Our focus is supporting all technology needs of small & medium businesses.
Through our managed services products and use of highly reliable equipment, we bring enterprise-class reliability to our clients.
Since 2000
Common Fonts
When creating an e-mail signature in Outlook or sharing a word or excel file, it is important to remember that fonts are not common across all platforms. If you use a font that does not on exist on the recipient’s device, your signature or files appearance will change as the font you selected is replaced with a default font. (more…)
The Edge of WiFi
When you have a weak wireless signal, you can try and boost it in a couple of ways:
- Make sure the wireless access point (WAP) closest to you is not obstructed. Clear away any dense objects within a foot of the device. You might also reposition it to boost the signal.
- Make sure your device in not in power save mode (yellow battery icon on iOS). It can be disabled in Settings > Battery > Low Power Mode: set to off.
- For services requiring more bandwidth, such as streaming video or sending large email attachments. You can often download content while closer to the WAP as you would for offline playback.
Positive Pay
A business may be held liable for all or a substantial portion of any loss when checks are stolen or altered. Positive Pay is an automated check fraud detection service offered by most banks. It matches the payee, check number and dollar amount of each check presented for payment against a list of checks issued from your accounting system. All three components of the check must match exactly or the check will not be paid. (more…)

Avoiding Cyber Fraud
Here are some tips from the FBI you can use to avoid becoming a victim of cyber fraud: (more…)
Battery Life & Lifespan
There is a great deal involved in maximizing the performance of your laptop or phone battery. GPS, Temperature and screen brightness all play a role. This Page from Apple details how to optimize each device.
The Traveling WiFi Circus
Whether you are in a hotel, airport or a coffee shop, WiFi can be spotty. The most common cause is the requirement for you to agree to an acceptable use policy on each device. This must be done before you can connect to your email or VPN. To do this, launch your browser and go to a new page. At this point you will be redirected to accept an agreement, or in some cases pay for access. Once you have joined one of these restricted networks, your device will always automatically reconnect in the future; (more…)
iOS 13 Preview
Apple announced the new features of iOS 13 More here… Do not be the first to upgrade. Turn off Automatic Updates: Settings > General > Software Update > Automatic Updates > Off
Real ID
Your current Illinois driver’s license will not be accepted at airports, military bases and secure federal facilities after Oct. 1, 2020. You can obtain a REAL ID card or use a passport after that time. To see what documents you need to apply for a REAL ID, visit the REAL ID Interactive Checklist. All Driver Services facilities are issuing REAL IDs, with the exception of mobile units and express facilities. To check your license look for a gold star at the top right. (more…)
This icon can ruin your iOS
Hackers are using the familiar Apple settings icon to trick users into hacking their own iOS devices. As I discussed in a previous post, this can permanently destroy your device. If you ever see the settings icon and a request to install, confirm or cancel, do not click any response presented. Rather, you should immediately close your app. If the message returns upon reopening the app, contact IT support. (more…)
USPS helps criminals read your mail
The U.S. Postal Service just fixed a security weakness that allowed anyone who has an account at usps.com to view account details for some 60 million other users, and in some cases to modify account details on their behalf. This would have been less of an issue before they released their latest service called Informed Delivery, which allows users to see the exterior of their mail. With this information, criminals can access private details and target you for fraud.
Gift Card Scam
The Internet Crime Complaint Center received an increase in the number of Business complaints requesting false requests to purchase gift cards. The victims receive either a spoofed email, a spoofed phone call or a spoofed text from a person in authority requesting the victim purchase multiple gift cards for personal or business reasons. (more…)
Office 365’s New Look
Office has a new look if you are on Office 365. One advantage that Office 365 offers is real-time access to the ever growing list of features that the product receives on an ongoing basis. Microsoft has also released its on-premise version of Office 2019
Mac Mojave
Apple released the latest OS for the Mac platform. It has a new look and some great new features including group FaceTime. Be sure to run a full backup before upgrading.
Install Mojave from the App Store
If you have already installed this update you can get more training here.
Facebook 90M Hacked
Attackers exploited a vulnerability in Facebook’s code that impacted “View As” a feature that lets people see what their own profile looks like to someone else. This allowed them to steal Facebook access tokens which they could then use to take over people’s accounts.

Drones as a service
Capturing a unique perspective of a project is easier than ever with the use of a drone. Services such as Droners.io connect you with pilots from around the country, making capturing those images very easy and affordable. Costs range from $40-$150 depending on the scope of your project. (more…)

FBI: Remote Desktop Compromised
Remote administration tools, such as Remote Desktop Protocol (RDP), as an attack vector has been on the rise since mid-late 2016 with the rise of dark markets selling RDP Access. Malicious cyber actors have developed methods of identifying and exploiting vulnerable RDP sessions over the Internet to compromise identities, steal login credentials, and ransom other sensitive information. (more…)
High Quality Voice Calls
Your iPhone is capable of making higher quality voice calls with VoLTE. The quality improvement comes from increasing the bandwidth used to carry your voice, relative to a traditional cellular call. To enable this go to Settings > Cellular > Cellular Data Options > Enable LTE > Select Voice & Data

OneNote
OneNote is a virtual notebook, with incredible search capabilities, that synchronizes across all your devices and between multiple users in real time. A universal platform, it works on Windows, Mac, iOS, Android, and Online. Everything is stored as a separate element so markups can be removed, files or images can be saved or moved. Pages are a limitless whiteboard that can accept markups, tags, MS Office and 3rd party files, tables, images, video, audio, web elements and screen clippings. Here are our detailed instructions..
iPhone as backup ISP
Did you know you can use your iPhone, or iPad with cellular service, as a backup internet connection. You need to set it up before you loose Internet service. (more…)
Security Awareness Training
Today the greatest threat to company security is the email vector. KnowBe4 provides security awareness training and simulated phishing attacks to test employee response to manage the continuing problem of social engineering.
Amazon Prices
Did you know that prices on Amazon change hourly. CamelCamelCamel.com tracks prices and can send alerts when they are at their lowest. Browser Plug-ins help simplify the service.
Never use Online Password Services
There are a multitude of services that are built specifically for storing your passwords. I’d like to briefly delve into why it is foolish to use any of them.
First of all, there are specific instances of these sites being hacked, for obvious reasons. If you store all the gold in one bank, that’s where the robbers are going to go. (more…)
Fake Security Alerts
Should you get a pop-up like this one. Do not follow the advice in the window, and in particular, do not call the number in the window. Just close the browser immediately. DO NOT click on any part of the window, as this can trigger a virus installation. If the pop-up is preventing you from closing the browser, then reboot your computer. Also, make a mental note of the site you were visiting when the alert popped up. Very often it will be a news site or a content aggregation site; the type of site with lots of ads in the borders or strewn throughout the articles. (more…)
SketchUp Make is Illegal
Sketchup Make is a free version of SketchUp, however, the license is not for commercial use. Employees of our clients will often unknowingly request that we install software that has similar limitations. These requests are not intended to do harm, but they can be costly. (more…)
FBI: Internet-Connected Toys
Consumer Notice: Internet-Connected Toys Could Present Privacy and Contact Concerns for Children
The FBI encourages consumers to consider cyber security prior to introducing smart, interactive, internet-connected toys into their homes or trusted environments. Smart toys and entertainment devices for children are increasingly incorporating technologies that learn (more…)
Family Internet Safety
Keeping your family safe on the Internet is a moving target. The Internet brings technology into our lives, but like the Gutenberg Press, its original purpose has been corrupted. If left unchecked, it will influence the very character of your children. To this end, I have a number of technologies and insights that can aid you in protecting your loved ones. Read more below. (more…)

KeePass
Passwords should never be stored in clear text, Excel or in the cloud. These are easy targets for viruses and hackers. There is a open source program called KeePass that will store your passwords in an encrypted file on your Mac or PC. A pin or password is used to access your data. You can also load this directly to your mobile device without it ever touching the cloud. KeePass will actually speed your access to web based accounts (more…)

Doceri
Doceri allows you to mirror and control any PC or Mac from a wirelessly connected iPad. It is also an interactive whiteboard that can be used to create a presentation, insert images, save and edit and record a screencast video that can be saved and shared. It works with any software as the makeups are actually being done in a separate space in front of your computers software. (more…)
4K Monitors & TVs
Resolution Comparison
4K monitors are taking over, but there are a number of pitfalls when implementing them.
Video cards: Even a lightweight card a NVidia Quadro NVS 295 (Passmark 103) will let you run at 4K resolution, but the PC is unusable. A more typical production card used by our architecture clients is the NVidia Quadro K2000 (Passmark 1672). The K2000 had no problem running a Samsung 75″ TV, and produces a fantastic picture. (more…)
Out of Office from your iPhone
Did you know you can enable your Out of office message from your iPhone (more…)