Connect2geek.com Logo
CALL US
208-468-4323
FOLLOW US
  • Home
  • About
  • Services
    • Protect IT
    • Home Services
    • Business Services
    • Managed Cybersecurity for Microsoft 365
  • Testimonials
  • Blog
  • Contact
  • Support
    • Book a Time
    • New Client Form (Residential)
    • New Client Form (Business)
    • Customer Portal
    • Download Remote Support Tool
  • Hire Us

Windows 8.1 Has Just Reached End-of-Life. What It Means For Security

February 8, 2023 by Glen Michaelson

Windows 8.1 Has Just Reached End-Of-Life. What It Means For Security

Are you still running Windows 8.1 on your computer? If so, it’s time to take notice. Microsoft’s popular operating system, Windows 8.1, released in 2013, officially reached end-of-life (EOL) status on January 10, 2023, meaning the tech giant will no longer provide technical support or security updates. 

[Read more…]

Filed Under: Blog Post

Share:

Why Data Protection, Not Just Data Backup, Should Be Your Focus

February 1, 2023 by Glen Michaelson

Why Data Protection, Not Just Data Backup, Should Be Your Focus

Are you only focusing on data backup and ignoring data protection? Think again! Data protection is more crucial than ever, with rising attacks, human error, and software bugs. 

[Read more…]

Filed Under: Blog Post

Share:

7 Email Security Tips Your Business Needs to Adopt

January 25, 2023 by Glen Michaelson

7 Email Security Tips Your Business Needs to Adopt

Since almost every business uses emails to exchange important and confidential information, emails have become one of the primary subjects of attack by cybercriminals. [Read more…]

Filed Under: Blog Post

Share:

What’s New in Microsoft 365?

January 18, 2023 by Glen Michaelson

What’s new in Microsoft 365?

In the past few years, businesses have learned about the possibility of having virtual offices and access to markets through various digital platforms. They have also rapidly requested IT experts to help set up the digital platforms required. [Read more…]

Filed Under: Blog Post

Share:

How to Start a Vulnerability Management Program

January 11, 2023 by Glen Michaelson

How to Start a Vulnerability Management Program

Vulnerability Management is commonly referred to as the process of identifying, classifying, mitigating, and remediating vulnerabilities. It also involves reporting, prioritization, and reaction to network vulnerabilities.  [Read more…]

Filed Under: Blog Post

Share:

Upcoming 2023 Trends to Leverage

January 4, 2023 by Glen Michaelson

Upcoming 2023 Trends to Leverage

Technologies are evolving at a fast rate, and new versions of the existing ones get released daily, causing an increase in the rate of changes. Therefore, companies must keep updating their tools to stay competitive in a technology-driven environment.   [Read more…]

Filed Under: Blog Post

Share:

3 Things That Are Proven to Lower the Cost of a Data Breach

December 28, 2022 by Glen Michaelson

3 Things That Are Proven to Lower the Cost of a Data Breach?

According to a 2022 report from IBM and Ponemon Institute (the 17th report of its kind since its inception), the cost of a data breach hit a record high of 4.35 million US dollars. This report is sourced from about 500 hack attacks in fifteen industries across seventeen countries, with data from over 3500 interviews.  [Read more…]

Filed Under: Blog Post

Share:

Is Your Company a Sitting Duck Because of Cloud Misconfiguration?

December 21, 2022 by Glen Michaelson

Is Your Company a Sitting Duck Because of Cloud Misconfiguration (

Cloud misconfiguration is one of the most common cloud security threats. It involves any error, loophole, or problem in the cloud that could be a threat to valuable assets and information stored on the cloud.  [Read more…]

Filed Under: Blog Post

Share:

Does My Company Really Need to Pay Attention to the Metaverse?

December 14, 2022 by Glen Michaelson

Does My Company Really Need to Pay Attention to the Metaverse?

The internet and other channels have given us the best experience to maximize productivity for business, which could make one skeptical about the success of another option. Have you ever thought of a virtual replica of yourself and your Company, one where you can interact and work with other people without being physically present?  [Read more…]

Filed Under: Blog Post

Share:

Mobile Malware is Increasing Rapidly: Steps to Reduce your Risk

December 7, 2022 by Glen Michaelson

Mobile Malware is Increasing Rapidly: Steps to reduce your Risk

Malware can make everything about your device feel off. The random unwanted pop-ups, unauthorized charges on your accounts, overheating, frequent freezing, and crashing, frustrate users’ experience. More harm than this can be caused due to the increasing frequency of Mobile malware Attacks. Research showed a 500% increase in mobile Malware in 2022 and also an 80% increase in banking malware attacks on Android devices; this is high and calls for mobile defense. [Read more…]

Filed Under: Blog Post

Share:

  • « Previous Page
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • …
  • 21
  • Next Page »

Services

  • VoIP Services
  • Computer Repair
  • Network Support
  • Data Recovery
  • Managed Services
  • Office 365
  • 24/7 Monitoring
  • Managed Cybersecurity Services
Click to Protect Your PC Now Webinars hosted by Glen Michaelson

FOLLOW US

Copyright © 2025 · Connect2geek.com