Videos

IT Security Tip #13 - Don't Use Public WiFi Until You Hear This

This video is about the precautions you should take when connecting to public WiFi.

IT Security Tip #12 - The Dangers Of Dropbox And Other File Sync Apps

If you’re using Dropbox, Google Drive or other consumer-grade file sync and sharing cloud applications, listen up! These applications pose a huge threat to your company because company data can be spread far and wide without central oversight of what ...

IT Security Tip #11 - What To Do Before You Go To Starbucks

So you’re in the car on the way home from Starbucks, basking in the glow of consuming your triple-shot, low-foam, extra-hot pumpkin-spice latte when you suddenly realize your laptop has gone missing. You drive back like the caffeinated lunatic you ...

IT Security Tip #10 - Remove That Unwanted Freeware

Like it or not, PC manufacturers LOVE to stuff your brand-new PC full of “free” applications (they get paid to do it, so you’ve got a slim chance of getting one without a side of spamware). But clutter is the ...

IT Security Tip #9 - If You Installed It, You Must Update It!

There are thousands of hackers who get up every morning with ONE goal in mind: to find a new vulnerability in a commonly installed software (like Adobe, Flash or QuickTime) to access your computer. That’s why these companies frequently issue ...

TechTip April 2016 - Should You Move Your Business To The Cloud?

Cloud computing is a concept that could possibly save your business quite a bit of money on software, hardware, upgrades and services. Instead of purchasing hardware and software for your office, you can use “the cloud” to put your programs ...

IT Security Tip #8 - Bookmark The Legitimate Websites You Frequently Visit

Here’s a sneaky trick used by many hackers: they purchase and set up a fraudulent web site that is a close misspelling of a legitimate one. Example: www.faceboook.com instead of www.facebokk.com. All you have to do is accidentally fat-finger ONE ...

IT Security Tip #7 - Never Use Personal Devices To Connect To Company Data

You’re a hardworking team player who likes to check e-mail and get a few things done after hours – all good! But here’s something you might not know: you should never access company data, file servers or applications through personal ...

IT Security Tip #6 - How To Spot A Phishing E-Mail

A phishing e-mail is a bogus e-mail that is carefully designed to look like a legitimate request (or attached file) from a site you trust in an effort to get you to willingly give up your login information to a ...

IT Security Tip #5 - How To Foil Ransomware

Not too long ago, the CryptoLocker ransomware virus was all over the news, infecting over 250,000 computers in its first 100 days of release (at least that’s the number reported – the real numbers are probably MUCH higher). The threat ...

Contact

Progressive Computing