- "If you are a small business owner with 5 or more computers looking for good computer support then contact us for a FREE HEALTH AND SECURITY CHECK of your network!"
Or subscribe by email:Subscribe to our informative technology blog from Erlach's technology experts by email, RSS feed or through Facebook's NetworkedBlogs
Category Archives: Blog
Think you can’t use your tablet to share screens with your co-workers? Think again. There are several apps available right now than enable you to share your reports, images, documents and videos with co-workers and friends. With these screen-sharing apps, you won’t even miss that heavier laptop. Whatever screen sharing it can do, your tablet can now do, too. But which screen-sharing apps for iOS should you download? Miguel Leiva-Gomez, a writer for the tech site smallbiz technology, recommends three that should handle all of your screen-sharing needs.
Do you have nightmares of your tablet falling into the hands of cyber thieves? Maybe you agonize that a hacker will break into your online bank account. These fears are justified. It’s increasingly difficult for all of us to protect our privacy in today’s Internet age. The good news? There are some very simple steps you can take to ensure it is less likely your personal information could be accessed by hackers, scammers or thieves. And a recent story by Forbes lists these tips.
Protect Yourself With Passwords
Google Reader, the widely used RSS reader, is all but dead. Google recently declared that it would discontinue the service once July 1 rolls around. This has hit several of the service’s biggest fans hard. The reality, though, is that there are other choices. Google made a decision to close the service since its user base was progressively falling. Nonetheless the closure of Google Reader provides an valuable lesson to consumers: There’s no guarantee that your favorite, free cloud service won’t vanish, also.
The impermanence of the cloud
Passwords aren’t sufficient anymore. That has been proven often by hackers, who crack passwords to gain access to the internal Web sites, computers, devices and online bank accounts of small companies across the country. Fortunately, Biztech Magazine has advice: Businesses can take steps to avoid the security holes of passwords. They can protect their Web sites and devices with two-factor authentication. This kind of move will greatly reduce companies’ vulnerability to cyber criminals.
Two steps are better than one
It’s a challenge to operate a successful small business today. You’re faced with escalating costs, sometimes unreliable employees, and competition from name-brand businesses with far deeper pockets. But at least your business can take advantage of larger tax breaks for purchasing new technology. BizTech Magazine recently covered how new tax breaks created in the American Taxpayer Relief Act of 2012 can help your business improve its technology while paying less for it.
The tax break