Blog

  • Atlanta Real Estate Firm Gets Ransomware

    atlanta-real-estate-ransomware-prevention-detection-IT-security

    A Story about Ransomware Detection and Prevention for an Atlanta Real Estate Firm This is the story of how cyber criminals in China attempted to take down and extort for ransom an Atlanta Real Estate Firm, how the Boost IT team reacted, and what we can learn from it — ransomware prevention in 2020. How […]

    Read More
  • Cyberattacks: Why Hackers Target Small Businesses

    When it comes to computer security, your business data must be secure. As a small business, you can’t afford cyberattacks. Yet, so much can happen. Employees can mistakenly open email spam or click on a malicious link while researching on the internet. Then there can be distributed denial of service (DDoS) attacks, like what happened […]

    Read More
  • How the Cloud is Helping Engineering

    cloud is helping engineering

    There are 4 ways the cloud is helping engineering. Cloud computing has changed how engineering and other industries are bidding for and completing projects. The cloud is secure, fast, reliable and full-featured – perfect for engineers to be productive and competitive. So, how are engineers using the cloud? It helps engineering keep things moving When designing […]

    Read More
  • Identifying Gaps in Your Cyber Security

    Many businesses recognize that cyber security is a growing threat and they prioritize it. They update software regularly, maintain their infrastructure and implement security measures to help thwart malicious attacks. They set up password protection access to computers, software, and apps so only those authorized can get access. The have their employees regularly change passwords. […]

    Read More
  • How to Check the Dark Web for Your Personal Information

    Boost IT | What To Do If Your Email Has Been Exposed on the Dark Web

    So I got a message from a client yesterday asking how to check the dark web for your personal information. This all started because they had gotten an e-mail from their bank that looked like this. “Heads up: CreditWise found your personal information somewhere on the dark web.” Needless to say they were freaked out. […]

    Read More
  • How to Prevent Ransomware

    Boost IT | How to Prevent Ransomware

    Do you know the one I.T. question you should be asking? This question is directed at you. Whether you are an individual trying to secure your digital footprint or an employee /owner working for a business, do you know the one I.T. question you should be asking? We do, and we want you to know […]

    Read More
  • Streamline Your Business with the Cloud

    Streamline Your Business with Cloud Computing

    When you streamline your business with the cloud, there is no more need to build out and maintain a complex IT infrastructure. Your operations become more agile and you can reduce costs. Cloud computing helps in streamlining your business so your employees can improve productivity and be more competitive. With quick access to the cloud, […]

    Read More
  • FTC Proposes adding Detailed Cybersecurity Requirements to Safeguards Rule

    Cybersecurity Requirements to Safeguards Rule

    On March 5, 2019 the Federal Trade Commission (“FTC”) published requests for comment on proposed amendments to two key rules under the Gramm-Leach-Bliley Act (“GLBA”).  Most significantly, the FTC proposes to add more detailed cybersecurity requirements to the Safeguards Rule. The rule governs the information security programs financial institutions must implement to protect customer data. […]

    Read More
  • How to Create a Strong Password

    How to Create a Strong Password

    Follow these 4 tips to secure your online accounts Knowing how to create a strong password can help prevent fraud and unauthorized access to your personal and financial information. But what is a strong password? Check out the tips below.  1. Create Long, Complex Passwords Shorter passwords may be easier to remember, but they usually […]

    Read More
  • Turn On Do Not Disturb in Mac OS X

    turn on do not disturb in mac os x

    So I was in a video screenshare meeting yesterday and the person I met with needed to know how to Turn On Do Not Disturb in Mac OS X. Ever get those annoying notifications on your Mac while you’re in a public place, presentation, screenshare, or video meeting? Me too, but it’s easy to turn […]

    Read More
  • How Are SMBs Using the Cloud in 2018? [CHART]

    How are SMBs using the Cloud

    So How are SMBs using the Cloud? It’s not just a buzzword. Read on to find out how using the cloud can cut costs and increase revenue through efficiency. This year has ushered in many technological changes, most notably the adoption in the small- and medium-sized business (SMB) of things like mobile and cloud solutions. […]

    Read More
  • 5 Time-Saving Tech Tips

    When it comes to saving time at work, we all want the best tech tips so we can be more productive. Better tech is not always the answer to your everyday productivity problems. Sometimes it can seem like we are spending more time on devices, even though we have the best. While technology is continuously […]

    Read More
  • How to share contacts in Outlook 2016 and Office 365

    How to Share Contacts in Outlook 2016 & Office 365

    How to share contacts in Outlook 2016 and Office 365 with specific people in your organization Knowing how to share contacts in Outlook 2016 and Office 365 can be a huge timesaver for companies of any size. The default Contacts folder in Outlook is created in each Outlook profile. This folder can’t be renamed or […]

    Read More
  • How to install SonicWall Mobile Connect on Windows 10

    How to configure SonicWall Mobile Connect on Windows 10

    How to install SonicWall Mobile Connect on Windows 10 Description This article explains how to install SonicWall Mobile Connect for Windows 10. Mobile Connect is the recommended VPN Client for Windows 10. Cause Resolution SonicWall Mobile Connect for Windows 10 is installed from the Microsoft Store. 1.On your Windows 10 device, launch the Store app. […]

    Read More
  • The Scenario of the Infected Computer

    The whole infected computer problem started when a coworker was sharing a computer to review a document and get other help. Before they realized what was going on, a pop-up window came up notifying them that you have an infected computer and suggested running a scan. The employees ran the scan but nothing happened. Everything […]

    Read More
  • Do You Know Where Your IT is Vulnerable?

    You might know a few people who avoid social media because they feel their personal identity will be compromised. You might also know a few people who are hesitant to use online banking for this same reason. Most of these people have no idea how many of their devices are connected to the internet and […]

    Read More
  • IT Recovery After a Major Flood

    Natural disasters can be devastating. A major flood can destroy everything. When we look at the flooding from Hurricane Harvey, it can be difficult to imagine that it can happen to any of us. But it can. While a business can rebuild and purchase new IT infrastructure, what would happen to your business in the […]

    Read More
  • Page 1 of 5

Want to win more projects, get more customers, increase productivity & secure your data?

Boost IT delivers managed IT services and IT support so you can.

Here's how.

Take the Self-Assessment NOW