause your computer to slow to a crawl, as it drains system resources in order to collect and send data.

Often, people are tricked into installing two or three pieces of spyware or adware at once, and it goes without saying that the more junked up a computer becomes with these things, the slower and slower it runs, and the more problems you may face. In extreme cases, spyware and adware has been known to crash computers entirely or make them almost unusable. Adware and spyware doesn’t tend to spread unless it’s coupled with a virus, so most of these annoyances can be removed with time, patience and a good IT professional.


  • Viruses, worms, trojans and keyloggers, however, have the potential to do much more serious and long term damage to your systems and possibly even your customers.

Some malicious software is programmed to cause as much destruction as possible to the systems it infects, for no other purpose than entertainment of the programmer or programming team. Some is designed to make companies aware of security flaws or to prove a vulnerability, while others are designed to steal data in order to make money in a much more direct fashion.

Data can be stolen, deleted, corrupted or otherwise rendered unusable by malware. When you’ve got a whole server full of critical or sensitive information, and a network of computers that access it, this can be very bad news.

Depending on the severity of the malware attacks, you could be forced to wipe your systems clean in order to get rid of the infection, or even replace parts of the system if enough damage is done. Left unchecked, infections can spread to backups you create from an infected network, meaning that you are then unable to use the backups of the data you have stored.


  • All malware can lead to lost time, which means lost productivity and lost potential profits.

The best defences against malware are to keep your software up to date, (for example, using Windows Update or similar tools) and using a security suite that defends your network or individual computer from attack. There are also hardware defences against intrusion attempts, like firewalls, which we’ll discuss in a later series of blog posts.

If you suspect there may be malware on your computer, get in contact with an IT professional as soon as possible, particularly if you are worried about your business network. If you’re a home user, there’s a tool you can download called Malware Bytes, which is available free for home use. It helps detect and remove the offending malware, and we recommend running through a full scan. You can find it at


On Friday, in our final post of the week, we’ll be discussing the antivirus and antimalware software and support options we provide, and the advantages of each for different types of businesses.

If you’d like to talk to us about anything IT related, give us a call on 0845 234 0580 or email us at, and we’ll be happy to help.



Posted in: It 4 business, IT Security Tagged , , , , , , , , , ,
Geek Guru Shield

Anti-Malware for Businesses – Malware Explained

Posted on August 05th, 2013 by Emily


This week in the Geek Guru Blog, we’ll be taking a look at malware, the impact it can have on your business, and the steps you can take to protect yourself, at home and at the office.


Malware is an all-encompassing term for malicious software and code out there that’s designed to negatively impact computer systems in one way or another. There are various forms of malware; most people who know how to use a computer are aware of at least one type, the virus. However, there are many more different kinds, all designed to do something slightly different.

In true Geek Guru style, we’ve decided to cut down the jargon and present these different types in a way that’s clear and straightforward. It’s often much easier to understand how you are protected by security software when you’re aware of the type of threats you are protected against, and how they work.


  • Viruses – A cover-all term for most types of infectious code. A virus will, when run, replicate itself by injecting its malicious code into other files. They can work in many different ways, but the defining characteristic is that a virus will install itself and replicate itself without the user knowing, but requires a file to be executed (launched or run) by a user in order to activate. While the term “computer virus” does have a specific definition, many people use it to encompass all of the malware types we mention in this article.
  • Worms – These are portions of malicious code or software that seek to accomplish the same things a virus does, but unlike a virus, they do not require user interaction in order to copy themselves. You do not need to click anything for a worm to replicate itself, once on a machine it can be completely autonomous, and easily spread over a network.
  • Keyloggers – These exist for one sole purpose – to log keystrokes on your computer with the goal of stealing valuable information. As you type, your keystrokes are recorded as data files and sent to wherever the keylogger is programmed to send them, meaning they could steal passwords, credit card numbers and other forms of sensitive data you input using the keyboard.
  • Trojans – Also known as Trojan Horses, so named because they disguise themselves as something normal or desirable (such as free software) in order to get users to download or install them. They can contain malicious code themselves or they can be used as a delivery mechanism for viruses, spyware or adware. They can also be used to turn computers into “zombie” machines for use in botnets.
  • Rootkits – Hiding malicious code from the user is sometimes essential for the proliferation and existence of a piece of malware. Sometimes a virus can seem incredibly hard to completely remove, or may come back seemingly from nowhere – this is nearly always because of a rootkit. Rootkits exist to do this job – they hide processes, files and sometimes even themselves from ordinary users so that they are not detected, and they try to avoid removal by antivirus programs. If a certain process critical to the malware is stopped or removed, the rootkit may reproduce it or restart it.
  • Backdoors – These open virtual “doors” into an infected machine, to allow access from other malicious software, interference from external sources such as hackers, or allow information to be sent out without the user’s knowledge (such as information from keyloggers).
  • SpywareDesigned to spy on the user through monitoring activities such as browsing habits, time spent on certain sites, links clicked, searches performed, logins, passwords, active software on a user’s computer, technical specs of the infected computer and other information that can be profitable to the spyware vendor or useful to marketers.
  • Adware – Mostly irritating rather than actually dangerous, adware (as its name suggests) shows unwanted advertisements to the user, usually in the form of a distracting pop-up window.

All types of malware can lead to theft or destruction of important or sensitive data. They can also lead to greatly reduced PC performance due to computer resources being used by malware, or reduced internet connection speeds due to uploading/downloading data. Imagine a scenario in which you have an office network of 50 computers, all infected with malware, all uploading or downloading data at the same time over the same connection. That would slow anything down to a crawl!


At Geek Guru we’re committed to doing the best we can to ensure this doesn’t happen to our clients. We offer several solutions, suitable for many sizes or types of business, and we even offer 100% managed solutions – meaning you won’t have to lift a finger to keep your internet security software up to date, or manage possible threats. We’ll do it all for you and notify you if there’s anything you should be worried about or anything that requires your attention.

Be sure to read the rest of this week’s posts which will focus on what these threats could do to your IT, things you can do to prevent these threats, available software and the services we offer to help.

For more advice or information, call us on 0845 234 0580 or email us at



Posted in: It 4 business, IT Security Tagged , , , , , , , , , ,

Surge Protection

Posted on July 29th, 2013 by Emily


No matter where you are in the world, electricity surges and spikes can be a real threat to sensitive equipment.


There are two main kinds of devices on the market designed to protect against electrical overloads. One is an RCD or “Circuit Breaker”, which protects users from electrical shocks from equipment, such as lawnmowers or other power tools. The other is a surge protection device, designed to protect sensitive equipment from electrical spikes or surges.

Power surges are very brief (around 1/20th of a second) increases in the voltage that can be incredibly destructive. Spikes are even shorter, lasting only one or two nanoseconds – but can be equally as destructive. Most IT equipment has some built-in safety functions, but these are not always successful in preventing damage to equipment. Power surges and spikes can occur at any time, but they can be especially prevalent at times of peak usage when electricity grids are pushed close to their maximum capacity, and before or after a power outage.

If you have a lot of IT equipment – you’ll want to protect it against these potentially destructive surges and spikes, since it can completely destroy equipment in its path if it is severe enough.

The idea behind a surge protector (sometimes also called “surge suppressors”) is that if/when a destructive surge or spike is sent down the power lines, the protector acts as a buffer and grounds the surge or spike instead of letting it hit your valuable equipment. Surge protectors let through a specific voltage, and are designed to keep your equipment running with the correct voltages despite being hit by surges and spikes. In particularly severe cases, such as a lightning strike, this can lead to the surge protector being destroyed – this is just a confirmation that your equipment was protected and the surge protector did its job.

You may be wondering “what spikes and surges can do to my equipment? How can they be so destructive?” Allow us to explain that one! Computers and other IT equipment are actually very sensitive to voltage changes. Too much or too little voltage can cause them to fail, and using too much for too long can cause components to melt or pop. Heat is a common enemy of all IT equipment (as we discussed last week in our blog on overheating) and surges can cause very rapid overheating of components, which leads to device failure and potentially thousands of pounds of broken equipment. Even if the equipment doesn’t fail because of one surge, repeated exposure to surges and spikes can leave lasting damage that will eventually cause it to fail.

We think of surge protection as a kind of insurance for IT equipment. It’s far cheaper to replace a few surge protectors than it is to replace a whole office full of roasted IT equipment! They’re fairly cheap to buy and we certainly wouldn’t operate our equipment without them. If you’re looking to buy some for your equipment, make sure you look for safety and production standards on them, and beware of buying too cheaply, they may not provide enough protection for your equipment.


If you’d like some advice or recommendations on protecting your IT equipment from surges and spikes, or you’d like to ask us about anything IT-related, we’re here to help!

Give us a call on 0845 234 0580 or send us an email at



Posted in: It 4 business Tagged , , , , , , , , , , , ,