SomethingCool.com LLC - Make IT Personal

Blog

5 Ways to Prepare Your IT Systems for Severe Weather

September 7, 2017
|

Severe weather, like hurricanes Harvey and Irma, can be as devastating to your IT environment as cyberattacks. While you cannot prevent or stop events like tornados and hurricanes, you can prepare for them. With the correct preparations, you can minimize the damage to your IT systems and lessen […]

Read more

Don’t Let Your IT Policies, Plans, and Strategies Collect Dust

September 7, 2017
|

To help keep IT systems running securely and efficiently, businesses often create IT policies, plans, and strategies. For example, businesses establish comprehensive acceptable use, mobile device, and email policies to protect their IT assets. They also develop detailed disaster recovery plans and data backup strategies so they can […]

Read more

Data Backups vs. Replication: What Does Your Business Need?

September 7, 2017
|

Data backups and replication aren’t one and the same. There are important differences in what they are used for and how they are set up. Most businesses need both, but to know for sure, you need to know the differences.

Data Backups

Data backups involve […]

Read more

What You Need to Know about the Virtual Desktops Feature in Windows 10

May 30, 2017
|

Windows 10 has many new features, one of which is the ability to create virtual desktops. Although Microsoft offered this functionality in the past, it was only available as an add-on program. As a result, most Windows users are not familiar with what virtual desktops are and […]

Read more

5 Ways to Declutter Your Hard Disk

May 30, 2017
|

As businesses grow, so do the number of files they generate. Presentations, proposals, correspondence, contracts, spreadsheets, and other types of business documents can quickly accumulate and fill up a hard disk. Fortunately, freeing up disk space on Windows computers is relatively easy.

Here are five ways to declutter […]

Read more

Don’t Let Your Business Become the Next Spear Phishing Victim

May 30, 2017
|

Spear phishing scams targeted at businesses have proven to be very lucrative for cybercriminals. For example, since January 2015, hackers have stolen over $3 billion (USD) from more than 22,000 companies worldwide using a type of spear phishing attack known as a Business Email Compromise (BEC) scam […]

Read more

WannaCry Ransomware – What You Can Do

May 14, 2017
|

Why this Attack is Different

Stories of a new ransomware attack flooded the news on Friday, and by Sunday more than 200,000 individuals and 10,000 organizations in 150 countries worldwide had been hit.  The size of the attack makes this exploit stand […]

Read more

6 Ways to Make Your IT Security Training More Effective

April 6, 2017
|

Cybercriminals like to target the weakest link in companies’ security defenses — and that link is often the employees. But it does not have to be that way. Your employees can provide an important line of defense against cybercrime if you educate them about IT security. For this training […]

Read more
1 2 3 4 5 6 7 Next page ›