September 11, 2001, is a day we’ll never forget. You probably remember exactly where you were and what you were doing when the news broke. It was a day of profound loss, with nearly 3,000 lives taken—including 343 firefighters who ran toward danger to save others. What you might not realize is how much communication failures played a role in …
Do Small Companies Need Cybersecurity?
Picture this: It’s the holiday season, and your business is thriving. Customers are placing orders, your team is busy handling requests, and sales are rolling in. Then, out of nowhere, your systems stop working. You reboot, thinking it’s just a glitch, but nothing changes. As frustration builds and operations grind to a halt, you discover the truth—hackers have locked you …
10 Ways to Prevent Cyber Attacks on a Business
In Honor of National Cybersecurity Awareness Month with Decypher Technologies Cyber attacks are becoming more frequent, and the data proves it. According to the 2024 IBM Cost of a Data Breach report, the average breach now costs $4.88 million—up 10% from last year. Even more concerning, 95% of organizations have experienced multiple breaches, highlighting the growing risk landscape. Small businesses …
How to Boost Your Wi-Fi Signal: Smart Solutions for Businesses
In today’s business world, slow Wi-Fi isn’t just annoying—it’s expensive. For companies that rely on billable hours, like law firms and engineering firms, every minute of downtime impacts the bottom line. If you’ve been wondering, “How can I make my Wi-Fi signal stronger?” or “How can I fix a weak Wi-Fi signal?” these solutions will help you improve connectivity and …
How Much Does It Cost to Install a DAS System?
In today’s fast-paced world, seamless connectivity is more crucial than ever. Whether in a large home, office building, hospital, or stadium, ensuring robust and reliable wireless coverage is essential for daily operations. That’s where a Distributed Antenna System (DAS) comes into play. But how much does it cost to install a DAS system? Let’s explore the factors that influence the …
Fixing Your Weakest Link: Your Employees
Even if you have every security hardware/software available, such as a firewall, backup disaster recovery device, and anti-virus, your employees could still be your organization’s most significant vulnerability regarding phishing attacks. How can you minimize the risk as much as possible? Create and Strictly Enforce a Password Policy Passwords should be complex, randomly generated, and replaced regularly. When creating a …
How to Spot A Phishing Attack
Would you know if you were the subject of a phishing attack? Many people claim they could tell immediately if they received an email from an illegitimate source. If that were the case, there wouldn’t be 1.5 million new phishing websites every month. A 65% increase in attacks in one year! Hackers would have moved on to their next idea …
What Is Phishing & How Are Hackers Using It?
Although the number of individuals who fall for the infamous Nigerian prince scam has declined, phishing remains a significant concern. In fact, over the past year, hackers worldwide have executed 65% more phishing attacks. Phishing is a fraudulent activity where hackers create emails, forms, and websites that look like those of legitimate companies to trick people into sharing their sensitive …
Financial Services Industry & The Benefits of Managed IT Services
Discover how Managed IT Services can revolutionize your business operations and enhance efficiency. Streamlining Business Operations Managed IT Services play a crucial role in streamlining business operations for the financial services industry. By outsourcing the management of IT infrastructure and systems, financial institutions can focus on their core competencies and strategic initiatives. This allows for greater efficiency and productivity, as …
How to know if your Company is Vulnerable to Attacks
Online safety is crucial for any business, and neglecting to take the necessary precautions to protect your company from malicious online threats can lead to severe consequences for you and your customers. Cyber crimes can cost businesses up to 1.33 billion dollars annually, which can significantly disrupt your company’s financial plans. Therefore, ensuring your company is prepared to face these …
A Comprehensive Guide to Budgeting for IT
In today’s technological landscape, Information Technology (IT) plays a crucial role in the success and growth of any organization. An adequate IT budget ensures operational efficiency, stays ahead of industry trends, and supports overall business objectives. Here, we will outline a comprehensive guide to effectively help you budget for IT. Understanding the Importance of IT Budgeting An IT budget is …
Making Cybersecurity a Priority
Cybercriminals and data brokers are a common threat to businesses nationwide, which is why infrastructure integrity is something companies need to understand to ensure online safety. Infrastructure integrity refers to the setup you have to promote safety and security; it includes firewalls, anti-virus software, and backups. You risk compromising your sensitive data if you have yet to invest in cybersecurity. …
Safeguarding Hospitality: The Vital Role of Cybersecurity
In an era where technology informs nearly every aspect of our lives, the hospitality industry is no exception. From online bookings to mobile check-ins and smart room amenities, technology has revolutionized the guest experience at hotels and resorts. While these advancements have undoubtedly enriched the guest experience, they have also opened the doors to a new set of challenges—cybersecurity threats. …
What is Endpoint Backup and Why Do You Need it?
Whether you experience a ransomware attack, lost or stolen device, or the accidental deletion of a file, a recovery solution is essential. Employee devices, and the network at large, carry critical business information that is often left out of company backup policies. In these scenarios, an inadequate endpoint (PC’s and laptops) backup option can result in lost data, lost time, …
THREE-TIME WINNER!
DECYPHER TECHNOLOGIES NAMED BEST IT SERVICES IN COLORADO, BY COLORADO BUSINESS MAGAZINE FOR THIRD YEAR! Decypher Technologies, an IT services firm specializing in Managed IT Services, Cybersecurity, & Cellular DAS, was awarded 2023‘s Best IT Services in Colorado, by Colorado Business Magazine. This is the company’s third year earning the title. Colorado Business Magazine is a monthly magazine, dedicated to coverage …
Where do cyber-attacks start?
Cyberattacks can happen on any device at any given time, so how do you know which of your devices you need to protect? It helps first to clarify where these attacks come from. In the past, attacks came from outside sources, or, in other words, the internet. Cybersecurity companies combatted these attacks by setting up firewalls, Intrusion Detection System (IDS), …
Understanding different types of Malware
Malicious software — or malware — is talked about when dangerous software is used to access and infect a computer or network without being detected. A lot of people hear terms like viruses, adware, spyware, ransomware, worms, or Trojan horses; these are all different types of malware that can severely damage computers, devices, and networks. Cybersecurity companies like Decypher Technologies …
What is Cyber Insurance and why it’s important
In today’s digital age, businesses are becoming increasingly dependent on technology. With the rise of cyber threats, cyber insurance has become a crucial part of a comprehensive risk management strategy for businesses of all sizes. Cyber insurance covers financial losses and legal liabilities from cyber-attacks and data breaches. These losses can include the cost of responding to a breach, such …
The Top Benefits of Managed IT Services
Businesses can significantly benefit from managed IT services in many ways, freeing up your time and resources to focus on what’s most important. Running your business. Here are just some of the benefits: COST SAVINGS Managed IT services offer predictable monthly costs for IT services, which can help businesses save money on IT expenses. Additionally, managed IT services can help …
Cybersecurity Tips for SMBs
When it comes to cybersecurity, small and medium-sized businesses (SMBs) face unique challenges. They are often targeted by cybercriminals, but have limited resources to invest in robust security measures. There are several simple steps that SMBs can take to improve their cybersecurity posture. Our goal in this blog post is to provide key cybersecurity tips for SMBs. Train your employees …
Protect Your Business: Cybersecurity Insurance Coverage Explained
Discover the importance of cybersecurity insurance coverage and learn about eligibility criteria and key considerations for protecting your business. Understanding Cybersecurity Insurance: What You Need to Know Cybersecurity insurance is a type of policy designed to protect businesses from financial losses and reputational damage caused by cyber threats and data breaches. It provides coverage for expenses related to data breaches, …
Common Cybersecurity Acronyms
Cybersecurity is a branch of technology that protects information that is stored digitally from online hackers, however, with such a vast subject, there is a plethora of unfamiliar words and acronyms that the everyday person would not know. As a company that knows A LOT about online security, we want to provide you with a few key acronyms and definitions …
Combatting Business Email Compromise Risks
An old scam that keeps reinventing itself with new victims. Don’t become one! You’ve probably heard the classic business email compromise (BEC) scam about Nigerian princes who want to deposit money in people’s bank accounts—but first need their prey to send them money to make it all work to plan. It’s an oldie but goodie. Unfortunately, it’s also one that …
October is Cybersecurity Awareness Month!
In honor of Cybersecurity Awareness Month, we would like to share some educational information with you to help keep you cyber-safe. Use our webchat if you have questions! October 2021 edition
Business E-Mail Compromise
Business E-Mail Compromise Since 2013, when the FBI began tracking an emerging financial cyber threat called business e-mail compromise (BEC), organized crime groups have targeted large and small companies and organizations in every U.S. state and more than 100 countries around the world—from non-profits and well-known corporations to churches and school systems. Losses are in the billions of dollars and …
Excel Tips & Tricks
Freeze Panes When you have a long spreadsheet, you might have the need to freeze multiple rows so you can still see them at the top when you scroll. Here’s how. Highlight the rows you wish to freeze & navigate to Window in the top Excel menu and select Freeze Panes. Find/Replace This tip is very helpful with large …
Chromebook Tips
Try these useful tips for more efficient use of your Chromebook. Pin frequently used files – For files that you need to come back to frequently, pin them to the shelf. Open the Files app and right click on the file you wish to pin, and select Pin to shelf. Access pinned files can be found by clicking on the …
Minimizing Blue Light
While the sun naturally emits blue light, too much artificial blue light from computers, laptops, phones, and other devices can cause sleep trouble, eye strain, and headaches. Here are a couple of ways to reduce discomfort. To adjust color temperature and reduce blue light on your Windows devices, select Start > Settings > System > Display > Night Light Settings. Under …
Tips & Tricks for Teams
When you come across an important message that you need to refer to later, bookmark it! Hover over the message and click on the three dots to the right of the emoji faces Click on Bookmark To search for this bookmark at another time, type /saved into the search bar If you then click on the chat icon in the …
Tips to Shop Securely Online
Because we shop online for nearly everything for our businesses and personal lives, it’s essential to be vigilant about cyber-safety. Here are some tips to make sure you’re shopping securely. Only shop on sites using HTTPS in the URL as opposed to HTTP. If a site is using HTTP, password and payment data can easily be stolen by anyone who …
Cyber-Privacy Basics
Sound advice from our friends at The National Cybersecurity Alliance: Personal Information is Like Money. Value it. Protect It. Your devices make it easy to connect to the world around you, but they can also pack a lot of info about you and your friends and family, such as your contacts, photos, videos, location and health and financial data. …
Zoom Tips
Between school & work, most of us are spending a lot of time on Zoom these days. Here are some useful tips to try out in your meetings. Zoom Filters Start a new meeting and look to the bottom left corner to find the “Start/Stop Video” icon. Click on the up arrow & select “Video Settings”. Check the “Touch …
Cache & Cookies on Your Mobile Device
You’ve probably heard the term “cache” and “cookies” thrown around in relation to internet browsing. Did you know that this data is also stored on your mobile devices? Here we will discuss what they are, why you should clear them and how to do it. CACHE & COOKIES – WHAT ARE THEY? Cookies small snippets of data stored on your …
Winter 2020 Tech Gift Guide
Winter 2020 Tech Gift Guide It’s that time of year again! Check out our list of top tech gifts for the season. Happy gifting Decypher Fans! Magnetic Charging Cables No more excuses for losing battery power in your devices! These cables have adapters to fit everything, in any direction and at any distance. There is even a blue LED light …
Search Engine Tips
Search Engine Tips When you’re on a webpage with content you want to know more about, highlight a word or phrase you’re interested in, then right click & select “Search Google for…” Google will find additional information for you. Searching for something very specific? Use quotes around your search terms. This tells search engines that you want to find that …
Have you been hacked? Now what?
Phishing, there I said it. You’ve heard it a million times–and with COVID19, probably a million & 1. But here’s the thing. It’s VERY real, it can happen to ANYONE and you need to be vigilant about it. Try this tool to see if an email address has been compromised and if so, it’s time to consider a password manager. …
Cybersecurity Webinar
Farr Shepherd, President of Decypher Technologies, recently co-hosted a cybersecurity webinar in partnership with Roaring Fork Leadership. If you missed the window to register for the live Zoom event, you’re in luck. Check it out here!
Summer Break in Times of Quarantine
We’ve been at this a while, right? Now it’s summer break, the kids are home & you still have to get work done. We get it! Here are some tech tips to help: Technology is your new BFF! Kids are social creatures! Cut yourself some slack on screen time limits. Have your kids connect with friends & family online. Grandparents …
Custom Vibrate Alerts on Apple Devices
Did you know that all of the customizations that exist for ringtones on your iPhone apply to vibration alerts too? Using this feature enables you to recognize when a specific contact is trying to reach you when your device’s ringer is silenced. The same applies to your iPad. Here’s how: Launch the Contacts app on your device & select a …
Disinfecting your Tech
Some of you are headed back to the office in the coming weeks. That means you’re bringing technology back to the office from your home. So, let’s talk about disinfection. We won’t get into what kinds of bacteria and how much of it is lurking on device surfaces (it’s a lot!) but rather how to properly clean them. Laptop and …
Digital Safety Tips
By now, we’re all a bit coronavirus weary–maybe even a bit anxious to find out how things are progressing as states and businesses begin to re-open. There are endless offerings of websites, apps, news stories, etc. to stay current. Now more than ever, it is critical to exercise caution in your consumption of news. There is a lot of malicious …
Outlook Tips for Remote Collaboration
Outlook has some often-overlooked tools that can be particularly helpful for remote teams. Some of us are in different time zones or working erratic hours while juggling work and family life from home. Here are some tips that may help your routine. Scheduling an email to send at a later day or time Let’s say you are based out of …
Another Windows 10 Update – What You Need to Know
Be wary of the most recent Window 10 update. We’ve seen glitches in updates before but this one seems to be a bit worse than usual. The update is causing an unusually high number of computers to crash and display a blue screen. There have also been reports of documents, photos and videos being deleted from hard drives. Additionally, the …
Getting Back to Business
From our team to yours, we hope everyone is in good health! Colorado and Florida are slowly warming to the idea of reopening some businesses which – done carefully – is welcomed news. Colorado Governor Polis announced on April 20th that the state will move to stage two of the coronavirus response – Safer at Home. This stage of the plan …
Cyber-Safety & Working From Home
Cyber-criminals are beginning to use Coronavirus and COVID 19 as subject lines in phishing scam emails. Use extra caution with emails from an unknown source. Here are some helpful tips to keep yourself out of cyber-harm’s way. Use work devices only for work. Use a personal device for personal use such as checking in on Instagram, online banking, school work, etc. …
Remain Vigilant!
By now we’re all pretty savvy when it comes to recognizing a scam but remain vigilant! The “bad guys” are savvy too, particularly in the midst of this COVID 19 pandemic. Practice extra caution with calls from unrecognized phone numbers and “too good to be true” or suspicious email offers. Especially links contained within those emails. Read these digital protection …
Scanning on the go
Scanning on the go We’ve all been there–out of the office for a meeting or traveling for work and you need to scan and save something to review later. Read about our top picks for mobile apps below. ADOBE SCAN (Android and iOS) Adobe Scan is the best tool if you must have a PDF as an end product. You …
Automate Your Inbox With Gmail Filters
Automate Your Inbox With Gmail Filters If you’re like most Gmail users, you probably have an abundance of messages in your inbox. Gmail has a powerful custom filtering tool to help you automate your message organization. You have the ability to make this tool as simple or as detailed as you’d like. Follow these steps to learn how: Click on …
A Few of our Favorite Keyboard Shortcuts
A Few of our Favorite Keyboard Shortcuts Check out these helpful keyboard shortcuts to improve your productivity. Outlook Tips Email can sometimes threaten to dominate your day. Try this tip to fire off emails like a pro and never have your fingers leave the keyboard. After you type your message, type ALT + S on a PC. On a Mac, …
13 Ransomware Statistics All Businesses MUST Know
Notice: JavaScript is required for this content.
Scam Phone Calls
Scam Phone Calls Scam phone calls are all too common these days. If you notice that you begin receiving spam calls more frequently, it’s a good practice to not answer any from unfamiliar numbers. If you do pick up, don’t say anything. Scammers can potentially record your voice and gather information on you, potentially reusing your voice signature to authorize …
Expired Adobe Subscriptions
Expired Adobe Subscriptions If someone in your organization has an expired subscription for an Adobe product, you need to call Adobe to have them remove the expired license. Expired licenses can cause issues when the subscription is allowed to lapse. When you try to renew a lapsed subscription and aren’t able to, a new subscription is created, but the expired …
An Added Benefit For Our Managed Prevent Clients
An Added Benefit For Our Managed Prevent Clients Decypher has recently made a commitment to improving our processes in blocking unicode domain phishing. Unicode phishing uses emails and domains with characters that are so similar to the real thing that they can trick people into thinking the links are legitimate. Luckily, our email spam solution, Proofpoint, quarantines email from unicode domains …
Windows Tips
WINDOWS TIPS We all love saving time! Check out this brief list of Windows keyboard shortcuts and tips to add to your workday efficiency repertoire. Windows key + left arrow or right arrow will automatically split the screen for you. Windows key + up arrow will maximize the current window. Windows key + down arrow will restore the window to …
Mac Screenshots
MAC SCREENSHOTS Your Mac comes with some useful tools to take screenshots. Depending on how you would like to use a screenshot, there are three ways to accomplish this. The most general of the three is to screenshot your entire screen. To do this, hit Command + Shift + 3 and a PNG file of your entire screen will be …
Split-Screen Tips
SPLIT-SCREEN TIPS Working while traveling can be frustrating when you don’t have that beloved second monitor to utilize. This tip can help! On a PC while you have at least two applications, files or individual web pages open, left-click the mouse to “grab” one of the windows or files and drag it to the side of the screen that you …
Managed Services Team – Behind the Scenes
MANAGED SERVICES TEAM – BEHIND THE SCENES Our Managed Services offer a wealth of great benefits. Here’s a brief snapshot of what our technicians are up to on a daily basis to keep our Managed Service Clients’ technology running smoothly, safely and consistently: We monitor servers for functionality to prevent unexpected issues like a drive filling up causing bottlenecks in …
Removing Dropbox from your computer
While it’s a convenient workflow to have Dropbox linked directly to your computer, it also has the potential to significantly slow the computer’s performance. The larger the quantity and size of files saved to the linked Dropbox account, the more likelihood there is for lag time. Frustrating as it may be when this happens, you must unlink your Dropbox account …
2019 Technology Declutter
2019 Technology Declutter With the speed that technology evolves and as we continually upgrade, Pin, save, and snap it can become overwhelming to manage. If you make a plan and tackle it in digestible pieces, decluttering doesn’t have to be such a daunting task. Here are some suggestions to button up your 2019 tech to head into 2020 with a …
2019 Holiday Tech Gift List
2019 Holiday Tech Gift List Every year, our technicians come up with great recommendations for their favorite holiday tech gifts. Check out what’s hot for 2019! The new Instax Mini 9 Instant Camera is a fun gift for anyone! The Mini 9 is very user-friendly, comes in many colors, has endless accessory options and even features a selfie mirror for …
MacOS Catalina – What you need to know before you update
MAC OS CATALINA UPGRADE Apple recently released macOS Catalina, the latest version of its operating system. Apple is also admitting that there are serious issues with this version and are recommending that users not upgrade until the bugs are worked out. One big change that comes with Catalina is that it marks the official end of iTunes. Apple’s replacement for …
Browsing History, Key Commands and Passwords
BROWSING HISTORY, KEY COMMANDS AND PASSWORDS We want to keep you informed with the latest technology tips. Here are some that we’ve found most helpful this month. In Chrome or Firefox browsers, you can quickly find a recent page you visited by right-clicking on the back arrow to view a list of your browsing history. Or, in the event that …
Shared Outlook Calendars
SHARED OUTLOOK CALENDARS Sometimes it’s helpful to view multiple calendars within your calendar in Outlook, especially if you need to keep track of multiple colleagues’ meeting schedules. Here’s how. Here are two ways to view shared calendars on a Mac. You can checkmark the calendar boxes that appear in the column to the far left of your calendar viewing screen. …
A Recent iPhone Scam
A RECENT IPHONE SCAM iPhones are notoriously safe against viruses and malicious software. And most of us would consider ourselves wise in detecting these cyber-scams in the current age of technology. However with Social Engineering, a scammer can easily impersonate Apple, for example. When caller ID says that Apple, Inc. is our incoming call, we would likely assume it’s safe, …
HEIC Files and more…
HEIC Files, Windows Shortcuts, and more… What are HEIC files? HEIC files (High Efficiency Image Format) are image files from an iPhone. They aren’t natively supported by Windows but there should be codecs you can download to view them in Windows, and Microsoft and Google might start supporting them soon. HEIC files are much smaller than other image file types, …
Take Google’s Phishing Quiz to Sharpen Your Security Skills
Take Google’s Phishing Quiz to Sharpen Your Security Skills This month, we’re sharing a great tool you can use to help train your staff to recognize email phishing attacks. Google has an interactive phishing quiz that is really educational. It’s a lot harder to pass than you might think! The quiz teaches you how to spot key indicators of a …
Windows Tips and Shortcuts
Windows Tips and Shortcuts Keyboard Shortcuts for Mac and Windows CTRL+Tab cycles through browser tabs on both Mac and Windows. CTRL+SHIFT+Tab cycles the opposite direction. Adobe Acrobat Troubleshooting If you’re experiencing problems with Adobe Acrobat, try signing out of the software and signing back in. This should refresh the Adobe license and solve the issue. Printer Hack If your color …
Holiday Gift Guide from our Technicians – 2018
Holiday Gift Guide from our Technicians – 2018 Our technicians have the best recommendations for gifts this year, no matter the age or budget. Keep reading for our gift ideas, and you’re sure to find something special for yourself or a loved one. The Embr Wave Bracelet (on sale for $239) is the perfect gift for someone who’s always too hot …
Outlook Time Zone Tips
Outlook Time Zone Tips You can change Outlook’s settings to view a second time zone in Outlook Calendar. Just go to File > Options (or Outlook > Preferences on a Mac), and on the Calendar tab, under “time zones,” type a name for the current time zone in the Label box. In the time zone list, click the time zone …
How to Work in IT
How to Work in IT – Advice from Mick Reilly, Decypher’s Vice President and Technical Director Mick has over 19 years of experience in Information Technology, and he specializes in Cisco networking and wireless. Mick loves to build networks that work and troubleshoot the ones that don’t. He’s been with Decypher for 12 years and manages our technical team. What …
The Easiest Way to Protect Yourself from Cybersecurity Threats
The Easiest Way to Protect Yourself from Cybersecurity Threats The Best and Easiest Protection Solution Available to You The best way to prevent breaches is to deploy multi-factor authentication or two-factor authentication (MFA or 2FA). This process is akin to entering your PIN number when you use your debit card – it requires an additional piece of information to supplement …
Equipment Lifespan – What You Can Do
Equipment Lifespan – What You Can Do Tidy Equipment = Longer Lifespan We often see messy equipment racks and offer to tidy them up for our clients. This isn’t just a cleanliness pet peeve – it serves an important purpose. When equipment is tidy and has enough breathing room (e.g., not stacked on other pieces of equipment), it stays cooler …
Cybersecurity & Russia, iPhone Charging, and more…
Cybersecurity & Russia, iPhone Charging, and more… Keyboard on Windows If you tend to accidentally press keys on your keyboard (perhaps due to hand tremors), “Filter Keys” can be enabled on Windows to slow down the key response so mistyped or repeated keystrokes don’t register. This accessibility feature doesn’t seem to affect regular typing. Outlook Calendars You can merge calendar …
What? You’re Not Using Office 365? Five Reasons Why You Need to Start Right Now
If you missed your invitation to the party, here it is. Chances are that your competition is already using the Microsoft Office 365 suite of tools to maximize their productivity and grow their business, so why aren’t you? This is a powerhouse of a platform that will change your business culture and deliver immediate results, and now it’s more affordable …
What is Managed Services?
What is managed services? It’s a question we hear often, and it’s a valid one. The IT community and MSPs (managed service providers) frequently use the term, but with little to no explanation about what it truly means. We’re here to define managed services and explain the benefits of a managed service plan. The difference really lies between managed services …
Surface Pro, Microsoft Office and Apple OS X Tips
Surface Pro, Microsoft Office and Apple OS X Tips Traveling with your Surface Pro When traveling with a Surface Pro for extended periods of time, we recommend shutting the device down. When the device is in sleep mode while sandwiched in your backpack or travel case, it can easily overheat and has a tendency not to turn back on upon request. …
4 Simple Steps to PCI Compliance
Like any business owner, you care about growing your business while protecting your customers’ confidential information. PCI DSS (Payment Card Industry Data Security Standard) is a security standard for organizations that handles branded credits cards and is designed to protect them from major card schemes while safeguarding your customers’ private data. You aren’t legally required to meet PCI compliance, but …
Top 5 CES Products that Will Impact You in 2018
Did you miss out on the 2018 Consumer Electronics Show (CES) last month? If you did, don’t worry…we’ll get you up to speed. The conference took place in Las Vegas and attracted more than 170,000 attendees from 150 countries for four days. Some of the most influential organizations in the industry, including Dell and Samsung, unveiled new technologies that are …
Outlook and Excel Tips You Shouldn’t Miss
Outlook and Excel Tips You Shouldn’t Miss Don’t Lose Your Outlook Contacts! Did you know that contacts “remembered” by Outlook in your autocomplete list are not saved contacts, and could be lost if your Outlook account crashes, is moved or is updated? Many people use the autocomplete or nickname feature as a shortcut to remember contacts that they email often, …
iPhone Tips and Tricks
iPhone Tips and Tricks Is “Planned Obsolescence” Real? Have you ever suspected that your older iPhone or iPad’s performance suffers when newer models or software updates are released? This article may bring us one step closer to proving that “planned obsolescence” is real. If your battery has degraded, Apple’s built-in code actually slows your device down. Your older iPhone could be …
Holiday Gift Guide from our Technicians – 2017
Holiday Gift Guide from our Technicians – 2017 Our technicians have the best recommendations for gifts this year, no matter the age or budget. Keep reading for our gift ideas, and you’re sure to find something special for yourself or a loved one. Tech Will Save Us Electro Dough Kit – $30 Upgrade your kid’s Play-Doh! Includes recipe to make conductive …
Laptop Upgrades and VoIP Quality of Service
Laptop Upgrades and VoIP Quality of Service Laptop Upgrades We’ve noticed that many customers buying new MacBooks are running into space issues because of hard disk drive downgrades. Some of our clients have replaced an older 1TB MacBook Pro with a 500GB MacBook Pro, and quickly run out of space. We recommend confirming how much space you are using on …
Memorable Passwords, Phishing, and Troubleshooting
Memorable Passwords, Phishing, and Troubleshooting When Troubleshooting, Don’t Overthink It If your computer is acting erratically, try basic troubleshooting first. This could include powering the machine down, then back up, closing windows and quitting programs. Also, don’t forget about external devices, as sometimes disconnecting these can resolve the issue. Try disconnecting the keyboard, mouse, track pad, etc. to see if …
Post-Hurricane Support and Recovery
Post-Hurricane Support and Recovery We’re thinking of all those affected by recent hurricanes that impacted the U.S. and the Caribbean. Let us know if there’s anything we can do to help recover your technology or data. Were you affected by hurricanes Harvey or Irma? Are you bracing for Jose, or the next storms in the forecast? Unfortunately, many of our …
Email Encryption, Send Limits, and Equipment Replacement
Email Encryption, Send Limits, and Equipment Replacement Equipment Replacement Often, sticker shock steers us to purchase cheaper solutions, but these decisions can come at a cost. That cost could be increased down time or more frequent service calls due to equipment failures. Replacement equipment should be of the same or higher quality than the item replaced. For example, Decypher would …
Important Security Update – Petya Cyberattack
What is Petya? This ransomware is a variant of an older attack, dubbed “Petya,” except this time the attack uses EternalBlue to target Windows systems—the same exploit behind the infamous WannaCry attack. While this variant appears to be an upgraded version of Petya, there is no confirmation that this attack is from the same author. It differs from typical ransomware …
WannaCry And HummingWhale: Keep Yourself Protected
WannaCry And HummingWhale: Keep Yourself Protected WannaCry The WannaCry virus made quite an impact this month, but the U.S. was less affected than other countries. Over 90% of WannaCry’s victims were running Windows 7, an older operating system, making it particularly vulnerable to threats. The spread of this virus was for the most part preventable, as doing frequent updates (patch …
How To Keep Your Browsing Data Private
How To Keep Your Browsing Data Private The government has recently moved to deregulate internet privacy laws so that Americans’ browsing data could be up for grabs to the highest bidder. Internet service providers want to collect as much data as possible to track people’s browsing habits, so they can better market and sell their products to consumers. In an age …
Cybersecurity Tips To Avoid Getting Hacked
No one wants to get hacked, but the reality of our online environment means it will likely happen sooner or later if we don’t follow the latest cybersecurity tips. This month’s Tech Tips focuses on keeping your information safe to stay ahead of hackers. Keep reading for important tips that will help you stay secure. Strengthen Your Passwords Many of …
Is Your Dropbox Full?
Lately we’ve been finding that many of our clients have been using Dropbox for their files (which we love), but the free account only comes with 5 GB of space, and everyone seems to be reaching their limit. Dropbox has some great picture and music syncing apps, so 5 GB can go fast. You may not have known that Dropbox has …
DNS, HP Scanning, and the Best of CES – Decypher Tech Tips
We want to keep you informed with the latest technology tips, so we’re sharing information from our technical meetings that we’ve found most helpful this month. DNS: Sometimes mistakes happen when updating your website and for whatever reason the Internet Records (DNS) that tell people how to send you mail or get to your website get deleted. If you don’t …
Decypher Tech Tips – January 2017
We want to keep you informed with the latest technology tips, so we’re sharing the information we’ve found most helpful this month. Office for Mac Updates: New Office for Mac Updates are bringing major improvements in speed. Join the Office Insider for Mac program to get releases ahead of the standard public release. Free Software: Here are a couple of free …
Amazon Echo vs. Google Home: Full Breakdown
Amazon Echo vs. Google Home: Our technicians have outlined some of the differences between these home automation systems to help you decide which one is right for you. Keep in mind that with both devices, you will need one or more additional smart devices to truly take control of your home. Here’s the full breakdown: Amazon Echo – $40-$140 …
November Tech Tips – Technician Gift Guide Edition
Our technicians know just the right gadgets to fill up your wish list this year, whether you’re shopping for loved ones or yourself. In our first-annual Technician Gift Guide, we give you some of our recommendations for gifts to please tech-lovers of all ages and at any budget. Kiwi Crate – Kid’s Subscription Boxes, $19.95/month A fun, hands-on kid’s subscription box …
Network Share and Power Outages – Decypher Tech Tips, June 2016
We want to keep you informed with the latest technology tips, so we’re sharing the information we’ve found most helpful this month about Network Share, printing and scanning, and how to deal with power outages. Network Share: When opening a file in network share, you may get an error message that the file is locked when the preview pane in …
Dropbox, Printing, and Office 365 – Decypher Tech Tips, May 2016
We want to keep you informed with the latest technology tips, so we’re sharing the information we’ve found most helpful this month about Dropbox, printing, and Office 365. Dropbox: Dropbox creates a folder on your computer by default, and any data you want synchronized with the cloud has to be placed inside that Dropbox folder. Alternatively, you can create a …
Software Updates and More – Decypher Tech Tips, April 2016
We want to keep you informed with the latest technology tips, so we’re sharing the information we’ve found most helpful this month regarding software updates and more. Internet Browsers: Be careful not to keep too many browser tabs open, as that can use a lot of RAM and cause your browser to leak memory, slowing down your computer Software Updates: …
Decypher Tech Tips, March 2016 – Printing Tips
We want to keep you informed with the latest technology tips, so we’re sharing the information we’ve found most helpful this month. Printers: HP’s All-In-One Printer Remote mobile app (available on iTunes and Google Play) extends desktop functionality to your mobile device. The app provides the following features: Print from your mobile device: Use your tablet or smartphone to print …
Decypher Tech Tips, Feb. 2016 – A Malware Infographic
We want to keep you informed with the latest technology tips, and we found this infographic from Cisco about the growing threat of malware to be very informative. If you feel that you may have been compromised by malware or would like to reduce the risk of compromise, please contact us immediately for assistance. Call us today at 970.373.5428. Best, …
- Page 1 of 2
- 1
- 2