Tech Blog

Cinch I.T. > Tech Blog

Short answer: Yes   Long answer: Cinch I.T. provides computer support for hundreds of businesses and tens of thousands of users. In our experience, access to personal email is the primary cause of malicious software entering the workplace. Business owners can make an argument that there is a loss of productivity if employees are allowed to access personal email. More important than the loss of productivity is the potential...

Read More
Concerned Muslim business lady examining business continuity plan at flip chart in office.

Is your business prepared for any disaster? Even though small businesses may not have as many employees or as much equipment, they are still vulnerable to disaster as a large corporation. If a tornado destroyed your business office, you could lose valuable business if you don’t plan. Many companies don’t want to take the time and the expense to prepare a business continuity plan, but...

Read More
Business executive working with a laptop and connecting online with email I.T. services.

Email support is a primary focus of I.T. services across the country. Email size in Microsoft's Exchange server plays a vital role in the organization since it acts as an essential factor for bandwidth, storage limit, email queue, CPU utilization, and mailbox size. This knowledgebase article provides a deeper dive into how email size restriction plays in the 2013 Exchange server. Furthermore, the email message size...

Read More
Man looking for I.T. support for Microsoft Outlook email on laptop.

Looking for email I.T. support? This knowledgebase article explains how to copy cached Outlook email addresses and add them to a new user profile. This article is intended for I.T. support professionals, if you require assistance with your business email support please contact us! Jump Ahead: Microsoft Office 2003-2007 Microsoft Office 2010-2013 How to copy the autocomplete list in Outlook 2010, Outlook 2013, and Outlook 2016 Microsoft Office 2003-2007: Within the...

Read More
Network Security - sticky note on laptop keyboard demonstrates insecure password.

You can have all the locks on your data center and all the network security available, but nothing will keep your data safe if your employees are sloppy with passwords. There are many ways data can fall prey to a breach. For example, opening a malicious email link is one of the most common sources of phishing scams. Here are some basic practices that you should...

Read More
Computer support seminar with newly hired remote employee.

Remote workforces rely on computer support. Many business owners are asking themselves right now - is a remote workforce right for me? Access to better talents, a cut on costs, and improved productivity are all possible advantages. Candidates, on the other hand, enjoy the flexibility, independence, and work-life balance that comes with distributed labor. When you're hiring someone to work from home, you're not just looking for...

Read More
Network security console controls via tablet.

On July 15, several high-profile Twitter accounts were hacked to spread a cryptocurrency scam. Twitter has enterprise-level network security, so how did hackers gain access to these profiles? Twitter reported that the hackers used an internal admin tool to gain access to the accounts. Specifically, the company tweeted that "a coordinated social engineering attack" on employees gave a hacker "access to internal systems and tools." Cybercriminals...

Read More
Inc. 5000 names Cinch I.T. a top managed services provider in the IT support industry.

Cinch I.T. Ranks No. 3151 on the 2019 Inc. 5000 With Three-Year Revenue Growth of nearly 67%   NEW YORK, August 14, 2019 – Inc. magazine today revealed that Cinch I.T. - a top I.T. service and computer support provider - is No. 3151 on its annual Inc. 5000 list, the most prestigious ranking of the nation's fastest-growing private companies. The list represents a unique look at...

Read More
Business owner considers how to transition back to the office with safe cybersecurity.

In light of the COVID-19 pandemic, businesses across the country are trying to figure out how to transition back to the office. Cybersecurity is a primary concern for these companies. Companies all over the U.S. have weighed the benefits of moving to a remote workforce model. That said, not every industry had the chance to do this. Those companies that did allow employees to work from...

Read More
Executive managers review their company's business continuity plan.

We don't always get advance notice that a crisis is about to start. Even with ample heads-up, you still need a business continuity plan to avoid a major disruption to your business. To allow your company the best chance at surviving during a disaster, you need to produce a modern, accessible plan. Once finished, you should distribute it among all personnel responsible for managing your company....

Read More