Centrend

Blog

Home » Newsroom » Blog

6 Ways Your Phone Is Tracking You

Have you ever casually talked about a product or service while your phone was nearby and then suddenly started seeing ads for it on your social media feed? Your phone is listening. If that concerns you, this should really worry you: your devices are tracking you too! From the phone...

Read More

Avoid A Holiday Tech Meltdown With Better IT

Ah, the holiday season – when everything gets festive, sales go up and your to-do list grows longer than your wish list. For businesses, this time of year can be make-or-break, but while you’re decking the halls, your IT infrastructure might be decking you with unwanted downtime and cyberthreats. The...

Read More

The Top 5 Data Breaches Of 2024 And What You Need To Know About Them

This year has been a busy one for cybercriminals, with some massive data breaches making headlines and costing companies millions. From health care giants to project management platforms, no industry is immune to the risks. But what do these breaches mean for small to midsize businesses? The same vulnerabilities exist...

Read More

Was Your Information Compromised From The National Public Data Breach?

National Public Data confirmed in September 2024 that a hacker has compromised the personal records of millions of individuals. The information exposed includes the names, e-mail addresses, mailing addresses, phone numbers and even Social Security numbers of up to 2.9 billion people. Here’s what you need to know. What happened?...

Read More

5 Signs It’s Time To Update Your Software (And How To Do It Safely)

Software updates can feel like a nuisance, but skipping them is one of the easiest ways to leave your systems vulnerable to cyber-attacks. Hackers are constantly looking for weaknesses, and outdated software is like an open door to your network. But how do you know when it’s time to update,...

Read More

The S.E.C.U.R.E. Method To Stop Phishing E-mails

Phishing attacks are the most common cybercrime attack for one reason…they work. Every day, over 3.4 billion spam e-mails reach unsuspecting users’ inboxes. Phishing e-mails have held the top spot as the most frequent form of attack for years because they’re easy to implement, easy to scale and continue to...

Read More

The CrowdStrike Outage: How To Avoid A Future IT Crisis

When 8.5 million Windows devices, including those at airlines, banks and hospitals, suddenly displayed the “Blue Screen of Death,” people began to panic. “We are under a cyber-attack!” most speculated. Fortunately, that was not the case, but the real reason behind the outage is alarming and something every business owner...

Read More

The Hidden Dangers Of Shortcuts In IT Security

The National Cancer Institute in Maryland recently analyzed data from three major US health studies that gathered information on people’s daily multivitamin use. They discovered that people who took daily multivitamins had a 4% higher mortality rate than those who didn’t. This surprising result echoes a scene from the movie...

Read More

Vacation Travel Scams Are Up 900%

Summer is a popular time for vacation travel. If you’re looking to squeeze in any last-minute travel, there is a scam circulating that you need to be aware of. As costs for everything from food to travel continue to increase, the logical step is to search for the best deals...

Read More

Outdated Technology Is Costing Your Organization Money

Is your organization currently bleeding money due to its reliance on outdated technology? The answer is likely yes. A recent survey by Deloitte revealed that a staggering 82% of companies failed to meet their cost-reduction targets last year, with an inefficient technology infrastructure being the primary culprit. The 2024 poll...

Read More

Dangers Of LinkedIn: 4 SecurityFeatures To Use TODAY

A recent report from Check Point Research revealed a shocking statistic – the Microsoft-owned business platform LinkedIn is impersonated in nearly half of all phishing attacks globally. One of the ways scammers leverage LinkedIn to deploy their phishing attack is when they zero in on anyone seeking a new job...

Read More

The Microsoft Outage: A Wake-Up Call for Incident Response Planning

The recent global outage of Microsoft services, caused by a faulty software update from CrowdStrike, served as a stark reminder of how vulnerable even the largest tech giants can be to unexpected disruptions. Airlines, businesses, and countless individuals relying on Microsoft’s vast ecosystem felt the ripple effects, highlighting the interconnected...

Read More

Travel Smart: Essential Cybersecurity Practices For A Hack-Free Vacation

Summer is a popular time for business owners and employees to step out of the office and take a well-deserved vacation. Even if their “out of office” e-mail responder is active, many people will periodically check in on work at least once while traveling. Unfortunately, studies show that working outside...

Read More

Massive Layoffs In 2024 Create A Serious Threat To Your Cybersecurity

The massive wave of layoffs in 2024 brings a cybersecurity threat that most business owners aren’t focusing on – offboarding employees. Even big-time brands that you would expect to have top-of-the-line cybersecurity systems, processes and procedures in place fail to adequately protect themselves from insider threats. This August marks a...

Read More

Frustrated With BAD Tech Support? You’re Not Alone

A recent stream of Reddit comments emerged detailing a series of poor customer service experiences with tech support. While I typically try to stay clear of Reddit and its gang of chronic whiny-pants commenters, I scrolled through a few, you know, for research purposes since I’m in the industry. A...

Read More

“Savings” That Could Cost You EVERYTHING

As a business leader, you’re always looking for ways to increase revenue, cut expenses and grow your bottom line. Implementing AI tools, shopping services and running a more efficient operation are great ways to do that. One place you do NOT want to cut corners is using free antivirus or...

Read More

How Poor Tech Support Is Slowing Down Your Business

If you’re serious about growing a successful, profitable business in 2024 and beyond, there’s no room for pass-the-buck tactics – especially when it comes to IT support. The efficiency of your IT team isn’t just a convenience – it’s a cornerstone of your operational capability. Yet many companies find themselves...

Read More

Apple Might Never Have Released The Macintosh If This Happened

Steve Wozniak was asked in an interview what he would have done differently if he had been Apple’s CEO instead of Jobs. He said he would have been “a lot nicer to people,” but then quickly added that IF he had been CEO, they might never have released the Macintosh....

Read More

AT&T Attack Reveals 73 Million Customer Records Exposed On The Dark Web

In a statement released by the largest telecommunications company in the United States, AT&T, they shared that they recently discovered a dataset for sale on the “dark web” that contained information for about 7.6 million current AT&T account holders and 65.4 million former users, totaling approximately 73 million affected accounts....

Read More

The Safest Way To Shop For Mother’s Day Online

Are you planning on buying gifts for the special women in your life for Mother’s Day? If you shop online, there are a few ways to do it SAFELY. During the holidays, cybercriminals ramp up various scams to capitalize on innocent people looking for gifts online. These scams range from...

Read More

10 Things Great IT Providers Always Do

What sets high-quality, reliable IT support apart from mediocre or substandard support? Is it lower prices? Flat-fee service? At Centrend, we believe there are many deciding factors that separate even the good from the great providers, but when our clients switch from their old companies to us, we get the...

Read More

What Is Bad IT Support Costing Your Business?

In our technology-driven world, efficient IT support is the backbone of any successful business. From ensuring seamless operations to safeguarding sensitive data, reliable IT services are crucial for maintaining productivity and protecting your bottom line. However, not all IT support is created equal, and the cost of settling for subpar...

Read More

 Suspect Your Computer Has Been Hacked? Do These 5 Things Now!

The initial reaction when you suspect your computer or network has been compromised is to panic. However, if your network has been breached, what you do next can make the difference between the incident being a minor inconvenience and being a devastating disaster that brings legal trouble and huge fines...

Read More

Financial Advisor Loses $50K To A Scammer

Horror stories of people getting scammed out of hundreds or even thousands of dollars aren’t in short supply. As we scroll through the news app from the comfort of our couch, reading these accounts of how a stupid so-and-so opened an obviously suspicious attachment and a hacker drained their bank...

Read More

Top Tax Scams Every Business Owner Needs To Watch Out For In 2024

Tax season is around the corner, which means so are tax scams. Without fail, every year, individuals and business owners alike fall victim to tax scams, resulting in the loss of substantial amounts of money and sensitive personal data. According to the Better Business Bureau, taxpayers lost $5.7 billion due...

Read More

6 Common Technology Problems Small Business Owners Face

Technology can provide a strategic advantage for companies in every industry when properly utilized. However, one of the biggest issues small business owners face is overcoming some of the common tech obstacles that hinder productivity. These issues can range from minor inconveniences to serious threats that can permanently shut down...

Read More

Pirates Aren’t Just Threats On The Open Seas

“Know Ye That We Have Granted And Given License To Adam Robernolt and William le Sauvage…to annoy our enemies by sea or by land, wheresoever they are able, so that they share with us the half of all their gain.” These were the words of King Henry III of England...

Read More

How “Cheaper” IT Providers Sneak In Expensive Hidden Costs

Is your company looking to hire an IT firm? Unfortunately, unless you’re tech-savvy or experienced with IT contracts, there can be hidden costs that you wouldn’t expect or know to look for. While it can sound appealing to go for the cheapest firm, that decision can end up costing you...

Read More

New Security Features To Protect Your Phone In 2024

Long gone are the days when phones were simple devices used to make calls. Today our phones are advanced, handheld supercomputers that can do everything from pay a bill to order lunch for delivery to edit videos and more. But with more capabilities come more risks. Because our phones are...

Read More

Your 15-Step IT Profitability Road Map For 2024

If you’re hoping to cut costs and boost profitability in 2024 without compromising productivity or efficiency, assessing the technology you use in day-to-day operations is one of the first areas in your business to examine. We’ve created a road map that you can use to go step-by-step through your organization...

Read More

Beware Of Cybersquatters!

Have you ever searched for a specific website but landed on a completely different one after misspelling a letter or two in the URL? This deceptive tactic is known as cybersquatting. This practice not only jeopardizes the online presence of businesses and individuals but also poses a significant challenge in...

Read More

How IT Support Companies Charge For Their Services – Part 1 Of 2

Before you can accurately compare the fees, services and deliverables of one IT services company to that of another, you need to understand the two predominant pricing and service models most of these companies offer. Many companies offer a blend of the two, while others are strict about offering only...

Read More

7 Ways To Maximize Workplace Productivity With Tech

In the fast-paced world of business, efficiency and productivity are paramount. Advancements in technology have revolutionized the way we work, providing a plethora of tools and resources to help us accomplish more in less time. Maximizing workplace productivity with technology has become an essential strategy for organizations looking to stay...

Read More

New And Urgent Bank Account Fraud Alert 

The infamous Xenomorph Android malware, known for targeting 56 European banks in 2022, is back and in full force targeting US banks, financial institutions and cryptocurrency wallets.  The cyber security and fraud detection company ThreatFabric has called this one of the most advanced and dangerous Android malware variants they’ve seen....

Read More

May A Force Field Be With You

“That won’t happen to me” is something many business owners say when discussing cyber-scams and the need for adequate protections for their business, but these days it’s getting to be a really, really stupid statement that you definitely don’t want your clients, employees and banker to hear. Generative AI (artificial...

Read More

The Bad Bot Takeover Is Here

There is one extremely common threat to our security that nearly everyone has witnessed but hardly anyone talks about – bad bots. These silent attackers are often thought of as annoying spam accounts posting computer-generated comments online. They are so common that most of us tend to scroll by them...

Read More

10 Tasks You Didn’t Know Your IT Team Could Do For You

When you run your own business, it feels like there are never enough hours in the day. Even when you start early and end late, there’s always something else, another e-mail or task, nagging for your attention. If you want to be productive, and ultimately successful, it’s important to prioritize...

Read More

7 Quick Fixes To Fix SLOW Home Wi-Fi

Nothing is more aggravating than attempting to watch a video or use your PC when the Internet is operating slower than molasses flowing uphill in winter. For our clients, we have many solutions to make your Internet connection faster, more reliable and secure. But what about at your home? Spotty,...

Read More

Are Your Business Tools Ticking Time Bombs For A Cyber-Attack?

In June a popular file-sharing software amongst big-name companies likes Shell, Siemens Energy, Sony, several large law firms, a number of US federal agencies such as the Department of Health and more was hacked by Russia-linked cybercrime group Cl0p. Security Magazine reported that, to date, there are 138 known companies...

Read More

The Key To Scaling Your Company Efficiently

As a business owner, you know that continuous, steady growth is an essential part of success. When you’re ready to get serious about scaling your organization, several vital activities must happen. Documented workflows and processes, streamlined hiring, onboarding and training, well-oiled marketing systems and more top the list. One key...

Read More

Your Personal Titanic Moment

On a recent interview about the Titan sub catastrophe, director of the movie Titanic James Cameron, who has made 33 successful dives to the Titanic wreckage site, pointed out that this tragedy is eerily similar to the 1912 Titanic disaster: the captain of the 1912 RMS Titanic was repeatedly warned...

Read More

Where Did All My Stuff Go?!

Has this happened to you? You are working on your Windows computer, and suddenly, while typing, your stuff disappears, and you are staring at your blank desktop! Then you realize your stuff didn’t disappear, it just all minimized to the bottom taskbar. Now you must open everything up again, but...

Read More

Facebook Owes You Money!

How To Apply For Your Share Of Facebook’s Recent $725 Million Privacy Lawsuit Here’s a shocker: Facebook is being forced to pay a whopping $725 million in a settlement following a number of lawsuits claiming they violated users’ privacy. This is in addition to another class action lawsuit for $650...

Read More

Microsoft Teams Productivity Tips Every SMEs Needs To Know

Every business needs the right tools to get the job done and to keep your team on track. But juggling multiple apps and software can be a nightmare when trying to keep information streamlined and easily accessible. That’s where Microsoft Teams for small businesses comes into play. In this article,...

Read More

10 Common Tech Problems SMEs Are Eliminating From Their Business Forever

They say, “You get what you tolerate” and now more than ever, we’ve been conditioned to tolerate worse service at higher prices. Companies get a ‘free pass’ simply by saying phrases like “the labor shortage,” “because COVID,” or “inflation.” But it doesn’t have to be that way. While you may...

Read More

Death By CHEAPNESS

Southwest Airlines’ recent fiasco that caused them to cancel over 16,700 flights, leaving people stranded across America, was the epitome of what’s happening with so many businesses right now across the US. A total and complete meltdown in service due to cheapness. During their busiest season, Southwest had to apologize for...

Read More

Winner Winner Chicken Dinner!

What do these three real e-mails have in common?  Kohl’s Winner – “Notifications – Re: 2nd attempt for Paul” WalmartStores – “Re: CONFIRMED: Paul you are selected” Lowe’s Winner – “Congratulations Paul! You Are The Lucky Online Winner Of A Brand-New Sweepstakes Dewalt Power Station Entry No, “Paul” isn’t the...

Read More

Are Your Smart Devices (Siri, Alexa, Google) Eavesdropping On You?

Have you ever had a conversation about a topic, and then later that day you start seeing news, ads, or updates about that subject, and said to yourself, “This can’t be a coincidence”? Well, you’re probably right.  According to Norton, who you may remember as an antivirus software company and...

Read More

This ONE Person Can Sink Your Company

It’s not just cybercriminals who hack into networks and steal data. Most business owners erroneously think cybercrime is limited to hackers based in China or Russia, but the evidence is overwhelming that disgruntled employees, both of your company and your vendors, can cause significant losses due to their knowledge of...

Read More

Technology Problems Shouldn’t Be Scary

If you depend on your computer network to run your business (and who doesn’t?), you’ll want someone treating your data as securely as they would their own.    Not knowing what’s going on behind the scenes should scare the crap out of you. It is NOT unreasonable that your IT company...

Read More

What is your stripper name?

Anyone active on social media has seen those seemingly harmless quizzes that someone in your newsfeed takes and then shares…the ones that ask you to enter your first name, your middle name, and the street you grew up on to create your “new name.” Joe + Schmo + Blow Avenue...

Read More

Are You On A Bad Date And Don’t Even Know It?

They don’t call you back, they don’t text back, and when you get time with them, they are disheveled, rude, and uninterested, doing barely enough to keep things going. This sounds like a bad date…and it’s one that many businesses are on with their current IT guy. You have a...

Read More

How To Find Your Passwords (And Never Need To Reset Them Again)

There are two types of people…which one are you? The frustrated, constant updater: You find yourself having to constantly click on “Forgot My Password” and verify your account, check your texts, scan a finger (give a pint of blood…maybe not that one) so you can reset your password. And it’s...

Read More

Scarier Than The Boogeyman

One of the common issues on the Dark Web – whether you use it or not – is the sale of passwords, bank account information, Social Security numbers, and other private data. Hackers can breach firewalls and software to obtain this information and then go to the Dark Web to...

Read More

Controlling Startup Programs in Windows 10

https://www.youtube.com/watch?v=aSQiydksJuE So many things we use on our computers will automatically add themselves to the startup. While some of these are important, most of the time they are unwelcome party crashers that slow your computer down. In this podcast episode, I’ll show you how to evaluate the programs that startup...

Read More

Learning to Use Windows in Windows

In today’s video blog, I show you how you can snap windows to the corners of your display essentially creating a multi-monitor effect on a single screen. It’s really handy when you need to look at two different windows at the same time. We’ll start with positioning two windows on...

Read More

How to Set Up and Use a Password Manager

https://www.youtube.com/watch?v=z9Kx9rND6x4 Passwords are a hassle, no doubt about it! In this blog post and video, I show you how to set up a password manager to help control password chaos. There are two tools that we recommend for managing passwords. One is LastPass, which is a cloud-based solution.  The other...

Read More

Sanitize your Electronics with UV Sanitizer Gadgets

https://www.youtube.com/watch?v=yqXYClyi-gc Using a UV Sanitizer is an easy and safe way to protect yourself from germs lingering on your electronics. In this blog post, I show you how to use two different devices designed to keep you safe. First, the phone soap.  This is a very slick device designed to...

Read More

How to Use Multi-factor Authentication

https://www.youtube.com/watch?v=lW7FhDMmzNY Multi-factor authentication is a very secure process of keeping your sensitive data private. In this blog, I explain in simple terms what Multi-factor authentication is, why you should use it where available, and how you can use it to keep your data private. First, what is Multi-factor authentication and...

Read More

How To Set Up Email Signatures

https://www.youtube.com/watch?v=pT298DBYG8Y Technology Tips By Centrend Podcast: Episode #6 Don’t you admire the professional look of a well-crafted email signature? Much more than just a name, a well-designed email signature is a block of text and graphics representing you and your brand. In this video podcast, I will show you how...

Read More

How to Recover Your Windows 7 Password

https://www.youtube.com/watch?v=V5dFilcmY4w Technology Tips By Centrend Podcast: Episode #5 With the scarcity of computers right now and the need for additional computers for remote working and remote learning, many folks are dusting off their old Windows 7 computers. The problem is, you may not remember the password to it. In this...

Read More

Using a Whiteboard in 2020

https://www.youtube.com/watch?v=dyyB-OWr3So Technology Tips by Centrend Podcast: Episode 4 I love working with a whiteboard. In fact, I can think of no technique more effective for brainstorming a project than getting a team of folks to share ideas in front of a whiteboard.  In 2020, we are forced out of the office,...

Read More

Fun Ways to Improve Your Typing Skills

https://youtu.be/8S-6LXy57Cg Technology Tips by Centrend Podcast: Episode 3 These days, when we aren’t on camera in a web meeting, it seems like we are typing on our computer keyboards. Typing skills are essential to be productive and competitive. I’m going to show you some effective and fun ways to improve...

Read More

Review Your Cyber Security Plan in Four Simple Steps

Increasing Threats Companies rely more and more on digital information and network-enabled devices. Threats are increasing, and cybercrime is on the rise, so it’s no wonder cybersecurity is increasingly important. Is your company prepared for a cyber attack? If you are like most small/medium businesses, you don’t have a written plan at...

Read More

Don’t Get Caught by a “Phisherman!”

https://youtu.be/FtdD_mQsTRg Technology Tips by Centrend Podcast: Episode 2 “Phishing” is a social hacking attempt to get you to reveal information that hackers can use to exploit your email or computer account. Here are some clues on how to detect a phishing attempt and what you should be looking for. Welcome to...

Read More

How to Fix Common Zoom Meeting Problems

https://youtu.be/cc2rpvI-SH8 Technology Tips by Centrend Podcast: Episode 1 We’ve all come to rely on online meetings to stay connected with business associates, remote learning for our children, and keep in touch with our loved ones that we can’t visit in person. That’s why in this first episode of my video...

Read More

What 6 things increase the longevity of your computer?

Individuals and small businesses struggle with ways to increase the lifetime value of their PC hardware. ​ What can you do​ to keep your computer running strong like you?​ Extending the life of existing desktops and laptops to reduce your cost and lower your budget is critical in today’s economic...

Read More
Scroll to Top