Extend WiFi Range At Home

Are you tired of slow internet speeds and dropped Wi-Fi signals? Do you have wireless dead zones in your home where the internet just doesn’t seem to reach? There are several ways to extend your Wi-Fi range and improve your internet experience. From repositioning your Wi-Fi router to installing a Wi-Fi extender or booster. If you have a larger than average sized home then the best way to extend Wi-Fi throughout your property is with Wi-Fi access points.

Extending Wi-Fi by repositioning your Wi-Fi router

A simple and affective way to extend your Wi-Fi range is to reposition your router. Wi-Fi signals travel easier through open space, so make sure your router is out in the open and free from obstructions. Don’t hide it in a cupboard or behind your TV. Try to elevate it because Wi-Fi signals are less absorbed through open space. Install your Wi-Fi router at least 2 meters off the ground.

Make sure to keep the Wi-Fi router away from fish tanks, water tanks and metal surfaces as these can absorb or reflect the Wi-Fi signal. Keep the Wi-Fi router as far away from other 2.4GHz and 5Ghz devices like Microwave ovens, baby monitors, cordless dect phones, wireless home security cameras and base stations. These devices will most likely interfere with the Wi-Fi router signal and cause dropouts.

If the Wi-Fi router has external antennas experiment using different angles. Sometimes having all antennas upright works better than having then angled at a V. Your mileage may vary.

Cheap way to extend Wi-Fi range using a Wi-Fi extender

A cheap option to extend Wi-Fi range is to use a Wi-Fi extender or booster. A Wi-Fi extender picks up your router’s Wi-Fi signal, and rebroadcasts the signal. This can help improve Wi-Fi coverage in areas where the signal is weak.

Wi-Fi extender placement is very important, too far away from the main Wi-Fi router and the speed will be slow and dropouts could occur. Most decent Wi-Fi extenders have a signal indicator light indicating if the Wi-Fi extender is placed in an optimal settings.

Another important aspect when using a Wi-Fi extender is to choose one that is dual band, i.e.. 2.4GHz and 5Ghz. When setting up the extender you will get way better speeds when the extender connects to the main Wi-Fi router on the 5GHz band.

Extend Wi-Fi range in a home using Wi-Fi access points

Using a wired Wi-Fi access point is the best way to extend Wi-Fi, using this method will give you the best speeds and greatest reliability. A Wi-Fi access point allows Wi-Fi devices to connect to a wired network. It serves as a central hub for Wi-Fi devices. You can wire in additional wireless access points, which offer better speeds and performance, but may involve running cables through the walls. This allows you to create a wireless network within your existing wired network.

What is a Wi-Fi access point?

A wireless access point (WAP) is a networking device that allows Wi-Fi enabled devices to connect to a wired network. It creates a wireless local-area network (WLAN) by serving as a transmitter and receiver of wireless radio signals. It allows easy access to the Internet over the air. A Wi-Fi access point can be incorporated into a wired router or be a stand-alone device 2. It is simpler and easier to install WAPs to connect all the computers or devices in your network than to use wires and cables. Wi-Fi access points are different from extenders in that they use a wired (ethernet) backhaul instead of Wi-Fi - this greatly enhances the speed, coverage and reliability.

How much does it cost to install Wi-Fi in my home?

The cost of installing Wi-Fi devices to enhance Wi-Fi coverage in your home can vary depending on several factors such as your home’s size, location, number of connected devices and speed requirements. The cost of an essential upgrade, such as adding a DIY Wi-Fi extender can start at about $60 for a basic Wi-Fi extender to about $200 for a better dual band Wi-Fi 6 extender. Upgrading your home Wi-Fi to a commercial grade Wi-Fi access point system can start at about $450, but this is again dependent on home size, number of devices, speed requirements etc.

How do I get a professional, commercial grade Wi-Fi system installed in my home?

To get a professional, commercial-grade Wi-Fi system installed in your home, you can contact a company that specialises in home and commercial Wi-Fi installation services. Our recommendation is to go with a trusted, reliable technically proficient Wi-Fi installation company that can install high-performance, business-grade Wi-Fi to ensure clear, even coverage throughout your home.

Contact a Wi-Fi installation company now.

Xero Backup – Secure, Automated Cloud Backup

What Is Xero Accounting Software?

Xero is a cloud-based accounting software that connects banks, accountants, management, and advisors from anywhere with any device with an active internet connection.

Xero performs all accounting tasks from preparing ledgers, accounts receivable, accounts payable, financial statements to the management of payroll, taxation, bank reconciliation, and inventory.

Xero is designed to simplify business tasks such as paying bills, managing expense claims, creating invoices and more.

Xero stores customer data on Amazon Web Services (AWS), a third-party data hosting provider with servers located all over the world.

Do I Need To Backup Xero Data?

Yes, it is necessary to backup your Xero accounting data. Xero themselves make this very clear in their terms of service - “Data loss: Data loss is an unavoidable risk when using any technology. You’re responsible for maintaining copies of your data entered into our services."

"No compensation: Whatever the cause of any downtime, access issues or data loss, your only recourse is to discontinue using our services.

Source, Xero Terms of Use: https://www.xero.com/au/legal/terms/

While Xero has security measures in place to protect your data, it is still important to have a backup of your data in case of any unexpected events such as data loss, cyber threats or corruption.

How Can I Backup My Xero Data?

You can do manual data exports directly from within your Xero application or you can use a secure, automated cloud to cloud backup solution to do daily backups.

Server Guru IT Support partnered with UK backup giant Redstor to provide a cloud to cloud backup solution right here in Australia for Australian businesses.

How it works:

Xero Cloud Backup is a cloud-based tool for backing up and restoring organisations using Xero.

Protect your business critical Xero-based accounting data against human error and other disasters with Redstor and gain peace of mind that you have a copy outside of Xero.

Ignoring the need for a third-party backup is a major gamble. Xero’s own Services Agreement states: “You must maintain copies of all data inputted into the service. Xero expressly excludes liability for any loss of data no matter how caused.”

Why you need third-party backup? Xero will do an excellent job keeping your data safe, but it can’t help if the problem originated from within your organisation. For example:

  • A new employee has deleted data in error or imported transactions wrongly.
  • A disgruntled employee has wreaked havoc, sabotaging files and deleting contacts.
  • An app you were trialing has pushed unwanted data into your accounting records or drastically altered contact details, records about deals or company data.

Our Xero backup solution connects to Xero via secure API to retrieve data and is then send to secure data centers in Australia.  Backup data is protected via bank grade encryption.

Automated backups of the following is supported:

  • Accounts
  • Assets (including draft, disposed and registered assets)
  • Asset types
  • Asset settings
  • Batch payments
  • Branding themes
  • Bank transactions
  • Bank transfers
  • Contacts
  • Contact groups
  • Currencies
  • Credit notes
  • Employees
  • Expense claims
  • Folders
  • Files
  • File associations
  • Invoices
  • Invoice reminders
  • Items
  • Journals
  • Linked transactions
  • Manual journals
  • Organisation settings
  • Overpayments
  • Payments
  • Prepayments
  • Projects
  • Project tasks
  • Project time entries
  • Projects users
  • Purchase orders
  • Quotes
  • Receipts
  • Repeating invoices
  • Tax rates
  • Tracking categories
  • Users

Want more info on our Xero Backup Solution?

Get in touch via our contact form below and we will get back to you.



    Need to Backup Microsoft 365 data? Read more about our Microsoft 365 Cloud Backup Solution

    Cybersecurity: How To Protect Your Business

    Small businesses are increasingly becoming targets for cyber attacks, as they often have valuable information and resources but lack the same level of security as larger companies. It is important for small business owners to take proactive steps to protect their business from cyber threats.

    Server Guru IT Support's Cybersecurity experts can conduct a small business cybersecurity risk assessment to point out vulnerabilities in IT systems.

    Cybersecurity Stats For 2021-2022

    The Australian Cybersecurity Centre's annual cyber threat report provides an overview of key cyber threats impacting Australia, how the ACSC is responding to the threat environment, and crucial advice for Australian individuals and organisations to protect themselves online.

    The report shows:

    • During the 2021–22 financial year, over 76,000 cybercrime reports were made via ReportCyber, an increase of nearly 13 per cent from the previous financial year.
    • One cybercrime report is made approximately every 7 minutes, compared to one report every 8 minutes in 2020–21.
    • Cyber security incidents responded to by the ACSC are growing in severity.
    • Cybercrime has a significant impact on organisations of all sizes; in 2021–22 the average loss per report across businesses increased 14 per cent compared to 2020–21.
    • Cybercrime and cyber security incidents remain underreported and the ACSC urges Australian organisations and individuals to report all cybercrimes and cyber security incidents.
    • A rise in the average cost per cybercrime report to over $39,000 for small business, $88,000 for medium business, and over $62,000 for large business
    • 150,000 to 200,000 Small Office/Home Office routers in Australian homes and small businesses vulnerable to compromise

    What Can Small Businesses Do To Protect Against Cyber Attacks

    One of the first steps in small business cybersecurity is to create a strong password policy. Passwords should be long, complex, and unique, and should be changed regularly. Additionally, two-factor authentication should be used whenever possible to add an extra layer of security.

    Another important step is to keep software and systems up-to-date. This includes not only operating systems and software, but also security software such as antivirus and firewall programs. Outdated software can contain vulnerabilities that hackers can exploit, so it is important to stay current with updates and patches.

    Small businesses should also be aware of the potential for phishing scams, in which hackers use fake emails or websites to trick users into giving away personal information. Employees should be trained to recognise and avoid phishing attempts, and to report any suspicious emails or websites to IT or management.

    It is also important for small businesses to have a disaster recovery plan in place in case of a cyber attack. This includes regular backups of important data and a plan for how to quickly and effectively respond to a security breach.

    Small businesses owners are recommended to get an IT security company to conduct a small business cybersecurity risk assessment to identify security weaknesses in IT systems.

    What Is A Small Business Cybersecurity Risk Assessment

    A small business cybersecurity risk assessment is a process of evaluating the potential risks and vulnerabilities that a small business may face from cyber threats. The assessment typically includes identifying the types of sensitive data and systems that the business has, determining the likelihood and potential impact of different threats, and developing strategies to mitigate or prevent those risks.

    During a risk assessment, a small business may take several steps, such as:

    • Identifying and inventorying all of the business's assets, including hardware, software, and sensitive data
    • Evaluating the current security controls and procedures in place, such as firewalls, antivirus software, and access controls
    • Assessing the potential vulnerabilities of the business's systems and data, such as outdated software or lack of encryption
    • Identifying the potential threats to the business, such as hacking, phishing, and malware
    • Determining the likelihood and potential impact of each identified risk
    • Developing and implementing a plan to mitigate or prevent identified risks.

    The risk assessment process is an ongoing one, as the cyber threats and vulnerabilities are constantly changing and evolving. It is important for small businesses to review and update their risk assessments on a regular basis to ensure they are always aware of the potential risks they are facing, and to have a plan in place to mitigate or prevent them.

    How To Backup Gmail Emails To Your Computer

    Did you know that Google's free Gmail service does not guarantee safeguard of your email data. At any point can your data become corrupt or be lost. I have seen and read about cases where a Gmail user's emails disappeared right in front of their eyes.

    Because Gmail is a free service there is no support and if your email data is gone it will stay gone. Unless... you have a backup.

    Backing up Gmail emails should be a regular focus to ensure data recoverability in case of loss, corruption or malware infection.

    Most Gmail users that have a Gmail account will eventually run in to the 15GB limit imposed. Others may already have reached this limit and will be faced with a message from Gmail " Gmail is out of space".  One you reach this limit your email no longer receive new messages.

    A simple way to clear out space is to delete old messages but, this may not be an option for you. Lets look at another option, making a backup of the Gmail emails on to a computer.

    The backup data includes email messages and attachments. To see what else is included follow the link to Gmail's article on exporting your data from Gmail.

    How To Download Gmail Emails To A Computer

    Head over to Google's download your data page.

    Select the checkbox next to "Mail" then click the "next step" button.

    Choose a destination to receive the download, in this case I chose "send download link via email"

    Choose export size as 50GB then click "create export".

    Now just wait until the export has been created and the link is emailed, then proceed to click the link to download the Gmail backup to your computer.

    Remember to place the downloaded file in a safe place as anyone can now use this file to view your emails.

    How To Download A Youtube Video To A Computer For Free

    There might be a time that you would like to download a video from YouTube to view later while offline but unfortunately YouTube does not allow saving or downloading videos directly. In order to download a YouTube video we would either need to install software that can download the video or make use of an online service. This article covers downloading a YouTube video without using software or without paying anyone a fee.

    How To Download Youtube Videos For Free Without Software

    The simplest way to download a YouTube video is to go to the YouTube video that you prefer to download, then insert "SS" in the url before the YouTube part.


    I want to download this YouTube video to my computer: https://www.youtube.com/watch?v=NBgOG1zzLjw&ab_channel=ServerGuru

    Insert SS after the www. bit but before the "youtube" bit like this: https://www.SSyoutube.com/watch?v=NBgOG1zzLjw&ab_channel=ServerGuru

    Then hit enter.

    Your web browser will automatically be redirected to "savefrom.net"

    Now, click on the "Download MP4" button next to the video. Do not click any other button.

    *You DO NOT need to install the Savefrom.net helper extension.

    The YouTube video will now download. If it doesn't and the video you chose to download plays instead, then click on the three dots to the right, then click on "download".

    Is It Legal To Download Videos From YouTube?

    Just incase you were wondering 🙂 No, it is not legal. YouTube terms of service state the following:

    "Permissions and Restrictions
    You may access and use the Service as made available to you, as long as you comply with this Agreement and applicable law. You may view or listen to Content for your personal, non-commercial use. You may also show YouTube videos through the embeddable YouTube player.

    The following restrictions apply to your use of the Service. You are not allowed to:

    access, reproduce, download, distribute, transmit, broadcast, display, sell, license, alter, modify or otherwise use any part of the Service or any Content except: (a) as expressly authorized by the Service; or (b) with prior written permission from YouTube and, if applicable, the respective rights holders;
    circumvent, disable, fraudulently engage with, or otherwise interfere with any part of the Service (or attempt to do any of these things), including security-related features or features that (a) prevent or restrict the copying or other use of Content or (b) limit the use of the Service or Content."

    Download YouTube Videos The Legit Way

    YouTube doesn't allow downloading videos for free unless you have a YouTube Premium account, this allows the account holder to download videos for offline watching. This is the only legal way.







    Tech Support Scams Explained

    A technical support scam, or tech support scam, is where a scammer claims to offer a technical support service or technical assistance to a user.

    Scammers claim to be from a known company such as Telstra, Optus, Apple, Microsoft etc.

    Tech support scammers use social media, fake websites and a variety of other sources to instill confidence to persuade their victim of problems on their computer or mobile device, such as a malware infection, services not working like shey should or telling the victim that their internet connection is slow and can be upgraded when in fact there are no issues.

    The Technical support scammer would most likely ask the victim to load a remote access application on the victims computer, laptop or other device. The tech support scammer uses the remote access application to gain access to the victims device to pretend to repair the "issue".

    The scammer will then persuade the victim to pay for the "fake" service provided by the tech support scammer.

    The victim makes payment for the fictitious service and the scammer moves on to their next victim.

    What to do if you were scammed

    If at some point you realise that you have been victim to a technical support scam follow these steps:

    • Unplug your computer from the internet or switch it off
    • Call your bank and inform them of the scam, they might be able to cancel the transaction
    • If you have given the scammer details about your bank, call your bank notifying them of your concern
    • Report the incident to ScammWatch
    • Report the incident to the Police
    • If you gave the scammer any passwords, IMMEDIATELY change the passwords
    • Set up two factor authentication on all online accounts
    • Call an IT Professional that can remove the remote access application, clean your computer of malware and validate that it is safe to use

    In short:

    Tech support scammers use pressure scare tactics to get what they want. They impersonate technical support staff and sometimes pose as support staff from legitimate companies. They trick you in to believing that there is a problem and then either steals information or fix the "problem".