- Home
- Technology
Latest Posts
Fix A Computer in Minutes and It Works Almost Every Time
I was stranded in the Portland airport last night because of a mechanical failure on the first flight. You’ve had similar situations for sure. What would your travel experience be like if the airlines could immediately reset a plane to be brand new if it breaks?
Continue reading Fix A Computer in Minutes and It Works Almost Every TimeSend your IT Professionals to The 2016 SuperTech Best Practices Workshop
Send your IT Professionals to The 2016 SuperTech Best Practices Workshop Monday 8/8/16 thru Wednesday 8/10/16 Executives are welcome too Professional Development Workshop for IT Pros: IT Pros must overcome ever-increasing challenges. Together, you can help yourself and your organization grow and thrive more than ever. At the SuperTech workshop, IT Professionals receive what they […]
Continue reading Send your IT Professionals to The 2016 SuperTech Best Practices WorkshopNew Hard Drives Need Electricity or they Lose Your Data
Most computers, for years now, have used hard drives to store data files. Those drives have metal discs that spin around. Drives that use newer technology have no moving parts…
Continue reading New Hard Drives Need Electricity or they Lose Your DataIf Someone Harasses You with Text Messages
People regularly report that some person is harassing them by sending unsolicited text messages at all hours of the night. Might be a co-worker, an ex-boyfriend or spouse, etc. The situation can be exasperating. What you should do if this happens…
Continue reading If Someone Harasses You with Text MessagesShellshock: Check Your Web Server
Shellshock is a bug that may exist on your servers and even your Mac. Even if you use Windows in your office, your web server may use Apache on Linux.
Continue reading Shellshock: Check Your Web ServerNew Big Screen iPhone
The iPhone 6 will have options for both the normal screen size as well as a new, larger, 5.5 inch screen. It is doubtful that they will be shipping for months, and Apple hasn’t made an official announcement – but one might come as early as today.
Continue reading New Big Screen iPhoneFire Phone at Work
Amazon just announced the new Amazon Fire phone. The first thing I wanted to know was about BYOD (Bring Your Own Device) features. How will your business utilize this great new device? The news is good…
Continue reading Fire Phone at WorkUse Windows 7 with Windows 8’s Benefits
As businesses transition to Windows 8, they don’t want to train their user in Windows 8. Here is a short 90 second video that shows the secret about how you can give Windows 7 all the great new stability, security, and speed that Windows 8 has to offer.
Continue reading Use Windows 7 with Windows 8’s BenefitsAnnihilate Sensitive Data
A chief executive asked this week about, if he is going to donate a computer to a good cause, how can he erase all of his sensitive data from the hard drive first? Here is how – complete with a video.
Continue reading Annihilate Sensitive DataAdding Security Makes Systems Unusable!
Ask your IT Professional: “Are you implementing the protections that users won’t notice anyway?” …
Continue reading Adding Security Makes Systems Unusable!Recent Blog Posts
- A Simple Way to Protect Work From Home Users and Families
- Tips and Tricks: An Unconventional way to Protect Yourself from SolarWinds and Future Hacks
- Three of the Most Useful Links About the SolarWinds Attack:
- The SolarWinds Breach Affects You Too. Ask your IT Team to Take these Steps.
- Emergency Update if Your IT Team Uses SolarWinds Products, and How to Protect Against Supply Chain Attacks
Blog Topics
- Account Lockout Policy
- ACH Fraud
- Acronis True Image
- Adobe
- Adobe Flash
- AI
- Airport Safety
- Android
- Anti-virus
- Apple
- Apple Virus
- Application Updates
- Application Whitelisting
- Applying IT Patches
- Attachments
- Backup
- Best Practices
- Big Screen iphone
- Bitcoin
- Bitlocker
- Blacklist
- Bromium
- browser security
- Business Email Compromise
- Carbon Copy Cloner
- CCleaner
- CCPA
- Children
- Clean Browsing
- Cloud
- Computer Processor
- Computer Security Day
- Coronavirus
- covid-19
- Credit Bureaus
- Credit Card Security
- Credit Freeze
- Customer Service
- Cyber Attacks
- Cyber Fraud
- Cyber Future
- Cyber Scams
- Cyber Security
- Cyber Security Breach
- Cyber Security Training
- Data Loss Prevention
- Data Restoration
- Decoy Website
- DEF CON
- Disabling Macros
- Disaster Plans
- Disaster Recovery
- DNS
- Download
- Email Security
- Encrypted Attachments
- Equifax
- Eternal Blue
- Executive Tips
- Executives and IT
- Family Cyber Safety
- Fire Phone
- Firefox
- Firewall
- Firing IT Firms
- free wifi
- FTC
- Gmail
- Google Docs
- GoToMyPC
- Hacked Email
- Hacker Insight
- Hackers
- Hacking Competition
- Heartbleed
- High Sierra
- Home Computers
- hotspot
- hotspot safety
- Identity Theft
- Infected Apps
- Infection Vector
- Inpivx
- International Security
- Invisible Security Threats
- iOS 11
- IT Best Practices
- IT Compliance
- IT Discussions
- IT Future
- IT Network
- IT Pay
- IT Pro Tips
- IT Professionals
- IT Risk Management
- IT Security
- IT Settings
- IT Training
- IT Virus
- IT Workshops
- java
- Kasperski
- KRACK
- laptops
- LastPass
- Learn to Program
- Linux Patch
- Mac Protection
- Mac Virus
- MacBook
- Malicious Advertising
- Malware
- Microsoft Patch
- Microsoft Settings
- Mimecast
- MINIX
- mobile devices
- National Security Agency
- NIST
- NIST Recommendations
- Norton ConnectSafe
- NSA
- NYC Secure
- Online Impersonators
- Online Meetings
- Online Security
- Open DNS
- Operating Systems
- Outsourced IT Firms
- Outsourcing IT
- password
- Password Manager
- Password Safety
- Password Security
- Patch Release
- Patch Updates
- Patches
- Petya
- phones
- Preventative IT Mainenance
- Preventative IT Security Breach
- Programs
- Project Management
- Protection Tools
- Pwn2Own
- Quad9
- Ransomware
- Remote Worker
- Remote Worker Security
- Remote Workers
- Restoring
- Ring Potential Three
- RSA
- RSA Security Conference
- Save time
- Scratch
- Security Breach
- Security Logs
- Service Provider Breach
- Service Provider Safety
- Shadow Protect Desktop
- Sir Michael Fallon
- Slow Internet
- social media
- SolarWinds
- Solid State Drives
- Spam
- Spam Phishing
- SSD
- Stolen Data
- Student Cyber Security
- SuperTech 2015
- SuperTech 2016
- surface pro
- Targeted Threat Protection
- TeamViewer
- Tech Support
- Technology
- Technology Distractions
- Technology Safety
- Technology Safety Tips
- Technology Security
- Technology Tips
- Threat Protection
- Threat Protection Software
- touch screen
- Troubleshooting
- Turkish Crime Family
- two set logon
- two step login
- UK
- Uncategorized
- Uninstall
- Upgrade
- Video Meeting Security
- Videos
- VirtusTotal.com
- Virus
- VPN
- WDAG
- Web Content Filtering
- Website Security
- Whitelisting
- wi-fi best practices
- wi-fi safety
- wi-fi security
- Windows
- Windows 10
- Windows 7
- Windows Update
- Wire Transfer Fraud
- Working with IT
- Workplace Safety
- Workplace Shooter
- Yahoo
- Zoom