This month's newsletter will be covering ransomware, and discussing what can be done about it. What is Ransomware? Why is it so popular? What can I do to protect myself from Ransomware? What are some good options if I get infected? What can I do to prepare for an attack? Ransomware has become one of the most popular hacking tools in use today. The attacks seem to come out of nowhere and they are a cheap and effective way for hackers to get money out of a victim. … [Read more...] about Ransomware: What it is, and why it’s here and how to protect yourself
March Newsletter: Grundig IT According to Josh Haire
Last newsletter we covered how our business operates with Google Apps. This week we're taking a bit of a different turn, and introducing one of our newer employees, Josh Haire. As usual, feel free to suggest topics which you would like to see covered in an upcoming newsletter or on the Grundig IT news page, which can be found on the Blog at GrundigIT.com As Always, Happy Computing! -- Tom Grundig Grundig IT According to Josh Haire (our most recent employee hire) Hello, … [Read more...] about March Newsletter: Grundig IT According to Josh Haire
Everything You Need to Know About Data Recovery
Data is precious. And whether you’re dealing with irreplaceable family photos, nearly-finished term papers, or gigabytes of confidential customer information, that data can be lost in only seconds. Fortunately, thanks to modern data recovery services, what is lost can usually be found and what is broken can usually be repaired. Data recovery is the salvaging and repair of data that has been lost, but the steps taken depend largely on the type of media the data was kept on (hard drive, … [Read more...] about Everything You Need to Know About Data Recovery
How We Use Google Apps
Google Apps is a great tool that has been out for a while now, and we at Grundig IT use a plethora of features from it. The best part is that these features can also be easily added to your mobile device, to allow for access anywhere. From using the Calendar for scheduling, Gmail for communication, and Drive / Docs to share documentation, all of these features play a key role in enabling how we function at Grundig IT. We'd like to demonstrate how we put these different functions to use, and how … [Read more...] about How We Use Google Apps
February Newsletter: How We Use Google Apps
Last newsletter we covered Ransomware, and some good ways to protect yourself from it, as well as what you need to do when you are infected. This month we'll be taking another look at Google Apps, but focusing on how we utilize it here at Grundig IT. At Grundig IT, we can help your business take advantage of all Google Apps has to offer. We have successfully implemented Google Apps for businesses of all sizes. As usual, feel free to suggest topics which you would like to see covered in an … [Read more...] about February Newsletter: How We Use Google Apps
7 Ways to Improve Your Small Businesses Online Security
Automation is key for quickly improving productivity, a lesson the hackers and cyber criminals of the world have taken to heart. New automated tools are allowing hackers to test, attack, and breach the security of hundreds of thousands of targets with minimal efforts, making small and medium-sized businesses a renewed focus of cyber-crime. In these attacks the attackers are generally probing for emails, addresses, credit cards, propriety information, and any other valuable data that … [Read more...] about 7 Ways to Improve Your Small Businesses Online Security
The Do’s and Don’ts of Data Recovery
Damaged hard drive heads, bad sectors, PCB damage, raid failures, fire and flood damage, viruses, accidental file deletions, reformatting, encryption attacks… There are no shortage of ways to lose important files, and once you do the panic can be blinding. However, it’s important that you don’t make critical mistakes that can put your data out of reach. When disaster strikes, there are steps that can be taken, and depending on the type, the media involved, and the value of the data you are … [Read more...] about The Do’s and Don’ts of Data Recovery
Grundig IT According to Josh Haire (our most recent employee)
Hello, World! Grundig IT is comprised of a collection of hard-working and talented individuals who are passionate about technology. It goes without say that technology is at the core of our business, but our organization prides ourselves on the high level of customer support we provide and the relationships we have built with our clientele. Our team is made up of individuals from diverse backgrounds and experiences, and as the newest member to Grundig IT, I would like to share a little about … [Read more...] about Grundig IT According to Josh Haire (our most recent employee)
Our Top 5 Technology Predictions for 2017
1. Stand-Alone Wearable Technology Wearable technology looks to be making yet another series of technological leaps in 2017 with new smartwatch models coming out from both Samsung and Apple. Apple’s new wearable models will be 100% waterproof, able to recognize four different types of swim strokes, and able to use an onboard GPS without a phone being present—a huge benefits for distance athletes. The Samsung Gear 3 will likewise be able to operate more independently of smartphones with built-in … [Read more...] about Our Top 5 Technology Predictions for 2017
How to Handle the 3 Most Common Types of Cyber Attacks
There are no shortages in the variety of cyber-attacks your business may potentially face. Understanding the most common types and how to prevent or respond to them can be important for limiting the damage caused. Here are the three most common types of cyber-attacks and how you, with the support of the digital security experts here at Grundig IT, can deal with them. 1. Web Application Attacks According to the Verizon Data Breach Investigation Report (DBIR) for 2016, Web Application attacks … [Read more...] about How to Handle the 3 Most Common Types of Cyber Attacks