Client Name: (business name removed)
Service Details: Business client, on-site consult, on-site support
Problem and Request: Client reported that they were seeing “ransom” messages appear on their computers, and that they couldn’t access files because they had been locked by a virus. They needed help restoring access to their files and securing their IT environment.
Continue reading “CASE STUDY: Encrypting Ransomware Hits Small Business”
Step 1: Basic Email Rules
Use professional salutations. Don’t use laid-back, informal expressions like, “Hey you guys,” “Yo,” or “Hi folks. It is good practice to avoid shortening anyone’s name. Say “Hi Michael,” unless you’re certain he prefers to be called “Mike.” Use Hi or Hello instead.
Continue reading “Email Etiquette Guidelines – Best Practices”
“You‘ve got to start with the customer experience and work back toward the technology – not the other way around.” -Steve Jobs (Wikiquote)
Continue reading “Bringing the WOW Customer Experience to IT (Part 2)”
We expected to find a few things wrong when we started working with a client who was running a 15-year-old server.
Continue reading “CASE STUDY: Main Server Crash!”
A big dry cleaning business was having serious problems with network outages.
Continue reading “CASE STUDY: Dry Cleaner Network”
Client Name: Dr. R.
Service Details: Business client, on-site consult, on-site/remote project
Problem and Request: A dental practice with 20 workstations and a legacy practice management software application needed some extra help. We met with the doctor to learn more about his IT environment, discover tech pain points, and help determine which technology solutions could contribute to his immediate and long term business goals.
Continue reading “CASE STUDY: Dental Office Software Upgrade”
Antivirus Software Isn’t 100% Effective
You probably already know that installing an antivirus software program and keeping it up to date is a critical step in protecting your computer. This essential software uses virus signatures provided by software vendors to look for malware and stop it before it infects your PC (or Mac).
What you may not be aware of is that antivirus software does not offer total protection against malware infection. In fact, today’s malware authors will often use widely-available crypting services to ensure that their malware is completely undetectable by the majority of the antivirus software on the market.
Continue reading “How to Spot a Phishing Email: Tips and Examples”
Nowadays more and more people are consuming entertainment through Internet-based streaming services rather than through traditional cable/satellite television service.
Continue reading “Stream for Success: Optimizing Your Internet & Wi-Fi Connections”
The following changes to our pricing policy will take effect March 1, 2017:
Continue reading “Pricing Policy Changes”
I’m happy to announce the launch of our new website: https://silvercomputer.net
To better understand the improvements featured on our new site, we should first take a moment to discuss some of the failings of the old website: http://silverleafcs.com
Continue reading “New Year, New Website: SILVERCOMPUTER.NET”