The Google Two-Step
Angela works in the office next to me. She and I have worked together on and off for almost 30 years so I would have thought that she would have certainly picked up on all my…
Angela works in the office next to me. She and I have worked together on and off for almost 30 years so I would have thought that she would have certainly picked up on all my…
I gave a presentation on cybersecurity recently and an attendee stated that their IT Team told him their firewall would protect them from ransomware. “FALSE!” I explained, and could see that they didn’t really believe that…
A family member recently joined an organization and was told that they would need a Gmail account since that is what the business uses. They contacted me asking if that was good business practice and my…
"What do you do again Tom?" That is the question I get from many people who I’ve met in the last few years. They are aware that we help companies with their computers, but that is…
When I sit down to write a post, the first thing that comes to mind is what is it that will be most helpful. With this being the last post of the year, I thought we…
Many organizations have their email hosted with Office 365 and sometimes an email will get through that appears to be from someone in the company when in fact it is not. So how did an email…
I was recently asked to compile a list of some of the best technology in use and I thought I would share two technologies that I think are huge game changers. Data Backup Solutions For the…
In days past, if you had a good antivirus solution and keep your systems up to date there was very little chance of your system becoming infected. Unfortunately, with the fast-changing world of ransomware, this is…