Tech Tips
10 Ways to Prevent Cyber Attacks on a Business
In Honor of National Cybersecurity Awareness Month with Decypher Technologies Cyber attacks are becoming more frequent, and the data proves it. According to the 2024 IBM Cost of a Data Breach repor...
How to Boost Your Wi-Fi Signal: Smart Solutions for Businesses
In today’s business world, slow Wi-Fi isn’t just annoying—it’s expensive. For companies that rely on billable hours, like law firms and engineering firms, every minute of downtime impacts t...
How Much Does It Cost to Install a DAS System?
In today’s fast-paced world, seamless connectivity is more crucial than ever. Whether in a large home, office building, hospital, or stadium, ensuring robust and reliable wireless coverage is essen...
Fixing Your Weakest Link: Your Employees
Even if you have every security hardware/software available, such as a firewall, backup disaster recovery device, and anti-virus, your employees could still be your organization’s most significant ...
How to Spot A Phishing Attack
Would you know if you were the subject of a phishing attack? Many people claim they could tell immediately if they received an email from an illegitimate source. If that were the case, there wouldn...
What Is Phishing & How Are Hackers Using It?
Although the number of individuals who fall for the infamous Nigerian prince scam has declined, phishing remains a significant concern. In fact, over the past year, hackers worldwide have executed ...
Financial Services Industry & The Benefits of Managed IT Services
Discover how Managed IT Services can revolutionize your business operations and enhance efficiency. Streamlining Business Operations Managed IT Services play a crucial role in streamlining business...
How to know if your Company is Vulnerable to Attacks
Online safety is crucial for any business, and neglecting to take the necessary precautions to protect your company from malicious online threats can lead to severe consequences for you and your cu...
A Comprehensive Guide to Budgeting for IT
In today’s technological landscape, Information Technology (IT) plays a crucial role in the success and growth of any organization. An adequate IT budget ensures operational efficiency, stays ahead...
Making Cybersecurity a Priority
Cybercriminals and data brokers are a common threat to businesses nationwide, which is why infrastructure integrity is something companies need to understand to ensure online safety. Infrastructure...
Safeguarding Hospitality: The Vital Role of Cybersecurity
In an era where technology informs nearly every aspect of our lives, the hospitality industry is no exception. From online bookings to mobile check-ins and smart room amenities, technology has revo...
What is Endpoint Backup and Why Do You Need it?
Whether you experience a ransomware attack, lost or stolen device, or the accidental deletion of a file, a recovery solution is essential. Employee devices, and the network at large, carry critical...
THREE-TIME WINNER!
DECYPHER TECHNOLOGIES NAMED BEST IT SERVICES IN COLORADO, BY COLORADO BUSINESS MAGAZINE FOR THIRD YEAR! Decypher Technologies, an IT services firm specializing in Managed IT Services, Cybersecuri...
Where do cyber-attacks start?
Cyberattacks can happen on any device at any given time, so how do you know which of your devices you need to protect? It helps first to clarify where these attacks come from. In the past, attacks ...
Understanding different types of Malware
Malicious software — or malware — is talked about when dangerous software is used to access and infect a computer or network without being detected. A lot of people hear terms like viruses, adw...
What is Cyber Insurance and why it’s important
In today’s digital age, businesses are becoming increasingly dependent on technology. With the rise of cyber threats, cyber insurance has become a crucial part of a comprehensive risk management st...
The Top Benefits of Managed IT Services
Businesses can significantly benefit from managed IT services in many ways, freeing up your time and resources to focus on what’s most important. Running your business. Here are just some of the ...
Cybersecurity Tips for SMBs
When it comes to cybersecurity, small and medium-sized businesses (SMBs) face unique challenges. They are often targeted by cybercriminals, but have limited resources to invest in robust security m...
Protect Your Business: Cybersecurity Insurance Coverage Explained
Discover the importance of cybersecurity insurance coverage and learn about eligibility criteria and key considerations for protecting your business. Understanding Cybersecurity Insurance: What You...
Common Cybersecurity Acronyms
Cybersecurity is a branch of technology that protects information that is stored digitally from online hackers, however, with such a vast subject, there is a plethora of unfamiliar words and acrony...
Combatting Business Email Compromise Risks
An old scam that keeps reinventing itself with new victims. Don’t become one! You’ve probably heard the classic business email compromise (BEC) scam about Nigerian princes who want to deposit...
October is Cybersecurity Awareness Month!
In honor of Cybersecurity Awareness Month, we would like to share some educational information with you to help keep you cyber-safe. Use our webchat if you have questions! ...
Business E-Mail Compromise
Business E-Mail Compromise Since 2013, when the FBI began tracking an emerging financial cyber threat called business e-mail compromise (BEC), organized crime groups have targeted large and small c...
Excel Tips & Tricks
Freeze Panes When you have a long spreadsheet, you might have the need to freeze multiple rows so you can still see them at the top when you scroll. Here’s how. Highlight the rows you wish to freez...
Chromebook Tips
Try these useful tips for more efficient use of your Chromebook. Pin frequently used files – For files that you need to come back to frequently, pin them to the shelf. Open the Files app and ri...
Tips & Tricks for Teams
When you come across an important message that you need to refer to later, bookmark it! Hover over the message and click on the three dots to the right of the emoji faces Click on Bookmark To searc...
Tips to Shop Securely Online
Because we shop online for nearly everything for our businesses and personal lives, it’s essential to be vigilant about cyber-safety. Here are some tips to make sure you’re shopping securely. O...
Cyber-Privacy Basics
Sound advice from our friends at The National Cybersecurity Alliance: Personal Information is Like Money. Value it. Protect It. Your devices make it easy to connect to the world around you, but...
Cache & Cookies on Your Mobile Device
You’ve probably heard the term “cache” and “cookies” thrown around in relation to internet browsing. Did you know that this data is also stored on your mobile devices? Here we will discuss what the...
Winter 2020 Tech Gift Guide
Winter 2020 Tech Gift Guide It’s that time of year again! Check out our list of top tech gifts for the season. Happy gifting Decypher Fans! Magnetic Charging Cables No more excuses for losing bat...
Search Engine Tips
Search Engine Tips When you’re on a webpage with content you want to know more about, highlight a word or phrase you’re interested in, then right click & select “Search Google for…” Googl...
Have you been hacked? Now what?
Phishing, there I said it. You’ve heard it a million times–and with COVID19, probably a million & 1. But here’s the thing. It’s VERY real, it can happen to ANYONE and you need to be vigilant ab...
Cybersecurity Webinar
Farr Shepherd, President of Decypher Technologies, recently co-hosted a cybersecurity webinar in partnership with Roaring Fork Leadership. If you missed the window to register for the live Zoom...
Summer Break in Times of Quarantine
We’ve been at this a while, right? Now it’s summer break, the kids are home & you still have to get work done. We get it! Here are some tech tips to help: Technology is your new BFF! Kids are soc...
Disinfecting your Tech
Some of you are headed back to the office in the coming weeks. That means you’re bringing technology back to the office from your home. So, let’s talk about disinfection. We won’t get into wh...
Digital Safety Tips
By now, we’re all a bit coronavirus weary–maybe even a bit anxious to find out how things are progressing as states and businesses begin to re-open. There are endless offerings of websites, app...
Outlook Tips for Remote Collaboration
Outlook has some often-overlooked tools that can be particularly helpful for remote teams. Some of us are in different time zones or working erratic hours while juggling work and family life from h...
Getting Back to Business
From our team to yours, we hope everyone is in good health! Colorado and Florida are slowly warming to the idea of reopening some businesses which – done carefully – is welcomed news. Colorado Gove...
Cyber-Safety & Working From Home
Cyber-criminals are beginning to use Coronavirus and COVID 19 as subject lines in phishing scam emails. Use extra caution with emails from an unknown source. Here are some helpful tips to keep your...
Remain Vigilant!
By now we’re all pretty savvy when it comes to recognizing a scam but remain vigilant! The “bad guys” are savvy too, particularly in the midst of this COVID 19 pandemic. Practice extra caution with...
Automate Your Inbox With Gmail Filters
Automate Your Inbox With Gmail Filters If you’re like most Gmail users, you probably have an abundance of messages in your inbox. Gmail has a powerful custom filtering tool to help you automate you...
A Few of our Favorite Keyboard Shortcuts
A Few of our Favorite Keyboard Shortcuts Check out these helpful keyboard shortcuts to improve your productivity. Outlook Tips Email can sometimes threaten to dominate your day. Try this tip to fir...
13 Ransomware Statistics All Businesses MUST Know
Notice: JavaScript is required for this content....
An Added Benefit For Our Managed Prevent Clients
An Added Benefit For Our Managed Prevent Clients Decypher has recently made a commitment to improving our processes in blocking unicode domain phishing. Unicode phishing uses emails and domains wi...
Mac Screenshots
MAC SCREENSHOTS Your Mac comes with some useful tools to take screenshots. Depending on how you would like to use a screenshot, there are three ways to accomplish this. The most general of the thre...
Managed Services Team – Behind the Scenes
MANAGED SERVICES TEAM – BEHIND THE SCENES Our Managed Services offer a wealth of great benefits. Here’s a brief snapshot of what our technicians are up to on a daily basis to keep our Managed Servi...
2019 Holiday Tech Gift List
2019 Holiday Tech Gift List Every year, our technicians come up with great recommendations for their favorite holiday tech gifts. Check out what’s hot for 2019! The new Instax Mini 9 Instant Camera...
MacOS Catalina – What you need to know before you update
MAC OS CATALINA UPGRADE Apple recently released macOS Catalina, the latest version of its operating system. Apple is also admitting that there are serious issues with this version and are recommend...
Browsing History, Key Commands and Passwords
BROWSING HISTORY, KEY COMMANDS AND PASSWORDS We want to keep you informed with the latest technology tips. Here are some that we’ve found most helpful this month. In Chrome or Firefox browsers, y...
Shared Outlook Calendars
SHARED OUTLOOK CALENDARS Sometimes it’s helpful to view multiple calendars within your calendar in Outlook, especially if you need to keep track of multiple colleagues’ meeting schedules. Here’s ...
A Recent iPhone Scam
A RECENT IPHONE SCAM iPhones are notoriously safe against viruses and malicious software. And most of us would consider ourselves wise in detecting these cyber-scams in the current age of technolog...
HEIC Files and more…
HEIC Files, Windows Shortcuts, and more… What are HEIC files? HEIC files (High Efficiency Image Format) are image files from an iPhone. They aren’t natively supported by Windows but there should be...
Take Google’s Phishing Quiz to Sharpen Your Security Skills
Take Google’s Phishing Quiz to Sharpen Your Security Skills This month, we’re sharing a great tool you can use to help train your staff to recognize email phishing attacks. Google has an interactiv...
Holiday Gift Guide from our Technicians – 2018
Holiday Gift Guide from our Technicians – 2018 Our technicians have the best recommendations for gifts this year, no matter the age or budget. Keep reading for our gift ideas, and you’re sure t...
How to Work in IT
How to Work in IT – Advice from Mick Reilly, Decypher’s Vice President and Technical Director Mick has over 19 years of experience in Information Technology, and he specializes in Cisco networkin...
The Easiest Way to Protect Yourself from Cybersecurity Threats
The Easiest Way to Protect Yourself from Cybersecurity Threats The Best and Easiest Protection Solution Available to You The best way to prevent breaches is to deploy multi-factor authentication or...
Equipment Lifespan – What You Can Do
Equipment Lifespan – What You Can Do Tidy Equipment = Longer Lifespan We often see messy equipment racks and offer to tidy them up for our clients. This isn’t just a cleanliness pet peeve – it ...
Cybersecurity & Russia, iPhone Charging, and more…
Cybersecurity & Russia, iPhone Charging, and more… Keyboard on Windows If you tend to accidentally press keys on your keyboard (perhaps due to hand tremors), “Filter Keys” can be enabled on Windows...
What? You’re Not Using Office 365? Five Reasons Why You Need to Start Right Now
If you missed your invitation to the party, here it is. Chances are that your competition is already using the Microsoft Office 365 suite of tools to maximize their productivity and grow their busi...
What is Managed Services?
What is managed services? It’s a question we hear often, and it’s a valid one. The IT community and MSPs (managed service providers) frequently use the term, but with little to no explanation a...
Surface Pro, Microsoft Office and Apple OS X Tips
Surface Pro, Microsoft Office and Apple OS X Tips Traveling with your Surface Pro When traveling with a Surface Pro for extended periods of time, we recommend shutting the device down. When the de...
4 Simple Steps to PCI Compliance
Like any business owner, you care about growing your business while protecting your customers’ confidential information. PCI DSS (Payment Card Industry Data Security Standard) is a security standar...
Holiday Gift Guide from our Technicians – 2017
Holiday Gift Guide from our Technicians – 2017 Our technicians have the best recommendations for gifts this year, no matter the age or budget. Keep reading for our gift ideas, and you’re sure to...
Laptop Upgrades and VoIP Quality of Service
Laptop Upgrades and VoIP Quality of Service Laptop Upgrades We’ve noticed that many customers buying new MacBooks are running into space issues because of hard disk drive downgrades. Some of our cl...
Memorable Passwords, Phishing, and Troubleshooting
Memorable Passwords, Phishing, and Troubleshooting When Troubleshooting, Don’t Overthink It If your computer is acting erratically, try basic troubleshooting first. This could include powering the ...
Post-Hurricane Support and Recovery
Post-Hurricane Support and Recovery We’re thinking of all those affected by recent hurricanes that impacted the U.S. and the Caribbean. Let us know if there’s anything we can do to help recover you...
Email Encryption, Send Limits, and Equipment Replacement
Email Encryption, Send Limits, and Equipment Replacement Equipment Replacement Often, sticker shock steers us to purchase cheaper solutions, but these decisions can come at a cost. That cost could ...
Important Security Update – Petya Cyberattack
What is Petya? This ransomware is a variant of an older attack, dubbed “Petya,” except this time the attack uses EternalBlue to target Windows systems—the same exploit behind the infamous Wan...
WannaCry And HummingWhale: Keep Yourself Protected
WannaCry And HummingWhale: Keep Yourself Protected WannaCry The WannaCry virus made quite an impact this month, but the U.S. was less affected than other countries. Over 90% of WannaCry’s victims w...
How To Keep Your Browsing Data Private
How To Keep Your Browsing Data Private The government has recently moved to deregulate internet privacy laws so that Americans’ browsing data could be up for grabs to the highest bidder. Internet s...
Cybersecurity Tips To Avoid Getting Hacked
No one wants to get hacked, but the reality of our online environment means it will likely happen sooner or later if we don’t follow the latest cybersecurity tips. This month’s Tech Tips focuses on...
DNS, HP Scanning, and the Best of CES – Decypher Tech Tips
We want to keep you informed with the latest technology tips, so we’re sharing information from our technical meetings that we’ve found most helpful this month. DNS: Sometimes mistakes happen w...
Decypher Tech Tips – January 2017
We want to keep you informed with the latest technology tips, so we’re sharing the information we’ve found most helpful this month. Office for Mac Updates: New Office for Mac Updates are bringing m...
Amazon Echo vs. Google Home: Full Breakdown
Amazon Echo vs. Google Home: Our technicians have outlined some of the differences between these home automation systems to help you decide which one is right for you. Keep in mind that with both d...
November Tech Tips – Technician Gift Guide Edition
Our technicians know just the right gadgets to fill up your wish list this year, whether you’re shopping for loved ones or yourself. In our first-annual Technician Gift Guide, we give you some of ...
Network Share and Power Outages – Decypher Tech Tips, June 2016
We want to keep you informed with the latest technology tips, so we’re sharing the information we’ve found most helpful this month about Network Share, printing and scanning, and how to deal with p...
Dropbox, Printing, and Office 365 – Decypher Tech Tips, May 2016
We want to keep you informed with the latest technology tips, so we’re sharing the information we’ve found most helpful this month about Dropbox, printing, and Office 365. Dropbox: Dropbox creates ...
Software Updates and More – Decypher Tech Tips, April 2016
We want to keep you informed with the latest technology tips, so we’re sharing the information we’ve found most helpful this month regarding software updates and more. Internet Browsers: Be careful...
Decypher Tech Tips, Jan 2016 – Watch Out For These Email Scams!
We want to keep you informed with the latest technology tips, and alert you to two recent email scams affecting our clients so you can protect yourself and your information: Email Scams – Stay Al...
Simplify Calling into Conference Calls with this Simple iPhone Tip
Simplify Calling into Conference Calls with this Simple iPhone Tip Dialing into conference calls can be a real hassle, especially when you’re on the go and have to punch in an access code in additi...
Decypher Tech Tips – October 2015
Decypher Tech Tips – October 2015 We want to keep our valued clients informed with the latest information regarding technology. That’s why we thought you’d enjoy some tips from our recent technic...
Windows 10 is here…should you upgrade?
Microsoft has finally released Windows 10 — the latest overhaul to the most popular operating system in the world. Is an upgrade in your future? We think it should be! Here are some of the stando...
The Benefits of a Cloud-Based Phone System
Antique. Dinosaur. Archaic. Have you or your team ever used these words to describe your organization’s phone system? If so, a change is probably long overdue. But is it really worth it to upgrad...
Password Managers: Protecting Yourself in the Age of Hackers
Whether it’s warnings about Heartbleed, the “largest data breach” ever, or Internet browser vulnerabilities, new online security threats are popping up every day. In the age of hackers, what is ...
The Heartbleed Bug – What You Can do to Protect Yourself
The Internet has run wild with reports of a new security threat, the “Heartbleed” bug. What is it, how does it affect you, and what can you do about it? In simple terms, Heartbleed is a vulnerabili...
What Windows XP End of Life means for you…
As of April 8, 2014, Windows has pulled the plug on XP. But there’s no need to panic – this doesn’t mean that XP will stop working. That being said, there are some important things to keep in min...
What is BYOD?
BYOD = Bring Your Own Device The “device” is a mobile one – whether it’s a smartphone, tablet or laptop. BYOD refers to the policy of organizations (businesses or schools) to allow their employee...
Clean Up a Slow PC
Few things are as frustrating as when your computer is acting sluggish and glitchy. Fortunately, there are steps you can take to ensure that your PC continues to run smoothly. Routinely cleaning up...