Quick Tip No. 56


To safeguard your data, when someone leaves your business remember to restrict their access to your systems-implement a staff exit process to reduce the risk of a breach to your information.




  139 Hits
139 Hits

Quick Tip No. 55


The find and replace function can be really handy if you need to look for or replace items in Word or Excel.




  146 Hits
146 Hits

The Value of Virtual Machines for Your Business

 

 

You invest a lot of time researching the best technology for your business. Your Apple computers work well for your needs, plus, the sleek desktops look great in client-visible locations. Yet occasionally, something comes up that you can’t do on an iMac. It doesn’t work on the Mac operating systems (OSs); only on Windows. That’s where a virtual machine can come in handy.


 

Continue reading
  107 Hits
107 Hits

Making Technology Easier for Seniors

 

 

The pandemic has changed the world. More people have been pushed online in new ways, and for senior citizens this can be particularly challenging. Even registering for a COVID-19 vaccination requires going online in many countries. Plus, social gatherings and other appointments have gone virtual. Don't add to a seniors' social distance. Here's how we can help seniors with their technology needs.


 

Continue reading
  107 Hits
107 Hits

Quick Tip No. 53


The Home key is a control key for returning the text cursor to the beginning of the line you're typing on. It can also move the cursor to the beginning of a document, web page, or cell.




  131 Hits
131 Hits

Quick Tip No. 52


F1 is used as the help key in almost every program. You may also need to hold down the fn key + F1 to open help in specific programs.




  151 Hits
151 Hits

Quick Tip No. 51.


Next time you make a mistake, press Ctrl-Z and all will be undone!




  125 Hits
125 Hits

Quick Tip No. 50.


Press the ALT Key + Tab for a nifty way to switch between programmes on your computer.




  132 Hits
132 Hits

IT Problems Your Managed Service Provider Can Solve


Unlike quick-fix IT relationships, a managed service provider isn't there just to solve short-term problems and leave. Your managed service provider is your IT's mountain Sherpa, there to guide your business through the ever-changing technology landscape.




Like a mountain guide, your managed service provider gives you a detailed route that will help your business climb to new heights. The secret to a great business is avoiding the pitfalls, dead-ends, and traps inherent in bad IT.







Removing IT Worries




Technology
in business presents both new solutions and new problems too. We are more
efficient and more productive today than we've ever been before. On the other
hand, we are also more vulnerable and more exposed to malware and hackers than
in previous years too.




Major
hacks of large firms are in the news almost daily, they affect millions of
customers worldwide, and even large firms seem to struggle with the fallout
incurred after a major breach. Our number one priority is ensuring that the
customers, suppliers, and business partners of our businesses can rest at ease.




We remove
your IT worries, secure your data, and keep your systems safe so you can focus
solely on your business. Our methods let you return to the passion which makes
your business great while sleeping soundly at night knowing your systems are in
good hands.

Continue reading
  125 Hits
125 Hits

Prevent Data Silos for Business Success


The volume of data in the world was predicted by International Data Group to reach 59 zettabytes this year, and one big problem with the explosion of data created, captured, copied, and consumed in the world is data silos. Fortunately, there are ways to prevent data silos from slowing your business success.







Need a better idea of IDG’s predicted 59 zettabytes? That's equivalent to filling a one-terabyte hard drive, every day, for about 161 million years. The rapid growth of data is not slowing either. Next year, the amount of data is expected to reach 74 zettabytes, and by 2023, this year’s number will have doubled to 118 zettabytes.




Data is a business driver today. Different departments are making decisions based on the data they collect. But that’s the very problem: “different departments.” When the team, business unit, or department keeps its data internally it creates silos.




There are many problems with data silos. These include:




  • Overlapping but inconsistent data is collected separately.
  • Gleaning actionable insights is challenging.
  • Barriers to a holistic view of opportunities or threats are created.
  • Resources are wasted learning from data analyzed through a narrow lens.



Think about it from the perspective of higher education. One campus has admissions, retention, health and wellness, student life, academics, and more; and students interact with any number of those. But if these groups don’t share information, an at-risk student could slip through the cracks. In business, data silos put innovation and growth opportunities at risk.

Continue reading
  111 Hits
111 Hits

Why Managed Services Make Your Life Easier


That smile of relief when we fix someone’s technology is a gift of doing IT service. When we get a call out, we’re happy to go out (or log in remotely) to fix what’s broken. We enjoy getting our customers back up and running quickly. Who said saving the day is only for superheroes, right?







Still, as much as we get a boost out of being the hero, we’d rather our clients’ systems didn’t go down in the first place.




How can we make that happen? By adding you to our managed services client roster. So, what does managed services mean?




Fixing things when they break is reactive, whereas managed services are more proactive. It involves:




  • ongoing monitoring;
  • handling system patches;
  • managing software updates, virus scans, and keeping malware current;
  • checking hard drive health to help catch issues in advance;
  • tuning up your technology;
  • setting up new devices, printers, networks, and systems.



As your managed service provider, we get to know not only what’s gone wrong but also find out your goals and objectives. Understanding what your needs are, we can suggest the technology that best serves you. Plus, we might be able to help you find discounts on new software or cut costs for your home office. After all, we can identify where you are duplicating licenses or paying for more than you need.

Continue reading
  130 Hits
130 Hits

Warning of New Spam Email Containing the Cryptolocker Virus

Warning of New Spam Email Containing the Cryptolocker Virus

We have being sent a copy of an email, which claims to have medical results. And that you have to download an email and contact your doctor. It is in fact a virus called cryptolocker (This virus encrypts all the files on your computer and holds your computer to ransom.) If you receive this email, just delete it.

 

  118 Hits
118 Hits

Spam, Spam and more Spam

How often do you check your Spam or Junk E-Mail Folder?

We were recently waiting for an important email which had accidently being caught and moved to our spam folder. While most of the email was spam, the email we were waiting for hiding in the folder.

An email can be marked as spam or junk for any reason, it does not matter who the email it has come from whether it be a family members, friend member or staff or a work colleague.

So check your spam folder on a regular basis. If you have not done it recently why not do it now?

  105 Hits
105 Hits

Twitter Keyboard Shortcuts.

There are a number of keyboard shortcuts which allows you to navigate the twitter website using just your keyboard.

I have split the shortcuts into three groups Actions, Navigation and Timeline.

Actions
  • To send a new tweet press 'N'
  • To favourite a tweet press 'F'
  • To reply to a tweet press 'R'
  • To retweet a tweet press 'T'
  • To send someone a direct message press 'M'
  • To block a user press 'B'
  • To unblock a user press 'U'
  • To open a tweet press 'Enter'
  • To close all open tweets press 'L'
Navigation
  • To view all available shortcuts Press ?
  • Move to next Tweet 'J'
  • Move to previous tweet 'K'
  • To scroll down a page of tweets press 'Space'
  • To search twitter press /
  • To load new tweets press '.'
Time Line
  • To view the timeline press 'G+H'
  • To view the connect tab press 'G+C'
  • To view the Activity tab press 'G+A'
  • To view the Mentions/Reply tab press 'G+R'
  • To view the Discovery tab press 'G+D'
  • To view your profile press 'G+P'
  • To view tweets you have favorited press 'G+F'
  • To view your lists press 'G+L'
  • To view you're Direct Messages Press 'G+M'
  • To view the settings menu press 'G+S'
  • To go to a user's profile press 'G+U'
  106 Hits
106 Hits

Keyboard Shortcuts for Firefox Users on Facebook

Did you know there is keyboard shortcuts to help you use Facebook with only a couple of key strokes?

You can navigate Facebook with great ease once you have learned a few keyboard shortcuts.

To comment, scroll between your news feed, like or message someone you can use these shortcuts.

Press C to comment on a post on your news feed.Press J and K = scroll between news feed posts.Press L to like or unlike a post.Press M to message someone.You can also use the keyboard shortcuts below to access the features below.

Shift + Alt + / = To search FacebookShift + Alt + 0 = To get helpShift + Alt + 1 = To go homeShift + Alt + 2 = To view your timelineShift + Alt + 3 = To see your friends listShift + Alt + 4 = To view your message inboxShift + Alt + 5 = To view your NotificationsShift + Alt + 6 = To view your Account SettingsShift + Alt + 7 = To view your Privacy settingsShift + Alt + 8 = To view information about FacebookShift + Alt + 9 = To View Facebook Terms and Conditions Terms

  94 Hits
94 Hits

Keyboard Shortcuts for Facebook Users Using Google Chrome

Did you know there is keyboard shortcuts to help you use Facebook with only a couple of key strokes?

You can navigate Facebook with great ease once you have learned a few keyboard shortcuts.

To comment, scroll between your news feed, like or message someone you can use these shortcuts.
  • Press C to comment on a post on your news feed.
  • Press J and K = scroll between news feed posts.
  • Press L to like or unlike a post.
  • Press M to message someone.
You can also use the keyboard shortcuts below to access the features below.
  • Ctrl + Alt + / = To search Facebook
  • Ctrl + Alt + 0 = To get help
  • Ctrl + Alt + 1 = To go home
  • Ctrl + Alt + 2 = To view your timeline
  • Ctrl + Alt + 3 = To see your friends list
  • Ctrl + Alt + 4 = To view your message inbox
  • Ctrl + Alt + 5 = To view your Notifications
  • Ctrl + Alt + 6 = To view your Account Settings
  • Ctrl + Alt + 7 = To view your Privacy settings
  • Ctrl + Alt + 8 = To view information about Facebook
  • Ctrl + Alt + 9 = To View Facebook Terms and Conditions Terms
  99 Hits
99 Hits

Keyboard Shortcuts for Facebook Users Using Safari

Did you know there is keyboard shortcuts to help you use Facebook with only a couple of key strokes?

You can navigate Facebook with great ease once you have learned a few keyboard shortcuts.

To comment, scroll between your news feed, like or message someone you can use these shortcuts.
  • Press C to comment on a post on your news feed.
  • Press J and K = scroll between news feed posts.
  • Press L to like or unlike a post.
  • Press M to message someone.
You can also use the keyboard shortcuts below to access the features below.
  • CMD + / = To search Facebook
  • CMD + 0 = To get help
  • CMD + 1 = To go home
  • CMD + 2 = To view your timeline
  • CMD + 3 = To see your friends list
  • CMD + 4 = to view your message inbox
  • CMD + 5 = to view your Notifications
  • CMD + 6 = to view your Account Settings
  • CMD + 7 = to view your Privacy settings
  • CMD + 8 = to view information about Facebook
  • CMD + 9 = To View Facebook Terms and Conditions Terms
  91 Hits
91 Hits

Keyboard Shortcuts for Facebook Users Using Firefox for Mac

Did you know there is keyboard shortcuts to help you use Facebook with only a couple of key strokes?

You can navigate Facebook with great ease once you have learned a few keyboard shortcuts.

To comment, scroll between your news feed, like or message someone you can use these shortcuts.
  • Press C to comment on a post on your news feed.
  • Press J and K = scroll between news feed posts.
  • Press L to like or unlike a post.
  • Press M to message someone.
You can also use the keyboard shortcuts below to access the features below.
  • CMD + / = To search Facebook
  • CMD + 0 = To get help
  • CMD + 1 = To go home
  • CMD + 2 = To view your timeline
  • CMD + 3 = To see your friends list
  • CMD + 4 = To view your message inbox
  • CMD + 5 = To view your Notifications
  • CMD + 6 = To view your Account Settings
  • CMD + 7 = To view your Privacy settings
  • CMD + 8 = To view information about Facebook
  98 Hits
98 Hits

Don’t Be a Phishing Victim: 3 Sure Signs an E-Mail is Fake

Don’t Be a Phishing Victim: 3 Sure Signs an E-Mail is Fake

Anyone who has been online more than a few years has likely been the victim of a phishing attack. What starts as a seemingly legitimate e-mail requesting information from a user can lead to account infiltration, e-mails sent to that person's entire contact list, or identity theft.

Over time, phishing has become more sophisticated, using logos and imitating fonts and intensifying threats to prey on the fears of its victims. But there are a few sure-fire signs that an e-mail might not be what it seems. By looking for these small indicators, you can save yourself—and your friends—hours of grief.

Misspellings
If a company the size of Apple or Facebook sends out an e-mail, that e-mail is generally professionally written, including perfect grammar and spelling. Large corporations carefully craft these e-mails and send them to thousands of people over a short period of time. Even one error would be spotted fairly quickly and corrected.

Link
The hallmark of a phishing e-mail is that it revolves around one link. The link invites you to click. Don't be fooled by text in the link that appears as though it will direct you to a major website. The text you see in front of you will not be the link you're directed to if you click. That link will connect you to the cybercriminal's site, where your information will be collected and used.

Urgency
Whether a phishing e-mail promises to reward you with a monetary prize or threatens account revocation if you fail to act, the one thing you'll notice is urgency. The cybercriminal's trick is to get you to act in haste. Don't be afraid to take time to research and ask a tech-savvy friend or colleague for their thoughts on the e-mail.

The best way to avoid being phished is to avoid clicking on links in e-mail. If a notification arrives that one of your accounts is in trouble, go directly to that site by entering the address in your browser. If a problem exists, you should be able to find evidence of it in your account settings. If not, contact the site's support for more information.

 

  99 Hits
99 Hits

Spyware, Viruses and Malware What's The Difference Anyway

Spyware, Viruses and Malware What's The Difference Anyway

Generally speaking, people tend to think that when their computer has been compromised by a hacker online, it 'has a virus'. But did you know that the majority of these problems can be attributed to related issues, such as malware and spyware?


If these terms have gone straight over your head, here is a handy guide that explains more.

Malware, viruses, and spyware: what exactly are they?
Many computer users consider these three terms to mean the same thing - a virus infection in their computers. Whilst broadly speaking this is partially true, these terms are used to describe different things when we talk about such computer problems

Here is what each term means:

Malware

The term malware is short for 'malicious software', and is used to describe software which is invoked to disrupt the normal operation of a computer (such as Windows-based PC), with some types of malware being used to gather sensitive information from a computer such as account login details for online services. Malware can also be used to describe software that operates with an aim to gaining access to private computer systems or networks.

Typically, malware comes in these forms:

● Keyloggers - this type of malware records the keystrokes that a computer user makes, so that a hacker can log in to any online services using their username and password credentials;

● Payware - software that launches as soon as you boot into Windows, purporting to be an antivirus program and telling you that your system has been scanned and has x amount of viruses. It then offers to 'clean' your system but only if you pay some money to download the 'full' version of the software. People that unknowingly pay do not receive any software, nor does the warning notice go;

● Ransomware - a particularly nasty type of malware, in many cases it renders a system inoperable. It will let you boot into Windows, but then a full-screen message allegedly from the police tells you that you have 'committed a crime' and that you must pay a 'fine' of £100 or so before you can continue to use your computer. As with payware, if you pay the fine, the message does not go away, and you have just been defrauded of your money.

Viruses
Computer viruses are a type of malware that, when run on a computer system, replicate itself on the system by inserting a copy of itself into applications, files, and even the boot sector of your hard drive. It has been said that over 99% of viruses are executed on computers running the Microsoft Windows operating system; the reason for this is because most computer users operating a computer using Windows rather than Mac OS X or Linux for example.

Spyware
Spyware is essentially software that monitors what you do at your computer and reveals this collected information to a third party. It can track the websites you visit, or it could be even more invasive and monitor literally everything you do.

Spyware is sometimes inadvertently installed when installing some other software that may have been downloaded, and it usually runs as a browser plugin or extension (although some may run invisibly as a background process).

  106 Hits
106 Hits