During the onboarding process or while on a service call, you may have heard us use the term “CoreCare agent” but weren’t quite sure what that is or does.
As a contracted client, either CoreCare | Critical or CoreCare | Basic, there is a small application that runs on your computer, whether it’s a PC, laptop, Surface or server, that periodically sends information about the status and health of that computer to our RMM (remote monitoring and management) utility database (aka “the system”). Some of that information includes things like:
Say hi to Jim Carraher! In the biz for 39 years, there isn't a lot Jim doesn't know about phone systems and their applications. With the title of Business Development Manager, (or self-dubbed "sales guy") Jim certainly isn't your typical salesman. He spends most of his time listening. After he's heard all your concerns, struggles or objectives, he suggests specific applications, integrations or pieces of technology that are capable of providing the solutions you're looking for. But, he's also the first person to come out and tell you that an application or integration is not right for your business and isn't worth investing in. To learn more about Jim, check out the interview!
Are you still working off an old in-house or hosted server for your email? If you haven’t already made the move to Office 365, it’s time you do. With the benefits far outweighing the costs, there’s no reason to keep your business in the past with outdated technology. Seriously – once you finally take the leap and make this change, your only regret will be not doing it sooner.
How many times are you interrupted during the work day? Are those interruptions impeding you from getting work accomplished? Many workers who feel overloaded by their workloads feel this way because they spend so much time dealing with interruptions, they don't have time to actually focus on their work.
Did you know that it takes an average of 25 minutes to get back on point after an interruption? If you consider how many times you’re interrupted every day by coworkers, phone calls, emails, texts and the like, that can certainly add up to a great deal of inefficient work time. We all deal with interruptions every day, and for a lot of us, it’s hard to say “no”.
A constant drive to create new features, combined with limited resources, leaves software with an expiration date. Since the goal of most tech companies is to evolve and innovate, they can only lend so much time, money and energy on their old programs. So, software is given what's called an end of life date. On that day, the developer will no longer fix any issues found in the software. Not even Microsoft has the resources to keep software supported forever. So, it's coming time to say goodbye to Windows 7. Windows 7 will no longer receive patches for new bugs or holes discovered as of January 14, 2020.
When an editor for The Economist (Leo Mirani), received a free mini USB-powered fan at the Singapore summit (where President Trump and North Korean leader Kim Jong-un met) he chose to not plug it in. He didn't know who made this fan, where exactly it came from, or if it had anything on it. However, he did know that any USB device presents the possibility of malware. Whether it's a fan, thumb-drive, mouse, keyboard (or anything else that plugs into your phone or laptop) it could pose a threat to your security. And when all the journalists at a high-stakes meeting - between two countries who have been known to partake in cyber-warfare - are given USB devices, it's best to err on the side of caution.
Today, get to know Galen! As one of our Systems Admins, Galen is always looking for ways to improve the workflows of his clients by introducing new solutions or applications. He also troubleshoots and repairs equipment when clients encounter issues. If Galen were lucky enough to be given a small fortune, he may not be be frugal enough to spend it all in one place, but he's sure that if he absolutely had to, he could find some things worth the money at a big-box electronic store. For more on Galen, check out the video!
The sole objective of any phishing email is to trick you into clicking it. If you aren't vigilant, it can be easy to fall for. It doesn't matter who you are, how much money you have, or what company you work for, you can be targeted and it's important to know how to protect yourself.
Since Amazon and Uber are so well-known and widely-used, cybercriminals have often chosen them to impersonate. Their aim? To lull you into a false sense of security at seeing the familiar brand name. With the addition of a subject line that will illicit a response, anyone could find themselves clicking on a link before even taking a second to think.
For over 15 years, our IT experts have assisted small and midsize businesses with their technology needs.