Mobile device encryption defined

As the line between work and life continues to blend, two devices are standing out as major change agents. Those devices are the smartphone and to a lesser, but growing, extent the tablet. It's common to see someone on their 'day off' checking their work email on...

Who knows your important passwords?

When it comes to disasters, people and businesses tend to think big, really big. Take for example Superstorm Sandy that hit the eastern US earlier in November. It can be pretty much guaranteed that a whole string of businesses will be preparing diligently for the next...

How to identify different kinds of spam

Spam was introduced in the late 1930s as a tinned form of ham that was easy to eat. It quickly became ubiquitous, so much so, that in 1970 Monty Python created a skit about a couple who go to a diner where Spam is in nearly every dish. Throughout the comedy sketch,...

Want to customize Windows 8?

Windows 8 is out, and with it comes a prettied up User Interface (UI) that is geared towards tablet and touchscreen device users. One thing that is de rigueur for all operating systems is the ability to customize it to meet your needs and preferences. As Windows 8 is...

How to use Pinterest to boost marketing

Social networks are something that have become a major marketing tool for all companies. A maintained presence on the major networks will help establish/solidify your brand, and possibly drive traffic and interest to your website. One of the newest social media...

The dangers of free Internet access

It's Monday afternoon, do you know what your employees are doing? Working you say? While some employees are working, John is on the local job board surfing for jobs and Sally has just logged into her personal email, clicked on an attachment and downloaded a virus....

6 things to keep in mind about policies

Rules are an integral part of society, they help define the boundaries of who we are and what we can do. Somewhere along the line, rules have become more of a societal term while the term policies has come to define rules for organizations and governmental...

What do I need to run Windows 8?

Windows 8 is out and there's been a bunch of news and reviews. As with most all technical products there are a ton of different opinions on whether it's any good or not. Windows 8 does bring some big changes and will appeal to offices looking to upgrade. However, if...

When and how to delete posts on Facebook

Trolls are powerful creatures of Norse mythology, known for being reclusive beings that lived largely separated from other humans and generally viewed as mean and not contributing to society. The modern troll has gone online and lurks on forums and other sites, making...

Windows 8 amps up OS security

The security of devices that connect to any network is normally a concept that is top of the mind for IT professionals managing networks. If there is a breach, then data could be compromised on all systems on the network. If you're working on a new form of renewable...

FIND OUT WHAT YOUR BUSINESS SHOULD EXPECT TO PAY
FOR HOUSTON TECH SUPPORT

Give us a call and discover how great local IT services and computer support can be!