Are you experiencing problems with your HP printers, especially HP LaserJet printers, where they are constantly rebooting over and over? If you look closely at the screen just before the reboot you may see a message pop up “Service Error 79”.
We have noticed this happening in a few offices, where all of the HP printers on a network would reboot over and over and pop-up the Service Error 79 message. We tried all of the recommended steps we could find, such as:
Unplugging the printer and plugging it back in
Updating the printer firmware
Restoring to factory defaults
Cleaning out everything in the print queue from all network attached computers
Turning off all computers on the network
Changing IP from static to DHCP and back again
None of the above steps fixed the issue. However, we did notice that the printers would reboot over and over again and crash with the Service Error 79 message only when plugged in with an ethernet cable or if they were connected to Wi-Fi. When taking them off the network they did not reboot. When plugging them into a computer directly with a USB cable they did not reboot.
We’re talking about a mix of different LaserJet printers, at least 4 different models were doing the same thing.
Finally, we found out that a single setting on the printers was causing this. We went into the webpage for the printer, into the network settings, advanced, and disabled the “WS Discovery” service. It took several tries because we’d have to pause while navigating the site each time the printer rebooted (once every 10 seconds or so).
But ultimately if you wait until right after the printer reboots and comes online, then check mark the box to turn off WS Discovery and apply, it should fix the issue.
So far we’ve applied this “fix” to several HP printers and it has solved the issue in all cases.
Many businesses are required by their insurance to undergo quarterly or yearly Cybersecurity Training for staff in order to maintain compliance. my PC Techs offers affordable Cybersecurity Training for businesses of all sizes. Training can be held in your office anywhere in the Phoenix metro area, or we can provide virtual training remotely.
A typical Cybersecurity Training meeting lasts anywhere from 45 to 90 minutes. Training will teach your employees how to protect your business network and data, covering dozens of topics including:
And much more… There is a rapidly growing threat to your business from hackers, ransomware, viruses, crimeware, and theft of corporate information. These training courses can help train your employees the safety measures they need to prevent costly damage to your business. In addition to the training topics, there will be time for a Q&A session where employees can discuss data security with a CyberSecurity expert.
If you’re interested in learning how my PC Techs can help your business with Cybersecurity, please contact us today @ (602) 456-0150.
Are you tired of dealing with computer, technology, or cybersecurity issues? Slow internet? Email problems? My PC Techs is for you.
Our friendly and reliable team of IT experts come to your office at a fraction of the cost of an in-house IT department. We free up valuable time by helping with:
Computers and Servers
Email and Databases
Cloud, Software, and Website development
My PC Techs is a local, family owned IT firm trusted by hundreds of Phoenix area businesses just like yours for 20 years.
Do you need help when migrating your existing business email to Microsoft 365 (Formerly Office 365)? After your business has made the intelligent decision to switch email services from outdated POP3 and IMAP servers to Microsoft 365 and Exchange, you’ll need to determine a quick and reliable method to complete the transition. The goal is to avoid any email downtime for your business, so an IT professional should be hired who can assist you with seamlessly migrating your entire company email services from an old email server to Microsoft 365.
Here are some of the many steps that an IT professional will be able to assist you with during the move:
Determining the best Microsoft 365 licenses for your organization based on your anticipated usage scenarios
Gaining access to your DNS host and performing tests to determine if records can be modified in a timely fashion
Configuring the initial Microsoft 365 account and user details and generating passwords and licenses
Figuring out email forwarding scenarios, distribution groups, and other factors in advance
Determine which method of migration you will want to use, such as cutover, staged, etc. and making sure that the chosen method will not result in any downtime for the organization’s email
Configuring SPAM filters
Modifying the domain records and pointing MX records
Performing the live migration (usually done over a weekend)
Copying over all emails and other Outlook items to the new accounts
Testing the ability to send/receive in the new accounts
Installing MS 365 software to user machines and devices and testing
Integrating other aspects of Microsoft 365 into the organization
There are a multitude of technical steps when moving your emails from an old email server such as GoDaddy, Gmail, Cpanel, an old web host, or other email services to Office 365 (Microsoft 365). Hiring an experienced IT professional to assist your business with the move can make everything easy on you, will be extremely effective and helpful, and will save your business time, money, and avoid potential downtime and errors with email performance in the future.
Migrating Email to Microsoft 365
my PC Techs has assisted hundreds of businesses with email migration from outdated servers to Office 365, now Microsoft 365, and Exchange Servers and can help you migrate and manage your Microsoft 365 accounts long after the migration is done. If you’d like help upgrading your email to MS 365 please give us a call.
In our previous blog we talked about the need to back up a variety of data and systems to protect your company’s most valuable resource, its’ data. But how, exactly, do you get that data back if it has been lost to a hardware or software malfunction, hacking, theft, server crash or even human error? Let’s take a look at different ways we can recover data that has been lost.
Four Data Recovery Methods
There are four main data recovery methods. Which of these you’ll need depends on many factors including, how was the data lost, do you have a working backup of the lost data, and whether or not the original equipment is still available.
Method One – Software File Recovery. File recovery, if previously enabled, is the easiest of the four data recovery methods. Many modern operating systems, such as Windows 10, can be configured to automatically save backup copies of files. This feature, called Previous Versions, creates a copy of a file and holds in a special backup storage area. In addition, server software such as Microsoft Exchange for example, have configurations where you can specify that backup emails should be retained for a certain period of days even after a user deletes them. Other software, such as Quickbooks or Microsoft Office, have features that automatically save or prompt you to save backup copies of databases and files each day. With a previously enabled file recovery feature setup in your software, restoring a lost file is sometimes as simple as right clicking on a folder to quickly browse through all files available for recovery.
Method Two – Restore from Backup. In some cases, restoring from backup is the only possible way to get your data back, especially in the event of theft or some types of hardware damage. Backup restoration is moderately difficult and there are two major factors that contribute to making restoration from backups so difficult. First, you must identify the method used to generate the backup and verify that you have a valid, recent backup containing the data you are looking for. Second, you must find a way to restore the data in a way that brings back data you need without destroying other working parts of the system in question. If everything lines up correctly meaning you have a recent, valid backup of the missing data, and you have the necessary equipment ready to restore it, restoring the data from backup can be accomplished quickly.
Method Three – Scanning for Lost Files. This is a highly advanced data recovery method and is only necessary when a backup isn’t available, file recovery is not enabled, but the original hardware is still working. With this method, various software tools, such as GetDataBack, are used to scan a hard drive and evaluate data fragments that have been lost but are still available to recover because they have not yet been overwritten. Unfortunately, this method is not guaranteed to recover lost data but has been known in some cases to help retrieve missing files.
Method Four – Clean Room Hard Drive Recovery. This is definitely the most advanced data recovery method and, sadly, is the last resort to restore missing data. This method is only necessary when all other methods have failed. File recovery was not setup, there are no recent backups, and scanning for lost files is unable to find any available files. This method is often the only way to recover data when a hard drive completely fails and a backup had not been made. In this method, the equipment is sent to a special processing lab where they attempt to physically extract data from a failed hard drive.
Preparing for Easy Data Recovery
As with everything in life, an ounce of prevention is worth a pound of cure. The best way to make sure we can recover all of our data in the event of data loss is to plan ahead. Proper data disaster planning involves setting up and maintaining all of the software and equipment so that the previously outlined steps work as intended. It means that, while everything is working correctly, we must configure file recovery options in our software, make sure that our data backups are running on a daily basis and backing up all important data, and secure our hardware and backups from theft and damage.
Hiring a competent IT firm such as My PC Techs to protect your data, systems, databases and e-mail ensures that you’ll have technology experts on hand who can keep your backups and data secure. In addition to evaluation and configuring data backups and security, another part of the data recovery process is practicing recovery – even when recovery isn’t required. Making sure you can recover data on a regular basis ensures that, when the worst-case scenario hits, down time is minimized and access is restored quickly.
Data Recovery Help for Your Business
Give us a call today at 602-456-0150 and we’ll come to your business and show you how we can eliminate the worry of data loss by installing the perfect backup and recovery systems for you. We look forward to the opportunity to help!
Managed IT and Computer Repair services for these Arizona cities: Ahwatukee, Carefree, Cave Creek, Chandler, Chandler Heights, Fountain Hills, Gilbert, Glendale, Higley, Laveen, Mesa, Paradise Valley, Peoria, Phoenix, Scottsdale, Tempe
To learn how Managed IT and Computer Repair services can help your Phoenix area business save money and increase productivity, click here to visit Phoenix Computer Repairs.
my PC Techs | Expert IT and Computer Repair Solutions You Can Trust | (602) 456-0150