Blog
Technology articles & resources to grow your business.
How To Choose a New Laptop
If you want to know how to choose a new laptop, you’ve come to right place. Choosing a laptop can be a really frustrating process. Even if you know some of what you want, choosing the hardware specs, model, manufacturer, finding one and then getting a good price can be a daunting process. And you want…
How To Create a Shared Calendar in Outlook & Microsoft 365?
How do I create a shared calendar for sharing in Outlook? If you would like to create a separate calendar in Exchange you need to use Microsoft Outlook 2007 or later. Other users that want to view your new shared calendar will need to use Microsoft Outlook or the Outlook Web App in Microsoft 365. Scroll…
Continue Reading How To Create a Shared Calendar in Outlook & Microsoft 365?
17 New Cyber Liability Insurance Questions Your Provider Will Ask
Are you ready for this? What steps will you have to take to acquire cyber liability insurance today? We’ve received lots of requests from clients or prospects asking us to help populate their cyber liability insurance questionnaires. A few of the more important questions being asked are below. E-MAIL SECURITY Do you filter/scan incoming e-mails…
Continue Reading 17 New Cyber Liability Insurance Questions Your Provider Will Ask
Atlanta Real Estate Firm Gets Ransomware
A Story about Ransomware Detection and Prevention for an Atlanta Real Estate Firm This is the story of how cyber criminals in China attempted to take down and extort for ransom an Atlanta Real Estate Firm, how the Boost IT team reacted, and what we can learn from it — ransomware prevention in 2020. How…
Why Hackers Target Small Businesses
When it comes to computer security, your business data must be secure. As a small business, you can’t afford cyberattacks. Yet so much can happen. Employees can mistakenly open email spam or click on a malicious link while researching on the internet. Then there can be distributed denial of service (DDoS) attacks, like what happened…
Cloud File Sync and Share Provides Speed and Efficiency
Real estate companies are learning the benefits of cloud file sync and share technology to simplify the way they create and share data and collaborate with their team and clients. You can upload files with a click from any device and access them at any time. Share a property survey with a potential buyer or…
Continue Reading Cloud File Sync and Share Provides Speed and Efficiency
How the Cloud is Helping Engineering
There are 4 ways the cloud is helping engineering. Cloud computing has changed how engineering and other industries are bidding for and completing projects. The cloud is secure, fast, reliable and full-featured – perfect for engineers to be productive and competitive. So, how are engineers using the cloud? It helps engineering keep things moving When designing…
Identifying Gaps in Your Cyber Security
Many businesses recognize that cyber security is a growing threat and they prioritize it. They update software regularly, maintain their infrastructure and implement security measures to help thwart malicious attacks. They set up password protection access to computers, software, and apps so only those authorized can get access. They have their employees regularly change passwords.…
How to Check the Dark Web for Your Personal Information?
So I got a message from a client yesterday asking how to check the dark web for your personal information. This all started because they had gotten an e-mail from their bank that looked like this. “Heads up: CreditWise found your personal information somewhere on the dark web.” Needless to say they were freaked out.…
Continue Reading How to Check the Dark Web for Your Personal Information?
How to Prevent Ransomware
Do you know the one I.T. question you should be asking? This question is directed at you. Whether you are an individual trying to secure your digital footprint or an employee /owner working for a business, do you know the one I.T. question you should be asking? We do, and we want you to know…
Streamline Your Business with the Cloud
When you streamline your business with the cloud, there is no more need to build out and maintain a complex IT infrastructure. Your operations become more agile and you can reduce costs. Cloud computing helps in streamlining your business so your employees can improve productivity and be more competitive. With quick access to the cloud,…
FTC Proposes adding Detailed Cybersecurity Requirements to Safeguards Rule
On March 5, 2019 the Federal Trade Commission (“FTC”) published requests for comment on proposed amendments to two key rules under the Gramm-Leach-Bliley Act (“GLBA”). Most significantly, the FTC proposes to add more detailed cybersecurity requirements to the Safeguards Rule. The rule governs the information security programs financial institutions must implement to protect customer data.…
Continue Reading FTC Proposes adding Detailed Cybersecurity Requirements to Safeguards Rule
How to Create a Strong Password
Follow these 4 tips to secure your online accounts Knowing how to create a strong password can help prevent fraud and unauthorized access to your personal and financial information. But what is a strong password? Check out the tips below. 1. Create Long, Complex Passwords Shorter passwords may be easier to remember, but they usually…
Turn On Do Not Disturb in Mac OS X
So I was in a video screenshare meeting yesterday and the person I met with needed to know how to Turn On Do Not Disturb in Mac OS X. Ever get those annoying notifications on your Mac while you’re in a public place, presentation, screenshare, or video meeting? Me too, but it’s easy to turn…
How Are SMBs Using the Cloud in 2018? [CHART]
So How are SMBs using the Cloud? It’s not just a buzzword. Read on to find out how using the cloud can cut costs and increase revenue through efficiency. This year has ushered in many technological changes, most notably the adoption in the small- and medium-sized business (SMB) of things like mobile and cloud solutions.…
Continue Reading How Are SMBs Using the Cloud in 2018? [CHART]
How to Resolve a File Sync Warning
How to resolve a file sync warning on a Windows or Mac machine: When an issue occurs, you will see a Resolve Sync Warning icon over the following (your icon may look like a rocket): System tray icon: System tray menu: Affected file: Click the icon on your computer’s system tray or menu bar, and select…
5 Time-Saving Tech Tips
When it comes to saving time at work, we all want the best tech tips so we can be more productive. Better tech is not always the answer to your everyday productivity problems. Sometimes it can seem like we are spending more time on devices, even though we have the best. While technology is continuously…
How to share contacts in Outlook 2016 and Office 365?
How to share contacts in Outlook 2016 and Office 365 with specific people in your organization Knowing how to share contacts in Outlook 2016 and Office 365 can be a huge timesaver for companies of any size. The default Contacts folder in Outlook is created in each Outlook profile. This folder can’t be renamed or…
Continue Reading How to share contacts in Outlook 2016 and Office 365?
How to install SonicWall Mobile Connect on Windows 10?
How to install SonicWall Mobile Connect on Windows 10 Description This article explains how to install SonicWall Mobile Connect for Windows 10. Mobile Connect is the recommended VPN Client for Windows 10. Cause Resolution SonicWall Mobile Connect for Windows 10 is installed from the Microsoft Store. 1.On your Windows 10 device, launch the Store app.…
Continue Reading How to install SonicWall Mobile Connect on Windows 10?
The Scenario of the Infected Computer
The whole infected computer problem started when a coworker was sharing a computer to review a document and get other help. Before they realized what was going on, a pop-up window came up notifying them that you have an infected computer and suggested running a scan. The employees ran the scan but nothing happened. Everything…
Using Technology as a Game Changer
At Boost IT, we hold quarterly business meetings with our clients to maximize their success through the use of technology. During one quarterly business meeting with an engineering client, the owner mentioned a productivity concern. The concern was that his most productive engineers needed the fastest technology. In response, we configured his machines to make…
Do You Know Where Your IT is Vulnerable?
You might know a few people who avoid social media because they feel their personal identity will be compromised. You might also know a few people who are hesitant to use online banking for this same reason. Most of these people have no idea how many of their devices are connected to the internet and…
IT Recovery After a Major Flood
Natural disasters can be devastating. A major flood can destroy everything. When we look at the flooding from Hurricane Harvey, it can be difficult to imagine that it can happen to any of us. But it can. While a business can rebuild and purchase new IT infrastructure, what would happen to your business in the…
Cloud Storage vs Dedicated Servers
Have you heard other SMBs talk about their migration to the cloud? You might be thinking about ditching your dedicated server and using cloud storage. But is it right for you? Before you decide between cloud storage versus a dedicated server, recognize that you are probably already using cloud storage. If you store photos in…
How To Free Up Disk Space Using Disk Cleanup?
How To Free Up Disk Space Using Disk Cleanup One of the most common questions we get asked is “How do I speed up my PC without upgrading it?” so we tell our clients How To Free Up Disk Space Using Disk Cleanup. Cleaning up your PC’s hard drive frees up drive space and makes it…
Continue Reading How To Free Up Disk Space Using Disk Cleanup?
How Technology is Changing the Real Estate Industry
Technology has completely changed how real estate transactions are handled by an agent, how agents list and research properties, and how buyers and sellers complete property transactions. It has completely transformed the industry. With mobile technology and cloud computing, today’s brokers and agents are more connected than ever before, being able to operate anywhere, and…
Continue Reading How Technology is Changing the Real Estate Industry
How IT is Changing the Way Healthcare Manages Big Data
The healthcare industry is a great example of how we see technology changing the way big data can be managed to benefit everyone. Big data is a term that describes data sets, or the large volume of data, that we use everyday but which are so complex that traditional data processing application software is inadequate…
Continue Reading How IT is Changing the Way Healthcare Manages Big Data
The Benefits of System Performance Monitoring
Improving your system performance and increasing your productivity are goals every business wants to achieve. IT can be a big headache and cost you money when your system is slow or down. Therefore, system performance monitoring should be a priority against weaknesses and threats that are counterproductive and costly. 3 benefits of system performance monitoring…
Continue Reading The Benefits of System Performance Monitoring
Making the Move to the Cloud
When is the last time you forgot to backup your work? If you remember working before the cloud, you might have thoughts of your computer crashing and losing several hours of work. Luckily, if you’ve started using the cloud, your changes are automatically saved. Many businesses are realizing the efficiency in storing data in the…
Where’s My Data? The Future of Cybersecurity
More businesses realize cybersecurity is a necessity. Cybercrimes are on the rise and small businesses are increasingly being targeted. Cybercriminals are becoming savvier and their attacks are becoming increasingly complex. The need to stay on the forefront of information technology and IT skills development increases. Just as important is the need to be prepared and…
Continue Reading Where’s My Data? The Future of Cybersecurity
Getting Out of the IT Business
Want to get out of the IT business? We’ve been hearing that phrase a lot lately and it’s coming from people who are realizing the benefits of outsourcing. That’s because these people aren’t even in the IT business. They are administrative assistants, engineers, real estate brokers, financial advisors, and other professionals who have jobs to…
What’s Slowing Down Your Device?
You rely on your device to get your work done. When your device is slow, your productivity level is affected. You have deadlines looming and risk going over budget if you can’t get the work done in a timely manner. But right now, all you can seem to do is stare at the screen, waiting…
How Outsourcing IT Can Help Take Your Business to the Next Level
Managed IT services are becoming increasingly popular. Whether you have a small business with limited IT staff or a large business with a full staff, outsourcing IT can help take your business to the next level. Filling in Gaps A big problem with IT is that there are gaps for essential tasks that are not…
Continue Reading How Outsourcing IT Can Help Take Your Business to the Next Level
The Ransomware Nightmare and Its Real Cost
Every day people go on the internet and are at risk from cyberattacks. Some of these attacks use highly sophisticated technology that can create a ransomware nightmare. Ransomware attacks by locking you out of your system and demanding a ransom to unlock it. The Ransomware Attack In Atlanta, there was a healthcare provider doing business…
How to Avoid Phishing Scams
From e-mails to pop-up ads to websites, phishing scams are sophisticated and come in many different forms. They are bombarding everyone from everywhere – on desktops, smartphones, tablets, and other devices. They are one of the most common security challenges that businesses face in keeping their information secure. Cybercriminals are devious in using phishing scams…
Benefits of Managed IT Services
To be successful in business, increasing revenue while decreasing costs is crucial. Many SMBs are turning to outsourced managed IT services because they realize that a small incremental expense, and in some cases an overall decrease in IT expenses, can mean huge gains in revenue. Managed IT services can also be a game changer because…
How to Get Started with Office 365
If you or someone from your company recently signed up for Office 365, that’s great. You now have many tools and features at your fingertips for multiple devices. With Office 365, there are new, easy ways to work from your phone, tablet, desktop, or laptop Mac or PC. Here’s how you start. Getting Started Unlike…
How to Increase Productivity with Cloud Computing
You have probably heard business professionals talk about the ease of working in the cloud and increasing their productivity, but what does that mean? Many SMBs are finding out just how effective cloud computing is. With its continued growth in popularity, cloud resources and services become more accessible, available, and secure. 3 Ways the Cloud…
Continue Reading How to Increase Productivity with Cloud Computing
How to Become an Office 365 Champion
It’s a new year and many people are resolving to be more productive in 2017. One way to do this is to be an Office 365 champion. Resolve to learn all you can about the technology. We’re not only talking about integrating it into your current workflow. We’re talking about making an all-out commitment to…
How To Boost Computer Performance
Your computer performance affects your productivity and can give you the competitive edge. It can also be the center of your frustration when it seems to be slow for the simplest of tasks. With more companies looking for game changers that can accelerate their growth, you need to regularly boost your computer performance to stay…
Planning for Data Recovery Before a Natural Disaster
When a natural disaster hits, your data can be affected. Everything, including your IT infrastructure, can be destroyed. Getting back up and running is critical for the health of your business. How quickly you can resume operations depends largely on what you do to protect your data before a disaster occurs. Having a data recovery…
Continue Reading Planning for Data Recovery Before a Natural Disaster
What Will Happen to Your Data if Disaster Strikes
Your data is your company’s most valuable asset. It could be at risk if a disaster strikes. The potential event will cause a disruption. How big of a disruption can depend on how big of a disaster and how well you’ve prepared. According to the National Archives and Records Administration, approximately 60 percent of companies…
Continue Reading What Will Happen to Your Data if Disaster Strikes
Cybersecurity Tips for Small Business
Back in January 2015, we wrote a four-part article about cybersecurity tips for small business. The article looked at the four parts of a great security strategy: anti-malware, firewall solutions, anti-virus and patches and updates. This information is still very relevant so we want to review the importance of cybersecurity and provide some basic tips.…
No, IT Support and Security are Not the Same
Most small to medium sized businesses intuitively know the difference between IT support and security. That doesn’t mean you address IT support and security separately when it comes to protecting your data and maintaining your infrastructure. Having both the necessary support to maintain your systems combined with adequate security to protect data is essential. Support…
Continue Reading No, IT Support and Security are Not the Same
Why Companies Are Doing Business in the Cloud
With professionals on the go, in the office and telecommuting, more companies are doing business in the Cloud. This shouldn’t come as a surprise considering the technical landscape is continuously changing. Businesses are realizing the impact of the Cloud with greater competitiveness and productivity. They can operate more efficiently, more safely and cut costs that…
Continue Reading Why Companies Are Doing Business in the Cloud
How Office 365 Improves Productivity
As a business professional, Office 365 is what you need to get the most productivity out of your devices. More companies than ever are using it for accomplishing goals and gaining an edge on their competition. Yet employees are not taking full advantage of the tools that can maximize their productivity. Your time is valuable.…
Why You Should Switch to Windows 10?
Have you held off on upgrading to Windows 10? You might have heard about the tradeoffs and shortcomings. You may have heard many complaints. Since its launch in 2015, many of the glitches are fixed. There are real benefits to upgrading. 5 Reasons to Switch to Windows 10 Updated Software Many individual users are disappointed…
Should You Regularly Change Your Password
Changing your password might not be providing as much security as experts thought. Hackers are regularly trying to access your company’s data to get financial information and for identity theft. Requiring your employees to have strong passwords makes it difficult for hackers to get at your accounts. But how often you require them to change…
Tips for Practicing Safe Browsing on the Internet
A security breach is a nightmare for any company. Attackers are always trying to take advantage of every opportunity to get financial and identity information. Therefore, protection requires continuous due diligence on the company’s part. But the company is not the only one with responsibilities. There are responsibilities that your employees should have also. The…
Continue Reading Tips for Practicing Safe Browsing on the Internet
Debunking the Myths About Cloud Computing
Cloud computing has been gaining in popularity and has definite value. You may have heard a lot of hype about the magical ease of using cloud services. Or you might have heard the concerns about security and privacy. After all, something that good can’t be real, right? From a consumer perspective, there is much confusion…
How To Configure Office 365 on Android
How To Configure Office 365 on Android Follow the steps below for how to configure Office 365 on Android. App Drawer Open the App Drawer, and then tap the Settings app. Settings Menu From the Settings menu, tap Add Account. (It may be located under Accounts & Sync.) Email Type Specify email type: click Corporate or maybe listed as Exchange ActiveSync. Email address Enter…
Configure Outlook E-mail on iPhone / iPad
How to configure Outlook e-mail on iPhone Follow the steps below for how to configure Office 365 on iPhone. Note: If you have a work account that requires the Intune Company Portal app, install it from the App Store before setting up Outlook for iOS. Your IT admin may or may not also require you to…
HIPAA Compliance Checklist
Understanding The HIPAA Compliance Checklist HIPAA (Health Insurance Portability and Accountability Act) compliance is designed to protect patient privacy and set standards for how medical records can be shared and how they must be safeguarded. HIPAA compliance isn’t just for those directly within the healthcare industry, however. Nearly anyone dealing with electronic Protected Health Information (PHI)…
Boost IT Help Desk – How To Contact Us
Click on the image below to start the video. You can also call us locally for Help Desk support at 404-865-1289, option 1.
ALERT! Badlock Bug in Windows
Badlock Bug On April 12th, 2016, a crucial security bug in Windows and Samba will be disclosed. We call it: the Badlock bug. Engineers at Microsoft and the Samba Team are working together to get this problem fixed. Patches will be released on April 12th. Admins and all of you responsible for Windows or Samba server infrastructure: Mark the date. (Again:…
How to Migrate AutoCAD Settings
How to Migrate AutoCAD Settings Applies to migrate AutoCAD settings for 2007-2017, AutoCAD Architecture 2008-2017, AutoCAD LT 2007-2017, AutoCAD MEP 2008-2017 Problem: After installing a new version of AutoCAD, you want to know how to migrate AutoCAD settings from the older product version into the new version. Resolution: Migration utility This utility transfers settings from an…
Solid State Drive vs Hard Disk Drive [VIDEO]
Solid State Drive vs Hard Disk Drive https://www.youtube.com/embed/FwzZ_Ss5veg Watch the video above. The SSD Drive is on the far right. The Solid State Drive Advantage There’s been a lot of hype in the tech community about the solid state drive advantage (SSDs) over mechanical hard drives (HDDs). Since SSDs don’t have moving parts, they’re able…
Continue Reading Solid State Drive vs Hard Disk Drive [VIDEO]
The Best Anti-Virus Solution
Cloud-Based Anti-Virus Benefits So which type of anti-virus software is best for your network? Not surprisingly, there’s no shortage of available solutions in today’s market – and there are some tried and trusted tools out there that have worked well for years. But as is the case with many software solutions, it’s important to look…
Malware Detection, Protection & Removal
Part 2: Malware Detection, Protection & Removal with Antivirus & Security Software With your users adopting this safer, preventative behavior, the chances of being attacked by malware are slimmer, but not impossible. To minimize the volume of threats that reach your clients’ network, strengthen your remote monitoring and management (RMM) solution with a solid firewall, anti-malware and…
How Virtualization Can Help Your Business
The Benefits of Virtualization Depending on your IT architecture, the nature of your work, and your IT budget, virtualization software can offer a variety of advantages to your small or medium business. Consolidate Servers One of the primary benefits of virtualization software is that it allows you to increase the scale of your server infrastructure…
Protect Yourself and Clients From Malware
Malware Alert!!! “Attention! We’ve detected malicious activity on your computer. Download antivirus now.” Spyware, Keyloggers, Scareware (described in example above), Ransomware and more. It seems like malware, or malicious software, lurks around every corner of the Internet, be it in a threatening email attachment or false online advertisement. There are now newer, subtler ways for…
6 Steps to Avoid HIPAA Fines
In 2016 we will see more HIPAA audits and increased HIPAA fines. In 2015, there were 10 times more audits than in the last 10 years combined and currently, 70% of healthcare organizations would fail an audit. This article in Healthcare IT News is an indication of what’s coming. Here are the 6 Steps to…
Microsoft Changes OneDrive Storage Plans For Office 365
Microsoft Changes OneDrive Storage Plans for Office 365 Downgrading Unlimited to 1TB OneDrive Storage Microsoft has announced that it’s planning to downgrade many of its OneDrive storage accounts, affecting nearly all users of the consumer version of Office 365. Microsoft wil be limiting its unlimited plan to 1TB instead. Not a small amount of storage…
Continue Reading Microsoft Changes OneDrive Storage Plans For Office 365
Get the Most Out of Windows 10 With These 4 New Features
Windows 10 Windows 10 is here and many users are becoming familiar with their new system and finding out what it can do. Like with any good OS, Windows 10 has advantages over its predecessors. Here are four of our favorite features, and here’s a more extensive list of features. OneDrive Integration Microsoft’s OneDrive cloud…
Continue Reading Get the Most Out of Windows 10 With These 4 New Features
HIPAA Compliance Assessment and Risk Analysis
HIPAA Compliance Assessment and Risk Analysis The HIPAA assessment can include documentation for a number of different modules. There is a link to download a FREE HIPAA Assessment tool below. HIPAA Policies & Procedures The Policy and Procedures are the best practices that our industry experts have formulated to comply with the technical requirements of…
Continue Reading HIPAA Compliance Assessment and Risk Analysis
How the Cloud Can Double Profits for Small Business
Before using a cloud solution, it’s important to consider the reasons you want to take advantage of it. What goals are you hoping to achieve, and how will the cloud going help you reach those goals? These are questions that absolutely have to be answered if you hope to reap any benefits from your cloud.…
Continue Reading How the Cloud Can Double Profits for Small Business
4 Reasons Hackers Love to Target Small Businesses
Hackers Love to Target Small Businesses October is Cybersecurity Month! Some businesses think that they’re immune to hacking attacks because they’re “low profile” compared to large corporations. However, the truth of the matter is that your organization is just as much at risk as they are. This month, take measures to keep your organization’s data…
Continue Reading 4 Reasons Hackers Love to Target Small Businesses
What’s New With Microsoft Office 2016?
What’s New With Microsoft Office 2016? Just months after releasing their newest operating system, Windows 10, Microsoft is now updating the world’s most popular productivity software. Office 2016 makes several improvements over the Office 2013 versions of Word, Excel, PowerPoint, and the other applications that businesses from all over the world rely on to stay…
How Our Endpoint Protection Software Saved Payroll
How Our Endpoint Protection Software Saved Payroll Below is an e-mail we just sent to one of our clients.The person we sent this e-mail to uses a computer that contains sensitive financial and personal data and is used for payroll. We are all very thankful for the endpoint protection software. Suzanne, Just wanted to keep you updated…
Continue Reading How Our Endpoint Protection Software Saved Payroll
Dropbox Duplicate Files Problem: SOLVED
What is the Dropbox Duplicate Files Problem? If two people change the same file at the same time, Dropbox won’t merge the changes. Instead, it saves the original file and creates a second version which has the same name but is appended with “conflicted copy”. Dropbox claims that “By creating a conflicted file, Dropbox ensures…
How to Recognize Malware BEFORE the Infection
How to recognize malware BEFORE the infection Boost IT’s protection software automatically cleans over 95% of malware, viruses, and spam. After we let our clients know about the blocked infection they inevitably ask how they can reduce the chances of a real infection. There are 1,000s of new malware and viruses released per day, and the creators are getting better at tricking you. Here’s…
Continue Reading How to Recognize Malware BEFORE the Infection
Google Changing URL Structure
Google Changing URL Structure Well-structured URLs offer users a quick hint about the page topic and how the page fits within the website. To help mobile searchers understand your website better when it’s shown in the mobile search results, today Google is updating the algorithms that display URLs in the search results to better reflect…
New Features in Windows 10
New Features in Windows 10 Is Windows 8.1 driving you crazy? Check out the new features in Windows 10 Microsoft Windows 10 is a FREE upgrade, brings back Start menu, adds Cortana voice command and many other exciting new features that make it easy to use on a tablet, computer, or convertible like a Surface…
Security Breach Report 2014
Security Breach Report 2014 Breaches Doubled in 2014, Financial Losses up 34% The security breach report showed that security breaches doubled in 2014, and are on the rise, and it is no surprise to find that as the number of information security incidents continues to mount, so do financial losses. The 2014 Verizon Data Breach Investigations…
How Was Anthem Hacked?
How Was Anthem Hacked? And How You Protect Yourself and Your Business It was Malware & other Tools I’m sure you’ve heard Anthem was hacked (Blue Cross Blue Shield), and we’ve been asked numerous times “How Was Anthem Hacked?” According to this Wall Street Journal article, “the Anthem hack relied on malware and tools that have been used…
Cyber Security Tips for SMBs : Part 4 (Security Patches & Updates)
Part 4 : Aren’t Security Patches & Updates Done Automatically? This is the forth post in a series of cybersecurity tips to secure your network. Here are the first 3. Cybersecurity Tips for SMBs : Part I (Anti-Malware Software) Cybersecurity Tips for SMB : Part II (Firewall Solutions) Cybersecurity Tips for SMBs : Part III (Still…
Continue Reading Cyber Security Tips for SMBs : Part 4 (Security Patches & Updates)
The Value of a Hacked PC
The Value of a Hacked PC Why a Hacker wants ANY PC The question we often hear is “I don’t bank online. I don’t store sensitive information on my machine. I only use it to check email. What could hackers possibly want with my PC?” We sit down with potential or existing clients all the time to…
Cybersecurity Tips for SMBs : Part III (Still Need Anti-Virus)
Cybersecurity Tips for SMBs (Anti-Virus Software) Part III : Do I Still Need Anti-Virus Software? This is the third post in a series of cyber security tips. Here are the first 2. Cybersecurity Tips for SMBs : Part I (Anti-Malware Software) Cybersecurity Tips for SMB : Part II (Firewall Solutions) There are a number of experts and amateurs…
Continue Reading Cybersecurity Tips for SMBs : Part III (Still Need Anti-Virus)
Cybersecurity Tips for SMBs : Part II (Firewall Solutions)
Cybersecurity Tips for SMBs (Firewall Solutions) Part II : Why a Managed Firewall is So Important This is the second post in a series of cybersecurity tips. Here is the first post. Cybersecurity Tips for SMBs : Part I (Anti-Malware Software) What is a Firewall? A firewall establishes a barrier between a trusted, secure internal network and…
Continue Reading Cybersecurity Tips for SMBs : Part II (Firewall Solutions)
Cybersecurity Tips for SMBs : Part I (Anti-Malware)
Cybersecurity Tips Part I : Why is Anti-Malware Software so Important? This is the first post in a 4-part series of cybersecurity tips. Links to other posts are below. Malware and Its Impact A Quick Anti-Malware Story A client of ours brought a home computer into their office without our knowledge and connected it to their office network. The computer…
Continue Reading Cybersecurity Tips for SMBs : Part I (Anti-Malware)
Meaningful Use Stage 2 Lab Results Project for Medical/Healthcare
Meaningful Use Stage 2 Lab Results Project for Medical/Healthcare How to automate lab results uploads from third-party medical vendors To meet Meaningful Use Stage 2 Lab Results criteria, a client came to us to solve the technical problem of automating transfer of lab results. They came to us at the beginning of last week with a…
Continue Reading Meaningful Use Stage 2 Lab Results Project for Medical/Healthcare
3 Reasons SMBs Need a Firewall
3 Reasons SMBs Need a Firewall Why it’s foolish to think SMBs aren’t a target We recently sent out an e-mail to a current client because we want them to know why their firewall is so important. It makes the difference between peace and quiet — and chaos. Here’s a summary. A firewall is a separate device installed between…
HTTPS as SEO Ranking Signal declared by Google
Google using HTTPS as SEO ranking signal – What it means? The reason for Google using HTTPS as a SEO ranking signal (SEO=search engine optimization) is they want to make the internet more secure for everyone. What It Means This means that if your web site has an SSL certificate and you see the lock…
Continue Reading HTTPS as SEO Ranking Signal declared by Google
SMB VoIP Phones are experiencing a ‘Radical Transformation’
A ‘Radical Transformation’ Is Brewing in SMB VoIP Phones Having just a VoIP phone system isn’t cutting it any more Owners want Advertising Accountability SMB VoIP phones are commonplace, but that’s not enough any more. Business owners are expecting accountability and higher ROI when it comes to spending advertising dollars. SMBs want VoIP Systems SMB VoIP…
Continue Reading SMB VoIP Phones are experiencing a ‘Radical Transformation’
Not Your Average IT Help Desk Support
The way IT Help Desk support is supposed to work Maureen, a marketing wizard, logs in to her computer Wednesday morning at 8AM to start a new project that has a 10AM Friday morning deadline. She quickly hits a wall, discovering that she doesn’t have access to the files she needs, and her creative energy starts…
Why Your Business Should Use Social Media Now
Why Your Business Should Use Social Media Now Are you a small or mid-sized business (SMB) trying to figure out the real value of social media and what it’s impact could be in and on your business? The answer is: Clear Results! Businesses are flocking to the social media sphere in droves. According to LinkedIn,…
Continue Reading Why Your Business Should Use Social Media Now
Top 3 Security Flaws with File Sharing Software
Top 3 Security Flaws with File Sharing Software Can you imagine working in today’s business environment without the ability to easily share files across any platform at any time? The days of thumb drives and other physical data transportation means are almost gone. While the need for data sharing will always exist, as file syncing and…
Continue Reading Top 3 Security Flaws with File Sharing Software
6 Most Costly IT Mistakes for SMBs
Ignore these costly IT mistakes, learn the hard way, and your wallet and business will suffer. Learn from these, and increase your revenue and keep costs predictable as possible. I have spent the majority of my life getting over my fears and learning from mistakes, of which I have made many. One of my life…
OneDrive, Dropbox, Google Drive, & Box: Which Cloud Storage Service is right for you?
If you’re ready to take the plunge into storing your files, photos, and more in the cloud but need help deciding which service is right for your needs and wallet, we’ve got you covered. Which Cloud Storage Service is the Best for You? Microsoft gave its cloud storage service a makeover in 2014, replacing the…
Transforming IT from Support to Innovation
Transforming IT from Support to Innovation The role of enterprise IT is shifting from managing systems to enabling new solutions, transforming business processes, and creating competitive advantage. Here’s how IT can build an innovation focus. CEOs have high expectations for their CIOs to deliver innovation. Top projects like analytics and business intelligence, cloud computing and…
How to Take a Screen Shot
How to Take A Screen Shot You can use Snipping Tool in Windows 7, Windows 8 or Windows 10 to take a screen shot, or snip, of any object on your screen, and then annotate, save, or share the image. You can capture any of the following types: Free-form Snip. Draw a free-form shape around an…
Google Apps vs Office 365
Google Apps vs Office 365 Top 3 reasons to choose Google Apps 1) Really easy to use — but mainly because it has fewer features, like not always compatible with MS documents format.2) Easy to administer — “one size fits all” means fewer choices but also limited adaptability3) Cheaper — good value — be careful…
SonicWALL firewall vulnerability
Our engineering team was just configuring some SonicWALL firewalls that we manage for clients and we came across a SonicWALL firewall vulnerability worth sharing. SonicWALL firewalls have the ability to be managed via command line interface (CLI) over SSH. Two of the primary benefits for an IT group to manage them like this are speed…
How To Remove a Hard Drive Before Recycling Your Computer
Preparation Make sure your hands are CLEAN and DRY. Remove any metal rings, watches or bracelets you may be wearing. Touch the metal casing to eliminate any static charge, then unplug the computer from the electrical outlet. You can also use an antistatic wrist strap if you prefer. Open the Case Check the user’s manual,…
Continue Reading How To Remove a Hard Drive Before Recycling Your Computer
Boost IT has a New Home
Boost IT has a New Home We are celebrating our growth with a prize giveaway. Want to know how to win? Read on. Atlanta, GA June 4 2014. How does a business with limited resources remove uncertainty from IT operations? Boost IT solves another piece of the puzzle with its new Atlanta home. “We quickly…
How to Maintain Your Server
If you know how to maintain your server, with just a little time, you can get the most performance for your investment and significantly extend it’s life. Servers can be maintained easily to reduce server outages. How Servers Work A server is a standalone computer that provides data and other services to one or several other…
The Difference between Backup, Disaster Recovery, and Business Continuity
The Difference between Backup, Disaster Recovery, and Business Continuity If you think “data backup” is synonymous with “disaster recovery” and aren’t sure what “business continuity” means, you’re not alone. Most of the business owners we talk to make the mistake of not knowing the difference and end up paying the price when data is lost,…
Continue Reading The Difference between Backup, Disaster Recovery, and Business Continuity
What are Managed Services?
The Managed Services Story Like every Tuesday morning, Linda the office manager came in 1/2 hour early. Tuesday’s are staff meeting days and the report has to be printed for the meeting. And right after the staff meeting Linda has a meeting with the HR vendor to talk about an issue that might potentially cost the…