How much Internet bandwidth do I need for my home?

Internet Service Providers sell different tiers of service.  These tiers are categorized in terms of speed/bandwidth and sometimes caps gqd8sgc.  But how do I know how much bandwidth I need to buy?

First, one needs to understand bandwidth and caps.  And it is really simple if you think of it like the water supply to your house.  When your house was built, the builder chose to use a certain size pipe.  The amount of water that pipe can carry depends mostly on the pipe’s diameter.  So, a 1 inch pipe will carry more water than a 3/4 inch pipe.  How big that pipe needs to be might be determined by how many showers are taken at the same time.  A 3/4 inch pipe may be able to serve 2 showers at the same time and still give good water pressure for that nice sting and back massage.  But if someone else turns on a 3rd shower, or the washing machine starts up, the pressure drops.  People can still get a shower, but it is less satisfying since it the pressure is lower because the main pipe limits the flow.  It doesn’t matter how many showers are in the house, only how many are in use at the same time.

Choosing a bandwidth option is like choosing the size of the pipe to the house.  Currently, streaming TV & movies is, by far, the biggest user of Internet bandwidth.  Netflix uses around 5 use this link.5mbps (megabits per second) for an full quality HD movie.  If two people watch Netflix on 2 different TVs, that will double the bandwidth usage to 11mbps.  So, our 12m service is just enough for that.  If a 3rd Netflix stream were started, it would work, but all 3 streams would compress more and reduce picture quality.  Also, while 2 Netflix movies are streaming, there isn’t much bandwidth left over for surfing, gaming, etc.  Just like water pressure in showers, it doesn’t matter how many TV’s or screens are in the house, just how many are used at the same time.

Caps matter also.  Most residential ISPs have caps.  AtNex does not.  To use the water analogy, a cap would be like having a limit on how much water you can draw from the system per month.  You can pull it slowly with a small pipe, or really fast with a big one, but when you hit the cap, they charge you more.  Comcast and AT&T have caps.  AtNex has no caps, so you can download all day & night.

The 5.5Mbps benchmark is good for 720p or 1080i HD.  The new 4K HD TV will use a lot more.  Netflix is recommending a bandwidth of at least 25mbps to support 4K TV.  But you don’t need to buy that bandwidth unless you have a 4K TV to watch.

There might be other factors in how much bandwidth you need.  An I.T. professional may need to download large disk images often.  A gamer needs some bandwidth, but is mostly concerned with latency (lag).  A real concern is security cameras.  If the video feed from the cameras goes to “the Cloud”, a lot of upstream bandwidth may be needed.  So, if you have one of these less common needs, call us at 770-222-4455 and we’ll be happy to help.


Phishing is not hacking. Tips to avoid being hacked like the DNC.

The FBI has released their report on the Russian hacking of the Democratic National Party called “Grizzly Steppe“.  Read the FBI report here.  The report is long on blame, short on evidence and includes a silly, but authoritative looking diagram.  Reminiscent of Colin Powell’s U.N. presentation of Saddam Hussein’s WMDs,  it is very short on details or evidence.  What is clear is that the initial attacks and entry were through phishing attacks.

In a phishing attack, an email is crafted to appear to be from an authoritative source but is not.  For instance, you might receive an email that appears to be from your bank or e-mail admin telling you to click here to change your password.  The link leads to a replica site that looks like the bank or your e-mail, but is really a fake site meant to capture your credentials.  The fake site may actually act as an intermediary and allow you to really change your password at the bank or mail service.  But it captures the new and old passwords and gives them to the bad guys.

Our SpamDragon spamfilter stops phishing emails by the dozens per day.  Phishing emails are very common.  So, everybody should have some clue how to recognize them.  And that’s where this imbroglio with DNC and Russian hacking is disingenuous.  The current administration has placed all the blame on the Russian “hackers” who did this.  And they may well be Russian.  But here’s the thing:  Hacking and Phishing are not the same thing.

Hacking is like burglary.  The burglar finds a way to break into your locked house, pokes around and steals the jewelry you keep in your sock drawer.  Phishing is more like this:  Some guy shows up in a maintenance uniform, knocks on your door, and says he’s here to look at your air conditioner.  That’s his bad.  But then you let him in and tell him you’re going for a long walk and he can make himself at home.  That’s on you then.  Phishing is just giving it away.  The DNC fell for a phishing attack.  That’s just incompetent.

The FBI report shows few facts to back up its assertions.  But it does have some good advice including regular backups, security scans, and training.  Phishing is best resisted with common sense.  So here are some security tips to which all of us should adhere:

    1.  Don’t trust emails from banks or mail admins that include links to login or change your passwords.  Type the URL into a web browser yourself so you know it is right.  Look for the green symbol that indicates the site is validated and trusted before you type in credentials.
    2. Don’t open attachments that you didn’t expect.  Regardless of whether the email purportedly came from your bank or your best friend, do not trust the attachment.  In particular, zip files are untrustworthy, especially encrypted zip files that have the password included in the email.  Why would anyone legit do that?
    3. Run a security scan from outside azithromycin price.  If you’re in a medium sized or larger company, pay professionals to do it.  If you’re a small company or a home user, you can use GRC’s scan as a beginning.  Just click here:
    4. Back up your data!  But keep the backup safe.  Use a very trusted cloud service with encryption, or put it on your own drives or USB sticks.  But don’t lose those drives or sticks.  Having many copies is safer for drive failures, but makes it easy to accidentally lose a copy that someone else may find and read.
    5. Patch the O/S and firmware.  Keep your systems up to date and patched.  Obviously, this includes Windows and Apple updates (Linux too).  But your router has software that may allow bad guys to do bad things.  Keep it up to date.  Other devices like security cameras, printers, and the soon to be a problem “Internet of Things” like home automation, smart refrigerators, etc need to be behind a firewall and running the latest firmware.
    6. Change default passwords and use high security passwords.  Change default user names where possible.  All the script kiddies in the world are trying usernames like admin, administrator, supervisor, superuser, root, etc.  Disable or change those usernames and make more unusual usernames.
    7. Turn off features and devices that aren’t needed.  If you’re out of town, power off the TV.  If you don’t have home automation or an Internet camera security system, turn off the router.  It’s more secure and saves power and life on the device also.
    8. Use an antivirus.  Duh!  But the latest malware will probably get by the antivirus anyway.  That’s why the measures above are still important.
    9. Use an anti-spam service.  It won’t block all phishing attacks, but it will reduce them and make it easier to resist… or will it?  Sometimes I wonder if people would be more skeptical if they saw all the attempts instead of just what gets through the spam filter.

It doesn’t matter much who the attacker is.  If it’s not Russia, it’s China, or North Korea, or Iran, or Anonymous, or ISIS, or some script kiddie club in Miami.  There will always be someone probing and testing your defenses.  Attacks, probing, and deception are constant.  Complaining about it is like complaining about a punch in the nose in a boxing match.  Retaliation and negative incentives in the form of laws are not adequate protection.  We must all protect ourselves proactively.  Falling for a phishing e-mail is unacceptable.  Don’t invite the burglar into your house!