Blog

  • November 15, 2019

    A Voicemail Scam Through Email

    A Voicemail Scam To Watch Out For Just this week, I got two voicemail messages in my email, what’s referred to as  ‘wave’ files that you can listen to. The first one got me to open the email. It said the message was sent by my audio message system, and it had the date the […]

    Full Article.....
  • November 07, 2019

    What to Expect When We Have Scheduled IT Work

    We often schedule specific times to work on your computers. We might have time set aside to troubleshoot an issue, upgrade software, or setup new equipment, for example. Based on our relationship with you and our experience with the task at hand, we estimate about how long we’ll need, then we schedule that time block […]

    Full Article.....
  • October 30, 2019

    How To Get Anything You Want; Book Review

    How To Get Anything You Want by Nido Qubein I had a chance to hear Mr. Qubein speak at an industry event. I was moved by his presentation, and even found myself leading some moments of audience clapping in response to his comments. I also ended up in the elevator with him as he was […]

    Full Article.....
  • October 24, 2019

    Top Tips to Protect Against Social Engineering Attacks

    Every year, millions of attacks are successfully carried out against businesses like yours. It’s important to know what you’re up against and how to protect yourself. The most common social engineering tactic is phishing, often coupled with a strategy of pretexting. By gaining the trust of the victim, hackers are able to lure them into […]

    Full Article.....
  • October 17, 2019

    Question Behind the Question, a Book Review

    QBQ! By John G Miller When it comes to personal accountability, Mr. Miller believes we can make better choices. He starts with a great story about a young waiter, Jacob Miller, who found an interesting way to accommodate his customer’s request. When faced with a problem, we have choices as to how we respond. The […]

    Full Article.....
  • October 13, 2019

    Evite Data Breach and Your Info

    Several family and friends love to use Evite for their party invitations. It’s convenient and works well. Since I reply to these invitations, it seems I’m on their mailing list. On June 12th, I received an email from Evite about a data breach. It seems they noticed unauthorized access on April 15th (two months earlier) […]

    Full Article.....
  • October 03, 2019

    Tips and Tricks; Sage 100 Contractor Users

    Why do some note pads take forever to save and close? How do I know what version I’m running or what modules I have? How do I select a job/client/employee in a print screen without having to look up the number first? Saving the Note Pad Takes Forever: Here’s a simple ‘fix’ for a lingering […]

    Full Article.....
  • September 29, 2019

    Microsoft As An IT Provider? What’s Your Time Worth?

    We were visiting a prospect, performing a Network Review, and the owner said he had been using Microsoft as his outside IT support. He’d found a good guy who was willing to help, although not always available. Call wait-times can be incredibly long, and not all IT-related problems have anything to do with the Microsoft […]

    Full Article.....
  • September 24, 2019

    Sage 100 Contractor v22 – Upgrade Now or Later?

    Should you upgrade Sage 100 Contractor to version 22 now or later? Sage 100 Contractor version 22 came out in June 2019. There are some great new features. And, if you have W-2 staff in Massachusetts, you’ll want to get educated and you may need the new Pay Type in version 22. We also have […]

    Full Article.....
  • September 18, 2019

    Capital One Security Breach – Human Error

    You probably heard this in the news; in July 2019, Capital One had a security breach. This was one of the largest data breaches in US history, 106 million accounts over 14 years; 140K SS #’s, 80K bank account #’s, according to an August 9th article by Spencer Israel for Benzinga. Next was Equifax in […]

    Full Article.....