Author Archives: J Colin Petersen

Phishing Scammers Using Hurricane Matthew to Steal Your Money, Data, & Life

scammer road sign warning

Disasters such as Hurricane Matthew bring out the best in people – and the worst. Unfortunately, the phishing scammers, schemers, and con-artists – the worst – use events like this to take advantage of the best. Phishing scams are the new form of fraud in the digital age. Don’t let your good nature leave you […]

6 Ways Your I.T. Support Has Too Much Control Over Your Network

it control

As the CEO, CTO, or owner of your business, you need to have a certain level of trust in your in-house computer guy or outsourced I.T. support company. At J –  I.T. Outsource, we know this is important, so our team works hard to earn our client’s trust by working in their best interests. We’ll even go […]

5 Easy Ways to Get Your Business Computers Ready for “Back to School” … and for Maximum Performance All Year

dirty computer

While your business computers might not be “going back to school,” your children and your employees’ children are preparing for the biggest event of the year. Why not take this as a good reminder to prepare your office for a semi-annual cleanup of your computers, servers, and electronic equipment, because a lack of maintenance – […]

Is Your I.T. Service Holding Your Network Prisoner?

it gate keeper

  Here’s a question you’ve probably never asked yourself about your I.T. service but will now probably keep you awake tonight (sorry). If your I.T. guy went away, would you know where all the passwords, data, software licenses and disks, key codes, and other important information were stored? And here are the follow-up questions that might […]

Should You Leave Your Computer on At Night or Turn It Off?

on and off

  We’re often asked by our clients and their team members if they should leave their computer on all the time or turn it off when they are not using them. Several years ago, we would have told them clients to turn their machines off to save power. But with the extreme proliferation of viruses, ransomware, and […]

Ransomware Prevention: How to Avoid Losing All Your Business Files to Cryptolocker, Locky, and Jigsaw Ransomware

ransomware

If You Thought Cryptolocker was Bad, Meet Jigsaw and Locky Ransomware Updated June 22, 2016 Back in December 2015, we shared with you a few Crypolocker stories about a number of clients and friends who had all of their vital business data kidnapped. We want you, our clients, and any business owner who is worried about their valuable business […]

Why The Death Star Explosion (and Your Data Breach) Was an Inside Job

data

  Why did the Death Star get blown up? Because there was a data breach in the Empire. Yes, Luke Skywalker and his rag-tag band of rebels attacked the Death Star with their tiny ships, but it was an analysis of the Death Star plans that revealed a weakness in the battle station. Plans that were STOLEN and couriered to […]

Keyboard Shortcuts – 19 Ways to Become a Computer Power User

desktop shortcut

  Dan Russell, a “search anthropologist” at Google, has studied thousands of computer users. He’s found that 90% of people don’t know how to use the keyboard shortcuts command “Ctrl-F” to find a word in a document or web page. If you do know this, then congratulations, you’re in the top 10% of users! Haven’t used the Ctrl button in a while? It’s usually on […]

Why Would a Third-Party Vendor – Operating in the Year 2014 – Be Complaining About Our Level of Security?

Do You Really Want Me to Keep the Door Unlocked for Just Anyone? “You have some very strict security policies in place.” Normally, this is a compliment. Any I.T. firm worth dealing with should be serious, no – rabid, about network security. Their own and their clients’. But in this case, it was delivered as […]

Why You Can Read Your Employees Emails… But Not Judge Them

Six months ago you might have gotten a dirty look from your spouse for knowing that Ashley Madison is a website with the tagline “Life is short, have an affair.” But this week, you’re off the hook: everyone knows about it. The online hookup service which specifically targets married folks seeking “discreet” affairs was all […]