Sheldon IT Solutions Sheldon IT Solutions Sheldon IT Solutions
Sheldon IT Solutions
  • Toggle menu
    Sheldon IT Solutions Sheldon IT Solutions Sheldon IT Solutions
    Sheldon IT Solutions
    • Services
    • Blog
    • Schedule a call
    iphone screen with icons on screen

    Microsoft Teams Plan Comparison: Free vs M365 Business vs Teams Essentials

    by Erik Sheldon June 20, 2022

    The shift to remote work over the last two years has caused companies to realign their digital tools. Now, many meetings default to being via video conference rather than in person, and working from home has become commonplace. Seventy-seven percent of remote workers say they’re…

    Share this:

    • Share on X (Opens in new window) X
    • Share on Facebook (Opens in new window) Facebook
    Microsoft 0
    Cyber Security, Technology, Network, Internet

    How to Protect Your Online Accounts from Being Breached

    by Erik Sheldon June 15, 2022

    Stolen login credentials are a hot commodity on the Dark Web. There’s a price for every type of account from online banking to social media. For example, hacked social media accounts will go for between $30 to $80 each. The rise in reliance on cloud…

    Share this:

    • Share on X (Opens in new window) X
    • Share on Facebook (Opens in new window) Facebook
    Cybersecurity 0
    Phishing, Credentials, Data, Login, Password, Internet

    6 Ways to Combat Social Phishing Attacks

    by Erik Sheldon June 10, 2022

    Phishing is the number one method of attack delivery for everything from ransomware to credential theft. We are very aware of it coming by email, but other types of phishing have been growing rapidly. In recent years, phishing over social media has skyrocketed by 500%….

    Share this:

    • Share on X (Opens in new window) X
    • Share on Facebook (Opens in new window) Facebook
    Cybersecurity 0
    Upload, Online, Internet, Files, Cloud, Technology

    4 Interesting Cloud Storage Trends to Watch for in 2022

    by Erik Sheldon June 5, 2022

    One area of cloud computing that is used widely, but often isn’t as flashy as the software side is cloud storage. Storing files in the cloud to make them easily accessible and shareable from anywhere was one of the very first uses of the cloud…

    Share this:

    • Share on X (Opens in new window) X
    • Share on Facebook (Opens in new window) Facebook
    Business Continuity, Cloud 0
    person using laptop

    5 Things You Should Never Do on a Work Computer

    by Erik Sheldon May 31, 2022

    Whether you work remotely or in an office, the line between personal and work tasks can become blurred when working on your company computer. If you’re in front of a computer for most of your time during work, then it’s not unusual to get attached…

    Share this:

    • Share on X (Opens in new window) X
    • Share on Facebook (Opens in new window) Facebook
    Cybersecurity 0
    Hacking, Data Theft, Online Fraud, Cyber Crime, Hacker

    Alarming Phishing Attack Trends to Beware of in 2022

    by Erik Sheldon May 25, 2022

    In 2020, 75% of companies around the world experienced a phishing attack. Phishing remains one of the biggest dangers to your business’s health and wellbeing because it’s the main delivery method for all types of cyberattacks. One phishing email can be responsible for a company…

    Share this:

    • Share on X (Opens in new window) X
    • Share on Facebook (Opens in new window) Facebook
    Cybersecurity 0
    From above view of faceless person holding mobile phone with white screen and green recycle logo above marble surface

    Important Steps to Take Before You Recycle a Mobile Phone Number 

    by Erik Sheldon May 20, 2022

    It’s not unusual to change a mobile number from time to time. For example, when you move, you may want a number that is local to the area you just moved to. Companies also may end up recycling mobile numbers throughout their staff as people…

    Share this:

    • Share on X (Opens in new window) X
    • Share on Facebook (Opens in new window) Facebook
    Cybersecurity 0
    person using black laptop computer

    These Google Search Tips Will Save You Tons of Time!

    by Erik Sheldon May 15, 2022

    Over 2.4 million searches happen every minute on Google. It’s often the first stop people make when they go online. We search daily for both personal and work needs, and often searching out the right information can take a lot of time if you have…

    Share this:

    • Share on X (Opens in new window) X
    • Share on Facebook (Opens in new window) Facebook
    Productivity 0
    Computer, Circuit Board, Cpu, Security, Digital

    Top 5 Cybersecurity Mistakes That Leave Your Data at Risk

    by Erik Sheldon May 10, 2022

    The global damage of cybercrime has risen to an average of $11 million USD per minute, which is a cost of $190,000 each second. 60% of small and mid-sized companies that have a data breach end up closing their doors within six months because they…

    Share this:

    • Share on X (Opens in new window) X
    • Share on Facebook (Opens in new window) Facebook
    Cybersecurity 0
    person using Windows 11 computer on lap

    What Are the Most Helpful Features of Windows 11?

    by Erik Sheldon May 5, 2022

    Windows 11 has been out for a few months now, beginning rollout in October of 2021. It has been largely well-received and seen as stable with very few bugs noted. One of the reasons that Windows 11 has been welcomed with open arms for both…

    Share this:

    • Share on X (Opens in new window) X
    • Share on Facebook (Opens in new window) Facebook
    Microsoft 0
    • Previous
    • 1
    • …
    • 23
    • 24
    • 25
    • 26
    • 27
    • 28
    • 29
    • …
    • 32
    • Next

    0
    Online Presence
    LinkedIn “Social Engineering”: Protecting Your Staff from Fake Recruitment Scams
    0
    Working from Home
    “Clean Desk” 2.0: Securing Your Home Office from Physical Data Leaks
    0
    Working from Home
    The Essential Checklist for Securing Company Laptops at Home

    Categories

    • AI (5)
    • Business (14)
    • Business Continuity (11)
    • Cloud (11)
    • Compliance (1)
    • Cybersecurity (139)
    • Data Security (3)
    • End of Life (1)
    • Focus (1)
    • IT Management (23)
    • Microsoft (39)
    • New Technology (20)
    • Office365 (4)
    • Online Presence (4)
    • Passwords (2)
    • Phishing (1)
    • Productivity (36)
    • Quick Tech Tips (2)
    • Security (22)
    • Software (6)
    • Uncategorized (5)
    • Windows (4)
    • Windows Server (2)
    • Working from Home (3)

    Tags

    1Password apps backup antivirus compliance cybersecurity data security disaster recovery email firewall focus KeyPass LastPass malware microsoft Microsoft Server 2008 microsoft server 2016 microsoft server 2019 microsoft windows 10 mobile O365 Office365 office 365 passwords patch patches patch tuesday phishing Productivity ransomware remotework remote work scam of the week security spam spear-phishing tutorials updates videos wannacry WatchGuard windows windows 10 Windows 11 windows updates yahoo

    Latest Blog Posts

    0
    Online Presence
    LinkedIn “Social Engineering”: Protecting Your Staff from Fake Recruitment Scams
    0
    Working from Home
    “Clean Desk” 2.0: Securing Your Home Office from Physical Data Leaks

    Sheldon IT Solutions, LLC

    281-858-3498
    info@sheldonitsolutions.com