Skip To The Main Content
Home
IT Consulting
Microsoft Solutions
Cybersecurity
Hardware Procurement
Virtual CIO
Video Surveillance
Quote Request
IT Support
IT Support Services
IT Support Plans
Managed IT Services
IT Office Moves
Disaster Recovery
Quote Request
Creative Lab
Website Portfolio
Website Awards
Custom Website Development
Identity Design & Branding
Digital Marketing Services
Quote Request
Cloud Services
Private Cloud Service
Cloud Backups
File Sharing
Website Hosting
Email Security
Quote Request
About
Why We’re the Best MSP
Team Leads
Timeline
Downloads
Careers
Contact Us
News
PlanetMagpie News
WOOF! Newsletter
Tech Tips
Creative Lab News
Microsoft Teams
Skype for Business
Office 365 Support
Quote Request
Breaking News
Toggle navigation
Home
IT Consulting
IT Support
Cloud Services
Creative Lab
About
News
Toggle navigation
California Emergency IT Support: 510-344-1203
Breaking News
Texas Emergency IT Support: 817-806-3523
Explore Our Solutions
Explore Our Solutions
PlanetMagpie News
WOOF! Newsletter
Tech Tips
Creative Lab News
Tech Tips
August 16, 2024
Teams Tip: Enable Sound When Sharing Videos in a Teams Meeting
If you're going to share a video in a meeting, make sure its audio gets shared too!
READ MORE
July 11, 2024
Safe Summer Travel Tips for Your Tech
Bringing devices with you on Summer trips? Keep them safe from loss/theft with these quick tips.
READ MORE
June 11, 2024
Leave Your Workstation POWERED ON When Work's Over
When work's done for the day, putting your computer to sleep works better than turning it off. Better for security and lifespan.
READ MORE
May 08, 2024
Tune Up Your Cybersecurity Before Renewing Your Cyber Insurance (It Saves $$$)
Can you lower cybersecurity insurance premiums? Yes, by improving your company's current cybersecurity protections.
READ MORE
April 10, 2024
Beware the Evil Twin! (The Wi-Fi Kind)
Public Wi-Fi networks are convenient. Unless you connect to a fake network...and fall victim to an Evil Twin cyberattack.
READ MORE
March 14, 2024
When Was Your Last Cybersecurity Training?
When did your team last refresh their cybersecurity awareness? Cyberattacks keep looking for new ways to sneak past you...
READ MORE
February 14, 2024
Teams is Not Safe from Phishing Attacks
Phishing attacks can reach your users through Microsoft Teams...unless you change your permissions for external user accounts.
READ MORE
January 11, 2024
How to Check the DMARC Status of Your Company Domain in 1 Minute
If you're not sure whether your domain has proper DMARC set up, here's a fast way to verify.
READ MORE
December 13, 2023
Use Google Drive for Work? Check Your Files (and Back Them Up Elsewhere)
Even major cloud services can lose files. Unfortunately, this happened to some Google Drive users this November.
READ MORE
November 09, 2023
5 Company Website Checks to Make Before Year's End
If you could do 5 quick checks of your website, and prevent a slew of technical issues throughout 2024, wouldn't you?
READ MORE
September 14, 2023
Secure Enclave: The Mac's Secret Weapon for Data Protection
Do Macs have an encryption asset in their hardware? They do! It's called Secure Enclave.
READ MORE
August 10, 2023
Does Your Computer Have a Trusted Platform Module (TPM)? If Not, Replace it ASAP!
A TPM chip makes encryption easier - protecting your data. Without one, it's easy for someone to steal your computer and access the data.
READ MORE
July 13, 2023
Never Scan a QR Code from an Unknown Source
We expect phishing emails, and plan for them. But what if phishing attacks use a QR code instead?
READ MORE
May 10, 2023
Low-Tech Ways to Protect Your Phone
Stopping phone attacks doesn't have to take expensive software. Use these free options to protect yours!
READ MORE
April 12, 2023
Use MFA for Everything!
Get an instant security upgrade - just add MFA. Works for hundreds of applications, online and offline!
READ MORE
March 09, 2023
How to Change SPF/DKIM Records When Changing Email Service Providers
Changing email service providers? Make sure you remove the old provider's SPF/DKIM records, and put the new ones in their place.
READ MORE
January 11, 2023
USB Drives Don't Last Forever! Keep Track of Their Age Before They Die
USB drives use flash storage - safe, reliable. Unfortunately, they'll eventually die. If you use any of them, here's how to protect the data they store.
READ MORE
December 15, 2022
Top 3 Ways You Can Identify a Scammer
Scammers keep getting better at cheating people. Don't become a victim. Use these three 'giveaways' to identify scams.
READ MORE
November 09, 2022
Cost Saving Tip – Hire a Virtual CIO to Guide Your IT
Looking to save on IT-related expenses? Here’s a tip for businesses whose IT drains too much budget.
READ MORE
October 13, 2022
Cost Saving Tip – Outsourcing IT Support for Better Labor Costs
Looking to save on IT-related expenses? Here’s a tip for businesses looking for critical IT support work, without the high cost of hiring & retaining full-time talent.
READ MORE
September 15, 2022
Cost Saving Tip—Hire Quality Developers
Looking to save on IT-related expenses? Here’s a tip for businesses developing software, websites, or apps.
READ MORE
August 10, 2022
Cost Saving Tip—Legacy Servers
Looking to save on IT-related expenses? Here's tip #2 of 5 we have. These work for all businesses.
READ MORE
July 15, 2022
Cost Saving Tip—Cloud Backups
Looking to save on IT-related expenses? Here's tip #1 of 5 we have. These work for all businesses.
READ MORE
April 13, 2022
The Top 3 "Buts" Companies Give for Not Training Employees on Cybersecurity
Training employees is one of the most powerful cybersecurity measures you can take. Yet many businesses won't do it. Why not?
READ MORE
November 10, 2021
New Vishing Attack Hitting Windows Users – Watch for It!
Yet again, cybercriminals change tactics. They're using a new "Vishing" strategy to attack unsuspecting people. The strategy impersonates Microsoft, and even employs phone calls to trick you into giving them access.
READ MORE
August 12, 2021
Malware-Infected PDFs Spreading Like Crazy – Here's How to Spot Them
Phishing attacks using PDF files – a common, easy-to-open document type – exploded in 2020. They use the same approach as phishing emails, but fewer people know about them. Here's how to identify an infected PDF...before you open it and unleash chaos.
READ MORE
July 15, 2021
Cybercriminals Now Acting Like VCs – Investing in Newer, More Destructive Ransomware Strains
First we had ransomware gangs. Then Ransomware-as-a-Service made ransomware into a cheap commodity on the Dark Web. Now cybercriminals have turned "VC" by investing in new startups...to make ransomware bigger and stronger!
READ MORE
May 13, 2021
Ransomware Attack Takes Down Oil Pipeline – What Would One Do to Your Business?
Ransomware just got very real. Last week an attack took down a major U.S. oil pipeline, disrupting fuel supplies for millions. Consider this a big scary reminder – ransomware can & will target you, too.
READ MORE
March 10, 2021
Running an Exchange Server? Patch It, Right Now!
Running your email through an Exchange Server? It needs a patch ASAP to fix a new vulnerability…a bad one.
READ MORE
February 11, 2021
Reboot Your Computers Once a Week to Stop Slowdowns
Should you power off your computers at night, before you leave the office? Here’s the answer!
READ MORE
January 14, 2021
5 Ways to Protect Your Business' Privacy in 5 Minutes
Business and personal online privacy are big topics these days…for good reason! This month’s Cyber Fu tip will focus on maintaining your business’ privacy while online.
READ MORE
November 12, 2020
Store Passwords in a Password Vault, Not Your Browser
We save passwords in our browsers all the time. It's easy…but is it secure? Would the browser protect your passwords if a hacker gained access? Maybe, maybe not. But a password vault will.
READ MORE
June 10, 2020
Safeguard Your Phone from Cyber Threats with the NYC Secure App
Your phone is as much a target for cyberattacks as your laptop. Practice good Cyber Fu when browsing on your phone, and put some protection on the device. One such protection is a free app called "NYC Secure."
READ MORE
May 13, 2020
Sharing Account Passwords with Co-Workers? Time to Stop.
When co-workers share passwords between them, you're asking for trouble. It could be a shared cloud service, an email account, even a shared computer. Each worker should always have their own account & unique password. Otherwise you open yourself up for cyberattack, and more.
READ MORE
March 11, 2020
Beware the Coronavirus Scams!
The world faces a new viral threat. That doesn't stop scammers from trying to exploit it.
READ MORE
February 12, 2020
Received an Email Alert from Your Bank? Don't Click the Link—Do This Instead
If you get a "Security Alert" from your bank, it may be a phishing email in disguise. To avoid the trap, don't click the link in the email – instead, use a simple workaround.
READ MORE
January 15, 2020
How to Stop Facebook from Following You Around
By now you know that Facebook tracks your activity, both on its apps and on other websites. Now they're using data to track your shopping habits in brick-and-mortar stores. A clear risk to privacy, especially if you use Facebook for business purposes. Here's how to stop it.
READ MORE
December 11, 2019
8 Cybersecurity Predictions for 2020
What do we have to look forward to on the cybersecurity front? Cybercriminals won't stop their attacks...but neither will the people combating them. Here are 8 predictions for 2020's cybersecurity outlook.
READ MORE
December 05, 2019
How One-Star Online Reviews Act Like Leeches (and How to Pry Them Off Your Brand)
One-star negative reviews reviews affect your prospective audience's perceptions of your business. Potentially warding them off ever contacting you. No business is safe. Don’t despair though! You can do something about "leech" reviews.
READ MORE
November 13, 2019
Is Your Office Printer Plotting Against You?
You've secured the office network. Every device has protection. Every user has cybersecurity training. Here's one item you may have missed though – the office printer. Turns out cybercriminals can attack those, too.
READ MORE
October 09, 2019
2 Reasons to Recycle Your Old IT Hardware
Continuing our Green IT discussion, let's talk recycling. You can recycle virtually all IT hardware, from your phone to dusty old servers. It's better for the environment, AND helps you protect your data. Here's how.
READ MORE
September 10, 2019
Ransomware Attack! What to Do in the First 10 Minutes
We hope you never have to deal with ransomware. However, it pays to know what to do if it strikes. If that, "Your files have been encrypted" screen pops up, don't panic! You can disrupt the attack before it gets worse.
READ MORE
August 14, 2019
How to Foil the "Gift Card" Email Scam
One of the most successful phishing scams involves a "boss" asking an employee to go out & buy gift cards. It uses clever social engineering, not advanced technology. Here's how you can spot & avoid the "gift card" scam.
READ MORE
July 10, 2019
How to Protect Your Child When They Use Mobile Devices
It’s summer and most kids have a lot of time on their hands - and access to devices. Here are some steps you can take to make those devices less alluring, keep your kids safe from online predators, and protect your personal data ... all at the same time.
READ MORE
June 12, 2019
How to Test Your Employees' Security Awareness
How many of your employees would click on a phishing email? If the answer's not an immediate "Zero/None," you have a cybersecurity vulnerability. Not sure who would & who wouldn't? Find out with a Phishing Test.
READ MORE
May 08, 2019
Windows 7 Support Will End in January 2020
Windows 7 will reach “End of Life” in January 2020, and as a result, will become vulnerable to cyberattacks. That means it’s time to upgrade!
READ MORE
April 10, 2019
Beware the Microsoft 365 "Puppet" Phishing Scam
Cybercriminals hammer on Microsoft 365 accounts every day. They want to break in, steal data, and wreak havoc. However, a new M365 phishing scam goes further: It uses your email account like a puppet.
READ MORE
March 06, 2019
How a Content Filter Keeps 'Bad' Websites Out
Some websites contain malware, ready to infect your network. Other websites allow employees to fritter away hours of productive time. You can block them all with a Content Filter.
READ MORE
February 07, 2019
Password Safety through SSO (Single Sign-On)
Almost every cloud service needs a secure password. How do you remember them all? Unless you have an incredible memory, you probably don't. Companies who keep all their services in the cloud are moving to SSO in droves.
READ MORE
January 09, 2019
Remote Wipe: The Last Resort to Protect Company Data
You're on a business trip and you lose your phone. Or someone steals your laptop. What do you do? You call your IT department and ask for a Remote Wipe. Before someone exploits all the company data on your device.
READ MORE
December 12, 2018
7 Laptop Safety Requirements for Your Corporate Travel Policy
Cybercriminals love to target business travelers. Stealing their devices or dropping malware onto them via unsecured Wi-Fi. However, if your employees follow these 7 laptop safely requirements, their devices and data will stay safe.
READ MORE
November 07, 2018
Follow a Monthly Patch Schedule & Avoid "Surprise Bugs"
How often should you apply security patches/Windows updates? Stick to a monthly schedule a week or two past Update Tuesday. Why? Well, not every patch arrives in perfect working order.
READ MORE
October 10, 2018
Avast Ye! Thar Be 2 Reasons Never to Use Pirated Software
Does your workstation contain any pirated software? If so, remove it ASAP. Beside the fact that it’s illegal, there are two more reasons not to pirate software…both of which involve your company's cybersecurity.
READ MORE
September 12, 2018
Asset Tag Your IT Hardware!
In today's Cyber Fu tip, we explain what an "Asset Tag" is. Tagging your IT hardware serves one vital purpose: Preserving information about each device, in case something bad happens to it.
READ MORE
August 07, 2018
3 Reasons Never to Use Personal Email for Work
For today's Cyber Fu tip, let's talk about email. Using personal email for work purposes is frowned on…but why? We'll give you not one, but three reasons.
READ MORE
July 12, 2018
How Malware Can Make You Spam Others
For today's Cyber Fu tip, we're learning about personal email use at work. The reasons never to use a personal email address at work, for any work function, keep piling up.
READ MORE
June 07, 2018
2 Great Examples of Strong Passwords (and 2 Catastrophically Bad Ones)
In this Cyber Fu Tip, we look at strong/weak passwords. Password strength can make you - or break you - when it comes to cyber-warfare. Strong passwords generally take two forms. Weak passwords, well, there are all kinds of those. These examples should clarify how to make your next password super strong.
READ MORE
May 10, 2018
DDoS Attacks 101
For today's Cyber Fu Tip, we're talking DDoS attacks. What they are, how they can impact your business, and what you can do to prevent them.
READ MORE
April 05, 2018
Voicemail "Scareware" Tries to Spook Money Out of You
Starting this month, we're bringing you a new cybersecurity tip each month! First, a warning about a type of phishing attack…that spreads through voicemail.
READ MORE
March 08, 2018
Should You Power Down Your Workstation at the End of the Day?
Many workers power down their workstations at the end of the day, thinking they are saving power and protecting their machines from hackers. But should they?
READ MORE
February 08, 2018
Local Antivirus vs. Cloud-Based Antivirus: The Pros & Cons
With cyber threats multiplying daily, every company workstation needs a business-grade anti-virus. But which solution is right for you? A locally-installed antivirus or a cloud-based security suite? Let's weigh the pros and cons.
READ MORE
January 11, 2018
New Year’s Resolution: Curb Your Facebook Habit?
Social Media has opened a new world of communication to all, but it has a dark side. According to a former Facebook executive, “you are being programmed.” Now that 2018 is here, consider curbing your Facebook habit. Your brain needs the freedom to think!
READ MORE
December 07, 2017
Thieves Don’t Have "Laptop Detectors" (But Protect Your Laptop’s Safety Anyway)
If you’ve heard that thieves have a device that can detect laptops in car trunks, they don’t. But you should still exercise some caution traveling with your laptop. Here’s the truth about “laptop detectors” and laptop safety measures.
READ MORE
November 14, 2017
The Two Communication Methods that “Just Work” in Any Office
Phone calls, chat, conferencing, social...what's your favorite communication method? We have plenty of choices now, but businesses tend to gravitate toward one or two.
READ MORE
November 09, 2017
Wi-Fi Security Has a KRACK In It (But Don’t Panic)
Nearly all Wi-Fi networks have a vulnerability in them. It’s called KRACK. The good news? It’s not too easy to exploit. We also have patches for most systems. Here’s what you should know.
READ MORE
October 05, 2017
How to Properly Dispose of IT Hardware
Don’t throw old IT hardware in the dumpster. It’s bad for the environment, and you could lose valuable Intellectual Property to thieves. Instead, use these secure disposal methods.
READ MORE
September 07, 2017
Keep Prying Eyes Out of Your Files with Secure Cloud Storage
Your business files need to stay private online. Using a secure cloud storage option is the best way to keep them away from cybercriminals.
READ MORE
August 03, 2017
How to Protect Your Business’ Privacy Online – Step 4 of 4: Use Secure DNS
Without DNS, no one could get anywhere on the Web. That means it’s a way to track where you go, unless you use a secure set of DNS numbers. Part 4 of 4.
READ MORE
July 06, 2017
How to Protect Your Business’ Privacy Online – Step 3 of 4: Use a VPN
VPNs surround your Internet connection, like armor keeping your data hidden from prying eyes. If you use the right VPN, that is. Part 3 of 4.
READ MORE
June 14, 2017
Warning: A New Ransomware is Targeting Macs
MacRansom is the latest ransomware targeting Macs. While MacRansom itself isn't a big threat, the fact that ransomware-as-a-service now targets Mac users is.
READ MORE
June 07, 2017
How to Protect Your Business’ Privacy Online – Step 2 of 4: Use Disk Encryption
If a cybercriminal can’t access your computer’s hard disk, they can’t steal data off it. Disk Encryption helps stop them. Part 2 of 4.
READ MORE
May 22, 2017
Lessons Learned from "WannaCry" — How to Protect Your Company's Data
We sent this notice to all of our customers, 1 week after the WannaCry ransomware spread worldwide. Even if you weren't hit, take the steps to protect your company's data...or you could be next.
READ MORE
May 11, 2017
How to Protect Your Business’ Privacy Online – Step 1 of 4: Private Browsing
Private browsing. It's just one way to keep your online activity private and away from prying eyes.
READ MORE
April 06, 2017
Conflicting Add-Ins Might Make Your Outlook Go Crazy
Having problems with Outlook? The culprit could be an Add-In. Learn how to locate a conflicting Add-In and how to fix the problem.
READ MORE
March 09, 2017
Manage All Your Email Signatures from One Place, with CodeTwo
Consistent email signatures make your organization look professional. CodeTwo keeps you and your team looking professional at all times.
READ MORE
February 09, 2017
Does Your Website Use HTTPS? If Not, It’s Time to Start
Google is serious about HTTPS, and you should be too. Websites without HTTPS will receive a 'flagged as unsafe' warning. Don't let your website lose ranking over this.
READ MORE
January 10, 2017
The Not-So-Friendly Skies: Hackers Use In-Flight Wi-Fi to Access Your Laptop
Think twice before accessing the Wi-Fi network on your next flight. If your computer isn't protected, a hacker on board could steal data right off of it.
READ MORE
December 06, 2016
Could Someone Guess Your Password in 100 Tries?
Is your password guess-proof? Could someone guess it in 100 tries? If there's even a small possibility someone could, consider these tips for making and keeping strong passwords.
READ MORE
November 02, 2016
Dead Lyve - Seagate Backup Service Collapses
What happens when the platform you store your photos on decides to call it quits? Users of Seagate Lyve are asking themselves that very question.
READ MORE
October 07, 2016
Did You Find a USB Flash Drive? Careful, It May Have Malware on It!
Finding a USB flash drive or SD card when out in public might seem like a bit of good luck. Watch out...it could have malware on it. Don't risk your information getting stolen. Don't plug it in!
READ MORE
July 05, 2016
One Way to Tell if an Email Contains Malware: Click "Reply All"
Not sure if an email is legitimate, or if it contains malware? Here's a quick way to find out within Outlook. Just be careful not to send it to anyone else!
READ MORE
April 29, 2016
Still Using QuickTime on a Windows PC? It Might Be Time to Uninstall
Apple has stopped updating its QuickTime video player. Trend Micro discovered 2 bugs in QuickTime, leaving anyone who still has it installed vulnerable to attack. Solution? Uninstall it!
READ MORE
March 28, 2016
The First Ransomware for Macs is here. Prepare Your Macs Accordingly.
For years now, Mac users didn't have to worry about ransomware stealing their data. Now they do. Ransomware has arrived on the Mac.
READ MORE
February 23, 2016
Consumer-Grade Email is Vulnerable to Blacklisting—Don't Use it for Business!
Does your email bounce back for no reason? If you use personal email for business purposes, your email address might have ended up on a blacklist. Here's how it happens, and how you can check.
READ MORE
January 25, 2016
Supercharge Your Sales & Marketing Efforts with these Marketing Automation Software Solutions
A Marketing Automation system helps businesses save time on their marketing, and still keep up. We gathered 6 marketing automation systems for small, mid-market and enterprise businesses use in this Tech Tip.
READ MORE
December 17, 2015
End-of-Year Advice: Check Your Backups
Take a moment before the New Year's Eve party to check your backups. Making sure they're stable and up-to-date now, means your data is safe and secure going into 2016.
READ MORE
November 24, 2015
How to Extend the Life of Your Phone & Laptop Batteries
Phone & laptop batteries do have a lifespan...but there are ways to extend it. Both through extenders and good battery management. Here's some advice to help keep your batteries running.
READ MORE
September 25, 2015
Server Environmental Conditions: What Works, What's Dangerous
Servers need a certain set of environmental conditions to run well. Heat, cold, dust, and moisture can all disrupt or even damage them. Here's a list of environmental risks to a server, and what you should do instead.
READ MORE
September 16, 2015
How to Deal with a Negative Review on Google Business Profile
Fund a negative review on Google Business Profile for your business? Naturally, if it's spam or fraudulent, you'll want it removed. Google does have a process for reviewing and removing it.
READ MORE
June 04, 2015
Domain Name Snatched Up After You Checked Its Availability? Here’s Why It Happens.
Ever searched for a domain name to buy, then come back later & someone else claimed it? There's a name for this practice - Domain Name Front Running. Here's why it happens, and how to avoid losing domains to it.
READ MORE
May 06, 2015
New "Mobile Friendly" Rules from Google Hurt 4 out of 5 Small Businesses
Mobile Internet access exceeded PCs in 2014. Google added "mobile-friendliness" to its ranking factors in April 2015. Now sites that display well on phones & tablets rank better in mobile search than the sites that don't. How does yours look?
READ MORE
April 07, 2015
3 Ways to Protect Against Ransomware (and Why Everyone Needs To)
As if malware wasn't bad enough, ransomware has invaded the Web. It doesn't just infect computers...it holds them hostage! Here's what to know about ransomware, and ways to protect yourself.
READ MORE
December 02, 2014
How to Copyright your Website Content
Can you copyright website content? Should you? We asked Terry Church at Silicon Valley Law Group for the ins and outs of content copyright.
READ MORE
October 01, 2014
The Bash Bug/Shellshock - Why It's Not "Bigger" Than Heartbleed
Have you seen the news about "Shellshock" yet? A bug in Linux and Mac OS X software which the media's calling "worse than Heartbleed." We think it's an issue, but not that bad. Here's why.
READ MORE
July 27, 2014
How Spam Filters Decide to Block Your Emails
What identifies an email as spam? Mail servers will scan for certain words, phrases or email elements to catch spam. Sometimes they grab a legitimate message because it has a few of those characteristics. Here's how to avoid getting caught.
READ MORE
June 29, 2014
The Files You Should Never Store in the Cloud
Most cloud services are reasonably safe. Still, there are files you should never store out there in the cloud. Here's what types of files you should keep safely local.
READ MORE
May 28, 2014
Calendar Your Internet Service Contract Expiration
When is your ISP's contract up for renewal? If you let it pass without review, you could get stuck in an auto-renewal and miss out on better rates. This Tech Tip explains how to avoid that.
READ MORE
November 01, 2013
Why Does My Company Limit Email Attachment Size?
Why do we still have a max size limit on email attachments? 10MB, 25MB, even 50MB attachment sizes aren't enough! However, good reasons for size limits do exist. As do better options for sharing large files.
READ MORE
October 26, 2013
Cable Management Tips from the Pros
Do your network cables look like spaghetti cascading down from the racks? If there's an issue, disorganized and unlabeled cabling can cause even more trouble. This month's Tech Tip gives tips on how to organize & manage network cables.
READ MORE
August 27, 2013
Would an online service provider share your data with a third party? Again, check the Privacy Policy!
Last month we showed that major tech firms can and do share your information with government. What about third parties, like other companies? Privacy policies tell the story. It's better than the government data sharing...but not completely.
READ MORE
July 08, 2013
Could your service provider participate in government data collection? Check their Privacy Policy
We've all clicked Yes on a Privacy Policy without reading it. But you should really know what's in that policy...especially when it allows a provider to share your data with the government. Here's what 5 such providers say about government data sharing.
READ MORE
May 29, 2013
Does Your Network Have Intrusion Detection?
If cyber-thieves are breaking into your network, how would you know? That's what Intrusion Detection Systems are for. These devices monitor network activity for anything out of the ordinary, and alert you if they sense something wrong. This Tech Tip covers our Intrusion Detection recommended product, and how it does the job.
READ MORE
April 10, 2013
The Result of an IT Security Audit - An Action Plan for Network Security Improvements
Conducting an IT Security Audit helps you determine if there are security issues in your network. But what do you get from the audit itself? How do you use its findings to improve network security? A good audit will give you an action plan...and here's what it includes.
READ MORE
February 05, 2013
Don't Use a Netgear Router for Business Networking
Does your office use a consumer-grade wireless router (like D-Link or Netgear) in the office? You may have trouble with your connections. Read our Tech Tip for the reason why.
READ MORE
March 02, 2012
What's the Best Ratio of Employees to IT Support Professionals?
When you need to hire IT workers, what's a good average to figure on between IT employees to all employees? Is there an 'ideal ratio' for certain business sizes? Debate varies widely on an ideal number of IT workers, but there are some good "Rules of Paw" to follow.
READ MORE
August 24, 2010
Wrong Email Address - Legitimate or Spam?
I've been receiving emails sent to administrator@mydomain.com. We don't even have an account for that address. These emails look legitimate... Phishing alert!
READ MORE
May 29, 2010
Email Addresses and "Unsubscribe"
"Do we really have to put an 'Unsubscribe' address in our email marketing?" This is called an opt-out address. You should definitely include it. Otherwise you'll look like a spammer. And it is required by law.
READ MORE
Contact
Us
Now
Success! Thanks for filling out our form!
Full Name
Company
City
State
- Select -
AL
AK
AZ
AR
CA
CO
CT
DE
FL
GA
HI
ID
IL
IN
IA
KS
KY
LA
ME
MD
MA
MI
MN
MS
MO
MT
NE
NV
NH
NJ
NM
NY
NC
ND
OH
OK
OR
PA
RI
SC
SD
TN
TX
UT
VT
VA
WA
WV
WI
WY
Phone
Email
How can we help you?
Send Message
Emergency IT Support
support@planetmagpie.com
510-344-1203 CA
817-806-3523 TX
Contact Sales
sales@planetmagpie.com
510-344-1180 CA
817-806-3524 TX
Request a Quote
Click Here