NEWS FROM THE EDGE

Tech Tips and Advice from the Experts at Dynamic Edge

March Newsletter!

Read the March 2014 Edition of the Dynamic Edge Newsletter by clicking the links below:

AA Newsletter – March 2014

TN Newsletter – March 2014

Did you get a new laptop with Windows 8 on it? Are you hoping Microsoft won’t force you to upgrade? Computers are constantly evolving, and you don’t want to get left behind. Just recently, Microsoft announced that they will no longer support Windows XP starting in April! Are you ready?

Join me on April 8th for a FREE webinar where I will share with you everything you need to know about Windows 8. I will reveal the biggest issues businesses experience when transitioning to Windows 8, and provide a number of must know Windows 8 tips to speed up your work. Register below.
continue reading

Why You Should Archive Your Inbox

MailboxqualityIt can easily be said that e-mail has become the single most important communication tool in businesses. Messages can pile up quickly however, taking up storage space that can be expensive to back up. Since deleting everything isn’t always the best course of action, the smartest option is to archive your inbox.

Archiving is simply the process of removing old (but important) e-mails from your “active” inbox and placing them into a compressed, encrypted backup. This frees up space in your inbox and preserves your e-mails in case you need to dig them up at some point in the future. Here are three important reasons why you should archive:
continue reading

2316-1267349631i8vS

It is a proven fact that all hard drives will eventually fail. Some will fail prematurely due to manufacturers’ defects while others will fail simply because of wear and tear. The question is: how long until this occurs?

For the last four years, online backup provider Backblaze.com has kept 25,000 consumer-grade hard drives constantly running, keeping a record of whenever a hard drive breaks down. Their results are very interesting. 
continue reading

Bruce’s Business Tips

old-key-1385384620Pb2

Are you handing a criminal the keys to your network? Over the last couple years, network security has become more and more important. We have made tremendous strides when it comes to eliminating SPAM and reducing viruses. We have tools that constantly scan your computer for viruses and we even manually scan your computers on Thursdays (if you are a Fixed IT customer). So you are safe, right? Wrong.

Lately we have seen a number of traps set for unsuspecting users. These traps trick the user into inadvertently handing over the keys to your network. What’s worse is that most of the time the user doesn’t even know it happened. It’s like having your wallet stolen on a busy subway and not even knowing you were on the subway to begin with.
continue reading

Protect Your Data

Pop quiz! How many password-protected accounts do you have? How many passwords on that list are unique?

It’s very likely that you re-use your password because you thought of a “good one” that is both strong and easy to remember. A strong password is great step toward protecting your account data, but if you use the same one for everything… Well, then you’ve actually taken a great step backwards. Would you use the same physical key for every building you access? What if you lost it? Or someone stole it? The potential risks are huge!
continue reading