contact us

Use the form on the right to contact us.

 


Naperville, IL 60565
USA

630-639-7372

iPhone-XS-photo.jpg

Blog

Tame the Tangle! Quick Cable Management Tips

Rowena

Tame the Tangle! Quick Cable Management Tips

Take a moment and look behind your Mac. Do you see a tangle of cables? The main downside of a mess of cables is that it’s a cluster of chaos that attracts dust bunnies. However, it’s possible for power cables—especially when tightly bundled or looped—to emit electromagnetic interference that can disrupt or degrade the signal carried by nearby data or network cables. They can also heat up, which is generally best avoided. Plus, the more tangled the cable nest, the more likely you’ll cause harm if you pull too hard while attempting to remove a cable from the tangle.

Also, consider cables that extend beyond your desk. Do you have power cables that run across the ground or Ethernet cables that loosely snake up into the ceiling? To protect both people and equipment, ensure that cables aren’t a tripping or catching hazard.

If your cables are a complete disaster, take some time to shut down your devices, disconnect all the cables, clean underneath, and reconnect them in an organized fashion, removing unused cables and replacing damaged or unnecessarily long cables with new ones.

To keep your cables under control going forward, follow these tips:

Select and reduce cables:

●     Buy and use cables that are only as long as they need to be.

●     When buying new cables, prefer braided cables, which catch less and last longer.

●     If you have many cables, try to trim the number with judicious use of docks or hubs.

●     Upgrade to wireless accessories, like the Magic Keyboard and Magic Trackpad, that only need to be plugged in occasionally to charge.

Pay attention to cable location:

●     Try to keep cables off the floor, but use a floor cord cover if it’s unavoidable.

●     Attach long runs of network cabling to the wall or floor to reduce the chance of accidents.

●     Run cables through raceways or inside cable trays to keep them together under desks.

●     Add adhesive cable clips to the back or underside of desks without cable management options.

●     Ensure cables don’t interfere with workstation ergonomics, especially with movable sit/stand desks.

●     Keep power adapters away from other cables for better heat management.

Group your cables:

●     Use Velcro straps or cable ties to bundle power and data cables separately.

●     Avoid bundling too many power cables too tightly to avoid heat buildup.

●     Label cables with their type and use so you can easily distinguish between them.

●     Store extra cables in clear zip lock bags or bins, one per cable type.

Maintain your cables:

●     Throw out any damaged or suspect cables right away.

●     Periodically check and reorganize your cables, removing any that aren’t in active use.

You should be able to find a wide variety of cable management accessories, such as Velcro cable ties, cable labels, cable clips, and floor cord covers, at your preferred electronics retailer.

None of these suggestions are difficult to follow, and you’d be surprised how much you will appreciate having neatly organized cables in use and available when you need them

(Featured image by Adam Engst)


Social Media: Do you have a rat’s nest of random cables behind your Mac? Follow our quick tips to bring order to the mess, reduce the chance of accidents, and avoid degraded data signals.

Quickly Catalog Books or Other Named Items on Shelves

Rowena

Quickly Catalog Books or Other Named Items on Shelves

If you have trouble finding particular items across multiple shelves of books, labeled boxes, or anything else that’s clearly identified with a text name, take carefully composed photos that capture all the titles without glare. Later, you can search for any text in those photos to find them—tap the Search button in Photos on the iPhone or iPad, or use the Search field in Photos on the Mac. Photos highlights the search term on the found photo. (If Photos on the Mac doesn’t surface an expected photo, try again on your iPhone, which seems to get more hits on harder-to-read text.) This capability comes courtesy of Apple’s Live Text feature, which uses machine learning to identify text in photos. Think of it as the lazy person’s database!

(Featured image by Adam Engst)


Social Media: You can take advantage of Apple’s Live Text feature in Photos to catalog books, boxes, or any other items with text names. Think of it as a lazy person’s ad hoc database.

Audit Your Trusted Device Lists for Greater Security

Rowena

Audit Your Trusted Device Lists for Greater Security

One of the ways companies protect critical account information is by remembering the devices you use to log in as “trusted devices” or “authorized devices.” Those logins will usually have been protected by two-factor authentication or another mechanism that guarantees the device is being used by you, its owner. Subsequent logins from those devices may be more convenient for you due to requiring only a username and password, and trusted devices may automatically receive two-factor authentication codes. That’s how Apple ensures you are who you say you are when you log in to your Apple ID on a previously unseen device.

Although trusted devices can help increase your security, they can also reduce it. If an attacker were to gain access to one of your trusted devices, they would have a better chance of breaking into your accounts or masquerading as you when setting up new accounts. As a result, it’s important to audit your trusted devices occasionally and make sure you still control all of them. The first time you do this, you may be shocked to see that a Mac you last used years ago could still be receiving Apple ID verification codes. Removing unused trusted devices from an account makes it more secure with no downside.

We can’t provide a comprehensive list of services that track trusted devices, but many of you use two high-profile ones: Apple and Google. In addition, most password managers with online accounts also rely on trusted devices—we’ll look at 1Password here, but if you use another password manager, look through its settings to see if it maintains a list of trusted devices.

Remove Trusted Apple Devices

Apple gives you access to the list of all your current Apple devices in System Settings > Your Name on the Mac and in Settings > Your Name on the iPhone and iPad. (You can also log in to appleid.apple.com, click Sign-in and Security in the sidebar, and click Account Security.) Some of the devices shown may not be trusted devices—there isn’t much to worry about with a HomePod, and some old Macs may not be logged in. Click or tap any device to learn more about it—the 27-inch iMac in the screenshot below is trusted and can receive Apple ID verification codes.

Unfortunately, Apple doesn’t display the date the device was last used, which can help identify ancient devices. So look for any devices that you don’t immediately recognize as being in use—particularly Macs, iPhones, and iPads—and remove them from your account. Don’t worry about inadvertently removing a device you do use—at worst, you’ll have to log in to your Apple ID again the next time you use it.

Remove Trusted Google Devices

You can quickly load Google’s list of trusted devices by logging in to your Google account at myaccount.google.com/device-activity. To navigate there manually, go to your Google Account at myaccount.google.com, click Security in the sidebar, scroll down to find the Your Devices tile, and click Manage All Devices. Google says it keeps track of sessions (whenever you sign in) on trusted devices for only 28 days, but the sessions shown on “unknown device(s)” below are far older than that. Google helps by displaying the location and date of most sessions.

Click a session to learn more about it, including the date you first signed in on that device. For devices you no longer use, click Sign Out to remove access to your Google Account.

Remove Trusted 1Password Devices

To remove old trusted devices from 1Password, start by logging in to 1Password.com, clicking your name at the top right, and choosing My Profile—you can also navigate directly to my.1password.com/profile. As you can see, 1Password provides information about each trusted device and browser, showing its IP address, location, operating system version, and last access time.

It’s easiest to click Deauthorize Inactive Devices, at which point 1Password will ask if you want to deauthorize all devices that haven’t been used in the last 60 days. If you prefer a more targeted approach, click the gear next to a device or browser you want to remove and click Deauthorize Device in the dialog that appears.

Again, the only harm that could come from deauthorizing a device you still use is that you will have to log in to 1Password again.

After you’ve audited your Apple, Google, and password-manager trusted devices—and any other accounts you may have that maintain such lists—there’s no need to check again right away. Once a month or once a quarter would be sufficient for most people.

That said, if you ever notice any unusual account activity, look at your trusted device lists to ensure you recognize everything. If there’s a device you don’t recognize or one that was used at an unfamiliar place or at a time when you were otherwise occupied, immediately remove it and change that service’s password.

(Featured image by iStock.com/Ildo Frazao)


Social Media: We all accumulate “trusted devices” in our Apple, Google, and password manager accounts, but it’s important to remove devices you no longer use because they could be security risks.