Connect2geek.com Logo
CALL US
208-468-4323
FOLLOW US
  • Home
  • About
  • Services
    • Protect IT
    • Home Services
    • Business Services
  • Testimonials
  • Blog
  • Contact
  • Support
    • Book a Time
    • New Client Form (Residential)
    • New Client Form (Business)
    • Customer Portal
    • Secure Support
  • Hire Us

Learn Safe Setup Practices for IP Security Cameras

November 10, 2022 by Glen Michaelson

Learn Safe Setup Practices for IP Security Cameras

Internet security cameras – commonly known as IP security cameras – are becoming an increasingly popular way to improve home security. Many people use these cameras to keep an eye on their home, children or pets when out of the house. In fact, at the end of 2021, over one billion surveillance cameras were estimated to have been installed worldwide. [Read more…]

Filed Under: Blog Post

Share:

VoIP: The Basics

November 1, 2022 by Glen Michaelson

VoIP: The Basics

VoIP, or Voice over Internet Protocol, is a technology that enables the transmission of phone calls over the internet instead of traditional landlines. These systems are fast becoming the backbone of business communications. Research shows that businesses in the United States installed over 35 million VoIP lines between 2010 and 2018, reaching a total of 41.6 million. [Read more…]

Filed Under: Blog Post

Share:

Is Your Network Secure? Make Sure You’re Doing These Five Things!

October 26, 2022 by Glen Michaelson

Is Your Network Secure? Make Sure You’re Doing These Five Things!

Small business IT networks face a multitude of complex threats today. Cyber-attackers are becoming more stealthy and sophisticated. If your network security isn’t up to scratch, you could fall victim to a data breach.    [Read more…]

Filed Under: Blog Post

Share:

Easy Setup Steps to Help You Get Started with Microsoft Teams

October 19, 2022 by Glen Michaelson

Easy Setup Steps to Help You Get Started with Microsoft Teams

Microsoft 365 is a powerhouse of a platform for employee collaboration and productivity. One of the solution’s most loved features is Microsoft Teams, an application that blends features associated with well-known tools like Slack, Asana and Trello.  [Read more…]

Filed Under: Blog Post

Share:

Recognize Cybersecurity Awareness Month by Getting Back to the Basics

October 12, 2022 by Glen Michaelson

Recognize Cybersecurity Awareness Month by Getting Back to the Basics

Cybersecurity Awareness Month is a great opportunity to remind yourself and your employees about the importance of cybersecurity in business. With cyber-attacks on the rise and a data breach seemingly in the news every day, it’s more important than ever to stay cyber aware.  [Read more…]

Filed Under: Blog Post

Share:

What Are The Benefits Of Using Conditional Access With MFA?

October 1, 2022 by Glen Michaelson

What Are the Benefits of Using Conditional Access with MFA?

Controlling access to crucial information is becoming increasingly difficult in recent times, where data is getting a lot more essential. Errors in the control of access to information endangers a business’s cyber security and the entire organization. To control this increasing risk, many companies support the practice of bringing self-owned devices in place of distributing the ones managed from a centralized source, posing further threats to network security.  [Read more…]

Filed Under: Blog Post

Share:

5 Errors That Can Negate Your Staff Cybersecurity Training

September 28, 2022 by Glen Michaelson

5 Errors That Can Negate Your Staff Cybersecurity Training

Cybercriminals are becoming more intelligent and savvier in their attacks. And firms with no or little cybersecurity training programs are open to imminent cyber-attacks. [Read more…]

Filed Under: Blog Post

Share:

Overview of Viva Sales – Microsoft’s Brand-New Application for Sales Teams

September 21, 2022 by Glen Michaelson

Overview of Viva Sales - Microsoft's Brand-New Application for Sales Teams

Most of your time as a salesperson is spent on administrative duties like updating your CRM system with new data. Time is money for sellers, and relationships are crucial. According to sales research, 34% of salespersons dedicate their time to closing deals. On the other hand, most sales teams struggle with tasks like quote creation, data entry, and other activities that take their focus away from customers. This, therefore, calls for a balance. [Read more…]

Filed Under: Blog Post

Share:

Tips For Using A BYOD Mobile Policy Safely

September 14, 2022 by Glen Michaelson

Tips for Using a BYOD Mobile Policy Safely

Bring Your Own Device, or BYOD, is becoming increasingly common, and this trend is expected to continue. According to a study, up to 67% of workers use their devices for work. [Read more…]

Filed Under: Blog Post

Share:

5 Things You Can Do to Mitigate Insider Threats at Your Business

August 31, 2022 by Glen Michaelson

5 Things You Can Do to Mitigate Insider Threats at Your Business

External security threats aren’t the only major concern for businesses. Your business may be on the verge of losing millions to threats from your organization.  Ponemon Institute’s report in 2022 revealed that insider threats have increased by 44% in the last two years, and the average cost per occurrence has risen to $15.8 million.  [Read more…]

Filed Under: Blog Post

Share:

  • « Previous Page
  • 1
  • 2
  • 3
  • 4
  • 5
  • …
  • 19
  • Next Page »

Services

  • VoIP Services
  • Computer Repair
  • Network Support
  • Data Recovery
  • Managed Services
  • Office 365
  • 24/7 Monitoring
  • Managed Cybersecurity Services
Click to Protect Your PC Now Webinars hosted by Glen Michaelson

FOLLOW US

Copyright © 2023 · Connect2geek.com