(978) 993-8038 facebook twitter linkedin google youtube pinterest rss

Resolve I.T.™ Blog

Resolve I.T.™ has been serving the Beverly area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Is it Wrong to Purchase Access to Your Own Data?

Is it Wrong to Purchase Access to Your Own Data?

Ransomware is a contender for the favorite method of attack for hackers. If you think about it, ransomware presents a no-loss situation. Either the victim pays the ransom and the hackers laugh all the way to the bank, or they move on to the next target and give them the same ultimatum.

Continue reading
0 Comments

Hack Enabled by NSA-Developed Tool

Hack Enabled by NSA-Developed Tool

Hackers aren’t the only ones out there developing malware tools, but sometimes, they get their hands on some of the others. This is precisely what happened when Double Pulsar, a malware that the NSA has used in the past, was paired with a Chinese hacking tool and used to attack Hong Kong and Belgium in 2016.

Continue reading
0 Comments

Tip of the Week: Windows 10 Taskbar Tips

Tip of the Week: Windows 10 Taskbar Tips

There are many aspects that go into making effective use of your office workstation, and one of them is utilizing the features that come with your Windows operating system. There is a lot to cover on that front, but one of the simpler ways your business can leverage its workstations more effectively is through its taskbar. You’ll be able to save time and customize your workstation to best suit your needs.

Continue reading
0 Comments

Microsoft Pulling the Plug on Support for Key OS Titles

Microsoft Pulling the Plug on Support for Key OS Titles

Microsoft’s place as one of the forefathers of modern computing is solidified, and one reason is that most PCs in the world run Microsoft Windows OS. In fact, some figures have reported that the number of Windows run PCs compared with other OS’s to be about 9-to-1. With that many computers relying on Windows OS, the software giant has made a habit of updating their offerings with the capabilities of the hardware produced to run this OS. As a result, they can’t support older software titles forever. It just so happens that two of the most utilized operating systems Microsoft has ever created are approaching their end of life date. They are Windows 7 and Windows Server 2008 R2.

Continue reading
0 Comments

Ransomware Can Just Be Devastating

Ransomware Can Just Be Devastating

Ransomware is still going strong, and now more than ever it’s important to emphasize the danger that it poses for your organization. Even municipalities and other high-profile targets are at risk of being taken down by ransomware. Since 2013, over 170 government systems at the county, city, or state levels have been attacked.

Continue reading
0 Comments

Company Culture Goes a Long Way

Company Culture Goes a Long Way

When you consider your business’ strengths, you might feel the need to focus on quantifiable aspects that can be defined with numbers. There are some competitive advantages to this, but it’s especially important to keep in mind that perhaps the most important quantifiable strength you have is your ability to sustain a positive company culture.

Continue reading
0 Comments

Looking for Value? Look No Further

Looking for Value? Look No Further

“Business as usual.” This is something that people say when their time at work matches their expectations. If your staff constantly has problems with the technology you’ve provided them, the saying may be in reference to your constant IT troubles, which would be problematic on several different fronts. If your company’s “business as usual” is dealing with downtime, runaway IT repair costs, and inefficient and variable productivity, you might want to consider managed IT services.

Continue reading
0 Comments

Sick of Spam Calls? VoIP is Partly to Blame

Sick of Spam Calls? VoIP is Partly to Blame

If you have access to a phone, chances are you’ve received a spammy robocall. In fact, you’ve probably received a bunch… but why? And how are these robocalls able to hide behind what looks to be a local number? Unfortunately, it’s because the scammers behind these robocalls are using a helpful business tool… Voice-over-Internet-Protocol telephony, also known as VoIP.

Continue reading
0 Comments

Tip of the Week: Five of Android Pie’s Tastier Features

Tip of the Week: Five of Android Pie’s Tastier Features

Despite Android Q being just around the corner, there’s a lot that Android Pie still has to offer. In fact, the average user might not have any idea that these features exist. This week, we’re offering a few tips that you can use to make your phone even more useful to your productivity.

Continue reading
0 Comments

Google Now Plays Nice with Microsoft Office

Google Now Plays Nice with Microsoft Office

For some time now, businesses have more or less had to choose between utilizing solutions provided by Google, or those that Microsoft has developed - exclusively. This was because these solutions offered no real inter-compatibility… until now, at least, as Google now allows users to edit Microsoft Office files in Google Docs.

Continue reading
0 Comments

Mobile Malware is on the Rise

Mobile Malware is on the Rise

When considering cybersecurity, it can be easy to overlook the computers that so many of us typically carry with us every day: our smartphones. However, as attacks to mobile devices have risen considerably in the recent past, it is important to recognize the severity of these attacks, as well as how to avoid them.

Continue reading
0 Comments

Tip of the Week: 5 Key OneNote Tips

Tip of the Week: 5 Key OneNote Tips

Microsoft OneNote is a program that can help you keep track of your notes, but it’s much more than that. OneNote actually provides several other functions that take it beyond the use of a simple digital scratchpad. Let’s take a look at some of the OneNote features that you may not know about.

Continue reading
0 Comments

Understanding the Dangers of a Man-in-the-Middle Attack

Understanding the Dangers of a Man-in-the-Middle Attack

Have you ever played the telephone game? One person in a group whispers a phrase to another, who then passes it to another, and the fun is had when the group shares what they heard and how the message was garbled along the way. In many ways, this activity is similar to a Man-in-the-Middle (MitM) attack - although the attack is a lot less fun than the game.

Continue reading
0 Comments

How Working with a Managed Service Provider Helps Your Operations

How Working with a Managed Service Provider Helps Your Operations

In today’s highly competitive business environment, any advantage that you can claim will be useful to you. One big advantage you should seek to have is a trusted and reliable resource you can turn to so they can help you manage your IT solutions, consulting you on your business’ future in terms of its technology.

Continue reading
0 Comments

Check Out These 4 Great Gmail Extensions

Check Out These 4 Great Gmail Extensions

Gmail is a massively popular email client for individuals and businesses, alike. As a business tool, Gmail is almost unmatched. This is mainly because it comes with a massive amount of space to archive emails and the ability to sync with other email providers. Another big draw is that it has several useful third-party applications that integrate with Gmail to provide even more communication tools. Today, we will take a look at four great Gmail integrations that can work for you and your business.

Continue reading
0 Comments

How to Protect Your Company’s Reputation Online

How to Protect Your Company’s Reputation Online

When you run a successful business, you accrue a large client base. It eventually becomes impossible to please everyone, leading to some negative online reviews. With the rise of social media making it easier than ever before to take negative thoughts into the public’s view, you need to take a step back and consider your organization’s stance on how it deals with online reputation management.

Continue reading
0 Comments

How 5G is Being Overhyped

How 5G is Being Overhyped

More and more is being said about the impending shift from fourth-generation wireless to fifth-generation, and how impactful this shift will be. The only problem is, a lot of what is being said is conflated hyperbole - exaggerated and overhyped.

Continue reading
0 Comments

Tip of the Week: How to Set Your Default Video Player in Windows 10

Tip of the Week: How to Set Your Default Video Player in Windows 10

Windows 10 has applications built into it that give users the ability to accomplish certain tasks, such as listening to music or watching a video, but they might not be the applications that you want or need to use. Today we’re going to help you set the right default video playback options, but you might be able to use these steps to change the default app settings for just about any other purpose, too.

Continue reading
0 Comments

A Field Guide to the Cables Around the Office

A Field Guide to the Cables Around the Office

If there’s one thing you likely have plenty of in your office, it’s cables. Each device you regularly use probably has compatibility with at least one kind of cable… but can you identify them and what they do? Below, we’ll go over a few common cable types so that you’ll be able to do just that.

Continue reading
0 Comments

Is Your Business Leaking Data?

Is Your Business Leaking Data?

Take a moment and consider the data that you have collected during your business’ operations. How valuable is it to you? What would it mean if it were to leak out of your business’ control?

Continue reading
0 Comments

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Microsoft Cloud Business Computing Hackers Google Malware Internet Efficiency Productivity Miscellaneous Smartphones Business Backup User Tips Network Security Mobile Devices Software Hosted Solutions Communication Innovation Business Management Productivity Email Hardware Data Android Smartphone Workplace Tips IT Services IT Support Communications Microsoft Office Windows Upgrade Browser Social Media VoIP Holiday Windows 10 Ransomware Save Money Network Passwords Computer Cybersecurity Alert Office Mobile Device Managed IT Services Small Business Employer-Employee Relationship Outsourced IT Marketing Business Continuity Tech Term Remote Computing Server Managed Service Provider Windows 10 Apps Apple Chrome Quick Tips Health IT Support Virtualization Bandwidth Automation Disaster Recovery Internet of Things Collaboration Gadgets Managed IT Services Big Data Hacking Mobile Device Management Users WiFi Antivirus Mobile Computing Going Green Wireless iPhone Operating System Remote Monitoring History Password Data Backup Facebook Saving Money Gmail Applications IT Solutions Wi-Fi The Internet of Things Computers Analytics Cloud Computing Application Excel Router Office Tips Retail Networking Mobility Data Recovery App Tablet Business Intelligence Website Office 365 Spam Company Culture BYOD PowerPoint Physical Security Data Management Access Control Current Events VPN Artificial Intelligence Government Search... Cybercrime Settings Information Maintenance Law Enforcement Twitter Blockchain Social Engineering Paperless Office Environment Lithium-ion battery Entertainment Word Compliance Net Neutrality Managed Service VoIP Mouse Battery Virus Biometrics Save Time Google Drive Workers Memory Politics Recovery Safety Telephone Systems Phishing Data Breach Value Wireless Technology Patch Management Proactive IT Sports Dark Web End of Support Internet Exlporer Customer Service Tip of the week Data storage Healthcare Virtual Assistant Remote Monitoring and Management Data Protection BDR Streaming Media Fax Server Licensing Data Security Outlook Smart Technology Two-factor Authentication How To Tech Terms Human Resources Shortcut Managing Stress Avoiding Downtime Information Technology Bring Your Own Device Managed IT Service G Suite Windows 8 Money eWaste Best Available Best Practice Budget Medical IT Cortana Hosted Solution Vulnerability Laptop Telephony Wearable Technology User Error Saving Time Downtime Touchscreen Online Currency HIPAA Cost Management Printer Hiring/Firing Connectivity Voice over Internet Protocol Hard Drives Cleaning Bluetooth Printer Server DDoS Tech Support Phone System Programming Scam Humor Customer Relationship Management Wireless Charging People Files Robot Education Meetings Wearables Lead Generation A.I. Display Plug-In Trending Remote Support Dongle Access Employee-Employer Relationship Authorization Piracy Content Filtering Database IT budget Skype Movies Electronic Health Records Advertising Printers YouTube Webcam Troubleshooting User Tip Tactics Video Games Remote Control Unified Communications IT Management Monitor Automobile Risk Management WannaCry Employees Virtual Reality Analysis Windows 8.1 Update File Sharing Technology Tips Private Cloud Staffing Encryption NarrowBand Update Telecommuting Internet Explorer Alerts Spam Blocking Hard Drive RAM Reputation WIndows 7 E-Commerce LinkedIn Administration Bloatware Statistics User Security Backup and Disaster Recovery PDF Notifications Email Management Chromecast Unified Threat Management Profitability Millennials Threat Work/Life Balance Processors Microsoft Teams Solid State Drive Samsung Network Attached Storage Customers Personal Information SharePoint Payment Vendor Management Entrepreneur Reporting Business Technology SSD Google Maps Eliminating Downtime Printing Spyware Hard Disk Drive Travel Server Management IT Consultant SaaS instant Messaging Hacker Inventory Gadget Botnet Computer Accessories Wireless Internet Paper Hybrid Cloud Video Crowdfunding Live Streaming Machine Learning Vulnerabilities Video Surveillance Science Worker Commute GDPR Sales Mobile Security Cabling HP Touchpad Managed IT Cameras Help Desk Voice over IP Ink Cables OneNote WhatsApp Telecommute Relocation Consultant Running Cable Cryptocurrency Tablets Uninterrupted Power Supply Storage Debate Knowledge e-waste Techology Multi-Factor Security Document Management Certification eCommerce Workplace Windows Server 2008 R2 News Data loss Law Firm IT Worker Windows 7 Social Error Comparison disposal HaaS Digital Training Online Shopping Downloads Taskbar Telephone System Staff User Time Management Windows XP Social Networking Microsoft Office 365 Specifications Flexibility Copy Edge Black Market Mobile Office Security Cameras Trends Amazon National Security Websites USB Distributed Denial of Service Chrome OS Analyitcs Shadow IT Spotify Windows Media Player Authentication Conferencing Legal Paste

Mobile? Grab this Article!

QR-Code

Recent Comments

Milli Philpson 3 Great Consumer Mobile Apps for Your Business
21 September 2017
According to my view for topic of mobile app is extremely stunning as well as useful for me. Because...