Viewing entries tagged
2017

Phishing 102: The 8 Phishing Scams You Need to Know About

Comment

Phishing 102: The 8 Phishing Scams You Need to Know About

Keyloggers...trojans...session hijackers...Do these worry you? We cover the aforementioned phishing scams along with a couple others you should learn about with tips to avoid falling victim to these attacks. Find out what you can do to protect yourself by reading part 2 of our phishing blog series.

Comment

Phishing 101: Top 5 Ways to Stop Phishing (Plus Google Docs Scam & ID Theft Prevention)

Comment

Phishing 101: Top 5 Ways to Stop Phishing (Plus Google Docs Scam & ID Theft Prevention)

Ever get an email that's too good to be true? An urgent request from your bank for private information? Message from a relative asking to wire some money? Click on link in your inbox you shouldn't have? These everyday examples of phishing & IT security breaches put your company data at risk along with the possibility of identity theft. Here are 5 things you can do prevent phishing from happening to you!

Comment

Work Smart with These 7 Useful Websites

Comment

Work Smart with These 7 Useful Websites

The internet is a vast sea of information, tools, entertainment, news, and more. It is easy to get lost if you do not know exactly what you are looking for. Here are seven handy websites that I have found useful. Hope you will too!

Comment

IT Stories: SFCD's Assistive Technology Lab

Comment

IT Stories: SFCD's Assistive Technology Lab

“I’ve been doing this for a long time, but this is the first time I’m seeing mainstream technology have real applications for people with disabilities,” Karen of SFCD explains. She proceeds to show me how she is able to control just about everything in the room, from the fan to the lights, with her voice or the iPad she holds in her hand. The iPad is running several communication applications that allow her to type out simple sentences telling the room what to do. Karen illustrates this by tapping a few buttons on her iPad, causing it to say, “Amazon, turn on the fan.” Sure enough, the fan across the room turns on with a pleasing whir. This is what assistive technology is all about, and it’s pretty incredible.

Comment

Team One's Favorite Apps

3 Comments

Team One's Favorite Apps

We are, essentially, technology guinea pigs. We try out apps, network equipment, computers, and more to find the best tools for the job. Here are some of our favorite lesser known apps.

3 Comments

Security 102: Malware, Spyware, & Ransomware

Comment

Security 102: Malware, Spyware, & Ransomware

If you use a computer, you need to care about malicious software. Malicious software is any piece of code designed to harm a computer system and it has been around for a very long time. Viruses have only become more sophisticated and costly, but there are many options for protecting yourself and your business from attack.  

Comment

Security for Windows: 3 Reasons Why Updates Matter

Comment

Security for Windows: 3 Reasons Why Updates Matter

Computers are a lot like cars. They’re expensive, incredibly useful, and will fall apart without regular maintenance. You wouldn’t go years without checking or changing your oil, or let the weird noise in your car fester without getting it looked at by a professional. But many people don’t look at computers the same way. They will go months without updating, shooing away notifications, and thinking, “I just spent $900 on this, it should just WORK!” Your car performs a lot better with the recommended maintenance and services, and so will your computer. More importantly, your computer will be much less susceptible to attack. 

Comment

Security 101: Spam, Phishing, and Social Engineering

Comment

Security 101: Spam, Phishing, and Social Engineering

Your device is the portal through which you communicate with friends, family, and the people you work with. Replacing a device is costly, but you can’t put a price on the data you hold in it. Consider how much worse it would be if someone got a hold of the data you can access with that device: bank accounts, passwords, emails, photos, correspondence with friends, and more. This is precisely why security is important.

Comment