Insights

Posts about

Best Practices

How do i lock or log off my computer?

Windows 10 and other operating systems store all data on a PC based on the logged in user account. It is very common, in family and in public...

Read more
secure data destruction

Best Practices for Data Destruction

Data destruction is the process of destroying data stored on tapes, hard disks, flash drives, and all other storage devices. The purpose is to...

Read more
windows 11 installing screen

Don't install the leaked version of Windows 11. Here's why.

In case you hadn’t heard, Windows 11 is coming. Many rumors have been circulating ahead of the big Windows event on June 24, and then just a few...

Read more
spam inbox screenshot

What to do if important emails are landing in your junk folder

At some point in your career you’ve missed an email you should have received. Perhaps it was an RFP you were waiting on, an invoice you’d been...

Read more
two employees analyzing data on a computer and a flowchart

Self-Assessment: How strong is Your Cybersecurity Plan?

Anyone who has a small to medium-sized business has “an” IT plan, but per a recent study, only 14% of them rate their own cybersecurity plans as...

Read more
old computers and servers

The Importance of a PC Refresh Cycle

Over the past 2 years, I have been investing more time and money in my newfound love/hate relationship with running. One thing I learned early on...

Read more