Suspect Your Computer Has Been Hacked? Do These 5 Things Now!
The initial reaction when you suspect your computer or network has been compromised is to panic. However, if your network has been breached, what you do next can make the difference between the incident being a minor inconvenience and being a devastating disaster that brings legal trouble and huge fines...
Read MoreFinancial Advisor Loses $50K To A Scammer
Horror stories of people getting scammed out of hundreds or even thousands of dollars aren’t in short supply. As we scroll through the news app from the comfort of our couch, reading these accounts of how a stupid so-and-so opened an obviously suspicious attachment and a hacker drained their bank...
Read MoreTop Tax Scams Every Business Owner Needs To Watch Out For In 2024
Tax season is around the corner, which means so are tax scams. Without fail, every year, individuals and business owners alike fall victim to tax scams, resulting in the loss of substantial amounts of money and sensitive personal data. According to the Better Business Bureau, taxpayers lost $5.7 billion due...
Read More6 Common Technology Problems Small Business Owners Face
Technology can provide a strategic advantage for companies in every industry when properly utilized. However, one of the biggest issues small business owners face is overcoming some of the common tech obstacles that hinder productivity. These issues can range from minor inconveniences to serious threats that can permanently shut down...
Read MorePirates Aren’t Just Threats On The Open Seas
“Know Ye That We Have Granted And Given License To Adam Robernolt and William le Sauvage…to annoy our enemies by sea or by land, wheresoever they are able, so that they share with us the half of all their gain.” These were the words of King Henry III of England...
Read MoreHow $43,000 Got Stolen From A Small Business In The Blink Of An Eye
What you are about to read is a real story showing you how a business can be devastated by cybercriminals in the blink of an eye. Most importantly, I’ll share several ways this could have been avoided. Make sure to forward this to anyone who might be making online payments...
Read MoreBest Practices To ‘Celebrate’ National Change Your Password Day: How Does Your Password Stack Up?
Each year on February 1st, we celebrate Change Your Password Day. While it’s not a holiday that gets you off work, it serves as a good opportunity each year to do a quick check-in and make sure you’re using strong passwords that will keep your accounts protected. The suggested ‘rule’...
Read MoreHow “Cheaper” IT Providers Sneak In Expensive Hidden Costs
Is your company looking to hire an IT firm? Unfortunately, unless you’re tech-savvy or experienced with IT contracts, there can be hidden costs that you wouldn’t expect or know to look for. While it can sound appealing to go for the cheapest firm, that decision can end up costing you...
Read MoreNew Security Features To Protect Your Phone In 2024
Long gone are the days when phones were simple devices used to make calls. Today our phones are advanced, handheld supercomputers that can do everything from pay a bill to order lunch for delivery to edit videos and more. But with more capabilities come more risks. Because our phones are...
Read More5 New Cybersecurity Threats You Need To Be Very Prepared For This Year
The year of 2023 marked a significant turning point for cyber-attacks with the introduction and wide proliferation of AI (artificial intelligence), now in the hands of people who wish to do you harm and who are actively using it to find faster and easier ways to rob you, extort you...
Read MoreYour 15-Step IT Profitability Road Map For 2024
If you’re hoping to cut costs and boost profitability in 2024 without compromising productivity or efficiency, assessing the technology you use in day-to-day operations is one of the first areas in your business to examine. We’ve created a road map that you can use to go step-by-step through your organization...
Read MoreBeware Of Cybersquatters!
Have you ever searched for a specific website but landed on a completely different one after misspelling a letter or two in the URL? This deceptive tactic is known as cybersquatting. This practice not only jeopardizes the online presence of businesses and individuals but also poses a significant challenge in...
Read MoreHow IT Support Companies Charge For Their Services – Part 1 Of 2
Before you can accurately compare the fees, services and deliverables of one IT services company to that of another, you need to understand the two predominant pricing and service models most of these companies offer. Many companies offer a blend of the two, while others are strict about offering only...
Read More7 Ways To Maximize Workplace Productivity With Tech
In the fast-paced world of business, efficiency and productivity are paramount. Advancements in technology have revolutionized the way we work, providing a plethora of tools and resources to help us accomplish more in less time. Maximizing workplace productivity with technology has become an essential strategy for organizations looking to stay...
Read MoreWhen Your Facebook Or Other Online Account Gets Hacked, Who’s Responsible For The Losses?
Recently, the CEO of a very successful marketing firm had their Facebook account hacked. In just a weekend, the hackers were able to run over $250,000 worth of ads for their online gambling site via their account and removed the rightful owner as the admin, causing the firm’s entire Facebook...
Read MoreNew And Urgent Bank Account Fraud Alert
The infamous Xenomorph Android malware, known for targeting 56 European banks in 2022, is back and in full force targeting US banks, financial institutions and cryptocurrency wallets. The cyber security and fraud detection company ThreatFabric has called this one of the most advanced and dangerous Android malware variants they’ve seen....
Read More10 Things Every Business Owner Should Know About Cyber Security
Have you started business planning for 2024? The last few months of the year can get hectic, between trying to close out the end of the quarter strong and mapping out your plan to ramp things up in the new year. One area that small business owners often skip over...
Read MoreThe Danger Of Holiday Phishing Scams: How To Recognize And Avoid Them To Stay Safe This Holiday Season
The holiday season is in full swing, which means so are the cybercriminals! While you’re making holiday gift lists, they’re plotting and scheming new ways to take advantage of unsuspecting online shoppers. Holiday phishing scams have become an all-too-common threat, targeting customers to steal personal information, financial data and even...
Read MoreMay A Force Field Be With You
“That won’t happen to me” is something many business owners say when discussing cyber-scams and the need for adequate protections for their business, but these days it’s getting to be a really, really stupid statement that you definitely don’t want your clients, employees and banker to hear. Generative AI (artificial...
Read MoreThe Bad Bot Takeover Is Here
There is one extremely common threat to our security that nearly everyone has witnessed but hardly anyone talks about – bad bots. These silent attackers are often thought of as annoying spam accounts posting computer-generated comments online. They are so common that most of us tend to scroll by them...
Read More10 Tasks You Didn’t Know Your IT Team Could Do For You
When you run your own business, it feels like there are never enough hours in the day. Even when you start early and end late, there’s always something else, another e-mail or task, nagging for your attention. If you want to be productive, and ultimately successful, it’s important to prioritize...
Read MoreHow To Get Out Of Overwhelm And Manage Projects Brilliantly (While Saving Money On IT)
It’s a special kind of relentless attack all business owners and managers face: the persistent, crazy, chaotic assault on your time and attention. No one is immune, and every business deals with it. Some leaders handle the constant pressure on their attention brilliantly, keeping the team organized and highly productive....
Read MoreWhy Cyber Security Compliance Doesn’t Belong In The IT Department’s Hands
What if you discovered that all of the hard work, investments and time you’ve put into growing your business is at risk due to a failure of your outsourced IT company, or possibly even your well-meaning (but overburdened) IT department? If you were exposed to that level of risk, wouldn’t...
Read MoreCollege-Age Kids Are A Prime Target For Cybercriminals – Make Sure Your Students Are Safe At School
College has changed since many of us were students. Years ago, we’d be shuffling from class to class, holding a single notebook and a pencil for scribbling down notes. There wasn’t as big a risk of photos or data being stolen online. That’s no longer the case. Students today have...
Read MoreScammers Are Using These 10 Popular Brands To Trick You Into Revealing Your Private Data
Cybercriminals know the easiest way to sneak under your radar is to pretend to be a brand you know and trust. These large companies have spent years on marketing, customer service, branding and consistency to build a trustworthy reputation, and hackers leverage this to go after you. The most common...
Read MoreThis HUGE And Recent Data Breach Practically Guarantees YOUR Personal Information Was Stolen
Back in May, the company MOVEit, a file transfer platform made by Progress Software, was compromised by a Russian ransomware operation called Cl0p. They used a vulnerability in Progress’s software that was unknown to exist at the time. Shortly after the attack was noticed, a patch was issued. However, some...
Read More7 Quick Fixes To Fix SLOW Home Wi-Fi
Nothing is more aggravating than attempting to watch a video or use your PC when the Internet is operating slower than molasses flowing uphill in winter. For our clients, we have many solutions to make your Internet connection faster, more reliable and secure. But what about at your home? Spotty,...
Read MoreAre Your Business Tools Ticking Time Bombs For A Cyber-Attack?
In June a popular file-sharing software amongst big-name companies likes Shell, Siemens Energy, Sony, several large law firms, a number of US federal agencies such as the Department of Health and more was hacked by Russia-linked cybercrime group Cl0p. Security Magazine reported that, to date, there are 138 known companies...
Read MoreThe Key To Scaling Your Company Efficiently
As a business owner, you know that continuous, steady growth is an essential part of success. When you’re ready to get serious about scaling your organization, several vital activities must happen. Documented workflows and processes, streamlined hiring, onboarding and training, well-oiled marketing systems and more top the list. One key...
Read MoreScammers Are Using These 10 Popular Brands To Trick You Into Revealing Your Private Data
Cybercriminals know the easiest way to sneak under your radar is to pretend to be a brand you know and trust. These large companies have spent years on marketing, customer service, branding and consistency to build a trustworthy reputation, and hackers leverage this to go after you. The most common...
Read MoreYour Personal Titanic Moment
On a recent interview about the Titan sub catastrophe, director of the movie Titanic James Cameron, who has made 33 successful dives to the Titanic wreckage site, pointed out that this tragedy is eerily similar to the 1912 Titanic disaster: the captain of the 1912 RMS Titanic was repeatedly warned...
Read MoreWarning: The Hole In Your Cyber-Insurance Policy That Could Result In Your Claim Being Denied Coverage
You’ve all heard the stats – small businesses are the #1 target for cybercriminals because they’re easy targets, with a recent article in Security Magazine reporting that nearly two-thirds (63%) of small businesses have experienced a cyber-attack and 58% an actual breach. But what many still don’t understand (or simply...
Read MoreTitle: 5 Essential Tech Tools To Grow Your Business And 2 You Should NOT Waste Your Money On
Growing your business involves learning how to make money and hang on to it responsibly. When you’re in the weeds, it’s easy to think that a fancy piece of well-marketed software could help dig your way out. That’s usually not the case, and you’ll likely end up paying for software...
Read MoreThe Shocking Facts About The New FTC Safeguards Rule That Affect Nearly EVERY Small Business Operating Today
As former President Ronald Regan once said, the scariest words you’ll ever hear are “We’re from the government, and we’re here to help.” In this case, the government is trying to help by forcing nearly all businesses to implement and maintain a strong cyber security program to protect the customer...
Read MoreIs It Illegal To Track Your Employees’ Activities When They’re Working From Home?
Along with the surge of people working from home or in hybrid situations over the last few years, there has also been an increase in employers looking for ways to monitor their employees’ work activities to ensure they actually ARE working when remote. This is no surprise given the new...
Read MoreThe One Lesson Business Owners Miss When Training Employees That Can Cost Them Thousands
Training employees on anything can be an expensive process. You incur the cost of investing in necessary materials plus the time it takes away from your employees doing revenue-generating activities. But what’s worse when it comes to cyber security training is the expense you’ll incur if that training fails. Recent...
Read MoreCybercriminals Are Deploying Powerful AI Powered Tools To Hack You – Are You Prepared For What’s Coming?
An Arizona family was recently in the news warning others about how they were the target of a ransom call in which scammers used AI (artificial intelligence) to clone their daughter’s voice to convince the parents they had kidnapped their daughter, with the apparent goal of extorting money. DeLynne Bock,...
Read MoreFacebook Owes You Money!
How To Apply For Your Share Of Facebook’s Recent $725 Million Privacy Lawsuit Here’s a shocker: Facebook is being forced to pay a whopping $725 million in a settlement following a number of lawsuits claiming they violated users’ privacy. This is in addition to another class action lawsuit for $650...
Read MoreMicrosoft Teams Productivity Tips Every SMEs Needs To Know
Every business needs the right tools to get the job done and to keep your team on track. But juggling multiple apps and software can be a nightmare when trying to keep information streamlined and easily accessible. That’s where Microsoft Teams for small businesses comes into play. In this article,...
Read More10 Common Tech Problems SMEs Are Eliminating From Their Business Forever
They say, “You get what you tolerate” and now more than ever, we’ve been conditioned to tolerate worse service at higher prices. Companies get a ‘free pass’ simply by saying phrases like “the labor shortage,” “because COVID,” or “inflation.” But it doesn’t have to be that way. While you may...
Read MoreThe Biggest Risk Is Not The One You Don’t Take, But The One You Don’t See
“The biggest risk is the one you don’t take” is a mantra you’ll hear motivational speakers deliver in their presentations to make the argument that you should throw all caution to the wind and go for it (whatever “it” is). And while that may be a good piece of advice to get...
Read More5 Seemingly Innocent Download Habits Your Employees Must STOP Now To Avoid A Ransomware Attack
Once upon a time, you could install antivirus software and go about your merry way online and in your inbox, opening, clicking, and downloading files without care. Today, antivirus alone cannot and will not protect you, especially if you INVITE the hack by downloading a file that is infected with...
Read MoreHow To Get More Productivity Out Of Every Employee (And Make Them Happier About It)
You’ve heard the phrase “Get with the program!” It’s often used as a direct order to someone to fall in line with the way things are supposed to be done at your company. The problem is, most business owners don’t have “a program” for employees to get with, and therefore they get...
Read MoreDeath By CHEAPNESS
Southwest Airlines’ recent fiasco that caused them to cancel over 16,700 flights, leaving people stranded across America, was the epitome of what’s happening with so many businesses right now across the US. A total and complete meltdown in service due to cheapness. During their busiest season, Southwest had to apologize for...
Read More“If I’m Going To Get Hacked Anyway, Why Bother Spending Money On Cyber Security?”
In his book The Road Less Stupid, Keith Cunningham makes this correct observation about succeeding in business: “I don’t need to do more smart things. I just need to do fewer dumb things.” When it comes to cyber security, I see a lot of dumb decisions made by smart people based on...
Read More3 Tech And Automation Strategies Businesses Must Have Now To Stay Competitive, Profitable And Thriving This Year
Covid changed everyone’s lives in dramatic ways on many levels – but small and big businesses alike were radically impacted, from events, restaurants, and retail being shut down to sending everyone home to work remotely. It’s no surprise that the tech sector thrived during this time, from remote work solutions...
Read MoreHow The New FTC Safeguards Rule Will Radically Change How Even Small Businesses Operate
A little over a year ago, the FTC made several amendments to the existing Safeguards Rule requiring even very small businesses to ensure the protection of client data. These changes, set to go into effect back in December of 2022, are now going to be enforced starting June 9, 2023 – and it’s...
Read MoreWinner Winner Chicken Dinner!
What do these three real e-mails have in common? Kohl’s Winner – “Notifications – Re: 2nd attempt for Paul” WalmartStores – “Re: CONFIRMED: Paul you are selected” Lowe’s Winner – “Congratulations Paul! You Are The Lucky Online Winner Of A Brand-New Sweepstakes Dewalt Power Station Entry No, “Paul” isn’t the...
Read MoreAre Your Smart Devices (Siri, Alexa, Google) Eavesdropping On You?
Have you ever had a conversation about a topic, and then later that day you start seeing news, ads, or updates about that subject, and said to yourself, “This can’t be a coincidence”? Well, you’re probably right. According to Norton, who you may remember as an antivirus software company and...
Read MoreMake Purchases Online? Here Are 4 Things You (And Your Employees) Need To Do To Keep From Becoming A Prime Target For Cybercriminals
ROI Revolution estimates that e-commerce sales will eclipse $236 billion this holiday season. While that’s the most popular time for consumers to purchase online, in 2021 over $2 billion a day was made in online purchases. Chances are you and your employees make purchases weekly personally and for your business. And…chances...
Read MoreIf You Have Employees Working From Home, Here Are Three Things All Remote Employees Must Do Now To Prevent Your Company From Being Hacked
The last few years have seen countless companies going to a hybrid work model. According to a survey by Envoy over 77% of businesses have some full or part-time remote employees. While this change comes with many benefits, as a business owner, there are three big things you need to make sure...
Read MoreThis ONE Person Can Sink Your Company
It’s not just cybercriminals who hack into networks and steal data. Most business owners erroneously think cybercrime is limited to hackers based in China or Russia, but the evidence is overwhelming that disgruntled employees, both of your company and your vendors, can cause significant losses due to their knowledge of...
Read MoreTechnology Problems Shouldn’t Be Scary
If you depend on your computer network to run your business (and who doesn’t?), you’ll want someone treating your data as securely as they would their own. Not knowing what’s going on behind the scenes should scare the crap out of you. It is NOT unreasonable that your IT company...
Read MoreWhat is your stripper name?
Anyone active on social media has seen those seemingly harmless quizzes that someone in your newsfeed takes and then shares…the ones that ask you to enter your first name, your middle name, and the street you grew up on to create your “new name.” Joe + Schmo + Blow Avenue...
Read MoreAre You On A Bad Date And Don’t Even Know It?
They don’t call you back, they don’t text back, and when you get time with them, they are disheveled, rude, and uninterested, doing barely enough to keep things going. This sounds like a bad date…and it’s one that many businesses are on with their current IT guy. You have a...
Read MoreHow To Find Your Passwords (And Never Need To Reset Them Again)
There are two types of people…which one are you? The frustrated, constant updater: You find yourself having to constantly click on “Forgot My Password” and verify your account, check your texts, scan a finger (give a pint of blood…maybe not that one) so you can reset your password. And it’s...
Read MoreScarier Than The Boogeyman
One of the common issues on the Dark Web – whether you use it or not – is the sale of passwords, bank account information, Social Security numbers, and other private data. Hackers can breach firewalls and software to obtain this information and then go to the Dark Web to...
Read MoreControlling Startup Programs in Windows 10
https://www.youtube.com/watch?v=aSQiydksJuE So many things we use on our computers will automatically add themselves to the startup. While some of these are important, most of the time they are unwelcome party crashers that slow your computer down. In this podcast episode, I’ll show you how to evaluate the programs that startup...
Read MoreLearning to Use Windows in Windows
In today’s video blog, I show you how you can snap windows to the corners of your display essentially creating a multi-monitor effect on a single screen. It’s really handy when you need to look at two different windows at the same time. We’ll start with positioning two windows on...
Read MoreHow to Set Up and Use a Password Manager
https://www.youtube.com/watch?v=z9Kx9rND6x4 Passwords are a hassle, no doubt about it! In this blog post and video, I show you how to set up a password manager to help control password chaos. There are two tools that we recommend for managing passwords. One is LastPass, which is a cloud-based solution. The other...
Read MoreSanitize your Electronics with UV Sanitizer Gadgets
https://www.youtube.com/watch?v=yqXYClyi-gc Using a UV Sanitizer is an easy and safe way to protect yourself from germs lingering on your electronics. In this blog post, I show you how to use two different devices designed to keep you safe. First, the phone soap. This is a very slick device designed to...
Read MoreHow to Use Multi-factor Authentication
https://www.youtube.com/watch?v=lW7FhDMmzNY Multi-factor authentication is a very secure process of keeping your sensitive data private. In this blog, I explain in simple terms what Multi-factor authentication is, why you should use it where available, and how you can use it to keep your data private. First, what is Multi-factor authentication and...
Read MoreHow To Set Up Email Signatures
https://www.youtube.com/watch?v=pT298DBYG8Y Technology Tips By Centrend Podcast: Episode #6 Don’t you admire the professional look of a well-crafted email signature? Much more than just a name, a well-designed email signature is a block of text and graphics representing you and your brand. In this video podcast, I will show you how...
Read MoreHow to Recover Your Windows 7 Password
https://www.youtube.com/watch?v=V5dFilcmY4w Technology Tips By Centrend Podcast: Episode #5 With the scarcity of computers right now and the need for additional computers for remote working and remote learning, many folks are dusting off their old Windows 7 computers. The problem is, you may not remember the password to it. In this...
Read MoreUsing a Whiteboard in 2020
https://www.youtube.com/watch?v=dyyB-OWr3So Technology Tips by Centrend Podcast: Episode 4 I love working with a whiteboard. In fact, I can think of no technique more effective for brainstorming a project than getting a team of folks to share ideas in front of a whiteboard. In 2020, we are forced out of the office,...
Read MoreFun Ways to Improve Your Typing Skills
https://youtu.be/8S-6LXy57Cg Technology Tips by Centrend Podcast: Episode 3 These days, when we aren’t on camera in a web meeting, it seems like we are typing on our computer keyboards. Typing skills are essential to be productive and competitive. I’m going to show you some effective and fun ways to improve...
Read MoreReview Your Cyber Security Plan in Four Simple Steps
Increasing Threats Companies rely more and more on digital information and network-enabled devices. Threats are increasing, and cybercrime is on the rise, so it’s no wonder cybersecurity is increasingly important. Is your company prepared for a cyber attack? If you are like most small/medium businesses, you don’t have a written plan at...
Read MoreDon’t Get Caught by a “Phisherman!”
https://youtu.be/FtdD_mQsTRg Technology Tips by Centrend Podcast: Episode 2 “Phishing” is a social hacking attempt to get you to reveal information that hackers can use to exploit your email or computer account. Here are some clues on how to detect a phishing attempt and what you should be looking for. Welcome to...
Read MoreHow to Fix Common Zoom Meeting Problems
https://youtu.be/cc2rpvI-SH8 Technology Tips by Centrend Podcast: Episode 1 We’ve all come to rely on online meetings to stay connected with business associates, remote learning for our children, and keep in touch with our loved ones that we can’t visit in person. That’s why in this first episode of my video...
Read MoreWhat 6 things increase the longevity of your computer?
Individuals and small businesses struggle with ways to increase the lifetime value of their PC hardware. What can you do to keep your computer running strong like you? Extending the life of existing desktops and laptops to reduce your cost and lower your budget is critical in today’s economic...
Read MoreIs My Internet Service Provider’s Firewall Strong Enough?
When an Internet Service Provider (ISP) installs internet access in your business, you are usually provided with a router/firewall combination. Do you need to invest in a commercial-grade firewall, or is the ISP’s firewall sufficient? Let’s start with a simple description of what a firewall is and how it protects...
Read MoreSix Ways Scammers are taking advantage of COVID-19
Cyber Criminals are taking advantage of the COVID-19 pandemic in some of the worse ways. Read on to learn how to avoid their evil scams… 1. Phishing: Phishing (pronounced fishing) occurs when criminals send fake mail, email, or phone calls pretending they are legit. They try to convince you to share...
Read MoreHow do you know if you have Spyware in your computer?
Sometimes, it’s obvious, right? There is a big obnoxious warning that pops up and tells you that you are infected and you need to call for support! Don’t call the number presented because that’s a scam. Call us instead! Other times, the infection is much more subtle. Here are some...
Read MoreHow to Clean and Disinfect Computer Equipment Without Destroying it
With the threat of coronavirus (COVID-19) all around us, we are all being more diligent about wiping down our work areas. One of the highest touch areas in your environment is your keyboard, mouse, and touch screens. If you’re a customer of Centrend, I already have the inside of your...
Read MoreWorking Remotely? Are you secure?
Since the Coronavirus pandemic outbreak, there has been a massive surge of remote workers. Your information is at risk when remote access is not done correctly! Read on to learn what to avoid when it comes to remote workers. Remote access requires careful thought and planning to keep business data...
Read MoreCentrend COVID-19 Response
Centrend cares about our employees’ and our customer’s safety, and we’re doing our part to reduce the spread and flatten the curve. Read on to learn what we are doing to keep safe and keep our customers’ information systems running well. We are practicing social distancing and utilizing our extensive...
Read MoreDon’t Frankenstein your IT!
Are you trying to cobble together pieces of disparate systems that weren’t meant to talk to each other? Are you hopeful that connecting mismatched data sets will breathe life into your IT Systems? Don’t Frankenstein your IT! Read on to find out what I mean. You know the story of Dr....
Read MoreIs Your Router Slowing Down Your Wi-Fi?
Your router is the box that connects your computers, phones, and tablets to the outside world. If your router is old or undersized for the number of devices you have, it can create a bottleneck. Here are a few essential things to keep in mind when assessing your router. These rules apply...
Read MoreInternet Seem Slow? Consider this!
If you are using a laptop on a slow wireless connection such as hotel Wi-Fi or a cellular hotspot, your connection can slow to a crawl if you have installed cloud services such as Dropbox, Google Drive, and Microsoft’s One-Drive. Here’s how to limit how much resource the service uses, so...
Read MoreWhy do my Spreadsheet Formulas Show Instead of the Result?
Have you ever been working on a spreadsheet and after entering a formula in a cell, you see the formula instead of the result? This article explains what happened and how you can get it back. This can happen in both Excel and Google Sheets, and I’ll explain how to...
Read MoreHow to Automatically Lock Your PC When You Walk Away
You should always secure your computer by locking the screen when you walk away. But sometimes in a rush, we forget to lock it down. This article shows how to set up an automatic lock so that when you walk away from your computer, your screen will lock itself! Keeping...
Read MoreShould you buy a Chromebook, PC, or Mac?
While any Chromebook, PC, or Mac can be used for email and web browsing, it’s all the other activities that determine what is right for you. Read this article to get some insight into the advantages of each option. They are all computers but Chromebooks run the Chromium operating system whereas...
Read MoreWhy You Shouldn’t Get Mad When You’re Asked to Reboot
Many users leave their computers on all the time so that they can receive automatic updates and security patches. This is a great strategy but leaves users with the question, “How long can you go without restarting your computer?” Read on to find out. During use, programs open and close,...
Read MoreSolid State vs Traditional Hard Drives – which should you choose?
No doubt, solid-state drives are fast, energy-efficient, and long-lasting. Unfortunately for users on a budget, solid-state drives can be too expensive to justify the cost. Here’s some advice on how and when to use solid-state drives (SSD) and how to stretch your budget on this crucial technology. Because SSDs are...
Read More7 Reasons Why You Should Replace Traditional Keys with card keys.
Card keys are fast replacing traditional keys in small businesses. Here are 7 reasons why it might make sense for your small business! Regular keys are bulky, clunky, and slowly going away. Have you been car shopping lately? You will be hard-pressed to find a new automobile that has a...
Read MoreShould my office be Wi-Fi only?
WiFi has come a long way in terms of speed and reliability. But there is still nothing like those irritating wires that are much faster and more reliable than interference-prone WiFi. Here are some guidelines for when you can go WiFi only and why you might not want to ditch...
Read MoreShould you back up your cloud data?
So you’ve put your data in the cloud. Should you back it up? The short answer is Yes! This article explains why I think it’s essential. We put data in the cloud for different reasons. Sometimes it is the primary access point for our data, and it’s in the cloud...
Read MoreHow to Keep Passwords Safe in Email
No doubt, the most secure way to give someone a password or other confidential information is in person or over a private phone call. There are times, however, when you want to send a password or a bank account number via email simply because of the convenience. This article explores...
Read MoreAre Cell Phones Ruining Communications?
Technology is great. I believe in its development and use to the benefit of all humankind. However, there is a real danger that we are losing our ability to communicate with each other because of the way cell phones are way overused. I’m sure you’ve seen the scenario. A set of...
Read MoreHow Big Can My Outlook File Get?
Who doesn’t love their email? Ok, maybe love is a strong word, but we all tend to save a lot of email, don’t we? How much is too much and what are the risks of letting Outlook grow out of control? This article assumes you are using MS Outlook so the...
Read MoreNon-profits Deserve the Best Tools – for Free!
If you work for or care about a non-profit organization, make sure they know about Centrend – and these strategies for obtaining the best software for free or nearly free. Corporations understand that investments in technology can make a huge difference in the success of their non-profit organization. After calculating...
Read MoreAre public WiFi’s Safe?
A friend of mine and I were together at a venue, and I asked him if he was able to get on the local free Wifi that was provided. He said, “I usually don’t go on public wifi because I don’t think it’s secure.” This article describes what I told...
Read MoreAre You in the Dark about Downtime?
Even the most reliable systems can go down, and you deserve to know what is happening! Here are some thoughts on what you should be able to find out when a critical piece of your Information Technology fails. As a managed service provider, we take great care to keep our...
Read MorePower: the One Thing your Computer Systems Need
This week, one of our managed services customers sites went down due to a power failure. The site has a backup generator, but guess what? Their generator failed to start! While there is not much we can do for a customer that is entirely without power, there are things we...
Read MoreDon’t type contacts, Scan them in with your phone!
If you’re like me, you meet a lot of people and end up collecting a lot of business cards. Several years ago, serious business networkers had to have a special scanner for scanning business cards effectively. With our smartphones so powerful, and with such great cameras, there’s an app for...
Read MoreHow to Protect from Word and Excel Crashes
There is NOTHING worse than having worked on an Excel Spreadsheet or written something in MS Word and then had to redo it because of a power loss or application crash. You can avoid this frustration by following a few quick and easy precautionary steps. So How Do I Protect from...
Read More