8 Steps To Building A Successful Blog

Step 1: Register a domain. A domain is the address of your website, like “microsoft.com” or “freemoney.biz”. Registering an appropriate and snappy domain name gives you a good way to make it easier to find your blog. Registration gives you the...

Display Images in Microsoft Outlook

Outlook 2016 To unblock picture downloads for all messages in Outlook 2016: Click File. Click Options. Click Trust Center. Under Microsoft Outlook Trust Center, click Trust Center Settings. Uncheck the Don’t download pictures automatically in HTML e-mail...

QuickBooks Read Only User Instructions

One of QuickBooks’ most powerful and frequently used features is the ability to run multiple user accounts. Often different people need different levels of access, or the organization needs a solid audit trail for determining who made changes. To start, log in to your...

TLS Encryption

It is important for organizations that require a greater level of security for inbound and outbound email traffic to understand the benefits of using Transport Layer Security (TLS) protocol. What is TLS Encryption? Transport Layer Security (TLS) and its predecessor,...

Lessons From Equifax

Equifax, a major US credit bureau, has experienced a massive data breach. While analysis of the exact causes and the fallout from this breach are still under scrutiny, there are some suppositions and guesses that are, if not definitive on the Equifax side, at least...

Boarding Passes and Information Security

Recently, Brian Krebs posted a story about the information shown on airline boarding passes. It’s interesting to see exactly how much secret/secure information is printed on a disposable piece of paperwork; much of it is secured only by format; barcodes are difficult...

Act! Customer Relationship Manager

Sales-oriented businesses will be familiar with the idea of a CRM – Customer Relationship Management – program. Act! is the CRM software we support at Katy – it’s a powerful program, capable of being remotely accessible, and includes powerful tools for scheduling and...

Centralizing Your Data Storage

In any organization, different members will need different information and managing who has access to that information can quickly become a serious headache. This is one area where a few good computers and a few good policies can dramatically simplify that overhead. A...

Leaks and Security Practices

With large security breaches becoming a more consistent phenomenon, many companies are looking for ways to keep from being the next victim. One of the most intense concerns has been unethical employees – a person in a position of trust can do a lot of damage. The...

Bundled Software

Even perfectly useful software can sometimes hide unexpected packages. While it’s more common among free and repackaged software bundles, even such common and vaunted software as Windows is sometimes packaged with unnecessary programs. The common industry term for...

Data Backups

Data loss is a strange beast- it’s an easy trap to fall into, and a hard one to climb out of. There are criminals who would hold your information hostage, mechanical failures that can ruin your day, and plenty of ways for small mistakes to snowball into costly...

Online Account Security

With the rise in fraud, many retailers online are taking extra precautions- as they should. There are some ways you can build on this higher baseline to help keep your money in your own hands in a busy day-to-day. Turn on Multi Factor Authentication: Multi Factor...

Social Engineering

As information security measures become more complex and powerful, many criminals and hackers are taking advantage of other kinds of vulnerabilities in what are known as “social engineering” attacks. If you’ve heard about the rising epidemic of tax fraud, then you’ve...

Growing Inventory Management

For a small startup business, taking inventory is usually simple and quick- look around, see what’s there, see what’s missing. But as the business grows, and the stuff starts to pile up, using an automated system becomes more advisable and, eventually necessary. If...

Spearphishing Attacks

Some of the most effective recent hacking attacks have used very straightforward programs- ones that come to the front door and ask permission before taking over a computer. These attacks have cost enormous amounts of money, time and endless headaches for security...

Cloud Computing Basics

A lot has been made recently of cloud computing- having the computational “heavy lifting” done by servers across the internet, rather than by the machine the user is seated at. There are some tremendous advantages that can be had in the cloud, but it can be expensive...

“Legacy” Systems

Businesses don’t like changing their processes- it’s expensive, time consuming, and can put a (hopefully temporary) strain on daily operations. But there are a lot of risks associated with old or outdated technology, and being proactive about updating and replacing...

Windows 10 – Upgrading and Costs

We’ve been getting some questions about the specifics in upgrading to Windows 10, especially regarding costs and compatibility. So here is a rundown of what to expect: Windows Vista and any previous versions are not being offered a free upgrade. There are concerns-...

Encryption

Encryption is becoming more and more necessary as more of our devices become connected to the internet- whenever sensitive information touches public data lines, it’s vulnerable- to hackers, to data collectors, even to occasional data line misfires. The best way to...

BYOD

There is an ongoing push lately for BYOD options- “Bring Your Own Device”, where an employee can set up their personal smart phone or tablet computer to work on job-related information. These options can be a great savings for any company in costs, both for hardware...

Windows 10 and Software as a Service

The arrival of Windows 10 is a bit of a sea change for business software. While no one is being required to switch over by Microsoft, there is a clear push for it to replace all previous Windows platforms. And while this will likely prove to be a serious benefit for...

Remote Monitoring and Maintenance, Part 2

Remote maintenance includes more than just update management. Using a remote access program, your IT provider can drastically cut the time and cost requirements for small repairs and minor changes. But there’s more to it than that, even: being able to quickly...

QuickBooks Bank Feeds

Recently, a small business owner reached out to us about the amount of time they spent reconciling credit card statements. They felt like they were between a rock and a hard place- too small to justify a staff accountant, but too large for working through things by...