Technology Blog

  • FTC Proposes adding Detailed Cybersecurity Requirements to Safeguards Rule

    Cybersecurity Requirements to Safeguards Rule

    On March 5, 2019 the Federal Trade Commission (“FTC”) published requests for comment on proposed amendments to two key rules under the Gramm-Leach-Bliley Act (“GLBA”).  Most significantly, the FTC proposes to add more detailed cybersecurity requirements to the Safeguards Rule. The rule governs the information security programs financial institutions must implement to protect customer data. […]

    Read More
  • Atlanta Real Estate Firm Gets Hit with Ransomware

    atlanta-real-estate-ransomware-prevention-detection-IT-security

    A Story about Ransomware Detection and Prevention for an Atlanta Real Estate Firm This is the story of how cyber criminals in China attempted to take down and extort for ransom an Atlanta Real Estate Firm, how the Boost IT team reacted, and what we can learn from it — ransomware prevention in 2019. How […]

    Read More
  • How to Create a Strong Password

    How to Create a Strong Password

    Follow these 4 tips to secure your online accounts Knowing how to create a strong password can help prevent fraud and unauthorized access to your personal and financial information. But what is a strong password? Check out the tips below.  1. Create Long, Complex Passwords Shorter passwords may be easier to remember, but they usually […]

    Read More
  • How to Check the Dark Web for Your Personal Information

    Boost IT | What To Do If Your Email Has Been Exposed on the Dark Web

    So I got a message from a client yesterday asking how to check the dark web for your personal information. This all started because they had gotten an e-mail from their bank that looked like this. “Heads up: CreditWise found your personal information somewhere on the dark web.” Needless to say they were freaked out. […]

    Read More
  • How to Turn On Do Not Disturb in Mac OS X

    how to turn on do not disturb in mac os x

    So I was in a video screenshare meeting yesterday and the person I met with needed to know How to Turn On Do Not Disturb in Mac OS X. Ever get those annoying notifications on your Mac while you’re in a public place, presentation, screenshare, or video meeting? Me too, but it’s easy to turn […]

    Read More
  • How Are SMBs Using the Cloud in 2018? [CHART]

    How are SMBs using the Cloud

    So How are SMBs using the Cloud? It’s not just a buzzword. Read on to find out how using the cloud can cut costs and increase revenue through efficiency. This year has ushered in many technological changes, most notably the adoption in the small- and medium-sized business (SMB) of things like mobile and cloud solutions. […]

    Read More
  • How to Prevent Ransomware

    Boost IT | How to Prevent Ransomware

    Do you know the one I.T. question you should be asking? This question is directed at you. Whether you are an individual trying to secure your digital footprint or an employee /owner working for a business, do you know the one I.T. question you should be asking? We do, and we want you to know […]

    Read More
  • How to share contacts in Outlook 2016 and Office 365

    How to Share Contacts in Outlook 2016 & Office 365

    How to share contacts in Outlook 2016 and Office 365 with specific people in your organization Knowing how to share contacts in Outlook 2016 and Office 365 can be a huge timesaver for companies of any size. The default Contacts folder in Outlook is created in each Outlook profile. This folder can’t be renamed or […]

    Read More
  • How to install SonicWall Mobile Connect on Windows 10

    How to configure SonicWall Mobile Connect on Windows 10

    How to install SonicWall Mobile Connect on Windows 10 Description This article explains how to install SonicWall Mobile Connect for Windows 10. Mobile Connect is the recommended VPN Client for Windows 10. Cause Resolution SonicWall Mobile Connect for Windows 10 is installed from the Microsoft Store. 1.On your Windows 10 device, launch the Store app. […]

    Read More
  • The Scenario of the Infected Computer

    The whole infected computer problem started when a coworker was sharing a computer to review a document and get other help. Before they realized what was going on, a pop-up window came up notifying them that you have an infected computer and suggested running a scan. The employees ran the scan but nothing happened. Everything […]

    Read More
  • Do You Know Where Your IT is Vulnerable?

    You might know a few people who avoid social media because they feel their personal identity will be compromised. You might also know a few people who are hesitant to use online banking for this same reason. Most of these people have no idea how many of their devices are connected to the internet and […]

    Read More
  • IT Recovery After a Major Flood

    Natural disasters can be devastating. A major flood can destroy everything. When we look at the flooding from Hurricane Harvey, it can be difficult to imagine that it can happen to any of us. But it can. While a business can rebuild and purchase new IT infrastructure, what would happen to your business in the […]

    Read More
  • Cloud Storage vs a Dedicated Server

    Have you heard other SMBs talk about their migration to the cloud? You might be thinking about ditching your dedicated server and using cloud storage. But is it right for you? Before you decide between cloud storage versus a dedicated server, recognize that you are probably already using cloud storage. If you store photos in […]

    Read More
  • How To Free Up Disk Space Using Disk Cleanup

    Disk Cleanup

    How To Free Up Disk Space Using Disk Cleanup One of the most common questions we get asked is “How do I speed up my PC without upgrading it?” so we tell our clients How To Free Up Disk Space Using Disk Cleanup. Cleaning up your PC’s hard drive frees up drive space and makes it […]

    Read More
  • How Technology is Changing the Real Estate Industry

    Technology has completely changed how real estate transactions are handled by an agent, how agents list and research properties, and how buyers and sellers complete property transactions. It has completely transformed the industry. With mobile technology and cloud computing, today’s brokers and agents are more connected than ever before, being able to operate anywhere, and […]

    Read More
  • Identifying Gaps in Your Cyber Security

    Many businesses recognize that cyber security is a growing threat and they prioritize it. They update software regularly, maintain their infrastructure and implement security measures to help thwart malicious attacks. They set up password protection access to computers, software, and apps so only those authorized can get access. The have their employees regularly change passwords. […]

    Read More
  • 5 Time-saving Tech Tips

    When it comes to saving time at work, we all want the best tech tips so we can be more productive. Better tech is not always the answer to your everyday productivity problems. Sometimes it can seem like we are spending more time on devices, even though we have the best. While technology is continuously […]

    Read More
  • Page 1 of 5

Our quick IT Self-Assessment will tell you how your business stacks up to industry best practices.

Take the Self-Assessment NOW