email-encryption

Email Encryption, Send Limits, and Equipment Replacement

Email Encryption, Send Limits, and Equipment Replacement Equipment Replacement Often, sticker shock steers us to purchase cheaper solutions, but these decisions can come at a cost. That cost could be increased down time or more frequent service calls due to equipment failures. Replacement equipment should be of the same or higher quality than the item replaced. For example, Decypher would …

Important Security Update – Petya Cyberattack

What is Petya? This ransomware is a variant of an older attack, dubbed “Petya,” except this time the attack uses EternalBlue to target Windows systems—the same exploit behind the infamous WannaCry attack. While this variant appears to be an upgraded version of Petya, there is no confirmation that this attack is from the same author. It differs from typical ransomware …

Steps to PCI Compliance

How To Keep Your Browsing Data Private

How To Keep Your Browsing Data Private The government has recently moved to deregulate internet privacy laws so that Americans’ browsing data could be up for grabs to the highest bidder. Internet service providers want to collect as much data as possible to track people’s browsing habits, so they can better market and sell their products to consumers. In an age …

Is Your Dropbox Full?

Lately we’ve been finding that many of our clients have been using Dropbox for their files (which we love), but the free account only comes with 5 GB of space, and everyone seems to be reaching their limit. Dropbox has some great picture and music syncing apps, so 5 GB can go fast. You may not have known that Dropbox has …

DNS, HP Scanning, and the Best of CES – Decypher Tech Tips

We want to keep you informed with the latest technology tips, so we’re sharing information from our technical meetings that we’ve found most helpful this month. DNS: Sometimes mistakes happen when updating your website and for whatever reason the Internet Records (DNS) that tell people how to send you mail or get to your website get deleted. If you don’t …

Decypher Tech Tips – January 2017

We want to keep you informed with the latest technology tips, so we’re sharing the information we’ve found most helpful this month. Office for Mac Updates: New Office for Mac Updates are bringing major improvements in speed. Join the Office Insider for Mac program to get releases ahead of the standard public release. Free Software: Here are a couple of free …

Tech-Tips-Dropbox

Dropbox, Printing, and Office 365 – Decypher Tech Tips, May 2016

We want to keep you informed with the latest technology tips, so we’re sharing the information we’ve found most helpful this month about Dropbox, printing, and Office 365. Dropbox: Dropbox creates a folder on your computer by default, and any data you want synchronized with the cloud has to be placed inside that Dropbox folder. Alternatively, you can create a …

Decypher Tech Tips, March 2016 – Printing Tips

We want to keep you informed with the latest technology tips, so we’re sharing the information we’ve found most helpful this month. Printers: HP’s All-In-One Printer Remote mobile app (available on iTunes and Google Play) extends desktop functionality to your mobile device. The app provides the following features: Print from your mobile device: Use your tablet or smartphone to print …

Windows 10 is here…should you upgrade?

Microsoft has finally released Windows 10 — the latest overhaul to the most popular operating system in the world. Is an upgrade in your future? We think it should be! Here are some of the standout features of Windows 10: • It’s familiar and easy to use, combining the strengths of Windows 7 & 8 • It’s productive, enabling faster …

typing on a phone

The Benefits of a Cloud-Based Phone System

Antique. Dinosaur. Archaic. Have you or your team ever used these words to describe your organization’s phone system? If so, a change is probably long overdue. But is it really worth it to upgrade to a cloud-based phone system? The answer is…YES! If your current phone system is dated, you may not even realize what you’re missing. The newest phone …

Password Managers: Protecting Yourself in the Age of Hackers

Whether it’s warnings about Heartbleed, the “largest data breach” ever, or Internet browser vulnerabilities, new online security threats are popping up every day. In the age of hackers, what is the number one way to safeguard your data? Use a Password Manager Password managers like LastPass, Dashlane, 1Password and True Key, are highly recommended by security experts as the strongest defense against online vulnerabilities. A password manager will help you …

What is BYOD?

BYOD = Bring Your Own Device The “device” is a mobile one – whether it’s a smartphone, tablet or laptop. BYOD refers to the policy of organizations (businesses or schools) to allow their employees or students to use their personal devices to connect to the organization’s networks and information. Businesses are tasked with providing a network that can accomodate employees’ …