Networking

Latest Posts from Our Blog

best location to install my Wireless Router

Where is the best location to install my Wireless Router?

By SandStorm IT | July 5, 2022
Categories: , , ,

Wireless routers should be set in such a location that they maximize availability, signal strength, and speeds. But how do you know where to set a router to best suit your needs? While there is no clear-cut answer, I’m here to help you in determining the best location for your device. Where to put it?…

Read More
facebook

What does Facebook know about you?

By Jordan Sanders | November 9, 2021
Categories: , , , , ,

Facebook, like Google, is a website with many interesting and relevant features that a large portion of the world’s population find useful.  This is evidenced by Facebook.com being the third-most visited website on the Internet according to Alexa (behind Google.com and YouTube.com).  This level of usage puts Facebook in a similar position as Google for…

Read More
multi-site VoIP

How can a multi-site “Voice over Internet Protocol” (VoIP) solution benefit your business?

By Justin Oliver | November 1, 2021
Categories: , ,

Legacy public branch exchanges (PBX)s present a multitude of challenges if your business has multiple locations or remote users.  A VoIP PBX solution can address many of those challenges. Multiple public branch exchanges (PBX)s to maintain, multiple bills from different tel-co providers, multiple systems to learn and train with, and multiple administrative portals all add to…

Read More
crypto currency

What is cryptojacking and how does it affect me?

By SandStorm IT | October 25, 2021
Categories: , , , ,

Cryptojacking is a term that has been making its rounds in the news lately. Rightfully so, many users are worried about being caught up in these attacks. So what is cryptojacking exactly? Basically, cryptojacking is an attack which secretly harnesses the power of your computer to “mine” for cryptocurrencies, which the attackers can later exchange…

Read More
Search Engine Optimization benefit

How can Search Engine Optimization benefit my business?

By Jeff Fowler | August 17, 2021
Categories: , ,

According to the online ad network Chitika, page one of the search results get 95% of all search traffic. The top result usually yields around 32.5% of the clicks. The 2nd place result receives around 17.6% of the clicks. By comparison, the 7th place result sees around 2.2% of the search traffic. Even the top…

Read More
iot

Why do I care about IoT?

By Jeff Fowler | June 28, 2021
Categories: , , ,

Welcome to SandStorm IT’s 6-part series about the Internet of Things. In this series, we’ll shed some light on the basics of IoT. Part 1 – What is the Internet of Things (IoT)? Part 2 – Why do I care about IoT? (You are here) Part 3 – What are some real-world applications of IoT? Part…

Read More
future of IoT

What is the future of IoT?

By SandStorm IT | June 15, 2021
Categories: , ,

Welcome to SandStorm IT’s 6-part series about the Internet of Things. In this series, we’ll shed some light on the basics of IoT. Part 1 – What is the Internet of Things (IoT)? Part 2 – Why do I care about IoT? Part 3 – What are some real-world applications of IoT? Part 4 – What…

Read More
Browser Cookies

What exactly are “Browser Cookies”?

By SandStorm IT | June 8, 2021
Categories: , , , ,

A browser cookie is data sent from a website that will be stored on your computer. Typically, these cookies store data such as cart information on shopping websites, login information when you choose to “Remember Me” while logging in to a website, tracking activity across websites, storing customized settings for websites, and potentially other data…

Read More
devices that connect to IoT

What devices do I have that connect to IoT?

By SandStorm IT | April 27, 2021
Categories: , , ,

Welcome to SandStorm IT’s 6-part series about the Internet of Things. In this series, we’ll shed some light on the basics of IoT. Part 1 – What is the Internet of Things (IoT)? Part 2 – Why do I care about IoT? Part 3 – What are some real-world applications of IoT? Part 4 – What…

Read More
Common Browser-based Network Attacks

Common Browser-based Network Attacks and How to Avoid Them

By Jordan Sanders | February 16, 2021
Categories: , , ,

Day by day, we do more and more through our web browsers.  We perform daily work tasks like checking and sending email, visiting websites to learn about news in our chosen fields, and work in web-based operational systems all through our browsers, and outside of the office, we use those same browsers to check our…

Read More

Connect w/ Us:

Subscribe to Our Newsletter