best tips | Biztek Solutions, Inc.

best tips

 

He’s probably young & textbook hipster. He last showered when Windows 7 was released. He’s rushed, frazzled and impatient. He fixes one thing and ten other things break. He drinks coffee or Red Bulls. He’s not unfriendly. But he’s not a salesman. You pay him by the hour or maybe you have a monthly contract with him. You need him. He makes sure your systems keep running so your business can keep running.

This is the type of tech that you must ask these 3 questions:

Continue reading

 

You’re hard at work on your computer or device and a message suddenly pops up saying, “a software update is available”. You’re busy, so you click “cancel” instead of “install”, thinking you’ll get to it later, but you never do. Sound familiar?

The truth is it’s easy to skip software updates because they can take up a few minutes of our time, and may not seem that important. But this is a mistake that keeps the door open for hackers to access your private information, putting you at risk for identity theft, loss of money, credit, and more.

Continue reading

 

Here Are Some Tips To Help You Stay In Control of Your Domain.

Image of laptop with screen showing Google.com

We see it far too often.  We begin working with a client and need to access their domain name, and the fun begins.  The domain is registered with one service provider, the primary name server (what routes all internet, web, email traffic on the internet) points to another provider and the website and/or email are hosted somewhere else.  And the worst part is, the client has no idea how or where anything is registered, no account credentials, etc.

Your domain name is extremely valuable and businesses should take management of their domains seriously.  This means understanding, or at least having an idea, of how their domain is setup, but most importantly, have any and all credentials on file to access their domain and any related services such as email and website.

Most web developers want to control everything for a domain in their web hosting control panel.  While there is technically nothing wrong with this, and it may be useful at times, it is not ideal.

Here is what we recommend:

Continue reading

 

 

Office365 has become the common platform for cloud hosted email.  There are several different subscriptions that your company can use that will provide different features and benefits.  Most companies only use a fraction of the available services and features that come with their subscription.

In this article, we are going to present 5 ways to maximize your investment with Office365.

Continue reading

You always hear stories every single year about a residential homes or small businesses being visited by what seems to be a utility worker. They knock on the door, with a smile on their face, and dressed at what seems to be “official”. As warm as the gesture may feel, a slight sense of worry tends to linger as they ask you questions and a request to step into the office and conduct their routines. “Workers” for your internet provider will ask you for permission to access your servers, or your utility providers looking to observe your circuit breakers and entering restricted rooms.

 

Do you remember when your parents told you to “never trust strangers”?

Continue reading

  

Ready for the Holidays? 

When you’re traveling and your phone is about to die, most travelers will take a charge wherever they can find it. But, a new report from the Los Angeles County District Attorney’s Office warns against using public USB power charging stations because of “juice jacking

Juice jacking is a scam that can drain important information from your phone while you use a public USB port to charge.

Criminals can load malware onto the charging stations, rip out the real USB ports and replace them with their own infected ports or leave infected cables at the stations. When people use these ports, their phone will charge and their private information will be leaked to scammers. Through these scams, criminals can access information like personal passwords, bank accounts or entire backups of your phone.

Continue reading