Connect2geek.com Logo
CALL US
208-468-4323
FOLLOW US
  • Home
  • About
  • Services
    • Protect IT
    • Home Services
    • Business Services
    • Managed Cybersecurity for Microsoft 365
  • Testimonials
  • Blog
  • Contact
  • Support
    • Book a Time
    • New Client Form (Residential)
    • New Client Form (Business)
    • Customer Portal
    • Download Remote Support Tool
  • Hire Us

Is It Okay to Sign Into Other Sites With Your Facebook, Google, or Apple ID?

November 10, 2021 by Glen Michaelson

Is It Okay to Sign Into Other Sites With Your Facebook, Google, or Apple ID?

Most people agree that there are just too many passwords to keep up with these days. It’s estimated that the average person now has 100 passwords to manage between their various personal and work accounts and apps. [Read more…]

Filed Under: Blog Post

Share:

9 Important Online Security Tips to Share from Cybersecurity Awareness Month

November 3, 2021 by Glen Michaelson

9 Important Online Security Tips to Share from Cybersecurity Awareness Month

We’ve just completed Cybersecurity Awareness Month and it’s the perfect time to take that reminder of the importance of IT security and infuse it into the rest of the year. [Read more…]

Filed Under: Blog Post

Share:

7 Helpful Tips for Keeping Shared Cloud Storage Organized & Efficient

October 27, 2021 by Glen Michaelson

7 Helpful Tips for Keeping Shared Cloud Storage Organized & Efficient

Most files are now stored digitally, which makes them easier to access than paper files, but also leads to problems searching for files. If company cloud storage isn’t kept organized, productivity can suffer across the organization. [Read more…]

Filed Under: Blog Post

Share:

Take These Vital Security Steps Before Eliminating a Company Mobile Phone Number

October 20, 2021 by Glen Michaelson

Take These Vital Security Steps Before Eliminating a Company Mobile Phone Number

People think nothing of switching out their cell phones and even mobile numbers. These days, getting a number from anywhere in the U.S. is as easy as making the request to your mobile provider or choosing the number from a VoIP interface. [Read more…]

Filed Under: Blog Post

Share:

What Types of Questions Are Asked When Applying for Cybersecurity Insurance?

October 13, 2021 by Glen Michaelson

What Types of Questions Are Asked When Applying for Cybersecurity Insurance?

Due to the rise in cybercrime and the increased reliance on technology, a new type of insurance is becoming more popular with business owners – Cybersecurity Insurance.  [Read more…]

Filed Under: Blog Post

Share:

The Benefits of a UCaaS Solution Over a Single Voice or Video Application

October 6, 2021 by Glen Michaelson

The Benefits of a UCaaS Solution Over a Single Voice or Video Application

The changes that the pandemic has brought about have meant that virtual communications are more important than ever. Video meetings have become the new default way to get together, and cloud-based processes are a must. [Read more…]

Filed Under: Blog Post

Share:

How Can We Root Out & Stop Unauthorized Cloud App Use?

September 22, 2021 by Glen Michaelson

How Can We Root Out & Stop Unauthorized Cloud App Use?

Remote working wasn’t the only thing to increase during the pandemic, there was also a rise in authorized cloud use for work (also known as shadow IT). It’s estimated that the number of unknown apps used for business data is at least 10x that of known applications. [Read more…]

Filed Under: Blog Post

Share:

Things You Should Never Do on Your Work Computer

September 15, 2021 by Glen Michaelson

Things You Should Never Do on Your Work Computer

The days when a work PC was left at the office are gone for many people. The pandemic has changed the look of the traditional office dramatically and accelerated the rise of the remote and hybrid workforce. [Read more…]

Filed Under: Blog Post

Share:

5 Best Practices for Implementing MFA to Reduce Resistance

September 8, 2021 by Glen Michaelson

5 Best Practices for Implementing MFA to Reduce Resistance

Cybercriminals follow the data when planning their attacks, and lately, that’s meant more attacks on company cloud accounts. Even before the pandemic, companies in Idaho and around the world were transitioning more of their work processes and files to the cloud. The pandemic just accelerated this process. [Read more…]

Filed Under: Blog Post

Share:

What Can You Expect From Windows 11?

September 1, 2021 by Glen Michaelson

What Can You Expect From Windows 11?

Time sure flies. It seems like we just got used to Windows 10 and now its successor is about to be released later this year. Windows 11 comes just as Windows 10 reaches about four years before retirement. [Read more…]

Filed Under: Blog Post

Share:

  • « Previous Page
  • 1
  • …
  • 8
  • 9
  • 10
  • 11
  • 12
  • …
  • 21
  • Next Page »

Services

  • VoIP Services
  • Computer Repair
  • Network Support
  • Data Recovery
  • Managed Services
  • Office 365
  • 24/7 Monitoring
  • Managed Cybersecurity Services
Click to Protect Your PC Now Webinars hosted by Glen Michaelson

FOLLOW US

Copyright © 2025 · Connect2geek.com