Inside Secure-IT: Physical Security Welcome to the Inside Secure-IT series of articles. Inspired by an alert from the US-CERT at the beginning of October describing the threat posed to MSP's by hackers and other ne'er-do-wells. Our resp... Cybersecurity Nov 30, 2018
Inside Secure-IT: Backups and Recovery Welcome to the Inside Secure-IT series of articles. Inspired by a post done by the US-CERT at the beginning of October describing the threat posed to MSP's by hackers and other ne'er-do-wells. Our res... Business Continuity Cybersecurity Nov 16, 2018
How to reduce a computer's boot time Give the boot to bad boot times Remember first pulling your new computer out of the box. That initial press of the power button is thrilling. To be instantly greeted with the setup screen was probably... Tech Tips Sep 28, 2018
Clearing your browser cache Have you ever been on a website and noticed a formatting issue that was just too weird to pawn-off on bad design? Or maybe something on a page that was there previously is gone/moved since the last ti... Tech Tips Sep 14, 2018
What to think about before hiring an IT professional? Modern day technology is necessary in starting a business. It is important to search and investigate for ways to keep your company parallel to, or ideally in front of, the competition. This also means... Managed Services Aug 24, 2018
Is it better to have a little SaaS? SaaS (Software as a Service) is a term that has become more popular with the rise of the cloud, even though SaaS predates the cloud by decades. SaaS has had a long history in the computing world but i... Aug 10, 2018
Should I Outsource My IT? Many small to medium sized businesses (SMBs) can find the cost of hiring IT staff to be quite expensive, but they cannot just ignore IT. Information technology is generally integral to many business o... Managed Services Jun 29, 2018
What is a pop-up and how can I get rid of them? Most people know what a pop-up ad is, but even if you have never heard of one before their description is in the name! And they are just as annoying as they sound... They are advertisements that with ... Cybersecurity Malware Tech Tips Jun 22, 2018
What is a Rootkit? A Rootkit is a piece of malicious software that hides itself on your computer and gives an unauthorized person control of the machine and access to the information on it. It goes without saying that t... Cybersecurity Malware Jun 15, 2018
Spam Emails and Getting Rid of Them Email spam, also known as junk, refers to all the unsolicited emails you receive and do not want to deal with (usually because they contain malicious links or viruses.) These shady emails are the ones... Cybersecurity Malware Jun 1, 2018
The Different Types of Malware What is Malware? Malware is short for malicious software and comes in many different forms. While some may believe that its purpose is to slow down or make a computer unusable, in reality that's only ... Cybersecurity Malware May 25, 2018
What should I do about a "Low Disk Space" error? Disk space refers to the storage capacity of your computer. ( But what is the difference between memory and storage? ) In most business cases, the capacity maxes out at around 500GB. This is usually m... Tech Tips May 19, 2018