­

5 Best Security Practices

Know you weaknesses

The first step to good security on your computer is to know where your weaknesses are and hot to correct them or fix any of the […]

Creating Good Passwords

Protecting everything you lock with a good password is when you use length and complexity (mix of letters, numbers, symbols, and capitals). A six character password has been shown […]

The Changing Face of Security Threats

In today’s day and age, we find ourselves the subject of digital attack. As the time has changed technology from room sized computers doing math to the world in […]

Make a bootable USB flash drive to wipe an old hard drive

Make a bootable USB flash drive to wipe an old hard drive
To use a USB to wipe an old hard drive on a Windows PC:

Download the DBAN *.iso […]

How to take a screenshot on your Mac

How to take a screenshot on your Mac
To take a screenshot of your whole screen:

Press Command (⌘)-Shift-3.

Find the screenshot as a .png file on your desktop.

You can take screenshots […]

Shadow Copy

Shadow Copy
The Shadow Copy feature is often one of the most overlooked tools built into Windows Servers. Utilizing shadow copies allows files to be recovered in real time, without […]

Importance of Keeping your firewall up to date

Importance of Keeping your firewall up to date
Keeping your firewall up to date is the easiest way to protect your network and data. Aging firewalls present a security risk […]

Turning the tables on technology performance

Turning the tables on technology performance

Technology performance is typically touted as a conduit to better business processes. However, sometimes lost amid all the high-tech hoopla is a high-touch catalyst […]

Denver Managed Services

Denver Managed Services
In the old days, managed services often referred to nothing more than a help desk that would take over control of your workstation while you leaned back […]

Managed Services Promote Predictability in Tough Times

Managed Services Promote Predictability in Tough Times
Managed services are a hot item in the IT world. Companies faced with downsizing their IT staffs are finding these competitively-priced, outsourced offerings […]