Virtual Assistants – How Do They Handle Your Privacy?
If you use computer devices, the Internet or any type of payment solution other than cash, you are sharing information about… you. Unless you don’t use the Internet, don’t have a cell phone, don’t use GPS, don’t use a credit card, don’t travel by air, don’t rent cars, don’t use EZ-Pass and only pay in...Read More
How to Setup a Smart Office: a Pragmatic Approach
Let’s get started… If you’re thinking about turning your office into a smart office, this article will guide you through a pragmatic approach to getting it done. Make a List Before you purchase a single item, decide what you want to do. Create a wish list. Try not to think in terms of technology but...Read More
Welcome to Your Smart Office
How cool would it be to walk into your vacant conference room and simply say “let’s start the meeting” and to have the blinds adjust, the lights come on dimmed at just the right level, the temperature fine-tune to accommodate for an influx of warm bodies and the flat screen TV light up ready to...Read More
Digital Assistants – The Science Behind Them
The voice activated computer has been a Sci-Fi staple for years, a ubiquitous sign of “the future,” much like the flying car. We may not be flying to work yet, but thanks to voice assistants such as Siri, Cortana, or Alexa, we all have access to a little bit of the future on our smartphones,...Read More
Since the early ‘80’s and the acceptance of the personal computer into everyday life, humanity has grown ever more reliant on computer networks for communication, entertainment, and commerce. It doesn’t really matter if you are talking about a small home network of one computer and a few smartphones or a huge, decentralized network like the...Read More
Gone Phishing: the Con is Still the Con.
The confidence trick, the swindle, the scam, the grift, the flimflam, the hustle: the con. The confidence trick probably dates as far back as to when our earliest ancestors started using tricks instead of muscles to outwit their opponents in winning the more prized portion of the kill.As a kid, three-card Monte and the shell...Read More
Setting up a Small Business WIFI solution, find out how:
WIFI is great! Wireless allows us to easily connect our various devices to the things we need without a wired connection. WIFI speed, stability, performance and security continues to improve. It won’t be long before WIFI effectively replaces hard wired Ethernet connections. So why this article? Can’t one just plug and play any old WIFI...Read More
Does Your Business Have a Password Policy? Should it?
Every business should have a password policy. Do all of your employees have keys to your office? Do you keep any valuables under lock and key? If so, how many people have keys? It is our experience that keys are issued with careful consideration and only a few individuals are entrusted with these responsibilities. Passwords...Read More
Online Privacy and How to Protect It
With the repeal of the 2016 Online Privacy Protection rule, many are concerned that their online privacy may be compromised. To understand more on the FCC rules see our article Who Owns Your Data? – The Repeal of Online Privacy Protection. The biggest concern with the repeal of the 2016 Online Privacy Protection rule is...Read More
Who Owns Your Data? – The Repeal of Online Privacy Protection
Data Transmitted Over the Internet Belongs to the Internet Service Providers. With the repeal of the 2016 Online Privacy Protection, our government is ruling that the data we send over the internet is not our private information, but data that is searchable and usable by your Internet Service Provider (ISP). Data transmitted is essentially owned...Read More
Hackproofing: How to prevent hacking for your Small Business
Hacking threats come in all shapes and sizes. To protect yourself and your business you need to take a multi-dimensional approach. Backup First and foremost, you must have reliable backups. Even the most secured corporations and organizations in the world are hacked. When they are, backup is used to restore what is lost or damaged....Read More
Best Practices for Your Business E-mail
E-mail is a key component of our daily business. Like any powerful tool, it can be used and abused. Here are some tips and tricks to help you get the most from your company e-mail. Signatures The e-mail signature is the digital equivalent of company stationary. Establishing a company-wide e-mail signature is a great way...Read More
Ransomware, Spyware, Malware, and Viruses Oh My! – Understanding the Differences
Malicious software is an issue that as an IT Company we have to deal with on an almost daily basis. The amount of Malware out on the internet is immense and growing every day. Recent research shows that there are over 15 million different pieces of malware out there. While this may seem like an...Read More
The Importance of Off-Site Backup
We all know the important concept of having local or onsite backup. Files get deleted accidentally, or hardware in a workstation or server fails, and precious data critical to businesses gets damaged or vanishes along with such mishaps. The ability is restore lost data from nearby media such as a backup hard drive is a...Read More
Company Email – Is it Personal?
Many people who use business email every day have no idea of what their privacy rights are concerning the messages they send and receive. There is only one thing that you, as the end user, must truly understand with regard to company email – whoever owns the server, owns the email. A company’s computer network...Read More
What is Inside Your Computer? No, It's Not Magic.
We regularly recommend replacement parts to our clients, and in most cases when we start describing computer components, we end up just talking to ourselves. We have chosen some of the most important components and defined them so that you can have a more complete understanding of the machines that you use daily. Common Computer...Read More
Preventing Malware: Tips and FAQs
What is malware? Short for “malicious software,” malware is software that exploits your computer without your consent. The creators of malware have various intentions but none are good and include collecting private information, gaining control of your computer for nefarious activities, directing you to unsolicited purchases and interfering with your ability to properly use your...Read More
How to Get the Best Service from Your IT Support Team
We love our computers, but we know how frustrating it can sometimes be to work with them. They can be fussy, mysterious, temperamental, and downright maddening. And we know that when your computer crashes unexpectedly in the middle of that proposal you’re preparing for an important client you just want to scream and go back...Read More
Surge Protectors: More than a Useful Outlet Multiplier
Surge protectors (also known as power strips), those ubiquitous plastic blocks of electronic goodness, are great if for no other reason than that they turn one electrical outlet into 6, 12, or sometimes even 18 outlets. But what if we told you that there is another, more important purpose to the surge protector? As the...Read More
The Anatomy of a Website
According to www.domaintools.com over 50,000 new .com domains are added to the internet every 24 hours. The web is now an essential tool for nearly everything we do in our daily lives. Still, for all of the websites that we visit every day, most of us have little idea of exactly what it takes to create...Read More
Email – The Practical Magic
Email is an essential part of our daily communications. How did we ever do business without it? Today we are integrated. Email feels… well… natural. Our devices connect. We connect. We can talk to our devices and they can talk to us. They even have names. Siri can’t quite read our emails yet, but does...Read More
What Is Phishing and Why Should I Be Concerned?
Why Backup Power? Protecting Your Data From Disaster.
Imagine this scenario… You’re hard at work when your office goes completely dark. Your computer shuts off suddenly, and even though your machine comes back up with no problem, when you try to turn your server back on, it beeps and tells you “no drive detected.” Suddenly, it looks as if you might have lost...Read More
Wireless Networking: Office Boon?
IEEE 802.11 IEEE 802.11 technology, the basis for the wireless network communication that we currently use, has remained pretty much unchanged for over a decade. There are multiple subcategories of the 802.11 standard identified by letter (g, n, ad, ay, etc…). Wireless networks have made huge gains in the past 10 years. Here some basic...Read More
Email, Acronyms, and You: The Different Ways that Email Gets Delivered
Email – it’s already starting to feel dated… it’s easy to send and receive emails every day without giving any thought to what’s going on behind the scenes. While it’s convenient to assume technology just works, there are in fact three standard methods used to deliver email. Furthermore, the method you use for sending and receiving...Read More
Microsoft Office: 12 Great Tips
The Standard Microsoft’s Office remains the most popular and powerful software suites available, and many of us spend a good part of each day using its applications such as Word, Excel, and Outlook. Here are some helpful ways to get the most out of your Office experience. Outlook 1. Set a reminder to reply to...Read More
Bulk email or Spam? How to Send Email Blasts and Newsletters and Avoid Blacklisting
Hey Everybody! So you need to send out a newsletter, and you have an email list containing hundreds or thousands of addresses. Before you hit send, there are several things you should consider that could save you a lot of headaches down the line. While your email isn’t technically “spam”, it is bulk mail, and...Read More
10 Common Time Saving Keyboard Commands
It’s all about the keys… It’s all about the keys… The Windows operating system and the programs designed for it can be a complex web of menus and lists that can be time consuming to navigate. Here are some keyboard shortcuts that can increase your computing efficiency. Let’s start off by defining some of the...Read More
Wolves in Sheep's Clothing: How to Detect and Avoid and Malware
What is Malware We’ve all heard of malware, but beyond knowing that it’s bad for your computer, we generally don’t know much about it. Fortunately, with a little bit of effort, malware is easy to recognize and avoid. Malware is the general term given to any unwanted software which makes unnecessary or malicious changes to...Read More
Mailbox Maintenance – Keeping Your Mail Application Running Quickly
The Count Counts Did you know that when it comes to slowness with your email program, it is usually not because of the size of your mailbox but because of the number of emails you have? It’s true; it isn’t the size of the mailbox that impacts performance, it is the number of items in...Read More