Email services are arguably the most important service for office functions. It's reasonable to switch email service providers for many reasons, but doing so can be a bit tricky. In the past, this meant manually exporting email data from each user and importing it to the new service. This process takes a lot of time and has a tendency to not work perfectly every time. This process can be faster and simpler for more than one user, plus it's not necessary to have all email data within the … [Read more...] about Switching Email Services: Part 1
General Computing
Ransomware Protection
No one wants their computer to fall victim to malware. And among the most annoying malware viruses is ransomware. What is Ransomware? Ransomware has a very literal name. First it gets onto a computer, usually downloading on accident from an email or website. Then it will deny access to all data on the computer until you pay a ransom. Unless there's a device scanning the computer for ransomware, it lays dormant for an indeterminate amount of time before locking down the … [Read more...] about Ransomware Protection
Email Spoofing and Phishing Prevention: Part 2
There are ways to attempt to prevent spoofed emails making it to your inbox, but none of them will be 100% effective. The methods that are most effective also have the potential of blocking emails that should be getting through. So these methods should be deployed when spoofed emails are a serious concern. The most inclusive method is to block an entire domain from sending email to your server. This can be effective if you notice a lot of these emails are coming from the same … [Read more...] about Email Spoofing and Phishing Prevention: Part 2
Email Spoofing and Phishing Prevention: Part 1
In most business environments, email can present many security risks. If there's a line of communication between people who make decisions, then that line of communication can be exploited by criminals. Usually, this is done by spoofing their email address to make it appear like their message is coming from someone within the company. The email sent might attempt to get you to send them money, click on a link that reveals information, or download a virus. Using Filtering Office 365 has an … [Read more...] about Email Spoofing and Phishing Prevention: Part 1
Does Your Business Need Tablets?
The tablets are something that has really changed the way that many of us do business. In fact, there are many things that can be done on this device that can really help to speed up some specific things that we do in today's business world. Although there are almost endless ways to use this new electronic item, here are a few that you will want to investigate your business needs. Tablets can take away the need for a business to give laptops to their traveling salesmen. By using an application … [Read more...] about Does Your Business Need Tablets?
Backup Basics
How Important is Your Data? There is always a possibility of losing important files. Hardware can fail, files can be accidentally deleted or otherwise lost. The only sure way to entirely prevent the permanent loss of files is to have some sort of backup. Typically, backups are either stored on a specific hard drive on site, or are uploaded to the cloud. Online or Local Backup? The main deciding factor between cloud and on site backups is in the time it takes to recover … [Read more...] about Backup Basics
Managed Computer Network Services: Why Your Growing Business Needs Them
As a small business, you need to be aware of scalability. Running an office, conducting research, or starting a small business out of your basement, keeping your network running is a necessity. Your Because when your network goes down, all your employees are left twiddling their thumbs. Many people think that Managed Computer Network Services are a luxury reserved for larger businesses, they're wrong. You don't have to leave your small business at risk. And you won't have to do it … [Read more...] about Managed Computer Network Services: Why Your Growing Business Needs Them
Firewalls: What, Why, How
Computers, laptops and other devices that connect to the Internet are vulnerable potential targets for a range of different threats. Firewalls are one defense to know about above all others, as a basic foundation of security. What is a firewall? Firewall is a term used to describe a barrier protecting something. Be it protecting a building from fire or a computer network from dangers, firewalls are barriers. In terms of computers, firewalls can either be software or hardware that monitors … [Read more...] about Firewalls: What, Why, How
Grundig IT August Newsletter: Personalizing Windows 10
Greetings! Last month, we talked about Victor Chacon and his experience at Grundig IT so far. This time we'll show you ways for: Personalizing Windows 10 on Your Machine People generally don't change much of their computer's appearance and feel other than the wallpaper and maybe a few icons. And that is not a bad thing since we just want to get some work done, look at our emails, and maybe watch some videos. Luckily for those of you that like to make your devices feel more personal, … [Read more...] about Grundig IT August Newsletter: Personalizing Windows 10
July Newsletter: Victor Chacon talks
Victor Chacon talks about his experience at Grundig IT so far. Working at Grundig IT since September 2017 has taught me a lot about computer and network support. In school, you can only learn so much in controlled environments. At Grundig IT, I have been able to see what real user needs are and build my experience from there. The skills that have improved the most since working at Grundig IT have been: backup, domain environments, and troubleshooting. When it comes to skills, my strength is … [Read more...] about July Newsletter: Victor Chacon talks