Home IT Service Provider Articles
IT Service Provider Articles
Share this article to warn your customers about some new malicious Google Chrome extensions that are using a technique known as "session replay recording" to steal sensitive information. They work by recording mouse movements and keystrokes.
Tech support scams are one of the most used types of social engineering attack, costing the victim on average between $200 and $400. Share this article to let your customers know how these newest scams work and how to avoid becoming a victim.
Share this article with your customers to tell them what to do if visitors use Chrome to view their website and it displays a security warning that is not encrypted. The call to action encourages them to call you for help.
When customers want to set up a personal VPN, they have many options including some that are free. Choosing a free option can have disastrous consequences. Share this article with your customers to educate them on those dangers, and encourage them to contact you for assistance in choosing a better option for their needs.
Google’s Chrome release 68 due out in July 2018 will include a security warning if a website is not encrypted. Show your customers how to check if their website passes the test – and what to do if it doesn’t.
A new tech support scam leverages vulnerabilities in Chrome and Firefox browsers to trick inexperienced victims into paying for unnecessary software and virus removal services. Send this article to your customers and prospects to help them avoid becoming a victim and remind them you are their expert on call.
In recent years, cloud services have become the most popular option for data duplication and storage. The different offerings may confuse some of your customers. Share this article to help them understand the different types of cloud services, and what to expect from each one.
Formatting discrepancies are a common concern for anyone that has to transfer MS Word files between different devices. Share this article to help your customers avoid the common problems with formatting changes that happen when sharing Word files, and remind them you are their expert on call.
Hubs, switches, and routers are all central connection points in wired Ethernet networks which are often confused due to their similar appearance. Here is a closer look at the distinguishing features and capabilities of each network device. Share with your customers and prospects to reinforce your expertise.
Even the smallest business makes use of servers, routers, printers, and a range of specialized software. Use this article to inform your customers of the importance of patch management to keep their devices and systems secured and up-to-date in the most efficient manner.