We are thrilled to announce that as of January 1st, 2020, Computer Bits, Inc. has been acquired by Noventech, Inc., a leading local provider of Managed IT, Cybersecurity, VOIP and custom software development. The acquisition will better serve both Noventech and Computer Bits clients by expanding the knowledge and IT experience available to all our…
Did You Know? Microsoft has an application that can help you communicate more efficiently with your team or organization that may already be included in your Office 365 Subscription? Microsoft Teams is able to bring your team together with group chat, online meetings, file sharing, and web conferencing. Helpful Tip Office 365 Business…
Breaking News: iPhone 11 and 11 Pro launch along with iOS 13. Let’s make sure you are ready for the new iPhone or iOS update! With the new launch of Apple iPhones and iOS, we recommend that you backup your Apple device to iCloud to prevent losing any important data during the upgrade or while…
What is worse than losing all of your data on your mobile device? Contacts, messages, calendar events and more vanished and are nowhere to be found. Luckily, there is are many ways to save yourself from all that stress. There are multiple reasons for backing up your mobile device. You may be upgrading to a…
The April 2019 Patch Tuesday updates from Microsoft are causing conflicts with several Anti-Virus products including ones from Avast and Sophos.
Meltdown and Spectre are bugs in the architecture of most modern processors produced since 1995. Meltdown is specific to Intel processors while Spectre affects Intel, AMD and ARM processors. These bugs can be found in desktops, laptops, mobile devices, IoT devices and even cloud virtual machines where the underlying hardware is using an affected processor.…
Tech Support Scams Some scammers will call you and claim to be computer technicians with a well-known and established company such as Microsoft or Apple. Other scammers can send pop-up messages, emails that will notify the user that the computer is infected and has problems. The scammers will claim to be from “tech support” calling…
Shared office spaces have become very popular for startups and entrepreneurs. You can find them in most downtown areas. The range of amenities they offer differs greatly but they all have what is absolutely required for a business: space for a computer and internet access. We see a lot of these users plugging in the…
Adobe just released yet another announcement of a vulnerability in their Flash application that applies to all versions and all operating systems. The announcement explains that there is a vulnerability that can allow an attacker to take control of an affected system. The vulnerability has been seen “in the wild” which means attackers are currently…
Everyone is noticing the “Upgrade to Windows 10 for Free” campaigns everywhere. They are getting popups in their current operating system, receiving emails and even viewing commercials on the internet and TV. Microsoft it trying to consolidate their customers into keeping their operating systems current and will do almost anything to do it. With all…
One of the most common online security mistakes people make is using the same password over and over again. This allows a hacker to gain access to all of your online accounts if the password at a single site gets compromised. Most sites store your password in what is called a Hash, which is a…
As a domain owner you may receive notifications regarding your domain’s expiration and their renewal. When you receive these notifications it is important to know where you registered your domain name and where the renewal notifications should come from. Common domain registrars are Network Solutions, GoDaddy, Hover, eNom, etc. It is important to be able to identify…
The newest threat to corporate and small business networks are cryptographic viruses. These viruses encrypt all the data they can find on the local PC and then proceed to the network shares. Once the virus has run its course, all the data that the infected machine had access to is now completely unusable. Virus writers…
On Saturday, Microsoft announced that Internet Explorer versions 6 through 11 were at risk for so-called drive-by attacks from malicious websites. This leaves all users using Internet Explorer at risk until Microsoft releases a patch for the browser. They have yet to determine when this patch will be released or if they will even release…
[separator headline=”h3″ title=”What is Remote Web Workplace?”] Remote Web Workplace is a feature built into Microsoft Small Business Server, which makes it easy to remotely connect to your office PC over the Internet. It was introduced in SBS 2003 and has been improved in SBS 2008. The most commonly used feature of RWW is the…
Hosted spam filtering is a service we provide that cleans your e-mail of spam and viruses before it ever reaches you. It works by intercepting your mail before it reaches your server, filters out unwanted mail, and then forwards the result to your server. Mail containing spam and viruses never reaches your organization, not even…
Choosing a Smartphone to fit your needs can be a difficult challenge. What makes it difficult is the assortment of mail servers on the internet that corporations are using for their e-mail. By far the most common business e-mail platform is Microsoft Exchange which can be expensive to set up and administer. Recently, Hosted Microsoft…