Recognizing Phishing Attacks

In the vast landscape of the internet, phishing attacks have become increasingly common. These deceptive tactics aim to steal your sensitive information, such as passwords, credit card numbers, or personal details. Recognizing phishing attempts is essential for safeguarding your online security. Here are some tips to help you identify and avoid falling victim to phishing…

Read more

Can the new tax laws help your business?

Darren McBride was at Thursday’s presentation, learning how to maximize savings as the country transitions into the new tax era.  The owner of Sierra Computer Group says his business will see immediate gains. “The overall, over the next couple of years, lower tax rate puts more money back in the business, which let’s us buy…

Read more

Can my small business afford amazing IT?

We are a small business ourselves and one thing I hear from potential customers, or friends and family is: Can we afford good IT? Isn’t it expensive to hire an IT person? The reality is that it’s not as cost prohibitive as you would think. Especially, when the work being done is enhancing the performance…

Read more

Having issues with Windows 10 upgrade?

Did you finally decide to click upgrade to Windows 10 only to find that your computer crashed or keeps freezing after the upgrade? Or your profile is completely missing? Why did it do that!? What do I do now? There are some theory’s as to why Window’s 10 installations are not always successful. One is…

Read more

Three reasons to switch to Office 365

1.Price Microsoft has a pretty heavy price tag for the new Office Home and Business 2016, starting out at $229.99 for one product key code. Why pay that for one user when Office 365 plans start at $5 per month? Small businesses can get access to Outlook Email with Calendars, Online conferencing, Skype, file storage…

Read more

Email encryption made easy

We’re all nervous about the security of our email. It’s so convenient to send documents via email but it is sometimes best to encrypt or password protect sensitive data. This is especially true for documents such as tax returns, W2’s, or other sensitive financial documents. Did you know that whoever has admin rights on mail…

Read more

Look out for Locky

Look out for Locky, the newest member of the ransomware family. It has only emerged in the past few weeks but has already proved to be much more devastating than its predecessors. The main difference between Locky and the other variants of ransomware is that can see un-mapped networked drives. Files encrypted by Locky don’t…

Read more

Suffering from antiquated Category 5 cabling?

Does your business suffer from antiquated Category 5 cabling? New bandwidth-intensive applications are calling for speeds greater than 100 and 1000 Mbps, and the demand is only going to increase. There’s also an increasing amount of wireless devices, an influx of transferring of high-res images, streaming, and surveillance footage that are all part of a…

Read more