(978) 993-8038 facebook twitter linkedin google youtube pinterest rss

Resolve I.T. Blog

Resolve I.T. has been serving the Beverly area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Five Ways to Use Your Android Phone Faster

Tip of the Week: Five Ways to Use Your Android Phone Faster

More businesses are moving to mobile technology than ever before, and one of the most popular solutions to this phenomenon comes in the form of Android smartphones. Android devices actually have quite a lot of hidden features that you’ll want to consider so that you can get the most out of your technology. Here are some efficient tips to help you get more productivity out of your Android device.

Continue reading
0 Comments

ALERT: Meltdown/Spectre Vulnerability Can Affect Your Business’ Critical Infrastructure

ALERT: Meltdown/Spectre Vulnerability Can Affect Your Business’ Critical Infrastructure

Intel has had publicity problems in the past, but now things are getting critical. An issue was reported that could potentially cause the processing power of their chips to diminish. What are being known as the Meltdown or Spectre vulnerabilities, have businesses scrambling around looking for ways to protect their data and infrastructure from what is seemingly an oversight that affects most of today’s CPU architectures; namely those that rely on virtual memory.

Continue reading
0 Comments

Improperly Disposing of a Hard Drive Can Threaten Your Security

Improperly Disposing of a Hard Drive Can Threaten Your Security

No technology lasts forever. Your business will need to replace server hardware or workstations eventually, no matter how well you take care of it. However, what do you do with the hard drive of any device that you have to replace? If you don’t take action to destroy your old hard drive (after moving any data off of it as needed), you could be in violation of various compliance guidelines issued by HIPAA.

Continue reading
0 Comments

Tip of the Week: How ‘StarWars’ Can Compromise Your Data’s Security

Tip of the Week: How ‘StarWars’ Can Compromise Your Data’s Security

If you think about it, password security is an interesting phenomenon. The odds are that a user knows the importance of using a strong password, as well as the potential consequences of using weak ones. Yet, time after time, people would rather go with passwords that are easy to type and remember, as opposed to adding a few simple security measures.

Continue reading
0 Comments

North Korea Suspected as Responsible for WannaCry Attack

North Korea Suspected as Responsible for WannaCry Attack

According to the homeland security adviser to the White House, Tom Bossert, international blame for the global WannaCry attack is being directed toward North Korea. Responsibility for the attack that spanned from May 12th to the 15th of 2017 has been firmly placed on the Democratic People’s Republic of Korea, which Bossert says is in agreement with the conclusions of Australia, Canada, Japan and New Zealand.

Continue reading
0 Comments

You Can Use Cortana with Your Most-Used Applications

You Can Use Cortana with Your Most-Used Applications

Cortana is becoming more of a utility with every feature that is added to its capabilities. Fans of Google’s applications will be happy to hear that Cortana can now play nice with the likes of Gmail, Google Contact, and Google Calendar. We’ll take you through the steps to set up an integration between these programs and Cortana.

Continue reading
0 Comments

Tip of the Week: Two Apps to Help You Manage Incoming Business Cards

Tip of the Week: Two Apps to Help You Manage Incoming Business Cards

Business cards have long been part of business etiquette. In the late Renaissance period, visitors were announced with special cards that signified the arrival of the guest and reminding the recipient of their social obligations. The Industrial Revolution transformed these into trade cards, and the professional business card as we know it got its start. Today, the business card is a useful networking tool, even though transferring the information into a phone can be a hassle.

Continue reading
0 Comments

The Elephant in the Server Room: 3 IT Needs Businesses Shouldn't Ignore

The Elephant in the Server Room: 3 IT Needs Businesses Shouldn't Ignore

“The elephant in the room” has long been used as an analogy for a blatantly obvious problem that everyone is hesitant, if not unwilling, to acknowledge. Many companies find that they have elephants like these in their server rooms. Today, we’ll discuss some of these metaphorical elephants and how your company can get rid of them.

Continue reading
0 Comments

Is It Time to Ditch Your Charging Cables and Go Wireless?

Is It Time to Ditch Your Charging Cables and Go Wireless?

Mobility is a key to business today, as evidenced by essentially every business utilizing some sort of mobile device in their operations. However, one major consideration that has kept mobile devices from being truly mobile is the battery life of these devices, and the fact that the limited nature of battery life keeps these devices from ever migrating too far from their wired power source. This is an issue that many anticipate that wireless charging technology can resolve.

Continue reading
0 Comments

Tip of the Week: Why You Should Keep a Closer Eye on Your Android Permissions

Tip of the Week: Why You Should Keep a Closer Eye on Your Android Permissions

Downloading an app is a fairly straightforward process on an Android device. Access the Google Play store, find the app, and press install. However, when you first try to use the app, things can sometimes become more complicated as your phone starts asking you for vague permissions. For today’s tip, we’ll explore what these permission requests are actually asking for.

Continue reading
0 Comments

Keep Online Shopping from Ruining Your Holidays

Keep Online Shopping from Ruining Your Holidays

Uh oh. It’s the big day, and you’ve just realized that you’ve forgotten to purchase a gift for a special someone (or twelve). Thank goodness for online shopping, right? However, you still need to keep your digital security in mind as you try to save the holiday--cybercriminals aren’t the type to take a break during one of the most potentially lucrative times of year.

Continue reading
0 Comments

For Benefits over Your Old Phone System, Dial VoIP

For Benefits over Your Old Phone System, Dial VoIP

How does your business stay in touch with both in-house employees and clients? One of the ways a traditional business would do so is by using the wired handset telephone, but such a device can’t keep up with the demands of modern businesses. In fact, you can make leaps and bounds by making the jump to a digital voice solution called VoIP, or Voice over Internet Protocol.

Continue reading
0 Comments

Tip of the Week: Use Excel to Create Eye-Catching Visuals

Tip of the Week: Use Excel to Create Eye-Catching Visuals

Spreadsheets are excellent ways to communicate a lot of information in a concise format. However, the big problem is that a spreadsheet alone isn’t very visually appealing. To remedy this, you can add other visual elements, like charts, into your Microsoft Excel spreadsheets. For today’s tip, we’ll go over some of your options.

Continue reading
0 Comments

New Year’s IT Solution: Outsource IT

New Year’s IT Solution: Outsource IT

How does your business handle its IT management? It’s inevitable that your organization will suffer from technology troubles at some point or another, and it might seem like you have little control over it at times. However, the way that you manage your business’s IT can have a considerable effect on how your organization functions on a grand scale. What’s the best way to handle something as important as technology maintenance for your organization?

Continue reading
0 Comments

Which is Worse -- a Phishing Attack or a Data Breach?

Which is Worse -- a Phishing Attack or a Data Breach?

In the realm of cyberattacks, a data breach is perceived as one of, if not the biggest threat that a business can face. They are seen as so dangerous, in fact, that threats like phishing attacks are largely disregarded. However, data from a recent study suggests that this is the opposite of what should happen in a decision maker’s mind.

Continue reading
0 Comments

Tip of the Week: Lost Internet? Don’t Lose Productivity!

Tip of the Week: Lost Internet? Don’t Lose Productivity!

It’s safe to say that most businesses today rely on the Internet, as do most of the humans who work at them. Therefore, when the cable suddenly goes out and their connection is lost, many employees may find themselves struggling with a downtime incident. There can be many causes to a lost Internet connection, with just as many ways to identify and resolve it.

Continue reading
0 Comments

The Right Analogy Makes Hacking Make More Sense

The Right Analogy Makes Hacking Make More Sense

How often have you started to read something you thought may be valuable to you, only to put it down a few moments later, completely lost because of the use of technical language and industry jargon? The IT industry can be especially guilty of this. However, since this is need-to-know information, we’ve decided to go over a few crucial security concepts by representing your business security with a locked door.

Continue reading
0 Comments

How to Prevent Office Issues Between Workers of Different Generations

How to Prevent Office Issues Between Workers of Different Generations

One in four Americans is a millennial, which puts their numbers at over 83 million. This means that the generation with the most people in the United States, all 83 million of them, are of the age where the time has come for them to work for a living. This in turn means that there are more workers from this generation than any other.

Continue reading
0 Comments

Is Telecommuting a Viable Option for Your Business?

Is Telecommuting a Viable Option for Your Business?

Allowing a workforce to operate remotely can provide a business with considerable benefits. However, there is also the risk of falling victim to a few shortcomings that can snag a business and ultimately hurt it. In order to make optimal use of a remote work strategy, there needs to be a conscious effort to minimize these shortcomings. For this week’s tip, we’ll discuss how to do so.

Continue reading
0 Comments

Are You Prepared for Cyber Threats? Many Businesses Aren’t

Are You Prepared for Cyber Threats? Many Businesses Aren’t

With so many breaches showing up in the headlines and their impact being felt across the world, one would think that businesses of all sizes would do more to protect their data against cybersecurity threats. A recent study has shown that this is unfortunately not the case.

Continue reading
0 Comments

Blog Archive

Tag Cloud

Security Tip of the Week Technology Privacy Best Practices Microsoft Cloud Productivity Hackers Internet Google Malware Miscellaneous Business Computing Backup Business Efficiency Hosted Solutions Smartphones IT Support Software Windows Mobile Devices Smartphone Upgrade Windows 10 Microsoft Office Business Management IT Services Workplace Tips Communications Android Email VoIP Alert Save Money Innovation Hardware Holiday Social Media User Tips Computer Office Browser Server Managed Service Provider Business Continuity Apple Passwords Quick Tips Communication Remote Computing Disaster Recovery Network Security Marketing Cybersecurity Network Hacking Virtualization Health Employer-Employee Relationship Mobile Device Management Outsourced IT Ransomware Automation Small Business Mobile Computing Going Green iPhone Managed IT Services Remote Monitoring Chrome History Data WiFi Big Data IT Solutions The Internet of Things Retail Antivirus App Operating System Productivity Apps Application Excel Office Tips Tablet Password Gadgets Facebook Gmail Search... Settings Law Enforcement Website Current Events Saving Money Bandwidth Router Google Drive Memory Recovery Phishing Government Mobility Telephone Systems Cybercrime Twitter Analytics Internet of Things VoIP Social Engineering Computers Office 365 Spam Lithium-ion battery Entertainment Workers BYOD Politics Wireless Windows 10 PowerPoint Mouse Maintenance Battery Wireless Technology Physical Security Data Breach Biometrics Save Time Patch Management Networking User Error Data Management Downtime HIPAA Tip of the week Safety Printer Company Culture Hiring/Firing Cleaning Word Scam Printer Server DDoS Tech Support Phone System Programming How To Humor Customer Relationship Management People Files Managed IT Services Robot Education IT Support Best Available Windows 8 End of Support Collaboration Internet Exlporer Cloud Computing Wearable Technology Data storage Environment Cortana Fax Server Saving Time Licensing Vulnerability VPN Data Backup Access Control Smart Technology Two-factor Authentication Online Currency Artificial Intelligence Shortcut Bluetooth Avoiding Downtime Information Technology Applications Virus Money eWaste Best Practice Budget Sports Hosted Solution Wi-Fi Proactive IT Display Crowdfunding Science Worker Commute Conferencing Paste Cabling Dark Web Touchpad Managed IT Cameras Lead Generation Skype Remote Support Relocation Access Consultant Running Cable Tablets Uninterrupted Power Supply Debate Content Filtering Techology Business Intelligence Virtual Assistant Workplace Data Protection Printers Hard Drives Social Windows 8.1 Update User Tip HaaS Remote Control Net Neutrality WannaCry LinkedIn File Sharing Staffing User Windows XP Social Networking Telecommuting Flexibility Spam Blocking Black Market Mobile Office Hard Drive User Security USB Distributed Denial of Service Analyitcs Shadow IT Spotify Windows Media Player Millennials Legal Email Management Automobile Meetings Processors Trending Business Technology IT Consultant Paperless Office Customer Service Piracy Managed IT Service Mobile Device Travel Video Surveillance Advertising Gadget Streaming Media YouTube Webcam Telephony Video Games Live Streaming Monitor Risk Management Touchscreen Outlook Compliance Virtual Reality Sales Private Cloud Encryption NarrowBand Voice over IP Alerts WhatsApp Reputation WIndows 7 Administration Bloatware Statistics Knowledge Law Firm IT PDF Human Resources Notifications Work/Life Balance Multi-Factor Security Chromecast Unified Threat Management eCommerce Samsung News Customers Worker Managing Stress SharePoint Vendor Management Entrepreneur Comparison Data Recovery Bring Your Own Device Google Maps Online Shopping Telephone System Hacker Specifications Copy Laptop Botnet Computer Accessories Wireless Charging

Mobile? Grab this Article!

QR-Code

Recent Comments

Milli Philpson 3 Great Consumer Mobile Apps for Your Business
21 September 2017
According to my view for topic of mobile app is extremely stunning as well as useful for me. Because...