BlogsTek Tips 10.22.20 Tek Tip: How to Stop the Mobile Spam How many of you have been experiencing an influx of robocalls, spam texts, and phishing… Megan Heater
BlogsTek Tips 10.16.20 Even Apple Isn’t Infallible Recently, Apple hired 5 White- Hat (also known as “ethical”) hackers to spend a significant… Megan Heater
BlogsTek Tips 10.06.20 Tek Tip: Zoom Is Stepping up Security With Added Features With the popularity of Zoom exploding off the charts in June, an increase of privacy… Megan Heater
BlogsTek TipsUncategorized 10.01.20 MSP vs. MSSP – What Is the Difference? Here at The Tek, our key (and perhaps most important) differentiator is that we are… Megan Heater
BlogsTek Tips 09.24.20 Tek Tip: A WFH Company Handbook We are officially in the age of remote work. Many companies that were thrown into… Megan Heater
BlogsTek Tips 09.17.20 Tek Tip: Cradle Points, Your Fail-Safe Plan In the event your primary internet goes down, having a redundant plan built-in will not… Megan Heater
BlogsPhishing AttemptsTek Tips 09.08.20 Tek Tip: Don’t Slack on your Slack Security With remote workforces rising at an unprecedented rate, tools to stay in touch with co-workers… Mike Trainor
BlogsTek Tips 08.28.20 Phishing Attacks: How to Recognize and Educate If you saw our Tek Tip yesterday about how to report online crime and phishing… Megan Heater
BlogsTek Tips 08.27.20 How to Report Phishing Attempts These days, it’s almost a given that you will experience a form of internet crime… Megan Heater
BlogsTek Tips 08.21.20 The Pandemic, A Hackers Perfect Storm When companies, schools and individuals made the shift to social distancing and WFH practices, not… Megan Heater