Skip To The Main Content
IT Support Services
IT Support Plans
Managed IT Services
Emergency IT Support
Customer How Tos
Custom Website Development
Identity Design & Branding
Digital Marketing Services
Private Cloud Service
Why Choose Us
Reshore Your IT!
IT Reshoring News
Magpie Tech Tips
Creative Lab News
Skype for Business Insider Blog
Skype for Business
Office 365 Support
Emergency IT Support: 510-344-1203
IT Reshoring News
Magpie Tech Tips
Creative Lab News
Skype for Business Insider Blog
Magpie Tech Tips
June 10, 2020
Safeguard Your Phone from Cyber Threats with the NYC Secure App
Your phone is as much a target for cyberattacks as your laptop. Practice good Cyber Fu when browsing on your phone, and put some protection on the device. One such protection is a free app called "NYC Secure."
May 13, 2020
Sharing Account Passwords with Co-Workers? Time to Stop.
When co-workers share passwords between them, you're asking for trouble. It could be a shared cloud service, an email account, even a shared computer. Each worker should always have their own account & unique password. Otherwise you open yourself up for cyberattack, and more.
March 11, 2020
Beware the Coronavirus Scams!
The world faces a new viral threat. That doesn't stop scammers from trying to exploit it.
February 12, 2020
Received an Email Alert from Your Bank? Don't Click the Link—Do This Instead
If you get a "Security Alert" from your bank, it may be a phishing email in disguise. To avoid the trap, don't click the link in the email – instead, use a simple workaround.
January 15, 2020
How to Stop Facebook from Following You Around
By now you know that Facebook tracks your activity, both on its apps and on other websites. Now they're using data to track your shopping habits in brick-and-mortar stores. A clear risk to privacy, especially if you use Facebook for business purposes. Here's how to stop it.
December 11, 2019
8 Cybersecurity Predictions for 2020
What do we have to look forward to on the cybersecurity front? Cybercriminals won't stop their attacks...but neither will the people combating them. Here are 8 predictions for 2020's cybersecurity outlook.
December 05, 2019
How One-Star Online Reviews Act Like Leeches (and How to Pry Them Off Your Brand)
One-star negative reviews reviews affect your prospective audience's perceptions of your business. Potentially warding them off ever contacting you. No business is safe. Don’t despair though! You can do something about "leech" reviews.
November 13, 2019
Is Your Office Printer Plotting Against You?
You've secured the office network. Every device has protection. Every user has cybersecurity training. Here's one item you may have missed though – the office printer. Turns out cybercriminals can attack those, too.
October 09, 2019
2 Reasons to Recycle Your Old IT Hardware
Continuing our Green IT discussion, let's talk recycling. You can recycle virtually all IT hardware, from your phone to dusty old servers. It's better for the environment, AND helps you protect your data. Here's how.
September 10, 2019
Ransomware Attack! What to Do in the First 10 Minutes
We hope you never have to deal with ransomware. However, it pays to know what to do if it strikes. If that, "Your files have been encrypted" screen pops up, don't panic! You can disrupt the attack before it gets worse.
August 14, 2019
How to Foil the "Gift Card" Email Scam
One of the most successful phishing scams involves a "boss" asking an employee to go out & buy gift cards. It uses clever social engineering, not advanced technology. Here's how you can spot & avoid the "gift card" scam.
July 10, 2019
How to Protect Your Child When They Use Mobile Devices
It’s summer and most kids have a lot of time on their hands - and access to devices. Here are some steps you can take to make those devices less alluring, keep your kids safe from online predators, and protect your personal data ... all at the same time.
June 12, 2019
How to Test Your Employees' Security Awareness
How many of your employees would click on a phishing email? If the answer's not an immediate "Zero/None," you have a cybersecurity vulnerability. Not sure who would & who wouldn't? Find out with a Phishing Test.
May 08, 2019
Windows 7 Support Will End in January 2020
Windows 7 will reach “End of Life” in January 2020, and as a result, will become vulnerable to cyberattacks. That means it’s time to upgrade!
April 10, 2019
Beware the Latest Office 365 "Puppet" Phishing Scam
Cybercriminals hammer on Office 365 accounts every day. They want to break in, steal data, and wreak havoc. However, a new O365 phishing scam goes further: It uses your email account like a puppet.
March 06, 2019
How a Content Filter Keeps 'Bad' Websites Out
Some websites contain malware, ready to infect your network. Other websites allow employees to fritter away hours of productive time. You can block them all with a Content Filter.
February 07, 2019
Password Safety through SSO (Single Sign-On)
Almost every cloud service needs a secure password. How do you remember them all? Unless you have an incredible memory, you probably don't. Companies who keep all their services in the cloud are moving to SSO in droves.
January 09, 2019
Remote Wipe: The Last Resort to Protect Company Data
You're on a business trip and you lose your phone. Or someone steals your laptop. What do you do? You call your IT department and ask for a Remote Wipe. Before someone exploits all the company data on your device.
December 12, 2018
7 Laptop Safety Requirements for Your Corporate Travel Policy
Cybercriminals love to target business travelers. Stealing their devices or dropping malware onto them via unsecured Wi-Fi. However, if your employees follow these 7 laptop safely requirements, their devices and data will stay safe.
November 07, 2018
Follow a Monthly Patch Schedule & Avoid "Surprise Bugs"
How often should you apply security patches/Windows updates? Stick to a monthly schedule a week or two past Update Tuesday. Why? Well, not every patch arrives in perfect working order.
October 10, 2018
Avast Ye! Thar Be 2 Reasons Never to Use Pirated Software
Does your workstation contain any pirated software? If so, remove it ASAP. Beside the fact that it’s illegal, there are two more reasons not to pirate software…both of which involve your company's cybersecurity.
September 12, 2018
Asset Tag Your IT Hardware!
In today's Cyber Fu tip, we explain what an "Asset Tag" is. Tagging your IT hardware serves one vital purpose: Preserving information about each device, in case something bad happens to it.
August 07, 2018
3 Reasons Never to Use Personal Email for Work
For today's Cyber Fu tip, let's talk about email. Using personal email for work purposes is frowned on…but why? We'll give you not one, but three reasons.
July 12, 2018
How Malware Can Make You Spam Others
For today's Cyber Fu tip, we're learning about personal email use at work. The reasons never to use a personal email address at work, for any work function, keep piling up.
June 07, 2018
2 Great Examples of Strong Passwords (and 2 Catastrophically Bad Ones)
In this Cyber Fu Tip, we look at strong/weak passwords. Password strength can make you - or break you - when it comes to cyber-warfare. Strong passwords generally take two forms. Weak passwords, well, there are all kinds of those. These examples should clarify how to make your next password super strong.
May 10, 2018
DDoS Attacks 101
For today's Cyber Fu Tip, we're talking DDoS attacks. What they are, how they can impact your business, and what you can do to prevent them.
April 05, 2018
Voicemail "Scareware" Tries to Spook Money Out of You
Starting this month, we're bringing you a new cybersecurity tip each month! First, a warning about a type of phishing attack…that spreads through voicemail.
March 08, 2018
Should You Power Down Your Workstation at the End of the Day?
Many workers power down their workstations at the end of the day, thinking they are saving power and protecting their machines from hackers. But should they?
February 08, 2018
Local Antivirus vs. Cloud-Based Antivirus: The Pros & Cons
With cyber threats multiplying daily, every company workstation needs a business-grade anti-virus. But which solution is right for you? A locally-installed antivirus or a cloud-based security suite? Let's weigh the pros and cons.
January 11, 2018
New Year’s Resolution: Curb Your Facebook Habit?
Social Media has opened a new world of communication to all, but it has a dark side. According to a former Facebook executive, “you are being programmed.” Now that 2018 is here, consider curbing your Facebook habit. Your brain needs the freedom to think!
December 07, 2017
Thieves Don’t Have "Laptop Detectors" (But Protect Your Laptop’s Safety Anyway)
If you’ve heard that thieves have a device that can detect laptops in car trunks, they don’t. But you should still exercise some caution traveling with your laptop. Here’s the truth about “laptop detectors” and laptop safety measures.
November 14, 2017
The Two Communication Methods that “Just Work” in Any Office
Phone calls, chat, conferencing, social...what's your favorite communication method? We have plenty of choices now, but businesses tend to gravitate toward one or two.
November 09, 2017
Wi-Fi Security Has a KRACK In It (But Don’t Panic)
Nearly all Wi-Fi networks have a vulnerability in them. It’s called KRACK. The good news? It’s not too easy to exploit. We also have patches for most systems. Here’s what you should know.
October 05, 2017
How to Properly Dispose of IT Hardware
Don’t throw old IT hardware in the dumpster. It’s bad for the environment, and you could lose valuable Intellectual Property to thieves. Instead, use these secure disposal methods.
September 07, 2017
Keep Prying Eyes Out of Your Files with Secure Cloud Storage
Your business files need to stay private online. Using a secure cloud storage option is the best way to keep them away from cybercriminals.
August 03, 2017
How to Protect Your Business’ Privacy Online – Step 4 of 4: Use Secure DNS
Without DNS, no one could get anywhere on the Web. That means it’s a way to track where you go, unless you use a secure set of DNS numbers. Part 4 of 4.
July 06, 2017
How to Protect Your Business’ Privacy Online – Step 3 of 4: Use a VPN
VPNs surround your Internet connection, like armor keeping your data hidden from prying eyes. If you use the right VPN, that is. Part 3 of 4.
June 14, 2017
Warning: A New Ransomware is Targeting Macs
MacRansom is the latest ransomware targeting Macs. While MacRansom itself isn't a big threat, the fact that ransomware-as-a-service now targets Mac users is.
June 07, 2017
How to Protect Your Business’ Privacy Online – Step 2 of 4: Use Disk Encryption
If a cybercriminal can’t access your computer’s hard disk, they can’t steal data off it. Disk Encryption helps stop them. Part 2 of 4.
May 22, 2017
Lessons Learned from "WannaCry" — How to Protect Your Company's Data
We sent this notice to all of our customers, 1 week after the WannaCry ransomware spread worldwide. Even if you weren't hit, take the steps to protect your company's data...or you could be next.
May 11, 2017
How to Protect Your Business’ Privacy Online – Step 1 of 4: Private Browsing
Private browsing. It's just one way to keep your online activity private and away from prying eyes.
April 06, 2017
Conflicting Add-Ins Might Make Your Outlook Go Crazy
Having problems with Outlook? The culprit could be an Add-In. Learn how to locate a conflicting Add-In and how to fix the problem.
March 09, 2017
Manage All Your Email Signatures from One Place, with CodeTwo
Consistent email signatures make your organization look professional. CodeTwo keeps you and your team looking professional at all times.
February 09, 2017
Does Your Website Use HTTPS? If Not, It’s Time to Start
Google is getting serious about HTTPS, and so should you. Websites without HTTPS may soon get flagged as unsafe for users. Don't get left behind.
January 10, 2017
The Not-So-Friendly Skies: Hackers Use In-Flight Wi-Fi to Access Your Laptop
Think twice before accessing the Wi-Fi network on your next flight. If your computer isn't protected, a hacker on board could steal data right off of it.
December 06, 2016
Could Someone Guess Your Password in 100 Tries?
Is your password guess-proof? Could someone guess it in 100 tries? If there's even a small possibility someone could, consider these tips for making and keeping strong passwords.
November 02, 2016
What happens when the platform you store your photos on decides to call it quits? Users of Seagate Lyve are asking themselves that very question.
October 07, 2016
Did You Find a USB Flash Drive? Careful, It May Have Malware on It!
Finding a USB flash drive or SD card when out in public might seem like a bit of good luck. Watch out...it could have malware on it. Don't risk your information getting stolen. Don't plug it in!
September 08, 2016
Dropbox Hacked – Change Your Password Right Away
Dropbox asked millions of its users to change their passwords. Why? Because they were hacked in 2012, but didn't make users aware at the time. If you use Dropbox, now's the time to change your password.
July 05, 2016
One Way to Tell if an Email Contains Malware: Click "Reply All"
Not sure if an email is legitimate, or if it contains malware? Here's a quick way to find out within Outlook. Just be careful not to send it to anyone else!
May 26, 2016
The Windows 10 Giveaway Deadline is July 29. Time to Upgrade!
Windows users have until July 29 to take advantage of the free Windows 10 upgrade. (You can still upgrade after July 29, but you must pay a license fee.) Here are the steps for upgrading to Windows 10.
April 29, 2016
Still Using QuickTime on a Windows PC? It Might Be Time to Uninstall
Apple has stopped updating its QuickTime video player. Trend Micro discovered 2 bugs in QuickTime, leaving anyone who still has it installed vulnerable to attack. Solution? Uninstall it!
March 28, 2016
The First Ransomware for Macs is here. Prepare Your Macs Accordingly.
For years now, Mac users didn't have to worry about ransomware stealing their data. Now they do. The first ransomware for Mac OS has arrived.
February 23, 2016
Consumer-Grade Email is Vulnerable to Blacklisting—Don't Use it for Business!
Does your email bounce back for no reason? If you use personal email for business purposes, your email address might have ended up on a blacklist. Here's how it happens, and how you can check.
January 25, 2016
Supercharge Your Sales & Marketing Efforts with these Marketing Automation Software Solutions
A Marketing Automation system helps businesses save time on their marketing, and still keep up. We gathered 6 marketing automation systems for small, mid-market and enterprise businesses use in this Tech Tip.
December 17, 2015
End-of-Year Advice: Check Your Backups
Take a moment before the New Year's Eve party to check your backups. Making sure they're stable and up-to-date now, means your data is safe and secure going into 2016.
November 24, 2015
How to Extend the Life of Your Phone & Laptop Batteries
Phone & laptop batteries do have a lifespan...but there are ways to extend it. Both through extenders and good battery management. Here's some advice to help keep your batteries running.
October 23, 2015
How to Use Co-Authoring in Office 2016
Office 2016 introduces new & improved features, including additions to Word. One new feature is Co-Authoring - multiple people working on a Word document simultaneously. Here's how you can start co-authoring.
September 25, 2015
Server Environmental Conditions: What Works, What's Dangerous
Servers need a certain set of environmental conditions to run well. Heat, cold, dust, and moisture can all disrupt or even damage them. Here's a list of environmental risks to a server, and what you should do instead.
September 16, 2015
How to Deal with a Negative Review on Google Places
Have you ever found a negative review on Google Places for your business? Naturally, you'll want it removed. If the review is spam or fraudulent, Google has a process for reviewing and removing it.
August 05, 2015
What You Should Know About the Windows 10 Support Lifecycle
Windows 10 is here! You may have received an upgrade notice already. Please note that Windows 10 has a similar lifecycle to previous operating systems, so you don't have to upgrade right away. It won't be free for very long though...
July 14, 2015
New Microsoft Software is Coming!
Does your office use Exchange Server? SharePoint? How about Office? All of these applications - and more - are due for new versions, coming later this year or early next year. Here are the details on what to expect (and plan for upgrades).
June 04, 2015
Domain Name Snatched Up After You Checked Its Availability? Here’s Why It Happens.
Ever searched for a domain name to buy, then come back later & someone else claimed it? There's a name for this practice - Domain Name Front Running. Here's why it happens, and how to avoid losing domains to it.
May 06, 2015
New "Mobile Friendly" Rules from Google Hurt 4 out of 5 Small Businesses
Mobile Internet access exceeded PCs in 2014. Google added "mobile-friendliness" to its ranking factors in April 2015. Now sites that display well on phones & tablets rank better in mobile search than the sites that don't. How does yours look?
April 07, 2015
3 Ways to Protect Against Ransomware (and Why Everyone Needs To)
As if malware wasn't bad enough, ransomware has invaded the Web. It doesn't just infect computers...it holds them hostage! Here's what to know about ransomware, and ways to protect yourself.
December 02, 2014
How to Copyright your Website Content
Can you copyright website content? Should you? We asked Terry Church at Silicon Valley Law Group for the ins and outs of content copyright.
October 01, 2014
The Bash Bug/Shellshock - Why It's Not "Bigger" Than Heartbleed
Have you seen the news about "Shellshock" yet? A bug in Linux and Mac OS X software which the media's calling "worse than Heartbleed." We think it's an issue, but not that bad. Here's why.
September 02, 2014
Time to Schedule a Windows 7 Migration?
We just passed the "End of XP". Now it's time to consider the End of Windows 7. Microsoft will keep supporting WIndows 7 with security patches until 2020. But no more service packs after January 2015. Now is the time to think about what your computers will run after Windows 7.
July 27, 2014
How Spam Filters Decide to Block Your Emails
What identifies an email as spam? Mail servers will scan for certain words, phrases or email elements to catch spam. Sometimes they grab a legitimate message because it has a few of those characteristics. Here's how to avoid getting caught.
June 29, 2014
The Files You Should Never Store in the Cloud
Most cloud services are reasonably safe. Still, there are files you should never store out there in the cloud. Here's what types of files you should keep safely local.
May 28, 2014
Calendar Your Internet Service Contract Expiration
When is your ISP's contract up for renewal? If you let it pass without review, you could get stuck in an auto-renewal and miss out on better rates. This Tech Tip explains how to avoid that.
November 01, 2013
Why Does My Company Limit Email Attachment Size?
Why do we still have a max size limit on email attachments? 10MB, 25MB, even 100MB attachment sizes aren't enough! However, good reasons for size limits do exist. As do better options for sharing large files.
October 26, 2013
Cable Management Tips from the Pros
Do your network cables look like spaghetti cascading down from the racks? If there's an issue, disorganized and unlabeled cabling can cause even more trouble. This month's Tech Tip gives tips on how to organize & manage network cables.
August 27, 2013
Last month we showed that major tech firms can and do share your information with government. What about third parties, like other companies? Privacy policies tell the story. It's better than the government data sharing...but not completely.
July 08, 2013
May 29, 2013
Does Your Network Have Intrusion Detection?
If cyber-thieves are breaking into your network, how would you know? That's what Intrusion Detection Systems are for. These devices monitor network activity for anything out of the ordinary, and alert you if they sense something wrong. This Tech Tip covers our Intrusion Detection recommended product, and how it does the job.
April 10, 2013
The Result of an IT Security Audit - An Action Plan for Network Security Improvements
Conducting an IT Security Audit helps you determine if there are security issues in your network. But what do you get from the audit itself? How do you use its findings to improve network security? A good audit will give you an action plan...and here's what it includes.
February 05, 2013
Don't Use a Netgear Router for Business Networking
Does your office use a consumer-grade wireless router (like D-Link or Netgear) in the office? You may have trouble with your connections. Read our Tech Tip for the reason why.
May 30, 2012
Choose a File Sharing Service that's Secure Top-to-Bottom
"If I don't trust online storage sites, what should I use instead? What's the most secure way to share files outside my network?" For most files, sites like Dropbox are OK. But if you want secure file sharing, here are 3 suggestions.
March 02, 2012
What's the Best Ratio of Employees to IT Support Professionals?
When you need to hire IT workers, what's a good average to figure on between IT employees to all employees? Is there an 'ideal ratio' for certain business sizes? Debate varies widely on an ideal number of IT workers, but there are some good "Rules of Paw" to follow.
August 24, 2010
Wrong Email Address - Legitimate or Spam?
I've been receiving emails sent to firstname.lastname@example.org. We don't even have an account for that address. These emails look legitimate... Phishing alert!
May 29, 2010
Email Addresses and "Unsubscribe"
"Do we really have to put an 'Unsubscribe' address in our email marketing?" This is called an opt-out address. You should definitely include it. Otherwise you'll look like a spammer. And it is required by law.
Success! Thanks for filling out our form!
- Select -
How can we help you?
Emergency IT Support
Request a Quote