Security Topics Cybersecurity Awareness Month & Security Round Up In case you have not heard, October is Cybersecurity Awareness Month. Cybersecurity is an important topic in technology and a part of our everyday lives even if we do not realize it. In general, cybersecurity includes the protection of devices and data from unauthorized access. Attacks may target devices, accounts
Organizational Tips How to Create Email Aliases and Merge Email Addresses An email alias is a secondary email address that accepts email the way your primary email address does, without the hassle of maintaining a separate email account. For instance, a primary email account might be jane@company.com. Later, if the company expanded, they might want to use janesmith@company.
General Topics The Best Way to Assign Default Apps for Opening Files The default applications programmed to open specific file extensions in Windows 10 may differ from the apps you want to open those types of files. For instance, Windows 10 comes with Microsoft Edge as the default (and recommended) application for opening all .pdf files. However, you may install Adobe Reader,
General Topics How to Create Additional Local Users on Windows 10 Home The setup process for new Windows 10 devices includes creating a user for the device. There are two types of user accounts to choose from: a local, or traditional user account, and a Microsoft account that requires an email address already associated with a Microsoft account. During the initial setup,
Advanced Topics How to Track File Deletions on Windows Server Shares Consolidating documents and files on a server provides many benefits. Servers reduce data duplication, help ensure everyone has access to the most recent versions of files and perhaps most important of all, keeps track of business content. A recent post, 4 Ways to Detect if your Business Benefits from a
Organizational Tips How to Create & Manage a Shared Calendar with O365 Shared calendars are commonly used by businesses and groups because they have many uses. Some of these uses include: * Keeping others in your office, department or group aware of your schedule. * Delegating scheduling to free up time. * Providing a way for different departments to collaborate and better manage events, social
Security Topics Security Round Up: Capital One, MoviePass, Apple & More Data breaches and security threats are an all too common part of the news cycle. Over the last few years attacks have ramped up at an alarming rate. The success of attacks, the ability to acquire threats like Ransomware strains combined with the inability of businesses to protect their assets,
General Topics How to be Sure Back to School Computer Sales are a Value Buy There are 3 times during the calendar year when it best to purchase a new computer or laptop device. These times are during Back-to-School sales, after Thanksgiving sales and after Christmas when there are often inventory blowout sales. Ideally, you will find the best value for the price during these
General Topics 4 iPhone Features you Might be Missing Out On When a device is new we are much more likely to click every app, open settings, and generally check out every capability of the device. With time, as we become more proficient at using the device and accomplishing the things we need to do, we often stop poking around. Instead,
General Topics Can your Computer be Updated? Here's the Best Ways to Know Most computing devices will slowly lose efficiency and speed over time. There are many reasons this naturally happens, including but not limited to: * Increased data which decreases available storage * Additional programs which often run in the background even when they are not actively being used * Advancements in technology that leave
Advanced Topics 4 Ways to Detect if Your Business Benefits From a Server Most businesses start small and grow with time. Starting small means fewer employees, fewer devices and less of an infrastructure when compared to larger businesses. Over time, the needs of most businesses change. This can be due to growth, changes in products and services or even in available technologies. Additions
General Topics What to Ask for When a Designer Creates a Logo for You A logo plays an important part in marketing your business. Some logos include the name of the business while others use business initials. Ideally you want a logo to be instantly recognizable. Logos should tie in or relate to your business in some way. The link between your logo and
Security Topics Why Reusing an Email Password can be Very Costly Passwords are a tricky beast. It is nearly impossible not to have tens and hundreds of local and online accounts requiring passwords. We use passwords to: * Log into devices * Log into communication and software portals * Order physical and digital assets online * Send secure documents to banks and tax preparers * Log
General Topics How to Identify the Cause of Wireless Slowness Wireless data transfer speeds are slower than wired connections, but wireless networks are being used by larger numbers of devices for several reasons. One, while data is transferred over wireless more slowly, newer wireless modems/access points push far more data than ever before. Second, faster internet provider plans at
Advanced Topics How to Troubleshoot Issues with Website Domains Anyone with a website knows it can be extremely stressful when problems occur. Our websites easily deliver vast amounts of information to a broad audience 24/7. Unfortunately, sometimes things happen and a website might be unavailable or redirect to a different site altogether. Luckily, there are ways to troubleshoot
General Topics How to Start Presenting with Zoom in 4 Steps Webinars, also known as online presentations, video communications, web conferencing, or web seminars are growing increasingly common. Many industries and individuals use these as a way to present their products or services to a greater number of people. The rise in popularity of webinars has occurred for several reasons, including
Security Topics Security Round Up: Exposed Records, File Deletion Warnings & More New security threats, breaches and file exposures putting our personal information at risk are consistently released. The general nature of our private information makes it valuable, not only to us, but also to the wrong people. However, there are steps you can take to protect your privacy and data. One
Security Topics Technology Checklist for When Employees Leave your Business Owning a business comes with many responsibilities. One responsibility that must be taken seriously, or you will surely suffer consequences, is how you handle an employee leaving. An employee leaving encompasses many parts of course, including but not limited to: * Printing their last paycheck * Finding someone to cover their duties
General Topics 3 Ways to Isolate the Cause of Web Browser Issues Web browsers like Chrome, Firefox, and Safari are a more integral part of our daily computer usage than ever before. This is partly due to how much we rely upon the internet for information including research and how-to documents and videos. It can also be attributed to the rise in
Security Topics Security Round Up: WhatsApp, Google & an XP Patch The past few weeks have been fraught with news about security threats putting our information at risk. These threats centered around our data being used in ways we never expected or approved, and vulnerabilities we could never have known existed. Worse yet, some threats created risk without any activity on
General Topics How to Speed Up a Sluggish Network Printer Network printers are an office staple because it includes much more flexibility than a standard printer. A network printer is an asset whether you work alone or if it is located in the midst of a larger office. Network printers provide the following benefits: * Allowing multiple users to print to
Security Topics 4 Single Point of Failure Categories & How to Address Them Whether you own a business, or simply own a computer for personal use, the best way to protect yourself is to be aware of the limitations in your systems. A single user with a laptop and a larger organization with hundreds of endpoints often have more similarities than differences in
Security Topics Windows 7 End of Life is Coming: What you Need to Know - Part 2 Last week in the part 1 of this topic, we covered some of the important things to know about the upcoming end of end of life for Windows 7 [https://eyonic.com/1/?J2]. Extended support for Windows 7, which includes security updates, ends January 14th, 2020. This post continues
Security Topics Windows 7 End of Life is Coming: What you Need to Know - Part 1 There are two important dates that correspond to every Windows operating system released by Microsoft. Those dates are the end of that operating system's: * Mainstream support * Extended support Understanding the differences between these types of support is extremely important to your environment. First, it is important to know
General Topics Scanning to Email versus Scanning to Folder Multi-function printers typically include scanning capability and provide many more features than a simple printer. One of the most time-saving features of a multi-function printer is the ability to scan to email and scan to a folder on a computer on the same network. These scan functions operate much the