As a part of the “Let Me Help You” series, I recently talked about the importance of two-factor authentication (2FA) for the security of your network. Cybersecurity is a necessity in today’s technologically advanced world, and it starts with two basics. You need the best firewall and you need the best antivirus software. IT specialists like […]
It’s Time To Start Using Two-Factor Authentication On Your Devices
We hear from our clients how awful two-factor authentication is going to be, and we sympathize. But—every day brings a new story of a major security breach. We have to keep fighting the good fight. Especially if your business allows employee remote access to company data, you need to have this important preventive security in […]
Thieves Can Now Steal Your Identity Using Your Personal Cell Phone Number
Your personal cell phone number can be stolen, and your number ported to another phone and another carrier. And since that personal cell phone number is probably on all your accounts, from social media accounts to financial accounts, then the new owner of your number may be able to access these sites, then change your […]
Tips For Disaster Prep—It Could Happen To You
While it’s unlikely we will ever experience a hurricane in the Angola, South Bend, Fort Wayne, Toledo, or Battle Creek areas, we could have tornadoes and/or punishing storms followed by chaos and property damage. Below are some tips to keep in mind when the forecast turns dangerous. Contact your IT team to verify what is […]
Is Your Cell Phone Safe?
From Our “Let Me Help You” Series Our cell phones have long been an intimate, helpful, often fun element in our daily lives. When our cell phone rings, historically we have known it was okay to answer. But in the last year or so, this relatively ‘safe’ device in our lives has changed—and it’s not […]
Are Your Computers ‘Sleeping’ On The Job?
Every day it’s something new in our IT management service. Recently at Aptica, we have been fighting computers going to ‘sleep’ within a minute or two, even after being configured not to. Has this happened to you? We have found that the following steps resolve this issue. This seems to be a common new problem and […]
Protected and Productive? Inventory Your Information Technology System
I’m amazed it’s already the middle of July, but since I’m always the optimist, I know that I still have half a year to meet my business goals for Aptica LLC. I know for sure that I can’t lose any productivity, so I will inventory my assets to be sure I’m set for the next […]
Cyber Assault: Probably Not If, But When
First question, and I am sincere when I ask: Is your business network secure? Do you know that for sure, or are you thinking that must be the case because nothing has gone wrong for a while? I ask because it’s my business to know if my managed IT service clients are vulnerable to this […]
“Risk” Is An Inclusive Term In IT Management
Every business owner takes risks; it’s just part of the challenge of being successful. As computers have become more and more indispensable in business, how is computer risk defined in today’s global IT scheme? IT management is all about assessing what you have, what you may need, when you may need it, and how you […]
Security: A Good Time To Continue The Conversation About IT Management
Last week I talked about security as being one of the key reasons to let experts be responsible for your business IT management. After last Friday’s Wanna Cry ransomware attack, I want to revisit that notion. Institutions in over 150 countries were hit, with data files stolen and encrypted until a ransom was paid. In […]