Software & Applications

Latest Posts from Our Blog

premium e-mail solution

Why should I use a premium e-mail solution instead of free?

By Jeff Fowler | April 11, 2023
Categories: , ,

E-mail is a valuable tool that is absolutely critical in business communication, with most business users checking their e-mail several times a day. According to a recent report by The Radicati Group, there are around 4.4 Billion email addresses currently in use. An e-mail account, whether it’s a free or premium one, is something most…

Read More
wordpress

What is WordPress?

By Jeff Fowler | December 21, 2022
Categories: ,

Do you ever wonder “How is this website built?” or “What software is this site running on?” If you’re like most people, you’ve probably never given it any thought. Your favorite websites are there when you need it and it just works as expected. In this article, we’ll cover one of the most popular website…

Read More
employee phishing

Don’t Get Phished!

By Doyle Sanders | November 29, 2022
Categories: , , ,

There has been a lot of local news and buzz lately about phishing activities and not the ones where you catch dinner! Emails, websites, and even telephone calls can be phishing expeditions by the less than trustworthy.  We’ve all heard of folks hit by identity theft.  And, yes, sometimes that comes from hackers and the…

Read More
Google Search Tricks

Ultimate Google Search Tips and Tricks Cheat Sheet

By Jeff Fowler | November 22, 2022
Categories: , ,

We’ve done a few posts in the past regarding tips and tricks using Google, such as “5 Google Search Tricks You May Not Know“, but as you know, there are hundreds of things that Google can do. We would like to share some of our top Google Search Tips and Tricks in this “Cheat Sheet”.…

Read More
E-mal Scams

5 Ways To Help Train Your Employees to Recognize Email Scams

By Jeff Fowler | June 21, 2022
Categories: , , ,

You can spend countless dollars on sophisticated anti-malware & firewall systems, but the weakest link will always be the human mind. It’s much easier to trick a human to reveal information than trying to force a computer system into doing it. With that in mind, our topic for today’s blog post deals with training employees…

Read More
Keyboard Shortcut Cheat Sheet

SandStorm IT Keyboard Shortcut Cheat Sheet

By Jeff Fowler | October 4, 2021
Categories: , , , ,

In this post, we’ll keep an ongoing list of keyboard shortcuts from posts that have been listed in previous blog posts like “6 Keyboard Shortcuts You May Not Know” and “6 More Keyboard Shortcuts You May Not Know“. In this “Cheat Sheet”, we’ll have all of them listed, but with more concise descriptions for easier…

Read More
Windows Defender good enough

Is Windows Defender good enough to protect me?

By SandStorm IT | July 26, 2021
Categories: , , , ,

The ever threat of viruses, hacking, and security threats are evolving everyday. So many people think to themselves “How can i protect my computer?” There are a lot of different opinions of anti-virus out there. Over the past several years there has been new programs that will help block viruses. But with so many programs…

Read More
Data Loss Prevention (DLP) Software

What is Data Loss Prevention (DLP) Software?

By SandStorm IT | May 11, 2021
Categories: , , ,

Data Loss Prevention (DLP) is software that monitors traffic and prevents sensitive data from leaving your network. Sensitive data could be something as simple as social security numbers or be something as complex as business documents or data that contain proprietary trade secrets. How is DLP used? The most common location for DLP software is…

Read More
Benefits and Risks of Software from the Internet

The Benefits and Risks of Software from the Internet

By SandStorm IT | March 9, 2021
Categories: , , ,

Got a flat tire? You will need a jack, a lug wrench, and a spare. Need to hang a picture? A hammer, nail, and level will set you straight. Almost any problem can be solved with the right set of tools. The same is true with your software on your computer. From writing an essay…

Read More
Common Browser-based Network Attacks

Common Browser-based Network Attacks and How to Avoid Them

By Jordan Sanders | February 16, 2021
Categories: , , ,

Day by day, we do more and more through our web browsers.  We perform daily work tasks like checking and sending email, visiting websites to learn about news in our chosen fields, and work in web-based operational systems all through our browsers, and outside of the office, we use those same browsers to check our…

Read More

Connect w/ Us:

Subscribe to Our Newsletter