Call (716) 373-4467

Ask A Databranch Engineer: “Should my computer be left on at night?” & “How secure is the cloud?”

Two questions we receive frequently from clients and prospects are, “Should I turn my computer off when I leave the office at night?” and “How can I be sure my data is protected in the cloud?” This month I sat down with Jason Aderman, Databranch Systems Engineer, to get his take on these common questions and set the record straight!

“Should I turn my computer off when I leave the office at night?”

At the end of the day leaving your computer on or off at night is a personal preference, which explains why there are so many conflicting ideas surrounding the topic. I’ve compiled the pros for each option in the chart below so that you can make the right decision for your organization:

Turn Computer Off Every Night

Leave Computer On Every Night

Energy Savings: Studies have shown that you can save on your power bill when you shut down your PC nightly. Even when your PC goes to “sleep”, it still consumes power.

Extend Life of Device: PC’s going in and out of sleep mode is actually easier on the computer in the long term compared to the demands of booting up each day.

Better Performance: A daily computer reboot gives your computer a fresh start which typically leads it to run faster with fewer errors.

Increased Productivity: General maintenance can be performed during off-hours if a computer is left on. This means users won’t be interrupted for anti-virus scans and software patching. Users can also get right to work when they arrive in the morning.

“How can I be sure my data is protected in the cloud?”

2015 was the year of the data breach and 2016 does not appear to be slowing down. The first thing we stress at Databranch is that you can never be too secure and security is always something that will need to be managed and maintained with laser focus. 

It is also important to remember that the “cloud” is nothing more than a farm of servers in a data center. By design, data centers have the highest standards for data security and protection, much higher than most users could reach storing their data at home or in their office. When evaluating cloud solutions for your organization, it’s vital to understand where your data is being stored, encryption standards, and what level of commitment your provider makes in the event your data is compromised. 

Databranch has a team of technology experts that can help you evaluate the right cloud applications for your organization. To start crafting the best cloud solution for your business, click here!

Have a technology question you’ve always wanted answered? Reach out to Amanda Lasky at 716-373-4467 ext. 15 or

comments powered by Disqus
2FA AI APC backup Breaches business continuity Business Email Compromise BYOD client of the month cloud computing computer services computer support computer upgrade Computer Upgrades Control Chief covid-19 CryptoLocker CryptoWall Cyber Attacks cyber criminal cyberattack cybercrime cybersecurity Cybersecurity Training Dark Web Monitoring Dark web scan Data Breaches data protection Data-Loss Prevention Databranch Databranch Comprehensive Care databranch cto databranch employees Device Security Discounts doug wilson dura-bilt email migration email security End of Support Exchange Online Facebook field technician Hackers Hardware Refresh heat-induced server crash holiday computer tips holiday internet tips How Long Do I have to Upgrade my Windows 7 Computers? i.t. service provider ID Agent Information Technology Internet Security IT Compliance IT Outsourcing IT Security IT Services J.P. Morgan local admin privileges malware managed service managed service provider managed services Microsoft Microsoft End of Support Microsoft Office Microsoft Patching Microsoft Support Microsoft Telephone Scam mike wilson mobile device security Multi-Factor Authentication Network Infrastructure Office 2013 Office 365 old UPS password management Password Manager password security Passwords PC Performance Penn-Troy Manufacturing Personal Data phishing Phishing Attacks Power Failure productivity Professional Tune-Up proper server environment Ransomware remote access repeatbusinesssystems SBS2011 Scammers security security vulnerabilty Server 2008 Server 2008R2 Server Upgrade server virtualization Small Business Small Business Server 2011 smb Smishing SMS intercept Social Media Social Media Security Solid-State Drive stolen credentials Symantec Symantec Backup Exec technology best practices temperature Tips Two-Factor Authentication Upgrading to Windows 10 UPS virus Western New York Windows 10 Windows 7 Windows Server 2003 Windows Server 2012 winrar Work Computers