Prior to using IT Radix’s Get Help feature, you must install and execute a software program on your computer called TeamViewer by clicking on the appropriate button below. The TeamViewer software creates a secure connection between your computer and an IT Radix technical consultant that allows us to remotely see and control your machine so that we may assist you in problem resolution. If you choose to download and execute, the TeamViewer software will load a one-time copy on to your computer, and you will have to share a unique number with us in order for us to provide the functionality of the Get Help Feature. DOWNLOADING THE TEAMVIEWER SOFTWARE IS ENTIRELY VOLUNTARY. BY DOWNLOADING THE TEAMVIEWER SOFTWARE, YOU EXPRESSLY AGREE AND CONSENT TO BE BOUND BY THE TERMS. If you do not want to install and execute the TeamViewer software, please close out this window.
I started my technology career at Exxon back in the late 1980s. While Exxon was not on the bleeding edge of most computer technologies, it turns out they were on the bleeding edge of something—cybersecurity. In general, they were a conservative and cautious bunch which naturally resulted in a high cybersecurity awareness level.
Technology drives everything in today’s Fulfillment Operations. The rise of eCommerce and the “Amazon effect” have dramatically shifted customer habits and expectations. Customer demand for faster delivery places warehouses and fulfillment centers under immense pressure to improve accuracy and speed in order to satisfy their clients’ requirements.
Quick Tip: A password management solution simplifies compliance for HIPPA, SOX and more.
In our final blog in this series on how passwords help you protect your most important business data, we look at how rock-solid password management can also protect you from legal trouble and compliance.
Of all the senses in the human body, it can be argued that our sense of smell often evokes the strongest response in our minds. The wrong smell can keep us from entering a room or trying a new food, but the right scent can be aesthetically pleasing and can trigger memories, evoking an emotional response to our environment in a way that no other sense can replicate.
What You Can Do To Stop It Cyberthreats are everywhere these days. Hackers, scammers and cybercriminals are working overtime to break into your network – and the network of just about every business out there. They have a huge arsenal of tools at their disposal, from automated bots to malicious advertising networks, to make it […]
Quick Tip: Centralized password management simplifies access control
This blog gets at a really important topic for businesses, especially smaller businesses that don’t have a lot of extra resources for dealing with IT admin. Using a centralized access control system to make sure your systems aren’t accessible by people who have left your company is really important to overall security.
There is a fun feature in Outlook that allows you to set up Electronic Business Cards for your contacts. This is useful because it enables you to see a picture of your contact—putting a face to the name.
Adding a picture to your Microsoft Outlook contacts is easy
Go to the Outlook navigation bar and click the “People” icon
(the icon looks like two people standing near each other).
Under “Current View” click on the “Business Card” view.
If you’re like many businesses today, there’s a good chance you’ve made this one mistake with your IT security: you don’t budget for it. Or if you do budget for it, it’s not enough to really protect your business. Time and time again, business owners decide NOT to invest in IT services.
“I want it so bad I can taste it!” Have you ever felt that way or said that? Most likely, the answer is “yes.” Many people feel that way about new technology. The excitement of a new technology rollout causes many to stand in line for hours, even days, to be the first to purchase the latest iPhone or other new gadget.