Ransomware: 5 Do’s And Don’ts
used with permission from Norton by Symantec By Kevin Haley, Director, Symantec Security Response I despise all forms of bullying. Perhaps the one I hate most of all is where the bully takes a personal item, snatching it from you, and refuses to give it back. It’s dangled right in front of you, but held […]
10 avoidable printer problems
used with permission from HP Technology at Work Printers are a major business investment. And understandably, you want to get the most out of that investment. A proactive approach to printer maintenance and repair is key to ensuring the best ROI and minimal downtime. The first step is to identify potential problems you can control. […]
Modern technology means faster growth and better security for SMBs
used with permission from Microsoft SMB Blog by Cindy Bates When most people think of transforming a business they think of moving to a new location, changing up their business strategy, expanding marketing efforts, hiring new employees and most of all they think of the dollar amounts associated with these upgrades. But there’s another more […]
The best way to prepare for disasters and security breaches
What would happen if your company lost your critical business data? Whether your application is email, your website, accounts receivable or any other critical application, your IT infrastructure is vital to protecting your data—and to your business overall. If critical data is corrupted or lost due to disaster or security breaches, immediate business consequences may […]
7 easy ways to lower your energy bills
used with permission from HP Technology at Work It’s September, and for businesses across the Northern Hemisphere that means the start of darker days, colder nights, and higher energy bills—bills that strain budgets further each year, with a nearly 20% increase in U.S. commercial electricity costs since 2005.1 In the lead up to winter, help […]
How can virtualization save your business?
used with permission from HP Technology at Work Winter is a time when Mother Nature reminds us that even the best laid plans can go wrong. Protect your small or midsized business from the unexpected by implementing virtualization technologies to optimize resources, improve application availability, and reduce downtime. Virtualization saves. Pooling server, storage, and network […]
Ransomware: When Cybercriminals Hold Your Computer Hostage
used with permission from Norton by Symantec by Nadia Kovacs Ransomware is a form of malware that will lock files on a computer using encryption. Encryption converts files into another format, like a secret code and can only be decoded by a specific decryption key. Types of Ransomware Ransomware can present itself in two forms. […]
Malware 101: What Is Malware?
used with permission from Norton by Symantec by Nadia Kovacs Spyware, ransomware, and bots, oh my! A lot of these terms are prevalent on the Internet, but it may seem impossible to know what all these terms mean, and how they actually affect your devices and personal information. The term, “virus” has been the commonplace […]
How To Safely and Securely Use USB Memory Sticks
used with permission from Norton by Symantec by Nadia Kovacs You may have noticed growing reports in the media about the dangers of using USB memory sticks. It is true, they are susceptible to being exploited like everything else, however, and these exploits aren’t terribly easy to carry out by hackers. Mostly because an attacker […]
A Word About Passwords
used with permission from FTC Business Center Blog by Lesley Fair On the old game show “Password,” the host whispered a word to contestants, who then gave clues to celebrities. The first to guess correctly advanced to the Lighting Round. The loser went home with a year’s supply of car wax. The legacy of “Password” […]
Helping Your Help Desk Help You
by Jennifer Totilo, Management Team Coordinator, The TNS Group Despite the average person’s growing knowledge of technical information, many workers still rely heavily on their company’s help desk to resolve any and all computer related issues that arise during the work day. It only requires an error message to pop up during an important presentation […]
Creating a Calendar event file in Outlook 2013
Have you ever signed up for an event and received a download link to “add this event to your Outlook calendar”? You can create your own! These files have a lot of uses, but especially to create your own event registration system. Step 1: Create the Event in Outlook Click the New Appointment button on the Ribbon, […]