Posts

Latest Posts from Our Blog

Social Engineering

Social Engineering: How to keep your business safe

By Jeff Fowler | December 13, 2022
Categories: , ,

What is social engineering? Social engineering involves manipulating users to give confidential information to people who should not have access to it. Common targets include banking and credit card info, passwords, social media access & computer access. The reason they resort to social engineering is that it’s much easier to trick a human than to…

Read More
find hidden programs

How can I find hidden programs running in the background?

By Matt Ballard | December 5, 2022
Categories: , , , , ,

There are programs and utilities that run in the background of every computer. Some of these programs are necessary for your system to function. Others may be malware, adware, or malicious programs designed to hijack your computer or personal information. Let’s discuss some ways to access these hidden background programs: Windows Task Manager Most people…

Read More
employee phishing

Don’t Get Phished!

By Doyle Sanders | November 29, 2022
Categories: , , ,

There has been a lot of local news and buzz lately about phishing activities and not the ones where you catch dinner! Emails, websites, and even telephone calls can be phishing expeditions by the less than trustworthy.  We’ve all heard of folks hit by identity theft.  And, yes, sometimes that comes from hackers and the…

Read More
Google Search Tricks

Ultimate Google Search Tips and Tricks Cheat Sheet

By Jeff Fowler | November 22, 2022
Categories: , ,

We’ve done a few posts in the past regarding tips and tricks using Google, such as “5 Google Search Tricks You May Not Know“, but as you know, there are hundreds of things that Google can do. We would like to share some of our top Google Search Tips and Tricks in this “Cheat Sheet”.…

Read More
TWO FACTOR AUTHENTICATION

What is Two Factor Authentication?

By SandStorm IT | November 15, 2022
Categories: , ,

Two Factor Authentication, commonly abbreviated 2FA, is a second layer of authentication in addition to your password used to keep your accounts safe. Typically, a code is sent to your phone (by text or application) every time you sign into your account. You enter this code after you receive it to finish the login process.…

Read More
small business

Bigger isn’t always better: Why working with a small business can be awesome!

By Jeff Fowler | November 8, 2022
Categories: ,

Small Businesses are the driving force behind the US Economy. The U.S. Small Business Association (SBA) estimates that there are nearly 28,000,000 small businesses that employ 56,000,000 workers while creating 2 out of every 3 new jobs. You would be surprised at just how many small businesses are in your city that you didn’t know…

Read More
Purchasing a New Computer

Five Things to Consider When Purchasing a New Computer (Updated 11/2022)

By SandStorm IT | November 1, 2022
Categories: , , ,

When shopping for a new computer, it’s easy to get overwhelmed by the sheer amount of options. The purpose of this article is to highlight some of the most important factors when deciding which PC is right for you or your business. 1. What will the PC be used for? This question should always be…

Read More

The Holidays Are Coming… And So Are The Scams

By Jeff Fowler | October 25, 2022
Categories: , ,

The holiday shopping season is coming up, which means you’re probably spending more time shopping online than at any other time of the year. In today’s post, we’ll go over some of the common scams and give some tips to avoid being scammed this time of the year. Fake Websites In the next few months,…

Read More
need a website

Bad Battery Life on your device? Here are a few things to check.

By SandStorm IT | October 17, 2022
Categories: , , , , ,

Smartphones are the new way of life in today’s day-to-day life. We can do anything we need to do on a computer from a handheld device. But, what happens if your device’s battery life doesn’t last? In this post, we’ll discuss a few things that you can look at to extend the battery life of your device. Charging…

Read More

Should You Outsource Your Network Support & Management?

By Jeff Fowler | October 11, 2022
Categories: , , , , , , , , ,

When decisions are being made about who is managing their network, there is sometimes debate whether in-house is a better option than using a trusted IT partner. In this post, we’ll help you determine which side of the grass is greener. Network Outsourcing is the forming of a relationship with a 3rd party IT Provider…

Read More

Connect w/ Us:

Subscribe to Our Newsletter