1. Usernames and Passwords. Yes I said it. Every I.T. person has told you not to write down your passwords. There are many desks that I have come across where the password is a post-it note on the monitor, hidden under a keyboard or mouse pad, or in a desk drawer. This is not where Read More >
The 3 Keys to Making Mobile Emails More Professional
September 14, 2016 by Joe D. GrossbauerA 2016 study by Fluent found 82% of people use their smartphones for email, making it the single most popular activity on a smartphone. And with more and more business emails being sent from phones, people wonder how to keep email professional while keeping with the simple convenience of cell phones. Email Signature All smartphones come Read More >
How Secure is the Cloud?
June 21, 2016 by Joe D. GrossbauerI get asked this question so often, I finally decided to write out a full answer. So is the cloud secure? Are you ready? Here comes the big answer… Yes! And no. And also maybe so. Frankly, this is a difficult question to answer, simply because the answer is so variable. But I’ll do my Read More >
The Making of a Backup Package
June 16, 2016 by Joe D. GrossbauerOur team recently had some, well, intense discussions on what types of backups are best for our clients, and I think some of these ideas are worth sharing. There are a couple different types of backups, and I think it’s important for people to understand what is best for them. Backups can be on-site, off-site, Read More >
What is a Firewall?
October 26, 2015 by Justin RoseberryA common question I hear after cleaning a client’s computer of malware is, “how did this happen, we have antivirus and a firewall?” This question has always intrigued me because it sheds some light on the fact that there are misconceptions about what firewalls actually do. We know what the purpose of antivirus is. We Read More >