Greg Brown

Best Practices for File Safety

File storage is something that many computer users have traditionally not thought about. Instead, they kept files on their computers and hoped that their computer continued to work so their files were always available. A computer crash could very...

How To Set Up Multi-Factor Authentication for Google And Microsoft

Multi-Factor Authentication (MFA) is the use of more than one security mechanism to access your accounts instead of the outdated way of setting a single password you can remember (or unfortunately write down where others can access it) and hope...

Managed Services – What It Is And How We Are Different

What exactly is Managed Services? Managed Services in Information Technology is a proactive relationship between a client and an IT Organization that can support and properly guide an organization to use the most current industry best practices...

Human Firewalls: What They Are And Why They're Important

What are Human Firewalls?

Human Firewalls are comprised of a group of people from your organization with a mission to detect scams such as ransomware or phishing attacks that sometimes bypass your computer security systems. These attacks need a...

Is your IT person good? A guide on how to tell

It’s a great question that I feel doesn’t get asked a lot. But is good enough? Why not look for great? Amazing? Outstanding?

Subscribe Here For Our Blogs:

Recent Posts