In this issue:
- IT Security Commandment #8: Thou Shalt Test Yourself
- Why You Need Cyber Insurance
- No Need to Fear Windows 11
- Back to School with Backpacks
In this issue:
Security Tip: Beware of texts from unknown senders and do not click on links.
Did you provide your cell phone number for holiday shopping, tracking, or special offers? Then you are a bigger target for smishing attacks.
Why: A smishing message is a bogus text message carefully designed to look like a legitimate request from a reputable source in an effort to get you to willingly give up your personal information to a particular website or to click and download a virus.
Geraldo comes to IT Radix as a recent graduate from the College of Staten Island with a bachelor’s degree in Business Management. He brings with him over eight years of experience in various customer service roles.
At IT Radix, Geraldo is part of our Sales and Marketing Team.
Sometimes it’s easier to just say it…
...especially if you are doing a brain dump and want to get your thoughts down on paper (or on your screen).
Microsoft’s Dictate function is here to help! Available in Word, Outlook and PowerPoint, it allows you to create content using your microphone.
The 10 Commandments of IT Security
IT Security Commandment #9: Thou Shalt Address All Issues Immediately
You are at the dentist for your six-month checkup and cleaning. At the end of the visit, the dentist provides a summary of what he/she finds and says, “There is an issue I am seeing on the lower second bicuspid.
Did you know September is National Preparedness Month? I suspect most of us used to ignore or downplay this concept in the past. However, with our changing weather patterns, health pandemics, threats of war, not to mention the usual cyber threats, I hope that most of you at a minimum consider the potential risks and impact any one of these can have on your business and personal life.
In this issue:
15 Years and Counting!
We’re grateful for our wonderful clients and our dedicated staff who have supported us throughout these years. Thank you for being part of our journey. Enjoy this recent podcast with Cathy Coloff talking about how we do what we do and how it all started at IT Radix.
Data breaches and malware attacks on Macs have been on the rise over the past few years, so you must take the necessary precautions to protect your devices. Below are three easy ways to make your Mac more secure.
Install a mobile device management profile so you can give an administrator remote access to the device.
Is the Internet the greatest cost reduction and energy saving device ever invented? It may well be!
We often think of the Internet as a source of information and/or a means of communication. But with the Internet of Things (the networking capability of the internet allowing for communication between devices), the Internet can now be viewed and used as an “appliance” or even “partner” to assist you in managing your office.