(978) 993-8038 facebook twitter linkedin google youtube pinterest rss

Resolve I.T.™ Blog

Resolve I.T.™ has been serving the Beverly area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Do You Need Cybersecurity Insurance?

Do You Need Cybersecurity Insurance?

Today, keeping your network and computing infrastructure free from threats is the best way to control the security of your organization’s data. Any business that actively confronts their risks realizes early on that cybercrime has become a major problem that their business has to be kept insulated from. Unfortunately for many organizations, no matter how much your business spends on network security, all it takes is one misstep by someone who has access to your organization’s sensitive information to cause a major problem.

Continue reading
0 Comments

You Don’t Hear About the Small Businesses That Get Breached

You Don’t Hear About the Small Businesses That Get Breached

It feels like every week we learn about another big business or bank or municipality getting hacked, and the data of their customers getting stolen.

Big organizations are losing millions of dollars, forcing their hand to run damage control to millions of customers and deal with crushingly bad press. Beyond feeling a little numb to these cyberattacks (more on this in a moment), many small business owners might be feeling pretty lucky they don’t need to deal with these types of threats. Unfortunately, they are dead wrong.

Continue reading
0 Comments

Tip of the Week: How to Identify (and Foil) a Phishing Attack

Tip of the Week: How to Identify (and Foil) a Phishing Attack

Phishing has been gaining notoriety in cybersecurity circles, as it has been used quite successfully in a variety of business infiltrations and data breaches. Many of the more well-known cyberattacks of the last few years were enabled by phishing. In order to protect your business’ interests, you and your team need to be able to identify these social engineering attempts. We’ll go over a few ways to do so for this week’s tip.

Continue reading
0 Comments

What Will Cybersecurity (Probably) Look Like in the Near Future?

What Will Cybersecurity (Probably) Look Like in the Near Future?

It isn’t exactly news that businesses of all sizes need to be concerned about cyberthreats - especially since, as time passes, these threats have become more serious and insidious. Up until this point, there have been tried-and-true methods that businesses could leverage to stop these threats, but hackers are very clever when it comes to their attacks. What can a business do?

Continue reading
0 Comments

A Short History of Cybersecurity

A Short History of Cybersecurity

The way a business handles its network security typically defines what kind of problems come from their use of information systems. As a result, cybersecurity has become a major part of any forward-thinking organization’s IT strategy and has become a multi-hundred-billion dollar a year industry. Of course, it wasn’t always such a huge problem. The history of cybersecurity doesn’t go back very far, but since it has such a major impact, we thought it would be interesting to go back a couple decades and look at the brief history of the practice. 

Continue reading
0 Comments

Tip of the Week: Search Google Better

Tip of the Week: Search Google Better

How many times a day do you search for something on Google? Your answer likely contributes to the fact that Google Search is the most visited website on the internet. In fact, it is so popular that the company’s name is now a verb. Google it! 

Continue reading
0 Comments

Battery Innovation to Fuel a More Mobile World

Battery Innovation to Fuel a More Mobile World

In today's technology dependent world, smartphones play a critical role. How much do you really know about these devices? Sure, the devices haven’t changed a whole lot in the past decade, but what has changed? Today, we take a look at how smartphone batteries have evolved, and what we will see in the future. 

Continue reading
0 Comments

Carbon Footprint Reducing Green Technologies

Carbon Footprint Reducing Green Technologies

Not all that long ago, green technologies were known as such for two reasons: yes, they were beneficial to the environment, but they also came at great expense to the businesses leveraging them. This has recently changed. Now, businesses are seeing plenty of reasons to go green, from increased customer appreciation for conservation efforts and, yes, even cost savings.

Continue reading
0 Comments

Tip of the Week: Managing Your Project Starts With You

Tip of the Week: Managing Your Project Starts With You

Project management is key to the success of all businesses. Luckily, there are great software options that can do a lot for you, if used correctly. Today, we look at project management and share tips to help make sure you are using the software correctly, further organizing your business and success of projects. 

Continue reading
0 Comments

What You Need to Know About Payment Skimmer

What You Need to Know About Payment Skimmer

Payment cards are extremely popular to use nowadays - whether its a debit or credit card, the convenience that they offer simply cannot be denied. Unfortunately, this convenience also makes them a promising threat vector for a scammer to use, via a device called a skimmer.

Continue reading
0 Comments

Do Not Sacrifice Security for Mobility

Do Not Sacrifice Security for Mobility

As a business owner security should be of the utmost importance to you and your business. Adapting to the modern age means implementing different strategies to adapt to employee physical location, travelling employees, or even employees dealing with circumstantial dilemmas such as health problems or family matters. Whilst your business can experiment with different off-site methods, there should always be one constant: security.

Tags:
Continue reading
0 Comments

Tip of the Week: Signatures Are More Than Just Your Name

Tip of the Week: Signatures Are More Than Just Your Name

Signatures are unique to the signatory. With the introduction and acceptance of electronic signatures, personalizing your signature has become more difficult. However, did you know introducing something as simple as a Gmail signature can give some credibility to your business communications? 

Continue reading
0 Comments

Former Fraudster Says to Stop Using Debit Cards

Former Fraudster Says to Stop Using Debit Cards

When over 16 million people are scammed out of over $16 billion, there’s likely some type of problem that needs to be addressed. Famous con artist, Frank Abagnale, the man immortalized in Steven Spielberg’s Catch Me If You Can, a movie that was based off his own memoir, has been working as a security consultant with the Federal Bureau of Investigation for over 45 years. In that time, he has become an expert in cybersecurity and fraud prevention.

Continue reading
0 Comments

Finding Value in Blockchain

Finding Value in Blockchain

When searching for value within blockchain, you do not have to look hard nor far. Blockchain’s incorruptibility encourages other potential uses in the tech community. Today we will take a look into what blockchain technology is as well as other ways we can utilize this technology. 

Continue reading
0 Comments

Tip of the Week: How to Download Videos from Social Media

Tip of the Week: How to Download Videos from Social Media

Social media has taken the world by storm, in no small part because of the videos that people share. We’ve all seen a shared video that we’ve wanted to keep. That’s why this blog will take you through the process of downloading videos from Facebook, Twitter, and Instagram.

Continue reading
0 Comments

VoIP Has More Features Than You Thought

VoIP Has More Features Than You Thought

Many small businesses are making the switch to Voice over Internet Protocol (VoIP). VoIP is able to provide many advantages over traditional landlines. Today, we will discuss features that even if you’ve already made the switch, you might not be taking advantage of. 

Continue reading
0 Comments

Making the Chromecast a Handy Business Tool

Making the Chromecast a Handy Business Tool

Google’s contribution to streaming, the Chromecast, is a nifty little device. While many might hear “streaming” and immediately think “consumer device,” the Chromecast can actually offer your business a few handy utilities as well. Here, we’ll go over four of them, as well as guide your through setting up (and if necessary, resetting) your Chromecast.

Continue reading
0 Comments

Intro to Your Tech: RFID

Intro to Your Tech: RFID

Information, and the transmission of it, has advanced by vast amounts since our ancestors first carved shapes into cave walls to record their hunts. Nowadays, information can be shared much more efficiently, thanks to a technology known as RFID, or Radio Frequency Identification. Here, we’ll discuss this technology and its common business-friendly uses.

Continue reading
0 Comments

Checking In on Some More Data Breaches

Checking In on Some More Data Breaches

Threats to data security are seemingly everywhere. Some companies spend millions of dollars a year on data security, but it only takes one unwitting user to tear down their huge investment. In fact, 2018 saw over 446.5 million records compromised, even if the number of data breaches dropped by almost 25 percent. Today, we will look at the biggest breaches that have happened from the beginning of May.

Continue reading
0 Comments

Can You Recycle That Battery Safely? Can Anyone?

Can You Recycle That Battery Safely? Can Anyone?

Businesses are often concerned with taking in the latest and greatest technologies, but it seems that less attention is paid to how these technologies are disposed of when the time comes to replace them. Is there a proper way to handle electronics that have outlived their use, and how has our prioritization of upgrade schedules and smaller form factors impacted these processes?

Continue reading
0 Comments

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Microsoft Business Computing Hackers Cloud Google Malware Efficiency Internet Productivity Miscellaneous Network Security Smartphones Business User Tips Data Software Backup Innovation Mobile Devices Hosted Solutions Productivity Communication Email Computer Hardware Business Management Windows Workplace Tips Communications IT Services Android Smartphone Upgrade IT Support VoIP Microsoft Office Social Media Browser Save Money Ransomware Holiday Windows 10 Passwords Network Cybersecurity Small Business Tech Term Mobile Device Office Alert Managed IT Services Employer-Employee Relationship Business Continuity Outsourced IT Marketing Quick Tips Managed Service Provider Apps IT Support Apple Windows 10 Remote Computing Server Internet of Things Users Chrome Virtualization Disaster Recovery Health Managed IT Services Bandwidth Automation Gadgets Going Green Collaboration Mobile Device Management Big Data Hacking Gmail Remote Monitoring History WiFi Saving Money Wireless IT Solutions Cloud Computing The Internet of Things Password Data Backup Facebook Antivirus Mobile Computing Applications iPhone Wi-Fi Operating System Business Intelligence Computers VPN Application Excel Router Office Tips Retail Networking Mobility Search... Data Recovery Settings Information App Analytics Blockchain Website Office 365 Spam Current Events BYOD Artificial Intelligence Managed Service PowerPoint Maintenance Physical Security Laptop Tablet Data Management Access Control Company Culture Government Cybercrime Phishing Law Enforcement Twitter Social Engineering Paperless Office Lithium-ion battery Environment Entertainment Word Compliance Mouse VoIP Wireless Technology Battery Virus Biometrics Sports Proactive IT Save Time Google Drive Workers Memory Politics Recovery Safety Telephone Systems Net Neutrality Data Breach Value Patch Management Dark Web Best Available Windows 8 End of Support Internet Exlporer Customer Service Virtual Assistant Wearable Technology Tip of the week Data storage Healthcare Payment Cards Streaming Media Remote Monitoring and Management Data Protection BDR Fax Server Saving Time Licensing Touchscreen Outlook Risk Management Data Security Smart Technology Two-factor Authentication Online Currency RAM How To Tech Terms Human Resources Bluetooth Shortcut Avoiding Downtime Managing Stress Information Technology Bring Your Own Device Managed IT Service G Suite Money eWaste Best Practice Budget Medical IT Cortana Hosted Solution Vulnerability Telephony Display User Error Downtime Processor Connectivity HIPAA Cost Management Printer Hiring/Firing Voice over Internet Protocol Hard Drives Cleaning Printer Server DDoS Tech Support Phone System Programming Wireless Charging Scam Humor Batteries Customer Relationship Management People Files Robot Education Lead Generation A.I. Meetings Wearables Bitcoin Employee-Employer Relationship Plug-In Trending Remote Support Dongle IT Consultant Access Authorization Video Piracy Content Filtering Database Movies IT budget Electronic Health Records Video Surveillance Advertising Printers Video Games Remote Control YouTube Webcam Troubleshooting OneNote User Tip Tactics WannaCry Unified Communications IT Management Monitor Automobile Threats Encryption Employees Virtual Reality Analysis File Sharing Technology Tips Private Cloud Staffing Alerts Spam Blocking NarrowBand Update Windows Server 2008 R2 Telecommuting Internet Explorer Administration Hard Drive Reputation WIndows 7 E-Commerce Scams Notifications Bloatware Statistics User Security Backup and Disaster Recovery Law Firm IT PDF Work/Life Balance Email Management Chromecast Unified Threat Management Profitability Taskbar Millennials Threat Processors Microsoft Teams Samsung Network Attached Storage Customers Personal Information SharePoint Payment Project Management Vendor Management Entrepreneur Reporting Business Technology SSD Google Maps Eliminating Downtime National Security Printing Spyware Travel Server Management SaaS instant Messaging Insurance Hacker Inventory Gadget Botnet Computer Accessories Wireless Internet Updates Paper Hybrid Cloud Crowdfunding Live Streaming Machine Learning Vulnerabilities Science Worker Commute GDPR Sales Mobile Security Cabling HP Touchpad Managed IT Cameras Help Desk Voice over IP Ink Cryptocurrency Skype Cables WhatsApp Telecommute Relocation Consultant Running Cable Tablets Uninterrupted Power Supply Storage Debate Knowledge e-waste Techology Multi-Factor Security Document Management Certification Benchmarks eCommerce Windows 7 Workplace News Data loss Worker Social Error Windows 8.1 Update Comparison disposal HaaS Online Shopping Downloads Digital Training Recycling Time Management LinkedIn Telephone System Staff User Flexibility Copy Windows XP Social Networking Microsoft Office 365 Solid State Drive Specifications Trends Edge Black Market Mobile Office Security Cameras USB Distributed Denial of Service Chrome OS Amazon Websites Legal Paste Analyitcs Shadow IT Spotify Windows Media Player Authentication Hard Disk Drive Conferencing

Mobile? Grab this Article!

QR-Code

Recent Comments

Milli Philpson 3 Great Consumer Mobile Apps for Your Business
21 September 2017
According to my view for topic of mobile app is extremely stunning as well as useful for me. Because...