SolutionOne Blog

SolutionOne has been serving the North Texas area since 2004, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Increase Security with Multi-Factor Identification

Using a strong password with complex combinations of letters and numbers will go a long way in protecting your account, but passwords provide only one level of protection against hackers. Additional levels of security can be added with multi-factor authentication. This is the best protection available for your internet accounts, and major technology companies have recently made this a reality for the public.

0 Comments
Continue reading

Finding Savings in Your Underutilized Servers Part 2

Earlier this week we talked about ways to shave your IT budget by combining your servers with a process called virtualization. This can equal big savings when you are running multiple single-task servers. Another way businesses can save money is by migrating their entire server infrastructure to a managed cloud environment.

0 Comments
Continue reading

Calculate Your Downtime

Does it sometimes feel that business is going well, yet your bottom line is taking a hit? If time is money, then downtime is anti-money, and downtime may be your biggest budget buster. To help you determine exactly how much your IT downtime is costing you, we have two mathematical formulas you can apply to your business.

0 Comments
Continue reading

Password Vulnerability and Security, Part 1

A weak password makes identity theft easy for hackers. You would never paint your social security number on the side of a truck and drive around town, but if your password is shared, left out in the open, and used on multiple sites, then you might as well ride shotgun with the Lifelock CEO (his SSN has been stolen 13 times).

0 Comments
Continue reading

3 Handy Tools to Remember Your Passwords, Part 2

Last time, we spoke about password security, we went over the importance of using strong passwords to avoid identity theft. In part two, we will discuss three easy password solutions that can help you manage all of your different passwords.

0 Comments
Continue reading

File Sharing Options to Consider


It's the information age. If you are always on the go, or you work as a member of a team, it helps if your work is accessible remotely. The ability to have relevant files on hand is nice and at times can be essential to the welfare of your business. Below are a few cloud-based options that could offer you or your company a solution for your remote file access needs.

0 Comments
Continue reading

Know These 4 Intruders that Threaten your Business

In order to best serve their clients, companies need to have a comprehensive program in place to help them defend their systems from malware attacks on their company's infrastructure. These attacks can have a devastating effect on a business's continuity, so having an appreciation for exactly what types of adversaries your company is up against is important. There are several types of potential intruders that you should be aware of.

0 Comments
Continue reading

Troubleshooting a Wet Cell Phone

Stories about smartphones getting wet usually have a funny twist to them, unless it is your own device, in which case the story is comparable to a Shakespearean tragedy. Whether your toddler threw your iPhone in the toilet, or your Galaxy S3 took up swimming, there are a few tricks you can try before dropping cash on a new device.

0 Comments
Continue reading

Stow and Move your Gadgets with GRID-IT

Need a handy way to pack and migrate all of your cables, peripherals, and other must-have devices when traveling? Check out the GRID-IT system - designed to keep your stuff organized and held in place.
Tags:
0 Comments
Continue reading

VoIP, More Features and New Possibilities

If you are reading this, then you obviously have an internet connection. Most internet users browse websites, check emails, and perhaps play a game or two, but if these activities are the extent of your internet usage, then you are missing out on a powerful, cost-effective tool called VoIP that uses the internet to entirely replace your old phone system.

Tags:
0 Comments
Continue reading

The Fall of the Mighty Fax Machine

If Back to the Future's Marty McFly time traveled to the modern office, he would probably feel a little disoriented. He would see employees squinting at little televisions, mobile devices right out of Star Trek, and no rows of file cabinets. Then Marty would notice a fax machine and feel right at home, because fax machines have been around forever.

0 Comments
Continue reading

The Quest for the Paperless Office

Ever since the first microfilm machine was rolled off the line 100 years ago, mankind has been striving to achieve the paperless office. If you are too young to remember using microfilm, think of an arcade cabinet, except, instead of Mortal Kombat, documents battle it out over a projected screen. Thankfully, we have come a long way in 100 years.

0 Comments
Continue reading

5 Solutions To Look for in North Texas Computer Support

In the market for a new computer service provider? Choosing a company to service your technology is a decision that carries a little more weight to it than, let's say, finding someone to trim your hedges. This is because you are essentially handing over access to all of your company's sensitive information to somebody else.

0 Comments
Continue reading

Pirates Ahead, Be Ye Warned!

"Ahoy ye swabbies! We be takin' heavy damage on the starboard side! Brace ye-selves for impact! Arrrr!" That is pirate talk for "Hello fellow co-worker. Our CRM tools crashed again and IT needs to reboot the server." September 19th is Talk like a Pirate Day!

0 Comments
Continue reading

5 Email Threats You Must Know

If only spam were true. You would have thousands in unclaimed money, cute singles would be lining up to meet you, and there would be a magic pill that would revolutionize your personal life. Some spam is so ridiculous they are instantly deleted, others are more subtle and dangerous. Here are some threats to watch out for before you open that unsolicited email.

Tags:
0 Comments
Continue reading

There’s Electricity in the Air Over Intel’s New Chip

Intel has been conducting experiments that would make electricity pioneer Nikola Tesla proud. Intel plans to get consumers charged up over their newest technology that will allow laptops to provide electricity to nearby smartphones without cables. Enough with the electricity puns - we're just ecstatic about this new technology!

0 Comments
Continue reading

Travel With Free Wi-Fi

Everybody likes the free goodies in a hotel room, tiny shampoo bottles, coupons to nearby restaurants, and HBO top the list. Wi-Fi however, our favorite goodie, sometimes fails to make the complimentary goodie list. It seems a little messed up to us, that hotels (the place you work and sleep) charge you for Wi-Fi while Burger King gives it away for free, but we have found a Wi-Fi loophole to help you out.

0 Comments
Continue reading

Is the Apple iPhone 5 Built for Business?

September 21st is the official launch date for Apple's iPhone 5. In typical Apple hype, they officially released the specs one week before launch, putting an end to wild rumors throughout the technology community. If you are an Apple aficionado, upgrading to the iPhone 5 will be a knee-jerk reaction, but if you find yourself on the fence then check out what's new.

0 Comments
Continue reading

Prevent your Web Browser from Storing Passwords

For sites you need to log into often, having your browser remember your password can save you time logging in, especially if you are using secure passwords that you might need to look up otherwise. There are circumstances where you might want to manage what personal information gets stored in your web browser.

0 Comments
Continue reading

Protect your Dropbox with Two-Step Authentication

Dropbox, a popular file-hosting service for both home-users and businesses, recently added a new security feature to prevent unauthorized access to your Dropbox files and folders. You can enable Dropbox to send a security code to your mobile phone whenever you log in.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Blog Archive

SolutionOne