How to Add 2FA to Your Geek Girls End User Portal

Here are instructions to secure your Geek Girls End User portal with 2 Factor Authentication. Two-Factor Authentication (2FA). 2FA is an extra step in the security process that reconfirms your identity. When you log in to the web site, a unique code is sent to your...
How to Maintain Your NAS

How to Maintain Your NAS

A network-attached storage device (or “NAS”) is a great option for fast, secure local storage for customers that don’t have server computers. However, it’s important to properly maintain your NAS and make sure it is stable and secure from...

Network Solutions | Important Security Information

If you host your domain registration, DNS or web site with Network Solutions, you should change your password immediately. Source: Network Solutions | Important Security Information This breach also illustrates why it’s important to use different passwords for...

What is My Computer’s Name or Host Name?

Often a customer asks us for assistance with a computer, but if they more than one computer, we may need to identify which one they’d like remote assistance with. In order to identify which computer we are supposed to remote into, we’ll sometimes ask the...

How to Prevent Employee Burnout

Unemployment has been on a steady downward trend for the past ten years, making keeping good employees a greater challenge than ever. Employee burnout is an important issue to address to ensure that your employees remain productive and happy. This article from our...

Email Security Basics for Your Business or NonProfit

Here’s an article that explains the basics of enterprise-class email security in plain English. Business-class email security should include: advanced phishing protection to protect against impostor email threats; spam and malware filtering; and URL screening to...

Five Reasons Why you Need to Test Your Back-Up Regularly

Trying to manage your own data backup using a “do it yourself” consumer backup service such as Carbonite or Mozy? If you have a backup, but you’re not test-restoring at least once per month, then you don’t really have a backup. Here are five reasons...

Business Email Compromise Attempts Are a Big Problem

According to this article on the Health IT Security web site, business email compromise attempts doubled in 2018. Business email compromise occurs when a hacker attempts to impersonate an employee (usually an executive) in order to request money be transferred from...