Category: IT Settings
-
A Way to Control Consultant Access – Every Time
What if you’d like to know each and every time a consultant attempted to access your systems? And would you like the ability to approve or deny each attempt?
Continue Reading -
Microsoft Using Your Computer To Deliver Software
Microsoft built a feature into Windows 10 called Delivery Optimization. Your computer may deliver and receive apps and patches to and from computers belonging to complete strangers. Your computer becomes a server to deliver patches and apps to people on the Internet. Though it is likely enabled on your computers, you can turn this feature […]
Continue Reading -
Lenovo Computers Infected
Urgent bulletin: Lenovo pre-installed software called SuperFish on computers that is a security risk. This is just another example of why it is so important to remove the junk-ware from new computers. Follow these instructions from Lenovo: http://support.lenovo.com/us/en/product_security/superfish_uninstall Please forward this to anyone you know who might have purchased a Lenovo computer – laptops included.
Continue Reading -
A Possible Solution for Ransomware
Ransomware is hitting so many companies hard. If you’ve not heard of it, you will soon. Ransomware is an infection that encrypts files on your network such that you cannot access the files. This can be devastating. The best way to deal with ransomware is…
Continue Reading