The Blog

Free Tips & Tricks
Cinch I.T. > The Blog (Page 6)
Cinch I.T. Blog - How To Prevent Ransomware At Your Business

Businesses that understand how to prevent ransomware significantly reduce their online vulnerability. This cyberattack scheme doesn't garner nearly as much attention as more common malware, but it can be even more debilitating. Ransomware attacks are so polished that many larger financial institutions have dedicated call centers to handle these data breaches. So what is ransomware? Ransomware stops you from using your PC, files, or programs. The...

Read More
Employee checking phone because his company did not block personal email at work.

Short answer: Yes, you should block personal email at work. Long answer: Cinch I.T. provides computer support for hundreds of businesses and tens of thousands of users. In our experience, access to personal email is the primary cause of malicious software entering the workplace. Business owners can argue that there is a loss of productivity if employees have access to their personal email. More important than the...

Read More
Concerned Muslim business lady examining business continuity plan at flip chart in office.

Is your business prepared for any disaster? Even though small businesses may not have as many employees or as much equipment, they are still vulnerable to disaster as a large corporation. If a tornado destroyed your business office, you could lose valuable business if you don’t plan. Many companies don’t want to take the time and the expense to prepare a business continuity plan, but...

Read More
Business executive working with a laptop and connecting online with email I.T. services.

Email support is a primary focus of I.T. services across the country. Email size in Microsoft's Exchange server plays a vital role in the organization since it acts as an essential factor for bandwidth, storage limit, email queue, CPU utilization, and mailbox size. This knowledgebase article provides a deeper dive into how email size restriction plays in the 2013 Exchange server. Furthermore, the email message size...

Read More
Man looking for managed I.T. services for Microsoft Outlook email on laptop.

Looking for email managed I.T. services? This knowledgebase article explains how to copy cached Outlook email addresses and add them to a new user profile. This article is intended for I.T. services professionals, if you require assistance with your business email support please contact us! Jump Ahead: Microsoft Office 2003-2007 Microsoft Office 2010-2013 How to copy the autocomplete list in Outlook 2010, Outlook 2013, and Outlook...

Read More
Network Security - sticky note on laptop keyboard demonstrates insecure password.

You can have all the locks on your data center and all the network security available, but nothing will keep your data safe if your employees are sloppy with passwords. There are many ways data can fall prey to a breach. For example, opening a malicious email link is one of the most common sources of phishing scams. Here are some basic practices that you should...

Read More