Blog by ComTech ActiveCare

Protect Your Data, Protect Your Business

Friday, 23 June 2017 00:00

Keyboard shortcuts in Windows 10

Written by

Since its release back in 2015, Windows 10 continues to see updates and new features. This time, users are greeted with some new keyboard shortcuts that will make life easier. So without further ado, here are our top picks that can be extremely helpful to your daily operations.

A discussion of a particularly nasty strain of malware downloader and what you need to know to keep yourself, your business and your employees protected.  

Malware Downloader

Conventional wisdom tells us that if you’re trying to keep your employees, your clients and ultimately your business safe from virtual harm, a little bit of old-fashioned common sense goes a long way. You’ve likely already been investing in ongoing security training, making sure that you and your team know how to identify a phishing email when you see one or know how to spot a rogue download coming from a mile away.

Wednesday, 21 June 2017 00:00

Office 365 tips to make your life easier

Written by

Office 365 receives dozens of changes every month, which explains why some get overlooked. While Office 365 Planner or Microsoft Teams are great tools for maximizing productivity, there are hidden functions and tricks you can use to make life a bit easier for yourself. Check out our six tips to improve your user experience with Office 365 below.

Declutter your inbox
If you’re having trouble managing the overwhelming amount of emails in your inbox, then using Office 365’s “Clutter” feature can clear up some space. To enable this feature go to Settings > Options > Mail > Automatic processing > Clutter then select Separate items identified as Clutter. Once activated, you need to mark any unwanted messages as “clutter” to teach Office 365. After learning your email preferences, Office 365 will automatically move low-priority messages into your “Clutter” folder, helping you focus on more important emails.

For many people, the vision of a world of driverless cars represents a commuter’s utopia, and for good reason. Commuting is costly, not only in terms of time and money but in terms of stress-related illnesses. Despite the fact that people have adapted to hurtling through space at 70 miles per hour while avoiding a potentially deadly crash, traffic is anything but relaxing. Just the idea of a car expertly programmed to detect and respond instantly to hazardous road conditions and the erratic behavior of all those other drivers is enough to lower a commuter’s blood pressure considerably. (Our own driving is, of course, always impeccable.) Driverless cars could also make it possible for people to give one another the increasingly rare gift of their undivided attention while traveling.

Skype For Business Choices

Monday, 19 June 2017 00:00

Phishing and Spear Phishing Scams

Written by

Don’t Get Caught in Their Nets.

What is Phishing?

Phishing is tech language for fishing over the Internet for confidential business and personal information such as credit card numbers, personal identification, usernames, and passwords. The first phishing scam occurred in 1996.

Let’s examine some of the most likely computer issues and quick tips for combatting these problems.

Slow Running Computer

I sure do love it when my computer bogs down and slows my workflow, so I can’t meet my deadlines… said no one ever.

Security professionals should be beefing up your network security, implementing advanced firewall software, and identifying risks for possible breaches. In reality, they spend a huge chunk of their time troubleshooting issues on individual personal computers (PCs). That workflow is not ideal, but that’s what normally happens in many organizations. At what cost? Read on to find out.

Take a look at how companies are shaping their IT budgets, and what their biggest expenses are.

digital budget

A very common question among businesses is, “How much should I be spending on digital services?” or “Should we increase our IT budget this year?” It’s a good question, so we’re going to take a look at the latest IT budget trends to see just what companies are deciding.

Tuesday, 13 June 2017 00:00

Hurricane-proof your business

Written by

While it’s easy to turn a blind eye against hurricane warnings and think “I already have a business continuity plan in place”, it pays to be extremely cautious, especially when the National Oceanic and Atmospheric Administration (NOAA) predicts up to four unusually active hurricanes this year. Needless to say, you simply can’t afford not to hurricane-proof your disaster recovery (DR) plan.

Tuesday, 13 June 2017 00:00

Definition: VPN

Written by

VPN: [vee-pee-ehn] noun.

VPN stands for virtual private network, a computer networking technology that enables users to securely connect to each over the Internet (or a similar public network) as if they were on the same private network/intranet.

Getting ready to adopt a new security strategy? Here are the top tips on preparing your company!

Security Overhaul

All right: Let’s assume your organization has taken note of WannaCry and other EternalBlue malware attacks and has finally decided that it’s time for a big security update to meet the threats of the modern digital world. That’s great news! Many companies don’t even make it that far. But now that your business understands the need for a security overhaul, it’s time to create a plan. And that’s where we have a few ideas to help out.

Friday, 09 June 2017 00:00

Return of the smartphone attack

Written by

Due to the recent WannaCry ransomware exploits, business owners are refocusing their efforts on protecting computer networks. Despite that, many leave one key device unaccounted for: their smartphone. The truth is hackers can exploit the technology in your smartphone to conduct malicious acts, and one of the most common is Bluetooth technology.

Learn about some of the much anticipated new features Microsoft recently announced for the Surface Pro and Office 365.

Microsoft Office 365 and the Surface Pro tablet have been innovative products since their introduction, but the past month brought the announcement of a slew of new updates for Microsoft’s landmark software and hardware offerings that aim to change the game for users. At ComTech in Central Texas, we want you to get the most out of your Microsoft experience by keeping you up to date on all of the exciting new things you can do with your Surface Pro combined with Office 365.

Office 365 Surface

Redefining expectations for tablet inking

Wednesday, 07 June 2017 00:00

The Hard Facts About Cyber Insurance

Written by

Cyber insurance helps ensure business profits in case of data attacks: Here’s what you need to know.

Cyber Insurance

Cyber insurance is business insurance that covers costs associated with data attacks, offered by insurers and via plans with certain vendors. When many companies here about that, the automatic thought is, “Yes, that is exactly what I need!”

Tuesday, 06 June 2017 00:00

Sweet Moments in Tech History

Written by

Marshmallow operating systems, candy-colored computers, and other sweet innovations for national candy month.

June is national candy month, and to celebrate, we’ve decided to share some of the sweetest moments in candy-related IT history. Each of these cultural tidbits is paired with a little lesson or a few tips on how to integrate the sweetness of innovation into your company.

National Candy Month

Monday, 05 June 2017 00:00

Happy World Environment Day

Written by

Now more than ever, business professionals in every industry are looking for the most sustainable and cost-efficient ways to reduce their environmental impact and drive sustainability. In an increasingly fast-paced and digital-based business environment, technology is playing a larger role in the effort to develop and maintain a business that is wholly sustainable.

World Environment Day

Why CPA Firms Need to Use Secure File Sharing

CPA firms of all sizes handle personally-identifiable information every day. This presents significant risks of their clients’ data being hacked. Secure file-sharing can help your business keep clients’ data safe and improve your bottom line.  

CPA Cloud

Whether you’re a one-person CPA practice or a large regional firm serving thousands of clients, you have a duty to keep your clients’ information safe. As a trusted financial advisor, your clients will expect that their personally-identifiable information will not be compromised easily when they hire you. Financial transactions inherently pose a risk of unwanted third parties trying to get sensitive information like Social Security numbers, bank account numbers, and other information that shouldn’t be compromised. By using a secure file sharing system, CPA firms of all sizes can take a significant preventative step from having sensitive client data breached. Additionally, secure file sharing systems offer workflow optimization benefits that can make your practice run more smoothly.

For all the talk about server hardware and capacity, none of it means a thing if you aren’t carefully managing the physical space surrounding your server. If you’re worried about getting the most out of your investment, follow these four tips for taking better care of your hardware.

WannaCry’s ransomware attack is mostly over – here are the lessons businesses must learn from the experience.

WannaCry

WannaCry was a particularly nasty bit of ransomware that infected Windows systems via network connections and encrypted important files to hold them as a ransom for bitcoins. The first wave of WannaCry is over, and we can learn a lot of important lessons from its rise and fall.

(Designed by Vexels.com)

When IT pros deploy devices to users, it usually comes in the form of a laptop or desktop. Both are suitable for business productivity, but in most cases, it looks like tablets get lost in a sea of 2-in-1s, ultrabooks, and standard laptops. And when it comes to tablets, the common perception is, "Tablets either aren't for business or have very niche markets, but definitely not for me." Our ThinkPad X1 Tablet is an example of how Lenovo is trying to break this misconception, by including specs you'd find within a laptop inside a tablet form factor.

Check Out this Webinar from Lenovo on Choosing User Hardware

 

 

That being said, tablets in a business environment may not be right for everyone, so what changes do you think could be made to the traditional "tablet" design to make it more suitable for a business environment? Do you think that most companies are headed in the rightdirection as far as tablet innovation goes?

For more Lenovo Options and other Hardware Solutions please contact ComTech at (254) 770-1210 or email us at This email address is being protected from spambots. You need JavaScript enabled to view it.

Page 1 of 12

Microsoft Office 365

 

Learn More