Cybersecurity &
Business Technology Blog

Practical advice to protect your business, explained in plain English.

Ransomware

Supposing Is Good, But KNOWING Is Better

Supposing Is Good, But KNOWING Is Better Computer Security Mark Twain Once Said, “Supposing Is Good, But KNOWING Is Better” If you want to know for S...

July 1, 2018 1 min
Phishing & Social Engineering

Biggest Security Threat to Any Business…

Biggest Security Threat to Any Business… Computer Security The #1 Security Threat To ANY Business Is …You! Like it or not, almost all security breache...

July 1, 2018 3 min
Compliance & Regulations

“Not My Company…Not My People…” You Say?

“Not My Company…Not My People…” You Say? Uncategorized

Don’t think you’re in danger because you’re “small” and not a big target like a J.P....

July 1, 2018 2 min
Cybersecurity

Best Hybrid VOIP – Star2Star

Best Hybrid VOIP – Star2Star Star2Star Provides the Highest Quality & Reliability in the Industry Experience the Highest Call Quality & Reliability in...

July 1, 2018 1 min
Cybersecurity

‘Here are the 3 ways we’re doing AI & deep…

‘Here are the 3 ways we’re doing AI & deep… Tech Solutions Now ‘Here are the 3 ways we’re doing AI & deep learning all wrong.’ http://buff.ly/2l8yS3C

July 1, 2018 1 min
Threat Intelligence

4 Ways to Increase MRR 3x in Less Than a…

4 Ways to Increase MRR 3x in Less Than a… Tech Solutions Now 4 Ways to Increase MRR 3x in Less Than a Year via @bberg1010 #SaaS #growthhacking

July 1, 2018 1 min
Cybersecurity

Looking for a password manager?

Looking for a password manager? Computer Security The best password managers for PCs, Macs and mobile devices – http://bit.ly/1yEEOAz

July 1, 2018 1 min
Threat Intelligence

Be wary of order confirmation emails

Be wary of order confirmation emails Computer Security If you receive an email this holiday season asking you to “confirm” an online e-commerce order...

July 1, 2018 1 min
Threat Intelligence

Need a Cost-Effective Cyber-Security Initiative?

Need a Cost-Effective Cyber-Security Initiative? Computer Security The most cost-effective cyber-security initiative you can employ – employee trainin...

July 1, 2018 1 min
Cybersecurity

Mobile Apps: No Respect for Your Privacy?

Mobile Apps: No Respect for Your Privacy? Computer Security Study: 85% of mobile apps fail to disclose how they use user data – http://bit.ly/1DZuSEH

July 1, 2018 1 min
Threat Intelligence

A Wreck in the Self-Checkout Lane

A Wreck in the Self-Checkout Lane Computer Security In Home Depot Breach, Investigation Focuses on Self-Checkout Lanes – http://bit.ly/1v0aAWH

July 1, 2018 1 min
Threat Intelligence

Does the Home Depot security breach affect you?

Does the Home Depot security breach affect you? Computer Security In wake of confirmed breach at Home Depot, banks see spike in PIN debit card fraud –...

July 1, 2018 1 min
Cybersecurity

VoIP Phone Service Test

VoIP Phone Service Test Free Stuff Are you considering changing to a VOIP (Voice Over IP) phone system?  One possible obstacle is whether your interne...

July 1, 2018 1 min
Cybersecurity

PowerListings Video

PowerListings Video Search Engine Optimization Our PowerListings technology lets you seamlessly update, sync, enhance and monitor your business listin...

July 1, 2018 1 min
Threat Intelligence

Windows XP End of Support (EOS)

Windows XP End of Support (EOS) Computer Security On APRIL 8, 2014 Microsoft support for Windows XP ends and 60% of those companies still using Window...

July 1, 2018 1 min
Threat Intelligence

Free Virus Cleaning CD

Free Virus Cleaning CD Computer Security This free virus cleaning product was formerly only available to resellers and business license customers. Now...

July 1, 2018 1 min
Cybersecurity

Office 365 Login

Office 365 Login Microsoft Office We’re moving more and more client email systems to the cloud using Microsoft Office 365. Here’s how you can access y...

July 1, 2018 1 min
Threat Intelligence

Get 1 hour of FREE Computer Support

Get 1 hour of FREE Computer Support Free Stuff Is Your Computer Support Guy Treating You Like A “Bad Date”? Not returning your calls fast enough? Cons...

July 1, 2018 1 min
Cybersecurity

Good Listeners

Good Listeners Testimonials I interviewed several consulting companies and Tech Solutions Now was the only company that actually listened to me and of...

July 1, 2018 1 min
Cybersecurity

Trusted Partner

Trusted Partner Testimonials We trust Tech Solutions Now because they think like owners of our business. They work closely with us on issues and lead...

July 1, 2018 1 min
Cybersecurity

Connect to Our Live Web Support

Connect to Our Live Web Support Top Support Tools To get remote support: Give us a call and we will provide a required 6-digit code. Then CLICK HERE t...

July 1, 2018 1 min
Cybersecurity

Microsoft Office 2010

Microsoft Office 2010 Microsoft Office If your PC is NOT preloaded with Office 2010, you can download it here: http://office.microsoft.com/en-us/buy/u...

July 1, 2018 1 min
Cybersecurity

Windows Help program

Windows Help program Microsoft Windows Windows Help program (WinHlp32.exe) no longer included with Windows but some applications still need it! You ca...

July 1, 2018 1 min

Don't Wait for a Breach

Reading about cybersecurity is great. Actually protecting your business is better. Get started with EZPZ Cyber today.