Your IT Team pours out so much time and energy. If you aren’t already, you can brighten their holidays by giving them a gift.
The work they do is often so complicated, yet they make it look easy. Unless you are a high-tech executive, it can be difficult to appreciate how sometimes your team accomplishes a miracle.
In some organizations, the only time the IT team gets noticed is when something technology-related stops functioning correctly.
IT pros, by nature, need to invest more than 40 hours a week to keep up with rapidly changing technology. That doesn’t include responses to the helpdesk crises and completing the projects assigned to them.
Executives reading this newsletter already feel compassion for and support their IT teams. But just in case you know an executive who doesn’t, or the gift slipped their mind, please forward this message to them. And why not add an IT Appreciation Day to company calendars?
Happy Holidays – and you deserve a bunch of credit too!
The most massive data leak that’s ever happened includes neatly bundled information for more than 1 billion people. Keep in mind that the estimated population of the United States is only 330 million. If you use email, you are probably exposed. Continue reading ‘A Huge Data Leak Exposed Your Personal Information’
One of the ways your spam filter helps to stop unwanted messages is to block messages from mail servers with a bad reputation for spamming. What will you do if your company gets labeled as a spammer? First of all, nobody will receive your company’s messages. Continue reading ‘What Will You Do if Your Customers’ Spam Filters Block Your Messages?’
A business contacted our office last week because a bad actor tricked an employee to give them full access to their computer.
The bad actor immediately took over the network and started performing highly illegal activities that appeared to come from the victim’s systems. User training is not enough. It is essential to take additional steps to help protect your network when an attacker is crafty enough to trick a user.
When you receive an email message with a PDF attached, it is always best to confirm that you are expecting the attachment before opening it. However, if you receive a Word, Excel, or another file type other than a pdf, beware.
Continue reading ‘Avoid Opening Word Attachments – Check with IT First’
Windows 7 computers will still run, your anti-virus will still work, as will your other programs. But you are taking a significant risk because Microsoft will no longer provide security updates that help keep attackers out of your network.
Continue reading ‘Microsoft Will Stop Protecting Windows 7 on January 14, 2020’
There is a strong chance that hackers obtained your identity information in the Equifax breach. It exposed 148 million American’s sensitive information, and that sets you and your family up for identity theft. If you already suffered identity theft and can prove Equifax was the source, you might get up to twenty thousand dollars. Continue reading ‘Find Out if You Can Collect a Bundle from the Equifax Breach’
A company had a problem with their bank’s remote deposit software. They called technical support, and the bank’s software support person announced, “First, I need to connect to your computer to see what is going on.” Fortunately, the company’s team member told the bank’s technical support person, Continue reading ‘Never Permit Tech Support to Access your Computer’
Wi-Fi technology is always changing. When you buy new Wi-Fi equipment, be sure to ask if there is a Wi-Fi version 6 option available. You will increase speed, security, and help futureproof your investment. Wi-Fi version 6 will become the new standard for several reasons: Continue reading ‘When You Buy New Wi-Fi devices, be Sure they Support Wi-Fi Version 6’