Jeff Fowler

Latest Posts from Our Blog

5 Questions to Ask Before Buying A Server For Small Business

By Jeff Fowler | July 19, 2022
Categories: , , ,

According to Spiceworks, 98% of companies depend on on-premise server hardware. While Cloud-based solutions are all the rage these days, most businesses just aren’t buying into it. They prefer to continue using on-site hardware. In today’s blog post, we’ll be discussing the questions you should ask before buying a server. Whether you’re in the market…

Read More

5 Questions To Ask Your IT Team To Ensure You Are Secure

By Jeff Fowler | July 12, 2022
Categories: , , ,

Most companies believe that they are in complete control of their security online and that they could never be the target of a cyber criminal. Sorry to be the bearer of bad news, but cyber attacks aren’t just for the big companies. Symantec, a leading security software company, states that 36 percent of all targeted…

Read More
What is VoIP

10 Things To Know About VoIP Phone Systems

By Jeff Fowler | June 28, 2022
Categories: ,

Most people have used or experienced Voice-over-Internet Protocol (VoIP) Phone Systems. The latest VoIP technology is leaps and bounds ahead of analog telephones and older PBX’s. But even if you know the basics of VoIP technology, there are some incredible features that you might not know about yet. In today’s blog post, we’ll go over…

Read More
E-mal Scams

5 Ways To Help Train Your Employees to Recognize Email Scams

By Jeff Fowler | June 21, 2022
Categories: , , ,

You can spend countless dollars on sophisticated anti-malware & firewall systems, but the weakest link will always be the human mind. It’s much easier to trick a human to reveal information than trying to force a computer system into doing it. With that in mind, our topic for today’s blog post deals with training employees…

Read More
data breach

5 Damaging Effects of a Data Breach That Can Sink Your Company

By Jeff Fowler | June 14, 2022
Categories: , ,

Data Breaches are a common talking point in cybersecurity. This is because there’s such a wide array of methods cybercriminals are using to attack businesses. Whether it’s malware, social engineering, or exploiting weak passwords. Any company can be a target, from Fortune 500 companies to small, family-owned businesses. In our blog post, we’ll be discussing…

Read More

8 Common IT Security Risks Facing Your Business

By Jeff Fowler | June 7, 2022
Categories: , , , , , , , , , ,

In today’s rapidly changing business environment, cybersecurity threats to small businesses are becoming more common than ever. With the wide array of threats, your business needs to be prepared on all fronts. In this post, we’ll cover 8 of the most common IT security risks to your business and how Managed Services can assist with…

Read More
Keyboard Shortcut Cheat Sheet

SandStorm IT Keyboard Shortcut Cheat Sheet

By Jeff Fowler | October 4, 2021
Categories: , , , ,

In this post, we’ll keep an ongoing list of keyboard shortcuts from posts that have been listed in previous blog posts like “6 Keyboard Shortcuts You May Not Know” and “6 More Keyboard Shortcuts You May Not Know“. In this “Cheat Sheet”, we’ll have all of them listed, but with more concise descriptions for easier…

Read More
Search Engine Optimization benefit

How can Search Engine Optimization benefit my business?

By Jeff Fowler | August 17, 2021
Categories: , ,

According to the online ad network Chitika, page one of the search results get 95% of all search traffic. The top result usually yields around 32.5% of the clicks. The 2nd place result receives around 17.6% of the clicks. By comparison, the 7th place result sees around 2.2% of the search traffic. Even the top…

Read More
Print Nightmare vulnerability

Microsoft releases fix for “Print Nightmare” vulnerability – Update Now!

By Jeff Fowler | July 9, 2021
Categories: , , , , ,

A new vulnerability was found that takes advantage of a flaw in the print spooler application within Windows. According to Microsoft “A remote code execution vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could…

Read More
iot

Why do I care about IoT?

By Jeff Fowler | June 28, 2021
Categories: , , ,

Welcome to SandStorm IT’s 6-part series about the Internet of Things. In this series, we’ll shed some light on the basics of IoT. Part 1 – What is the Internet of Things (IoT)? Part 2 – Why do I care about IoT? (You are here) Part 3 – What are some real-world applications of IoT? Part…

Read More

Connect w/ Us:

Subscribe to Our Newsletter