CASE STUDY: Encrypting Ransomware Hits Small Business

Client Name: (business name removed)
Service Details: Business client, on-site consult, on-site support
Problem and Request: Client reported that they were seeing “ransom” messages appear on their computers, and that they couldn’t access files because they had been locked by a virus. They needed help restoring access to their files and securing their IT environment.

Continue reading “CASE STUDY: Encrypting Ransomware Hits Small Business”

Email Etiquette Guidelines – Best Practices

Step 1: Basic Email Rules

Use professional salutations. Don’t use laid-back, informal expressions like, “Hey you guys,” “Yo,” or “Hi folks. It is good practice to avoid shortening anyone’s name. Say “Hi Michael,” unless you’re certain he prefers to be called “Mike.” Use Hi or Hello instead.

Continue reading “Email Etiquette Guidelines – Best Practices”

CASE STUDY: Dental Office Software Upgrade

Client Name: Dr. R.
Service Details: Business client, on-site consult, on-site/remote project
Problem and Request: A dental practice with 20 workstations and a legacy practice management software application needed some extra help. We met with the doctor to learn more about his IT environment, discover tech pain points, and help determine which technology solutions could contribute to his immediate and long term business goals.

Continue reading “CASE STUDY: Dental Office Software Upgrade”

How to Spot a Phishing Email: Tips and Examples

Antivirus Software Isn’t 100% Effective

You probably already know that installing an antivirus software program and keeping it up to date is a critical step in protecting your computer. This essential software uses virus signatures provided by software vendors to look for malware and stop it before it infects your PC (or Mac).


What you may not be aware of is that antivirus software does not offer total protection against malware infection. In fact, today’s malware authors will often use widely-available crypting services to ensure that their malware is completely undetectable by the majority of the antivirus software on the market.

Continue reading “How to Spot a Phishing Email: Tips and Examples”

Stream for Success: Optimizing Your Internet & Wi-Fi Connections

Nowadays more and more people are consuming entertainment through Internet-based streaming services rather than through traditional cable/satellite television service.

Continue reading “Stream for Success: Optimizing Your Internet & Wi-Fi Connections”