Archives for Blog

Phishing Scammers Using Hurricane Matthew to Steal Your Money, Data, & Life

Disasters such as Hurricane Matthew bring out the best in people – and the worst. Unfortunately, the phishing scammers, schemers, and con-artists – the worst – use events like this to take advantage of the best. Phishing scams are the new form of fraud in the digital age. Don’t let your good nature leave you open to theft of your personal identity or money. If you own a business, the consequences of you or an employee getting phished can cause huge problems for you, your employees, and your clients. Phishing is just one source of disaster for your business. Is
Read More

J. Colin Petersen on the KMJ Now Podcast with Philip Teresi

J. Colin Petersen, President & CEO of J – I.T. Outsource was on the KMJ Now Philip Teresi Podcast on Saturday, October 1st. J. and Philip had a great time quotes from our website, debating which is easier – baking cupcakes or installing a new graphics card, and how stinky t-shirts aren’t the only thing that needs better hygiene. J. also shared serious information for CEOs, business owners, or any employee who uses computers. Listen on demand to find out: Why J. works so hard to hire great people. How he predicted the future of business computing. What’s going to happen
Read More

6 Ways Your I.T. Support Has Too Much Control Over Your Network

As the CEO, CTO, or owner of your business, you need to have a certain level of trust in your in-house computer guy or outsourced I.T. support company. At J –  I.T. Outsource, we know this is important, so our team works hard to earn our client’s trust by working in their best interests. We’ll even go so far as to tell our clients what they should and shouldn’t trust us with. Who are you trusting with your business? After all, your technology people – whether they are an in-house employee or outsourced I.T. provider – probably has access to
Read More

5 Easy Ways to Get Your Business Computers Ready for “Back to School” … and for Maximum Performance All Year

While your business computers might not be “going back to school,” your children and your employees’ children are preparing for the biggest event of the year. Why not take this as a good reminder to prepare your office for a semi-annual cleanup of your computers, servers, and electronic equipment, because a lack of maintenance – physical or digital – can decrease the performance and life of your computers and expensive servers. Here’s Why Business Computers Need Regular Maintenance Business computers, servers, and other electronic devices need cleaning both inside and out: for the software and the hardware. Letting dust pile
Read More

Is Your I.T. Service Holding Your Network Prisoner?

Here’s a question you’ve probably never asked yourself about your I.T. service but will now probably keep you awake tonight (sorry). If your I.T. guy went away, would you know where all the passwords, data, software licenses and disks, key codes, and other important information were stored? And here are the follow-up questions that might keep you up for the next week: Do you know how to log into your server? Do you know the passwords to all your employee’s workstations? Do you know where your offsite data is stored and how to access it? Is your network documented so that
Read More

Should You Leave Your Computer on At Night or Turn It Off?

We’re often asked by our clients and their team members if they should leave their computer on all the time or turn it off when they are not using them. Several years ago, we would have told them clients to turn their machines off to save power. But with the extreme proliferation of viruses, ransomware, and other threats over the last few years, we’ve changed our minds. You want your anti-virus and anti-spyware applications to be up-to-the-minute, which means you should let them run as soon as the updates are released. They’re often scheduled to for the middle of the night
Read More

Ransomware Prevention: How to Avoid Losing All Your Business Files to Cryptolocker, Locky, and Jigsaw Ransomware

  If You Thought Cryptolocker was Bad, Meet Jigsaw and Locky Ransomware Updated June 22, 2016 Back in December 2015, we shared with you a few Crypolocker stories about a number of clients and friends who had all of their vital business data kidnapped. We want you, our clients, and any business owner who is worried about their valuable business data to learn about ransomware prevention and protection. The FBI has reported that ransomware more than doubled between April and May of this year. It’s one of the biggest growing threats to your business … and not enough business owners know
Read More

Why The Death Star Explosion (and Your Data Breach) Was an Inside Job

  Why did the Death Star get blown up? Because there was a data breach in the Empire. Yes, Luke Skywalker and his rag-tag band of rebels attacked the Death Star with their tiny ships, but it was an analysis of the Death Star plans that revealed a weakness in the battle station. Plans that were STOLEN and couriered to the Alliance by Princess Leia. Sure, the movies seems to start with a huge destroyer, a tiny rebel ship, the defiant princess. But right before that, there was probably some guy with a thumb drive who cracked into the Death Star mainframe,
Read More

J – I.T. Outsource and J – Digital Identity – As Seen on the Internet

J –  I.T. Outsource President & CEO J. Colin Petersen is the go-to business technology expert for news stations in Fresno and the Central Valley. He and his team are featured in quotes for national print publications, popular blogs, and other online publications. If you’re a journalist looking for technology, cybersecurity, or martech quotes, please reach out to us at bbridges (at) jitoutsource. com Find out who’s quoting us and what we have to say …
Read More