Get a Quote

Linda’s Tech Tips

Google Calendar Attacks Are Targeting Unwitting iPhone and Android Users

Google Calendar Attacks Are Targeting Unwitting iPhone and Android Users

  Google Calendar Attacks Target Unwitting iPhone and Android Users https://threatpost.com/google-calendar-attacks-mobile/145588/ Users of Gmail on iPhone and Android devices are being targeted by fraudulent,…

Continue Reading >
Cisco Products Security Flaw, aka: “ThrangryCat”

Cisco Products Security Flaw, aka: “ThrangryCat”

Security Experts have discovered that Cisco networking products manufactured since 2013 have an internal flaw dubbed “ThrangryCat”, which could allow a persistent “backdoor” to be installed on affected devices .

Continue Reading >
Should You Use Airport USB Charging Stations?

Should You Use Airport USB Charging Stations?

The summer travel season is in full swing, which means many of us will spend time over the next few months in airports. Whether…

Continue Reading >
Outlook Web is Rolling Out – Are You Onboard?

Outlook Web is Rolling Out – Are You Onboard?

The new version of Outlook Web is being rolled out.  What is in it for you? The great thing about Microsoft 365 is that…

Continue Reading >
Improving Email Security in 2019

Improving Email Security in 2019

Stamford Business — learn how to reduce the likelihood of a virus with Microsoft Advanced Threat Protection and CMIT Solutions of Stamford’s special sauce.

Continue Reading >
WHAT’S THE DIFFERENCE BETWEEN A SHAREPOINT LIBRARY AND A FILE FOLDER?

WHAT’S THE DIFFERENCE BETWEEN A SHAREPOINT LIBRARY AND A FILE FOLDER?

THINK A SHAREPOINT DOCUMENT LIBRARY IS THE SAME AS A FILE FOLDER? THINK AGAIN! Here’s an overview to help better understand the difference: A…

Continue Reading >
IT LOOKS LIKE AN EMAIL FROM MY BANK — BUT IS IT REALLY?

IT LOOKS LIKE AN EMAIL FROM MY BANK — BUT IS IT REALLY?

These days, the stealing of personal information online (often referred to as “identity theft”) is rampant, and criminals are constantly at work cooking-up new…

Continue Reading >
DISASTER PLANNING FOR WHEN YOUR MACHINE FAILS

DISASTER PLANNING FOR WHEN YOUR MACHINE FAILS

All too often we don’t do Disaster Planning until an disaster occurs.  All too often we get calls that a machine is getting a…

Continue Reading >
TOP 5 CONSIDERATIONS WHEN CHOOSING WIRELESS ACCESS POINTS

TOP 5 CONSIDERATIONS WHEN CHOOSING WIRELESS ACCESS POINTS

WIRELESS ACCESS POINTS: TOP 5 CONSIDERATIONS Decades ago, we rarely leaned on technology for our day-to-day business operations. But today, technology – specifically the…

Continue Reading >
IS FTP OBSOLETE?

IS FTP OBSOLETE?

Ten years ago, the answer to sending large files to clients was a file transfer protocol (FTP) server. This solution was used by companies…

Continue Reading >