(403) 210-2927    Get SUPPORT

OnSite I.T. Blog

OnSite I.T. has been serving the Alberta area since , providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Your Computer Might Be Sharing Data with its Manufacturer

Your Computer Might Be Sharing Data with its Manufacturer

It is our hope that you are aware of how much of a risk spyware can pose to your business. Your business generates, collects, and leverages truly considerable amounts of data each day that is intended for your business only. While spyware that is introduced by a hacker is clearly a bad thing, what if the manufacturer of the device installed a program that pulled data from your machine?

0 Comments
Continue reading

Tip of the Week: Five Ways to Use Your Android Phone Faster

Tip of the Week: Five Ways to Use Your Android Phone Faster

More businesses are moving to mobile technology than ever before, and one of the most popular solutions to this phenomenon comes in the form of Android smartphones. Android devices actually have quite a lot of hidden features that you’ll want to consider so that you can get the most out of your technology. Here are some efficient tips to help you get more productivity out of your Android device.

0 Comments
Continue reading

ALERT: Meltdown/Spectre Vulnerability Can Affect Your Business’ Critical Infrastructure

ALERT: Meltdown/Spectre Vulnerability Can Affect Your Business’ Critical Infrastructure

Intel has had publicity problems in the past, but now things are getting critical. An issue was reported that could potentially cause the processing power of their chips to diminish. What are being known as the Meltdown or Spectre vulnerabilities, have businesses scrambling around looking for ways to protect their data and infrastructure from what is seemingly an oversight that affects most of today’s CPU architectures; namely those that rely on virtual memory.

0 Comments
Continue reading

Improperly Disposing of a Hard Drive Can Threaten Your Security

Improperly Disposing of a Hard Drive Can Threaten Your Security

No technology lasts forever. Your business will need to replace server hardware or workstations eventually, no matter how well you take care of it. However, what do you do with the hard drive of any device that you have to replace? If you don’t take action to destroy your old hard drive (after moving any data off of it as needed), you could be in violation of various compliance guidelines issued by HIPAA.

0 Comments
Continue reading

Tip of the Week: How ‘StarWars’ Can Compromise Your Data’s Security

Tip of the Week: How ‘StarWars’ Can Compromise Your Data’s Security

If you think about it, password security is an interesting phenomenon. The odds are that a user knows the importance of using a strong password, as well as the potential consequences of using weak ones. Yet, time after time, people would rather go with passwords that are easy to type and remember, as opposed to adding a few simple security measures.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Privacy Passwords Malware Network Security Smartphones Best Practices Internet Cybersecurity Cloud Microsoft Cortana Software Phishing Saving Money Excel Hardware Android Communications Business Computing Small Business Windows 10 Data Breach IT Support Outsourced IT Wireless Knowledge Virtual Assistant Managed IT Services Server Telephony VoIP Law Enforcement Wi-Fi Ransomware Tip of the week Computer Voice over IP Data Protection Applications WannaCry User Tip Marketing Holiday File Sharing Patch Management HIPAA IT Services eCommerce Router Office 365 Comparison Hard Drive Remote Computing Backup Online Shopping User Security Specifications Processors Telecommuting How To Conferencing Vulnerability Hosted Solutions Workers Email Apple Settings Business Technology Office Spyware Millennials Smartphone iPhone Battery Content Filtering HP Productivity Wireless Charging Sales Gmail Employer-Employee Relationship Chrome User Tips Lead Generation Miscellaneous Tablet Google Virtualization Managed IT Service Business Government Digital Search Windows 10 Presentation Edge Communication 5G Wireless Technology Save Money Managed Service Provider IBM Hacker Microsoft Office Hackers Customer Relationship Management IP Address Website Remote Monitoring Customer Service Mobile Office Domains Hard Drives Spam Technology Mobile Device Management Mobile Devices Public Speaking Two-factor Authentication Lithium-ion battery Augmented Reality Data Tech Support Apps Safety Productivity The Internet of Things Hiring/Firing Budget Gadgets Competition Browser Fun Big Data Document Management Innovation Users Paperless Office Upgrade Social Media