Techies 4 U Blog

Harness the power of positive thinking and learn to manage time more effectively to supercharge sales for your small business.     There are hundreds of eponymous laws, which are formalized versions of observations made by and named after a person. From science to business, there’s a law for anything you can think of, and in this case, there are three important ones for your sales team to pay attention to. Use these laws to create habits among your team that lead to success all year long—mitigating the potential for failure, harnessing the power of positive thinking, and managing time more effectively. Law of Attraction Focusing on positive or negative thoughts brings positive or negative experiences into your life. The Law of Attraction was discussed in depth in the book and movie The Secret because it can be a powerful tool for everyone, including your sales team. The idea is that where your…

In early 2017, SolarWinds® MSP investigated the cybersecurity preparedness, experiences, and failings of 400 SMEs and enterprises, split equally across the US and the UK. Now that the results are in, my anxiety level regarding the state of Internet security has never been higher. I’m also a bit disappointed we (as in the industry) have not made more progress, when it comes to securing our customers. At one moment, our networks are secure because we are patching diligently and then the next day stuff is exploding all around us. Is there really anything we can do? The answer is yes; there is a lot we can do.  Picking through the cyber wreckageThe news of the WannaCry ransomware attacks targeting companies around the world this last weekend is just the latest in a long line of cyber carnage that has been happening. If the past few months are any indicator the damage…

Go beyond the basics of authentication  There are, simply put, three generally accepted methods of authenticating identity: knowledge; possession; and inherence. The first is familiar to everyone in the form of the password, passphrase, PIN, or even the pattern drawn with a finger on some smartphone lock screens; this is also sadly the weakest form of authentication. The knowledge factor relies on something you know, and that's at once its biggest positive and negative.  On the plus side, a user can create (if the login process allows, and all enterprise strength ones should) a truly 'strong' password. I have placed strong within inverted commas for a reason; one person's strength is another's weakness. So, while the user may well think that transposing an “a” for an “@”, and throwing a couple of exclamation marks at their partner's name is strong, a hacker could crack it in less time than it took…

10 Surprising (and Disturbing) Trends Revealed by Google Searches       In the age of Google, it’s not at all surprising to realize that our greatest confidant and holder of our deepest secrets is a simple search bar with a flickering cursor. Free of others’ judgments, we can ask it any question we like, at any time during the day, and get an answer in a fraction of a second. From queries like “What is the meaning of life?” to “What is twerking?” the things we search for on Google speak volumes about the cultural zeitgeist of our times. While this collective consciousness was once the subject of hours of study by philosophers and novelists, today all you need is an Internet connection and a little tool called Google Trends to check our nation’s cultural pulse. At Visme, we got a little curious to see just how much our interests and concerns have…

5 Apps That Will Be Everywhere in 5 Years       So you’re minding your own business one day, talking to a buddy about going to the movies. “Ah, let’s take a cab,” he says. “Do you have Taxidrivr?” Next thing you know, he’s telling you all the marginal advantages it has over Lyft and Uber, how you can choose the preferred odor, talkativeness, and hair style of your driver. You’ve never even heard of it, but then he starts telling you about TixR4Kidz, which lets you buy movie tickets and popcorn before you walk in the theater and even guarantees you a seat not behind Andre the Giant. This app is maybe three weeks old but now your grandmother is using it. Staying hip today is a full-time job. Every month there’s a new app that you gotta have. Some of them fade away, some of them become…

While Vintage is great for the music industry, in IT, it's not the best plan. Lately, hackers have been using passwords stolen from social media accounts years ago to try and access other related social and business accounts. Recent password thefts from Myspace, LinkedIn, and Twitter informed/forced users to change their passwords on those accounts, but what about your other accounts that use the same password? If you were informed of a hack on your account in the past, and you used the same password elsewhere, it's probably a good idea to change that password sooner rather than later. The Best Hack Proof Strategy for your social media accounts is to use Two Factor Authentication (2FA). In its simplest form, 2FA sends a 4- or 6-digit code to your mobile device via SMS that must be entered in as a challenge on the login page after password credentials have been…

     

Latest Blog Post

Our Location

Headquarters
9549 N. Royston rd.
Grand Ledge, MI 48837
Get Directions

Refer a friend

Help your friends get the best solution for their IT problems and needs and earn a discount on your next invoice!

Find out more