Gmail is a great way to take advantage of business email, but do you know all of the ins and outs of how to use some of its finer details? Today’s tip is dedicated to going over some of the more useful features of Gmail, like filters and labels–both of …
Targeted Ransomware Checks for Particular Attributes
Put yourself in the shoes of a cybercriminal. If you were to launch a ransomware attack, who would be your target? Would you launch an indiscriminate attack to try to snare as many as you could, or would you narrow your focus to be more selective? As it happens, real-life …
Is Your Business Prepared to Do Away with Paper?
There’s no denying that digital records have quite a few advantages over paper documentation. Benefits of ‘going paperless’ include simplified search capabilities, more efficient storage, heightened security and automated backup capabilities. There are plenty of sources around the Internet that discuss making the switch to paperless documentation, but to keep …
Tip of the Week: Google Drive is Better with these Chrome Extensions
Google Drive provides its users with a considerable amount of utility. However, when combined with extensions made for Google’s Chrome browser, users have the tools to make their use of Drive’s capabilities even more efficient. For this week’s tip, we’ll go over a few Chrome extensions that your business might …
How to Keep IT and the Rest of Your Staff on the Same Side
There are some facets to IT that are universally accepted as important, such as security. However, there are also others that create some conflicting opinions between management and IT personnel. When surveyed, business leaders and IT management held vastly different opinions as to the importance of various IT tasks. Is …
Why You Need to Be Certain You’re Using Licensed Software
Using pirated software or abusing your software licenses for your business is heavily frowned upon. However, many software companies, in an attempt to protect their products, have unleashed a practice that can actually reward those who let it happen in the first place. To begin, we want to say that …
Tip of the Week: Putting Your Old Android Device to Good Use
Considering how often smartphones are replaced, you’re bound to have a couple of them stashed away for a rainy day. These devices are particularly helpful in the event that your smartphone breaks unexpectedly, but there are other purposes that you might want to keep in mind. Here are three ways …
Mike’s List of Must Have Software
Here’s what I can tell you about Mike…. You may or may not know Michael Lidke, he is our Operations Manager at I.T. Solutions of South Florida and he is AWESOME. For those of you who don’t know what Mike does, I’ll break it down. He’s the behind the scenes …
ALERT: Make Sure Your Business is Safe from Meltdown and Spectre
Intel recently found itself (once again) in hot water, mere months after many flaws were discovered in the firmware that enables all of their chips to do their job. This time, the issue could have potentially caused a permanent dip in the CPU’s capacity to function properly. This has come …
According to Study, Only 28% Utilize Two-Factor Authentication
2FA, or two-factor authentication, is a simple and effective means of boosting your cybersecurity. Despite this, a study performed by Duo Labs suggests that 2FA has not been adopted as much as one might expect, or as much as it should be. Using data from Survey Sampling International, the researchers …