Connect2geek.com Logo
CALL US
208-468-4323
FOLLOW US
  • Home
  • About
  • Services
    • Protect IT
    • Home Services
    • Business Services
    • Managed Cybersecurity for Microsoft 365
  • Testimonials
  • Blog
  • Contact
  • Support
    • Book a Time
    • New Client Form (Residential)
    • New Client Form (Business)
    • Customer Portal
    • Download Remote Support Tool
  • Hire Us

6 Smart Ways to Use Microsoft Teams for Successful Collaboration

November 27, 2019 by Glen Michaelson

6 Smart Ways to Use Microsoft Teams for Successful Collaboration

Team collaboration tools have become a popular way to tame the email overload that plagues many offices. It offers real-time communication, file sharing, and other productivity-boosting benefits. [Read more…]

Filed Under: Blog Post

Share:

How ThreatLocker Can Provide Your Business Complete Protection of Your Applications & Data

November 13, 2019 by Glen Michaelson

How ThreatLocker Can Provide Your Business Complete Protection of Your Applications & Data

Businesses face sophisticated threats on a number of fronts. From constant phishing attacks to Ransomware infections to file-less intrusions that use trusted software against you, attacks come from all areas of your technology infrastructure. [Read more…]

Filed Under: Blog Post

Share:

Wi-Fi 6 (802.11ax) Is Officially Out! Now What? Learn All About this Improved Wi-Fi Standard

October 16, 2019 by Glen Michaelson

Wi-Fi 6 (802.11ax) Is Officially Out! Now What? Learn All About this Improved Wi-Fi Standard

It’s been 5 years since the standard used by wireless routers and devices was last updated and 15 years since there was a new Wi-Fi security protocol. After the long wait, the new standards have been launched, and the world is in for faster, better, and more secure Wi-Fi. [Read more…]

Filed Under: Blog Post

Share:

Protecting the Keys to the Kingdom: How to Manage Your Passwords Effectively

October 2, 2019 by Glen Michaelson

Protecting the Keys to the Kingdom: How to Manage Your Passwords Effectively

Passwords have become one of the most sought-after commodities by hackers looking to sell credentials on the Dark Web. Criminals will pay good money for stolen passwords because they know there’s a chance just a single password will open multiple online accounts. [Read more…]

Filed Under: Blog Post

Share:

Local Administrator Rights are Putting Your PC in Danger! (Here’s What to Do)

September 18, 2019 by Glen Michaelson

Local Administrator Rights are Putting Your PC in Danger! (Here’s What to Do)

When setting up any type of PC operating system or software access there is always a balance between security and ease of use. Unfortunately, ease of use often wins out, leaving systems vulnerable and easily infected by a virus or malware. [Read more…]

Filed Under: Blog Post

Share:

5 Eye-Opening Reasons You Should Never Let Your Browser Store Passwords

September 4, 2019 by Glen Michaelson

5 Eye-Opening Reasons You Should Never Let Your Browser Store Passwords

You’re setting up yet another new login for a new cloud service, your browser asks if you’d like to save your password, you click “yes” without even thinking about it because it’s going to save you time later.

[Read more…]

Filed Under: Blog Post

Share:

Work Smarter with a New QuickBooks Access Solution for Accounting, Tax & CPA Firms

August 7, 2019 by Glen Michaelson

Work Smarter with a New QuickBooks Access Solution for Accounting, Tax & CPA FirmsThere has always been a challenge in the world of finance when it comes to accessing company files in QuickBooks. They’re often kept securely in a hard drive of a computer or server, which makes sharing them with the appropriate parties that need access difficult at times. [Read more…]

Filed Under: Blog Post

Share:

Learn the Secrets to Securing & Protecting Your PC… the Easy Way!

July 24, 2019 by Glen Michaelson

Learn the Secrets to Securing & Protecting Your PC… the Easy Way!No matter how sophisticated computers get, it seems that malware and viruses are always a present and looming threat. And it’s not always obvious that you have one lurking on your hard drive, because many of them are designed to go into “stealth mode.” [Read more…]

Filed Under: Blog Post

Share:

What’s the Difference Between a Data Backup and a Disaster Recovery Solution?

July 10, 2019 by Glen Michaelson

What’s the Difference Between a Data Backup and a Disaster Recovery Solution?

Keeping a separate copy of your data isn’t just a good rule of thumb these days, it’s vital to protecting your business from an irrecoverable data disaster. There are multiple things that put a company’s data at risk and any one of them could cost hundreds of thousands of dollars or even cause them to shut their doors completely. [Read more…]

Filed Under: Blog Post

Share:

How to Defend Against Dangerous Ransomware Attacks (They’re on the Rise!)

June 26, 2019 by Glen Michaelson

How to Defend Against Dangerous Ransomware Attacks (They’re on the Rise!)

An evolved form of the standard computer virus, ransomware is a malware that first came into widespread use around 2012. Since that time, this particular cybercrime has continued to grow and spread. [Read more…]

Filed Under: Blog Post

Share:

  • « Previous Page
  • 1
  • …
  • 15
  • 16
  • 17
  • 18
  • 19
  • …
  • 21
  • Next Page »

Services

  • VoIP Services
  • Computer Repair
  • Network Support
  • Data Recovery
  • Managed Services
  • Office 365
  • 24/7 Monitoring
  • Managed Cybersecurity Services
Click to Protect Your PC Now Webinars hosted by Glen Michaelson

FOLLOW US

Copyright © 2025 · Connect2geek.com