How Do You Know You’re Safe? IT Infrastructure Security is Constantly Changing.

IT Infrastructure Security is Constantly Changing. Security is like insurance.  You may not want to think much about it, but if you actually need it, you are very glad you have been paying the monthly premium. When you experience a security breach, or are the victim of any type of cybercrime, things can go very

By |December 14th, 2015|Categories: IT Articles|Comments Off on How Do You Know You’re Safe? IT Infrastructure Security is Constantly Changing.

3-2-1 Backup Rule

3-2-1 Backup Rule Hard drives will fail and, if you don’t make appropriate preparations, data can be lost. Implementing a proper backup system allows recovery of data in the event of a hardware failure. A good rule of thought for backups is the 3-2-1 backup rule. So what exactly is the 3-2-1 backup rule? Keep

By |December 14th, 2015|Categories: Tech Tips|Comments Off on 3-2-1 Backup Rule

Microsoft Windows Problem Steps Recorder

Microsoft Windows Problem Steps Recorder How to Use Microsoft Steps Recorder: Search for "Steps" in the Start Menu Select "Record Steps to Reproduce a Problem" Launch Application Click "Start Record" Record Process When finished click "Stop Record" Have you ever tried to describe a Microsoft Windows-based task to a colleague or friend, such as how

By |December 14th, 2015|Categories: Tech Tips|Comments Off on Microsoft Windows Problem Steps Recorder

Many small businesses aren’t prepared for cyber attacks

Many small businesses aren't prepared for cyber attacks From 9 News - "The majority of small businesses are not prepared to combat cyber thieves, according to a new survey conducted by Nationwide insurance. In fact, eight out of 10 small businesses do not have a secure plan in place, which makes them vulnerable to cyber

By |December 7th, 2015|Categories: Helpful Security Links|Comments Off on Many small businesses aren’t prepared for cyber attacks

Office and the iPad Pro Get Along Better Than You Think

Office and the iPad Pro Get Along Better Than You Think Office works with the iPad Pro, iOS 9 and WatchOS 2. We’ve developed a number of new features for Word, Excel, PowerPoint, OneNote, Outlook and Translator to take advantage of these enhancements. Read up on the official Office Blog to learn about multitasking, inking,

By |November 16th, 2015|Categories: Tech Tips|Comments Off on Office and the iPad Pro Get Along Better Than You Think

Taking a screen shot

Taking a screen shot How do I take a screen shot in Windows or Mac? Taking a screen shot can be helpful when trying to troubleshoot a problem.  Error codes can be copied and sent in to assist in resolving the issue. In Windows, press the Print Screen (PrtScn) button on the keyboard.  Then you

By |November 16th, 2015|Categories: Tech Tips|Comments Off on Taking a screen shot

Considering Cloud Computing? What’s the Right Choice for You?

Considering Cloud Computing? What’s the Right Choice for You? Cloud computing is a sensible business solution. It increases efficiency while improving cash flow – a veritable win-win. If you’re considering moving to the cloud solutions, there are two options you want to consider: Software-as-a-service (SaaS) Infrastructure-as-a-services (IaaS) Let me shed a little light on the

By |November 16th, 2015|Categories: IT Articles|Comments Off on Considering Cloud Computing? What’s the Right Choice for You?

Fraudulent emails that are targeting businesses and non-profit organizations

Fraudulent emails that are targeting businesses and non-profit organizations There has been a recent uptick in fraudulent emails targeting businesses and non-profit organizations. The perpetrators send emails posing as a leader in the organization, usually a CEO or Executive Director, to someone in the financial department of the organization requesting a wire transfer of some

By |October 15th, 2015|Categories: Tech Tips|Comments Off on Fraudulent emails that are targeting businesses and non-profit organizations

Things to consider for security and safety

Things to consider for computer security and safety Never give out login credentials (over the phone, in person,or by email). When using public Wi-Fi, refrain from sending or receiving private information. Report any loss or theft of your company issued smartphone/tablet/laptop immediately to IT. Choose strong password with letters, numbers, and special characters to create a

By |September 9th, 2015|Categories: Tech Tips|Comments Off on Things to consider for security and safety