(415) 246-0101

Microtechs Blog

Microtechs has been serving the Mill Valley area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How to Get Your Passwords in Order, and Keep It That Way [Part 2 of 5]

How to Get Your Passwords in Order, and Keep It That Way [Part 2 of 5]

Previously, we covered why it’s important to protect your online accounts and why it’s critical that you use strong passwords. We also provided some good tips for creating unique, strong passwords that are easier to remember. You’ll be using that method to create a couple of strong passwords, but ultimately, you’ll be using a password manager by the time you are done with this 5-part guide.

In this part, we’re going to do some housekeeping to make sure that all of your important online accounts are tied to a single email address, and we’re going to walk you through steps to secure that email account.

0 Comments
Continue reading

How to Get Your Passwords in Order, and Keep It That Way [Part 1 of 5]

How to Get Your Passwords in Order, and Keep It That Way [Part 1 of 5]

We’re doing something a little different this time around. Normally, we try to keep the focus on business technology, but this article is geared towards the typical low-tech home user.

These days, nearly all human beings are wrapped up in a little technology, and there isn’t a huge divide between protecting yourself as an employee at a company versus protecting yourself as an individual—at least as far as cybersecurity habits go. Even if you feel like you are pretty low-tech, you still have to worry about protecting your identity, financial information, and personally identifiable information online.

We encourage you to share this article around with everyone you can, from students to those enjoying their retirement. We all have family or friends who have a loose ream of paper they scrawl their passwords onto, or might even have worse habits that they think are perfectly healthy that are putting them at risk. This article might help them reduce the risk of expensive, frustrating problems.

If you were sent this article, hello! There is someone who cares about your safety online and wants to try to make your digital life a little easier. We hope you find this guide useful, and we’d love to get feedback from you if you have any!

0 Comments
Continue reading

Virtual CIOs: An Accessible Way to Get the IT Leadership Your Business Deserves

Virtual CIOs: An Accessible Way to Get the IT Leadership Your Business Deserves

Who makes the decisions related to technology for your business? If you’re the one calling the shots, can you honestly say you have all the knowledge necessary to make informed decisions regarding your technology infrastructure’s future? If the answer is “no,” we’ve got just the service for you: a virtual CIO.

0 Comments
Continue reading

Phishing Simulation: An Engaging Way to Train Employees and Protect Your Business

Phishing Simulation: An Engaging Way to Train Employees and Protect Your Business

Imagine one of your employees receiving a phishing message in their email inbox. Would they fall for it or report it to the appropriate individuals within your business? With phishing training, you can take the guesswork out of this scenario and know—for sure—that your team knows how to respond to a potential phishing scheme.

0 Comments
Continue reading

What to Do with All the Hardware You Replaced Over the Holidays?

What to Do with All the Hardware You Replaced Over the Holidays?

Now that the holidays have passed and are winding down, you may need to phase out some of your old technology to make room for the new. Maybe you’re looking to the new year as an opportunity to upgrade some of the tech your business uses. In either case, it is essential to dispose of your old tools responsibly and sustainably.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code