What is ransomware? Well, this is a great question and something our team at STS is asked many times throughout the week. So…we put together a short video on what exactly ransomware is. In order to view this video on our YouTube page, simply click right here. I promise this link is good. If you […]
Have you heard of the IF function in Microsoft Excel? IF not 🙂 check out this week’s tech training from STS. Can’t see the video above? Just click here. Have questions about our services and how we can help your organisation? Give me a ring anytime.
*|FNAME|*, There are many factors that go into choosing the right IT provider, not the least of which is how your provider handles cybersecurity. You may think everything looks good on paper, but without asking a few important questions before you sign a contract with them, you could find yourself without coverage you thought was […]
Your Anti-Virus Software & Firewalls WON’T Protect Your Machines Against this Dangerous Type of Ransomware! Ransomware has quickly become a huge threat to businesses of all types and sizes. Not sure what ransomware is all about? Allow us to explain: ransomware is a form of malware that infects machines, then encrypts all of the files […]
Is your business prepared to weather an information technology disaster? It’s more than just putting money aside to repair your computers if they break down. Imagine how much time you might lose if you couldn’t use your every-day electronic systems: being unable to access your important client records, kept from accessing your email or the […]
As a business owner, the decision between outsourcing vs. in-house IT support can be difficult and time consuming. Ultimately, you want to choose the most effective way to support your IT systems and end-users. But how do you know which option is the most effective for your business? Let’s start by defining the word “outsourcing,” […]
Acceptable vs. Unacceptable Social Media Behavior Social media is extremely popular for consumers and businesses alike. A well-structured social media plan can be powerful when successfully launched, but it can also become a disaster if employees aren’t knowledgeable about acceptable and unacceptable social media behavior. Many business owners struggle when developing policies to make sure […]
Did you know smartphones collect GPS location information? Even more surprising, newer smartphone models with the latest-generation cameras will broadcast GPS location information to your digital photos online. There’s many factors to consider when it comes to GPS data privacy while using your smartphone. Here are 4 important facts about GPS data privacy to help […]
New memory-scraping malware was recently released to steal payment card data from point-of-sale (PoS) systems. According to cyber security firm, IntelCrawler, the malware, known as Decebal can steal encrypted data on the magnetic stripe of credit or debit cards. What makes this new malware different from previous forms of memory-scraping malware? The practice of a […]
A disaster recovery test evaluates your business continuity and disaster recovery plans to ensure they are functional and efficient in the event of a disaster. It’s critical to test your disaster recovery plan on a regular basis to ensure critical applications and operations continue operating after an interruption of service. There are three major areas […]
Just short of bringing you coffee, the new Google Now feature acts like a personal assistant. Compare it to Apple’s Suri, but on steroids. Google Now can react to voice inquiries; proactively alert you of useful information such as traffic jams or warn of package delivery to your door and much more. Proactive means it […]
There is a collection of tips on the internet for saving your phone battery. Some of them, though, seem unrealistic, such as dimming your screen so low you can barely read it or turning off features you truly need on a regular basis [I.E. putting it in Airplane mode]. What is a better use of […]